Solian/lib/providers/auth.dart

164 lines
4.3 KiB
Dart
Raw Normal View History

2024-05-18 14:23:36 +00:00
import 'dart:async';
import 'dart:convert';
import 'dart:developer';
2024-05-18 14:23:36 +00:00
import 'package:flutter/material.dart';
import 'package:flutter_secure_storage/flutter_secure_storage.dart';
import 'package:get/get.dart';
import 'package:get/get_connect/http/src/request/request.dart';
2024-05-25 05:00:40 +00:00
import 'package:solian/providers/account.dart';
2024-05-26 05:39:21 +00:00
import 'package:solian/providers/chat.dart';
2024-05-18 14:23:36 +00:00
import 'package:solian/services.dart';
import 'package:oauth2/oauth2.dart' as oauth2;
class AuthProvider extends GetConnect {
final tokenEndpoint =
Uri.parse('${ServiceFinder.services['passport']}/api/auth/token');
2024-05-18 14:23:36 +00:00
static const clientId = 'solian';
static const clientSecret = '_F4%q2Eea3';
static const storage = FlutterSecureStorage();
@override
void onInit() {
httpClient.baseUrl = ServiceFinder.services['passport'];
loadCredentials();
2024-05-18 14:23:36 +00:00
}
oauth2.Credentials? credentials;
2024-05-25 05:00:40 +00:00
Future<void> refreshCredentials() async {
final resp = await post('/api/auth/token', {
'refresh_token': credentials!.refreshToken,
'grant_type': 'refresh_token',
});
if (resp.statusCode != 200) {
throw Exception(resp.bodyString);
}
credentials = oauth2.Credentials(
resp.body['access_token'],
refreshToken: resp.body['refresh_token'],
idToken: resp.body['access_token'],
tokenEndpoint: tokenEndpoint,
expiration: DateTime.now().add(const Duration(minutes: 3)),
);
storage.write(
key: 'auth_credentials',
value: jsonEncode(credentials!.toJson()),
);
}
Future<Request<T?>> requestAuthenticator<T>(Request<T?> request) async {
try {
await ensureCredentials();
2024-05-18 14:23:36 +00:00
request.headers['Authorization'] = 'Bearer ${credentials!.accessToken}';
} catch (_) {}
2024-05-18 14:23:36 +00:00
return request;
}
2024-06-22 14:39:32 +00:00
GetConnect configureClient(
String service, {
timeout = const Duration(seconds: 5),
}) {
final client = GetConnect(
maxAuthRetries: 3,
timeout: timeout,
allowAutoSignedCert: true,
);
client.httpClient.addAuthenticator(requestAuthenticator);
2024-06-22 14:39:32 +00:00
client.httpClient.baseUrl = ServiceFinder.services[service];
return client;
}
Future<void> ensureCredentials() async {
if (!await isAuthorized) throw Exception('unauthorized');
if (credentials == null) await loadCredentials();
if (credentials!.isExpired) {
await refreshCredentials();
log("Refreshed credentials at ${DateTime.now()}");
}
}
Future<void> loadCredentials() async {
if (await isAuthorized) {
final content = await storage.read(key: 'auth_credentials');
credentials = oauth2.Credentials.fromJson(jsonDecode(content!));
}
2024-05-18 14:23:36 +00:00
}
Future<oauth2.Credentials> signin(
BuildContext context,
String username,
String password,
) async {
2024-06-01 13:39:28 +00:00
_cachedUserProfileResponse = null;
2024-05-18 14:23:36 +00:00
final resp = await oauth2.resourceOwnerPasswordGrant(
tokenEndpoint,
username,
password,
identifier: clientId,
secret: clientSecret,
scopes: ['*'],
basicAuth: false,
);
credentials = oauth2.Credentials(
resp.credentials.accessToken,
refreshToken: resp.credentials.refreshToken!,
idToken: resp.credentials.accessToken,
tokenEndpoint: tokenEndpoint,
expiration: DateTime.now().add(const Duration(minutes: 3)),
);
storage.write(
key: 'auth_credentials',
value: jsonEncode(credentials!.toJson()),
);
2024-05-18 14:23:36 +00:00
2024-05-25 05:00:40 +00:00
Get.find<AccountProvider>().connect();
2024-05-25 05:19:16 +00:00
Get.find<AccountProvider>().notifyPrefetch();
2024-05-26 05:39:21 +00:00
Get.find<ChatProvider>().connect();
2024-05-25 05:00:40 +00:00
2024-05-18 14:23:36 +00:00
return credentials!;
}
void signout() {
2024-06-01 13:39:28 +00:00
_cachedUserProfileResponse = null;
2024-05-26 05:39:21 +00:00
Get.find<ChatProvider>().disconnect();
2024-05-25 05:00:40 +00:00
Get.find<AccountProvider>().disconnect();
2024-05-25 05:19:16 +00:00
Get.find<AccountProvider>().notifications.clear();
Get.find<AccountProvider>().notificationUnread.value = 0;
2024-05-25 05:00:40 +00:00
2024-05-18 14:23:36 +00:00
storage.deleteAll();
}
2024-06-06 15:28:19 +00:00
// Data Layer
2024-06-01 13:39:28 +00:00
Response? _cachedUserProfileResponse;
2024-05-18 14:23:36 +00:00
Future<bool> get isAuthorized => storage.containsKey(key: 'auth_credentials');
Future<Response> getProfile({noCache = false}) async {
2024-06-01 13:39:28 +00:00
if (!noCache && _cachedUserProfileResponse != null) {
return _cachedUserProfileResponse!;
}
2024-06-22 14:39:32 +00:00
final client = configureClient('passport');
final resp = await client.get('/api/users/me');
2024-05-31 17:25:45 +00:00
if (resp.statusCode != 200) {
throw Exception(resp.bodyString);
} else {
2024-06-01 13:39:28 +00:00
_cachedUserProfileResponse = resp;
2024-05-31 17:25:45 +00:00
}
return resp;
}
2024-05-18 14:23:36 +00:00
}