2024-01-06 17:56:32 +00:00
|
|
|
package services
|
|
|
|
|
|
|
|
import (
|
2024-09-19 14:18:22 +00:00
|
|
|
"context"
|
2024-01-28 08:17:38 +00:00
|
|
|
"fmt"
|
2024-10-26 16:06:23 +00:00
|
|
|
"git.solsynth.dev/hypernet/nexus/pkg/nex"
|
|
|
|
"git.solsynth.dev/hypernet/nexus/pkg/proto"
|
2024-10-31 12:38:50 +00:00
|
|
|
"git.solsynth.dev/hypernet/passport/pkg/authkit/models"
|
2024-12-08 12:21:40 +00:00
|
|
|
localCache "git.solsynth.dev/hypernet/passport/pkg/internal/cache"
|
|
|
|
"github.com/eko/gocache/lib/v4/cache"
|
|
|
|
"github.com/eko/gocache/lib/v4/marshaler"
|
|
|
|
"github.com/eko/gocache/lib/v4/store"
|
2024-07-12 05:31:39 +00:00
|
|
|
"time"
|
2024-08-01 04:21:34 +00:00
|
|
|
"unicode"
|
2024-07-12 05:31:39 +00:00
|
|
|
|
2024-10-31 12:38:50 +00:00
|
|
|
"git.solsynth.dev/hypernet/passport/pkg/internal/gap"
|
2024-09-25 12:18:11 +00:00
|
|
|
|
2024-07-30 10:20:45 +00:00
|
|
|
"gorm.io/gorm/clause"
|
|
|
|
|
2024-06-26 07:52:58 +00:00
|
|
|
"github.com/rs/zerolog/log"
|
2024-05-17 09:13:11 +00:00
|
|
|
"github.com/spf13/viper"
|
|
|
|
"gorm.io/datatypes"
|
2024-03-20 12:56:43 +00:00
|
|
|
|
2024-10-31 12:38:50 +00:00
|
|
|
"git.solsynth.dev/hypernet/passport/pkg/internal/database"
|
2024-01-29 08:11:59 +00:00
|
|
|
"github.com/google/uuid"
|
2024-01-28 16:32:39 +00:00
|
|
|
"github.com/samber/lo"
|
2024-01-06 17:56:32 +00:00
|
|
|
)
|
|
|
|
|
2024-12-08 12:21:40 +00:00
|
|
|
func GetAccountCacheKey(query any) string {
|
|
|
|
return fmt.Sprintf("account-query#%v", query)
|
|
|
|
}
|
|
|
|
|
|
|
|
func CacheAccount(account models.Account) {
|
|
|
|
cacheManager := cache.New[any](localCache.S)
|
|
|
|
marshal := marshaler.New(cacheManager)
|
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
_ = marshal.Set(
|
|
|
|
ctx,
|
|
|
|
GetAccountCacheKey(account.Name),
|
|
|
|
account,
|
|
|
|
store.WithExpiration(30*time.Minute),
|
|
|
|
store.WithTags([]string{"account", fmt.Sprintf("user#%d", account.ID)}),
|
|
|
|
)
|
|
|
|
_ = marshal.Set(
|
|
|
|
ctx,
|
|
|
|
GetAccountCacheKey(account.ID),
|
|
|
|
account,
|
|
|
|
store.WithExpiration(30*time.Minute),
|
|
|
|
store.WithTags([]string{"account", fmt.Sprintf("user#%d", account.ID)}),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2024-08-01 04:21:34 +00:00
|
|
|
func ValidateAccountName(val string, min, max int) bool {
|
|
|
|
actualLength := 0
|
|
|
|
for _, r := range val {
|
|
|
|
if unicode.Is(unicode.Han, r) || unicode.Is(unicode.Hiragana, r) || unicode.Is(unicode.Katakana, r) || unicode.Is(unicode.Hangul, r) {
|
|
|
|
actualLength += 2
|
|
|
|
} else {
|
|
|
|
actualLength += 1
|
|
|
|
}
|
|
|
|
}
|
2024-08-01 15:55:33 +00:00
|
|
|
return actualLength >= min && max >= actualLength
|
2024-08-01 04:21:34 +00:00
|
|
|
}
|
|
|
|
|
2024-01-07 07:52:23 +00:00
|
|
|
func GetAccount(id uint) (models.Account, error) {
|
|
|
|
var account models.Account
|
|
|
|
if err := database.C.Where(models.Account{
|
|
|
|
BaseModel: models.BaseModel{ID: id},
|
|
|
|
}).First(&account).Error; err != nil {
|
|
|
|
return account, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return account, nil
|
|
|
|
}
|
|
|
|
|
2024-07-17 06:04:55 +00:00
|
|
|
func GetAccountList(id []uint) ([]models.Account, error) {
|
|
|
|
var accounts []models.Account
|
|
|
|
if err := database.C.Where("id IN ?", id).Find(&accounts).Error; err != nil {
|
|
|
|
return accounts, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return accounts, nil
|
|
|
|
}
|
|
|
|
|
2024-06-26 12:05:28 +00:00
|
|
|
func GetAccountWithName(alias string) (models.Account, error) {
|
|
|
|
var account models.Account
|
|
|
|
if err := database.C.Where(models.Account{
|
|
|
|
Name: alias,
|
|
|
|
}).First(&account).Error; err != nil {
|
|
|
|
return account, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return account, nil
|
|
|
|
}
|
|
|
|
|
2024-04-20 11:04:33 +00:00
|
|
|
func LookupAccount(probe string) (models.Account, error) {
|
2024-01-06 17:56:32 +00:00
|
|
|
var account models.Account
|
2024-04-20 11:04:33 +00:00
|
|
|
if err := database.C.Where(models.Account{Name: probe}).First(&account).Error; err == nil {
|
2024-01-06 17:56:32 +00:00
|
|
|
return account, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var contact models.AccountContact
|
2024-04-20 11:04:33 +00:00
|
|
|
if err := database.C.Where(models.AccountContact{Content: probe}).First(&contact).Error; err == nil {
|
2024-01-06 17:56:32 +00:00
|
|
|
if err := database.C.
|
|
|
|
Where(models.Account{
|
|
|
|
BaseModel: models.BaseModel{ID: contact.AccountID},
|
2024-01-27 16:05:19 +00:00
|
|
|
}).First(&account).Error; err == nil {
|
2024-01-06 17:56:32 +00:00
|
|
|
return account, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return account, fmt.Errorf("account was not found")
|
|
|
|
}
|
2024-01-28 08:17:38 +00:00
|
|
|
|
2024-07-30 10:20:45 +00:00
|
|
|
func SearchAccount(probe string) ([]models.Account, error) {
|
|
|
|
probe = "%" + probe + "%"
|
|
|
|
var accounts []models.Account
|
2024-07-30 11:39:53 +00:00
|
|
|
if err := database.C.Where("name LIKE ? OR nick LIKE ?", probe, probe).Find(&accounts).Error; err != nil {
|
2024-07-30 10:20:45 +00:00
|
|
|
return accounts, err
|
|
|
|
}
|
|
|
|
return accounts, nil
|
|
|
|
}
|
|
|
|
|
2024-01-28 08:17:38 +00:00
|
|
|
func CreateAccount(name, nick, email, password string) (models.Account, error) {
|
|
|
|
user := models.Account{
|
2024-02-18 07:51:27 +00:00
|
|
|
Name: name,
|
|
|
|
Nick: nick,
|
2024-01-28 08:17:38 +00:00
|
|
|
Profile: models.AccountProfile{
|
|
|
|
Experience: 100,
|
|
|
|
},
|
|
|
|
Factors: []models.AuthFactor{
|
|
|
|
{
|
|
|
|
Type: models.PasswordAuthFactor,
|
2024-04-20 11:04:33 +00:00
|
|
|
Secret: HashPassword(password),
|
2024-01-28 08:17:38 +00:00
|
|
|
},
|
2024-01-29 08:11:59 +00:00
|
|
|
{
|
|
|
|
Type: models.EmailPasswordFactor,
|
|
|
|
Secret: uuid.NewString()[:8],
|
|
|
|
},
|
2024-01-28 08:17:38 +00:00
|
|
|
},
|
|
|
|
Contacts: []models.AccountContact{
|
|
|
|
{
|
|
|
|
Type: models.EmailAccountContact,
|
|
|
|
Content: email,
|
2024-01-29 08:11:59 +00:00
|
|
|
IsPrimary: true,
|
2024-01-28 08:17:38 +00:00
|
|
|
VerifiedAt: nil,
|
|
|
|
},
|
|
|
|
},
|
2024-07-24 09:33:05 +00:00
|
|
|
PermNodes: datatypes.JSONMap{},
|
2024-01-28 08:17:38 +00:00
|
|
|
ConfirmedAt: nil,
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := database.C.Create(&user).Error; err != nil {
|
|
|
|
return user, err
|
2024-07-24 09:33:05 +00:00
|
|
|
} else if viper.GetInt("default_user_group") > 0 {
|
|
|
|
database.C.Create(&models.AccountGroupMember{
|
|
|
|
AccountID: user.ID,
|
|
|
|
GroupID: uint(viper.GetInt("default_user_group")),
|
|
|
|
})
|
2024-01-28 08:17:38 +00:00
|
|
|
}
|
2024-01-28 16:32:39 +00:00
|
|
|
|
|
|
|
if tk, err := NewMagicToken(models.ConfirmMagicToken, &user, nil); err != nil {
|
|
|
|
return user, err
|
|
|
|
} else if err := NotifyMagicToken(tk); err != nil {
|
|
|
|
return user, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return user, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func ConfirmAccount(code string) error {
|
2024-01-29 08:11:59 +00:00
|
|
|
token, err := ValidateMagicToken(code, models.ConfirmMagicToken)
|
|
|
|
if err != nil {
|
2024-01-28 16:32:39 +00:00
|
|
|
return err
|
2024-06-30 09:01:39 +00:00
|
|
|
} else if token.AccountID == nil {
|
|
|
|
return fmt.Errorf("magic token didn't assign a valid account")
|
2024-01-28 16:32:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var user models.Account
|
|
|
|
if err := database.C.Where(&models.Account{
|
2024-06-26 07:52:58 +00:00
|
|
|
BaseModel: models.BaseModel{ID: *token.AccountID},
|
2024-01-28 16:32:39 +00:00
|
|
|
}).First(&user).Error; err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2024-07-03 15:01:20 +00:00
|
|
|
if err = ForceConfirmAccount(user); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
database.C.Delete(&token)
|
|
|
|
}
|
2024-05-17 09:13:11 +00:00
|
|
|
|
2024-07-03 15:01:20 +00:00
|
|
|
return nil
|
|
|
|
}
|
2024-01-28 16:32:39 +00:00
|
|
|
|
2024-07-03 15:01:20 +00:00
|
|
|
func ForceConfirmAccount(user models.Account) error {
|
|
|
|
user.ConfirmedAt = lo.ToPtr(time.Now())
|
|
|
|
|
|
|
|
for k, v := range viper.GetStringMap("permissions.verified") {
|
|
|
|
if val, ok := user.PermNodes[k]; !ok {
|
|
|
|
user.PermNodes[k] = v
|
|
|
|
} else {
|
|
|
|
user.PermNodes[k] = val
|
2024-01-28 16:32:39 +00:00
|
|
|
}
|
2024-07-03 15:01:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := database.C.Save(&user).Error; err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2024-01-28 16:32:39 +00:00
|
|
|
|
2024-07-03 15:01:20 +00:00
|
|
|
InvalidAuthCacheWithUser(user.ID)
|
2024-05-17 11:37:58 +00:00
|
|
|
|
2024-07-03 15:01:20 +00:00
|
|
|
return nil
|
2024-01-28 08:17:38 +00:00
|
|
|
}
|
2024-06-26 07:52:58 +00:00
|
|
|
|
2024-09-19 14:18:22 +00:00
|
|
|
func CheckAbleToDeleteAccount(user models.Account) error {
|
|
|
|
if user.AutomatedID != nil {
|
|
|
|
return fmt.Errorf("bot cannot request delete account, head to developer portal and dispose bot")
|
|
|
|
}
|
|
|
|
|
|
|
|
var count int64
|
|
|
|
if err := database.C.
|
|
|
|
Where("account_id = ?", user.ID).
|
|
|
|
Where("expired_at < ?", time.Now()).
|
2024-09-25 12:18:11 +00:00
|
|
|
Where("type = ?", models.DeleteAccountMagicToken).
|
2024-09-19 14:18:22 +00:00
|
|
|
Model(&models.MagicToken{}).
|
|
|
|
Count(&count).Error; err != nil {
|
|
|
|
return fmt.Errorf("unable to check delete account ability: %v", err)
|
|
|
|
} else if count > 0 {
|
|
|
|
return fmt.Errorf("you requested delete account recently")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func RequestDeleteAccount(user models.Account) error {
|
|
|
|
if tk, err := NewMagicToken(
|
|
|
|
models.DeleteAccountMagicToken,
|
|
|
|
&user,
|
|
|
|
lo.ToPtr(time.Now().Add(24*time.Hour)),
|
|
|
|
); err != nil {
|
|
|
|
return err
|
|
|
|
} else if err := NotifyMagicToken(tk); err != nil {
|
|
|
|
log.Error().
|
|
|
|
Err(err).
|
|
|
|
Str("code", tk.Code).
|
|
|
|
Uint("user", user.ID).
|
|
|
|
Msg("Failed to notify delete account magic token...")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func ConfirmDeleteAccount(code string) error {
|
|
|
|
token, err := ValidateMagicToken(code, models.DeleteAccountMagicToken)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if token.AccountID == nil {
|
|
|
|
return fmt.Errorf("magic token didn't assign a valid account")
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := DeleteAccount(*token.AccountID); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
database.C.Delete(&token)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-06-30 09:01:39 +00:00
|
|
|
func CheckAbleToResetPassword(user models.Account) error {
|
|
|
|
var count int64
|
|
|
|
if err := database.C.
|
|
|
|
Where("account_id = ?", user.ID).
|
|
|
|
Where("expired_at < ?", time.Now()).
|
2024-06-30 09:20:05 +00:00
|
|
|
Where("type = ?", models.ResetPasswordMagicToken).
|
2024-06-30 09:01:39 +00:00
|
|
|
Model(&models.MagicToken{}).
|
|
|
|
Count(&count).Error; err != nil {
|
|
|
|
return fmt.Errorf("unable to check reset password ability: %v", err)
|
2024-06-30 09:20:05 +00:00
|
|
|
} else if count > 0 {
|
2024-06-30 09:01:39 +00:00
|
|
|
return fmt.Errorf("you requested reset password recently")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func RequestResetPassword(user models.Account) error {
|
|
|
|
if tk, err := NewMagicToken(
|
|
|
|
models.ResetPasswordMagicToken,
|
|
|
|
&user,
|
|
|
|
lo.ToPtr(time.Now().Add(24*time.Hour)),
|
|
|
|
); err != nil {
|
|
|
|
return err
|
|
|
|
} else if err := NotifyMagicToken(tk); err != nil {
|
|
|
|
log.Error().
|
|
|
|
Err(err).
|
|
|
|
Str("code", tk.Code).
|
|
|
|
Uint("user", user.ID).
|
|
|
|
Msg("Failed to notify password reset magic token...")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func ConfirmResetPassword(code, newPassword string) error {
|
|
|
|
token, err := ValidateMagicToken(code, models.ResetPasswordMagicToken)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if token.AccountID == nil {
|
|
|
|
return fmt.Errorf("magic token didn't assign a valid account")
|
|
|
|
}
|
|
|
|
|
|
|
|
factor, err := GetPasswordTypeFactor(*token.AccountID)
|
|
|
|
if err != nil {
|
|
|
|
factor = models.AuthFactor{
|
|
|
|
Type: models.PasswordAuthFactor,
|
|
|
|
Secret: HashPassword(newPassword),
|
|
|
|
AccountID: *token.AccountID,
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
factor.Secret = HashPassword(newPassword)
|
|
|
|
}
|
|
|
|
|
2024-09-19 14:18:22 +00:00
|
|
|
if err = database.C.Save(&factor).Error; err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
database.C.Delete(&token)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
2024-06-30 09:01:39 +00:00
|
|
|
}
|
|
|
|
|
2024-06-26 07:52:58 +00:00
|
|
|
func DeleteAccount(id uint) error {
|
|
|
|
tx := database.C.Begin()
|
|
|
|
|
2024-07-24 09:23:44 +00:00
|
|
|
if err := tx.Select(clause.Associations).Delete(&models.Account{}, "id = ?", id).Error; err != nil {
|
2024-06-26 07:52:58 +00:00
|
|
|
tx.Rollback()
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2024-09-19 14:18:22 +00:00
|
|
|
if err := tx.Commit().Error; err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
InvalidAuthCacheWithUser(id)
|
2024-10-26 16:06:23 +00:00
|
|
|
_, _ = proto.NewDirectoryServiceClient(gap.Nx.GetNexusGrpcConn()).BroadcastEvent(context.Background(), &proto.EventInfo{
|
|
|
|
Event: "deletion",
|
|
|
|
Data: nex.EncodeMap(map[string]any{
|
|
|
|
"type": "account",
|
|
|
|
"id": fmt.Sprintf("%d", id),
|
|
|
|
}),
|
2024-09-19 14:18:22 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
2024-06-26 07:52:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func RecycleUnConfirmAccount() {
|
2024-10-13 05:00:51 +00:00
|
|
|
deadline := time.Now().Add(-24 * time.Hour)
|
|
|
|
|
2024-06-26 07:52:58 +00:00
|
|
|
var hitList []models.Account
|
2024-10-13 05:00:51 +00:00
|
|
|
if err := database.C.Where("confirmed_at IS NULL AND created_at <= ?", deadline).Find(&hitList).Error; err != nil {
|
2024-06-26 07:52:58 +00:00
|
|
|
log.Error().Err(err).Msg("An error occurred while recycling accounts...")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(hitList) > 0 {
|
|
|
|
log.Info().Int("count", len(hitList)).Msg("Going to recycle those un-confirmed accounts...")
|
|
|
|
for _, entry := range hitList {
|
|
|
|
if err := DeleteAccount(entry.ID); err != nil {
|
|
|
|
log.Error().Err(err).Msg("An error occurred while recycling accounts...")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2024-06-26 12:28:12 +00:00
|
|
|
|
|
|
|
func SetAccountLastSeen(uid uint) error {
|
|
|
|
var profile models.AccountProfile
|
|
|
|
if err := database.C.Where("account_id = ?", uid).First(&profile).Error; err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
profile.LastSeenAt = lo.ToPtr(time.Now())
|
|
|
|
|
|
|
|
return database.C.Save(&profile).Error
|
|
|
|
}
|