Passport/pkg/internal/services/accounts.go

386 lines
9.4 KiB
Go
Raw Normal View History

2024-01-06 17:56:32 +00:00
package services
import (
2024-09-19 14:18:22 +00:00
"context"
2024-01-28 08:17:38 +00:00
"fmt"
2024-10-26 16:06:23 +00:00
"git.solsynth.dev/hypernet/nexus/pkg/nex"
"git.solsynth.dev/hypernet/nexus/pkg/proto"
"git.solsynth.dev/hypernet/passport/pkg/authkit/models"
2024-12-08 12:21:40 +00:00
localCache "git.solsynth.dev/hypernet/passport/pkg/internal/cache"
"github.com/eko/gocache/lib/v4/cache"
"github.com/eko/gocache/lib/v4/marshaler"
"github.com/eko/gocache/lib/v4/store"
2024-07-12 05:31:39 +00:00
"time"
"unicode"
2024-07-12 05:31:39 +00:00
"git.solsynth.dev/hypernet/passport/pkg/internal/gap"
2024-09-25 12:18:11 +00:00
"gorm.io/gorm/clause"
2024-06-26 07:52:58 +00:00
"github.com/rs/zerolog/log"
2024-05-17 09:13:11 +00:00
"github.com/spf13/viper"
"gorm.io/datatypes"
2024-03-20 12:56:43 +00:00
"git.solsynth.dev/hypernet/passport/pkg/internal/database"
2024-01-29 08:11:59 +00:00
"github.com/google/uuid"
2024-01-28 16:32:39 +00:00
"github.com/samber/lo"
2024-01-06 17:56:32 +00:00
)
2024-12-08 12:21:40 +00:00
func GetAccountCacheKey(query any) string {
return fmt.Sprintf("account-query#%v", query)
}
func CacheAccount(account models.Account) {
cacheManager := cache.New[any](localCache.S)
marshal := marshaler.New(cacheManager)
ctx := context.Background()
_ = marshal.Set(
ctx,
GetAccountCacheKey(account.Name),
account,
store.WithExpiration(30*time.Minute),
store.WithTags([]string{"account", fmt.Sprintf("user#%d", account.ID)}),
)
_ = marshal.Set(
ctx,
GetAccountCacheKey(account.ID),
account,
store.WithExpiration(30*time.Minute),
store.WithTags([]string{"account", fmt.Sprintf("user#%d", account.ID)}),
)
}
func ValidateAccountName(val string, min, max int) bool {
actualLength := 0
for _, r := range val {
if unicode.Is(unicode.Han, r) || unicode.Is(unicode.Hiragana, r) || unicode.Is(unicode.Katakana, r) || unicode.Is(unicode.Hangul, r) {
actualLength += 2
} else {
actualLength += 1
}
}
2024-08-01 15:55:33 +00:00
return actualLength >= min && max >= actualLength
}
2024-01-07 07:52:23 +00:00
func GetAccount(id uint) (models.Account, error) {
var account models.Account
if err := database.C.Where(models.Account{
BaseModel: models.BaseModel{ID: id},
}).First(&account).Error; err != nil {
return account, err
}
return account, nil
}
func GetAccountList(id []uint) ([]models.Account, error) {
var accounts []models.Account
if err := database.C.Where("id IN ?", id).Find(&accounts).Error; err != nil {
return accounts, err
}
return accounts, nil
}
2024-06-26 12:05:28 +00:00
func GetAccountWithName(alias string) (models.Account, error) {
var account models.Account
if err := database.C.Where(models.Account{
Name: alias,
}).First(&account).Error; err != nil {
return account, err
}
return account, nil
}
2024-04-20 11:04:33 +00:00
func LookupAccount(probe string) (models.Account, error) {
2024-01-06 17:56:32 +00:00
var account models.Account
2024-04-20 11:04:33 +00:00
if err := database.C.Where(models.Account{Name: probe}).First(&account).Error; err == nil {
2024-01-06 17:56:32 +00:00
return account, nil
}
var contact models.AccountContact
2024-04-20 11:04:33 +00:00
if err := database.C.Where(models.AccountContact{Content: probe}).First(&contact).Error; err == nil {
2024-01-06 17:56:32 +00:00
if err := database.C.
Where(models.Account{
BaseModel: models.BaseModel{ID: contact.AccountID},
2024-01-27 16:05:19 +00:00
}).First(&account).Error; err == nil {
2024-01-06 17:56:32 +00:00
return account, err
}
}
return account, fmt.Errorf("account was not found")
}
2024-01-28 08:17:38 +00:00
func SearchAccount(probe string) ([]models.Account, error) {
probe = "%" + probe + "%"
var accounts []models.Account
2024-07-30 11:39:53 +00:00
if err := database.C.Where("name LIKE ? OR nick LIKE ?", probe, probe).Find(&accounts).Error; err != nil {
return accounts, err
}
return accounts, nil
}
2024-01-28 08:17:38 +00:00
func CreateAccount(name, nick, email, password string) (models.Account, error) {
user := models.Account{
Name: name,
Nick: nick,
2024-01-28 08:17:38 +00:00
Profile: models.AccountProfile{
Experience: 100,
},
Factors: []models.AuthFactor{
{
Type: models.PasswordAuthFactor,
2024-04-20 11:04:33 +00:00
Secret: HashPassword(password),
2024-01-28 08:17:38 +00:00
},
2024-01-29 08:11:59 +00:00
{
Type: models.EmailPasswordFactor,
Secret: uuid.NewString()[:8],
},
2024-01-28 08:17:38 +00:00
},
Contacts: []models.AccountContact{
{
Type: models.EmailAccountContact,
Content: email,
2024-01-29 08:11:59 +00:00
IsPrimary: true,
2024-01-28 08:17:38 +00:00
VerifiedAt: nil,
},
},
2024-07-24 09:33:05 +00:00
PermNodes: datatypes.JSONMap{},
2024-01-28 08:17:38 +00:00
ConfirmedAt: nil,
}
if err := database.C.Create(&user).Error; err != nil {
return user, err
2024-07-24 09:33:05 +00:00
} else if viper.GetInt("default_user_group") > 0 {
database.C.Create(&models.AccountGroupMember{
AccountID: user.ID,
GroupID: uint(viper.GetInt("default_user_group")),
})
2024-01-28 08:17:38 +00:00
}
2024-01-28 16:32:39 +00:00
if tk, err := NewMagicToken(models.ConfirmMagicToken, &user, nil); err != nil {
return user, err
} else if err := NotifyMagicToken(tk); err != nil {
return user, err
}
return user, nil
}
func ConfirmAccount(code string) error {
2024-01-29 08:11:59 +00:00
token, err := ValidateMagicToken(code, models.ConfirmMagicToken)
if err != nil {
2024-01-28 16:32:39 +00:00
return err
2024-06-30 09:01:39 +00:00
} else if token.AccountID == nil {
return fmt.Errorf("magic token didn't assign a valid account")
2024-01-28 16:32:39 +00:00
}
var user models.Account
if err := database.C.Where(&models.Account{
2024-06-26 07:52:58 +00:00
BaseModel: models.BaseModel{ID: *token.AccountID},
2024-01-28 16:32:39 +00:00
}).First(&user).Error; err != nil {
return err
}
2024-07-03 15:01:20 +00:00
if err = ForceConfirmAccount(user); err != nil {
return err
} else {
database.C.Delete(&token)
}
2024-05-17 09:13:11 +00:00
2024-07-03 15:01:20 +00:00
return nil
}
2024-01-28 16:32:39 +00:00
2024-07-03 15:01:20 +00:00
func ForceConfirmAccount(user models.Account) error {
user.ConfirmedAt = lo.ToPtr(time.Now())
for k, v := range viper.GetStringMap("permissions.verified") {
if val, ok := user.PermNodes[k]; !ok {
user.PermNodes[k] = v
} else {
user.PermNodes[k] = val
2024-01-28 16:32:39 +00:00
}
2024-07-03 15:01:20 +00:00
}
if err := database.C.Save(&user).Error; err != nil {
return err
}
2024-01-28 16:32:39 +00:00
2024-07-03 15:01:20 +00:00
InvalidAuthCacheWithUser(user.ID)
2024-05-17 11:37:58 +00:00
2024-07-03 15:01:20 +00:00
return nil
2024-01-28 08:17:38 +00:00
}
2024-06-26 07:52:58 +00:00
2024-09-19 14:18:22 +00:00
func CheckAbleToDeleteAccount(user models.Account) error {
if user.AutomatedID != nil {
return fmt.Errorf("bot cannot request delete account, head to developer portal and dispose bot")
}
var count int64
if err := database.C.
Where("account_id = ?", user.ID).
Where("expired_at < ?", time.Now()).
2024-09-25 12:18:11 +00:00
Where("type = ?", models.DeleteAccountMagicToken).
2024-09-19 14:18:22 +00:00
Model(&models.MagicToken{}).
Count(&count).Error; err != nil {
return fmt.Errorf("unable to check delete account ability: %v", err)
} else if count > 0 {
return fmt.Errorf("you requested delete account recently")
}
return nil
}
func RequestDeleteAccount(user models.Account) error {
if tk, err := NewMagicToken(
models.DeleteAccountMagicToken,
&user,
lo.ToPtr(time.Now().Add(24*time.Hour)),
); err != nil {
return err
} else if err := NotifyMagicToken(tk); err != nil {
log.Error().
Err(err).
Str("code", tk.Code).
Uint("user", user.ID).
Msg("Failed to notify delete account magic token...")
}
return nil
}
func ConfirmDeleteAccount(code string) error {
token, err := ValidateMagicToken(code, models.DeleteAccountMagicToken)
if err != nil {
return err
} else if token.AccountID == nil {
return fmt.Errorf("magic token didn't assign a valid account")
}
if err := DeleteAccount(*token.AccountID); err != nil {
return err
} else {
database.C.Delete(&token)
}
return nil
}
2024-06-30 09:01:39 +00:00
func CheckAbleToResetPassword(user models.Account) error {
var count int64
if err := database.C.
Where("account_id = ?", user.ID).
Where("expired_at < ?", time.Now()).
Where("type = ?", models.ResetPasswordMagicToken).
2024-06-30 09:01:39 +00:00
Model(&models.MagicToken{}).
Count(&count).Error; err != nil {
return fmt.Errorf("unable to check reset password ability: %v", err)
} else if count > 0 {
2024-06-30 09:01:39 +00:00
return fmt.Errorf("you requested reset password recently")
}
return nil
}
func RequestResetPassword(user models.Account) error {
if tk, err := NewMagicToken(
models.ResetPasswordMagicToken,
&user,
lo.ToPtr(time.Now().Add(24*time.Hour)),
); err != nil {
return err
} else if err := NotifyMagicToken(tk); err != nil {
log.Error().
Err(err).
Str("code", tk.Code).
Uint("user", user.ID).
Msg("Failed to notify password reset magic token...")
}
return nil
}
func ConfirmResetPassword(code, newPassword string) error {
token, err := ValidateMagicToken(code, models.ResetPasswordMagicToken)
if err != nil {
return err
} else if token.AccountID == nil {
return fmt.Errorf("magic token didn't assign a valid account")
}
factor, err := GetPasswordTypeFactor(*token.AccountID)
if err != nil {
factor = models.AuthFactor{
Type: models.PasswordAuthFactor,
Secret: HashPassword(newPassword),
AccountID: *token.AccountID,
}
} else {
factor.Secret = HashPassword(newPassword)
}
2024-09-19 14:18:22 +00:00
if err = database.C.Save(&factor).Error; err != nil {
return err
} else {
database.C.Delete(&token)
}
return nil
2024-06-30 09:01:39 +00:00
}
2024-06-26 07:52:58 +00:00
func DeleteAccount(id uint) error {
tx := database.C.Begin()
2024-07-24 09:23:44 +00:00
if err := tx.Select(clause.Associations).Delete(&models.Account{}, "id = ?", id).Error; err != nil {
2024-06-26 07:52:58 +00:00
tx.Rollback()
return err
}
2024-09-19 14:18:22 +00:00
if err := tx.Commit().Error; err != nil {
return err
} else {
InvalidAuthCacheWithUser(id)
2024-10-26 16:06:23 +00:00
_, _ = proto.NewDirectoryServiceClient(gap.Nx.GetNexusGrpcConn()).BroadcastEvent(context.Background(), &proto.EventInfo{
Event: "deletion",
Data: nex.EncodeMap(map[string]any{
"type": "account",
"id": fmt.Sprintf("%d", id),
}),
2024-09-19 14:18:22 +00:00
})
}
return nil
2024-06-26 07:52:58 +00:00
}
func RecycleUnConfirmAccount() {
deadline := time.Now().Add(-24 * time.Hour)
2024-06-26 07:52:58 +00:00
var hitList []models.Account
if err := database.C.Where("confirmed_at IS NULL AND created_at <= ?", deadline).Find(&hitList).Error; err != nil {
2024-06-26 07:52:58 +00:00
log.Error().Err(err).Msg("An error occurred while recycling accounts...")
return
}
if len(hitList) > 0 {
log.Info().Int("count", len(hitList)).Msg("Going to recycle those un-confirmed accounts...")
for _, entry := range hitList {
if err := DeleteAccount(entry.ID); err != nil {
log.Error().Err(err).Msg("An error occurred while recycling accounts...")
}
}
}
}
2024-06-26 12:28:12 +00:00
func SetAccountLastSeen(uid uint) error {
var profile models.AccountProfile
if err := database.C.Where("account_id = ?", uid).First(&profile).Error; err != nil {
return err
}
profile.LastSeenAt = lo.ToPtr(time.Now())
return database.C.Save(&profile).Error
}