2023-01-06 14:34:53 +08:00
|
|
|
package user_external_login
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2023-03-02 10:24:32 +08:00
|
|
|
"encoding/json"
|
2023-01-09 16:54:20 +08:00
|
|
|
"fmt"
|
2023-01-06 14:34:53 +08:00
|
|
|
"time"
|
|
|
|
|
2023-01-06 17:22:09 +08:00
|
|
|
"github.com/answerdev/answer/internal/base/reason"
|
2023-01-06 14:34:53 +08:00
|
|
|
"github.com/answerdev/answer/internal/entity"
|
|
|
|
"github.com/answerdev/answer/internal/schema"
|
2023-01-09 16:54:20 +08:00
|
|
|
"github.com/answerdev/answer/internal/service/activity"
|
|
|
|
"github.com/answerdev/answer/internal/service/export"
|
|
|
|
"github.com/answerdev/answer/internal/service/siteinfo_common"
|
2023-01-06 14:34:53 +08:00
|
|
|
usercommon "github.com/answerdev/answer/internal/service/user_common"
|
2023-01-09 16:54:20 +08:00
|
|
|
"github.com/answerdev/answer/pkg/random"
|
2023-01-06 17:22:09 +08:00
|
|
|
"github.com/answerdev/answer/pkg/token"
|
2023-01-09 16:54:20 +08:00
|
|
|
"github.com/google/uuid"
|
2023-01-06 17:22:09 +08:00
|
|
|
"github.com/segmentfault/pacman/errors"
|
2023-01-09 16:54:20 +08:00
|
|
|
"github.com/segmentfault/pacman/log"
|
2023-01-06 14:34:53 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
type UserExternalLoginRepo interface {
|
|
|
|
AddUserExternalLogin(ctx context.Context, user *entity.UserExternalLogin) (err error)
|
|
|
|
UpdateInfo(ctx context.Context, userInfo *entity.UserExternalLogin) (err error)
|
|
|
|
GetByExternalID(ctx context.Context, externalID string) (userInfo *entity.UserExternalLogin, exist bool, err error)
|
2023-01-13 12:50:20 +08:00
|
|
|
GetUserExternalLoginList(ctx context.Context, userID string) (
|
|
|
|
resp []*entity.UserExternalLogin, err error)
|
|
|
|
DeleteUserExternalLogin(ctx context.Context, userID, externalID string) (err error)
|
2023-01-09 16:54:20 +08:00
|
|
|
SetCacheUserExternalLoginInfo(ctx context.Context, key string, info *schema.ExternalLoginUserInfoCache) (err error)
|
|
|
|
GetCacheUserExternalLoginInfo(ctx context.Context, key string) (info *schema.ExternalLoginUserInfoCache, err error)
|
2023-01-06 14:34:53 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// UserExternalLoginService user external login service
|
|
|
|
type UserExternalLoginService struct {
|
|
|
|
userRepo usercommon.UserRepo
|
|
|
|
userExternalLoginRepo UserExternalLoginRepo
|
|
|
|
userCommonService *usercommon.UserCommon
|
2023-01-09 16:54:20 +08:00
|
|
|
emailService *export.EmailService
|
|
|
|
siteInfoCommonService *siteinfo_common.SiteInfoCommonService
|
|
|
|
userActivity activity.UserActiveActivityRepo
|
2023-01-06 14:34:53 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewUserExternalLoginService new user external login service
|
|
|
|
func NewUserExternalLoginService(
|
|
|
|
userRepo usercommon.UserRepo,
|
|
|
|
userCommonService *usercommon.UserCommon,
|
2023-01-06 14:48:41 +08:00
|
|
|
userExternalLoginRepo UserExternalLoginRepo,
|
2023-01-09 16:54:20 +08:00
|
|
|
emailService *export.EmailService,
|
|
|
|
siteInfoCommonService *siteinfo_common.SiteInfoCommonService,
|
|
|
|
userActivity activity.UserActiveActivityRepo,
|
2023-01-06 14:34:53 +08:00
|
|
|
) *UserExternalLoginService {
|
|
|
|
return &UserExternalLoginService{
|
2023-01-06 14:48:41 +08:00
|
|
|
userRepo: userRepo,
|
|
|
|
userCommonService: userCommonService,
|
|
|
|
userExternalLoginRepo: userExternalLoginRepo,
|
2023-01-09 16:54:20 +08:00
|
|
|
emailService: emailService,
|
|
|
|
siteInfoCommonService: siteInfoCommonService,
|
|
|
|
userActivity: userActivity,
|
2023-01-06 14:34:53 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ExternalLogin if user is already a member logged in
|
|
|
|
func (us *UserExternalLoginService) ExternalLogin(
|
2023-01-09 16:54:20 +08:00
|
|
|
ctx context.Context, externalUserInfo *schema.ExternalLoginUserInfoCache) (
|
2023-01-06 14:34:53 +08:00
|
|
|
resp *schema.UserExternalLoginResp, err error) {
|
2023-01-09 16:54:20 +08:00
|
|
|
oldExternalLoginUserInfo, exist, err := us.userExternalLoginRepo.GetByExternalID(ctx, externalUserInfo.ExternalID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if exist {
|
2023-03-01 10:48:11 +08:00
|
|
|
// if user is already a member, login directly
|
2023-01-09 16:54:20 +08:00
|
|
|
oldUserInfo, exist, err := us.userRepo.GetByUserID(ctx, oldExternalLoginUserInfo.UserID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-03-01 10:48:11 +08:00
|
|
|
if exist && oldUserInfo.Status != entity.UserStatusDeleted {
|
2023-03-02 11:03:06 +08:00
|
|
|
newMailStatus, err := us.activeUser(ctx, oldUserInfo, externalUserInfo)
|
2023-03-01 10:48:11 +08:00
|
|
|
if err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
2023-01-09 16:54:20 +08:00
|
|
|
accessToken, _, err := us.userCommonService.CacheLoginUserInfo(
|
2023-03-01 10:48:11 +08:00
|
|
|
ctx, oldUserInfo.ID, newMailStatus, oldUserInfo.Status)
|
2023-01-09 16:54:20 +08:00
|
|
|
return &schema.UserExternalLoginResp{AccessToken: accessToken}, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-06 14:34:53 +08:00
|
|
|
// cache external user info, waiting for user enter email address.
|
|
|
|
if len(externalUserInfo.Email) == 0 {
|
2023-01-06 17:22:09 +08:00
|
|
|
bindingKey := token.GenerateToken()
|
|
|
|
err = us.userExternalLoginRepo.SetCacheUserExternalLoginInfo(ctx, bindingKey, externalUserInfo)
|
2023-01-06 14:34:53 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-01-06 17:22:09 +08:00
|
|
|
return &schema.UserExternalLoginResp{BindingKey: bindingKey}, nil
|
2023-01-06 14:34:53 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
oldUserInfo, exist, err := us.userRepo.GetByEmail(ctx, externalUserInfo.Email)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-03-01 10:48:11 +08:00
|
|
|
// if user is not a member, register a new user
|
2023-01-06 14:48:41 +08:00
|
|
|
if !exist {
|
2023-01-09 16:54:20 +08:00
|
|
|
oldUserInfo, err = us.registerNewUser(ctx, externalUserInfo)
|
2023-01-06 14:48:41 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-01-06 14:34:53 +08:00
|
|
|
}
|
2023-03-01 10:48:11 +08:00
|
|
|
// bind external user info to user
|
2023-01-09 16:54:20 +08:00
|
|
|
err = us.bindOldUser(ctx, externalUserInfo, oldUserInfo)
|
2023-01-06 14:34:53 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-03-01 10:48:11 +08:00
|
|
|
// If user login with external account and email is exist, active user directly.
|
2023-03-02 11:03:06 +08:00
|
|
|
newMailStatus, err := us.activeUser(ctx, oldUserInfo, externalUserInfo)
|
2023-03-01 10:48:11 +08:00
|
|
|
if err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
|
|
|
|
2023-01-06 14:34:53 +08:00
|
|
|
accessToken, _, err := us.userCommonService.CacheLoginUserInfo(
|
2023-03-01 10:48:11 +08:00
|
|
|
ctx, oldUserInfo.ID, newMailStatus, oldUserInfo.Status)
|
2023-01-06 14:34:53 +08:00
|
|
|
return &schema.UserExternalLoginResp{AccessToken: accessToken}, err
|
|
|
|
}
|
|
|
|
|
2023-01-09 16:54:20 +08:00
|
|
|
func (us *UserExternalLoginService) registerNewUser(ctx context.Context,
|
|
|
|
externalUserInfo *schema.ExternalLoginUserInfoCache) (userInfo *entity.User, err error) {
|
2023-01-06 14:34:53 +08:00
|
|
|
userInfo = &entity.User{}
|
|
|
|
userInfo.EMail = externalUserInfo.Email
|
2023-03-02 12:13:58 +08:00
|
|
|
userInfo.DisplayName = externalUserInfo.DisplayName
|
2023-03-02 10:24:32 +08:00
|
|
|
|
2023-03-02 12:13:58 +08:00
|
|
|
userInfo.Username, err = us.userCommonService.MakeUsername(ctx, externalUserInfo.Username)
|
2023-01-06 14:34:53 +08:00
|
|
|
if err != nil {
|
2023-03-02 10:24:32 +08:00
|
|
|
log.Error(err)
|
2023-01-09 16:54:20 +08:00
|
|
|
userInfo.Username = random.Username()
|
2023-01-06 14:34:53 +08:00
|
|
|
}
|
2023-03-02 10:24:32 +08:00
|
|
|
|
|
|
|
if len(externalUserInfo.Avatar) > 0 {
|
|
|
|
avatarInfo := &schema.AvatarInfo{
|
|
|
|
Type: schema.AvatarTypeCustom,
|
|
|
|
Custom: externalUserInfo.Avatar,
|
|
|
|
}
|
|
|
|
avatar, _ := json.Marshal(avatarInfo)
|
|
|
|
userInfo.Avatar = string(avatar)
|
|
|
|
}
|
|
|
|
|
2023-01-06 14:34:53 +08:00
|
|
|
userInfo.MailStatus = entity.EmailStatusToBeVerified
|
|
|
|
userInfo.Status = entity.UserStatusAvailable
|
|
|
|
userInfo.LastLoginDate = time.Now()
|
|
|
|
err = us.userRepo.AddUser(ctx, userInfo)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return userInfo, nil
|
|
|
|
}
|
|
|
|
|
2023-01-09 16:54:20 +08:00
|
|
|
func (us *UserExternalLoginService) bindOldUser(ctx context.Context,
|
|
|
|
externalUserInfo *schema.ExternalLoginUserInfoCache, oldUserInfo *entity.User) (err error) {
|
2023-01-06 14:34:53 +08:00
|
|
|
oldExternalUserInfo, exist, err := us.userExternalLoginRepo.GetByExternalID(ctx, externalUserInfo.ExternalID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if exist {
|
|
|
|
oldExternalUserInfo.MetaInfo = externalUserInfo.MetaInfo
|
|
|
|
oldExternalUserInfo.UserID = oldUserInfo.ID
|
|
|
|
err = us.userExternalLoginRepo.UpdateInfo(ctx, oldExternalUserInfo)
|
|
|
|
} else {
|
|
|
|
newExternalUserInfo := &entity.UserExternalLogin{
|
|
|
|
UserID: oldUserInfo.ID,
|
2023-01-06 17:22:09 +08:00
|
|
|
Provider: externalUserInfo.Provider,
|
2023-01-06 14:34:53 +08:00
|
|
|
ExternalID: externalUserInfo.ExternalID,
|
|
|
|
MetaInfo: externalUserInfo.MetaInfo,
|
|
|
|
}
|
|
|
|
err = us.userExternalLoginRepo.AddUserExternalLogin(ctx, newExternalUserInfo)
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
2023-01-06 17:22:09 +08:00
|
|
|
|
2023-03-02 11:03:06 +08:00
|
|
|
func (us *UserExternalLoginService) activeUser(ctx context.Context, oldUserInfo *entity.User,
|
|
|
|
externalUserInfo *schema.ExternalLoginUserInfoCache) (
|
2023-03-01 10:48:11 +08:00
|
|
|
mailStatus int, err error) {
|
2023-03-02 11:03:06 +08:00
|
|
|
log.Infof("user %s login with external account, try to active email, old status is %d",
|
|
|
|
oldUserInfo.ID, oldUserInfo.MailStatus)
|
|
|
|
|
|
|
|
// try to active user email
|
2023-03-02 12:13:58 +08:00
|
|
|
if oldUserInfo.MailStatus == entity.EmailStatusToBeVerified {
|
|
|
|
err = us.userRepo.UpdateEmailStatus(ctx, oldUserInfo.ID, entity.EmailStatusAvailable)
|
|
|
|
if err != nil {
|
|
|
|
return oldUserInfo.MailStatus, err
|
|
|
|
}
|
2023-03-01 10:48:11 +08:00
|
|
|
}
|
2023-03-02 11:03:06 +08:00
|
|
|
|
|
|
|
// try to update user avatar
|
2023-03-21 11:53:15 +08:00
|
|
|
if len(externalUserInfo.Avatar) > 0 && len(schema.FormatAvatarInfo(oldUserInfo.Avatar, oldUserInfo.EMail)) == 0 {
|
2023-03-02 11:03:06 +08:00
|
|
|
avatarInfo := &schema.AvatarInfo{
|
|
|
|
Type: schema.AvatarTypeCustom,
|
|
|
|
Custom: externalUserInfo.Avatar,
|
|
|
|
}
|
|
|
|
avatar, _ := json.Marshal(avatarInfo)
|
|
|
|
oldUserInfo.Avatar = string(avatar)
|
|
|
|
err = us.userRepo.UpdateInfo(ctx, oldUserInfo)
|
|
|
|
if err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = us.userActivity.UserActive(ctx, oldUserInfo.ID); err != nil {
|
|
|
|
return oldUserInfo.MailStatus, err
|
2023-03-01 10:48:11 +08:00
|
|
|
}
|
|
|
|
return entity.EmailStatusAvailable, nil
|
|
|
|
}
|
|
|
|
|
2023-01-09 16:54:20 +08:00
|
|
|
// ExternalLoginBindingUserSendEmail Send an email for third-party account login for binding user
|
2023-01-06 17:22:09 +08:00
|
|
|
func (us *UserExternalLoginService) ExternalLoginBindingUserSendEmail(
|
|
|
|
ctx context.Context, req *schema.ExternalLoginBindingUserSendEmailReq) (
|
|
|
|
resp *schema.ExternalLoginBindingUserSendEmailResp, err error) {
|
2023-01-09 16:54:20 +08:00
|
|
|
siteGeneral, err := us.siteInfoCommonService.GetSiteGeneral(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-01-06 17:22:09 +08:00
|
|
|
resp = &schema.ExternalLoginBindingUserSendEmailResp{}
|
|
|
|
externalLoginInfo, err := us.userExternalLoginRepo.GetCacheUserExternalLoginInfo(ctx, req.BindingKey)
|
|
|
|
if err != nil || len(externalLoginInfo.ExternalID) == 0 {
|
|
|
|
return nil, errors.BadRequest(reason.UserNotFound)
|
|
|
|
}
|
2023-01-09 16:54:20 +08:00
|
|
|
if len(externalLoginInfo.Email) > 0 {
|
|
|
|
log.Warnf("the binding email has been sent %s", req.BindingKey)
|
|
|
|
return &schema.ExternalLoginBindingUserSendEmailResp{}, nil
|
|
|
|
}
|
2023-01-06 17:22:09 +08:00
|
|
|
|
2023-01-09 16:54:20 +08:00
|
|
|
userInfo, exist, err := us.userRepo.GetByEmail(ctx, req.Email)
|
2023-01-06 17:22:09 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if exist && !req.Must {
|
|
|
|
resp.EmailExistAndMustBeConfirmed = true
|
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if !exist {
|
|
|
|
externalLoginInfo.Email = req.Email
|
2023-01-09 16:54:20 +08:00
|
|
|
userInfo, err = us.registerNewUser(ctx, externalLoginInfo)
|
2023-01-06 17:22:09 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-01-10 14:24:32 +08:00
|
|
|
resp.AccessToken, _, err = us.userCommonService.CacheLoginUserInfo(
|
|
|
|
ctx, userInfo.ID, userInfo.MailStatus, userInfo.Status)
|
|
|
|
if err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
2023-01-06 17:22:09 +08:00
|
|
|
}
|
2023-01-09 16:54:20 +08:00
|
|
|
err = us.userExternalLoginRepo.SetCacheUserExternalLoginInfo(ctx, req.BindingKey, externalLoginInfo)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-01-06 17:22:09 +08:00
|
|
|
|
2023-01-09 16:54:20 +08:00
|
|
|
// send bind confirmation email
|
|
|
|
data := &schema.EmailCodeContent{
|
|
|
|
SourceType: schema.BindingSourceType,
|
|
|
|
Email: req.Email,
|
|
|
|
UserID: userInfo.ID,
|
|
|
|
BindingKey: req.BindingKey,
|
|
|
|
}
|
|
|
|
code := uuid.NewString()
|
|
|
|
verifyEmailURL := fmt.Sprintf("%s/users/account-activation?code=%s", siteGeneral.SiteUrl, code)
|
|
|
|
title, body, err := us.emailService.RegisterTemplate(ctx, verifyEmailURL)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
go us.emailService.SendAndSaveCode(ctx, userInfo.EMail, title, body, code, data.ToJSONString())
|
2023-01-06 17:22:09 +08:00
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
|
2023-01-09 16:54:20 +08:00
|
|
|
// ExternalLoginBindingUser
|
|
|
|
// The user clicks on the email link of the bound account and requests the API to bind the user officially
|
2023-01-06 17:22:09 +08:00
|
|
|
func (us *UserExternalLoginService) ExternalLoginBindingUser(
|
2023-01-09 18:43:52 +08:00
|
|
|
ctx context.Context, bindingKey string, oldUserInfo *entity.User) (err error) {
|
|
|
|
externalLoginInfo, err := us.userExternalLoginRepo.GetCacheUserExternalLoginInfo(ctx, bindingKey)
|
2023-01-09 16:54:20 +08:00
|
|
|
if err != nil || len(externalLoginInfo.ExternalID) == 0 {
|
2023-01-09 18:43:52 +08:00
|
|
|
return errors.BadRequest(reason.UserNotFound)
|
2023-01-09 16:54:20 +08:00
|
|
|
}
|
2023-01-09 18:43:52 +08:00
|
|
|
return us.bindOldUser(ctx, externalLoginInfo, oldUserInfo)
|
2023-01-06 17:22:09 +08:00
|
|
|
}
|
2023-01-13 12:50:20 +08:00
|
|
|
|
|
|
|
// GetExternalLoginUserInfoList get external login user info list
|
|
|
|
func (us *UserExternalLoginService) GetExternalLoginUserInfoList(
|
|
|
|
ctx context.Context, userID string) (resp []*entity.UserExternalLogin, err error) {
|
|
|
|
return us.userExternalLoginRepo.GetUserExternalLoginList(ctx, userID)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ExternalLoginUnbinding external login unbinding
|
|
|
|
func (us *UserExternalLoginService) ExternalLoginUnbinding(
|
2023-03-10 10:42:45 +08:00
|
|
|
ctx context.Context, req *schema.ExternalLoginUnbindingReq) (resp any, err error) {
|
|
|
|
// If user has only one external login and never set password, he can't unbind it.
|
|
|
|
userInfo, exist, err := us.userRepo.GetByUserID(ctx, req.UserID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if !exist {
|
|
|
|
return nil, errors.BadRequest(reason.UserNotFound)
|
|
|
|
}
|
|
|
|
if len(userInfo.Pass) == 0 {
|
|
|
|
loginList, err := us.userExternalLoginRepo.GetUserExternalLoginList(ctx, req.UserID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if len(loginList) <= 1 {
|
|
|
|
return schema.ErrTypeToast, errors.BadRequest(reason.UserExternalLoginUnbindingForbidden)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, us.userExternalLoginRepo.DeleteUserExternalLogin(ctx, req.UserID, req.ExternalID)
|
2023-01-13 12:50:20 +08:00
|
|
|
}
|