diff options
| author | rtkay123 <dev@kanjala.com> | 2026-04-06 20:06:14 +0200 |
|---|---|---|
| committer | rtkay123 <dev@kanjala.com> | 2026-04-06 20:06:14 +0200 |
| commit | cf51cf6f7424a85795bc67b3cece29c806a6d7e0 (patch) | |
| tree | 115a76de126dabf2c912715ef898f482d1bb992b /crates/api-auth/src/discord | |
| parent | d575e966a422ea87508ef5370b2904f4818c6773 (diff) | |
| download | sellershut-cf51cf6f7424a85795bc67b3cece29c806a6d7e0.tar.bz2 sellershut-cf51cf6f7424a85795bc67b3cece29c806a6d7e0.zip | |
feat(oauth): redirect
Diffstat (limited to 'crates/api-auth/src/discord')
| -rw-r--r-- | crates/api-auth/src/discord/mod.rs | 26 |
1 files changed, 21 insertions, 5 deletions
diff --git a/crates/api-auth/src/discord/mod.rs b/crates/api-auth/src/discord/mod.rs index dbcb139..1a7d47d 100644 --- a/crates/api-auth/src/discord/mod.rs +++ b/crates/api-auth/src/discord/mod.rs @@ -1,11 +1,12 @@ use api_core::models::user::User; -use async_session::Session; +use async_session::{Session, serde_json}; use async_trait::async_trait; use oauth2::{CsrfToken, Scope}; -use sh_util::cache::RedisManager; +use redis::AsyncCommands; +use sh_util::cache::{CacheKey, RedisManager}; use sqlx::PgPool; -use crate::{BasicClient, CSRF_TOKEN, OauthDriver, error::AuthError}; +use crate::{BasicClient, CSRF_TOKEN, OauthDriver, SessionResponse, error::AuthError}; #[derive(Clone)] pub struct AuthServiceDiscord { @@ -32,7 +33,7 @@ impl OauthDriver for AuthServiceDiscord { async fn get_user(&self) -> Result<User, AuthError> { todo!() } - async fn create_oauth_session(&self) -> Result<String, AuthError> { + async fn create_oauth_session(&self) -> Result<SessionResponse, AuthError> { let (auth_url, csrf_token) = self .client .authorize_url(CsrfToken::new_random) @@ -42,7 +43,22 @@ impl OauthDriver for AuthServiceDiscord { let mut session = Session::new(); session.insert(CSRF_TOKEN, &csrf_token).unwrap(); - Ok(String::default()) + let cache_key = CacheKey::Session(session.id()); + let mut cache = self.cache.get().await.unwrap(); + cache + .set::<_, _, ()>( + cache_key, + serde_json::to_string(&session).or(Err(AuthError::InvalidSession))?, + ) + .await?; + let cookie = session + .into_cookie_value() + .ok_or(AuthError::MissingSession)?; + + Ok(SessionResponse { + cookie_value: cookie, + auth_url, + }) } async fn save_session(&self, user: &User) -> Result<(), AuthError> { todo!() |
