1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
|
use api_core::models::user::User;
use async_session::{Session, serde_json};
use async_trait::async_trait;
use oauth2::{CsrfToken, Scope};
use redis::AsyncCommands;
use sh_util::cache::{CacheKey, RedisManager};
use sqlx::PgPool;
use crate::{BasicClient, CSRF_TOKEN, OauthDriver, SessionResponse, error::AuthError};
#[derive(Clone)]
pub struct AuthServiceDiscord {
database: PgPool,
cache: RedisManager,
client: BasicClient,
}
impl AuthServiceDiscord {
pub fn new(database: PgPool, client: BasicClient, cache: RedisManager) -> Self {
Self {
database,
client,
cache,
}
}
}
#[async_trait]
impl OauthDriver for AuthServiceDiscord {
async fn get_auth_token(&self) -> Result<String, AuthError> {
todo!()
}
async fn get_user(&self) -> Result<User, AuthError> {
todo!()
}
async fn create_oauth_session(&self) -> Result<SessionResponse, AuthError> {
let (auth_url, csrf_token) = self
.client
.authorize_url(CsrfToken::new_random)
.add_scope(Scope::new("identify".to_string()))
.url();
let mut session = Session::new();
session.insert(CSRF_TOKEN, &csrf_token).unwrap();
let cache_key = CacheKey::Session(session.id());
let mut cache = self.cache.get().await.unwrap();
cache
.set::<_, _, ()>(
cache_key,
serde_json::to_string(&session).or(Err(AuthError::InvalidSession))?,
)
.await?;
let cookie = session
.into_cookie_value()
.ok_or(AuthError::MissingSession)?;
Ok(SessionResponse {
cookie_value: cookie,
auth_url,
})
}
async fn save_session(&self, user: &User) -> Result<(), AuthError> {
todo!()
}
}
|