|
|
|
@ -5,11 +5,16 @@ import (
|
|
|
|
|
"net/http"
|
|
|
|
|
"time"
|
|
|
|
|
|
|
|
|
|
"github.com/golang-jwt/jwt/v4"
|
|
|
|
|
"github.com/labstack/echo/v4"
|
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
|
"github.com/usememos/memos/api/auth"
|
|
|
|
|
"github.com/usememos/memos/common/util"
|
|
|
|
|
apiv2pb "github.com/usememos/memos/proto/gen/api/v2"
|
|
|
|
|
storepb "github.com/usememos/memos/proto/gen/store"
|
|
|
|
|
"github.com/usememos/memos/store"
|
|
|
|
|
"golang.org/x/crypto/bcrypt"
|
|
|
|
|
"golang.org/x/exp/slices"
|
|
|
|
|
"google.golang.org/grpc/codes"
|
|
|
|
|
"google.golang.org/grpc/status"
|
|
|
|
|
"google.golang.org/protobuf/types/known/timestamppb"
|
|
|
|
@ -18,13 +23,15 @@ import (
|
|
|
|
|
type UserService struct {
|
|
|
|
|
apiv2pb.UnimplementedUserServiceServer
|
|
|
|
|
|
|
|
|
|
Store *store.Store
|
|
|
|
|
Store *store.Store
|
|
|
|
|
Secret string
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// NewUserService creates a new UserService.
|
|
|
|
|
func NewUserService(store *store.Store) *UserService {
|
|
|
|
|
func NewUserService(store *store.Store, secret string) *UserService {
|
|
|
|
|
return &UserService{
|
|
|
|
|
Store: store,
|
|
|
|
|
Store: store,
|
|
|
|
|
Secret: secret,
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
@ -40,13 +47,10 @@ func (s *UserService) GetUser(ctx context.Context, request *apiv2pb.GetUserReque
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
userMessage := convertUserFromStore(user)
|
|
|
|
|
userIDPtr := ctx.Value(UserIDContextKey)
|
|
|
|
|
if userIDPtr != nil {
|
|
|
|
|
userID := userIDPtr.(int32)
|
|
|
|
|
if userID != userMessage.Id {
|
|
|
|
|
// Data desensitization.
|
|
|
|
|
userMessage.OpenId = ""
|
|
|
|
|
}
|
|
|
|
|
currentUser, _ := getCurrentUser(ctx, s.Store)
|
|
|
|
|
if currentUser == nil || currentUser.ID != user.ID {
|
|
|
|
|
// Data desensitization.
|
|
|
|
|
userMessage.OpenId = ""
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
response := &apiv2pb.GetUserResponse{
|
|
|
|
@ -56,14 +60,11 @@ func (s *UserService) GetUser(ctx context.Context, request *apiv2pb.GetUserReque
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *UserService) UpdateUser(ctx context.Context, request *apiv2pb.UpdateUserRequest) (*apiv2pb.UpdateUserResponse, error) {
|
|
|
|
|
userID := ctx.Value(UserIDContextKey).(int32)
|
|
|
|
|
currentUser, err := s.Store.GetUser(ctx, &store.FindUser{
|
|
|
|
|
ID: &userID,
|
|
|
|
|
})
|
|
|
|
|
currentUser, err := getCurrentUser(ctx, s.Store)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return nil, status.Errorf(codes.Internal, "failed to get user: %v", err)
|
|
|
|
|
}
|
|
|
|
|
if currentUser == nil || (currentUser.ID != userID && currentUser.Role != store.RoleAdmin) {
|
|
|
|
|
if currentUser.Username != request.Username && currentUser.Role != store.RoleAdmin {
|
|
|
|
|
return nil, status.Errorf(codes.PermissionDenied, "permission denied")
|
|
|
|
|
}
|
|
|
|
|
if request.UpdateMask == nil || len(request.UpdateMask) == 0 {
|
|
|
|
@ -72,7 +73,7 @@ func (s *UserService) UpdateUser(ctx context.Context, request *apiv2pb.UpdateUse
|
|
|
|
|
|
|
|
|
|
currentTs := time.Now().Unix()
|
|
|
|
|
update := &store.UpdateUser{
|
|
|
|
|
ID: userID,
|
|
|
|
|
ID: currentUser.ID,
|
|
|
|
|
UpdatedTs: ¤tTs,
|
|
|
|
|
}
|
|
|
|
|
for _, path := range request.UpdateMask {
|
|
|
|
@ -116,6 +117,162 @@ func (s *UserService) UpdateUser(ctx context.Context, request *apiv2pb.UpdateUse
|
|
|
|
|
return response, nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *UserService) ListUserAccessTokens(ctx context.Context, request *apiv2pb.ListUserAccessTokensRequest) (*apiv2pb.ListUserAccessTokensResponse, error) {
|
|
|
|
|
user, err := getCurrentUser(ctx, s.Store)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err)
|
|
|
|
|
}
|
|
|
|
|
if user == nil || user.Username != request.Username {
|
|
|
|
|
return nil, status.Errorf(codes.PermissionDenied, "permission denied")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
userAccessTokens, err := s.Store.GetUserAccessTokens(ctx, user.ID)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return nil, status.Errorf(codes.Internal, "failed to list access tokens: %v", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
accessTokens := []*apiv2pb.UserAccessToken{}
|
|
|
|
|
for _, userAccessToken := range userAccessTokens {
|
|
|
|
|
claims := &auth.ClaimsMessage{}
|
|
|
|
|
_, err := jwt.ParseWithClaims(userAccessToken.AccessToken, claims, func(t *jwt.Token) (any, error) {
|
|
|
|
|
if t.Method.Alg() != jwt.SigningMethodHS256.Name {
|
|
|
|
|
return nil, errors.Errorf("unexpected access token signing method=%v, expect %v", t.Header["alg"], jwt.SigningMethodHS256)
|
|
|
|
|
}
|
|
|
|
|
if kid, ok := t.Header["kid"].(string); ok {
|
|
|
|
|
if kid == "v1" {
|
|
|
|
|
return []byte(s.Secret), nil
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return nil, errors.Errorf("unexpected access token kid=%v", t.Header["kid"])
|
|
|
|
|
})
|
|
|
|
|
if err != nil {
|
|
|
|
|
// If the access token is invalid or expired, just ignore it.
|
|
|
|
|
continue
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
userAccessToken := &apiv2pb.UserAccessToken{
|
|
|
|
|
AccessToken: userAccessToken.AccessToken,
|
|
|
|
|
Description: userAccessToken.Description,
|
|
|
|
|
IssuedAt: timestamppb.New(claims.IssuedAt.Time),
|
|
|
|
|
}
|
|
|
|
|
if claims.ExpiresAt != nil {
|
|
|
|
|
userAccessToken.ExpiresAt = timestamppb.New(claims.ExpiresAt.Time)
|
|
|
|
|
}
|
|
|
|
|
accessTokens = append(accessTokens, userAccessToken)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Sort by issued time in descending order.
|
|
|
|
|
slices.SortFunc(accessTokens, func(i, j *apiv2pb.UserAccessToken) bool {
|
|
|
|
|
return i.IssuedAt.Seconds > j.IssuedAt.Seconds
|
|
|
|
|
})
|
|
|
|
|
response := &apiv2pb.ListUserAccessTokensResponse{
|
|
|
|
|
AccessTokens: accessTokens,
|
|
|
|
|
}
|
|
|
|
|
return response, nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *UserService) CreateUserAccessToken(ctx context.Context, request *apiv2pb.CreateUserAccessTokenRequest) (*apiv2pb.CreateUserAccessTokenResponse, error) {
|
|
|
|
|
user, err := getCurrentUser(ctx, s.Store)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
accessToken, err := auth.GenerateAccessToken(user.Email, user.ID, request.UserAccessToken.ExpiresAt.AsTime(), s.Secret)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return nil, status.Errorf(codes.Internal, "failed to generate access token: %v", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
claims := &auth.ClaimsMessage{}
|
|
|
|
|
_, err = jwt.ParseWithClaims(accessToken, claims, func(t *jwt.Token) (any, error) {
|
|
|
|
|
if t.Method.Alg() != jwt.SigningMethodHS256.Name {
|
|
|
|
|
return nil, errors.Errorf("unexpected access token signing method=%v, expect %v", t.Header["alg"], jwt.SigningMethodHS256)
|
|
|
|
|
}
|
|
|
|
|
if kid, ok := t.Header["kid"].(string); ok {
|
|
|
|
|
if kid == "v1" {
|
|
|
|
|
return []byte(s.Secret), nil
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return nil, errors.Errorf("unexpected access token kid=%v", t.Header["kid"])
|
|
|
|
|
})
|
|
|
|
|
if err != nil {
|
|
|
|
|
return nil, status.Errorf(codes.Internal, "failed to parse access token: %v", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Upsert the access token to user setting store.
|
|
|
|
|
if err := s.UpsertAccessTokenToStore(ctx, user, accessToken, request.UserAccessToken.Description); err != nil {
|
|
|
|
|
return nil, status.Errorf(codes.Internal, "failed to upsert access token to store: %v", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
userAccessToken := &apiv2pb.UserAccessToken{
|
|
|
|
|
AccessToken: accessToken,
|
|
|
|
|
Description: request.UserAccessToken.Description,
|
|
|
|
|
IssuedAt: timestamppb.New(claims.IssuedAt.Time),
|
|
|
|
|
}
|
|
|
|
|
if claims.ExpiresAt != nil {
|
|
|
|
|
userAccessToken.ExpiresAt = timestamppb.New(claims.ExpiresAt.Time)
|
|
|
|
|
}
|
|
|
|
|
response := &apiv2pb.CreateUserAccessTokenResponse{
|
|
|
|
|
AccessToken: userAccessToken,
|
|
|
|
|
}
|
|
|
|
|
return response, nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *UserService) DeleteUserAccessToken(ctx context.Context, request *apiv2pb.DeleteUserAccessTokenRequest) (*apiv2pb.DeleteUserAccessTokenResponse, error) {
|
|
|
|
|
user, err := getCurrentUser(ctx, s.Store)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
userAccessTokens, err := s.Store.GetUserAccessTokens(ctx, user.ID)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return nil, status.Errorf(codes.Internal, "failed to list access tokens: %v", err)
|
|
|
|
|
}
|
|
|
|
|
updatedUserAccessTokens := []*storepb.AccessTokensUserSetting_AccessToken{}
|
|
|
|
|
for _, userAccessToken := range userAccessTokens {
|
|
|
|
|
if userAccessToken.AccessToken == request.AccessToken {
|
|
|
|
|
continue
|
|
|
|
|
}
|
|
|
|
|
updatedUserAccessTokens = append(updatedUserAccessTokens, userAccessToken)
|
|
|
|
|
}
|
|
|
|
|
if _, err := s.Store.UpsertUserSettingV1(ctx, &storepb.UserSetting{
|
|
|
|
|
UserId: user.ID,
|
|
|
|
|
Key: storepb.UserSettingKey_USER_SETTING_ACCESS_TOKENS,
|
|
|
|
|
Value: &storepb.UserSetting_AccessTokens{
|
|
|
|
|
AccessTokens: &storepb.AccessTokensUserSetting{
|
|
|
|
|
AccessTokens: updatedUserAccessTokens,
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}); err != nil {
|
|
|
|
|
return nil, status.Errorf(codes.Internal, "failed to upsert user setting: %v", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return &apiv2pb.DeleteUserAccessTokenResponse{}, nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (s *UserService) UpsertAccessTokenToStore(ctx context.Context, user *store.User, accessToken, description string) error {
|
|
|
|
|
userAccessTokens, err := s.Store.GetUserAccessTokens(ctx, user.ID)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return errors.Wrap(err, "failed to get user access tokens")
|
|
|
|
|
}
|
|
|
|
|
userAccessToken := storepb.AccessTokensUserSetting_AccessToken{
|
|
|
|
|
AccessToken: accessToken,
|
|
|
|
|
Description: description,
|
|
|
|
|
}
|
|
|
|
|
userAccessTokens = append(userAccessTokens, &userAccessToken)
|
|
|
|
|
if _, err := s.Store.UpsertUserSettingV1(ctx, &storepb.UserSetting{
|
|
|
|
|
UserId: user.ID,
|
|
|
|
|
Key: storepb.UserSettingKey_USER_SETTING_ACCESS_TOKENS,
|
|
|
|
|
Value: &storepb.UserSetting_AccessTokens{
|
|
|
|
|
AccessTokens: &storepb.AccessTokensUserSetting{
|
|
|
|
|
AccessTokens: userAccessTokens,
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}); err != nil {
|
|
|
|
|
return errors.Wrap(err, "failed to upsert user setting")
|
|
|
|
|
}
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func convertUserFromStore(user *store.User) *apiv2pb.User {
|
|
|
|
|
return &apiv2pb.User{
|
|
|
|
|
Id: int32(user.ID),
|
|
|
|
|