test update some permissions

This commit is contained in:
Kenta420 2023-12-08 14:46:07 +07:00
parent ac64335d5b
commit 25ce65e425
15 changed files with 582 additions and 493 deletions

View file

@ -1,4 +1,4 @@
import { NgModule, inject } from '@angular/core';
import {inject, NgModule} from '@angular/core';
import {
ActivatedRouteSnapshot,
CanActivateFn,
@ -7,8 +7,9 @@ import {
RouterStateSnapshot,
Routes,
} from '@angular/router';
import { UserService } from './core/services/user.service';
import { map } from 'rxjs';
import {UserService} from './core/services/user.service';
import {map} from 'rxjs';
import {UserPermissions} from "./core/auth/userPermissions";
const authGuard: CanActivateFn = (
route: ActivatedRouteSnapshot,
@ -31,13 +32,38 @@ const authGuard: CanActivateFn = (
);
};
const loginGuard: CanActivateFn = (
const permissionsGuard: (...requiredPermissions: UserPermissions[]) => CanActivateFn = (...requiredPermissions) => (
route: ActivatedRouteSnapshot,
state: RouterStateSnapshot
) => {
const userService: UserService = inject(UserService);
const router: Router = inject(Router);
const user = userService.getCurrentUser()
if (user == null)
return router.createUrlTree(['/login'], {
queryParams: {
redirectUrl: state.url,
},
});
if (requiredPermissions.every(permission => user.permissions.includes(permission))) {
return true
}
return router.createUrlTree(['/unauthorized'], {
queryParams: {
redirectUrl: state.url,
},
});
}
const loginGuard: CanActivateFn = (
route: ActivatedRouteSnapshot
) => {
const userService: UserService = inject(UserService);
const router: Router = inject(Router);
return userService.isAuthenticated.pipe(
map((isAuth) => {
if (!isAuth) {
@ -83,15 +109,15 @@ const routes: Routes = [
import('./features/recipes/recipes.component').then(
(m) => m.RecipesComponent
),
canActivate: [authGuard],
canActivate: [authGuard, permissionsGuard(UserPermissions.THAI_PERMISSION, UserPermissions.SUPER_ADMIN)],
},
{
path: 'recipe/:productCode',
loadComponent: () =>
import(
'./features/recipes/recipe-details/recipe-details.component'
).then((m) => m.RecipeDetailsComponent),
canActivate: [authGuard],
).then((m) => m.RecipeDetailsComponent),
canActivate: [authGuard, permissionsGuard(UserPermissions.THAI_PERMISSION, UserPermissions.SUPER_ADMIN)],
},
// {
// path: 'log',
@ -100,9 +126,17 @@ const routes: Routes = [
// (m) => m.ChangelogComponent
// ),
// },
{
path: 'unauthorized',
loadComponent: () => import('./core/auth/unauthorized.component').then((m) => m.UnauthorizedComponent)
},
{
path: 'notfound',
loadComponent: () => import('./core/notfound.component').then((m) => m.NotfoundComponent)
},
{
path: '**',
redirectTo: 'recipes',
redirectTo: 'notfound',
},
],
},
@ -112,4 +146,5 @@ const routes: Routes = [
imports: [RouterModule.forRoot(routes)],
exports: [RouterModule],
})
export class AppRoutingModule {}
export class AppRoutingModule {
}

View file

@ -0,0 +1,31 @@
import { Component, OnInit } from '@angular/core';
import { Router, ActivatedRoute } from '@angular/router';
@Component({
selector: 'app-unauthorized',
standalone: true,
template: `
<div class="flex pt-[100px] justify-center h-screen">
<h1 class="text-2xl font-bold text-center text-red-500">
Unauthorized, You 🫵🏻 not have permissions
</h1>
</div>`
})
export class UnauthorizedComponent implements OnInit {
constructor(
private router: Router,
private activatedRoute: ActivatedRoute
) { }
ngOnInit(): void {
const redirectUrl = this.activatedRoute.snapshot.queryParams['redirectUrl'];
if (redirectUrl) {
this.router.navigate([redirectUrl]).catch(() => {
// redirect to login page
void this.router.navigate(['/login']);
});
}
}
}

View file

@ -0,0 +1,12 @@
export enum UserPermissions {
NO_PERMISSION,
THAI_PERMISSION = 1 << 0,
MALAY_PERMISSION = 1 << 1,
AUS_PERMISSION = 1 << 2,
SUPER_ADMIN = 1 << 3
}
export function getPermissions(perms: number) : UserPermissions[] {
return Object.values(UserPermissions)
.filter(permission => typeof permission === 'number' && (perms & permission) !== 0) as UserPermissions[];
}

View file

@ -1,7 +1,7 @@
import { Component, OnInit } from '@angular/core';
import { CommonModule } from '@angular/common';
import { ActivatedRoute, Params, Router } from '@angular/router';
import { ActivatedRoute, Router } from '@angular/router';
import { UserService } from '../services/user.service';
import {getPermissions} from "../auth/userPermissions";
@Component({
selector: 'app-callback',
@ -19,18 +19,19 @@ export class CallbackComponent implements OnInit {
this.route.queryParams.subscribe((params) => {
console.log(params);
if (params['email'] && params['name'] && params['picture']) {
if (params['email'] && params['name'] && params['picture'] && params['permissions']) {
this.userService.setAuth({
email: params['email'],
name: params['name'],
picture: params['picture'],
permissions: getPermissions(params['permissions'])
});
}
if (params['redirect_to']) {
this.router.navigate([params['redirect_to']]);
void this.router.navigate([params['redirect_to']]);
} else {
this.router.navigate(['/']);
void this.router.navigate(['/']);
}
});
}

View file

@ -1,5 +1,8 @@
import {UserPermissions} from "../auth/userPermissions";
export interface User {
email: string;
name: string;
picture: string;
permissions: UserPermissions[];
}

View file

@ -0,0 +1,10 @@
import { Component } from '@angular/core';
@Component({
selector: 'app-notfound',
standalone: true,
template: `<h1>Not Found!!!</h1>`
})
export class NotfoundComponent {
}

View file

@ -2,10 +2,9 @@ import { Injectable } from '@angular/core';
import { HttpClient } from '@angular/common/http';
import {
BehaviorSubject,
Observable,
distinctUntilChanged,
map,
tap,
} from 'rxjs';
import { User } from '../models/user.model';
import { Router } from '@angular/router';
@ -31,6 +30,10 @@ export class UserService {
}
}
getCurrentUser(): User | null {
return this.currentUserSubject.value
}
logout(): void {
this.purgeAuth();
// post to api /revoke with cookie
@ -43,21 +46,6 @@ export class UserService {
});
}
getCurrentUser(): Observable<{ user: User }> {
return this.http
.get<{ user: User }>(environment.api + '/auth/user', {
withCredentials: true,
})
.pipe(
tap({
next: ({ user }) => {
this.setAuth(user);
},
error: () => this.purgeAuth(),
})
);
}
setAuth(user: User): void {
window.localStorage.setItem('user', JSON.stringify(user));
void this.currentUserSubject.next(user);

View file

@ -2,7 +2,7 @@ import { CommonModule, DatePipe } from '@angular/common';
import { Component, EventEmitter, OnInit } from '@angular/core';
import { FormBuilder, ReactiveFormsModule } from '@angular/forms';
import { ActivatedRoute, Router, RouterLink } from '@angular/router';
import { Observable, first } from 'rxjs';
import {Observable, first, map} from 'rxjs';
import { RecipeService } from 'src/app/core/services/recipe.service';
import { ConfirmModal } from 'src/app/shared/modal/confirm/confirm-modal.component';
import { animate, style, transition, trigger } from '@angular/animations';
@ -11,8 +11,7 @@ import {
RecipeDetail,
RecipeDetailMat,
} from 'src/app/core/models/recipe.model';
import { Action, ActionRecord } from 'src/app/shared/actionRecord/actionRecord';
import { isEqual } from 'lodash';
import { ActionRecord } from 'src/app/shared/actionRecord/actionRecord';
import { UserService } from 'src/app/core/services/user.service';
@Component({
@ -119,10 +118,9 @@ export class RecipeDetailsComponent implements OnInit {
// get username
let username:string = ""
this._userService.getCurrentUser().subscribe((user) => {
username = user.user.name;
this._userService.currentUser.pipe(map((user) => {
if (user)
username = user.name;
let to_send = {
edit_by: username,
@ -152,8 +150,8 @@ export class RecipeDetailsComponent implements OnInit {
}
);
console.log('Sending changes');
this._router.navigate(['/recipes']);
})
void this._router.navigate(['/recipes']);
}))
@ -198,6 +196,6 @@ export class RecipeDetailsComponent implements OnInit {
onRecipeListFormChange(repl: unknown[]) {
console.log('Recipe List Form Changed', repl);
this.repl = repl as never[];
this.isValueChanged ||= repl != undefined ? true : false;
this.isValueChanged ||= repl != undefined;
}
}

Binary file not shown.

View file

@ -1,173 +1,173 @@
package helpers
import (
"fmt"
"os"
"strconv"
"strings"
)
// DynamicCompare compares two values dynamically and returns true if they are equal.
//
// Parameters:
//
// - s: The first value to compare.
//
// - u: The second value to compare.
//
// Returns:
//
// - bool: True if the values are equal, false otherwise.
//
// - error: An error if the values cannot be compared.
func DynamicCompare(s interface{}, u interface{}) (bool, error) {
switch t := s.(type) {
case bool:
u, ok := u.(bool)
if !ok {
return false, fmt.Errorf("[bool] cannot compare %T and %T, %v and %v", t, u, s, u)
}
return t == u, nil
case string:
u, ok := u.(string)
if !ok {
return false, fmt.Errorf("[string] cannot compare %T and %T, %v and %v", t, u, s, u)
}
return t == u, nil
case int:
u, ok := u.(int)
if !ok {
return false, fmt.Errorf("[int] cannot compare %T and %T, %v and %v", t, u, s, u)
}
return t == u, nil
case float64:
u, ok := u.(float64)
// Log.Debug("[helpers] DynamicCompare", zap.Any("u", u), zap.Any("ok", ok), zap.Any("test_compare*(t==u)", t == u))
if t == u {
return t == u, nil
}
if !ok {
return false, fmt.Errorf("[float64] cannot compare %T and %T, %v and %v", t, u, s, u)
}
return t == u, nil
case nil:
return t == u, nil
case []interface{}:
for i := range t {
if ok, err := DynamicCompare(t[i], u); err != nil {
return false, err
} else if !ok {
return false, nil
}
}
break
case map[string]interface{}:
for _, v := range t {
if ok, err := DynamicCompare(v, u); err != nil {
return false, err
} else if !ok {
return false, nil
}
}
break
default:
return false, fmt.Errorf("[unknown] not in case. Cannot compare %T and %T, %v and %v", t, u, s, u)
}
if u == nil {
return false, fmt.Errorf("[empty] the compared value is nil")
}
return false, fmt.Errorf("[unknown] unexpected error. [old] %v and [new] %v", s, u)
}
func GetTempFile(filename string, user string, suffix int) string {
// Check if the temp file exist
_, err := os.Stat(filename)
// Log.Debug("[helpers] GetTempFile", zap.Any("filename", filename), zap.Any("suffix", suffix), zap.Any("err", err))
// file not exists
if os.IsNotExist(err) {
// Create temp file
if suffix == 0 {
return strings.Replace(filename, ".json", "_"+user+".tmp"+strconv.Itoa(suffix), 1)
}
// change extension from json to tmp
filename = strings.Replace(filename, ".json", "_"+user+".tmp"+strconv.Itoa(suffix), 1)
return filename
} else {
if strings.Contains(filename, ".tmp") {
return GetTempFile(strings.Replace(filename, "_"+user+".tmp"+strconv.Itoa(suffix-1), "_"+user+".tmp"+strconv.Itoa(suffix), 1), user, suffix+1)
}
// recursive call
return GetTempFile(strings.Replace(filename, ".json", "_"+user+".tmp"+strconv.Itoa(suffix), 1), user, suffix+1)
}
}
// func PackTempToRealFile(data *data.Data, countryID string, filename string) {
// // list file that end with .tmp*
// files, err := filepath.Glob(filename + ".tmp*")
// // for all files, read and get configNumber
// if err != nil {
// Log.Error("[helpers] PackTempToRealFile", zap.Error(err))
// }
// // get configNumber from actual filename.json
// //
// base_recipe := data.GetRecipe(countryID, filename)
// // read file and apply tmp file from 0 to tmpX.
// // - if there is more than 1 user that access this file at the same time,
// // pack in order, and if conflict, stop
// if len(files) == 0 {
// return
// }
// // TODO: must check the changes
// for _, file := range files {
// var tmpdata models.Recipe
// tmpfile, err := os.Open(file)
// if err != nil {
// return
// }
// _ = json.NewDecoder(tmpfile).Decode(&tmpdata)
// // apply change
// // = tmpdata.Recipe01
// for key, val := range tmpdata.Recipe01 {
// test_bol, err := DynamicCompare(base_recipe.Recipe01[key], val)
// if err != nil {
// Log.Error("[helpers] PackTempToRealFile", zap.Error(err))
// }
// if !test_bol {
// base_recipe.Recipe01[key] = val
// }
// }
// }
// // verify changes between tmpX and actual filename.json
// // if changes, rename tmpX to filename (version +1) .json
// }
package helpers
import (
"fmt"
"os"
"strconv"
"strings"
)
// DynamicCompare compares two values dynamically and returns true if they are equal.
//
// Parameters:
//
// - s: The first value to compare.
//
// - u: The second value to compare.
//
// Returns:
//
// - bool: True if the values are equal, false otherwise.
//
// - error: An error if the values cannot be compared.
func DynamicCompare(s interface{}, u interface{}) (bool, error) {
switch t := s.(type) {
case bool:
u, ok := u.(bool)
if !ok {
return false, fmt.Errorf("[bool] cannot compare %T and %T, %v and %v", t, u, s, u)
}
return t == u, nil
case string:
u, ok := u.(string)
if !ok {
return false, fmt.Errorf("[string] cannot compare %T and %T, %v and %v", t, u, s, u)
}
return t == u, nil
case int:
u, ok := u.(int)
if !ok {
return false, fmt.Errorf("[int] cannot compare %T and %T, %v and %v", t, u, s, u)
}
return t == u, nil
case float64:
u, ok := u.(float64)
// Log.Debug("[helpers] DynamicCompare", zap.Any("user", u), zap.Any("ok", ok), zap.Any("test_compare*(t==u)", t == u))
if t == u {
return t == u, nil
}
if !ok {
return false, fmt.Errorf("[float64] cannot compare %T and %T, %v and %v", t, u, s, u)
}
return t == u, nil
case nil:
return t == u, nil
case []interface{}:
for i := range t {
if ok, err := DynamicCompare(t[i], u); err != nil {
return false, err
} else if !ok {
return false, nil
}
}
break
case map[string]interface{}:
for _, v := range t {
if ok, err := DynamicCompare(v, u); err != nil {
return false, err
} else if !ok {
return false, nil
}
}
break
default:
return false, fmt.Errorf("[unknown] not in case. Cannot compare %T and %T, %v and %v", t, u, s, u)
}
if u == nil {
return false, fmt.Errorf("[empty] the compared value is nil")
}
return false, fmt.Errorf("[unknown] unexpected error. [old] %v and [new] %v", s, u)
}
func GetTempFile(filename string, user string, suffix int) string {
// Check if the temp file exist
_, err := os.Stat(filename)
// Log.Debug("[helpers] GetTempFile", zap.Any("filename", filename), zap.Any("suffix", suffix), zap.Any("err", err))
// file not exists
if os.IsNotExist(err) {
// Create temp file
if suffix == 0 {
return strings.Replace(filename, ".json", "_"+user+".tmp"+strconv.Itoa(suffix), 1)
}
// change extension from json to tmp
filename = strings.Replace(filename, ".json", "_"+user+".tmp"+strconv.Itoa(suffix), 1)
return filename
} else {
if strings.Contains(filename, ".tmp") {
return GetTempFile(strings.Replace(filename, "_"+user+".tmp"+strconv.Itoa(suffix-1), "_"+user+".tmp"+strconv.Itoa(suffix), 1), user, suffix+1)
}
// recursive call
return GetTempFile(strings.Replace(filename, ".json", "_"+user+".tmp"+strconv.Itoa(suffix), 1), user, suffix+1)
}
}
// func PackTempToRealFile(data *data.Data, countryID string, filename string) {
// // list file that end with .tmp*
// files, err := filepath.Glob(filename + ".tmp*")
// // for all files, read and get configNumber
// if err != nil {
// Log.Error("[helpers] PackTempToRealFile", zap.Error(err))
// }
// // get configNumber from actual filename.json
// //
// base_recipe := data.GetRecipe(countryID, filename)
// // read file and apply tmp file from 0 to tmpX.
// // - if there is more than 1 user that access this file at the same time,
// // pack in order, and if conflict, stop
// if len(files) == 0 {
// return
// }
// // TODO: must check the changes
// for _, file := range files {
// var tmpdata models.Recipe
// tmpfile, err := os.Open(file)
// if err != nil {
// return
// }
// _ = json.NewDecoder(tmpfile).Decode(&tmpdata)
// // apply change
// // = tmpdata.Recipe01
// for key, val := range tmpdata.Recipe01 {
// test_bol, err := DynamicCompare(base_recipe.Recipe01[key], val)
// if err != nil {
// Log.Error("[helpers] PackTempToRealFile", zap.Error(err))
// }
// if !test_bol {
// base_recipe.Recipe01[key] = val
// }
// }
// }
// // verify changes between tmpX and actual filename.json
// // if changes, rename tmpX to filename (version +1) .json
// }

View file

@ -2,6 +2,7 @@ package main
import (
"context"
"errors"
"log"
"os"
"os/signal"
@ -22,7 +23,7 @@ func main() {
go func() {
<-shutdownCtx.Done()
if shutdownCtx.Err() == context.DeadlineExceeded {
if errors.Is(shutdownCtx.Err(), context.DeadlineExceeded) {
log.Println("Shutdown timeout, force exit")
cancel()
}

View file

@ -1,19 +1,87 @@
package middlewares
import (
"context"
"encoding/json"
"fmt"
"github.com/go-chi/chi/v5"
"golang.org/x/oauth2"
"net/http"
"recipe-manager/enums/permissions"
"recipe-manager/models"
"recipe-manager/services/oauth"
"recipe-manager/services/user"
)
func Authorize(p []permissions.Permission, nextRoute http.HandlerFunc) http.HandlerFunc {
// ========================== ValidatePermissions =========================================
func Authorize(oauthService oauth.OAuthService, userService user.UserService, nextRoute http.Handler) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
user := r.Context().Value("user").(*models.User)
token := &oauth2.Token{}
if cookie, err := r.Cookie("access_token"); err == nil {
token.AccessToken = cookie.Value
}
userInfo, err := oauthService.GetUserInfo(r.Context(), token)
if err != nil {
// if have refresh token, set refresh token to token
if cookie, err := r.Cookie("refresh_token"); err == nil {
token.RefreshToken = cookie.Value
}
newToken, err := oauthService.RefreshToken(r.Context(), token)
if err != nil {
http.Error(w, "Unauthorized", http.StatusUnauthorized)
return
}
userInfo, err = oauthService.GetUserInfo(r.Context(), newToken)
if err != nil {
http.Error(w, "Unauthorized", http.StatusUnauthorized)
return
}
// set new token to cookie
w.Header().Add("set-cookie", fmt.Sprintf("access_token=%s; Path=/; HttpOnly; SameSite=None; Secure; Max-Age=3600", newToken.AccessToken))
}
if userInfo != nil {
userFromDB, err := userService.GetUserByEmail(r.Context(), userInfo.Email)
if err != nil {
if err != nil {
http.Error(w, "Unauthorized", http.StatusUnauthorized)
return
}
}
if userFromDB != nil {
userInfo.ID = userFromDB.ID
userInfo.Name = userFromDB.Name
if userFromDB.Picture != "" {
userInfo.Picture = userFromDB.Picture
}
userInfo.Permissions = userFromDB.Permissions
}
}
ctx := context.WithValue(r.Context(), "user", userInfo)
nextRoute.ServeHTTP(w, r.WithContext(ctx))
}
}
// ========================== Permissions =========================================
func ValidatePermissions(p []permissions.Permission, nextRoute http.HandlerFunc) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
u := r.Context().Value("user").(*models.User)
for _, pm := range p {
if !user.Permissions.IsHavePermission(pm) {
if !u.Permissions.IsHavePermission(pm) {
// If not have permission response unauthorized
w.WriteHeader(http.StatusUnauthorized)
err := json.NewEncoder(w).Encode("Unauthorized")
@ -28,10 +96,10 @@ func Authorize(p []permissions.Permission, nextRoute http.HandlerFunc) http.Hand
}
}
func OwnOrAuthorize(p []permissions.Permission, nextRoute http.HandlerFunc) http.HandlerFunc {
func ValidateOwnerOrPermissions(p []permissions.Permission, nextRoute http.HandlerFunc) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
reqUserID := chi.URLParam(r, "id")
user := r.Context().Value("user").(*models.User)
u := r.Context().Value("user").(*models.User)
if reqUserID == "" {
// If not have permission response unauthorized
@ -43,11 +111,11 @@ func OwnOrAuthorize(p []permissions.Permission, nextRoute http.HandlerFunc) http
return
}
if reqUserID == user.ID {
if reqUserID == u.ID {
nextRoute.ServeHTTP(w, r)
return
}
Authorize(p, nextRoute)
ValidatePermissions(p, nextRoute)
}
}

View file

@ -27,14 +27,14 @@ func (ur *UserRouter) Route(r chi.Router) {
// Users
r.Route("/users", func(r chi.Router) {
r.Get("/", middlewares.Authorize([]permissions.Permission{permissions.SuperAdmin}, ur.getUsers))
r.Get("/", middlewares.ValidatePermissions([]permissions.Permission{permissions.SuperAdmin}, ur.getUsers))
r.Post("/", middlewares.Authorize([]permissions.Permission{permissions.SuperAdmin}, ur.createUser))
r.Post("/", middlewares.ValidatePermissions([]permissions.Permission{permissions.SuperAdmin}, ur.createUser))
})
// User
r.Route("/user", func(r chi.Router) {
r.Get("/{id}", middlewares.OwnOrAuthorize([]permissions.Permission{permissions.SuperAdmin}, ur.getUser))
r.Get("/{id}", middlewares.ValidateOwnerOrPermissions([]permissions.Permission{permissions.SuperAdmin}, ur.getUser))
})
}
@ -56,7 +56,7 @@ func (ur *UserRouter) createUser(w http.ResponseWriter, r *http.Request) {
ur.taoLogger.Log.Error("UserRouter.CreateUser", zap.Error(err))
}
ur.taoLogger.Log.Info("UserRouter.CreateUser", zap.Reflect("u", u))
ur.taoLogger.Log.Info("UserRouter.CreateUser", zap.Reflect("user", u))
if err := ur.userService.CreateNewUser(ctx, u.Name, u.Email, u.Picture, u.Permissions); err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)

View file

@ -14,6 +14,7 @@ import (
"recipe-manager/config"
"recipe-manager/data"
"recipe-manager/enums/permissions"
"recipe-manager/middlewares"
"recipe-manager/models"
"recipe-manager/routers"
"recipe-manager/services/logger"
@ -29,7 +30,6 @@ import (
"github.com/go-chi/cors"
"github.com/spf13/viper"
"go.uber.org/zap"
"golang.org/x/oauth2"
)
var (
@ -116,7 +116,7 @@ func (s *Server) createHandler() {
}))
// Recipe Service
recipeService := recipe.NewRecipeService(s.data)
recipeService := recipe.NewRecipeService(s.data, s.taoLogger)
// User Service
userService := user.NewUserService(s.cfg, s.database, s.taoLogger)
@ -134,63 +134,7 @@ func (s *Server) createHandler() {
r.Group(func(r chi.Router) {
r.Use(func(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
token := &oauth2.Token{}
if cookie, err := r.Cookie("access_token"); err == nil {
token.AccessToken = cookie.Value
}
userInfo, err := s.oauth.GetUserInfo(r.Context(), token)
if err != nil {
// if have refresh token, set refresh token to token
if cookie, err := r.Cookie("refresh_token"); err == nil {
token.RefreshToken = cookie.Value
}
newToken, err := s.oauth.RefreshToken(r.Context(), token)
if err != nil {
http.Error(w, "Unauthorized", http.StatusUnauthorized)
return
}
userInfo, err = s.oauth.GetUserInfo(r.Context(), newToken)
if err != nil {
http.Error(w, "Unauthorized", http.StatusUnauthorized)
return
}
// set new token to cookie
w.Header().Add("set-cookie", fmt.Sprintf("access_token=%s; Path=/; HttpOnly; SameSite=None; Secure; Max-Age=3600", newToken.AccessToken))
}
if userInfo != nil {
userFromDB, err := userService.GetUserByEmail(r.Context(), userInfo.Email)
if err != nil {
if err != nil {
http.Error(w, "Unauthorized", http.StatusUnauthorized)
return
}
}
if userFromDB != nil {
userInfo.ID = userFromDB.ID
userInfo.Name = userFromDB.Name
if userFromDB.Picture != "" {
userInfo.Picture = userFromDB.Picture
}
userInfo.Permissions = userFromDB.Permissions
}
}
ctx := context.WithValue(r.Context(), "user", userInfo)
next.ServeHTTP(w, r.WithContext(ctx))
})
return middlewares.Authorize(s.oauth, userService, next)
})
r.Post("/merge", func(w http.ResponseWriter, r *http.Request) {
@ -198,10 +142,10 @@ func (s *Server) createHandler() {
// locking
if !pyAPIhandler(w, r) {
s.taoLogger.Log.Warn("Merge - u tried to access while another u is requesting merge",
zap.String("u", r.Context().Value("u").(*models.User).Name))
zap.String("user", r.Context().Value("user").(*models.User).Name))
return
} else {
s.taoLogger.Log.Debug("Merge - u has access", zap.String("u", r.Context().Value("u").(*models.User).Name))
s.taoLogger.Log.Debug("Merge - u has access", zap.String("user", r.Context().Value("user").(*models.User).Name))
}
var targetMap map[string]interface{}
@ -234,8 +178,8 @@ func (s *Server) createHandler() {
dev_path := repo_path + dev_version + ".json"
// Get who's requesting
u := r.Context().Value("u").(*models.User)
s.taoLogger.Log.Info("Request merge by", zap.String("u", u.Name))
u := r.Context().Value("user").(*models.User)
s.taoLogger.Log.Info("Request merge by", zap.String("user", u.Name))
// lookup for python exec
pyExec, err := exec.LookPath("python")

View file

@ -1,204 +1,202 @@
package recipe
import (
"fmt"
"recipe-manager/contracts"
"recipe-manager/data"
"recipe-manager/models"
"recipe-manager/services/logger"
"sort"
"strings"
"go.uber.org/zap"
)
var (
Log = logger.GetInstance()
)
type RecipeService interface {
GetRecipeDashboard(request *contracts.RecipeDashboardRequest) (contracts.RecipeDashboardResponse, error)
GetRecipeOverview(request *contracts.RecipeOverviewRequest) (contracts.RecipeOverviewResponse, error)
GetRecipeDetail(request *contracts.RecipeDetailRequest) (contracts.RecipeDetailResponse, error)
GetRecipeDetailMat(request *contracts.RecipeDetailRequest) (contracts.RecipeDetailMatListResponse, error)
}
type recipeService struct {
db *data.Data
}
// GetRecipeDetail implements RecipeService.
func (rs *recipeService) GetRecipeDetail(request *contracts.RecipeDetailRequest) (contracts.RecipeDetailResponse, error) {
Log.Debug("GetRecipeDetail", zap.Any("request", request))
recipe, err := rs.db.GetRecipe01ByProductCode(request.Filename, request.Country, request.ProductCode)
if err != nil {
return contracts.RecipeDetailResponse{}, err
}
// DEBUG: picture
Log.Debug("GetRecipeDetail", zap.String("picture", recipe.UriData))
result := contracts.RecipeDetailResponse{
Name: recipe.Name,
OtherName: recipe.OtherName,
Description: recipe.Description,
OtherDescription: recipe.OtherDescription,
LastUpdated: recipe.LastChange,
Picture: recipe.UriData[len("img="):], // remove "img=" prefix
}
return result, nil
}
// GetRecipeDetailMat implements RecipeService.
func (rs *recipeService) GetRecipeDetailMat(request *contracts.RecipeDetailRequest) (contracts.RecipeDetailMatListResponse, error) {
countryID, err := rs.db.GetCountryIDByName(request.Country)
if err != nil {
return contracts.RecipeDetailMatListResponse{}, fmt.Errorf("country name: %s not found", request.Country)
}
recipe, err := rs.db.GetRecipe01ByProductCode(request.Filename, request.Country, request.ProductCode)
if err != nil {
return contracts.RecipeDetailMatListResponse{}, err
}
matIds := []uint64{}
for _, v := range recipe.Recipes {
if v.IsUse {
matIds = append(matIds, uint64(v.MaterialPathId))
}
}
matsCode := rs.db.GetMaterialCode(matIds, countryID, request.Filename)
result := contracts.RecipeDetailMatListResponse{
Result: []contracts.RecipeDetailMat{},
}
for _, v := range recipe.Recipes {
for _, mat := range matsCode {
if v.MaterialPathId == int(mat.MaterialID) {
result.Result = append(result.Result, contracts.RecipeDetailMat{
IsUse: v.IsUse,
MaterialID: mat.MaterialID,
Name: mat.PackageDescription,
MixOrder: v.MixOrder,
FeedParameter: v.FeedParameter,
FeedPattern: v.FeedPattern,
MaterialPathId: v.MaterialPathId,
PowderGram: v.PowderGram,
PowderTime: v.PowderTime,
StirTime: v.StirTime,
SyrupGram: v.SyrupGram,
SyrupTime: v.SyrupTime,
WaterCold: v.WaterCold,
WaterYield: v.WaterYield,
})
break
}
}
}
// sort by id
// sort.Slice(result.Result, func(i, j int) bool {
// return result.Result[i].MaterialID < result.Result[j].MaterialID
// })
return result, nil
}
func (rs *recipeService) GetRecipeDashboard(request *contracts.RecipeDashboardRequest) (contracts.RecipeDashboardResponse, error) {
countryID, err := rs.db.GetCountryIDByName(request.Country)
if err != nil {
return contracts.RecipeDashboardResponse{}, fmt.Errorf("country name: %s not found", request.Country)
}
recipe := rs.db.GetRecipe(countryID, request.Filename)
result := contracts.RecipeDashboardResponse{
ConfigNumber: recipe.MachineSetting.ConfigNumber,
LastUpdated: recipe.Timestamp,
Filename: request.Filename,
}
return result, nil
}
func (rs *recipeService) GetRecipeOverview(request *contracts.RecipeOverviewRequest) (contracts.RecipeOverviewResponse, error) {
countryID, err := rs.db.GetCountryIDByName(request.Country)
if err != nil {
return contracts.RecipeOverviewResponse{}, fmt.Errorf("country name: %s not found", request.Country)
}
recipe := rs.db.GetRecipe(countryID, request.Filename)
recipeFilter := recipe.Recipe01
result := contracts.RecipeOverviewResponse{}
if request.Search != "" {
searchResult := []models.Recipe01{}
for _, v := range recipeFilter {
if strings.Contains(strings.ToLower(v.ProductCode), strings.ToLower(request.Search)) ||
strings.Contains(strings.ToLower(v.Name), strings.ToLower(request.Search)) ||
strings.Contains(strings.ToLower(v.OtherName), strings.ToLower(request.Search)) {
searchResult = append(searchResult, v)
}
}
recipeFilter = searchResult
}
if len(request.MatIds) > 0 {
matIdsFiltered := []models.Recipe01{}
for _, v := range recipeFilter {
for _, matID := range request.MatIds {
for _, recipe := range v.Recipes {
if recipe.IsUse && recipe.MaterialPathId == matID {
matIdsFiltered = append(matIdsFiltered, v)
}
}
}
}
recipeFilter = matIdsFiltered
}
// Map to contracts.RecipeOverview
for _, v := range recipeFilter {
result.Result = append(result.Result, contracts.RecipeOverview{
ID: v.ID,
ProductCode: v.ProductCode,
Name: v.Name,
OtherName: v.OtherName,
Description: v.Description,
LastUpdated: v.LastChange,
})
}
result.TotalCount = len(result.Result)
result.HasMore = result.TotalCount >= request.Take+request.Skip
if result.HasMore {
result.Result = result.Result[request.Skip : request.Take+request.Skip]
sort.Slice(result.Result, func(i, j int) bool {
return result.Result[i].ID < result.Result[j].ID
})
} else if result.TotalCount > request.Skip {
result.Result = result.Result[request.Skip:]
} else {
result.Result = []contracts.RecipeOverview{}
}
return result, nil
}
func NewRecipeService(db *data.Data) RecipeService {
return &recipeService{
db: db,
}
}
package recipe
import (
"fmt"
"recipe-manager/contracts"
"recipe-manager/data"
"recipe-manager/models"
"recipe-manager/services/logger"
"sort"
"strings"
"go.uber.org/zap"
)
type RecipeService interface {
GetRecipeDashboard(request *contracts.RecipeDashboardRequest) (contracts.RecipeDashboardResponse, error)
GetRecipeOverview(request *contracts.RecipeOverviewRequest) (contracts.RecipeOverviewResponse, error)
GetRecipeDetail(request *contracts.RecipeDetailRequest) (contracts.RecipeDetailResponse, error)
GetRecipeDetailMat(request *contracts.RecipeDetailRequest) (contracts.RecipeDetailMatListResponse, error)
}
type recipeService struct {
db *data.Data
taoLogger *logger.TaoLogger
}
// GetRecipeDetail implements RecipeService.
func (rs *recipeService) GetRecipeDetail(request *contracts.RecipeDetailRequest) (contracts.RecipeDetailResponse, error) {
rs.taoLogger.Log.Debug("GetRecipeDetail", zap.Any("request", request))
recipe, err := rs.db.GetRecipe01ByProductCode(request.Filename, request.Country, request.ProductCode)
if err != nil {
return contracts.RecipeDetailResponse{}, err
}
// DEBUG: picture
rs.taoLogger.Log.Debug("GetRecipeDetail", zap.String("picture", recipe.UriData))
result := contracts.RecipeDetailResponse{
Name: recipe.Name,
OtherName: recipe.OtherName,
Description: recipe.Description,
OtherDescription: recipe.OtherDescription,
LastUpdated: recipe.LastChange,
Picture: recipe.UriData[len("img="):], // remove "img=" prefix
}
return result, nil
}
// GetRecipeDetailMat implements RecipeService.
func (rs *recipeService) GetRecipeDetailMat(request *contracts.RecipeDetailRequest) (contracts.RecipeDetailMatListResponse, error) {
countryID, err := rs.db.GetCountryIDByName(request.Country)
if err != nil {
return contracts.RecipeDetailMatListResponse{}, fmt.Errorf("country name: %s not found", request.Country)
}
recipe, err := rs.db.GetRecipe01ByProductCode(request.Filename, request.Country, request.ProductCode)
if err != nil {
return contracts.RecipeDetailMatListResponse{}, err
}
matIds := []uint64{}
for _, v := range recipe.Recipes {
if v.IsUse {
matIds = append(matIds, uint64(v.MaterialPathId))
}
}
matsCode := rs.db.GetMaterialCode(matIds, countryID, request.Filename)
result := contracts.RecipeDetailMatListResponse{
Result: []contracts.RecipeDetailMat{},
}
for _, v := range recipe.Recipes {
for _, mat := range matsCode {
if v.MaterialPathId == int(mat.MaterialID) {
result.Result = append(result.Result, contracts.RecipeDetailMat{
IsUse: v.IsUse,
MaterialID: mat.MaterialID,
Name: mat.PackageDescription,
MixOrder: v.MixOrder,
FeedParameter: v.FeedParameter,
FeedPattern: v.FeedPattern,
MaterialPathId: v.MaterialPathId,
PowderGram: v.PowderGram,
PowderTime: v.PowderTime,
StirTime: v.StirTime,
SyrupGram: v.SyrupGram,
SyrupTime: v.SyrupTime,
WaterCold: v.WaterCold,
WaterYield: v.WaterYield,
})
break
}
}
}
// sort by id
// sort.Slice(result.Result, func(i, j int) bool {
// return result.Result[i].MaterialID < result.Result[j].MaterialID
// })
return result, nil
}
func (rs *recipeService) GetRecipeDashboard(request *contracts.RecipeDashboardRequest) (contracts.RecipeDashboardResponse, error) {
countryID, err := rs.db.GetCountryIDByName(request.Country)
if err != nil {
return contracts.RecipeDashboardResponse{}, fmt.Errorf("country name: %s not found", request.Country)
}
recipe := rs.db.GetRecipe(countryID, request.Filename)
result := contracts.RecipeDashboardResponse{
ConfigNumber: recipe.MachineSetting.ConfigNumber,
LastUpdated: recipe.Timestamp,
Filename: request.Filename,
}
return result, nil
}
func (rs *recipeService) GetRecipeOverview(request *contracts.RecipeOverviewRequest) (contracts.RecipeOverviewResponse, error) {
countryID, err := rs.db.GetCountryIDByName(request.Country)
if err != nil {
return contracts.RecipeOverviewResponse{}, fmt.Errorf("country name: %s not found", request.Country)
}
recipe := rs.db.GetRecipe(countryID, request.Filename)
recipeFilter := recipe.Recipe01
result := contracts.RecipeOverviewResponse{}
if request.Search != "" {
var searchResult []models.Recipe01
for _, v := range recipeFilter {
if strings.Contains(strings.ToLower(v.ProductCode), strings.ToLower(request.Search)) ||
strings.Contains(strings.ToLower(v.Name), strings.ToLower(request.Search)) ||
strings.Contains(strings.ToLower(v.OtherName), strings.ToLower(request.Search)) {
searchResult = append(searchResult, v)
}
}
recipeFilter = searchResult
}
if len(request.MatIds) > 0 {
var matIdsFiltered []models.Recipe01
for _, v := range recipeFilter {
for _, matID := range request.MatIds {
for _, recipe := range v.Recipes {
if recipe.IsUse && recipe.MaterialPathId == matID {
matIdsFiltered = append(matIdsFiltered, v)
}
}
}
}
recipeFilter = matIdsFiltered
}
// Map to contracts.RecipeOverview
for _, v := range recipeFilter {
result.Result = append(result.Result, contracts.RecipeOverview{
ID: v.ID,
ProductCode: v.ProductCode,
Name: v.Name,
OtherName: v.OtherName,
Description: v.Description,
LastUpdated: v.LastChange,
})
}
result.TotalCount = len(result.Result)
result.HasMore = result.TotalCount >= request.Take+request.Skip
if result.HasMore {
result.Result = result.Result[request.Skip : request.Take+request.Skip]
sort.Slice(result.Result, func(i, j int) bool {
return result.Result[i].ID < result.Result[j].ID
})
} else if result.TotalCount > request.Skip {
result.Result = result.Result[request.Skip:]
} else {
result.Result = []contracts.RecipeOverview{}
}
return result, nil
}
func NewRecipeService(db *data.Data, taoLogger *logger.TaoLogger) RecipeService {
return &recipeService{
db: db,
taoLogger: taoLogger,
}
}