From cf51cf6f7424a85795bc67b3cece29c806a6d7e0 Mon Sep 17 00:00:00 2001 From: rtkay123 Date: Mon, 6 Apr 2026 20:06:14 +0200 Subject: feat(oauth): redirect --- crates/api-auth/src/discord/mod.rs | 26 +++++++++++++++++++++----- crates/api-auth/src/error.rs | 6 ++++++ crates/api-auth/src/lib.rs | 8 +++++++- 3 files changed, 34 insertions(+), 6 deletions(-) (limited to 'crates/api-auth/src') diff --git a/crates/api-auth/src/discord/mod.rs b/crates/api-auth/src/discord/mod.rs index dbcb139..1a7d47d 100644 --- a/crates/api-auth/src/discord/mod.rs +++ b/crates/api-auth/src/discord/mod.rs @@ -1,11 +1,12 @@ use api_core::models::user::User; -use async_session::Session; +use async_session::{Session, serde_json}; use async_trait::async_trait; use oauth2::{CsrfToken, Scope}; -use sh_util::cache::RedisManager; +use redis::AsyncCommands; +use sh_util::cache::{CacheKey, RedisManager}; use sqlx::PgPool; -use crate::{BasicClient, CSRF_TOKEN, OauthDriver, error::AuthError}; +use crate::{BasicClient, CSRF_TOKEN, OauthDriver, SessionResponse, error::AuthError}; #[derive(Clone)] pub struct AuthServiceDiscord { @@ -32,7 +33,7 @@ impl OauthDriver for AuthServiceDiscord { async fn get_user(&self) -> Result { todo!() } - async fn create_oauth_session(&self) -> Result { + async fn create_oauth_session(&self) -> Result { let (auth_url, csrf_token) = self .client .authorize_url(CsrfToken::new_random) @@ -42,7 +43,22 @@ impl OauthDriver for AuthServiceDiscord { let mut session = Session::new(); session.insert(CSRF_TOKEN, &csrf_token).unwrap(); - Ok(String::default()) + let cache_key = CacheKey::Session(session.id()); + let mut cache = self.cache.get().await.unwrap(); + cache + .set::<_, _, ()>( + cache_key, + serde_json::to_string(&session).or(Err(AuthError::InvalidSession))?, + ) + .await?; + let cookie = session + .into_cookie_value() + .ok_or(AuthError::MissingSession)?; + + Ok(SessionResponse { + cookie_value: cookie, + auth_url, + }) } async fn save_session(&self, user: &User) -> Result<(), AuthError> { todo!() diff --git a/crates/api-auth/src/error.rs b/crates/api-auth/src/error.rs index ec60e51..72a7fba 100644 --- a/crates/api-auth/src/error.rs +++ b/crates/api-auth/src/error.rs @@ -22,4 +22,10 @@ pub enum AuthError { InvalidTokenUrl(#[source] oauth2::url::ParseError), #[error("invalid redirect url: {0}")] InvalidRedirectUrl(#[source] oauth2::url::ParseError), + #[error("cache")] + Cache(#[from] redis::RedisError), + #[error("missing session")] + MissingSession, + #[error("invalid session")] + InvalidSession, } diff --git a/crates/api-auth/src/lib.rs b/crates/api-auth/src/lib.rs index 367d395..85fdb01 100644 --- a/crates/api-auth/src/lib.rs +++ b/crates/api-auth/src/lib.rs @@ -23,17 +23,23 @@ pub struct BasicClient(C); pub trait OauthDriver: Send + Sync { async fn get_auth_token(&self) -> Result; async fn get_user(&self) -> Result; - async fn create_oauth_session(&self) -> Result; + async fn create_oauth_session(&self) -> Result; async fn save_session(&self, user: &User) -> Result<(), AuthError>; } use oauth2::{AuthUrl, ClientId, ClientSecret, RedirectUrl, TokenUrl}; use std::{convert::TryFrom, ops::Deref}; +use url::Url; use crate::error::AuthError; static CSRF_TOKEN: &str = "csrf_token"; +pub struct SessionResponse { + pub cookie_value: String, + pub auth_url: Url, +} + impl Deref for BasicClient { type Target = C; -- cgit v1.2.3