storj/pkg/satellite/service.go

326 lines
7.6 KiB
Go
Raw Normal View History

// Copyright (C) 2018 Storj Labs, Inc.
// See LICENSE for copying information.
package satellite
import (
"context"
"crypto/sha256"
"crypto/subtle"
"time"
2018-11-21 15:51:43 +00:00
"go.uber.org/zap"
"github.com/skyrings/skyring-common/tools/uuid"
"github.com/zeebo/errs"
"storj.io/storj/pkg/auth"
"storj.io/storj/pkg/satellite/satelliteauth"
)
// Service is handling accounts related logic
type Service struct {
Signer
store DB
2018-11-21 15:51:43 +00:00
log *zap.Logger
}
// NewService returns new instance of Service
2018-11-21 15:51:43 +00:00
func NewService(log *zap.Logger, signer Signer, store DB) (*Service, error) {
if signer == nil {
return nil, errs.New("signer can't be nil")
}
if store == nil {
return nil, errs.New("store can't be nil")
}
2018-11-21 15:51:43 +00:00
if log == nil {
return nil, errs.New("log can't be nil")
}
return &Service{Signer: signer, store: store, log: log}, nil
}
2018-11-28 10:31:15 +00:00
// CreateUser gets password hash value and creates new User
2018-11-21 15:51:43 +00:00
func (s *Service) CreateUser(ctx context.Context, userInfo UserInfo, companyInfo CompanyInfo) (*User, error) {
passwordHash := sha256.Sum256([]byte(userInfo.Password))
2018-11-28 10:31:15 +00:00
//TODO(yar): separate creation of user and company
2018-11-21 15:51:43 +00:00
user, err := s.store.Users().Insert(ctx, &User{
Email: userInfo.Email,
FirstName: userInfo.FirstName,
LastName: userInfo.LastName,
PasswordHash: passwordHash[:],
})
if err != nil {
return nil, err
}
_, err = s.store.Companies().Insert(ctx, &Company{
UserID: user.ID,
Name: companyInfo.Name,
Address: companyInfo.Address,
Country: companyInfo.Country,
City: companyInfo.City,
State: companyInfo.State,
PostalCode: companyInfo.PostalCode,
})
if err != nil {
s.log.Error(err.Error())
}
return user, nil
}
2018-11-21 15:51:43 +00:00
// CreateCompany creates Company for authorized User
func (s *Service) CreateCompany(ctx context.Context, info CompanyInfo) (*Company, error) {
auth, err := GetAuth(ctx)
if err != nil {
return nil, err
}
2018-11-21 15:51:43 +00:00
return s.store.Companies().Insert(ctx, &Company{
UserID: auth.User.ID,
2018-11-21 15:51:43 +00:00
Name: info.Name,
Address: info.Address,
Country: info.Country,
City: info.City,
State: info.State,
PostalCode: info.PostalCode,
})
}
2018-11-28 10:31:15 +00:00
// Token authenticates User by credentials and returns auth token
2018-11-21 15:51:43 +00:00
func (s *Service) Token(ctx context.Context, email, password string) (string, error) {
passwordHash := sha256.Sum256([]byte(password))
user, err := s.store.Users().GetByCredentials(ctx, passwordHash[:], email)
if err != nil {
return "", err
}
//TODO: move expiration time to constants
claims := satelliteauth.Claims{
ID: user.ID,
Expiration: time.Now().Add(time.Minute * 15),
}
token, err := s.createToken(&claims)
if err != nil {
return "", err
}
return token, nil
}
2018-11-28 10:31:15 +00:00
// GetUser returns User by id
func (s *Service) GetUser(ctx context.Context, id uuid.UUID) (*User, error) {
_, err := GetAuth(ctx)
if err != nil {
return nil, err
}
2018-11-21 15:51:43 +00:00
return s.store.Users().Get(ctx, id)
}
2018-11-28 10:31:15 +00:00
// UpdateUser updates User with given id
func (s *Service) UpdateUser(ctx context.Context, id uuid.UUID, info UserInfo) error {
_, err := GetAuth(ctx)
if err != nil {
return err
}
//TODO(yar): remove when validation is added
var passwordHash []byte
if info.Password != "" {
hash := sha256.Sum256([]byte(info.Password))
passwordHash = hash[:]
}
return s.store.Users().Update(ctx, &User{
ID: id,
FirstName: info.FirstName,
LastName: info.LastName,
Email: info.Email,
PasswordHash: passwordHash,
})
}
// DeleteUser deletes user by ID
func (s *Service) DeleteUser(ctx context.Context, id uuid.UUID) error {
_, err := GetAuth(ctx)
if err != nil {
return err
}
return s.store.Users().Delete(ctx, id)
}
2018-11-21 15:51:43 +00:00
// GetCompany returns company by userID
func (s *Service) GetCompany(ctx context.Context, userID uuid.UUID) (*Company, error) {
_, err := GetAuth(ctx)
if err != nil {
return nil, err
}
2018-11-21 15:51:43 +00:00
return s.store.Companies().GetByUserID(ctx, userID)
}
// GetProject is a method for querying project by id
func (s *Service) GetProject(ctx context.Context, projectID uuid.UUID) (*Project, error) {
_, err := GetAuth(ctx)
if err != nil {
return nil, err
}
return s.store.Projects().Get(ctx, projectID)
}
// GetUsersProjects is a method for querying all projects
func (s *Service) GetUsersProjects(ctx context.Context) ([]Project, error) {
_, err := GetAuth(ctx)
if err != nil {
return nil, err
}
// TODO: should return only users projects, not all
return s.store.Projects().GetAll(ctx)
}
// CreateProject is a method for creating new project
func (s *Service) CreateProject(ctx context.Context, projectInfo ProjectInfo) (*Project, error) {
auth, err := GetAuth(ctx)
if err != nil {
return nil, err
}
if !projectInfo.IsTermsAccepted {
return nil, errs.New("Terms of use should be accepted!")
}
project := &Project{
OwnerID: &auth.User.ID,
Description: projectInfo.Description,
Name: projectInfo.Name,
TermsAccepted: 1, //TODO: get lat version of Term of Use
}
return s.store.Projects().Insert(ctx, project)
}
// DeleteProject is a method for deleting project by id
func (s *Service) DeleteProject(ctx context.Context, projectID uuid.UUID) error {
_, err := GetAuth(ctx)
if err != nil {
return err
}
return s.store.Projects().Delete(ctx, projectID)
}
// UpdateProject is a method for updating project by id
func (s *Service) UpdateProject(ctx context.Context, projectID uuid.UUID, projectInfo ProjectInfo) (*Project, error) {
_, err := GetAuth(ctx)
if err != nil {
return nil, err
}
project, err := s.store.Projects().Get(ctx, projectID)
if err != nil {
return nil, errs.New("Project doesn't exist!")
}
project.Description = projectInfo.Description
project.Name = projectInfo.Name
err = s.store.Projects().Update(ctx, project)
if err != nil {
return nil, err
}
return project, nil
}
// Authorize validates token from context and returns authorized Authorization
func (s *Service) Authorize(ctx context.Context) (Authorization, error) {
tokenS, ok := auth.GetAPIKey(ctx)
2018-11-21 15:51:43 +00:00
if !ok {
return Authorization{}, errs.New("no api key was provided")
2018-11-21 15:51:43 +00:00
}
token, err := satelliteauth.FromBase64URLString(string(tokenS))
2018-11-21 15:51:43 +00:00
if err != nil {
return Authorization{}, err
2018-11-21 15:51:43 +00:00
}
claims, err := s.authenticate(token)
if err != nil {
return Authorization{}, err
}
user, err := s.authorize(ctx, claims)
if err != nil {
return Authorization{}, err
}
return Authorization{
User: *user,
Claims: *claims,
}, nil
2018-11-21 15:51:43 +00:00
}
// createToken creates string representation
2018-11-22 10:38:58 +00:00
func (s *Service) createToken(claims *satelliteauth.Claims) (string, error) {
json, err := claims.JSON()
if err != nil {
return "", err
}
token := satelliteauth.Token{Payload: json}
err = signToken(&token, s.Signer)
if err != nil {
return "", err
}
return token.String(), nil
}
// authenticate validates token signature and returns authenticated *satelliteauth.Authorization
func (s *Service) authenticate(token satelliteauth.Token) (*satelliteauth.Claims, error) {
signature := token.Signature
err := signToken(&token, s.Signer)
if err != nil {
return nil, err
}
if subtle.ConstantTimeCompare(signature, token.Signature) != 1 {
return nil, errs.New("incorrect signature")
}
claims, err := satelliteauth.FromJSON(token.Payload)
if err != nil {
return nil, err
}
return claims, nil
}
2018-11-21 15:51:43 +00:00
// authorize checks claims and returns authorized User
func (s *Service) authorize(ctx context.Context, claims *satelliteauth.Claims) (*User, error) {
if !claims.Expiration.IsZero() && claims.Expiration.Before(time.Now()) {
2018-11-21 15:51:43 +00:00
return nil, errs.New("token is outdated")
}
2018-11-21 15:51:43 +00:00
user, err := s.store.Users().Get(ctx, claims.ID)
if err != nil {
2018-11-21 15:51:43 +00:00
return nil, errs.New("authorization failed. no user with id: %s", claims.ID.String())
}
2018-11-21 15:51:43 +00:00
return user, nil
}