Files
Memoh/internal/bind/service.go
T
Ran 6acdd191c7 Squashed commit of the following:
commit bcdb026ae43e4f95d0b2c4f9bd440a2df9d6b514
Author: Ran <16112591+chen-ran@users.noreply.github.com>
Date:   Thu Feb 12 17:10:32 2026 +0800

    chore: update DEVELOPMENT.md

commit 30281742ef
Merge: ca5c6a1 5b05f13
Author: BBQ <bbq@BBQdeMacBook-Air.local>
Date:   Thu Feb 12 15:49:17 2026 +0800

    merge(github/main): integrate fx dependency injection framework

    Merge upstream fx refactor and adapt all services to use go.uber.org/fx
    for dependency injection. Resolve conflicts in main.go, server.go,
    and service constructors while preserving our domain model changes.

    - Fix telegram adapter panic on shutdown (double close channel)
    - Fix feishu adapter processing messages after stop
    - Increase directory lookup timeout from 2s to 5s

commit ca5c6a1866
Author: BBQ <bbq@BBQdeMacBook-Air.local>
Date:   Thu Feb 12 15:33:09 2026 +0800

    refactor(core): restructure conversation, channel and message domains

    - Rename chat module to conversation with flow-based architecture
    - Move channelidentities into channel/identities subpackage
    - Add channel/route for routing logic
    - Add message service with event hub
    - Add MCP providers: container, directory, schedule
    - Refactor Feishu/Telegram adapters with directory and stream support
    - Add platform management page and channel badges in web UI
    - Update database schema for conversations, messages and channel routes
    - Add @memoh/shared package for cross-package type definitions

commit 75e2ef0467
Merge: d99ba38 01cb6c8
Author: BBQ <bbq@BBQdeMacBook-Air.local>
Date:   Thu Feb 12 14:45:49 2026 +0800

    merge(github): merge github/main, resolve index.ts URL conflict

    Keep our defensive absolute-URL check in createAuthFetcher.

commit d99ba38b7d
Merge: 860e20f 35ce7d1
Author: BBQ <bbq@BBQdeMacBook-Air.local>
Date:   Thu Feb 12 05:20:18 2026 +0800

    merge(github): merge github/main, keep our code and docs/spec

commit 860e20fe70
Author: BBQ <bbq@BBQdeMacBook-Air.local>
Date:   Wed Feb 11 22:13:27 2026 +0800

    docs(docs): add concepts and style guides for VitePress site

    - Add concepts: identity-and-binding, index (en/zh)
    - Add style: terminology (en/zh)
    - Update index and zh/index
    - Update .vitepress/config.ts

commit a75fdb8040
Author: BBQ <bbq@BBQdeMacBook-Air.local>
Date:   Wed Feb 11 17:37:16 2026 +0800

    refactor(mcp): standardize unified tool gateway on go-sdk

    Split business executors from federation sources and migrate unified tool/federation transports to the official go-sdk for stricter MCP compliance and safer session lifecycle handling. Add targeted regression tests for accept compatibility, initialization retries, pending cleanup, and include updated swagger artifacts.

commit 02b33c8e85
Author: BBQ <bbq@BBQdeMacBook-Air.local>
Date:   Wed Feb 11 15:42:21 2026 +0800

    refactor(core): finalize user-centric identity and policy cleanup

    Unify auth and chat identity semantics around user_id, enforce personal-bot owner-only authorization, and remove legacy compatibility branches in integration tests.

commit 06e8619a37
Author: BBQ <bbq@BBQdeMacBook-Air.local>
Date:   Wed Feb 11 14:47:03 2026 +0800

    refactor(core): migrate channel identity and binding across app

    Align channel identity and bind flow across backend and app-facing layers, including generated swagger artifacts and package lock updates while excluding docs content changes.
2026-02-12 17:13:03 +08:00

243 lines
6.6 KiB
Go

package bind
import (
"context"
"errors"
"fmt"
"log/slog"
"strings"
"time"
"github.com/google/uuid"
"github.com/jackc/pgx/v5"
"github.com/jackc/pgx/v5/pgconn"
"github.com/jackc/pgx/v5/pgtype"
"github.com/jackc/pgx/v5/pgxpool"
"github.com/memohai/memoh/internal/db"
"github.com/memohai/memoh/internal/db/sqlc"
)
const (
defaultTTL = 24 * time.Hour
maxTokenRetries = 5
)
// Service manages channel identity->user bind code lifecycle.
type Service struct {
pool *pgxpool.Pool
queries *sqlc.Queries
logger *slog.Logger
}
// NewService creates a bind code service.
func NewService(log *slog.Logger, pool *pgxpool.Pool, queries *sqlc.Queries) *Service {
if log == nil {
log = slog.Default()
}
return &Service{
pool: pool,
queries: queries,
logger: log.With(slog.String("service", "bind")),
}
}
// Issue creates a new bind code issued by the given user.
// Platform is optional; when provided, bind consume must happen on the same channel platform.
func (s *Service) Issue(ctx context.Context, issuedByUserID, platform string, ttl time.Duration) (Code, error) {
if s.queries == nil {
return Code{}, fmt.Errorf("bind queries not configured")
}
if ttl <= 0 {
ttl = defaultTTL
}
pgUserID, err := db.ParseUUID(issuedByUserID)
if err != nil {
return Code{}, fmt.Errorf("invalid user id: %w", err)
}
normalizedPlatform := normalizePlatform(platform)
expiresAt := time.Now().UTC().Add(ttl)
for i := 0; i < maxTokenRetries; i++ {
token := strings.ToUpper(strings.ReplaceAll(uuid.NewString(), "-", "")[:8])
row, err := s.queries.CreateBindCode(ctx, sqlc.CreateBindCodeParams{
Token: token,
IssuedByUserID: pgUserID,
ChannelType: pgtype.Text{
String: normalizedPlatform,
Valid: normalizedPlatform != "",
},
ExpiresAt: pgtype.Timestamptz{Time: expiresAt, Valid: true},
})
if err == nil {
return toCode(row), nil
}
if isUniqueViolation(err) {
continue
}
return Code{}, fmt.Errorf("create bind code: %w", err)
}
return Code{}, fmt.Errorf("create bind code: token collision after retries")
}
// Get looks up a bind code by token.
func (s *Service) Get(ctx context.Context, token string) (Code, error) {
if s.queries == nil {
return Code{}, fmt.Errorf("bind queries not configured")
}
row, err := s.queries.GetBindCode(ctx, strings.TrimSpace(token))
if err != nil {
if errors.Is(err, pgx.ErrNoRows) {
return Code{}, ErrCodeNotFound
}
return Code{}, err
}
return toCode(row), nil
}
// Consume validates and consumes a bind code and links the channel identity to issuer user.
func (s *Service) Consume(ctx context.Context, code Code, channelIdentityID string) error {
if s.queries == nil || s.pool == nil {
return fmt.Errorf("bind service not configured")
}
// Fast-fail based on caller snapshot before opening a transaction.
if !code.UsedAt.IsZero() {
return ErrCodeUsed
}
if !code.ExpiresAt.IsZero() && time.Now().UTC().After(code.ExpiresAt) {
return ErrCodeExpired
}
token := strings.TrimSpace(code.Token)
if token == "" {
return ErrCodeNotFound
}
sourceIdentityID := strings.TrimSpace(channelIdentityID)
if sourceIdentityID == "" {
return fmt.Errorf("channel identity id is required")
}
pgSourceIdentityID, err := db.ParseUUID(sourceIdentityID)
if err != nil {
return err
}
tx, err := s.pool.BeginTx(ctx, pgx.TxOptions{})
if err != nil {
return fmt.Errorf("begin bind consume tx: %w", err)
}
defer func() { _ = tx.Rollback(ctx) }()
qtx := s.queries.WithTx(tx)
lockedCodeRow, err := qtx.GetBindCodeForUpdate(ctx, token)
if err != nil {
if errors.Is(err, pgx.ErrNoRows) {
return ErrCodeNotFound
}
return fmt.Errorf("lock bind code: %w", err)
}
lockedCode := toCode(lockedCodeRow)
if !lockedCode.UsedAt.IsZero() {
return ErrCodeUsed
}
if !lockedCode.ExpiresAt.IsZero() && time.Now().UTC().After(lockedCode.ExpiresAt) {
return ErrCodeExpired
}
if strings.TrimSpace(code.Platform) != "" && !strings.EqualFold(lockedCode.Platform, strings.TrimSpace(code.Platform)) {
return ErrCodeMismatch
}
targetUserID := strings.TrimSpace(lockedCode.IssuedByUserID)
if targetUserID == "" {
return fmt.Errorf("bind code issuer user is missing")
}
pgTargetUserID, err := db.ParseUUID(targetUserID)
if err != nil {
return err
}
if _, err := qtx.GetChannelIdentityByIDForUpdate(ctx, pgSourceIdentityID); err != nil {
if errors.Is(err, pgx.ErrNoRows) {
return fmt.Errorf("channel identity not found")
}
return fmt.Errorf("lock source identity: %w", err)
}
sourceIdentity, err := qtx.GetChannelIdentityByIDForUpdate(ctx, pgSourceIdentityID)
if err != nil {
if errors.Is(err, pgx.ErrNoRows) {
return fmt.Errorf("channel identity not found")
}
return fmt.Errorf("reload source identity: %w", err)
}
if sourceIdentity.UserID.Valid && sourceIdentity.UserID.String() != targetUserID {
return ErrLinkConflict
}
if !sourceIdentity.UserID.Valid {
if _, err := qtx.SetChannelIdentityLinkedUser(ctx, sqlc.SetChannelIdentityLinkedUserParams{
ID: pgSourceIdentityID,
UserID: pgTargetUserID,
}); err != nil {
return fmt.Errorf("link channel identity user: %w", err)
}
}
if _, err := qtx.MarkBindCodeUsed(ctx, sqlc.MarkBindCodeUsedParams{
ID: lockedCodeRow.ID,
UsedByChannelIdentityID: pgSourceIdentityID,
}); err != nil {
if errors.Is(err, pgx.ErrNoRows) {
return ErrCodeUsed
}
return fmt.Errorf("mark bind code used: %w", err)
}
if err := tx.Commit(ctx); err != nil {
return fmt.Errorf("commit bind consume tx: %w", err)
}
s.logger.Info("bind code consumed",
slog.String("code_id", lockedCode.ID),
slog.String("platform", lockedCode.Platform),
slog.String("channel_identity", sourceIdentityID),
slog.String("target_user", targetUserID),
)
return nil
}
func toCode(row sqlc.ChannelIdentityBindCode) Code {
c := Code{
ID: row.ID.String(),
Token: row.Token,
IssuedByUserID: row.IssuedByUserID.String(),
CreatedAt: row.CreatedAt.Time,
}
if row.ChannelType.Valid {
c.Platform = normalizePlatform(row.ChannelType.String)
}
if row.ExpiresAt.Valid {
c.ExpiresAt = row.ExpiresAt.Time
}
if row.UsedAt.Valid {
c.UsedAt = row.UsedAt.Time
}
if row.UsedByChannelIdentityID.Valid {
c.UsedByChannelIdentityID = row.UsedByChannelIdentityID.String()
}
return c
}
func isUniqueViolation(err error) bool {
var pgErr *pgconn.PgError
if !errors.As(err, &pgErr) {
return false
}
if pgErr.Code != "23505" {
return false
}
return pgErr.ConstraintName == "" || pgErr.ConstraintName == "channel_identity_bind_codes_token_unique"
}
func normalizePlatform(raw string) string {
return strings.ToLower(strings.TrimSpace(raw))
}