2023-04-28 06:08:53 +00:00
|
|
|
use std::sync::Arc;
|
2023-04-04 00:41:16 +00:00
|
|
|
|
2023-05-15 14:16:05 +00:00
|
|
|
use appflowy_integrate::RocksCollabDB;
|
|
|
|
use serde::{Deserialize, Serialize};
|
2023-05-21 10:53:59 +00:00
|
|
|
use serde_repr::*;
|
2023-05-15 14:16:05 +00:00
|
|
|
use tokio::sync::RwLock;
|
|
|
|
|
2023-05-17 04:46:48 +00:00
|
|
|
use flowy_error::internal_error;
|
2023-01-31 00:28:31 +00:00
|
|
|
use flowy_sqlite::ConnectionPool;
|
|
|
|
use flowy_sqlite::{
|
2023-02-13 01:29:49 +00:00
|
|
|
kv::KV,
|
|
|
|
query_dsl::*,
|
|
|
|
schema::{user_table, user_table::dsl},
|
|
|
|
DBConnection, ExpressionMethods, UserDatabaseConnection,
|
2021-07-10 08:27:20 +00:00
|
|
|
};
|
2023-05-21 10:53:59 +00:00
|
|
|
use lib_infra::box_any::BoxAny;
|
2023-05-17 01:49:39 +00:00
|
|
|
|
|
|
|
use crate::entities::{
|
2023-05-21 10:53:59 +00:00
|
|
|
AuthTypePB, SignInResponse, SignUpResponse, UpdateUserProfileParams, UserProfile,
|
2023-02-13 01:29:49 +00:00
|
|
|
};
|
2023-04-28 06:08:53 +00:00
|
|
|
use crate::entities::{UserProfilePB, UserSettingPB};
|
2023-05-31 09:42:14 +00:00
|
|
|
use crate::event_map::{DefaultUserStatusCallback, UserCloudServiceProvider, UserStatusCallback};
|
2023-04-28 06:08:53 +00:00
|
|
|
use crate::{
|
2023-05-17 04:46:48 +00:00
|
|
|
errors::FlowyError,
|
2023-05-21 10:53:59 +00:00
|
|
|
event_map::UserAuthService,
|
2023-04-28 06:08:53 +00:00
|
|
|
notification::*,
|
|
|
|
services::database::{UserDB, UserTable, UserTableChangeset},
|
|
|
|
};
|
|
|
|
|
2021-07-10 08:27:20 +00:00
|
|
|
pub struct UserSessionConfig {
|
2023-02-13 01:29:49 +00:00
|
|
|
root_dir: String,
|
2022-12-20 03:14:42 +00:00
|
|
|
|
2023-02-13 01:29:49 +00:00
|
|
|
/// Used as the key of `Session` when saving session information to KV.
|
|
|
|
session_cache_key: String,
|
2021-07-10 08:27:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl UserSessionConfig {
|
2023-02-13 01:29:49 +00:00
|
|
|
/// The `root_dir` represents as the root of the user folders. It must be unique for each
|
|
|
|
/// users.
|
|
|
|
pub fn new(name: &str, root_dir: &str) -> Self {
|
|
|
|
let session_cache_key = format!("{}_session_cache", name);
|
|
|
|
Self {
|
|
|
|
root_dir: root_dir.to_owned(),
|
|
|
|
session_cache_key,
|
2021-07-10 08:27:20 +00:00
|
|
|
}
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
2021-07-10 08:27:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub struct UserSession {
|
2023-02-13 01:29:49 +00:00
|
|
|
database: UserDB,
|
2023-05-15 14:16:05 +00:00
|
|
|
session_config: UserSessionConfig,
|
2023-05-21 10:53:59 +00:00
|
|
|
cloud_services: Arc<dyn UserCloudServiceProvider>,
|
2023-05-31 09:42:14 +00:00
|
|
|
user_status_callback: RwLock<Arc<dyn UserStatusCallback>>,
|
2021-07-10 08:27:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl UserSession {
|
2023-05-21 10:53:59 +00:00
|
|
|
pub fn new(
|
|
|
|
session_config: UserSessionConfig,
|
|
|
|
cloud_services: Arc<dyn UserCloudServiceProvider>,
|
|
|
|
) -> Self {
|
2023-05-15 14:16:05 +00:00
|
|
|
let db = UserDB::new(&session_config.root_dir);
|
2023-05-31 09:42:14 +00:00
|
|
|
let user_status_callback: RwLock<Arc<dyn UserStatusCallback>> =
|
|
|
|
RwLock::new(Arc::new(DefaultUserStatusCallback));
|
2023-02-13 01:29:49 +00:00
|
|
|
Self {
|
|
|
|
database: db,
|
2023-05-15 14:16:05 +00:00
|
|
|
session_config,
|
2023-05-21 10:53:59 +00:00
|
|
|
cloud_services,
|
2023-02-13 01:29:49 +00:00
|
|
|
user_status_callback,
|
2021-08-31 15:01:46 +00:00
|
|
|
}
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
2021-08-31 15:01:46 +00:00
|
|
|
|
2023-02-13 01:29:49 +00:00
|
|
|
pub async fn init<C: UserStatusCallback + 'static>(&self, user_status_callback: C) {
|
|
|
|
if let Ok(session) = self.get_session() {
|
|
|
|
let _ = user_status_callback
|
2023-05-21 10:53:59 +00:00
|
|
|
.did_sign_in(session.user_id, &session.workspace_id)
|
2023-02-13 01:29:49 +00:00
|
|
|
.await;
|
2021-07-11 07:33:19 +00:00
|
|
|
}
|
2023-05-31 09:42:14 +00:00
|
|
|
*self.user_status_callback.write().await = Arc::new(user_status_callback);
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn db_connection(&self) -> Result<DBConnection, FlowyError> {
|
|
|
|
let user_id = self.get_session()?.user_id;
|
2023-04-04 00:41:16 +00:00
|
|
|
self.database.get_connection(user_id)
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// The caller will be not 'Sync' before of the return value,
|
|
|
|
// PooledConnection<ConnectionManager> is not sync. You can use
|
|
|
|
// db_connection_pool function to require the ConnectionPool that is 'Sync'.
|
|
|
|
//
|
|
|
|
// let pool = self.db_connection_pool()?;
|
|
|
|
// let conn: PooledConnection<ConnectionManager> = pool.get()?;
|
|
|
|
pub fn db_pool(&self) -> Result<Arc<ConnectionPool>, FlowyError> {
|
|
|
|
let user_id = self.get_session()?.user_id;
|
2023-04-04 00:41:16 +00:00
|
|
|
self.database.get_pool(user_id)
|
|
|
|
}
|
|
|
|
|
2023-05-15 14:16:05 +00:00
|
|
|
pub fn get_collab_db(&self) -> Result<Arc<RocksCollabDB>, FlowyError> {
|
2023-04-04 00:41:16 +00:00
|
|
|
let user_id = self.get_session()?.user_id;
|
2023-06-06 08:03:29 +00:00
|
|
|
self.database.get_collab_db(user_id)
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
|
|
|
|
2023-05-21 10:53:59 +00:00
|
|
|
#[tracing::instrument(level = "debug", skip(self, params))]
|
|
|
|
pub async fn sign_in(
|
|
|
|
&self,
|
|
|
|
auth_type: &AuthType,
|
|
|
|
params: BoxAny,
|
|
|
|
) -> Result<UserProfile, FlowyError> {
|
2023-05-31 09:42:14 +00:00
|
|
|
self
|
|
|
|
.user_status_callback
|
|
|
|
.read()
|
|
|
|
.await
|
|
|
|
.auth_type_did_changed(auth_type.clone());
|
|
|
|
|
2023-05-23 15:55:21 +00:00
|
|
|
self.cloud_services.set_auth_type(auth_type.clone());
|
2023-05-21 10:53:59 +00:00
|
|
|
let resp = self
|
|
|
|
.cloud_services
|
2023-05-31 09:42:14 +00:00
|
|
|
.get_auth_service()?
|
2023-05-21 10:53:59 +00:00
|
|
|
.sign_in(params)
|
|
|
|
.await?;
|
|
|
|
|
|
|
|
let session: Session = resp.clone().into();
|
|
|
|
self.set_session(Some(session))?;
|
|
|
|
let user_profile: UserProfile = self.save_user(resp.into()).await?.into();
|
|
|
|
let _ = self
|
|
|
|
.user_status_callback
|
|
|
|
.read()
|
|
|
|
.await
|
|
|
|
.did_sign_in(user_profile.id, &user_profile.workspace_id)
|
|
|
|
.await;
|
|
|
|
send_sign_in_notification()
|
|
|
|
.payload::<UserProfilePB>(user_profile.clone().into())
|
|
|
|
.send();
|
|
|
|
|
|
|
|
Ok(user_profile)
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
|
|
|
|
2023-05-21 10:53:59 +00:00
|
|
|
#[tracing::instrument(level = "debug", skip(self, params))]
|
|
|
|
pub async fn sign_up(
|
|
|
|
&self,
|
|
|
|
auth_type: &AuthType,
|
|
|
|
params: BoxAny,
|
|
|
|
) -> Result<UserProfile, FlowyError> {
|
2023-05-31 09:42:14 +00:00
|
|
|
self
|
|
|
|
.user_status_callback
|
|
|
|
.read()
|
|
|
|
.await
|
|
|
|
.auth_type_did_changed(auth_type.clone());
|
|
|
|
|
2023-05-23 15:55:21 +00:00
|
|
|
self.cloud_services.set_auth_type(auth_type.clone());
|
2023-05-21 10:53:59 +00:00
|
|
|
let resp = self
|
|
|
|
.cloud_services
|
2023-05-31 09:42:14 +00:00
|
|
|
.get_auth_service()?
|
2023-05-21 10:53:59 +00:00
|
|
|
.sign_up(params)
|
|
|
|
.await?;
|
|
|
|
|
|
|
|
let session: Session = resp.clone().into();
|
|
|
|
self.set_session(Some(session))?;
|
|
|
|
let user_table = self.save_user(resp.into()).await?;
|
|
|
|
let user_profile: UserProfile = user_table.into();
|
|
|
|
let _ = self
|
|
|
|
.user_status_callback
|
|
|
|
.read()
|
|
|
|
.await
|
|
|
|
.did_sign_up(&user_profile)
|
|
|
|
.await;
|
|
|
|
Ok(user_profile)
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[tracing::instrument(level = "debug", skip(self))]
|
2023-05-21 10:53:59 +00:00
|
|
|
pub async fn sign_out(&self, auth_type: &AuthType) -> Result<(), FlowyError> {
|
2023-02-13 01:29:49 +00:00
|
|
|
let session = self.get_session()?;
|
2023-04-04 00:41:16 +00:00
|
|
|
let uid = session.user_id.to_string();
|
|
|
|
let _ = diesel::delete(dsl::user_table.filter(dsl::id.eq(&uid)))
|
2023-02-13 01:29:49 +00:00
|
|
|
.execute(&*(self.db_connection()?))?;
|
2023-04-04 00:41:16 +00:00
|
|
|
self.database.close_user_db(session.user_id)?;
|
2023-02-13 01:29:49 +00:00
|
|
|
self.set_session(None)?;
|
2023-05-23 15:55:21 +00:00
|
|
|
|
2023-05-31 09:42:14 +00:00
|
|
|
let server = self.cloud_services.get_auth_service()?;
|
2023-05-21 10:53:59 +00:00
|
|
|
let token = session.token;
|
2023-06-09 14:23:07 +00:00
|
|
|
tokio::spawn(async move {
|
2023-05-21 10:53:59 +00:00
|
|
|
match server.sign_out(token).await {
|
|
|
|
Ok(_) => {},
|
|
|
|
Err(e) => tracing::error!("Sign out failed: {:?}", e),
|
|
|
|
}
|
|
|
|
});
|
2022-11-11 09:24:10 +00:00
|
|
|
|
2023-02-13 01:29:49 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
2021-09-01 08:08:32 +00:00
|
|
|
|
2023-02-13 01:29:49 +00:00
|
|
|
#[tracing::instrument(level = "debug", skip(self))]
|
|
|
|
pub async fn update_user_profile(
|
|
|
|
&self,
|
|
|
|
params: UpdateUserProfileParams,
|
|
|
|
) -> Result<(), FlowyError> {
|
2023-05-21 10:53:59 +00:00
|
|
|
let auth_type = params.auth_type.clone();
|
2023-02-13 01:29:49 +00:00
|
|
|
let session = self.get_session()?;
|
|
|
|
let changeset = UserTableChangeset::new(params.clone());
|
|
|
|
diesel_update_table!(user_table, changeset, &*self.db_connection()?);
|
|
|
|
|
|
|
|
let user_profile = self.get_user_profile().await?;
|
|
|
|
let profile_pb: UserProfilePB = user_profile.into();
|
2023-05-21 10:53:59 +00:00
|
|
|
send_notification(
|
|
|
|
&session.user_id.to_string(),
|
|
|
|
UserNotification::DidUpdateUserProfile,
|
|
|
|
)
|
|
|
|
.payload(profile_pb)
|
|
|
|
.send();
|
|
|
|
self
|
|
|
|
.update_user(&auth_type, session.user_id, &session.token, params)
|
|
|
|
.await?;
|
2023-02-13 01:29:49 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
2021-12-09 14:28:11 +00:00
|
|
|
|
2023-02-13 01:29:49 +00:00
|
|
|
pub async fn init_user(&self) -> Result<(), FlowyError> {
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn check_user(&self) -> Result<UserProfile, FlowyError> {
|
2023-05-21 10:53:59 +00:00
|
|
|
let (user_id, _token) = self.get_session()?.into_part();
|
2023-04-04 00:41:16 +00:00
|
|
|
let user_id = user_id.to_string();
|
2023-02-13 01:29:49 +00:00
|
|
|
let user = dsl::user_table
|
|
|
|
.filter(user_table::id.eq(&user_id))
|
|
|
|
.first::<UserTable>(&*(self.db_connection()?))?;
|
|
|
|
Ok(user.into())
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn get_user_profile(&self) -> Result<UserProfile, FlowyError> {
|
2023-05-21 10:53:59 +00:00
|
|
|
let (user_id, _) = self.get_session()?.into_part();
|
2023-04-04 00:41:16 +00:00
|
|
|
let user_id = user_id.to_string();
|
2023-02-13 01:29:49 +00:00
|
|
|
let user = dsl::user_table
|
|
|
|
.filter(user_table::id.eq(&user_id))
|
|
|
|
.first::<UserTable>(&*(self.db_connection()?))?;
|
|
|
|
|
|
|
|
Ok(user.into())
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn user_dir(&self) -> Result<String, FlowyError> {
|
|
|
|
let session = self.get_session()?;
|
2023-05-15 14:16:05 +00:00
|
|
|
Ok(format!(
|
|
|
|
"{}/{}",
|
|
|
|
self.session_config.root_dir, session.user_id
|
|
|
|
))
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn user_setting(&self) -> Result<UserSettingPB, FlowyError> {
|
|
|
|
let user_setting = UserSettingPB {
|
|
|
|
user_folder: self.user_dir()?,
|
|
|
|
};
|
|
|
|
Ok(user_setting)
|
|
|
|
}
|
|
|
|
|
2023-04-04 00:41:16 +00:00
|
|
|
pub fn user_id(&self) -> Result<i64, FlowyError> {
|
2023-02-13 01:29:49 +00:00
|
|
|
Ok(self.get_session()?.user_id)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn user_name(&self) -> Result<String, FlowyError> {
|
|
|
|
Ok(self.get_session()?.name)
|
|
|
|
}
|
|
|
|
|
2023-05-21 10:53:59 +00:00
|
|
|
pub fn token(&self) -> Result<Option<String>, FlowyError> {
|
2023-02-13 01:29:49 +00:00
|
|
|
Ok(self.get_session()?.token)
|
|
|
|
}
|
2021-09-01 08:08:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl UserSession {
|
2023-05-21 10:53:59 +00:00
|
|
|
async fn update_user(
|
2023-02-13 01:29:49 +00:00
|
|
|
&self,
|
2023-05-31 09:42:14 +00:00
|
|
|
_auth_type: &AuthType,
|
2023-05-21 10:53:59 +00:00
|
|
|
uid: i64,
|
|
|
|
token: &Option<String>,
|
2023-02-13 01:29:49 +00:00
|
|
|
params: UpdateUserProfileParams,
|
|
|
|
) -> Result<(), FlowyError> {
|
2023-05-31 09:42:14 +00:00
|
|
|
let server = self.cloud_services.get_auth_service()?;
|
2023-02-13 01:29:49 +00:00
|
|
|
let token = token.to_owned();
|
|
|
|
let _ = tokio::spawn(async move {
|
2023-05-21 10:53:59 +00:00
|
|
|
match server.update_user(uid, &token, params).await {
|
2023-02-13 01:29:49 +00:00
|
|
|
Ok(_) => {},
|
|
|
|
Err(e) => {
|
|
|
|
// TODO: retry?
|
|
|
|
tracing::error!("update user profile failed: {:?}", e);
|
|
|
|
},
|
|
|
|
}
|
|
|
|
})
|
|
|
|
.await;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn save_user(&self, user: UserTable) -> Result<UserTable, FlowyError> {
|
|
|
|
let conn = self.db_connection()?;
|
|
|
|
let _ = diesel::insert_into(user_table::table)
|
|
|
|
.values(user.clone())
|
|
|
|
.execute(&*conn)?;
|
|
|
|
Ok(user)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn set_session(&self, session: Option<Session>) -> Result<(), FlowyError> {
|
|
|
|
tracing::debug!("Set user session: {:?}", session);
|
|
|
|
match &session {
|
2023-05-17 04:46:48 +00:00
|
|
|
None => KV::remove(&self.session_config.session_cache_key),
|
|
|
|
Some(session) => {
|
|
|
|
KV::set_object(&self.session_config.session_cache_key, session.clone())
|
|
|
|
.map_err(internal_error)?;
|
|
|
|
},
|
2021-09-01 03:21:42 +00:00
|
|
|
}
|
2023-02-13 01:29:49 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
2021-09-03 08:43:03 +00:00
|
|
|
|
2023-02-13 01:29:49 +00:00
|
|
|
fn get_session(&self) -> Result<Session, FlowyError> {
|
2023-05-17 04:46:48 +00:00
|
|
|
match KV::get_object::<Session>(&self.session_config.session_cache_key) {
|
2023-02-13 01:29:49 +00:00
|
|
|
None => Err(FlowyError::unauthorized()),
|
2023-05-17 04:46:48 +00:00
|
|
|
Some(session) => Ok(session),
|
2021-07-18 15:56:36 +00:00
|
|
|
}
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
2021-08-31 15:01:46 +00:00
|
|
|
}
|
|
|
|
|
2021-09-27 15:23:23 +00:00
|
|
|
pub async fn update_user(
|
2023-05-21 10:53:59 +00:00
|
|
|
_cloud_service: Arc<dyn UserAuthService>,
|
2023-02-13 01:29:49 +00:00
|
|
|
pool: Arc<ConnectionPool>,
|
|
|
|
params: UpdateUserProfileParams,
|
2021-12-14 10:04:51 +00:00
|
|
|
) -> Result<(), FlowyError> {
|
2023-02-13 01:29:49 +00:00
|
|
|
let changeset = UserTableChangeset::new(params);
|
|
|
|
let conn = pool.get()?;
|
|
|
|
diesel_update_table!(user_table, changeset, &*conn);
|
|
|
|
Ok(())
|
2021-07-16 15:18:12 +00:00
|
|
|
}
|
2021-07-11 09:38:03 +00:00
|
|
|
|
2021-07-13 15:08:20 +00:00
|
|
|
impl UserDatabaseConnection for UserSession {
|
2023-02-13 01:29:49 +00:00
|
|
|
fn get_connection(&self) -> Result<DBConnection, String> {
|
|
|
|
self.db_connection().map_err(|e| format!("{:?}", e))
|
|
|
|
}
|
2021-07-13 15:08:20 +00:00
|
|
|
}
|
|
|
|
|
2021-09-01 03:21:42 +00:00
|
|
|
#[derive(Debug, Clone, Default, Serialize, Deserialize)]
|
|
|
|
struct Session {
|
2023-04-04 00:41:16 +00:00
|
|
|
user_id: i64,
|
2023-05-21 10:53:59 +00:00
|
|
|
|
|
|
|
workspace_id: String,
|
|
|
|
|
2023-02-13 01:29:49 +00:00
|
|
|
#[serde(default)]
|
|
|
|
name: String,
|
2023-05-21 10:53:59 +00:00
|
|
|
|
|
|
|
#[serde(default)]
|
|
|
|
token: Option<String>,
|
|
|
|
|
|
|
|
#[serde(default)]
|
|
|
|
email: Option<String>,
|
2021-09-01 03:21:42 +00:00
|
|
|
}
|
|
|
|
|
2021-12-09 13:39:53 +00:00
|
|
|
impl std::convert::From<SignInResponse> for Session {
|
2023-02-13 01:29:49 +00:00
|
|
|
fn from(resp: SignInResponse) -> Self {
|
|
|
|
Session {
|
|
|
|
user_id: resp.user_id,
|
|
|
|
token: resp.token,
|
|
|
|
email: resp.email,
|
|
|
|
name: resp.name,
|
2023-05-21 10:53:59 +00:00
|
|
|
workspace_id: resp.workspace_id,
|
2021-12-09 13:39:53 +00:00
|
|
|
}
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
2021-12-09 13:39:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl std::convert::From<SignUpResponse> for Session {
|
2023-02-13 01:29:49 +00:00
|
|
|
fn from(resp: SignUpResponse) -> Self {
|
|
|
|
Session {
|
|
|
|
user_id: resp.user_id,
|
|
|
|
token: resp.token,
|
|
|
|
email: resp.email,
|
|
|
|
name: resp.name,
|
2023-05-21 10:53:59 +00:00
|
|
|
workspace_id: resp.workspace_id,
|
2021-09-01 03:21:42 +00:00
|
|
|
}
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
2021-12-09 13:39:53 +00:00
|
|
|
}
|
2021-09-07 15:30:43 +00:00
|
|
|
|
2021-12-09 13:39:53 +00:00
|
|
|
impl Session {
|
2023-05-21 10:53:59 +00:00
|
|
|
pub fn into_part(self) -> (i64, Option<String>) {
|
2023-02-13 01:29:49 +00:00
|
|
|
(self.user_id, self.token)
|
|
|
|
}
|
2021-09-01 03:21:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl std::convert::From<String> for Session {
|
2023-02-13 01:29:49 +00:00
|
|
|
fn from(s: String) -> Self {
|
|
|
|
match serde_json::from_str(&s) {
|
|
|
|
Ok(s) => s,
|
|
|
|
Err(e) => {
|
|
|
|
tracing::error!("Deserialize string to Session failed: {:?}", e);
|
|
|
|
Session::default()
|
|
|
|
},
|
2021-09-01 03:21:42 +00:00
|
|
|
}
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
2021-09-01 03:21:42 +00:00
|
|
|
}
|
2021-11-27 11:19:41 +00:00
|
|
|
impl std::convert::From<Session> for String {
|
2023-02-13 01:29:49 +00:00
|
|
|
fn from(session: Session) -> Self {
|
|
|
|
match serde_json::to_string(&session) {
|
|
|
|
Ok(s) => s,
|
|
|
|
Err(e) => {
|
|
|
|
tracing::error!("Serialize session to string failed: {:?}", e);
|
|
|
|
"".to_string()
|
|
|
|
},
|
2021-09-01 03:21:42 +00:00
|
|
|
}
|
2023-02-13 01:29:49 +00:00
|
|
|
}
|
2021-09-01 03:21:42 +00:00
|
|
|
}
|
2023-04-04 00:41:16 +00:00
|
|
|
|
2023-05-21 10:53:59 +00:00
|
|
|
#[derive(Debug, Clone, Hash, Serialize_repr, Deserialize_repr, Eq, PartialEq)]
|
|
|
|
#[repr(u8)]
|
|
|
|
pub enum AuthType {
|
|
|
|
/// It's a local server, we do fake sign in default.
|
|
|
|
Local = 0,
|
|
|
|
/// Currently not supported. It will be supported in the future when the
|
|
|
|
/// [AppFlowy-Server](https://github.com/AppFlowy-IO/AppFlowy-Server) ready.
|
|
|
|
SelfHosted = 1,
|
|
|
|
/// It uses Supabase as the backend.
|
|
|
|
Supabase = 2,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Default for AuthType {
|
|
|
|
fn default() -> Self {
|
|
|
|
Self::Local
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<AuthTypePB> for AuthType {
|
|
|
|
fn from(pb: AuthTypePB) -> Self {
|
|
|
|
match pb {
|
|
|
|
AuthTypePB::Supabase => AuthType::Supabase,
|
|
|
|
AuthTypePB::Local => AuthType::Local,
|
|
|
|
AuthTypePB::SelfHosted => AuthType::SelfHosted,
|
|
|
|
}
|
|
|
|
}
|
2023-04-04 00:41:16 +00:00
|
|
|
}
|