Try to make esi use db.go

This commit is contained in:
2025-10-10 20:00:33 +02:00
parent bae3254df8
commit 693c822c12
3 changed files with 50 additions and 29 deletions

View File

@@ -12,14 +12,11 @@ import (
"net"
"net/http"
"net/url"
"os"
"path/filepath"
"strconv"
"strings"
"sync"
"time"
"gorm.io/driver/sqlite"
"gorm.io/gorm"
)
@@ -42,7 +39,7 @@ type SSO struct {
clientID string
redirectURI string
scopes []string
db *gorm.DB
db DB
mu sync.Mutex
server *http.Server
state string
@@ -55,10 +52,16 @@ type SSO struct {
// NewSSO creates a new SSO instance
func NewSSO(clientID, redirectURI string, scopes []string) (*SSO, error) {
db, err := GetDB()
if err != nil {
return nil, err
}
s := &SSO{
clientID: clientID,
redirectURI: redirectURI,
scopes: scopes,
db: db,
}
if err := s.initDB(); err != nil {
@@ -69,20 +72,7 @@ func NewSSO(clientID, redirectURI string, scopes []string) (*SSO, error) {
}
func (s *SSO) initDB() error {
home, err := os.UserHomeDir()
if err != nil {
return err
}
dbPath := filepath.Join(home, ".industrializer", "sqlite-latest.sqlite")
db, err := gorm.Open(sqlite.Open(dbPath), &gorm.Config{})
if err != nil {
return err
}
if err := db.AutoMigrate(&Token{}); err != nil {
return err
}
s.db = db
return nil
return s.db.AutoMigrate(&Token{})
}
// GetToken returns a valid access token for the given character name
@@ -93,15 +83,16 @@ func (s *SSO) GetToken(ctx context.Context, characterName string) (string, error
defer s.mu.Unlock()
// Try to get existing token from DB
var token Token
if err := s.db.Where("character_name = ?", characterName).First(&token).Error; err != nil {
token, err := s.db.GetTokenForCharacter(characterName)
if err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
// No token exists, need to authenticate
if err := s.startAuthFlow(ctx, characterName); err != nil {
return "", err
}
// After authentication, fetch the token from DB
if err := s.db.Where("character_name = ?", characterName).First(&token).Error; err != nil {
token, err = s.db.GetTokenForCharacter(characterName)
if err != nil {
return "", err
}
} else {
@@ -111,13 +102,14 @@ func (s *SSO) GetToken(ctx context.Context, characterName string) (string, error
// Check if token needs refresh
if time.Now().After(token.ExpiresAt.Add(-60 * time.Second)) {
if err := s.refreshToken(ctx, &token); err != nil {
if err := s.refreshToken(ctx, token); err != nil {
// Refresh failed, need to re-authenticate
if err := s.startAuthFlow(ctx, characterName); err != nil {
return "", err
}
// After re-authentication, fetch the token from DB
if err := s.db.Where("character_name = ?", characterName).First(&token).Error; err != nil {
token, err = s.db.GetTokenForCharacter(characterName)
if err != nil {
return "", err
}
}
@@ -170,7 +162,7 @@ func (s *SSO) startAuthFlow(ctx context.Context, characterName string) error {
// Save token to DB
token.CharacterName = characterName
return s.db.Save(&token).Error
return s.db.SaveTokenForCharacter(token)
}
func (s *SSO) buildAuthURL(challenge, state string) string {
@@ -341,7 +333,7 @@ func (s *SSO) refreshToken(ctx context.Context, token *Token) error {
token.ExpiresAt = time.Now().Add(time.Duration(tr.ExpiresIn-30) * time.Second)
}
return s.db.Save(token).Error
return s.db.SaveTokenForCharacter(token)
}
// Utility functions