- Add VerifyPassword RPC to Identity Service - Added to proto file and generated code - Implemented in Identity Service gRPC server - Added to Identity Service client interface and gRPC client - Complete RefreshToken implementation - Store refresh tokens in database using RefreshToken entity - Validate refresh tokens with expiration checking - Revoke refresh tokens on logout and token rotation - Integrate Authz Service for role retrieval - Added AuthzServiceClient to Auth Service - Get user roles during login and token refresh - Gracefully handle Authz Service failures - Require JWT secret in configuration - Removed default secret fallback - Service fails to start if JWT secret is not configured - Fix Consul health checks for Docker - Services now register with Docker service names (e.g., audit-service) - Allows Consul (in Docker) to reach services via Docker DNS - Health checks use gRPC service names instead of localhost This completes all TODOs in auth_service_fx.go and fixes the Consul health check failures in Docker environments.
137 lines
4.4 KiB
Go
137 lines
4.4 KiB
Go
// Code generated by ent, DO NOT EDIT.
|
|
|
|
package ent
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
"time"
|
|
|
|
"entgo.io/ent"
|
|
"entgo.io/ent/dialect/sql"
|
|
"git.dcentral.systems/toolz/goplt/internal/ent/refreshtoken"
|
|
)
|
|
|
|
// RefreshToken is the model entity for the RefreshToken schema.
|
|
type RefreshToken struct {
|
|
config `json:"-"`
|
|
// ID of the ent.
|
|
ID string `json:"id,omitempty"`
|
|
// ID of the user who owns this refresh token
|
|
UserID string `json:"user_id,omitempty"`
|
|
// SHA256 hash of the refresh token
|
|
TokenHash string `json:"-"`
|
|
// When the refresh token expires
|
|
ExpiresAt time.Time `json:"expires_at,omitempty"`
|
|
// CreatedAt holds the value of the "created_at" field.
|
|
CreatedAt time.Time `json:"created_at,omitempty"`
|
|
selectValues sql.SelectValues
|
|
}
|
|
|
|
// scanValues returns the types for scanning values from sql.Rows.
|
|
func (*RefreshToken) scanValues(columns []string) ([]any, error) {
|
|
values := make([]any, len(columns))
|
|
for i := range columns {
|
|
switch columns[i] {
|
|
case refreshtoken.FieldID, refreshtoken.FieldUserID, refreshtoken.FieldTokenHash:
|
|
values[i] = new(sql.NullString)
|
|
case refreshtoken.FieldExpiresAt, refreshtoken.FieldCreatedAt:
|
|
values[i] = new(sql.NullTime)
|
|
default:
|
|
values[i] = new(sql.UnknownType)
|
|
}
|
|
}
|
|
return values, nil
|
|
}
|
|
|
|
// assignValues assigns the values that were returned from sql.Rows (after scanning)
|
|
// to the RefreshToken fields.
|
|
func (_m *RefreshToken) assignValues(columns []string, values []any) error {
|
|
if m, n := len(values), len(columns); m < n {
|
|
return fmt.Errorf("mismatch number of scan values: %d != %d", m, n)
|
|
}
|
|
for i := range columns {
|
|
switch columns[i] {
|
|
case refreshtoken.FieldID:
|
|
if value, ok := values[i].(*sql.NullString); !ok {
|
|
return fmt.Errorf("unexpected type %T for field id", values[i])
|
|
} else if value.Valid {
|
|
_m.ID = value.String
|
|
}
|
|
case refreshtoken.FieldUserID:
|
|
if value, ok := values[i].(*sql.NullString); !ok {
|
|
return fmt.Errorf("unexpected type %T for field user_id", values[i])
|
|
} else if value.Valid {
|
|
_m.UserID = value.String
|
|
}
|
|
case refreshtoken.FieldTokenHash:
|
|
if value, ok := values[i].(*sql.NullString); !ok {
|
|
return fmt.Errorf("unexpected type %T for field token_hash", values[i])
|
|
} else if value.Valid {
|
|
_m.TokenHash = value.String
|
|
}
|
|
case refreshtoken.FieldExpiresAt:
|
|
if value, ok := values[i].(*sql.NullTime); !ok {
|
|
return fmt.Errorf("unexpected type %T for field expires_at", values[i])
|
|
} else if value.Valid {
|
|
_m.ExpiresAt = value.Time
|
|
}
|
|
case refreshtoken.FieldCreatedAt:
|
|
if value, ok := values[i].(*sql.NullTime); !ok {
|
|
return fmt.Errorf("unexpected type %T for field created_at", values[i])
|
|
} else if value.Valid {
|
|
_m.CreatedAt = value.Time
|
|
}
|
|
default:
|
|
_m.selectValues.Set(columns[i], values[i])
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Value returns the ent.Value that was dynamically selected and assigned to the RefreshToken.
|
|
// This includes values selected through modifiers, order, etc.
|
|
func (_m *RefreshToken) Value(name string) (ent.Value, error) {
|
|
return _m.selectValues.Get(name)
|
|
}
|
|
|
|
// Update returns a builder for updating this RefreshToken.
|
|
// Note that you need to call RefreshToken.Unwrap() before calling this method if this RefreshToken
|
|
// was returned from a transaction, and the transaction was committed or rolled back.
|
|
func (_m *RefreshToken) Update() *RefreshTokenUpdateOne {
|
|
return NewRefreshTokenClient(_m.config).UpdateOne(_m)
|
|
}
|
|
|
|
// Unwrap unwraps the RefreshToken entity that was returned from a transaction after it was closed,
|
|
// so that all future queries will be executed through the driver which created the transaction.
|
|
func (_m *RefreshToken) Unwrap() *RefreshToken {
|
|
_tx, ok := _m.config.driver.(*txDriver)
|
|
if !ok {
|
|
panic("ent: RefreshToken is not a transactional entity")
|
|
}
|
|
_m.config.driver = _tx.drv
|
|
return _m
|
|
}
|
|
|
|
// String implements the fmt.Stringer.
|
|
func (_m *RefreshToken) String() string {
|
|
var builder strings.Builder
|
|
builder.WriteString("RefreshToken(")
|
|
builder.WriteString(fmt.Sprintf("id=%v, ", _m.ID))
|
|
builder.WriteString("user_id=")
|
|
builder.WriteString(_m.UserID)
|
|
builder.WriteString(", ")
|
|
builder.WriteString("token_hash=<sensitive>")
|
|
builder.WriteString(", ")
|
|
builder.WriteString("expires_at=")
|
|
builder.WriteString(_m.ExpiresAt.Format(time.ANSIC))
|
|
builder.WriteString(", ")
|
|
builder.WriteString("created_at=")
|
|
builder.WriteString(_m.CreatedAt.Format(time.ANSIC))
|
|
builder.WriteByte(')')
|
|
return builder.String()
|
|
}
|
|
|
|
// RefreshTokens is a parsable slice of RefreshToken.
|
|
type RefreshTokens []*RefreshToken
|