789 lines
24 KiB
Go
789 lines
24 KiB
Go
package businessvalidator
|
|
|
|
import (
|
|
"service/api/base"
|
|
"service/api/consts"
|
|
"service/api/errcode"
|
|
accountproto "service/api/proto/account/proto"
|
|
accountrelationproto "service/api/proto/accountrelation/proto"
|
|
"service/bizcommon/util"
|
|
"service/dbstruct"
|
|
"service/library/apollo"
|
|
"service/library/logger"
|
|
"time"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
goproto "google.golang.org/protobuf/proto"
|
|
)
|
|
|
|
// 鉴权校验
|
|
type AuthBusinessValidator struct {
|
|
*BusinessValidateStream
|
|
|
|
// 操作来源校验
|
|
OperMid int64 // 操作用户
|
|
|
|
account *dbstruct.Account
|
|
accountrelation *dbstruct.AccountRelation
|
|
momentCreateTimes *dbstruct.MomentCreateTimes
|
|
accountpunishment *dbstruct.AccountPunishment
|
|
zoneThirdPartner *dbstruct.ZoneThirdPartner
|
|
}
|
|
|
|
func NewAuthBusinessValidator(ctx *gin.Context, req any) *AuthBusinessValidator {
|
|
validator := &AuthBusinessValidator{
|
|
BusinessValidateStream: NewBusinessValidator(ctx, req),
|
|
}
|
|
baseRequest, _ := req.(base.BaseRequestAccessible)
|
|
validator.OperMid = baseRequest.GetBaseRequest().Mid
|
|
|
|
return validator
|
|
}
|
|
|
|
// 确认对本人操作
|
|
func (a *AuthBusinessValidator) EnsureIsOperatingHisOwn(reqMid int64) *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
if a.OperMid != reqMid {
|
|
logger.Error("Insufficient privileges: this operation is self-execute-only")
|
|
a.ec = errcode.ErrCodeSelfOnlyOperation
|
|
return
|
|
}
|
|
})
|
|
return a
|
|
}
|
|
|
|
// 确认不对本人操作
|
|
func (a *AuthBusinessValidator) EnsureIsNotOperatingHisOwn(Uid int64) *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
if a.OperMid == Uid {
|
|
logger.Error("Insufficient privileges: this operation is not permitted to operate on requestor himself")
|
|
a.ec = errcode.ErrCodeOperationToSelfIsNotPermitted
|
|
return
|
|
}
|
|
})
|
|
return a
|
|
}
|
|
|
|
// 查询账户
|
|
func (a *AuthBusinessValidator) QueryAccount(QueryFunc func(ctx *gin.Context, req *accountproto.OpListByMidReq) (*dbstruct.Account, error)) *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
listByMidReq := &accountproto.OpListByMidReq{
|
|
Mid: goproto.Int64(a.OperMid),
|
|
}
|
|
account, err := QueryFunc(a.ctx, listByMidReq)
|
|
|
|
if err != nil {
|
|
logger.Error("Query account failed, err: %v", err)
|
|
a.ec = errcode.ErrCodeAccountSrvFail
|
|
return
|
|
}
|
|
a.account = account
|
|
})
|
|
return a
|
|
}
|
|
|
|
// 查询指定账户
|
|
func (a *AuthBusinessValidator) QueryAccountForUid(QueryFunc func(ctx *gin.Context, req *accountproto.OpListByMidReq) (*dbstruct.Account, error), Uid int64) *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
listByMidReq := &accountproto.OpListByMidReq{
|
|
Mid: goproto.Int64(Uid),
|
|
}
|
|
account, err := QueryFunc(a.ctx, listByMidReq)
|
|
|
|
if err != nil {
|
|
logger.Error("Query account failed, err: %v", err)
|
|
a.ec = errcode.ErrCodeAccountSrvFail
|
|
return
|
|
}
|
|
a.account = account
|
|
})
|
|
return a
|
|
}
|
|
|
|
func (a *AuthBusinessValidator) EnsureAccountExist() *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
if a.account == nil {
|
|
logger.Error("No account entity was found")
|
|
a.ec = errcode.ErrCodeAccountNotExist
|
|
return
|
|
}
|
|
})
|
|
return a
|
|
}
|
|
|
|
// 角色鉴权
|
|
func (a *AuthBusinessValidator) EnsureIsThisRole(role int64) *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
|
|
accountRole := util.DerefInt64(a.account.Role)
|
|
if accountRole == consts.Admin {
|
|
return
|
|
}
|
|
|
|
if accountRole != role {
|
|
logger.Error("Insufficient privileges of role: %v, this operation is %v-execute-only", consts.RoleNameMap[role])
|
|
a.ec = errcode.ErrCodeRolePrivilegesNotEnough
|
|
return
|
|
}
|
|
})
|
|
return a
|
|
}
|
|
|
|
// 角色鉴权
|
|
func (a *AuthBusinessValidator) EnsureIsInTheseRoles(roles []int64) *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
|
|
accountRole := util.DerefInt64(a.account.Role)
|
|
if accountRole == consts.Admin {
|
|
return
|
|
}
|
|
|
|
pass := false
|
|
for _, role := range roles {
|
|
if accountRole == role {
|
|
pass = true
|
|
break
|
|
}
|
|
}
|
|
if !pass {
|
|
roleNames := make([]string, len(roles))
|
|
for i, role := range roles {
|
|
roleNames[i] = consts.RoleNameMap[role]
|
|
}
|
|
logger.Error("Insufficient privileges of role: %v, this operation is %v-execute-only", roleNames)
|
|
a.ec = errcode.ErrCodeRolePrivilegesNotEnough
|
|
return
|
|
}
|
|
})
|
|
return a
|
|
}
|
|
|
|
// 角色鉴权
|
|
func (a *AuthBusinessValidator) EnsureIsNotThisRole(role int64) *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
|
|
accountRole := util.DerefInt64(a.account.Role)
|
|
|
|
if accountRole == role {
|
|
logger.Error("Insufficient privileges of role: %v, this operation to %v is not permitted", consts.RoleNameMap[role])
|
|
a.ec = errcode.ErrCodeRolePrivilegesNotEnough
|
|
return
|
|
}
|
|
})
|
|
return a
|
|
}
|
|
|
|
// 角色鉴权-后台系统
|
|
func (a *AuthBusinessValidator) EnsureIsOpRole() *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
|
|
accountRole := util.DerefInt64(a.account.Role)
|
|
if accountRole == consts.Admin {
|
|
return
|
|
}
|
|
|
|
if accountRole != consts.Supportor {
|
|
logger.Error("Insufficient privileges of role: %v, this operation is %v-execute-only", consts.RoleNameMap[consts.Supportor])
|
|
a.ec = errcode.ErrCodeOpRoleOnlyOperation
|
|
return
|
|
}
|
|
})
|
|
return a
|
|
}
|
|
|
|
// 确认存在用户关系
|
|
func (a *AuthBusinessValidator) QueryAccountRelation(predicate int64, reqMid int64, QueryFunc func(ctx *gin.Context, req *accountrelationproto.OpListBySentenceReq) (*dbstruct.AccountRelation, error)) *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
accountrelation, err := QueryFunc(a.ctx, &accountrelationproto.OpListBySentenceReq{
|
|
AccountRelation: &dbstruct.AccountRelation{
|
|
SubMid: goproto.Int64(a.OperMid),
|
|
ObjMid: goproto.Int64(reqMid),
|
|
Predicate: goproto.Int64(predicate),
|
|
},
|
|
})
|
|
if err != nil {
|
|
logger.Error("Query accountrelation failed, err: %v", err)
|
|
a.ec = errcode.ErrCodeAccountRelationSrvFail
|
|
return
|
|
}
|
|
a.accountrelation = accountrelation
|
|
})
|
|
return a
|
|
}
|
|
|
|
func (a *AuthBusinessValidator) EnsureAccountRelationExist() *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
if a.accountrelation == nil {
|
|
logger.Error("No accountrelation entity was found")
|
|
a.ec = errcode.ErrCodeAccountRelationNotExist
|
|
return
|
|
}
|
|
})
|
|
return a
|
|
}
|
|
|
|
// 确认用户关系数组成对提交
|
|
func (a *AuthBusinessValidator) EnsureAccountRelationsSubmittedInPairs(accountrelations []*dbstruct.AccountRelation) *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
|
|
// 1.必须为偶数
|
|
if len(accountrelations)%2 != 0 {
|
|
logger.Error("ApiCreateAccountRelation: Business exception: Account Relations must be submitted in pairs")
|
|
a.ec = errcode.ErrCodeAccountRelationMustSubmitInPairs
|
|
return
|
|
}
|
|
})
|
|
return a
|
|
}
|
|
|
|
// 确认关系对是对本人操作
|
|
func (a *AuthBusinessValidator) EnsureAccountRelationsAreOperatedByHisOwn(accountrelations [2]*dbstruct.AccountRelation) *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
activeRelation := accountrelations[0]
|
|
activeSubMid := util.DerefInt64(activeRelation.SubMid)
|
|
|
|
if a.OperMid != activeSubMid {
|
|
logger.Error("Insufficient privileges: this operation is self-execute-only")
|
|
a.ec = errcode.ErrCodeSelfOnlyOperation
|
|
return
|
|
}
|
|
})
|
|
|
|
return a
|
|
}
|
|
|
|
// 确认关系对正确
|
|
func (a *AuthBusinessValidator) EnsureAccountRelationsAreCorrectlyMapped(accountrelations [2]*dbstruct.AccountRelation) *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
activeRelation := accountrelations[0]
|
|
passiveRelation := accountrelations[1]
|
|
activeSubMid := util.DerefInt64(activeRelation.SubMid)
|
|
activeObjMid := util.DerefInt64(activeRelation.ObjMid)
|
|
activePredicate := util.DerefInt64(activeRelation.Predicate)
|
|
passiveSubMid := util.DerefInt64(passiveRelation.SubMid)
|
|
passiveObjMid := util.DerefInt64(passiveRelation.ObjMid)
|
|
passivePredicate := util.DerefInt64(passiveRelation.Predicate)
|
|
|
|
if activeSubMid != passiveObjMid || activeObjMid != passiveSubMid || activePredicate+1 != passivePredicate {
|
|
logger.Error("ApiCreateAccountRelation: Business exception: Bad account relations pair")
|
|
a.ec = errcode.ErrCodeAccountRelationBadPair
|
|
return
|
|
}
|
|
})
|
|
|
|
return a
|
|
}
|
|
|
|
// 确认主语宾语不指向同一人
|
|
func (a *AuthBusinessValidator) EnsureAccountRelationsAreNotReflexive(accountrelations [2]*dbstruct.AccountRelation) *AuthBusinessValidator {
|
|
a.oplist = append(a.oplist, func() {
|
|
activeRelation := accountrelations[0]
|
|
activeSubMid := util.DerefInt64(activeRelation.SubMid)
|
|
activeObjMid := util.DerefInt64(activeRelation.ObjMid)
|
|
|
|
if activeSubMid == activeObjMid {
|
|
logger.Error("ApiCreateAccountRelation: Business exception: SubMid and ObjMid cannot refer to the same person")
|
|
a.ec = errcode.ErrCodeAccountRelationSameSubMidAndObjMid
|
|
return
|
|
}
|
|
})
|
|
|
|
return a
|
|
}
|
|
|
|
// 对用户关系对的校验方法组装
|
|
func (a *AuthBusinessValidator) ForAccountRelations(accountrelations []*dbstruct.AccountRelation, funcs ...func(accountrelations [2]*dbstruct.AccountRelation) *AuthBusinessValidator) *AuthBusinessValidator {
|
|
|
|
if len(accountrelations)%2 != 0 {
|
|
logger.Error("ApiCreateAccountRelation: Business exception: Account Relations must be submitted in pairs")
|
|
a.ec = errcode.ErrCodeAccountRelationMustSubmitInPairs
|
|
return a
|
|
}
|
|
|
|
for i := 0; i < len(accountrelations); i += 2 {
|
|
activeRelation := accountrelations[i]
|
|
passiveRelation := accountrelations[i+1]
|
|
for _, fun := range funcs {
|
|
a = fun([2]*dbstruct.AccountRelation{activeRelation, passiveRelation})
|
|
}
|
|
}
|
|
return a
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) QueryMomentCreateTimes(fun func(*gin.Context, int64) (*dbstruct.MomentCreateTimes, error), mid int64) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
|
|
momentCreateTimes, err := fun(l.ctx, mid)
|
|
if err != nil {
|
|
l.ec = errcode.ErrCodeMomentCreateTimesSrvFail
|
|
return
|
|
}
|
|
|
|
l.momentCreateTimes = momentCreateTimes
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureMomentCreateTimesNotReachedDailyUpperbound() *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
|
|
// 读取每日发送上限
|
|
maxDailyMomentCreateTimes, err := apollo.GetIntValue(consts.MaxDailyMomentCreateTimesKey, apollo.ApolloOpts().SetNamespace("application"))
|
|
if err != nil {
|
|
logger.Error("Apollo read failed : %v", err)
|
|
l.ec = errcode.ErrCodeApolloReadFail
|
|
return
|
|
}
|
|
|
|
logger.Info("momentCreateTimes: %v, maxDailyMomentCreateTimes : %v", l.momentCreateTimes.CreateTimes, maxDailyMomentCreateTimes)
|
|
if l.momentCreateTimes.CreateTimes >= int64(maxDailyMomentCreateTimes) {
|
|
logger.Error("the moment create times of this mid has reached its daily upperbound")
|
|
l.ec = errcode.ErrCodeMomentCreateTimesReachedDailyUpperbound
|
|
return
|
|
}
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureAmongZoneMomentsPaidItemsLessThanFreeItems(fun func(*gin.Context, int64, int64) (int64, error), mid int64, cType int64) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
|
|
if cType == consts.ZoneMomentCType_Free {
|
|
return
|
|
}
|
|
|
|
totalFreeCount, err := fun(l.ctx, mid, consts.ZoneMomentCType_Free)
|
|
if err != nil {
|
|
logger.Error("_DefaultZoneMoment OpCountByMidAndCType fail, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneMomentSrvFail
|
|
return
|
|
}
|
|
|
|
totalPaidCount, err := fun(l.ctx, mid, consts.ZoneMomentCType_Paid)
|
|
if err != nil {
|
|
logger.Error("_DefaultZoneMoment OpCountByMidAndCType fail, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneMomentSrvFail
|
|
return
|
|
}
|
|
|
|
if totalPaidCount >= totalFreeCount {
|
|
logger.Error("the paid zone moment create times of this mid has reached its upperbound")
|
|
l.ec = errcode.ErrCodePaidZoneMomentCreateTimesReachedUpperbound
|
|
return
|
|
}
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureAccountPunishmentHasNotTerminated(id int64, QueryFunc func(ctx *gin.Context, id int64) (*dbstruct.AccountPunishment, error)) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
accountpunishment, err := QueryFunc(l.ctx, id)
|
|
if err != nil {
|
|
logger.Error("Query account punishment failed, err: %v", err)
|
|
l.ec = errcode.ErrCodeAccountPunishmentSrvFail
|
|
return
|
|
}
|
|
if accountpunishment == nil {
|
|
logger.Error("No account punishment was found")
|
|
l.ec = errcode.ErrCodeAccountPunishmentNotExist
|
|
return
|
|
}
|
|
if util.DerefInt64(accountpunishment.Status) == consts.AccountPunishment_Interrupted {
|
|
l.ec = errcode.ErrCodeAccountPunishmentHasBeenInterrupted
|
|
return
|
|
}
|
|
if util.DerefInt64(accountpunishment.EndTime) <= time.Now().Unix() {
|
|
l.ec = errcode.ErrCodeAccountPunishmentHasFinished
|
|
return
|
|
}
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureAccountPunishmentMatchesRoleOfTarget(uid int64, typ int64, QueryFunc func(ctx *gin.Context, req *accountproto.OpListByMidReq) (*dbstruct.Account, error)) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
|
|
if len(consts.AccountPunishmentRoleMap[typ]) == 0 {
|
|
return
|
|
}
|
|
|
|
acct, err := QueryFunc(l.ctx, &accountproto.OpListByMidReq{
|
|
Mid: goproto.Int64(uid),
|
|
})
|
|
if err != nil {
|
|
logger.Error("Query account failed, err: %v", err)
|
|
l.ec = errcode.ErrCodeAccountSrvFail
|
|
return
|
|
}
|
|
if acct == nil {
|
|
logger.Error("No account entity was found")
|
|
l.ec = errcode.ErrCodeAccountNotExist
|
|
return
|
|
}
|
|
acctRole := util.DerefInt64(acct.Role)
|
|
pass := false
|
|
for _, role := range consts.AccountPunishmentRoleMap[typ] {
|
|
if acctRole == role {
|
|
pass = true
|
|
break
|
|
}
|
|
}
|
|
if !pass {
|
|
switch typ {
|
|
case consts.AccountPunishment_BlockFromCreatingMoment:
|
|
l.ec = errcode.ErrCodeAccountPunishmentStreamerOnly
|
|
default:
|
|
l.ec = errcode.ErrCodeAccountPunishmentSrvFail
|
|
}
|
|
}
|
|
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureSuchAccountPunishmentNotExist(uid int64, typ int64, QueryFunc func(ctx *gin.Context, mid int64, typ int64) (*dbstruct.AccountPunishment, error)) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
accountpunishment, err := QueryFunc(l.ctx, uid, typ)
|
|
if err != nil {
|
|
logger.Error("Query account punishment failed, err: %v", err)
|
|
l.ec = errcode.ErrCodeAccountPunishmentSrvFail
|
|
return
|
|
}
|
|
|
|
if accountpunishment != nil {
|
|
l.ec = errcode.ErrCodeAccountPunishmentExist
|
|
l.accountpunishment = accountpunishment
|
|
return
|
|
}
|
|
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureZoneMomentCreateTimesNotReachedDailyUpperbound(fun func(*gin.Context, int64, int64) (*dbstruct.ZoneMomentCreateTimes, error), mid int64, cType int64) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
|
|
// 读取每日发送上限
|
|
maxDailyZoneMomentCreateTimes, err := apollo.GetIntValue(consts.MaxDailyZoneMomentCreateTimesKey, apollo.ApolloOpts().SetNamespace("application"))
|
|
if err != nil {
|
|
logger.Error("Apollo read failed : %v", err)
|
|
l.ec = errcode.ErrCodeApolloReadFail
|
|
return
|
|
}
|
|
|
|
totalIncr := int64(1)
|
|
|
|
zoneMomentCreateTimes, err := fun(l.ctx, mid, totalIncr)
|
|
if err != nil {
|
|
l.ec = errcode.ErrCodeZoneMomentCreateTimesSrvFail
|
|
return
|
|
}
|
|
|
|
if zoneMomentCreateTimes.CreateTimes >= int64(maxDailyZoneMomentCreateTimes) {
|
|
logger.Error("the zone moment create times of this mid has reached its daily upperbound")
|
|
l.ec = errcode.ErrCodeZoneMomentCreateTimesReachedDailyUpperbound
|
|
return
|
|
}
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureZoneMomentImagesEnoughForEncryption(mType int64, media *dbstruct.MediaComponent, mediaVisibleRange int64) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
|
|
if mType == consts.MediaTypeVideo {
|
|
return
|
|
}
|
|
|
|
if len(media.GetImageIds()) <= int(mediaVisibleRange) {
|
|
logger.Error("images of this zone moment are not enough for encryption")
|
|
l.ec = errcode.ErrCodeZoneMomentImagesNotEnoughForEncryption
|
|
return
|
|
}
|
|
})
|
|
return l
|
|
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) QueryZoneThirdPartnerByZid(fun func(*gin.Context, int64) (*dbstruct.ZoneThirdPartner, error), zid int64) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
|
|
zoneThirdPartner, err := fun(l.ctx, zid)
|
|
if err != nil {
|
|
l.ec = errcode.ErrCodeZoneThirdPartnerSrvFail
|
|
return
|
|
}
|
|
l.zoneThirdPartner = zoneThirdPartner
|
|
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureZoneThirdPartnerExist() *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
|
|
if l.zoneThirdPartner == nil {
|
|
l.ec = errcode.ErrCodeZoneThirdPartnerNotExist
|
|
return
|
|
}
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureZoneCollaboratorCreaterIsZoneThirdPartner(createrMid int64) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
|
|
if l.zoneThirdPartner.GetThirdPartnerMid() != createrMid {
|
|
l.ec = errcode.ErrCodeZoneCollaboratorCreateIsZTPOnlyOperation
|
|
return
|
|
}
|
|
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureZoneCollaboratorIsNotZoneOwner(fun func(ctx *gin.Context, mid int64) (*dbstruct.Zone, error), collaboratorMid int64) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
|
|
zone, err := fun(l.ctx, collaboratorMid)
|
|
if err != nil {
|
|
l.ec = errcode.ErrCodeZoneSrvFail
|
|
return
|
|
}
|
|
if zone == nil {
|
|
return
|
|
}
|
|
if zone.GetId() == l.zoneThirdPartner.GetZid() {
|
|
l.ec = errcode.ErrCodeZoneCollaboratorWrongCollaborator
|
|
return
|
|
}
|
|
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureZoneThirdPartnerSharingRatioIsNotTooLarge(sharingRatio float64) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
if sharingRatio > 0.5 {
|
|
l.ec = errcode.ErrCodeZoneThirdPartnerSharingRatioTooLarge
|
|
return
|
|
}
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureZoneThirdPartnerSharingRatioIsEnough(fun func(ctx *gin.Context, zid int64) ([]*dbstruct.ZoneCollaborator, error), zid int64, ztpSharingRatio float64) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
// 保证更新后代运营分成比例可满足协作者的分成比例
|
|
zclist, err := fun(l.ctx, zid)
|
|
if err != nil {
|
|
logger.Error("_DefaultZoneCollaborator OpList fail, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneCollaboratorSrvFail
|
|
return
|
|
}
|
|
totalZcSharingRatio := float64(0)
|
|
for _, zc := range zclist {
|
|
totalZcSharingRatio += zc.GetSharingRatio()
|
|
}
|
|
if ztpSharingRatio < totalZcSharingRatio {
|
|
logger.Error("Sharing ratio of zone_third_partner is not enough to afford its collaborators, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneThirdPartnerSharingRatioNotEnough
|
|
return
|
|
}
|
|
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureZtpSharingRatioIsEnoughAfterAddingACollab(GetZtp func(*gin.Context, int64) (*dbstruct.ZoneThirdPartner, error), GetZc func(*gin.Context, int64) ([]*dbstruct.ZoneCollaborator, error),
|
|
zid int64, addedSharingRatio float64) *AuthBusinessValidator {
|
|
|
|
l.oplist = append(l.oplist, func() {
|
|
// 保证更新后代运营分成比例可满足协作者的分成比例
|
|
ztp, err := GetZtp(l.ctx, zid)
|
|
if err != nil {
|
|
logger.Error("_DefaultZoneThirdPartner OpList fail, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneThirdPartnerSrvFail
|
|
return
|
|
}
|
|
if ztp == nil {
|
|
logger.Error("No zone_third_partner entity was found, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneThirdPartnerNotExist
|
|
return
|
|
}
|
|
zclist, err := GetZc(l.ctx, zid)
|
|
if err != nil {
|
|
logger.Error("_DefaultZoneCollaborator OpList fail, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneCollaboratorSrvFail
|
|
return
|
|
}
|
|
totalZcSharingRatio := addedSharingRatio
|
|
for _, zc := range zclist {
|
|
totalZcSharingRatio += zc.GetSharingRatio()
|
|
}
|
|
if ztp.GetSharingRatio() < totalZcSharingRatio {
|
|
logger.Error("Sharing ratio of zone_third_partner is not enough to afford its collaborators, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneThirdPartnerSharingRatioNotEnough
|
|
return
|
|
}
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureZtpSharingRatioIsEnoughAfterUpdatingACollab(GetZtp func(*gin.Context, int64) (*dbstruct.ZoneThirdPartner, error), GetZc func(*gin.Context, int64) ([]*dbstruct.ZoneCollaborator, error),
|
|
zid int64, updatedCollabId int64, updatedSharingRatio float64) *AuthBusinessValidator {
|
|
|
|
l.oplist = append(l.oplist, func() {
|
|
// 保证更新后代运营分成比例可满足协作者的分成比例
|
|
ztp, err := GetZtp(l.ctx, zid)
|
|
if err != nil {
|
|
logger.Error("_DefaultZoneThirdPartner OpList fail, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneThirdPartnerSrvFail
|
|
return
|
|
}
|
|
if ztp == nil {
|
|
logger.Error("No zone_third_partner entity was found, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneThirdPartnerNotExist
|
|
return
|
|
}
|
|
zclist, err := GetZc(l.ctx, zid)
|
|
if err != nil {
|
|
logger.Error("_DefaultZoneCollaborator OpList fail, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneCollaboratorSrvFail
|
|
return
|
|
}
|
|
totalZcSharingRatio := updatedSharingRatio
|
|
for _, zc := range zclist {
|
|
if zc.GetId() != updatedCollabId {
|
|
totalZcSharingRatio += zc.GetSharingRatio()
|
|
}
|
|
}
|
|
if ztp.GetSharingRatio() < totalZcSharingRatio {
|
|
logger.Error("Sharing ratio of zone_third_partner is not enough to afford its collaborators, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneThirdPartnerSharingRatioNotEnough
|
|
return
|
|
}
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureZoneThirdPartnerIsNotZoneCreater(fun func(*gin.Context, int64) (*dbstruct.Zone, error), zid int64, ztpMid int64) *AuthBusinessValidator {
|
|
|
|
l.oplist = append(l.oplist, func() {
|
|
// 查询空间
|
|
zone, err := fun(l.ctx, zid)
|
|
if err != nil {
|
|
logger.Error("Zone GetById fail, err: %v", err)
|
|
l.ec = errcode.ErrCodeZoneSrvFail
|
|
return
|
|
}
|
|
if zone.GetMid() == ztpMid {
|
|
l.ec = errcode.ErrCodeZoneThirdPartnerWrongThirdPartner
|
|
return
|
|
}
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureMediaIsSuccessfullyUploaded(media *dbstruct.MediaComponent) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
|
|
if len(media.GetImageIds()) > 0 {
|
|
imageIdForUploadFail, err := apollo.GetIntValue(consts.ImageIdForUploadFail, apollo.ApolloOpts().SetNamespace("application"))
|
|
if err != nil {
|
|
logger.Error("Apollo read failed : %v", err)
|
|
l.ec = errcode.ErrCodeApolloReadFail
|
|
return
|
|
}
|
|
for _, imageId := range media.GetImageIds() {
|
|
if int64(imageIdForUploadFail) == imageId {
|
|
l.ec = errcode.ErrCodeMediaUploadFailPleaseCheck
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
if len(media.GetVideoIds()) > 0 {
|
|
videoIdForUploadFail, err := apollo.GetIntValue(consts.VideoIdForUploadFail, apollo.ApolloOpts().SetNamespace("application"))
|
|
if err != nil {
|
|
logger.Error("Apollo read failed : %v", err)
|
|
l.ec = errcode.ErrCodeApolloReadFail
|
|
return
|
|
}
|
|
for _, videoId := range media.GetVideoIds() {
|
|
if int64(videoIdForUploadFail) == videoId {
|
|
l.ec = errcode.ErrCodeMediaUploadFailPleaseCheck
|
|
return
|
|
}
|
|
}
|
|
}
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureStreamerAuthApprovalBasicCreated(fun func(*gin.Context, int64) (*dbstruct.StreamerAuthApprovalBasic, error), mid int64) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
streamerauthapprovalbasic, err := fun(l.ctx, mid)
|
|
if err != nil {
|
|
logger.Error("StreamerAuthApprovalBasic GetByMid fail, err: %v", err)
|
|
l.ec = errcode.ErrCodeStreamerAuthApprovalBasicSrvFail
|
|
return
|
|
}
|
|
if streamerauthapprovalbasic == nil {
|
|
l.ec = errcode.ErrCodeStreamerAuthApprovalBasicNotExist
|
|
return
|
|
}
|
|
})
|
|
return l
|
|
}
|
|
|
|
func (l *AuthBusinessValidator) EnsureStreamerAuthApprovalIsUnique(createFunc func(*gin.Context, *dbstruct.StreamerAuthApprovalVersion) error, queryFunc func(*gin.Context, int64) (*dbstruct.StreamerAuthApprovalVersion, error),
|
|
version int64, mid int64) *AuthBusinessValidator {
|
|
l.oplist = append(l.oplist, func() {
|
|
streamerauthapprovalversion, err := queryFunc(l.ctx, mid)
|
|
if err != nil {
|
|
logger.Error("StreamerAuthApprovalVersion Get fail, err: %v", err)
|
|
l.ec = errcode.ErrCodeStreamerAuthApprovalSrvFail
|
|
return
|
|
}
|
|
if streamerauthapprovalversion == nil {
|
|
err := createFunc(l.ctx, &dbstruct.StreamerAuthApprovalVersion{
|
|
Id: mid,
|
|
Version: version,
|
|
})
|
|
if err != nil {
|
|
logger.Error("StreamerAuthApprovalVersion Create fail, err: %v", err)
|
|
l.ec = errcode.ErrCodeStreamerAuthApprovalSrvFail
|
|
return
|
|
}
|
|
return
|
|
}
|
|
if streamerauthapprovalversion.Version != version {
|
|
if streamerauthapprovalversion.Version == consts.StreamerAuthApproval_OneOffVersion {
|
|
l.ec = errcode.ErrCodeStreamerAuthApprovalOneOffVersionExist
|
|
return
|
|
}
|
|
if streamerauthapprovalversion.Version == consts.StreamerAuthApproval_SeparateVersion {
|
|
l.ec = errcode.ErrCodeStreamerAuthApprovalSeparateVersionExist
|
|
return
|
|
}
|
|
}
|
|
})
|
|
return l
|
|
}
|
|
|
|
// 执行校验
|
|
func (a *AuthBusinessValidator) Validate() *AuthBusinessValidator {
|
|
a.BusinessValidateStream.Validate()
|
|
return a
|
|
}
|
|
|
|
func (a *AuthBusinessValidator) Collect() []any {
|
|
resultList := make([]any, 4)
|
|
resultList[0] = a.ec
|
|
resultList[1] = a.account
|
|
resultList[2] = a.accountrelation
|
|
resultList[3] = a.accountpunishment
|
|
return resultList
|
|
}
|