service/app/mix/service/business_validator/auth.go

789 lines
24 KiB
Go

package businessvalidator
import (
"service/api/base"
"service/api/consts"
"service/api/errcode"
accountproto "service/api/proto/account/proto"
accountrelationproto "service/api/proto/accountrelation/proto"
"service/bizcommon/util"
"service/dbstruct"
"service/library/apollo"
"service/library/logger"
"time"
"github.com/gin-gonic/gin"
goproto "google.golang.org/protobuf/proto"
)
// 鉴权校验
type AuthBusinessValidator struct {
*BusinessValidateStream
// 操作来源校验
OperMid int64 // 操作用户
account *dbstruct.Account
accountrelation *dbstruct.AccountRelation
momentCreateTimes *dbstruct.MomentCreateTimes
accountpunishment *dbstruct.AccountPunishment
zoneThirdPartner *dbstruct.ZoneThirdPartner
}
func NewAuthBusinessValidator(ctx *gin.Context, req any) *AuthBusinessValidator {
validator := &AuthBusinessValidator{
BusinessValidateStream: NewBusinessValidator(ctx, req),
}
baseRequest, _ := req.(base.BaseRequestAccessible)
validator.OperMid = baseRequest.GetBaseRequest().Mid
return validator
}
// 确认对本人操作
func (a *AuthBusinessValidator) EnsureIsOperatingHisOwn(reqMid int64) *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
if a.OperMid != reqMid {
logger.Error("Insufficient privileges: this operation is self-execute-only")
a.ec = errcode.ErrCodeSelfOnlyOperation
return
}
})
return a
}
// 确认不对本人操作
func (a *AuthBusinessValidator) EnsureIsNotOperatingHisOwn(Uid int64) *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
if a.OperMid == Uid {
logger.Error("Insufficient privileges: this operation is not permitted to operate on requestor himself")
a.ec = errcode.ErrCodeOperationToSelfIsNotPermitted
return
}
})
return a
}
// 查询账户
func (a *AuthBusinessValidator) QueryAccount(QueryFunc func(ctx *gin.Context, req *accountproto.OpListByMidReq) (*dbstruct.Account, error)) *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
listByMidReq := &accountproto.OpListByMidReq{
Mid: goproto.Int64(a.OperMid),
}
account, err := QueryFunc(a.ctx, listByMidReq)
if err != nil {
logger.Error("Query account failed, err: %v", err)
a.ec = errcode.ErrCodeAccountSrvFail
return
}
a.account = account
})
return a
}
// 查询指定账户
func (a *AuthBusinessValidator) QueryAccountForUid(QueryFunc func(ctx *gin.Context, req *accountproto.OpListByMidReq) (*dbstruct.Account, error), Uid int64) *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
listByMidReq := &accountproto.OpListByMidReq{
Mid: goproto.Int64(Uid),
}
account, err := QueryFunc(a.ctx, listByMidReq)
if err != nil {
logger.Error("Query account failed, err: %v", err)
a.ec = errcode.ErrCodeAccountSrvFail
return
}
a.account = account
})
return a
}
func (a *AuthBusinessValidator) EnsureAccountExist() *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
if a.account == nil {
logger.Error("No account entity was found")
a.ec = errcode.ErrCodeAccountNotExist
return
}
})
return a
}
// 角色鉴权
func (a *AuthBusinessValidator) EnsureIsThisRole(role int64) *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
accountRole := util.DerefInt64(a.account.Role)
if accountRole == consts.Admin {
return
}
if accountRole != role {
logger.Error("Insufficient privileges of role: %v, this operation is %v-execute-only", consts.RoleNameMap[role])
a.ec = errcode.ErrCodeRolePrivilegesNotEnough
return
}
})
return a
}
// 角色鉴权
func (a *AuthBusinessValidator) EnsureIsInTheseRoles(roles []int64) *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
accountRole := util.DerefInt64(a.account.Role)
if accountRole == consts.Admin {
return
}
pass := false
for _, role := range roles {
if accountRole == role {
pass = true
break
}
}
if !pass {
roleNames := make([]string, len(roles))
for i, role := range roles {
roleNames[i] = consts.RoleNameMap[role]
}
logger.Error("Insufficient privileges of role: %v, this operation is %v-execute-only", roleNames)
a.ec = errcode.ErrCodeRolePrivilegesNotEnough
return
}
})
return a
}
// 角色鉴权
func (a *AuthBusinessValidator) EnsureIsNotThisRole(role int64) *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
accountRole := util.DerefInt64(a.account.Role)
if accountRole == role {
logger.Error("Insufficient privileges of role: %v, this operation to %v is not permitted", consts.RoleNameMap[role])
a.ec = errcode.ErrCodeRolePrivilegesNotEnough
return
}
})
return a
}
// 角色鉴权-后台系统
func (a *AuthBusinessValidator) EnsureIsOpRole() *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
accountRole := util.DerefInt64(a.account.Role)
if accountRole == consts.Admin {
return
}
if accountRole != consts.Supportor {
logger.Error("Insufficient privileges of role: %v, this operation is %v-execute-only", consts.RoleNameMap[consts.Supportor])
a.ec = errcode.ErrCodeOpRoleOnlyOperation
return
}
})
return a
}
// 确认存在用户关系
func (a *AuthBusinessValidator) QueryAccountRelation(predicate int64, reqMid int64, QueryFunc func(ctx *gin.Context, req *accountrelationproto.OpListBySentenceReq) (*dbstruct.AccountRelation, error)) *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
accountrelation, err := QueryFunc(a.ctx, &accountrelationproto.OpListBySentenceReq{
AccountRelation: &dbstruct.AccountRelation{
SubMid: goproto.Int64(a.OperMid),
ObjMid: goproto.Int64(reqMid),
Predicate: goproto.Int64(predicate),
},
})
if err != nil {
logger.Error("Query accountrelation failed, err: %v", err)
a.ec = errcode.ErrCodeAccountRelationSrvFail
return
}
a.accountrelation = accountrelation
})
return a
}
func (a *AuthBusinessValidator) EnsureAccountRelationExist() *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
if a.accountrelation == nil {
logger.Error("No accountrelation entity was found")
a.ec = errcode.ErrCodeAccountRelationNotExist
return
}
})
return a
}
// 确认用户关系数组成对提交
func (a *AuthBusinessValidator) EnsureAccountRelationsSubmittedInPairs(accountrelations []*dbstruct.AccountRelation) *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
// 1.必须为偶数
if len(accountrelations)%2 != 0 {
logger.Error("ApiCreateAccountRelation: Business exception: Account Relations must be submitted in pairs")
a.ec = errcode.ErrCodeAccountRelationMustSubmitInPairs
return
}
})
return a
}
// 确认关系对是对本人操作
func (a *AuthBusinessValidator) EnsureAccountRelationsAreOperatedByHisOwn(accountrelations [2]*dbstruct.AccountRelation) *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
activeRelation := accountrelations[0]
activeSubMid := util.DerefInt64(activeRelation.SubMid)
if a.OperMid != activeSubMid {
logger.Error("Insufficient privileges: this operation is self-execute-only")
a.ec = errcode.ErrCodeSelfOnlyOperation
return
}
})
return a
}
// 确认关系对正确
func (a *AuthBusinessValidator) EnsureAccountRelationsAreCorrectlyMapped(accountrelations [2]*dbstruct.AccountRelation) *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
activeRelation := accountrelations[0]
passiveRelation := accountrelations[1]
activeSubMid := util.DerefInt64(activeRelation.SubMid)
activeObjMid := util.DerefInt64(activeRelation.ObjMid)
activePredicate := util.DerefInt64(activeRelation.Predicate)
passiveSubMid := util.DerefInt64(passiveRelation.SubMid)
passiveObjMid := util.DerefInt64(passiveRelation.ObjMid)
passivePredicate := util.DerefInt64(passiveRelation.Predicate)
if activeSubMid != passiveObjMid || activeObjMid != passiveSubMid || activePredicate+1 != passivePredicate {
logger.Error("ApiCreateAccountRelation: Business exception: Bad account relations pair")
a.ec = errcode.ErrCodeAccountRelationBadPair
return
}
})
return a
}
// 确认主语宾语不指向同一人
func (a *AuthBusinessValidator) EnsureAccountRelationsAreNotReflexive(accountrelations [2]*dbstruct.AccountRelation) *AuthBusinessValidator {
a.oplist = append(a.oplist, func() {
activeRelation := accountrelations[0]
activeSubMid := util.DerefInt64(activeRelation.SubMid)
activeObjMid := util.DerefInt64(activeRelation.ObjMid)
if activeSubMid == activeObjMid {
logger.Error("ApiCreateAccountRelation: Business exception: SubMid and ObjMid cannot refer to the same person")
a.ec = errcode.ErrCodeAccountRelationSameSubMidAndObjMid
return
}
})
return a
}
// 对用户关系对的校验方法组装
func (a *AuthBusinessValidator) ForAccountRelations(accountrelations []*dbstruct.AccountRelation, funcs ...func(accountrelations [2]*dbstruct.AccountRelation) *AuthBusinessValidator) *AuthBusinessValidator {
if len(accountrelations)%2 != 0 {
logger.Error("ApiCreateAccountRelation: Business exception: Account Relations must be submitted in pairs")
a.ec = errcode.ErrCodeAccountRelationMustSubmitInPairs
return a
}
for i := 0; i < len(accountrelations); i += 2 {
activeRelation := accountrelations[i]
passiveRelation := accountrelations[i+1]
for _, fun := range funcs {
a = fun([2]*dbstruct.AccountRelation{activeRelation, passiveRelation})
}
}
return a
}
func (l *AuthBusinessValidator) QueryMomentCreateTimes(fun func(*gin.Context, int64) (*dbstruct.MomentCreateTimes, error), mid int64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
momentCreateTimes, err := fun(l.ctx, mid)
if err != nil {
l.ec = errcode.ErrCodeMomentCreateTimesSrvFail
return
}
l.momentCreateTimes = momentCreateTimes
})
return l
}
func (l *AuthBusinessValidator) EnsureMomentCreateTimesNotReachedDailyUpperbound() *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
// 读取每日发送上限
maxDailyMomentCreateTimes, err := apollo.GetIntValue(consts.MaxDailyMomentCreateTimesKey, apollo.ApolloOpts().SetNamespace("application"))
if err != nil {
logger.Error("Apollo read failed : %v", err)
l.ec = errcode.ErrCodeApolloReadFail
return
}
logger.Info("momentCreateTimes: %v, maxDailyMomentCreateTimes : %v", l.momentCreateTimes.CreateTimes, maxDailyMomentCreateTimes)
if l.momentCreateTimes.CreateTimes >= int64(maxDailyMomentCreateTimes) {
logger.Error("the moment create times of this mid has reached its daily upperbound")
l.ec = errcode.ErrCodeMomentCreateTimesReachedDailyUpperbound
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureAmongZoneMomentsPaidItemsLessThanFreeItems(fun func(*gin.Context, int64, int64) (int64, error), mid int64, cType int64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
if cType == consts.ZoneMomentCType_Free {
return
}
totalFreeCount, err := fun(l.ctx, mid, consts.ZoneMomentCType_Free)
if err != nil {
logger.Error("_DefaultZoneMoment OpCountByMidAndCType fail, err: %v", err)
l.ec = errcode.ErrCodeZoneMomentSrvFail
return
}
totalPaidCount, err := fun(l.ctx, mid, consts.ZoneMomentCType_Paid)
if err != nil {
logger.Error("_DefaultZoneMoment OpCountByMidAndCType fail, err: %v", err)
l.ec = errcode.ErrCodeZoneMomentSrvFail
return
}
if totalPaidCount >= totalFreeCount {
logger.Error("the paid zone moment create times of this mid has reached its upperbound")
l.ec = errcode.ErrCodePaidZoneMomentCreateTimesReachedUpperbound
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureAccountPunishmentHasNotTerminated(id int64, QueryFunc func(ctx *gin.Context, id int64) (*dbstruct.AccountPunishment, error)) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
accountpunishment, err := QueryFunc(l.ctx, id)
if err != nil {
logger.Error("Query account punishment failed, err: %v", err)
l.ec = errcode.ErrCodeAccountPunishmentSrvFail
return
}
if accountpunishment == nil {
logger.Error("No account punishment was found")
l.ec = errcode.ErrCodeAccountPunishmentNotExist
return
}
if util.DerefInt64(accountpunishment.Status) == consts.AccountPunishment_Interrupted {
l.ec = errcode.ErrCodeAccountPunishmentHasBeenInterrupted
return
}
if util.DerefInt64(accountpunishment.EndTime) <= time.Now().Unix() {
l.ec = errcode.ErrCodeAccountPunishmentHasFinished
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureAccountPunishmentMatchesRoleOfTarget(uid int64, typ int64, QueryFunc func(ctx *gin.Context, req *accountproto.OpListByMidReq) (*dbstruct.Account, error)) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
if len(consts.AccountPunishmentRoleMap[typ]) == 0 {
return
}
acct, err := QueryFunc(l.ctx, &accountproto.OpListByMidReq{
Mid: goproto.Int64(uid),
})
if err != nil {
logger.Error("Query account failed, err: %v", err)
l.ec = errcode.ErrCodeAccountSrvFail
return
}
if acct == nil {
logger.Error("No account entity was found")
l.ec = errcode.ErrCodeAccountNotExist
return
}
acctRole := util.DerefInt64(acct.Role)
pass := false
for _, role := range consts.AccountPunishmentRoleMap[typ] {
if acctRole == role {
pass = true
break
}
}
if !pass {
switch typ {
case consts.AccountPunishment_BlockFromCreatingMoment:
l.ec = errcode.ErrCodeAccountPunishmentStreamerOnly
default:
l.ec = errcode.ErrCodeAccountPunishmentSrvFail
}
}
})
return l
}
func (l *AuthBusinessValidator) EnsureSuchAccountPunishmentNotExist(uid int64, typ int64, QueryFunc func(ctx *gin.Context, mid int64, typ int64) (*dbstruct.AccountPunishment, error)) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
accountpunishment, err := QueryFunc(l.ctx, uid, typ)
if err != nil {
logger.Error("Query account punishment failed, err: %v", err)
l.ec = errcode.ErrCodeAccountPunishmentSrvFail
return
}
if accountpunishment != nil {
l.ec = errcode.ErrCodeAccountPunishmentExist
l.accountpunishment = accountpunishment
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureZoneMomentCreateTimesNotReachedDailyUpperbound(fun func(*gin.Context, int64, int64) (*dbstruct.ZoneMomentCreateTimes, error), mid int64, cType int64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
// 读取每日发送上限
maxDailyZoneMomentCreateTimes, err := apollo.GetIntValue(consts.MaxDailyZoneMomentCreateTimesKey, apollo.ApolloOpts().SetNamespace("application"))
if err != nil {
logger.Error("Apollo read failed : %v", err)
l.ec = errcode.ErrCodeApolloReadFail
return
}
totalIncr := int64(1)
zoneMomentCreateTimes, err := fun(l.ctx, mid, totalIncr)
if err != nil {
l.ec = errcode.ErrCodeZoneMomentCreateTimesSrvFail
return
}
if zoneMomentCreateTimes.CreateTimes >= int64(maxDailyZoneMomentCreateTimes) {
logger.Error("the zone moment create times of this mid has reached its daily upperbound")
l.ec = errcode.ErrCodeZoneMomentCreateTimesReachedDailyUpperbound
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureZoneMomentImagesEnoughForEncryption(mType int64, media *dbstruct.MediaComponent, mediaVisibleRange int64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
if mType == consts.MediaTypeVideo {
return
}
if len(media.GetImageIds()) <= int(mediaVisibleRange) {
logger.Error("images of this zone moment are not enough for encryption")
l.ec = errcode.ErrCodeZoneMomentImagesNotEnoughForEncryption
return
}
})
return l
}
func (l *AuthBusinessValidator) QueryZoneThirdPartnerByZid(fun func(*gin.Context, int64) (*dbstruct.ZoneThirdPartner, error), zid int64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
zoneThirdPartner, err := fun(l.ctx, zid)
if err != nil {
l.ec = errcode.ErrCodeZoneThirdPartnerSrvFail
return
}
l.zoneThirdPartner = zoneThirdPartner
})
return l
}
func (l *AuthBusinessValidator) EnsureZoneThirdPartnerExist() *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
if l.zoneThirdPartner == nil {
l.ec = errcode.ErrCodeZoneThirdPartnerNotExist
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureZoneCollaboratorCreaterIsZoneThirdPartner(createrMid int64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
if l.zoneThirdPartner.GetThirdPartnerMid() != createrMid {
l.ec = errcode.ErrCodeZoneCollaboratorCreateIsZTPOnlyOperation
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureZoneCollaboratorIsNotZoneOwner(fun func(ctx *gin.Context, mid int64) (*dbstruct.Zone, error), collaboratorMid int64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
zone, err := fun(l.ctx, collaboratorMid)
if err != nil {
l.ec = errcode.ErrCodeZoneSrvFail
return
}
if zone == nil {
return
}
if zone.GetId() == l.zoneThirdPartner.GetZid() {
l.ec = errcode.ErrCodeZoneCollaboratorWrongCollaborator
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureZoneThirdPartnerSharingRatioIsNotTooLarge(sharingRatio float64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
if sharingRatio > 0.5 {
l.ec = errcode.ErrCodeZoneThirdPartnerSharingRatioTooLarge
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureZoneThirdPartnerSharingRatioIsEnough(fun func(ctx *gin.Context, zid int64) ([]*dbstruct.ZoneCollaborator, error), zid int64, ztpSharingRatio float64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
// 保证更新后代运营分成比例可满足协作者的分成比例
zclist, err := fun(l.ctx, zid)
if err != nil {
logger.Error("_DefaultZoneCollaborator OpList fail, err: %v", err)
l.ec = errcode.ErrCodeZoneCollaboratorSrvFail
return
}
totalZcSharingRatio := float64(0)
for _, zc := range zclist {
totalZcSharingRatio += zc.GetSharingRatio()
}
if ztpSharingRatio < totalZcSharingRatio {
logger.Error("Sharing ratio of zone_third_partner is not enough to afford its collaborators, err: %v", err)
l.ec = errcode.ErrCodeZoneThirdPartnerSharingRatioNotEnough
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureZtpSharingRatioIsEnoughAfterAddingACollab(GetZtp func(*gin.Context, int64) (*dbstruct.ZoneThirdPartner, error), GetZc func(*gin.Context, int64) ([]*dbstruct.ZoneCollaborator, error),
zid int64, addedSharingRatio float64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
// 保证更新后代运营分成比例可满足协作者的分成比例
ztp, err := GetZtp(l.ctx, zid)
if err != nil {
logger.Error("_DefaultZoneThirdPartner OpList fail, err: %v", err)
l.ec = errcode.ErrCodeZoneThirdPartnerSrvFail
return
}
if ztp == nil {
logger.Error("No zone_third_partner entity was found, err: %v", err)
l.ec = errcode.ErrCodeZoneThirdPartnerNotExist
return
}
zclist, err := GetZc(l.ctx, zid)
if err != nil {
logger.Error("_DefaultZoneCollaborator OpList fail, err: %v", err)
l.ec = errcode.ErrCodeZoneCollaboratorSrvFail
return
}
totalZcSharingRatio := addedSharingRatio
for _, zc := range zclist {
totalZcSharingRatio += zc.GetSharingRatio()
}
if ztp.GetSharingRatio() < totalZcSharingRatio {
logger.Error("Sharing ratio of zone_third_partner is not enough to afford its collaborators, err: %v", err)
l.ec = errcode.ErrCodeZoneThirdPartnerSharingRatioNotEnough
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureZtpSharingRatioIsEnoughAfterUpdatingACollab(GetZtp func(*gin.Context, int64) (*dbstruct.ZoneThirdPartner, error), GetZc func(*gin.Context, int64) ([]*dbstruct.ZoneCollaborator, error),
zid int64, updatedCollabId int64, updatedSharingRatio float64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
// 保证更新后代运营分成比例可满足协作者的分成比例
ztp, err := GetZtp(l.ctx, zid)
if err != nil {
logger.Error("_DefaultZoneThirdPartner OpList fail, err: %v", err)
l.ec = errcode.ErrCodeZoneThirdPartnerSrvFail
return
}
if ztp == nil {
logger.Error("No zone_third_partner entity was found, err: %v", err)
l.ec = errcode.ErrCodeZoneThirdPartnerNotExist
return
}
zclist, err := GetZc(l.ctx, zid)
if err != nil {
logger.Error("_DefaultZoneCollaborator OpList fail, err: %v", err)
l.ec = errcode.ErrCodeZoneCollaboratorSrvFail
return
}
totalZcSharingRatio := updatedSharingRatio
for _, zc := range zclist {
if zc.GetId() != updatedCollabId {
totalZcSharingRatio += zc.GetSharingRatio()
}
}
if ztp.GetSharingRatio() < totalZcSharingRatio {
logger.Error("Sharing ratio of zone_third_partner is not enough to afford its collaborators, err: %v", err)
l.ec = errcode.ErrCodeZoneThirdPartnerSharingRatioNotEnough
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureZoneThirdPartnerIsNotZoneCreater(fun func(*gin.Context, int64) (*dbstruct.Zone, error), zid int64, ztpMid int64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
// 查询空间
zone, err := fun(l.ctx, zid)
if err != nil {
logger.Error("Zone GetById fail, err: %v", err)
l.ec = errcode.ErrCodeZoneSrvFail
return
}
if zone.GetMid() == ztpMid {
l.ec = errcode.ErrCodeZoneThirdPartnerWrongThirdPartner
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureMediaIsSuccessfullyUploaded(media *dbstruct.MediaComponent) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
if len(media.GetImageIds()) > 0 {
imageIdForUploadFail, err := apollo.GetIntValue(consts.ImageIdForUploadFail, apollo.ApolloOpts().SetNamespace("application"))
if err != nil {
logger.Error("Apollo read failed : %v", err)
l.ec = errcode.ErrCodeApolloReadFail
return
}
for _, imageId := range media.GetImageIds() {
if int64(imageIdForUploadFail) == imageId {
l.ec = errcode.ErrCodeMediaUploadFailPleaseCheck
return
}
}
}
if len(media.GetVideoIds()) > 0 {
videoIdForUploadFail, err := apollo.GetIntValue(consts.VideoIdForUploadFail, apollo.ApolloOpts().SetNamespace("application"))
if err != nil {
logger.Error("Apollo read failed : %v", err)
l.ec = errcode.ErrCodeApolloReadFail
return
}
for _, videoId := range media.GetVideoIds() {
if int64(videoIdForUploadFail) == videoId {
l.ec = errcode.ErrCodeMediaUploadFailPleaseCheck
return
}
}
}
})
return l
}
func (l *AuthBusinessValidator) EnsureStreamerAuthApprovalBasicCreated(fun func(*gin.Context, int64) (*dbstruct.StreamerAuthApprovalBasic, error), mid int64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
streamerauthapprovalbasic, err := fun(l.ctx, mid)
if err != nil {
logger.Error("StreamerAuthApprovalBasic GetByMid fail, err: %v", err)
l.ec = errcode.ErrCodeStreamerAuthApprovalBasicSrvFail
return
}
if streamerauthapprovalbasic == nil {
l.ec = errcode.ErrCodeStreamerAuthApprovalBasicNotExist
return
}
})
return l
}
func (l *AuthBusinessValidator) EnsureStreamerAuthApprovalIsUnique(createFunc func(*gin.Context, *dbstruct.StreamerAuthApprovalVersion) error, queryFunc func(*gin.Context, int64) (*dbstruct.StreamerAuthApprovalVersion, error),
version int64, mid int64) *AuthBusinessValidator {
l.oplist = append(l.oplist, func() {
streamerauthapprovalversion, err := queryFunc(l.ctx, mid)
if err != nil {
logger.Error("StreamerAuthApprovalVersion Get fail, err: %v", err)
l.ec = errcode.ErrCodeStreamerAuthApprovalSrvFail
return
}
if streamerauthapprovalversion == nil {
err := createFunc(l.ctx, &dbstruct.StreamerAuthApprovalVersion{
Id: mid,
Version: version,
})
if err != nil {
logger.Error("StreamerAuthApprovalVersion Create fail, err: %v", err)
l.ec = errcode.ErrCodeStreamerAuthApprovalSrvFail
return
}
return
}
if streamerauthapprovalversion.Version != version {
if streamerauthapprovalversion.Version == consts.StreamerAuthApproval_OneOffVersion {
l.ec = errcode.ErrCodeStreamerAuthApprovalOneOffVersionExist
return
}
if streamerauthapprovalversion.Version == consts.StreamerAuthApproval_SeparateVersion {
l.ec = errcode.ErrCodeStreamerAuthApprovalSeparateVersionExist
return
}
}
})
return l
}
// 执行校验
func (a *AuthBusinessValidator) Validate() *AuthBusinessValidator {
a.BusinessValidateStream.Validate()
return a
}
func (a *AuthBusinessValidator) Collect() []any {
resultList := make([]any, 4)
resultList[0] = a.ec
resultList[1] = a.account
resultList[2] = a.accountrelation
resultList[3] = a.accountpunishment
return resultList
}