alps/session.go

197 lines
3.5 KiB
Go
Raw Normal View History

2019-12-02 16:24:19 +00:00
package koushin
import (
"crypto/rand"
"encoding/base64"
"errors"
"fmt"
2019-12-02 16:40:53 +00:00
"sync"
"time"
2019-12-02 16:24:19 +00:00
imapclient "github.com/emersion/go-imap/client"
)
// TODO: make this configurable
const sessionDuration = 30 * time.Minute
2019-12-02 16:24:19 +00:00
func generateToken() (string, error) {
b := make([]byte, 32)
_, err := rand.Read(b)
if err != nil {
return "", err
}
return base64.URLEncoding.EncodeToString(b), nil
}
var ErrSessionExpired = errors.New("session expired")
type AuthError struct {
cause error
}
func (err AuthError) Error() string {
return fmt.Sprintf("authentication failed: %v", err.cause)
}
type Session struct {
Token string
manager *SessionManager
username, password string
closed chan struct{}
pings chan struct{}
timer *time.Timer
locker sync.Mutex
imapConn *imapclient.Client // protected by locker, can be nil
}
func (s *Session) Ping() {
s.pings <- struct{}{}
}
func (s *Session) Do(f func(*imapclient.Client) error) error {
s.locker.Lock()
defer s.locker.Unlock()
if s.imapConn == nil {
var err error
s.imapConn, err = s.manager.connect(s.username, s.password)
if err != nil {
s.Close()
return fmt.Errorf("failed to re-connect to IMAP server: %v", err)
}
}
return f(s.imapConn)
}
func (s *Session) Close() {
select {
case <-s.closed:
// This space is intentionally left blank
default:
close(s.closed)
}
}
2019-12-09 17:16:27 +00:00
type SessionManager struct {
newIMAPClient func() (*imapclient.Client, error)
locker sync.Mutex
sessions map[string]*Session // protected by locker
2019-12-02 16:24:19 +00:00
}
func NewSessionManager(newIMAPClient func() (*imapclient.Client, error)) *SessionManager {
2019-12-09 17:16:27 +00:00
return &SessionManager{
sessions: make(map[string]*Session),
newIMAPClient: newIMAPClient,
2019-12-02 16:24:19 +00:00
}
}
func (sm *SessionManager) connect(username, password string) (*imapclient.Client, error) {
c, err := sm.newIMAPClient()
if err != nil {
return nil, err
}
if err := c.Login(username, password); err != nil {
c.Logout()
return nil, AuthError{err}
}
return c, nil
}
2019-12-09 17:16:27 +00:00
func (sm *SessionManager) Get(token string) (*Session, error) {
sm.locker.Lock()
defer sm.locker.Unlock()
2019-12-02 16:40:53 +00:00
2019-12-09 17:16:27 +00:00
session, ok := sm.sessions[token]
2019-12-02 16:24:19 +00:00
if !ok {
return nil, ErrSessionExpired
}
return session, nil
2019-12-02 16:24:19 +00:00
}
func (sm *SessionManager) Put(username, password string) (*Session, error) {
c, err := sm.connect(username, password)
if err != nil {
return nil, err
}
2019-12-09 17:16:27 +00:00
sm.locker.Lock()
defer sm.locker.Unlock()
2019-12-02 16:40:53 +00:00
var token string
2019-12-02 16:24:19 +00:00
for {
var err error
token, err = generateToken()
if err != nil {
c.Logout()
return nil, err
2019-12-02 16:24:19 +00:00
}
2019-12-09 17:16:27 +00:00
if _, ok := sm.sessions[token]; !ok {
2019-12-02 16:24:19 +00:00
break
}
}
s := &Session{
Token: token,
manager: sm,
closed: make(chan struct{}),
pings: make(chan struct{}, 5),
imapConn: c,
username: username,
password: password,
}
sm.sessions[token] = s
2019-12-02 16:36:43 +00:00
go func() {
timer := time.NewTimer(sessionDuration)
alive := true
for alive {
var loggedOut <-chan struct{}
s.locker.Lock()
if s.imapConn != nil {
loggedOut = s.imapConn.LoggedOut()
}
s.locker.Unlock()
select {
case <-loggedOut:
s.locker.Lock()
s.imapConn = nil
s.locker.Unlock()
case <-s.pings:
if !timer.Stop() {
<-timer.C
}
timer.Reset(sessionDuration)
case <-timer.C:
alive = false
case <-s.closed:
alive = false
}
}
if !timer.Stop() {
<-timer.C
}
s.locker.Lock()
if s.imapConn != nil {
s.imapConn.Logout()
}
s.locker.Unlock()
2019-12-02 16:40:53 +00:00
2019-12-09 17:16:27 +00:00
sm.locker.Lock()
delete(sm.sessions, token)
sm.locker.Unlock()
2019-12-02 16:36:43 +00:00
}()
return s, nil
2019-12-02 16:24:19 +00:00
}