feat: authsession service

This commit is contained in:
Ilia Denisov
2026-04-08 16:23:07 +02:00
committed by GitHub
parent 28f04916af
commit 86a68ed9d0
174 changed files with 31732 additions and 112 deletions
@@ -0,0 +1,58 @@
// Package listusersessions implements the trusted internal read use case for
// listing all sessions of one user.
package listusersessions
import (
"context"
"fmt"
"galaxy/authsession/internal/ports"
"galaxy/authsession/internal/service/shared"
)
// Input describes one trusted internal list-user-sessions request.
type Input struct {
// UserID identifies the owner whose sessions should be listed.
UserID string
}
// Result describes one trusted internal list-user-sessions response.
type Result struct {
// Sessions stores the frozen internal read-model DTO slice.
Sessions []shared.Session
}
// Service executes the trusted internal list-user-sessions use case.
type Service struct {
sessionStore ports.SessionStore
}
// New returns a list-user-sessions service wired to sessionStore.
func New(sessionStore ports.SessionStore) (*Service, error) {
if sessionStore == nil {
return nil, fmt.Errorf("listusersessions: session store must not be nil")
}
return &Service{sessionStore: sessionStore}, nil
}
// Execute loads all source-of-truth sessions for one user and projects them
// into the frozen internal read DTO shape.
func (s *Service) Execute(ctx context.Context, input Input) (Result, error) {
userID, err := shared.ParseUserID(input.UserID)
if err != nil {
return Result{}, err
}
records, err := s.sessionStore.ListByUserID(ctx, userID)
if err != nil {
return Result{}, shared.ServiceUnavailable(err)
}
sessions, err := shared.ToSessions(records)
if err != nil {
return Result{}, shared.InternalError(err)
}
return Result{Sessions: sessions}, nil
}
@@ -0,0 +1,73 @@
package listusersessions
import (
"context"
"github.com/stretchr/testify/require"
"testing"
"time"
"galaxy/authsession/internal/domain/common"
"galaxy/authsession/internal/domain/devicesession"
"galaxy/authsession/internal/testkit"
)
func TestExecutePreservesNewestFirstOrder(t *testing.T) {
t.Parallel()
store := &testkit.InMemorySessionStore{}
older := activeSessionFixture("device-session-1", "user-1", time.Unix(10, 0).UTC())
newer := activeSessionFixture("device-session-2", "user-1", time.Unix(20, 0).UTC())
for _, record := range []devicesession.Session{older, newer} {
if err := store.Create(context.Background(), record); err != nil {
require.Failf(t, "test failed", "Create() returned error: %v", err)
}
}
service, err := New(store)
if err != nil {
require.Failf(t, "test failed", "New() returned error: %v", err)
}
result, err := service.Execute(context.Background(), Input{UserID: "user-1"})
if err != nil {
require.Failf(t, "test failed", "Execute() returned error: %v", err)
}
if len(result.Sessions) != 2 {
require.Failf(t, "test failed", "Execute().Sessions length = %d, want 2", len(result.Sessions))
}
if result.Sessions[0].DeviceSessionID != "device-session-2" || result.Sessions[1].DeviceSessionID != "device-session-1" {
require.Failf(t, "test failed", "Execute().Sessions order = [%q %q]", result.Sessions[0].DeviceSessionID, result.Sessions[1].DeviceSessionID)
}
}
func TestExecuteReturnsEmptyForUnknownUser(t *testing.T) {
t.Parallel()
service, err := New(&testkit.InMemorySessionStore{})
if err != nil {
require.Failf(t, "test failed", "New() returned error: %v", err)
}
result, err := service.Execute(context.Background(), Input{UserID: "missing"})
if err != nil {
require.Failf(t, "test failed", "Execute() returned error: %v", err)
}
if len(result.Sessions) != 0 {
require.Failf(t, "test failed", "Execute().Sessions length = %d, want 0", len(result.Sessions))
}
}
func activeSessionFixture(deviceSessionID string, userID string, createdAt time.Time) devicesession.Session {
key, err := common.NewClientPublicKey(make([]byte, 32))
if err != nil {
panic(err)
}
return devicesession.Session{
ID: common.DeviceSessionID(deviceSessionID),
UserID: common.UserID(userID),
ClientPublicKey: key,
Status: devicesession.StatusActive,
CreatedAt: createdAt,
}
}