mirror of
				https://github.com/openimsdk/open-im-server.git
				synced 2025-10-31 16:32:12 +08:00 
			
		
		
		
	* Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * feat: add code lint * feat: add code lint * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * Script Refactoring * feat: code format * Script Refactoring * Script Refactoring * Script Refactoring * Adjust MinIO configuration settings * Adjust configuration settings * Adjust configuration settings * refactor: config change. * refactor: webhooks update. * Adjust configuration settings * refactor: webhooks update. * Adjust configuration settings * Adjust configuration settings * Adjust configuration settings * feat: s3 api addr * refactor: webhooks update. * Adjust configuration settings * Adjust configuration settings * Adjust configuration settings * Adjust configuration settings * Adjust configuration settings * Adjust configuration settings * Adjust configuration settings * refactor: webhooks update. * refactor: kafka update. * Simplify the Docker Compose configuration, remove unnecessary environment variables, and eliminate the gateway service. * refactor: kafka update. * refactor: kafka update. * Simplify the Docker Compose configuration, remove unnecessary environment variables, and eliminate the gateway service. * Simplify the Docker Compose configuration, remove unnecessary environment variables, and eliminate the gateway service. * Windows can compile and run. * Windows can compile and run. * refactor: kafka update. * feat: msg cache split * refactor: webhooks update * refactor: webhooks update * refactor: friends update * refactor: group update * refactor: third update * refactor: api update * refactor: crontab update * refactor: msggateway update * mage * mage * refactor: all module update. * check * refactor: all module update. * load config * load config * load config * load config * refactor: all module update. * refactor: all module update. * refactor: all module update. * refactor: all module update. * refactor: all module update. * Optimize Docker configuration and script. * refactor: all module update. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * refactor: all module update. * Optimize Docker configuration and script. * refactor: all module update. * refactor: all module update. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * update tools * update tools * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * update protocol * Optimize Docker configuration and script. * Optimize Docker configuration and script. * refactor: all module update. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * Optimize Docker configuration and script. * refactor: api remove token auth by redis directly. * Code Refactoring * refactor: websocket auth change to call rpc of auth. * refactor: kick online user and remove token change to call auth rpc. * refactor: kick online user and remove token change to call auth rpc. * refactor: remove msggateway redis. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor webhook * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor webhook * refactor: cmd update. * refactor: cmd update. * fix: runtime: goroutine stack exceeds * refactor: cmd update. * refactor notification * refactor notification * refactor * refactor: cmd update. * refactor: cmd update. * refactor * refactor * refactor * protojson * protojson * protojson * go mod * wrapperspb * refactor: cmd update. * refactor: cmd update. * refactor: cmd update. * refactor: context update. * refactor: websocket update info. * refactor: websocket update info. * refactor: websocket update info. * refactor: websocket update info. * refactor: api name change. * refactor: debug info. * refactor: debug info. * refactor: debug info. * fix: update file * refactor * refactor * refactor: debug info. * refactor: debug info. * refactor: debug info. * refactor: debug info. * refactor: debug info. * refactor: debug info. * fix: callback update. * fix: callback update. * refactor * fix: update message. * fix: msg cache timeout. * refactor * refactor * fix: push update. * fix: push update. * fix: push update. * fix: push update. * fix: push update. * fix: push update. * fix: push update. * fix: websocket handle error remove when upgrade error. --------- Co-authored-by: skiffer-git <44203734@qq.com> Co-authored-by: Xinwei Xiong (cubxxw) <3293172751nss@gmail.com> Co-authored-by: withchao <993506633@qq.com>
		
			
				
	
	
		
			467 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			467 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright © 2023 OpenIM. All rights reserved.
 | |
| //
 | |
| // Licensed under the Apache License, Version 2.0 (the "License");
 | |
| // you may not use this file except in compliance with the License.
 | |
| // You may obtain a copy of the License at
 | |
| //
 | |
| //     http://www.apache.org/licenses/LICENSE-2.0
 | |
| //
 | |
| // Unless required by applicable law or agreed to in writing, software
 | |
| // distributed under the License is distributed on an "AS IS" BASIS,
 | |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| // See the License for the specific language governing permissions and
 | |
| // limitations under the License.
 | |
| 
 | |
| package friend
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/common/config"
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/common/webhook"
 | |
| 	"github.com/openimsdk/tools/db/redisutil"
 | |
| 
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/authverify"
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/common/convert"
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/common/db/cache"
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/common/db/controller"
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/common/db/mgo"
 | |
| 	tablerelation "github.com/openimsdk/open-im-server/v3/pkg/common/db/table/relation"
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/common/servererrs"
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/rpcclient"
 | |
| 	"github.com/openimsdk/protocol/constant"
 | |
| 	pbfriend "github.com/openimsdk/protocol/friend"
 | |
| 	"github.com/openimsdk/protocol/sdkws"
 | |
| 	"github.com/openimsdk/tools/db/mongoutil"
 | |
| 	"github.com/openimsdk/tools/discovery"
 | |
| 	"github.com/openimsdk/tools/errs"
 | |
| 	"github.com/openimsdk/tools/utils/datautil"
 | |
| 	"google.golang.org/grpc"
 | |
| )
 | |
| 
 | |
| type friendServer struct {
 | |
| 	friendDatabase        controller.FriendDatabase
 | |
| 	blackDatabase         controller.BlackDatabase
 | |
| 	userRpcClient         *rpcclient.UserRpcClient
 | |
| 	notificationSender    *FriendNotificationSender
 | |
| 	conversationRpcClient rpcclient.ConversationRpcClient
 | |
| 	RegisterCenter        discovery.SvcDiscoveryRegistry
 | |
| 	config                *Config
 | |
| 	webhookClient         *webhook.Client
 | |
| }
 | |
| 
 | |
| type Config struct {
 | |
| 	RpcConfig          config.Friend
 | |
| 	RedisConfig        config.Redis
 | |
| 	MongodbConfig      config.Mongo
 | |
| 	ZookeeperConfig    config.ZooKeeper
 | |
| 	NotificationConfig config.Notification
 | |
| 	Share              config.Share
 | |
| 	WebhooksConfig     config.Webhooks
 | |
| 	LocalCacheConfig   config.LocalCache
 | |
| }
 | |
| 
 | |
| func Start(ctx context.Context, config *Config, client discovery.SvcDiscoveryRegistry, server *grpc.Server) error {
 | |
| 	mgocli, err := mongoutil.NewMongoDB(ctx, config.MongodbConfig.Build())
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	rdb, err := redisutil.NewRedisClient(ctx, config.RedisConfig.Build())
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	friendMongoDB, err := mgo.NewFriendMongo(mgocli.GetDB())
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	friendRequestMongoDB, err := mgo.NewFriendRequestMongo(mgocli.GetDB())
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	blackMongoDB, err := mgo.NewBlackMongo(mgocli.GetDB())
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// Initialize RPC clients
 | |
| 	userRpcClient := rpcclient.NewUserRpcClient(client, config.Share.RpcRegisterName.User, config.Share.IMAdminUserID)
 | |
| 	msgRpcClient := rpcclient.NewMessageRpcClient(client, config.Share.RpcRegisterName.Msg)
 | |
| 
 | |
| 	// Initialize notification sender
 | |
| 	notificationSender := NewFriendNotificationSender(
 | |
| 		&config.NotificationConfig,
 | |
| 		&msgRpcClient,
 | |
| 		WithRpcFunc(userRpcClient.GetUsersInfo),
 | |
| 	)
 | |
| 	cache.InitLocalCache(&config.LocalCacheConfig)
 | |
| 
 | |
| 	// Register Friend server with refactored MongoDB and Redis integrations
 | |
| 	pbfriend.RegisterFriendServer(server, &friendServer{
 | |
| 		friendDatabase: controller.NewFriendDatabase(
 | |
| 			friendMongoDB,
 | |
| 			friendRequestMongoDB,
 | |
| 			cache.NewFriendCacheRedis(rdb, &config.LocalCacheConfig, friendMongoDB, cache.GetDefaultOpt()),
 | |
| 			mgocli.GetTx(),
 | |
| 		),
 | |
| 		blackDatabase: controller.NewBlackDatabase(
 | |
| 			blackMongoDB,
 | |
| 			cache.NewBlackCacheRedis(rdb, &config.LocalCacheConfig, blackMongoDB, cache.GetDefaultOpt()),
 | |
| 		),
 | |
| 		userRpcClient:         &userRpcClient,
 | |
| 		notificationSender:    notificationSender,
 | |
| 		RegisterCenter:        client,
 | |
| 		conversationRpcClient: rpcclient.NewConversationRpcClient(client, config.Share.RpcRegisterName.Conversation),
 | |
| 		config:                config,
 | |
| 		webhookClient:         webhook.NewWebhookClient(config.WebhooksConfig.URL),
 | |
| 	})
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // ok.
 | |
| func (s *friendServer) ApplyToAddFriend(ctx context.Context, req *pbfriend.ApplyToAddFriendReq) (resp *pbfriend.ApplyToAddFriendResp, err error) {
 | |
| 	resp = &pbfriend.ApplyToAddFriendResp{}
 | |
| 	if err := authverify.CheckAccessV3(ctx, req.FromUserID, s.config.Share.IMAdminUserID); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if req.ToUserID == req.FromUserID {
 | |
| 		return nil, servererrs.ErrCanNotAddYourself.WrapMsg("req.ToUserID", req.ToUserID)
 | |
| 	}
 | |
| 	if err = s.webhookBeforeAddFriend(ctx, &s.config.WebhooksConfig.BeforeAddFriend, req); err != nil && err != servererrs.ErrCallbackContinue {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if _, err := s.userRpcClient.GetUsersInfoMap(ctx, []string{req.ToUserID, req.FromUserID}); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	in1, in2, err := s.friendDatabase.CheckIn(ctx, req.FromUserID, req.ToUserID)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if in1 && in2 {
 | |
| 		return nil, servererrs.ErrRelationshipAlready.WrapMsg("already friends has f")
 | |
| 	}
 | |
| 	if err = s.friendDatabase.AddFriendRequest(ctx, req.FromUserID, req.ToUserID, req.ReqMsg, req.Ex); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	s.notificationSender.FriendApplicationAddNotification(ctx, req)
 | |
| 	s.webhookAfterAddFriend(ctx, &s.config.WebhooksConfig.AfterAddFriend, req)
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| // ok.
 | |
| func (s *friendServer) ImportFriends(ctx context.Context, req *pbfriend.ImportFriendReq) (resp *pbfriend.ImportFriendResp, err error) {
 | |
| 	if err := authverify.CheckAdmin(ctx, s.config.Share.IMAdminUserID); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if _, err := s.userRpcClient.GetUsersInfo(ctx, append([]string{req.OwnerUserID}, req.FriendUserIDs...)); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if datautil.Contain(req.OwnerUserID, req.FriendUserIDs...) {
 | |
| 		return nil, servererrs.ErrCanNotAddYourself.WrapMsg("can not add yourself")
 | |
| 	}
 | |
| 	if datautil.Duplicate(req.FriendUserIDs) {
 | |
| 		return nil, errs.ErrArgs.WrapMsg("friend userID repeated")
 | |
| 	}
 | |
| 
 | |
| 	if err := s.webhookBeforeImportFriends(ctx, &s.config.WebhooksConfig.BeforeImportFriends, req); err != nil && err != servererrs.ErrCallbackContinue {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	if err := s.friendDatabase.BecomeFriends(ctx, req.OwnerUserID, req.FriendUserIDs, constant.BecomeFriendByImport); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	for _, userID := range req.FriendUserIDs {
 | |
| 		s.notificationSender.FriendApplicationAgreedNotification(ctx, &pbfriend.RespondFriendApplyReq{
 | |
| 			FromUserID:   req.OwnerUserID,
 | |
| 			ToUserID:     userID,
 | |
| 			HandleResult: constant.FriendResponseAgree,
 | |
| 		})
 | |
| 	}
 | |
| 
 | |
| 	s.webhookAfterImportFriends(ctx, &s.config.WebhooksConfig.AfterImportFriends, req)
 | |
| 	return &pbfriend.ImportFriendResp{}, nil
 | |
| }
 | |
| 
 | |
| // ok.
 | |
| func (s *friendServer) RespondFriendApply(ctx context.Context, req *pbfriend.RespondFriendApplyReq) (resp *pbfriend.RespondFriendApplyResp, err error) {
 | |
| 	resp = &pbfriend.RespondFriendApplyResp{}
 | |
| 	if err := authverify.CheckAccessV3(ctx, req.ToUserID, s.config.Share.IMAdminUserID); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	friendRequest := tablerelation.FriendRequestModel{
 | |
| 		FromUserID:   req.FromUserID,
 | |
| 		ToUserID:     req.ToUserID,
 | |
| 		HandleMsg:    req.HandleMsg,
 | |
| 		HandleResult: req.HandleResult,
 | |
| 	}
 | |
| 	if req.HandleResult == constant.FriendResponseAgree {
 | |
| 		if err := s.webhookBeforeAddFriendAgree(ctx, &s.config.WebhooksConfig.BeforeAddFriendAgree, req); err != nil && err != servererrs.ErrCallbackContinue {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 		err := s.friendDatabase.AgreeFriendRequest(ctx, &friendRequest)
 | |
| 		if err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 		s.notificationSender.FriendApplicationAgreedNotification(ctx, req)
 | |
| 		return resp, nil
 | |
| 	}
 | |
| 	if req.HandleResult == constant.FriendResponseRefuse {
 | |
| 		err := s.friendDatabase.RefuseFriendRequest(ctx, &friendRequest)
 | |
| 		if err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 		s.notificationSender.FriendApplicationRefusedNotification(ctx, req)
 | |
| 		return resp, nil
 | |
| 	}
 | |
| 	return nil, errs.ErrArgs.WrapMsg("req.HandleResult != -1/1")
 | |
| }
 | |
| 
 | |
| // ok.
 | |
| func (s *friendServer) DeleteFriend(ctx context.Context, req *pbfriend.DeleteFriendReq) (resp *pbfriend.DeleteFriendResp, err error) {
 | |
| 	resp = &pbfriend.DeleteFriendResp{}
 | |
| 	if err := s.userRpcClient.Access(ctx, req.OwnerUserID); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	_, err = s.friendDatabase.FindFriendsWithError(ctx, req.OwnerUserID, []string{req.FriendUserID})
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if err := s.friendDatabase.Delete(ctx, req.OwnerUserID, []string{req.FriendUserID}); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	s.notificationSender.FriendDeletedNotification(ctx, req)
 | |
| 	s.webhookAfterDeleteFriend(ctx, &s.config.WebhooksConfig.AfterDeleteFriend, req)
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| // ok.
 | |
| func (s *friendServer) SetFriendRemark(ctx context.Context, req *pbfriend.SetFriendRemarkReq) (resp *pbfriend.SetFriendRemarkResp, err error) {
 | |
| 	if err = s.webhookBeforeSetFriendRemark(ctx, &s.config.WebhooksConfig.BeforeSetFriendRemark, req); err != nil && err != servererrs.ErrCallbackContinue {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	resp = &pbfriend.SetFriendRemarkResp{}
 | |
| 	if err := s.userRpcClient.Access(ctx, req.OwnerUserID); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	_, err = s.friendDatabase.FindFriendsWithError(ctx, req.OwnerUserID, []string{req.FriendUserID})
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if err := s.friendDatabase.UpdateRemark(ctx, req.OwnerUserID, req.FriendUserID, req.Remark); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	s.webhookAfterSetFriendRemark(ctx, &s.config.WebhooksConfig.AfterSetFriendRemark, req)
 | |
| 	s.notificationSender.FriendRemarkSetNotification(ctx, req.OwnerUserID, req.FriendUserID)
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| // ok.
 | |
| func (s *friendServer) GetDesignatedFriends(ctx context.Context, req *pbfriend.GetDesignatedFriendsReq) (resp *pbfriend.GetDesignatedFriendsResp, err error) {
 | |
| 	resp = &pbfriend.GetDesignatedFriendsResp{}
 | |
| 	if datautil.Duplicate(req.FriendUserIDs) {
 | |
| 		return nil, errs.ErrArgs.WrapMsg("friend userID repeated")
 | |
| 	}
 | |
| 	friends, err := s.friendDatabase.FindFriendsWithError(ctx, req.OwnerUserID, req.FriendUserIDs)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if resp.FriendsInfo, err = convert.FriendsDB2Pb(ctx, friends, s.userRpcClient.GetUsersInfoMap); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| // Get the list of friend requests sent out proactively.
 | |
| func (s *friendServer) GetDesignatedFriendsApply(ctx context.Context,
 | |
| 	req *pbfriend.GetDesignatedFriendsApplyReq) (resp *pbfriend.GetDesignatedFriendsApplyResp, err error) {
 | |
| 	friendRequests, err := s.friendDatabase.FindBothFriendRequests(ctx, req.FromUserID, req.ToUserID)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	resp = &pbfriend.GetDesignatedFriendsApplyResp{}
 | |
| 	resp.FriendRequests, err = convert.FriendRequestDB2Pb(ctx, friendRequests, s.userRpcClient.GetUsersInfoMap)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| // Get received friend requests (i.e., those initiated by others).
 | |
| func (s *friendServer) GetPaginationFriendsApplyTo(ctx context.Context, req *pbfriend.GetPaginationFriendsApplyToReq) (resp *pbfriend.GetPaginationFriendsApplyToResp, err error) {
 | |
| 	if err := s.userRpcClient.Access(ctx, req.UserID); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	total, friendRequests, err := s.friendDatabase.PageFriendRequestToMe(ctx, req.UserID, req.Pagination)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	resp = &pbfriend.GetPaginationFriendsApplyToResp{}
 | |
| 	resp.FriendRequests, err = convert.FriendRequestDB2Pb(ctx, friendRequests, s.userRpcClient.GetUsersInfoMap)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	resp.Total = int32(total)
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| func (s *friendServer) GetPaginationFriendsApplyFrom(ctx context.Context, req *pbfriend.GetPaginationFriendsApplyFromReq) (resp *pbfriend.GetPaginationFriendsApplyFromResp, err error) {
 | |
| 	resp = &pbfriend.GetPaginationFriendsApplyFromResp{}
 | |
| 	if err := s.userRpcClient.Access(ctx, req.UserID); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	total, friendRequests, err := s.friendDatabase.PageFriendRequestFromMe(ctx, req.UserID, req.Pagination)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	resp.FriendRequests, err = convert.FriendRequestDB2Pb(ctx, friendRequests, s.userRpcClient.GetUsersInfoMap)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	resp.Total = int32(total)
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| // ok.
 | |
| func (s *friendServer) IsFriend(ctx context.Context, req *pbfriend.IsFriendReq) (resp *pbfriend.IsFriendResp, err error) {
 | |
| 	resp = &pbfriend.IsFriendResp{}
 | |
| 	resp.InUser1Friends, resp.InUser2Friends, err = s.friendDatabase.CheckIn(ctx, req.UserID1, req.UserID2)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| func (s *friendServer) GetPaginationFriends(ctx context.Context, req *pbfriend.GetPaginationFriendsReq) (resp *pbfriend.GetPaginationFriendsResp, err error) {
 | |
| 	if err := s.userRpcClient.Access(ctx, req.UserID); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	total, friends, err := s.friendDatabase.PageOwnerFriends(ctx, req.UserID, req.Pagination)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	resp = &pbfriend.GetPaginationFriendsResp{}
 | |
| 	resp.FriendsInfo, err = convert.FriendsDB2Pb(ctx, friends, s.userRpcClient.GetUsersInfoMap)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	resp.Total = int32(total)
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| func (s *friendServer) GetFriendIDs(ctx context.Context, req *pbfriend.GetFriendIDsReq) (resp *pbfriend.GetFriendIDsResp, err error) {
 | |
| 	if err := s.userRpcClient.Access(ctx, req.UserID); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	resp = &pbfriend.GetFriendIDsResp{}
 | |
| 	resp.FriendIDs, err = s.friendDatabase.FindFriendUserIDs(ctx, req.UserID)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| func (s *friendServer) GetSpecifiedFriendsInfo(ctx context.Context, req *pbfriend.GetSpecifiedFriendsInfoReq) (*pbfriend.GetSpecifiedFriendsInfoResp, error) {
 | |
| 	if len(req.UserIDList) == 0 {
 | |
| 		return nil, errs.ErrArgs.WrapMsg("userIDList is empty")
 | |
| 	}
 | |
| 	if datautil.Duplicate(req.UserIDList) {
 | |
| 		return nil, errs.ErrArgs.WrapMsg("userIDList repeated")
 | |
| 	}
 | |
| 	userMap, err := s.userRpcClient.GetUsersInfoMap(ctx, req.UserIDList)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	friends, err := s.friendDatabase.FindFriendsWithError(ctx, req.OwnerUserID, req.UserIDList)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	blacks, err := s.blackDatabase.FindBlackInfos(ctx, req.OwnerUserID, req.UserIDList)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	friendMap := datautil.SliceToMap(friends, func(e *tablerelation.FriendModel) string {
 | |
| 		return e.FriendUserID
 | |
| 	})
 | |
| 	blackMap := datautil.SliceToMap(blacks, func(e *tablerelation.BlackModel) string {
 | |
| 		return e.BlockUserID
 | |
| 	})
 | |
| 	resp := &pbfriend.GetSpecifiedFriendsInfoResp{
 | |
| 		Infos: make([]*pbfriend.GetSpecifiedFriendsInfoInfo, 0, len(req.UserIDList)),
 | |
| 	}
 | |
| 	for _, userID := range req.UserIDList {
 | |
| 		user := userMap[userID]
 | |
| 		if user == nil {
 | |
| 			continue
 | |
| 		}
 | |
| 		var friendInfo *sdkws.FriendInfo
 | |
| 		if friend := friendMap[userID]; friend != nil {
 | |
| 
 | |
| 			friendInfo = &sdkws.FriendInfo{
 | |
| 				OwnerUserID:    friend.OwnerUserID,
 | |
| 				Remark:         friend.Remark,
 | |
| 				CreateTime:     friend.CreateTime.UnixMilli(),
 | |
| 				AddSource:      friend.AddSource,
 | |
| 				OperatorUserID: friend.OperatorUserID,
 | |
| 				Ex:             friend.Ex,
 | |
| 				IsPinned:       friend.IsPinned,
 | |
| 			}
 | |
| 		}
 | |
| 		var blackInfo *sdkws.BlackInfo
 | |
| 		if black := blackMap[userID]; black != nil {
 | |
| 			blackInfo = &sdkws.BlackInfo{
 | |
| 				OwnerUserID:    black.OwnerUserID,
 | |
| 				CreateTime:     black.CreateTime.UnixMilli(),
 | |
| 				AddSource:      black.AddSource,
 | |
| 				OperatorUserID: black.OperatorUserID,
 | |
| 				Ex:             black.Ex,
 | |
| 			}
 | |
| 		}
 | |
| 		resp.Infos = append(resp.Infos, &pbfriend.GetSpecifiedFriendsInfoInfo{
 | |
| 			UserInfo:   user,
 | |
| 			FriendInfo: friendInfo,
 | |
| 			BlackInfo:  blackInfo,
 | |
| 		})
 | |
| 	}
 | |
| 	return resp, nil
 | |
| }
 | |
| func (s *friendServer) UpdateFriends(
 | |
| 	ctx context.Context,
 | |
| 	req *pbfriend.UpdateFriendsReq,
 | |
| ) (*pbfriend.UpdateFriendsResp, error) {
 | |
| 	if len(req.FriendUserIDs) == 0 {
 | |
| 		return nil, errs.ErrArgs.WrapMsg("friendIDList is empty")
 | |
| 	}
 | |
| 	if datautil.Duplicate(req.FriendUserIDs) {
 | |
| 		return nil, errs.ErrArgs.WrapMsg("friendIDList repeated")
 | |
| 	}
 | |
| 
 | |
| 	_, err := s.friendDatabase.FindFriendsWithError(ctx, req.OwnerUserID, req.FriendUserIDs)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	val := make(map[string]any)
 | |
| 
 | |
| 	if req.IsPinned != nil {
 | |
| 		val["is_pinned"] = req.IsPinned.Value
 | |
| 	}
 | |
| 	if req.Remark != nil {
 | |
| 		val["remark"] = req.Remark.Value
 | |
| 	}
 | |
| 	if req.Ex != nil {
 | |
| 		val["ex"] = req.Ex.Value
 | |
| 	}
 | |
| 	if err = s.friendDatabase.UpdateFriends(ctx, req.OwnerUserID, req.FriendUserIDs, val); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	resp := &pbfriend.UpdateFriendsResp{}
 | |
| 
 | |
| 	s.notificationSender.FriendsInfoUpdateNotification(ctx, req.OwnerUserID, req.FriendUserIDs)
 | |
| 	return resp, nil
 | |
| }
 |