mirror of
https://github.com/aykhans/slash-e.git
synced 2025-04-21 06:13:33 +00:00
233 lines
6.7 KiB
Go
233 lines
6.7 KiB
Go
package license
|
|
|
|
import (
|
|
"context"
|
|
_ "embed"
|
|
"slices"
|
|
"time"
|
|
|
|
"github.com/golang-jwt/jwt/v5"
|
|
"github.com/pkg/errors"
|
|
"google.golang.org/protobuf/types/known/timestamppb"
|
|
|
|
v1pb "github.com/yourselfhosted/slash/proto/gen/api/v1"
|
|
storepb "github.com/yourselfhosted/slash/proto/gen/store"
|
|
"github.com/yourselfhosted/slash/server/profile"
|
|
"github.com/yourselfhosted/slash/server/service/license/lemonsqueezy"
|
|
"github.com/yourselfhosted/slash/store"
|
|
)
|
|
|
|
//go:embed slash.public.pem
|
|
var slashPublicRSAKey string
|
|
|
|
type LicenseService struct {
|
|
Profile *profile.Profile
|
|
Store *store.Store
|
|
|
|
cachedSubscription *v1pb.Subscription
|
|
}
|
|
|
|
// NewLicenseService creates a new LicenseService.
|
|
func NewLicenseService(profile *profile.Profile, store *store.Store) *LicenseService {
|
|
return &LicenseService{
|
|
Profile: profile,
|
|
Store: store,
|
|
cachedSubscription: getSubscriptionForFreePlan(),
|
|
}
|
|
}
|
|
|
|
func (s *LicenseService) LoadSubscription(ctx context.Context) (*v1pb.Subscription, error) {
|
|
workspaceSettingGeneral, err := s.Store.GetWorkspaceSetting(ctx, &store.FindWorkspaceSetting{
|
|
Key: storepb.WorkspaceSettingKey_WORKSPACE_SETTING_GENERAL,
|
|
})
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to get workspace setting")
|
|
}
|
|
|
|
subscription := getSubscriptionForFreePlan()
|
|
licenseKey := ""
|
|
if workspaceSettingGeneral != nil {
|
|
licenseKey = workspaceSettingGeneral.GetGeneral().LicenseKey
|
|
}
|
|
if licenseKey == "" {
|
|
return subscription, nil
|
|
}
|
|
|
|
result, err := validateLicenseKey(licenseKey)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to validate license key")
|
|
}
|
|
if result == nil {
|
|
return subscription, nil
|
|
}
|
|
|
|
subscription.Plan = result.Plan
|
|
subscription.ExpiresTime = timestamppb.New(result.ExpiresTime)
|
|
subscription.Seats = int32(result.Seats)
|
|
for _, feature := range result.Features {
|
|
subscription.Features = append(subscription.Features, feature.String())
|
|
}
|
|
return subscription, nil
|
|
}
|
|
|
|
func (s *LicenseService) UpdateSubscription(ctx context.Context, licenseKey string) (*v1pb.Subscription, error) {
|
|
if licenseKey != "" {
|
|
result, err := validateLicenseKey(licenseKey)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to validate license key")
|
|
}
|
|
if result == nil {
|
|
return nil, errors.New("invalid license key")
|
|
}
|
|
}
|
|
if err := s.UpdateLicenseKey(ctx, licenseKey); err != nil {
|
|
return nil, errors.Wrap(err, "failed to update license key")
|
|
}
|
|
|
|
subscription, err := s.LoadSubscription(ctx)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to load subscription")
|
|
}
|
|
s.cachedSubscription = subscription
|
|
return subscription, nil
|
|
}
|
|
|
|
func (s *LicenseService) UpdateLicenseKey(ctx context.Context, licenseKey string) error {
|
|
workspaceSettingGeneral, err := s.Store.GetWorkspaceSetting(ctx, &store.FindWorkspaceSetting{
|
|
Key: storepb.WorkspaceSettingKey_WORKSPACE_SETTING_GENERAL,
|
|
})
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to get workspace setting")
|
|
}
|
|
if workspaceSettingGeneral == nil || workspaceSettingGeneral.GetGeneral() == nil {
|
|
workspaceSettingGeneral = &storepb.WorkspaceSetting{
|
|
Key: storepb.WorkspaceSettingKey_WORKSPACE_SETTING_GENERAL,
|
|
Value: &storepb.WorkspaceSetting_General{
|
|
General: &storepb.WorkspaceSetting_GeneralSetting{
|
|
LicenseKey: licenseKey,
|
|
},
|
|
},
|
|
}
|
|
} else {
|
|
workspaceSettingGeneral.GetGeneral().LicenseKey = licenseKey
|
|
}
|
|
_, err = s.Store.UpsertWorkspaceSetting(ctx, workspaceSettingGeneral)
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to upsert workspace setting")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (s *LicenseService) GetSubscription() *v1pb.Subscription {
|
|
return s.cachedSubscription
|
|
}
|
|
|
|
func (s *LicenseService) IsFeatureEnabled(feature FeatureType) bool {
|
|
return slices.Contains(s.cachedSubscription.Features, feature.String())
|
|
}
|
|
|
|
type ValidateResult struct {
|
|
Plan v1pb.PlanType
|
|
ExpiresTime time.Time
|
|
Trial bool
|
|
Seats int
|
|
Features []FeatureType
|
|
}
|
|
|
|
type Claims struct {
|
|
jwt.RegisteredClaims
|
|
|
|
Owner string `json:"owner"`
|
|
Plan string `json:"plan"`
|
|
Trial bool `json:"trial"`
|
|
// The number of seats in the license key. Leave it empty if the license key does not have a seat limit.
|
|
Seats int `json:"seats"`
|
|
// The available features in the license key.
|
|
Features []string `json:"features"`
|
|
}
|
|
|
|
func validateLicenseKey(licenseKey string) (*ValidateResult, error) {
|
|
// Try to parse the license key as a JWT token.
|
|
claims, _ := parseLicenseKey(licenseKey)
|
|
if claims != nil {
|
|
result := &ValidateResult{
|
|
Plan: v1pb.PlanType(v1pb.PlanType_value[claims.Plan]),
|
|
ExpiresTime: claims.ExpiresAt.Time,
|
|
Trial: claims.Trial,
|
|
Seats: claims.Seats,
|
|
}
|
|
result.Features = getDefaultFeatures(result.Plan)
|
|
for _, feature := range claims.Features {
|
|
featureType, ok := validateFeatureString(feature)
|
|
if ok {
|
|
result.Features = append(result.Features, featureType)
|
|
}
|
|
}
|
|
plan := v1pb.PlanType(v1pb.PlanType_value[claims.Plan])
|
|
if plan == v1pb.PlanType_PLAN_TYPE_UNSPECIFIED {
|
|
return nil, errors.New("invalid plan")
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
// Try to validate the license key with the license server.
|
|
validateResponse, err := lemonsqueezy.ValidateLicenseKey(licenseKey, "")
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to validate license key")
|
|
}
|
|
if validateResponse.Valid {
|
|
result := &ValidateResult{
|
|
Plan: v1pb.PlanType_PRO,
|
|
Features: getDefaultFeatures(v1pb.PlanType_PRO),
|
|
}
|
|
if validateResponse.LicenseKey.ExpiresAt != nil && *validateResponse.LicenseKey.ExpiresAt != "" {
|
|
expiresTime, err := time.Parse(time.RFC3339Nano, *validateResponse.LicenseKey.ExpiresAt)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to parse license key expires time")
|
|
}
|
|
result.ExpiresTime = expiresTime
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
// Otherwise, return an error.
|
|
return nil, errors.New("invalid license key")
|
|
}
|
|
|
|
func parseLicenseKey(licenseKey string) (*Claims, error) {
|
|
token, err := jwt.ParseWithClaims(licenseKey, &Claims{}, func(token *jwt.Token) (any, error) {
|
|
if _, ok := token.Method.(*jwt.SigningMethodRSA); !ok {
|
|
return nil, errors.Errorf("unexpected signing method: %v", token.Header["alg"])
|
|
}
|
|
|
|
key, err := jwt.ParseRSAPublicKeyFromPEM([]byte(slashPublicRSAKey))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return key, nil
|
|
})
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to parse token")
|
|
}
|
|
if token == nil || !token.Valid {
|
|
return nil, errors.New("invalid token")
|
|
}
|
|
|
|
claims, ok := token.Claims.(*Claims)
|
|
if !ok {
|
|
return nil, errors.New("invalid claims")
|
|
}
|
|
return claims, nil
|
|
}
|
|
|
|
func getSubscriptionForFreePlan() *v1pb.Subscription {
|
|
return &v1pb.Subscription{
|
|
Plan: v1pb.PlanType_FREE,
|
|
Seats: 5,
|
|
ShortcutsLimit: 100,
|
|
CollectionsLimit: 5,
|
|
Features: []string{},
|
|
}
|
|
}
|