Admin: For managing administrators with role-based access LlmProvider: For managing LLM service providers Created SQL schema: All tables as per the database design Proper foreign key constraints and indexes Timestamps for auditing Appropriate character sets and collations Added operation logging: Created LogService for centralized logging Integrated logging into TokenService Logs all token-related operations with user info and IP address Enhanced token management: Added comprehensive logging for all token operations Improved error handling and validation Added proper cleanup for revoked tokens
132 lines
3.4 KiB
PHP
132 lines
3.4 KiB
PHP
<?php
|
|
|
|
declare(strict_types=1);
|
|
|
|
namespace App\Services\Auth;
|
|
|
|
use App\Models\AuthToken;
|
|
use App\Models\Client;
|
|
use App\Services\LogService;
|
|
use Illuminate\Support\Facades\Redis;
|
|
use Illuminate\Support\Str;
|
|
|
|
class TokenService
|
|
{
|
|
private const ACCESS_TOKEN_PREFIX = 'access_token:';
|
|
private const ACCESS_TOKEN_TTL = 3600; // 1 hour in seconds
|
|
|
|
public function __construct(
|
|
private readonly LogService $logService
|
|
) {}
|
|
|
|
public function generateAuthToken(Client $client, ?int $expiresInDays = null): AuthToken
|
|
{
|
|
$token = AuthToken::create([
|
|
'client_id' => $client->id,
|
|
'token' => Str::random(64),
|
|
'expires_at' => $expiresInDays ? now()->addDays($expiresInDays) : null,
|
|
]);
|
|
|
|
$this->logService->logOperation(
|
|
'client',
|
|
$client->id,
|
|
'Generated new auth token'
|
|
);
|
|
|
|
return $token;
|
|
}
|
|
|
|
public function generateAccessToken(AuthToken $authToken): array
|
|
{
|
|
$accessToken = Str::random(64);
|
|
$expiresAt = now()->addSeconds(self::ACCESS_TOKEN_TTL);
|
|
|
|
$tokenData = [
|
|
'client_id' => $authToken->client_id,
|
|
'expires_at' => $expiresAt->toIso8601String(),
|
|
];
|
|
|
|
Redis::setex(
|
|
self::ACCESS_TOKEN_PREFIX . $accessToken,
|
|
self::ACCESS_TOKEN_TTL,
|
|
json_encode($tokenData)
|
|
);
|
|
|
|
$this->logService->logOperation(
|
|
'client',
|
|
$authToken->client_id,
|
|
'Generated new access token'
|
|
);
|
|
|
|
return [
|
|
'access_token' => $accessToken,
|
|
'expires_in' => self::ACCESS_TOKEN_TTL,
|
|
];
|
|
}
|
|
|
|
public function validateAuthToken(string $token): ?AuthToken
|
|
{
|
|
$authToken = AuthToken::where('token', $token)->first();
|
|
|
|
if (!$authToken || !$authToken->isValid()) {
|
|
if ($authToken) {
|
|
$this->logService->logOperation(
|
|
'client',
|
|
$authToken->client_id,
|
|
'Invalid auth token attempt'
|
|
);
|
|
}
|
|
return null;
|
|
}
|
|
|
|
return $authToken;
|
|
}
|
|
|
|
public function validateAccessToken(string $token): ?array
|
|
{
|
|
$tokenData = Redis::get(self::ACCESS_TOKEN_PREFIX . $token);
|
|
|
|
if (!$tokenData) {
|
|
return null;
|
|
}
|
|
|
|
$data = json_decode($tokenData, true);
|
|
$expiresAt = \DateTime::createFromFormat(\DateTime::ISO8601, $data['expires_at']);
|
|
|
|
if ($expiresAt < now()) {
|
|
$this->revokeAccessToken($token);
|
|
$this->logService->logOperation(
|
|
'client',
|
|
$data['client_id'],
|
|
'Access token expired'
|
|
);
|
|
return null;
|
|
}
|
|
|
|
return $data;
|
|
}
|
|
|
|
public function revokeAccessToken(string $token): void
|
|
{
|
|
$tokenData = Redis::get(self::ACCESS_TOKEN_PREFIX . $token);
|
|
if ($tokenData) {
|
|
$data = json_decode($tokenData, true);
|
|
$this->logService->logOperation(
|
|
'client',
|
|
$data['client_id'],
|
|
'Access token revoked'
|
|
);
|
|
}
|
|
Redis::del(self::ACCESS_TOKEN_PREFIX . $token);
|
|
}
|
|
|
|
public function revokeAuthToken(AuthToken $authToken): void
|
|
{
|
|
$this->logService->logOperation(
|
|
'client',
|
|
$authToken->client_id,
|
|
'Auth token revoked'
|
|
);
|
|
$authToken->delete();
|
|
}
|
|
}
|