Compare commits
1 Commits
b006fe77c2
...
fix/bossra
| Author | SHA1 | Date | |
|---|---|---|---|
| 688d4b34df |
@@ -10,48 +10,48 @@ jobs:
|
|||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- name: 코드 체크아웃
|
- name: 코드 체크아웃
|
||||||
run: |
|
uses: actions/checkout@v4
|
||||||
git config --global --add safe.directory "$(pwd)"
|
|
||||||
git init
|
|
||||||
git remote add origin $GITHUB_SERVER_URL/$GITHUB_REPOSITORY.git
|
|
||||||
git fetch --depth=1 origin $GITHUB_SHA
|
|
||||||
git checkout $GITHUB_SHA
|
|
||||||
|
|
||||||
- name: tolchain 의존성 클론
|
- name: tolchain 의존성 클론
|
||||||
run: git clone --depth 1 https://github.com/tolelom/tolchain.git ../tolchain
|
run: git clone --depth 1 https://github.com/tolelom/tolchain.git ../tolchain
|
||||||
|
|
||||||
- name: Go 설치
|
- name: Go 설치
|
||||||
run: |
|
uses: actions/setup-go@v5
|
||||||
curl -fsSL https://go.dev/dl/go1.25.5.linux-arm64.tar.gz -o /tmp/go.tar.gz
|
with:
|
||||||
rm -rf /usr/local/go && tar -C /usr/local -xzf /tmp/go.tar.gz
|
go-version: '1.25'
|
||||||
export PATH=$PATH:/usr/local/go/bin
|
|
||||||
go version
|
|
||||||
|
|
||||||
- name: go vet 검증
|
- name: go vet 검증
|
||||||
run: |
|
run: go vet ./...
|
||||||
export PATH=$PATH:/usr/local/go/bin
|
|
||||||
go vet ./...
|
|
||||||
|
|
||||||
- name: 테스트 실행
|
- name: 테스트 실행
|
||||||
run: |
|
run: go test ./... -count=1
|
||||||
export PATH=$PATH:/usr/local/go/bin
|
|
||||||
go test ./... -count=1
|
|
||||||
|
|
||||||
- name: 빌드 검증
|
- name: 빌드 검증
|
||||||
run: |
|
run: go build -o /dev/null .
|
||||||
export PATH=$PATH:/usr/local/go/bin
|
|
||||||
go build -o /dev/null .
|
|
||||||
|
|
||||||
deploy:
|
deploy:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
needs: lint-and-build
|
needs: lint-and-build
|
||||||
steps:
|
steps:
|
||||||
- name: 서버에 배포
|
- name: 서버에 배포
|
||||||
run: |
|
uses: appleboy/ssh-action@v1
|
||||||
mkdir -p ~/.ssh
|
with:
|
||||||
echo "${{ secrets.SSH_PRIVATE_KEY }}" > ~/.ssh/deploy_key
|
host: ${{ secrets.SERVER_HOST }}
|
||||||
chmod 600 ~/.ssh/deploy_key
|
username: ${{ secrets.SERVER_USER }}
|
||||||
ssh -o StrictHostKeyChecking=no -i ~/.ssh/deploy_key \
|
key: ${{ secrets.SSH_PRIVATE_KEY }}
|
||||||
${{ secrets.SERVER_USER }}@${{ secrets.SERVER_HOST }} \
|
port: 22
|
||||||
'set -e && export PATH=$PATH:/usr/local/bin:/opt/homebrew/bin:$HOME/.docker/bin && cd /tmp && rm -rf a301-build && mkdir a301-build && cd a301-build && git clone --quiet https://tolelom:${{ secrets.GIT_TOKEN }}@git.tolelom.xyz/A301/a301_server.git a301_server && git clone --quiet https://github.com/tolelom/tolchain.git tolchain && docker build --no-cache -t a301-server:latest -f a301_server/Dockerfile . && cd ~/server && docker compose up -d --no-deps --force-recreate a301-server && rm -rf /tmp/a301-build'
|
script: |
|
||||||
rm -f ~/.ssh/deploy_key
|
set -e
|
||||||
|
export PATH=$PATH:/usr/local/bin:/opt/homebrew/bin:$HOME/.docker/bin
|
||||||
|
cd /tmp
|
||||||
|
rm -rf a301-build
|
||||||
|
mkdir a301-build && cd a301-build
|
||||||
|
# Suppress token from logs
|
||||||
|
set +x
|
||||||
|
git clone --quiet https://tolelom:${{ secrets.GIT_TOKEN }}@git.tolelom.xyz/A301/a301_server.git a301_server 2>/dev/null
|
||||||
|
set -x
|
||||||
|
git clone --quiet https://github.com/tolelom/tolchain.git tolchain
|
||||||
|
docker build --no-cache -t a301-server:latest -f a301_server/Dockerfile .
|
||||||
|
cd ~/server
|
||||||
|
docker compose up -d --no-deps --force-recreate a301-server
|
||||||
|
rm -rf /tmp/a301-build
|
||||||
|
|||||||
@@ -10,11 +10,9 @@ RUN CGO_ENABLED=0 GOOS=linux go build -o server .
|
|||||||
# Stage 2: Run
|
# Stage 2: Run
|
||||||
FROM alpine:latest
|
FROM alpine:latest
|
||||||
RUN apk --no-cache add tzdata ca-certificates curl
|
RUN apk --no-cache add tzdata ca-certificates curl
|
||||||
RUN addgroup -g 1000 app && adduser -D -u 1000 -G app app
|
RUN mkdir -p /data/game
|
||||||
RUN mkdir -p /data/game && chown app:app /data/game
|
|
||||||
WORKDIR /app
|
WORKDIR /app
|
||||||
COPY --from=builder --chown=app:app /build/a301_server/server .
|
COPY --from=builder /build/a301_server/server .
|
||||||
USER app
|
|
||||||
EXPOSE 8080
|
EXPOSE 8080
|
||||||
HEALTHCHECK --interval=30s --timeout=5s --start-period=10s --retries=3 \
|
HEALTHCHECK --interval=30s --timeout=5s --start-period=10s --retries=3 \
|
||||||
CMD curl -f http://localhost:8080/health || exit 1
|
CMD curl -f http://localhost:8080/health || exit 1
|
||||||
|
|||||||
@@ -66,10 +66,10 @@ func (h *Handler) Create(c *fiber.Ctx) error {
|
|||||||
if err := c.BodyParser(&body); err != nil || body.Title == "" || body.Content == "" {
|
if err := c.BodyParser(&body); err != nil || body.Title == "" || body.Content == "" {
|
||||||
return apperror.BadRequest("제목과 내용을 입력해주세요")
|
return apperror.BadRequest("제목과 내용을 입력해주세요")
|
||||||
}
|
}
|
||||||
if len([]rune(body.Title)) > 256 {
|
if len(body.Title) > 256 {
|
||||||
return apperror.BadRequest("제목은 256자 이하여야 합니다")
|
return apperror.BadRequest("제목은 256자 이하여야 합니다")
|
||||||
}
|
}
|
||||||
if len([]rune(body.Content)) > 10000 {
|
if len(body.Content) > 10000 {
|
||||||
return apperror.BadRequest("내용은 10000자 이하여야 합니다")
|
return apperror.BadRequest("내용은 10000자 이하여야 합니다")
|
||||||
}
|
}
|
||||||
a, err := h.svc.Create(body.Title, body.Content)
|
a, err := h.svc.Create(body.Title, body.Content)
|
||||||
@@ -110,10 +110,10 @@ func (h *Handler) Update(c *fiber.Ctx) error {
|
|||||||
if body.Title == "" && body.Content == "" {
|
if body.Title == "" && body.Content == "" {
|
||||||
return apperror.BadRequest("수정할 내용을 입력해주세요")
|
return apperror.BadRequest("수정할 내용을 입력해주세요")
|
||||||
}
|
}
|
||||||
if len([]rune(body.Title)) > 256 {
|
if len(body.Title) > 256 {
|
||||||
return apperror.BadRequest("제목은 256자 이하여야 합니다")
|
return apperror.BadRequest("제목은 256자 이하여야 합니다")
|
||||||
}
|
}
|
||||||
if len([]rune(body.Content)) > 10000 {
|
if len(body.Content) > 10000 {
|
||||||
return apperror.BadRequest("내용은 10000자 이하여야 합니다")
|
return apperror.BadRequest("내용은 10000자 이하여야 합니다")
|
||||||
}
|
}
|
||||||
a, err := h.svc.Update(uint(id), body.Title, body.Content)
|
a, err := h.svc.Update(uint(id), body.Title, body.Content)
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
package auth
|
package auth
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
|
||||||
"log"
|
"log"
|
||||||
"regexp"
|
"regexp"
|
||||||
"strconv"
|
"strconv"
|
||||||
@@ -57,8 +56,8 @@ func (h *Handler) Register(c *fiber.Ctx) error {
|
|||||||
return apperror.BadRequest("비밀번호는 72자 이하여야 합니다")
|
return apperror.BadRequest("비밀번호는 72자 이하여야 합니다")
|
||||||
}
|
}
|
||||||
if err := h.svc.Register(req.Username, req.Password); err != nil {
|
if err := h.svc.Register(req.Username, req.Password); err != nil {
|
||||||
if errors.Is(err, apperror.ErrDuplicateUsername) {
|
if strings.Contains(err.Error(), "이미 사용 중") {
|
||||||
return apperror.Conflict("이미 사용 중인 아이디입니다")
|
return apperror.Conflict(err.Error())
|
||||||
}
|
}
|
||||||
return apperror.Internal("회원가입에 실패했습니다")
|
return apperror.Internal("회원가입에 실패했습니다")
|
||||||
}
|
}
|
||||||
@@ -250,11 +249,6 @@ func (h *Handler) UpdateRole(c *fiber.Ctx) error {
|
|||||||
return apperror.BadRequest("role은 admin 또는 user여야 합니다")
|
return apperror.BadRequest("role은 admin 또는 user여야 합니다")
|
||||||
}
|
}
|
||||||
uid := uint(id)
|
uid := uint(id)
|
||||||
// 자기 자신의 admin 권한 강등 방지
|
|
||||||
callerID, _ := c.Locals("userID").(uint)
|
|
||||||
if uid == callerID && body.Role != "admin" {
|
|
||||||
return apperror.BadRequest("자신의 관리자 권한을 제거할 수 없습니다")
|
|
||||||
}
|
|
||||||
if err := h.svc.UpdateRole(uid, Role(body.Role)); err != nil {
|
if err := h.svc.UpdateRole(uid, Role(body.Role)); err != nil {
|
||||||
return apperror.Internal("권한 변경에 실패했습니다")
|
return apperror.Internal("권한 변경에 실패했습니다")
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -15,7 +15,6 @@ import (
|
|||||||
|
|
||||||
"gorm.io/gorm"
|
"gorm.io/gorm"
|
||||||
|
|
||||||
"a301_server/pkg/apperror"
|
|
||||||
"a301_server/pkg/config"
|
"a301_server/pkg/config"
|
||||||
"github.com/golang-jwt/jwt/v5"
|
"github.com/golang-jwt/jwt/v5"
|
||||||
"github.com/redis/go-redis/v9"
|
"github.com/redis/go-redis/v9"
|
||||||
@@ -264,6 +263,9 @@ func (s *Service) RedeemLaunchTicket(ticket string) (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (s *Service) Register(username, password string) error {
|
func (s *Service) Register(username, password string) error {
|
||||||
|
if _, err := s.repo.FindByUsername(username); err == nil {
|
||||||
|
return fmt.Errorf("이미 사용 중인 아이디입니다")
|
||||||
|
}
|
||||||
hash, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)
|
hash, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("비밀번호 처리에 실패했습니다")
|
return fmt.Errorf("비밀번호 처리에 실패했습니다")
|
||||||
@@ -272,9 +274,6 @@ func (s *Service) Register(username, password string) error {
|
|||||||
return s.repo.Transaction(func(txRepo *Repository) error {
|
return s.repo.Transaction(func(txRepo *Repository) error {
|
||||||
user := &User{Username: username, PasswordHash: string(hash), Role: RoleUser}
|
user := &User{Username: username, PasswordHash: string(hash), Role: RoleUser}
|
||||||
if err := txRepo.Create(user); err != nil {
|
if err := txRepo.Create(user); err != nil {
|
||||||
if apperror.IsDuplicateEntry(err) {
|
|
||||||
return apperror.ErrDuplicateUsername
|
|
||||||
}
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if s.walletCreator != nil {
|
if s.walletCreator != nil {
|
||||||
@@ -427,6 +426,9 @@ func (s *Service) SSAFYLogin(code, state string) (accessToken, refreshToken stri
|
|||||||
|
|
||||||
ssafyID := userInfo.UserID
|
ssafyID := userInfo.UserID
|
||||||
// SSAFY ID에서 영문 소문자+숫자만 추출하여 안전한 username 생성
|
// SSAFY ID에서 영문 소문자+숫자만 추출하여 안전한 username 생성
|
||||||
|
// NOTE: Username collision is handled by the DB unique constraint.
|
||||||
|
// If collision occurs, the transaction will rollback and return a generic error.
|
||||||
|
// A retry with random suffix could improve UX but is not critical.
|
||||||
safeID := sanitizeForUsername(ssafyID)
|
safeID := sanitizeForUsername(ssafyID)
|
||||||
if safeID == "" {
|
if safeID == "" {
|
||||||
safeID = hex.EncodeToString(randomBytes[:8])
|
safeID = hex.EncodeToString(randomBytes[:8])
|
||||||
@@ -435,47 +437,32 @@ func (s *Service) SSAFYLogin(code, state string) (accessToken, refreshToken stri
|
|||||||
if len(username) > 50 {
|
if len(username) > 50 {
|
||||||
username = username[:50]
|
username = username[:50]
|
||||||
}
|
}
|
||||||
// DB unique constraint 충돌 시 랜덤 suffix로 최대 3회 재시도
|
|
||||||
maxRetries := 3
|
|
||||||
baseUsername := username
|
|
||||||
|
|
||||||
for attempt := 0; attempt < maxRetries; attempt++ {
|
err = s.repo.Transaction(func(txRepo *Repository) error {
|
||||||
if attempt > 0 {
|
user = &User{
|
||||||
suffix := hex.EncodeToString(randomBytes[attempt*2 : attempt*2+4])
|
Username: username,
|
||||||
username = baseUsername + "_" + suffix
|
PasswordHash: string(hash),
|
||||||
if len(username) > 50 {
|
Role: RoleUser,
|
||||||
username = username[:50]
|
SsafyID: &ssafyID,
|
||||||
|
}
|
||||||
|
if err := txRepo.Create(user); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if s.walletCreator != nil {
|
||||||
|
if err := s.walletCreator(user.ID); err != nil {
|
||||||
|
return fmt.Errorf("wallet creation failed: %w", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
err = s.repo.Transaction(func(txRepo *Repository) error {
|
if s.profileCreator != nil {
|
||||||
user = &User{
|
if err := s.profileCreator(user.ID); err != nil {
|
||||||
Username: username,
|
return fmt.Errorf("profile creation failed: %w", err)
|
||||||
PasswordHash: string(hash),
|
|
||||||
Role: RoleUser,
|
|
||||||
SsafyID: &ssafyID,
|
|
||||||
}
|
}
|
||||||
if err := txRepo.Create(user); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if s.walletCreator != nil {
|
|
||||||
if err := s.walletCreator(user.ID); err != nil {
|
|
||||||
return fmt.Errorf("wallet creation failed: %w", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if s.profileCreator != nil {
|
|
||||||
if err := s.profileCreator(user.ID); err != nil {
|
|
||||||
return fmt.Errorf("profile creation failed: %w", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
})
|
|
||||||
if err == nil {
|
|
||||||
break
|
|
||||||
}
|
}
|
||||||
log.Printf("SSAFY user creation attempt %d failed: %v", attempt+1, err)
|
return nil
|
||||||
}
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
log.Printf("SSAFY user creation transaction failed: %v", err)
|
||||||
return "", "", nil, fmt.Errorf("계정 생성 실패: %v", err)
|
return "", "", nil, fmt.Errorf("계정 생성 실패: %v", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -536,18 +523,6 @@ func sanitizeForUsername(s string) string {
|
|||||||
// If these fail, the admin user exists without a wallet/profile.
|
// If these fail, the admin user exists without a wallet/profile.
|
||||||
// This is acceptable because EnsureAdmin runs once at startup and failures
|
// This is acceptable because EnsureAdmin runs once at startup and failures
|
||||||
// are logged as warnings. A restart will skip user creation (already exists).
|
// are logged as warnings. A restart will skip user creation (already exists).
|
||||||
// VerifyPassword checks if the password matches the user's stored hash.
|
|
||||||
func (s *Service) VerifyPassword(userID uint, password string) error {
|
|
||||||
user, err := s.repo.FindByID(userID)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("user not found")
|
|
||||||
}
|
|
||||||
if err := bcrypt.CompareHashAndPassword([]byte(user.PasswordHash), []byte(password)); err != nil {
|
|
||||||
return fmt.Errorf("invalid password")
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *Service) EnsureAdmin(username, password string) error {
|
func (s *Service) EnsureAdmin(username, password string) error {
|
||||||
if _, err := s.repo.FindByUsername(username); err == nil {
|
if _, err := s.repo.FindByUsername(username); err == nil {
|
||||||
return nil
|
return nil
|
||||||
|
|||||||
@@ -2,7 +2,6 @@ package bossraid
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"log"
|
"log"
|
||||||
"strings"
|
|
||||||
|
|
||||||
"a301_server/pkg/apperror"
|
"a301_server/pkg/apperror"
|
||||||
|
|
||||||
@@ -62,11 +61,7 @@ func (h *Handler) RequestEntry(c *fiber.Ctx) error {
|
|||||||
|
|
||||||
room, tokens, err := h.svc.RequestEntryWithTokens(req.Usernames, req.BossID)
|
room, tokens, err := h.svc.RequestEntryWithTokens(req.Usernames, req.BossID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
status := fiber.StatusConflict
|
return bossError(fiber.StatusConflict, "보스 레이드 입장에 실패했습니다", err)
|
||||||
if strings.Contains(err.Error(), "이용 가능한") {
|
|
||||||
status = fiber.StatusServiceUnavailable
|
|
||||||
}
|
|
||||||
return bossError(status, "보스 레이드 입장에 실패했습니다", err)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return c.Status(fiber.StatusCreated).JSON(fiber.Map{
|
return c.Status(fiber.StatusCreated).JSON(fiber.Map{
|
||||||
@@ -212,18 +207,10 @@ func (h *Handler) ValidateEntryToken(c *fiber.Ctx) error {
|
|||||||
return apperror.Unauthorized(err.Error())
|
return apperror.Unauthorized(err.Error())
|
||||||
}
|
}
|
||||||
|
|
||||||
// 방 정보에서 파티 인원 수 조회
|
|
||||||
expectedPlayers := 0
|
|
||||||
room, roomErr := h.svc.GetRoom(sessionName)
|
|
||||||
if roomErr == nil && room != nil {
|
|
||||||
expectedPlayers = room.MaxPlayers
|
|
||||||
}
|
|
||||||
|
|
||||||
return c.JSON(fiber.Map{
|
return c.JSON(fiber.Map{
|
||||||
"valid": true,
|
"valid": true,
|
||||||
"username": username,
|
"username": username,
|
||||||
"sessionName": sessionName,
|
"sessionName": sessionName,
|
||||||
"expectedPlayers": expectedPlayers,
|
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -88,6 +88,5 @@ type RewardFailure struct {
|
|||||||
Experience int `json:"experience" gorm:"default:0;not null"`
|
Experience int `json:"experience" gorm:"default:0;not null"`
|
||||||
Error string `json:"error" gorm:"type:text"`
|
Error string `json:"error" gorm:"type:text"`
|
||||||
RetryCount int `json:"retryCount" gorm:"default:0;not null"`
|
RetryCount int `json:"retryCount" gorm:"default:0;not null"`
|
||||||
LastTxID string `json:"lastTxId" gorm:"type:varchar(100)"` // 마지막 시도한 블록체인 트랜잭션 ID (이중 지급 방지용)
|
|
||||||
ResolvedAt *time.Time `json:"resolvedAt" gorm:"index"`
|
ResolvedAt *time.Time `json:"resolvedAt" gorm:"index"`
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -64,17 +64,6 @@ func (r *Repository) CountActiveByUsername(username string) (int64, error) {
|
|||||||
return count, err
|
return count, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// FindWaitingRoomsByUsername returns all waiting rooms containing the given username.
|
|
||||||
func (r *Repository) FindWaitingRoomsByUsername(username string) ([]BossRoom, error) {
|
|
||||||
escaped := strings.NewReplacer("%", "\\%", "_", "\\_").Replace(username)
|
|
||||||
search := `"` + escaped + `"`
|
|
||||||
var rooms []BossRoom
|
|
||||||
err := r.db.Where("status = ? AND players LIKE ?",
|
|
||||||
StatusWaiting, "%"+search+"%").
|
|
||||||
Find(&rooms).Error
|
|
||||||
return rooms, err
|
|
||||||
}
|
|
||||||
|
|
||||||
// --- DedicatedServer & RoomSlot ---
|
// --- DedicatedServer & RoomSlot ---
|
||||||
|
|
||||||
// UpsertDedicatedServer creates or updates a server group by name.
|
// UpsertDedicatedServer creates or updates a server group by name.
|
||||||
@@ -224,40 +213,6 @@ func (r *Repository) DeleteRoomBySessionName(sessionName string) error {
|
|||||||
return r.db.Unscoped().Where("session_name = ?", sessionName).Delete(&BossRoom{}).Error
|
return r.db.Unscoped().Where("session_name = ?", sessionName).Delete(&BossRoom{}).Error
|
||||||
}
|
}
|
||||||
|
|
||||||
// CleanupStaleWaitingRooms deletes BossRoom records stuck in "waiting" status
|
|
||||||
// past the given threshold and resets their associated RoomSlots to idle.
|
|
||||||
// This handles cases where players disconnect during loading before the Fusion session starts.
|
|
||||||
func (r *Repository) CleanupStaleWaitingRooms(threshold time.Time) (int64, error) {
|
|
||||||
// 1. waiting 상태에서 threshold보다 오래된 방 조회
|
|
||||||
var staleRooms []BossRoom
|
|
||||||
if err := r.db.Where("status = ? AND created_at < ?", StatusWaiting, threshold).
|
|
||||||
Find(&staleRooms).Error; err != nil {
|
|
||||||
return 0, err
|
|
||||||
}
|
|
||||||
if len(staleRooms) == 0 {
|
|
||||||
return 0, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// 2. 연결된 슬롯을 idle로 리셋
|
|
||||||
staleSessionNames := make([]string, len(staleRooms))
|
|
||||||
for i, room := range staleRooms {
|
|
||||||
staleSessionNames[i] = room.SessionName
|
|
||||||
}
|
|
||||||
r.db.Model(&RoomSlot{}).
|
|
||||||
Where("session_name IN ? AND status = ?", staleSessionNames, SlotWaiting).
|
|
||||||
Updates(map[string]interface{}{
|
|
||||||
"status": SlotIdle,
|
|
||||||
"boss_room_id": nil,
|
|
||||||
})
|
|
||||||
|
|
||||||
// 3. BossRoom 레코드 하드 삭제
|
|
||||||
result := r.db.Unscoped().
|
|
||||||
Where("status = ? AND created_at < ?", StatusWaiting, threshold).
|
|
||||||
Delete(&BossRoom{})
|
|
||||||
|
|
||||||
return result.RowsAffected, result.Error
|
|
||||||
}
|
|
||||||
|
|
||||||
// ResetStaleSlots clears instanceID for slots with stale heartbeats
|
// ResetStaleSlots clears instanceID for slots with stale heartbeats
|
||||||
// and resets any active raids on those slots.
|
// and resets any active raids on those slots.
|
||||||
func (r *Repository) ResetStaleSlots(threshold time.Time) (int64, error) {
|
func (r *Repository) ResetStaleSlots(threshold time.Time) (int64, error) {
|
||||||
@@ -374,10 +329,3 @@ func (r *Repository) IncrementRetryCount(id uint, errMsg string) error {
|
|||||||
"error": errMsg,
|
"error": errMsg,
|
||||||
}).Error
|
}).Error
|
||||||
}
|
}
|
||||||
|
|
||||||
// UpdateLastTxID saves the last attempted blockchain transaction ID for idempotency checking.
|
|
||||||
func (r *Repository) UpdateLastTxID(id uint, txID string) error {
|
|
||||||
return r.db.Model(&RewardFailure{}).
|
|
||||||
Where("id = ?", id).
|
|
||||||
Update("last_tx_id", txID).Error
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -11,9 +11,8 @@ import (
|
|||||||
// RewardWorker periodically retries failed reward grants.
|
// RewardWorker periodically retries failed reward grants.
|
||||||
type RewardWorker struct {
|
type RewardWorker struct {
|
||||||
repo *Repository
|
repo *Repository
|
||||||
rewardGrant func(username string, tokenAmount uint64, assets []core.MintAssetPayload) (txID string, err error)
|
rewardGrant func(username string, tokenAmount uint64, assets []core.MintAssetPayload) error
|
||||||
expGrant func(username string, exp int) error
|
expGrant func(username string, exp int) error
|
||||||
txCheck func(txID string) (confirmed bool, err error) // 이중 지급 방지: tx 상태 확인
|
|
||||||
interval time.Duration
|
interval time.Duration
|
||||||
stopCh chan struct{}
|
stopCh chan struct{}
|
||||||
}
|
}
|
||||||
@@ -21,15 +20,13 @@ type RewardWorker struct {
|
|||||||
// NewRewardWorker creates a new RewardWorker. Default interval is 1 minute.
|
// NewRewardWorker creates a new RewardWorker. Default interval is 1 minute.
|
||||||
func NewRewardWorker(
|
func NewRewardWorker(
|
||||||
repo *Repository,
|
repo *Repository,
|
||||||
rewardGrant func(username string, tokenAmount uint64, assets []core.MintAssetPayload) (txID string, err error),
|
rewardGrant func(username string, tokenAmount uint64, assets []core.MintAssetPayload) error,
|
||||||
expGrant func(username string, exp int) error,
|
expGrant func(username string, exp int) error,
|
||||||
txCheck func(txID string) (confirmed bool, err error),
|
|
||||||
) *RewardWorker {
|
) *RewardWorker {
|
||||||
return &RewardWorker{
|
return &RewardWorker{
|
||||||
repo: repo,
|
repo: repo,
|
||||||
rewardGrant: rewardGrant,
|
rewardGrant: rewardGrant,
|
||||||
expGrant: expGrant,
|
expGrant: expGrant,
|
||||||
txCheck: txCheck,
|
|
||||||
interval: 1 * time.Minute,
|
interval: 1 * time.Minute,
|
||||||
stopCh: make(chan struct{}),
|
stopCh: make(chan struct{}),
|
||||||
}
|
}
|
||||||
@@ -74,21 +71,6 @@ func (w *RewardWorker) retryOne(rf RewardFailure) {
|
|||||||
|
|
||||||
// 블록체인 보상 재시도 (토큰 또는 에셋이 있는 경우)
|
// 블록체인 보상 재시도 (토큰 또는 에셋이 있는 경우)
|
||||||
if (rf.TokenAmount > 0 || rf.Assets != "[]") && w.rewardGrant != nil {
|
if (rf.TokenAmount > 0 || rf.Assets != "[]") && w.rewardGrant != nil {
|
||||||
// 이중 지급 방지: 마지막 tx가 이미 성공했는지 확인
|
|
||||||
if rf.LastTxID != "" && w.txCheck != nil {
|
|
||||||
confirmed, checkErr := w.txCheck(rf.LastTxID)
|
|
||||||
if checkErr != nil {
|
|
||||||
log.Printf("보상 재시도 tx 상태 확인 실패: ID=%d, txID=%s: %v", rf.ID, rf.LastTxID, checkErr)
|
|
||||||
// 상태 확인 실패 시 안전하게 재시도 건너뜀 (다음 주기에 다시 확인)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if confirmed {
|
|
||||||
log.Printf("보상 재시도 건너뜀 (이전 tx 이미 성공): ID=%d, txID=%s, %s", rf.ID, rf.LastTxID, rf.Username)
|
|
||||||
// 블록체인 보상은 이미 지급됨 → 경험치만 확인
|
|
||||||
goto expRetry
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
var assets []core.MintAssetPayload
|
var assets []core.MintAssetPayload
|
||||||
if rf.Assets != "" && rf.Assets != "[]" {
|
if rf.Assets != "" && rf.Assets != "[]" {
|
||||||
if err := json.Unmarshal([]byte(rf.Assets), &assets); err != nil {
|
if err := json.Unmarshal([]byte(rf.Assets), &assets); err != nil {
|
||||||
@@ -100,18 +82,9 @@ func (w *RewardWorker) retryOne(rf RewardFailure) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
txID, grantErr := w.rewardGrant(rf.Username, rf.TokenAmount, assets)
|
retryErr = w.rewardGrant(rf.Username, rf.TokenAmount, assets)
|
||||||
retryErr = grantErr
|
|
||||||
|
|
||||||
// 시도한 txID 저장 (다음 재시도 시 이중 지급 방지용)
|
|
||||||
if txID != "" {
|
|
||||||
if err := w.repo.UpdateLastTxID(rf.ID, txID); err != nil {
|
|
||||||
log.Printf("보상 재시도 txID 저장 실패: ID=%d: %v", rf.ID, err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
expRetry:
|
|
||||||
// 경험치 재시도 (블록체인 보상이 없거나 성공한 경우)
|
// 경험치 재시도 (블록체인 보상이 없거나 성공한 경우)
|
||||||
if retryErr == nil && rf.Experience > 0 && w.expGrant != nil {
|
if retryErr == nil && rf.Experience > 0 && w.expGrant != nil {
|
||||||
retryErr = w.expGrant(rf.Username, rf.Experience)
|
retryErr = w.expGrant(rf.Username, rf.Experience)
|
||||||
@@ -132,8 +105,7 @@ expRetry:
|
|||||||
}
|
}
|
||||||
newCount := rf.RetryCount + 1
|
newCount := rf.RetryCount + 1
|
||||||
if newCount >= 10 {
|
if newCount >= 10 {
|
||||||
log.Printf("CRITICAL: 보상 재시도 포기 (최대 횟수 초과) — 수동 복구 필요: ID=%d, session=%s, user=%s, token=%d, exp=%d",
|
log.Printf("보상 재시도 포기 (최대 횟수 초과): ID=%d, %s", rf.ID, rf.Username)
|
||||||
rf.ID, rf.SessionName, rf.Username, rf.TokenAmount, rf.Experience)
|
|
||||||
} else {
|
} else {
|
||||||
log.Printf("보상 재시도 실패 (%d/10): ID=%d, %s: %v", newCount, rf.ID, rf.Username, retryErr)
|
log.Printf("보상 재시도 실패 (%d/10): ID=%d, %s: %v", newCount, rf.ID, rf.Username, retryErr)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -22,9 +22,6 @@ const (
|
|||||||
entryTokenPrefix = "bossraid:entry:"
|
entryTokenPrefix = "bossraid:entry:"
|
||||||
// pendingEntryPrefix is the Redis key prefix for username → {sessionName, entryToken}.
|
// pendingEntryPrefix is the Redis key prefix for username → {sessionName, entryToken}.
|
||||||
pendingEntryPrefix = "bossraid:pending:"
|
pendingEntryPrefix = "bossraid:pending:"
|
||||||
// waitingRoomTimeout is the maximum time a room can stay in "waiting" status
|
|
||||||
// before being considered stale and cleaned up. Covers loading + Fusion connection + retries.
|
|
||||||
waitingRoomTimeout = 2 * time.Minute
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// entryTokenData is stored in Redis for each entry token.
|
// entryTokenData is stored in Redis for each entry token.
|
||||||
@@ -36,7 +33,7 @@ type entryTokenData struct {
|
|||||||
type Service struct {
|
type Service struct {
|
||||||
repo *Repository
|
repo *Repository
|
||||||
rdb *redis.Client
|
rdb *redis.Client
|
||||||
rewardGrant func(username string, tokenAmount uint64, assets []core.MintAssetPayload) (txID string, err error)
|
rewardGrant func(username string, tokenAmount uint64, assets []core.MintAssetPayload) error
|
||||||
expGrant func(username string, exp int) error
|
expGrant func(username string, exp int) error
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -45,8 +42,7 @@ func NewService(repo *Repository, rdb *redis.Client) *Service {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// SetRewardGranter sets the callback for granting rewards via blockchain.
|
// SetRewardGranter sets the callback for granting rewards via blockchain.
|
||||||
// The callback returns the blockchain transaction ID and an error.
|
func (s *Service) SetRewardGranter(fn func(username string, tokenAmount uint64, assets []core.MintAssetPayload) error) {
|
||||||
func (s *Service) SetRewardGranter(fn func(username string, tokenAmount uint64, assets []core.MintAssetPayload) (txID string, err error)) {
|
|
||||||
s.rewardGrant = fn
|
s.rewardGrant = fn
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -59,10 +55,8 @@ func (s *Service) SetExpGranter(fn func(username string, exp int) error) {
|
|||||||
// Allocates an idle room slot from a registered dedicated server.
|
// Allocates an idle room slot from a registered dedicated server.
|
||||||
// Returns the room with assigned session name.
|
// Returns the room with assigned session name.
|
||||||
func (s *Service) RequestEntry(usernames []string, bossID int) (*BossRoom, error) {
|
func (s *Service) RequestEntry(usernames []string, bossID int) (*BossRoom, error) {
|
||||||
// 좀비 슬롯 정리 — idle 슬롯 검색 전에 stale 인스턴스와 대기방을 리셋
|
// 좀비 슬롯 정리 — idle 슬롯 검색 전에 stale 인스턴스를 리셋
|
||||||
s.CheckStaleSlots()
|
s.CheckStaleSlots()
|
||||||
// 입장 요청 플레이어들의 stale waiting room 선제 정리
|
|
||||||
s.cleanupStaleWaitingForUsers(usernames)
|
|
||||||
|
|
||||||
if len(usernames) == 0 {
|
if len(usernames) == 0 {
|
||||||
return nil, fmt.Errorf("플레이어 목록이 비어있습니다")
|
return nil, fmt.Errorf("플레이어 목록이 비어있습니다")
|
||||||
@@ -110,7 +104,7 @@ func (s *Service) RequestEntry(usernames []string, bossID int) (*BossRoom, error
|
|||||||
SessionName: slot.SessionName,
|
SessionName: slot.SessionName,
|
||||||
BossID: bossID,
|
BossID: bossID,
|
||||||
Status: StatusWaiting,
|
Status: StatusWaiting,
|
||||||
MaxPlayers: len(usernames),
|
MaxPlayers: defaultMaxPlayers,
|
||||||
Players: string(playersJSON),
|
Players: string(playersJSON),
|
||||||
}
|
}
|
||||||
if err := txRepo.Create(room); err != nil {
|
if err := txRepo.Create(room); err != nil {
|
||||||
@@ -221,43 +215,43 @@ func (s *Service) CompleteRaid(sessionName string, rewards []PlayerReward) (*Bos
|
|||||||
hasRewardFailure := false
|
hasRewardFailure := false
|
||||||
if s.rewardGrant != nil {
|
if s.rewardGrant != nil {
|
||||||
for _, r := range rewards {
|
for _, r := range rewards {
|
||||||
// 1회만 시도 — 실패 시 즉시 RewardFailure에 저장하여 백그라운드 워커가 재시도
|
grantErr := s.grantWithRetry(r.Username, r.TokenAmount, r.Assets)
|
||||||
txID, grantErr := s.rewardGrant(r.Username, r.TokenAmount, r.Assets)
|
|
||||||
result := RewardResult{Username: r.Username, Success: grantErr == nil}
|
result := RewardResult{Username: r.Username, Success: grantErr == nil}
|
||||||
if grantErr != nil {
|
if grantErr != nil {
|
||||||
result.Error = grantErr.Error()
|
result.Error = grantErr.Error()
|
||||||
log.Printf("보상 지급 실패: %s: %v (백그라운드 재시도 예정)", r.Username, grantErr)
|
log.Printf("보상 지급 실패 (재시도 소진): %s: %v", r.Username, grantErr)
|
||||||
hasRewardFailure = true
|
hasRewardFailure = true
|
||||||
s.saveRewardFailure(sessionName, r, grantErr, txID)
|
// 실패한 보상을 DB에 기록하여 백그라운드 재시도 가능하게 함
|
||||||
|
s.saveRewardFailure(sessionName, r, grantErr)
|
||||||
}
|
}
|
||||||
resultRewards = append(resultRewards, result)
|
resultRewards = append(resultRewards, result)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Grant experience to players (1회 시도, 실패 시 백그라운드 재시도)
|
// 보상 실패가 있으면 상태를 reward_failed로 업데이트 (completed → reward_failed)
|
||||||
if s.expGrant != nil {
|
|
||||||
for _, r := range rewards {
|
|
||||||
if r.Experience > 0 {
|
|
||||||
expErr := s.expGrant(r.Username, r.Experience)
|
|
||||||
if expErr != nil {
|
|
||||||
log.Printf("경험치 지급 실패: %s: %v (백그라운드 재시도 예정)", r.Username, expErr)
|
|
||||||
hasRewardFailure = true
|
|
||||||
s.saveRewardFailure(sessionName, PlayerReward{
|
|
||||||
Username: r.Username,
|
|
||||||
Experience: r.Experience,
|
|
||||||
}, expErr, "")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// 보상 실패(블록체인 또는 경험치)가 있으면 상태를 reward_failed로 업데이트
|
|
||||||
if hasRewardFailure {
|
if hasRewardFailure {
|
||||||
if err := s.repo.TransitionRoomStatus(sessionName, StatusCompleted, StatusRewardFailed, nil); err != nil {
|
if err := s.repo.TransitionRoomStatus(sessionName, StatusCompleted, StatusRewardFailed, nil); err != nil {
|
||||||
log.Printf("보상 실패 상태 업데이트 실패: %s: %v", sessionName, err)
|
log.Printf("보상 실패 상태 업데이트 실패: %s: %v", sessionName, err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Grant experience to players (with retry)
|
||||||
|
if s.expGrant != nil {
|
||||||
|
for _, r := range rewards {
|
||||||
|
if r.Experience > 0 {
|
||||||
|
expErr := s.grantExpWithRetry(r.Username, r.Experience)
|
||||||
|
if expErr != nil {
|
||||||
|
log.Printf("경험치 지급 실패 (재시도 소진): %s: %v", r.Username, expErr)
|
||||||
|
// 경험치 실패도 RewardFailure에 기록 (토큰/에셋 없이 경험치만)
|
||||||
|
s.saveRewardFailure(sessionName, PlayerReward{
|
||||||
|
Username: r.Username,
|
||||||
|
Experience: r.Experience,
|
||||||
|
}, expErr)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// BossRoom 삭제 후 슬롯 리셋 — 다음 파티가 즉시 슬롯 재사용 가능
|
// BossRoom 삭제 후 슬롯 리셋 — 다음 파티가 즉시 슬롯 재사용 가능
|
||||||
if err := s.repo.DeleteRoomBySessionName(sessionName); err != nil {
|
if err := s.repo.DeleteRoomBySessionName(sessionName); err != nil {
|
||||||
log.Printf("BossRoom 삭제 실패 (complete): %s: %v", sessionName, err)
|
log.Printf("BossRoom 삭제 실패 (complete): %s: %v", sessionName, err)
|
||||||
@@ -406,50 +400,12 @@ func (s *Service) RequestEntryWithTokens(usernames []string, bossID int) (*BossR
|
|||||||
|
|
||||||
tokens, err := s.GenerateEntryTokens(room.SessionName, usernames)
|
tokens, err := s.GenerateEntryTokens(room.SessionName, usernames)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
// 토큰 생성 실패 시 방/슬롯 롤백
|
|
||||||
log.Printf("입장 토큰 생성 실패, 방/슬롯 롤백: session=%s: %v", room.SessionName, err)
|
|
||||||
if delErr := s.repo.DeleteRoomBySessionName(room.SessionName); delErr != nil {
|
|
||||||
log.Printf("롤백 중 방 삭제 실패: %v", delErr)
|
|
||||||
}
|
|
||||||
if resetErr := s.repo.ResetRoomSlot(room.SessionName); resetErr != nil {
|
|
||||||
log.Printf("롤백 중 슬롯 리셋 실패: %v", resetErr)
|
|
||||||
}
|
|
||||||
return nil, nil, fmt.Errorf("입장 토큰 생성 실패: %w", err)
|
return nil, nil, fmt.Errorf("입장 토큰 생성 실패: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
return room, tokens, nil
|
return room, tokens, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// cleanupStaleWaitingForUsers checks if any of the given users are stuck in
|
|
||||||
// a waiting room whose entry token has already expired or been consumed.
|
|
||||||
// If the pending token is gone from Redis, the room is abandoned and safe to remove.
|
|
||||||
// If the token still exists, the room may have active loading players — leave it alone.
|
|
||||||
func (s *Service) cleanupStaleWaitingForUsers(usernames []string) {
|
|
||||||
ctx := context.Background()
|
|
||||||
for _, username := range usernames {
|
|
||||||
rooms, err := s.repo.FindWaitingRoomsByUsername(username)
|
|
||||||
if err != nil || len(rooms) == 0 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
// pending entry token이 Redis에 남아있으면 정상 로딩 중일 수 있음 → 보존
|
|
||||||
pendingKey := pendingEntryPrefix + username
|
|
||||||
exists, _ := s.rdb.Exists(ctx, pendingKey).Result()
|
|
||||||
if exists > 0 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
// 토큰 만료/소비됨 → 방 abandoned 확정, 정리
|
|
||||||
for _, room := range rooms {
|
|
||||||
log.Printf("abandoned 대기방 정리 (토큰 만료): session=%s, player=%s", room.SessionName, username)
|
|
||||||
if err := s.repo.DeleteRoomBySessionName(room.SessionName); err != nil {
|
|
||||||
log.Printf("대기방 삭제 실패: %v", err)
|
|
||||||
}
|
|
||||||
_ = s.repo.ResetRoomSlot(room.SessionName)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// --- Dedicated Server Management ---
|
// --- Dedicated Server Management ---
|
||||||
|
|
||||||
const staleTimeout = 30 * time.Second
|
const staleTimeout = 30 * time.Second
|
||||||
@@ -500,8 +456,7 @@ func (s *Service) Heartbeat(instanceID string) error {
|
|||||||
return s.repo.UpdateHeartbeat(instanceID)
|
return s.repo.UpdateHeartbeat(instanceID)
|
||||||
}
|
}
|
||||||
|
|
||||||
// CheckStaleSlots resets slots whose instances have gone silent
|
// CheckStaleSlots resets slots whose instances have gone silent.
|
||||||
// and cleans up waiting rooms that have exceeded the timeout.
|
|
||||||
func (s *Service) CheckStaleSlots() {
|
func (s *Service) CheckStaleSlots() {
|
||||||
threshold := time.Now().Add(-staleTimeout)
|
threshold := time.Now().Add(-staleTimeout)
|
||||||
count, err := s.repo.ResetStaleSlots(threshold)
|
count, err := s.repo.ResetStaleSlots(threshold)
|
||||||
@@ -512,17 +467,6 @@ func (s *Service) CheckStaleSlots() {
|
|||||||
if count > 0 {
|
if count > 0 {
|
||||||
log.Printf("스태일 슬롯 %d개 리셋", count)
|
log.Printf("스태일 슬롯 %d개 리셋", count)
|
||||||
}
|
}
|
||||||
|
|
||||||
// waiting 상태로 너무 오래 머문 방 정리 (로딩 중 강제 종료 등)
|
|
||||||
waitingThreshold := time.Now().Add(-waitingRoomTimeout)
|
|
||||||
cleaned, err := s.repo.CleanupStaleWaitingRooms(waitingThreshold)
|
|
||||||
if err != nil {
|
|
||||||
log.Printf("스태일 대기방 정리 실패: %v", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if cleaned > 0 {
|
|
||||||
log.Printf("스태일 대기방 %d개 정리", cleaned)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// ResetRoom resets a room slot back to idle and cleans up any lingering BossRoom records.
|
// ResetRoom resets a room slot back to idle and cleans up any lingering BossRoom records.
|
||||||
@@ -548,10 +492,46 @@ func (s *Service) GetServerStatus(serverName string) (*DedicatedServer, []RoomSl
|
|||||||
return server, slots, nil
|
return server, slots, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// --- Reward helpers ---
|
// --- Reward retry helpers ---
|
||||||
|
|
||||||
|
const immediateRetries = 3
|
||||||
|
|
||||||
|
// grantWithRetry attempts the reward grant up to 3 times with backoff (1s, 2s).
|
||||||
|
func (s *Service) grantWithRetry(username string, tokenAmount uint64, assets []core.MintAssetPayload) error {
|
||||||
|
delays := []time.Duration{1 * time.Second, 2 * time.Second}
|
||||||
|
var lastErr error
|
||||||
|
for attempt := 0; attempt < immediateRetries; attempt++ {
|
||||||
|
lastErr = s.rewardGrant(username, tokenAmount, assets)
|
||||||
|
if lastErr == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
if attempt < len(delays) {
|
||||||
|
log.Printf("보상 지급 재시도 (%d/%d): %s: %v", attempt+1, immediateRetries, username, lastErr)
|
||||||
|
time.Sleep(delays[attempt])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return lastErr
|
||||||
|
}
|
||||||
|
|
||||||
|
// grantExpWithRetry attempts the experience grant up to 3 times with backoff (1s, 2s).
|
||||||
|
func (s *Service) grantExpWithRetry(username string, exp int) error {
|
||||||
|
delays := []time.Duration{1 * time.Second, 2 * time.Second}
|
||||||
|
var lastErr error
|
||||||
|
for attempt := 0; attempt < immediateRetries; attempt++ {
|
||||||
|
lastErr = s.expGrant(username, exp)
|
||||||
|
if lastErr == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
if attempt < len(delays) {
|
||||||
|
log.Printf("경험치 지급 재시도 (%d/%d): %s: %v", attempt+1, immediateRetries, username, lastErr)
|
||||||
|
time.Sleep(delays[attempt])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return lastErr
|
||||||
|
}
|
||||||
|
|
||||||
// saveRewardFailure records a failed reward in the DB for background retry.
|
// saveRewardFailure records a failed reward in the DB for background retry.
|
||||||
func (s *Service) saveRewardFailure(sessionName string, r PlayerReward, grantErr error, lastTxID string) {
|
func (s *Service) saveRewardFailure(sessionName string, r PlayerReward, grantErr error) {
|
||||||
assets := "[]"
|
assets := "[]"
|
||||||
if len(r.Assets) > 0 {
|
if len(r.Assets) > 0 {
|
||||||
if data, err := json.Marshal(r.Assets); err == nil {
|
if data, err := json.Marshal(r.Assets); err == nil {
|
||||||
@@ -565,7 +545,6 @@ func (s *Service) saveRewardFailure(sessionName string, r PlayerReward, grantErr
|
|||||||
Assets: assets,
|
Assets: assets,
|
||||||
Experience: r.Experience,
|
Experience: r.Experience,
|
||||||
Error: grantErr.Error(),
|
Error: grantErr.Error(),
|
||||||
LastTxID: lastTxID,
|
|
||||||
}
|
}
|
||||||
if err := s.repo.SaveRewardFailure(rf); err != nil {
|
if err := s.repo.SaveRewardFailure(rf); err != nil {
|
||||||
log.Printf("보상 실패 기록 저장 실패: %s/%s: %v", sessionName, r.Username, err)
|
log.Printf("보상 실패 기록 저장 실패: %s/%s: %v", sessionName, r.Username, err)
|
||||||
|
|||||||
@@ -226,8 +226,8 @@ func TestNewService_NilParams(t *testing.T) {
|
|||||||
|
|
||||||
func TestSetRewardGranter(t *testing.T) {
|
func TestSetRewardGranter(t *testing.T) {
|
||||||
svc := NewService(nil, nil)
|
svc := NewService(nil, nil)
|
||||||
svc.SetRewardGranter(func(username string, tokenAmount uint64, assets []core.MintAssetPayload) (string, error) {
|
svc.SetRewardGranter(func(username string, tokenAmount uint64, assets []core.MintAssetPayload) error {
|
||||||
return "", nil
|
return nil
|
||||||
})
|
})
|
||||||
if svc.rewardGrant == nil {
|
if svc.rewardGrant == nil {
|
||||||
t.Error("rewardGrant should be set after SetRewardGranter")
|
t.Error("rewardGrant should be set after SetRewardGranter")
|
||||||
@@ -281,7 +281,7 @@ func newMockRepo() *mockRepo {
|
|||||||
// This lets us test business rules without external dependencies.
|
// This lets us test business rules without external dependencies.
|
||||||
type testableService struct {
|
type testableService struct {
|
||||||
repo *mockRepo
|
repo *mockRepo
|
||||||
rewardGrant func(username string, tokenAmount uint64, assets []core.MintAssetPayload) (string, error)
|
rewardGrant func(username string, tokenAmount uint64, assets []core.MintAssetPayload) error
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *testableService) requestEntry(usernames []string, bossID int) (*BossRoom, error) {
|
func (s *testableService) requestEntry(usernames []string, bossID int) (*BossRoom, error) {
|
||||||
@@ -351,7 +351,7 @@ func (s *testableService) completeRaid(sessionName string, rewards []PlayerRewar
|
|||||||
var results []RewardResult
|
var results []RewardResult
|
||||||
if s.rewardGrant != nil {
|
if s.rewardGrant != nil {
|
||||||
for _, r := range rewards {
|
for _, r := range rewards {
|
||||||
_, grantErr := s.rewardGrant(r.Username, r.TokenAmount, r.Assets)
|
grantErr := s.rewardGrant(r.Username, r.TokenAmount, r.Assets)
|
||||||
res := RewardResult{Username: r.Username, Success: grantErr == nil}
|
res := RewardResult{Username: r.Username, Success: grantErr == nil}
|
||||||
if grantErr != nil {
|
if grantErr != nil {
|
||||||
res.Error = grantErr.Error()
|
res.Error = grantErr.Error()
|
||||||
@@ -453,9 +453,9 @@ func TestMock_CompleteRaid_WithRewardGranter(t *testing.T) {
|
|||||||
grantCalls := 0
|
grantCalls := 0
|
||||||
svc := &testableService{
|
svc := &testableService{
|
||||||
repo: newMockRepo(),
|
repo: newMockRepo(),
|
||||||
rewardGrant: func(username string, tokenAmount uint64, assets []core.MintAssetPayload) (string, error) {
|
rewardGrant: func(username string, tokenAmount uint64, assets []core.MintAssetPayload) error {
|
||||||
grantCalls++
|
grantCalls++
|
||||||
return "", nil
|
return nil
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
room, _ := svc.requestEntry([]string{"p1"}, 1)
|
room, _ := svc.requestEntry([]string{"p1"}, 1)
|
||||||
@@ -478,8 +478,8 @@ func TestMock_CompleteRaid_WithRewardGranter(t *testing.T) {
|
|||||||
func TestMock_CompleteRaid_RewardFailure(t *testing.T) {
|
func TestMock_CompleteRaid_RewardFailure(t *testing.T) {
|
||||||
svc := &testableService{
|
svc := &testableService{
|
||||||
repo: newMockRepo(),
|
repo: newMockRepo(),
|
||||||
rewardGrant: func(username string, tokenAmount uint64, assets []core.MintAssetPayload) (string, error) {
|
rewardGrant: func(username string, tokenAmount uint64, assets []core.MintAssetPayload) error {
|
||||||
return "", fmt.Errorf("chain error")
|
return fmt.Errorf("chain error")
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
room, _ := svc.requestEntry([]string{"p1"}, 1)
|
room, _ := svc.requestEntry([]string{"p1"}, 1)
|
||||||
|
|||||||
@@ -3,7 +3,6 @@ package chain
|
|||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"log"
|
"log"
|
||||||
"log/slog"
|
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
@@ -11,7 +10,6 @@ import (
|
|||||||
|
|
||||||
"github.com/gofiber/fiber/v2"
|
"github.com/gofiber/fiber/v2"
|
||||||
"github.com/tolelom/tolchain/core"
|
"github.com/tolelom/tolchain/core"
|
||||||
"gorm.io/gorm"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const maxLimit = 200
|
const maxLimit = 200
|
||||||
@@ -51,10 +49,6 @@ func validID(s string) bool {
|
|||||||
return s != "" && len(s) <= maxIDLength
|
return s != "" && len(s) <= maxIDLength
|
||||||
}
|
}
|
||||||
|
|
||||||
func validUsername(s string) bool {
|
|
||||||
return len(s) >= 3 && len(s) <= 50
|
|
||||||
}
|
|
||||||
|
|
||||||
// chainError classifies chain errors into appropriate HTTP responses.
|
// chainError classifies chain errors into appropriate HTTP responses.
|
||||||
// TxError (on-chain execution failure) maps to 422 with the chain's error detail.
|
// TxError (on-chain execution failure) maps to 422 with the chain's error detail.
|
||||||
// Other errors (network, timeout, build failures) remain 500.
|
// Other errors (network, timeout, build failures) remain 500.
|
||||||
@@ -117,10 +111,7 @@ func (h *Handler) GetWalletInfo(c *fiber.Ctx) error {
|
|||||||
}
|
}
|
||||||
w, err := h.svc.GetWallet(userID)
|
w, err := h.svc.GetWallet(userID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if errors.Is(err, gorm.ErrRecordNotFound) {
|
return apperror.NotFound("지갑을 찾을 수 없습니다")
|
||||||
return apperror.NotFound("지갑을 찾을 수 없습니다")
|
|
||||||
}
|
|
||||||
return apperror.Internal("지갑 조회에 실패했습니다")
|
|
||||||
}
|
}
|
||||||
return c.JSON(fiber.Map{
|
return c.JSON(fiber.Map{
|
||||||
"address": w.Address,
|
"address": w.Address,
|
||||||
@@ -583,9 +574,6 @@ func (h *Handler) GrantReward(c *fiber.Ctx) error {
|
|||||||
if !validID(req.RecipientPubKey) {
|
if !validID(req.RecipientPubKey) {
|
||||||
return apperror.BadRequest("recipientPubKey는 필수입니다")
|
return apperror.BadRequest("recipientPubKey는 필수입니다")
|
||||||
}
|
}
|
||||||
if req.TokenAmount == 0 && len(req.Assets) == 0 {
|
|
||||||
return apperror.BadRequest("tokenAmount 또는 assets가 필요합니다")
|
|
||||||
}
|
|
||||||
result, err := h.svc.GrantReward(req.RecipientPubKey, req.TokenAmount, req.Assets)
|
result, err := h.svc.GrantReward(req.RecipientPubKey, req.TokenAmount, req.Assets)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return chainError("보상 지급에 실패했습니다", err)
|
return chainError("보상 지급에 실패했습니다", err)
|
||||||
@@ -628,39 +616,6 @@ func (h *Handler) RegisterTemplate(c *fiber.Ctx) error {
|
|||||||
return c.Status(fiber.StatusCreated).JSON(result)
|
return c.Status(fiber.StatusCreated).JSON(result)
|
||||||
}
|
}
|
||||||
|
|
||||||
// ExportWallet godoc
|
|
||||||
// @Summary 개인키 내보내기
|
|
||||||
// @Description 비밀번호 확인 후 현재 유저의 지갑 개인키를 반환합니다
|
|
||||||
// @Tags Chain
|
|
||||||
// @Accept json
|
|
||||||
// @Produce json
|
|
||||||
// @Security BearerAuth
|
|
||||||
// @Param body body exportRequest true "비밀번호"
|
|
||||||
// @Success 200 {object} map[string]string
|
|
||||||
// @Failure 400 {object} docs.ErrorResponse
|
|
||||||
// @Failure 401 {object} docs.ErrorResponse
|
|
||||||
// @Router /api/chain/wallet/export [post]
|
|
||||||
type exportRequest struct {
|
|
||||||
Password string `json:"password"`
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *Handler) ExportWallet(c *fiber.Ctx) error {
|
|
||||||
userID, err := getUserID(c)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
var req exportRequest
|
|
||||||
if err := c.BodyParser(&req); err != nil || req.Password == "" {
|
|
||||||
return apperror.BadRequest("password는 필수입니다")
|
|
||||||
}
|
|
||||||
slog.Warn("wallet export requested", "userID", userID, "ip", c.IP())
|
|
||||||
privKeyHex, err := h.svc.ExportPrivKey(userID, req.Password)
|
|
||||||
if err != nil {
|
|
||||||
return apperror.Unauthorized("비밀번호가 올바르지 않습니다")
|
|
||||||
}
|
|
||||||
return c.JSON(fiber.Map{"privateKey": privKeyHex})
|
|
||||||
}
|
|
||||||
|
|
||||||
// ---- Internal Handlers (game server, username-based) ----
|
// ---- Internal Handlers (game server, username-based) ----
|
||||||
|
|
||||||
// InternalGrantReward godoc
|
// InternalGrantReward godoc
|
||||||
@@ -685,8 +640,8 @@ func (h *Handler) InternalGrantReward(c *fiber.Ctx) error {
|
|||||||
if err := c.BodyParser(&req); err != nil {
|
if err := c.BodyParser(&req); err != nil {
|
||||||
return apperror.ErrBadRequest
|
return apperror.ErrBadRequest
|
||||||
}
|
}
|
||||||
if !validUsername(req.Username) {
|
if !validID(req.Username) {
|
||||||
return apperror.BadRequest("username은 3~50자여야 합니다")
|
return apperror.BadRequest("username은 필수입니다")
|
||||||
}
|
}
|
||||||
result, err := h.svc.GrantRewardByUsername(req.Username, req.TokenAmount, req.Assets)
|
result, err := h.svc.GrantRewardByUsername(req.Username, req.TokenAmount, req.Assets)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -717,8 +672,8 @@ func (h *Handler) InternalMintAsset(c *fiber.Ctx) error {
|
|||||||
if err := c.BodyParser(&req); err != nil {
|
if err := c.BodyParser(&req); err != nil {
|
||||||
return apperror.ErrBadRequest
|
return apperror.ErrBadRequest
|
||||||
}
|
}
|
||||||
if !validID(req.TemplateID) || !validUsername(req.Username) {
|
if !validID(req.TemplateID) || !validID(req.Username) {
|
||||||
return apperror.BadRequest("templateId와 username은 필수입니다 (username: 3~50자)")
|
return apperror.BadRequest("templateId와 username은 필수입니다")
|
||||||
}
|
}
|
||||||
result, err := h.svc.MintAssetByUsername(req.TemplateID, req.Username, req.Properties)
|
result, err := h.svc.MintAssetByUsername(req.TemplateID, req.Username, req.Properties)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -740,8 +695,8 @@ func (h *Handler) InternalMintAsset(c *fiber.Ctx) error {
|
|||||||
// @Router /api/internal/chain/balance [get]
|
// @Router /api/internal/chain/balance [get]
|
||||||
func (h *Handler) InternalGetBalance(c *fiber.Ctx) error {
|
func (h *Handler) InternalGetBalance(c *fiber.Ctx) error {
|
||||||
username := c.Query("username")
|
username := c.Query("username")
|
||||||
if !validUsername(username) {
|
if !validID(username) {
|
||||||
return apperror.BadRequest("username은 3~50자여야 합니다")
|
return apperror.BadRequest("username은 필수입니다")
|
||||||
}
|
}
|
||||||
result, err := h.svc.GetBalanceByUsername(username)
|
result, err := h.svc.GetBalanceByUsername(username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -765,8 +720,8 @@ func (h *Handler) InternalGetBalance(c *fiber.Ctx) error {
|
|||||||
// @Router /api/internal/chain/assets [get]
|
// @Router /api/internal/chain/assets [get]
|
||||||
func (h *Handler) InternalGetAssets(c *fiber.Ctx) error {
|
func (h *Handler) InternalGetAssets(c *fiber.Ctx) error {
|
||||||
username := c.Query("username")
|
username := c.Query("username")
|
||||||
if !validUsername(username) {
|
if !validID(username) {
|
||||||
return apperror.BadRequest("username은 3~50자여야 합니다")
|
return apperror.BadRequest("username은 필수입니다")
|
||||||
}
|
}
|
||||||
offset, limit := parsePagination(c)
|
offset, limit := parsePagination(c)
|
||||||
result, err := h.svc.GetAssetsByUsername(username, offset, limit)
|
result, err := h.svc.GetAssetsByUsername(username, offset, limit)
|
||||||
@@ -790,8 +745,8 @@ func (h *Handler) InternalGetAssets(c *fiber.Ctx) error {
|
|||||||
// @Router /api/internal/chain/inventory [get]
|
// @Router /api/internal/chain/inventory [get]
|
||||||
func (h *Handler) InternalGetInventory(c *fiber.Ctx) error {
|
func (h *Handler) InternalGetInventory(c *fiber.Ctx) error {
|
||||||
username := c.Query("username")
|
username := c.Query("username")
|
||||||
if !validUsername(username) {
|
if !validID(username) {
|
||||||
return apperror.BadRequest("username은 3~50자여야 합니다")
|
return apperror.BadRequest("username은 필수입니다")
|
||||||
}
|
}
|
||||||
result, err := h.svc.GetInventoryByUsername(username)
|
result, err := h.svc.GetInventoryByUsername(username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|||||||
@@ -17,6 +17,4 @@ type UserWallet struct {
|
|||||||
Address string `json:"address" gorm:"type:varchar(40);uniqueIndex;not null"`
|
Address string `json:"address" gorm:"type:varchar(40);uniqueIndex;not null"`
|
||||||
EncryptedPrivKey string `json:"-" gorm:"type:varchar(512);not null"`
|
EncryptedPrivKey string `json:"-" gorm:"type:varchar(512);not null"`
|
||||||
EncNonce string `json:"-" gorm:"type:varchar(48);not null"`
|
EncNonce string `json:"-" gorm:"type:varchar(48);not null"`
|
||||||
KeyVersion int `json:"-" gorm:"type:tinyint;default:1;not null"`
|
|
||||||
HKDFSalt string `json:"-" gorm:"type:varchar(32)"` // 16 bytes hex, nullable for v1
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -29,22 +29,3 @@ func (r *Repository) FindByPubKeyHex(pubKeyHex string) (*UserWallet, error) {
|
|||||||
}
|
}
|
||||||
return &w, nil
|
return &w, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// FindAllByKeyVersion returns all wallets with the given key version.
|
|
||||||
func (r *Repository) FindAllByKeyVersion(version int) ([]UserWallet, error) {
|
|
||||||
var wallets []UserWallet
|
|
||||||
if err := r.db.Where("key_version = ?", version).Find(&wallets).Error; err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return wallets, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// UpdateEncryption updates the encryption fields of a wallet.
|
|
||||||
func (r *Repository) UpdateEncryption(id uint, encPrivKey, encNonce, hkdfSalt string, keyVersion int) error {
|
|
||||||
return r.db.Model(&UserWallet{}).Where("id = ?", id).Updates(map[string]any{
|
|
||||||
"encrypted_priv_key": encPrivKey,
|
|
||||||
"enc_nonce": encNonce,
|
|
||||||
"hkdf_salt": hkdfSalt,
|
|
||||||
"key_version": keyVersion,
|
|
||||||
}).Error
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -4,34 +4,28 @@ import (
|
|||||||
"crypto/aes"
|
"crypto/aes"
|
||||||
"crypto/cipher"
|
"crypto/cipher"
|
||||||
"crypto/rand"
|
"crypto/rand"
|
||||||
"crypto/sha256"
|
|
||||||
"encoding/hex"
|
"encoding/hex"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"log"
|
"log"
|
||||||
"strconv"
|
|
||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"a301_server/pkg/apperror"
|
|
||||||
|
|
||||||
"github.com/tolelom/tolchain/core"
|
"github.com/tolelom/tolchain/core"
|
||||||
tocrypto "github.com/tolelom/tolchain/crypto"
|
tocrypto "github.com/tolelom/tolchain/crypto"
|
||||||
"github.com/tolelom/tolchain/wallet"
|
"github.com/tolelom/tolchain/wallet"
|
||||||
"golang.org/x/crypto/hkdf"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type Service struct {
|
type Service struct {
|
||||||
repo *Repository
|
repo *Repository
|
||||||
client *Client
|
client *Client
|
||||||
chainID string
|
chainID string
|
||||||
operatorWallet *wallet.Wallet
|
operatorWallet *wallet.Wallet
|
||||||
encKeyBytes []byte // 32-byte AES-256 key
|
encKeyBytes []byte // 32-byte AES-256 key
|
||||||
userResolver func(username string) (uint, error)
|
userResolver func(username string) (uint, error)
|
||||||
passwordVerifier func(userID uint, password string) error
|
operatorMu sync.Mutex // serialises operator-nonce transactions
|
||||||
operatorMu sync.Mutex // serialises operator-nonce transactions
|
userMu sync.Map // per-user mutex (keyed by userID uint)
|
||||||
userMu sync.Map // per-user mutex (keyed by userID uint)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetUserResolver sets the callback that resolves username → userID.
|
// SetUserResolver sets the callback that resolves username → userID.
|
||||||
@@ -39,24 +33,6 @@ func (s *Service) SetUserResolver(fn func(username string) (uint, error)) {
|
|||||||
s.userResolver = fn
|
s.userResolver = fn
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Service) SetPasswordVerifier(fn func(userID uint, password string) error) {
|
|
||||||
s.passwordVerifier = fn
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *Service) ExportPrivKey(userID uint, password string) (string, error) {
|
|
||||||
if s.passwordVerifier == nil {
|
|
||||||
return "", fmt.Errorf("password verifier not configured")
|
|
||||||
}
|
|
||||||
if err := s.passwordVerifier(userID, password); err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
w, _, err := s.loadUserWallet(userID)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
return w.PrivKey().Hex(), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// resolveUsername converts a username to the user's on-chain pubKeyHex.
|
// resolveUsername converts a username to the user's on-chain pubKeyHex.
|
||||||
// If the user exists but has no wallet (e.g. legacy user or failed creation),
|
// If the user exists but has no wallet (e.g. legacy user or failed creation),
|
||||||
// a wallet is auto-created on the fly.
|
// a wallet is auto-created on the fly.
|
||||||
@@ -71,17 +47,12 @@ func (s *Service) resolveUsername(username string) (string, error) {
|
|||||||
uw, err := s.repo.FindByUserID(userID)
|
uw, err := s.repo.FindByUserID(userID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
// 지갑이 없으면 자동 생성 시도
|
// 지갑이 없으면 자동 생성 시도
|
||||||
var createErr error
|
uw, err = s.CreateWallet(userID)
|
||||||
uw, createErr = s.CreateWallet(userID)
|
if err != nil {
|
||||||
if createErr != nil {
|
// unique constraint 위반 — 다른 고루틴이 먼저 생성 완료
|
||||||
if apperror.IsDuplicateEntry(createErr) {
|
uw, err = s.repo.FindByUserID(userID)
|
||||||
// unique constraint 위반 — 다른 고루틴이 먼저 생성 완료
|
if err != nil {
|
||||||
uw, err = s.repo.FindByUserID(userID)
|
return "", fmt.Errorf("wallet auto-creation failed: %w", err)
|
||||||
if err != nil {
|
|
||||||
return "", fmt.Errorf("wallet auto-creation failed: %w", err)
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
return "", fmt.Errorf("wallet auto-creation failed: %w", createErr)
|
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
log.Printf("INFO: auto-created wallet for userID=%d (username=%s)", userID, username)
|
log.Printf("INFO: auto-created wallet for userID=%d (username=%s)", userID, username)
|
||||||
@@ -122,16 +93,6 @@ func NewService(
|
|||||||
|
|
||||||
// ---- Wallet Encryption (AES-256-GCM) ----
|
// ---- Wallet Encryption (AES-256-GCM) ----
|
||||||
|
|
||||||
func (s *Service) derivePerWalletKey(salt []byte, userID uint) ([]byte, error) {
|
|
||||||
info := []byte("wallet:" + strconv.FormatUint(uint64(userID), 10))
|
|
||||||
r := hkdf.New(sha256.New, s.encKeyBytes, salt, info)
|
|
||||||
key := make([]byte, 32)
|
|
||||||
if _, err := io.ReadFull(r, key); err != nil {
|
|
||||||
return nil, fmt.Errorf("HKDF key derivation failed: %w", err)
|
|
||||||
}
|
|
||||||
return key, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *Service) encryptPrivKey(privKey tocrypto.PrivateKey) (cipherHex, nonceHex string, err error) {
|
func (s *Service) encryptPrivKey(privKey tocrypto.PrivateKey) (cipherHex, nonceHex string, err error) {
|
||||||
block, err := aes.NewCipher(s.encKeyBytes)
|
block, err := aes.NewCipher(s.encKeyBytes)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -173,101 +134,6 @@ func (s *Service) decryptPrivKey(cipherHex, nonceHex string) (tocrypto.PrivateKe
|
|||||||
return tocrypto.PrivateKey(plaintext), nil
|
return tocrypto.PrivateKey(plaintext), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Service) encryptPrivKeyV2(privKey tocrypto.PrivateKey, userID uint) (cipherHex, nonceHex, saltHex string, err error) {
|
|
||||||
salt := make([]byte, 16)
|
|
||||||
if _, err := io.ReadFull(rand.Reader, salt); err != nil {
|
|
||||||
return "", "", "", err
|
|
||||||
}
|
|
||||||
key, err := s.derivePerWalletKey(salt, userID)
|
|
||||||
if err != nil {
|
|
||||||
return "", "", "", err
|
|
||||||
}
|
|
||||||
block, err := aes.NewCipher(key)
|
|
||||||
if err != nil {
|
|
||||||
return "", "", "", err
|
|
||||||
}
|
|
||||||
gcm, err := cipher.NewGCM(block)
|
|
||||||
if err != nil {
|
|
||||||
return "", "", "", err
|
|
||||||
}
|
|
||||||
nonce := make([]byte, gcm.NonceSize())
|
|
||||||
if _, err := io.ReadFull(rand.Reader, nonce); err != nil {
|
|
||||||
return "", "", "", err
|
|
||||||
}
|
|
||||||
cipherText := gcm.Seal(nil, nonce, []byte(privKey), nil)
|
|
||||||
return hex.EncodeToString(cipherText), hex.EncodeToString(nonce), hex.EncodeToString(salt), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *Service) decryptPrivKeyV2(cipherHex, nonceHex, saltHex string, userID uint) (tocrypto.PrivateKey, error) {
|
|
||||||
cipherText, err := hex.DecodeString(cipherHex)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
nonce, err := hex.DecodeString(nonceHex)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
salt, err := hex.DecodeString(saltHex)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
key, err := s.derivePerWalletKey(salt, userID)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
block, err := aes.NewCipher(key)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
gcm, err := cipher.NewGCM(block)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
plaintext, err := gcm.Open(nil, nonce, cipherText, nil)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("wallet decryption failed: %w", err)
|
|
||||||
}
|
|
||||||
return tocrypto.PrivateKey(plaintext), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// ---- Wallet Migration ----
|
|
||||||
|
|
||||||
// MigrateWalletKeys re-encrypts all v1 wallets using HKDF per-wallet keys.
|
|
||||||
// Each wallet is migrated individually; failures are logged and skipped.
|
|
||||||
func (s *Service) MigrateWalletKeys() error {
|
|
||||||
wallets, err := s.repo.FindAllByKeyVersion(1)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("query v1 wallets: %w", err)
|
|
||||||
}
|
|
||||||
if len(wallets) == 0 {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
log.Printf("INFO: migrating %d v1 wallets to v2 (HKDF)", len(wallets))
|
|
||||||
var migrated, failed int
|
|
||||||
for _, uw := range wallets {
|
|
||||||
privKey, err := s.decryptPrivKey(uw.EncryptedPrivKey, uw.EncNonce)
|
|
||||||
if err != nil {
|
|
||||||
log.Printf("ERROR: v1 decrypt failed for walletID=%d userID=%d: %v", uw.ID, uw.UserID, err)
|
|
||||||
failed++
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
cipherHex, nonceHex, saltHex, err := s.encryptPrivKeyV2(privKey, uw.UserID)
|
|
||||||
if err != nil {
|
|
||||||
log.Printf("ERROR: v2 encrypt failed for walletID=%d userID=%d: %v", uw.ID, uw.UserID, err)
|
|
||||||
failed++
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
if err := s.repo.UpdateEncryption(uw.ID, cipherHex, nonceHex, saltHex, 2); err != nil {
|
|
||||||
log.Printf("ERROR: DB update failed for walletID=%d userID=%d: %v", uw.ID, uw.UserID, err)
|
|
||||||
failed++
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
migrated++
|
|
||||||
}
|
|
||||||
log.Printf("INFO: wallet migration complete: %d migrated, %d failed", migrated, failed)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// ---- Wallet Management ----
|
// ---- Wallet Management ----
|
||||||
|
|
||||||
// CreateWallet generates a new keypair, encrypts it, and stores in DB.
|
// CreateWallet generates a new keypair, encrypts it, and stores in DB.
|
||||||
@@ -276,18 +142,18 @@ func (s *Service) CreateWallet(userID uint) (*UserWallet, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("key generation failed: %w", err)
|
return nil, fmt.Errorf("key generation failed: %w", err)
|
||||||
}
|
}
|
||||||
cipherHex, nonceHex, saltHex, err := s.encryptPrivKeyV2(w.PrivKey(), userID)
|
|
||||||
|
cipherHex, nonceHex, err := s.encryptPrivKey(w.PrivKey())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("key encryption failed: %w", err)
|
return nil, fmt.Errorf("key encryption failed: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
uw := &UserWallet{
|
uw := &UserWallet{
|
||||||
UserID: userID,
|
UserID: userID,
|
||||||
PubKeyHex: w.PubKey(),
|
PubKeyHex: w.PubKey(),
|
||||||
Address: w.Address(),
|
Address: w.Address(),
|
||||||
EncryptedPrivKey: cipherHex,
|
EncryptedPrivKey: cipherHex,
|
||||||
EncNonce: nonceHex,
|
EncNonce: nonceHex,
|
||||||
KeyVersion: 2,
|
|
||||||
HKDFSalt: saltHex,
|
|
||||||
}
|
}
|
||||||
if err := s.repo.Create(uw); err != nil {
|
if err := s.repo.Create(uw); err != nil {
|
||||||
return nil, fmt.Errorf("wallet save failed: %w", err)
|
return nil, fmt.Errorf("wallet save failed: %w", err)
|
||||||
@@ -305,12 +171,7 @@ func (s *Service) loadUserWallet(userID uint) (*wallet.Wallet, string, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, "", fmt.Errorf("wallet not found: %w", err)
|
return nil, "", fmt.Errorf("wallet not found: %w", err)
|
||||||
}
|
}
|
||||||
var privKey tocrypto.PrivateKey
|
privKey, err := s.decryptPrivKey(uw.EncryptedPrivKey, uw.EncNonce)
|
||||||
if uw.KeyVersion >= 2 {
|
|
||||||
privKey, err = s.decryptPrivKeyV2(uw.EncryptedPrivKey, uw.EncNonce, uw.HKDFSalt, uw.UserID)
|
|
||||||
} else {
|
|
||||||
privKey, err = s.decryptPrivKey(uw.EncryptedPrivKey, uw.EncNonce)
|
|
||||||
}
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Printf("WARNING: wallet decryption failed for userID=%d: %v", userID, err)
|
log.Printf("WARNING: wallet decryption failed for userID=%d: %v", userID, err)
|
||||||
return nil, "", fmt.Errorf("wallet decryption failed")
|
return nil, "", fmt.Errorf("wallet decryption failed")
|
||||||
|
|||||||
@@ -1,46 +0,0 @@
|
|||||||
package chain
|
|
||||||
|
|
||||||
import (
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
tocrypto "github.com/tolelom/tolchain/crypto"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestEncryptDecryptV2_Roundtrip(t *testing.T) {
|
|
||||||
s := newTestService()
|
|
||||||
priv, _, err := tocrypto.GenerateKeyPair()
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
cipherHex, nonceHex, saltHex, err := s.encryptPrivKeyV2(priv, 42)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
got, err := s.decryptPrivKeyV2(cipherHex, nonceHex, saltHex, 42)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
if got.Hex() != priv.Hex() {
|
|
||||||
t.Errorf("roundtrip mismatch: got %s, want %s", got.Hex(), priv.Hex())
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestDecryptV2_WrongUserID_Fails(t *testing.T) {
|
|
||||||
s := newTestService()
|
|
||||||
priv, _, _ := tocrypto.GenerateKeyPair()
|
|
||||||
cipherHex, nonceHex, saltHex, _ := s.encryptPrivKeyV2(priv, 42)
|
|
||||||
_, err := s.decryptPrivKeyV2(cipherHex, nonceHex, saltHex, 99)
|
|
||||||
if err == nil {
|
|
||||||
t.Error("expected error for wrong userID")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestV1V2_DifferentCiphertext(t *testing.T) {
|
|
||||||
s := newTestService()
|
|
||||||
priv, _, _ := tocrypto.GenerateKeyPair()
|
|
||||||
v1cipher, _, _ := s.encryptPrivKey(priv)
|
|
||||||
v2cipher, _, _, _ := s.encryptPrivKeyV2(priv, 1)
|
|
||||||
if v1cipher == v2cipher {
|
|
||||||
t.Error("v1 and v2 should produce different ciphertext")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -11,17 +11,13 @@ import (
|
|||||||
"path/filepath"
|
"path/filepath"
|
||||||
"regexp"
|
"regexp"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const maxLauncherSize = 500 * 1024 * 1024 // 500MB
|
|
||||||
|
|
||||||
var versionRe = regexp.MustCompile(`v\d+\.\d+(\.\d+)?`)
|
var versionRe = regexp.MustCompile(`v\d+\.\d+(\.\d+)?`)
|
||||||
|
|
||||||
type Service struct {
|
type Service struct {
|
||||||
repo *Repository
|
repo *Repository
|
||||||
gameDir string
|
gameDir string
|
||||||
uploadMu sync.Mutex
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewService(repo *Repository, gameDir string) *Service {
|
func NewService(repo *Repository, gameDir string) *Service {
|
||||||
@@ -41,9 +37,6 @@ func (s *Service) LauncherFilePath() string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (s *Service) UploadLauncher(body io.Reader, baseURL string) (*Info, error) {
|
func (s *Service) UploadLauncher(body io.Reader, baseURL string) (*Info, error) {
|
||||||
s.uploadMu.Lock()
|
|
||||||
defer s.uploadMu.Unlock()
|
|
||||||
|
|
||||||
if err := os.MkdirAll(s.gameDir, 0755); err != nil {
|
if err := os.MkdirAll(s.gameDir, 0755); err != nil {
|
||||||
return nil, fmt.Errorf("디렉토리 생성 실패: %w", err)
|
return nil, fmt.Errorf("디렉토리 생성 실패: %w", err)
|
||||||
}
|
}
|
||||||
@@ -56,7 +49,9 @@ func (s *Service) UploadLauncher(body io.Reader, baseURL string) (*Info, error)
|
|||||||
return nil, fmt.Errorf("파일 생성 실패: %w", err)
|
return nil, fmt.Errorf("파일 생성 실패: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
n, err := io.Copy(f, io.LimitReader(body, maxLauncherSize+1))
|
// NOTE: Partial uploads (client closes cleanly mid-transfer) are saved.
|
||||||
|
// The hashGameExeFromZip check mitigates this for game uploads but not for launcher uploads.
|
||||||
|
n, err := io.Copy(f, body)
|
||||||
if closeErr := f.Close(); closeErr != nil && err == nil {
|
if closeErr := f.Close(); closeErr != nil && err == nil {
|
||||||
err = closeErr
|
err = closeErr
|
||||||
}
|
}
|
||||||
@@ -66,16 +61,6 @@ func (s *Service) UploadLauncher(body io.Reader, baseURL string) (*Info, error)
|
|||||||
}
|
}
|
||||||
return nil, fmt.Errorf("파일 저장 실패: %w", err)
|
return nil, fmt.Errorf("파일 저장 실패: %w", err)
|
||||||
}
|
}
|
||||||
if n > maxLauncherSize {
|
|
||||||
os.Remove(tmpPath)
|
|
||||||
return nil, fmt.Errorf("런처 파일이 너무 큽니다 (최대 %dMB)", maxLauncherSize/1024/1024)
|
|
||||||
}
|
|
||||||
|
|
||||||
// PE 헤더 검증 (MZ magic bytes)
|
|
||||||
if err := validatePEHeader(tmpPath); err != nil {
|
|
||||||
os.Remove(tmpPath)
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := os.Rename(tmpPath, finalPath); err != nil {
|
if err := os.Rename(tmpPath, finalPath); err != nil {
|
||||||
if removeErr := os.Remove(tmpPath); removeErr != nil {
|
if removeErr := os.Remove(tmpPath); removeErr != nil {
|
||||||
@@ -103,9 +88,6 @@ func (s *Service) UploadLauncher(body io.Reader, baseURL string) (*Info, error)
|
|||||||
|
|
||||||
// Upload streams the body directly to disk, then extracts metadata from the zip.
|
// Upload streams the body directly to disk, then extracts metadata from the zip.
|
||||||
func (s *Service) Upload(filename string, body io.Reader, baseURL string) (*Info, error) {
|
func (s *Service) Upload(filename string, body io.Reader, baseURL string) (*Info, error) {
|
||||||
s.uploadMu.Lock()
|
|
||||||
defer s.uploadMu.Unlock()
|
|
||||||
|
|
||||||
if err := os.MkdirAll(s.gameDir, 0755); err != nil {
|
if err := os.MkdirAll(s.gameDir, 0755); err != nil {
|
||||||
return nil, fmt.Errorf("디렉토리 생성 실패: %w", err)
|
return nil, fmt.Errorf("디렉토리 생성 실패: %w", err)
|
||||||
}
|
}
|
||||||
@@ -171,22 +153,6 @@ func (s *Service) Upload(filename string, body io.Reader, baseURL string) (*Info
|
|||||||
return info, s.repo.Save(info)
|
return info, s.repo.Save(info)
|
||||||
}
|
}
|
||||||
|
|
||||||
func validatePEHeader(path string) error {
|
|
||||||
f, err := os.Open(path)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("파일 검증 실패: %w", err)
|
|
||||||
}
|
|
||||||
defer f.Close()
|
|
||||||
header := make([]byte, 2)
|
|
||||||
if _, err := io.ReadFull(f, header); err != nil {
|
|
||||||
return fmt.Errorf("유효하지 않은 실행 파일입니다")
|
|
||||||
}
|
|
||||||
if header[0] != 'M' || header[1] != 'Z' {
|
|
||||||
return fmt.Errorf("유효하지 않은 실행 파일입니다")
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func hashFileToHex(path string) string {
|
func hashFileToHex(path string) string {
|
||||||
f, err := os.Open(path)
|
f, err := os.Open(path)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -215,17 +181,12 @@ func hashGameExeFromZip(zipPath string) string {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
lr := io.LimitReader(rc, maxExeSize+1)
|
|
||||||
h := sha256.New()
|
h := sha256.New()
|
||||||
n, err := io.Copy(h, lr)
|
_, err = io.Copy(h, io.LimitReader(rc, maxExeSize))
|
||||||
rc.Close()
|
rc.Close()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
if n > maxExeSize {
|
|
||||||
log.Printf("WARNING: A301.exe exceeds %dMB, hash may be inaccurate", maxExeSize/1024/1024)
|
|
||||||
return ""
|
|
||||||
}
|
|
||||||
return hex.EncodeToString(h.Sum(nil))
|
return hex.EncodeToString(h.Sum(nil))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -8,8 +8,8 @@ import (
|
|||||||
|
|
||||||
// validateGameData checks that game data fields are within acceptable ranges.
|
// validateGameData checks that game data fields are within acceptable ranges.
|
||||||
func validateGameData(data *GameDataRequest) error {
|
func validateGameData(data *GameDataRequest) error {
|
||||||
if data.Level != nil && (*data.Level < 1 || *data.Level > MaxLevel) {
|
if data.Level != nil && (*data.Level < 1 || *data.Level > 999) {
|
||||||
return fmt.Errorf("레벨은 1~%d 범위여야 합니다", MaxLevel)
|
return fmt.Errorf("레벨은 1~999 범위여야 합니다")
|
||||||
}
|
}
|
||||||
if data.Experience != nil && *data.Experience < 0 {
|
if data.Experience != nil && *data.Experience < 0 {
|
||||||
return fmt.Errorf("경험치는 0 이상이어야 합니다")
|
return fmt.Errorf("경험치는 0 이상이어야 합니다")
|
||||||
|
|||||||
@@ -5,7 +5,6 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"a301_server/pkg/apperror"
|
"a301_server/pkg/apperror"
|
||||||
"a301_server/pkg/config"
|
|
||||||
"a301_server/pkg/metrics"
|
"a301_server/pkg/metrics"
|
||||||
"a301_server/pkg/middleware"
|
"a301_server/pkg/middleware"
|
||||||
|
|
||||||
@@ -13,7 +12,6 @@ import (
|
|||||||
"github.com/gofiber/fiber/v2/middleware/cors"
|
"github.com/gofiber/fiber/v2/middleware/cors"
|
||||||
"github.com/gofiber/fiber/v2/middleware/limiter"
|
"github.com/gofiber/fiber/v2/middleware/limiter"
|
||||||
"github.com/gofiber/fiber/v2/middleware/logger"
|
"github.com/gofiber/fiber/v2/middleware/logger"
|
||||||
"github.com/gofiber/fiber/v2/middleware/recover"
|
|
||||||
"github.com/redis/go-redis/v9"
|
"github.com/redis/go-redis/v9"
|
||||||
"gorm.io/gorm"
|
"gorm.io/gorm"
|
||||||
)
|
)
|
||||||
@@ -25,9 +23,6 @@ func New() *fiber.App {
|
|||||||
BodyLimit: 4 * 1024 * 1024 * 1024, // 4GB
|
BodyLimit: 4 * 1024 * 1024 * 1024, // 4GB
|
||||||
ErrorHandler: middleware.ErrorHandler,
|
ErrorHandler: middleware.ErrorHandler,
|
||||||
})
|
})
|
||||||
app.Use(recover.New(recover.Config{
|
|
||||||
EnableStackTrace: true,
|
|
||||||
}))
|
|
||||||
app.Use(middleware.RequestID)
|
app.Use(middleware.RequestID)
|
||||||
app.Use(middleware.Metrics)
|
app.Use(middleware.Metrics)
|
||||||
app.Get("/metrics", metrics.Handler)
|
app.Get("/metrics", metrics.Handler)
|
||||||
@@ -37,10 +32,9 @@ func New() *fiber.App {
|
|||||||
}))
|
}))
|
||||||
app.Use(middleware.SecurityHeaders)
|
app.Use(middleware.SecurityHeaders)
|
||||||
app.Use(cors.New(cors.Config{
|
app.Use(cors.New(cors.Config{
|
||||||
AllowOrigins: config.C.CORSAllowOrigins,
|
AllowOrigins: "https://a301.tolelom.xyz",
|
||||||
AllowHeaders: "Origin, Content-Type, Authorization, Idempotency-Key, X-API-Key, X-Requested-With",
|
AllowHeaders: "Origin, Content-Type, Authorization, Idempotency-Key, X-API-Key, X-Requested-With",
|
||||||
AllowMethods: "GET, POST, PUT, PATCH, DELETE",
|
AllowMethods: "GET, POST, PUT, PATCH, DELETE",
|
||||||
ExposeHeaders: "X-Request-ID, X-Idempotent-Replay",
|
|
||||||
AllowCredentials: true,
|
AllowCredentials: true,
|
||||||
}))
|
}))
|
||||||
return app
|
return app
|
||||||
@@ -60,10 +54,10 @@ func AuthLimiter() fiber.Handler {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
// APILimiter returns a rate limiter for general API endpoints (120 req/min per IP).
|
// APILimiter returns a rate limiter for general API endpoints (60 req/min per IP).
|
||||||
func APILimiter() fiber.Handler {
|
func APILimiter() fiber.Handler {
|
||||||
return limiter.New(limiter.Config{
|
return limiter.New(limiter.Config{
|
||||||
Max: 120,
|
Max: 60,
|
||||||
Expiration: 1 * time.Minute,
|
Expiration: 1 * time.Minute,
|
||||||
KeyGenerator: func(c *fiber.Ctx) string {
|
KeyGenerator: func(c *fiber.Ctx) string {
|
||||||
return c.IP()
|
return c.IP()
|
||||||
@@ -74,21 +68,6 @@ func APILimiter() fiber.Handler {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
// RefreshLimiter returns a rate limiter for refresh token endpoint (5 req/min per IP).
|
|
||||||
// Separate from AuthLimiter to avoid NAT collisions while still preventing abuse.
|
|
||||||
func RefreshLimiter() fiber.Handler {
|
|
||||||
return limiter.New(limiter.Config{
|
|
||||||
Max: 5,
|
|
||||||
Expiration: 1 * time.Minute,
|
|
||||||
KeyGenerator: func(c *fiber.Ctx) string {
|
|
||||||
return "refresh:" + c.IP()
|
|
||||||
},
|
|
||||||
LimitReached: func(c *fiber.Ctx) error {
|
|
||||||
return apperror.ErrRateLimited
|
|
||||||
},
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
// ChainUserLimiter returns a rate limiter for chain transactions (20 req/min per user).
|
// ChainUserLimiter returns a rate limiter for chain transactions (20 req/min per user).
|
||||||
func ChainUserLimiter() fiber.Handler {
|
func ChainUserLimiter() fiber.Handler {
|
||||||
return limiter.New(limiter.Config{
|
return limiter.New(limiter.Config{
|
||||||
|
|||||||
84
main.go
84
main.go
@@ -75,11 +75,6 @@ func main() {
|
|||||||
}
|
}
|
||||||
chainHandler := chain.NewHandler(chainSvc)
|
chainHandler := chain.NewHandler(chainSvc)
|
||||||
|
|
||||||
// Migrate v1 wallets to v2 (HKDF per-wallet keys)
|
|
||||||
if err := chainSvc.MigrateWalletKeys(); err != nil {
|
|
||||||
log.Fatalf("wallet key migration failed: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
userResolver := func(username string) (uint, error) {
|
userResolver := func(username string) (uint, error) {
|
||||||
user, err := authRepo.FindByUsername(username)
|
user, err := authRepo.FindByUsername(username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -93,7 +88,6 @@ func main() {
|
|||||||
_, err := chainSvc.CreateWallet(userID)
|
_, err := chainSvc.CreateWallet(userID)
|
||||||
return err
|
return err
|
||||||
})
|
})
|
||||||
chainSvc.SetPasswordVerifier(authSvc.VerifyPassword)
|
|
||||||
|
|
||||||
playerRepo := player.NewRepository(db)
|
playerRepo := player.NewRepository(db)
|
||||||
playerSvc := player.NewService(playerRepo)
|
playerSvc := player.NewService(playerRepo)
|
||||||
@@ -112,12 +106,9 @@ func main() {
|
|||||||
|
|
||||||
brRepo := bossraid.NewRepository(db)
|
brRepo := bossraid.NewRepository(db)
|
||||||
brSvc := bossraid.NewService(brRepo, rdb)
|
brSvc := bossraid.NewService(brRepo, rdb)
|
||||||
brSvc.SetRewardGranter(func(username string, tokenAmount uint64, assets []core.MintAssetPayload) (string, error) {
|
brSvc.SetRewardGranter(func(username string, tokenAmount uint64, assets []core.MintAssetPayload) error {
|
||||||
result, err := chainSvc.GrantRewardByUsername(username, tokenAmount, assets)
|
_, err := chainSvc.GrantRewardByUsername(username, tokenAmount, assets)
|
||||||
if result != nil {
|
return err
|
||||||
return result.TxID, err
|
|
||||||
}
|
|
||||||
return "", err
|
|
||||||
})
|
})
|
||||||
brSvc.SetExpGranter(func(username string, exp int) error {
|
brSvc.SetExpGranter(func(username string, exp int) error {
|
||||||
return playerSvc.GrantExperienceByUsername(username, exp)
|
return playerSvc.GrantExperienceByUsername(username, exp)
|
||||||
@@ -146,7 +137,7 @@ func main() {
|
|||||||
|
|
||||||
routes.Register(app, authHandler, annHandler, dlHandler, chainHandler, brHandler, playerHandler,
|
routes.Register(app, authHandler, annHandler, dlHandler, chainHandler, brHandler, playerHandler,
|
||||||
server.AuthLimiter(), server.APILimiter(), server.HealthCheck(), server.ReadyCheck(db, rdb),
|
server.AuthLimiter(), server.APILimiter(), server.HealthCheck(), server.ReadyCheck(db, rdb),
|
||||||
server.ChainUserLimiter(), authMw, serverAuthMw, idempotencyReqMw, server.RefreshLimiter())
|
server.ChainUserLimiter(), authMw, serverAuthMw, idempotencyReqMw)
|
||||||
|
|
||||||
// ── 백그라운드 워커 ──────────────────────────────────────────────
|
// ── 백그라운드 워커 ──────────────────────────────────────────────
|
||||||
|
|
||||||
@@ -160,59 +151,42 @@ func main() {
|
|||||||
|
|
||||||
rewardWorker := bossraid.NewRewardWorker(
|
rewardWorker := bossraid.NewRewardWorker(
|
||||||
brRepo,
|
brRepo,
|
||||||
func(username string, tokenAmount uint64, assets []core.MintAssetPayload) (string, error) {
|
func(username string, tokenAmount uint64, assets []core.MintAssetPayload) error {
|
||||||
result, err := chainSvc.GrantRewardByUsername(username, tokenAmount, assets)
|
_, err := chainSvc.GrantRewardByUsername(username, tokenAmount, assets)
|
||||||
if result != nil {
|
return err
|
||||||
return result.TxID, err
|
|
||||||
}
|
|
||||||
return "", err
|
|
||||||
},
|
},
|
||||||
func(username string, exp int) error {
|
func(username string, exp int) error {
|
||||||
return playerSvc.GrantExperienceByUsername(username, exp)
|
return playerSvc.GrantExperienceByUsername(username, exp)
|
||||||
},
|
},
|
||||||
func(txID string) (bool, error) {
|
|
||||||
result, err := chainClient.GetTxStatus(txID)
|
|
||||||
if err != nil {
|
|
||||||
return false, err
|
|
||||||
}
|
|
||||||
return result != nil && result.Success, nil
|
|
||||||
},
|
|
||||||
)
|
)
|
||||||
rewardWorker.Start()
|
rewardWorker.Start()
|
||||||
|
|
||||||
// ── Graceful shutdown ────────────────────────────────────────────
|
// ── Graceful shutdown ────────────────────────────────────────────
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
if err := app.Listen(":" + config.C.AppPort); err != nil {
|
sigCh := make(chan os.Signal, 1)
|
||||||
log.Printf("서버 Listen 종료: %v", err)
|
signal.Notify(sigCh, syscall.SIGINT, syscall.SIGTERM)
|
||||||
|
sig := <-sigCh
|
||||||
|
log.Printf("수신된 시그널: %v — 서버 종료 중...", sig)
|
||||||
|
rewardWorker.Stop()
|
||||||
|
if err := app.ShutdownWithTimeout(10 * time.Second); err != nil {
|
||||||
|
log.Printf("서버 종료 실패: %v", err)
|
||||||
|
}
|
||||||
|
if rdb != nil {
|
||||||
|
if err := rdb.Close(); err != nil {
|
||||||
|
log.Printf("Redis 종료 실패: %v", err)
|
||||||
|
} else {
|
||||||
|
log.Println("Redis 연결 종료 완료")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if sqlDB, err := db.DB(); err == nil {
|
||||||
|
if err := sqlDB.Close(); err != nil {
|
||||||
|
log.Printf("MySQL 종료 실패: %v", err)
|
||||||
|
} else {
|
||||||
|
log.Println("MySQL 연결 종료 완료")
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
sigCh := make(chan os.Signal, 1)
|
log.Fatal(app.Listen(":" + config.C.AppPort))
|
||||||
signal.Notify(sigCh, syscall.SIGINT, syscall.SIGTERM)
|
|
||||||
sig := <-sigCh
|
|
||||||
log.Printf("수신된 시그널: %v — 서버 종료 중...", sig)
|
|
||||||
|
|
||||||
rewardWorker.Stop()
|
|
||||||
|
|
||||||
if err := app.ShutdownWithTimeout(10 * time.Second); err != nil {
|
|
||||||
log.Printf("서버 종료 실패: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if rdb != nil {
|
|
||||||
if err := rdb.Close(); err != nil {
|
|
||||||
log.Printf("Redis 종료 실패: %v", err)
|
|
||||||
} else {
|
|
||||||
log.Println("Redis 연결 종료 완료")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if sqlDB, err := db.DB(); err == nil {
|
|
||||||
if err := sqlDB.Close(); err != nil {
|
|
||||||
log.Printf("MySQL 종료 실패: %v", err)
|
|
||||||
} else {
|
|
||||||
log.Println("MySQL 연결 종료 완료")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Println("서버 종료 완료")
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,12 +1,6 @@
|
|||||||
package apperror
|
package apperror
|
||||||
|
|
||||||
import (
|
import "fmt"
|
||||||
"errors"
|
|
||||||
"fmt"
|
|
||||||
"strings"
|
|
||||||
|
|
||||||
"github.com/go-sql-driver/mysql"
|
|
||||||
)
|
|
||||||
|
|
||||||
// AppError is a structured application error with an HTTP status code.
|
// AppError is a structured application error with an HTTP status code.
|
||||||
// JSON response format: {"error": "<code>", "message": "<human-readable message>"}
|
// JSON response format: {"error": "<code>", "message": "<human-readable message>"}
|
||||||
@@ -63,15 +57,3 @@ func Conflict(message string) *AppError {
|
|||||||
func Internal(message string) *AppError {
|
func Internal(message string) *AppError {
|
||||||
return &AppError{Code: "internal_error", Message: message, Status: 500}
|
return &AppError{Code: "internal_error", Message: message, Status: 500}
|
||||||
}
|
}
|
||||||
|
|
||||||
// ErrDuplicateUsername is returned when a username already exists.
|
|
||||||
var ErrDuplicateUsername = fmt.Errorf("이미 사용 중인 아이디입니다")
|
|
||||||
|
|
||||||
// IsDuplicateEntry checks if a GORM error is a MySQL duplicate key violation (error 1062).
|
|
||||||
func IsDuplicateEntry(err error) bool {
|
|
||||||
var mysqlErr *mysql.MySQLError
|
|
||||||
if errors.As(err, &mysqlErr) {
|
|
||||||
return mysqlErr.Number == 1062
|
|
||||||
}
|
|
||||||
return strings.Contains(err.Error(), "Duplicate entry") || strings.Contains(err.Error(), "UNIQUE constraint")
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -2,7 +2,6 @@ package config
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"log"
|
"log"
|
||||||
"net/url"
|
|
||||||
"os"
|
"os"
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
@@ -36,9 +35,6 @@ type Config struct {
|
|||||||
OperatorKeyHex string
|
OperatorKeyHex string
|
||||||
WalletEncryptionKey string
|
WalletEncryptionKey string
|
||||||
|
|
||||||
// CORS
|
|
||||||
CORSAllowOrigins string
|
|
||||||
|
|
||||||
// Server-to-server auth
|
// Server-to-server auth
|
||||||
InternalAPIKey string
|
InternalAPIKey string
|
||||||
|
|
||||||
@@ -76,8 +72,6 @@ func Load() {
|
|||||||
OperatorKeyHex: getEnv("OPERATOR_KEY_HEX", ""),
|
OperatorKeyHex: getEnv("OPERATOR_KEY_HEX", ""),
|
||||||
WalletEncryptionKey: getEnv("WALLET_ENCRYPTION_KEY", ""),
|
WalletEncryptionKey: getEnv("WALLET_ENCRYPTION_KEY", ""),
|
||||||
|
|
||||||
CORSAllowOrigins: getEnv("CORS_ALLOW_ORIGINS", "https://a301.tolelom.xyz"),
|
|
||||||
|
|
||||||
InternalAPIKey: getEnv("INTERNAL_API_KEY", ""),
|
InternalAPIKey: getEnv("INTERNAL_API_KEY", ""),
|
||||||
|
|
||||||
SSAFYClientID: getEnv("SSAFY_CLIENT_ID", ""),
|
SSAFYClientID: getEnv("SSAFY_CLIENT_ID", ""),
|
||||||
@@ -89,9 +83,6 @@ func Load() {
|
|||||||
if raw := getEnv("CHAIN_NODE_URLS", ""); raw != "" {
|
if raw := getEnv("CHAIN_NODE_URLS", ""); raw != "" {
|
||||||
for _, u := range strings.Split(raw, ",") {
|
for _, u := range strings.Split(raw, ",") {
|
||||||
if u = strings.TrimSpace(u); u != "" {
|
if u = strings.TrimSpace(u); u != "" {
|
||||||
if parsed, err := url.Parse(u); err != nil || parsed.Scheme == "" || parsed.Host == "" {
|
|
||||||
log.Fatalf("FATAL: invalid CHAIN_NODE_URL: %q (must be http:// or https://)", u)
|
|
||||||
}
|
|
||||||
C.ChainNodeURLs = append(C.ChainNodeURLs, u)
|
C.ChainNodeURLs = append(C.ChainNodeURLs, u)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -123,23 +114,8 @@ func WarnInsecureDefaults() {
|
|||||||
log.Println("WARNING: WALLET_ENCRYPTION_KEY is empty — blockchain wallet features will fail")
|
log.Println("WARNING: WALLET_ENCRYPTION_KEY is empty — blockchain wallet features will fail")
|
||||||
}
|
}
|
||||||
|
|
||||||
if isProd {
|
|
||||||
if C.DBPassword == "" {
|
|
||||||
log.Println("FATAL: DB_PASSWORD must be set in production")
|
|
||||||
insecure = true
|
|
||||||
}
|
|
||||||
if C.OperatorKeyHex == "" {
|
|
||||||
log.Println("FATAL: OPERATOR_KEY_HEX must be set in production")
|
|
||||||
insecure = true
|
|
||||||
}
|
|
||||||
if C.InternalAPIKey == "" {
|
|
||||||
log.Println("FATAL: INTERNAL_API_KEY must be set in production")
|
|
||||||
insecure = true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if isProd && insecure {
|
if isProd && insecure {
|
||||||
log.Fatal("FATAL: insecure defaults detected in production — check warnings above")
|
log.Fatal("FATAL: insecure default secrets detected in production — set JWT_SECRET, REFRESH_SECRET, and ADMIN_PASSWORD")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ import (
|
|||||||
|
|
||||||
func ConnectMySQL() (*gorm.DB, error) {
|
func ConnectMySQL() (*gorm.DB, error) {
|
||||||
c := config.C
|
c := config.C
|
||||||
dsn := fmt.Sprintf("%s:%s@tcp(%s:%s)/%s?charset=utf8mb4&parseTime=True&loc=UTC",
|
dsn := fmt.Sprintf("%s:%s@tcp(%s:%s)/%s?charset=utf8mb4&parseTime=True&loc=Local",
|
||||||
c.DBUser, c.DBPassword, c.DBHost, c.DBPort, c.DBName,
|
c.DBUser, c.DBPassword, c.DBHost, c.DBPort, c.DBName,
|
||||||
)
|
)
|
||||||
db, err := gorm.Open(mysql.Open(dsn), &gorm.Config{})
|
db, err := gorm.Open(mysql.Open(dsn), &gorm.Config{})
|
||||||
|
|||||||
@@ -9,41 +9,23 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
// ErrorHandler is a Fiber error handler that returns structured JSON for AppError.
|
// ErrorHandler is a Fiber error handler that returns structured JSON for AppError.
|
||||||
// Includes requestID in error responses for log correlation.
|
|
||||||
func ErrorHandler(c *fiber.Ctx, err error) error {
|
func ErrorHandler(c *fiber.Ctx, err error) error {
|
||||||
requestID, _ := c.Locals("requestID").(string)
|
|
||||||
|
|
||||||
var appErr *apperror.AppError
|
var appErr *apperror.AppError
|
||||||
if errors.As(err, &appErr) {
|
if errors.As(err, &appErr) {
|
||||||
resp := fiber.Map{
|
return c.Status(appErr.Status).JSON(appErr)
|
||||||
"error": appErr.Code,
|
|
||||||
"message": appErr.Message,
|
|
||||||
}
|
|
||||||
if requestID != "" {
|
|
||||||
resp["requestId"] = requestID
|
|
||||||
}
|
|
||||||
return c.Status(appErr.Status).JSON(resp)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Default Fiber error handling
|
// Default Fiber error handling
|
||||||
var fiberErr *fiber.Error
|
var fiberErr *fiber.Error
|
||||||
if errors.As(err, &fiberErr) {
|
if errors.As(err, &fiberErr) {
|
||||||
resp := fiber.Map{
|
return c.Status(fiberErr.Code).JSON(fiber.Map{
|
||||||
"error": "server_error",
|
"error": "server_error",
|
||||||
"message": fiberErr.Message,
|
"message": fiberErr.Message,
|
||||||
}
|
})
|
||||||
if requestID != "" {
|
|
||||||
resp["requestId"] = requestID
|
|
||||||
}
|
|
||||||
return c.Status(fiberErr.Code).JSON(resp)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
resp := fiber.Map{
|
return c.Status(500).JSON(fiber.Map{
|
||||||
"error": "internal_error",
|
"error": "internal_error",
|
||||||
"message": "서버 오류가 발생했습니다",
|
"message": "서버 오류가 발생했습니다",
|
||||||
}
|
})
|
||||||
if requestID != "" {
|
|
||||||
resp["requestId"] = requestID
|
|
||||||
}
|
|
||||||
return c.Status(500).JSON(resp)
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -49,7 +49,7 @@ func Idempotency(rdb *redis.Client) fiber.Handler {
|
|||||||
if uid, ok := c.Locals("userID").(uint); ok {
|
if uid, ok := c.Locals("userID").(uint); ok {
|
||||||
redisKey += fmt.Sprintf("u%d:", uid)
|
redisKey += fmt.Sprintf("u%d:", uid)
|
||||||
}
|
}
|
||||||
redisKey += c.Method() + ":" + c.Route().Path + ":" + key
|
redisKey += key
|
||||||
|
|
||||||
ctx, cancel := context.WithTimeout(context.Background(), redisTimeout)
|
ctx, cancel := context.WithTimeout(context.Background(), redisTimeout)
|
||||||
defer cancel()
|
defer cancel()
|
||||||
@@ -57,9 +57,9 @@ func Idempotency(rdb *redis.Client) fiber.Handler {
|
|||||||
// Atomically claim the key using SET NX (only succeeds if key doesn't exist)
|
// Atomically claim the key using SET NX (only succeeds if key doesn't exist)
|
||||||
set, err := rdb.SetNX(ctx, redisKey, "processing", idempotencyTTL).Result()
|
set, err := rdb.SetNX(ctx, redisKey, "processing", idempotencyTTL).Result()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
// Redis error — reject to prevent duplicate transactions
|
// Redis error — let the request through rather than blocking
|
||||||
log.Printf("ERROR: idempotency SetNX failed (key=%s): %v", key, err)
|
log.Printf("WARNING: idempotency SetNX failed (key=%s): %v", key, err)
|
||||||
return apperror.New("internal_error", "서버 오류가 발생했습니다. 잠시 후 다시 시도해주세요", 503)
|
return c.Next()
|
||||||
}
|
}
|
||||||
|
|
||||||
if !set {
|
if !set {
|
||||||
|
|||||||
@@ -28,7 +28,6 @@ func Register(
|
|||||||
authMw fiber.Handler,
|
authMw fiber.Handler,
|
||||||
serverAuthMw fiber.Handler,
|
serverAuthMw fiber.Handler,
|
||||||
idempotencyReqMw fiber.Handler,
|
idempotencyReqMw fiber.Handler,
|
||||||
refreshLimiter fiber.Handler,
|
|
||||||
) {
|
) {
|
||||||
// Swagger UI
|
// Swagger UI
|
||||||
app.Get("/swagger/*", swagger.HandlerDefault)
|
app.Get("/swagger/*", swagger.HandlerDefault)
|
||||||
@@ -81,7 +80,7 @@ func Register(
|
|||||||
a := api.Group("/auth")
|
a := api.Group("/auth")
|
||||||
a.Post("/register", authLimiter, authH.Register)
|
a.Post("/register", authLimiter, authH.Register)
|
||||||
a.Post("/login", authLimiter, authH.Login)
|
a.Post("/login", authLimiter, authH.Login)
|
||||||
a.Post("/refresh", refreshLimiter, authH.Refresh)
|
a.Post("/refresh", authLimiter, authH.Refresh)
|
||||||
a.Post("/logout", authMw, authH.Logout)
|
a.Post("/logout", authMw, authH.Logout)
|
||||||
// /verify moved to internal API (ServerAuth) — see internal section below
|
// /verify moved to internal API (ServerAuth) — see internal section below
|
||||||
a.Get("/ssafy/login", authH.SSAFYLoginURL)
|
a.Get("/ssafy/login", authH.SSAFYLoginURL)
|
||||||
@@ -113,7 +112,6 @@ func Register(
|
|||||||
// Chain - Queries (authenticated)
|
// Chain - Queries (authenticated)
|
||||||
ch := api.Group("/chain", authMw)
|
ch := api.Group("/chain", authMw)
|
||||||
ch.Get("/wallet", chainH.GetWalletInfo)
|
ch.Get("/wallet", chainH.GetWalletInfo)
|
||||||
ch.Post("/wallet/export", chainH.ExportWallet)
|
|
||||||
ch.Get("/balance", chainH.GetBalance)
|
ch.Get("/balance", chainH.GetBalance)
|
||||||
ch.Get("/assets", chainH.GetAssets)
|
ch.Get("/assets", chainH.GetAssets)
|
||||||
ch.Get("/asset/:id", chainH.GetAsset)
|
ch.Get("/asset/:id", chainH.GetAsset)
|
||||||
|
|||||||
Reference in New Issue
Block a user