diff --git a/src/Controller/OAuth2Controller.php b/src/Controller/OAuth2Controller.php index c614716..2427772 100644 --- a/src/Controller/OAuth2Controller.php +++ b/src/Controller/OAuth2Controller.php @@ -3,6 +3,8 @@ namespace App\Controller; use App\Service\AccessTokenService; +use App\Service\LoggerService; +use App\Service\UserService; use Psr\Log\LoggerInterface; use Psr\Log\LogLevel; use Symfony\Bundle\FrameworkBundle\Controller\AbstractController; @@ -18,17 +20,20 @@ class OAuth2Controller extends AbstractController { - + public function __construct(private readonly LoggerService $loggerService, private readonly UserService $userService) + { + } #[Route('/oauth2/userinfo', name: 'userinfo', methods: ['GET'])] public function userinfo(Request $request): JsonResponse { $user = $this->getUser(); -// dd($user); if (!$user) { + $this->loggerService->logAccessDenied($user->getId()); return new JsonResponse(['error' => 'Unauthorized'], 401); } + $this->loggerService->logUserAction($user->getId(), $user->getId(), 'Accessed userinfo endpoint'); return new JsonResponse([ 'id' => $user->getId(), 'name' => $user->getName(), @@ -66,7 +71,7 @@ class OAuth2Controller extends AbstractController if (!$userIdentifier) { return new JsonResponse(["ERROR" => "User identifier is required"], Response::HTTP_BAD_REQUEST); } - $accessTokenService->revokeTokens($userIdentifier); + $accessTokenService->revokeUserTokens($userIdentifier); $logger->info("Revoke tokens successfully"); return new JsonResponse(["SUCCESS" => "Tokens revoked successfully"], Response::HTTP_OK);