| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465 |
- package svc
- import (
- "perms-system-server/internal/config"
- "perms-system-server/internal/loaders"
- "perms-system-server/internal/middleware"
- "perms-system-server/internal/model"
- "github.com/zeromicro/go-zero/core/limit"
- "github.com/zeromicro/go-zero/core/stores/redis"
- "github.com/zeromicro/go-zero/core/stores/sqlx"
- "github.com/zeromicro/go-zero/rest"
- )
- type ServiceContext struct {
- Config config.Config
- JwtAuth rest.Middleware
- ProductLoginRateLimit rest.Middleware
- AdminLoginRateLimit rest.Middleware
- SyncRateLimit rest.Middleware
- RefreshTokenRateLimit rest.Middleware
- GrpcLoginLimiter *limit.PeriodLimit
- GrpcRefreshLimiter *limit.PeriodLimit
- GrpcVerifyLimiter *limit.PeriodLimit
- UsernameLoginLimit *limit.PeriodLimit
- TokenOpLimiter *limit.PeriodLimit
- UserDetailsLoader *loaders.UserDetailsLoader
- Redis *redis.Redis
- *model.Models
- }
- func NewServiceContext(c config.Config) *ServiceContext {
- conn := sqlx.NewMysql(c.MySQL.DataSource)
- rds := redis.MustNewRedis(c.CacheRedis.Nodes[0].RedisConf)
- models := model.NewModels(conn, c.CacheRedis.Nodes, c.CacheRedis.KeyPrefix)
- udLoader := loaders.NewUserDetailsLoader(rds, c.CacheRedis.KeyPrefix, models)
- productLoginRL := middleware.NewRateLimitMiddleware(rds, 60, 30, c.CacheRedis.KeyPrefix+":rl:login:product", c.BehindProxy)
- adminLoginRL := middleware.NewRateLimitMiddleware(rds, 60, 20, c.CacheRedis.KeyPrefix+":rl:login:admin", c.BehindProxy)
- syncRlMiddleware := middleware.NewRateLimitMiddleware(rds, 60, 10, c.CacheRedis.KeyPrefix+":rl:sync", c.BehindProxy)
- refreshTokenRL := middleware.NewRateLimitMiddleware(rds, 60, 30, c.CacheRedis.KeyPrefix+":rl:refresh", c.BehindProxy)
- grpcLimiter := limit.NewPeriodLimit(60, 20, rds, c.CacheRedis.KeyPrefix+":rl:grpc:login")
- // gRPC refreshToken 一般低频操作(分钟级),限紧一点可以同时防签名爆破与并发刷新被用作会话劫持的放大器。
- grpcRefreshLimiter := limit.NewPeriodLimit(60, 30, rds, c.CacheRedis.KeyPrefix+":rl:grpc:refresh")
- // gRPC verifyToken 是下游每请求都会调用的热路径,阈值必须足够高;这里的作用是兜底防止下游被攻破后把权限中心当 token oracle 爆破。
- grpcVerifyLimiter := limit.NewPeriodLimit(60, 6000, rds, c.CacheRedis.KeyPrefix+":rl:grpc:verify")
- usernameLimiter := limit.NewPeriodLimit(300, 10, rds, c.CacheRedis.KeyPrefix+":rl:user")
- tokenOpLimiter := limit.NewPeriodLimit(60, 10, rds, c.CacheRedis.KeyPrefix+":rl:tokenop")
- return &ServiceContext{
- Config: c,
- JwtAuth: middleware.NewJwtAuthMiddleware(c.Auth.AccessSecret, udLoader).Handle,
- ProductLoginRateLimit: productLoginRL.Handle,
- AdminLoginRateLimit: adminLoginRL.Handle,
- SyncRateLimit: syncRlMiddleware.Handle,
- RefreshTokenRateLimit: refreshTokenRL.Handle,
- GrpcLoginLimiter: grpcLimiter,
- GrpcRefreshLimiter: grpcRefreshLimiter,
- GrpcVerifyLimiter: grpcVerifyLimiter,
- UsernameLoginLimit: usernameLimiter,
- TokenOpLimiter: tokenOpLimiter,
- UserDetailsLoader: udLoader,
- Redis: rds,
- Models: models,
- }
- }
|