permserver.go 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216
  1. package server
  2. import (
  3. "context"
  4. "time"
  5. "perms-system-server/internal/consts"
  6. authHelper "perms-system-server/internal/logic/auth"
  7. "perms-system-server/internal/middleware"
  8. permModel "perms-system-server/internal/model/perm"
  9. "perms-system-server/internal/svc"
  10. "perms-system-server/pb"
  11. "github.com/golang-jwt/jwt/v4"
  12. "golang.org/x/crypto/bcrypt"
  13. "google.golang.org/grpc/codes"
  14. "google.golang.org/grpc/status"
  15. )
  16. type PermServer struct {
  17. svcCtx *svc.ServiceContext
  18. pb.UnimplementedPermServiceServer
  19. }
  20. func NewPermServer(svcCtx *svc.ServiceContext) *PermServer {
  21. return &PermServer{svcCtx: svcCtx}
  22. }
  23. func (s *PermServer) SyncPermissions(ctx context.Context, req *pb.SyncPermissionsReq) (*pb.SyncPermissionsResp, error) {
  24. product, err := s.svcCtx.SysProductModel.FindOneByAppKey(ctx, req.AppKey)
  25. if err != nil {
  26. return nil, status.Error(codes.Unauthenticated, "无效的appKey")
  27. }
  28. if product.AppSecret != req.AppSecret {
  29. return nil, status.Error(codes.Unauthenticated, "appSecret验证失败")
  30. }
  31. if product.Status != consts.StatusEnabled {
  32. return nil, status.Error(codes.PermissionDenied, "产品已被禁用")
  33. }
  34. existingMap, err := s.svcCtx.SysPermModel.FindMapByProductCode(ctx, product.Code)
  35. if err != nil {
  36. return nil, status.Error(codes.Internal, "查询权限数据失败")
  37. }
  38. now := time.Now().Unix()
  39. var added, updated int64
  40. codeList := make([]string, 0, len(req.Perms))
  41. var toInsert []*permModel.SysPerm
  42. var toUpdate []*permModel.SysPerm
  43. for _, item := range req.Perms {
  44. codeList = append(codeList, item.Code)
  45. existing, ok := existingMap[item.Code]
  46. if !ok {
  47. toInsert = append(toInsert, &permModel.SysPerm{
  48. ProductCode: product.Code,
  49. Name: item.Name,
  50. Code: item.Code,
  51. Remark: item.Remark,
  52. Status: consts.StatusEnabled,
  53. CreateTime: now,
  54. UpdateTime: now,
  55. })
  56. added++
  57. continue
  58. }
  59. if existing.Name != item.Name || existing.Remark != item.Remark || existing.Status != consts.StatusEnabled {
  60. existing.Name = item.Name
  61. existing.Remark = item.Remark
  62. existing.Status = consts.StatusEnabled
  63. existing.UpdateTime = now
  64. toUpdate = append(toUpdate, existing)
  65. updated++
  66. }
  67. }
  68. if len(toInsert) > 0 {
  69. if err := s.svcCtx.SysPermModel.BatchInsert(ctx, toInsert); err != nil {
  70. return nil, status.Error(codes.Internal, "批量插入权限失败")
  71. }
  72. }
  73. if len(toUpdate) > 0 {
  74. if err := s.svcCtx.SysPermModel.BatchUpdate(ctx, toUpdate); err != nil {
  75. return nil, status.Error(codes.Internal, "批量更新权限失败")
  76. }
  77. }
  78. disabled, err := s.svcCtx.SysPermModel.DisableNotInCodes(ctx, product.Code, codeList, now)
  79. if err != nil {
  80. return nil, status.Error(codes.Internal, "禁用权限失败")
  81. }
  82. if added > 0 || updated > 0 || disabled > 0 {
  83. s.svcCtx.UserDetailsLoader.CleanByProduct(ctx, product.Code)
  84. }
  85. return &pb.SyncPermissionsResp{Added: added, Updated: updated, Disabled: disabled}, nil
  86. }
  87. func (s *PermServer) Login(ctx context.Context, req *pb.LoginReq) (*pb.LoginResp, error) {
  88. if req.ProductCode == "" {
  89. return nil, status.Error(codes.InvalidArgument, "productCode不能为空")
  90. }
  91. user, err := s.svcCtx.SysUserModel.FindOneByUsername(ctx, req.Username)
  92. if err != nil {
  93. return nil, status.Error(codes.Unauthenticated, "用户名或密码错误")
  94. }
  95. if user.Status != consts.StatusEnabled {
  96. return nil, status.Error(codes.PermissionDenied, "账号已被冻结")
  97. }
  98. if err := bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(req.Password)); err != nil {
  99. return nil, status.Error(codes.Unauthenticated, "用户名或密码错误")
  100. }
  101. if user.IsSuperAdmin == consts.IsSuperAdminYes {
  102. return nil, status.Error(codes.PermissionDenied, "超级管理员不允许通过产品端登录")
  103. }
  104. ud := s.svcCtx.UserDetailsLoader.Load(ctx, user.Id, req.ProductCode)
  105. accessToken, err := authHelper.GenerateAccessToken(
  106. s.svcCtx.Config.Auth.AccessSecret, s.svcCtx.Config.Auth.AccessExpire,
  107. ud.UserId, ud.Username, ud.ProductCode, ud.MemberType, ud.Perms,
  108. )
  109. if err != nil {
  110. return nil, status.Error(codes.Internal, "生成token失败")
  111. }
  112. refreshToken, err := authHelper.GenerateRefreshToken(
  113. s.svcCtx.Config.Auth.RefreshSecret, s.svcCtx.Config.Auth.RefreshExpire,
  114. ud.UserId, ud.ProductCode,
  115. )
  116. if err != nil {
  117. return nil, status.Error(codes.Internal, "生成token失败")
  118. }
  119. return &pb.LoginResp{
  120. AccessToken: accessToken,
  121. RefreshToken: refreshToken,
  122. Expires: time.Now().Unix() + s.svcCtx.Config.Auth.AccessExpire,
  123. UserId: ud.UserId,
  124. Username: ud.Username,
  125. MemberType: ud.MemberType,
  126. Perms: ud.Perms,
  127. }, nil
  128. }
  129. func (s *PermServer) RefreshToken(ctx context.Context, req *pb.RefreshTokenReq) (*pb.RefreshTokenResp, error) {
  130. claims, err := authHelper.ParseRefreshToken(req.RefreshToken, s.svcCtx.Config.Auth.RefreshSecret)
  131. if err != nil {
  132. return nil, status.Error(codes.Unauthenticated, "refreshToken无效或已过期")
  133. }
  134. productCode := req.ProductCode
  135. if productCode == "" {
  136. productCode = claims.ProductCode
  137. }
  138. ud := s.svcCtx.UserDetailsLoader.Load(ctx, claims.UserId, productCode)
  139. if ud.Status != consts.StatusEnabled {
  140. return nil, status.Error(codes.PermissionDenied, "账号已被冻结")
  141. }
  142. accessToken, err := authHelper.GenerateAccessToken(
  143. s.svcCtx.Config.Auth.AccessSecret, s.svcCtx.Config.Auth.AccessExpire,
  144. ud.UserId, ud.Username, ud.ProductCode, ud.MemberType, ud.Perms,
  145. )
  146. if err != nil {
  147. return nil, status.Error(codes.Internal, "生成token失败")
  148. }
  149. return &pb.RefreshTokenResp{
  150. AccessToken: accessToken,
  151. RefreshToken: req.RefreshToken,
  152. Expires: time.Now().Unix() + s.svcCtx.Config.Auth.AccessExpire,
  153. }, nil
  154. }
  155. func (s *PermServer) VerifyToken(ctx context.Context, req *pb.VerifyTokenReq) (*pb.VerifyTokenResp, error) {
  156. token, err := jwt.ParseWithClaims(req.AccessToken, &middleware.Claims{}, func(token *jwt.Token) (interface{}, error) {
  157. return []byte(s.svcCtx.Config.Auth.AccessSecret), nil
  158. })
  159. if err != nil || !token.Valid {
  160. return &pb.VerifyTokenResp{Valid: false}, nil
  161. }
  162. claims, ok := token.Claims.(*middleware.Claims)
  163. if !ok || claims.TokenType != consts.TokenTypeAccess {
  164. return &pb.VerifyTokenResp{Valid: false}, nil
  165. }
  166. return &pb.VerifyTokenResp{
  167. Valid: true,
  168. UserId: claims.UserId,
  169. Username: claims.Username,
  170. MemberType: claims.MemberType,
  171. Perms: claims.Perms,
  172. }, nil
  173. }
  174. func (s *PermServer) GetUserPerms(ctx context.Context, req *pb.GetUserPermsReq) (*pb.GetUserPermsResp, error) {
  175. ud := s.svcCtx.UserDetailsLoader.Load(ctx, req.UserId, req.ProductCode)
  176. if ud.Username == "" {
  177. return nil, status.Error(codes.NotFound, "用户不存在")
  178. }
  179. return &pb.GetUserPermsResp{
  180. MemberType: ud.MemberType,
  181. Perms: ud.Perms,
  182. }, nil
  183. }