permserver.go 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235
  1. package server
  2. import (
  3. "context"
  4. "fmt"
  5. "net"
  6. "time"
  7. "perms-system-server/internal/consts"
  8. authHelper "perms-system-server/internal/logic/auth"
  9. pub "perms-system-server/internal/logic/pub"
  10. "perms-system-server/internal/middleware"
  11. "perms-system-server/internal/svc"
  12. "perms-system-server/pb"
  13. "github.com/golang-jwt/jwt/v4"
  14. "github.com/zeromicro/go-zero/core/limit"
  15. "golang.org/x/crypto/bcrypt"
  16. "google.golang.org/grpc/codes"
  17. "google.golang.org/grpc/peer"
  18. "google.golang.org/grpc/status"
  19. )
  20. type PermServer struct {
  21. svcCtx *svc.ServiceContext
  22. pb.UnimplementedPermServiceServer
  23. }
  24. func NewPermServer(svcCtx *svc.ServiceContext) *PermServer {
  25. return &PermServer{svcCtx: svcCtx}
  26. }
  27. func (s *PermServer) SyncPermissions(ctx context.Context, req *pb.SyncPermissionsReq) (*pb.SyncPermissionsResp, error) {
  28. items := make([]pub.SyncPermItem, len(req.Perms))
  29. for i, p := range req.Perms {
  30. items[i] = pub.SyncPermItem{Code: p.Code, Name: p.Name, Remark: p.Remark}
  31. }
  32. result, err := pub.ExecuteSyncPerms(ctx, s.svcCtx, req.AppKey, req.AppSecret, items)
  33. if err != nil {
  34. if se, ok := err.(*pub.SyncPermsError); ok {
  35. switch se.Code {
  36. case 400:
  37. return nil, status.Error(codes.InvalidArgument, se.Message)
  38. case 401:
  39. return nil, status.Error(codes.Unauthenticated, se.Message)
  40. case 403:
  41. return nil, status.Error(codes.PermissionDenied, se.Message)
  42. default:
  43. return nil, status.Error(codes.Internal, se.Message)
  44. }
  45. }
  46. return nil, status.Error(codes.Internal, "同步权限失败")
  47. }
  48. return &pb.SyncPermissionsResp{Added: result.Added, Updated: result.Updated, Disabled: result.Disabled}, nil
  49. }
  50. func (s *PermServer) Login(ctx context.Context, req *pb.LoginReq) (*pb.LoginResp, error) {
  51. if s.svcCtx.GrpcLoginLimiter != nil {
  52. p, ok := peer.FromContext(ctx)
  53. if ok {
  54. ip, _, _ := net.SplitHostPort(p.Addr.String())
  55. if ip == "" {
  56. ip = p.Addr.String()
  57. }
  58. code, _ := s.svcCtx.GrpcLoginLimiter.Take(fmt.Sprintf("grpc:login:%s", ip))
  59. if code == limit.OverQuota {
  60. return nil, status.Error(codes.ResourceExhausted, "请求过于频繁,请稍后再试")
  61. }
  62. }
  63. }
  64. if req.ProductCode == "" {
  65. return nil, status.Error(codes.InvalidArgument, "productCode不能为空")
  66. }
  67. result, err := pub.ValidateProductLogin(ctx, s.svcCtx, req.Username, req.Password, req.ProductCode)
  68. if err != nil {
  69. if le, ok := err.(*pub.LoginError); ok {
  70. switch le.Code {
  71. case 400:
  72. return nil, status.Error(codes.InvalidArgument, le.Message)
  73. case 401:
  74. return nil, status.Error(codes.Unauthenticated, le.Message)
  75. case 403:
  76. return nil, status.Error(codes.PermissionDenied, le.Message)
  77. case 429:
  78. return nil, status.Error(codes.ResourceExhausted, le.Message)
  79. }
  80. }
  81. return nil, status.Error(codes.Internal, "登录失败")
  82. }
  83. ud := result.UserDetails
  84. return &pb.LoginResp{
  85. AccessToken: result.AccessToken,
  86. RefreshToken: result.RefreshToken,
  87. Expires: time.Now().Unix() + s.svcCtx.Config.Auth.AccessExpire,
  88. UserId: ud.UserId,
  89. Username: ud.Username,
  90. Nickname: ud.Nickname,
  91. MemberType: ud.MemberType,
  92. Perms: ud.Perms,
  93. }, nil
  94. }
  95. func (s *PermServer) RefreshToken(ctx context.Context, req *pb.RefreshTokenReq) (*pb.RefreshTokenResp, error) {
  96. claims, err := authHelper.ParseRefreshToken(req.RefreshToken, s.svcCtx.Config.Auth.RefreshSecret)
  97. if err != nil {
  98. return nil, status.Error(codes.Unauthenticated, "refreshToken无效或已过期")
  99. }
  100. productCode := claims.ProductCode
  101. if req.ProductCode != "" && req.ProductCode != productCode {
  102. return nil, status.Error(codes.InvalidArgument, "刷新令牌不允许切换产品")
  103. }
  104. ud := s.svcCtx.UserDetailsLoader.Load(ctx, claims.UserId, productCode)
  105. if ud.Status != consts.StatusEnabled {
  106. return nil, status.Error(codes.PermissionDenied, "账号已被冻结")
  107. }
  108. if productCode != "" && ud.ProductStatus != consts.StatusEnabled {
  109. return nil, status.Error(codes.PermissionDenied, "该产品已被禁用")
  110. }
  111. if productCode != "" && !ud.IsSuperAdmin && ud.MemberType == "" {
  112. return nil, status.Error(codes.PermissionDenied, "您已不是该产品的成员")
  113. }
  114. if claims.TokenVersion != ud.TokenVersion {
  115. return nil, status.Error(codes.Unauthenticated, "登录状态已失效,请重新登录")
  116. }
  117. newVersion, err := s.svcCtx.SysUserModel.IncrementTokenVersion(ctx, claims.UserId)
  118. if err != nil {
  119. return nil, status.Error(codes.Internal, "刷新token失败")
  120. }
  121. s.svcCtx.UserDetailsLoader.Clean(ctx, claims.UserId)
  122. accessToken, err := authHelper.GenerateAccessToken(
  123. s.svcCtx.Config.Auth.AccessSecret, s.svcCtx.Config.Auth.AccessExpire,
  124. ud.UserId, ud.Username, ud.ProductCode, ud.MemberType, newVersion,
  125. )
  126. if err != nil {
  127. return nil, status.Error(codes.Internal, "生成token失败")
  128. }
  129. newRefreshToken, err := authHelper.GenerateRefreshTokenWithExpiry(
  130. s.svcCtx.Config.Auth.RefreshSecret,
  131. claims.ExpiresAt.Time,
  132. ud.UserId, ud.ProductCode, newVersion,
  133. )
  134. if err != nil {
  135. return nil, status.Error(codes.Unauthenticated, "refreshToken已过期,请重新登录")
  136. }
  137. return &pb.RefreshTokenResp{
  138. AccessToken: accessToken,
  139. RefreshToken: newRefreshToken,
  140. Expires: time.Now().Unix() + s.svcCtx.Config.Auth.AccessExpire,
  141. }, nil
  142. }
  143. func (s *PermServer) VerifyToken(ctx context.Context, req *pb.VerifyTokenReq) (*pb.VerifyTokenResp, error) {
  144. token, err := jwt.ParseWithClaims(req.AccessToken, &middleware.Claims{}, func(token *jwt.Token) (interface{}, error) {
  145. return []byte(s.svcCtx.Config.Auth.AccessSecret), nil
  146. })
  147. if err != nil || !token.Valid {
  148. return &pb.VerifyTokenResp{Valid: false}, nil
  149. }
  150. claims, ok := token.Claims.(*middleware.Claims)
  151. if !ok || claims.TokenType != consts.TokenTypeAccess {
  152. return &pb.VerifyTokenResp{Valid: false}, nil
  153. }
  154. ud := s.svcCtx.UserDetailsLoader.Load(ctx, claims.UserId, claims.ProductCode)
  155. if ud.Status != consts.StatusEnabled {
  156. return &pb.VerifyTokenResp{Valid: false}, nil
  157. }
  158. if claims.ProductCode != "" && ud.ProductStatus != consts.StatusEnabled {
  159. return &pb.VerifyTokenResp{Valid: false}, nil
  160. }
  161. if claims.ProductCode != "" && !ud.IsSuperAdmin && ud.MemberType == "" {
  162. return &pb.VerifyTokenResp{Valid: false}, nil
  163. }
  164. if claims.TokenVersion != ud.TokenVersion {
  165. return &pb.VerifyTokenResp{Valid: false}, nil
  166. }
  167. return &pb.VerifyTokenResp{
  168. Valid: true,
  169. UserId: ud.UserId,
  170. Username: ud.Username,
  171. MemberType: ud.MemberType,
  172. Perms: ud.Perms,
  173. ProductCode: claims.ProductCode,
  174. }, nil
  175. }
  176. func (s *PermServer) GetUserPerms(ctx context.Context, req *pb.GetUserPermsReq) (*pb.GetUserPermsResp, error) {
  177. product, err := s.svcCtx.SysProductModel.FindOneByAppKey(ctx, req.AppKey)
  178. if err != nil {
  179. return nil, status.Error(codes.Unauthenticated, "无效的appKey")
  180. }
  181. if err := bcrypt.CompareHashAndPassword([]byte(product.AppSecret), []byte(req.AppSecret)); err != nil {
  182. return nil, status.Error(codes.Unauthenticated, "appSecret验证失败")
  183. }
  184. if product.Status != consts.StatusEnabled {
  185. return nil, status.Error(codes.PermissionDenied, "产品已被禁用")
  186. }
  187. if product.Code != req.ProductCode {
  188. return nil, status.Error(codes.InvalidArgument, "appKey与productCode不匹配")
  189. }
  190. ud := s.svcCtx.UserDetailsLoader.Load(ctx, req.UserId, req.ProductCode)
  191. if ud.Username == "" {
  192. return nil, status.Error(codes.NotFound, "用户不存在")
  193. }
  194. if ud.Status != consts.StatusEnabled {
  195. return nil, status.Error(codes.PermissionDenied, "用户已被冻结")
  196. }
  197. if !ud.IsSuperAdmin && ud.MemberType == "" {
  198. return nil, status.Error(codes.PermissionDenied, "用户不是该产品的有效成员")
  199. }
  200. return &pb.GetUserPermsResp{
  201. MemberType: ud.MemberType,
  202. Perms: ud.Perms,
  203. }, nil
  204. }