| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235 |
- package server
- import (
- "context"
- "fmt"
- "net"
- "time"
- "perms-system-server/internal/consts"
- authHelper "perms-system-server/internal/logic/auth"
- pub "perms-system-server/internal/logic/pub"
- "perms-system-server/internal/middleware"
- "perms-system-server/internal/svc"
- "perms-system-server/pb"
- "github.com/golang-jwt/jwt/v4"
- "github.com/zeromicro/go-zero/core/limit"
- "golang.org/x/crypto/bcrypt"
- "google.golang.org/grpc/codes"
- "google.golang.org/grpc/peer"
- "google.golang.org/grpc/status"
- )
- type PermServer struct {
- svcCtx *svc.ServiceContext
- pb.UnimplementedPermServiceServer
- }
- func NewPermServer(svcCtx *svc.ServiceContext) *PermServer {
- return &PermServer{svcCtx: svcCtx}
- }
- func (s *PermServer) SyncPermissions(ctx context.Context, req *pb.SyncPermissionsReq) (*pb.SyncPermissionsResp, error) {
- items := make([]pub.SyncPermItem, len(req.Perms))
- for i, p := range req.Perms {
- items[i] = pub.SyncPermItem{Code: p.Code, Name: p.Name, Remark: p.Remark}
- }
- result, err := pub.ExecuteSyncPerms(ctx, s.svcCtx, req.AppKey, req.AppSecret, items)
- if err != nil {
- if se, ok := err.(*pub.SyncPermsError); ok {
- switch se.Code {
- case 400:
- return nil, status.Error(codes.InvalidArgument, se.Message)
- case 401:
- return nil, status.Error(codes.Unauthenticated, se.Message)
- case 403:
- return nil, status.Error(codes.PermissionDenied, se.Message)
- default:
- return nil, status.Error(codes.Internal, se.Message)
- }
- }
- return nil, status.Error(codes.Internal, "同步权限失败")
- }
- return &pb.SyncPermissionsResp{Added: result.Added, Updated: result.Updated, Disabled: result.Disabled}, nil
- }
- func (s *PermServer) Login(ctx context.Context, req *pb.LoginReq) (*pb.LoginResp, error) {
- if s.svcCtx.GrpcLoginLimiter != nil {
- p, ok := peer.FromContext(ctx)
- if ok {
- ip, _, _ := net.SplitHostPort(p.Addr.String())
- if ip == "" {
- ip = p.Addr.String()
- }
- code, _ := s.svcCtx.GrpcLoginLimiter.Take(fmt.Sprintf("grpc:login:%s", ip))
- if code == limit.OverQuota {
- return nil, status.Error(codes.ResourceExhausted, "请求过于频繁,请稍后再试")
- }
- }
- }
- if req.ProductCode == "" {
- return nil, status.Error(codes.InvalidArgument, "productCode不能为空")
- }
- result, err := pub.ValidateProductLogin(ctx, s.svcCtx, req.Username, req.Password, req.ProductCode)
- if err != nil {
- if le, ok := err.(*pub.LoginError); ok {
- switch le.Code {
- case 400:
- return nil, status.Error(codes.InvalidArgument, le.Message)
- case 401:
- return nil, status.Error(codes.Unauthenticated, le.Message)
- case 403:
- return nil, status.Error(codes.PermissionDenied, le.Message)
- case 429:
- return nil, status.Error(codes.ResourceExhausted, le.Message)
- }
- }
- return nil, status.Error(codes.Internal, "登录失败")
- }
- ud := result.UserDetails
- return &pb.LoginResp{
- AccessToken: result.AccessToken,
- RefreshToken: result.RefreshToken,
- Expires: time.Now().Unix() + s.svcCtx.Config.Auth.AccessExpire,
- UserId: ud.UserId,
- Username: ud.Username,
- Nickname: ud.Nickname,
- MemberType: ud.MemberType,
- Perms: ud.Perms,
- }, nil
- }
- func (s *PermServer) RefreshToken(ctx context.Context, req *pb.RefreshTokenReq) (*pb.RefreshTokenResp, error) {
- claims, err := authHelper.ParseRefreshToken(req.RefreshToken, s.svcCtx.Config.Auth.RefreshSecret)
- if err != nil {
- return nil, status.Error(codes.Unauthenticated, "refreshToken无效或已过期")
- }
- productCode := claims.ProductCode
- if req.ProductCode != "" && req.ProductCode != productCode {
- return nil, status.Error(codes.InvalidArgument, "刷新令牌不允许切换产品")
- }
- ud := s.svcCtx.UserDetailsLoader.Load(ctx, claims.UserId, productCode)
- if ud.Status != consts.StatusEnabled {
- return nil, status.Error(codes.PermissionDenied, "账号已被冻结")
- }
- if productCode != "" && ud.ProductStatus != consts.StatusEnabled {
- return nil, status.Error(codes.PermissionDenied, "该产品已被禁用")
- }
- if productCode != "" && !ud.IsSuperAdmin && ud.MemberType == "" {
- return nil, status.Error(codes.PermissionDenied, "您已不是该产品的成员")
- }
- if claims.TokenVersion != ud.TokenVersion {
- return nil, status.Error(codes.Unauthenticated, "登录状态已失效,请重新登录")
- }
- newVersion, err := s.svcCtx.SysUserModel.IncrementTokenVersion(ctx, claims.UserId)
- if err != nil {
- return nil, status.Error(codes.Internal, "刷新token失败")
- }
- s.svcCtx.UserDetailsLoader.Clean(ctx, claims.UserId)
- accessToken, err := authHelper.GenerateAccessToken(
- s.svcCtx.Config.Auth.AccessSecret, s.svcCtx.Config.Auth.AccessExpire,
- ud.UserId, ud.Username, ud.ProductCode, ud.MemberType, newVersion,
- )
- if err != nil {
- return nil, status.Error(codes.Internal, "生成token失败")
- }
- newRefreshToken, err := authHelper.GenerateRefreshTokenWithExpiry(
- s.svcCtx.Config.Auth.RefreshSecret,
- claims.ExpiresAt.Time,
- ud.UserId, ud.ProductCode, newVersion,
- )
- if err != nil {
- return nil, status.Error(codes.Unauthenticated, "refreshToken已过期,请重新登录")
- }
- return &pb.RefreshTokenResp{
- AccessToken: accessToken,
- RefreshToken: newRefreshToken,
- Expires: time.Now().Unix() + s.svcCtx.Config.Auth.AccessExpire,
- }, nil
- }
- func (s *PermServer) VerifyToken(ctx context.Context, req *pb.VerifyTokenReq) (*pb.VerifyTokenResp, error) {
- token, err := jwt.ParseWithClaims(req.AccessToken, &middleware.Claims{}, func(token *jwt.Token) (interface{}, error) {
- return []byte(s.svcCtx.Config.Auth.AccessSecret), nil
- })
- if err != nil || !token.Valid {
- return &pb.VerifyTokenResp{Valid: false}, nil
- }
- claims, ok := token.Claims.(*middleware.Claims)
- if !ok || claims.TokenType != consts.TokenTypeAccess {
- return &pb.VerifyTokenResp{Valid: false}, nil
- }
- ud := s.svcCtx.UserDetailsLoader.Load(ctx, claims.UserId, claims.ProductCode)
- if ud.Status != consts.StatusEnabled {
- return &pb.VerifyTokenResp{Valid: false}, nil
- }
- if claims.ProductCode != "" && ud.ProductStatus != consts.StatusEnabled {
- return &pb.VerifyTokenResp{Valid: false}, nil
- }
- if claims.ProductCode != "" && !ud.IsSuperAdmin && ud.MemberType == "" {
- return &pb.VerifyTokenResp{Valid: false}, nil
- }
- if claims.TokenVersion != ud.TokenVersion {
- return &pb.VerifyTokenResp{Valid: false}, nil
- }
- return &pb.VerifyTokenResp{
- Valid: true,
- UserId: ud.UserId,
- Username: ud.Username,
- MemberType: ud.MemberType,
- Perms: ud.Perms,
- ProductCode: claims.ProductCode,
- }, nil
- }
- func (s *PermServer) GetUserPerms(ctx context.Context, req *pb.GetUserPermsReq) (*pb.GetUserPermsResp, error) {
- product, err := s.svcCtx.SysProductModel.FindOneByAppKey(ctx, req.AppKey)
- if err != nil {
- return nil, status.Error(codes.Unauthenticated, "无效的appKey")
- }
- if err := bcrypt.CompareHashAndPassword([]byte(product.AppSecret), []byte(req.AppSecret)); err != nil {
- return nil, status.Error(codes.Unauthenticated, "appSecret验证失败")
- }
- if product.Status != consts.StatusEnabled {
- return nil, status.Error(codes.PermissionDenied, "产品已被禁用")
- }
- if product.Code != req.ProductCode {
- return nil, status.Error(codes.InvalidArgument, "appKey与productCode不匹配")
- }
- ud := s.svcCtx.UserDetailsLoader.Load(ctx, req.UserId, req.ProductCode)
- if ud.Username == "" {
- return nil, status.Error(codes.NotFound, "用户不存在")
- }
- if ud.Status != consts.StatusEnabled {
- return nil, status.Error(codes.PermissionDenied, "用户已被冻结")
- }
- if !ud.IsSuperAdmin && ud.MemberType == "" {
- return nil, status.Error(codes.PermissionDenied, "用户不是该产品的有效成员")
- }
- return &pb.GetUserPermsResp{
- MemberType: ud.MemberType,
- Perms: ud.Perms,
- }, nil
- }
|