servicecontext.go 3.1 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465
  1. package svc
  2. import (
  3. "perms-system-server/internal/config"
  4. "perms-system-server/internal/loaders"
  5. "perms-system-server/internal/middleware"
  6. "perms-system-server/internal/model"
  7. "github.com/zeromicro/go-zero/core/limit"
  8. "github.com/zeromicro/go-zero/core/stores/redis"
  9. "github.com/zeromicro/go-zero/core/stores/sqlx"
  10. "github.com/zeromicro/go-zero/rest"
  11. )
  12. type ServiceContext struct {
  13. Config config.Config
  14. JwtAuth rest.Middleware
  15. ProductLoginRateLimit rest.Middleware
  16. AdminLoginRateLimit rest.Middleware
  17. SyncRateLimit rest.Middleware
  18. RefreshTokenRateLimit rest.Middleware
  19. GrpcLoginLimiter *limit.PeriodLimit
  20. GrpcRefreshLimiter *limit.PeriodLimit
  21. GrpcVerifyLimiter *limit.PeriodLimit
  22. UsernameLoginLimit *limit.PeriodLimit
  23. TokenOpLimiter *limit.PeriodLimit
  24. UserDetailsLoader *loaders.UserDetailsLoader
  25. Redis *redis.Redis
  26. *model.Models
  27. }
  28. func NewServiceContext(c config.Config) *ServiceContext {
  29. conn := sqlx.NewMysql(c.MySQL.DataSource)
  30. rds := redis.MustNewRedis(c.CacheRedis.Nodes[0].RedisConf)
  31. models := model.NewModels(conn, c.CacheRedis.Nodes, c.CacheRedis.KeyPrefix)
  32. udLoader := loaders.NewUserDetailsLoader(rds, c.CacheRedis.KeyPrefix, models)
  33. productLoginRL := middleware.NewRateLimitMiddleware(rds, 60, 30, c.CacheRedis.KeyPrefix+":rl:login:product", c.BehindProxy)
  34. adminLoginRL := middleware.NewRateLimitMiddleware(rds, 60, 20, c.CacheRedis.KeyPrefix+":rl:login:admin", c.BehindProxy)
  35. syncRlMiddleware := middleware.NewRateLimitMiddleware(rds, 60, 10, c.CacheRedis.KeyPrefix+":rl:sync", c.BehindProxy)
  36. refreshTokenRL := middleware.NewRateLimitMiddleware(rds, 60, 30, c.CacheRedis.KeyPrefix+":rl:refresh", c.BehindProxy)
  37. grpcLimiter := limit.NewPeriodLimit(60, 20, rds, c.CacheRedis.KeyPrefix+":rl:grpc:login")
  38. // gRPC refreshToken 一般低频操作(分钟级),限紧一点可以同时防签名爆破与并发刷新被用作会话劫持的放大器。
  39. grpcRefreshLimiter := limit.NewPeriodLimit(60, 30, rds, c.CacheRedis.KeyPrefix+":rl:grpc:refresh")
  40. // gRPC verifyToken 是下游每请求都会调用的热路径,阈值必须足够高;这里的作用是兜底防止下游被攻破后把权限中心当 token oracle 爆破。
  41. grpcVerifyLimiter := limit.NewPeriodLimit(60, 6000, rds, c.CacheRedis.KeyPrefix+":rl:grpc:verify")
  42. usernameLimiter := limit.NewPeriodLimit(300, 10, rds, c.CacheRedis.KeyPrefix+":rl:user")
  43. tokenOpLimiter := limit.NewPeriodLimit(60, 10, rds, c.CacheRedis.KeyPrefix+":rl:tokenop")
  44. return &ServiceContext{
  45. Config: c,
  46. JwtAuth: middleware.NewJwtAuthMiddleware(c.Auth.AccessSecret, udLoader).Handle,
  47. ProductLoginRateLimit: productLoginRL.Handle,
  48. AdminLoginRateLimit: adminLoginRL.Handle,
  49. SyncRateLimit: syncRlMiddleware.Handle,
  50. RefreshTokenRateLimit: refreshTokenRL.Handle,
  51. GrpcLoginLimiter: grpcLimiter,
  52. GrpcRefreshLimiter: grpcRefreshLimiter,
  53. GrpcVerifyLimiter: grpcVerifyLimiter,
  54. UsernameLoginLimit: usernameLimiter,
  55. TokenOpLimiter: tokenOpLimiter,
  56. UserDetailsLoader: udLoader,
  57. Redis: rds,
  58. Models: models,
  59. }
  60. }