loginLogic.go 1.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364
  1. package pub
  2. import (
  3. "context"
  4. "time"
  5. "perms-system-server/internal/response"
  6. "perms-system-server/internal/svc"
  7. "perms-system-server/internal/types"
  8. "github.com/zeromicro/go-zero/core/logx"
  9. )
  10. type LoginLogic struct {
  11. logx.Logger
  12. ctx context.Context
  13. svcCtx *svc.ServiceContext
  14. }
  15. func NewLoginLogic(ctx context.Context, svcCtx *svc.ServiceContext) *LoginLogic {
  16. return &LoginLogic{
  17. Logger: logx.WithContext(ctx),
  18. ctx: ctx,
  19. svcCtx: svcCtx,
  20. }
  21. }
  22. func (l *LoginLogic) Login(req *types.LoginReq) (resp *types.LoginResp, err error) {
  23. result, err := ValidateProductLogin(l.ctx, l.svcCtx, req.Username, req.Password, req.ProductCode)
  24. if err != nil {
  25. if le, ok := err.(*LoginError); ok {
  26. switch le.Code {
  27. case 400:
  28. return nil, response.ErrBadRequest(le.Message)
  29. case 401:
  30. return nil, response.ErrUnauthorized(le.Message)
  31. case 403:
  32. return nil, response.ErrForbidden(le.Message)
  33. case 429:
  34. return nil, response.NewCodeError(429, le.Message)
  35. }
  36. }
  37. return nil, err
  38. }
  39. ud := result.UserDetails
  40. return &types.LoginResp{
  41. AccessToken: result.AccessToken,
  42. RefreshToken: result.RefreshToken,
  43. Expires: time.Now().Unix() + l.svcCtx.Config.Auth.AccessExpire,
  44. UserInfo: types.UserInfo{
  45. UserId: ud.UserId,
  46. Username: ud.Username,
  47. Nickname: ud.Nickname,
  48. Avatar: ud.Avatar,
  49. Email: ud.Email,
  50. Phone: ud.Phone,
  51. IsSuperAdmin: ud.IsSuperAdminRaw,
  52. MustChangePassword: ud.MustChangePwdRaw,
  53. MemberType: ud.MemberType,
  54. Perms: ud.Perms,
  55. },
  56. }, nil
  57. }