permserver.go 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251
  1. package server
  2. import (
  3. "context"
  4. "fmt"
  5. "net"
  6. "time"
  7. "perms-system-server/internal/consts"
  8. authHelper "perms-system-server/internal/logic/auth"
  9. pub "perms-system-server/internal/logic/pub"
  10. "perms-system-server/internal/middleware"
  11. "perms-system-server/internal/svc"
  12. "perms-system-server/pb"
  13. "github.com/golang-jwt/jwt/v4"
  14. "github.com/zeromicro/go-zero/core/limit"
  15. "github.com/zeromicro/go-zero/core/logx"
  16. "golang.org/x/crypto/bcrypt"
  17. "google.golang.org/grpc/codes"
  18. "google.golang.org/grpc/peer"
  19. "google.golang.org/grpc/status"
  20. )
  21. // PermServer 权限管理系统 gRPC 服务实现,供接入产品的服务端调用。
  22. type PermServer struct {
  23. svcCtx *svc.ServiceContext
  24. pb.UnimplementedPermServiceServer
  25. }
  26. func NewPermServer(svcCtx *svc.ServiceContext) *PermServer {
  27. return &PermServer{svcCtx: svcCtx}
  28. }
  29. // SyncPermissions 同步权限声明。产品服务端通过 appKey/appSecret 认证后批量同步权限定义(新增/更新/禁用不在列表中的权限)。
  30. func (s *PermServer) SyncPermissions(ctx context.Context, req *pb.SyncPermissionsReq) (*pb.SyncPermissionsResp, error) {
  31. items := make([]pub.SyncPermItem, len(req.Perms))
  32. for i, p := range req.Perms {
  33. items[i] = pub.SyncPermItem{Code: p.Code, Name: p.Name, Remark: p.Remark}
  34. }
  35. result, err := pub.ExecuteSyncPerms(ctx, s.svcCtx, req.AppKey, req.AppSecret, items)
  36. if err != nil {
  37. if se, ok := err.(*pub.SyncPermsError); ok {
  38. switch se.Code {
  39. case 400:
  40. return nil, status.Error(codes.InvalidArgument, se.Message)
  41. case 401:
  42. return nil, status.Error(codes.Unauthenticated, se.Message)
  43. case 403:
  44. return nil, status.Error(codes.PermissionDenied, se.Message)
  45. default:
  46. return nil, status.Error(codes.Internal, se.Message)
  47. }
  48. }
  49. return nil, status.Error(codes.Internal, "同步权限失败")
  50. }
  51. return &pb.SyncPermissionsResp{Added: result.Added, Updated: result.Updated, Disabled: result.Disabled}, nil
  52. }
  53. // Login 产品端登录。产品成员通过用户名密码 + productCode 登录,返回 JWT 令牌对及用户权限信息。受 IP 维度限流保护。
  54. func (s *PermServer) Login(ctx context.Context, req *pb.LoginReq) (*pb.LoginResp, error) {
  55. var clientIP string
  56. if s.svcCtx.GrpcLoginLimiter != nil {
  57. clientIP = "unknown"
  58. if p, ok := peer.FromContext(ctx); ok {
  59. host, _, err := net.SplitHostPort(p.Addr.String())
  60. if err == nil && host != "" {
  61. clientIP = host
  62. } else {
  63. clientIP = p.Addr.String()
  64. }
  65. }
  66. code, _ := s.svcCtx.GrpcLoginLimiter.Take(fmt.Sprintf("grpc:login:%s", clientIP))
  67. if code == limit.OverQuota {
  68. return nil, status.Error(codes.ResourceExhausted, "请求过于频繁,请稍后再试")
  69. }
  70. }
  71. if req.ProductCode == "" {
  72. return nil, status.Error(codes.InvalidArgument, "productCode不能为空")
  73. }
  74. result, err := pub.ValidateProductLogin(ctx, s.svcCtx, req.Username, req.Password, req.ProductCode, clientIP)
  75. if err != nil {
  76. if le, ok := err.(*pub.LoginError); ok {
  77. switch le.Code {
  78. case 400:
  79. return nil, status.Error(codes.InvalidArgument, le.Message)
  80. case 401:
  81. return nil, status.Error(codes.Unauthenticated, le.Message)
  82. case 403:
  83. return nil, status.Error(codes.PermissionDenied, le.Message)
  84. case 429:
  85. return nil, status.Error(codes.ResourceExhausted, le.Message)
  86. }
  87. }
  88. return nil, status.Error(codes.Internal, "登录失败")
  89. }
  90. ud := result.UserDetails
  91. return &pb.LoginResp{
  92. AccessToken: result.AccessToken,
  93. RefreshToken: result.RefreshToken,
  94. Expires: time.Now().Unix() + s.svcCtx.Config.Auth.AccessExpire,
  95. UserId: ud.UserId,
  96. Username: ud.Username,
  97. Nickname: ud.Nickname,
  98. MemberType: ud.MemberType,
  99. Perms: ud.Perms,
  100. }, nil
  101. }
  102. // RefreshToken 刷新令牌。使用有效的 refreshToken 换取新的令牌对,同时递增 tokenVersion 使旧令牌即时失效(单会话轮转)。
  103. func (s *PermServer) RefreshToken(ctx context.Context, req *pb.RefreshTokenReq) (*pb.RefreshTokenResp, error) {
  104. claims, err := authHelper.ParseRefreshToken(req.RefreshToken, s.svcCtx.Config.Auth.RefreshSecret)
  105. if err != nil {
  106. return nil, status.Error(codes.Unauthenticated, "refreshToken无效或已过期")
  107. }
  108. productCode := claims.ProductCode
  109. if req.ProductCode != "" && req.ProductCode != productCode {
  110. return nil, status.Error(codes.InvalidArgument, "刷新令牌不允许切换产品")
  111. }
  112. ud := s.svcCtx.UserDetailsLoader.Load(ctx, claims.UserId, productCode)
  113. if ud.Status != consts.StatusEnabled {
  114. return nil, status.Error(codes.PermissionDenied, "账号已被冻结")
  115. }
  116. if productCode != "" && ud.ProductStatus != consts.StatusEnabled {
  117. return nil, status.Error(codes.PermissionDenied, "该产品已被禁用")
  118. }
  119. if productCode != "" && !ud.IsSuperAdmin && ud.MemberType == "" {
  120. return nil, status.Error(codes.PermissionDenied, "您已不是该产品的成员")
  121. }
  122. if claims.TokenVersion != ud.TokenVersion {
  123. return nil, status.Error(codes.Unauthenticated, "登录状态已失效,请重新登录")
  124. }
  125. newVersion, err := s.svcCtx.SysUserModel.IncrementTokenVersion(ctx, claims.UserId)
  126. if err != nil {
  127. return nil, status.Error(codes.Internal, "刷新token失败")
  128. }
  129. s.svcCtx.UserDetailsLoader.Clean(ctx, claims.UserId)
  130. accessToken, err := authHelper.GenerateAccessToken(
  131. s.svcCtx.Config.Auth.AccessSecret, s.svcCtx.Config.Auth.AccessExpire,
  132. ud.UserId, ud.Username, ud.ProductCode, ud.MemberType, newVersion,
  133. )
  134. if err != nil {
  135. return nil, status.Error(codes.Internal, "生成token失败")
  136. }
  137. newRefreshToken, err := authHelper.GenerateRefreshTokenWithExpiry(
  138. s.svcCtx.Config.Auth.RefreshSecret,
  139. claims.ExpiresAt.Time,
  140. ud.UserId, ud.ProductCode, newVersion,
  141. )
  142. if err != nil {
  143. return nil, status.Error(codes.Unauthenticated, "refreshToken已过期,请重新登录")
  144. }
  145. return &pb.RefreshTokenResp{
  146. AccessToken: accessToken,
  147. RefreshToken: newRefreshToken,
  148. Expires: time.Now().Unix() + s.svcCtx.Config.Auth.AccessExpire,
  149. }, nil
  150. }
  151. // VerifyToken 验证令牌。校验 accessToken 的有效性(签名、过期、用户状态、产品状态、成员资格、tokenVersion),有效时返回用户身份和权限信息。
  152. func (s *PermServer) VerifyToken(ctx context.Context, req *pb.VerifyTokenReq) (*pb.VerifyTokenResp, error) {
  153. token, err := jwt.ParseWithClaims(req.AccessToken, &middleware.Claims{}, func(token *jwt.Token) (interface{}, error) {
  154. return []byte(s.svcCtx.Config.Auth.AccessSecret), nil
  155. })
  156. if err != nil || !token.Valid {
  157. logx.WithContext(ctx).Infof("verifyToken fail reason=invalid_token")
  158. return &pb.VerifyTokenResp{Valid: false}, nil
  159. }
  160. claims, ok := token.Claims.(*middleware.Claims)
  161. if !ok || claims.TokenType != consts.TokenTypeAccess {
  162. logx.WithContext(ctx).Infof("verifyToken fail reason=bad_claims")
  163. return &pb.VerifyTokenResp{Valid: false}, nil
  164. }
  165. ud := s.svcCtx.UserDetailsLoader.Load(ctx, claims.UserId, claims.ProductCode)
  166. if ud.Status != consts.StatusEnabled {
  167. logx.WithContext(ctx).Infof("verifyToken fail userId=%d reason=user_disabled", claims.UserId)
  168. return &pb.VerifyTokenResp{Valid: false}, nil
  169. }
  170. if claims.TokenVersion != ud.TokenVersion {
  171. logx.WithContext(ctx).Infof("verifyToken fail userId=%d reason=token_version_mismatch", claims.UserId)
  172. return &pb.VerifyTokenResp{Valid: false}, nil
  173. }
  174. if claims.ProductCode != "" && ud.ProductStatus != consts.StatusEnabled {
  175. logx.WithContext(ctx).Infof("verifyToken fail userId=%d reason=product_disabled product=%s", claims.UserId, claims.ProductCode)
  176. return &pb.VerifyTokenResp{Valid: false}, nil
  177. }
  178. if claims.ProductCode != "" && !ud.IsSuperAdmin && ud.MemberType == "" {
  179. logx.WithContext(ctx).Infof("verifyToken fail userId=%d reason=not_member product=%s", claims.UserId, claims.ProductCode)
  180. return &pb.VerifyTokenResp{Valid: false}, nil
  181. }
  182. return &pb.VerifyTokenResp{
  183. Valid: true,
  184. UserId: ud.UserId,
  185. Username: ud.Username,
  186. MemberType: ud.MemberType,
  187. Perms: ud.Perms,
  188. ProductCode: claims.ProductCode,
  189. }, nil
  190. }
  191. // GetUserPerms 查询用户权限。产品服务端通过 appKey/appSecret 认证后查询指定用户在该产品下的成员类型和权限列表,用于产品侧的权限网关判定。
  192. func (s *PermServer) GetUserPerms(ctx context.Context, req *pb.GetUserPermsReq) (*pb.GetUserPermsResp, error) {
  193. product, err := s.svcCtx.SysProductModel.FindOneByAppKey(ctx, req.AppKey)
  194. if err != nil {
  195. return nil, status.Error(codes.Unauthenticated, "无效的appKey")
  196. }
  197. if err := bcrypt.CompareHashAndPassword([]byte(product.AppSecret), []byte(req.AppSecret)); err != nil {
  198. return nil, status.Error(codes.Unauthenticated, "appSecret验证失败")
  199. }
  200. if product.Status != consts.StatusEnabled {
  201. return nil, status.Error(codes.PermissionDenied, "产品已被禁用")
  202. }
  203. if product.Code != req.ProductCode {
  204. return nil, status.Error(codes.InvalidArgument, "appKey与productCode不匹配")
  205. }
  206. ud := s.svcCtx.UserDetailsLoader.Load(ctx, req.UserId, req.ProductCode)
  207. if ud.Username == "" {
  208. return nil, status.Error(codes.NotFound, "用户不存在")
  209. }
  210. if ud.Status != consts.StatusEnabled {
  211. return nil, status.Error(codes.PermissionDenied, "用户已被冻结")
  212. }
  213. if !ud.IsSuperAdmin && ud.MemberType == "" {
  214. return nil, status.Error(codes.PermissionDenied, "用户不是该产品的有效成员")
  215. }
  216. return &pb.GetUserPermsResp{
  217. MemberType: ud.MemberType,
  218. Perms: ud.Perms,
  219. }, nil
  220. }