permserver.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235
  1. package server
  2. import (
  3. "context"
  4. "crypto/subtle"
  5. "fmt"
  6. "time"
  7. "perms-system-server/internal/consts"
  8. authHelper "perms-system-server/internal/logic/auth"
  9. pub "perms-system-server/internal/logic/pub"
  10. "perms-system-server/internal/middleware"
  11. permModel "perms-system-server/internal/model/perm"
  12. "perms-system-server/internal/svc"
  13. "perms-system-server/pb"
  14. "github.com/golang-jwt/jwt/v4"
  15. "github.com/zeromicro/go-zero/core/limit"
  16. "github.com/zeromicro/go-zero/core/stores/sqlx"
  17. "google.golang.org/grpc/codes"
  18. "google.golang.org/grpc/peer"
  19. "google.golang.org/grpc/status"
  20. )
  21. type PermServer struct {
  22. svcCtx *svc.ServiceContext
  23. pb.UnimplementedPermServiceServer
  24. }
  25. func NewPermServer(svcCtx *svc.ServiceContext) *PermServer {
  26. return &PermServer{svcCtx: svcCtx}
  27. }
  28. func (s *PermServer) SyncPermissions(ctx context.Context, req *pb.SyncPermissionsReq) (*pb.SyncPermissionsResp, error) {
  29. product, err := s.svcCtx.SysProductModel.FindOneByAppKey(ctx, req.AppKey)
  30. if err != nil {
  31. return nil, status.Error(codes.Unauthenticated, "无效的appKey")
  32. }
  33. if subtle.ConstantTimeCompare([]byte(product.AppSecret), []byte(req.AppSecret)) != 1 {
  34. return nil, status.Error(codes.Unauthenticated, "appSecret验证失败")
  35. }
  36. if product.Status != consts.StatusEnabled {
  37. return nil, status.Error(codes.PermissionDenied, "产品已被禁用")
  38. }
  39. existingMap, err := s.svcCtx.SysPermModel.FindMapByProductCode(ctx, product.Code)
  40. if err != nil {
  41. return nil, status.Error(codes.Internal, "查询权限数据失败")
  42. }
  43. now := time.Now().Unix()
  44. var added, updated int64
  45. codeList := make([]string, 0, len(req.Perms))
  46. var toInsert []*permModel.SysPerm
  47. var toUpdate []*permModel.SysPerm
  48. seen := make(map[string]bool, len(req.Perms))
  49. for _, item := range req.Perms {
  50. if seen[item.Code] {
  51. continue
  52. }
  53. seen[item.Code] = true
  54. codeList = append(codeList, item.Code)
  55. existing, ok := existingMap[item.Code]
  56. if !ok {
  57. toInsert = append(toInsert, &permModel.SysPerm{
  58. ProductCode: product.Code,
  59. Name: item.Name,
  60. Code: item.Code,
  61. Remark: item.Remark,
  62. Status: consts.StatusEnabled,
  63. CreateTime: now,
  64. UpdateTime: now,
  65. })
  66. added++
  67. continue
  68. }
  69. if existing.Name != item.Name || existing.Remark != item.Remark || existing.Status != consts.StatusEnabled {
  70. existing.Name = item.Name
  71. existing.Remark = item.Remark
  72. existing.Status = consts.StatusEnabled
  73. existing.UpdateTime = now
  74. toUpdate = append(toUpdate, existing)
  75. updated++
  76. }
  77. }
  78. var disabled int64
  79. if txErr := s.svcCtx.SysPermModel.TransactCtx(ctx, func(txCtx context.Context, session sqlx.Session) error {
  80. if len(toInsert) > 0 {
  81. if err := s.svcCtx.SysPermModel.BatchInsertWithTx(txCtx, session, toInsert); err != nil {
  82. return err
  83. }
  84. }
  85. if len(toUpdate) > 0 {
  86. if err := s.svcCtx.SysPermModel.BatchUpdateWithTx(txCtx, session, toUpdate); err != nil {
  87. return err
  88. }
  89. }
  90. var err error
  91. disabled, err = s.svcCtx.SysPermModel.DisableNotInCodesWithTx(txCtx, session, product.Code, codeList, now)
  92. return err
  93. }); txErr != nil {
  94. return nil, status.Error(codes.Internal, "同步权限事务失败")
  95. }
  96. if added > 0 || updated > 0 || disabled > 0 {
  97. s.svcCtx.UserDetailsLoader.CleanByProduct(ctx, product.Code)
  98. }
  99. return &pb.SyncPermissionsResp{Added: added, Updated: updated, Disabled: disabled}, nil
  100. }
  101. func (s *PermServer) Login(ctx context.Context, req *pb.LoginReq) (*pb.LoginResp, error) {
  102. if s.svcCtx.GrpcLoginLimiter != nil {
  103. p, ok := peer.FromContext(ctx)
  104. if ok {
  105. ip := p.Addr.String()
  106. code, _ := s.svcCtx.GrpcLoginLimiter.Take(fmt.Sprintf("grpc:login:%s", ip))
  107. if code == limit.OverQuota {
  108. return nil, status.Error(codes.ResourceExhausted, "请求过于频繁,请稍后再试")
  109. }
  110. }
  111. }
  112. if req.ProductCode == "" {
  113. return nil, status.Error(codes.InvalidArgument, "productCode不能为空")
  114. }
  115. result, err := pub.ValidateProductLogin(ctx, s.svcCtx, req.Username, req.Password, req.ProductCode)
  116. if err != nil {
  117. if le, ok := err.(*pub.LoginError); ok {
  118. switch le.Code {
  119. case 400:
  120. return nil, status.Error(codes.InvalidArgument, le.Message)
  121. case 401:
  122. return nil, status.Error(codes.Unauthenticated, le.Message)
  123. case 403:
  124. return nil, status.Error(codes.PermissionDenied, le.Message)
  125. }
  126. }
  127. return nil, status.Error(codes.Internal, "登录失败")
  128. }
  129. ud := result.UserDetails
  130. return &pb.LoginResp{
  131. AccessToken: result.AccessToken,
  132. RefreshToken: result.RefreshToken,
  133. Expires: time.Now().Unix() + s.svcCtx.Config.Auth.AccessExpire,
  134. UserId: ud.UserId,
  135. Username: ud.Username,
  136. MemberType: ud.MemberType,
  137. Perms: ud.Perms,
  138. }, nil
  139. }
  140. func (s *PermServer) RefreshToken(ctx context.Context, req *pb.RefreshTokenReq) (*pb.RefreshTokenResp, error) {
  141. claims, err := authHelper.ParseRefreshToken(req.RefreshToken, s.svcCtx.Config.Auth.RefreshSecret)
  142. if err != nil {
  143. return nil, status.Error(codes.Unauthenticated, "refreshToken无效或已过期")
  144. }
  145. productCode := claims.ProductCode
  146. if req.ProductCode != "" && req.ProductCode != productCode {
  147. return nil, status.Error(codes.InvalidArgument, "刷新令牌不允许切换产品")
  148. }
  149. ud := s.svcCtx.UserDetailsLoader.Load(ctx, claims.UserId, productCode)
  150. if ud.Status != consts.StatusEnabled {
  151. return nil, status.Error(codes.PermissionDenied, "账号已被冻结")
  152. }
  153. if productCode != "" && !ud.IsSuperAdmin && ud.MemberType == "" {
  154. return nil, status.Error(codes.PermissionDenied, "您已不是该产品的成员")
  155. }
  156. accessToken, err := authHelper.GenerateAccessToken(
  157. s.svcCtx.Config.Auth.AccessSecret, s.svcCtx.Config.Auth.AccessExpire,
  158. ud.UserId, ud.Username, ud.ProductCode, ud.MemberType, ud.Perms,
  159. )
  160. if err != nil {
  161. return nil, status.Error(codes.Internal, "生成token失败")
  162. }
  163. return &pb.RefreshTokenResp{
  164. AccessToken: accessToken,
  165. RefreshToken: req.RefreshToken,
  166. Expires: time.Now().Unix() + s.svcCtx.Config.Auth.AccessExpire,
  167. }, nil
  168. }
  169. func (s *PermServer) VerifyToken(ctx context.Context, req *pb.VerifyTokenReq) (*pb.VerifyTokenResp, error) {
  170. token, err := jwt.ParseWithClaims(req.AccessToken, &middleware.Claims{}, func(token *jwt.Token) (interface{}, error) {
  171. return []byte(s.svcCtx.Config.Auth.AccessSecret), nil
  172. })
  173. if err != nil || !token.Valid {
  174. return &pb.VerifyTokenResp{Valid: false}, nil
  175. }
  176. claims, ok := token.Claims.(*middleware.Claims)
  177. if !ok || claims.TokenType != consts.TokenTypeAccess {
  178. return &pb.VerifyTokenResp{Valid: false}, nil
  179. }
  180. ud := s.svcCtx.UserDetailsLoader.Load(ctx, claims.UserId, claims.ProductCode)
  181. if ud.Status != consts.StatusEnabled {
  182. return &pb.VerifyTokenResp{Valid: false}, nil
  183. }
  184. if claims.ProductCode != "" && !ud.IsSuperAdmin && ud.MemberType == "" {
  185. return &pb.VerifyTokenResp{Valid: false}, nil
  186. }
  187. return &pb.VerifyTokenResp{
  188. Valid: true,
  189. UserId: ud.UserId,
  190. Username: ud.Username,
  191. MemberType: ud.MemberType,
  192. Perms: ud.Perms,
  193. }, nil
  194. }
  195. func (s *PermServer) GetUserPerms(ctx context.Context, req *pb.GetUserPermsReq) (*pb.GetUserPermsResp, error) {
  196. ud := s.svcCtx.UserDetailsLoader.Load(ctx, req.UserId, req.ProductCode)
  197. if ud.Username == "" {
  198. return nil, status.Error(codes.NotFound, "用户不存在")
  199. }
  200. return &pb.GetUserPermsResp{
  201. MemberType: ud.MemberType,
  202. Perms: ud.Perms,
  203. }, nil
  204. }