fusenapi/utils/auth/user.go

175 lines
4.4 KiB
Go
Raw Normal View History

2023-06-07 03:35:04 +00:00
package auth
import (
2023-06-12 07:17:42 +00:00
"errors"
"fmt"
2023-06-12 12:04:30 +00:00
"net/http"
2023-06-12 07:17:42 +00:00
"github.com/golang-jwt/jwt"
2023-06-07 03:35:04 +00:00
"github.com/zeromicro/go-zero/core/logx"
)
2023-06-14 10:17:45 +00:00
type IDTYPE int
const (
// 白板用户, 以观众身份命名, 没有接收Cookie, 没有拿到guest_id的用户
IDTYPE_Onlooker IDTYPE = 0
// 登录用户
IDTYPE_User IDTYPE = 1
// 游客 接收授权拿到guest_id的用户
IDTYPE_Guest IDTYPE = 2
)
2023-06-07 03:35:04 +00:00
type UserInfo struct {
2023-06-14 10:17:45 +00:00
UserId int64 `json:"user_id"`
GuestId int64 `json:"guest_id"`
}
// GetIdType 用户确认用户身份类型
func (info *UserInfo) GetIdType() IDTYPE {
if info.UserId != 0 {
return IDTYPE_User
}
if info.GuestId != 0 {
return IDTYPE_Guest
}
return IDTYPE_Onlooker
2023-06-07 03:35:04 +00:00
}
2023-06-15 08:08:43 +00:00
// IsUser 用户是不是登录用户
func (info *UserInfo) IsUser() bool {
return info.UserId != 0
}
// IsGuest 用户是不是游客
func (info *UserInfo) IsGuest() bool {
// 必须判断登录用户在前, 用户可能会携带以前是游客到注册的身份
if info.UserId != 0 {
return false
}
if info.GuestId != 0 {
return true
2023-06-07 03:35:04 +00:00
}
2023-06-15 08:08:43 +00:00
return false
}
// IsOnlooker 白板用户: 非登录用户, 非游客, 判断为白板用户
func (info *UserInfo) IsOnlooker() bool {
return info.UserId != 0 && info.GuestId != 0
2023-06-07 03:35:04 +00:00
}
2023-06-12 07:17:42 +00:00
// 获取登录信息
func GetUserInfoFormMapClaims(claims jwt.MapClaims) (*UserInfo, error) {
2023-06-14 10:17:45 +00:00
userinfo := &UserInfo{}
if userid, ok := claims["user_id"]; ok {
2023-06-12 07:17:42 +00:00
uid, ok := userid.(float64)
if !ok {
err := errors.New(fmt.Sprint("parse uid form context err:", userid))
logx.Error("parse uid form context err:", err)
return nil, err
}
2023-06-14 10:17:45 +00:00
userinfo.UserId = int64(uid)
} else {
err := errors.New(`userid not in claims`)
logx.Error(`userid not in claims`)
return nil, err
}
2023-06-12 07:17:42 +00:00
2023-06-14 10:17:45 +00:00
if guestid, ok := claims["guest_id"]; ok {
gid, ok := guestid.(float64)
if !ok {
err := errors.New(fmt.Sprint("parse guestid form context err:", guestid))
logx.Error("parse guestid form context err:", err)
return nil, err
}
userinfo.GuestId = int64(gid)
2023-06-12 07:17:42 +00:00
} else {
err := errors.New(`userid not in claims`)
logx.Error(`userid not in claims`)
return nil, err
}
2023-06-14 10:17:45 +00:00
return userinfo, nil
2023-06-12 07:17:42 +00:00
}
2023-06-14 10:17:45 +00:00
func GenerateJwtToken(accessSecret *string, accessExpire, nowSec int64, userid int64, guestid int64) (string, error) {
2023-06-12 07:17:42 +00:00
claims := make(jwt.MapClaims)
claims["exp"] = nowSec + accessExpire
claims["iat"] = nowSec
2023-06-14 10:17:45 +00:00
if userid == 0 && guestid == 0 {
err := errors.New("userid and guestid cannot be 0 at the same time")
logx.Error(err)
return "", err
2023-06-12 11:52:11 +00:00
}
2023-06-14 10:17:45 +00:00
claims["user_id"] = userid
claims["guest_id"] = guestid
2023-06-12 07:17:42 +00:00
token := jwt.New(jwt.SigningMethodHS256)
token.Claims = claims
2023-06-14 10:17:45 +00:00
return token.SignedString([]byte(*accessSecret))
2023-06-12 07:17:42 +00:00
}
2023-06-12 12:04:30 +00:00
func ParseJwtToken(w http.ResponseWriter, r *http.Request, AccessSecret *string) (*UserInfo, error) {
// 解析jwtToken
2023-06-14 10:17:45 +00:00
claims, err := getJwtClaimsFromRequest(r, AccessSecret)
2023-06-12 12:04:30 +00:00
// 如果解析出错则返回未授权的JSON响应并记录错误消息
if err != nil {
// httpx.OkJsonCtx(r.Context(), w, &basic.Response{
// Code: 401,
// Message: "unauthorized",
// })
// logx.Info("unauthorized:", err.Error())
return nil, err
}
// 从Token里获取对应的信息
userinfo, err := GetUserInfoFormMapClaims(claims)
// 如果获取用户信息出错则返回未授权的JSON响应并记录错误消息
if err != nil {
// httpx.OkJsonCtx(r.Context(), w, &basic.Response{
// Code: 401,
// Message: "unauthorized",
// })
// logx.Info("unauthorized:", err.Error())
return nil, err
}
return userinfo, err
}
2023-06-14 10:17:45 +00:00
func getJwtClaimsFromRequest(r *http.Request, AccessSecret *string) (jwt.MapClaims, error) {
2023-06-12 12:04:30 +00:00
AuthKey := r.Header.Get("Authorization")
if len(AuthKey) <= 50 {
return nil, errors.New(fmt.Sprint("Error parsing token, len:", len(AuthKey)))
}
2023-06-14 10:17:45 +00:00
return getJwtClaims(AuthKey, AccessSecret)
}
func getJwtClaims(AuthKey string, AccessSecret *string) (jwt.MapClaims, error) {
2023-06-12 12:04:30 +00:00
token, err := jwt.Parse(AuthKey, func(token *jwt.Token) (interface{}, error) {
// 检查签名方法是否为 HS256
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
}
// 返回用于验证签名的密钥
return []byte(*AccessSecret), nil
})
if err != nil {
return nil, errors.New(fmt.Sprint("Error parsing token:", err))
}
// 验证成功返回
if claims, ok := token.Claims.(jwt.MapClaims); ok && token.Valid {
return claims, nil
}
return nil, errors.New(fmt.Sprint("Invalid token", err))
}