2023-07-20 07:21:03 +00:00
|
|
|
|
package basic
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"errors"
|
2023-07-26 04:15:15 +00:00
|
|
|
|
"fusenapi/fsm"
|
2023-07-20 07:21:03 +00:00
|
|
|
|
"fusenapi/utils/auth"
|
|
|
|
|
"net/http"
|
|
|
|
|
"reflect"
|
|
|
|
|
|
|
|
|
|
"github.com/golang-jwt/jwt"
|
|
|
|
|
"github.com/zeromicro/go-zero/core/logx"
|
|
|
|
|
"github.com/zeromicro/go-zero/rest/httpx"
|
|
|
|
|
)
|
|
|
|
|
|
2023-07-26 04:15:15 +00:00
|
|
|
|
var DefaultJwtSecret uint64 = 21321321321
|
|
|
|
|
|
2023-07-20 07:21:03 +00:00
|
|
|
|
type IJWTParse interface {
|
|
|
|
|
ParseJwtToken(r *http.Request) (jwt.MapClaims, error)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func BeforeLogic(w http.ResponseWriter, r *http.Request, l reflect.Value) (isNext bool) {
|
|
|
|
|
|
|
|
|
|
m := l.MethodByName("BeforeLogic")
|
|
|
|
|
if m.IsValid() {
|
|
|
|
|
result := m.Call([]reflect.Value{reflect.ValueOf(w), reflect.ValueOf(r)})
|
|
|
|
|
if len(result) != 0 {
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
|
2023-07-24 05:17:02 +00:00
|
|
|
|
func AfterLogic(w http.ResponseWriter, r *http.Request, l reflect.Value, resp *Response) bool {
|
2023-07-20 07:21:03 +00:00
|
|
|
|
|
|
|
|
|
m := l.MethodByName("AfterLogic")
|
|
|
|
|
if m.IsValid() {
|
2023-07-24 05:17:02 +00:00
|
|
|
|
m.Call([]reflect.Value{reflect.ValueOf(w), reflect.ValueOf(r), reflect.ValueOf(resp)})
|
2023-07-20 07:21:03 +00:00
|
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func NormalAfterLogic(w http.ResponseWriter, r *http.Request, resp *Response) {
|
|
|
|
|
// 如果响应不为nil,则使用httpx.OkJsonCtx方法返回JSON响应;
|
|
|
|
|
if resp != nil {
|
|
|
|
|
httpx.OkJsonCtx(r.Context(), w, resp)
|
|
|
|
|
} else {
|
|
|
|
|
err := errors.New("server logic is error, resp must not be nil")
|
|
|
|
|
httpx.ErrorCtx(r.Context(), w, err)
|
|
|
|
|
logx.Error(err)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2023-07-26 04:15:15 +00:00
|
|
|
|
func RequestParse(w http.ResponseWriter, r *http.Request, state *fsm.StateCluster, LogicRequest any) (*auth.UserInfo, error) {
|
2023-07-20 07:21:03 +00:00
|
|
|
|
|
2023-07-27 02:18:49 +00:00
|
|
|
|
token, info, err := auth.ParseJwtTokenHeader[auth.UserInfo](r) //解析Token头, 和payload信息
|
2023-07-20 07:21:03 +00:00
|
|
|
|
if err != nil {
|
2023-07-26 04:15:15 +00:00
|
|
|
|
logx.Error(err)
|
|
|
|
|
return nil, err
|
2023-07-20 07:21:03 +00:00
|
|
|
|
}
|
|
|
|
|
|
2023-07-26 04:15:15 +00:00
|
|
|
|
var secret uint64 = 0
|
|
|
|
|
if info.IsUser() {
|
2023-07-27 02:18:49 +00:00
|
|
|
|
us, err := state.GetUserState(info.UserId) //获取缓存的用户状态
|
2023-07-26 04:15:15 +00:00
|
|
|
|
if err != nil {
|
|
|
|
|
logx.Error(err)
|
|
|
|
|
return nil, err
|
|
|
|
|
}
|
2023-07-27 02:18:49 +00:00
|
|
|
|
secret = us.PwdHash // 获取密码的hash做jwt, 便于重置密码的使用
|
2023-07-26 04:15:15 +00:00
|
|
|
|
|
|
|
|
|
} else if info.IsGuest() {
|
2023-07-27 02:18:49 +00:00
|
|
|
|
secret = DefaultJwtSecret //获取默认的hash
|
2023-07-26 04:15:15 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var userinfo *auth.UserInfo
|
|
|
|
|
if secret != 0 {
|
|
|
|
|
claims, err := auth.ParseJwtTokenUint64Secret(token, secret)
|
|
|
|
|
// 如果解析JWT token出错,则返回未授权的JSON响应并记录错误消息
|
2023-07-20 07:21:03 +00:00
|
|
|
|
if err != nil {
|
|
|
|
|
httpx.OkJsonCtx(r.Context(), w, &Response{
|
2023-07-26 04:15:15 +00:00
|
|
|
|
Code: 401, // 返回401状态码,表示未授权
|
|
|
|
|
Message: "unauthorized", // 返回未授权信息
|
2023-07-20 07:21:03 +00:00
|
|
|
|
})
|
2023-07-26 04:15:15 +00:00
|
|
|
|
logx.Info("unauthorized:", err.Error()) // 记录错误日志
|
|
|
|
|
return nil, err
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if claims != nil {
|
|
|
|
|
// 从token中获取对应的用户信息
|
|
|
|
|
userinfo, err = auth.GetUserInfoFormMapClaims(claims)
|
|
|
|
|
// 如果获取用户信息出错,则返回未授权的JSON响应并记录错误消息
|
|
|
|
|
if err != nil {
|
|
|
|
|
httpx.OkJsonCtx(r.Context(), w, &Response{
|
|
|
|
|
Code: 401,
|
|
|
|
|
Message: "unauthorized",
|
|
|
|
|
})
|
|
|
|
|
logx.Info("unauthorized:", err.Error())
|
|
|
|
|
return nil, err
|
|
|
|
|
}
|
2023-07-20 07:21:03 +00:00
|
|
|
|
}
|
2023-07-27 02:18:49 +00:00
|
|
|
|
} else {
|
|
|
|
|
// 白板用户
|
|
|
|
|
userinfo = &auth.UserInfo{UserId: 0, GuestId: 0}
|
2023-07-20 07:21:03 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// 如果端点有请求结构体,则使用httpx.Parse方法从HTTP请求体中解析请求数据
|
|
|
|
|
if err = httpx.Parse(r, LogicRequest); err != nil {
|
|
|
|
|
httpx.OkJsonCtx(r.Context(), w, &Response{
|
|
|
|
|
Code: 510,
|
|
|
|
|
Message: "parameter error",
|
|
|
|
|
})
|
2023-07-26 04:15:15 +00:00
|
|
|
|
logx.Error(err)
|
|
|
|
|
return nil, err
|
2023-07-20 07:21:03 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return userinfo, err
|
|
|
|
|
}
|
2023-07-21 07:20:18 +00:00
|
|
|
|
|
|
|
|
|
func RequestParseBackend(w http.ResponseWriter, r *http.Request, svcCtx IJWTParse, LogicRequest any) (userinfo *auth.BackendUserInfo, err error) {
|
|
|
|
|
|
|
|
|
|
// 解析JWT token,并对空用户进行判断
|
|
|
|
|
claims, err := svcCtx.ParseJwtToken(r)
|
|
|
|
|
// 如果解析JWT token出错,则返回未授权的JSON响应并记录错误消息
|
|
|
|
|
if err != nil {
|
|
|
|
|
httpx.OkJsonCtx(r.Context(), w, &Response{
|
|
|
|
|
Code: 401, // 返回401状态码,表示未授权
|
|
|
|
|
Message: "unauthorized", // 返回未授权信息
|
|
|
|
|
})
|
|
|
|
|
logx.Info("unauthorized:", err.Error()) // 记录错误日志
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if claims != nil {
|
|
|
|
|
// 从token中获取对应的用户信息
|
|
|
|
|
userinfo, err = auth.GetBackendUserInfoFormMapClaims(claims)
|
|
|
|
|
// 如果获取用户信息出错,则返回未授权的JSON响应并记录错误消息
|
|
|
|
|
if err != nil {
|
|
|
|
|
httpx.OkJsonCtx(r.Context(), w, &Response{
|
|
|
|
|
Code: 401,
|
|
|
|
|
Message: "unauthorized",
|
|
|
|
|
})
|
|
|
|
|
logx.Info("unauthorized:", err.Error())
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// var req types.RequestGoogleLogin
|
|
|
|
|
// 如果端点有请求结构体,则使用httpx.Parse方法从HTTP请求体中解析请求数据
|
|
|
|
|
if err = httpx.Parse(r, LogicRequest); err != nil {
|
|
|
|
|
httpx.OkJsonCtx(r.Context(), w, &Response{
|
|
|
|
|
Code: 510,
|
|
|
|
|
Message: "parameter error",
|
|
|
|
|
})
|
|
|
|
|
logx.Info(err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return userinfo, err
|
|
|
|
|
}
|