2023-06-15 07:28:17 +00:00
|
|
|
package svc
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
2023-06-15 11:14:19 +00:00
|
|
|
"fmt"
|
2023-07-25 11:32:51 +00:00
|
|
|
"fusenapi/fsm"
|
2023-06-15 07:28:17 +00:00
|
|
|
"fusenapi/server/orders/internal/config"
|
2023-07-26 02:52:33 +00:00
|
|
|
"fusenapi/utils/autoconfig"
|
2023-06-20 11:36:28 +00:00
|
|
|
"net/http"
|
|
|
|
|
2023-06-21 06:12:50 +00:00
|
|
|
"fusenapi/initalize"
|
|
|
|
"fusenapi/model/gmodel"
|
|
|
|
|
2023-06-15 07:28:17 +00:00
|
|
|
"github.com/golang-jwt/jwt"
|
|
|
|
"gorm.io/gorm"
|
|
|
|
)
|
|
|
|
|
|
|
|
type ServiceContext struct {
|
2023-07-25 11:32:51 +00:00
|
|
|
Config config.Config
|
2023-07-30 16:41:04 +00:00
|
|
|
SharedState *fsm.SharedState
|
2023-06-15 07:28:17 +00:00
|
|
|
|
|
|
|
MysqlConn *gorm.DB
|
2023-06-21 06:12:50 +00:00
|
|
|
AllModels *gmodel.AllModelsGen
|
2023-06-15 07:28:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewServiceContext(c config.Config) *ServiceContext {
|
2023-07-25 11:32:51 +00:00
|
|
|
conn := initalize.InitMysql(c.SourceMysql)
|
2023-07-30 16:41:04 +00:00
|
|
|
StateServer := fsm.StartNode(c.ReplicaId, autoconfig.AutoGetAllServerConfig(), conn)
|
2023-06-15 07:28:17 +00:00
|
|
|
|
|
|
|
return &ServiceContext{
|
2023-07-25 11:32:51 +00:00
|
|
|
Config: c,
|
|
|
|
MysqlConn: conn,
|
|
|
|
SharedState: StateServer,
|
|
|
|
AllModels: gmodel.NewAllModels(initalize.InitMysql(c.SourceMysql)),
|
2023-06-15 07:28:17 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-06-20 11:36:28 +00:00
|
|
|
func (svcCtx *ServiceContext) ParseJwtToken(r *http.Request) (jwt.MapClaims, error) {
|
2023-06-15 07:28:17 +00:00
|
|
|
AuthKey := r.Header.Get("Authorization")
|
2023-06-25 03:31:37 +00:00
|
|
|
if AuthKey == "" {
|
|
|
|
return nil, nil
|
|
|
|
}
|
2023-07-10 09:54:10 +00:00
|
|
|
AuthKey = AuthKey[7:]
|
|
|
|
|
2023-06-15 07:28:17 +00:00
|
|
|
if len(AuthKey) <= 50 {
|
|
|
|
return nil, errors.New(fmt.Sprint("Error parsing token, len:", len(AuthKey)))
|
|
|
|
}
|
|
|
|
|
|
|
|
token, err := jwt.Parse(AuthKey, func(token *jwt.Token) (interface{}, error) {
|
|
|
|
// 检查签名方法是否为 HS256
|
|
|
|
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
|
|
|
|
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
|
|
|
|
}
|
|
|
|
// 返回用于验证签名的密钥
|
2023-06-21 06:12:50 +00:00
|
|
|
return []byte(svcCtx.Config.Auth.AccessSecret), nil
|
2023-06-15 07:28:17 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New(fmt.Sprint("Error parsing token:", err))
|
|
|
|
}
|
|
|
|
|
|
|
|
// 验证成功返回
|
|
|
|
if claims, ok := token.Claims.(jwt.MapClaims); ok && token.Valid {
|
|
|
|
return claims, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, errors.New(fmt.Sprint("Invalid token", err))
|
|
|
|
}
|