143 lines
3.4 KiB
Go
143 lines
3.4 KiB
Go
package auth
|
|
|
|
import (
|
|
"context"
|
|
"crypto/rsa"
|
|
"errors"
|
|
"fmt"
|
|
"strconv"
|
|
"time"
|
|
|
|
"tinyskin/db/cache"
|
|
"tinyskin/db/ent"
|
|
"tinyskin/db/ent/user"
|
|
"tinyskin/db/ent/usertoken"
|
|
"tinyskin/model"
|
|
"tinyskin/model/yggdrasil"
|
|
"tinyskin/utils"
|
|
|
|
"github.com/golang-jwt/jwt/v5"
|
|
)
|
|
|
|
type AuthService struct {
|
|
client *ent.Client
|
|
c cache.Cache
|
|
pub *rsa.PublicKey
|
|
pri *rsa.PrivateKey
|
|
}
|
|
|
|
func NewAuthService(
|
|
client *ent.Client,
|
|
c cache.Cache,
|
|
pub *rsa.PublicKey,
|
|
pri *rsa.PrivateKey,
|
|
) *AuthService {
|
|
return &AuthService{
|
|
client: client,
|
|
c: c,
|
|
pub: pub,
|
|
pri: pri,
|
|
}
|
|
}
|
|
|
|
var (
|
|
ErrTokenInvalid = errors.New("token 无效")
|
|
ErrUserDisable = errors.New("用户被禁用")
|
|
)
|
|
|
|
func (a *AuthService) Auth(ctx context.Context, t yggdrasil.ValidateToken, tmpInvalid bool) (*model.TokenClaims, error) {
|
|
token, err := jwt.ParseWithClaims(t.AccessToken, &model.TokenClaims{}, func(t *jwt.Token) (interface{}, error) {
|
|
return a.pub, nil
|
|
})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Auth: %w", errors.Join(err, ErrTokenInvalid))
|
|
}
|
|
|
|
claims, ok := token.Claims.(*model.TokenClaims)
|
|
if !ok || !token.Valid {
|
|
return nil, fmt.Errorf("Auth: %w", ErrTokenInvalid)
|
|
}
|
|
if t.ClientToken != "" && t.ClientToken != claims.CID {
|
|
return nil, fmt.Errorf("Auth: %w", ErrTokenInvalid)
|
|
}
|
|
|
|
if tmpInvalid {
|
|
it, err := claims.GetIssuedAt()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Auth: %w", errors.Join(err, ErrTokenInvalid))
|
|
}
|
|
et, err := claims.GetExpirationTime()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Auth: %w", errors.Join(err, ErrTokenInvalid))
|
|
}
|
|
invalidTime := it.Add(et.Time.Sub(it.Time) / 2)
|
|
if time.Now().After(invalidTime) {
|
|
return nil, fmt.Errorf("Auth: %w", ErrTokenInvalid)
|
|
}
|
|
}
|
|
tokenID, err := func() (uint64, error) {
|
|
c := cache.CacheHelp[uint64]{Cache: a.c}
|
|
key := []byte("auth" + strconv.Itoa(claims.UID))
|
|
t, err := c.Get(key)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
if t != 0 {
|
|
return t, nil
|
|
}
|
|
ut, err := a.client.UserToken.Query().Where(usertoken.HasUserWith(user.ID(claims.UID))).First(ctx)
|
|
if err != nil {
|
|
var ne *ent.NotFoundError
|
|
if errors.As(err, &ne) {
|
|
return 0, ErrTokenInvalid
|
|
}
|
|
return 0, err
|
|
}
|
|
return ut.TokenID, c.Put(key, ut.TokenID, time.Now().Add(20*time.Minute))
|
|
}()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Auth: %w", err)
|
|
}
|
|
if strconv.FormatUint(tokenID, 10) != claims.Tid {
|
|
return nil, fmt.Errorf("Auth: %w", ErrTokenInvalid)
|
|
}
|
|
return claims, nil
|
|
}
|
|
|
|
func (a *AuthService) CreateToken(ctx context.Context, u *ent.User, clientToken string, uuid string) (string, error) {
|
|
if IsDisable(u.State) {
|
|
return "", fmt.Errorf("CreateToken: %w", ErrUserDisable)
|
|
}
|
|
var utoken *ent.UserToken
|
|
err := utils.WithTx(ctx, a.client, func(tx *ent.Tx) error {
|
|
var err error
|
|
utoken, err = tx.User.QueryToken(u).ForUpdateA().First(ctx)
|
|
if err != nil {
|
|
var nf *ent.NotFoundError
|
|
if !errors.As(err, &nf) {
|
|
return err
|
|
}
|
|
}
|
|
if utoken == nil {
|
|
ut, err := tx.UserToken.Create().SetTokenID(1).SetUser(u).Save(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
utoken = ut
|
|
}
|
|
return nil
|
|
})
|
|
if err != nil {
|
|
return "", fmt.Errorf("CreateToken: %w", err)
|
|
}
|
|
err = a.c.Del([]byte("auth" + strconv.Itoa(u.ID)))
|
|
if err != nil {
|
|
return "", fmt.Errorf("CreateToken: %w", err)
|
|
}
|
|
t, err := NewJwtToken(a.pri, strconv.FormatUint(utoken.TokenID, 10), clientToken, uuid, u.ID)
|
|
if err != nil {
|
|
return "", fmt.Errorf("CreateToken: %w", err)
|
|
}
|
|
return t, nil
|
|
}
|