You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
90 lines
2.6 KiB
90 lines
2.6 KiB
2 years ago
|
package tokenverify
|
||
3 years ago
|
|
||
|
import (
|
||
|
"Open_IM/pkg/common/config"
|
||
|
"Open_IM/pkg/common/constant"
|
||
2 years ago
|
"Open_IM/pkg/common/tracelog"
|
||
3 years ago
|
"Open_IM/pkg/utils"
|
||
2 years ago
|
"context"
|
||
2 years ago
|
"github.com/golang-jwt/jwt/v4"
|
||
2 years ago
|
"time"
|
||
3 years ago
|
)
|
||
|
|
||
|
type Claims struct {
|
||
|
UID string
|
||
|
Platform string //login platform
|
||
|
jwt.RegisteredClaims
|
||
|
}
|
||
|
|
||
|
func BuildClaims(uid, platform string, ttl int64) Claims {
|
||
|
now := time.Now()
|
||
2 years ago
|
before := now.Add(-time.Minute * 5)
|
||
3 years ago
|
return Claims{
|
||
|
UID: uid,
|
||
|
Platform: platform,
|
||
|
RegisteredClaims: jwt.RegisteredClaims{
|
||
|
ExpiresAt: jwt.NewNumericDate(now.Add(time.Duration(ttl*24) * time.Hour)), //Expiration time
|
||
|
IssuedAt: jwt.NewNumericDate(now), //Issuing time
|
||
2 years ago
|
NotBefore: jwt.NewNumericDate(before), //Begin Effective time
|
||
3 years ago
|
}}
|
||
|
}
|
||
|
|
||
|
func secret() jwt.Keyfunc {
|
||
|
return func(token *jwt.Token) (interface{}, error) {
|
||
|
return []byte(config.Config.TokenPolicy.AccessSecret), nil
|
||
|
}
|
||
|
}
|
||
|
|
||
3 years ago
|
func GetClaimFromToken(tokensString string) (*Claims, error) {
|
||
3 years ago
|
token, err := jwt.ParseWithClaims(tokensString, &Claims{}, secret())
|
||
|
if err != nil {
|
||
|
if ve, ok := err.(*jwt.ValidationError); ok {
|
||
|
if ve.Errors&jwt.ValidationErrorMalformed != 0 {
|
||
2 years ago
|
return nil, utils.Wrap(constant.ErrTokenMalformed, "")
|
||
3 years ago
|
} else if ve.Errors&jwt.ValidationErrorExpired != 0 {
|
||
2 years ago
|
return nil, utils.Wrap(constant.ErrTokenExpired, "")
|
||
3 years ago
|
} else if ve.Errors&jwt.ValidationErrorNotValidYet != 0 {
|
||
2 years ago
|
return nil, utils.Wrap(constant.ErrTokenNotValidYet, "")
|
||
3 years ago
|
} else {
|
||
2 years ago
|
return nil, utils.Wrap(constant.ErrTokenUnknown, "")
|
||
3 years ago
|
}
|
||
|
} else {
|
||
2 years ago
|
return nil, utils.Wrap(constant.ErrTokenUnknown, "")
|
||
3 years ago
|
}
|
||
|
} else {
|
||
|
if claims, ok := token.Claims.(*Claims); ok && token.Valid {
|
||
|
return claims, nil
|
||
|
}
|
||
2 years ago
|
return nil, utils.Wrap(constant.ErrTokenUnknown, "")
|
||
3 years ago
|
}
|
||
|
}
|
||
|
|
||
2 years ago
|
func CheckAccessV3(ctx context.Context, ownerUserID string) (err error) {
|
||
2 years ago
|
opUserID := tracelog.GetOpUserID(ctx)
|
||
2 years ago
|
defer func() {
|
||
2 years ago
|
tracelog.SetCtxInfo(ctx, utils.GetFuncName(1), err, "OpUserID", opUserID, "ownerUserID", ownerUserID)
|
||
2 years ago
|
}()
|
||
|
if utils.IsContain(opUserID, config.Config.Manager.AppManagerUid) {
|
||
|
return nil
|
||
|
}
|
||
2 years ago
|
if opUserID == ownerUserID {
|
||
2 years ago
|
return nil
|
||
|
}
|
||
2 years ago
|
return constant.ErrIdentity.Wrap(utils.GetSelfFuncName())
|
||
2 years ago
|
}
|
||
|
|
||
2 years ago
|
func IsAppManagerUid(ctx context.Context) bool {
|
||
|
return utils.IsContain(tracelog.GetOpUserID(ctx), config.Config.Manager.AppManagerUid)
|
||
|
}
|
||
|
|
||
2 years ago
|
func CheckAdmin(ctx context.Context) error {
|
||
2 years ago
|
if utils.IsContain(tracelog.GetOpUserID(ctx), config.Config.Manager.AppManagerUid) {
|
||
2 years ago
|
return nil
|
||
|
}
|
||
|
return constant.ErrIdentity.Wrap()
|
||
|
}
|
||
|
|
||
3 years ago
|
func ParseRedisInterfaceToken(redisToken interface{}) (*Claims, error) {
|
||
3 years ago
|
return GetClaimFromToken(string(redisToken.([]uint8)))
|
||
3 years ago
|
}
|