|
|
|
package apiAuth
|
|
|
|
|
|
|
|
import (
|
|
|
|
api "Open_IM/pkg/base_info"
|
|
|
|
"Open_IM/pkg/common/config"
|
|
|
|
"Open_IM/pkg/common/log"
|
|
|
|
"Open_IM/pkg/common/token_verify"
|
|
|
|
"Open_IM/pkg/grpc-etcdv3/getcdv3"
|
|
|
|
rpc "Open_IM/pkg/proto/auth"
|
|
|
|
open_im_sdk "Open_IM/pkg/proto/sdk_ws"
|
|
|
|
"Open_IM/pkg/utils"
|
|
|
|
"context"
|
|
|
|
"github.com/fatih/structs"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
)
|
|
|
|
|
|
|
|
func UserRegister(c *gin.Context) {
|
|
|
|
params := api.UserRegisterReq{}
|
|
|
|
if err := c.BindJSON(¶ms); err != nil {
|
|
|
|
errMsg := " BindJSON failed " + err.Error()
|
|
|
|
log.NewError("0", errMsg)
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"errCode": 400, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if params.Secret != config.Config.Secret {
|
|
|
|
errMsg := " params.Secret != config.Config.Secret "
|
|
|
|
log.NewError(params.OperationID, errMsg, params.Secret, config.Config.Secret)
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"errCode": 401, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
req := &rpc.UserRegisterReq{UserInfo: &open_im_sdk.UserInfo{}}
|
|
|
|
utils.CopyStructFields(req.UserInfo, ¶ms)
|
|
|
|
//copier.Copy(req.UserInfo, ¶ms)
|
|
|
|
req.OperationID = params.OperationID
|
|
|
|
log.NewInfo(req.OperationID, "UserRegister args ", req.String())
|
|
|
|
etcdConn := getcdv3.GetConn(config.Config.Etcd.EtcdSchema, strings.Join(config.Config.Etcd.EtcdAddr, ","), config.Config.RpcRegisterName.OpenImAuthName)
|
|
|
|
client := rpc.NewAuthClient(etcdConn)
|
|
|
|
reply, err := client.UserRegister(context.Background(), req)
|
|
|
|
if err != nil {
|
|
|
|
errMsg := req.OperationID + " " + "UserRegister failed " + err.Error() + req.String()
|
|
|
|
log.NewError(req.OperationID, errMsg)
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"errCode": 500, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if reply.CommonResp.ErrCode != 0 {
|
|
|
|
errMsg := req.OperationID + " " + " UserRegister failed " + reply.CommonResp.ErrMsg + req.String()
|
|
|
|
log.NewError(req.OperationID, errMsg)
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"errCode": 500, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
pbDataToken := &rpc.UserTokenReq{Platform: params.Platform, FromUserID: params.UserID, OperationID: params.OperationID}
|
|
|
|
replyToken, err := client.UserToken(context.Background(), pbDataToken)
|
|
|
|
if err != nil {
|
|
|
|
errMsg := req.OperationID + " " + " client.UserToken failed " + err.Error() + pbDataToken.String()
|
|
|
|
log.NewError(req.OperationID, errMsg)
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"errCode": 500, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
resp := api.UserRegisterResp{CommResp: api.CommResp{ErrCode: replyToken.CommonResp.ErrCode, ErrMsg: replyToken.CommonResp.ErrMsg},
|
|
|
|
UserToken: api.UserTokenInfo{UserID: req.UserInfo.UserID, Token: replyToken.Token, ExpiredTime: replyToken.ExpiredTime}}
|
|
|
|
log.NewInfo(req.OperationID, "UserRegister return ", resp)
|
|
|
|
c.JSON(http.StatusOK, resp)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
func UserToken(c *gin.Context) {
|
|
|
|
params := api.UserTokenReq{}
|
|
|
|
if err := c.BindJSON(¶ms); err != nil {
|
|
|
|
errMsg := " BindJSON failed " + err.Error()
|
|
|
|
log.NewError("0", errMsg)
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"errCode": 400, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if params.Secret != config.Config.Secret {
|
|
|
|
errMsg := params.OperationID + " params.Secret != config.Config.Secret "
|
|
|
|
log.NewError(params.OperationID, "params.Secret != config.Config.Secret", params.Secret, config.Config.Secret)
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"errCode": 401, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
req := &rpc.UserTokenReq{Platform: params.Platform, FromUserID: params.UserID, OperationID: params.OperationID}
|
|
|
|
log.NewInfo(req.OperationID, "UserToken args ", req.String())
|
|
|
|
etcdConn := getcdv3.GetConn(config.Config.Etcd.EtcdSchema, strings.Join(config.Config.Etcd.EtcdAddr, ","), config.Config.RpcRegisterName.OpenImAuthName)
|
|
|
|
client := rpc.NewAuthClient(etcdConn)
|
|
|
|
reply, err := client.UserToken(context.Background(), req)
|
|
|
|
if err != nil {
|
|
|
|
errMsg := req.OperationID + " UserToken failed " + err.Error() + req.String()
|
|
|
|
log.NewError(req.OperationID, errMsg)
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"errCode": 500, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
resp := api.UserTokenResp{CommResp: api.CommResp{ErrCode: reply.CommonResp.ErrCode, ErrMsg: reply.CommonResp.ErrMsg},
|
|
|
|
UserToken: api.UserTokenInfo{UserID: req.FromUserID, Token: reply.Token, ExpiredTime: reply.ExpiredTime}}
|
|
|
|
log.NewInfo(req.OperationID, "UserToken return ", resp)
|
|
|
|
c.JSON(http.StatusOK, resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
func ParseToken(c *gin.Context) {
|
|
|
|
params := api.ParseTokenReq{}
|
|
|
|
if err := c.BindJSON(¶ms); err != nil {
|
|
|
|
errMsg := " BindJSON failed " + err.Error()
|
|
|
|
log.NewError("0", errMsg)
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"errCode": 400, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var ok bool
|
|
|
|
var errInfo string
|
|
|
|
var expireTime int64
|
|
|
|
ok, _, errInfo, expireTime = token_verify.GetUserIDFromTokenExpireTime(c.Request.Header.Get("token"), params.OperationID)
|
|
|
|
if !ok {
|
|
|
|
errMsg := params.OperationID + " " + "GetUserIDFromTokenExpireTime failed " + errInfo + " token:" + c.Request.Header.Get("token")
|
|
|
|
log.NewError(params.OperationID, errMsg)
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"errCode": 500, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := api.ParseTokenResp{CommResp: api.CommResp{ErrCode: 0, ErrMsg: ""}, ExpireTime: api.ExpireTime{ExpireTimeSeconds: uint32(expireTime)}}
|
|
|
|
resp.Data = structs.Map(&resp.ExpireTime)
|
|
|
|
log.NewInfo(params.OperationID, "ParseToken return ", resp)
|
|
|
|
c.JSON(http.StatusOK, resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
func ForceLogout(c *gin.Context) {
|
|
|
|
params := api.ForceLogoutReq{}
|
|
|
|
if err := c.BindJSON(¶ms); err != nil {
|
|
|
|
errMsg := " BindJSON failed " + err.Error()
|
|
|
|
log.NewError("0", errMsg)
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"errCode": 400, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
req := &rpc.ForceLogoutReq{}
|
|
|
|
utils.CopyStructFields(req, ¶ms)
|
|
|
|
|
|
|
|
var ok bool
|
|
|
|
var errInfo string
|
|
|
|
ok, req.OpUserID, errInfo = token_verify.GetUserIDFromToken(c.Request.Header.Get("token"), req.OperationID)
|
|
|
|
if !ok {
|
|
|
|
errMsg := req.OperationID + " " + "GetUserIDFromToken failed " + errInfo + " token:" + c.Request.Header.Get("token")
|
|
|
|
log.NewError(req.OperationID, errMsg)
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"errCode": 500, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
log.NewInfo(req.OperationID, "ForceLogout args ", req.String())
|
|
|
|
etcdConn := getcdv3.GetConn(config.Config.Etcd.EtcdSchema, strings.Join(config.Config.Etcd.EtcdAddr, ","), config.Config.RpcRegisterName.OpenImAuthName)
|
|
|
|
client := rpc.NewAuthClient(etcdConn)
|
|
|
|
reply, err := client.ForceLogout(context.Background(), req)
|
|
|
|
if err != nil {
|
|
|
|
errMsg := req.OperationID + " UserToken failed " + err.Error() + req.String()
|
|
|
|
log.NewError(req.OperationID, errMsg)
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"errCode": 500, "errMsg": errMsg})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
log.NewInfo(params.OperationID, utils.GetSelfFuncName(), " return ", reply)
|
|
|
|
c.JSON(http.StatusOK, reply)
|
|
|
|
}
|