package tokenservicelogic import ( "ark-permission/internal/domain" "ark-permission/internal/entity" ers "code.30cm.net/wanderland/library-go/errors" "context" "github.com/google/uuid" "time" "ark-permission/gen_result/pb/permission" "ark-permission/internal/svc" "github.com/zeromicro/go-zero/core/logx" ) type NewTokenLogic struct { ctx context.Context svcCtx *svc.ServiceContext logx.Logger } func NewNewTokenLogic(ctx context.Context, svcCtx *svc.ServiceContext) *NewTokenLogic { return &NewTokenLogic{ ctx: ctx, svcCtx: svcCtx, Logger: logx.WithContext(ctx), } } // https://datatracker.ietf.org/doc/html/rfc6749#section-3.3 type authorizationReq struct { GrantType domain.GrantType `json:"grant_type" validate:"required,oneof=password client_credentials refresh_token"` DeviceID string `json:"device_id"` Scope string `json:"scope" validate:"required"` Data map[string]any `json:"data"` Expires int `json:"expires"` IsRefreshToken bool `json:"is_refresh_token"` } // NewToken 建立一個新的 Token,例如:AccessToken func (l *NewTokenLogic) NewToken(in *permission.AuthorizationReq) (*permission.TokenResp, error) { // 驗證所需 if err := l.svcCtx.Validate.ValidateAll(&authorizationReq{ GrantType: domain.GrantType(in.GetGrantType()), Scope: in.GetScope(), }); err != nil { return nil, ers.InvalidFormat(err.Error()) } // 準備建立 Token 所需 now := time.Now().UTC() expires := int(in.GetExpires()) refreshExpires := int(in.GetExpires()) if expires <= 0 { // 將時間加上 300 秒 sec := time.Duration(l.svcCtx.Config.Token.Expired.Seconds()) * time.Second newTime := now.Add(sec) // 獲取 Unix 時間戳 timestamp := newTime.Unix() expires = int(timestamp) refreshExpires = expires } // 如果這是一個 Refresh Token 過期時間要比普通的Token 長 if in.GetIsRefreshToken() { // 將時間加上 300 秒 sec := time.Duration(l.svcCtx.Config.Token.RefreshExpires.Seconds()) * time.Second newTime := now.Add(sec) // 獲取 Unix 時間戳 timestamp := newTime.Unix() refreshExpires = int(timestamp) } token := entity.Token{ ID: uuid.Must(uuid.NewRandom()).String(), DeviceID: in.GetDeviceId(), ExpiresIn: expires, RefreshExpiresIn: refreshExpires, AccessCreateAt: now, RefreshCreateAt: now, } claims := claims(in.GetData()) claims.SetRole(domain.DefaultRole) claims.SetID(token.ID) claims.SetScope(in.GetScope()) token.UID = claims.UID() if in.GetDeviceId() != "" { claims.SetDeviceID(in.GetDeviceId()) } var err error token.AccessToken, err = generateAccessTokenFunc(token, claims, l.svcCtx.Config.Token.Secret) if err != nil { logx.WithCallerSkip(1).WithFields( logx.Field("func", "generateAccessTokenFunc"), logx.Field("claims", claims), ).Error(err.Error()) return nil, err } if in.GetIsRefreshToken() { token.RefreshToken = generateRefreshTokenFunc(token.AccessToken) } err = l.svcCtx.TokenRedisRepo.Create(l.ctx, token) if err != nil { logx.WithCallerSkip(1).WithFields( logx.Field("func", "TokenRedisRepo.Create"), logx.Field("token", token), ).Error(err.Error()) return nil, err } return &permission.TokenResp{ AccessToken: token.AccessToken, TokenType: domain.TokenTypeBearer, ExpiresIn: int32(token.ExpiresIn), RefreshToken: token.RefreshToken, }, nil }