app-cloudep-permission-server/internal/logic/tokenservice/new_token_logic.go

68 lines
1.8 KiB
Go
Raw Normal View History

package tokenservicelogic
import (
"context"
2025-02-28 07:28:31 +00:00
"time"
2025-02-13 11:06:51 +00:00
"code.30cm.net/digimon/app-cloudep-permission-server/gen_result/pb/permission"
2025-02-12 01:51:46 +00:00
"code.30cm.net/digimon/app-cloudep-permission-server/internal/svc"
2025-02-28 07:28:31 +00:00
"code.30cm.net/digimon/app-cloudep-permission-server/pkg/domain/token"
"code.30cm.net/digimon/app-cloudep-permission-server/pkg/domain/usecase"
"github.com/zeromicro/go-zero/core/logx"
)
type NewTokenLogic struct {
ctx context.Context
svcCtx *svc.ServiceContext
logx.Logger
}
func NewNewTokenLogic(ctx context.Context, svcCtx *svc.ServiceContext) *NewTokenLogic {
return &NewTokenLogic{
ctx: ctx,
svcCtx: svcCtx,
Logger: logx.WithContext(ctx),
}
}
// NewToken 建立一個新的 Token例如AccessToken
2025-02-13 11:06:51 +00:00
func (l *NewTokenLogic) NewToken(in *permission.AuthorizationReq) (*permission.TokenResp, error) {
2025-02-28 07:28:31 +00:00
tokenType := token.Bearer
2025-02-28 07:28:31 +00:00
var expired, refreshExpired int64
if in.GetExpires() > 0 {
expired = in.GetExpires()
} else {
expired = time.Now().UTC().Add(l.svcCtx.Config.Token.Expired).UnixNano()
}
if in.GetRefreshExpire() > 0 {
refreshExpired = in.GetRefreshExpire()
} else {
refreshExpired = time.Now().UTC().Add(l.svcCtx.Config.Token.RefreshExpires).UnixNano()
}
t, err := l.svcCtx.TokenUseCase.GenerateAccessToken(l.ctx, usecase.GenerateTokenRequest{
TokenType: tokenType.ToString(),
DeviceID: in.GetDeviceId(),
Scope: in.GetScope(),
Expires: expired,
RefreshExpires: refreshExpired,
2025-02-28 08:58:37 +00:00
Role: in.GetRole(),
2025-02-28 07:28:31 +00:00
Account: in.GetAccount(),
UID: in.GetUid(),
Data: in.Data,
})
if err != nil {
return nil, err
}
return &permission.TokenResp{
AccessToken: t.AccessToken,
RefreshToken: t.RefreshToken,
ExpiresIn: t.ExpiresIn,
TokenType: tokenType.ToString(),
}, nil
}