mirror of
				https://github.com/TeaOSLab/EdgeAPI.git
				synced 2025-11-04 07:50:25 +08:00 
			
		
		
		
	优化代码
This commit is contained in:
		@@ -1,18 +1,7 @@
 | 
			
		||||
package rpcutils
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"encoding/base64"
 | 
			
		||||
	"encoding/json"
 | 
			
		||||
	"errors"
 | 
			
		||||
	teaconst "github.com/TeaOSLab/EdgeAPI/internal/const"
 | 
			
		||||
	"github.com/TeaOSLab/EdgeAPI/internal/db/models"
 | 
			
		||||
	"github.com/TeaOSLab/EdgeAPI/internal/db/models/authority"
 | 
			
		||||
	"github.com/TeaOSLab/EdgeAPI/internal/encrypt"
 | 
			
		||||
	"github.com/TeaOSLab/EdgeAPI/internal/utils"
 | 
			
		||||
	"github.com/iwind/TeaGo/lists"
 | 
			
		||||
	"github.com/iwind/TeaGo/maps"
 | 
			
		||||
	"google.golang.org/grpc/metadata"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type UserType = string
 | 
			
		||||
@@ -33,181 +22,6 @@ const (
 | 
			
		||||
	UserTypeReport    = "report"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// ValidateRequest 校验请求
 | 
			
		||||
func ValidateRequest(ctx context.Context, userTypes ...UserType) (userType UserType, resultNodeId int64, userId int64, err error) {
 | 
			
		||||
	if ctx == nil {
 | 
			
		||||
		err = errors.New("context should not be nil")
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// 支持直接认证
 | 
			
		||||
	plainCtx, ok := ctx.(*PlainContext)
 | 
			
		||||
	if ok {
 | 
			
		||||
		userType = plainCtx.UserType
 | 
			
		||||
		userId = plainCtx.UserId
 | 
			
		||||
 | 
			
		||||
		if len(userTypes) > 0 && !lists.ContainsString(userTypes, userType) {
 | 
			
		||||
			userType = UserTypeNone
 | 
			
		||||
			userId = 0
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if userId <= 0 {
 | 
			
		||||
			err = errors.New("context: can not find user or permission denied")
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// 是否是模拟测试
 | 
			
		||||
	{
 | 
			
		||||
		mockCtx, isMock := ctx.(*MockNodeContext)
 | 
			
		||||
		if isMock {
 | 
			
		||||
			return UserTypeNode, 0, mockCtx.NodeId, nil
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	{
 | 
			
		||||
		mockCtx, isMock := ctx.(*MockAdminNodeContext)
 | 
			
		||||
		if isMock {
 | 
			
		||||
			return UserTypeAdmin, 0, mockCtx.AdminId, nil
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	md, ok := metadata.FromIncomingContext(ctx)
 | 
			
		||||
	if !ok {
 | 
			
		||||
		return UserTypeNone, 0, 0, errors.New("context: need 'nodeId'")
 | 
			
		||||
	}
 | 
			
		||||
	nodeIds := md.Get("nodeid")
 | 
			
		||||
	if len(nodeIds) == 0 || len(nodeIds[0]) == 0 {
 | 
			
		||||
		return UserTypeNone, 0, 0, errors.New("context: need 'nodeId'")
 | 
			
		||||
	}
 | 
			
		||||
	nodeId := nodeIds[0]
 | 
			
		||||
 | 
			
		||||
	// 获取角色Node信息
 | 
			
		||||
	apiToken, err := models.SharedApiTokenDAO.FindEnabledTokenWithNodeCacheable(nil, nodeId)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		utils.PrintError(err)
 | 
			
		||||
		return UserTypeNone, 0, 0, err
 | 
			
		||||
	}
 | 
			
		||||
	nodeUserId := int64(0)
 | 
			
		||||
	if apiToken == nil {
 | 
			
		||||
		return UserTypeNode, 0, 0, errors.New("context: can not find api token for node '" + nodeId + "'")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	tokens := md.Get("token")
 | 
			
		||||
	if len(tokens) == 0 || len(tokens[0]) == 0 {
 | 
			
		||||
		return UserTypeNone, 0, 0, errors.New("context: need 'token'")
 | 
			
		||||
	}
 | 
			
		||||
	token := tokens[0]
 | 
			
		||||
 | 
			
		||||
	data, err := base64.StdEncoding.DecodeString(token)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return UserTypeNone, 0, 0, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	method, err := encrypt.NewMethodInstance(teaconst.EncryptMethod, apiToken.Secret, nodeId)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		utils.PrintError(err)
 | 
			
		||||
		return UserTypeNone, 0, 0, err
 | 
			
		||||
	}
 | 
			
		||||
	data, err = method.Decrypt(data)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return UserTypeNone, 0, 0, err
 | 
			
		||||
	}
 | 
			
		||||
	if len(data) == 0 {
 | 
			
		||||
		return UserTypeNone, 0, 0, errors.New("invalid token")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var m = maps.Map{}
 | 
			
		||||
	err = json.Unmarshal(data, &m)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return UserTypeNone, 0, 0, errors.New("decode token error: " + err.Error())
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	t := m.GetString("type")
 | 
			
		||||
	if len(userTypes) > 0 && !lists.ContainsString(userTypes, t) {
 | 
			
		||||
		return UserTypeNone, 0, 0, errors.New("not supported node type: '" + t + "'")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	switch apiToken.Role {
 | 
			
		||||
	case UserTypeNode:
 | 
			
		||||
		// TODO 需要检查集群是否已经删除
 | 
			
		||||
		nodeIntId, err := models.SharedNodeDAO.FindEnabledNodeIdWithUniqueIdCacheable(nil, nodeId)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return UserTypeNode, 0, 0, errors.New("context: " + err.Error())
 | 
			
		||||
		}
 | 
			
		||||
		if nodeIntId <= 0 {
 | 
			
		||||
			return UserTypeNode, 0, 0, errors.New("context: not found node with id '" + nodeId + "'")
 | 
			
		||||
		}
 | 
			
		||||
		nodeUserId = nodeIntId
 | 
			
		||||
		resultNodeId = nodeIntId
 | 
			
		||||
	case UserTypeCluster:
 | 
			
		||||
		clusterId, err := models.SharedNodeClusterDAO.FindEnabledClusterIdWithUniqueId(nil, nodeId)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return UserTypeCluster, 0, 0, errors.New("context: " + err.Error())
 | 
			
		||||
		}
 | 
			
		||||
		if clusterId <= 0 {
 | 
			
		||||
			return UserTypeCluster, 0, 0, errors.New("context: not found cluster with id '" + nodeId + "'")
 | 
			
		||||
		}
 | 
			
		||||
		nodeUserId = clusterId
 | 
			
		||||
		resultNodeId = clusterId
 | 
			
		||||
	case UserTypeUser:
 | 
			
		||||
		nodeIntId, err := models.SharedUserNodeDAO.FindEnabledUserNodeIdWithUniqueId(nil, nodeId)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return UserTypeUser, 0, 0, errors.New("context: " + err.Error())
 | 
			
		||||
		}
 | 
			
		||||
		if nodeIntId <= 0 {
 | 
			
		||||
			return UserTypeUser, 0, 0, errors.New("context: not found node with id '" + nodeId + "'")
 | 
			
		||||
		}
 | 
			
		||||
		resultNodeId = nodeIntId
 | 
			
		||||
	case UserTypeMonitor:
 | 
			
		||||
		nodeIntId, err := models.SharedMonitorNodeDAO.FindEnabledMonitorNodeIdWithUniqueId(nil, nodeId)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return UserTypeMonitor, 0, 0, errors.New("context: " + err.Error())
 | 
			
		||||
		}
 | 
			
		||||
		if nodeIntId <= 0 {
 | 
			
		||||
			return UserTypeMonitor, 0, 0, errors.New("context: not found node with id '" + nodeId + "'")
 | 
			
		||||
		}
 | 
			
		||||
		resultNodeId = nodeIntId
 | 
			
		||||
	case UserTypeAuthority:
 | 
			
		||||
		nodeIntId, err := authority.SharedAuthorityNodeDAO.FindEnabledAuthorityNodeIdWithUniqueId(nil, nodeId)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return UserTypeAuthority, 0, 0, errors.New("context: " + err.Error())
 | 
			
		||||
		}
 | 
			
		||||
		if nodeIntId <= 0 {
 | 
			
		||||
			return UserTypeAuthority, 0, 0, errors.New("context: not found node with id '" + nodeId + "'")
 | 
			
		||||
		}
 | 
			
		||||
		nodeUserId = nodeIntId
 | 
			
		||||
		resultNodeId = nodeIntId
 | 
			
		||||
	case UserTypeDNS:
 | 
			
		||||
		nodeIntId, err := models.SharedNSNodeDAO.FindEnabledNodeIdWithUniqueId(nil, nodeId)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return UserTypeDNS, nodeIntId, 0, errors.New("context: " + err.Error())
 | 
			
		||||
		}
 | 
			
		||||
		if nodeIntId <= 0 {
 | 
			
		||||
			return UserTypeDNS, nodeIntId, 0, errors.New("context: not found node with id '" + nodeId + "'")
 | 
			
		||||
		}
 | 
			
		||||
		nodeUserId = nodeIntId
 | 
			
		||||
		resultNodeId = nodeIntId
 | 
			
		||||
	case UserTypeReport:
 | 
			
		||||
		nodeIntId, err := models.SharedReportNodeDAO.FindEnabledNodeIdWithUniqueId(nil, nodeId)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return UserTypeReport, nodeIntId, 0, errors.New("context: " + err.Error())
 | 
			
		||||
		}
 | 
			
		||||
		if nodeIntId <= 0 {
 | 
			
		||||
			return UserTypeReport, nodeIntId, 0, errors.New("context: not found node with id '" + nodeId + "'")
 | 
			
		||||
		}
 | 
			
		||||
		nodeUserId = nodeIntId
 | 
			
		||||
		resultNodeId = nodeIntId
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if nodeUserId > 0 {
 | 
			
		||||
		return t, resultNodeId, nodeUserId, nil
 | 
			
		||||
	} else {
 | 
			
		||||
		return t, resultNodeId, m.GetInt64("userId"), nil
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Wrap 包装错误
 | 
			
		||||
func Wrap(description string, err error) error {
 | 
			
		||||
	if err == nil {
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										153
									
								
								internal/rpc/utils/utils_ext.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										153
									
								
								internal/rpc/utils/utils_ext.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,153 @@
 | 
			
		||||
//go:build !plus
 | 
			
		||||
 | 
			
		||||
package rpcutils
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"encoding/base64"
 | 
			
		||||
	"encoding/json"
 | 
			
		||||
	teaconst "github.com/TeaOSLab/EdgeAPI/internal/const"
 | 
			
		||||
	"github.com/TeaOSLab/EdgeAPI/internal/db/models"
 | 
			
		||||
	"github.com/TeaOSLab/EdgeAPI/internal/encrypt"
 | 
			
		||||
	"github.com/TeaOSLab/EdgeAPI/internal/errors"
 | 
			
		||||
	"github.com/TeaOSLab/EdgeAPI/internal/utils"
 | 
			
		||||
	"github.com/iwind/TeaGo/lists"
 | 
			
		||||
	"github.com/iwind/TeaGo/maps"
 | 
			
		||||
	"google.golang.org/grpc/metadata"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// ValidateRequest 校验请求
 | 
			
		||||
func ValidateRequest(ctx context.Context, userTypes ...UserType) (userType UserType, resultNodeId int64, userId int64, err error) {
 | 
			
		||||
	if ctx == nil {
 | 
			
		||||
		err = errors.New("context should not be nil")
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// 支持直接认证
 | 
			
		||||
	plainCtx, ok := ctx.(*PlainContext)
 | 
			
		||||
	if ok {
 | 
			
		||||
		userType = plainCtx.UserType
 | 
			
		||||
		userId = plainCtx.UserId
 | 
			
		||||
 | 
			
		||||
		if len(userTypes) > 0 && !lists.ContainsString(userTypes, userType) {
 | 
			
		||||
			userType = UserTypeNone
 | 
			
		||||
			userId = 0
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if userId <= 0 {
 | 
			
		||||
			err = errors.New("context: can not find user or permission denied")
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// 是否是模拟测试
 | 
			
		||||
	{
 | 
			
		||||
		mockCtx, isMock := ctx.(*MockNodeContext)
 | 
			
		||||
		if isMock {
 | 
			
		||||
			return UserTypeNode, 0, mockCtx.NodeId, nil
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	{
 | 
			
		||||
		mockCtx, isMock := ctx.(*MockAdminNodeContext)
 | 
			
		||||
		if isMock {
 | 
			
		||||
			return UserTypeAdmin, 0, mockCtx.AdminId, nil
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	md, ok := metadata.FromIncomingContext(ctx)
 | 
			
		||||
	if !ok {
 | 
			
		||||
		return UserTypeNone, 0, 0, errors.New("context: need 'nodeId'")
 | 
			
		||||
	}
 | 
			
		||||
	nodeIds := md.Get("nodeid")
 | 
			
		||||
	if len(nodeIds) == 0 || len(nodeIds[0]) == 0 {
 | 
			
		||||
		return UserTypeNone, 0, 0, errors.New("context: need 'nodeId'")
 | 
			
		||||
	}
 | 
			
		||||
	nodeId := nodeIds[0]
 | 
			
		||||
 | 
			
		||||
	// 获取角色Node信息
 | 
			
		||||
	apiToken, err := models.SharedApiTokenDAO.FindEnabledTokenWithNodeCacheable(nil, nodeId)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		utils.PrintError(err)
 | 
			
		||||
		return UserTypeNone, 0, 0, err
 | 
			
		||||
	}
 | 
			
		||||
	nodeUserId := int64(0)
 | 
			
		||||
	if apiToken == nil {
 | 
			
		||||
		return UserTypeNode, 0, 0, errors.New("context: can not find api token for node '" + nodeId + "'")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	tokens := md.Get("token")
 | 
			
		||||
	if len(tokens) == 0 || len(tokens[0]) == 0 {
 | 
			
		||||
		return UserTypeNone, 0, 0, errors.New("context: need 'token'")
 | 
			
		||||
	}
 | 
			
		||||
	token := tokens[0]
 | 
			
		||||
 | 
			
		||||
	data, err := base64.StdEncoding.DecodeString(token)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return UserTypeNone, 0, 0, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	method, err := encrypt.NewMethodInstance(teaconst.EncryptMethod, apiToken.Secret, nodeId)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		utils.PrintError(err)
 | 
			
		||||
		return UserTypeNone, 0, 0, err
 | 
			
		||||
	}
 | 
			
		||||
	data, err = method.Decrypt(data)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return UserTypeNone, 0, 0, err
 | 
			
		||||
	}
 | 
			
		||||
	if len(data) == 0 {
 | 
			
		||||
		return UserTypeNone, 0, 0, errors.New("invalid token")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var m = maps.Map{}
 | 
			
		||||
	err = json.Unmarshal(data, &m)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return UserTypeNone, 0, 0, errors.New("decode token error: " + err.Error())
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	t := m.GetString("type")
 | 
			
		||||
	if len(userTypes) > 0 && !lists.ContainsString(userTypes, t) {
 | 
			
		||||
		return UserTypeNone, 0, 0, errors.New("not supported node type: '" + t + "'")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	switch apiToken.Role {
 | 
			
		||||
	case UserTypeNode:
 | 
			
		||||
		// TODO 需要检查集群是否已经删除
 | 
			
		||||
		nodeIntId, err := models.SharedNodeDAO.FindEnabledNodeIdWithUniqueIdCacheable(nil, nodeId)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return UserTypeNode, 0, 0, errors.New("context: " + err.Error())
 | 
			
		||||
		}
 | 
			
		||||
		if nodeIntId <= 0 {
 | 
			
		||||
			return UserTypeNode, 0, 0, errors.New("context: not found node with id '" + nodeId + "'")
 | 
			
		||||
		}
 | 
			
		||||
		nodeUserId = nodeIntId
 | 
			
		||||
		resultNodeId = nodeIntId
 | 
			
		||||
	case UserTypeCluster:
 | 
			
		||||
		clusterId, err := models.SharedNodeClusterDAO.FindEnabledClusterIdWithUniqueId(nil, nodeId)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return UserTypeCluster, 0, 0, errors.New("context: " + err.Error())
 | 
			
		||||
		}
 | 
			
		||||
		if clusterId <= 0 {
 | 
			
		||||
			return UserTypeCluster, 0, 0, errors.New("context: not found cluster with id '" + nodeId + "'")
 | 
			
		||||
		}
 | 
			
		||||
		nodeUserId = clusterId
 | 
			
		||||
		resultNodeId = clusterId
 | 
			
		||||
	case UserTypeUser:
 | 
			
		||||
		nodeIntId, err := models.SharedUserNodeDAO.FindEnabledUserNodeIdWithUniqueId(nil, nodeId)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return UserTypeUser, 0, 0, errors.New("context: " + err.Error())
 | 
			
		||||
		}
 | 
			
		||||
		if nodeIntId <= 0 {
 | 
			
		||||
			return UserTypeUser, 0, 0, errors.New("context: not found node with id '" + nodeId + "'")
 | 
			
		||||
		}
 | 
			
		||||
		resultNodeId = nodeIntId
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if nodeUserId > 0 {
 | 
			
		||||
		return t, resultNodeId, nodeUserId, nil
 | 
			
		||||
	} else {
 | 
			
		||||
		return t, resultNodeId, m.GetInt64("userId"), nil
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
		Reference in New Issue
	
	Block a user