Initial commit (code only without large binaries)
This commit is contained in:
13
EdgeAPI/internal/rpc/utils/mock_node.go
Normal file
13
EdgeAPI/internal/rpc/utils/mock_node.go
Normal file
@@ -0,0 +1,13 @@
|
||||
package rpcutils
|
||||
|
||||
import "context"
|
||||
|
||||
type MockNodeContext struct {
|
||||
context.Context
|
||||
|
||||
NodeId int64
|
||||
}
|
||||
|
||||
func NewMockNodeContext(nodeId int64) context.Context {
|
||||
return &MockNodeContext{NodeId: nodeId}
|
||||
}
|
||||
13
EdgeAPI/internal/rpc/utils/mock_node_admin.go
Normal file
13
EdgeAPI/internal/rpc/utils/mock_node_admin.go
Normal file
@@ -0,0 +1,13 @@
|
||||
package rpcutils
|
||||
|
||||
import "context"
|
||||
|
||||
type MockAdminNodeContext struct {
|
||||
context.Context
|
||||
|
||||
AdminId int64
|
||||
}
|
||||
|
||||
func NewMockAdminNodeContext(adminId int64) context.Context {
|
||||
return &MockAdminNodeContext{AdminId: adminId}
|
||||
}
|
||||
45
EdgeAPI/internal/rpc/utils/plain_context.go
Normal file
45
EdgeAPI/internal/rpc/utils/plain_context.go
Normal file
@@ -0,0 +1,45 @@
|
||||
package rpcutils
|
||||
|
||||
import (
|
||||
"context"
|
||||
"time"
|
||||
)
|
||||
|
||||
func IsRest(ctx context.Context) bool {
|
||||
if ctx == nil {
|
||||
return false
|
||||
}
|
||||
_, ok := ctx.(*PlainContext)
|
||||
return ok
|
||||
}
|
||||
|
||||
type PlainContext struct {
|
||||
UserType string
|
||||
UserId int64
|
||||
|
||||
ctx context.Context
|
||||
}
|
||||
|
||||
func NewPlainContext(userType string, userId int64) *PlainContext {
|
||||
return &PlainContext{
|
||||
UserType: userType,
|
||||
UserId: userId,
|
||||
ctx: context.Background(),
|
||||
}
|
||||
}
|
||||
|
||||
func (this *PlainContext) Deadline() (deadline time.Time, ok bool) {
|
||||
return this.ctx.Deadline()
|
||||
}
|
||||
|
||||
func (this *PlainContext) Done() <-chan struct{} {
|
||||
return this.ctx.Done()
|
||||
}
|
||||
|
||||
func (this *PlainContext) Err() error {
|
||||
return this.ctx.Err()
|
||||
}
|
||||
|
||||
func (this *PlainContext) Value(key interface{}) interface{} {
|
||||
return this.ctx.Value(key)
|
||||
}
|
||||
31
EdgeAPI/internal/rpc/utils/utils.go
Normal file
31
EdgeAPI/internal/rpc/utils/utils.go
Normal file
@@ -0,0 +1,31 @@
|
||||
package rpcutils
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"fmt"
|
||||
)
|
||||
|
||||
type UserType = string
|
||||
|
||||
const (
|
||||
UserTypeNone = "none"
|
||||
UserTypeAdmin = "admin"
|
||||
UserTypeUser = "user"
|
||||
UserTypeProvider = "provider"
|
||||
UserTypeNode = "node"
|
||||
UserTypeCluster = "cluster"
|
||||
UserTypeStat = "stat"
|
||||
UserTypeDNS = "dns"
|
||||
UserTypeLog = "log"
|
||||
UserTypeAPI = "api"
|
||||
UserTypeAuthority = "authority"
|
||||
UserTypeReport = "report"
|
||||
)
|
||||
|
||||
// Wrap 包装错误
|
||||
func Wrap(description string, err error) error {
|
||||
if err == nil {
|
||||
return errors.New(description)
|
||||
}
|
||||
return fmt.Errorf("%s: %w", description, err)
|
||||
}
|
||||
152
EdgeAPI/internal/rpc/utils/utils_ext.go
Normal file
152
EdgeAPI/internal/rpc/utils/utils_ext.go
Normal file
@@ -0,0 +1,152 @@
|
||||
//go:build !plus
|
||||
|
||||
package rpcutils
|
||||
|
||||
import (
|
||||
"context"
|
||||
"encoding/base64"
|
||||
"encoding/json"
|
||||
teaconst "github.com/TeaOSLab/EdgeAPI/internal/const"
|
||||
"github.com/TeaOSLab/EdgeAPI/internal/db/models"
|
||||
"github.com/TeaOSLab/EdgeAPI/internal/encrypt"
|
||||
"github.com/TeaOSLab/EdgeAPI/internal/errors"
|
||||
"github.com/TeaOSLab/EdgeAPI/internal/utils"
|
||||
"github.com/iwind/TeaGo/lists"
|
||||
"github.com/iwind/TeaGo/maps"
|
||||
"google.golang.org/grpc/metadata"
|
||||
)
|
||||
|
||||
// ValidateRequest 校验请求
|
||||
func ValidateRequest(ctx context.Context, userTypes ...UserType) (userType UserType, resultNodeId int64, userId int64, err error) {
|
||||
if ctx == nil {
|
||||
err = errors.New("context should not be nil")
|
||||
return
|
||||
}
|
||||
|
||||
// 支持直接认证
|
||||
plainCtx, ok := ctx.(*PlainContext)
|
||||
if ok {
|
||||
userType = plainCtx.UserType
|
||||
userId = plainCtx.UserId
|
||||
|
||||
if len(userTypes) > 0 && !lists.ContainsString(userTypes, userType) {
|
||||
userType = UserTypeNone
|
||||
userId = 0
|
||||
}
|
||||
|
||||
if userId <= 0 {
|
||||
err = errors.New("context: can not find user or permission denied")
|
||||
}
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
// 是否是模拟测试
|
||||
{
|
||||
mockCtx, isMock := ctx.(*MockNodeContext)
|
||||
if isMock {
|
||||
return UserTypeNode, 0, mockCtx.NodeId, nil
|
||||
}
|
||||
}
|
||||
|
||||
{
|
||||
mockCtx, isMock := ctx.(*MockAdminNodeContext)
|
||||
if isMock {
|
||||
return UserTypeAdmin, 0, mockCtx.AdminId, nil
|
||||
}
|
||||
}
|
||||
|
||||
md, ok := metadata.FromIncomingContext(ctx)
|
||||
if !ok {
|
||||
return UserTypeNone, 0, 0, errors.New("context: need 'nodeId'")
|
||||
}
|
||||
nodeIds := md.Get("nodeid")
|
||||
if len(nodeIds) == 0 || len(nodeIds[0]) == 0 {
|
||||
return UserTypeNone, 0, 0, errors.New("context: need 'nodeId'")
|
||||
}
|
||||
nodeId := nodeIds[0]
|
||||
|
||||
// 获取角色Node信息
|
||||
apiToken, err := models.SharedApiTokenDAO.FindEnabledTokenWithNodeCacheable(nil, nodeId)
|
||||
if err != nil {
|
||||
utils.PrintError(err)
|
||||
return UserTypeNone, 0, 0, err
|
||||
}
|
||||
nodeUserId := int64(0)
|
||||
if apiToken == nil {
|
||||
return UserTypeNode, 0, 0, errors.New("context: can not find api token for node '" + nodeId + "'")
|
||||
}
|
||||
|
||||
tokens := md.Get("token")
|
||||
if len(tokens) == 0 || len(tokens[0]) == 0 {
|
||||
return UserTypeNone, 0, 0, errors.New("context: need 'token'")
|
||||
}
|
||||
token := tokens[0]
|
||||
|
||||
data, err := base64.StdEncoding.DecodeString(token)
|
||||
if err != nil {
|
||||
return UserTypeNone, 0, 0, err
|
||||
}
|
||||
|
||||
method, err := encrypt.NewMethodInstance(teaconst.EncryptMethod, apiToken.Secret, nodeId)
|
||||
if err != nil {
|
||||
utils.PrintError(err)
|
||||
return UserTypeNone, 0, 0, err
|
||||
}
|
||||
data, err = method.Decrypt(data)
|
||||
if err != nil {
|
||||
return UserTypeNone, 0, 0, err
|
||||
}
|
||||
if len(data) == 0 {
|
||||
return UserTypeNone, 0, 0, errors.New("invalid token")
|
||||
}
|
||||
|
||||
var m = maps.Map{}
|
||||
err = json.Unmarshal(data, &m)
|
||||
if err != nil {
|
||||
return UserTypeNone, 0, 0, errors.New("decode token error: " + err.Error())
|
||||
}
|
||||
|
||||
t := m.GetString("type")
|
||||
if len(userTypes) > 0 && !lists.ContainsString(userTypes, t) {
|
||||
return UserTypeNone, 0, 0, errors.New("not supported node type: '" + t + "'")
|
||||
}
|
||||
|
||||
switch apiToken.Role {
|
||||
case UserTypeNode:
|
||||
nodeIntId, err := models.SharedNodeDAO.FindEnabledNodeIdWithUniqueId(nil, nodeId)
|
||||
if err != nil {
|
||||
return UserTypeNode, 0, 0, errors.New("context: " + err.Error())
|
||||
}
|
||||
if nodeIntId <= 0 {
|
||||
return UserTypeNode, 0, 0, errors.New("context: not found node with id '" + nodeId + "'")
|
||||
}
|
||||
nodeUserId = nodeIntId
|
||||
resultNodeId = nodeIntId
|
||||
case UserTypeCluster:
|
||||
clusterId, err := models.SharedNodeClusterDAO.FindEnabledClusterIdWithUniqueId(nil, nodeId)
|
||||
if err != nil {
|
||||
return UserTypeCluster, 0, 0, errors.New("context: " + err.Error())
|
||||
}
|
||||
if clusterId <= 0 {
|
||||
return UserTypeCluster, 0, 0, errors.New("context: not found cluster with id '" + nodeId + "'")
|
||||
}
|
||||
nodeUserId = clusterId
|
||||
resultNodeId = clusterId
|
||||
case UserTypeUser:
|
||||
nodeIntId, err := models.SharedUserNodeDAO.FindEnabledUserNodeIdWithUniqueId(nil, nodeId)
|
||||
if err != nil {
|
||||
return UserTypeUser, 0, 0, errors.New("context: " + err.Error())
|
||||
}
|
||||
if nodeIntId <= 0 {
|
||||
return UserTypeUser, 0, 0, errors.New("context: not found node with id '" + nodeId + "'")
|
||||
}
|
||||
resultNodeId = nodeIntId
|
||||
}
|
||||
|
||||
if nodeUserId > 0 {
|
||||
return t, resultNodeId, nodeUserId, nil
|
||||
} else {
|
||||
return t, resultNodeId, m.GetInt64("userId"), nil
|
||||
}
|
||||
}
|
||||
191
EdgeAPI/internal/rpc/utils/utils_ext_plus.go
Normal file
191
EdgeAPI/internal/rpc/utils/utils_ext_plus.go
Normal file
@@ -0,0 +1,191 @@
|
||||
//go:build plus
|
||||
|
||||
package rpcutils
|
||||
|
||||
import (
|
||||
"context"
|
||||
"encoding/base64"
|
||||
"encoding/json"
|
||||
teaconst "github.com/TeaOSLab/EdgeAPI/internal/const"
|
||||
"github.com/TeaOSLab/EdgeAPI/internal/db/models"
|
||||
"github.com/TeaOSLab/EdgeAPI/internal/db/models/authority"
|
||||
"github.com/TeaOSLab/EdgeAPI/internal/encrypt"
|
||||
"github.com/TeaOSLab/EdgeAPI/internal/errors"
|
||||
"github.com/TeaOSLab/EdgeAPI/internal/utils"
|
||||
"github.com/iwind/TeaGo/lists"
|
||||
"github.com/iwind/TeaGo/maps"
|
||||
"google.golang.org/grpc/metadata"
|
||||
)
|
||||
|
||||
// ValidateRequest 校验请求
|
||||
func ValidateRequest(ctx context.Context, userTypes ...UserType) (userType UserType, resultNodeId int64, userId int64, err error) {
|
||||
if ctx == nil {
|
||||
err = errors.New("context should not be nil")
|
||||
return
|
||||
}
|
||||
|
||||
// 支持直接认证
|
||||
plainCtx, ok := ctx.(*PlainContext)
|
||||
if ok {
|
||||
userType = plainCtx.UserType
|
||||
userId = plainCtx.UserId
|
||||
|
||||
if len(userTypes) > 0 && !lists.ContainsString(userTypes, userType) {
|
||||
userType = UserTypeNone
|
||||
userId = 0
|
||||
}
|
||||
|
||||
if userId <= 0 {
|
||||
err = errors.New("context: can not find user or permission denied")
|
||||
}
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
// 是否是模拟测试
|
||||
{
|
||||
mockCtx, isMock := ctx.(*MockNodeContext)
|
||||
if isMock {
|
||||
return UserTypeNode, 0, mockCtx.NodeId, nil
|
||||
}
|
||||
}
|
||||
|
||||
{
|
||||
mockCtx, isMock := ctx.(*MockAdminNodeContext)
|
||||
if isMock {
|
||||
return UserTypeAdmin, 0, mockCtx.AdminId, nil
|
||||
}
|
||||
}
|
||||
|
||||
md, ok := metadata.FromIncomingContext(ctx)
|
||||
if !ok {
|
||||
return UserTypeNone, 0, 0, errors.New("context: need 'nodeId'")
|
||||
}
|
||||
nodeIds := md.Get("nodeid")
|
||||
if len(nodeIds) == 0 || len(nodeIds[0]) == 0 {
|
||||
return UserTypeNone, 0, 0, errors.New("context: need 'nodeId'")
|
||||
}
|
||||
nodeId := nodeIds[0]
|
||||
|
||||
// 获取角色Node信息
|
||||
apiToken, err := models.SharedApiTokenDAO.FindEnabledTokenWithNodeCacheable(nil, nodeId)
|
||||
if err != nil {
|
||||
utils.PrintError(err)
|
||||
return UserTypeNone, 0, 0, err
|
||||
}
|
||||
nodeUserId := int64(0)
|
||||
if apiToken == nil {
|
||||
return UserTypeNode, 0, 0, errors.New("context: can not find api token for node '" + nodeId + "'")
|
||||
}
|
||||
|
||||
var tokens = md.Get("token")
|
||||
if len(tokens) == 0 || len(tokens[0]) == 0 {
|
||||
return UserTypeNone, 0, 0, errors.New("context: need 'token'")
|
||||
}
|
||||
token := tokens[0]
|
||||
|
||||
data, err := base64.StdEncoding.DecodeString(token)
|
||||
if err != nil {
|
||||
return UserTypeNone, 0, 0, err
|
||||
}
|
||||
|
||||
method, err := encrypt.NewMethodInstance(teaconst.EncryptMethod, apiToken.Secret, nodeId)
|
||||
if err != nil {
|
||||
utils.PrintError(err)
|
||||
return UserTypeNone, 0, 0, err
|
||||
}
|
||||
data, err = method.Decrypt(data)
|
||||
if err != nil {
|
||||
return UserTypeNone, 0, 0, err
|
||||
}
|
||||
if len(data) == 0 {
|
||||
return UserTypeNone, 0, 0, errors.New("invalid token")
|
||||
}
|
||||
|
||||
var m = maps.Map{}
|
||||
err = json.Unmarshal(data, &m)
|
||||
if err != nil {
|
||||
return UserTypeNone, 0, 0, errors.New("decode token error: " + err.Error())
|
||||
}
|
||||
|
||||
var t = m.GetString("type")
|
||||
|
||||
if t != apiToken.Role {
|
||||
return UserTypeNone, 0, 0, errors.New("wrong token role, expect: '" + apiToken.Role + "', but give '" + t + "'")
|
||||
}
|
||||
|
||||
if len(userTypes) > 0 {
|
||||
if !lists.ContainsString(userTypes, t) {
|
||||
return UserTypeNone, 0, 0, errors.New("not supported node type: '" + t + "'")
|
||||
}
|
||||
}
|
||||
|
||||
switch apiToken.Role {
|
||||
case UserTypeNode:
|
||||
nodeIntId, err := models.SharedNodeDAO.FindEnabledNodeIdWithUniqueId(nil, nodeId)
|
||||
if err != nil {
|
||||
return UserTypeNode, 0, 0, errors.New("context: " + err.Error())
|
||||
}
|
||||
if nodeIntId <= 0 {
|
||||
return UserTypeNode, 0, 0, errors.New("context: not found node with id '" + nodeId + "'")
|
||||
}
|
||||
|
||||
nodeUserId = nodeIntId
|
||||
resultNodeId = nodeIntId
|
||||
case UserTypeCluster:
|
||||
clusterId, err := models.SharedNodeClusterDAO.FindEnabledClusterIdWithUniqueId(nil, nodeId)
|
||||
if err != nil {
|
||||
return UserTypeCluster, 0, 0, errors.New("context: " + err.Error())
|
||||
}
|
||||
if clusterId <= 0 {
|
||||
return UserTypeCluster, 0, 0, errors.New("context: not found cluster with id '" + nodeId + "'")
|
||||
}
|
||||
nodeUserId = clusterId
|
||||
resultNodeId = clusterId
|
||||
case UserTypeUser:
|
||||
nodeIntId, err := models.SharedUserNodeDAO.FindEnabledUserNodeIdWithUniqueId(nil, nodeId)
|
||||
if err != nil {
|
||||
return UserTypeUser, 0, 0, errors.New("context: " + err.Error())
|
||||
}
|
||||
if nodeIntId <= 0 {
|
||||
return UserTypeUser, 0, 0, errors.New("context: not found node with id '" + nodeId + "'")
|
||||
}
|
||||
resultNodeId = nodeIntId
|
||||
case UserTypeAuthority:
|
||||
nodeIntId, err := authority.SharedAuthorityNodeDAO.FindEnabledAuthorityNodeIdWithUniqueId(nil, nodeId)
|
||||
if err != nil {
|
||||
return UserTypeAuthority, 0, 0, errors.New("context: " + err.Error())
|
||||
}
|
||||
if nodeIntId <= 0 {
|
||||
return UserTypeAuthority, 0, 0, errors.New("context: not found node with id '" + nodeId + "'")
|
||||
}
|
||||
nodeUserId = nodeIntId
|
||||
resultNodeId = nodeIntId
|
||||
case UserTypeDNS:
|
||||
nodeIntId, err := models.SharedNSNodeDAO.FindEnabledNodeIdWithUniqueId(nil, nodeId)
|
||||
if err != nil {
|
||||
return UserTypeDNS, nodeIntId, 0, errors.New("context: " + err.Error())
|
||||
}
|
||||
if nodeIntId <= 0 {
|
||||
return UserTypeDNS, nodeIntId, 0, errors.New("context: not found node with id '" + nodeId + "'")
|
||||
}
|
||||
nodeUserId = nodeIntId
|
||||
resultNodeId = nodeIntId
|
||||
case UserTypeReport:
|
||||
nodeIntId, err := models.SharedReportNodeDAO.FindEnabledNodeIdWithUniqueId(nil, nodeId)
|
||||
if err != nil {
|
||||
return UserTypeReport, nodeIntId, 0, errors.New("context: " + err.Error())
|
||||
}
|
||||
if nodeIntId <= 0 {
|
||||
return UserTypeReport, nodeIntId, 0, errors.New("context: not found node with id '" + nodeId + "'")
|
||||
}
|
||||
nodeUserId = nodeIntId
|
||||
resultNodeId = nodeIntId
|
||||
}
|
||||
|
||||
if nodeUserId > 0 {
|
||||
return t, resultNodeId, nodeUserId, nil
|
||||
} else {
|
||||
return t, resultNodeId, m.GetInt64("userId"), nil
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user