|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/tal-tech/go-zero/core/conf"
|
|
|
|
"github.com/tal-tech/go-zero/rest"
|
|
|
|
"github.com/tal-tech/go-zero/rest/httpx"
|
|
|
|
|
|
|
|
"github.com/dgrijalva/jwt-go"
|
|
|
|
"github.com/dgrijalva/jwt-go/request"
|
|
|
|
)
|
|
|
|
|
|
|
|
const jwtUserField = "user"
|
|
|
|
|
|
|
|
type (
|
|
|
|
Config struct {
|
|
|
|
rest.RestConf
|
|
|
|
AccessSecret string
|
|
|
|
AccessExpire int64 `json:",default=1209600"` // 2 weeks
|
|
|
|
RefreshSecret string
|
|
|
|
RefreshExpire int64 `json:",default=2419200"` // 4 weeks
|
|
|
|
RefreshAfter int64 `json:",default=604800"` // 1 week
|
|
|
|
}
|
|
|
|
|
|
|
|
TokenOptions struct {
|
|
|
|
AccessSecret string
|
|
|
|
AccessExpire int64
|
|
|
|
RefreshSecret string
|
|
|
|
RefreshExpire int64
|
|
|
|
RefreshAfter int64
|
|
|
|
Fields map[string]interface{}
|
|
|
|
}
|
|
|
|
|
|
|
|
Tokens struct {
|
|
|
|
// Access token to access the apis
|
|
|
|
AccessToken string `json:"access_token"`
|
|
|
|
// Access token expire time, generated like: time.Now().Add(time.Day*14).Unix()
|
|
|
|
AccessExpire int64 `json:"access_expire"`
|
|
|
|
// Refresh token, use this to refresh the token
|
|
|
|
RefreshToken string `json:"refresh_token"`
|
|
|
|
// Refresh token expire time, generated like: time.Now().Add(time.Month).Unix()
|
|
|
|
RefreshExpire int64 `json:"refresh_expire"`
|
|
|
|
// Recommended time to refresh the access token
|
|
|
|
RefreshAfter int64 `json:"refresh_after"`
|
|
|
|
}
|
|
|
|
|
|
|
|
UserCredentials struct {
|
|
|
|
Username string `json:"username"`
|
|
|
|
Password string `json:"password"`
|
|
|
|
}
|
|
|
|
|
|
|
|
User struct {
|
|
|
|
ID int `json:"id"`
|
|
|
|
Name string `json:"name"`
|
|
|
|
Username string `json:"username"`
|
|
|
|
Password string `json:"password"`
|
|
|
|
}
|
|
|
|
|
|
|
|
Response struct {
|
|
|
|
Data string `json:"data"`
|
|
|
|
}
|
|
|
|
|
|
|
|
Token struct {
|
|
|
|
Token string `json:"token"`
|
|
|
|
}
|
|
|
|
|
|
|
|
AuthRequest struct {
|
|
|
|
User string `json:"u"`
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
func main() {
|
|
|
|
var c Config
|
|
|
|
conf.MustLoad("user.json", &c)
|
|
|
|
|
|
|
|
engine, err := rest.NewServer(c.RestConf)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
defer engine.Stop()
|
|
|
|
|
|
|
|
engine.AddRoute(rest.Route{
|
|
|
|
Method: http.MethodPost,
|
|
|
|
Path: "/login",
|
|
|
|
Handler: LoginHandler(c),
|
|
|
|
})
|
|
|
|
engine.AddRoute(rest.Route{
|
|
|
|
Method: http.MethodGet,
|
|
|
|
Path: "/resource",
|
|
|
|
Handler: ProtectedHandler,
|
|
|
|
}, rest.WithJwt(c.AccessSecret))
|
|
|
|
engine.AddRoute(rest.Route{
|
|
|
|
Method: http.MethodPost,
|
|
|
|
Path: "/refresh",
|
|
|
|
Handler: RefreshHandler(c),
|
|
|
|
}, rest.WithJwt(c.RefreshSecret))
|
|
|
|
|
|
|
|
fmt.Println("Now listening...")
|
|
|
|
engine.Start()
|
|
|
|
}
|
|
|
|
|
|
|
|
func RefreshHandler(c Config) http.HandlerFunc {
|
|
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
var authReq AuthRequest
|
|
|
|
|
|
|
|
if err := httpx.Parse(r, &authReq); err != nil {
|
|
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
|
|
fmt.Println(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
token, err := request.ParseFromRequest(r, request.AuthorizationHeaderExtractor,
|
|
|
|
func(token *jwt.Token) (interface{}, error) {
|
|
|
|
return []byte(c.RefreshSecret), nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
w.WriteHeader(http.StatusUnauthorized)
|
|
|
|
fmt.Println("Unauthorized access to this resource")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if !token.Valid {
|
|
|
|
w.WriteHeader(http.StatusUnauthorized)
|
|
|
|
fmt.Println("Token is not valid")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
claims, ok := token.Claims.(jwt.MapClaims)
|
|
|
|
if !ok {
|
|
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
|
|
fmt.Println("not a valid jwt.MapClaims")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
user, ok := claims[jwtUserField]
|
|
|
|
if !ok {
|
|
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
|
|
fmt.Println("no user info in fresh token")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
userStr, ok := user.(string)
|
|
|
|
if !ok || authReq.User != userStr {
|
|
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
|
|
fmt.Println("user info not match in query and fresh token")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
respond(w, c, userStr)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func ProtectedHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
response := Response{"Gained access to protected resource"}
|
|
|
|
JsonResponse(response, w)
|
|
|
|
}
|
|
|
|
|
|
|
|
func LoginHandler(c Config) http.HandlerFunc {
|
|
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
var user UserCredentials
|
|
|
|
|
|
|
|
if err := httpx.Parse(r, &user); err != nil {
|
|
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
|
|
fmt.Fprint(w, "Error in request")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if strings.ToLower(user.Username) != "someone" {
|
|
|
|
if user.Password != "p@ssword" {
|
|
|
|
w.WriteHeader(http.StatusForbidden)
|
|
|
|
fmt.Println("Error logging in")
|
|
|
|
fmt.Fprint(w, "Invalid credentials")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
respond(w, c, user.Username)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func JsonResponse(response interface{}, w http.ResponseWriter) {
|
|
|
|
content, err := json.Marshal(response)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
w.Write(content)
|
|
|
|
}
|
|
|
|
|
|
|
|
type ()
|
|
|
|
|
|
|
|
func buildTokens(opt TokenOptions) (Tokens, error) {
|
|
|
|
var tokens Tokens
|
|
|
|
|
|
|
|
accessToken, err := genToken(opt.AccessSecret, opt.Fields, opt.AccessExpire)
|
|
|
|
if err != nil {
|
|
|
|
return tokens, err
|
|
|
|
}
|
|
|
|
|
|
|
|
refreshToken, err := genToken(opt.RefreshSecret, opt.Fields, opt.RefreshExpire)
|
|
|
|
if err != nil {
|
|
|
|
return tokens, err
|
|
|
|
}
|
|
|
|
|
|
|
|
now := time.Now().Unix()
|
|
|
|
tokens.AccessToken = accessToken
|
|
|
|
tokens.AccessExpire = now + opt.AccessExpire
|
|
|
|
tokens.RefreshAfter = now + opt.RefreshAfter
|
|
|
|
tokens.RefreshToken = refreshToken
|
|
|
|
tokens.RefreshExpire = now + opt.RefreshExpire
|
|
|
|
|
|
|
|
return tokens, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func genToken(secretKey string, payloads map[string]interface{}, seconds int64) (string, error) {
|
|
|
|
now := time.Now().Unix()
|
|
|
|
claims := make(jwt.MapClaims)
|
|
|
|
claims["exp"] = now + seconds
|
|
|
|
claims["iat"] = now
|
|
|
|
for k, v := range payloads {
|
|
|
|
claims[k] = v
|
|
|
|
}
|
|
|
|
|
|
|
|
token := jwt.New(jwt.SigningMethodHS256)
|
|
|
|
token.Claims = claims
|
|
|
|
|
|
|
|
return token.SignedString([]byte(secretKey))
|
|
|
|
}
|
|
|
|
|
|
|
|
func respond(w http.ResponseWriter, c Config, user string) {
|
|
|
|
tokens, err := buildTokens(TokenOptions{
|
|
|
|
AccessSecret: c.AccessSecret,
|
|
|
|
AccessExpire: c.AccessExpire,
|
|
|
|
RefreshSecret: c.RefreshSecret,
|
|
|
|
RefreshExpire: c.RefreshExpire,
|
|
|
|
RefreshAfter: c.RefreshAfter,
|
|
|
|
Fields: map[string]interface{}{
|
|
|
|
jwtUserField: user,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
w.WriteHeader(http.StatusServiceUnavailable)
|
|
|
|
fmt.Println(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
httpx.OkJson(w, tokens)
|
|
|
|
}
|