Files
platform/web/auth/authenticate.go

137 lines
3.2 KiB
Go
Raw Normal View History

2025-04-08 09:35:19 +08:00
package auth
2025-03-18 17:57:07 +08:00
import (
"context"
"encoding/base64"
"errors"
"log/slog"
q "platform/web/queries"
2025-03-29 11:13:10 +08:00
"slices"
2025-03-18 17:57:07 +08:00
"strings"
"github.com/gofiber/fiber/v2"
"golang.org/x/crypto/bcrypt"
2025-03-18 17:57:07 +08:00
)
func Protect(c *fiber.Ctx, types []PayloadType, permissions []string) (*Context, error) {
// 获取令牌
var header = c.Get("Authorization")
var split = strings.Split(header, " ")
if len(split) != 2 {
return nil, fiber.NewError(fiber.StatusUnauthorized, "无效的令牌")
}
2025-03-18 17:57:07 +08:00
var token = split[1]
if token == "" {
return nil, fiber.NewError(fiber.StatusUnauthorized, "无效的令牌")
}
var auth *Context
var err error
switch split[0] {
case "Bearer":
auth, err = authBearer(c.Context(), token)
if err != nil {
2025-05-06 19:05:44 +08:00
slog.Debug("Bearer 认证失败", "err", err)
return nil, fiber.NewError(fiber.StatusUnauthorized, "无效的令牌")
}
case "Basic":
if !slices.Contains(types, PayloadClientConfidential) {
slog.Debug("禁止使用 Basic 认证方式")
return nil, fiber.NewError(fiber.StatusUnauthorized, "无效的令牌")
}
auth, err = authBasic(c.Context(), token)
if err != nil {
2025-05-06 19:05:44 +08:00
slog.Debug("Basic 认证失败", "err", err)
return nil, fiber.NewError(fiber.StatusUnauthorized, "无效的令牌")
}
default:
slog.Debug("无效的认证方式")
return nil, fiber.NewError(fiber.StatusUnauthorized, "无效的令牌")
}
// 检查权限
if !slices.Contains(types, auth.Payload.Type) {
slog.Debug("无效的认证主体")
return nil, fiber.NewError(fiber.StatusForbidden, "没有权限")
}
if len(permissions) > 0 && !auth.AnyPermission(permissions...) {
slog.Debug("无效的认证权限")
return nil, fiber.NewError(fiber.StatusForbidden, "没有权限")
}
// 保存到上下文
Locals(c, auth)
return auth, nil
}
func Locals(c *fiber.Ctx, auth *Context) {
c.Locals("auth", auth)
c.Locals("authtype", auth.Payload.Type.ToStr())
c.Locals("authid", auth.Payload.Id)
}
2025-03-18 17:57:07 +08:00
func authBearer(ctx context.Context, token string) (*Context, error) {
auth, err := find(ctx, token)
if err != nil {
slog.Debug(err.Error())
return nil, err
2025-03-18 17:57:07 +08:00
}
return auth, nil
2025-03-18 17:57:07 +08:00
}
2025-03-28 15:01:30 +08:00
func authBasic(_ context.Context, token string) (*Context, error) {
2025-03-28 15:01:30 +08:00
// 解析 Basic 认证信息
var base, err = base64.RawURLEncoding.DecodeString(token)
if err != nil {
slog.Debug(err.Error())
return nil, err
}
2025-03-28 15:01:30 +08:00
var split = strings.Split(string(base), ":")
if len(split) != 2 {
msg := "无法解析 Basic 认证信息"
slog.Debug(msg)
return nil, errors.New(msg)
}
2025-03-28 15:01:30 +08:00
var clientID = split[0]
// 获取客户端信息
client, err := q.Client.
Where(
q.Client.ClientID.Eq(clientID),
q.Client.Spec.Eq(3),
q.Client.GrantClient.Is(true),
q.Client.Status.Eq(1)).
Take()
if err != nil {
return nil, err
2025-03-28 15:01:30 +08:00
}
// 检查客户端密钥
var clientSecret = split[1]
if bcrypt.CompareHashAndPassword([]byte(client.ClientSecret), []byte(clientSecret)) != nil {
return nil, errors.New("客户端密钥错误")
}
// todo 查询客户端关联权限
// 组织授权信息(一次性请求)
return &Context{
Payload: Payload{
Id: client.ID,
Type: PayloadClientConfidential,
Name: client.Name,
Avatar: client.Icon,
},
Permissions: nil,
Metadata: nil,
}, nil
2025-03-28 15:01:30 +08:00
}