member_gateway_rest/service/member-service.go

184 lines
5.0 KiB
Go
Raw Normal View History

2018-04-06 10:08:38 +00:00
package service
import (
2018-04-06 10:47:42 +00:00
"context"
2018-04-10 07:11:17 +00:00
"crypto/rsa"
"encoding/json"
"fmt"
2018-04-10 06:58:38 +00:00
"reflect"
2018-04-10 07:11:17 +00:00
"time"
2018-04-06 10:47:42 +00:00
2018-04-10 06:58:38 +00:00
cda "git.loafle.net/commons/di-go/annotation"
cdr "git.loafle.net/commons/di-go/registry"
2018-04-11 13:08:41 +00:00
"git.loafle.net/commons/logging-go"
2018-04-06 10:08:38 +00:00
"git.loafle.net/commons/server-go"
2018-04-10 06:58:38 +00:00
_ "git.loafle.net/overflow/commons-go/annotation"
2018-04-06 12:17:07 +00:00
"git.loafle.net/overflow/gateway/external/grpc"
2018-04-06 10:08:38 +00:00
"github.com/valyala/fasthttp"
2018-04-10 07:11:17 +00:00
2018-04-11 08:19:00 +00:00
"net/url"
2018-04-10 07:11:17 +00:00
2018-04-11 14:23:47 +00:00
"github.com/dgrijalva/jwt-go"
)
2018-04-06 10:08:38 +00:00
2018-04-10 06:58:38 +00:00
var MemberServiceType = reflect.TypeOf((*MemberService)(nil))
2018-04-11 14:23:47 +00:00
func init() {
2018-04-10 06:58:38 +00:00
cdr.RegisterType(MemberServiceType)
}
2018-04-06 10:08:38 +00:00
type MemberService struct {
2018-04-10 14:30:45 +00:00
cda.TypeAnnotation `annotation:"@overflow:RESTService()"`
2018-04-11 14:23:47 +00:00
VerifyKey *rsa.PublicKey `annotation:"@Resource(name='VerifyKey')"`
SignKey *rsa.PrivateKey `annotation:"@Resource(name='SignKey')"`
2018-04-11 13:08:41 +00:00
2018-04-11 14:23:47 +00:00
_Signin cda.MethodAnnotation `annotation:"@overflow:RequestMapping(method='POST', entry='/account/signin', params='[signinID, signinPW]')"`
_SigninByCookie cda.MethodAnnotation `annotation:"@overflow:RequestMapping(method='POST', entry='/account/signin_cookie', params='[authToken]')"`
_Signup cda.MethodAnnotation `annotation:"@overflow:RequestMapping(method='POST', entry='/account/signup', params='[member, pw]')"`
_EmailConfirm cda.MethodAnnotation `annotation:"@overflow:RequestMapping(method='GET', entry='/account/email_confirm', params='[token]')"`
_ForgotPassword cda.MethodAnnotation `annotation:"@overflow:RequestMapping(method='POST', entry='/account/forgot_password', params='[signinID]')"`
_ResetPwConfirm cda.MethodAnnotation `annotation:"@overflow:RequestMapping(method='POST', entry='/account/reset_pw_confirm', params='[pw, key]')"`
2018-04-06 10:08:38 +00:00
}
2018-04-11 06:05:09 +00:00
func (ms *MemberService) EmailConfirm(servletCtx server.ServletCtx, ctx *fasthttp.RequestCtx, token string) error {
var c fasthttp.Cookie
c.SetKey("cookie-name")
c.SetValue("cookie-value")
ctx.Response.Header.SetCookie(&c)
2018-04-11 04:35:29 +00:00
2018-04-11 06:05:09 +00:00
ctx.SetBody([]byte("DDDDDDD"))
return nil
2018-04-11 04:35:29 +00:00
}
2018-04-11 06:05:09 +00:00
type SigninResult struct {
AuthToken string `json:"authToken"`
DomainMember interface{} `json:"domainMember"`
}
func (ms *MemberService) Signin(servletCtx server.ServletCtx, ctx *fasthttp.RequestCtx, signinID string, signinPW string) error {
2018-04-06 10:08:38 +00:00
2018-04-06 10:47:42 +00:00
gRPCCtx := context.Background()
2018-04-10 07:11:17 +00:00
r, err := grpc.Exec(gRPCCtx, "MemberService.signin", signinID, signinPW)
if nil != err {
2018-04-11 06:05:09 +00:00
return err
2018-04-10 07:11:17 +00:00
}
token := jwt.New(jwt.SigningMethodRS512)
/* Create a map to store our claims */
claims := token.Claims.(jwt.MapClaims)
// expireTime := time.Now().Add(time.Hour * 24)
/* Set token claims */
claims["iss"] = "overFlow"
claims["iat"] = time.Now().Unix()
claims["exp"] = time.Now().Add(time.Hour * 24).Unix()
claims["aud"] = "www.overflow.cloud"
claims["sub"] = signinID
/* Sign the token with our secret */
2018-04-11 13:08:41 +00:00
tokenString, err := token.SignedString(ms.SignKey)
2018-04-10 07:11:17 +00:00
if nil != err {
2018-04-11 06:05:09 +00:00
return err
2018-04-10 07:11:17 +00:00
}
var domainMember interface{}
err = json.Unmarshal([]byte(r), &domainMember)
if nil != err {
2018-04-11 06:05:09 +00:00
return err
2018-04-10 07:11:17 +00:00
}
2018-04-11 06:05:09 +00:00
signInResult := &SigninResult{
2018-04-10 07:11:17 +00:00
AuthToken: tokenString,
DomainMember: domainMember,
}
buf, err := json.Marshal(signInResult)
if nil != err {
2018-04-11 06:05:09 +00:00
return err
2018-04-10 07:11:17 +00:00
}
2018-04-11 06:05:09 +00:00
ctx.SetBody(buf)
return nil
2018-04-10 07:11:17 +00:00
}
2018-04-11 06:05:09 +00:00
func (ms *MemberService) SigninByCookie(servletCtx server.ServletCtx, ctx *fasthttp.RequestCtx, authToken string) error {
2018-04-10 07:11:17 +00:00
token, err := jwt.Parse(authToken, func(token *jwt.Token) (interface{}, error) {
// Don't forget to validate the alg is what you expect:
if _, ok := token.Method.(*jwt.SigningMethodRSA); !ok {
return nil, fmt.Errorf("Webapp: Unexpected signing method: %v", token.Header["alg"])
}
// hmacSampleSecret is a []byte containing your secret, e.g. []byte("my_secret_key")
2018-04-11 13:08:41 +00:00
return ms.VerifyKey, nil
2018-04-10 07:11:17 +00:00
})
2018-04-06 10:47:42 +00:00
if nil != err {
2018-04-11 06:05:09 +00:00
return err
2018-04-06 10:47:42 +00:00
}
2018-04-10 07:11:17 +00:00
var ok bool
var claims jwt.MapClaims
if claims, ok = token.Claims.(jwt.MapClaims); !ok || !token.Valid {
logging.Logger().Warnf("Token is not valid %v", token)
2018-04-11 06:05:09 +00:00
return fmt.Errorf("authToken is not valid")
2018-04-10 07:11:17 +00:00
}
params := []string{claims["sub"].(string)}
gRPCCtx := context.Background()
r, err := grpc.Exec(gRPCCtx, "DomainMemberService.readByMemberEmail", params...)
2018-04-11 06:05:09 +00:00
if nil != err {
return err
}
2018-04-10 07:11:17 +00:00
2018-04-11 06:05:09 +00:00
ctx.SetBody([]byte(r))
2018-04-06 10:08:38 +00:00
2018-04-11 06:05:09 +00:00
return nil
2018-04-06 10:08:38 +00:00
}
2018-04-10 07:11:17 +00:00
2018-04-11 08:19:00 +00:00
func (ms *MemberService) Signup(servletCtx server.ServletCtx, ctx *fasthttp.RequestCtx, member string, pw string) error {
gRPCCtx := context.Background()
r, err := grpc.Exec(gRPCCtx, "MemberService.signup", member, pw)
if nil != err {
return err
}
ctx.SetBody([]byte(r))
2018-04-11 06:05:09 +00:00
return nil
2018-04-10 07:11:17 +00:00
}
2018-04-11 08:19:00 +00:00
func (ms *MemberService) ForgotPassword(servletCtx server.ServletCtx, ctx *fasthttp.RequestCtx, signinID string) error {
gRPCCtx := context.Background()
r, err := grpc.Exec(gRPCCtx, "MemberService.sendEmailForPassword", signinID)
if nil != err {
return err
}
ctx.SetBody([]byte(r))
return nil
}
// Todo id QueryEscape Test
func (ms *MemberService) ResetPwConfirm(servletCtx server.ServletCtx, ctx *fasthttp.RequestCtx, pw string, key string) error {
gRPCCtx := context.Background()
r, err := grpc.Exec(gRPCCtx, "MemberService.resetPassword", url.QueryEscape(key), pw)
if nil != err {
return err
}
ctx.SetBody([]byte(r))
return nil
2018-04-11 14:23:47 +00:00
}