member_gateway_rpc/servlet/webapp-servlet.go
crusader 5e46d9e576 ing
2018-04-09 22:37:03 +09:00

164 lines
4.0 KiB
Go

package servlet
import (
"crypto/rsa"
"fmt"
"io/ioutil"
logging "git.loafle.net/commons/logging-go"
"git.loafle.net/commons/server-go"
"git.loafle.net/commons/server-go/socket"
ogs "git.loafle.net/overflow/gateway/subscribe"
ogrs "git.loafle.net/overflow/gateway_rpc/servlet"
"git.loafle.net/overflow/member_gateway_rpc/subscribe"
"github.com/dgrijalva/jwt-go"
uuid "github.com/satori/go.uuid"
"github.com/valyala/fasthttp"
)
var (
verifyKey *rsa.PublicKey
signKey *rsa.PrivateKey
)
func init() {
signBytes, err := ioutil.ReadFile("overFlow-private.key")
if nil != err {
panic(err)
}
signKey, err = jwt.ParseRSAPrivateKeyFromPEM(signBytes)
if nil != err {
panic(err)
}
verifyBytes, err := ioutil.ReadFile("overFlow-public.pem")
if nil != err {
panic(err)
}
verifyKey, err = jwt.ParseRSAPublicKeyFromPEM(verifyBytes)
if nil != err {
panic(err)
}
}
type WebappServlet interface {
ogrs.RPCServlet
}
type WebappServlets struct {
ogrs.RPCServlets
}
func (s *WebappServlets) Init(serverCtx server.ServerCtx) error {
if err := s.RPCServlets.Init(serverCtx); nil != err {
return err
}
return nil
}
func (s *WebappServlets) OnStart(serverCtx server.ServerCtx) error {
if err := s.RPCServlets.OnStart(serverCtx); nil != err {
return err
}
subscribeChan, err := subscribe.Subscriber.Subscribe("/webapp")
if nil != err {
return err
}
go s.handleSubscribe(serverCtx, subscribeChan)
return nil
}
func (s *WebappServlets) OnStop(serverCtx server.ServerCtx) {
if err := subscribe.Subscriber.Unsubscribe("/webapp"); nil != err {
logging.Logger().Warn(err)
}
s.RPCServlets.OnStop(serverCtx)
}
func (s *WebappServlets) Destroy(serverCtx server.ServerCtx) {
s.RPCServlets.Destroy(serverCtx)
}
func (s *WebappServlets) Handshake(servletCtx server.ServletCtx, ctx *fasthttp.RequestCtx) (*fasthttp.ResponseHeader, error) {
var ok bool
tokenString := string(ctx.QueryArgs().Peek("authToken"))
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {
// Don't forget to validate the alg is what you expect:
if _, ok := token.Method.(*jwt.SigningMethodRSA); !ok {
return nil, fmt.Errorf("Webapp: Unexpected signing method: %v", token.Header["alg"])
}
// hmacSampleSecret is a []byte containing your secret, e.g. []byte("my_secret_key")
return verifyKey, nil
})
if nil != err {
return nil, nil
}
var claims jwt.MapClaims
if claims, ok = token.Claims.(jwt.MapClaims); !ok || !token.Valid {
return nil, fmt.Errorf("Token is not valid %v", token)
}
userEmail := claims["sub"].(string)
sessionID := uuid.NewV4().String()
logging.Logger().Debugf("%s, %s", userEmail, sessionID)
// servletCtx.SetAttribute(oogw.ClientTypeKey, ogs.MEMBER)
// servletCtx.SetAttribute(oogw.TargetIDKey, userEmail)
return nil, nil
}
func (s *WebappServlets) OnConnect(servletCtx server.ServletCtx, conn socket.Conn) {
//
}
func (s *WebappServlets) OnDisconnect(servletCtx server.ServletCtx) {
//
}
func (s *WebappServlets) handleSubscribe(serverCtx server.ServerCtx, subscribeChan <-chan *ogs.Message) {
// for {
// select {
// case msg, ok := <-subscribeChan:
// switch msg.TargetType {
// case ogs.MEMBER:
// for _, uid := range msg.Targets {
// sockets := sh.getMemberSockets(uid)
// if nil == sockets {
// continue
// }
// for _, soc := range sockets {
// if err := soc.WriteMessageUseWriter(websocket.TextMessage, message.Message); nil != err {
// logging.Logger().Errorf("OnSubscribe: write error %v", err)
// }
// }
// }
// case oos.MEMBER_SESSION:
// for _, sid := range message.Targets {
// if soc := sh.GetSocket(sid); nil != soc {
// if err := soc.WriteMessageUseWriter(websocket.TextMessage, message.Message); nil != err {
// logging.Logger().Errorf("OnSubscribe: write error %v", err)
// }
// }
// }
// default:
// logging.Logger().Warnf("[WEBAPP] SubscriberHandler: Unknown TargetType %s", message.TargetType)
// }
// }
// }
}