You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

accesstoken.go 4.5 kB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208
  1. package accesstoken
  2. import (
  3. "context"
  4. "crypto/ed25519"
  5. "crypto/rand"
  6. "encoding/hex"
  7. "fmt"
  8. "sync"
  9. "time"
  10. "gitlink.org.cn/cloudream/common/pkgs/async"
  11. "gitlink.org.cn/cloudream/common/pkgs/logger"
  12. "gitlink.org.cn/cloudream/jcs-pub/common/ecode"
  13. stgglb "gitlink.org.cn/cloudream/jcs-pub/common/globals"
  14. "gitlink.org.cn/cloudream/jcs-pub/common/pkgs/accesstoken"
  15. "gitlink.org.cn/cloudream/jcs-pub/common/pkgs/rpc"
  16. corrpc "gitlink.org.cn/cloudream/jcs-pub/common/pkgs/rpc/coordinator"
  17. jcstypes "gitlink.org.cn/cloudream/jcs-pub/common/types"
  18. )
  19. type KeeperEvent interface {
  20. IsAccessTokenKeeper() bool
  21. }
  22. type ExitEvent struct {
  23. KeeperEvent
  24. Err error
  25. }
  26. type Keeper struct {
  27. cfg Config
  28. enabled bool
  29. token jcstypes.UserAccessToken
  30. priKey ed25519.PrivateKey
  31. lock sync.RWMutex
  32. done chan any
  33. }
  34. func New(cfg Config, tempCli *corrpc.TempClient) (*Keeper, error) {
  35. loginResp, cerr := tempCli.UserLogin(context.Background(), &corrpc.UserLogin{
  36. Account: cfg.Account,
  37. Password: cfg.Password,
  38. })
  39. if cerr != nil {
  40. return nil, fmt.Errorf("login: %w", cerr.ToError())
  41. }
  42. priKey, err := hex.DecodeString(loginResp.PrivateKey)
  43. if err != nil {
  44. return nil, fmt.Errorf("decode private key: %w", err)
  45. }
  46. return &Keeper{
  47. cfg: cfg,
  48. enabled: true,
  49. token: loginResp.Token,
  50. priKey: priKey,
  51. done: make(chan any, 1),
  52. }, nil
  53. }
  54. func NewDisabled() *Keeper {
  55. return &Keeper{
  56. done: make(chan any, 1),
  57. enabled: false,
  58. }
  59. }
  60. func (k *Keeper) Start() *async.UnboundChannel[KeeperEvent] {
  61. log := logger.WithField("Mod", "Keeper")
  62. ch := async.NewUnboundChannel[KeeperEvent]()
  63. go func() {
  64. if !k.enabled {
  65. return
  66. }
  67. k.lock.RLock()
  68. log.Infof("login success, token expires at %v", k.token.ExpiresAt)
  69. k.lock.RUnlock()
  70. ticker := time.NewTicker(time.Minute)
  71. defer ticker.Stop()
  72. loop:
  73. for {
  74. select {
  75. case <-k.done:
  76. break loop
  77. case <-ticker.C:
  78. k.lock.RLock()
  79. token := k.token
  80. k.lock.RUnlock()
  81. // 当前Token已经过期,说明之前的刷新都失败了,打个日志
  82. if time.Now().After(token.ExpiresAt) {
  83. log.Warnf("token expired at %v !", token.ExpiresAt)
  84. }
  85. // 在Token到期前5分钟时就要开始刷新Token
  86. tokenDeadline := token.ExpiresAt.Add(-time.Minute * 5)
  87. if time.Now().Before(tokenDeadline) {
  88. continue
  89. }
  90. var priKeyStr string
  91. var newToken jcstypes.UserAccessToken
  92. corCli := stgglb.CoordinatorRPCPool.Get()
  93. refResp, cerr := corCli.UserRefreshToken(context.Background(), &corrpc.UserRefreshToken{})
  94. if cerr != nil {
  95. if cerr.Code != string(ecode.Unauthorized) {
  96. log.Warnf("refresh token: %v", cerr)
  97. corCli.Release()
  98. continue
  99. }
  100. log.Warnf("unauthorized to refresh token, login again")
  101. loginResp, cerr := corCli.UserLogin(context.Background(), &corrpc.UserLogin{
  102. Account: k.cfg.Account,
  103. Password: k.cfg.Password,
  104. })
  105. if cerr != nil {
  106. log.Warnf("login: %v", cerr)
  107. corCli.Release()
  108. continue
  109. } else {
  110. priKeyStr = loginResp.PrivateKey
  111. newToken = loginResp.Token
  112. }
  113. } else {
  114. priKeyStr = refResp.PrivateKey
  115. newToken = refResp.Token
  116. }
  117. priKey, err := hex.DecodeString(priKeyStr)
  118. if err != nil {
  119. log.Warnf("decode private key: %v", err)
  120. corCli.Release()
  121. continue
  122. }
  123. log.Infof("new token expires at %v", newToken.ExpiresAt)
  124. k.lock.Lock()
  125. k.token = newToken
  126. k.priKey = priKey
  127. k.lock.Unlock()
  128. corCli.Release()
  129. }
  130. }
  131. ch.Send(ExitEvent{})
  132. }()
  133. return ch
  134. }
  135. func (k *Keeper) Stop() {
  136. select {
  137. case k.done <- true:
  138. default:
  139. }
  140. }
  141. func (k *Keeper) GetToken() jcstypes.UserAccessToken {
  142. k.lock.RLock()
  143. defer k.lock.RUnlock()
  144. return k.token
  145. }
  146. func (k *Keeper) MakeAuthInfo() (rpc.AccessTokenAuthInfo, error) {
  147. if !k.enabled {
  148. return rpc.AccessTokenAuthInfo{}, fmt.Errorf("function disabled")
  149. }
  150. k.lock.RLock()
  151. token := k.token
  152. k.lock.RUnlock()
  153. bytes := make([]byte, 8)
  154. _, err := rand.Read(bytes)
  155. if err != nil {
  156. return rpc.AccessTokenAuthInfo{}, fmt.Errorf("generate nonce: %w", err)
  157. }
  158. nonce := hex.EncodeToString(bytes)
  159. stringToSign := accesstoken.MakeStringToSign(token.UserID, token.TokenID, nonce)
  160. signBytes := ed25519.Sign(k.priKey, []byte(stringToSign))
  161. signature := hex.EncodeToString(signBytes)
  162. return rpc.AccessTokenAuthInfo{
  163. UserID: token.UserID,
  164. AccessTokenID: token.TokenID,
  165. Nonce: nonce,
  166. Signature: signature,
  167. }, nil
  168. }

本项目旨在将云际存储公共基础设施化,使个人及企业可低门槛使用高效的云际存储服务(安装开箱即用云际存储客户端即可,无需关注其他组件的部署),同时支持用户灵活便捷定制云际存储的功能细节。