You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

accesstoken.go 3.9 kB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182
  1. package accesstoken
  2. import (
  3. "context"
  4. "crypto/ed25519"
  5. "crypto/rand"
  6. "encoding/hex"
  7. "fmt"
  8. "sync"
  9. "time"
  10. "gitlink.org.cn/cloudream/common/pkgs/async"
  11. "gitlink.org.cn/cloudream/common/pkgs/logger"
  12. stgglb "gitlink.org.cn/cloudream/jcs-pub/common/globals"
  13. "gitlink.org.cn/cloudream/jcs-pub/common/pkgs/accesstoken"
  14. "gitlink.org.cn/cloudream/jcs-pub/common/pkgs/rpc"
  15. corrpc "gitlink.org.cn/cloudream/jcs-pub/common/pkgs/rpc/coordinator"
  16. jcstypes "gitlink.org.cn/cloudream/jcs-pub/common/types"
  17. )
  18. type KeeperEvent interface {
  19. IsAccessTokenKeeper() bool
  20. }
  21. type ExitEvent struct {
  22. KeeperEvent
  23. Err error
  24. }
  25. type Keeper struct {
  26. cfg Config
  27. enabled bool
  28. token jcstypes.UserAccessToken
  29. priKey ed25519.PrivateKey
  30. lock sync.RWMutex
  31. done chan any
  32. }
  33. func New(cfg Config, tempCli *corrpc.TempClient) (*Keeper, error) {
  34. loginResp, cerr := tempCli.UserLogin(context.Background(), &corrpc.UserLogin{
  35. Account: cfg.Account,
  36. Password: cfg.Password,
  37. })
  38. if cerr != nil {
  39. return nil, fmt.Errorf("login: %w", cerr.ToError())
  40. }
  41. priKey, err := hex.DecodeString(loginResp.PrivateKey)
  42. if err != nil {
  43. return nil, fmt.Errorf("decode private key: %w", err)
  44. }
  45. return &Keeper{
  46. cfg: cfg,
  47. enabled: true,
  48. token: loginResp.Token,
  49. priKey: priKey,
  50. done: make(chan any, 1),
  51. }, nil
  52. }
  53. func NewDisabled() *Keeper {
  54. return &Keeper{
  55. done: make(chan any, 1),
  56. enabled: false,
  57. }
  58. }
  59. func (k *Keeper) Start() *async.UnboundChannel[KeeperEvent] {
  60. log := logger.WithField("Mod", "Keeper")
  61. ch := async.NewUnboundChannel[KeeperEvent]()
  62. go func() {
  63. if !k.enabled {
  64. return
  65. }
  66. k.lock.RLock()
  67. log.Infof("login success, token expires at %v", k.token.ExpiresAt)
  68. k.lock.RUnlock()
  69. ticker := time.NewTicker(time.Minute)
  70. defer ticker.Stop()
  71. loop:
  72. for {
  73. select {
  74. case <-k.done:
  75. break loop
  76. case <-ticker.C:
  77. k.lock.RLock()
  78. token := k.token
  79. k.lock.RUnlock()
  80. // 当前Token已经过期,说明之前的刷新都失败了,打个日志
  81. if time.Now().After(token.ExpiresAt) {
  82. log.Warnf("token expired at %v !", token.ExpiresAt)
  83. }
  84. // 在Token到期前5分钟时就要开始刷新Token
  85. tokenDeadline := token.ExpiresAt.Add(-time.Minute * 5)
  86. if time.Now().Before(tokenDeadline) {
  87. continue
  88. }
  89. corCli := stgglb.CoordinatorRPCPool.Get()
  90. refResp, cerr := corCli.UserRefreshToken(context.Background(), &corrpc.UserRefreshToken{})
  91. if cerr != nil {
  92. log.Warnf("refresh token: %v", cerr)
  93. corCli.Release()
  94. continue
  95. }
  96. priKey, err := hex.DecodeString(refResp.PrivateKey)
  97. if err != nil {
  98. log.Warnf("decode private key: %v", err)
  99. corCli.Release()
  100. continue
  101. }
  102. log.Infof("refresh token success, new token expires at %v", refResp.Token.ExpiresAt)
  103. k.lock.Lock()
  104. k.token = refResp.Token
  105. k.priKey = priKey
  106. k.lock.Unlock()
  107. corCli.Release()
  108. }
  109. }
  110. ch.Send(ExitEvent{})
  111. }()
  112. return ch
  113. }
  114. func (k *Keeper) Stop() {
  115. select {
  116. case k.done <- true:
  117. default:
  118. }
  119. }
  120. func (k *Keeper) GetToken() jcstypes.UserAccessToken {
  121. k.lock.RLock()
  122. defer k.lock.RUnlock()
  123. return k.token
  124. }
  125. func (k *Keeper) MakeAuthInfo() (rpc.AccessTokenAuthInfo, error) {
  126. if !k.enabled {
  127. return rpc.AccessTokenAuthInfo{}, fmt.Errorf("function disabled")
  128. }
  129. k.lock.RLock()
  130. token := k.token
  131. k.lock.RUnlock()
  132. bytes := make([]byte, 8)
  133. _, err := rand.Read(bytes)
  134. if err != nil {
  135. return rpc.AccessTokenAuthInfo{}, fmt.Errorf("generate nonce: %w", err)
  136. }
  137. nonce := hex.EncodeToString(bytes)
  138. stringToSign := accesstoken.MakeStringToSign(token.UserID, token.TokenID, nonce)
  139. signBytes := ed25519.Sign(k.priKey, []byte(stringToSign))
  140. signature := hex.EncodeToString(signBytes)
  141. return rpc.AccessTokenAuthInfo{
  142. UserID: token.UserID,
  143. AccessTokenID: token.TokenID,
  144. Nonce: nonce,
  145. Signature: signature,
  146. }, nil
  147. }

本项目旨在将云际存储公共基础设施化,使个人及企业可低门槛使用高效的云际存储服务(安装开箱即用云际存储客户端即可,无需关注其他组件的部署),同时支持用户灵活便捷定制云际存储的功能细节。