mirror of
https://github.com/openimsdk/open-im-server.git
synced 2025-04-05 20:11:14 +08:00
* fix: to start im or chat, ZooKeeper must be started first. * fix: msg gateway start output err info Signed-off-by: Gordon <1432970085@qq.com> * fix: msg gateway start output err info Signed-off-by: Gordon <1432970085@qq.com> * chore: package path changes Signed-off-by: withchao <993506633@qq.com> * fix: go mod update Signed-off-by: Gordon <1432970085@qq.com> * fix: token update Signed-off-by: Gordon <1432970085@qq.com> * chore: package path changes Signed-off-by: withchao <993506633@qq.com> * chore: package path changes Signed-off-by: withchao <993506633@qq.com> * fix: token update Signed-off-by: Gordon <1432970085@qq.com> * fix: token update Signed-off-by: Gordon <1432970085@qq.com> * fix: token update Signed-off-by: Gordon <1432970085@qq.com> * fix: token update Signed-off-by: Gordon <1432970085@qq.com> * fix: token update Signed-off-by: Gordon <1432970085@qq.com> --------- Signed-off-by: Gordon <1432970085@qq.com> Signed-off-by: withchao <993506633@qq.com> Co-authored-by: withchao <993506633@qq.com>
63 lines
1.8 KiB
Go
63 lines
1.8 KiB
Go
package authverify
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"github.com/OpenIMSDK/Open-IM-Server/pkg/common/config"
|
|
"github.com/OpenIMSDK/tools/errs"
|
|
"github.com/OpenIMSDK/tools/mcontext"
|
|
"github.com/OpenIMSDK/tools/tokenverify"
|
|
"github.com/OpenIMSDK/tools/utils"
|
|
"github.com/golang-jwt/jwt/v4"
|
|
)
|
|
|
|
func Secret() jwt.Keyfunc {
|
|
return func(token *jwt.Token) (interface{}, error) {
|
|
return []byte(config.Config.Secret), nil
|
|
}
|
|
}
|
|
|
|
func CheckAccessV3(ctx context.Context, ownerUserID string) (err error) {
|
|
opUserID := mcontext.GetOpUserID(ctx)
|
|
if utils.IsContain(opUserID, config.Config.Manager.UserID) {
|
|
return nil
|
|
}
|
|
if opUserID == ownerUserID {
|
|
return nil
|
|
}
|
|
return errs.ErrNoPermission.Wrap(utils.GetSelfFuncName())
|
|
}
|
|
|
|
func IsAppManagerUid(ctx context.Context) bool {
|
|
return utils.IsContain(mcontext.GetOpUserID(ctx), config.Config.Manager.UserID)
|
|
}
|
|
|
|
func CheckAdmin(ctx context.Context) error {
|
|
if utils.IsContain(mcontext.GetOpUserID(ctx), config.Config.Manager.UserID) {
|
|
return nil
|
|
}
|
|
return errs.ErrNoPermission.Wrap(fmt.Sprintf("user %s is not admin userID", mcontext.GetOpUserID(ctx)))
|
|
}
|
|
|
|
func ParseRedisInterfaceToken(redisToken interface{}) (*tokenverify.Claims, error) {
|
|
return tokenverify.GetClaimFromToken(string(redisToken.([]uint8)), Secret())
|
|
}
|
|
|
|
func IsManagerUserID(opUserID string) bool {
|
|
return utils.IsContain(opUserID, config.Config.Manager.UserID)
|
|
}
|
|
|
|
func WsVerifyToken(token, userID string, platformID int) error {
|
|
claim, err := tokenverify.GetClaimFromToken(token, Secret())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if claim.UserID != userID {
|
|
return errs.ErrTokenInvalid.Wrap(fmt.Sprintf("token uid %s != userID %s", claim.UserID, userID))
|
|
}
|
|
if claim.PlatformID != platformID {
|
|
return errs.ErrTokenInvalid.Wrap(fmt.Sprintf("token platform %d != %d", claim.PlatformID, platformID))
|
|
}
|
|
return nil
|
|
}
|