mirror of
				https://github.com/openimsdk/open-im-server.git
				synced 2025-10-31 08:29:33 +08:00 
			
		
		
		
	* Code adaptation k8s: service discovery and registration adaptation, configuration adaptation * Initial submission of the help charts script for openim API * change the help charts script * change the help charts script * change helm chart codes * change dockerfiles script * change chart script:add configmap mounts * change chart script:change repository * change chart script:msggateway add one service * change config.yaml * roll back some config values * change chart script:change Ingress rule with a rewrite annotation * add mysql charts scrible * change chart script:add mysql.config.yaml * add nfs provisioner charts * change chart script:add nfs.config.yaml * add ingress-nginx charts * change chart script:add ingress-nginx.config.yaml * add redis &mongodb charts * add kafka&minio charts * change chart script:change redis.values.yaml * change chart script:add redis.config.yaml * change chart script:change redis.config.yaml * change chart script:change mongodb.value.yaml * change chart script:change mongodb.value.yaml * change chart script:add mongodb.config.yaml * change chart script:change minio.values.yaml * change chart script:add minio.config.yaml * change chart script:change kafka.values.yaml * change chart script:add kafka.config.yaml * change chart script:change services.config.yaml * bug fix:Delete websocket's Port restrictions * bug fix:change port value * change chart script:Submit a stable version script * fix bug:Implement option interface * fix bug:change K8sDR.Register * change config.yaml * change chats script:minio service add ingress * change chats script:minio service add ingress * change chats script:kafka.replicaCount=3& change minio.api ingress * delete change chats script * change config.yaml * change openim.yaml * merge go.sum * Add monitoring function and struct for Prometheus on gin and GRPC * Add GRPC and gin server monitoring logic * Add GRPC and gin server monitoring logic2 * Add GRPC and gin server monitoring logic3 * Add GRPC and gin server monitoring logic4 * Add GRPC and gin server monitoring logic5 * Add GRPC and gin server monitoring logic6 * Add GRPC and gin server monitoring logic7 * delete:old monitoring code * add for test * fix bug:change packname * fix bug:delete getPromPort funciton * fix bug:delete getPromPort funciton * fix bug:change logs * fix bug:change registerName logic in GetGrpcCusMetrics function * add getPrometheus url api * fix:config path logic * fix:prometheus enable function * fix:prometheus enable function * fix:transfer Multi process monitoring logic * del:del not using manifest * fix:openim-msgtransfer.sh * fix:openim-msgtransfer.sh --------- Co-authored-by: lin.huang <lin.huang@apulis.com> Co-authored-by: Xinwei Xiong <3293172751@qq.com>
		
			
				
	
	
		
			151 lines
		
	
	
		
			4.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			151 lines
		
	
	
		
			4.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright © 2023 OpenIM. All rights reserved.
 | |
| //
 | |
| // Licensed under the Apache License, Version 2.0 (the "License");
 | |
| // you may not use this file except in compliance with the License.
 | |
| // You may obtain a copy of the License at
 | |
| //
 | |
| //     http://www.apache.org/licenses/LICENSE-2.0
 | |
| //
 | |
| // Unless required by applicable law or agreed to in writing, software
 | |
| // distributed under the License is distributed on an "AS IS" BASIS,
 | |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| // See the License for the specific language governing permissions and
 | |
| // limitations under the License.
 | |
| 
 | |
| package auth
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/common/prom_metrics"
 | |
| 
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/authverify"
 | |
| 
 | |
| 	"google.golang.org/grpc"
 | |
| 
 | |
| 	pbauth "github.com/OpenIMSDK/protocol/auth"
 | |
| 	"github.com/OpenIMSDK/protocol/constant"
 | |
| 	"github.com/OpenIMSDK/protocol/msggateway"
 | |
| 	"github.com/OpenIMSDK/tools/discoveryregistry"
 | |
| 	"github.com/OpenIMSDK/tools/errs"
 | |
| 	"github.com/OpenIMSDK/tools/log"
 | |
| 	"github.com/OpenIMSDK/tools/mcontext"
 | |
| 	"github.com/OpenIMSDK/tools/tokenverify"
 | |
| 	"github.com/OpenIMSDK/tools/utils"
 | |
| 
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/common/config"
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/common/db/cache"
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/common/db/controller"
 | |
| 	"github.com/openimsdk/open-im-server/v3/pkg/rpcclient"
 | |
| )
 | |
| 
 | |
| type authServer struct {
 | |
| 	authDatabase   controller.AuthDatabase
 | |
| 	userRpcClient  *rpcclient.UserRpcClient
 | |
| 	RegisterCenter discoveryregistry.SvcDiscoveryRegistry
 | |
| }
 | |
| 
 | |
| func Start(client discoveryregistry.SvcDiscoveryRegistry, server *grpc.Server) error {
 | |
| 	rdb, err := cache.NewRedis()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	userRpcClient := rpcclient.NewUserRpcClient(client)
 | |
| 	pbauth.RegisterAuthServer(server, &authServer{
 | |
| 		userRpcClient:  &userRpcClient,
 | |
| 		RegisterCenter: client,
 | |
| 		authDatabase: controller.NewAuthDatabase(
 | |
| 			cache.NewMsgCacheModel(rdb),
 | |
| 			config.Config.Secret,
 | |
| 			config.Config.TokenPolicy.Expire,
 | |
| 		),
 | |
| 	})
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (s *authServer) UserToken(ctx context.Context, req *pbauth.UserTokenReq) (*pbauth.UserTokenResp, error) {
 | |
| 	resp := pbauth.UserTokenResp{}
 | |
| 	if req.Secret != config.Config.Secret {
 | |
| 		return nil, errs.ErrNoPermission.Wrap("secret invalid")
 | |
| 	}
 | |
| 	if _, err := s.userRpcClient.GetUserInfo(ctx, req.UserID); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	token, err := s.authDatabase.CreateToken(ctx, req.UserID, int(req.PlatformID))
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	prom_metrics.UserLoginCounter.Inc()
 | |
| 	resp.Token = token
 | |
| 	resp.ExpireTimeSeconds = config.Config.TokenPolicy.Expire * 24 * 60 * 60
 | |
| 	return &resp, nil
 | |
| }
 | |
| 
 | |
| func (s *authServer) parseToken(ctx context.Context, tokensString string) (claims *tokenverify.Claims, err error) {
 | |
| 	claims, err = tokenverify.GetClaimFromToken(tokensString, authverify.Secret())
 | |
| 	if err != nil {
 | |
| 		return nil, utils.Wrap(err, "")
 | |
| 	}
 | |
| 	m, err := s.authDatabase.GetTokensWithoutError(ctx, claims.UserID, claims.PlatformID)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if len(m) == 0 {
 | |
| 		return nil, errs.ErrTokenNotExist.Wrap()
 | |
| 	}
 | |
| 	if v, ok := m[tokensString]; ok {
 | |
| 		switch v {
 | |
| 		case constant.NormalToken:
 | |
| 			return claims, nil
 | |
| 		case constant.KickedToken:
 | |
| 			return nil, errs.ErrTokenKicked.Wrap()
 | |
| 		default:
 | |
| 			return nil, utils.Wrap(errs.ErrTokenUnknown, "")
 | |
| 		}
 | |
| 	}
 | |
| 	return nil, errs.ErrTokenNotExist.Wrap()
 | |
| }
 | |
| 
 | |
| func (s *authServer) ParseToken(
 | |
| 	ctx context.Context,
 | |
| 	req *pbauth.ParseTokenReq,
 | |
| ) (resp *pbauth.ParseTokenResp, err error) {
 | |
| 	resp = &pbauth.ParseTokenResp{}
 | |
| 	claims, err := s.parseToken(ctx, req.Token)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	resp.UserID = claims.UserID
 | |
| 	resp.Platform = constant.PlatformIDToName(claims.PlatformID)
 | |
| 	resp.ExpireTimeSeconds = claims.ExpiresAt.Unix()
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| func (s *authServer) ForceLogout(ctx context.Context, req *pbauth.ForceLogoutReq) (*pbauth.ForceLogoutResp, error) {
 | |
| 	if err := authverify.CheckAdmin(ctx); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if err := s.forceKickOff(ctx, req.UserID, req.PlatformID, mcontext.GetOperationID(ctx)); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return &pbauth.ForceLogoutResp{}, nil
 | |
| }
 | |
| 
 | |
| func (s *authServer) forceKickOff(ctx context.Context, userID string, platformID int32, operationID string) error {
 | |
| 	conns, err := s.RegisterCenter.GetConns(ctx, config.Config.RpcRegisterName.OpenImMessageGatewayName)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	for _, v := range conns {
 | |
| 		log.ZDebug(ctx, "forceKickOff", "conn", v.Target())
 | |
| 	}
 | |
| 	for _, v := range conns {
 | |
| 		client := msggateway.NewMsgGatewayClient(v)
 | |
| 		kickReq := &msggateway.KickUserOfflineReq{KickUserIDList: []string{userID}, PlatformID: platformID}
 | |
| 		_, err := client.KickUserOffline(ctx, kickReq)
 | |
| 		if err != nil {
 | |
| 			log.ZError(ctx, "forceKickOff", err, "kickReq", kickReq)
 | |
| 		}
 | |
| 	}
 | |
| 	return nil
 | |
| }
 |