csauthlogic.go 1.8 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788
  1. package logic
  2. import (
  3. "context"
  4. "fmt"
  5. "github.com/golang-jwt/jwt/v4"
  6. "google.golang.org/protobuf/types/known/structpb"
  7. "time"
  8. "ylink/ext/globalkey"
  9. "ylink/ext/jwtdata"
  10. "ylink/apis/auth/internal/svc"
  11. "ylink/apis/auth/pb"
  12. "github.com/zeromicro/go-zero/core/logx"
  13. )
  14. type CsAuthLogic struct {
  15. ctx context.Context
  16. svcCtx *svc.ServiceContext
  17. logx.Logger
  18. }
  19. func NewCsAuthLogic(ctx context.Context, svcCtx *svc.ServiceContext) *CsAuthLogic {
  20. return &CsAuthLogic{
  21. ctx: ctx,
  22. svcCtx: svcCtx,
  23. Logger: logx.WithContext(ctx),
  24. }
  25. }
  26. func (l *CsAuthLogic) CsAuth(in *pb.CsAuthReq) (*pb.AuthResp, error) {
  27. var token string
  28. // 查询redis
  29. tokenKey := fmt.Sprintf(globalkey.CacheTokenKey, in.CsId)
  30. token, err := l.svcCtx.RedisClient.GetCtx(l.ctx, tokenKey)
  31. if err != nil {
  32. return nil, err
  33. }
  34. // 生成token
  35. if len(token) == 0 {
  36. now := time.Now().Unix()
  37. token, err = l.generateCsToken(now, in.CsId)
  38. if err != nil {
  39. return nil, err
  40. }
  41. }
  42. data, err := structpb.NewStruct(map[string]interface{}{
  43. "token": token,
  44. })
  45. if err != nil {
  46. return nil, err
  47. }
  48. // 存入redis
  49. if err := l.svcCtx.RedisClient.SetexCtx(l.ctx, tokenKey, token, int(l.svcCtx.Config.JwtAuth.AccessExpire)); err != nil {
  50. return nil, err
  51. }
  52. return &pb.AuthResp{
  53. Code: 0,
  54. Msg: "success",
  55. Data: data,
  56. }, nil
  57. }
  58. //
  59. // generateCsToken
  60. // @Description: 客服token签发
  61. // @receiver l
  62. // @param iat
  63. // @param csId
  64. // @return string
  65. // @return error
  66. //
  67. func (l *CsAuthLogic) generateCsToken(iat int64, csId string) (string, error) {
  68. secret := l.svcCtx.Config.JwtAuth.AccessSecret
  69. expire := l.svcCtx.Config.JwtAuth.AccessExpire
  70. claims := make(jwt.MapClaims)
  71. claims["iat"] = iat
  72. claims["exp"] = iat + expire
  73. claims[jwtdata.JwtKeyCsId] = csId
  74. token := jwt.New(jwt.SigningMethodHS256)
  75. token.Claims = claims
  76. return token.SignedString([]byte(secret))
  77. }