rest.go 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187
  1. package rest
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/json"
  6. "errors"
  7. "fmt"
  8. "io"
  9. "log"
  10. "net/http"
  11. "strings"
  12. "sync/atomic"
  13. "time"
  14. mjson "git.ali33.ru/fcg-xvii/go-tools/json"
  15. jwt "github.com/dgrijalva/jwt-go"
  16. )
  17. func New(app IApplication) *Rest {
  18. return &Rest{
  19. app: app,
  20. }
  21. }
  22. type Rest struct {
  23. opened atomic.Bool
  24. server *http.Server
  25. app IApplication
  26. }
  27. func (s *Rest) TokenGenerate(m mjson.Map, expire int64) (string, error) {
  28. token := jwt.New(jwt.SigningMethodHS256)
  29. claims := token.Claims.(jwt.MapClaims)
  30. for key, val := range m {
  31. claims[key] = val
  32. }
  33. if expire > 0 {
  34. claims["exp"] = time.Now().Add(time.Minute * 30).Unix()
  35. }
  36. tokenString, err := token.SignedString(s.app.Secret())
  37. return tokenString, err
  38. }
  39. // Listen start server in other goroutine
  40. func (s *Rest) Listen(timeout time.Duration) (err error) {
  41. if s.opened.Swap(true) {
  42. return errors.New(ErrAlreadyOpened)
  43. }
  44. ctx, _ := context.WithTimeout(context.Background(), timeout)
  45. go func() {
  46. mux := http.NewServeMux()
  47. mux.HandleFunc("/", s.handle)
  48. s.server = &http.Server{
  49. Addr: s.app.Addr(),
  50. Handler: mux,
  51. }
  52. err = s.server.ListenAndServe()
  53. s.opened.Store(false)
  54. }()
  55. <-ctx.Done()
  56. return
  57. }
  58. // Close
  59. func (s *Rest) Close() error {
  60. if !s.opened.Load() {
  61. return errors.New(ErrNotOpened)
  62. }
  63. return s.server.Close()
  64. }
  65. func responseNotFound(w http.ResponseWriter) {
  66. w.WriteHeader(404)
  67. }
  68. func responseError(w http.ResponseWriter, err error, code int) {
  69. w.WriteHeader(code)
  70. w.Write([]byte(err.Error()))
  71. }
  72. // handle
  73. func (s *Rest) handle(w http.ResponseWriter, r *http.Request) {
  74. log.Println("handle", r.URL.Path)
  75. // Инициализация restRequest
  76. rr := &Request{
  77. Request: r,
  78. data: mjson.Map{},
  79. files: make(map[string]io.ReadCloser),
  80. tokenGenerator: s.TokenGenerate,
  81. }
  82. // Парсим Bearer токен и извлекаем claims
  83. authHeader := r.Header.Get("Authorization")
  84. if authHeader != "" {
  85. if parts := strings.Split(authHeader, " "); len(parts) == 2 && parts[0] == "Bearer" {
  86. tokenString := parts[1]
  87. token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {
  88. if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
  89. return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
  90. }
  91. return s.app.Secret(), nil
  92. })
  93. if err != nil {
  94. log.Printf("Failed to parse JWT: %s", err)
  95. http.Error(w, "Invalid token", http.StatusUnauthorized)
  96. return
  97. }
  98. if claims, ok := token.Claims.(jwt.MapClaims); ok && token.Valid {
  99. rr.auth = mjson.Map(claims)
  100. }
  101. }
  102. }
  103. // Если это многокомпонентный запрос, обрабатываем файлы
  104. if strings.Index(r.Header.Get("Content-Type"), "multipart/form-data") == 0 {
  105. err := r.ParseMultipartForm(32 << 20) // max memory 32MB, после этого файлы будут сохранены во временных файлах
  106. if err != nil {
  107. responseError(w, fmt.Errorf("failed to parse multipart form: %w", err), 500)
  108. return
  109. }
  110. multiPartForm := r.MultipartForm
  111. data, check := multiPartForm.Value["data"]
  112. if check {
  113. err := json.NewDecoder(bytes.NewBuffer([]byte(data[0]))).Decode(&rr.data)
  114. if err != nil {
  115. responseError(w, fmt.Errorf("failed to decode JSON: %w", err), 500)
  116. return
  117. }
  118. }
  119. for filename, headers := range multiPartForm.File {
  120. for _, header := range headers {
  121. file, err := header.Open()
  122. if err != nil {
  123. responseError(w, fmt.Errorf("failed to open file %s: %w", filename, err), 500)
  124. }
  125. rr.files[filename] = file
  126. }
  127. }
  128. defer rr.Close()
  129. } else {
  130. err := json.NewDecoder(r.Body).Decode(&rr.data)
  131. if err != nil {
  132. responseError(w, fmt.Errorf("failed to decode JSON: %w", err), 500)
  133. return
  134. }
  135. }
  136. // get command
  137. //command, check := s.commands.GetCommand(r.URL.Path)
  138. command, check := s.app.Executer(rr)
  139. if !check {
  140. responseNotFound(w)
  141. return
  142. }
  143. // serialize
  144. if err := serialize(rr.data, &command); err != nil {
  145. responseError(w, err, 500)
  146. return
  147. }
  148. // validate
  149. if validator, check := command.(IValidator); check {
  150. resp := validator.Validate(rr)
  151. if resp != nil {
  152. if err := resp.Send(w); err != nil {
  153. responseError(w, err, 500)
  154. }
  155. return
  156. }
  157. }
  158. // execute
  159. resp := command.Execute(rr)
  160. if err := resp.Send(w); err != nil {
  161. responseError(w, err, 500)
  162. }
  163. resp.Close()
  164. }