rest.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191
  1. package rest
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/json"
  6. "errors"
  7. "fmt"
  8. "io"
  9. "log"
  10. "net/http"
  11. "strings"
  12. "sync/atomic"
  13. "time"
  14. mjson "git.ali33.ru/fcg-xvii/go-tools/json"
  15. jwt "github.com/dgrijalva/jwt-go"
  16. )
  17. func New(addr string, secret []byte, app IApp) *Rest {
  18. return &Rest{
  19. app: app,
  20. secret: secret,
  21. addr: addr,
  22. }
  23. }
  24. type Rest struct {
  25. secret []byte
  26. addr string
  27. opened atomic.Bool
  28. server *http.Server
  29. app IApp
  30. }
  31. func (s *Rest) TokenGenerate(m mjson.Map, expire int64) (string, error) {
  32. token := jwt.New(jwt.SigningMethodHS256)
  33. claims := token.Claims.(jwt.MapClaims)
  34. for key, val := range m {
  35. claims[key] = val
  36. }
  37. if expire > 0 {
  38. claims["exp"] = time.Now().Add(time.Minute * 30).Unix()
  39. }
  40. tokenString, err := token.SignedString(s.secret)
  41. return tokenString, err
  42. }
  43. // Listen start server in other goroutine
  44. func (s *Rest) Listen(timeout time.Duration) (err error) {
  45. if s.opened.Swap(true) {
  46. return errors.New(ErrAlreadyOpened)
  47. }
  48. ctx, _ := context.WithTimeout(context.Background(), timeout)
  49. go func() {
  50. mux := http.NewServeMux()
  51. mux.HandleFunc("/", s.handle)
  52. s.server = &http.Server{
  53. Addr: s.addr,
  54. Handler: mux,
  55. }
  56. err = s.server.ListenAndServe()
  57. s.opened.Store(false)
  58. }()
  59. <-ctx.Done()
  60. return
  61. }
  62. // Close
  63. func (s *Rest) Close() error {
  64. if !s.opened.Load() {
  65. return errors.New(ErrNotOpened)
  66. }
  67. return s.server.Close()
  68. }
  69. func responseNotFound(w http.ResponseWriter) {
  70. w.WriteHeader(404)
  71. }
  72. func responseError(w http.ResponseWriter, err error, code int) {
  73. w.WriteHeader(code)
  74. w.Write([]byte(err.Error()))
  75. }
  76. // handle
  77. func (s *Rest) handle(w http.ResponseWriter, r *http.Request) {
  78. log.Println("handle", r.URL.Path)
  79. // Инициализация restRequest
  80. rr := &Request{
  81. Request: r,
  82. data: mjson.Map{},
  83. files: make(map[string]io.ReadCloser),
  84. tokenGenerator: s.TokenGenerate,
  85. }
  86. // Парсим Bearer токен и извлекаем claims
  87. authHeader := r.Header.Get("Authorization")
  88. if authHeader != "" {
  89. if parts := strings.Split(authHeader, " "); len(parts) == 2 && parts[0] == "Bearer" {
  90. tokenString := parts[1]
  91. token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {
  92. if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
  93. return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
  94. }
  95. return s.secret, nil
  96. })
  97. if err != nil {
  98. log.Printf("Failed to parse JWT: %s", err)
  99. http.Error(w, "Invalid token", http.StatusUnauthorized)
  100. return
  101. }
  102. if claims, ok := token.Claims.(jwt.MapClaims); ok && token.Valid {
  103. rr.auth = mjson.Map(claims)
  104. }
  105. }
  106. }
  107. // Если это многокомпонентный запрос, обрабатываем файлы
  108. if strings.Index(r.Header.Get("Content-Type"), "multipart/form-data") == 0 {
  109. err := r.ParseMultipartForm(32 << 20) // max memory 32MB, после этого файлы будут сохранены во временных файлах
  110. if err != nil {
  111. responseError(w, fmt.Errorf("failed to parse multipart form: %w", err), 500)
  112. return
  113. }
  114. multiPartForm := r.MultipartForm
  115. data, check := multiPartForm.Value["data"]
  116. if check {
  117. err := json.NewDecoder(bytes.NewBuffer([]byte(data[0]))).Decode(&rr.data)
  118. if err != nil {
  119. responseError(w, fmt.Errorf("failed to decode JSON: %w", err), 500)
  120. return
  121. }
  122. }
  123. for filename, headers := range multiPartForm.File {
  124. for _, header := range headers {
  125. file, err := header.Open()
  126. if err != nil {
  127. responseError(w, fmt.Errorf("failed to open file %s: %w", filename, err), 500)
  128. }
  129. rr.files[filename] = file
  130. }
  131. }
  132. defer rr.Close()
  133. } else {
  134. err := json.NewDecoder(r.Body).Decode(&rr.data)
  135. if err != nil {
  136. responseError(w, fmt.Errorf("failed to decode JSON: %w", err), 500)
  137. return
  138. }
  139. }
  140. // get command
  141. //command, check := s.commands.GetCommand(r.URL.Path)
  142. command, check := s.app.Executer(rr)
  143. if !check {
  144. responseNotFound(w)
  145. return
  146. }
  147. // serialize
  148. if err := serializeRequest(command, rr.data, rr.files, ""); err != nil {
  149. responseError(w, err, 500)
  150. return
  151. }
  152. // validate
  153. if validator, check := command.(IValidator); check {
  154. resp := validator.Validate(rr)
  155. if resp != nil {
  156. if err := resp.Send(w); err != nil {
  157. responseError(w, err, 500)
  158. }
  159. return
  160. }
  161. }
  162. // execute
  163. resp := command.Execute(rr)
  164. if err := resp.Send(w); err != nil {
  165. responseError(w, err, 500)
  166. }
  167. resp.Close()
  168. }