| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153 | package transportimport (	"context"	"encoding/json"	"errors"	"github.com/go-kit/kit/log"	"github.com/go-kit/kit/transport"	kithttp "github.com/go-kit/kit/transport/http"	"github.com/gorilla/mux"	"github.com/longjoy/micro-go-course/section31/endpoint"	"github.com/longjoy/micro-go-course/section31/service"	"github.com/prometheus/client_golang/prometheus/promhttp"	"net/http")var (	ErrorBadRequest = errors.New("invalid request parameter")	ErrorGrantTypeRequest = errors.New("invalid request grant type")	ErrorTokenRequest = errors.New("invalid request token")	ErrInvalidClientRequest = errors.New("invalid client message"))// MakeHttpHandler make http handler use muxfunc MakeHttpHandler(ctx context.Context, endpoints endpoint.OAuth2Endpoints, tokenService service.TokenService, clientService service.ClientDetailsService, logger log.Logger) http.Handler {	r := mux.NewRouter()	options := []kithttp.ServerOption{		kithttp.ServerErrorHandler(transport.NewLogErrorHandler(logger)),		kithttp.ServerErrorEncoder(encodeError),	}	r.Path("/metrics").Handler(promhttp.Handler())	clientAuthorizationOptions := []kithttp.ServerOption{		kithttp.ServerBefore(makeClientAuthorizationContext(clientService, logger)),		kithttp.ServerErrorHandler(transport.NewLogErrorHandler(logger)),		kithttp.ServerErrorEncoder(encodeError),	}	r.Methods("POST").Path("/oauth/token").Handler(kithttp.NewServer(		endpoints.TokenEndpoint,		decodeTokenRequest,		encodeJsonResponse,		clientAuthorizationOptions...,	))	r.Methods("POST").Path("/oauth/check_token").Handler(kithttp.NewServer(		endpoints.CheckTokenEndpoint,		decodeCheckTokenRequest,		encodeJsonResponse,		clientAuthorizationOptions...,	))	// create health check handler	r.Methods("GET").Path("/health").Handler(kithttp.NewServer(		endpoints.HealthCheckEndpoint,		decodeHealthCheckRequest,		encodeJsonResponse,		options...,	))	return r}func makeOAuth2AuthorizationContext(tokenService service.TokenService, logger log.Logger) kithttp.RequestFunc {	return func(ctx context.Context, r *http.Request) context.Context {		// 获取访问令牌		accessTokenValue := r.Header.Get("Authorization")		var err error		if accessTokenValue != ""{			// 获取令牌对应的用户信息和客户端信息			oauth2Details, err := tokenService.GetOAuth2DetailsByAccessToken(accessTokenValue)			if err == nil {				return context.WithValue(ctx, endpoint.OAuth2DetailsKey, oauth2Details)			}		}else {			err = ErrorTokenRequest		}		return context.WithValue(ctx, endpoint.OAuth2ErrorKey, err)	}}func makeClientAuthorizationContext(clientDetailsService service.ClientDetailsService, logger log.Logger) kithttp.RequestFunc {	return func(ctx context.Context, r *http.Request) context.Context {		if clientId, clientSecret, ok := r.BasicAuth(); ok {			clientDetails, err := clientDetailsService.GetClientDetailsByClientId(ctx, clientId, clientSecret)			if err != nil{				return context.WithValue(ctx, endpoint.OAuth2ErrorKey, ErrInvalidClientRequest)			}			return context.WithValue(ctx, endpoint.OAuth2ClientDetailsKey, clientDetails)		}		return context.WithValue(ctx, endpoint.OAuth2ErrorKey, ErrInvalidClientRequest)	}}func decodeTokenRequest(ctx context.Context, r *http.Request) (interface{}, error) {	grantType := r.URL.Query().Get("grant_type")	if grantType == ""{		return nil, ErrorGrantTypeRequest	}	return &endpoint.TokenRequest{		GrantType:grantType,		Reader:r,	}, nil}func decodeCheckTokenRequest(ctx context.Context, r *http.Request) (interface{}, error) {	tokenValue := r.URL.Query().Get("token")	if tokenValue == ""{		return nil, ErrorTokenRequest	}	return &endpoint.CheckTokenRequest{		Token:tokenValue,	}, nil}func encodeJsonResponse(ctx context.Context, w http.ResponseWriter, response interface{}) error {	w.Header().Set("Content-Type", "application/json;charset=utf-8")	return json.NewEncoder(w).Encode(response)}// decodeHealthCheckRequest decode requestfunc decodeHealthCheckRequest(ctx context.Context, r *http.Request) (interface{}, error) {	return endpoint.HealthRequest{}, nil}// encode errors from business-logicfunc encodeError(_ context.Context, err error, w http.ResponseWriter) {	w.Header().Set("Content-Type", "application/json; charset=utf-8")	switch err {	default:		w.WriteHeader(http.StatusInternalServerError)	}	json.NewEncoder(w).Encode(map[string]interface{}{		"error": err.Error(),	})}
 |