| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132 | package transportimport (	"context"	"encoding/json"	"errors"	"github.com/go-kit/kit/log"	"github.com/go-kit/kit/transport"	kithttp "github.com/go-kit/kit/transport/http"	"github.com/gorilla/mux"	"github.com/longjoy/micro-go-course/section32/endpoint"	"github.com/longjoy/micro-go-course/section32/service"	"github.com/prometheus/client_golang/prometheus/promhttp"	"net/http")var (	ErrorBadRequest = errors.New("invalid request parameter")	ErrorGrantTypeRequest = errors.New("invalid request grant type")	ErrorTokenRequest = errors.New("invalid request token")	ErrInvalidClientRequest = errors.New("invalid client message"))// MakeHttpHandler make http handler use muxfunc MakeHttpHandler(ctx context.Context, endpoints endpoint.OAuth2Endpoints, tokenService service.ResourceServerTokenService,  logger log.Logger) http.Handler {	r := mux.NewRouter()	options := []kithttp.ServerOption{		kithttp.ServerErrorHandler(transport.NewLogErrorHandler(logger)),		kithttp.ServerErrorEncoder(encodeError),	}	r.Path("/metrics").Handler(promhttp.Handler())	oauth2AuthorizationOptions := []kithttp.ServerOption{		kithttp.ServerBefore(makeOAuth2AuthorizationContext(tokenService, logger)),		kithttp.ServerErrorHandler(transport.NewLogErrorHandler(logger)),		kithttp.ServerErrorEncoder(encodeError),	}	r.Methods("Get").Path("/index").Handler(kithttp.NewServer(		endpoints.IndexEndpoint,		decodeIndexRequest,		encodeJsonResponse,		oauth2AuthorizationOptions...,	))    r.Methods("Get").Path("/sample").Handler(kithttp.NewServer(    	endpoints.SampleEndpoint,    	decodeSampleRequest,    	encodeJsonResponse,    	oauth2AuthorizationOptions...,    	))	r.Methods("Get").Path("/admin").Handler(kithttp.NewServer(		endpoints.AdminEndpoint,		decodeAdminRequest,		encodeJsonResponse,		oauth2AuthorizationOptions...,	))	// create health check handler	r.Methods("GET").Path("/health").Handler(kithttp.NewServer(		endpoints.HealthCheckEndpoint,		decodeHealthCheckRequest,		encodeJsonResponse,		options...,	))	return r}func makeOAuth2AuthorizationContext(tokenService service.ResourceServerTokenService, logger log.Logger) kithttp.RequestFunc {	return func(ctx context.Context, r *http.Request) context.Context {		// 获取访问令牌		accessTokenValue := r.Header.Get("Authorization")		var err error		if accessTokenValue != ""{			// 获取令牌对应的用户信息和客户端信息			oauth2Details, err := tokenService.GetOAuth2DetailsByAccessToken(accessTokenValue)			if err != nil{				return context.WithValue(ctx, endpoint.OAuth2ErrorKey, err)			}			return context.WithValue(ctx, endpoint.OAuth2DetailsKey, oauth2Details)		}else {			err = ErrorTokenRequest		}		return context.WithValue(ctx, endpoint.OAuth2ErrorKey, err)	}}func decodeIndexRequest(ctx context.Context, r *http.Request)(interface{}, error) {	return &endpoint.IndexRequest{}, nil}func decodeSampleRequest(ctx context.Context, r *http.Request) (interface{}, error) {	return &endpoint.SampleRequest{}, nil}func decodeAdminRequest(ctx context.Context, r *http.Request) (interface{}, error) {	return &endpoint.AdminRequest{}, nil}func encodeJsonResponse(ctx context.Context, w http.ResponseWriter, response interface{}) error {	w.Header().Set("Content-Type", "application/json;charset=utf-8")	return json.NewEncoder(w).Encode(response)}// decodeHealthCheckRequest decode requestfunc decodeHealthCheckRequest(ctx context.Context, r *http.Request) (interface{}, error) {	return endpoint.HealthRequest{}, nil}// encode errors from business-logicfunc encodeError(_ context.Context, err error, w http.ResponseWriter) {	w.Header().Set("Content-Type", "application/json; charset=utf-8")	switch err {	default:		w.WriteHeader(http.StatusInternalServerError)	}	json.NewEncoder(w).Encode(map[string]interface{}{		"error": err.Error(),	})}
 |