mirror of
https://github.com/memohai/Memoh.git
synced 2026-04-27 07:16:19 +09:00
6acdd191c7
commit bcdb026ae43e4f95d0b2c4f9bd440a2df9d6b514 Author: Ran <16112591+chen-ran@users.noreply.github.com> Date: Thu Feb 12 17:10:32 2026 +0800 chore: update DEVELOPMENT.md commit30281742efMerge:ca5c6a15b05f13Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Thu Feb 12 15:49:17 2026 +0800 merge(github/main): integrate fx dependency injection framework Merge upstream fx refactor and adapt all services to use go.uber.org/fx for dependency injection. Resolve conflicts in main.go, server.go, and service constructors while preserving our domain model changes. - Fix telegram adapter panic on shutdown (double close channel) - Fix feishu adapter processing messages after stop - Increase directory lookup timeout from 2s to 5s commitca5c6a1866Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Thu Feb 12 15:33:09 2026 +0800 refactor(core): restructure conversation, channel and message domains - Rename chat module to conversation with flow-based architecture - Move channelidentities into channel/identities subpackage - Add channel/route for routing logic - Add message service with event hub - Add MCP providers: container, directory, schedule - Refactor Feishu/Telegram adapters with directory and stream support - Add platform management page and channel badges in web UI - Update database schema for conversations, messages and channel routes - Add @memoh/shared package for cross-package type definitions commit75e2ef0467Merge:d99ba3801cb6c8Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Thu Feb 12 14:45:49 2026 +0800 merge(github): merge github/main, resolve index.ts URL conflict Keep our defensive absolute-URL check in createAuthFetcher. commitd99ba38b7dMerge:860e20f35ce7d1Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Thu Feb 12 05:20:18 2026 +0800 merge(github): merge github/main, keep our code and docs/spec commit860e20fe70Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Wed Feb 11 22:13:27 2026 +0800 docs(docs): add concepts and style guides for VitePress site - Add concepts: identity-and-binding, index (en/zh) - Add style: terminology (en/zh) - Update index and zh/index - Update .vitepress/config.ts commita75fdb8040Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Wed Feb 11 17:37:16 2026 +0800 refactor(mcp): standardize unified tool gateway on go-sdk Split business executors from federation sources and migrate unified tool/federation transports to the official go-sdk for stricter MCP compliance and safer session lifecycle handling. Add targeted regression tests for accept compatibility, initialization retries, pending cleanup, and include updated swagger artifacts. commit02b33c8e85Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Wed Feb 11 15:42:21 2026 +0800 refactor(core): finalize user-centric identity and policy cleanup Unify auth and chat identity semantics around user_id, enforce personal-bot owner-only authorization, and remove legacy compatibility branches in integration tests. commit06e8619a37Author: BBQ <bbq@BBQdeMacBook-Air.local> Date: Wed Feb 11 14:47:03 2026 +0800 refactor(core): migrate channel identity and binding across app Align channel identity and bind flow across backend and app-facing layers, including generated swagger artifacts and package lock updates while excluding docs content changes.
176 lines
5.2 KiB
Go
176 lines
5.2 KiB
Go
package auth
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/golang-jwt/jwt/v5"
|
|
echojwt "github.com/labstack/echo-jwt/v4"
|
|
"github.com/labstack/echo/v4"
|
|
"github.com/labstack/echo/v4/middleware"
|
|
)
|
|
|
|
const (
|
|
claimSubject = "sub"
|
|
claimUserID = "user_id"
|
|
claimChannelIdentityID = "channel_identity_id"
|
|
claimType = "typ"
|
|
claimBotID = "bot_id"
|
|
claimChatID = "chat_id"
|
|
claimRouteID = "route_id"
|
|
chatTokenType = "chat_route"
|
|
)
|
|
|
|
// JWTMiddleware returns a JWT auth middleware configured for HS256 tokens.
|
|
func JWTMiddleware(secret string, skipper middleware.Skipper) echo.MiddlewareFunc {
|
|
return echojwt.WithConfig(echojwt.Config{
|
|
SigningKey: []byte(secret),
|
|
SigningMethod: "HS256",
|
|
TokenLookup: "header:Authorization:Bearer ",
|
|
Skipper: skipper,
|
|
NewClaimsFunc: func(c echo.Context) jwt.Claims {
|
|
return jwt.MapClaims{}
|
|
},
|
|
})
|
|
}
|
|
|
|
// UserIDFromContext extracts the user id from JWT claims.
|
|
func UserIDFromContext(c echo.Context) (string, error) {
|
|
token, ok := c.Get("user").(*jwt.Token)
|
|
if !ok || token == nil || !token.Valid {
|
|
return "", echo.NewHTTPError(http.StatusUnauthorized, "invalid token")
|
|
}
|
|
claims, ok := token.Claims.(jwt.MapClaims)
|
|
if !ok {
|
|
return "", echo.NewHTTPError(http.StatusUnauthorized, "invalid token claims")
|
|
}
|
|
if userID := claimString(claims, claimUserID); userID != "" {
|
|
return userID, nil
|
|
}
|
|
if userID := claimString(claims, claimSubject); userID != "" {
|
|
return userID, nil
|
|
}
|
|
return "", echo.NewHTTPError(http.StatusUnauthorized, "user id missing")
|
|
}
|
|
|
|
// GenerateToken creates a signed JWT for the user.
|
|
func GenerateToken(userID, secret string, expiresIn time.Duration) (string, time.Time, error) {
|
|
if strings.TrimSpace(userID) == "" {
|
|
return "", time.Time{}, fmt.Errorf("user id is required")
|
|
}
|
|
if strings.TrimSpace(secret) == "" {
|
|
return "", time.Time{}, fmt.Errorf("jwt secret is required")
|
|
}
|
|
if expiresIn <= 0 {
|
|
return "", time.Time{}, fmt.Errorf("jwt expires in must be positive")
|
|
}
|
|
|
|
now := time.Now().UTC()
|
|
expiresAt := now.Add(expiresIn)
|
|
claims := jwt.MapClaims{
|
|
claimSubject: userID,
|
|
claimUserID: userID,
|
|
"iat": now.Unix(),
|
|
"exp": expiresAt.Unix(),
|
|
}
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
|
signed, err := token.SignedString([]byte(secret))
|
|
if err != nil {
|
|
return "", time.Time{}, err
|
|
}
|
|
return signed, expiresAt, nil
|
|
}
|
|
|
|
// ChatToken holds the claims for a chat-based JWT used for route-based reply.
|
|
type ChatToken struct {
|
|
BotID string
|
|
ChatID string
|
|
RouteID string
|
|
UserID string
|
|
ChannelIdentityID string
|
|
}
|
|
|
|
// GenerateChatToken creates a signed JWT for chat route reply.
|
|
func GenerateChatToken(info ChatToken, secret string, expiresIn time.Duration) (string, time.Time, error) {
|
|
if strings.TrimSpace(info.BotID) == "" {
|
|
return "", time.Time{}, fmt.Errorf("bot id is required")
|
|
}
|
|
if strings.TrimSpace(info.ChatID) == "" {
|
|
return "", time.Time{}, fmt.Errorf("chat id is required")
|
|
}
|
|
if strings.TrimSpace(info.UserID) == "" {
|
|
info.UserID = strings.TrimSpace(info.ChannelIdentityID)
|
|
}
|
|
if strings.TrimSpace(info.UserID) == "" {
|
|
return "", time.Time{}, fmt.Errorf("user id is required")
|
|
}
|
|
if strings.TrimSpace(secret) == "" {
|
|
return "", time.Time{}, fmt.Errorf("jwt secret is required")
|
|
}
|
|
if expiresIn <= 0 {
|
|
return "", time.Time{}, fmt.Errorf("jwt expires in must be positive")
|
|
}
|
|
|
|
now := time.Now().UTC()
|
|
expiresAt := now.Add(expiresIn)
|
|
claims := jwt.MapClaims{
|
|
claimType: chatTokenType,
|
|
claimBotID: info.BotID,
|
|
claimChatID: info.ChatID,
|
|
claimRouteID: info.RouteID,
|
|
claimUserID: info.UserID,
|
|
claimChannelIdentityID: info.ChannelIdentityID,
|
|
"iat": now.Unix(),
|
|
"exp": expiresAt.Unix(),
|
|
}
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
|
signed, err := token.SignedString([]byte(secret))
|
|
if err != nil {
|
|
return "", time.Time{}, err
|
|
}
|
|
return signed, expiresAt, nil
|
|
}
|
|
|
|
// ChatTokenFromContext extracts the chat token claims from context.
|
|
func ChatTokenFromContext(c echo.Context) (ChatToken, error) {
|
|
token, ok := c.Get("user").(*jwt.Token)
|
|
if !ok || token == nil || !token.Valid {
|
|
return ChatToken{}, echo.NewHTTPError(http.StatusUnauthorized, "invalid token")
|
|
}
|
|
claims, ok := token.Claims.(jwt.MapClaims)
|
|
if !ok {
|
|
return ChatToken{}, echo.NewHTTPError(http.StatusUnauthorized, "invalid token claims")
|
|
}
|
|
if claimString(claims, claimType) != chatTokenType {
|
|
return ChatToken{}, echo.NewHTTPError(http.StatusUnauthorized, "invalid chat token")
|
|
}
|
|
info := ChatToken{
|
|
BotID: claimString(claims, claimBotID),
|
|
ChatID: claimString(claims, claimChatID),
|
|
RouteID: claimString(claims, claimRouteID),
|
|
UserID: claimString(claims, claimUserID),
|
|
ChannelIdentityID: claimString(claims, claimChannelIdentityID),
|
|
}
|
|
if strings.TrimSpace(info.UserID) == "" {
|
|
info.UserID = strings.TrimSpace(info.ChannelIdentityID)
|
|
}
|
|
return info, nil
|
|
}
|
|
|
|
func claimString(claims jwt.MapClaims, key string) string {
|
|
raw, ok := claims[key]
|
|
if !ok || raw == nil {
|
|
return ""
|
|
}
|
|
switch v := raw.(type) {
|
|
case string:
|
|
return v
|
|
case fmt.Stringer:
|
|
return v.String()
|
|
default:
|
|
return fmt.Sprint(raw)
|
|
}
|
|
}
|