From 5fae613da55d11e7281fd106c7058ceed2c0e05c Mon Sep 17 00:00:00 2001 From: LittleSheep Date: Sat, 21 Dec 2024 21:29:59 +0800 Subject: [PATCH] :sparkles: Reply token --- pkg/internal/http/api/quick_actions_api.go | 20 ++++++--- pkg/internal/services/events.go | 14 +++--- pkg/internal/services/reply_token.go | 50 ++++++++++++++++++++++ settings.toml | 1 + 4 files changed, 73 insertions(+), 12 deletions(-) create mode 100644 pkg/internal/services/reply_token.go diff --git a/pkg/internal/http/api/quick_actions_api.go b/pkg/internal/http/api/quick_actions_api.go index bcb6035..90798f9 100644 --- a/pkg/internal/http/api/quick_actions_api.go +++ b/pkg/internal/http/api/quick_actions_api.go @@ -7,8 +7,6 @@ import ( "git.solsynth.dev/hypernet/messaging/pkg/internal/http/exts" "git.solsynth.dev/hypernet/messaging/pkg/internal/models" "git.solsynth.dev/hypernet/messaging/pkg/internal/services" - "git.solsynth.dev/hypernet/nexus/pkg/nex/sec" - authm "git.solsynth.dev/hypernet/passport/pkg/authkit/models" "github.com/gofiber/fiber/v2" "github.com/google/uuid" jsoniter "github.com/json-iterator/go" @@ -20,13 +18,23 @@ import ( // It did not support all the features of the message event // But it just works func quickReply(c *fiber.Ctx) error { - if err := sec.EnsureAuthenticated(c); err != nil { - return err + replyTk := c.Query("replyToken") + if len(replyTk) == 0 { + return fiber.NewError(fiber.StatusBadRequest, "reply token is required") } - user := c.Locals("user").(authm.Account) + + claims, err := services.ParseReplyToken(replyTk) + if err != nil { + return fiber.NewError(fiber.StatusBadRequest, fmt.Sprintf("reply token is invaild: %v", err)) + } + channelId, _ := c.ParamsInt("channelId", 0) eventId, _ := c.ParamsInt("eventId", 0) + if claims.EventID != uint(eventId) { + return fiber.NewError(fiber.StatusBadRequest, "reply token is invaild, event id mismatch") + } + var data struct { Type string `json:"type" validate:"required"` Body models.EventMessageBody `json:"body"` @@ -43,7 +51,7 @@ func quickReply(c *fiber.Ctx) error { return fiber.NewError(fiber.StatusBadRequest, "empty message was not allowed") } - channel, member, err := services.GetChannelIdentityWithID(uint(channelId), user.ID) + channel, member, err := services.GetChannelIdentityWithID(uint(channelId), claims.UserID) if err != nil { return fiber.NewError(fiber.StatusBadRequest, fmt.Sprintf("channel / member not found: %v", err.Error())) } diff --git a/pkg/internal/services/events.go b/pkg/internal/services/events.go index 5a9a395..3569862 100644 --- a/pkg/internal/services/events.go +++ b/pkg/internal/services/events.go @@ -180,14 +180,16 @@ func NotifyMessageEvent(members []models.ChannelMember, event models.Event) { } displayTitle := fmt.Sprintf("%s (%s)", event.Sender.Nick, event.Channel.DisplayText()) + replyToken, err := CreateReplyToken(event.ID, event.Sender.AccountID) metadata := map[string]any{ - "avatar": event.Sender.Avatar, - "user_id": event.Sender.AccountID, - "user_name": event.Sender.Name, - "user_nick": event.Sender.Nick, - "channel_id": event.ChannelID, - "event_id": event.ID, + "avatar": event.Sender.Avatar, + "user_id": event.Sender.AccountID, + "user_name": event.Sender.Name, + "user_nick": event.Sender.Nick, + "channel_id": event.ChannelID, + "event_id": event.ID, + "reply_token": replyToken, } if len(pendingUsers) > 0 { diff --git a/pkg/internal/services/reply_token.go b/pkg/internal/services/reply_token.go new file mode 100644 index 0000000..207b2f9 --- /dev/null +++ b/pkg/internal/services/reply_token.go @@ -0,0 +1,50 @@ +package services + +import ( + "fmt" + "time" + + "github.com/golang-jwt/jwt/v5" + "github.com/spf13/viper" +) + +type ReplyClaims struct { + UserID uint `json:"user_id"` + EventID uint `json:"event_id"` + jwt.RegisteredClaims +} + +func CreateReplyToken(eventId uint, userId uint) (string, error) { + claims := ReplyClaims{ + UserID: userId, + EventID: eventId, + RegisteredClaims: jwt.RegisteredClaims{ + Issuer: "messaging", + ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Hour * 24 * 7)), + }, + } + + token := jwt.NewWithClaims(jwt.SigningMethodHS512, claims) + tks, err := token.SignedString([]byte(viper.GetString("security.reply_token_secret"))) + if err != nil { + return "", fmt.Errorf("failed to sign token: %v", err) + } + return tks, nil +} + +func ParseReplyToken(tk string) (ReplyClaims, error) { + var claims ReplyClaims + token, err := jwt.ParseWithClaims(tk, &claims, func(token *jwt.Token) (interface{}, error) { + if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok { + return nil, fmt.Errorf("unexpected signing method: %v", token.Method) + } + return []byte(viper.GetString("security.reply_token_secret")), nil + }) + if err != nil { + return claims, err + } + if !token.Valid { + return claims, fmt.Errorf("invalid token") + } + return claims, nil +} diff --git a/settings.toml b/settings.toml index b3380ce..3a6fed9 100644 --- a/settings.toml +++ b/settings.toml @@ -19,3 +19,4 @@ max_participants = 20 [security] internal_public_key = "keys/internal_public_key.pem" +reply_token_secret = "QSu8iYYLDkGj10H3FtNI7OabpGl8N7Rg6rBagofQN4Uza3nIrXpVzDEfAiU1G2Yn"