Version: 0.9.77.dev.260505

后端:
1.阶段 6 CP4/CP5 目录收口与共享边界纯化
- 将 backend 根目录收口为 services、client、gateway、cmd、shared 五个一级目录
- 收拢 bootstrap、inits、infra/kafka、infra/outbox、conv、respond、pkg、middleware,移除根目录旧实现与空目录
- 将 utils 下沉到 services/userauth/internal/auth,将 logic 下沉到 services/schedule/core/planning
- 将迁移期 runtime 桥接实现统一收拢到 services/runtime/{conv,dao,eventsvc,model},删除 shared/legacy 与未再被 import 的旧 service 实现
- 将 gateway/shared/respond 收口为 HTTP/Gin 错误写回适配,shared/respond 仅保留共享错误语义与状态映射
- 将 HTTP IdempotencyMiddleware 与 RateLimitMiddleware 收口到 gateway/middleware
- 将 GormCachePlugin 下沉到 shared/infra/gormcache,将共享 RateLimiter 下沉到 shared/infra/ratelimit,将 agent token budget 下沉到 services/agent/shared
- 删除 InitEino 兼容壳,收缩 cmd/internal/coreinit 仅保留旧组合壳残留域初始化语义
- 更新微服务迁移计划与桌面 checklist,补齐 CP4/CP5 当前切流点、目录终态与验证结果
- 完成 go test ./...、git diff --check 与最终真实 smoke;health、register/login、task/create+get、schedule/today、task-class/list、memory/items、agent chat/meta/timeline/context-stats 全部 200,SSE 合并结果为 CP5_OK 且 [DONE] 只有 1 个
This commit is contained in:
Losita
2026-05-05 23:25:07 +08:00
parent 2a96f4c6f9
commit 3b6fca44a6
226 changed files with 731 additions and 3497 deletions

View File

@@ -0,0 +1,218 @@
package userauth
import (
"context"
"errors"
"strings"
"time"
"github.com/LoveLosita/smartflow/backend/services/userauth/rpc/pb"
contracts "github.com/LoveLosita/smartflow/backend/shared/contracts/userauth"
"github.com/zeromicro/go-zero/zrpc"
)
const (
defaultEndpoint = "127.0.0.1:9081"
defaultTimeout = 2 * time.Second
)
type ClientConfig struct {
Endpoints []string
Target string
Timeout time.Duration
}
// Client 是 gateway 侧 user/auth zrpc 的最小适配层。
//
// 职责边界:
// 1. 只负责跨进程 gRPC 调用和响应转译,不碰 DB / Redis / JWT 细节;
// 2. 服务端业务错误先通过 gRPC status 传输,再在这里反解回 respond.Response 风格;
// 3. 上层调用方仍然可以保持 `res, err :=` 的统一用法。
type Client struct {
rpc pb.UserAuthClient
}
func NewClient(cfg ClientConfig) (*Client, error) {
timeout := cfg.Timeout
if timeout <= 0 {
timeout = defaultTimeout
}
endpoints := normalizeEndpoints(cfg.Endpoints)
target := strings.TrimSpace(cfg.Target)
if len(endpoints) == 0 && target == "" {
endpoints = []string{defaultEndpoint}
}
zclient, err := zrpc.NewClient(zrpc.RpcClientConf{
Endpoints: endpoints,
Target: target,
NonBlock: true,
Timeout: int64(timeout / time.Millisecond),
})
if err != nil {
return nil, err
}
return &Client{rpc: pb.NewUserAuthClient(zclient.Conn())}, nil
}
func (c *Client) Register(ctx context.Context, req contracts.RegisterRequest) (*contracts.RegisterResponse, error) {
if err := c.ensureReady(); err != nil {
return nil, err
}
resp, err := c.rpc.Register(ctx, &pb.RegisterRequest{
Username: req.Username,
Password: req.Password,
PhoneNumber: req.PhoneNumber,
})
if err != nil {
return nil, responseFromRPCError(err)
}
if resp == nil {
return nil, errors.New("userauth zrpc service returned empty register response")
}
return &contracts.RegisterResponse{ID: uint(resp.Id)}, nil
}
func (c *Client) Login(ctx context.Context, req contracts.LoginRequest) (*contracts.Tokens, error) {
if err := c.ensureReady(); err != nil {
return nil, err
}
resp, err := c.rpc.Login(ctx, &pb.LoginRequest{
Username: req.Username,
Password: req.Password,
})
if err != nil {
return nil, responseFromRPCError(err)
}
return tokensFromResponse(resp)
}
func (c *Client) RefreshToken(ctx context.Context, req contracts.RefreshTokenRequest) (*contracts.Tokens, error) {
if err := c.ensureReady(); err != nil {
return nil, err
}
resp, err := c.rpc.RefreshToken(ctx, &pb.RefreshTokenRequest{
RefreshToken: req.RefreshToken,
})
if err != nil {
return nil, responseFromRPCError(err)
}
return tokensFromResponse(resp)
}
func (c *Client) Logout(ctx context.Context, accessToken string) error {
if err := c.ensureReady(); err != nil {
return err
}
resp, err := c.rpc.Logout(ctx, &pb.LogoutRequest{
AccessToken: accessToken,
})
if err != nil {
return responseFromRPCError(err)
}
if resp == nil {
return errors.New("userauth zrpc service returned empty logout response")
}
return nil
}
func (c *Client) ValidateAccessToken(ctx context.Context, accessToken string) (*contracts.ValidateAccessTokenResponse, error) {
if err := c.ensureReady(); err != nil {
return nil, err
}
resp, err := c.rpc.ValidateAccessToken(ctx, &pb.ValidateAccessTokenRequest{
AccessToken: accessToken,
})
if err != nil {
return nil, responseFromRPCError(err)
}
if resp == nil {
return nil, errors.New("userauth zrpc service returned empty validate response")
}
return &contracts.ValidateAccessTokenResponse{
Valid: resp.Valid,
UserID: int(resp.UserId),
TokenType: resp.TokenType,
JTI: resp.Jti,
ExpiresAt: timeFromUnixNano(resp.ExpiresAtUnixNano),
}, nil
}
func (c *Client) CheckTokenQuota(ctx context.Context, userID int) (*contracts.CheckTokenQuotaResponse, error) {
if err := c.ensureReady(); err != nil {
return nil, err
}
resp, err := c.rpc.CheckTokenQuota(ctx, &pb.CheckTokenQuotaRequest{
UserId: int64(userID),
})
if err != nil {
return nil, responseFromRPCError(err)
}
if resp == nil {
return nil, errors.New("userauth zrpc service returned empty quota response")
}
return &contracts.CheckTokenQuotaResponse{
Allowed: resp.Allowed,
TokenLimit: int(resp.TokenLimit),
TokenUsage: int(resp.TokenUsage),
LastResetAt: timeFromUnixNano(resp.LastResetAtUnixNano),
}, nil
}
func (c *Client) AdjustTokenUsage(ctx context.Context, req contracts.AdjustTokenUsageRequest) (*contracts.CheckTokenQuotaResponse, error) {
if err := c.ensureReady(); err != nil {
return nil, err
}
resp, err := c.rpc.AdjustTokenUsage(ctx, &pb.AdjustTokenUsageRequest{
EventId: req.EventID,
UserId: int64(req.UserID),
TokenDelta: int64(req.TokenDelta),
})
if err != nil {
return nil, responseFromRPCError(err)
}
if resp == nil {
return nil, errors.New("userauth zrpc service returned empty adjust response")
}
return &contracts.CheckTokenQuotaResponse{
Allowed: resp.Allowed,
TokenLimit: int(resp.TokenLimit),
TokenUsage: int(resp.TokenUsage),
LastResetAt: timeFromUnixNano(resp.LastResetAtUnixNano),
}, nil
}
func (c *Client) ensureReady() error {
if c == nil || c.rpc == nil {
return errors.New("userauth zrpc client is not initialized")
}
return nil
}
func tokensFromResponse(resp *pb.TokensResponse) (*contracts.Tokens, error) {
if resp == nil {
return nil, errors.New("userauth zrpc service returned empty token response")
}
return &contracts.Tokens{
AccessToken: resp.AccessToken,
RefreshToken: resp.RefreshToken,
}, nil
}
func normalizeEndpoints(values []string) []string {
endpoints := make([]string, 0, len(values))
for _, value := range values {
trimmed := strings.TrimSpace(value)
if trimmed != "" {
endpoints = append(endpoints, trimmed)
}
}
return endpoints
}
func timeFromUnixNano(value int64) time.Time {
if value <= 0 {
return time.Time{}
}
return time.Unix(0, value)
}

View File

@@ -0,0 +1,198 @@
package userauth
import (
"errors"
"fmt"
"strings"
"github.com/LoveLosita/smartflow/backend/shared/respond"
"google.golang.org/genproto/googleapis/rpc/errdetails"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
)
// responseFromRPCError 负责把 user/auth 的 gRPC 错误反解回项目内的 respond.Response。
//
// 职责边界:
// 1. 只在 gateway 边缘层使用,不下沉到服务实现里;
// 2. 业务错误尽量恢复成 respond.Response方便 API 层继续复用现有 DealWithError
// 3. 只要拿不到业务语义,就退化成普通 error让上层按 500 处理。
func responseFromRPCError(err error) error {
if err == nil {
return nil
}
st, ok := status.FromError(err)
if !ok {
return wrapRPCError(err)
}
if resp, ok := responseFromStatus(st); ok {
return resp
}
switch st.Code() {
case codes.Internal, codes.Unknown, codes.Unavailable, codes.DeadlineExceeded, codes.DataLoss, codes.Unimplemented:
msg := strings.TrimSpace(st.Message())
if msg == "" {
msg = "userauth zrpc service internal error"
}
return wrapRPCError(errors.New(msg))
}
msg := strings.TrimSpace(st.Message())
if msg == "" {
msg = "userauth zrpc service rejected request"
}
return respond.Response{
Status: grpcCodeToRespondStatus(st.Code()),
Info: msg,
}
}
func responseFromStatus(st *status.Status) (respond.Response, bool) {
if st == nil {
return respond.Response{}, false
}
if resp, ok := responseFromStatusDetails(st); ok {
return resp, true
}
if resp, ok := responseFromLegacyStatus(st.Code(), st.Message()); ok {
return resp, true
}
return respond.Response{}, false
}
func responseFromStatusDetails(st *status.Status) (respond.Response, bool) {
for _, detail := range st.Details() {
info, ok := detail.(*errdetails.ErrorInfo)
if !ok {
continue
}
statusValue := strings.TrimSpace(info.Reason)
if statusValue == "" {
statusValue = grpcCodeToRespondStatus(st.Code())
}
if statusValue == "" {
return respond.Response{}, false
}
message := strings.TrimSpace(st.Message())
if message == "" && info.Metadata != nil {
message = strings.TrimSpace(info.Metadata["info"])
}
if message == "" {
message = statusValue
}
return respond.Response{Status: statusValue, Info: message}, true
}
return respond.Response{}, false
}
func responseFromLegacyStatus(code codes.Code, message string) (respond.Response, bool) {
trimmed := strings.TrimSpace(message)
if resp, ok := respondResponseByMessage(trimmed); ok {
return resp, true
}
switch code {
case codes.Unauthenticated:
if trimmed == "" {
trimmed = "unauthorized"
}
return respond.Response{Status: respond.ErrUnauthorized.Status, Info: trimmed}, true
case codes.AlreadyExists:
if trimmed == "" {
trimmed = "already exists"
}
return respond.Response{Status: respond.InvalidName.Status, Info: trimmed}, true
case codes.NotFound:
if trimmed == "" {
trimmed = "not found"
}
return respond.Response{Status: respond.WrongName.Status, Info: trimmed}, true
case codes.ResourceExhausted:
if trimmed == "" {
trimmed = respond.TokenUsageExceedsLimit.Info
}
return respond.Response{Status: respond.TokenUsageExceedsLimit.Status, Info: trimmed}, true
case codes.InvalidArgument:
if trimmed == "" {
trimmed = "invalid argument"
}
return respond.Response{Status: respond.MissingParam.Status, Info: trimmed}, true
case codes.Internal, codes.Unknown, codes.DataLoss:
if trimmed == "" {
trimmed = "userauth service internal error"
}
return respond.InternalError(errors.New(trimmed)), true
}
return respond.Response{}, false
}
func respondResponseByMessage(message string) (respond.Response, bool) {
switch strings.TrimSpace(message) {
case respond.MissingParam.Info:
return respond.MissingParam, true
case respond.WrongParamType.Info:
return respond.WrongParamType, true
case respond.ParamTooLong.Info:
return respond.ParamTooLong, true
case respond.InvalidName.Info:
return respond.InvalidName, true
case respond.WrongName.Info:
return respond.WrongName, true
case respond.WrongPwd.Info:
return respond.WrongPwd, true
case respond.WrongUsernameOrPwd.Info:
return respond.WrongUsernameOrPwd, true
case respond.MissingToken.Info:
return respond.MissingToken, true
case respond.InvalidTokenSingingMethod.Info:
return respond.InvalidTokenSingingMethod, true
case respond.InvalidToken.Info:
return respond.InvalidToken, true
case respond.InvalidClaims.Info:
return respond.InvalidClaims, true
case respond.ErrUnauthorized.Info:
return respond.ErrUnauthorized, true
case respond.InvalidRefreshToken.Info:
return respond.InvalidRefreshToken, true
case respond.WrongTokenType.Info:
return respond.WrongTokenType, true
case respond.UserLoggedOut.Info:
return respond.UserLoggedOut, true
case respond.WrongUserID.Info:
return respond.WrongUserID, true
case respond.TokenUsageExceedsLimit.Info:
return respond.TokenUsageExceedsLimit, true
}
return respond.Response{}, false
}
func grpcCodeToRespondStatus(code codes.Code) string {
switch code {
case codes.Unauthenticated:
return respond.ErrUnauthorized.Status
case codes.AlreadyExists:
return respond.InvalidName.Status
case codes.NotFound:
return respond.WrongName.Status
case codes.ResourceExhausted:
return respond.TokenUsageExceedsLimit.Status
case codes.Internal, codes.Unknown, codes.DataLoss:
return "500"
default:
return "400"
}
}
func wrapRPCError(err error) error {
if err == nil {
return nil
}
return fmt.Errorf("调用 userauth zrpc 服务失败: %w", err)
}