后端:
1.阶段 6 CP4/CP5 目录收口与共享边界纯化
- 将 backend 根目录收口为 services、client、gateway、cmd、shared 五个一级目录
- 收拢 bootstrap、inits、infra/kafka、infra/outbox、conv、respond、pkg、middleware,移除根目录旧实现与空目录
- 将 utils 下沉到 services/userauth/internal/auth,将 logic 下沉到 services/schedule/core/planning
- 将迁移期 runtime 桥接实现统一收拢到 services/runtime/{conv,dao,eventsvc,model},删除 shared/legacy 与未再被 import 的旧 service 实现
- 将 gateway/shared/respond 收口为 HTTP/Gin 错误写回适配,shared/respond 仅保留共享错误语义与状态映射
- 将 HTTP IdempotencyMiddleware 与 RateLimitMiddleware 收口到 gateway/middleware
- 将 GormCachePlugin 下沉到 shared/infra/gormcache,将共享 RateLimiter 下沉到 shared/infra/ratelimit,将 agent token budget 下沉到 services/agent/shared
- 删除 InitEino 兼容壳,收缩 cmd/internal/coreinit 仅保留旧组合壳残留域初始化语义
- 更新微服务迁移计划与桌面 checklist,补齐 CP4/CP5 当前切流点、目录终态与验证结果
- 完成 go test ./...、git diff --check 与最终真实 smoke;health、register/login、task/create+get、schedule/today、task-class/list、memory/items、agent chat/meta/timeline/context-stats 全部 200,SSE 合并结果为 CP5_OK 且 [DONE] 只有 1 个
178 lines
5.5 KiB
Go
178 lines
5.5 KiB
Go
package rpc
|
||
|
||
import (
|
||
"context"
|
||
"errors"
|
||
"time"
|
||
|
||
"github.com/LoveLosita/smartflow/backend/services/userauth/rpc/pb"
|
||
userauthsv "github.com/LoveLosita/smartflow/backend/services/userauth/sv"
|
||
contracts "github.com/LoveLosita/smartflow/backend/shared/contracts/userauth"
|
||
"github.com/LoveLosita/smartflow/backend/shared/respond"
|
||
)
|
||
|
||
type Handler struct {
|
||
pb.UnimplementedUserAuthServer
|
||
svc *userauthsv.Service
|
||
}
|
||
|
||
func NewHandler(svc *userauthsv.Service) *Handler {
|
||
return &Handler{svc: svc}
|
||
}
|
||
|
||
// Register 负责把 user/auth 的注册请求从 gRPC 协议转成内部服务调用。
|
||
//
|
||
// 职责边界:
|
||
// 1. 只做 transport -> service 的参数搬运,不碰 DAO/Redis/JWT 细节;
|
||
// 2. 业务错误统一转成 gRPC status,让 client 侧继续使用 `res, err :=`;
|
||
// 3. 成功时只回传业务数据,不再在 payload 里塞 status/info。
|
||
func (h *Handler) Register(ctx context.Context, req *pb.RegisterRequest) (*pb.RegisterResponse, error) {
|
||
if h == nil || h.svc == nil {
|
||
return nil, grpcErrorFromServiceError(errors.New("userauth service dependency not initialized"))
|
||
}
|
||
if req == nil {
|
||
return nil, grpcErrorFromServiceError(respond.MissingParam)
|
||
}
|
||
|
||
resp, err := h.svc.Register(ctx, contracts.RegisterRequest{
|
||
Username: req.Username,
|
||
Password: req.Password,
|
||
PhoneNumber: req.PhoneNumber,
|
||
})
|
||
if err != nil {
|
||
return nil, grpcErrorFromServiceError(err)
|
||
}
|
||
return &pb.RegisterResponse{Id: uint64(resp.ID)}, nil
|
||
}
|
||
|
||
func (h *Handler) Login(ctx context.Context, req *pb.LoginRequest) (*pb.TokensResponse, error) {
|
||
if h == nil || h.svc == nil {
|
||
return nil, grpcErrorFromServiceError(errors.New("userauth service dependency not initialized"))
|
||
}
|
||
if req == nil {
|
||
return nil, grpcErrorFromServiceError(respond.MissingParam)
|
||
}
|
||
|
||
resp, err := h.svc.Login(ctx, contracts.LoginRequest{
|
||
Username: req.Username,
|
||
Password: req.Password,
|
||
})
|
||
if err != nil {
|
||
return nil, grpcErrorFromServiceError(err)
|
||
}
|
||
return &pb.TokensResponse{
|
||
AccessToken: resp.AccessToken,
|
||
RefreshToken: resp.RefreshToken,
|
||
}, nil
|
||
}
|
||
|
||
func (h *Handler) RefreshToken(ctx context.Context, req *pb.RefreshTokenRequest) (*pb.TokensResponse, error) {
|
||
if h == nil || h.svc == nil {
|
||
return nil, grpcErrorFromServiceError(errors.New("userauth service dependency not initialized"))
|
||
}
|
||
if req == nil {
|
||
return nil, grpcErrorFromServiceError(respond.MissingParam)
|
||
}
|
||
|
||
resp, err := h.svc.RefreshToken(ctx, contracts.RefreshTokenRequest{
|
||
RefreshToken: req.RefreshToken,
|
||
})
|
||
if err != nil {
|
||
return nil, grpcErrorFromServiceError(err)
|
||
}
|
||
return &pb.TokensResponse{
|
||
AccessToken: resp.AccessToken,
|
||
RefreshToken: resp.RefreshToken,
|
||
}, nil
|
||
}
|
||
|
||
func (h *Handler) Logout(ctx context.Context, req *pb.LogoutRequest) (*pb.StatusResponse, error) {
|
||
if h == nil || h.svc == nil {
|
||
return nil, grpcErrorFromServiceError(errors.New("userauth service dependency not initialized"))
|
||
}
|
||
if req == nil {
|
||
return nil, grpcErrorFromServiceError(respond.MissingToken)
|
||
}
|
||
|
||
if err := h.svc.LogoutByAccessToken(ctx, req.AccessToken); err != nil {
|
||
return nil, grpcErrorFromServiceError(err)
|
||
}
|
||
return &pb.StatusResponse{}, nil
|
||
}
|
||
|
||
func (h *Handler) ValidateAccessToken(ctx context.Context, req *pb.ValidateAccessTokenRequest) (*pb.ValidateAccessTokenResponse, error) {
|
||
if h == nil || h.svc == nil {
|
||
return nil, grpcErrorFromServiceError(errors.New("userauth service dependency not initialized"))
|
||
}
|
||
if req == nil {
|
||
return nil, grpcErrorFromServiceError(respond.MissingToken)
|
||
}
|
||
|
||
resp, err := h.svc.ValidateAccessToken(ctx, contracts.ValidateAccessTokenRequest{
|
||
AccessToken: req.AccessToken,
|
||
})
|
||
if err != nil {
|
||
return nil, grpcErrorFromServiceError(err)
|
||
}
|
||
return &pb.ValidateAccessTokenResponse{
|
||
Valid: resp.Valid,
|
||
UserId: int64(resp.UserID),
|
||
TokenType: resp.TokenType,
|
||
Jti: resp.JTI,
|
||
ExpiresAtUnixNano: timeToUnixNano(resp.ExpiresAt),
|
||
}, nil
|
||
}
|
||
|
||
func (h *Handler) CheckTokenQuota(ctx context.Context, req *pb.CheckTokenQuotaRequest) (*pb.CheckTokenQuotaResponse, error) {
|
||
if h == nil || h.svc == nil {
|
||
return nil, grpcErrorFromServiceError(errors.New("userauth service dependency not initialized"))
|
||
}
|
||
if req == nil {
|
||
return nil, grpcErrorFromServiceError(respond.ErrUnauthorized)
|
||
}
|
||
|
||
resp, err := h.svc.CheckTokenQuota(ctx, contracts.CheckTokenQuotaRequest{
|
||
UserID: int(req.UserId),
|
||
})
|
||
if err != nil {
|
||
return nil, grpcErrorFromServiceError(err)
|
||
}
|
||
return &pb.CheckTokenQuotaResponse{
|
||
Allowed: resp.Allowed,
|
||
TokenLimit: int64(resp.TokenLimit),
|
||
TokenUsage: int64(resp.TokenUsage),
|
||
LastResetAtUnixNano: timeToUnixNano(resp.LastResetAt),
|
||
}, nil
|
||
}
|
||
|
||
func (h *Handler) AdjustTokenUsage(ctx context.Context, req *pb.AdjustTokenUsageRequest) (*pb.CheckTokenQuotaResponse, error) {
|
||
if h == nil || h.svc == nil {
|
||
return nil, grpcErrorFromServiceError(errors.New("userauth service dependency not initialized"))
|
||
}
|
||
if req == nil {
|
||
return nil, grpcErrorFromServiceError(respond.MissingParam)
|
||
}
|
||
|
||
resp, err := h.svc.AdjustTokenUsage(ctx, contracts.AdjustTokenUsageRequest{
|
||
EventID: req.EventId,
|
||
UserID: int(req.UserId),
|
||
TokenDelta: int(req.TokenDelta),
|
||
})
|
||
if err != nil {
|
||
return nil, grpcErrorFromServiceError(err)
|
||
}
|
||
return &pb.CheckTokenQuotaResponse{
|
||
Allowed: resp.Allowed,
|
||
TokenLimit: int64(resp.TokenLimit),
|
||
TokenUsage: int64(resp.TokenUsage),
|
||
LastResetAtUnixNano: timeToUnixNano(resp.LastResetAt),
|
||
}, nil
|
||
}
|
||
|
||
func timeToUnixNano(value time.Time) int64 {
|
||
if value.IsZero() {
|
||
return 0
|
||
}
|
||
return value.UnixNano()
|
||
}
|