actions.go 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143
  1. package main
  2. import (
  3. "context"
  4. "encoding/hex"
  5. "errors"
  6. "math/rand"
  7. "net/http"
  8. "sparrow/pkg/models"
  9. "sparrow/pkg/rpcs"
  10. "sparrow/pkg/server"
  11. "sparrow/pkg/token"
  12. "strings"
  13. "github.com/opentracing/opentracing-go/ext"
  14. "github.com/opentracing/opentracing-go"
  15. "github.com/martini-contrib/render"
  16. )
  17. const (
  18. ErrOK = 0
  19. ErrSystemFault = 10001
  20. ErrDeviceNotFound = 10002
  21. ErrWrongSecret = 10003
  22. ErrProtocolNotSuported = 10004
  23. )
  24. func renderError(code int, err error) Common {
  25. result := Common{}
  26. result.Code = code
  27. result.Message = err.Error()
  28. server.Log.Error(err.Error())
  29. return result
  30. }
  31. // DeviceRegisterArgs device register args
  32. type DeviceRegisterArgs struct {
  33. ProductKey string `json:"product_key" binding:"required"`
  34. DeviceCode string `json:"device_code" binding:"required"`
  35. Version string `json:"version" binding:"required"`
  36. ModuleName string `json:"module" binding:"required"`
  37. }
  38. // DeviceAuthArgs device authentication args
  39. type DeviceAuthArgs struct {
  40. DeviceId int64 `json:"device_id" binding:"required"`
  41. DeviceSecret string `json:"device_secret" binding:"required"`
  42. Protocol string `json:"protocol" binding:"required"`
  43. }
  44. // RegisterDevice 设备激活
  45. func RegisterDevice(args DeviceRegisterArgs, r render.Render) {
  46. server.Log.Printf("ACTION RegisterDevice, args:: %v ", args)
  47. span, ctx := opentracing.StartSpanFromContext(context.Background(), "RegisterDevice")
  48. defer span.Finish()
  49. rpcargs := &rpcs.ArgsDeviceRegister{
  50. ProductKey: args.ProductKey,
  51. DeviceCode: args.DeviceCode,
  52. DeviceVersion: args.Version,
  53. ModuleName: args.ModuleName,
  54. }
  55. device := &models.Device{}
  56. ext.SpanKindRPCClient.Set(span)
  57. err := server.RPCCallByName(ctx, rpcs.RegistryServerName, "Registry.RegisterDevice", rpcargs, device)
  58. if err != nil {
  59. r.JSON(http.StatusOK, renderError(ErrSystemFault, err))
  60. return
  61. }
  62. server.Log.Infof("register device success: %v", device)
  63. result := DeviceRegisterResponse{}
  64. result.Data = DeviceRegisterData{
  65. DeviceId: int64(device.ID),
  66. DeviceSecret: device.DeviceSecret,
  67. DeviceKey: device.DeviceKey,
  68. DeviceIdentifier: device.DeviceIdentifier,
  69. }
  70. r.JSON(http.StatusOK, result)
  71. return
  72. }
  73. // AuthDevice device auth
  74. func AuthDevice(args DeviceAuthArgs, r render.Render) {
  75. server.Log.Printf("ACTION AuthDevice, args:: %v", args)
  76. device := &models.Device{}
  77. span, ctx := opentracing.StartSpanFromContext(context.Background(), "AuthDevice")
  78. defer span.Finish()
  79. ext.SpanKindRPCClient.Set(span)
  80. arg := uint64(args.DeviceId)
  81. err := server.RPCCallByName(ctx, rpcs.RegistryServerName, "Registry.FindDeviceById", &arg, device)
  82. if err != nil {
  83. r.JSON(http.StatusOK, renderError(ErrDeviceNotFound, err))
  84. return
  85. }
  86. if device.DeviceSecret != args.DeviceSecret {
  87. // device secret is wrong.
  88. r.JSON(http.StatusOK, renderError(ErrWrongSecret, errors.New("wrong device secret.")))
  89. return
  90. }
  91. hepler := token.NewHelper(*confRedisHost)
  92. token, err := hepler.GenerateToken(device.RecordId)
  93. if err != nil {
  94. r.JSON(http.StatusOK, renderError(ErrSystemFault, err))
  95. return
  96. }
  97. var hosts []string
  98. switch args.Protocol {
  99. case "http":
  100. hosts, err = server.GetServerHosts(strings.ToUpper(args.Protocol)+"Access", "httphost")
  101. case "mqtt":
  102. hosts, err = server.GetServerHosts(strings.ToUpper(args.Protocol)+"Access", "tcphost")
  103. case "coap":
  104. hosts, err = server.GetServerHosts(strings.ToUpper(args.Protocol)+"Access", "udphost")
  105. default:
  106. err = errors.New("unsuported protocol: " + args.Protocol)
  107. }
  108. if err != nil {
  109. r.JSON(http.StatusOK, renderError(ErrProtocolNotSuported, err))
  110. return
  111. }
  112. // just get a random host
  113. host := hosts[rand.Intn(len(hosts))]
  114. result := DeviceAuthResponse{}
  115. result.Data = DeviceAuthData{
  116. AccessToken: hex.EncodeToString(token),
  117. AccessAddr: host,
  118. }
  119. server.Log.Infof("auth device success: %v, token: %x, access: %v", device, token, host)
  120. r.JSON(http.StatusOK, result)
  121. return
  122. }