2026-01-15 18:27:06 +08:00
|
|
|
|
package service
|
|
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
|
"context"
|
|
|
|
|
|
"errors"
|
|
|
|
|
|
"log/slog"
|
|
|
|
|
|
"strconv"
|
|
|
|
|
|
"strings"
|
|
|
|
|
|
"time"
|
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
const (
|
|
|
|
|
|
claudeTokenRefreshSkew = 3 * time.Minute
|
|
|
|
|
|
claudeTokenCacheSkew = 5 * time.Minute
|
|
|
|
|
|
claudeLockWaitTime = 200 * time.Millisecond
|
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
// ClaudeTokenCache Token 缓存接口(复用 GeminiTokenCache 接口定义)
|
|
|
|
|
|
type ClaudeTokenCache = GeminiTokenCache
|
|
|
|
|
|
|
|
|
|
|
|
// ClaudeTokenProvider 管理 Claude (Anthropic) OAuth 账户的 access_token
|
|
|
|
|
|
type ClaudeTokenProvider struct {
|
|
|
|
|
|
accountRepo AccountRepository
|
|
|
|
|
|
tokenCache ClaudeTokenCache
|
|
|
|
|
|
oauthService *OAuthService
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func NewClaudeTokenProvider(
|
|
|
|
|
|
accountRepo AccountRepository,
|
|
|
|
|
|
tokenCache ClaudeTokenCache,
|
|
|
|
|
|
oauthService *OAuthService,
|
|
|
|
|
|
) *ClaudeTokenProvider {
|
|
|
|
|
|
return &ClaudeTokenProvider{
|
|
|
|
|
|
accountRepo: accountRepo,
|
|
|
|
|
|
tokenCache: tokenCache,
|
|
|
|
|
|
oauthService: oauthService,
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// GetAccessToken 获取有效的 access_token
|
|
|
|
|
|
func (p *ClaudeTokenProvider) GetAccessToken(ctx context.Context, account *Account) (string, error) {
|
|
|
|
|
|
if account == nil {
|
|
|
|
|
|
return "", errors.New("account is nil")
|
|
|
|
|
|
}
|
|
|
|
|
|
if account.Platform != PlatformAnthropic || account.Type != AccountTypeOAuth {
|
|
|
|
|
|
return "", errors.New("not an anthropic oauth account")
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
cacheKey := ClaudeTokenCacheKey(account)
|
|
|
|
|
|
|
|
|
|
|
|
// 1. 先尝试缓存
|
|
|
|
|
|
if p.tokenCache != nil {
|
|
|
|
|
|
if token, err := p.tokenCache.GetAccessToken(ctx, cacheKey); err == nil && strings.TrimSpace(token) != "" {
|
|
|
|
|
|
slog.Debug("claude_token_cache_hit", "account_id", account.ID)
|
|
|
|
|
|
return token, nil
|
|
|
|
|
|
} else if err != nil {
|
|
|
|
|
|
slog.Warn("claude_token_cache_get_failed", "account_id", account.ID, "error", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
slog.Debug("claude_token_cache_miss", "account_id", account.ID)
|
|
|
|
|
|
|
|
|
|
|
|
// 2. 如果即将过期则刷新
|
|
|
|
|
|
expiresAt := account.GetCredentialAsTime("expires_at")
|
|
|
|
|
|
needsRefresh := expiresAt == nil || time.Until(*expiresAt) <= claudeTokenRefreshSkew
|
|
|
|
|
|
refreshFailed := false
|
|
|
|
|
|
if needsRefresh && p.tokenCache != nil {
|
2026-01-15 19:08:07 +08:00
|
|
|
|
locked, lockErr := p.tokenCache.AcquireRefreshLock(ctx, cacheKey, 30*time.Second)
|
|
|
|
|
|
if lockErr == nil && locked {
|
2026-01-15 18:27:06 +08:00
|
|
|
|
defer func() { _ = p.tokenCache.ReleaseRefreshLock(ctx, cacheKey) }()
|
|
|
|
|
|
|
|
|
|
|
|
// 拿到锁后再次检查缓存(另一个 worker 可能已刷新)
|
|
|
|
|
|
if token, err := p.tokenCache.GetAccessToken(ctx, cacheKey); err == nil && strings.TrimSpace(token) != "" {
|
|
|
|
|
|
return token, nil
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// 从数据库获取最新账户信息
|
|
|
|
|
|
fresh, err := p.accountRepo.GetByID(ctx, account.ID)
|
|
|
|
|
|
if err == nil && fresh != nil {
|
|
|
|
|
|
account = fresh
|
|
|
|
|
|
}
|
|
|
|
|
|
expiresAt = account.GetCredentialAsTime("expires_at")
|
|
|
|
|
|
if expiresAt == nil || time.Until(*expiresAt) <= claudeTokenRefreshSkew {
|
|
|
|
|
|
if p.oauthService == nil {
|
|
|
|
|
|
slog.Warn("claude_oauth_service_not_configured", "account_id", account.ID)
|
|
|
|
|
|
refreshFailed = true // 无法刷新,标记失败
|
|
|
|
|
|
} else {
|
|
|
|
|
|
tokenInfo, err := p.oauthService.RefreshAccountToken(ctx, account)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
// 刷新失败时记录警告,但不立即返回错误,尝试使用现有 token
|
|
|
|
|
|
slog.Warn("claude_token_refresh_failed", "account_id", account.ID, "error", err)
|
|
|
|
|
|
refreshFailed = true // 刷新失败,标记以使用短 TTL
|
|
|
|
|
|
} else {
|
|
|
|
|
|
// 构建新 credentials,保留原有字段
|
|
|
|
|
|
newCredentials := make(map[string]any)
|
|
|
|
|
|
for k, v := range account.Credentials {
|
|
|
|
|
|
newCredentials[k] = v
|
|
|
|
|
|
}
|
|
|
|
|
|
newCredentials["access_token"] = tokenInfo.AccessToken
|
|
|
|
|
|
newCredentials["token_type"] = tokenInfo.TokenType
|
|
|
|
|
|
newCredentials["expires_in"] = strconv.FormatInt(tokenInfo.ExpiresIn, 10)
|
|
|
|
|
|
newCredentials["expires_at"] = strconv.FormatInt(tokenInfo.ExpiresAt, 10)
|
|
|
|
|
|
if tokenInfo.RefreshToken != "" {
|
|
|
|
|
|
newCredentials["refresh_token"] = tokenInfo.RefreshToken
|
|
|
|
|
|
}
|
|
|
|
|
|
if tokenInfo.Scope != "" {
|
|
|
|
|
|
newCredentials["scope"] = tokenInfo.Scope
|
|
|
|
|
|
}
|
|
|
|
|
|
account.Credentials = newCredentials
|
|
|
|
|
|
if updateErr := p.accountRepo.Update(ctx, account); updateErr != nil {
|
|
|
|
|
|
slog.Error("claude_token_provider_update_failed", "account_id", account.ID, "error", updateErr)
|
|
|
|
|
|
}
|
|
|
|
|
|
expiresAt = account.GetCredentialAsTime("expires_at")
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2026-01-15 19:08:07 +08:00
|
|
|
|
} else if lockErr != nil {
|
|
|
|
|
|
// Redis 错误导致无法获取锁,降级为无锁刷新(仅在 token 接近过期时)
|
|
|
|
|
|
slog.Warn("claude_token_lock_failed_degraded_refresh", "account_id", account.ID, "error", lockErr)
|
|
|
|
|
|
|
|
|
|
|
|
// 检查 ctx 是否已取消
|
|
|
|
|
|
if ctx.Err() != nil {
|
|
|
|
|
|
return "", ctx.Err()
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// 从数据库获取最新账户信息
|
|
|
|
|
|
if p.accountRepo != nil {
|
|
|
|
|
|
fresh, err := p.accountRepo.GetByID(ctx, account.ID)
|
|
|
|
|
|
if err == nil && fresh != nil {
|
|
|
|
|
|
account = fresh
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
expiresAt = account.GetCredentialAsTime("expires_at")
|
|
|
|
|
|
|
|
|
|
|
|
// 仅在 expires_at 已过期/接近过期时才执行无锁刷新
|
|
|
|
|
|
if expiresAt == nil || time.Until(*expiresAt) <= claudeTokenRefreshSkew {
|
|
|
|
|
|
if p.oauthService == nil {
|
|
|
|
|
|
slog.Warn("claude_oauth_service_not_configured", "account_id", account.ID)
|
|
|
|
|
|
refreshFailed = true
|
|
|
|
|
|
} else {
|
|
|
|
|
|
tokenInfo, err := p.oauthService.RefreshAccountToken(ctx, account)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
slog.Warn("claude_token_refresh_failed_degraded", "account_id", account.ID, "error", err)
|
|
|
|
|
|
refreshFailed = true
|
|
|
|
|
|
} else {
|
|
|
|
|
|
// 构建新 credentials,保留原有字段
|
|
|
|
|
|
newCredentials := make(map[string]any)
|
|
|
|
|
|
for k, v := range account.Credentials {
|
|
|
|
|
|
newCredentials[k] = v
|
|
|
|
|
|
}
|
|
|
|
|
|
newCredentials["access_token"] = tokenInfo.AccessToken
|
|
|
|
|
|
newCredentials["token_type"] = tokenInfo.TokenType
|
|
|
|
|
|
newCredentials["expires_in"] = strconv.FormatInt(tokenInfo.ExpiresIn, 10)
|
|
|
|
|
|
newCredentials["expires_at"] = strconv.FormatInt(tokenInfo.ExpiresAt, 10)
|
|
|
|
|
|
if tokenInfo.RefreshToken != "" {
|
|
|
|
|
|
newCredentials["refresh_token"] = tokenInfo.RefreshToken
|
|
|
|
|
|
}
|
|
|
|
|
|
if tokenInfo.Scope != "" {
|
|
|
|
|
|
newCredentials["scope"] = tokenInfo.Scope
|
|
|
|
|
|
}
|
|
|
|
|
|
account.Credentials = newCredentials
|
|
|
|
|
|
if updateErr := p.accountRepo.Update(ctx, account); updateErr != nil {
|
|
|
|
|
|
slog.Error("claude_token_provider_update_failed", "account_id", account.ID, "error", updateErr)
|
|
|
|
|
|
}
|
|
|
|
|
|
expiresAt = account.GetCredentialAsTime("expires_at")
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2026-01-15 18:27:06 +08:00
|
|
|
|
} else {
|
2026-01-15 19:08:07 +08:00
|
|
|
|
// 锁获取失败(被其他 worker 持有),等待 200ms 后重试读取缓存
|
2026-01-15 18:27:06 +08:00
|
|
|
|
time.Sleep(claudeLockWaitTime)
|
|
|
|
|
|
if token, err := p.tokenCache.GetAccessToken(ctx, cacheKey); err == nil && strings.TrimSpace(token) != "" {
|
|
|
|
|
|
slog.Debug("claude_token_cache_hit_after_wait", "account_id", account.ID)
|
|
|
|
|
|
return token, nil
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
accessToken := account.GetCredential("access_token")
|
|
|
|
|
|
if strings.TrimSpace(accessToken) == "" {
|
|
|
|
|
|
return "", errors.New("access_token not found in credentials")
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2026-01-22 21:07:09 +08:00
|
|
|
|
// 3. 存入缓存(验证版本后再写入,避免异步刷新任务与请求线程的竞态条件)
|
2026-01-23 10:29:52 +08:00
|
|
|
|
if p.tokenCache != nil {
|
|
|
|
|
|
latestAccount, isStale := CheckTokenVersion(ctx, account, p.accountRepo)
|
|
|
|
|
|
if isStale && latestAccount != nil {
|
|
|
|
|
|
// 版本过时,使用 DB 中的最新 token
|
|
|
|
|
|
slog.Debug("claude_token_version_stale_use_latest", "account_id", account.ID)
|
|
|
|
|
|
accessToken = latestAccount.GetCredential("access_token")
|
|
|
|
|
|
if strings.TrimSpace(accessToken) == "" {
|
|
|
|
|
|
return "", errors.New("access_token not found after version check")
|
|
|
|
|
|
}
|
|
|
|
|
|
// 不写入缓存,让下次请求重新处理
|
|
|
|
|
|
} else {
|
|
|
|
|
|
ttl := 30 * time.Minute
|
|
|
|
|
|
if refreshFailed {
|
|
|
|
|
|
// 刷新失败时使用短 TTL,避免失效 token 长时间缓存导致 401 抖动
|
2026-01-15 18:27:06 +08:00
|
|
|
|
ttl = time.Minute
|
2026-01-23 10:29:52 +08:00
|
|
|
|
slog.Debug("claude_token_cache_short_ttl", "account_id", account.ID, "reason", "refresh_failed")
|
|
|
|
|
|
} else if expiresAt != nil {
|
|
|
|
|
|
until := time.Until(*expiresAt)
|
|
|
|
|
|
switch {
|
|
|
|
|
|
case until > claudeTokenCacheSkew:
|
|
|
|
|
|
ttl = until - claudeTokenCacheSkew
|
|
|
|
|
|
case until > 0:
|
|
|
|
|
|
ttl = until
|
|
|
|
|
|
default:
|
|
|
|
|
|
ttl = time.Minute
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
if err := p.tokenCache.SetAccessToken(ctx, cacheKey, accessToken, ttl); err != nil {
|
|
|
|
|
|
slog.Warn("claude_token_cache_set_failed", "account_id", account.ID, "error", err)
|
2026-01-15 18:27:06 +08:00
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return accessToken, nil
|
|
|
|
|
|
}
|