| | |
| | | package middleware |
| | | |
| | | import ( |
| | | "errors" |
| | | "github.com/golang-jwt/jwt/v4" |
| | | "strconv" |
| | | "time" |
| | | |
| | | "srm/utils" |
| | | |
| | | "srm/global" |
| | | "srm/model/common/response" |
| | | "srm/model/system" |
| | | "srm/service" |
| | | |
| | | "github.com/gin-gonic/gin" |
| | | "go.uber.org/zap" |
| | | "srm/pkg/contextx" |
| | | "srm/pkg/ecode" |
| | | "strings" |
| | | ) |
| | | |
| | | var jwtService = service.ServiceGroupApp.SystemServiceGroup.JwtService |
| | | |
| | | func JWTAuth() gin.HandlerFunc { |
| | | return func(c *gin.Context) { |
| | | // 我们这里jwt鉴权取头部信息 x-token 登录时回返回token信息 这里前端需要把token存储到cookie或者本地localStorage中 不过需要跟后端协商过期时间 可以约定刷新令牌或者重新登录 |
| | | token := c.Request.Header.Get("x-token") |
| | | ctx := new(contextx.Context).SetCtx(c) |
| | | // 我们这里jwt鉴权取头部信息 Authorization 登录时回返回token信息 这里前端需要把token存储到cookie或者本地localStorage中 不过需要跟后端协商过期时间 可以约定刷新令牌或者重新登录 |
| | | token := c.Request.Header.Get("Authorization") |
| | | if token == "" { |
| | | response.FailWithDetailed(gin.H{"reload": true}, "未登录或非法访问", c) |
| | | ctx.Fail(ecode.JWTEmpty) |
| | | c.Abort() |
| | | return |
| | | } |
| | | if jwtService.IsBlacklist(token) { |
| | | response.FailWithDetailed(gin.H{"reload": true}, "您的帐户异地登陆或令牌失效", c) |
| | | c.Abort() |
| | | return |
| | | slices := strings.Split(token, " ") |
| | | if len(slices) == 2 { |
| | | token = slices[1] |
| | | } |
| | | j := utils.NewJWT() |
| | | j := NewJWT() |
| | | // parseToken 解析token包含的信息 |
| | | claims, err := j.ParseToken(token) |
| | | if err != nil { |
| | | if errors.Is(err, utils.TokenExpired) { |
| | | response.FailWithDetailed(gin.H{"reload": true}, "授权已过期", c) |
| | | c.Abort() |
| | | if err == TokenExpired { |
| | | c.Next() |
| | | return |
| | | } |
| | | response.FailWithDetailed(gin.H{"reload": true}, err.Error(), c) |
| | | c.Abort() |
| | | c.Next() |
| | | return |
| | | } |
| | | |
| | | // 已登录用户被管理员禁用 需要使该用户的jwt失效 此处比较消耗性能 如果需要 请自行打开 |
| | | // 用户被删除的逻辑 需要优化 此处比较消耗性能 如果需要 请自行打开 |
| | | |
| | | //if user, err := userService.FindUserByUuid(claims.UUID.String()); err != nil || user.Enable == 2 { |
| | | // _ = jwtService.JsonInBlacklist(system.JwtBlacklist{Jwt: token}) |
| | | // response.FailWithDetailed(gin.H{"reload": true}, err.Error(), c) |
| | | // c.Abort() |
| | | //} |
| | | if claims.ExpiresAt.Unix()-time.Now().Unix() < claims.BufferTime { |
| | | dr, _ := utils.ParseDuration(global.GVA_CONFIG.JWT.ExpiresTime) |
| | | claims.ExpiresAt = jwt.NewNumericDate(time.Now().Add(dr)) |
| | | newToken, _ := j.CreateTokenByOldToken(token, *claims) |
| | | newClaims, _ := j.ParseToken(newToken) |
| | | c.Header("new-token", newToken) |
| | | c.Header("new-expires-at", strconv.FormatInt(newClaims.ExpiresAt.Unix(), 10)) |
| | | if global.GVA_CONFIG.System.UseMultipoint { |
| | | RedisJwtToken, err := jwtService.GetRedisJWT(newClaims.Username) |
| | | if err != nil { |
| | | global.GVA_LOG.Error("get redis jwt failed", zap.Error(err)) |
| | | } else { // 当之前的取成功时才进行拉黑操作 |
| | | _ = jwtService.JsonInBlacklist(system.JwtBlacklist{Jwt: RedisJwtToken}) |
| | | } |
| | | // 无论如何都要记录当前的活跃状态 |
| | | _ = jwtService.SetRedisJWT(newToken, newClaims.Username) |
| | | } |
| | | } |
| | | c.Set("claims", claims) |
| | | c.Next() |
| | | } |