|
@@ -3,9 +3,9 @@ package middleware
|
|
|
import (
|
|
|
"errors"
|
|
|
"gin-vue-admin/global"
|
|
|
- "gin-vue-admin/global/response"
|
|
|
"gin-vue-admin/model"
|
|
|
"gin-vue-admin/model/request"
|
|
|
+ "gin-vue-admin/model/response"
|
|
|
"gin-vue-admin/service"
|
|
|
"github.com/dgrijalva/jwt-go"
|
|
|
"github.com/gin-gonic/gin"
|
|
@@ -19,16 +19,12 @@ func JWTAuth() gin.HandlerFunc {
|
|
|
|
|
|
token := c.Request.Header.Get("x-token")
|
|
|
if token == "" {
|
|
|
- response.Result(response.ERROR, gin.H{
|
|
|
- "reload": true,
|
|
|
- }, "未登录或非法访问", c)
|
|
|
+ response.FailWithDetailed(gin.H{"reload": true}, "未登录或非法访问", c)
|
|
|
c.Abort()
|
|
|
return
|
|
|
}
|
|
|
if service.IsBlacklist(token) {
|
|
|
- response.Result(response.ERROR, gin.H{
|
|
|
- "reload": true,
|
|
|
- }, "您的帐户异地登陆或令牌失效", c)
|
|
|
+ response.FailWithDetailed(gin.H{"reload": true}, "您的帐户异地登陆或令牌失效", c)
|
|
|
c.Abort()
|
|
|
return
|
|
|
}
|
|
@@ -37,40 +33,33 @@ func JWTAuth() gin.HandlerFunc {
|
|
|
claims, err := j.ParseToken(token)
|
|
|
if err != nil {
|
|
|
if err == TokenExpired {
|
|
|
- response.Result(response.ERROR, gin.H{
|
|
|
- "reload": true,
|
|
|
- }, "授权已过期", c)
|
|
|
+ response.FailWithDetailed(gin.H{"reload": true}, "授权已过期", c)
|
|
|
c.Abort()
|
|
|
return
|
|
|
}
|
|
|
- response.Result(response.ERROR, gin.H{
|
|
|
- "reload": true,
|
|
|
- }, err.Error(), c)
|
|
|
+ response.FailWithDetailed(gin.H{"reload": true}, err.Error(), c)
|
|
|
c.Abort()
|
|
|
return
|
|
|
}
|
|
|
- if err, _ = service.FindUserByUuid(claims.UUID.String()); err != nil{
|
|
|
- response.Result(response.ERROR, gin.H{
|
|
|
- "reload": true,
|
|
|
- }, err.Error(), c)
|
|
|
+ if err, _ = service.FindUserByUuid(claims.UUID.String()); err != nil {
|
|
|
+ response.FailWithDetailed(gin.H{"reload": true}, err.Error(), c)
|
|
|
c.Abort()
|
|
|
}
|
|
|
- if claims.ExpiresAt - time.Now().Unix()<claims.BufferTime {
|
|
|
+ if claims.ExpiresAt-time.Now().Unix() < claims.BufferTime {
|
|
|
claims.ExpiresAt = time.Now().Unix() + 60*60*24*7
|
|
|
- newToken,_ := j.CreateToken(*claims)
|
|
|
- newClaims,_ := j.ParseToken(newToken)
|
|
|
- c.Header("new-token",newToken)
|
|
|
- c.Header("new-expires-at",strconv.FormatInt(newClaims.ExpiresAt,10))
|
|
|
+ newToken, _ := j.CreateToken(*claims)
|
|
|
+ newClaims, _ := j.ParseToken(newToken)
|
|
|
+ c.Header("new-token", newToken)
|
|
|
+ c.Header("new-expires-at", strconv.FormatInt(newClaims.ExpiresAt, 10))
|
|
|
if global.GVA_CONFIG.System.UseMultipoint {
|
|
|
- err,RedisJwtToken := service.GetRedisJWT(newClaims.Username)
|
|
|
- if err!=nil {
|
|
|
- global.GVA_LOG.Error("get redis jwt failed", zap.Any("err", err))
|
|
|
- }else{
|
|
|
+ err, RedisJwtToken := service.GetRedisJWT(newClaims.Username)
|
|
|
+ if err != nil {
|
|
|
+ global.GVA_LOG.Error("get redis jwt failed", zap.Any("err", err))
|
|
|
+ } else {
|
|
|
_ = service.JsonInBlacklist(model.JwtBlacklist{Jwt: RedisJwtToken})
|
|
|
-
|
|
|
}
|
|
|
|
|
|
- _ = service.SetRedisJWT(newToken,newClaims.Username)
|
|
|
+ _ = service.SetRedisJWT(newToken, newClaims.Username)
|
|
|
}
|
|
|
}
|
|
|
c.Set("claims", claims)
|