123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130 |
- package middleware
- import (
- "errors"
- "gin-vue-admin/global"
- "gin-vue-admin/global/response"
- "gin-vue-admin/model"
- "gin-vue-admin/model/request"
- "gin-vue-admin/service"
- "github.com/dgrijalva/jwt-go"
- "github.com/gin-gonic/gin"
- "time"
- )
- func JWTAuth() gin.HandlerFunc {
- return func(c *gin.Context) {
- // 我们这里jwt鉴权取头部信息 x-token 登录时回返回token信息 这里前端需要把token存储到cookie或者本地localSstorage中 不过需要跟后端协商过期时间 可以约定刷新令牌或者重新登录
- token := c.Request.Header.Get("x-token")
- modelToken := model.JwtBlacklist{
- Jwt: token,
- }
- if token == "" {
- response.Result(response.ERROR, gin.H{
- "reload": true,
- }, "未登录或非法访问", c)
- c.Abort()
- return
- }
- if service.IsBlacklist(token, modelToken) {
- response.Result(response.ERROR, gin.H{
- "reload": true,
- }, "您的帐户异地登陆或令牌失效", c)
- c.Abort()
- return
- }
- j := NewJWT()
- // parseToken 解析token包含的信息
- claims, err := j.ParseToken(token)
- if err != nil {
- if err == TokenExpired {
- response.Result(response.ERROR, gin.H{
- "reload": true,
- }, "授权已过期", c)
- c.Abort()
- return
- }
- response.Result(response.ERROR, gin.H{
- "reload": true,
- }, err.Error(), c)
- c.Abort()
- return
- }
- c.Set("claims", claims)
- c.Next()
- }
- }
- type JWT struct {
- SigningKey []byte
- }
- var (
- TokenExpired = errors.New("Token is expired")
- TokenNotValidYet = errors.New("Token not active yet")
- TokenMalformed = errors.New("That's not even a token")
- TokenInvalid = errors.New("Couldn't handle this token:")
- )
- func NewJWT() *JWT {
- return &JWT{
- []byte(global.GVA_CONFIG.JWT.SigningKey),
- }
- }
- // 创建一个token
- func (j *JWT) CreateToken(claims request.CustomClaims) (string, error) {
- token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
- return token.SignedString(j.SigningKey)
- }
- // 解析 token
- func (j *JWT) ParseToken(tokenString string) (*request.CustomClaims, error) {
- token, err := jwt.ParseWithClaims(tokenString, &request.CustomClaims{}, func(token *jwt.Token) (i interface{}, e error) {
- return j.SigningKey, nil
- })
- if err != nil {
- if ve, ok := err.(*jwt.ValidationError); ok {
- if ve.Errors&jwt.ValidationErrorMalformed != 0 {
- return nil, TokenMalformed
- } else if ve.Errors&jwt.ValidationErrorExpired != 0 {
- // Token is expired
- return nil, TokenExpired
- } else if ve.Errors&jwt.ValidationErrorNotValidYet != 0 {
- return nil, TokenNotValidYet
- } else {
- return nil, TokenInvalid
- }
- }
- }
- if token != nil {
- if claims, ok := token.Claims.(*request.CustomClaims); ok && token.Valid {
- return claims, nil
- }
- return nil, TokenInvalid
- } else {
- return nil, TokenInvalid
- }
- }
- // 更新token
- func (j *JWT) RefreshToken(tokenString string) (string, error) {
- jwt.TimeFunc = func() time.Time {
- return time.Unix(0, 0)
- }
- token, err := jwt.ParseWithClaims(tokenString, &request.CustomClaims{}, func(token *jwt.Token) (interface{}, error) {
- return j.SigningKey, nil
- })
- if err != nil {
- return "", err
- }
- if claims, ok := token.Claims.(*request.CustomClaims); ok && token.Valid {
- jwt.TimeFunc = time.Now
- claims.StandardClaims.ExpiresAt = time.Now().Add(1 * time.Hour).Unix()
- return j.CreateToken(*claims)
- }
- return "", TokenInvalid
- }
|