123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143 |
- package middleware
- import (
- "errors"
- "gin-vue-admin/global"
- "gin-vue-admin/model"
- "gin-vue-admin/model/request"
- "gin-vue-admin/model/response"
- "gin-vue-admin/service"
- "github.com/dgrijalva/jwt-go"
- "github.com/gin-gonic/gin"
- "go.uber.org/zap"
- "strconv"
- "time"
- )
- func JWTAuth() gin.HandlerFunc {
- return func(c *gin.Context) {
-
- token := c.Request.Header.Get("x-token")
- if token == "" {
- response.FailWithDetailed(gin.H{"reload": true}, "未登录或非法访问", c)
- c.Abort()
- return
- }
- if service.IsBlacklist(token) {
- response.FailWithDetailed(gin.H{"reload": true}, "您的帐户异地登陆或令牌失效", c)
- c.Abort()
- return
- }
- j := NewJWT()
-
- claims, err := j.ParseToken(token)
- if err != nil {
- if err == TokenExpired {
- response.FailWithDetailed(gin.H{"reload": true}, "授权已过期", c)
- c.Abort()
- return
- }
- response.FailWithDetailed(gin.H{"reload": true}, err.Error(), c)
- c.Abort()
- return
- }
- if err, _ = service.FindUserByUuid(claims.UUID.String()); err != nil {
- _ = service.JsonInBlacklist(model.JwtBlacklist{Jwt: token})
- response.FailWithDetailed(gin.H{"reload": true}, err.Error(), c)
- c.Abort()
- }
- if claims.ExpiresAt-time.Now().Unix() < claims.BufferTime {
- claims.ExpiresAt = time.Now().Unix() + 60*60*24*7
- newToken, _ := j.CreateToken(*claims)
- newClaims, _ := j.ParseToken(newToken)
- c.Header("new-token", newToken)
- c.Header("new-expires-at", strconv.FormatInt(newClaims.ExpiresAt, 10))
- if global.GVA_CONFIG.System.UseMultipoint {
- err, RedisJwtToken := service.GetRedisJWT(newClaims.Username)
- if err != nil {
- global.GVA_LOG.Error("get redis jwt failed", zap.Any("err", err))
- } else {
- _ = service.JsonInBlacklist(model.JwtBlacklist{Jwt: RedisJwtToken})
- }
-
- _ = service.SetRedisJWT(newToken, newClaims.Username)
- }
- }
- c.Set("claims", claims)
- c.Next()
- }
- }
- type JWT struct {
- SigningKey []byte
- }
- var (
- TokenExpired = errors.New("Token is expired")
- TokenNotValidYet = errors.New("Token not active yet")
- TokenMalformed = errors.New("That's not even a token")
- TokenInvalid = errors.New("Couldn't handle this token:")
- )
- func NewJWT() *JWT {
- return &JWT{
- []byte(global.GVA_CONFIG.JWT.SigningKey),
- }
- }
- func (j *JWT) CreateToken(claims request.CustomClaims) (string, error) {
- token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
- return token.SignedString(j.SigningKey)
- }
- func (j *JWT) ParseToken(tokenString string) (*request.CustomClaims, error) {
- token, err := jwt.ParseWithClaims(tokenString, &request.CustomClaims{}, func(token *jwt.Token) (i interface{}, e error) {
- return j.SigningKey, nil
- })
- if err != nil {
- if ve, ok := err.(*jwt.ValidationError); ok {
- if ve.Errors&jwt.ValidationErrorMalformed != 0 {
- return nil, TokenMalformed
- } else if ve.Errors&jwt.ValidationErrorExpired != 0 {
-
- return nil, TokenExpired
- } else if ve.Errors&jwt.ValidationErrorNotValidYet != 0 {
- return nil, TokenNotValidYet
- } else {
- return nil, TokenInvalid
- }
- }
- }
- if token != nil {
- if claims, ok := token.Claims.(*request.CustomClaims); ok && token.Valid {
- return claims, nil
- }
- return nil, TokenInvalid
- } else {
- return nil, TokenInvalid
- }
- }
|