jwt.go 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147
  1. package middleware
  2. import (
  3. "errors"
  4. "fmt"
  5. "github.com/dgrijalva/jwt-go"
  6. "github.com/gin-gonic/gin"
  7. uuid "github.com/satori/go.uuid"
  8. "main/controller/servers"
  9. "main/init/qmsql"
  10. "time"
  11. )
  12. type SqlRes struct {
  13. Path string
  14. AuthorityId string
  15. ApiId uint
  16. Id uint
  17. }
  18. func JWTAuth() gin.HandlerFunc {
  19. return func(c *gin.Context) {
  20. // 我们这里jwt鉴权取头部信息 x-token 登录时回返回token信息 这里前端需要把token存储到cookie或者本地localSstorage中 不过需要跟后端协商过期时间 可以约定刷新令牌或者重新登录
  21. token := c.Request.Header.Get("x-token")
  22. if token == "" {
  23. servers.ReportFormat(c, false, "未登录或非法访问", gin.H{})
  24. c.Abort()
  25. return
  26. }
  27. j := NewJWT()
  28. // parseToken 解析token包含的信息
  29. claims, err := j.ParseToken(token)
  30. if err != nil {
  31. if err == TokenExpired {
  32. servers.ReportFormat(c, false, "授权已过期", gin.H{})
  33. c.Abort()
  34. return
  35. }
  36. servers.ReportFormat(c, false, err.Error(), gin.H{})
  37. c.Abort()
  38. return
  39. }
  40. var sqlRes SqlRes
  41. row:=qmsql.DEFAULTDB.Raw("SELECT apis.path,api_authorities.authority_id,api_authorities.api_id,apis.id FROM apis INNER JOIN api_authorities ON api_authorities.api_id = apis.id WHERE apis.path = ? AND api_authorities.authority_id = ?",c.Request.RequestURI,claims.AuthorityId)
  42. err=row.Scan(&sqlRes).Error
  43. if(fmt.Sprintf("%v",err) == "record not found"){
  44. servers.ReportFormat(c, false, "没有Api操作权限", gin.H{})
  45. c.Abort()
  46. return
  47. }
  48. c.Set("claims", claims)
  49. }
  50. }
  51. type JWT struct {
  52. SigningKey []byte
  53. }
  54. var (
  55. TokenExpired error = errors.New("Token is expired")
  56. TokenNotValidYet error = errors.New("Token not active yet")
  57. TokenMalformed error = errors.New("That's not even a token")
  58. TokenInvalid error = errors.New("Couldn't handle this token:")
  59. SignKey string = "qmPlus"
  60. )
  61. type CustomClaims struct {
  62. UUID uuid.UUID
  63. ID uint
  64. NickName string
  65. AuthorityId float64
  66. jwt.StandardClaims
  67. }
  68. func NewJWT() *JWT {
  69. return &JWT{
  70. []byte(GetSignKey()),
  71. }
  72. }
  73. //获取token
  74. func GetSignKey() string {
  75. return SignKey
  76. }
  77. // 这是SignKey
  78. func SetSignKey(key string) string {
  79. SignKey = key
  80. return SignKey
  81. }
  82. //创建一个token
  83. func (j *JWT) CreateToken(claims CustomClaims) (string, error) {
  84. token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
  85. return token.SignedString(j.SigningKey)
  86. }
  87. //解析 token
  88. func (j *JWT) ParseToken(tokenString string) (*CustomClaims, error) {
  89. token, err := jwt.ParseWithClaims(tokenString, &CustomClaims{}, func(token *jwt.Token) (i interface{}, e error) {
  90. return j.SigningKey, nil
  91. })
  92. if err != nil {
  93. if ve, ok := err.(*jwt.ValidationError); ok {
  94. if ve.Errors&jwt.ValidationErrorMalformed != 0 {
  95. return nil, TokenMalformed
  96. } else if ve.Errors&jwt.ValidationErrorExpired != 0 {
  97. // Token is expired
  98. return nil, TokenExpired
  99. } else if ve.Errors&jwt.ValidationErrorNotValidYet != 0 {
  100. return nil, TokenNotValidYet
  101. } else {
  102. return nil, TokenInvalid
  103. }
  104. }
  105. }
  106. if token != nil {
  107. if claims, ok := token.Claims.(*CustomClaims); ok && token.Valid {
  108. return claims, nil
  109. }
  110. return nil, TokenInvalid
  111. } else {
  112. return nil, TokenInvalid
  113. }
  114. }
  115. // 更新token
  116. func (j *JWT) RefreshToken(tokenString string) (string, error) {
  117. jwt.TimeFunc = func() time.Time {
  118. return time.Unix(0, 0)
  119. }
  120. token, err := jwt.ParseWithClaims(tokenString, &CustomClaims{}, func(token *jwt.Token) (interface{}, error) {
  121. return j.SigningKey, nil
  122. })
  123. if err != nil {
  124. return "", err
  125. }
  126. if claims, ok := token.Claims.(*CustomClaims); ok && token.Valid {
  127. jwt.TimeFunc = time.Now
  128. claims.StandardClaims.ExpiresAt = time.Now().Add(1 * time.Hour).Unix()
  129. return j.CreateToken(*claims)
  130. }
  131. return "", TokenInvalid
  132. }