token.go 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244
  1. package controller
  2. import (
  3. "fmt"
  4. "github.com/gin-gonic/gin"
  5. "github.com/golang-jwt/jwt"
  6. "github.com/mojocn/base64Captcha"
  7. "github.com/satori/go.uuid"
  8. "iot_manager_service/app/system/dao"
  9. "iot_manager_service/app/system/service"
  10. "strconv"
  11. "time"
  12. "iot_manager_service/app/system/model"
  13. "iot_manager_service/config"
  14. "iot_manager_service/util"
  15. "net/http"
  16. "strings"
  17. )
  18. var Auth = new(auth)
  19. type auth struct{}
  20. var driver = &base64Captcha.DriverString{
  21. Height: 48,
  22. Width: 130,
  23. NoiseCount: 100,
  24. ShowLineOptions: 2,
  25. Length: 5,
  26. BgColor: nil,
  27. }
  28. func (c *auth) Token(ctx *gin.Context) {
  29. tenantId := ctx.Query("tenantId")
  30. userName := ctx.Query("username")
  31. password := ctx.Query("password")
  32. grantType := ctx.Query("grant_type")
  33. refreshToken := ctx.Query("refresh_token")
  34. // 校验连续登录失败次数
  35. checkLock()
  36. userType := ctx.GetHeader(model.UserTypeHeaderKey)
  37. token := model.Token{
  38. TenantId: tenantId,
  39. UserName: userName,
  40. Password: password,
  41. GrantType: grantType,
  42. RefreshToken: refreshToken,
  43. UserType: userType,
  44. }
  45. userInfo, err := grant(token, ctx)
  46. if err != nil {
  47. ctx.JSON(http.StatusOK, err)
  48. return
  49. }
  50. if userInfo == nil || userInfo.ID == 0 {
  51. ctx.JSON(http.StatusOK, util.NormalResponse(http.StatusBadRequest, model.UserNotFound, nil))
  52. return
  53. }
  54. if len(userInfo.Roles) == 0 {
  55. ctx.JSON(http.StatusOK, util.NormalResponse(http.StatusBadRequest, model.UserHasNoRole, nil))
  56. return
  57. }
  58. // access token过期时间2小时
  59. random := util.RandomString(8)
  60. jwtToken, e := getAccessToken(*userInfo, random)
  61. if e != nil {
  62. ctx.JSON(http.StatusOK, util.NormalResponse(http.StatusBadRequest, e.Error(), nil))
  63. return
  64. }
  65. // redis记录缓存2小时
  66. util.Redis.Set(getAccessTokenKey(userInfo.TenantId, userInfo.ID, random), jwtToken, 2*time.Hour)
  67. ctx.JSON(http.StatusOK, model.RspToken{
  68. TenantId: userInfo.TenantId,
  69. UserId: strconv.FormatInt(userInfo.ID, 10),
  70. DeptId: userInfo.DeptId,
  71. PostId: userInfo.PostId,
  72. RoleId: userInfo.RoleId,
  73. OauthId: userInfo.OauthId,
  74. Account: userInfo.Account,
  75. UserName: userInfo.Name,
  76. NickName: userInfo.RealName,
  77. RoleName: userInfo.Roles[0],
  78. Avatar: userInfo.Avatar,
  79. AccessToken: jwtToken,
  80. RefreshToken: getRefreshToken(*userInfo),
  81. TokenType: model.BEARER,
  82. ExpiresIn: 7200,
  83. License: "",
  84. })
  85. }
  86. func (c *auth) Logout(ctx *gin.Context) {
  87. emptyKeyFunc := func(t *jwt.Token) (interface{}, error) { return []byte(config.Instance().Server.TokenSign), nil }
  88. authorization := ctx.GetHeader(model.HeaderKey)
  89. token, err := jwt.ParseWithClaims(authorization, &model.JwtToken{}, emptyKeyFunc)
  90. if err != nil {
  91. ctx.JSON(http.StatusUnauthorized, util.NormalResponse(http.StatusUnauthorized, err.Error(), nil))
  92. return
  93. }
  94. jwtToken := token.Claims.(*model.JwtToken)
  95. err = util.Redis.Del(getAccessTokenKey(jwtToken.TenantId, jwtToken.UserId, jwtToken.Random)).Err()
  96. //todo 操作记录
  97. ctx.JSON(http.StatusOK, util.SuccessResponse("", nil))
  98. }
  99. func (c *auth) Captcha(ctx *gin.Context) {
  100. id := uuid.NewV1().String()
  101. code := util.RandomString2(5)
  102. gotItem, _ := driver.DrawCaptcha(code)
  103. image := gotItem.EncodeB64string()
  104. rsp := model.RspCaptcha{
  105. Key: id,
  106. Image: image,
  107. }
  108. util.Redis.Set(getCaptchaKey(id), code, 5*time.Minute)
  109. ctx.JSON(http.StatusOK, rsp)
  110. }
  111. func (c *auth) Clear(ctx *gin.Context) {
  112. //todo clear redis
  113. ctx.JSON(http.StatusOK, util.SuccessResponse(util.Success, nil))
  114. }
  115. func (c *auth) Login(ctx *gin.Context) {
  116. passKey := ctx.Query("passKey")
  117. tenant, err := service.TenantService.GetTenantByPasskey(passKey)
  118. if err != nil {
  119. ctx.JSON(http.StatusOK, util.SuccessResponse(model.TenantNotFound, nil))
  120. return
  121. }
  122. rsp := model.RspLogin{
  123. ID: tenant.TenantId,
  124. Name: tenant.LoginDisplayName,
  125. BackgroundUrl: tenant.BackgroundUrl,
  126. SysLogoUrl: tenant.SysLogoUrl,
  127. }
  128. ctx.JSON(http.StatusOK, util.SuccessResponse(util.Success, rsp))
  129. }
  130. //checkLock 校验用户登录失败次数
  131. func checkLock() {
  132. }
  133. func getAccessToken(info model.UserInfo, random string) (string, error) {
  134. jwtToken := model.JwtToken{StandardClaims: jwt.StandardClaims{
  135. Audience: "audience",
  136. ExpiresAt: time.Now().Add(2 * time.Hour).Unix(),
  137. Issuer: "issuser",
  138. NotBefore: time.Now().Unix(),
  139. },
  140. UserId: info.ID,
  141. TenantId: info.TenantId,
  142. TokenType: "access_token",
  143. ClientId: "saber",
  144. RoleId: info.RoleId,
  145. RoleName: info.Roles[0],
  146. DeptId: info.DeptId,
  147. PostId: info.PostId,
  148. OauthId: info.OauthId,
  149. Account: info.Account,
  150. UserName: info.Account,
  151. NickName: info.RealName,
  152. Random: random,
  153. }
  154. claims := jwt.NewWithClaims(jwt.SigningMethodHS512, jwtToken)
  155. return claims.SignedString([]byte(config.Instance().Server.TokenSign))
  156. }
  157. func getRefreshToken(info model.UserInfo) string {
  158. claims := jwt.NewWithClaims(jwt.SigningMethodHS512, jwt.MapClaims{
  159. model.Iss: "issuser",
  160. model.Aud: "audience",
  161. model.ClientId: "saber",
  162. model.TokenType: "refresh_token",
  163. model.UserId: info.ID,
  164. model.Exp: time.Now().Add(7 * 24 * time.Hour).Unix(),
  165. model.Nbf: time.Now().Unix(),
  166. })
  167. token, _ := claims.SignedString([]byte(config.Instance().Server.TokenSign))
  168. return token
  169. }
  170. func grant(token model.Token, ctx *gin.Context) (*model.UserInfo, *util.Errors) {
  171. info := &model.UserInfo{}
  172. key := ctx.GetHeader(model.CaptchaHeaderKey)
  173. code := ctx.GetHeader(model.CaptchaHeaderCode)
  174. // 获取验证码
  175. result, err := util.Redis.Get(getCaptchaKey(key)).Result()
  176. if err != nil {
  177. return nil, util.NormalResponse(http.StatusBadRequest, model.CaptchaNotCorrect, nil)
  178. }
  179. redisCode := result
  180. // 判断验证码
  181. if config.Instance().Server.CodeEnabled && (key == "" || code == "" || !strings.EqualFold(redisCode, code)) {
  182. return nil, util.NormalResponse(http.StatusBadRequest, model.CaptchaNotCorrect, nil)
  183. }
  184. if token.UserName != "" && token.Password != "" {
  185. // 获取租户信息
  186. tenant, _ := service.TenantService.GetOne(token.TenantId)
  187. if tenant == nil {
  188. return nil, util.NormalResponse(http.StatusOK, model.UserHasNoTenant, nil)
  189. }
  190. if judgeTenant(tenant) {
  191. return nil, util.NormalResponse(http.StatusOK, model.UserHasNoTenantPermission, nil)
  192. }
  193. // 获取用户类型
  194. // 根据不同用户类型调用对应的接口返回数据,用户可自行拓展
  195. info.User, _ = service.UserService.GetOne(token.TenantId, token.UserName, token.Password)
  196. }
  197. //测试代码start
  198. info.TenantId = "000000"
  199. info.ID = 11112222
  200. info.Roles = []string{"admin"}
  201. // 测试代码end
  202. //todo 操作记录
  203. return info, nil
  204. }
  205. func judgeTenant(tenant *dao.Tenant) bool {
  206. if tenant.TenantId == model.AdminTenantId {
  207. return false
  208. }
  209. if tenant.ExpireTime.IsZero() || tenant.ExpireTime.Before(time.Now()) {
  210. return true
  211. }
  212. return false
  213. }
  214. func getAccessTokenKey(tenantId string, uId int64, random string) string {
  215. return fmt.Sprintf("access_token_%s_%d_%s", tenantId, uId, random)
  216. }
  217. func getCaptchaKey(uId string) string {
  218. return fmt.Sprintf("auth:captcha:%s", uId)
  219. }