token.go 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255
  1. package controller
  2. import (
  3. "fmt"
  4. "github.com/gin-gonic/gin"
  5. "github.com/golang-jwt/jwt"
  6. "github.com/mojocn/base64Captcha"
  7. "github.com/satori/go.uuid"
  8. "iot_manager_service/app/middleware"
  9. "iot_manager_service/app/system/dao"
  10. "iot_manager_service/app/system/service"
  11. "iot_manager_service/util/cache"
  12. "iot_manager_service/util/common"
  13. "strconv"
  14. "time"
  15. "iot_manager_service/app/system/model"
  16. "iot_manager_service/config"
  17. "net/http"
  18. "strings"
  19. )
  20. var Auth = new(auth)
  21. type auth struct{}
  22. var driver = &base64Captcha.DriverString{
  23. Height: 48,
  24. Width: 130,
  25. NoiseCount: 100,
  26. ShowLineOptions: 2,
  27. Length: 5,
  28. BgColor: nil,
  29. }
  30. func (c *auth) Token(ctx *gin.Context) {
  31. tenantId := ctx.Query("tenantId")
  32. userName := ctx.Query("username")
  33. password := ctx.Query("password")
  34. grantType := ctx.Query("grant_type")
  35. refreshToken := ctx.Query("refresh_token")
  36. // 校验连续登录失败次数
  37. checkLock()
  38. tId, _ := strconv.Atoi(tenantId)
  39. userType := ctx.GetHeader(model.UserTypeHeaderKey)
  40. token := model.Token{
  41. TenantId: tId,
  42. UserName: userName,
  43. Password: password,
  44. GrantType: grantType,
  45. RefreshToken: refreshToken,
  46. UserType: userType,
  47. }
  48. var userInfo *model.UserInfo
  49. var err *common.Errors
  50. if grantType == "captcha" {
  51. userInfo, err = captchaGrant(token, ctx)
  52. if err != nil {
  53. ctx.JSON(http.StatusOK, err)
  54. return
  55. }
  56. } else if grantType == "refresh_token" {
  57. userInfo, err = refreshGrant(token)
  58. if err != nil {
  59. ctx.JSON(http.StatusOK, err)
  60. return
  61. }
  62. }
  63. if userInfo == nil || userInfo.User == nil {
  64. ctx.JSON(http.StatusOK, common.NormalResponse(http.StatusBadRequest, model.UserNotFound, nil))
  65. return
  66. }
  67. if len(userInfo.Roles) == 0 {
  68. ctx.JSON(http.StatusOK, common.NormalResponse(http.StatusBadRequest, model.UserHasNoRole, nil))
  69. return
  70. }
  71. // access token过期时间2小时
  72. random := common.RandomString(8)
  73. jwtToken, e := middleware.GetAccessToken(userInfo.ID, userInfo.RoleId, userInfo.TenantId, userInfo.Account, random)
  74. if e != nil {
  75. ctx.JSON(http.StatusOK, common.NormalResponse(http.StatusBadRequest, e.Error(), nil))
  76. return
  77. }
  78. // redis记录缓存2小时
  79. cache.Redis.Set(getAccessTokenKey(userInfo.TenantId, userInfo.ID, random), jwtToken, 2*time.Hour)
  80. ctx.JSON(http.StatusOK, model.RspToken{
  81. TenantId: userInfo.TenantId,
  82. UserId: userInfo.ID,
  83. RoleId: userInfo.RoleId,
  84. OauthId: userInfo.OauthId,
  85. Account: userInfo.Account,
  86. UserName: userInfo.Name,
  87. NickName: userInfo.RealName,
  88. RoleName: userInfo.Roles[0],
  89. Avatar: userInfo.Avatar,
  90. AccessToken: jwtToken,
  91. RefreshToken: getRefreshToken(*userInfo),
  92. TokenType: model.BEARER,
  93. ExpiresIn: 7200,
  94. License: "",
  95. })
  96. }
  97. func (c *auth) Logout(ctx *gin.Context) {
  98. value, _ := ctx.Get(middleware.Authorization)
  99. claims := value.(*middleware.Claims)
  100. _ = cache.Redis.Del(getAccessTokenKey(claims.TenantId, claims.UserId, claims.Random)).Err()
  101. service.OperationHisService.Save(claims.UserId, claims.TenantId, common.OperationLogout, common.ModuleTypeDefault,
  102. common.DeviceTypeDefault, "", common.OperationSuccess)
  103. ctx.JSON(http.StatusOK, common.SuccessResponse("", nil))
  104. }
  105. func (c *auth) Captcha(ctx *gin.Context) {
  106. id := uuid.NewV1().String()
  107. code := common.RandomString2(5)
  108. gotItem, _ := driver.DrawCaptcha(code)
  109. image := gotItem.EncodeB64string()
  110. rsp := model.RspCaptcha{
  111. Key: id,
  112. Image: image,
  113. }
  114. cache.Redis.Set(getCaptchaKey(id), code, 5*time.Minute)
  115. ctx.JSON(http.StatusOK, rsp)
  116. }
  117. func (c *auth) Clear(ctx *gin.Context) {
  118. //todo clear redis
  119. ctx.JSON(http.StatusOK, common.SuccessResponse(common.Success, nil))
  120. }
  121. func (c *auth) Login(ctx *gin.Context) {
  122. passKey := ctx.Query("passKey")
  123. tenant, err := service.TenantService.GetTenantByPasskey(passKey)
  124. if err != nil {
  125. ctx.JSON(http.StatusOK, common.SuccessResponse(model.TenantNotFound, nil))
  126. return
  127. }
  128. rsp := model.RspLogin{
  129. ID: tenant.TenantId,
  130. Name: tenant.LoginDisplayName,
  131. BackgroundUrl: tenant.BackgroundUrl,
  132. SysLogoUrl: tenant.SysLogoUrl,
  133. }
  134. ctx.JSON(http.StatusOK, common.SuccessResponse(common.Success, rsp))
  135. }
  136. //checkLock 校验用户登录失败次数
  137. func checkLock() {
  138. }
  139. func getRefreshToken(info model.UserInfo) string {
  140. claims := jwt.NewWithClaims(jwt.SigningMethodHS512, jwt.MapClaims{
  141. model.Iss: middleware.Issuer,
  142. model.Aud: middleware.Audience,
  143. model.ClientId: model.Saber,
  144. model.TokenType: model.RefreshToken,
  145. model.UserId: info.ID,
  146. model.Exp: time.Now().Add(7 * 24 * time.Hour).Unix(),
  147. model.Nbf: time.Now().Unix(),
  148. })
  149. token, _ := claims.SignedString([]byte(config.Instance().Server.TokenSign))
  150. return token
  151. }
  152. func parseRefreshToken(refreshToken string) *jwt.MapClaims {
  153. token, err := jwt.ParseWithClaims(refreshToken, &jwt.MapClaims{}, middleware.EmptyKeyFunc)
  154. if err != nil {
  155. return nil
  156. }
  157. return token.Claims.(*jwt.MapClaims)
  158. }
  159. func captchaGrant(token model.Token, ctx *gin.Context) (*model.UserInfo, *common.Errors) {
  160. info := &model.UserInfo{}
  161. key := ctx.GetHeader(model.CaptchaHeaderKey)
  162. code := ctx.GetHeader(model.CaptchaHeaderCode)
  163. // 获取验证码
  164. result, err := cache.Redis.Get(getCaptchaKey(key)).Result()
  165. if err != nil {
  166. return nil, common.NormalResponse(http.StatusBadRequest, model.CaptchaNotCorrect, nil)
  167. }
  168. redisCode := result
  169. // 判断验证码
  170. if config.Instance().Server.CodeEnabled && (key == "" || code == "" || !strings.EqualFold(redisCode, code)) {
  171. return nil, common.NormalResponse(http.StatusBadRequest, model.CaptchaNotCorrect, nil)
  172. }
  173. if token.UserName != "" && token.Password != "" {
  174. // 获取租户信息
  175. tenant, err := service.TenantService.GetOne(token.TenantId)
  176. if err != nil || tenant == nil {
  177. return nil, common.NormalResponse(http.StatusOK, model.UserHasNoTenant, nil)
  178. }
  179. if judgeTenant(tenant) {
  180. return nil, common.NormalResponse(http.StatusOK, model.UserHasNoTenantPermission, nil)
  181. }
  182. // 获取用户类型
  183. // 根据不同用户类型调用对应的接口返回数据,用户可自行拓展
  184. info.User = service.UserService.GetOne(token.TenantId, token.UserName, token.Password)
  185. info.TenantId = token.TenantId
  186. info.Roles = []string{"admin"}
  187. if info.User != nil {
  188. service.OperationHisService.Save(info.User.ID, info.TenantId, common.OperationLogin,
  189. common.ModuleTypeDefault, common.DeviceTypeDefault, "", common.OperationSuccess)
  190. }
  191. }
  192. return info, nil
  193. }
  194. func refreshGrant(token model.Token) (*model.UserInfo, *common.Errors) {
  195. info := &model.UserInfo{}
  196. jwtToken := parseRefreshToken(token.RefreshToken)
  197. if jwtToken == nil || len(*jwtToken) != 7 {
  198. return nil, common.NormalResponse(http.StatusOK, model.UserHasNoTenantPermission, nil)
  199. }
  200. // 获取租户信息
  201. tenant, _ := service.TenantService.GetOne(token.TenantId)
  202. if tenant == nil {
  203. return nil, common.NormalResponse(http.StatusOK, model.UserHasNoTenant, nil)
  204. }
  205. if judgeTenant(tenant) {
  206. return nil, common.NormalResponse(http.StatusOK, model.UserHasNoTenantPermission, nil)
  207. }
  208. info.User = service.UserService.GetOneByTenantId(token.TenantId)
  209. info.Roles = []string{"admin"}
  210. return info, nil
  211. }
  212. func judgeTenant(tenant *dao.Tenant) bool {
  213. if tenant.TenantId == model.AdminTenantId {
  214. return false
  215. }
  216. if tenant.ExpireTime.IsZero() || !tenant.ExpireTime.Before(time.Now()) {
  217. return false
  218. }
  219. return true
  220. }
  221. func getAccessTokenKey(tenantId int, uId int64, random string) string {
  222. return fmt.Sprintf("access_token_%d_%d_%s", tenantId, uId, random)
  223. }
  224. func getCaptchaKey(uId string) string {
  225. return fmt.Sprintf("auth:captcha:%s", uId)
  226. }