token.go 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228
  1. package controller
  2. import (
  3. "fmt"
  4. "github.com/gin-gonic/gin"
  5. "github.com/golang-jwt/jwt"
  6. "github.com/mojocn/base64Captcha"
  7. "github.com/satori/go.uuid"
  8. "iot_manager_service/app/system/service"
  9. "strconv"
  10. "time"
  11. "iot_manager_service/app/system/model"
  12. "iot_manager_service/config"
  13. "iot_manager_service/util"
  14. "net/http"
  15. "strings"
  16. )
  17. var Auth = new(auth)
  18. type auth struct{}
  19. var driver = &base64Captcha.DriverString{
  20. Height: 48,
  21. Width: 130,
  22. NoiseCount: 100,
  23. ShowLineOptions: 2,
  24. Length: 5,
  25. BgColor: nil,
  26. }
  27. func (c *auth) Token(ctx *gin.Context) {
  28. tenantId := ctx.Query("tenantId")
  29. userName := ctx.Query("username")
  30. password := ctx.Query("password")
  31. grantType := ctx.Query("grant_type")
  32. refreshToken := ctx.Query("refresh_token")
  33. // 校验连续登录失败次数
  34. checkLock()
  35. userType := ctx.GetHeader(model.UserTypeHeaderKey)
  36. token := model.Token{
  37. TenantId: tenantId,
  38. UserName: userName,
  39. Password: password,
  40. GrantType: grantType,
  41. RefreshToken: refreshToken,
  42. UserType: userType,
  43. }
  44. userInfo, err := grant(token, ctx)
  45. if err != nil {
  46. ctx.JSON(http.StatusOK, err)
  47. return
  48. }
  49. if userInfo == nil || userInfo.ID == 0 {
  50. ctx.JSON(http.StatusOK, util.NormalResponse(http.StatusBadRequest, model.UserNotFound, nil))
  51. return
  52. }
  53. if len(userInfo.Roles) == 0 {
  54. ctx.JSON(http.StatusOK, util.NormalResponse(http.StatusBadRequest, model.UserHasNoRole, nil))
  55. return
  56. }
  57. // access token过期时间2小时
  58. random := util.RandomString(8)
  59. jwtToken, e := getAccessToken(*userInfo, random)
  60. if e != nil {
  61. ctx.JSON(http.StatusOK, util.NormalResponse(http.StatusBadRequest, e.Error(), nil))
  62. return
  63. }
  64. // redis记录缓存2小时
  65. util.Redis.Set(getAccessTokenKey(userInfo.TenantId, userInfo.ID, random), jwtToken, 2*time.Hour)
  66. ctx.JSON(http.StatusOK, model.RspToken{
  67. TenantId: userInfo.TenantId,
  68. UserId: strconv.FormatInt(userInfo.ID, 10),
  69. DeptId: userInfo.DeptId,
  70. PostId: userInfo.PostId,
  71. RoleId: userInfo.RoleId,
  72. OauthId: userInfo.OauthId,
  73. Account: userInfo.Account,
  74. UserName: userInfo.Name,
  75. NickName: userInfo.RealName,
  76. RoleName: userInfo.Roles[0],
  77. Avatar: userInfo.Avatar,
  78. AccessToken: jwtToken,
  79. RefreshToken: getRefreshToken(*userInfo),
  80. TokenType: model.BEARER,
  81. ExpiresIn: 7200,
  82. License: "",
  83. })
  84. }
  85. func (c *auth) Logout(ctx *gin.Context) {
  86. emptyKeyFunc := func(t *jwt.Token) (interface{}, error) { return []byte(config.Instance().Server.TokenSign), nil }
  87. authorization := ctx.GetHeader("Authorization")
  88. token, err := jwt.ParseWithClaims(authorization, &model.JwtToken{}, emptyKeyFunc)
  89. if err != nil {
  90. ctx.JSON(http.StatusUnauthorized, util.NormalResponse(http.StatusUnauthorized, err.Error(), nil))
  91. return
  92. }
  93. jwtToken := token.Claims.(*model.JwtToken)
  94. err = util.Redis.Del(getAccessTokenKey(jwtToken.TenantId, jwtToken.UserId, jwtToken.Random)).Err()
  95. //todo 操作记录
  96. ctx.JSON(http.StatusOK, util.SuccessResponse("", nil))
  97. }
  98. func (c *auth) Captcha(ctx *gin.Context) {
  99. id := uuid.NewV1().String()
  100. code := util.RandomString2(5)
  101. gotItem, _ := driver.DrawCaptcha(code)
  102. image := gotItem.EncodeB64string()
  103. rsp := model.RspCaptcha{
  104. Key: id,
  105. Image: image,
  106. }
  107. util.Redis.Set(getCaptchaKey(id), code, 5*time.Minute)
  108. ctx.JSON(http.StatusOK, rsp)
  109. }
  110. func (c *auth) Clear(ctx *gin.Context) {
  111. //todo clear redis
  112. ctx.JSON(http.StatusOK, util.SuccessResponse(util.Success, nil))
  113. }
  114. func (c *auth) Login(ctx *gin.Context) {
  115. passKey := ctx.Query("passKey")
  116. tenant, err := service.TenantService.Get(passKey)
  117. if err != nil {
  118. ctx.JSON(http.StatusOK, util.SuccessResponse(model.TenantNotFound, nil))
  119. return
  120. }
  121. rsp := model.RspLogin{
  122. ID: tenant.TenantId,
  123. }
  124. ctx.JSON(http.StatusOK, util.SuccessResponse(util.Success, rsp))
  125. }
  126. //checkLock 校验用户登录失败次数
  127. func checkLock() {
  128. }
  129. func getAccessToken(info model.UserInfo, random string) (string, error) {
  130. jwtToken := model.JwtToken{StandardClaims: jwt.StandardClaims{
  131. Audience: "audience",
  132. ExpiresAt: time.Now().Add(2 * time.Hour).Unix(),
  133. Issuer: "issuser",
  134. NotBefore: time.Now().Unix(),
  135. },
  136. UserId: info.ID,
  137. TenantId: info.TenantId,
  138. TokenType: "access_token",
  139. ClientId: "saber",
  140. RoleId: info.RoleId,
  141. RoleName: info.Roles[0],
  142. DeptId: info.DeptId,
  143. PostId: info.PostId,
  144. OauthId: info.OauthId,
  145. Account: info.Account,
  146. UserName: info.Account,
  147. NickName: info.RealName,
  148. Random: random,
  149. }
  150. claims := jwt.NewWithClaims(jwt.SigningMethodHS512, jwtToken)
  151. return claims.SignedString([]byte(config.Instance().Server.TokenSign))
  152. }
  153. func getRefreshToken(info model.UserInfo) string {
  154. claims := jwt.NewWithClaims(jwt.SigningMethodHS512, jwt.MapClaims{
  155. model.Iss: "issuser",
  156. model.Aud: "audience",
  157. model.ClientId: "saber",
  158. model.TokenType: "refresh_token",
  159. model.UserId: info.ID,
  160. model.Exp: time.Now().Add(7 * 24 * time.Hour).Unix(),
  161. model.Nbf: time.Now().Unix(),
  162. })
  163. token, _ := claims.SignedString([]byte(config.Instance().Server.TokenSign))
  164. return token
  165. }
  166. func grant(token model.Token, ctx *gin.Context) (*model.UserInfo, *util.Errors) {
  167. info := &model.UserInfo{}
  168. key := ctx.GetHeader(model.CaptchaHeaderKey)
  169. code := ctx.GetHeader(model.CaptchaHeaderCode)
  170. // 获取验证码
  171. result, err := util.Redis.Get(getCaptchaKey(key)).Result()
  172. if err != nil {
  173. return nil, util.NormalResponse(http.StatusBadRequest, model.CaptchaNotCorrect, nil)
  174. }
  175. redisCode := result
  176. // 判断验证码
  177. if config.Instance().Server.CodeEnabled && (key == "" || code == "" || !strings.EqualFold(redisCode, code)) {
  178. return nil, util.NormalResponse(http.StatusBadRequest, model.CaptchaNotCorrect, nil)
  179. }
  180. if token.UserName != "" && token.Password != "" {
  181. // 获取租户信息
  182. //Tenant tenant = tenantService.getByTenantId(tenantId);
  183. //if (TokenUtil.judgeTenant(tenant)) {
  184. // throw new ServiceException(TokenUtil.USER_HAS_NO_TENANT_PERMISSION);
  185. //}
  186. // 获取用户类型
  187. // 根据不同用户类型调用对应的接口返回数据,用户可自行拓展
  188. // info.Auth = userService.GetUser(auth.tenantId, auth.UserName, auth.password)
  189. }
  190. //测试代码start
  191. info.TenantId = "000000"
  192. info.ID = 11112222
  193. info.Roles = []string{"admin"}
  194. // 测试代码end
  195. //todo 操作记录
  196. return info, nil
  197. }
  198. func getAccessTokenKey(tenantId string, uId int64, random string) string {
  199. return fmt.Sprintf("access_token_%s_%d_%s", tenantId, uId, random)
  200. }
  201. func getCaptchaKey(uId string) string {
  202. return fmt.Sprintf("auth:captcha:%s", uId)
  203. }