token.go 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209
  1. package controller
  2. import (
  3. "fmt"
  4. "github.com/gin-gonic/gin"
  5. "github.com/golang-jwt/jwt"
  6. "github.com/mojocn/base64Captcha"
  7. "github.com/satori/go.uuid"
  8. "strconv"
  9. "time"
  10. "iot_manager_service/app/system/model"
  11. "iot_manager_service/config"
  12. "iot_manager_service/util"
  13. "net/http"
  14. "strings"
  15. )
  16. var Auth = new(auth)
  17. type auth struct{}
  18. var driver = &base64Captcha.DriverString{
  19. Height: 48,
  20. Width: 130,
  21. NoiseCount: 100,
  22. ShowLineOptions: 2,
  23. Length: 5,
  24. BgColor: nil,
  25. }
  26. func (c *auth) Token(ctx *gin.Context) {
  27. tenantId := ctx.Query("tenantId")
  28. userName := ctx.Query("username")
  29. password := ctx.Query("password")
  30. grantType := ctx.Query("grant_type")
  31. refreshToken := ctx.Query("refresh_token")
  32. // 校验连续登录失败次数
  33. checkLock()
  34. userType := ctx.GetHeader(model.UserTypeHeaderKey)
  35. token := model.Token{
  36. TenantId: tenantId,
  37. UserName: userName,
  38. Password: password,
  39. GrantType: grantType,
  40. RefreshToken: refreshToken,
  41. UserType: userType,
  42. }
  43. userInfo, err := grant(token, ctx)
  44. if err != nil {
  45. ctx.JSON(http.StatusOK, err)
  46. return
  47. }
  48. if userInfo == nil || userInfo.ID == 0 {
  49. ctx.JSON(http.StatusOK, util.NormalResponse(http.StatusBadRequest, model.UserNotFound, nil))
  50. return
  51. }
  52. if len(userInfo.Roles) == 0 {
  53. ctx.JSON(http.StatusOK, util.NormalResponse(http.StatusBadRequest, model.UserHasNoRole, nil))
  54. return
  55. }
  56. // access token过期时间2小时
  57. random := util.RandomString(8)
  58. jwtToken, e := getAccessToken(*userInfo, random)
  59. if e != nil {
  60. ctx.JSON(http.StatusOK, util.NormalResponse(http.StatusBadRequest, e.Error(), nil))
  61. return
  62. }
  63. // redis记录缓存2小时
  64. util.Redis.Set(getAccessTokenKey(userInfo.TenantId, userInfo.ID, random), jwtToken, 2*time.Hour)
  65. ctx.JSON(http.StatusOK, model.RspToken{
  66. TenantId: userInfo.TenantId,
  67. UserId: strconv.FormatInt(userInfo.ID, 10),
  68. DeptId: userInfo.DeptId,
  69. PostId: userInfo.PostId,
  70. RoleId: userInfo.RoleId,
  71. OauthId: userInfo.OauthId,
  72. Account: userInfo.Account,
  73. UserName: userInfo.Name,
  74. NickName: userInfo.RealName,
  75. RoleName: userInfo.Roles[0],
  76. Avatar: userInfo.Avatar,
  77. AccessToken: jwtToken,
  78. RefreshToken: getRefreshToken(*userInfo),
  79. TokenType: model.BEARER,
  80. ExpiresIn: 7200,
  81. License: "",
  82. })
  83. }
  84. func (c *auth) Logout(ctx *gin.Context) {
  85. emptyKeyFunc := func(t *jwt.Token) (interface{}, error) { return []byte(config.Instance().Server.TokenSign), nil }
  86. authorization := ctx.GetHeader("Authorization")
  87. token, err := jwt.ParseWithClaims(authorization, &model.JwtToken{}, emptyKeyFunc)
  88. if err != nil {
  89. ctx.JSON(http.StatusUnauthorized, util.NormalResponse(http.StatusUnauthorized, err.Error(), nil))
  90. return
  91. }
  92. jwtToken := token.Claims.(*model.JwtToken)
  93. err = util.Redis.Del(getAccessTokenKey(jwtToken.TenantId, jwtToken.UserId, jwtToken.Random)).Err()
  94. //todo 操作记录
  95. ctx.JSON(http.StatusOK, util.SuccessResponse("", nil))
  96. }
  97. func (c *auth) Captcha(ctx *gin.Context) {
  98. id := uuid.NewV1().String()
  99. code := util.RandomString2(5)
  100. gotItem, _ := driver.DrawCaptcha(code)
  101. image := gotItem.EncodeB64string()
  102. rsp := model.RspCaptcha{
  103. Key: id,
  104. Image: image,
  105. }
  106. util.Redis.Set(getCaptchaKey(id), code, 5*time.Minute)
  107. ctx.JSON(http.StatusOK, rsp)
  108. }
  109. //checkLock 校验用户登录失败次数
  110. func checkLock() {
  111. }
  112. func getAccessToken(info model.UserInfo, random string) (string, error) {
  113. jwtToken := model.JwtToken{StandardClaims: jwt.StandardClaims{
  114. Audience: "audience",
  115. ExpiresAt: time.Now().Add(2 * time.Hour).Unix(),
  116. Issuer: "issuser",
  117. NotBefore: time.Now().Unix(),
  118. },
  119. UserId: info.ID,
  120. TenantId: info.TenantId,
  121. TokenType: "access_token",
  122. ClientId: "saber",
  123. RoleId: info.RoleId,
  124. RoleName: info.Roles[0],
  125. DeptId: info.DeptId,
  126. PostId: info.PostId,
  127. OauthId: info.OauthId,
  128. Account: info.Account,
  129. UserName: info.Account,
  130. NickName: info.RealName,
  131. Random: random,
  132. }
  133. claims := jwt.NewWithClaims(jwt.SigningMethodHS512, jwtToken)
  134. return claims.SignedString([]byte(config.Instance().Server.TokenSign))
  135. }
  136. func getRefreshToken(info model.UserInfo) string {
  137. claims := jwt.NewWithClaims(jwt.SigningMethodHS512, jwt.MapClaims{
  138. model.Iss: "issuser",
  139. model.Aud: "audience",
  140. model.ClientId: "saber",
  141. model.TokenType: "refresh_token",
  142. model.UserId: info.ID,
  143. model.Exp: time.Now().Add(7 * 24 * time.Hour).Unix(),
  144. model.Nbf: time.Now().Unix(),
  145. })
  146. token, _ := claims.SignedString([]byte(config.Instance().Server.TokenSign))
  147. return token
  148. }
  149. func grant(token model.Token, ctx *gin.Context) (*model.UserInfo, *util.Errors) {
  150. info := &model.UserInfo{}
  151. key := ctx.GetHeader(model.CaptchaHeaderKey)
  152. code := ctx.GetHeader(model.CaptchaHeaderCode)
  153. // 获取验证码
  154. result, err := util.Redis.Get(getCaptchaKey(key)).Result()
  155. if err != nil {
  156. return nil, util.NormalResponse(http.StatusBadRequest, model.CaptchaNotCorrect, nil)
  157. }
  158. redisCode := result
  159. // 判断验证码
  160. if config.Instance().Server.CodeEnabled && (key == "" || code == "" || !strings.EqualFold(redisCode, code)) {
  161. return nil, util.NormalResponse(http.StatusBadRequest, model.CaptchaNotCorrect, nil)
  162. }
  163. if token.UserName != "" && token.Password != "" {
  164. // 获取租户信息
  165. //Tenant tenant = tenantService.getByTenantId(tenantId);
  166. //if (TokenUtil.judgeTenant(tenant)) {
  167. // throw new ServiceException(TokenUtil.USER_HAS_NO_TENANT_PERMISSION);
  168. //}
  169. // 获取用户类型
  170. // 根据不同用户类型调用对应的接口返回数据,用户可自行拓展
  171. // info.Auth = userService.GetUser(auth.tenantId, auth.UserName, auth.password)
  172. }
  173. //测试代码start
  174. info.TenantId = "000000"
  175. info.ID = 11112222
  176. info.Roles = []string{"admin"}
  177. // 测试代码end
  178. //todo 操作记录
  179. return info, nil
  180. }
  181. func getAccessTokenKey(tenantId string, uId int64, random string) string {
  182. return fmt.Sprintf("access_token_%s_%d_%s", tenantId, uId, random)
  183. }
  184. func getCaptchaKey(uId string) string {
  185. return fmt.Sprintf("auth:captcha:%s", uId)
  186. }