token.go 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198
  1. package controller
  2. import (
  3. "fmt"
  4. "github.com/gin-gonic/gin"
  5. "github.com/golang-jwt/jwt"
  6. "strconv"
  7. "time"
  8. "iot_manager_service/app/system/model"
  9. "iot_manager_service/config"
  10. "iot_manager_service/util"
  11. "net/http"
  12. "strings"
  13. )
  14. var Auth = new(auth)
  15. type auth struct{}
  16. type JwtToken struct {
  17. jwt.StandardClaims
  18. TenantId string `json:"tenant_id"`
  19. UserId int64 `json:"user_id"`
  20. TokenType string `json:"token_type"`
  21. ClientId string `json:"client_id"`
  22. RoleId string `json:"role_id"`
  23. RoleName string `json:"role_name"`
  24. DeptId string `json:"dept_id"`
  25. PostId string `json:"post_id"`
  26. OauthId string `json:"oauth_id"`
  27. Account string `json:"account"`
  28. UserName string `json:"user_name"`
  29. NickName string `json:"nick_name"`
  30. Random string `json:"random"`
  31. }
  32. func (c *auth) Token(ctx *gin.Context) {
  33. tenantId := ctx.Query("tenantId")
  34. userName := ctx.Query("username")
  35. password := ctx.Query("password")
  36. grantType := ctx.Query("grant_type")
  37. refreshToken := ctx.Query("refresh_token")
  38. // 校验连续登录失败次数
  39. checkLock()
  40. userType := ctx.GetHeader(model.UserTypeHeaderKey)
  41. token := model.Token{
  42. TenantId: tenantId,
  43. UserName: userName,
  44. Password: password,
  45. GrantType: grantType,
  46. RefreshToken: refreshToken,
  47. UserType: userType,
  48. }
  49. userInfo, err := grant(token, ctx)
  50. if err != nil {
  51. ctx.JSON(http.StatusOK, err)
  52. return
  53. }
  54. if userInfo == nil || userInfo.ID == 0 {
  55. ctx.JSON(http.StatusOK, util.NormalResponse(http.StatusBadRequest, model.UserNotFound, nil))
  56. return
  57. }
  58. if len(userInfo.Roles) == 0 {
  59. ctx.JSON(http.StatusOK, util.NormalResponse(http.StatusBadRequest, model.UserHasNoRole, nil))
  60. return
  61. }
  62. // access token过期时间2小时
  63. random := util.RandomString(8)
  64. jwtToken, e := getAccessToken(*userInfo, random)
  65. if e != nil {
  66. ctx.JSON(http.StatusOK, util.NormalResponse(http.StatusBadRequest, e.Error(), nil))
  67. return
  68. }
  69. // redis记录缓存2小时
  70. util.Redis.Set(getAccessTokenKey(userInfo.TenantId, userInfo.ID, random), jwtToken, 2*time.Hour)
  71. ctx.JSON(http.StatusOK, model.RspToken{
  72. TenantId: userInfo.TenantId,
  73. UserId: strconv.FormatInt(userInfo.ID, 10),
  74. DeptId: userInfo.DeptId,
  75. PostId: userInfo.PostId,
  76. RoleId: userInfo.RoleId,
  77. OauthId: userInfo.OauthId,
  78. Account: userInfo.Account,
  79. UserName: userInfo.Name,
  80. NickName: userInfo.RealName,
  81. RoleName: userInfo.Roles[0],
  82. Avatar: userInfo.Avatar,
  83. AccessToken: jwtToken,
  84. RefreshToken: getRefreshToken(*userInfo),
  85. TokenType: model.BEARER,
  86. ExpiresIn: 7200,
  87. License: "",
  88. })
  89. }
  90. //checkLock 校验用户登录失败次数
  91. func checkLock() {
  92. }
  93. func getAccessTokenKey(tenantId string, uId int64, random string) string {
  94. return fmt.Sprintf("access_token_%s_%d_%s", tenantId, uId, random)
  95. }
  96. func getAccessToken(info model.UserInfo, random string) (string, error) {
  97. jwtToken := JwtToken{StandardClaims: jwt.StandardClaims{
  98. Audience: "audience",
  99. ExpiresAt: time.Now().Add(2 * time.Hour).Unix(),
  100. Issuer: "issuser",
  101. NotBefore: time.Now().Unix(),
  102. },
  103. UserId: info.ID,
  104. TenantId: info.TenantId,
  105. TokenType: "access_token",
  106. ClientId: "saber",
  107. RoleId: info.RoleId,
  108. RoleName: info.Roles[0],
  109. DeptId: info.DeptId,
  110. PostId: info.PostId,
  111. OauthId: info.OauthId,
  112. Account: info.Account,
  113. UserName: info.Account,
  114. NickName: info.RealName,
  115. Random: random,
  116. }
  117. claims := jwt.NewWithClaims(jwt.SigningMethodHS512, jwtToken)
  118. return claims.SignedString([]byte(config.Instance().Server.TokenSign))
  119. }
  120. func getRefreshToken(info model.UserInfo) string {
  121. claims := jwt.NewWithClaims(jwt.SigningMethodHS512, jwt.MapClaims{
  122. model.Iss: "issuser",
  123. model.Aud: "audience",
  124. model.ClientId: "saber",
  125. model.TokenType: "refresh_token",
  126. model.UserId: info.ID,
  127. model.Exp: time.Now().Add(7 * 24 * time.Hour).Unix(),
  128. model.Nbf: time.Now().Unix(),
  129. })
  130. token, _ := claims.SignedString([]byte(config.Instance().Server.TokenSign))
  131. return token
  132. }
  133. func grant(token model.Token, ctx *gin.Context) (*model.UserInfo, *util.Errors) {
  134. info := &model.UserInfo{}
  135. key := ctx.GetHeader(model.CaptchaHeaderKey)
  136. code := ctx.GetHeader(model.CaptchaHeaderCode)
  137. // 获取验证码
  138. redisCode := util.Redis.Get(model.CaptchaKey + key).String()
  139. // 判断验证码
  140. if config.Instance().Server.CodeEnable && (code == "" || !strings.EqualFold(redisCode, code)) {
  141. return nil, util.NormalResponse(http.StatusBadRequest, model.CaptchaNotCorrect, nil)
  142. }
  143. if token.UserName != "" && token.Password != "" {
  144. // 获取租户信息
  145. //Tenant tenant = tenantService.getByTenantId(tenantId);
  146. //if (TokenUtil.judgeTenant(tenant)) {
  147. // throw new ServiceException(TokenUtil.USER_HAS_NO_TENANT_PERMISSION);
  148. //}
  149. // 获取用户类型
  150. // 根据不同用户类型调用对应的接口返回数据,用户可自行拓展
  151. // info.Auth = userService.GetUser(auth.tenantId, auth.UserName, auth.password)
  152. }
  153. //测试代码start
  154. info.TenantId = "000000"
  155. info.ID = 11112222
  156. info.Roles = []string{"admin"}
  157. // 测试代码end
  158. //todo 操作记录
  159. return info, nil
  160. }
  161. func (c *auth) Logout(ctx *gin.Context) {
  162. emptyKeyFunc := func(t *jwt.Token) (interface{}, error) { return []byte(config.Instance().Server.TokenSign), nil }
  163. authorization := ctx.GetHeader("Authorization")
  164. token, err := jwt.ParseWithClaims(authorization, &JwtToken{}, emptyKeyFunc)
  165. if err != nil {
  166. ctx.JSON(http.StatusUnauthorized, util.NormalResponse(http.StatusUnauthorized, err.Error(), nil))
  167. return
  168. }
  169. jwtToken := token.Claims.(*JwtToken)
  170. err = util.Redis.Del(getAccessTokenKey(jwtToken.TenantId, jwtToken.UserId, jwtToken.Random)).Err()
  171. //todo 操作记录
  172. ctx.JSON(http.StatusOK, util.SuccessResponse("", nil))
  173. }
  174. func (c *auth) Captcha(ctx *gin.Context) {
  175. ctx.JSON(0, nil)
  176. }