base_auth.go 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122
  1. package controllers
  2. import (
  3. "encoding/json"
  4. "eta/eta_mini_crm/models"
  5. "eta/eta_mini_crm/utils"
  6. "fmt"
  7. "net/http"
  8. "strconv"
  9. "strings"
  10. "time"
  11. "github.com/beego/beego/v2/client/orm"
  12. "github.com/beego/beego/v2/server/web"
  13. )
  14. type BaseAuthController struct {
  15. web.Controller
  16. SysUser *models.SysUser
  17. Session *models.SysSession
  18. }
  19. func (c *BaseAuthController) Prepare() {
  20. method := c.Ctx.Input.Method()
  21. // uri := c.Ctx.Input.URI()
  22. if method != "HEAD" {
  23. if method == "POST" || method == "GET" {
  24. authorization := c.Ctx.Input.Header("authorization")
  25. if authorization == "" {
  26. c.JSON(models.BaseResponse{Ret: 408, Msg: "请重新授权!", ErrMsg: "请重新授权:Token is empty or account is empty"})
  27. c.StopRun()
  28. return
  29. }
  30. tokenStr := authorization
  31. tokenArr := strings.Split(tokenStr, "=")
  32. token := tokenArr[1]
  33. session, err := models.GetSysSessionByToken(token)
  34. if err != nil {
  35. if err == orm.ErrNoRows {
  36. c.JSON(models.BaseResponse{Ret: 408, Msg: "信息已变更,请重新登陆!", ErrMsg: "Token 信息已变更:Token: " + token})
  37. c.StopRun()
  38. return
  39. }
  40. c.JSON(models.BaseResponse{Ret: 408, Msg: "网络异常,请稍后重试!", ErrMsg: "获取用户信息异常,Eerr:" + err.Error()})
  41. c.StopRun()
  42. return
  43. }
  44. if session == nil {
  45. c.JSON(models.BaseResponse{Ret: 408, Msg: "网络异常,请稍后重试!", ErrMsg: "sesson is empty "})
  46. c.StopRun()
  47. return
  48. }
  49. account := utils.MD5(session.UserName)
  50. if !utils.CheckToken(account, token) {
  51. c.JSON(models.BaseResponse{Ret: 408, Msg: "鉴权失败,请重新登录!", ErrMsg: "登录失效,请重新登陆!,CheckToken Fail"})
  52. c.StopRun()
  53. return
  54. }
  55. if time.Now().After(session.ExpiredTime) {
  56. c.JSON(models.BaseResponse{Ret: 408, Msg: "请重新登录!", ErrMsg: "获取用户信息异常"})
  57. c.StopRun()
  58. return
  59. }
  60. sysUser, err := models.GetSysUserById(session.SysUserId)
  61. if err != nil {
  62. if err == orm.ErrNoRows {
  63. c.JSON(models.BaseResponse{Ret: 408, Msg: "信息已变更,请重新登陆!", ErrMsg: "获取sysUser信息失败: " + strconv.Itoa(session.SysUserId)})
  64. c.StopRun()
  65. return
  66. }
  67. c.JSON(models.BaseResponse{Ret: 408, Msg: "网络异常,请稍后重试!", ErrMsg: "获取sysUser信息异常,Err:" + err.Error()})
  68. c.StopRun()
  69. return
  70. }
  71. if sysUser == nil {
  72. c.JSON(models.BaseResponse{Ret: 408, Msg: "网络异常,请稍后重试!", ErrMsg: "sysUser is empty"})
  73. c.StopRun()
  74. return
  75. }
  76. if !sysUser.IsEnabled {
  77. c.JSON(models.BaseResponse{Ret: 408, Msg: "账户信息异常!", ErrMsg: "账户被禁用,不允许登陆!"})
  78. c.StopRun()
  79. return
  80. }
  81. loginKey := fmt.Sprint(utils.CACHE_ACCESS_TOKEN_LOGIN, session.SysSessionId)
  82. loginInfo, _ := utils.Rc.RedisString(loginKey)
  83. if loginInfo == `` {
  84. c.JSON(models.BaseResponse{Ret: 408, Msg: "超时未操作,系统自动退出!", ErrMsg: "超时未操作,系统自动退出!"})
  85. c.StopRun()
  86. return
  87. }
  88. if loginInfo != "1" {
  89. msg := "在其他网络登录。此客户端已退出登录。"
  90. c.JSON(models.BaseResponse{Ret: 408, Msg: msg, ErrMsg: msg})
  91. c.StopRun()
  92. return
  93. }
  94. c.SysUser = sysUser
  95. c.Session = session
  96. }
  97. }
  98. }
  99. func (c *BaseAuthController) JSON(data interface{}) error {
  100. c.Ctx.Output.Header("Content-Type", "application/json; charset=utf-8")
  101. desEncrypt := utils.DesBase64Encrypt([]byte(utils.DesKey), utils.DesKeySalt)
  102. c.Ctx.Output.Header("Dk", string(desEncrypt)) // des3加解密key
  103. // 设置Cookie为HTTPOnly
  104. c.Ctx.SetCookie("", "", -1, "/", "", false, true, "")
  105. content, err := json.Marshal(data)
  106. if err != nil {
  107. http.Error(c.Ctx.Output.Context.ResponseWriter, err.Error(), http.StatusInternalServerError)
  108. return err
  109. }
  110. if utils.RunMode != "debug" {
  111. content = utils.DesBase64Encrypt(content, utils.DesKey)
  112. content = []byte(`"` + string(content) + `"`)
  113. }
  114. return c.Ctx.Output.Body(content)
  115. }