auth_middleware.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. package middleware
  2. import (
  3. "eta/eta_mini_ht_api/common/component/cache"
  4. logger "eta/eta_mini_ht_api/common/component/log"
  5. "eta/eta_mini_ht_api/common/exception"
  6. "eta/eta_mini_ht_api/common/utils/jwt"
  7. "eta/eta_mini_ht_api/common/utils/redis"
  8. stringUtils "eta/eta_mini_ht_api/common/utils/string"
  9. "eta/eta_mini_ht_api/controllers"
  10. "eta/eta_mini_ht_api/service/user"
  11. "fmt"
  12. "github.com/beego/beego/v2/server/web"
  13. "github.com/beego/beego/v2/server/web/context"
  14. "strings"
  15. )
  16. var (
  17. rdCache *cache.RedisCache
  18. )
  19. const (
  20. ILLEGALUSER = "用户信息异常"
  21. UNAUTHORIZED = "请重新登录"
  22. TOKENEXPIRED = "token过期"
  23. FORBIDDEN = "禁止访问"
  24. NOTFOUND = "未找到"
  25. authorization = "Authorization"
  26. baseUrl = "/htapi"
  27. Bearer = "Bearer"
  28. )
  29. func rd() *cache.RedisCache {
  30. if rdCache == nil {
  31. rdCache = cache.GetInstance()
  32. }
  33. return rdCache
  34. }
  35. var publicRoutes = []string{
  36. "/auth/refreshToken",
  37. "/user/bind_gzh",
  38. "/user/wx/notify",
  39. }
  40. func AuthMiddleware() web.FilterFunc {
  41. return func(ctx *context.Context) {
  42. path := ctx.Input.URL()
  43. logger.Info("请求路径:%v", path)
  44. if !allowed(path) {
  45. rep := unAuthorized()
  46. auth := ctx.Input.Header(authorization)
  47. if auth == "" {
  48. logger.Error("token信息不存在")
  49. _ = ctx.JSONResp(rep)
  50. return
  51. }
  52. fmt.Println(auth)
  53. parts := strings.Split(auth, " ")
  54. fmt.Println(len(parts))
  55. if len(parts) != 2 || parts[0] != Bearer {
  56. logger.Error("token参数不符合格式" + auth)
  57. _ = ctx.JSONResp(rep)
  58. return
  59. }
  60. info, err := jwt.CheckToken(parts[1])
  61. if err != nil {
  62. logger.Error("token无效:%v", err)
  63. _ = ctx.JSONResp(rep)
  64. return
  65. }
  66. fmt.Println(info)
  67. //校验redis中是否合法
  68. redisToken := rd().GetString(redis.GenerateTokenKey(info.OpenId))
  69. if redisToken != parts[1] {
  70. logger.Error("token无效:用户token已刷新")
  71. _ = ctx.JSONResp(tokenExpired())
  72. return
  73. }
  74. fmt.Println()
  75. //组装用户信息
  76. var userInfo user.User
  77. userInfo, err = user.GetUserByOpenId(info.OpenId)
  78. fmt.Println(userInfo)
  79. if err != nil {
  80. logger.Error("获取用户信息失败:%v", err)
  81. _ = ctx.JSONResp(illegalUser())
  82. return
  83. }
  84. ctx.Input.SetData("user", userInfo)
  85. return
  86. }
  87. return
  88. }
  89. }
  90. func unAuthorized() controllers.BaseResponse {
  91. return controllers.BaseResponse{
  92. Ret: 401,
  93. Msg: UNAUTHORIZED,
  94. ErrMsg: exception.GetMsg(exception.Unauthorized),
  95. }
  96. }
  97. func tokenExpired() controllers.BaseResponse {
  98. return controllers.BaseResponse{
  99. Ret: 408,
  100. Msg: TOKENEXPIRED,
  101. ErrMsg: exception.GetMsg(exception.Unauthorized),
  102. }
  103. }
  104. func illegalUser() controllers.BaseResponse {
  105. return controllers.BaseResponse{
  106. Ret: 401,
  107. Msg: ILLEGALUSER,
  108. ErrMsg: exception.GetMsg(exception.Unauthorized),
  109. }
  110. }
  111. func allowed(path string) bool {
  112. for _, p := range publicRoutes {
  113. if stringUtils.IsBlank(p) {
  114. continue
  115. }
  116. src := baseUrl + p
  117. if strings.HasSuffix(p, "*") {
  118. target := src[:len(src)-1]
  119. fmt.Println("target:" + target)
  120. if strings.HasPrefix(path, target) {
  121. return true
  122. }
  123. } else {
  124. if src == path {
  125. return true
  126. }
  127. }
  128. }
  129. return false
  130. }