auth_middleware.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. package middleware
  2. import (
  3. "eta/eta_mini_ht_api/common/component/cache"
  4. logger "eta/eta_mini_ht_api/common/component/log"
  5. "eta/eta_mini_ht_api/common/exception"
  6. "eta/eta_mini_ht_api/common/utils/jwt"
  7. "eta/eta_mini_ht_api/common/utils/redis"
  8. stringUtils "eta/eta_mini_ht_api/common/utils/string"
  9. "eta/eta_mini_ht_api/controllers"
  10. "eta/eta_mini_ht_api/service/user"
  11. "fmt"
  12. "github.com/beego/beego/v2/server/web"
  13. "github.com/beego/beego/v2/server/web/context"
  14. "strings"
  15. )
  16. var (
  17. rdCache *cache.RedisCache
  18. )
  19. const (
  20. ILLEGALUSER = "用户信息异常"
  21. UNAUTHORIZED = "请重新登录"
  22. TOKENEXPIRED = "token过期"
  23. FORBIDDEN = "禁止访问"
  24. NOTFOUND = "未找到"
  25. authorization = "Authorization"
  26. baseUrl = "/htapi"
  27. Bearer = "Bearer"
  28. )
  29. func rd() *cache.RedisCache {
  30. if rdCache == nil {
  31. rdCache = cache.GetInstance()
  32. }
  33. return rdCache
  34. }
  35. var publicRoutes = []string{
  36. "/auth/refreshToken",
  37. "/auth/bind_gzh",
  38. }
  39. func AuthMiddleware() web.FilterFunc {
  40. return func(ctx *context.Context) {
  41. path := ctx.Input.URL()
  42. logger.Info("请求路径:%v", path)
  43. f := allowed(path)
  44. fmt.Println(f)
  45. if !allowed(path) {
  46. rep := unAuthorized()
  47. auth := ctx.Input.Header(authorization)
  48. if auth == "" {
  49. logger.Error("token信息不存在")
  50. _ = ctx.JSONResp(rep)
  51. return
  52. }
  53. fmt.Println(auth)
  54. parts := strings.Split(auth, " ")
  55. fmt.Println(len(parts))
  56. if len(parts) != 2 || parts[0] != Bearer {
  57. logger.Error("token参数不符合格式" + auth)
  58. _ = ctx.JSONResp(rep)
  59. return
  60. }
  61. info, err := jwt.CheckToken(parts[1])
  62. if err != nil {
  63. logger.Error("token无效:%v", err)
  64. _ = ctx.JSONResp(rep)
  65. return
  66. }
  67. fmt.Println(info)
  68. //校验redis中是否合法
  69. redisToken := rd().GetString(redis.GenerateTokenKey(info.OpenId))
  70. if redisToken != parts[1] {
  71. logger.Error("token无效:用户token已刷新")
  72. _ = ctx.JSONResp(tokenExpired())
  73. return
  74. }
  75. fmt.Println()
  76. //组装用户信息
  77. var userInfo user.User
  78. userInfo, err = user.GetUserByOpenId(info.OpenId)
  79. fmt.Println(userInfo)
  80. if err != nil {
  81. logger.Error("获取用户信息失败:%v", err)
  82. _ = ctx.JSONResp(illegalUser())
  83. return
  84. }
  85. ctx.Input.SetData("user", userInfo)
  86. return
  87. }
  88. return
  89. }
  90. }
  91. func unAuthorized() controllers.BaseResponse {
  92. return controllers.BaseResponse{
  93. Ret: 401,
  94. Msg: UNAUTHORIZED,
  95. ErrMsg: exception.GetMsg(exception.Unauthorized),
  96. }
  97. }
  98. func tokenExpired() controllers.BaseResponse {
  99. return controllers.BaseResponse{
  100. Ret: 408,
  101. Msg: TOKENEXPIRED,
  102. ErrMsg: exception.GetMsg(exception.Unauthorized),
  103. }
  104. }
  105. func illegalUser() controllers.BaseResponse {
  106. return controllers.BaseResponse{
  107. Ret: 401,
  108. Msg: ILLEGALUSER,
  109. ErrMsg: exception.GetMsg(exception.Unauthorized),
  110. }
  111. }
  112. func allowed(path string) bool {
  113. for _, p := range publicRoutes {
  114. if stringUtils.IsBlank(p) {
  115. continue
  116. }
  117. src := baseUrl + p
  118. if strings.HasSuffix(p, "*") {
  119. target := src[:len(src)-1]
  120. if strings.HasPrefix(path, target) {
  121. return true
  122. }
  123. } else {
  124. if src == path {
  125. return true
  126. }
  127. }
  128. }
  129. return false
  130. }