auth_middleware.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136
  1. package middleware
  2. import (
  3. "eta/eta_mini_ht_api/common/component/cache"
  4. logger "eta/eta_mini_ht_api/common/component/log"
  5. "eta/eta_mini_ht_api/common/exception"
  6. "eta/eta_mini_ht_api/common/utils/jwt"
  7. "eta/eta_mini_ht_api/common/utils/redis"
  8. stringUtils "eta/eta_mini_ht_api/common/utils/string"
  9. "eta/eta_mini_ht_api/controllers"
  10. "eta/eta_mini_ht_api/service/user"
  11. "fmt"
  12. "github.com/beego/beego/v2/server/web"
  13. "github.com/beego/beego/v2/server/web/context"
  14. "strings"
  15. )
  16. var (
  17. rdCache *cache.RedisCache
  18. )
  19. const (
  20. ILLEGALUSER = "用户信息异常"
  21. UNAUTHORIZED = "请重新登录"
  22. TOKENEXPIRED = "token过期"
  23. FORBIDDEN = "禁止访问"
  24. NOTFOUND = "未找到"
  25. authorization = "Authorization"
  26. baseUrl = "/htapi"
  27. Bearer = "Bearer"
  28. )
  29. func rd() *cache.RedisCache {
  30. if rdCache == nil {
  31. rdCache = cache.GetInstance()
  32. }
  33. return rdCache
  34. }
  35. var publicRoutes = []string{
  36. "/auth/refreshToken",
  37. }
  38. func AuthMiddleware() web.FilterFunc {
  39. return func(ctx *context.Context) {
  40. path := ctx.Input.URL()
  41. logger.Info("请求路径:%v", path)
  42. if !allowed(path) {
  43. rep := unAuthorized()
  44. auth := ctx.Input.Header(authorization)
  45. if auth == "" {
  46. logger.Error("token信息不存在")
  47. _ = ctx.JSONResp(rep)
  48. return
  49. }
  50. fmt.Println(auth)
  51. parts := strings.Split(auth, " ")
  52. fmt.Println(len(parts))
  53. if len(parts) != 2 || parts[0] != Bearer {
  54. logger.Error("token参数不符合格式" + auth)
  55. _ = ctx.JSONResp(rep)
  56. return
  57. }
  58. info, err := jwt.CheckToken(parts[1])
  59. if err != nil {
  60. logger.Error("token无效:%v", err)
  61. _ = ctx.JSONResp(rep)
  62. return
  63. }
  64. fmt.Println(info)
  65. //校验redis中是否合法
  66. redisToken := rd().GetString(redis.GenerateTokenKey(info.OpenId))
  67. if redisToken != parts[1] {
  68. logger.Error("token无效:用户token已刷新")
  69. _ = ctx.JSONResp(tokenExpired())
  70. return
  71. }
  72. fmt.Println()
  73. //组装用户信息
  74. var userInfo user.User
  75. userInfo, err = user.GetUserByOpenId(info.OpenId)
  76. fmt.Println(userInfo)
  77. if err != nil {
  78. logger.Error("获取用户信息失败:%v", err)
  79. _ = ctx.JSONResp(illegalUser())
  80. return
  81. }
  82. ctx.Input.SetData("user", userInfo)
  83. return
  84. }
  85. return
  86. }
  87. }
  88. func unAuthorized() controllers.BaseResponse {
  89. return controllers.BaseResponse{
  90. Ret: 401,
  91. Msg: UNAUTHORIZED,
  92. ErrMsg: exception.GetMsg(exception.Unauthorized),
  93. }
  94. }
  95. func tokenExpired() controllers.BaseResponse {
  96. return controllers.BaseResponse{
  97. Ret: 408,
  98. Msg: TOKENEXPIRED,
  99. ErrMsg: exception.GetMsg(exception.Unauthorized),
  100. }
  101. }
  102. func illegalUser() controllers.BaseResponse {
  103. return controllers.BaseResponse{
  104. Ret: 401,
  105. Msg: ILLEGALUSER,
  106. ErrMsg: exception.GetMsg(exception.Unauthorized),
  107. }
  108. }
  109. func allowed(path string) bool {
  110. for _, p := range publicRoutes {
  111. if stringUtils.IsBlank(p) {
  112. continue
  113. }
  114. src := baseUrl + p
  115. if strings.HasSuffix(p, "*") {
  116. target := src[:len(src)-1]
  117. if strings.HasPrefix(path, target) {
  118. return true
  119. }
  120. } else {
  121. if src == path {
  122. return true
  123. }
  124. }
  125. }
  126. return false
  127. }