auth_middleware.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137
  1. package middleware
  2. import (
  3. "eta/eta_mini_ht_api/common/component/cache"
  4. logger "eta/eta_mini_ht_api/common/component/log"
  5. "eta/eta_mini_ht_api/common/exception"
  6. "eta/eta_mini_ht_api/common/utils/jwt"
  7. "eta/eta_mini_ht_api/common/utils/redis"
  8. stringUtils "eta/eta_mini_ht_api/common/utils/string"
  9. "eta/eta_mini_ht_api/controllers"
  10. "eta/eta_mini_ht_api/service/user"
  11. "fmt"
  12. "github.com/beego/beego/v2/server/web"
  13. "github.com/beego/beego/v2/server/web/context"
  14. "strings"
  15. )
  16. var (
  17. rdCache *cache.RedisCache
  18. )
  19. const (
  20. ILLEGALUSER = "用户信息异常"
  21. UNAUTHORIZED = "请重新登录"
  22. TOKENEXPIRED = "token过期"
  23. FORBIDDEN = "禁止访问"
  24. NOTFOUND = "未找到"
  25. authorization = "Authorization"
  26. baseUrl = "/htapi"
  27. Bearer = "Bearer"
  28. )
  29. func rd() *cache.RedisCache {
  30. if rdCache == nil {
  31. rdCache = cache.GetInstance()
  32. }
  33. return rdCache
  34. }
  35. var publicRoutes = []string{
  36. "/auth/refreshToken",
  37. "/auth/bind_gzh",
  38. }
  39. func AuthMiddleware() web.FilterFunc {
  40. return func(ctx *context.Context) {
  41. path := ctx.Input.URL()
  42. logger.Info("请求路径:%v", path)
  43. if !allowed(path) {
  44. rep := unAuthorized()
  45. auth := ctx.Input.Header(authorization)
  46. if auth == "" {
  47. logger.Error("token信息不存在")
  48. _ = ctx.JSONResp(rep)
  49. return
  50. }
  51. fmt.Println(auth)
  52. parts := strings.Split(auth, " ")
  53. fmt.Println(len(parts))
  54. if len(parts) != 2 || parts[0] != Bearer {
  55. logger.Error("token参数不符合格式" + auth)
  56. _ = ctx.JSONResp(rep)
  57. return
  58. }
  59. info, err := jwt.CheckToken(parts[1])
  60. if err != nil {
  61. logger.Error("token无效:%v", err)
  62. _ = ctx.JSONResp(rep)
  63. return
  64. }
  65. fmt.Println(info)
  66. //校验redis中是否合法
  67. redisToken := rd().GetString(redis.GenerateTokenKey(info.OpenId))
  68. if redisToken != parts[1] {
  69. logger.Error("token无效:用户token已刷新")
  70. _ = ctx.JSONResp(tokenExpired())
  71. return
  72. }
  73. fmt.Println()
  74. //组装用户信息
  75. var userInfo user.User
  76. userInfo, err = user.GetUserByOpenId(info.OpenId)
  77. fmt.Println(userInfo)
  78. if err != nil {
  79. logger.Error("获取用户信息失败:%v", err)
  80. _ = ctx.JSONResp(illegalUser())
  81. return
  82. }
  83. ctx.Input.SetData("user", userInfo)
  84. return
  85. }
  86. return
  87. }
  88. }
  89. func unAuthorized() controllers.BaseResponse {
  90. return controllers.BaseResponse{
  91. Ret: 401,
  92. Msg: UNAUTHORIZED,
  93. ErrMsg: exception.GetMsg(exception.Unauthorized),
  94. }
  95. }
  96. func tokenExpired() controllers.BaseResponse {
  97. return controllers.BaseResponse{
  98. Ret: 408,
  99. Msg: TOKENEXPIRED,
  100. ErrMsg: exception.GetMsg(exception.Unauthorized),
  101. }
  102. }
  103. func illegalUser() controllers.BaseResponse {
  104. return controllers.BaseResponse{
  105. Ret: 401,
  106. Msg: ILLEGALUSER,
  107. ErrMsg: exception.GetMsg(exception.Unauthorized),
  108. }
  109. }
  110. func allowed(path string) bool {
  111. for _, p := range publicRoutes {
  112. if stringUtils.IsBlank(p) {
  113. continue
  114. }
  115. src := baseUrl + p
  116. if strings.HasSuffix(p, "*") {
  117. target := src[:len(src)-1]
  118. if strings.HasPrefix(path, target) {
  119. return true
  120. }
  121. } else {
  122. if src == path {
  123. return true
  124. }
  125. }
  126. }
  127. return false
  128. }