123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124 |
- package middleware
- import (
- "net/http"
- "regexp"
- "time"
- "github.com/gin-gonic/gin"
- "github.com/go-nunu/nunu-layout-advanced/pkg/helper/resp"
- "github.com/go-nunu/nunu-layout-advanced/pkg/log"
- "github.com/golang-jwt/jwt/v5"
- "github.com/spf13/viper"
- "go.uber.org/zap"
- )
- type JWT struct {
- key []byte
- }
- type MyCustomClaims struct {
- UserId string
- jwt.RegisteredClaims
- }
- func NewJwt(conf *viper.Viper) *JWT {
- return &JWT{key: []byte(conf.GetString("security.jwt.key"))}
- }
- func (j *JWT) GenToken(userId string, expiresAt time.Time) (string, error) {
- token := jwt.NewWithClaims(jwt.SigningMethodHS256, MyCustomClaims{
- UserId: userId,
- RegisteredClaims: jwt.RegisteredClaims{
- ExpiresAt: jwt.NewNumericDate(expiresAt),
- IssuedAt: jwt.NewNumericDate(time.Now()),
- NotBefore: jwt.NewNumericDate(time.Now()),
- Issuer: "",
- Subject: "",
- ID: "",
- Audience: []string{},
- },
- })
- // Sign and get the complete encoded token as a string using the key
- tokenString, err := token.SignedString(j.key)
- if err != nil {
- return "", err
- }
- return tokenString, nil
- }
- func (j *JWT) ParseToken(tokenString string) (*MyCustomClaims, error) {
- re := regexp.MustCompile(`(?i)Bearer `)
- tokenString = re.ReplaceAllString(tokenString, "")
- token, err := jwt.ParseWithClaims(tokenString, &MyCustomClaims{}, func(token *jwt.Token) (interface{}, error) {
- return j.key, nil
- })
- if claims, ok := token.Claims.(*MyCustomClaims); ok && token.Valid {
- return claims, nil
- } else {
- return nil, err
- }
- }
- func StrictAuth(j *JWT, logger *log.Logger) gin.HandlerFunc {
- return func(ctx *gin.Context) {
- tokenString := ctx.Request.Header.Get("Authorization")
- if tokenString == "" {
- logger.WithContext(ctx).Warn("请求未携带token,无权限访问", zap.Any("data", map[string]interface{}{
- "url": ctx.Request.URL,
- "params": ctx.Params,
- }))
- resp.HandleError(ctx, http.StatusUnauthorized, 1, "no token", nil)
- ctx.Abort()
- return
- }
- claims, err := j.ParseToken(tokenString)
- if err != nil {
- logger.WithContext(ctx).Error("token error", zap.Any("data", map[string]interface{}{
- "url": ctx.Request.URL,
- "params": ctx.Params,
- }))
- resp.HandleError(ctx, http.StatusUnauthorized, 1, err.Error(), nil)
- ctx.Abort()
- return
- }
- ctx.Set("claims", claims)
- recoveryLoggerFunc(ctx, logger)
- ctx.Next()
- }
- }
- func NoStrictAuth(j *JWT, logger *log.Logger) gin.HandlerFunc {
- return func(ctx *gin.Context) {
- tokenString := ctx.Request.Header.Get("Authorization")
- if tokenString == "" {
- tokenString, _ = ctx.Cookie("accessToken")
- }
- if tokenString == "" {
- tokenString = ctx.Query("accessToken")
- }
- if tokenString == "" {
- ctx.Next()
- return
- }
- claims, err := j.ParseToken(tokenString)
- if err != nil {
- ctx.Next()
- return
- }
- ctx.Set("claims", claims)
- recoveryLoggerFunc(ctx, logger)
- ctx.Next()
- }
- }
- func recoveryLoggerFunc(ctx *gin.Context, logger *log.Logger) {
- userInfo := ctx.MustGet("claims").(*MyCustomClaims)
- logger.NewContext(ctx, zap.String("UserId", userInfo.UserId))
- }
|