-
Notifications
You must be signed in to change notification settings - Fork 0
/
jwt.go
123 lines (111 loc) · 3.66 KB
/
jwt.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
package Middlewares
import (
"errors"
"github.com/dgrijalva/jwt-go"
"github.com/gin-gonic/gin"
"github.com/hewenyu/gin-simple/Models/request"
"github.com/hewenyu/gin-simple/Models/response"
)
/*
JWTAuth 简易的jwt认证
*/
func JWTAuth() gin.HandlerFunc {
return func(c *gin.Context) {
// 我们这里jwt鉴权取头部信息 x-token 登录时回返回token信息 这里前端需要把token存储到cookie或者本地localStorage中 不过需要跟后端协商过期时间 可以约定刷新令牌或者重新登录
token := c.Request.Header.Get("x-token")
if token == "" {
response.FailWithDetailed(gin.H{"reload": true}, "未登录或非法访问", c)
c.Abort()
return
}
// if service.IsBlacklist(token) {
// response.FailWithDetailed(gin.H{"reload": true}, "您的帐户异地登陆或令牌失效", c)
// c.Abort()
// return
// }
j := NewJWT()
// parseToken 解析token包含的信息
claims, err := j.ParseToken(token)
if err != nil {
if err == TokenExpired {
response.FailWithDetailed(gin.H{"reload": true}, "授权已过期", c)
c.Abort()
return
}
response.FailWithDetailed(gin.H{"reload": true}, err.Error(), c)
c.Abort()
return
}
// if err, _ = service.FindUserByUuid(claims.UUID.String()); err != nil {
// _ = service.JsonInBlacklist(model.JwtBlacklist{Jwt: token})
// response.FailWithDetailed(gin.H{"reload": true}, err.Error(), c)
// c.Abort()
// }
// if claims.ExpiresAt-time.Now().Unix() < claims.BufferTime {
// claims.ExpiresAt = time.Now().Unix() + global.GVA_CONFIG.JWT.ExpiresTime
// newToken, _ := j.CreateToken(*claims)
// newClaims, _ := j.ParseToken(newToken)
// c.Header("new-token", newToken)
// c.Header("new-expires-at", strconv.FormatInt(newClaims.ExpiresAt, 10))
// if global.GVA_CONFIG.System.UseMultipoint {
// err, RedisJwtToken := service.GetRedisJWT(newClaims.Username)
// if err != nil {
// global.GVA_LOG.Error("get redis jwt failed", zap.Any("err", err))
// } else { // 当之前的取成功时才进行拉黑操作
// _ = service.JsonInBlacklist(model.JwtBlacklist{Jwt: RedisJwtToken})
// }
// // 无论如何都要记录当前的活跃状态
// _ = service.SetRedisJWT(newToken, newClaims.Username)
// }
// }
c.Set("claims", claims)
c.Next()
}
}
type JWT struct {
SigningKey []byte
}
var (
TokenExpired = errors.New("Token is expired")
TokenNotValidYet = errors.New("Token not active yet")
TokenMalformed = errors.New("That's not even a token")
TokenInvalid = errors.New("Couldn't handle this token:")
)
func NewJWT() *JWT {
return &JWT{
[]byte("28asUuqRc6QlgDr7Y7aT9FrVpkd3cps8"),
}
}
// 创建一个token
func (j *JWT) CreateToken(claims request.CustomClaims) (string, error) {
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
return token.SignedString(j.SigningKey)
}
// 解析 token
func (j *JWT) ParseToken(tokenString string) (*request.CustomClaims, error) {
token, err := jwt.ParseWithClaims(tokenString, &request.CustomClaims{}, func(token *jwt.Token) (i interface{}, e error) {
return j.SigningKey, nil
})
if err != nil {
if ve, ok := err.(*jwt.ValidationError); ok {
if ve.Errors&jwt.ValidationErrorMalformed != 0 {
return nil, TokenMalformed
} else if ve.Errors&jwt.ValidationErrorExpired != 0 {
// Token is expired
return nil, TokenExpired
} else if ve.Errors&jwt.ValidationErrorNotValidYet != 0 {
return nil, TokenNotValidYet
} else {
return nil, TokenInvalid
}
}
}
if token != nil {
if claims, ok := token.Claims.(*request.CustomClaims); ok && token.Valid {
return claims, nil
}
return nil, TokenInvalid
} else {
return nil, TokenInvalid
}
}