百木园-与人分享,
就是让自己快乐。

Golang的JWT权限校验解析

JWT校验

配置文件

package config

type JWT struct {
	SigningKey  string `json:\"signingKey\" yaml:\"signing-key\"`   // jwt签名
	ExpiresTime int64  `json:\"expiresTime\" yaml:\"expires-time\"` // 过期时间
	Issuer      string `json:\"issuer\" yaml:\"issuer\"`            // 签发者
}

工具结构体

package pkg

import (
	\"errors\"
	\"time\"

	\"catering/global\"
	\"catering/model/system/request\"

	\"github.com/dgrijalva/jwt-go\"
)

type JWT struct {
	SigningKey []byte
}

var (
	ErrTokenExpired     = errors.New(\"token is expired\")
	ErrTokenNotValidYet = errors.New(\"token not active yet\")
	ErrTokenMalformed   = errors.New(\"that\'s not even a token\")
	ErrTokenInvalid     = errors.New(\"couldn\'t handle this token\")
)

func NewJWT() *JWT {
	return &JWT{
		[]byte(global.Config.JWT.SigningKey),
	}
}

//生成claims
func (j *JWT) CreateClaims(baseClaims request.BaseClaims) request.CustomClaims {
	claims := request.CustomClaims{
		BaseClaims: baseClaims,
		StandardClaims: jwt.StandardClaims{
			NotBefore: time.Now().Unix() - 1000,                          // 签名生效时间
			ExpiresAt: time.Now().Unix() + global.Config.JWT.ExpiresTime, // 过期时间 7天  配置文件
			Issuer:    global.Config.JWT.Issuer,                          // 签名的发行者
		},
	}
	return claims
}

// 创建一个token
func (j *JWT) CreateToken(claims request.CustomClaims) (string, error) {
	//对token进行签名加密
	token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
	return token.SignedString(j.SigningKey)
}

// CreateTokenByOldToken 旧token 换新token 用concurrency_control对token进行加锁避免并发问题(加锁粒度为oldToken)
func (j *JWT) CreateTokenByOldToken(oldToken string, claims request.CustomClaims) (string, error) {
	v, err, _ := global.Concurrency_Control.Do(\"JWT:\"+oldToken, func() (interface{}, error) {
		return j.CreateToken(claims)
	})
	return v.(string), err
}

// 解析 token
func (j *JWT) ParseToken(tokenString string) (*request.CustomClaims, error) {
	token, err := jwt.ParseWithClaims(tokenString, &request.CustomClaims{}, func(token *jwt.Token) (i interface{}, e error) {
		return j.SigningKey, nil
	})
	if err != nil {
		if ve, ok := err.(*jwt.ValidationError); ok {
			if ve.Errors&jwt.ValidationErrorMalformed != 0 {
				return nil, ErrTokenMalformed
			} else if ve.Errors&jwt.ValidationErrorExpired != 0 {
				// Token is expired
				return nil, ErrTokenExpired
			} else if ve.Errors&jwt.ValidationErrorNotValidYet != 0 {
				return nil, ErrTokenNotValidYet
			} else {
				return nil, ErrTokenInvalid
			}
		}
	}
	if token != nil {
		if claims, ok := token.Claims.(*request.CustomClaims); ok && token.Valid {
			return claims, nil
		}
		return nil, ErrTokenInvalid

	} else {
		return nil, ErrTokenInvalid
	}
}

使用

登录获取token

func (b *BaseApi) Login(c *gin.Context) {
	var l systemReq.Login
	msg, err := valid.BindAndValid(c, &l)
	if err != nil {
		response.FailWithMessage(msg, c)
		return
	}
	if store.Verify(l.CaptchaId, l.Captcha, true) {
		u := &system.SysUser{Username: l.Username, Password: l.Password}
		if err, user := userService.Login(u); err != nil {
			global.Log.Error(\"登陆失败! 用户名不存在或者密码错误!\", zap.Error(err))
			response.FailWithMessage(\"用户名不存在或者密码错误\", c)
		} else {
			//登录成功,生成token
			b.tokenNext(c, *user)
		}
	} else {
		response.FailWithMessage(\"验证码错误\", c)
	}
}

// 登录以后签发jwt
func (b *BaseApi) tokenNext(c *gin.Context, user system.SysUser) {
	j := pkg.NewJWT()
	//新建claims
	claims := j.CreateClaims(systemReq.BaseClaims{
		UUID:        user.UUID,
		ID:          uint(user.ID),
		NickName:    user.NickName,
		Username:    user.Username,
		AuthorityId: user.AuthorityId,
	})
	//生成token
	token, err := j.CreateToken(claims)
	if err != nil {
		global.Log.Error(\"获取token失败!\", zap.Error(err))
		response.FailWithMessage(\"获取token失败\", c)
		return
	}
	//生成session
	session, err := global.SESSION.Get(c.Request, \"SessionId\")
	if err != nil {
		fmt.Println(err)
	}
	session.Values[\"token\"] = token
	//把session数据存放到cookie并在response的head中返回
	session.Save(c.Request, c.Writer)
	//返回token
	response.OkWithDetailed(systemRes.LoginResponse{
		User:      user,
		Token:     token,
		ExpiresAt: claims.StandardClaims.ExpiresAt * 1000,
	}, \"登录成功\", c)
	return
}

在中间件中进行校验

package middleware

import (
	\"strconv\"
	\"time\"

	\"catering/pkg\"

	\"catering/global\"
	\"catering/model/common/response\"

	\"github.com/gin-gonic/gin\"
)

func JWTAuth() gin.HandlerFunc {
	return func(c *gin.Context) {
		// 我们这里jwt鉴权取头部信息 x-token 登录时回返回token信息
		token := c.Request.Header.Get(\"x-token\")
		if token == \"\" {
			response.FailWithDetailed(gin.H{\"reload\": true}, \"未登录或非法访问\", c)
			c.Abort()
			return
		}

		// 获取session
		session, _ := global.SESSION.Get(c.Request, \"SessionId\")
		t := session.Values[\"token\"]

		//判断session和对session中的token进行比对
		if tk, ok := t.(string); !ok {
			response.FailWithDetailed(gin.H{\"reload\": true}, \"授权已过期\", c)
			c.Abort()
			return
		} else if tk != token {
			response.FailWithDetailed(gin.H{\"reload\": true}, \"授权已过期\", c)
			c.Abort()
			return
		}

		j := pkg.NewJWT()
		// parseToken 解析token包含的信息
		// 判断该token是否已经到达有效期
		claims, err := j.ParseToken(token)
		if err != nil {
			if err == pkg.ErrTokenExpired {
				response.FailWithDetailed(gin.H{\"reload\": true}, \"授权已过期\", c)
				c.Abort()
				return
			}
			response.FailWithDetailed(gin.H{\"reload\": true}, err.Error(), c)
			c.Abort()
			return
		}
		//把解析出来的用户数据存入上下文中,方便后续的调用
		c.Set(\"claims\", claims)
		c.Next()
	}
}

用法

//获取用户动态路由,返回包括系统菜单详情列表
func (a *AuthorityMenuApi) GetMenu(c *gin.Context) {
    //其中pkg.GetUserAuthorityId是通过上下文获取,也就是ctx.Get(\"claims\")
	if err, menus := menuService.GetMenuTree(pkg.GetUserAuthorityId(c)); err != nil {
		global.Log.Error(\"获取失败!\", zap.Error(err))
		response.FailWithMessage(\"获取失败\", c)
	} else {
		if menus == nil {
			menus = []system.SysMenu{}
		}
		response.OkWithDetailed(systemRes.SysMenusResponse{Menus: menus}, \"获取成功\", c)
	}
}


// pakcage pkg
// 从Gin的Context中获取从jwt解析出来的用户角色id
func GetUserAuthorityId(c *gin.Context) string {
	if claims, exists := c.Get(\"claims\"); !exists {
		if cl, err := GetClaims(c); err != nil {
			return \"\"
		} else {
			return cl.AuthorityId
		}
	} else {
		waitUse := claims.(*systemReq.CustomClaims)
		return waitUse.AuthorityId
	}
}

来源:https://www.cnblogs.com/xiaofua/p/16179330.html
本站部分图文来源于网络,如有侵权请联系删除。

未经允许不得转载:百木园 » Golang的JWT权限校验解析

相关推荐

  • 暂无文章