JwtHandler.cs 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107
  1. // 大名科技(天津)有限公司 版权所有
  2. //
  3. // 此源代码遵循位于源代码树根目录中的 LICENSE 文件的许可证
  4. //
  5. // 不得利用本项目从事危害国家安全、扰乱社会秩序、侵犯他人合法权益等法律法规禁止的活动
  6. //
  7. // 任何基于本项目二次开发而产生的一切法律纠纷和责任,均与作者无关
  8. using Admin.NET.Core;
  9. using Admin.NET.Core.Service;
  10. using Furion;
  11. using Furion.Authorization;
  12. using Furion.DataEncryption;
  13. using Microsoft.AspNetCore.Authorization;
  14. using Microsoft.AspNetCore.Http;
  15. using Microsoft.Extensions.DependencyInjection;
  16. using System;
  17. using System.Threading.Tasks;
  18. namespace Admin.NET.Web.Core
  19. {
  20. public class JwtHandler : AppAuthorizeHandler
  21. {
  22. private readonly IServiceProvider _serviceProvider;
  23. public JwtHandler(IServiceProvider serviceProvider)
  24. {
  25. _serviceProvider = serviceProvider;
  26. }
  27. /// <summary>
  28. /// 自动刷新Token
  29. /// </summary>
  30. /// <param name="context"></param>
  31. /// <returns></returns>
  32. public override async Task HandleAsync(AuthorizationHandlerContext context)
  33. {
  34. // var serviceProvider = context.GetCurrentHttpContext().RequestServices;
  35. using var serviceScope = _serviceProvider.CreateScope();
  36. // 若当前账号存在黑名单中则授权失败
  37. var sysCacheService = serviceScope.ServiceProvider.GetService<SysCacheService>();
  38. if (sysCacheService.ExistKey($"{CacheConst.KeyBlacklist}{context.User.FindFirst(ClaimConst.UserId)?.Value}"))
  39. {
  40. context.Fail();
  41. context.GetCurrentHttpContext().SignoutToSwagger();
  42. return;
  43. }
  44. var sysConfigService = serviceScope.ServiceProvider.GetService<SysConfigService>();
  45. var tokenExpire = await sysConfigService.GetTokenExpire();
  46. var refreshTokenExpire = await sysConfigService.GetRefreshTokenExpire();
  47. if (JWTEncryption.AutoRefreshToken(context, context.GetCurrentHttpContext(), tokenExpire, refreshTokenExpire))
  48. {
  49. await AuthorizeHandleAsync(context);
  50. }
  51. else
  52. {
  53. context.Fail(); // 授权失败
  54. var currentHttpContext = context.GetCurrentHttpContext();
  55. if (currentHttpContext == null)
  56. return;
  57. // 跳过由于 SignatureAuthentication 引发的失败
  58. if (currentHttpContext.Items.ContainsKey(SignatureAuthenticationDefaults.AuthenticateFailMsgKey))
  59. return;
  60. currentHttpContext.SignoutToSwagger();
  61. }
  62. }
  63. public override async Task<bool> PipelineAsync(AuthorizationHandlerContext context, DefaultHttpContext httpContext)
  64. {
  65. // 已自动验证 Jwt Token 有效性
  66. return await CheckAuthorizeAsync(httpContext);
  67. }
  68. /// <summary>
  69. /// 权限校验核心逻辑
  70. /// </summary>
  71. /// <param name="httpContext"></param>
  72. /// <returns></returns>
  73. private static async Task<bool> CheckAuthorizeAsync(DefaultHttpContext httpContext)
  74. {
  75. // 登录模式判断PC、APP
  76. if (App.User.FindFirst(ClaimConst.LoginMode)?.Value == ((int)LoginModeEnum.APP).ToString())
  77. return true;
  78. // 排除超管
  79. if (App.User.FindFirst(ClaimConst.AccountType)?.Value == ((int)AccountTypeEnum.SuperAdmin).ToString())
  80. return true;
  81. // 路由名称
  82. var routeName = httpContext.Request.Path.StartsWithSegments("/api")
  83. ? httpContext.Request.Path.Value[5..].Replace("/", ":")
  84. : httpContext.Request.Path.Value[1..].Replace("/", ":");
  85. // 获取用户拥有按钮权限集合
  86. var ownBtnPermList = await App.GetService<SysMenuService>().GetOwnBtnPermList();
  87. // 获取系统所有按钮权限集合
  88. var allBtnPermList = await App.GetService<SysMenuService>().GetAllBtnPermList();
  89. // 已拥有该按钮权限或者所有按钮集合里面不存在
  90. var exist1 = ownBtnPermList.Exists(u => routeName.Equals(u, StringComparison.CurrentCultureIgnoreCase));
  91. var exist2 = allBtnPermList.TrueForAll(u => !routeName.Equals(u, StringComparison.CurrentCultureIgnoreCase));
  92. return exist1 || exist2;
  93. }
  94. }
  95. }