JwtHandler.cs 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. // Admin.NET 项目的版权、商标、专利和其他相关权利均受相应法律法规的保护。使用本项目应遵守相关法律法规和许可证的要求。
  2. //
  3. // 本项目主要遵循 MIT 许可证和 Apache 许可证(版本 2.0)进行分发和使用。许可证位于源代码树根目录中的 LICENSE-MIT 和 LICENSE-APACHE 文件。
  4. //
  5. // 不得利用本项目从事危害国家安全、扰乱社会秩序、侵犯他人合法权益等法律法规禁止的活动!任何基于本项目二次开发而产生的一切法律纠纷和责任,我们不承担任何责任!
  6. using Admin.NET.Core;
  7. using Admin.NET.Core.Service;
  8. using Furion;
  9. using Furion.Authorization;
  10. using Furion.DataEncryption;
  11. using Microsoft.AspNetCore.Authorization;
  12. using Microsoft.AspNetCore.Http;
  13. using System;
  14. using System.Threading.Tasks;
  15. namespace Admin.NET.Web.Core;
  16. public class JwtHandler : AppAuthorizeHandler
  17. {
  18. private readonly SysCacheService _sysCacheService = App.GetRequiredService<SysCacheService>();
  19. private readonly SysConfigService _sysConfigService = App.GetRequiredService<SysConfigService>();
  20. private static readonly SysMenuService SysMenuService = App.GetRequiredService<SysMenuService>();
  21. /// <summary>
  22. /// 自动刷新Token
  23. /// </summary>
  24. /// <param name="context"></param>
  25. /// <param name="httpContext"></param>
  26. /// <returns></returns>
  27. public override async Task HandleAsync(AuthorizationHandlerContext context, DefaultHttpContext httpContext)
  28. {
  29. // 若当前账号存在黑名单中则授权失败
  30. var token = httpContext.Request.Headers["Authorization"].ToString().Replace("Bearer ", "");
  31. if (_sysCacheService.ExistKey($"{CacheConst.KeyBlacklist}{context.User.FindFirst(ClaimConst.UserId)?.Value}") ||
  32. _sysCacheService.ExistKey($"blacklist:token:{token}"))
  33. {
  34. context.Fail();
  35. context.GetCurrentHttpContext().SignoutToSwagger();
  36. return;
  37. }
  38. var tokenExpire = await _sysConfigService.GetTokenExpire();
  39. var refreshTokenExpire = await _sysConfigService.GetRefreshTokenExpire();
  40. if (JWTEncryption.AutoRefreshToken(context, context.GetCurrentHttpContext(), tokenExpire, refreshTokenExpire))
  41. {
  42. await AuthorizeHandleAsync(context);
  43. }
  44. else
  45. {
  46. context.Fail(); // 授权失败
  47. var currentHttpContext = context.GetCurrentHttpContext();
  48. if (currentHttpContext == null) return;
  49. // 跳过由于 SignatureAuthentication 引发的失败
  50. if (currentHttpContext.Items.ContainsKey(SignatureAuthenticationDefaults.AuthenticateFailMsgKey)) return;
  51. currentHttpContext.SignoutToSwagger();
  52. }
  53. }
  54. public override async Task<bool> PipelineAsync(AuthorizationHandlerContext context, DefaultHttpContext httpContext)
  55. {
  56. // 已自动验证 Jwt Token 有效性
  57. return await CheckAuthorizeAsync(httpContext);
  58. }
  59. /// <summary>
  60. /// 权限校验核心逻辑
  61. /// </summary>
  62. /// <param name="httpContext"></param>
  63. /// <returns></returns>
  64. private static async Task<bool> CheckAuthorizeAsync(DefaultHttpContext httpContext)
  65. {
  66. // 登录模式判断PC、APP
  67. if (App.User.FindFirst(ClaimConst.LoginMode)?.Value == ((int)LoginModeEnum.APP).ToString())
  68. return true;
  69. // 排除超管
  70. if (App.User.FindFirst(ClaimConst.AccountType)?.Value == ((int)AccountTypeEnum.SuperAdmin).ToString())
  71. return true;
  72. // 路由名称
  73. var routeName = httpContext.Request.Path.StartsWithSegments("/api")
  74. ? httpContext.Request.Path.Value![5..].Replace("/", ":")
  75. : httpContext.Request.Path.Value![1..].Replace("/", ":");
  76. // 获取用户拥有按钮权限集合
  77. var ownBtnPermList = await SysMenuService.GetOwnBtnPermList();
  78. if (ownBtnPermList.Exists(u => routeName.Equals(u, StringComparison.CurrentCultureIgnoreCase)))
  79. return true;
  80. // 获取系统所有按钮权限集合
  81. var allBtnPermList = await SysMenuService.GetAllBtnPermList();
  82. return allBtnPermList.TrueForAll(u => !routeName.Equals(u, StringComparison.CurrentCultureIgnoreCase));
  83. }
  84. }