JwtHandler.cs 4.2 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. // Admin.NET 项目的版权、商标、专利和其他相关权利均受相应法律法规的保护。使用本项目应遵守相关法律法规和许可证的要求。
  2. //
  3. // 本项目主要遵循 MIT 许可证和 Apache 许可证(版本 2.0)进行分发和使用。许可证位于源代码树根目录中的 LICENSE-MIT 和 LICENSE-APACHE 文件。
  4. //
  5. // 不得利用本项目从事危害国家安全、扰乱社会秩序、侵犯他人合法权益等法律法规禁止的活动!任何基于本项目二次开发而产生的一切法律纠纷和责任,我们不承担任何责任!
  6. using Admin.NET.Core;
  7. using Admin.NET.Core.Service;
  8. using Furion;
  9. using Furion.Authorization;
  10. using Furion.DataEncryption;
  11. using Microsoft.AspNetCore.Authorization;
  12. using Microsoft.AspNetCore.Http;
  13. using System;
  14. using System.Threading.Tasks;
  15. namespace Admin.NET.Web.Core;
  16. public class JwtHandler : AppAuthorizeHandler
  17. {
  18. private readonly SysCacheService _sysCacheService = App.GetRequiredService<SysCacheService>();
  19. private readonly SysConfigService _sysConfigService = App.GetRequiredService<SysConfigService>();
  20. private static readonly SysMenuService SysMenuService = App.GetRequiredService<SysMenuService>();
  21. /// <summary>
  22. /// 自动刷新Token
  23. /// </summary>
  24. /// <param name="context"></param>
  25. /// <param name="httpContext"></param>
  26. /// <returns></returns>
  27. public override async Task HandleAsync(AuthorizationHandlerContext context, DefaultHttpContext httpContext)
  28. {
  29. var userId = context.User.FindFirst(ClaimConst.UserId)?.Value;
  30. var token = httpContext.Request.Headers["Authorization"].ToString().Replace("Bearer ", "");
  31. // 🛡️ 黑名单校验(包括用户和token)
  32. if (_sysCacheService.ExistKey($"{CacheConst.KeyBlacklist}{userId}") ||
  33. _sysCacheService.ExistKey($"blacklist:token:{token}"))
  34. {
  35. context.Fail();
  36. context.GetCurrentHttpContext().SignoutToSwagger();
  37. return;
  38. }
  39. var tokenExpire = await _sysConfigService.GetTokenExpire();
  40. var refreshTokenExpire = await _sysConfigService.GetRefreshTokenExpire();
  41. if (JWTEncryption.AutoRefreshToken(context, context.GetCurrentHttpContext(), tokenExpire, refreshTokenExpire))
  42. {
  43. await AuthorizeHandleAsync(context);
  44. }
  45. else
  46. {
  47. context.Fail(); // 授权失败
  48. var currentHttpContext = context.GetCurrentHttpContext();
  49. if (currentHttpContext == null) return;
  50. // 跳过由于 SignatureAuthentication 引发的失败
  51. if (currentHttpContext.Items.ContainsKey(SignatureAuthenticationDefaults.AuthenticateFailMsgKey)) return;
  52. currentHttpContext.SignoutToSwagger();
  53. }
  54. }
  55. public override async Task<bool> PipelineAsync(AuthorizationHandlerContext context, DefaultHttpContext httpContext)
  56. {
  57. // 已自动验证 Jwt Token 有效性
  58. return await CheckAuthorizeAsync(httpContext);
  59. }
  60. /// <summary>
  61. /// 权限校验核心逻辑
  62. /// </summary>
  63. /// <param name="httpContext"></param>
  64. /// <returns></returns>
  65. private static async Task<bool> CheckAuthorizeAsync(DefaultHttpContext httpContext)
  66. {
  67. // 登录模式判断PC、APP
  68. if (App.User.FindFirst(ClaimConst.LoginMode)?.Value == ((int)LoginModeEnum.APP).ToString())
  69. return true;
  70. // 排除超管
  71. if (App.User.FindFirst(ClaimConst.AccountType)?.Value == ((int)AccountTypeEnum.SuperAdmin).ToString())
  72. return true;
  73. // 路由名称
  74. var routeName = httpContext.Request.Path.StartsWithSegments("/api")
  75. ? httpContext.Request.Path.Value![5..].Replace("/", ":")
  76. : httpContext.Request.Path.Value![1..].Replace("/", ":");
  77. // 获取用户拥有按钮权限集合
  78. var ownBtnPermList = await SysMenuService.GetOwnBtnPermList();
  79. if (ownBtnPermList.Exists(u => routeName.Equals(u, StringComparison.CurrentCultureIgnoreCase)))
  80. return true;
  81. // 获取系统所有按钮权限集合
  82. var allBtnPermList = await SysMenuService.GetAllBtnPermList();
  83. return allBtnPermList.TrueForAll(u => !routeName.Equals(u, StringComparison.CurrentCultureIgnoreCase));
  84. }
  85. }