104 lines
4.5 KiB
C#
104 lines
4.5 KiB
C#
|
// Admin.NET 项目的版权、商标、专利和其他相关权利均受相应法律法规的保护。使用本项目应遵守相关法律法规和许可证的要求。
|
|||
|
//
|
|||
|
// 本项目主要遵循 MIT 许可证和 Apache 许可证(版本 2.0)进行分发和使用。许可证位于源代码树根目录中的 LICENSE-MIT 和 LICENSE-APACHE 文件。
|
|||
|
//
|
|||
|
// 不得利用本项目从事危害国家安全、扰乱社会秩序、侵犯他人合法权益等法律法规禁止的活动!任何基于本项目二次开发而产生的一切法律纠纷和责任,我们不承担任何责任!
|
|||
|
|
|||
|
using Admin.NET.Core;
|
|||
|
using Admin.NET.Core.Service;
|
|||
|
using Furion;
|
|||
|
using Furion.Authorization;
|
|||
|
using Furion.DataEncryption;
|
|||
|
using Microsoft.AspNetCore.Authorization;
|
|||
|
using Microsoft.AspNetCore.Http;
|
|||
|
using Microsoft.Extensions.DependencyInjection;
|
|||
|
using System;
|
|||
|
using System.Threading.Tasks;
|
|||
|
|
|||
|
namespace Admin.NET.Web.Core
|
|||
|
{
|
|||
|
public class JwtHandler : AppAuthorizeHandler
|
|||
|
{
|
|||
|
private readonly IServiceProvider _serviceProvider;
|
|||
|
|
|||
|
public JwtHandler(IServiceProvider serviceProvider)
|
|||
|
{
|
|||
|
_serviceProvider = serviceProvider;
|
|||
|
}
|
|||
|
|
|||
|
/// <summary>
|
|||
|
/// 自动刷新Token
|
|||
|
/// </summary>
|
|||
|
/// <param name="context"></param>
|
|||
|
/// <param name="httpContext"></param>
|
|||
|
/// <returns></returns>
|
|||
|
public override async Task HandleAsync(AuthorizationHandlerContext context, DefaultHttpContext httpContext)
|
|||
|
{
|
|||
|
// var serviceProvider = context.GetCurrentHttpContext().RequestServices;
|
|||
|
using var serviceScope = _serviceProvider.CreateScope();
|
|||
|
|
|||
|
// 若当前账号存在黑名单中则授权失败
|
|||
|
var sysCacheService = serviceScope.ServiceProvider.GetRequiredService<SysCacheService>();
|
|||
|
if (sysCacheService.ExistKey($"{CacheConst.KeyBlacklist}{context.User.FindFirst(ClaimConst.UserId)?.Value}"))
|
|||
|
{
|
|||
|
context.Fail();
|
|||
|
context.GetCurrentHttpContext().SignoutToSwagger();
|
|||
|
return;
|
|||
|
}
|
|||
|
|
|||
|
// 验证Token版本号
|
|||
|
|
|||
|
var sysConfigService = serviceScope.ServiceProvider.GetRequiredService<SysConfigService>();
|
|||
|
var tokenExpire = await sysConfigService.GetTokenExpire();
|
|||
|
var refreshTokenExpire = await sysConfigService.GetRefreshTokenExpire();
|
|||
|
if (JWTEncryption.AutoRefreshToken(context, context.GetCurrentHttpContext(), tokenExpire, refreshTokenExpire))
|
|||
|
{
|
|||
|
await AuthorizeHandleAsync(context);
|
|||
|
}
|
|||
|
else
|
|||
|
{
|
|||
|
context.Fail(); // 授权失败
|
|||
|
var currentHttpContext = context.GetCurrentHttpContext();
|
|||
|
if (currentHttpContext == null)
|
|||
|
return;
|
|||
|
// 跳过由于 SignatureAuthentication 引发的失败
|
|||
|
if (currentHttpContext.Items.ContainsKey(SignatureAuthenticationDefaults.AuthenticateFailMsgKey))
|
|||
|
return;
|
|||
|
currentHttpContext.SignoutToSwagger();
|
|||
|
}
|
|||
|
}
|
|||
|
|
|||
|
public override async Task<bool> PipelineAsync(AuthorizationHandlerContext context, DefaultHttpContext httpContext)
|
|||
|
{
|
|||
|
// 已自动验证 Jwt Token 有效性
|
|||
|
return await CheckAuthorizeAsync(httpContext);
|
|||
|
}
|
|||
|
|
|||
|
/// <summary>
|
|||
|
/// 权限校验核心逻辑
|
|||
|
/// </summary>
|
|||
|
/// <param name="httpContext"></param>
|
|||
|
/// <returns></returns>
|
|||
|
private static async Task<bool> CheckAuthorizeAsync(DefaultHttpContext httpContext)
|
|||
|
{
|
|||
|
// 排除超管账号
|
|||
|
if (App.User.FindFirst(ClaimConst.AccountType)?.Value == ((int)AccountTypeEnum.SuperAdmin).ToString())
|
|||
|
return true;
|
|||
|
|
|||
|
// 当前接口路由
|
|||
|
var path = httpContext.Request.Path.ToString();
|
|||
|
|
|||
|
// 获取当前用户按钮权限集合和接口黑名单
|
|||
|
var serviceScope = httpContext.RequestServices.CreateScope();
|
|||
|
var sysRoleService = serviceScope.ServiceProvider.GetRequiredService<SysRoleService>();
|
|||
|
var roleApis = await sysRoleService.GetUserApiList();
|
|||
|
|
|||
|
// 若当前路由在按钮权限集合里面则放行
|
|||
|
if (roleApis[0].Exists(u => path.EndsWith(u, StringComparison.CurrentCultureIgnoreCase)))
|
|||
|
return true;
|
|||
|
|
|||
|
// 若当前路由在已接口黑名单里面则禁止
|
|||
|
return roleApis[1].TrueForAll(u => !path.EndsWith(u, StringComparison.CurrentCultureIgnoreCase));
|
|||
|
}
|
|||
|
}
|
|||
|
}
|