| | |
| | | package com.ruoyi.framework.security.service;
|
| | |
|
| | | import java.util.HashMap;
|
| | | import java.util.Map;
|
| | | import java.util.concurrent.TimeUnit;
|
| | | import javax.servlet.http.HttpServletRequest;
|
| | | import org.springframework.beans.factory.annotation.Autowired;
|
| | | import org.springframework.beans.factory.annotation.Value;
|
| | | import org.springframework.stereotype.Component;
|
| | | import com.baomidou.mybatisplus.core.conditions.query.LambdaQueryWrapper;
|
| | | import com.ruoyi.common.constant.CacheConstants;
|
| | | import com.ruoyi.common.constant.Constants;
|
| | | import com.ruoyi.common.utils.ServletUtils;
|
| | |
| | | import com.ruoyi.common.utils.uuid.IdUtils;
|
| | | import com.ruoyi.framework.redis.RedisCache;
|
| | | import com.ruoyi.framework.security.LoginUser;
|
| | | import com.ruoyi.project.system.domain.SysRole;
|
| | | import com.ruoyi.project.system.domain.SysUserDept;
|
| | | import com.ruoyi.project.system.mapper.SysUserDeptMapper;
|
| | | import eu.bitwalker.useragentutils.UserAgent;
|
| | | import io.jsonwebtoken.Claims;
|
| | | import io.jsonwebtoken.Jwts;
|
| | | import io.jsonwebtoken.SignatureAlgorithm;
|
| | | import io.jsonwebtoken.security.Keys;
|
| | | import jakarta.servlet.http.HttpServletRequest;
|
| | | import org.slf4j.Logger;
|
| | | import org.slf4j.LoggerFactory;
|
| | | import org.springframework.beans.factory.annotation.Autowired;
|
| | | import org.springframework.beans.factory.annotation.Value;
|
| | | import org.springframework.stereotype.Component;
|
| | | import org.springframework.util.CollectionUtils;
|
| | |
|
| | | import javax.crypto.SecretKey;
|
| | | import java.nio.charset.StandardCharsets;
|
| | | import java.util.HashMap;
|
| | | import java.util.List;
|
| | | import java.util.Map;
|
| | | import java.util.concurrent.TimeUnit;
|
| | |
|
| | | /**
|
| | | * token验证处理
|
| | |
| | | @Component
|
| | | public class TokenService
|
| | | {
|
| | | private static final Logger log = LoggerFactory.getLogger(TokenService.class);
|
| | |
|
| | | // 令牌自定义标识
|
| | | @Value("${token.header}")
|
| | | private String header;
|
| | |
| | |
|
| | | protected static final long MILLIS_MINUTE = 60 * MILLIS_SECOND;
|
| | |
|
| | | private static final Long MILLIS_MINUTE_TEN = 20 * 60 * 1000L;
|
| | | private static final Long MILLIS_MINUTE_TWENTY = 20 * 60 * 1000L;
|
| | |
|
| | | @Autowired
|
| | | private RedisCache redisCache;
|
| | |
| | | }
|
| | | catch (Exception e)
|
| | | {
|
| | | log.error("获取用户信息异常'{}'", e.getMessage());
|
| | | }
|
| | | }
|
| | | return null;
|
| | |
| | |
|
| | | Map<String, Object> claims = new HashMap<>();
|
| | | claims.put(Constants.LOGIN_USER_KEY, token);
|
| | | claims.put(Constants.JWT_USERNAME, loginUser.getUsername());
|
| | | return createToken(claims);
|
| | | }
|
| | |
|
| | | /**
|
| | | * 验证令牌有效期,相差不足20分钟,自动刷新缓存
|
| | | *
|
| | | * @param token 令牌
|
| | | * @param loginUser 登录信息
|
| | | * @return 令牌
|
| | | */
|
| | | public void verifyToken(LoginUser loginUser)
|
| | | {
|
| | | long expireTime = loginUser.getExpireTime();
|
| | | long currentTime = System.currentTimeMillis();
|
| | | if (expireTime - currentTime <= MILLIS_MINUTE_TEN)
|
| | | if (expireTime - currentTime <= MILLIS_MINUTE_TWENTY)
|
| | | {
|
| | | refreshToken(loginUser);
|
| | | }
|
| | | }
|
| | |
|
| | | @Autowired
|
| | | private SysUserDeptMapper sysUserDeptMapper;
|
| | |
|
| | | /**
|
| | | * 刷新令牌有效期
|
| | |
| | | {
|
| | | loginUser.setLoginTime(System.currentTimeMillis());
|
| | | loginUser.setExpireTime(loginUser.getLoginTime() + expireTime * MILLIS_MINUTE);
|
| | | loginUser.setDeptIds(getDeptIdsByUserId(loginUser.getUserId()));
|
| | | if (loginUser.getDeptIds() != null && loginUser.getDeptIds().length > 0)
|
| | | {
|
| | | loginUser.setCurrentDeptId(loginUser.getDeptIds()[0]);
|
| | | }
|
| | | loginUser.setDataScope(resolveDataScope(loginUser));
|
| | | // 根据uuid将loginUser缓存
|
| | | String userKey = getTokenKey(loginUser.getToken());
|
| | | redisCache.setCacheObject(userKey, loginUser, expireTime, TimeUnit.MINUTES);
|
| | | }
|
| | | |
| | |
|
| | | public String resolveDataScope(LoginUser loginUser)
|
| | | {
|
| | | if (loginUser == null || loginUser.getUser() == null || CollectionUtils.isEmpty(loginUser.getUser().getRoles()))
|
| | | {
|
| | | return null;
|
| | | }
|
| | | boolean hasCustom = false;
|
| | | boolean hasDeptAndChild = false;
|
| | | boolean hasDept = false;
|
| | | boolean hasSelf = false;
|
| | | for (SysRole role : loginUser.getUser().getRoles())
|
| | | {
|
| | | if (role == null || !"0".equals(role.getStatus()))
|
| | | {
|
| | | continue;
|
| | | }
|
| | | if ("1".equals(role.getDataScope()))
|
| | | {
|
| | | return "1";
|
| | | }
|
| | | if ("2".equals(role.getDataScope()))
|
| | | {
|
| | | hasCustom = true;
|
| | | }
|
| | | else if ("4".equals(role.getDataScope()))
|
| | | {
|
| | | hasDeptAndChild = true;
|
| | | }
|
| | | else if ("3".equals(role.getDataScope()))
|
| | | {
|
| | | hasDept = true;
|
| | | }
|
| | | else if ("5".equals(role.getDataScope()))
|
| | | {
|
| | | hasSelf = true;
|
| | | }
|
| | | }
|
| | | if (hasCustom)
|
| | | {
|
| | | return "2";
|
| | | }
|
| | | if (hasDeptAndChild)
|
| | | {
|
| | | return "4";
|
| | | }
|
| | | if (hasDept)
|
| | | {
|
| | | return "3";
|
| | | }
|
| | | if (hasSelf)
|
| | | {
|
| | | return "5";
|
| | | }
|
| | | return null;
|
| | | }
|
| | |
|
| | | public Long[] getDeptIdsByUserId(Long userId){
|
| | | LambdaQueryWrapper<SysUserDept> sysUserDeptLambdaQueryWrapper = new LambdaQueryWrapper<>();
|
| | | sysUserDeptLambdaQueryWrapper.eq(SysUserDept::getUserId, userId);
|
| | | List<SysUserDept> sysUserDept = sysUserDeptMapper.selectList(sysUserDeptLambdaQueryWrapper);
|
| | | if(CollectionUtils.isEmpty(sysUserDept)){
|
| | | return null;
|
| | | }
|
| | | return sysUserDept.stream().map(SysUserDept::getDeptId).toArray(Long[]::new);
|
| | | }
|
| | |
|
| | | /**
|
| | | * 设置用户代理信息
|
| | | *
|
| | |
| | | loginUser.setBrowser(userAgent.getBrowser().getName());
|
| | | loginUser.setOs(userAgent.getOperatingSystem().getName());
|
| | | }
|
| | | |
| | |
|
| | | private SecretKey getSigningKey() {
|
| | | byte[] keyBytes = secret.getBytes(StandardCharsets.UTF_8);
|
| | | return Keys.hmacShaKeyFor(keyBytes);
|
| | | }
|
| | |
|
| | | /**
|
| | | * 从数据声明生成令牌
|
| | | *
|
| | |
| | | */
|
| | | private String createToken(Map<String, Object> claims)
|
| | | {
|
| | | String token = Jwts.builder()
|
| | | .setClaims(claims)
|
| | | .signWith(SignatureAlgorithm.HS512, secret).compact();
|
| | | return token;
|
| | | return Jwts.builder()
|
| | | .claims(claims) // 注意:新版方法名变了,不再是 setClaims
|
| | | .signWith(getSigningKey(), Jwts.SIG.HS512) // 使用新的签名常量
|
| | | .compact();
|
| | | }
|
| | |
|
| | | /**
|
| | |
| | | private Claims parseToken(String token)
|
| | | {
|
| | | return Jwts.parser()
|
| | | .setSigningKey(secret)
|
| | | .parseClaimsJws(token)
|
| | | .getBody();
|
| | | .verifyWith(getSigningKey()) // 新版使用 verifyWith
|
| | | .build()
|
| | | .parseSignedClaims(token)
|
| | | .getPayload();
|
| | | }
|
| | |
|
| | | /**
|