authority_middleware.go 2.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889
  1. package middleware
  2. import (
  3. "context"
  4. "errors"
  5. "net/http"
  6. "strings"
  7. "github.com/casbin/casbin/v2"
  8. "github.com/redis/go-redis/v9"
  9. "github.com/zeromicro/go-zero/core/errorx"
  10. "github.com/zeromicro/go-zero/core/logx"
  11. "github.com/zeromicro/go-zero/rest/httpx"
  12. "github.com/suyuan32/simple-admin-common/config"
  13. "github.com/suyuan32/simple-admin-common/enum/errorcode"
  14. "github.com/suyuan32/simple-admin-common/utils/jwt"
  15. )
  16. type AuthorityMiddleware struct {
  17. Cbn *casbin.Enforcer
  18. Rds redis.UniversalClient
  19. }
  20. func NewAuthorityMiddleware(cbn *casbin.Enforcer, rds redis.UniversalClient) *AuthorityMiddleware {
  21. return &AuthorityMiddleware{
  22. Cbn: cbn,
  23. Rds: rds,
  24. }
  25. }
  26. func (m *AuthorityMiddleware) Handle(next http.HandlerFunc) http.HandlerFunc {
  27. return func(w http.ResponseWriter, r *http.Request) {
  28. // get the path
  29. obj := r.URL.Path
  30. // get the method
  31. act := r.Method
  32. // get the role id
  33. roleIds := r.Context().Value("roleId").(string)
  34. // check jwt blacklist
  35. jwtResult, err := m.Rds.Get(context.Background(), config.RedisTokenPrefix+jwt.StripBearerPrefixFromToken(r.Header.Get("Authorization"))).Result()
  36. if err != nil && !errors.Is(err, redis.Nil) {
  37. logx.Errorw("redis error in jwt", logx.Field("detail", err.Error()))
  38. httpx.Error(w, errorx.NewApiError(http.StatusInternalServerError, err.Error()))
  39. return
  40. }
  41. if jwtResult == "1" {
  42. logx.Errorw("token in blacklist", logx.Field("detail", r.Header.Get("Authorization")))
  43. httpx.Error(w, errorx.NewApiErrorWithoutMsg(http.StatusUnauthorized))
  44. return
  45. }
  46. result := batchCheck(m.Cbn, roleIds, act, obj)
  47. if result {
  48. logx.Infow("HTTP/HTTPS Request", logx.Field("UUID", r.Context().Value("userId").(string)),
  49. logx.Field("path", obj), logx.Field("method", act))
  50. next(w, r)
  51. return
  52. } else {
  53. logx.Errorw("the role is not permitted to access the API", logx.Field("roleId", roleIds),
  54. logx.Field("path", obj), logx.Field("method", act))
  55. httpx.Error(w, errorx.NewCodeError(errorcode.PermissionDenied, "Permission Denied"))
  56. return
  57. }
  58. }
  59. }
  60. func batchCheck(cbn *casbin.Enforcer, roleIds, act, obj string) bool {
  61. var checkReq [][]any
  62. for _, v := range strings.Split(roleIds, ",") {
  63. checkReq = append(checkReq, []any{v, obj, act})
  64. }
  65. result, err := cbn.BatchEnforce(checkReq)
  66. if err != nil {
  67. logx.Errorw("Casbin enforce error", logx.Field("detail", err.Error()))
  68. return false
  69. }
  70. for _, v := range result {
  71. if v {
  72. return true
  73. }
  74. }
  75. return false
  76. }