This commit is contained in:
@@ -51,7 +51,7 @@ func BaseAuthorityMiddleware(r *ghttp.Request) {
|
||||
return []byte(config.Config.Jwt.Secret), nil
|
||||
})
|
||||
if err != nil {
|
||||
cool.Logger.Error(ctx, "BaseAuthorityMiddleware", err)
|
||||
|
||||
statusCode = 401
|
||||
r.Response.WriteStatusExit(statusCode, g.Map{
|
||||
"code": 1001,
|
||||
@@ -59,7 +59,7 @@ func BaseAuthorityMiddleware(r *ghttp.Request) {
|
||||
})
|
||||
}
|
||||
if !token.Valid {
|
||||
cool.Logger.Error(ctx, "BaseAuthorityMiddleware", "token invalid")
|
||||
|
||||
statusCode = 401
|
||||
r.Response.WriteStatusExit(statusCode, g.Map{
|
||||
"code": 1001,
|
||||
@@ -75,7 +75,7 @@ func BaseAuthorityMiddleware(r *ghttp.Request) {
|
||||
// 超管拥有所有权限
|
||||
if admin.UserId == 10001 && !admin.IsRefresh {
|
||||
if tokenString != rtoken && config.Config.Jwt.Sso {
|
||||
cool.Logger.Error(ctx, "BaseAuthorityMiddleware", "token invalid")
|
||||
|
||||
statusCode = 401
|
||||
r.Response.WriteStatusExit(statusCode, g.Map{
|
||||
"code": 1001,
|
||||
@@ -94,7 +94,7 @@ func BaseAuthorityMiddleware(r *ghttp.Request) {
|
||||
}
|
||||
// 如果传的token是refreshToken则校验失败
|
||||
if admin.IsRefresh {
|
||||
cool.Logger.Error(ctx, "BaseAuthorityMiddleware", "token invalid")
|
||||
|
||||
statusCode = 401
|
||||
r.Response.WriteStatusExit(statusCode, g.Map{
|
||||
"code": 1001,
|
||||
@@ -104,16 +104,16 @@ func BaseAuthorityMiddleware(r *ghttp.Request) {
|
||||
// 判断密码版本是否正确
|
||||
passwordV, _ := cool.CacheManager.Get(ctx, "admin:passwordVersion:"+gconv.String(admin.UserId))
|
||||
if passwordV.Int32() != *admin.PasswordVersion {
|
||||
cool.Logger.Error(ctx, "BaseAuthorityMiddleware", "passwordV invalid")
|
||||
|
||||
statusCode = 401
|
||||
r.Response.WriteStatusExit(statusCode, g.Map{
|
||||
"code": 1001,
|
||||
"message": "登陆失效~",
|
||||
"message": "密码过期,登陆失效~",
|
||||
})
|
||||
}
|
||||
// 如果rtoken为空
|
||||
if rtoken == "" {
|
||||
cool.Logger.Error(ctx, "BaseAuthorityMiddleware", "rtoken invalid")
|
||||
|
||||
statusCode = 401
|
||||
r.Response.WriteStatusExit(statusCode, g.Map{
|
||||
"code": 1001,
|
||||
@@ -122,7 +122,7 @@ func BaseAuthorityMiddleware(r *ghttp.Request) {
|
||||
}
|
||||
// 如果rtoken不等于token 且 sso 未开启
|
||||
if tokenString != rtoken && !config.Config.Jwt.Sso {
|
||||
cool.Logger.Error(ctx, "BaseAuthorityMiddleware", "token invalid")
|
||||
|
||||
statusCode = 401
|
||||
r.Response.WriteStatusExit(statusCode, g.Map{
|
||||
"code": 1001,
|
||||
@@ -137,7 +137,7 @@ func BaseAuthorityMiddleware(r *ghttp.Request) {
|
||||
perms := garray.NewStrArrayFrom(permsVar)
|
||||
// 如果perms为空
|
||||
if perms.Len() == 0 {
|
||||
cool.Logger.Error(ctx, "BaseAuthorityMiddleware", "perms invalid")
|
||||
|
||||
statusCode = 403
|
||||
r.Response.WriteStatusExit(statusCode, g.Map{
|
||||
"code": 1001,
|
||||
@@ -157,7 +157,7 @@ func BaseAuthorityMiddleware(r *ghttp.Request) {
|
||||
url = gstr.Join(urls, ":")
|
||||
// 如果perms中不包含url 则无权限
|
||||
if !perms.ContainsI(url) {
|
||||
cool.Logger.Error(ctx, "BaseAuthorityMiddleware", "perms invalid")
|
||||
|
||||
statusCode = 403
|
||||
r.Response.WriteStatusExit(statusCode, g.Map{
|
||||
"code": 1001,
|
||||
|
||||
Reference in New Issue
Block a user