|
|
package v1
import ( "gin-vue-admin/global" "gin-vue-admin/middleware" "gin-vue-admin/model" "gin-vue-admin/model/request" "gin-vue-admin/model/response" "gin-vue-admin/service" "gin-vue-admin/utils" "github.com/dgrijalva/jwt-go" "github.com/gin-gonic/gin" "github.com/go-redis/redis" "go.uber.org/zap" "time" )
// @Tags Base
// @Summary 用户登录
// @Produce application/json
// @Param data body request.Login true "用户名, 密码, 验证码"
// @Success 200 {string} string "{"success":true,"data":{},"msg":"登陆成功"}"
// @Router /base/login [post]
func Login(c *gin.Context) { var L request.Login _ = c.ShouldBindJSON(&L) if err := utils.Verify(L, utils.LoginVerify); err != nil { response.FailWithMessage(err.Error(), c) return } if store.Verify(L.CaptchaId, L.Captcha, true) { U := &model.SysUser{Username: L.Username, Password: L.Password} if err, user := service.Login(U); err != nil { global.GVA_LOG.Error("登陆失败! 用户名不存在或者密码错误", zap.Any("err", err)) response.FailWithMessage("登陆失败!", c) } else { tokenNext(c, *user) } } else { response.FailWithMessage("验证码错误", c) } }
// 登录以后签发jwt
func tokenNext(c *gin.Context, user model.SysUser) { j := &middleware.JWT{SigningKey: []byte(global.GVA_CONFIG.JWT.SigningKey)} // 唯一签名
claims := request.CustomClaims{ UUID: user.UUID, ID: user.ID, NickName: user.NickName, Username: user.Username, AuthorityId: user.AuthorityId, BufferTime: 60 * 60 * 24, // 缓冲时间1天 缓冲时间内会获得新的token刷新令牌 此时一个用户会存在两个有效令牌 但是前端只留一个 另一个会丢失
StandardClaims: jwt.StandardClaims{ NotBefore: time.Now().Unix() - 1000, // 签名生效时间
ExpiresAt: time.Now().Unix() + 60*60*24*7, // 过期时间 7天
Issuer: "qmPlus", // 签名的发行者
}, } token, err := j.CreateToken(claims) if err != nil { global.GVA_LOG.Error("获取token失败", zap.Any("err", err)) response.FailWithMessage("获取token失败", c) return } if !global.GVA_CONFIG.System.UseMultipoint { response.OkWithDetailed(response.LoginResponse{ User: user, Token: token, ExpiresAt: claims.StandardClaims.ExpiresAt * 1000, }, "登录成功", c) return } if err, jwtStr := service.GetRedisJWT(user.Username); err == redis.Nil { if err := service.SetRedisJWT(token, user.Username); err != nil { global.GVA_LOG.Error("设置登录状态失败", zap.Any("err", err)) response.FailWithMessage("设置登录状态失败", c) return } response.OkWithDetailed(response.LoginResponse{ User: user, Token: token, ExpiresAt: claims.StandardClaims.ExpiresAt * 1000, }, "登录成功", c) } else if err != nil { global.GVA_LOG.Error("设置登录状态失败", zap.Any("err", err)) response.FailWithMessage("设置登录状态失败", c) } else { var blackJWT model.JwtBlacklist blackJWT.Jwt = jwtStr if err := service.JsonInBlacklist(blackJWT); err != nil { response.FailWithMessage("jwt作废失败", c) return } if err := service.SetRedisJWT(token, user.Username); err != nil { response.FailWithMessage("设置登录状态失败", c) return } response.OkWithDetailed(response.LoginResponse{ User: user, Token: token, ExpiresAt: claims.StandardClaims.ExpiresAt * 1000, }, "登录成功", c) } }
// @Tags SysUser
// @Summary 用户注册账号
// @Produce application/json
// @Param data body model.SysUser true "用户名, 昵称, 密码, 角色ID"
// @Success 200 {string} string "{"success":true,"data":{},"msg":"注册成功"}"
// @Router /user/register [post]
func Register(c *gin.Context) { var R request.Register _ = c.ShouldBindJSON(&R) if err := utils.Verify(R, utils.RegisterVerify); err != nil { response.FailWithMessage(err.Error(), c) return } user := &model.SysUser{Username: R.Username, NickName: R.NickName, Password: R.Password, HeaderImg: R.HeaderImg, AuthorityId: R.AuthorityId} err, userReturn := service.Register(*user) if err != nil { global.GVA_LOG.Error("注册失败", zap.Any("err", err)) response.FailWithDetailed(response.SysUserResponse{User: userReturn}, "注册失败", c) } else { response.OkWithDetailed(response.SysUserResponse{User: userReturn}, "注册成功", c) } }
// @Tags SysUser
// @Summary 用户修改密码
// @Security ApiKeyAuth
// @Produce application/json
// @Param data body request.ChangePasswordStruct true "用户名, 原密码, 新密码"
// @Success 200 {string} string "{"success":true,"data":{},"msg":"修改成功"}"
// @Router /user/changePassword [put]
func ChangePassword(c *gin.Context) { var user request.ChangePasswordStruct _ = c.ShouldBindJSON(&user) if err := utils.Verify(user, utils.ChangePasswordVerify); err != nil { response.FailWithMessage(err.Error(), c) return } U := &model.SysUser{Username: user.Username, Password: user.Password} if err, _ := service.ChangePassword(U, user.NewPassword); err != nil { global.GVA_LOG.Error("修改失败", zap.Any("err", err)) response.FailWithMessage("修改失败,原密码与当前账户不符", c) } else { response.OkWithMessage("修改成功", c) } }
// @Tags SysUser
// @Summary 分页获取用户列表
// @Security ApiKeyAuth
// @accept application/json
// @Produce application/json
// @Param data body request.PageInfo true "页码, 每页大小"
// @Success 200 {string} string "{"success":true,"data":{},"msg":"获取成功"}"
// @Router /user/getUserList [post]
func GetUserList(c *gin.Context) { var pageInfo request.PageInfo _ = c.ShouldBindJSON(&pageInfo) if err := utils.Verify(pageInfo, utils.PageInfoVerify); err != nil { response.FailWithMessage(err.Error(), c) return } if err, list, total := service.GetUserInfoList(pageInfo); err != nil { global.GVA_LOG.Error("获取失败", zap.Any("err", err)) response.FailWithMessage("获取失败", c) } else { response.OkWithDetailed(response.PageResult{ List: list, Total: total, Page: pageInfo.Page, PageSize: pageInfo.PageSize, }, "获取成功", c) } }
// @Tags SysUser
// @Summary 设置用户权限
// @Security ApiKeyAuth
// @accept application/json
// @Produce application/json
// @Param data body request.SetUserAuth true "用户UUID, 角色ID"
// @Success 200 {string} string "{"success":true,"data":{},"msg":"修改成功"}"
// @Router /user/setUserAuthority [post]
func SetUserAuthority(c *gin.Context) { var sua request.SetUserAuth _ = c.ShouldBindJSON(&sua) if UserVerifyErr := utils.Verify(sua, utils.SetUserAuthorityVerify); UserVerifyErr != nil { response.FailWithMessage(UserVerifyErr.Error(), c) return } if err := service.SetUserAuthority(sua.UUID, sua.AuthorityId); err != nil { global.GVA_LOG.Error("修改失败", zap.Any("err", err)) response.FailWithMessage("修改失败", c) } else { response.OkWithMessage("修改成功", c) } }
// @Tags SysUser
// @Summary 删除用户
// @Security ApiKeyAuth
// @accept application/json
// @Produce application/json
// @Param data body request.GetById true "用户ID"
// @Success 200 {string} string "{"success":true,"data":{},"msg":"删除成功"}"
// @Router /user/deleteUser [delete]
func DeleteUser(c *gin.Context) { var reqId request.GetById _ = c.ShouldBindJSON(&reqId) if err := utils.Verify(reqId, utils.IdVerify); err != nil { response.FailWithMessage(err.Error(), c) return } if err := service.DeleteUser(reqId.Id); err != nil { global.GVA_LOG.Error("删除失败!", zap.Any("err", err)) response.FailWithMessage("删除失败", c) } else { response.OkWithMessage("删除成功", c) } }
// @Tags SysUser
// @Summary 设置用户信息
// @Security ApiKeyAuth
// @accept application/json
// @Produce application/json
// @Param data body model.SysUser true "ID, 用户名, 昵称, 头像链接"
// @Success 200 {string} string "{"success":true,"data":{},"msg":"设置成功"}"
// @Router /user/setUserInfo [put]
func SetUserInfo(c *gin.Context) { var user model.SysUser _ = c.ShouldBindJSON(&user) if err := utils.Verify(user, utils.SetUserVerify); err != nil { response.FailWithMessage(err.Error(), c) return } if err, ReqUser := service.SetUserInfo(user); err != nil { global.GVA_LOG.Error("设置失败", zap.Any("err", err)) response.FailWithMessage("设置失败", c) } else { response.OkWithDetailed(gin.H{"userInfo": ReqUser}, "设置成功", c) } }
// 从Gin的Context中获取从jwt解析出来的用户ID
func getUserID(c *gin.Context) uint { if claims, exists := c.Get("claims"); !exists { global.GVA_LOG.Error("从Gin的Context中获取从jwt解析出来的用户ID失败, 请检查路由是否使用jwt中间件") return 0 } else { waitUse := claims.(*request.CustomClaims) return waitUse.ID } }
// 从Gin的Context中获取从jwt解析出来的用户UUID
func getUserUuid(c *gin.Context) string { if claims, exists := c.Get("claims"); !exists { global.GVA_LOG.Error("从Gin的Context中获取从jwt解析出来的用户UUID失败, 请检查路由是否使用jwt中间件") return "" } else { waitUse := claims.(*request.CustomClaims) return waitUse.UUID.String() } }
// 从Gin的Context中获取从jwt解析出来的用户角色id
func getUserAuthorityId(c *gin.Context) string { if claims, exists := c.Get("claims"); !exists { global.GVA_LOG.Error("从Gin的Context中获取从jwt解析出来的用户UUID失败, 请检查路由是否使用jwt中间件") return "" } else { waitUse := claims.(*request.CustomClaims) return waitUse.AuthorityId } }
|