|
|
using EntrustSettle.Common;
|
|
|
using EntrustSettle.Common.Helper;
|
|
|
using EntrustSettle.Common.HttpContextUser;
|
|
|
using EntrustSettle.IServices;
|
|
|
using EntrustSettle.Model;
|
|
|
using Microsoft.AspNetCore.Authentication;
|
|
|
using Microsoft.AspNetCore.Authorization;
|
|
|
using Microsoft.AspNetCore.Http;
|
|
|
using Microsoft.Extensions.DependencyInjection;
|
|
|
using System;
|
|
|
using System.Collections.Generic;
|
|
|
using System.IdentityModel.Tokens.Jwt;
|
|
|
using System.Linq;
|
|
|
using System.Security.Claims;
|
|
|
using System.Text.RegularExpressions;
|
|
|
using System.Threading.Tasks;
|
|
|
using EntrustSettle.Common.Swagger;
|
|
|
using EntrustSettle.Model.Models;
|
|
|
|
|
|
namespace EntrustSettle.AuthHelper
|
|
|
{
|
|
|
/// <summary>
|
|
|
/// 权限授权处理器
|
|
|
/// </summary>
|
|
|
public class PermissionHandler : AuthorizationHandler<PermissionRequirement>
|
|
|
{
|
|
|
/// <summary>
|
|
|
/// 验证方案提供对象
|
|
|
/// </summary>
|
|
|
public IAuthenticationSchemeProvider Schemes { get; set; }
|
|
|
|
|
|
private readonly IRoleModulePermissionServices _roleModulePermissionServices;
|
|
|
private readonly IHttpContextAccessor _accessor;
|
|
|
private readonly ISysUserInfoServices _userServices;
|
|
|
private readonly IUser _user;
|
|
|
|
|
|
/// <summary>
|
|
|
/// 构造函数注入
|
|
|
/// </summary>
|
|
|
/// <param name="schemes"></param>
|
|
|
/// <param name="roleModulePermissionServices"></param>
|
|
|
/// <param name="accessor"></param>
|
|
|
/// <param name="userServices"></param>
|
|
|
/// <param name="user"></param>
|
|
|
public PermissionHandler(IAuthenticationSchemeProvider schemes,
|
|
|
IRoleModulePermissionServices roleModulePermissionServices, IHttpContextAccessor accessor,
|
|
|
ISysUserInfoServices userServices, IUser user)
|
|
|
{
|
|
|
_accessor = accessor;
|
|
|
_userServices = userServices;
|
|
|
_user = user;
|
|
|
Schemes = schemes;
|
|
|
_roleModulePermissionServices = roleModulePermissionServices;
|
|
|
}
|
|
|
|
|
|
// 重写异步处理程序
|
|
|
protected override async Task HandleRequirementAsync(AuthorizationHandlerContext context,
|
|
|
PermissionRequirement requirement)
|
|
|
{
|
|
|
var httpContext = _accessor.HttpContext;
|
|
|
|
|
|
// 获取系统中所有的角色和菜单的关系集合
|
|
|
if (!requirement.Permissions.Any())
|
|
|
{
|
|
|
var data = await _roleModulePermissionServices.RoleModuleMaps();
|
|
|
var list = new List<PermissionItem>();
|
|
|
// ids4和jwt切换
|
|
|
// ids4
|
|
|
if (Permissions.IsUseIds4)
|
|
|
{
|
|
|
list = (from item in data
|
|
|
where item.IsDeleted == false
|
|
|
orderby item.Id
|
|
|
select new PermissionItem
|
|
|
{
|
|
|
Url = item.Module?.LinkUrl,
|
|
|
Role = item.Role?.Id.ObjToString(),
|
|
|
}).ToList();
|
|
|
}
|
|
|
// jwt
|
|
|
else
|
|
|
{
|
|
|
list = (from item in data
|
|
|
where item.IsDeleted == false
|
|
|
orderby item.Id
|
|
|
select new PermissionItem
|
|
|
{
|
|
|
Url = item.Module?.LinkUrl,
|
|
|
Role = item.Role?.Name.ObjToString(),
|
|
|
}).ToList();
|
|
|
}
|
|
|
|
|
|
requirement.Permissions = list;
|
|
|
}
|
|
|
|
|
|
if (httpContext != null)
|
|
|
{
|
|
|
var questUrl = httpContext.Request.Path.Value.ToLower();
|
|
|
|
|
|
// 整体结构类似认证中间件UseAuthentication的逻辑,具体查看开源地址
|
|
|
// https://github.com/dotnet/aspnetcore/blob/master/src/Security/Authentication/Core/src/AuthenticationMiddleware.cs
|
|
|
httpContext.Features.Set<IAuthenticationFeature>(new AuthenticationFeature
|
|
|
{
|
|
|
OriginalPath = httpContext.Request.Path,
|
|
|
OriginalPathBase = httpContext.Request.PathBase
|
|
|
});
|
|
|
|
|
|
// Give any IAuthenticationRequestHandler schemes a chance to handle the request
|
|
|
// 主要作用是: 判断当前是否需要进行远程验证,如果是就进行远程验证
|
|
|
var handlers = httpContext.RequestServices.GetRequiredService<IAuthenticationHandlerProvider>();
|
|
|
foreach (var scheme in await Schemes.GetRequestHandlerSchemesAsync())
|
|
|
{
|
|
|
if (await handlers.GetHandlerAsync(httpContext, scheme.Name) is IAuthenticationRequestHandler
|
|
|
handler && await handler.HandleRequestAsync())
|
|
|
{
|
|
|
context.Fail();
|
|
|
return;
|
|
|
}
|
|
|
}
|
|
|
|
|
|
//判断请求是否拥有凭据,即有没有登录
|
|
|
var defaultAuthenticate = await Schemes.GetDefaultAuthenticateSchemeAsync();
|
|
|
if (defaultAuthenticate != null)
|
|
|
{
|
|
|
var result = await httpContext.AuthenticateAsync(defaultAuthenticate.Name);
|
|
|
|
|
|
//result?.Principal不为空即登录成功
|
|
|
if (result?.Principal != null || httpContext.IsSuccessSwagger())
|
|
|
{
|
|
|
//应该要先校验用户的信息 再校验菜单权限相关的
|
|
|
// JWT模式下校验当前用户状态
|
|
|
// IDS4也可以校验,可以通过服务或者接口形式
|
|
|
SysUserInfo user = new();
|
|
|
if (!Permissions.IsUseIds4)
|
|
|
{
|
|
|
//校验用户
|
|
|
user = await _userServices.QueryById(_user.ID, true);
|
|
|
if (user == null)
|
|
|
{
|
|
|
_user.MessageModel = new ApiResponse(StatusCode.CODE401, "用户不存在或已被删除").MessageModel;
|
|
|
context.Fail(new AuthorizationFailureReason(this, _user.MessageModel.msg));
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
if (user.IsDeleted)
|
|
|
{
|
|
|
_user.MessageModel = new ApiResponse(StatusCode.CODE401, "用户已被删除,禁止登陆!").MessageModel;
|
|
|
context.Fail(new AuthorizationFailureReason(this, _user.MessageModel.msg));
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
if (!user.Enable)
|
|
|
{
|
|
|
_user.MessageModel = new ApiResponse(StatusCode.CODE401, "用户已被禁用!禁止登陆!").MessageModel;
|
|
|
context.Fail(new AuthorizationFailureReason(this, _user.MessageModel.msg));
|
|
|
return;
|
|
|
}
|
|
|
}
|
|
|
|
|
|
// 判断token是否过期,过期则重新登录
|
|
|
var isExp = false;
|
|
|
// ids4和jwt切换
|
|
|
// ids4
|
|
|
if (Permissions.IsUseIds4)
|
|
|
{
|
|
|
isExp = (httpContext.User.Claims.FirstOrDefault(s => s.Type == "exp")?.Value) != null &&
|
|
|
DateHelper.StampToDateTime(httpContext.User.Claims
|
|
|
.FirstOrDefault(s => s.Type == "exp")?.Value) >= DateTime.Now;
|
|
|
}
|
|
|
else
|
|
|
{
|
|
|
// jwt
|
|
|
isExp =
|
|
|
(httpContext.User.Claims.FirstOrDefault(s => s.Type == ClaimTypes.Expiration)
|
|
|
?.Value) != null &&
|
|
|
DateTime.Parse(httpContext.User.Claims
|
|
|
.FirstOrDefault(s => s.Type == ClaimTypes.Expiration)?.Value) >= DateTime.Now;
|
|
|
}
|
|
|
|
|
|
if (!isExp)
|
|
|
{
|
|
|
context.Fail(new AuthorizationFailureReason(this, "授权已过期,请重新授权"));
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
|
|
|
//校验签发时间
|
|
|
if (!Permissions.IsUseIds4)
|
|
|
{
|
|
|
var value = httpContext.User.Claims
|
|
|
.FirstOrDefault(s => s.Type == JwtRegisteredClaimNames.Iat)?.Value;
|
|
|
if (value != null)
|
|
|
{
|
|
|
if (user.CriticalModifyTime > value.ObjToDate())
|
|
|
{
|
|
|
_user.MessageModel = new ApiResponse(StatusCode.CODE401, "很抱歉,授权已失效,请重新授权")
|
|
|
.MessageModel;
|
|
|
context.Fail(new AuthorizationFailureReason(this, _user.MessageModel.msg));
|
|
|
return;
|
|
|
}
|
|
|
}
|
|
|
}
|
|
|
|
|
|
// 获取当前用户的角色信息
|
|
|
var currentUserRoles = new List<string>();
|
|
|
currentUserRoles = (from item in httpContext.User.Claims
|
|
|
where item.Type == ClaimTypes.Role
|
|
|
select item.Value).ToList();
|
|
|
if (!currentUserRoles.Any())
|
|
|
{
|
|
|
currentUserRoles = (from item in httpContext.User.Claims
|
|
|
where item.Type == "role"
|
|
|
select item.Value).ToList();
|
|
|
}
|
|
|
|
|
|
//超级管理员 默认拥有所有权限
|
|
|
if (currentUserRoles.All(s => s != "SuperAdmin"))
|
|
|
{
|
|
|
var isMatchRole = false;
|
|
|
var permisssionRoles =
|
|
|
requirement.Permissions.Where(w => currentUserRoles.Contains(w.Role));
|
|
|
foreach (var item in permisssionRoles)
|
|
|
{
|
|
|
try
|
|
|
{
|
|
|
if (Regex.Match(questUrl, item.Url?.ObjToString().ToLower())?.Value == questUrl)
|
|
|
{
|
|
|
isMatchRole = true;
|
|
|
break;
|
|
|
}
|
|
|
}
|
|
|
catch (Exception)
|
|
|
{
|
|
|
// ignored
|
|
|
}
|
|
|
}
|
|
|
|
|
|
//验证权限
|
|
|
if (currentUserRoles.Count <= 0 || !isMatchRole)
|
|
|
{
|
|
|
context.Fail();
|
|
|
return;
|
|
|
}
|
|
|
}
|
|
|
|
|
|
|
|
|
context.Succeed(requirement);
|
|
|
return;
|
|
|
}
|
|
|
}
|
|
|
|
|
|
//判断没有登录时,是否访问登录的url,并且是Post请求,并且是form表单提交类型,否则为失败
|
|
|
if (!(questUrl.Equals(requirement.LoginPath.ToLower(), StringComparison.Ordinal) &&
|
|
|
(!httpContext.Request.Method.Equals("POST") || !httpContext.Request.HasFormContentType)))
|
|
|
{
|
|
|
context.Fail();
|
|
|
return;
|
|
|
}
|
|
|
}
|
|
|
|
|
|
//context.Succeed(requirement);
|
|
|
}
|
|
|
}
|
|
|
} |