refreshTokenLogic.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155
  1. package pub
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "strings"
  7. "time"
  8. "perms-system-server/internal/consts"
  9. authHelper "perms-system-server/internal/logic/auth"
  10. userModel "perms-system-server/internal/model/user"
  11. "perms-system-server/internal/response"
  12. "perms-system-server/internal/svc"
  13. "perms-system-server/internal/types"
  14. "github.com/zeromicro/go-zero/core/limit"
  15. "github.com/zeromicro/go-zero/core/logx"
  16. )
  17. type RefreshTokenLogic struct {
  18. logx.Logger
  19. ctx context.Context
  20. svcCtx *svc.ServiceContext
  21. }
  22. func NewRefreshTokenLogic(ctx context.Context, svcCtx *svc.ServiceContext) *RefreshTokenLogic {
  23. return &RefreshTokenLogic{
  24. Logger: logx.WithContext(ctx),
  25. ctx: ctx,
  26. svcCtx: svcCtx,
  27. }
  28. }
  29. // RefreshToken 刷新令牌。使用有效的 refreshToken 换取新的 accessToken/refreshToken 令牌对,旧令牌即时失效(单会话轮转)。
  30. // 路由层已挂载 RefreshTokenRateLimit 做 IP 维度限流;本处再叠加 per-user 限流,形成"IP + 用户"双层防护。
  31. func (l *RefreshTokenLogic) RefreshToken(req *types.RefreshTokenReq) (resp *types.LoginResp, err error) {
  32. tokenStr := strings.TrimPrefix(req.Authorization, "Bearer ")
  33. if tokenStr == "" || tokenStr == req.Authorization {
  34. return nil, response.ErrUnauthorized("refreshToken格式错误")
  35. }
  36. claims, err := authHelper.ParseRefreshToken(tokenStr, l.svcCtx.Config.Auth.RefreshSecret)
  37. if err != nil {
  38. return nil, response.ErrUnauthorized("refreshToken无效或已过期")
  39. }
  40. productCode := claims.ProductCode
  41. if req.ProductCode != "" && req.ProductCode != productCode {
  42. return nil, response.ErrBadRequest("刷新令牌不允许切换产品")
  43. }
  44. ud, err := l.svcCtx.UserDetailsLoader.Load(l.ctx, claims.UserId, productCode)
  45. if err != nil {
  46. return nil, response.NewCodeError(503, "服务暂时不可用,请稍后重试")
  47. }
  48. if ud.Username == "" {
  49. return nil, response.ErrUnauthorized("用户不存在或已被删除")
  50. }
  51. if ud.Status != consts.StatusEnabled {
  52. return nil, response.ErrForbidden("账号已被冻结")
  53. }
  54. if productCode != "" && ud.ProductStatus != consts.StatusEnabled {
  55. return nil, response.ErrForbidden("该产品已被禁用")
  56. }
  57. if productCode != "" && !ud.IsSuperAdmin && ud.MemberType == "" {
  58. return nil, response.ErrForbidden("您已不是该产品的成员")
  59. }
  60. if claims.TokenVersion != ud.TokenVersion {
  61. return nil, response.ErrUnauthorized("登录状态已失效,请重新登录")
  62. }
  63. if l.svcCtx.TokenOpLimiter != nil {
  64. code, _ := l.svcCtx.TokenOpLimiter.Take(fmt.Sprintf("refresh:%d", claims.UserId))
  65. if code == limit.OverQuota {
  66. return nil, response.ErrTooManyRequests("刷新操作过于频繁,请稍后再试")
  67. }
  68. }
  69. // 审计 M-3:把签名放在 CAS 之前,让"签名失败"不再污染 tokenVersion。原顺序是
  70. // CAS → Clean → 签 access → 签 refresh
  71. // 一旦签名失败 tokenVersion 已+1,但客户端没收到新 refreshToken,下一次带旧 version 来
  72. // 会被 "登录状态已失效" 踢掉,变成"签名 bug → 用户被强制登出"的放大效应。新顺序:
  73. // 试签 access → 试签 refresh → CAS → Clean
  74. // 签名走不通直接 500,DB/缓存都不动;CAS 赢家才推进 tokenVersion 并 Clean 缓存。
  75. predictedVersion := claims.TokenVersion + 1
  76. accessToken, err := authHelper.GenerateAccessToken(
  77. l.svcCtx.Config.Auth.AccessSecret,
  78. l.svcCtx.Config.Auth.AccessExpire,
  79. ud.UserId, ud.Username, ud.ProductCode, ud.MemberType, predictedVersion,
  80. )
  81. if err != nil {
  82. return nil, err
  83. }
  84. newRefreshToken, err := authHelper.GenerateRefreshTokenWithExpiry(
  85. l.svcCtx.Config.Auth.RefreshSecret,
  86. claims.ExpiresAt.Time,
  87. ud.UserId, ud.ProductCode, predictedVersion,
  88. )
  89. if err != nil {
  90. return nil, err
  91. }
  92. newVersion, err := l.svcCtx.SysUserModel.IncrementTokenVersionIfMatch(l.ctx, claims.UserId, ud.Username, claims.TokenVersion)
  93. if err != nil {
  94. if errors.Is(err, userModel.ErrTokenVersionMismatch) {
  95. return nil, response.ErrUnauthorized("登录状态已失效,请重新登录")
  96. }
  97. return nil, err
  98. }
  99. if newVersion != predictedVersion {
  100. // 审计 L-R10-4:按 IncrementTokenVersionIfMatch 的 UPDATE 语义,CAS 成功时 WHERE 命中
  101. // tokenVersion = claims.TokenVersion,新值必然是 claims.TokenVersion + 1 = predictedVersion;
  102. // LAST_INSERT_ID() 由同一事务设置,其他连接的写入无法篡改本连接 session 里的值。
  103. // 本分支在正常路径下**不可达**,但保留为 forensic 兜底:一旦真的进来,说明:
  104. // (a) sys_user_model 的 IncrementTokenVersionIfMatch 实现被改动(比如 UPDATE 条件
  105. // 从 tokenVersion=? 被悄悄改成 tokenVersion>=?),CAS 不再精确;
  106. // (b) 或底层 MySQL 连接被中间件劫持 / session-level 变量被干扰;
  107. // 两种都是"签名链契约漂移"级别的事件,直接落 ERROR 并踢到重新登录,避免签发出一个
  108. // 与实际 DB 值不一致的 refreshToken 留下审计死角。
  109. logx.WithContext(l.ctx).Errorw("refresh token version prediction mismatch",
  110. logx.Field("audit", "refresh_token_version_mismatch"),
  111. logx.Field("userId", claims.UserId),
  112. logx.Field("claimed", claims.TokenVersion),
  113. logx.Field("predicted", predictedVersion),
  114. logx.Field("actual", newVersion),
  115. )
  116. return nil, response.ErrUnauthorized("登录状态已失效,请重新登录")
  117. }
  118. l.svcCtx.UserDetailsLoader.Clean(l.ctx, claims.UserId)
  119. return &types.LoginResp{
  120. AccessToken: accessToken,
  121. RefreshToken: newRefreshToken,
  122. Expires: time.Now().Unix() + l.svcCtx.Config.Auth.AccessExpire,
  123. UserInfo: types.UserInfo{
  124. UserId: ud.UserId,
  125. Username: ud.Username,
  126. Nickname: ud.Nickname,
  127. Avatar: ud.Avatar,
  128. Email: ud.Email,
  129. Phone: ud.Phone,
  130. IsSuperAdmin: ud.IsSuperAdminRaw,
  131. MustChangePassword: ud.MustChangePwdRaw,
  132. MemberType: ud.MemberType,
  133. Perms: ud.Perms,
  134. },
  135. }, nil
  136. }