| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155 |
- package pub
- import (
- "context"
- "errors"
- "fmt"
- "strings"
- "time"
- "perms-system-server/internal/consts"
- authHelper "perms-system-server/internal/logic/auth"
- userModel "perms-system-server/internal/model/user"
- "perms-system-server/internal/response"
- "perms-system-server/internal/svc"
- "perms-system-server/internal/types"
- "github.com/zeromicro/go-zero/core/limit"
- "github.com/zeromicro/go-zero/core/logx"
- )
- type RefreshTokenLogic struct {
- logx.Logger
- ctx context.Context
- svcCtx *svc.ServiceContext
- }
- func NewRefreshTokenLogic(ctx context.Context, svcCtx *svc.ServiceContext) *RefreshTokenLogic {
- return &RefreshTokenLogic{
- Logger: logx.WithContext(ctx),
- ctx: ctx,
- svcCtx: svcCtx,
- }
- }
- // RefreshToken 刷新令牌。使用有效的 refreshToken 换取新的 accessToken/refreshToken 令牌对,旧令牌即时失效(单会话轮转)。
- // 路由层已挂载 RefreshTokenRateLimit 做 IP 维度限流;本处再叠加 per-user 限流,形成"IP + 用户"双层防护。
- func (l *RefreshTokenLogic) RefreshToken(req *types.RefreshTokenReq) (resp *types.LoginResp, err error) {
- tokenStr := strings.TrimPrefix(req.Authorization, "Bearer ")
- if tokenStr == "" || tokenStr == req.Authorization {
- return nil, response.ErrUnauthorized("refreshToken格式错误")
- }
- claims, err := authHelper.ParseRefreshToken(tokenStr, l.svcCtx.Config.Auth.RefreshSecret)
- if err != nil {
- return nil, response.ErrUnauthorized("refreshToken无效或已过期")
- }
- productCode := claims.ProductCode
- if req.ProductCode != "" && req.ProductCode != productCode {
- return nil, response.ErrBadRequest("刷新令牌不允许切换产品")
- }
- ud, err := l.svcCtx.UserDetailsLoader.Load(l.ctx, claims.UserId, productCode)
- if err != nil {
- return nil, response.NewCodeError(503, "服务暂时不可用,请稍后重试")
- }
- if ud.Username == "" {
- return nil, response.ErrUnauthorized("用户不存在或已被删除")
- }
- if ud.Status != consts.StatusEnabled {
- return nil, response.ErrForbidden("账号已被冻结")
- }
- if productCode != "" && ud.ProductStatus != consts.StatusEnabled {
- return nil, response.ErrForbidden("该产品已被禁用")
- }
- if productCode != "" && !ud.IsSuperAdmin && ud.MemberType == "" {
- return nil, response.ErrForbidden("您已不是该产品的成员")
- }
- if claims.TokenVersion != ud.TokenVersion {
- return nil, response.ErrUnauthorized("登录状态已失效,请重新登录")
- }
- if l.svcCtx.TokenOpLimiter != nil {
- code, _ := l.svcCtx.TokenOpLimiter.Take(fmt.Sprintf("refresh:%d", claims.UserId))
- if code == limit.OverQuota {
- return nil, response.ErrTooManyRequests("刷新操作过于频繁,请稍后再试")
- }
- }
- // 审计 M-3:把签名放在 CAS 之前,让"签名失败"不再污染 tokenVersion。原顺序是
- // CAS → Clean → 签 access → 签 refresh
- // 一旦签名失败 tokenVersion 已+1,但客户端没收到新 refreshToken,下一次带旧 version 来
- // 会被 "登录状态已失效" 踢掉,变成"签名 bug → 用户被强制登出"的放大效应。新顺序:
- // 试签 access → 试签 refresh → CAS → Clean
- // 签名走不通直接 500,DB/缓存都不动;CAS 赢家才推进 tokenVersion 并 Clean 缓存。
- predictedVersion := claims.TokenVersion + 1
- accessToken, err := authHelper.GenerateAccessToken(
- l.svcCtx.Config.Auth.AccessSecret,
- l.svcCtx.Config.Auth.AccessExpire,
- ud.UserId, ud.Username, ud.ProductCode, ud.MemberType, predictedVersion,
- )
- if err != nil {
- return nil, err
- }
- newRefreshToken, err := authHelper.GenerateRefreshTokenWithExpiry(
- l.svcCtx.Config.Auth.RefreshSecret,
- claims.ExpiresAt.Time,
- ud.UserId, ud.ProductCode, predictedVersion,
- )
- if err != nil {
- return nil, err
- }
- newVersion, err := l.svcCtx.SysUserModel.IncrementTokenVersionIfMatch(l.ctx, claims.UserId, ud.Username, claims.TokenVersion)
- if err != nil {
- if errors.Is(err, userModel.ErrTokenVersionMismatch) {
- return nil, response.ErrUnauthorized("登录状态已失效,请重新登录")
- }
- return nil, err
- }
- if newVersion != predictedVersion {
- // 审计 L-R10-4:按 IncrementTokenVersionIfMatch 的 UPDATE 语义,CAS 成功时 WHERE 命中
- // tokenVersion = claims.TokenVersion,新值必然是 claims.TokenVersion + 1 = predictedVersion;
- // LAST_INSERT_ID() 由同一事务设置,其他连接的写入无法篡改本连接 session 里的值。
- // 本分支在正常路径下**不可达**,但保留为 forensic 兜底:一旦真的进来,说明:
- // (a) sys_user_model 的 IncrementTokenVersionIfMatch 实现被改动(比如 UPDATE 条件
- // 从 tokenVersion=? 被悄悄改成 tokenVersion>=?),CAS 不再精确;
- // (b) 或底层 MySQL 连接被中间件劫持 / session-level 变量被干扰;
- // 两种都是"签名链契约漂移"级别的事件,直接落 ERROR 并踢到重新登录,避免签发出一个
- // 与实际 DB 值不一致的 refreshToken 留下审计死角。
- logx.WithContext(l.ctx).Errorw("refresh token version prediction mismatch",
- logx.Field("audit", "refresh_token_version_mismatch"),
- logx.Field("userId", claims.UserId),
- logx.Field("claimed", claims.TokenVersion),
- logx.Field("predicted", predictedVersion),
- logx.Field("actual", newVersion),
- )
- return nil, response.ErrUnauthorized("登录状态已失效,请重新登录")
- }
- l.svcCtx.UserDetailsLoader.Clean(l.ctx, claims.UserId)
- return &types.LoginResp{
- AccessToken: accessToken,
- RefreshToken: newRefreshToken,
- Expires: time.Now().Unix() + l.svcCtx.Config.Auth.AccessExpire,
- UserInfo: types.UserInfo{
- UserId: ud.UserId,
- Username: ud.Username,
- Nickname: ud.Nickname,
- Avatar: ud.Avatar,
- Email: ud.Email,
- Phone: ud.Phone,
- IsSuperAdmin: ud.IsSuperAdminRaw,
- MustChangePassword: ud.MustChangePwdRaw,
- MemberType: ud.MemberType,
- Perms: ud.Perms,
- },
- }, nil
- }
|