mirror of https://github.com/Xhofe/alist
parent
a6bead90d7
commit
81258d3e8a
|
@ -3,6 +3,7 @@ package common
|
||||||
import (
|
import (
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/Xhofe/go-cache"
|
||||||
"github.com/alist-org/alist/v3/internal/conf"
|
"github.com/alist-org/alist/v3/internal/conf"
|
||||||
"github.com/alist-org/alist/v3/internal/model"
|
"github.com/alist-org/alist/v3/internal/model"
|
||||||
"github.com/golang-jwt/jwt/v4"
|
"github.com/golang-jwt/jwt/v4"
|
||||||
|
@ -17,6 +18,8 @@ type UserClaims struct {
|
||||||
jwt.RegisteredClaims
|
jwt.RegisteredClaims
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var validTokenCache = cache.NewMemCache[bool]()
|
||||||
|
|
||||||
func GenerateToken(user *model.User) (tokenString string, err error) {
|
func GenerateToken(user *model.User) (tokenString string, err error) {
|
||||||
claim := UserClaims{
|
claim := UserClaims{
|
||||||
Username: user.Username,
|
Username: user.Username,
|
||||||
|
@ -28,6 +31,10 @@ func GenerateToken(user *model.User) (tokenString string, err error) {
|
||||||
}}
|
}}
|
||||||
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claim)
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claim)
|
||||||
tokenString, err = token.SignedString(SecretKey)
|
tokenString, err = token.SignedString(SecretKey)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
validTokenCache.Set(tokenString, true)
|
||||||
return tokenString, err
|
return tokenString, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -35,6 +42,9 @@ func ParseToken(tokenString string) (*UserClaims, error) {
|
||||||
token, err := jwt.ParseWithClaims(tokenString, &UserClaims{}, func(token *jwt.Token) (interface{}, error) {
|
token, err := jwt.ParseWithClaims(tokenString, &UserClaims{}, func(token *jwt.Token) (interface{}, error) {
|
||||||
return SecretKey, nil
|
return SecretKey, nil
|
||||||
})
|
})
|
||||||
|
if IsTokenInvalidated(tokenString) {
|
||||||
|
return nil, errors.New("token is invalidated")
|
||||||
|
}
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if ve, ok := err.(*jwt.ValidationError); ok {
|
if ve, ok := err.(*jwt.ValidationError); ok {
|
||||||
if ve.Errors&jwt.ValidationErrorMalformed != 0 {
|
if ve.Errors&jwt.ValidationErrorMalformed != 0 {
|
||||||
|
@ -53,3 +63,16 @@ func ParseToken(tokenString string) (*UserClaims, error) {
|
||||||
}
|
}
|
||||||
return nil, errors.New("couldn't handle this token")
|
return nil, errors.New("couldn't handle this token")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func InvalidateToken(tokenString string) error {
|
||||||
|
if tokenString == "" {
|
||||||
|
return nil // don't invalidate empty guest token
|
||||||
|
}
|
||||||
|
validTokenCache.Del(tokenString)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func IsTokenInvalidated(tokenString string) bool {
|
||||||
|
_, ok := validTokenCache.Get(tokenString)
|
||||||
|
return !ok
|
||||||
|
}
|
||||||
|
|
|
@ -181,3 +181,12 @@ func Verify2FA(c *gin.Context) {
|
||||||
common.SuccessResp(c)
|
common.SuccessResp(c)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func LogOut(c *gin.Context) {
|
||||||
|
err := common.InvalidateToken(c.GetHeader("Authorization"))
|
||||||
|
if err != nil {
|
||||||
|
common.ErrorResp(c, err, 500)
|
||||||
|
} else {
|
||||||
|
common.SuccessResp(c)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -54,6 +54,7 @@ func Init(e *gin.Engine) {
|
||||||
auth.POST("/me/update", handles.UpdateCurrent)
|
auth.POST("/me/update", handles.UpdateCurrent)
|
||||||
auth.POST("/auth/2fa/generate", handles.Generate2FA)
|
auth.POST("/auth/2fa/generate", handles.Generate2FA)
|
||||||
auth.POST("/auth/2fa/verify", handles.Verify2FA)
|
auth.POST("/auth/2fa/verify", handles.Verify2FA)
|
||||||
|
auth.GET("/auth/logout", handles.LogOut)
|
||||||
|
|
||||||
// auth
|
// auth
|
||||||
api.GET("/auth/sso", handles.SSOLoginRedirect)
|
api.GET("/auth/sso", handles.SSOLoginRedirect)
|
||||||
|
|
Loading…
Reference in New Issue