Compare commits
2 Commits
03658c9004
...
54cc8fbfbf
| Author | SHA1 | Date | |
|---|---|---|---|
| 54cc8fbfbf | |||
|
|
a9718e0504 |
|
|
@ -25,36 +25,18 @@ local routes = {
|
|||
methods = { "GET", "POST" },
|
||||
handler = oauthService.token,
|
||||
},
|
||||
--通过用户名和密码进行验证
|
||||
{
|
||||
paths = { "/yum/v1/oauth/v2/login" },
|
||||
methods = { "POST" },
|
||||
handler = oauthService.login,
|
||||
},
|
||||
--根据Access-Token获取相应用户的账户信息
|
||||
{
|
||||
paths = { "/yum/v1/oauth/v2/userinfo" },
|
||||
methods = { "POST" },
|
||||
handler = oauthService.userinfo,
|
||||
},
|
||||
--回收Access-Token
|
||||
{
|
||||
paths = { "/yum/v1/oauth/v2/logout" },
|
||||
methods = { "POST" },
|
||||
handler = oauthService.logout,
|
||||
},
|
||||
--根据Refresh-Token刷新Access-Token
|
||||
{
|
||||
paths = { "/yum/v1/oauth/v2/refresh" },
|
||||
methods = { "GET", "POST" },
|
||||
handler = oauthService.refresh,
|
||||
},
|
||||
--验证token是否有效
|
||||
{
|
||||
paths = { "/yum/v1/oauth/v2/checklogin" },
|
||||
methods = { "POST" },
|
||||
handler = oauthService.checklogin,
|
||||
},
|
||||
}
|
||||
|
||||
-- 初始化路由
|
||||
|
|
|
|||
|
|
@ -10,6 +10,7 @@ local cjson = require("cjson.safe")
|
|||
local jwt = require "resty.jwt"
|
||||
local rsa = require("util.rsa")
|
||||
local authcode = require("util.authcode")
|
||||
local token = require("util.token")
|
||||
|
||||
local _M = {}
|
||||
|
||||
|
|
@ -62,7 +63,7 @@ function _M:authorize()
|
|||
return
|
||||
end
|
||||
-- 4. 生成授权码(随机字符串,确保唯一性)(用户ID、客户端ID、scope、生成时间)
|
||||
local auth_code, err = authcode.create("123456", args.client_id, ngx.var.request_uri, args.scope)
|
||||
local auth_code, err = authcode.create("123456", args.client_id, args.redirect_uri, args.scope)
|
||||
if not auth_code then
|
||||
ngx.log(ngx.ERR, "生成授权码失败: ", err)
|
||||
ngx.exit(ngx.HTTP_INTERNAL_SERVER_ERROR)
|
||||
|
|
@ -72,7 +73,7 @@ function _M:authorize()
|
|||
local redirect_url = args.redirect_uri .. "?code=" .. code .. "&state=" .. args.state
|
||||
local rest = {}
|
||||
rest.redirect_uri = args.redirect_uri
|
||||
rest.code = code
|
||||
rest.code = auth_code
|
||||
rest.state = args.state
|
||||
local result = resp:json(ngx.HTTP_OK, rest)
|
||||
resp:send(result)
|
||||
|
|
@ -112,7 +113,7 @@ function _M:token()
|
|||
return
|
||||
end
|
||||
-- 3. 校验 code 有效性
|
||||
local code_data, err = authcode.consume(args.code, args.client_id)
|
||||
local code_data, err = authcode.consume(args.code)--, args.client_id)
|
||||
if not code_data then
|
||||
ngx.log(ngx.ERR, "授权码验证失败: ", err)
|
||||
ngx.exit(ngx.HTTP_BAD_REQUEST)
|
||||
|
|
@ -120,86 +121,39 @@ function _M:token()
|
|||
-- 4、验证redirect_url地址的正确性
|
||||
local request_uri = code_data.redirect_uri
|
||||
print("token request_uri:", request_uri)
|
||||
if request_uri ~= args.redirect_url then
|
||||
--print("token redirect_url:", request_uri, args.redirect_url)
|
||||
if request_uri ~= args.redirect_uri then
|
||||
print("token redirect_url:", request_uri, args.redirect_uri)
|
||||
local login_url = "/login?redirect=" .. ngx.escape_uri(request_uri)
|
||||
local result = resp:json(ngx.HTTP_MOVED_TEMPORARILY, login_url)
|
||||
resp:send(result)
|
||||
return
|
||||
end
|
||||
-- 6. 生成密钥对
|
||||
-- 5. 生成密钥对
|
||||
local pub_key, priv_key, err = rsa.generate_rsa_keys(2048)
|
||||
if err then
|
||||
--print("密钥生成失败: ", err)
|
||||
print("密钥生成失败: ", err)
|
||||
local result = resp:json(0x00001)
|
||||
resp:send(result)
|
||||
return
|
||||
end
|
||||
print("token pubkey:", pub_key)
|
||||
local user_id = code_data.user_id
|
||||
--print("token user_id:", user_id)
|
||||
local client_id = code_data.client_id
|
||||
--print("token client_id:", client_id)
|
||||
local scope = code_data.scope
|
||||
--print("token scope:", scope)
|
||||
local access_token_ttl = 10 * 60 --十分钟
|
||||
local refresh_token_ttl = 7 * 24 * 3600 --7天
|
||||
-- 7 生成新 Access Token
|
||||
local access_payload = {
|
||||
sub = user_id, -- 用户ID
|
||||
client_id = client_id,
|
||||
scope = scope or "",
|
||||
exp = ngx.time() + access_token_ttl,
|
||||
jti = ngx.md5(ngx.time() .. math.random() .. client_id) -- 唯一标识
|
||||
}
|
||||
local new_access_token = jwt:sign(priv_key, {
|
||||
header = { typ = "JWT", alg = "HS256" },
|
||||
payload = access_payload
|
||||
})
|
||||
|
||||
-- 8 生成新 Refresh Token(滚动刷新)
|
||||
local refresh_payload = {
|
||||
sub = user_id,
|
||||
client_id = client_id,
|
||||
scope = scope or "",
|
||||
exp = ngx.time() + refresh_token_ttl,
|
||||
jti = ngx.md5(ngx.time() .. math.random() * 1000 .. client_id)
|
||||
}
|
||||
local new_refresh_token = jwt:sign(priv_key, {
|
||||
header = { typ = "JWT", alg = "HS256" },
|
||||
payload = refresh_payload
|
||||
})
|
||||
|
||||
-- 9、生存id_token
|
||||
-- 创建JWT的payload
|
||||
local payload = {
|
||||
iss = request_uri,
|
||||
sub = user_id,
|
||||
name = user_id,
|
||||
iat = os.time(),
|
||||
exp = os.time() + 3600
|
||||
}
|
||||
-- 使用私钥生成JWT
|
||||
local jwt_obj = jwt:sign(priv_key, {
|
||||
header = {
|
||||
type = "JWT",
|
||||
alg = "RS256"
|
||||
},
|
||||
payload = payload
|
||||
})
|
||||
if not jwt_obj then
|
||||
local result = resp:json(0x00001)
|
||||
resp:send(result)
|
||||
return
|
||||
end
|
||||
-- 6 生成新 Access Token
|
||||
local new_access_token = token.generate_access_token(priv_key, user_id, client_id, scope)
|
||||
-- 7 生成新 Refresh Token(滚动刷新)
|
||||
local new_refresh_token = token.generate_refresh_token(priv_key, user_id, client_id, scope)
|
||||
-- 8、生存id_token
|
||||
local new_id_token = token.generate_id_token(priv_key, user_id, client_id, scope)
|
||||
--ngx.say("Generated JWT: ", jwt_obj)
|
||||
-- 10. 返回结果
|
||||
-- 9. 返回结果
|
||||
local ret = {}
|
||||
ret.access_token = new_access_token
|
||||
ret.token_type = "Bearer"
|
||||
ret.expires_in = access_token_ttl
|
||||
ret.expires_in = 10 * 60
|
||||
ret.refresh_token = new_refresh_token
|
||||
ret.id_token = jwt_obj
|
||||
ret.id_token = new_id_token
|
||||
local result = resp:json(ngx.HTTP_OK, ret)
|
||||
resp:send(result)
|
||||
end
|
||||
|
|
@ -209,13 +163,13 @@ function _M:userinfo()
|
|||
--获取用户认证数据信息
|
||||
local auth_header = ngx.var.http_Authorization
|
||||
|
||||
--如果请求头中没有令牌,则直接返回401
|
||||
-- 1.如果请求头中没有令牌,则直接返回401
|
||||
if auth_header == nil or auth_header == "" then
|
||||
ngx.log(ngx.WARN, "没有找到令牌数据")
|
||||
ngx.status = ngx.HTTP_UNAUTHORIZED
|
||||
ngx.exit(ngx.HTTP_UNAUTHORIZED)
|
||||
end
|
||||
--查找令牌中的Bearer前缀字符
|
||||
-- 2.查找令牌中的Bearer前缀字符
|
||||
local data = {}
|
||||
data.Authorization = auth_header
|
||||
local ok = validator.validateUserinfo(data)
|
||||
|
|
@ -224,7 +178,7 @@ function _M:userinfo()
|
|||
ngx.status = ngx.HTTP_UNAUTHORIZED
|
||||
ngx.exit(ngx.HTTP_UNAUTHORIZED)
|
||||
end
|
||||
--获取token的数据值
|
||||
-- 3.获取token的数据值
|
||||
local token = string.sub(auth_header,8)
|
||||
--校验令牌
|
||||
local pub_key, priv_key, err = rsa.generate_rsa_keys(2048)
|
||||
|
|
@ -234,6 +188,7 @@ function _M:userinfo()
|
|||
resp:send(result)
|
||||
return
|
||||
end
|
||||
-- 5.对token进行验证
|
||||
print("userinfo pubkey:", pub_key)
|
||||
local jwt_obj = jwt:verify(pub_key, token)
|
||||
--如果校验结果中的verified==false,则表示令牌无效
|
||||
|
|
@ -249,7 +204,7 @@ function _M:userinfo()
|
|||
ngx.status = ngx.HTTP_UNAUTHORIZED
|
||||
ngx.exit(ngx.HTTP_UNAUTHORIZED)
|
||||
end
|
||||
--获取token中的信息进行所需用户的信息返回
|
||||
-- 6.获取token中的信息进行所需用户的信息返回
|
||||
local ret = {}
|
||||
ret.sub = 248289761001
|
||||
ret.name = "Jane Doe"
|
||||
|
|
|
|||
|
|
@ -6,18 +6,20 @@
|
|||
|
||||
local str = require "resty.string"
|
||||
local random = require "resty.random"
|
||||
local cjson = require("cjson.safe")
|
||||
|
||||
local _M = {}
|
||||
|
||||
-- 生成随机授权码(20字节)
|
||||
-- 生成随机授权码(16字节)
|
||||
local function generate_code()
|
||||
local random_bytes = random.bytes(20, true)
|
||||
local random_bytes = random.bytes(16)
|
||||
return str.to_hex(random_bytes)
|
||||
end
|
||||
|
||||
-- 存储授权码(有效期5分钟)
|
||||
function _M.create(user_id, client_id, redirect_uri, scope)
|
||||
local code = generate_code()
|
||||
print("authorize code:", code)
|
||||
local code_key = "auth_code-"..code
|
||||
local code_data = cjson.encode({
|
||||
user_id = user_id,
|
||||
|
|
@ -45,9 +47,11 @@ function _M.consume(code, client_id)
|
|||
shared_dict:delete(code_key)
|
||||
|
||||
local code_data = cjson.decode(data)
|
||||
--[[
|
||||
if code_data.client_id ~= client_id then
|
||||
return nil, "客户端不匹配"
|
||||
end
|
||||
--]]
|
||||
if code_data.expires_at < ngx.time() then
|
||||
return nil, "授权码已过期"
|
||||
end
|
||||
|
|
|
|||
|
|
@ -93,4 +93,66 @@ function _M.authorizationToken(auth_header)
|
|||
return response
|
||||
end
|
||||
|
||||
local access_token_ttl = 10 * 60 --十分钟
|
||||
local refresh_token_ttl = 7 * 24 * 3600 --7天
|
||||
local id_token_ttl = 60 * 60 --1小时
|
||||
|
||||
-- 生成 Access Token(简化为 JWT 格式)
|
||||
function _M.generate_access_token(priv_key, sub, client_id, scope)
|
||||
local now = ngx.time()
|
||||
local payload = {
|
||||
--iss = OP_DOMAIN,
|
||||
sub = sub,
|
||||
client_id = client_id,
|
||||
exp = now + access_token_ttl,
|
||||
iat = now,
|
||||
scope = scope, --"openid profile email"
|
||||
jti = ngx.md5(now .. math.random() .. client_id) -- 唯一标识
|
||||
}
|
||||
local access_token = jwt:sign(priv_key, {
|
||||
header = { typ = "JWT", alg = "HS256" },
|
||||
payload = payload
|
||||
})
|
||||
return access_token
|
||||
end
|
||||
|
||||
-- 生成 refresh Token(简化为 JWT 格式)
|
||||
function _M.generate_refresh_token(priv_key, sub, client_id, scope)
|
||||
local now = ngx.time()
|
||||
local payload = {
|
||||
--iss = OP_DOMAIN,
|
||||
sub = sub,
|
||||
client_id = client_id,
|
||||
exp = now + refresh_token_ttl,
|
||||
iat = now,
|
||||
scope = scope, --"openid profile email"
|
||||
jti = ngx.md5(now .. math.random() * 1000 .. client_id)
|
||||
}
|
||||
local refresh_token = jwt:sign(priv_key, {
|
||||
header = { typ = "JWT", alg = "HS256" },
|
||||
payload = payload
|
||||
})
|
||||
return refresh_token
|
||||
end
|
||||
|
||||
-- 生成 ID Token(JWT)
|
||||
function _M.generate_id_token(priv_key, sub, client_id, userinfo, scope)
|
||||
local now = ngx.time()
|
||||
local payload = {
|
||||
--iss = OP_DOMAIN, -- issuer:OP 域名
|
||||
sub = sub, -- subject:用户唯一标识
|
||||
aud = client_id, -- audience:客户端 ID
|
||||
exp = now + id_token_ttl, -- 过期时间(1小时)
|
||||
iat = now, -- 签发时间
|
||||
nonce = ngx.var.nonce, -- 可选:防重放攻击
|
||||
--name = userinfo.name,
|
||||
--email = userinfo.email
|
||||
}
|
||||
local id_token = jwt:sign(priv_key, {
|
||||
header = { typ = "JWT", alg = "HS256" }, -- 算法可选 HS256/RS256
|
||||
payload = payload
|
||||
})
|
||||
return id_token
|
||||
end
|
||||
|
||||
return _M
|
||||
Loading…
Reference in New Issue
Block a user