- 新增 Access Token + Refresh Token 双令牌认证 - 支持 Token 自动刷新和轮转 - 添加登出和撤销所有会话接口 - 前端实现无感刷新和主动刷新定时器
283 lines
9.5 KiB
TypeScript
283 lines
9.5 KiB
TypeScript
/**
|
|
* Axios HTTP Client Configuration
|
|
* Base client with interceptors for authentication, token refresh, and error handling
|
|
*/
|
|
|
|
import axios, { AxiosInstance, AxiosError, InternalAxiosRequestConfig, AxiosResponse } from 'axios'
|
|
import type { ApiResponse } from '@/types'
|
|
import { getLocale } from '@/i18n'
|
|
|
|
// ==================== Axios Instance Configuration ====================
|
|
|
|
const API_BASE_URL = import.meta.env.VITE_API_BASE_URL || '/api/v1'
|
|
|
|
export const apiClient: AxiosInstance = axios.create({
|
|
baseURL: API_BASE_URL,
|
|
timeout: 30000,
|
|
headers: {
|
|
'Content-Type': 'application/json'
|
|
}
|
|
})
|
|
|
|
// ==================== Token Refresh State ====================
|
|
|
|
// Track if a token refresh is in progress to prevent multiple simultaneous refresh requests
|
|
let isRefreshing = false
|
|
// Queue of requests waiting for token refresh
|
|
let refreshSubscribers: Array<(token: string) => void> = []
|
|
|
|
/**
|
|
* Subscribe to token refresh completion
|
|
*/
|
|
function subscribeTokenRefresh(callback: (token: string) => void): void {
|
|
refreshSubscribers.push(callback)
|
|
}
|
|
|
|
/**
|
|
* Notify all subscribers that token has been refreshed
|
|
*/
|
|
function onTokenRefreshed(token: string): void {
|
|
refreshSubscribers.forEach((callback) => callback(token))
|
|
refreshSubscribers = []
|
|
}
|
|
|
|
// ==================== Request Interceptor ====================
|
|
|
|
// Get user's timezone
|
|
const getUserTimezone = (): string => {
|
|
try {
|
|
return Intl.DateTimeFormat().resolvedOptions().timeZone
|
|
} catch {
|
|
return 'UTC'
|
|
}
|
|
}
|
|
|
|
apiClient.interceptors.request.use(
|
|
(config: InternalAxiosRequestConfig) => {
|
|
// Attach token from localStorage
|
|
const token = localStorage.getItem('auth_token')
|
|
if (token && config.headers) {
|
|
config.headers.Authorization = `Bearer ${token}`
|
|
}
|
|
|
|
// Attach locale for backend translations
|
|
if (config.headers) {
|
|
config.headers['Accept-Language'] = getLocale()
|
|
}
|
|
|
|
// Attach timezone for all GET requests (backend may use it for default date ranges)
|
|
if (config.method === 'get') {
|
|
if (!config.params) {
|
|
config.params = {}
|
|
}
|
|
config.params.timezone = getUserTimezone()
|
|
}
|
|
|
|
return config
|
|
},
|
|
(error) => {
|
|
return Promise.reject(error)
|
|
}
|
|
)
|
|
|
|
// ==================== Response Interceptor ====================
|
|
|
|
apiClient.interceptors.response.use(
|
|
(response: AxiosResponse) => {
|
|
// Unwrap standard API response format { code, message, data }
|
|
const apiResponse = response.data as ApiResponse<unknown>
|
|
if (apiResponse && typeof apiResponse === 'object' && 'code' in apiResponse) {
|
|
if (apiResponse.code === 0) {
|
|
// Success - return the data portion
|
|
response.data = apiResponse.data
|
|
} else {
|
|
// API error
|
|
return Promise.reject({
|
|
status: response.status,
|
|
code: apiResponse.code,
|
|
message: apiResponse.message || 'Unknown error'
|
|
})
|
|
}
|
|
}
|
|
return response
|
|
},
|
|
async (error: AxiosError<ApiResponse<unknown>>) => {
|
|
// Request cancellation: keep the original axios cancellation error so callers can ignore it.
|
|
// Otherwise we'd misclassify it as a generic "network error".
|
|
if (error.code === 'ERR_CANCELED' || axios.isCancel(error)) {
|
|
return Promise.reject(error)
|
|
}
|
|
|
|
const originalRequest = error.config as InternalAxiosRequestConfig & { _retry?: boolean }
|
|
|
|
// Handle common errors
|
|
if (error.response) {
|
|
const { status, data } = error.response
|
|
const url = String(error.config?.url || '')
|
|
|
|
// Validate `data` shape to avoid HTML error pages breaking our error handling.
|
|
const apiData = (typeof data === 'object' && data !== null ? data : {}) as Record<string, any>
|
|
|
|
// Ops monitoring disabled: treat as feature-flagged 404, and proactively redirect away
|
|
// from ops pages to avoid broken UI states.
|
|
if (status === 404 && apiData.message === 'Ops monitoring is disabled') {
|
|
try {
|
|
localStorage.setItem('ops_monitoring_enabled_cached', 'false')
|
|
} catch {
|
|
// ignore localStorage failures
|
|
}
|
|
try {
|
|
window.dispatchEvent(new CustomEvent('ops-monitoring-disabled'))
|
|
} catch {
|
|
// ignore event failures
|
|
}
|
|
|
|
if (window.location.pathname.startsWith('/admin/ops')) {
|
|
window.location.href = '/admin/settings'
|
|
}
|
|
|
|
return Promise.reject({
|
|
status,
|
|
code: 'OPS_DISABLED',
|
|
message: apiData.message || error.message,
|
|
url
|
|
})
|
|
}
|
|
|
|
// 401: Try to refresh the token if we have a refresh token
|
|
// This handles TOKEN_EXPIRED, INVALID_TOKEN, TOKEN_REVOKED, etc.
|
|
if (status === 401 && !originalRequest._retry) {
|
|
const refreshToken = localStorage.getItem('refresh_token')
|
|
const isAuthEndpoint =
|
|
url.includes('/auth/login') || url.includes('/auth/register') || url.includes('/auth/refresh')
|
|
|
|
// If we have a refresh token and this is not an auth endpoint, try to refresh
|
|
if (refreshToken && !isAuthEndpoint) {
|
|
if (isRefreshing) {
|
|
// Wait for the ongoing refresh to complete
|
|
return new Promise((resolve, reject) => {
|
|
subscribeTokenRefresh((newToken: string) => {
|
|
if (newToken) {
|
|
// Mark as retried to prevent infinite loop if retry also returns 401
|
|
originalRequest._retry = true
|
|
if (originalRequest.headers) {
|
|
originalRequest.headers.Authorization = `Bearer ${newToken}`
|
|
}
|
|
resolve(apiClient(originalRequest))
|
|
} else {
|
|
// Refresh failed, reject with original error
|
|
reject({
|
|
status,
|
|
code: apiData.code,
|
|
message: apiData.message || apiData.detail || error.message
|
|
})
|
|
}
|
|
})
|
|
})
|
|
}
|
|
|
|
originalRequest._retry = true
|
|
isRefreshing = true
|
|
|
|
try {
|
|
// Call refresh endpoint directly to avoid circular dependency
|
|
const refreshResponse = await axios.post(
|
|
`${API_BASE_URL}/auth/refresh`,
|
|
{ refresh_token: refreshToken },
|
|
{ headers: { 'Content-Type': 'application/json' } }
|
|
)
|
|
|
|
const refreshData = refreshResponse.data as ApiResponse<{
|
|
access_token: string
|
|
refresh_token: string
|
|
expires_in: number
|
|
}>
|
|
|
|
if (refreshData.code === 0 && refreshData.data) {
|
|
const { access_token, refresh_token: newRefreshToken, expires_in } = refreshData.data
|
|
|
|
// Update tokens in localStorage (convert expires_in to timestamp)
|
|
localStorage.setItem('auth_token', access_token)
|
|
localStorage.setItem('refresh_token', newRefreshToken)
|
|
localStorage.setItem('token_expires_at', String(Date.now() + expires_in * 1000))
|
|
|
|
// Notify subscribers with new token
|
|
onTokenRefreshed(access_token)
|
|
|
|
// Retry the original request with new token
|
|
if (originalRequest.headers) {
|
|
originalRequest.headers.Authorization = `Bearer ${access_token}`
|
|
}
|
|
|
|
isRefreshing = false
|
|
return apiClient(originalRequest)
|
|
}
|
|
|
|
// Refresh response was not successful, fall through to clear auth
|
|
throw new Error('Token refresh failed')
|
|
} catch (refreshError) {
|
|
// Refresh failed - notify subscribers with empty token
|
|
onTokenRefreshed('')
|
|
isRefreshing = false
|
|
|
|
// Clear tokens and redirect to login
|
|
localStorage.removeItem('auth_token')
|
|
localStorage.removeItem('refresh_token')
|
|
localStorage.removeItem('auth_user')
|
|
localStorage.removeItem('token_expires_at')
|
|
sessionStorage.setItem('auth_expired', '1')
|
|
|
|
if (!window.location.pathname.includes('/login')) {
|
|
window.location.href = '/login'
|
|
}
|
|
|
|
return Promise.reject({
|
|
status: 401,
|
|
code: 'TOKEN_REFRESH_FAILED',
|
|
message: 'Session expired. Please log in again.'
|
|
})
|
|
}
|
|
}
|
|
|
|
// No refresh token or is auth endpoint - clear auth and redirect
|
|
const hasToken = !!localStorage.getItem('auth_token')
|
|
const headers = error.config?.headers as Record<string, unknown> | undefined
|
|
const authHeader = headers?.Authorization ?? headers?.authorization
|
|
const sentAuth =
|
|
typeof authHeader === 'string'
|
|
? authHeader.trim() !== ''
|
|
: Array.isArray(authHeader)
|
|
? authHeader.length > 0
|
|
: !!authHeader
|
|
|
|
localStorage.removeItem('auth_token')
|
|
localStorage.removeItem('refresh_token')
|
|
localStorage.removeItem('auth_user')
|
|
localStorage.removeItem('token_expires_at')
|
|
if ((hasToken || sentAuth) && !isAuthEndpoint) {
|
|
sessionStorage.setItem('auth_expired', '1')
|
|
}
|
|
// Only redirect if not already on login page
|
|
if (!window.location.pathname.includes('/login')) {
|
|
window.location.href = '/login'
|
|
}
|
|
}
|
|
|
|
// Return structured error
|
|
return Promise.reject({
|
|
status,
|
|
code: apiData.code,
|
|
message: apiData.message || apiData.detail || error.message
|
|
})
|
|
}
|
|
|
|
// Network error
|
|
return Promise.reject({
|
|
status: 0,
|
|
message: 'Network error. Please check your connection.'
|
|
})
|
|
}
|
|
)
|
|
|
|
export default apiClient
|