adminLoginLogic.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. package pub
  2. import (
  3. "context"
  4. "crypto/subtle"
  5. "errors"
  6. "time"
  7. "perms-system-server/internal/consts"
  8. authHelper "perms-system-server/internal/logic/auth"
  9. "perms-system-server/internal/model/user"
  10. "perms-system-server/internal/response"
  11. "perms-system-server/internal/svc"
  12. "perms-system-server/internal/types"
  13. "github.com/zeromicro/go-zero/core/logx"
  14. "golang.org/x/crypto/bcrypt"
  15. )
  16. type AdminLoginLogic struct {
  17. logx.Logger
  18. ctx context.Context
  19. svcCtx *svc.ServiceContext
  20. }
  21. func NewAdminLoginLogic(ctx context.Context, svcCtx *svc.ServiceContext) *AdminLoginLogic {
  22. return &AdminLoginLogic{
  23. Logger: logx.WithContext(ctx),
  24. ctx: ctx,
  25. svcCtx: svcCtx,
  26. }
  27. }
  28. func (l *AdminLoginLogic) AdminLogin(req *types.AdminLoginReq) (resp *types.LoginResp, err error) {
  29. if subtle.ConstantTimeCompare([]byte(req.ManagementKey), []byte(l.svcCtx.Config.Auth.ManagementKey)) != 1 {
  30. return nil, response.ErrUnauthorized("managementKey无效")
  31. }
  32. u, err := l.svcCtx.SysUserModel.FindOneByUsername(l.ctx, req.Username)
  33. if err != nil {
  34. if errors.Is(err, user.ErrNotFound) {
  35. return nil, response.ErrUnauthorized("用户名或密码错误")
  36. }
  37. return nil, err
  38. }
  39. if u.Status != consts.StatusEnabled {
  40. return nil, response.ErrForbidden("账号已被冻结")
  41. }
  42. if err := bcrypt.CompareHashAndPassword([]byte(u.Password), []byte(req.Password)); err != nil {
  43. return nil, response.ErrUnauthorized("用户名或密码错误")
  44. }
  45. if u.IsSuperAdmin != consts.IsSuperAdminYes {
  46. return nil, response.ErrForbidden("仅超级管理员可通过管理后台登录")
  47. }
  48. ud := l.svcCtx.UserDetailsLoader.Load(l.ctx, u.Id, "")
  49. accessToken, err := authHelper.GenerateAccessToken(
  50. l.svcCtx.Config.Auth.AccessSecret,
  51. l.svcCtx.Config.Auth.AccessExpire,
  52. ud.UserId, ud.Username, ud.ProductCode, ud.MemberType, ud.TokenVersion,
  53. )
  54. if err != nil {
  55. return nil, err
  56. }
  57. refreshToken, err := authHelper.GenerateRefreshToken(
  58. l.svcCtx.Config.Auth.RefreshSecret,
  59. l.svcCtx.Config.Auth.RefreshExpire,
  60. ud.UserId, ud.ProductCode, ud.TokenVersion,
  61. )
  62. if err != nil {
  63. return nil, err
  64. }
  65. return &types.LoginResp{
  66. AccessToken: accessToken,
  67. RefreshToken: refreshToken,
  68. Expires: time.Now().Unix() + l.svcCtx.Config.Auth.AccessExpire,
  69. UserInfo: types.UserInfo{
  70. UserId: ud.UserId,
  71. Username: ud.Username,
  72. Nickname: ud.Nickname,
  73. Avatar: ud.Avatar,
  74. Email: ud.Email,
  75. Phone: ud.Phone,
  76. IsSuperAdmin: ud.IsSuperAdminRaw,
  77. MustChangePassword: ud.MustChangePwdRaw,
  78. MemberType: ud.MemberType,
  79. Perms: ud.Perms,
  80. },
  81. }, nil
  82. }