| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118 |
- package pub
- import (
- "context"
- "errors"
- "fmt"
- "perms-system-server/internal/consts"
- "perms-system-server/internal/loaders"
- authHelper "perms-system-server/internal/logic/auth"
- "perms-system-server/internal/model/user"
- "perms-system-server/internal/svc"
- "github.com/zeromicro/go-zero/core/limit"
- "golang.org/x/crypto/bcrypt"
- )
- // dummyBcryptHash 用于对不存在的用户名执行等时 bcrypt 比对,防止基于响应时间的用户名枚举
- var dummyBcryptHash, _ = bcrypt.GenerateFromPassword([]byte("dummy-anti-timing"), bcrypt.DefaultCost)
- type LoginResult struct {
- UserDetails *loaders.UserDetails
- AccessToken string
- RefreshToken string
- }
- type LoginError struct {
- Code int
- Message string
- }
- func (e *LoginError) Error() string {
- return e.Message
- }
- func checkUsernameLimit(svcCtx *svc.ServiceContext, clientIP, username string) bool {
- if svcCtx.UsernameLoginLimit == nil {
- return false
- }
- key := fmt.Sprintf("%s:%s", clientIP, username)
- code, _ := svcCtx.UsernameLoginLimit.Take(key)
- return code == limit.OverQuota
- }
- func ValidateProductLogin(ctx context.Context, svcCtx *svc.ServiceContext, username, password, productCode, clientIP string) (*LoginResult, error) {
- if checkUsernameLimit(svcCtx, clientIP, username) {
- return nil, &LoginError{Code: 429, Message: "该账号登录尝试过于频繁,请5分钟后再试"}
- }
- u, lookupErr := svcCtx.SysUserModel.FindOneByUsername(ctx, username)
- var userHash []byte
- if lookupErr != nil {
- if !errors.Is(lookupErr, user.ErrNotFound) {
- return nil, lookupErr
- }
- userHash = dummyBcryptHash
- } else {
- userHash = []byte(u.Password)
- }
- // 无条件执行一次 bcrypt:让"账号不存在 / 冻结 / 密码错"三条路径在耗时上完全等长,
- // 消除基于响应时间的账号存在性 / 冻结状态 oracle(见审计 H-2)。
- bcryptErr := bcrypt.CompareHashAndPassword(userHash, []byte(password))
- if lookupErr != nil || bcryptErr != nil {
- return nil, &LoginError{Code: 401, Message: "用户名或密码错误"}
- }
- // 密码正确之后再披露账号语义状态:此时攻击者已经猜中密码,再隐藏"冻结/超管"已无意义。
- if u.Status != consts.StatusEnabled {
- return nil, &LoginError{Code: 403, Message: "账号已被冻结"}
- }
- if u.IsSuperAdmin == consts.IsSuperAdminYes {
- return nil, &LoginError{Code: 403, Message: "超级管理员不允许通过产品端登录,请使用管理后台"}
- }
- product, err := svcCtx.SysProductModel.FindOneByCode(ctx, productCode)
- if err != nil {
- return nil, &LoginError{Code: 400, Message: "产品不存在"}
- }
- if product.Status != consts.StatusEnabled {
- return nil, &LoginError{Code: 403, Message: "该产品已被禁用"}
- }
- member, memberErr := svcCtx.SysProductMemberModel.FindOneByProductCodeUserId(ctx, productCode, u.Id)
- if memberErr != nil {
- return nil, &LoginError{Code: 403, Message: "您不是该产品的成员"}
- }
- if member.Status != consts.StatusEnabled {
- return nil, &LoginError{Code: 403, Message: "您在该产品下的成员资格已被禁用"}
- }
- ud := svcCtx.UserDetailsLoader.Load(ctx, u.Id, productCode)
- accessToken, err := authHelper.GenerateAccessToken(
- svcCtx.Config.Auth.AccessSecret,
- svcCtx.Config.Auth.AccessExpire,
- ud.UserId, ud.Username, ud.ProductCode, ud.MemberType, ud.TokenVersion,
- )
- if err != nil {
- return nil, err
- }
- refreshToken, err := authHelper.GenerateRefreshToken(
- svcCtx.Config.Auth.RefreshSecret,
- svcCtx.Config.Auth.RefreshExpire,
- ud.UserId, ud.ProductCode, ud.TokenVersion,
- )
- if err != nil {
- return nil, err
- }
- return &LoginResult{
- UserDetails: ud,
- AccessToken: accessToken,
- RefreshToken: refreshToken,
- }, nil
- }
|