loginService.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112
  1. package pub
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "perms-system-server/internal/consts"
  7. "perms-system-server/internal/loaders"
  8. authHelper "perms-system-server/internal/logic/auth"
  9. "perms-system-server/internal/model/user"
  10. "perms-system-server/internal/svc"
  11. "github.com/zeromicro/go-zero/core/limit"
  12. "golang.org/x/crypto/bcrypt"
  13. )
  14. // dummyBcryptHash 用于对不存在的用户名执行等时 bcrypt 比对,防止基于响应时间的用户名枚举
  15. var dummyBcryptHash, _ = bcrypt.GenerateFromPassword([]byte("dummy-anti-timing"), bcrypt.DefaultCost)
  16. type LoginResult struct {
  17. UserDetails *loaders.UserDetails
  18. AccessToken string
  19. RefreshToken string
  20. }
  21. type LoginError struct {
  22. Code int
  23. Message string
  24. }
  25. func (e *LoginError) Error() string {
  26. return e.Message
  27. }
  28. func checkUsernameLimit(svcCtx *svc.ServiceContext, clientIP, username string) bool {
  29. if svcCtx.UsernameLoginLimit == nil {
  30. return false
  31. }
  32. key := fmt.Sprintf("%s:%s", clientIP, username)
  33. code, _ := svcCtx.UsernameLoginLimit.Take(key)
  34. return code == limit.OverQuota
  35. }
  36. func ValidateProductLogin(ctx context.Context, svcCtx *svc.ServiceContext, username, password, productCode, clientIP string) (*LoginResult, error) {
  37. if checkUsernameLimit(svcCtx, clientIP, username) {
  38. return nil, &LoginError{Code: 429, Message: "该账号登录尝试过于频繁,请5分钟后再试"}
  39. }
  40. u, err := svcCtx.SysUserModel.FindOneByUsername(ctx, username)
  41. if err != nil {
  42. if errors.Is(err, user.ErrNotFound) {
  43. bcrypt.CompareHashAndPassword(dummyBcryptHash, []byte(password))
  44. return nil, &LoginError{Code: 401, Message: "用户名或密码错误"}
  45. }
  46. return nil, err
  47. }
  48. if u.Status != consts.StatusEnabled {
  49. return nil, &LoginError{Code: 403, Message: "账号已被冻结"}
  50. }
  51. if err := bcrypt.CompareHashAndPassword([]byte(u.Password), []byte(password)); err != nil {
  52. return nil, &LoginError{Code: 401, Message: "用户名或密码错误"}
  53. }
  54. if u.IsSuperAdmin == consts.IsSuperAdminYes {
  55. return nil, &LoginError{Code: 403, Message: "超级管理员不允许通过产品端登录,请使用管理后台"}
  56. }
  57. product, err := svcCtx.SysProductModel.FindOneByCode(ctx, productCode)
  58. if err != nil {
  59. return nil, &LoginError{Code: 400, Message: "产品不存在"}
  60. }
  61. if product.Status != consts.StatusEnabled {
  62. return nil, &LoginError{Code: 403, Message: "该产品已被禁用"}
  63. }
  64. member, memberErr := svcCtx.SysProductMemberModel.FindOneByProductCodeUserId(ctx, productCode, u.Id)
  65. if memberErr != nil {
  66. return nil, &LoginError{Code: 403, Message: "您不是该产品的成员"}
  67. }
  68. if member.Status != consts.StatusEnabled {
  69. return nil, &LoginError{Code: 403, Message: "您在该产品下的成员资格已被禁用"}
  70. }
  71. ud := svcCtx.UserDetailsLoader.Load(ctx, u.Id, productCode)
  72. accessToken, err := authHelper.GenerateAccessToken(
  73. svcCtx.Config.Auth.AccessSecret,
  74. svcCtx.Config.Auth.AccessExpire,
  75. ud.UserId, ud.Username, ud.ProductCode, ud.MemberType, ud.TokenVersion,
  76. )
  77. if err != nil {
  78. return nil, err
  79. }
  80. refreshToken, err := authHelper.GenerateRefreshToken(
  81. svcCtx.Config.Auth.RefreshSecret,
  82. svcCtx.Config.Auth.RefreshExpire,
  83. ud.UserId, ud.ProductCode, ud.TokenVersion,
  84. )
  85. if err != nil {
  86. return nil, err
  87. }
  88. return &LoginResult{
  89. UserDetails: ud,
  90. AccessToken: accessToken,
  91. RefreshToken: refreshToken,
  92. }, nil
  93. }