createProductLogic.go 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207
  1. package product
  2. import (
  3. "context"
  4. "crypto/rand"
  5. "encoding/hex"
  6. "encoding/json"
  7. "fmt"
  8. "regexp"
  9. "time"
  10. "perms-system-server/internal/consts"
  11. authHelper "perms-system-server/internal/logic/auth"
  12. productModel "perms-system-server/internal/model/product"
  13. "perms-system-server/internal/model/productmember"
  14. userModel "perms-system-server/internal/model/user"
  15. "perms-system-server/internal/response"
  16. "perms-system-server/internal/svc"
  17. "perms-system-server/internal/types"
  18. "perms-system-server/internal/util"
  19. "github.com/zeromicro/go-zero/core/logx"
  20. "github.com/zeromicro/go-zero/core/stores/sqlx"
  21. "golang.org/x/crypto/bcrypt"
  22. )
  23. // 审计 M-4:CreateProduct 不再把 adminPassword/appSecret 明文写入响应体;改为把"真正的初始凭证"
  24. // 暂存 Redis,并只把一次性消费票据放进响应。票据本身是短期(5 分钟)+ 一次性,即使被上游日志/APM
  25. // 错误记录,也只能换一次而无法长期复用。
  26. const (
  27. initialCredentialsTTL = 5 * time.Minute
  28. initialCredentialsKeyPrefix = "pm:initcred:"
  29. )
  30. // initialCredentialsPayload 实际落 Redis 的凭证载荷。放在内部文件以避免跨包暴露结构。
  31. type initialCredentialsPayload struct {
  32. AppKey string `json:"appKey"`
  33. AppSecret string `json:"appSecret"`
  34. AdminUser string `json:"adminUser"`
  35. AdminPassword string `json:"adminPassword"`
  36. }
  37. var productCodeRegexp = regexp.MustCompile(`^[a-zA-Z][a-zA-Z0-9_-]{1,63}$`)
  38. type CreateProductLogic struct {
  39. logx.Logger
  40. ctx context.Context
  41. svcCtx *svc.ServiceContext
  42. }
  43. func NewCreateProductLogic(ctx context.Context, svcCtx *svc.ServiceContext) *CreateProductLogic {
  44. return &CreateProductLogic{
  45. Logger: logx.WithContext(ctx),
  46. ctx: ctx,
  47. svcCtx: svcCtx,
  48. }
  49. }
  50. // CreateProduct 创建产品。仅超管可调用,自动生成 appKey/appSecret 和产品专属管理员账号,用于接入新的业务产品。
  51. func (l *CreateProductLogic) CreateProduct(req *types.CreateProductReq) (resp *types.CreateProductResp, err error) {
  52. if err := authHelper.RequireSuperAdmin(l.ctx); err != nil {
  53. return nil, err
  54. }
  55. if !productCodeRegexp.MatchString(req.Code) {
  56. return nil, response.ErrBadRequest("产品编码只能包含字母、数字、下划线和中划线,须以字母开头,长度2-64")
  57. }
  58. if len(req.Name) > 64 {
  59. return nil, response.ErrBadRequest("产品名称长度不能超过64个字符")
  60. }
  61. if len(req.Remark) > 255 {
  62. return nil, response.ErrBadRequest("备注长度不能超过255个字符")
  63. }
  64. _, findErr := l.svcCtx.SysProductModel.FindOneByCode(l.ctx, req.Code)
  65. if findErr == nil {
  66. return nil, response.ErrConflict("产品编码已存在")
  67. }
  68. appKey, err := generateRandomHex(16)
  69. if err != nil {
  70. return nil, err
  71. }
  72. rawAppSecret, err := generateRandomHex(32)
  73. if err != nil {
  74. return nil, err
  75. }
  76. appSecretHash, err := bcrypt.GenerateFromPassword([]byte(rawAppSecret), bcrypt.DefaultCost)
  77. if err != nil {
  78. return nil, err
  79. }
  80. now := time.Now().Unix()
  81. adminUsername := fmt.Sprintf("admin_%s", req.Code)
  82. if _, err := l.svcCtx.SysUserModel.FindOneByUsername(l.ctx, adminUsername); err == nil {
  83. return nil, response.ErrConflict(fmt.Sprintf("用户名 %s 已存在,无法自动创建管理员账号", adminUsername))
  84. }
  85. adminPassword, err := generateRandomHex(12)
  86. if err != nil {
  87. return nil, err
  88. }
  89. hashedPwd, err := bcrypt.GenerateFromPassword([]byte(adminPassword), bcrypt.DefaultCost)
  90. if err != nil {
  91. return nil, err
  92. }
  93. var productId int64
  94. err = l.svcCtx.SysProductModel.TransactCtx(l.ctx, func(ctx context.Context, session sqlx.Session) error {
  95. result, err := l.svcCtx.SysProductModel.InsertWithTx(ctx, session, &productModel.SysProduct{
  96. Code: req.Code,
  97. Name: req.Name,
  98. AppKey: appKey,
  99. AppSecret: string(appSecretHash),
  100. Remark: req.Remark,
  101. Status: consts.StatusEnabled,
  102. CreateTime: now,
  103. UpdateTime: now,
  104. })
  105. if err != nil {
  106. return err
  107. }
  108. productId, _ = result.LastInsertId()
  109. userResult, err := l.svcCtx.SysUserModel.InsertWithTx(ctx, session, &userModel.SysUser{
  110. Username: adminUsername,
  111. Password: string(hashedPwd),
  112. Nickname: fmt.Sprintf("%s管理员", req.Name),
  113. IsSuperAdmin: consts.IsSuperAdminNo,
  114. MustChangePassword: consts.MustChangePasswordYes,
  115. Status: consts.StatusEnabled,
  116. CreateTime: now,
  117. UpdateTime: now,
  118. })
  119. if err != nil {
  120. return err
  121. }
  122. userId, _ := userResult.LastInsertId()
  123. _, err = l.svcCtx.SysProductMemberModel.InsertWithTx(ctx, session, &productmember.SysProductMember{
  124. ProductCode: req.Code,
  125. UserId: userId,
  126. MemberType: consts.MemberTypeAdmin,
  127. Status: consts.StatusEnabled,
  128. CreateTime: now,
  129. UpdateTime: now,
  130. })
  131. return err
  132. })
  133. if err != nil {
  134. // 前置的 FindOneByCode / FindOneByUsername 已经在大多数合法请求里把"产品码/用户名已存在"
  135. // 分辨清楚并返回具体文案。落到这里的 1062 基本都是同秒并发创建的稀有竞态,按审计 M-5 的
  136. // 建议不再用 strings.Contains 匹配 MySQL 错误消息中的索引名(不同版本的文案不稳定,
  137. // 改索引名会导致静默降级成通用冲突);直接统一回通用冲突让前端重试,由 pre-check 负责语义。
  138. if util.IsDuplicateEntryErr(err) {
  139. return nil, response.ErrConflict("数据冲突,请稍后重试")
  140. }
  141. return nil, err
  142. }
  143. // 生成一次性凭证票据(32 字节随机,hex 编码)。
  144. ticket, err := generateRandomHex(32)
  145. if err != nil {
  146. // 退化策略:Redis 写入失败时不该返回明文密码(那样就回到了 M-4 的老毛病)。
  147. // 这里直接 500,让运维查链路;调用方可根据业务决定重启流程。
  148. logx.WithContext(l.ctx).Errorf("CreateProduct: generate credentials ticket failed: %v", err)
  149. return nil, response.NewCodeError(500, "生成初始凭证票据失败,请稍后重试")
  150. }
  151. payload := initialCredentialsPayload{
  152. AppKey: appKey,
  153. AppSecret: rawAppSecret,
  154. AdminUser: adminUsername,
  155. AdminPassword: adminPassword,
  156. }
  157. buf, mErr := json.Marshal(&payload)
  158. if mErr != nil {
  159. logx.WithContext(l.ctx).Errorf("CreateProduct: marshal credentials payload failed: %v", mErr)
  160. return nil, response.NewCodeError(500, "封装初始凭证失败,请稍后重试")
  161. }
  162. ticketKey := initialCredentialsKeyPrefix + ticket
  163. if setErr := l.svcCtx.Redis.SetexCtx(l.ctx, ticketKey, string(buf), int(initialCredentialsTTL/time.Second)); setErr != nil {
  164. logx.WithContext(l.ctx).Errorf("CreateProduct: stash credentials to redis failed: %v", setErr)
  165. return nil, response.NewCodeError(500, "暂存初始凭证失败,请稍后重试")
  166. }
  167. // 仅脱敏字段 + ticket 落响应体。productCode / adminUser 属于可公开的管理信息。
  168. logx.WithContext(l.ctx).Infof("CreateProduct: product=%s admin=%s credentialsTicketIssued ttl=%s",
  169. req.Code, adminUsername, initialCredentialsTTL)
  170. return &types.CreateProductResp{
  171. Id: productId,
  172. Code: req.Code,
  173. AppKey: appKey,
  174. AdminUser: adminUsername,
  175. CredentialsTicket: ticket,
  176. CredentialsExpiresAt: time.Now().Add(initialCredentialsTTL).Unix(),
  177. }, nil
  178. }
  179. func generateRandomHex(byteLen int) (string, error) {
  180. b := make([]byte, byteLen)
  181. if _, err := rand.Read(b); err != nil {
  182. return "", fmt.Errorf("generate random bytes failed: %w", err)
  183. }
  184. return hex.EncodeToString(b), nil
  185. }