mirror of
https://github.com/Awuqing/BackupX.git
synced 2026-05-06 20:02:41 +08:00
Add complete MFA support with TOTP, recovery codes, WebAuthn, trusted-device cookie flow, and email/SMS OTP delivery via notification channels. Security follow-up: trusted device tokens are stored in HttpOnly cookies, and SMS OTP reuses the existing Webhook notifier to avoid introducing a new dynamic URL sink.
230 lines
8.6 KiB
Go
230 lines
8.6 KiB
Go
package service
|
||
|
||
import (
|
||
"context"
|
||
"strings"
|
||
|
||
"backupx/server/internal/apperror"
|
||
"backupx/server/internal/model"
|
||
"backupx/server/internal/repository"
|
||
"backupx/server/internal/security"
|
||
)
|
||
|
||
// UserService 管理账号(admin 专属)。
|
||
// 初始化阶段(无用户)由 AuthService.Setup 负责创建首个管理员,本服务从第二个用户开始。
|
||
type UserService struct {
|
||
users repository.UserRepository
|
||
}
|
||
|
||
func NewUserService(users repository.UserRepository) *UserService {
|
||
return &UserService{users: users}
|
||
}
|
||
|
||
// UserSummary 用户列表项(不含密码哈希)。
|
||
type UserSummary struct {
|
||
ID uint `json:"id"`
|
||
Username string `json:"username"`
|
||
DisplayName string `json:"displayName"`
|
||
Email string `json:"email"`
|
||
Phone string `json:"phone"`
|
||
Role string `json:"role"`
|
||
Disabled bool `json:"disabled"`
|
||
MFAEnabled bool `json:"mfaEnabled"`
|
||
TwoFactorEnabled bool `json:"twoFactorEnabled"`
|
||
TwoFactorRecoveryCodesRemaining int `json:"twoFactorRecoveryCodesRemaining"`
|
||
WebAuthnEnabled bool `json:"webAuthnEnabled"`
|
||
WebAuthnCredentialCount int `json:"webAuthnCredentialCount"`
|
||
TrustedDeviceCount int `json:"trustedDeviceCount"`
|
||
EmailOTPEnabled bool `json:"emailOtpEnabled"`
|
||
SMSOTPEnabled bool `json:"smsOtpEnabled"`
|
||
CreatedAt string `json:"createdAt"`
|
||
}
|
||
|
||
// UserUpsertInput 创建/更新用户的输入。
|
||
type UserUpsertInput struct {
|
||
Username string `json:"username" binding:"required,min=3,max=64"`
|
||
Password string `json:"password" binding:"omitempty,min=8,max=128"`
|
||
DisplayName string `json:"displayName" binding:"required,min=1,max=128"`
|
||
Email string `json:"email" binding:"omitempty,max=255"`
|
||
Phone string `json:"phone" binding:"omitempty,max=64"`
|
||
Role string `json:"role" binding:"required,oneof=admin operator viewer"`
|
||
Disabled bool `json:"disabled"`
|
||
}
|
||
|
||
func (s *UserService) List(ctx context.Context) ([]UserSummary, error) {
|
||
items, err := s.users.List(ctx)
|
||
if err != nil {
|
||
return nil, apperror.Internal("USER_LIST_FAILED", "无法获取用户列表", err)
|
||
}
|
||
result := make([]UserSummary, 0, len(items))
|
||
for i := range items {
|
||
result = append(result, toUserSummary(&items[i]))
|
||
}
|
||
return result, nil
|
||
}
|
||
|
||
func (s *UserService) Create(ctx context.Context, input UserUpsertInput) (*UserSummary, error) {
|
||
if !model.IsValidRole(input.Role) {
|
||
return nil, apperror.BadRequest("USER_INVALID", "非法的角色", nil)
|
||
}
|
||
if strings.TrimSpace(input.Password) == "" {
|
||
return nil, apperror.BadRequest("USER_INVALID", "创建用户必须指定密码", nil)
|
||
}
|
||
existing, err := s.users.FindByUsername(ctx, strings.TrimSpace(input.Username))
|
||
if err != nil {
|
||
return nil, apperror.Internal("USER_LOOKUP_FAILED", "无法校验用户名", err)
|
||
}
|
||
if existing != nil {
|
||
return nil, apperror.Conflict("USER_USERNAME_EXISTS", "用户名已存在", nil)
|
||
}
|
||
hash, err := security.HashPassword(input.Password)
|
||
if err != nil {
|
||
return nil, apperror.Internal("USER_HASH_FAILED", "无法处理密码", err)
|
||
}
|
||
user := &model.User{
|
||
Username: strings.TrimSpace(input.Username),
|
||
PasswordHash: hash,
|
||
DisplayName: strings.TrimSpace(input.DisplayName),
|
||
Email: strings.TrimSpace(input.Email),
|
||
Phone: strings.TrimSpace(input.Phone),
|
||
Role: input.Role,
|
||
Disabled: input.Disabled,
|
||
}
|
||
if err := s.users.Create(ctx, user); err != nil {
|
||
return nil, apperror.Internal("USER_CREATE_FAILED", "无法创建用户", err)
|
||
}
|
||
summary := toUserSummary(user)
|
||
return &summary, nil
|
||
}
|
||
|
||
func (s *UserService) Update(ctx context.Context, id uint, input UserUpsertInput) (*UserSummary, error) {
|
||
existing, err := s.users.FindByID(ctx, id)
|
||
if err != nil {
|
||
return nil, apperror.Internal("USER_GET_FAILED", "无法获取用户", err)
|
||
}
|
||
if existing == nil {
|
||
return nil, apperror.New(404, "USER_NOT_FOUND", "用户不存在", nil)
|
||
}
|
||
if !model.IsValidRole(input.Role) {
|
||
return nil, apperror.BadRequest("USER_INVALID", "非法的角色", nil)
|
||
}
|
||
// 校验用户名冲突
|
||
if strings.TrimSpace(input.Username) != existing.Username {
|
||
dup, err := s.users.FindByUsername(ctx, strings.TrimSpace(input.Username))
|
||
if err != nil {
|
||
return nil, apperror.Internal("USER_LOOKUP_FAILED", "无法校验用户名", err)
|
||
}
|
||
if dup != nil {
|
||
return nil, apperror.Conflict("USER_USERNAME_EXISTS", "用户名已存在", nil)
|
||
}
|
||
}
|
||
passwordChanged := strings.TrimSpace(input.Password) != ""
|
||
disabledChanged := input.Disabled && !existing.Disabled
|
||
emailChanged := strings.TrimSpace(input.Email) != strings.TrimSpace(existing.Email)
|
||
phoneChanged := strings.TrimSpace(input.Phone) != strings.TrimSpace(existing.Phone)
|
||
existing.Username = strings.TrimSpace(input.Username)
|
||
existing.DisplayName = strings.TrimSpace(input.DisplayName)
|
||
existing.Email = strings.TrimSpace(input.Email)
|
||
existing.Phone = strings.TrimSpace(input.Phone)
|
||
existing.Role = input.Role
|
||
existing.Disabled = input.Disabled
|
||
if passwordChanged {
|
||
hash, err := security.HashPassword(input.Password)
|
||
if err != nil {
|
||
return nil, apperror.Internal("USER_HASH_FAILED", "无法处理密码", err)
|
||
}
|
||
existing.PasswordHash = hash
|
||
existing.TrustedDevices = ""
|
||
existing.OutOfBandOTPCiphertext = ""
|
||
existing.WebAuthnChallengeCiphertext = ""
|
||
}
|
||
if strings.TrimSpace(existing.Email) == "" && existing.EmailOTPEnabled {
|
||
existing.EmailOTPEnabled = false
|
||
existing.OutOfBandOTPCiphertext = ""
|
||
}
|
||
if strings.TrimSpace(existing.Phone) == "" && existing.SMSOTPEnabled {
|
||
existing.SMSOTPEnabled = false
|
||
existing.OutOfBandOTPCiphertext = ""
|
||
}
|
||
if emailChanged || phoneChanged {
|
||
existing.OutOfBandOTPCiphertext = ""
|
||
}
|
||
if disabledChanged {
|
||
existing.TrustedDevices = ""
|
||
existing.OutOfBandOTPCiphertext = ""
|
||
existing.WebAuthnChallengeCiphertext = ""
|
||
}
|
||
clearTrustedDevicesIfMFAOff(existing)
|
||
if err := s.users.Update(ctx, existing); err != nil {
|
||
return nil, apperror.Internal("USER_UPDATE_FAILED", "无法更新用户", err)
|
||
}
|
||
summary := toUserSummary(existing)
|
||
return &summary, nil
|
||
}
|
||
|
||
func (s *UserService) Delete(ctx context.Context, id uint) error {
|
||
existing, err := s.users.FindByID(ctx, id)
|
||
if err != nil {
|
||
return apperror.Internal("USER_GET_FAILED", "无法获取用户", err)
|
||
}
|
||
if existing == nil {
|
||
return apperror.New(404, "USER_NOT_FOUND", "用户不存在", nil)
|
||
}
|
||
// 禁止删除系统中最后一个 admin(防止系统失权)
|
||
if existing.Role == model.UserRoleAdmin {
|
||
count, err := s.users.CountByRole(ctx, model.UserRoleAdmin)
|
||
if err != nil {
|
||
return apperror.Internal("USER_COUNT_FAILED", "无法统计管理员数量", err)
|
||
}
|
||
if count <= 1 {
|
||
return apperror.BadRequest("USER_LAST_ADMIN", "不能删除系统最后一个管理员", nil)
|
||
}
|
||
}
|
||
return s.users.Delete(ctx, id)
|
||
}
|
||
|
||
func (s *UserService) ResetTwoFactor(ctx context.Context, id uint) (*UserSummary, error) {
|
||
existing, err := s.users.FindByID(ctx, id)
|
||
if err != nil {
|
||
return nil, apperror.Internal("USER_GET_FAILED", "无法获取用户", err)
|
||
}
|
||
if existing == nil {
|
||
return nil, apperror.New(404, "USER_NOT_FOUND", "用户不存在", nil)
|
||
}
|
||
existing.TwoFactorEnabled = false
|
||
existing.TwoFactorSecretCiphertext = ""
|
||
existing.TwoFactorRecoveryCodeHashes = ""
|
||
existing.WebAuthnCredentials = ""
|
||
existing.WebAuthnChallengeCiphertext = ""
|
||
existing.TrustedDevices = ""
|
||
existing.EmailOTPEnabled = false
|
||
existing.SMSOTPEnabled = false
|
||
existing.OutOfBandOTPCiphertext = ""
|
||
if err := s.users.Update(ctx, existing); err != nil {
|
||
return nil, apperror.Internal("USER_2FA_RESET_FAILED", "无法重置 MFA", err)
|
||
}
|
||
summary := toUserSummary(existing)
|
||
return &summary, nil
|
||
}
|
||
|
||
func toUserSummary(u *model.User) UserSummary {
|
||
return UserSummary{
|
||
ID: u.ID,
|
||
Username: u.Username,
|
||
DisplayName: u.DisplayName,
|
||
Email: u.Email,
|
||
Phone: u.Phone,
|
||
Role: u.Role,
|
||
Disabled: u.Disabled,
|
||
MFAEnabled: userMFAEnabled(u),
|
||
TwoFactorEnabled: u.TwoFactorEnabled,
|
||
TwoFactorRecoveryCodesRemaining: recoveryCodeRemainingCount(u),
|
||
WebAuthnEnabled: webAuthnCredentialCount(u) > 0,
|
||
WebAuthnCredentialCount: webAuthnCredentialCount(u),
|
||
TrustedDeviceCount: trustedDeviceCount(u),
|
||
EmailOTPEnabled: u.EmailOTPEnabled,
|
||
SMSOTPEnabled: u.SMSOTPEnabled,
|
||
CreatedAt: u.CreatedAt.Format("2006-01-02T15:04:05Z07:00"),
|
||
}
|
||
}
|