新增功能: - 支持 Google Authenticator 等应用进行 TOTP 二次验证 - 用户可在个人设置中启用/禁用 2FA - 登录时支持 TOTP 验证流程 - 管理后台可全局开关 TOTP 功能 安全增强: - TOTP 密钥使用 AES-256-GCM 加密存储 - 添加 TOTP_ENCRYPTION_KEY 配置项,必须手动配置才能启用功能 - 防止服务重启导致加密密钥变更使用户无法登录 - 验证失败次数限制,防止暴力破解 配置说明: - Docker 部署:在 .env 中设置 TOTP_ENCRYPTION_KEY - 非 Docker 部署:在 config.yaml 中设置 totp.encryption_key - 生成密钥命令:openssl rand -hex 32
150 lines
4.2 KiB
Go
150 lines
4.2 KiB
Go
package repository
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/redis/go-redis/v9"
|
|
|
|
"github.com/Wei-Shaw/sub2api/internal/service"
|
|
)
|
|
|
|
const (
|
|
totpSetupKeyPrefix = "totp:setup:"
|
|
totpLoginKeyPrefix = "totp:login:"
|
|
totpAttemptsKeyPrefix = "totp:attempts:"
|
|
totpAttemptsTTL = 15 * time.Minute
|
|
)
|
|
|
|
// TotpCache implements service.TotpCache using Redis
|
|
type TotpCache struct {
|
|
rdb *redis.Client
|
|
}
|
|
|
|
// NewTotpCache creates a new TOTP cache
|
|
func NewTotpCache(rdb *redis.Client) service.TotpCache {
|
|
return &TotpCache{rdb: rdb}
|
|
}
|
|
|
|
// GetSetupSession retrieves a TOTP setup session
|
|
func (c *TotpCache) GetSetupSession(ctx context.Context, userID int64) (*service.TotpSetupSession, error) {
|
|
key := fmt.Sprintf("%s%d", totpSetupKeyPrefix, userID)
|
|
data, err := c.rdb.Get(ctx, key).Bytes()
|
|
if err != nil {
|
|
if err == redis.Nil {
|
|
return nil, nil
|
|
}
|
|
return nil, fmt.Errorf("get setup session: %w", err)
|
|
}
|
|
|
|
var session service.TotpSetupSession
|
|
if err := json.Unmarshal(data, &session); err != nil {
|
|
return nil, fmt.Errorf("unmarshal setup session: %w", err)
|
|
}
|
|
|
|
return &session, nil
|
|
}
|
|
|
|
// SetSetupSession stores a TOTP setup session
|
|
func (c *TotpCache) SetSetupSession(ctx context.Context, userID int64, session *service.TotpSetupSession, ttl time.Duration) error {
|
|
key := fmt.Sprintf("%s%d", totpSetupKeyPrefix, userID)
|
|
data, err := json.Marshal(session)
|
|
if err != nil {
|
|
return fmt.Errorf("marshal setup session: %w", err)
|
|
}
|
|
|
|
if err := c.rdb.Set(ctx, key, data, ttl).Err(); err != nil {
|
|
return fmt.Errorf("set setup session: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// DeleteSetupSession deletes a TOTP setup session
|
|
func (c *TotpCache) DeleteSetupSession(ctx context.Context, userID int64) error {
|
|
key := fmt.Sprintf("%s%d", totpSetupKeyPrefix, userID)
|
|
return c.rdb.Del(ctx, key).Err()
|
|
}
|
|
|
|
// GetLoginSession retrieves a TOTP login session
|
|
func (c *TotpCache) GetLoginSession(ctx context.Context, tempToken string) (*service.TotpLoginSession, error) {
|
|
key := totpLoginKeyPrefix + tempToken
|
|
data, err := c.rdb.Get(ctx, key).Bytes()
|
|
if err != nil {
|
|
if err == redis.Nil {
|
|
return nil, nil
|
|
}
|
|
return nil, fmt.Errorf("get login session: %w", err)
|
|
}
|
|
|
|
var session service.TotpLoginSession
|
|
if err := json.Unmarshal(data, &session); err != nil {
|
|
return nil, fmt.Errorf("unmarshal login session: %w", err)
|
|
}
|
|
|
|
return &session, nil
|
|
}
|
|
|
|
// SetLoginSession stores a TOTP login session
|
|
func (c *TotpCache) SetLoginSession(ctx context.Context, tempToken string, session *service.TotpLoginSession, ttl time.Duration) error {
|
|
key := totpLoginKeyPrefix + tempToken
|
|
data, err := json.Marshal(session)
|
|
if err != nil {
|
|
return fmt.Errorf("marshal login session: %w", err)
|
|
}
|
|
|
|
if err := c.rdb.Set(ctx, key, data, ttl).Err(); err != nil {
|
|
return fmt.Errorf("set login session: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// DeleteLoginSession deletes a TOTP login session
|
|
func (c *TotpCache) DeleteLoginSession(ctx context.Context, tempToken string) error {
|
|
key := totpLoginKeyPrefix + tempToken
|
|
return c.rdb.Del(ctx, key).Err()
|
|
}
|
|
|
|
// IncrementVerifyAttempts increments the verify attempt counter
|
|
func (c *TotpCache) IncrementVerifyAttempts(ctx context.Context, userID int64) (int, error) {
|
|
key := fmt.Sprintf("%s%d", totpAttemptsKeyPrefix, userID)
|
|
|
|
// Use pipeline for atomic increment and set TTL
|
|
pipe := c.rdb.Pipeline()
|
|
incrCmd := pipe.Incr(ctx, key)
|
|
pipe.Expire(ctx, key, totpAttemptsTTL)
|
|
|
|
if _, err := pipe.Exec(ctx); err != nil {
|
|
return 0, fmt.Errorf("increment verify attempts: %w", err)
|
|
}
|
|
|
|
count, err := incrCmd.Result()
|
|
if err != nil {
|
|
return 0, fmt.Errorf("get increment result: %w", err)
|
|
}
|
|
|
|
return int(count), nil
|
|
}
|
|
|
|
// GetVerifyAttempts gets the current verify attempt count
|
|
func (c *TotpCache) GetVerifyAttempts(ctx context.Context, userID int64) (int, error) {
|
|
key := fmt.Sprintf("%s%d", totpAttemptsKeyPrefix, userID)
|
|
count, err := c.rdb.Get(ctx, key).Int()
|
|
if err != nil {
|
|
if err == redis.Nil {
|
|
return 0, nil
|
|
}
|
|
return 0, fmt.Errorf("get verify attempts: %w", err)
|
|
}
|
|
return count, nil
|
|
}
|
|
|
|
// ClearVerifyAttempts clears the verify attempt counter
|
|
func (c *TotpCache) ClearVerifyAttempts(ctx context.Context, userID int64) error {
|
|
key := fmt.Sprintf("%s%d", totpAttemptsKeyPrefix, userID)
|
|
return c.rdb.Del(ctx, key).Err()
|
|
}
|