新增功能: - 支持 Google Authenticator 等应用进行 TOTP 二次验证 - 用户可在个人设置中启用/禁用 2FA - 登录时支持 TOTP 验证流程 - 管理后台可全局开关 TOTP 功能 安全增强: - TOTP 密钥使用 AES-256-GCM 加密存储 - 添加 TOTP_ENCRYPTION_KEY 配置项,必须手动配置才能启用功能 - 防止服务重启导致加密密钥变更使用户无法登录 - 验证失败次数限制,防止暴力破解 配置说明: - Docker 部署:在 .env 中设置 TOTP_ENCRYPTION_KEY - 非 Docker 部署:在 config.yaml 中设置 totp.encryption_key - 生成密钥命令:openssl rand -hex 32
430 lines
12 KiB
Go
430 lines
12 KiB
Go
package handler
|
|
|
|
import (
|
|
"log/slog"
|
|
|
|
"github.com/Wei-Shaw/sub2api/internal/config"
|
|
"github.com/Wei-Shaw/sub2api/internal/handler/dto"
|
|
"github.com/Wei-Shaw/sub2api/internal/pkg/ip"
|
|
"github.com/Wei-Shaw/sub2api/internal/pkg/response"
|
|
middleware2 "github.com/Wei-Shaw/sub2api/internal/server/middleware"
|
|
"github.com/Wei-Shaw/sub2api/internal/service"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
)
|
|
|
|
// AuthHandler handles authentication-related requests
|
|
type AuthHandler struct {
|
|
cfg *config.Config
|
|
authService *service.AuthService
|
|
userService *service.UserService
|
|
settingSvc *service.SettingService
|
|
promoService *service.PromoService
|
|
totpService *service.TotpService
|
|
}
|
|
|
|
// NewAuthHandler creates a new AuthHandler
|
|
func NewAuthHandler(cfg *config.Config, authService *service.AuthService, userService *service.UserService, settingService *service.SettingService, promoService *service.PromoService, totpService *service.TotpService) *AuthHandler {
|
|
return &AuthHandler{
|
|
cfg: cfg,
|
|
authService: authService,
|
|
userService: userService,
|
|
settingSvc: settingService,
|
|
promoService: promoService,
|
|
totpService: totpService,
|
|
}
|
|
}
|
|
|
|
// RegisterRequest represents the registration request payload
|
|
type RegisterRequest struct {
|
|
Email string `json:"email" binding:"required,email"`
|
|
Password string `json:"password" binding:"required,min=6"`
|
|
VerifyCode string `json:"verify_code"`
|
|
TurnstileToken string `json:"turnstile_token"`
|
|
PromoCode string `json:"promo_code"` // 注册优惠码
|
|
}
|
|
|
|
// SendVerifyCodeRequest 发送验证码请求
|
|
type SendVerifyCodeRequest struct {
|
|
Email string `json:"email" binding:"required,email"`
|
|
TurnstileToken string `json:"turnstile_token"`
|
|
}
|
|
|
|
// SendVerifyCodeResponse 发送验证码响应
|
|
type SendVerifyCodeResponse struct {
|
|
Message string `json:"message"`
|
|
Countdown int `json:"countdown"` // 倒计时秒数
|
|
}
|
|
|
|
// LoginRequest represents the login request payload
|
|
type LoginRequest struct {
|
|
Email string `json:"email" binding:"required,email"`
|
|
Password string `json:"password" binding:"required"`
|
|
TurnstileToken string `json:"turnstile_token"`
|
|
}
|
|
|
|
// AuthResponse 认证响应格式(匹配前端期望)
|
|
type AuthResponse struct {
|
|
AccessToken string `json:"access_token"`
|
|
TokenType string `json:"token_type"`
|
|
User *dto.User `json:"user"`
|
|
}
|
|
|
|
// Register handles user registration
|
|
// POST /api/v1/auth/register
|
|
func (h *AuthHandler) Register(c *gin.Context) {
|
|
var req RegisterRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
response.BadRequest(c, "Invalid request: "+err.Error())
|
|
return
|
|
}
|
|
|
|
// Turnstile 验证(当提供了邮箱验证码时跳过,因为发送验证码时已验证过)
|
|
if req.VerifyCode == "" {
|
|
if err := h.authService.VerifyTurnstile(c.Request.Context(), req.TurnstileToken, ip.GetClientIP(c)); err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
}
|
|
|
|
token, user, err := h.authService.RegisterWithVerification(c.Request.Context(), req.Email, req.Password, req.VerifyCode, req.PromoCode)
|
|
if err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
response.Success(c, AuthResponse{
|
|
AccessToken: token,
|
|
TokenType: "Bearer",
|
|
User: dto.UserFromService(user),
|
|
})
|
|
}
|
|
|
|
// SendVerifyCode 发送邮箱验证码
|
|
// POST /api/v1/auth/send-verify-code
|
|
func (h *AuthHandler) SendVerifyCode(c *gin.Context) {
|
|
var req SendVerifyCodeRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
response.BadRequest(c, "Invalid request: "+err.Error())
|
|
return
|
|
}
|
|
|
|
// Turnstile 验证
|
|
if err := h.authService.VerifyTurnstile(c.Request.Context(), req.TurnstileToken, ip.GetClientIP(c)); err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
result, err := h.authService.SendVerifyCodeAsync(c.Request.Context(), req.Email)
|
|
if err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
response.Success(c, SendVerifyCodeResponse{
|
|
Message: "Verification code sent successfully",
|
|
Countdown: result.Countdown,
|
|
})
|
|
}
|
|
|
|
// Login handles user login
|
|
// POST /api/v1/auth/login
|
|
func (h *AuthHandler) Login(c *gin.Context) {
|
|
var req LoginRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
response.BadRequest(c, "Invalid request: "+err.Error())
|
|
return
|
|
}
|
|
|
|
// Turnstile 验证
|
|
if err := h.authService.VerifyTurnstile(c.Request.Context(), req.TurnstileToken, ip.GetClientIP(c)); err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
token, user, err := h.authService.Login(c.Request.Context(), req.Email, req.Password)
|
|
if err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
// Check if TOTP 2FA is enabled for this user
|
|
if h.totpService != nil && h.settingSvc.IsTotpEnabled(c.Request.Context()) && user.TotpEnabled {
|
|
// Create a temporary login session for 2FA
|
|
tempToken, err := h.totpService.CreateLoginSession(c.Request.Context(), user.ID, user.Email)
|
|
if err != nil {
|
|
response.InternalError(c, "Failed to create 2FA session")
|
|
return
|
|
}
|
|
|
|
response.Success(c, TotpLoginResponse{
|
|
Requires2FA: true,
|
|
TempToken: tempToken,
|
|
UserEmailMasked: service.MaskEmail(user.Email),
|
|
})
|
|
return
|
|
}
|
|
|
|
response.Success(c, AuthResponse{
|
|
AccessToken: token,
|
|
TokenType: "Bearer",
|
|
User: dto.UserFromService(user),
|
|
})
|
|
}
|
|
|
|
// TotpLoginResponse represents the response when 2FA is required
|
|
type TotpLoginResponse struct {
|
|
Requires2FA bool `json:"requires_2fa"`
|
|
TempToken string `json:"temp_token,omitempty"`
|
|
UserEmailMasked string `json:"user_email_masked,omitempty"`
|
|
}
|
|
|
|
// Login2FARequest represents the 2FA login request
|
|
type Login2FARequest struct {
|
|
TempToken string `json:"temp_token" binding:"required"`
|
|
TotpCode string `json:"totp_code" binding:"required,len=6"`
|
|
}
|
|
|
|
// Login2FA completes the login with 2FA verification
|
|
// POST /api/v1/auth/login/2fa
|
|
func (h *AuthHandler) Login2FA(c *gin.Context) {
|
|
var req Login2FARequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
response.BadRequest(c, "Invalid request: "+err.Error())
|
|
return
|
|
}
|
|
|
|
slog.Debug("login_2fa_request",
|
|
"temp_token_len", len(req.TempToken),
|
|
"totp_code_len", len(req.TotpCode))
|
|
|
|
// Get the login session
|
|
session, err := h.totpService.GetLoginSession(c.Request.Context(), req.TempToken)
|
|
if err != nil || session == nil {
|
|
tokenPrefix := ""
|
|
if len(req.TempToken) >= 8 {
|
|
tokenPrefix = req.TempToken[:8]
|
|
}
|
|
slog.Debug("login_2fa_session_invalid",
|
|
"temp_token_prefix", tokenPrefix,
|
|
"error", err)
|
|
response.BadRequest(c, "Invalid or expired 2FA session")
|
|
return
|
|
}
|
|
|
|
slog.Debug("login_2fa_session_found",
|
|
"user_id", session.UserID,
|
|
"email", session.Email)
|
|
|
|
// Verify the TOTP code
|
|
if err := h.totpService.VerifyCode(c.Request.Context(), session.UserID, req.TotpCode); err != nil {
|
|
slog.Debug("login_2fa_verify_failed",
|
|
"user_id", session.UserID,
|
|
"error", err)
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
// Delete the login session
|
|
_ = h.totpService.DeleteLoginSession(c.Request.Context(), req.TempToken)
|
|
|
|
// Get the user
|
|
user, err := h.userService.GetByID(c.Request.Context(), session.UserID)
|
|
if err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
// Generate the JWT token
|
|
token, err := h.authService.GenerateToken(user)
|
|
if err != nil {
|
|
response.InternalError(c, "Failed to generate token")
|
|
return
|
|
}
|
|
|
|
response.Success(c, AuthResponse{
|
|
AccessToken: token,
|
|
TokenType: "Bearer",
|
|
User: dto.UserFromService(user),
|
|
})
|
|
}
|
|
|
|
// GetCurrentUser handles getting current authenticated user
|
|
// GET /api/v1/auth/me
|
|
func (h *AuthHandler) GetCurrentUser(c *gin.Context) {
|
|
subject, ok := middleware2.GetAuthSubjectFromContext(c)
|
|
if !ok {
|
|
response.Unauthorized(c, "User not authenticated")
|
|
return
|
|
}
|
|
|
|
user, err := h.userService.GetByID(c.Request.Context(), subject.UserID)
|
|
if err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
type UserResponse struct {
|
|
*dto.User
|
|
RunMode string `json:"run_mode"`
|
|
}
|
|
|
|
runMode := config.RunModeStandard
|
|
if h.cfg != nil {
|
|
runMode = h.cfg.RunMode
|
|
}
|
|
|
|
response.Success(c, UserResponse{User: dto.UserFromService(user), RunMode: runMode})
|
|
}
|
|
|
|
// ValidatePromoCodeRequest 验证优惠码请求
|
|
type ValidatePromoCodeRequest struct {
|
|
Code string `json:"code" binding:"required"`
|
|
}
|
|
|
|
// ValidatePromoCodeResponse 验证优惠码响应
|
|
type ValidatePromoCodeResponse struct {
|
|
Valid bool `json:"valid"`
|
|
BonusAmount float64 `json:"bonus_amount,omitempty"`
|
|
ErrorCode string `json:"error_code,omitempty"`
|
|
Message string `json:"message,omitempty"`
|
|
}
|
|
|
|
// ValidatePromoCode 验证优惠码(公开接口,注册前调用)
|
|
// POST /api/v1/auth/validate-promo-code
|
|
func (h *AuthHandler) ValidatePromoCode(c *gin.Context) {
|
|
// 检查优惠码功能是否启用
|
|
if h.settingSvc != nil && !h.settingSvc.IsPromoCodeEnabled(c.Request.Context()) {
|
|
response.Success(c, ValidatePromoCodeResponse{
|
|
Valid: false,
|
|
ErrorCode: "PROMO_CODE_DISABLED",
|
|
})
|
|
return
|
|
}
|
|
|
|
var req ValidatePromoCodeRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
response.BadRequest(c, "Invalid request: "+err.Error())
|
|
return
|
|
}
|
|
|
|
promoCode, err := h.promoService.ValidatePromoCode(c.Request.Context(), req.Code)
|
|
if err != nil {
|
|
// 根据错误类型返回对应的错误码
|
|
errorCode := "PROMO_CODE_INVALID"
|
|
switch err {
|
|
case service.ErrPromoCodeNotFound:
|
|
errorCode = "PROMO_CODE_NOT_FOUND"
|
|
case service.ErrPromoCodeExpired:
|
|
errorCode = "PROMO_CODE_EXPIRED"
|
|
case service.ErrPromoCodeDisabled:
|
|
errorCode = "PROMO_CODE_DISABLED"
|
|
case service.ErrPromoCodeMaxUsed:
|
|
errorCode = "PROMO_CODE_MAX_USED"
|
|
case service.ErrPromoCodeAlreadyUsed:
|
|
errorCode = "PROMO_CODE_ALREADY_USED"
|
|
}
|
|
|
|
response.Success(c, ValidatePromoCodeResponse{
|
|
Valid: false,
|
|
ErrorCode: errorCode,
|
|
})
|
|
return
|
|
}
|
|
|
|
if promoCode == nil {
|
|
response.Success(c, ValidatePromoCodeResponse{
|
|
Valid: false,
|
|
ErrorCode: "PROMO_CODE_INVALID",
|
|
})
|
|
return
|
|
}
|
|
|
|
response.Success(c, ValidatePromoCodeResponse{
|
|
Valid: true,
|
|
BonusAmount: promoCode.BonusAmount,
|
|
})
|
|
}
|
|
|
|
// ForgotPasswordRequest 忘记密码请求
|
|
type ForgotPasswordRequest struct {
|
|
Email string `json:"email" binding:"required,email"`
|
|
TurnstileToken string `json:"turnstile_token"`
|
|
}
|
|
|
|
// ForgotPasswordResponse 忘记密码响应
|
|
type ForgotPasswordResponse struct {
|
|
Message string `json:"message"`
|
|
}
|
|
|
|
// ForgotPassword 请求密码重置
|
|
// POST /api/v1/auth/forgot-password
|
|
func (h *AuthHandler) ForgotPassword(c *gin.Context) {
|
|
var req ForgotPasswordRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
response.BadRequest(c, "Invalid request: "+err.Error())
|
|
return
|
|
}
|
|
|
|
// Turnstile 验证
|
|
if err := h.authService.VerifyTurnstile(c.Request.Context(), req.TurnstileToken, ip.GetClientIP(c)); err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
// Build frontend base URL from request
|
|
scheme := "https"
|
|
if c.Request.TLS == nil {
|
|
// Check X-Forwarded-Proto header (common in reverse proxy setups)
|
|
if proto := c.GetHeader("X-Forwarded-Proto"); proto != "" {
|
|
scheme = proto
|
|
} else {
|
|
scheme = "http"
|
|
}
|
|
}
|
|
frontendBaseURL := scheme + "://" + c.Request.Host
|
|
|
|
// Request password reset (async)
|
|
// Note: This returns success even if email doesn't exist (to prevent enumeration)
|
|
if err := h.authService.RequestPasswordResetAsync(c.Request.Context(), req.Email, frontendBaseURL); err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
response.Success(c, ForgotPasswordResponse{
|
|
Message: "If your email is registered, you will receive a password reset link shortly.",
|
|
})
|
|
}
|
|
|
|
// ResetPasswordRequest 重置密码请求
|
|
type ResetPasswordRequest struct {
|
|
Email string `json:"email" binding:"required,email"`
|
|
Token string `json:"token" binding:"required"`
|
|
NewPassword string `json:"new_password" binding:"required,min=6"`
|
|
}
|
|
|
|
// ResetPasswordResponse 重置密码响应
|
|
type ResetPasswordResponse struct {
|
|
Message string `json:"message"`
|
|
}
|
|
|
|
// ResetPassword 重置密码
|
|
// POST /api/v1/auth/reset-password
|
|
func (h *AuthHandler) ResetPassword(c *gin.Context) {
|
|
var req ResetPasswordRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
response.BadRequest(c, "Invalid request: "+err.Error())
|
|
return
|
|
}
|
|
|
|
// Reset password
|
|
if err := h.authService.ResetPassword(c.Request.Context(), req.Email, req.Token, req.NewPassword); err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
response.Success(c, ResetPasswordResponse{
|
|
Message: "Your password has been reset successfully. You can now log in with your new password.",
|
|
})
|
|
}
|