function.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178
  1. package utils
  2. import (
  3. "database/sql"
  4. "errors"
  5. "gfast/app/model/admin/user"
  6. "gfast/library/response"
  7. "github.com/goflyfox/gtoken/gtoken"
  8. "github.com/gogf/gf/crypto/gaes"
  9. "github.com/gogf/gf/crypto/gmd5"
  10. "github.com/gogf/gf/encoding/gbase64"
  11. "github.com/gogf/gf/frame/g"
  12. "github.com/gogf/gf/net/ghttp"
  13. "github.com/gogf/gf/os/gtime"
  14. "github.com/gogf/gf/util/gconv"
  15. "github.com/gogf/gf/util/gvalid"
  16. "github.com/mojocn/base64Captcha"
  17. )
  18. const AdminCbcPublicKey = "HqmP1KLMuz09Q0Bu"
  19. var (
  20. AdminMultiLogin bool //是否允许后台管理员多端登陆
  21. AdminPageNum = 20 //后台分页长度
  22. NotCheckAuthAdminIds []int //无需验证权限的用户id
  23. )
  24. //获取数字验证码
  25. func GetVerifyImgDigit() (idKeyC string, base64stringC string) {
  26. driver := &base64Captcha.DriverDigit{80, 240, 5, 0.7, 5}
  27. store := base64Captcha.DefaultMemStore
  28. c := base64Captcha.NewCaptcha(driver, store)
  29. idKeyC, base64stringC, err := c.Generate()
  30. if err != nil {
  31. g.Log().Error(err)
  32. }
  33. return
  34. }
  35. //获取字母数字混合验证码
  36. func GetVerifyImgString() (idKeyC string, base64stringC string) {
  37. driver := &base64Captcha.DriverString{
  38. Height: 80,
  39. Width: 240,
  40. NoiseCount: 50,
  41. ShowLineOptions: 20,
  42. Length: 4,
  43. Source: "abcdefghijklmnopqrstuvwxyz0123456789",
  44. }
  45. driver = driver.ConvertFonts()
  46. store := base64Captcha.DefaultMemStore
  47. c := base64Captcha.NewCaptcha(driver, store)
  48. idKeyC, base64stringC, err := c.Generate()
  49. if err != nil {
  50. g.Log().Error(err)
  51. }
  52. return
  53. }
  54. //验证输入的验证码是否正确
  55. func VerifyString(id, answer string) bool {
  56. driver := new(base64Captcha.DriverString)
  57. store := base64Captcha.DefaultMemStore
  58. c := base64Captcha.NewCaptcha(driver, store)
  59. return c.Verify(id, answer, true)
  60. }
  61. //AdminLogin 后台用户登陆验证
  62. func AdminLogin(r *ghttp.Request) (string, interface{}) {
  63. data := r.GetFormMapStrStr()
  64. rules := map[string]string{
  65. "idValueC": "required",
  66. "username": "required",
  67. "password": "required",
  68. }
  69. msgs := map[string]interface{}{
  70. "idValueC": "请输入验证码",
  71. "username": "账号不能为空",
  72. "password": "密码不能为空",
  73. }
  74. if e := gvalid.CheckMap(data, rules, msgs); e != nil {
  75. response.JsonExit(r, response.ErrorCode, e.String())
  76. }
  77. //判断验证码是否正确
  78. if !VerifyString(data["idKeyC"], data["idValueC"]) {
  79. response.JsonExit(r, response.ErrorCode, "验证码输入错误")
  80. }
  81. password := EncryptCBC(data["password"], AdminCbcPublicKey)
  82. var keys string
  83. if AdminMultiLogin {
  84. keys = data["username"] + password + gmd5.MustEncryptString(r.GetClientIp())
  85. } else {
  86. keys = data["username"] + password
  87. }
  88. if err, user := signIn(data["username"], password, r); err != nil {
  89. response.JsonExit(r, response.ErrorCode, err.Error())
  90. } else {
  91. return keys, user
  92. }
  93. return keys, nil
  94. }
  95. //gtoken验证后返回
  96. func AuthAfterFunc(r *ghttp.Request, respData gtoken.Resp) {
  97. if r.Method == "OPTIONS" || respData.Success() {
  98. r.Middleware.Next()
  99. } else {
  100. respData.Msg = "用户信息验证失败"
  101. response := r.Response
  102. options := response.DefaultCORSOptions()
  103. response.CORS(options)
  104. response.WriteJson(respData)
  105. r.ExitAll()
  106. }
  107. }
  108. //后台退出登陆
  109. func AdminLoginOut(r *ghttp.Request) bool {
  110. return true
  111. }
  112. //字符串加密
  113. func EncryptCBC(plainText, publicKey string) string {
  114. key := []byte(publicKey)
  115. b, e := gaes.EncryptCBC([]byte(plainText), key, key)
  116. if e != nil {
  117. g.Log().Error(e.Error())
  118. return ""
  119. }
  120. return gbase64.EncodeToString(b)
  121. }
  122. //字符串解密
  123. func DecryptCBC(plainText, publicKey string) string {
  124. key := []byte(publicKey)
  125. plainTextByte, e := gbase64.DecodeString(plainText)
  126. if e != nil {
  127. g.Log().Error(e.Error())
  128. return ""
  129. }
  130. b, e := gaes.DecryptCBC(plainTextByte, key, key)
  131. if e != nil {
  132. g.Log().Error(e.Error())
  133. return ""
  134. }
  135. return gbase64.EncodeToString(b)
  136. }
  137. // 用户登录,成功返回用户信息,否则返回nil
  138. func signIn(username, password string, r *ghttp.Request) (error, *user.QxkjUser) {
  139. qxkjUser, err := user.Model.Where("user_name=? and user_password=?", username, password).One()
  140. if err != nil && err != sql.ErrNoRows {
  141. return err, nil
  142. }
  143. if qxkjUser == nil {
  144. return errors.New("账号或密码错误"), nil
  145. }
  146. //判断用户状态
  147. if qxkjUser.UserStatus == 0 {
  148. return errors.New("用户已被冻结"), nil
  149. }
  150. returnData := *qxkjUser
  151. //更新登陆时间及ip
  152. qxkjUser.LastLoginTime = gconv.Int(gtime.Timestamp())
  153. qxkjUser.LastLoginIp = r.GetClientIp()
  154. qxkjUser.Update()
  155. return nil, &returnData
  156. }
  157. //日期字符串转时间戳(秒)
  158. func StrToTimestamp(dateStr string) int64 {
  159. tm, err := gtime.StrToTime(dateStr)
  160. if err != nil {
  161. g.Log().Error(err)
  162. return 0
  163. }
  164. return tm.Timestamp()
  165. }