UserManager.cs 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899
  1. using System;
  2. using System.Collections.Generic;
  3. using System.Linq;
  4. using System.Security.Claims;
  5. using System.Threading.Tasks;
  6. using Abp;
  7. using Abp.Application.Features;
  8. using Abp.Authorization;
  9. using Abp.Collections.Extensions;
  10. using Abp.Configuration.Startup;
  11. using Abp.Domain.Services;
  12. using Abp.Domain.Uow;
  13. using Abp.Localization;
  14. using Abp.MultiTenancy;
  15. using Abp.Runtime.Caching;
  16. using Abp.Runtime.Session;
  17. using IwbZero.Authorization.Permissions;
  18. using IwbZero.Authorization.Roles;
  19. using IwbZero.Caching;
  20. using IwbZero.Configuration;
  21. using IwbZero.IdentityFramework;
  22. using IwbZero.Session;
  23. using IwbZero.Setting;
  24. using Microsoft.AspNet.Identity;
  25. namespace IwbZero.Authorization.Users
  26. {
  27. public abstract class IwbUserManager<TRole, TUser> : UserManager<TUser, long>, IDomainService
  28. where TRole : IwbSysRole<TUser>, new()
  29. where TUser : IwbSysUser<TUser>, new()
  30. {
  31. protected IIwbUserPermissionStore<TUser> IwbUserPermissionStore
  32. {
  33. get
  34. {
  35. if (!(Store is IIwbUserPermissionStore<TUser>))
  36. {
  37. throw new AbpException("Store is not IUserPermissionStore");
  38. }
  39. return Store as IIwbUserPermissionStore<TUser>;
  40. }
  41. }
  42. public ILocalizationManager LocalizationManager { get; }
  43. public IAbpSession AbpSession { get; set; }
  44. public FeatureDependencyContext FeatureDependencyContext { get; set; }
  45. protected IwbRoleManager<TRole, TUser> RoleManager { get; }
  46. public IwbUserStore<TRole, TUser> UserStore { get; }
  47. public IMultiTenancyConfig MultiTenancy { get; set; }
  48. private readonly IIwbPermissionManager _permissionManager;
  49. private readonly IUnitOfWorkManager _unitOfWorkManager;
  50. private readonly ICacheManager _cacheManager;
  51. //private readonly IRepository<OrganizationUnit, long> _organizationUnitRepository;
  52. //private readonly IRepository<UserOrganizationUnit, long> _userOrganizationUnitRepository;
  53. //private readonly IOrganizationUnitSettings _organizationUnitSettings;
  54. private readonly IIwbSettingManager _settingManager;
  55. protected IwbUserManager(
  56. IwbUserStore<TRole, TUser> userStore,
  57. IwbRoleManager<TRole, TUser> roleManager,
  58. IIwbPermissionManager permissionManager,
  59. IUnitOfWorkManager unitOfWorkManager,
  60. ICacheManager cacheManager,
  61. //IRepository<OrganizationUnit, long> organizationUnitRepository,
  62. //IRepository<UserOrganizationUnit, long> userOrganizationUnitRepository,
  63. //IOrganizationUnitSettings organizationUnitSettings,
  64. ILocalizationManager localizationManager,
  65. IwbIdentityEmailMessageService emailService,
  66. IIwbSettingManager settingManager,
  67. IIwbUserTokenProviderAccessor iwbUserTokenProviderAccessor,
  68. string localizationSourceName=null)
  69. : base(userStore)
  70. {
  71. UserStore = userStore;
  72. RoleManager = roleManager;
  73. LocalizationManager = localizationManager;
  74. _settingManager = settingManager;
  75. _permissionManager = permissionManager;
  76. _unitOfWorkManager = unitOfWorkManager;
  77. _cacheManager = cacheManager;
  78. //_organizationUnitRepository = organizationUnitRepository;
  79. //_userOrganizationUnitRepository = userOrganizationUnitRepository;
  80. //_organizationUnitSettings = organizationUnitSettings;
  81. AbpSession = NullAbpSession.Instance;
  82. UserLockoutEnabledByDefault = true;
  83. DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5);
  84. MaxFailedAccessAttemptsBeforeLockout = 5;
  85. EmailService = emailService;
  86. UserTokenProvider = iwbUserTokenProviderAccessor.GetUserTokenProviderOrNull<TUser>();
  87. LocalizationSourceName = localizationSourceName ?? IwbZeroConsts.IwbZeroLocalizationSourceName;
  88. }
  89. protected string LocalizationSourceName { get; set; }
  90. public override async Task<IdentityResult> CreateAsync(TUser user)
  91. {
  92. var result = await CheckDuplicateUsernameOrEmailAddressAsync(user.Id, user.UserName, user.EmailAddress);
  93. if (!result.Succeeded)
  94. {
  95. return result;
  96. }
  97. //var tenantId = GetCurrentTenantId();
  98. //if (tenantId.HasValue && !user.TenantId.HasValue)
  99. //{
  100. // user.TenantId = tenantId.Value;
  101. //}
  102. var isLockoutEnabled = user.IsLockoutEnabled;
  103. var identityResult = await base.CreateAsync(user);
  104. if (identityResult.Succeeded)
  105. {
  106. await _unitOfWorkManager.Current.SaveChangesAsync();
  107. await SetLockoutEnabledAsync(user.Id, isLockoutEnabled);
  108. }
  109. return identityResult;
  110. }
  111. /// <summary>
  112. /// Check whether a user is granted for a permission.
  113. /// </summary>
  114. /// <param name="userId">User id</param>
  115. /// <param name="permissionName">Permission name</param>
  116. public virtual async Task<bool> IsGrantedAsync(long userId, string permissionName)
  117. {
  118. return await IsGrantedAsync(
  119. userId,
  120. _permissionManager.GetPermission(permissionName)
  121. );
  122. }
  123. /// <summary>
  124. /// Check whether a user is granted for a permission.
  125. /// </summary>
  126. /// <param name="userId">User id</param>
  127. /// <param name="permissionName">Permission name</param>
  128. public virtual async Task<bool> IsGrantedOnlyUserAsync(long userId, string permissionName)
  129. {
  130. return await IsGrantedOnlyUserAsync(
  131. userId,
  132. _permissionManager.GetPermission(permissionName)
  133. );
  134. }
  135. /// <summary>
  136. /// Check whether a user is granted for a permission.
  137. /// </summary>
  138. /// <param name="user">User</param>
  139. /// <param name="permission">Permission</param>
  140. public virtual Task<bool> IsGrantedAsync(TUser user, Permission permission)
  141. {
  142. return IsGrantedAsync(user.Id, permission);
  143. }
  144. /// <summary>
  145. /// Check whether a user is granted for a permission.
  146. /// </summary>
  147. /// <param name="userId">User id</param>
  148. /// <param name="permission">Permission</param>
  149. public virtual async Task<bool> IsGrantedAsync(long userId, Permission permission)
  150. {
  151. //Check for multi-tenancy side
  152. if (!permission.MultiTenancySides.HasFlag(GetCurrentMultiTenancySide()))
  153. {
  154. return false;
  155. }
  156. //Check for depended features
  157. if (permission.FeatureDependency != null && GetCurrentMultiTenancySide() == MultiTenancySides.Tenant)
  158. {
  159. FeatureDependencyContext.TenantId = GetCurrentTenantId();
  160. if (!await permission.FeatureDependency.IsSatisfiedAsync(FeatureDependencyContext))
  161. {
  162. return false;
  163. }
  164. }
  165. //Get cached user permissions
  166. var cacheItem = await GetUserPermissionCacheItemAsync(userId);
  167. if (cacheItem == null)
  168. {
  169. return false;
  170. }
  171. //Check for user-specific value
  172. if (cacheItem.GrantedPermissions.Contains(permission.Name))
  173. {
  174. return true;
  175. }
  176. if (cacheItem.ProhibitedPermissions.Contains(permission.Name))
  177. {
  178. return false;
  179. }
  180. //Check for roles
  181. foreach (var roleId in cacheItem.RoleIds)
  182. {
  183. if (await RoleManager.IsGrantedAsync(roleId, permission))
  184. {
  185. return true;
  186. }
  187. }
  188. return false;
  189. }
  190. /// <summary>
  191. /// Check whether a user is granted for a permission.
  192. /// </summary>
  193. /// <param name="userId">User id</param>
  194. /// <param name="permission">Permission</param>
  195. public async Task<bool> IsGrantedOnlyUserAsync(long userId, Permission permission)
  196. {
  197. //Check for multi-tenancy side
  198. if (!permission.MultiTenancySides.HasFlag(GetCurrentMultiTenancySide()))
  199. {
  200. return false;
  201. }
  202. //Check for depended features
  203. if (permission.FeatureDependency != null && GetCurrentMultiTenancySide() == MultiTenancySides.Tenant)
  204. {
  205. FeatureDependencyContext.TenantId = GetCurrentTenantId();
  206. if (!await permission.FeatureDependency.IsSatisfiedAsync(FeatureDependencyContext))
  207. {
  208. return false;
  209. }
  210. }
  211. //Get cached user permissions
  212. var cacheItem = await GetUserPermissionCacheItemAsync(userId);
  213. if (cacheItem == null)
  214. {
  215. return false;
  216. }
  217. //Check for user-specific value
  218. if (cacheItem.GrantedPermissions.Contains(permission.Name))
  219. {
  220. return true;
  221. }
  222. if (cacheItem.ProhibitedPermissions.Contains(permission.Name))
  223. {
  224. return false;
  225. }
  226. return false;
  227. }
  228. /// <summary>
  229. /// Gets granted permissions for a user(user and role).
  230. /// </summary>
  231. /// <param name="user">Role</param>
  232. /// <returns>List of granted permissions</returns>
  233. public virtual async Task<IReadOnlyList<Permission>> GetGrantedPermissionsAsync(TUser user)
  234. {
  235. var permissionList = new List<Permission>();
  236. foreach (var permission in _permissionManager.GetAllPermissions())
  237. {
  238. if (await IsGrantedAsync(user.Id, permission))
  239. {
  240. permissionList.Add(permission);
  241. }
  242. }
  243. return permissionList;
  244. }
  245. /// <summary>
  246. /// Gets granted permissions for a user(only user).
  247. /// </summary>
  248. /// <param name="user">Role</param>
  249. /// <returns>List of granted permissions</returns>
  250. public virtual async Task<IReadOnlyList<Permission>> GetGrantedOnlyUserPermissionsAsync(TUser user)
  251. {
  252. var permissionList = new List<Permission>();
  253. foreach (var permission in _permissionManager.GetAllPermissions())
  254. {
  255. if (await IsGrantedOnlyUserAsync(user.Id, permission))
  256. {
  257. permissionList.Add(permission);
  258. }
  259. }
  260. return permissionList;
  261. }
  262. /// <summary>
  263. /// Sets all granted permissions of a user at once.
  264. /// Prohibits all other permissions.
  265. /// </summary>
  266. /// <param name="user">The user</param>
  267. /// <param name="permissions">Permissions</param>
  268. public virtual async Task SetUserGrantedPermissionsAsync(TUser user, IEnumerable<Permission> permissions)
  269. {
  270. var oldPermissions = await GetGrantedOnlyUserPermissionsAsync(user);
  271. var newPermissions = permissions.ToArray();
  272. foreach (var permission in oldPermissions.Where(p => !newPermissions.Contains(p)))
  273. {
  274. await RemovePermissionAsync(user, permission);
  275. }
  276. foreach (var permission in newPermissions.Where(p => !oldPermissions.Contains(p)))
  277. {
  278. await GrantPermissionAsync(user, permission);
  279. }
  280. }
  281. /// <summary>
  282. /// Sets all granted permissions of a user at once.
  283. /// Prohibits all other permissions.
  284. /// </summary>
  285. /// <param name="user">The user</param>
  286. /// <param name="permissions">Permissions</param>
  287. public virtual async Task SetGrantedPermissionsAsync(TUser user, IEnumerable<Permission> permissions)
  288. {
  289. var oldPermissions = await GetGrantedPermissionsAsync(user);
  290. var newPermissions = permissions.ToArray();
  291. foreach (var permission in oldPermissions.Where(p => !newPermissions.Contains(p)))
  292. {
  293. await ProhibitPermissionAsync(user, permission);
  294. }
  295. foreach (var permission in newPermissions.Where(p => !oldPermissions.Contains(p)))
  296. {
  297. await GrantPermissionAsync(user, permission);
  298. }
  299. }
  300. /// <summary>
  301. /// Prohibits all permissions for a user.
  302. /// </summary>
  303. /// <param name="user">User</param>
  304. public async Task ProhibitAllPermissionsAsync(TUser user)
  305. {
  306. foreach (var permission in _permissionManager.GetAllPermissions())
  307. {
  308. await ProhibitPermissionAsync(user, permission);
  309. }
  310. }
  311. /// <summary>
  312. /// Resets all permission settings for a user.
  313. /// It removes all permission settings for the user.
  314. /// User will have permissions according to his roles.
  315. /// This method does not prohibit all permissions.
  316. /// For that, use <see cref="ProhibitAllPermissionsAsync"/>.
  317. /// </summary>
  318. /// <param name="user">User</param>
  319. public async Task ResetAllPermissionsAsync(TUser user)
  320. {
  321. await IwbUserPermissionStore.RemoveAllPermissionSettingsAsync(user);
  322. }
  323. /// <summary>
  324. /// Grants a permission for a user if not already granted.
  325. /// </summary>
  326. /// <param name="user">User</param>
  327. /// <param name="permission">Permission</param>
  328. public virtual async Task GrantPermissionAsync(TUser user, Permission permission)
  329. {
  330. await IwbUserPermissionStore.RemovePermissionAsync(user, new IwbPermissionGrantInfo(permission.Name, false));
  331. if (await IsGrantedOnlyUserAsync(user.Id, permission))
  332. {
  333. return;
  334. }
  335. await IwbUserPermissionStore.AddPermissionAsync(user, new IwbPermissionGrantInfo(permission.Name, true));
  336. await SetUserGrantedPermissionCacheItem(user.Id, permission.Name);
  337. }
  338. /// <summary>
  339. /// Prohibits a permission for a user if it's granted.
  340. /// </summary>
  341. /// <param name="user">User</param>
  342. /// <param name="permission">Permission</param>
  343. public virtual async Task ProhibitPermissionAsync(TUser user, Permission permission)
  344. {
  345. await IwbUserPermissionStore.RemovePermissionAsync(user, new IwbPermissionGrantInfo(permission.Name, true));
  346. if (!await IsGrantedOnlyUserAsync(user.Id, permission))
  347. {
  348. return;
  349. }
  350. await IwbUserPermissionStore.AddPermissionAsync(user, new IwbPermissionGrantInfo(permission.Name, false));
  351. await SetUserProhibitedPermissionCacheItem(user.Id, permission.Name);
  352. }
  353. /// <summary>
  354. /// Prohibits a permission for a user if it's granted.
  355. /// </summary>
  356. /// <param name="user">User</param>
  357. /// <param name="permission">Permission</param>
  358. public virtual async Task RemovePermissionAsync(TUser user, Permission permission)
  359. {
  360. await IwbUserPermissionStore.RemovePermissionAsync(user, new IwbPermissionGrantInfo(permission.Name, true));
  361. await SetUserGrantedPermissionCacheItem(user.Id, permission.Name, false);
  362. }
  363. public virtual async Task<TUser> FindByNameOrEmailAsync(string userNameOrEmailAddress)
  364. {
  365. return await UserStore.FindByNameOrEmailAsync(userNameOrEmailAddress);
  366. }
  367. public virtual Task<List<TUser>> FindAllAsync(UserLoginInfo login)
  368. {
  369. return UserStore.FindAllAsync(login);
  370. }
  371. /// <summary>
  372. /// Gets a user by given id.
  373. /// Throws exception if no user found with given id.
  374. /// </summary>
  375. /// <param name="userId">User id</param>
  376. /// <returns>User</returns>
  377. /// <exception cref="AbpException">Throws exception if no user found with given id</exception>
  378. public virtual async Task<TUser> GetUserByIdAsync(long userId)
  379. {
  380. var user = await FindByIdAsync(userId);
  381. if (user == null)
  382. {
  383. throw new AbpException("There is no user with id: " + userId);
  384. }
  385. return user;
  386. }
  387. public override async Task<ClaimsIdentity> CreateIdentityAsync(TUser user, string authenticationType)
  388. {
  389. var identity = await base.CreateIdentityAsync(user, authenticationType);
  390. identity.AddClaim(new Claim(IwbClaimTypes.UserName, user.UserName));
  391. identity.AddClaim(new Claim(IwbClaimTypes.RealName, user.RealName));
  392. identity.AddClaim(new Claim(IwbClaimTypes.UserType, user.UserType.ToString()));
  393. identity.AddClaim(new Claim(IwbClaimTypes.EmailAddress, user.EmailAddress));
  394. var roleList = await GetRolesAsync(user.Id);
  395. string userRoles = roleList.Any() ? string.Join(",", roleList.ToArray()) : "";
  396. identity.AddClaim(new Claim(IwbClaimTypes.UserRoles, userRoles));//IwbClaimTypes.EmployeeNo
  397. //if (user.TenantId.HasValue)
  398. //{
  399. // identity.AddClaim(new Claim(AbpClaimTypes.TenantId, user.TenantId.Value.ToString(CultureInfo.InvariantCulture)));
  400. //}
  401. return identity;
  402. }
  403. public override async Task<IdentityResult> UpdateAsync(TUser user)
  404. {
  405. var result = await CheckDuplicateUsernameOrEmailAddressAsync(user.Id, user.UserName, user.EmailAddress);
  406. if (!result.Succeeded)
  407. {
  408. return result;
  409. }
  410. //Admin user's username can not be changed!
  411. if (user.UserName != UserBase.AdminUserName)
  412. {
  413. if ((await GetOldUserNameAsync(user.Id)) == UserBase.AdminUserName)
  414. {
  415. return IwbIdentityResult.Failed(string.Format(L("CanNotRenameAdminUser"), UserBase.AdminUserName));
  416. }
  417. }
  418. else if (user.UserName != UserBase.SystemUserName)
  419. {
  420. if ((await GetOldUserNameAsync(user.Id)) == UserBase.SystemUserName)
  421. {
  422. return IwbIdentityResult.Failed(string.Format(L("CanNotRenameAdminUser"), UserBase.AdminUserName));
  423. }
  424. }
  425. return await base.UpdateAsync(user);
  426. }
  427. public override async Task<IdentityResult> DeleteAsync(TUser user)
  428. {
  429. if (user.UserName == UserBase.AdminUserName)
  430. {
  431. return IwbIdentityResult.Failed(string.Format(L("CanNotDeleteAdminUser"), UserBase.AdminUserName));
  432. }
  433. return await base.DeleteAsync(user);
  434. }
  435. //public override async Task<TUser> FindByIdAsync(long useId)
  436. //{
  437. // return await AbpStore.FindByIdAsync(useId);
  438. //}
  439. public virtual async Task<IdentityResult> ChangePasswordAsync(TUser user, string newPassword)
  440. {
  441. var result = await PasswordValidator.ValidateAsync(newPassword);
  442. if (!result.Succeeded)
  443. {
  444. return result;
  445. }
  446. await UserStore.SetPasswordHashAsync(user, PasswordHasher.HashPassword(newPassword));
  447. return IdentityResult.Success;
  448. }
  449. public virtual async Task<IdentityResult> CheckDuplicateUsernameOrEmailAddressAsync(long? expectedUserId, string userName, string emailAddress)
  450. {
  451. var user = (await FindByNameAsync(userName));
  452. if (user != null && user.Id != expectedUserId)
  453. {
  454. return IwbIdentityResult.Failed(string.Format(L("Identity.DuplicateUserName"), userName));
  455. }
  456. user = (await FindByEmailAsync(emailAddress));
  457. if (user != null && user.Id != expectedUserId)
  458. {
  459. return IwbIdentityResult.Failed(string.Format(L("Identity.DuplicateEmail"), emailAddress));
  460. }
  461. return IdentityResult.Success;
  462. }
  463. public virtual async Task<IdentityResult> SetRoles(TUser user, string[] roleNames)
  464. {
  465. //Remove from removed roles
  466. if (user.Roles.Any())
  467. {
  468. foreach (var userRole in user.Roles.ToList())
  469. {
  470. var role = await RoleManager.FindByIdAsync(userRole.RoleId);
  471. if (roleNames != null && roleNames.All(roleName => role.Name == roleName))
  472. continue;
  473. await RemoveFromRoleAsync(user.Id, role.Name);
  474. }
  475. }
  476. //Add to added roles
  477. if (roleNames != null)
  478. {
  479. foreach (var roleName in roleNames)
  480. {
  481. var role = await RoleManager.GetRoleByNameAsync(roleName);
  482. if (user.Roles.All(ur => ur.RoleId != role.Id))
  483. {
  484. var result = await AddToRoleAsync(user.Id, roleName);
  485. if (!result.Succeeded)
  486. {
  487. return result;
  488. }
  489. }
  490. }
  491. }
  492. return IdentityResult.Success;
  493. }
  494. #region Organization
  495. //public virtual async Task<bool> IsInOrganizationUnitAsync(long userId, long ouId)
  496. //{
  497. // return await IsInOrganizationUnitAsync(
  498. // await GetUserByIdAsync(userId),
  499. // await _organizationUnitRepository.GetAsync(ouId)
  500. // );
  501. //}
  502. //public virtual async Task<bool> IsInOrganizationUnitAsync(SysUser user, OrganizationUnit ou)
  503. //{
  504. // return await _userOrganizationUnitRepository.CountAsync(uou =>
  505. // uou.UserId == user.Id && uou.OrganizationUnitId == ou.Id
  506. // ) > 0;
  507. //}
  508. //public virtual async Task AddToOrganizationUnitAsync(long userId, long ouId)
  509. //{
  510. // await AddToOrganizationUnitAsync(
  511. // await GetUserByIdAsync(userId),
  512. // await _organizationUnitRepository.GetAsync(ouId)
  513. // );
  514. //}
  515. //public virtual async Task AddToOrganizationUnitAsync(SysUser user, OrganizationUnit ou)
  516. //{
  517. // var currentOus = await GetOrganizationUnitsAsync(user);
  518. // if (currentOus.Any(cou => cou.Id == ou.Id))
  519. // {
  520. // return;
  521. // }
  522. // await CheckMaxUserOrganizationUnitMembershipCountAsync(user.TenantId, currentOus.Count + 1);
  523. // await _userOrganizationUnitRepository.InsertAsync(new UserOrganizationUnit(user.TenantId, user.Id, ou.Id));
  524. //}
  525. //public virtual async Task RemoveFromOrganizationUnitAsync(long userId, long ouId)
  526. //{
  527. // await RemoveFromOrganizationUnitAsync(
  528. // await GetUserByIdAsync(userId),
  529. // await _organizationUnitRepository.GetAsync(ouId)
  530. // );
  531. //}
  532. //public virtual async Task RemoveFromOrganizationUnitAsync(SysUser user, OrganizationUnit ou)
  533. //{
  534. // await _userOrganizationUnitRepository.DeleteAsync(uou => uou.UserId == user.Id && uou.OrganizationUnitId == ou.Id);
  535. //}
  536. //public virtual async Task SetOrganizationUnitsAsync(long userId, params long[] organizationUnitIds)
  537. //{
  538. // await SetOrganizationUnitsAsync(
  539. // await GetUserByIdAsync(userId),
  540. // organizationUnitIds
  541. // );
  542. //}
  543. //private async Task CheckMaxUserOrganizationUnitMembershipCountAsync(int? tenantId, int requestedCount)
  544. //{
  545. // var maxCount = await _organizationUnitSettings.GetMaxUserMembershipCountAsync(tenantId);
  546. // if (requestedCount > maxCount)
  547. // {
  548. // throw new AbpException(string.Format("Can not set more than {0} organization unit for a user!", maxCount));
  549. // }
  550. //}
  551. //public virtual async Task SetOrganizationUnitsAsync(SysUser user, params long[] organizationUnitIds)
  552. //{
  553. // if (organizationUnitIds == null)
  554. // {
  555. // organizationUnitIds = new long[0];
  556. // }
  557. // await CheckMaxUserOrganizationUnitMembershipCountAsync(user.TenantId, organizationUnitIds.Length);
  558. // var currentOus = await GetOrganizationUnitsAsync(user);
  559. // //Remove from removed OUs
  560. // foreach (var currentOu in currentOus)
  561. // {
  562. // if (!organizationUnitIds.Contains(currentOu.Id))
  563. // {
  564. // await RemoveFromOrganizationUnitAsync(user, currentOu);
  565. // }
  566. // }
  567. // //Add to added OUs
  568. // foreach (var organizationUnitId in organizationUnitIds)
  569. // {
  570. // if (currentOus.All(ou => ou.Id != organizationUnitId))
  571. // {
  572. // await AddToOrganizationUnitAsync(
  573. // user,
  574. // await _organizationUnitRepository.GetAsync(organizationUnitId)
  575. // );
  576. // }
  577. // }
  578. //}
  579. //[UnitOfWork]
  580. //public virtual Task<List<OrganizationUnit>> GetOrganizationUnitsAsync(SysUser user)
  581. //{
  582. // var query = from uou in _userOrganizationUnitRepository.GetAll()
  583. // join ou in _organizationUnitRepository.GetAll() on uou.OrganizationUnitId equals ou.Id
  584. // where uou.UserId == user.Id
  585. // select ou;
  586. // return Task.FromResult(query.ToList());
  587. //}
  588. //[UnitOfWork]
  589. //public virtual Task<List<SysUser>> GetUsersInOrganizationUnit(OrganizationUnit organizationUnit, bool includeChildren = false)
  590. //{
  591. // if (!includeChildren)
  592. // {
  593. // var query = from uou in _userOrganizationUnitRepository.GetAll()
  594. // join user in AbpStore.Users on uou.UserId equals user.Id
  595. // where uou.OrganizationUnitId == organizationUnit.Id
  596. // select user;
  597. // return Task.FromResult(query.ToList());
  598. // }
  599. // else
  600. // {
  601. // var query = from uou in _userOrganizationUnitRepository.GetAll()
  602. // join user in AbpStore.Users on uou.UserId equals user.Id
  603. // join ou in _organizationUnitRepository.GetAll() on uou.OrganizationUnitId equals ou.Id
  604. // where ou.Code.StartsWith(organizationUnit.Code)
  605. // select user;
  606. // return Task.FromResult(query.ToList());
  607. // }
  608. //}
  609. #endregion
  610. public virtual void RegisterTwoFactorProviders(int? tenantId = null)
  611. {
  612. TwoFactorProviders.Clear();
  613. if (!IsTrue(IwbAdminSettingNames.UserManagement.TwoFactorLogin.IsEnabled))
  614. {
  615. return;
  616. }
  617. if (EmailService != null &&
  618. IsTrue(IwbAdminSettingNames.UserManagement.TwoFactorLogin.IsEmailProviderEnabled))
  619. {
  620. RegisterTwoFactorProvider(
  621. L("Email"),
  622. new EmailTokenProvider<TUser, long>
  623. {
  624. Subject = L("EmailSecurityCodeSubject"),
  625. BodyFormat = L("EmailSecurityCodeBody")
  626. }
  627. );
  628. }
  629. if (SmsService != null &&
  630. IsTrue(IwbAdminSettingNames.UserManagement.TwoFactorLogin.IsSmsProviderEnabled))
  631. {
  632. RegisterTwoFactorProvider(
  633. L("Sms"),
  634. new PhoneNumberTokenProvider<TUser, long>
  635. {
  636. MessageFormat = L("SmsSecurityCodeMessage")
  637. }
  638. );
  639. }
  640. }
  641. public virtual void InitializeLockoutSettings(int? tenantId = null)
  642. {
  643. UserLockoutEnabledByDefault = IsTrue(IwbAdminSettingNames.UserManagement.UserLockOut.IsEnabled);
  644. DefaultAccountLockoutTimeSpan = TimeSpan.FromSeconds(GetSettingValue<int>(IwbAdminSettingNames.UserManagement.UserLockOut.DefaultAccountLockoutSeconds));
  645. MaxFailedAccessAttemptsBeforeLockout = GetSettingValue<int>(IwbAdminSettingNames.UserManagement.UserLockOut.MaxFailedAccessAttemptsBeforeLockout);
  646. }
  647. public override async Task<IList<string>> GetValidTwoFactorProvidersAsync(long userId)
  648. {
  649. //var user = await GetUserByIdAsync(userId);
  650. //RegisterTwoFactorProviders(user.TenantId);
  651. RegisterTwoFactorProviders();
  652. return await base.GetValidTwoFactorProvidersAsync(userId);
  653. }
  654. public override async Task<IdentityResult> NotifyTwoFactorTokenAsync(long userId, string twoFactorProvider, string token)
  655. {
  656. //var user = await GetUserByIdAsync(userId);
  657. //RegisterTwoFactorProviders(user.TenantId);
  658. RegisterTwoFactorProviders();
  659. return await base.NotifyTwoFactorTokenAsync(userId, twoFactorProvider, token);
  660. }
  661. public override async Task<string> GenerateTwoFactorTokenAsync(long userId, string twoFactorProvider)
  662. {
  663. //var user = await GetUserByIdAsync(userId);
  664. //RegisterTwoFactorProviders(user.TenantId);
  665. RegisterTwoFactorProviders();
  666. return await base.GenerateTwoFactorTokenAsync(userId, twoFactorProvider);
  667. }
  668. public override async Task<bool> VerifyTwoFactorTokenAsync(long userId, string twoFactorProvider, string token)
  669. {
  670. //var user = await GetUserByIdAsync(userId);
  671. //RegisterTwoFactorProviders(user.TenantId);
  672. RegisterTwoFactorProviders();
  673. return await base.VerifyTwoFactorTokenAsync(userId, twoFactorProvider, token);
  674. }
  675. protected virtual Task<string> GetOldUserNameAsync(long userId)
  676. {
  677. return UserStore.GetUserNameFromDatabaseAsync(userId);
  678. }
  679. public Task<TUser> GetOldUserAsync(long userId)
  680. {
  681. return UserStore.GetUserFromDatabaseAsync(userId);
  682. }
  683. private async Task<IwbUserPermissionCacheItem> GetUserPermissionCacheItemAsync(long userId)
  684. {
  685. var cacheKey = userId + "@" + (GetCurrentTenantId() ?? 0);
  686. return await _cacheManager.GetUserPermissionCache().GetAsync(cacheKey, async () =>
  687. {
  688. var user = await FindByIdAsync(userId);
  689. if (user == null)
  690. {
  691. return null;
  692. }
  693. var newCacheItem = new IwbUserPermissionCacheItem(userId);
  694. foreach (var roleName in await GetRolesAsync(userId))
  695. {
  696. newCacheItem.RoleIds.Add((await RoleManager.GetRoleByNameAsync(roleName)).Id);
  697. }
  698. foreach (var permissionInfo in await IwbUserPermissionStore.GetPermissionsAsync(userId))
  699. {
  700. if (permissionInfo.IsGranted)
  701. {
  702. newCacheItem.GrantedPermissions.Add(permissionInfo.Name);
  703. }
  704. else
  705. {
  706. newCacheItem.ProhibitedPermissions.Add(permissionInfo.Name);
  707. }
  708. }
  709. return newCacheItem;
  710. });
  711. }
  712. private Task SetUserGrantedPermissionCacheItem(long userId, string permissionName, bool isAdded = true)
  713. {
  714. var cacheKey = userId + "@" + (GetCurrentTenantId() ?? 0);
  715. IwbUserPermissionCacheItem cacheItem = _cacheManager.GetUserPermissionCache().Get(cacheKey, () => null) ?? new IwbUserPermissionCacheItem(userId);
  716. if (isAdded)
  717. {
  718. cacheItem.GrantedPermissions.AddIfNotContains(permissionName);
  719. }
  720. else
  721. {
  722. cacheItem.GrantedPermissions.Remove(permissionName);
  723. }
  724. return _cacheManager.GetUserPermissionCache().SetAsync(cacheKey, cacheItem);
  725. }
  726. private Task SetUserProhibitedPermissionCacheItem(long userId, string permissionName, bool isAdded = true)
  727. {
  728. var cacheKey = userId + "@" + (GetCurrentTenantId() ?? 0);
  729. var cacheItem = _cacheManager.GetUserPermissionCache().Get(cacheKey, () => null) ?? new IwbUserPermissionCacheItem(userId);
  730. if (isAdded)
  731. {
  732. cacheItem.ProhibitedPermissions.AddIfNotContains(permissionName);
  733. }
  734. else
  735. {
  736. cacheItem.ProhibitedPermissions.Remove(permissionName);
  737. }
  738. return _cacheManager.GetUserPermissionCache().SetAsync(cacheKey, cacheItem);
  739. }
  740. private bool IsTrue(string settingName)
  741. {
  742. return GetSettingValue<bool>(settingName);
  743. }
  744. private T GetSettingValue<T>(string settingName) where T : struct
  745. {
  746. return _settingManager.GetSettingValueForApplication<T>(settingName);
  747. }
  748. private string L(string name)
  749. {
  750. return LocalizationManager.GetString(LocalizationSourceName, name);
  751. }
  752. private int? GetCurrentTenantId()
  753. {
  754. if (_unitOfWorkManager.Current != null)
  755. {
  756. return _unitOfWorkManager.Current.GetTenantId();
  757. }
  758. return AbpSession.TenantId;
  759. }
  760. private MultiTenancySides GetCurrentMultiTenancySide()
  761. {
  762. if (_unitOfWorkManager.Current != null)
  763. {
  764. return MultiTenancy.IsEnabled && !_unitOfWorkManager.Current.GetTenantId().HasValue
  765. ? MultiTenancySides.Host
  766. : MultiTenancySides.Tenant;
  767. }
  768. return AbpSession.MultiTenancySide;
  769. }
  770. }
  771. }