IwbUserManager.cs 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797
  1. using System;
  2. using System.Collections.Generic;
  3. using System.Globalization;
  4. using System.Linq;
  5. using System.Security.Claims;
  6. using System.Threading.Tasks;
  7. using Abp;
  8. using Abp.Application.Features;
  9. using Abp.Authorization;
  10. using Abp.Collections.Extensions;
  11. using Abp.Configuration;
  12. using Abp.Configuration.Startup;
  13. using Abp.Domain.Services;
  14. using Abp.Domain.Uow;
  15. using Abp.Localization;
  16. using Abp.MultiTenancy;
  17. using Abp.Runtime.Caching;
  18. using Abp.Runtime.Security;
  19. using IwbZero.Authorization.Base.Permissions;
  20. using IwbZero.Authorization.Base.Users;
  21. using IwbZero.Authorization.Roles;
  22. using IwbZero.IdentityFramework;
  23. using IwbZero.Runtime.Caching;
  24. using IwbZero.Runtime.Session;
  25. using IwbZero.Zero.Configuration;
  26. using Microsoft.AspNet.Identity;
  27. namespace IwbZero.Authorization.Users
  28. {
  29. public abstract class IwbUserManager<TRole, TUser>
  30. : UserManager<TUser, long>,
  31. IDomainService
  32. where TRole : IwbSysRole<TUser>, new()
  33. where TUser : IwbSysUser<TUser>
  34. {
  35. protected IUserPermissionStore<TUser> UserPermissionStore
  36. {
  37. get
  38. {
  39. if (!(Store is IUserPermissionStore<TUser>))
  40. {
  41. throw new AbpException("Store is not IUserPermissionStore");
  42. }
  43. return Store as IUserPermissionStore<TUser>;
  44. }
  45. }
  46. public ILocalizationManager LocalizationManager { get; }
  47. protected string LocalizationSourceName { get; set; }
  48. public IIwbSession AbpSession { get; set; }
  49. public FeatureDependencyContext FeatureDependencyContext { get; set; }
  50. protected IwbRoleManager<TRole, TUser> RoleManager { get; }
  51. public IwbUserStore<TRole, TUser> IwbStore { get; }
  52. public IMultiTenancyConfig MultiTenancy { get; set; }
  53. private readonly IPermissionManager _permissionManager;
  54. private readonly IUnitOfWorkManager _unitOfWorkManager;
  55. private readonly ICacheManager _cacheManager;
  56. private readonly ISettingManager _settingManager;
  57. protected IwbUserManager(
  58. IwbUserStore<TRole, TUser> userStore,
  59. IwbRoleManager<TRole, TUser> roleManager,
  60. IPermissionManager permissionManager,
  61. IUnitOfWorkManager unitOfWorkManager,
  62. ICacheManager cacheManager,
  63. ILocalizationManager localizationManager,
  64. IdentityEmailMessageService emailService,
  65. ISettingManager settingManager,
  66. IUserTokenProviderAccessor userTokenProviderAccessor)
  67. : base(userStore)
  68. {
  69. IwbStore = userStore;
  70. RoleManager = roleManager;
  71. LocalizationManager = localizationManager;
  72. LocalizationSourceName = IwbZeroConsts.LocalizationSourceName;
  73. _settingManager = settingManager;
  74. _permissionManager = permissionManager;
  75. _unitOfWorkManager = unitOfWorkManager;
  76. _cacheManager = cacheManager;
  77. AbpSession = NullIwbSession.Instance;
  78. UserLockoutEnabledByDefault = true;
  79. DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5);
  80. MaxFailedAccessAttemptsBeforeLockout = 5;
  81. EmailService = emailService;
  82. UserTokenProvider = userTokenProviderAccessor.GetUserTokenProviderOrNull<TUser>();
  83. }
  84. public override async Task<IdentityResult> CreateAsync(TUser user)
  85. {
  86. user.SetNormalizedNames();
  87. var result = await CheckDuplicateUsernameOrEmailAddressAsync(user.Id, user.UserName, user.EmailAddress);
  88. if (!result.Succeeded)
  89. {
  90. return result;
  91. }
  92. var tenantId = GetCurrentTenantId();
  93. if (tenantId.HasValue && !user.TenantId.HasValue)
  94. {
  95. user.TenantId = tenantId.Value;
  96. }
  97. InitializeLockoutSettings(user.TenantId);
  98. return await base.CreateAsync(user);
  99. }
  100. /// <summary>
  101. /// Check whether a user is granted for a permission.
  102. /// </summary>
  103. /// <param name="userId">User id</param>
  104. /// <param name="permissionName">Permission name</param>
  105. /// <param name="isOnlyUser"></param>
  106. public virtual async Task<bool> IsGrantedAsync(long userId, string permissionName, bool isOnlyUser = false)
  107. {
  108. return await IsGrantedAsync(
  109. userId,
  110. _permissionManager.GetPermission(permissionName), isOnlyUser
  111. );
  112. }
  113. /// <summary>
  114. /// Check whether a user is granted for a permission.
  115. /// </summary>
  116. /// <param name="user">User</param>
  117. /// <param name="permission">Permission</param>
  118. /// <param name="isOnlyUser"></param>
  119. public virtual Task<bool> IsGrantedAsync(TUser user, Permission permission, bool isOnlyUser = false)
  120. {
  121. return IsGrantedAsync(user.Id, permission, isOnlyUser);
  122. }
  123. /// <summary>
  124. /// Check whether a user is granted for a permission.
  125. /// </summary>
  126. /// <param name="userId">User id</param>
  127. /// <param name="permission">Permission</param>
  128. /// <param name="isOnlyUser"></param>
  129. public virtual async Task<bool> IsGrantedAsync(long userId, Permission permission, bool isOnlyUser = false)
  130. {
  131. //Check for multi-tenancy side
  132. if (!permission.MultiTenancySides.HasFlag(GetCurrentMultiTenancySide()))
  133. {
  134. return false;
  135. }
  136. //Check for depended features
  137. if (permission.FeatureDependency != null && GetCurrentMultiTenancySide() == MultiTenancySides.Tenant)
  138. {
  139. FeatureDependencyContext.TenantId = GetCurrentTenantId();
  140. if (!await permission.FeatureDependency.IsSatisfiedAsync(FeatureDependencyContext))
  141. {
  142. return false;
  143. }
  144. }
  145. //Get cached user permissions
  146. var cacheItem = await GetUserPermissionCacheItemAsync(userId);
  147. if (cacheItem == null)
  148. {
  149. return false;
  150. }
  151. //Check for user-specific value
  152. if (cacheItem.GrantedPermissions.Contains(permission.Name))
  153. {
  154. return true;
  155. }
  156. if (cacheItem.ProhibitedPermissions.Contains(permission.Name))
  157. {
  158. return false;
  159. }
  160. if (isOnlyUser)
  161. {
  162. return false;
  163. }
  164. //Check for roles
  165. foreach (var roleId in cacheItem.RoleIds)
  166. {
  167. if (await RoleManager.IsGrantedAsync(roleId, permission))
  168. {
  169. return true;
  170. }
  171. }
  172. return false;
  173. }
  174. /// <summary>
  175. /// Check whether a user is granted for a permission.
  176. /// </summary>
  177. /// <param name="user">User id</param>
  178. /// <param name="operType"></param>
  179. /// <param name="permission">Permission</param>
  180. /// <param name="isOnlyUser">只查用户权限</param>
  181. /// <param name="dataKey"></param>
  182. public virtual async Task<bool> IsGrantedAsync(TUser user, string dataKey, int operType, Permission permission, bool isOnlyUser = false)
  183. {
  184. return await IsGrantedAsync(user.Id, dataKey, operType, permission.Name, isOnlyUser);
  185. }
  186. /// <summary>
  187. /// Check whether a user is granted for a permission.
  188. /// </summary>
  189. /// <param name="user">User id</param>
  190. /// <param name="operType"></param>
  191. /// <param name="permissionName">Permission</param>
  192. /// <param name="isOnlyUser">只查用户权限</param>
  193. /// <param name="dataKey"></param>
  194. public virtual async Task<bool> IsGrantedAsync(TUser user, string dataKey, int operType, string permissionName, bool isOnlyUser = false)
  195. {
  196. return await IsGrantedAsync(user.Id, dataKey, operType, permissionName, isOnlyUser);
  197. }
  198. /// <summary>
  199. /// Check whether a user is granted for a permission.
  200. /// </summary>
  201. /// <param name="userId">User id</param>
  202. /// <param name="operType"></param>
  203. /// <param name="permission">Permission</param>
  204. /// <param name="isOnlyUser">只查用户权限</param>
  205. /// <param name="dataKey"></param>
  206. public virtual async Task<bool> IsGrantedAsync(long userId, string dataKey, int operType, Permission permission, bool isOnlyUser = false)
  207. {
  208. return await IsGrantedAsync(userId, dataKey, operType, permission.Name, isOnlyUser);
  209. }
  210. /// <summary>
  211. /// Check whether a user is granted for a permission.
  212. /// </summary>
  213. /// <param name="userId">User id</param>
  214. /// <param name="operType"></param>
  215. /// <param name="permissionName">Permission</param>
  216. /// <param name="isOnlyUser">只查用户权限</param>
  217. /// <param name="dataKey"></param>
  218. public virtual async Task<bool> IsGrantedAsync(long userId, string dataKey, int operType, string permissionName, bool isOnlyUser = false)
  219. {
  220. //Get cached user permissions
  221. var cacheItem = await GetUserDataPermissionCacheItemAsync(userId);
  222. if (cacheItem == null)
  223. {
  224. return false;
  225. }
  226. //Check for user-specific value
  227. // ReSharper disable once PossibleUnintendedLinearSearchInSet
  228. if (cacheItem.GrantedPermissions.Contains($"{permissionName}@{dataKey}@{operType}", DataPermissionNameComparer.Instance))
  229. {
  230. return true;
  231. }
  232. // ReSharper disable once PossibleUnintendedLinearSearchInSet
  233. if (cacheItem.ProhibitedPermissions.Contains($"{permissionName}@{dataKey}@{operType}", DataPermissionNameComparer.Instance))
  234. {
  235. return false;
  236. }
  237. if (isOnlyUser)
  238. {
  239. return false;
  240. }
  241. //Check for roles
  242. foreach (var roleId in cacheItem.RoleIds)
  243. {
  244. if (await RoleManager.IsGrantedAsync(roleId, dataKey, operType, permissionName))
  245. {
  246. return true;
  247. }
  248. }
  249. return false;
  250. }
  251. /// <summary>
  252. /// Gets granted permissions for a user.
  253. /// </summary>
  254. /// <param name="user">Role</param>
  255. /// <returns>List of granted permissions</returns>
  256. public virtual async Task<IReadOnlyList<Permission>> GetGrantedPermissionsAsync(TUser user)
  257. {
  258. var permissionList = new List<Permission>();
  259. foreach (var permission in _permissionManager.GetAllPermissions())
  260. {
  261. if (await IsGrantedAsync(user.Id, permission))
  262. {
  263. permissionList.Add(permission);
  264. }
  265. }
  266. return permissionList;
  267. }
  268. /// <summary>
  269. /// Sets all granted permissions of a user at once.
  270. /// Prohibits all other permissions.
  271. /// </summary>
  272. /// <param name="user">The user</param>
  273. /// <param name="permissions">Permissions</param>
  274. public virtual async Task SetGrantedPermissionsAsync(TUser user, IEnumerable<Permission> permissions)
  275. {
  276. var oldPermissions = await GetGrantedPermissionsAsync(user);
  277. var newPermissions = permissions.ToArray();
  278. foreach (var permission in oldPermissions.Where(p => !newPermissions.Contains(p)))
  279. {
  280. //await ProhibitPermissionAsync(user, permission);
  281. await RemovePermissionAsync(user, permission);
  282. }
  283. foreach (var permission in newPermissions.Where(p => !oldPermissions.Contains(p)))
  284. {
  285. await GrantPermissionAsync(user, permission);
  286. }
  287. }
  288. /// <summary>
  289. /// Prohibits all permissions for a user.
  290. /// </summary>
  291. /// <param name="user">User</param>
  292. public async Task ProhibitAllPermissionsAsync(TUser user)
  293. {
  294. foreach (var permission in _permissionManager.GetAllPermissions())
  295. {
  296. await ProhibitPermissionAsync(user, permission);
  297. }
  298. }
  299. /// <summary>
  300. /// Resets all permission settings for a user.
  301. /// It removes all permission settings for the user.
  302. /// User will have permissions according to his roles.
  303. /// This method does not prohibit all permissions.
  304. /// For that, use <see cref="ProhibitAllPermissionsAsync"/>.
  305. /// </summary>
  306. /// <param name="user">User</param>
  307. public async Task ResetAllPermissionsAsync(TUser user)
  308. {
  309. await UserPermissionStore.RemoveAllPermissionSettingsAsync(user);
  310. }
  311. /// <summary>
  312. /// Grants a permission for a user if not already granted.
  313. /// </summary>
  314. /// <param name="user">User</param>
  315. /// <param name="permission">Permission</param>
  316. public virtual async Task GrantPermissionAsync(TUser user, Permission permission)
  317. {
  318. await UserPermissionStore.RemovePermissionAsync(user, new PermissionGrantInfo(permission.Name, false));
  319. if (await IsGrantedAsync(user.Id, permission))
  320. {
  321. return;
  322. }
  323. await UserPermissionStore.AddPermissionAsync(user, new PermissionGrantInfo(permission.Name, true));
  324. await SetGrantedPermissionCacheItem(user.Id, permission.Name);
  325. }
  326. public virtual async Task RemovePermissionAsync(TUser user, Permission permission)
  327. {
  328. await UserPermissionStore.RemovePermissionAsync(user, new PermissionGrantInfo(permission.Name, true));
  329. await SetGrantedPermissionCacheItem(user.Id, permission.Name, false);
  330. }
  331. /// <summary>
  332. /// Prohibits a permission for a user if it's granted.
  333. /// </summary>
  334. /// <param name="user">User</param>
  335. /// <param name="permission">Permission</param>
  336. public virtual async Task ProhibitPermissionAsync(TUser user, Permission permission)
  337. {
  338. await UserPermissionStore.RemovePermissionAsync(user, new PermissionGrantInfo(permission.Name, true));
  339. if (!await IsGrantedAsync(user.Id, permission))
  340. {
  341. return;
  342. }
  343. await UserPermissionStore.AddPermissionAsync(user, new PermissionGrantInfo(permission.Name, false));
  344. await SetGrantedPermissionCacheItem(user.Id, permission.Name, false);
  345. }
  346. private async Task SetGrantedPermissionCacheItem(long userId, string permissionName, bool isAdded = true)
  347. {
  348. var permissionCacheItem = await GetUserPermissionCacheItemAsync(userId);
  349. if (isAdded)
  350. permissionCacheItem.GrantedPermissions.AddIfNotContains(permissionName);
  351. else
  352. permissionCacheItem.GrantedPermissions.Remove(permissionName);
  353. }
  354. public virtual async Task<TUser> FindByNameOrEmailAsync(string userNameOrEmailAddress)
  355. {
  356. return await IwbStore.FindByNameOrEmailOrMobileAsync(userNameOrEmailAddress);
  357. }
  358. public virtual Task<List<TUser>> FindAllAsync(UserLoginInfo login)
  359. {
  360. return IwbStore.FindAllAsync(login);
  361. }
  362. /// <summary>
  363. /// Gets a user by given id.
  364. /// Throws exception if no user found with given id.
  365. /// </summary>
  366. /// <param name="userId">User id</param>
  367. /// <returns>User</returns>
  368. /// <exception cref="AbpException">Throws exception if no user found with given id</exception>
  369. public virtual async Task<TUser> GetUserByIdAsync(long userId)
  370. {
  371. var user = await FindByIdAsync(userId);
  372. if (user == null)
  373. {
  374. throw new AbpException("There is no user with id: " + userId);
  375. }
  376. return user;
  377. }
  378. public override async Task<ClaimsIdentity> CreateIdentityAsync(TUser user, string authenticationType)
  379. {
  380. var identity = await base.CreateIdentityAsync(user, authenticationType);
  381. identity.AddClaim(new Claim(IwbClaimTypes.UserName, user.UserName));
  382. identity.AddClaim(new Claim(IwbClaimTypes.PhoneNumber, user.PhoneNumber ?? ""));
  383. identity.AddClaim(new Claim(IwbClaimTypes.RealName, user.Name));
  384. identity.AddClaim(new Claim(IwbClaimTypes.UserType, user.UserType.ToString()));
  385. identity.AddClaim(new Claim(IwbClaimTypes.EmailAddress, user.EmailAddress));
  386. identity.AddClaim(new Claim(IwbClaimTypes.AccountType, user.AccountType.ToString()));
  387. identity.AddClaim(new Claim(IwbClaimTypes.AccountNo, user.AccountNo ?? ""));
  388. identity.AddClaim(new Claim(IwbClaimTypes.AvatarImagePath, user.ImagePath ?? ""));
  389. IList<string> roleList = await GetRolesAsync(user.Id);
  390. string userRoles = roleList.Any() ? string.Join(",", roleList.ToArray()) : "";
  391. identity.AddClaim(new Claim(IwbClaimTypes.UserRoles, userRoles));
  392. var roleIdList = user.Roles?.Select(a => a.RoleId.ToString()) ?? new List<string>();
  393. string userRoleIds = roleList.Any() ? string.Join("|", roleIdList.ToArray()) : "";
  394. identity.AddClaim(new Claim(IwbClaimTypes.UserRoleIds, userRoleIds));
  395. if (user.TenantId.HasValue)
  396. {
  397. identity.AddClaim(new Claim(AbpClaimTypes.TenantId, user.TenantId.Value.ToString(CultureInfo.InvariantCulture)));
  398. }
  399. return identity;
  400. }
  401. public override async Task<IdentityResult> UpdateAsync(TUser user)
  402. {
  403. user.SetNormalizedNames();
  404. var result = await CheckDuplicateUsernameOrEmailAddressAsync(user.Id, user.UserName, user.EmailAddress);
  405. if (!result.Succeeded)
  406. {
  407. return result;
  408. }
  409. var oldName = await GetOldUserNameAsync(user.Id);
  410. //Admin user's username can not be changed!
  411. if (user.UserName != UserBase.AdminUserName)
  412. {
  413. if (oldName == UserBase.AdminUserName)
  414. {
  415. return AbpIdentityResult.Failed(string.Format(L("CanNotRenameAdminUser"), UserBase.AdminUserName));
  416. }
  417. }
  418. if (user.UserName != UserBase.SystemUserName)
  419. {
  420. if (oldName == UserBase.SystemUserName)
  421. {
  422. return AbpIdentityResult.Failed(string.Format(L("CanNotRenameAdminUser"), UserBase.SystemUserName));
  423. }
  424. }
  425. return await base.UpdateAsync(user);
  426. }
  427. public override async Task<IdentityResult> DeleteAsync(TUser user)
  428. {
  429. if (user.UserName == UserBase.AdminUserName)
  430. {
  431. return AbpIdentityResult.Failed(string.Format(L("CanNotDeleteAdminUser"), UserBase.AdminUserName));
  432. }
  433. if (user.UserName == UserBase.SystemUserName)
  434. {
  435. return AbpIdentityResult.Failed(string.Format(L("CanNotDeleteAdminUser"), UserBase.SystemUserName));
  436. }
  437. return await base.DeleteAsync(user);
  438. }
  439. public virtual async Task<IdentityResult> ChangePasswordAsync(TUser user, string newPassword)
  440. {
  441. var result = await PasswordValidator.ValidateAsync(newPassword);
  442. if (!result.Succeeded)
  443. {
  444. return result;
  445. }
  446. await IwbStore.SetPasswordHashAsync(user, PasswordHasher.HashPassword(newPassword));
  447. return IdentityResult.Success;
  448. }
  449. public virtual async Task UnLockUserLogin(TUser user)
  450. {
  451. if (await IwbStore.GetLockoutEnabledAsync(user))
  452. {
  453. await IwbStore.SetLockoutEnabledAsync(user, false);
  454. }
  455. }
  456. public virtual async Task<IdentityResult> CheckDuplicateUsernameOrEmailAddressAsync(long? expectedUserId, string userName, string emailAddress)
  457. {
  458. var user = (await FindByNameAsync(userName));
  459. if (user != null && user.Id != expectedUserId)
  460. {
  461. return AbpIdentityResult.Failed(string.Format(L("Identity.DuplicateUserName"), userName));
  462. }
  463. user = (await FindByEmailAsync(emailAddress));
  464. if (user != null && user.Id != expectedUserId)
  465. {
  466. return AbpIdentityResult.Failed(string.Format(L("Identity.DuplicateEmail"), emailAddress));
  467. }
  468. return IdentityResult.Success;
  469. }
  470. public virtual async Task<IdentityResult> SetRoles(TUser user, string[] roleNames)
  471. {
  472. //Remove from removed roles
  473. if (user.Roles != null)
  474. {
  475. foreach (var userRole in user.Roles.ToList())
  476. {
  477. var role = await RoleManager.FindByIdAsync(userRole.RoleId);
  478. if (roleNames.All(roleName => role.Name != roleName))
  479. {
  480. var result = await RemoveFromRoleAsync(user.Id, role.Name);
  481. if (!result.Succeeded)
  482. {
  483. return result;
  484. }
  485. }
  486. }
  487. }
  488. //Add to added roles
  489. foreach (var roleName in roleNames)
  490. {
  491. var role = await RoleManager.GetRoleByNameAsync(roleName);
  492. if (user.Roles != null && user.Roles.All(ur => ur.RoleId != role.Id))
  493. {
  494. var result = await AddToRoleAsync(user.Id, roleName);
  495. if (!result.Succeeded)
  496. {
  497. return result;
  498. }
  499. }
  500. }
  501. return IdentityResult.Success;
  502. }
  503. public virtual void RegisterTwoFactorProviders(int? tenantId)
  504. {
  505. TwoFactorProviders.Clear();
  506. if (!IsTrue(IwbZeroSettingNames.UserManagement.TwoFactorLogin.IsEnabled, tenantId))
  507. {
  508. return;
  509. }
  510. if (EmailService != null &&
  511. IsTrue(IwbZeroSettingNames.UserManagement.TwoFactorLogin.IsEmailProviderEnabled, tenantId))
  512. {
  513. RegisterTwoFactorProvider(
  514. L("Email"),
  515. new EmailTokenProvider<TUser, long>
  516. {
  517. Subject = L("EmailSecurityCodeSubject"),
  518. BodyFormat = L("EmailSecurityCodeBody")
  519. }
  520. );
  521. }
  522. if (SmsService != null &&
  523. IsTrue(IwbZeroSettingNames.UserManagement.TwoFactorLogin.IsSmsProviderEnabled, tenantId))
  524. {
  525. RegisterTwoFactorProvider(
  526. L("Sms"),
  527. new PhoneNumberTokenProvider<TUser, long>
  528. {
  529. MessageFormat = L("SmsSecurityCodeMessage")
  530. }
  531. );
  532. }
  533. }
  534. public virtual void InitializeLockoutSettings(int? tenantId)
  535. {
  536. UserLockoutEnabledByDefault = IsTrue(IwbZeroSettingNames.UserManagement.UserLockOut.IsEnabled, tenantId);
  537. DefaultAccountLockoutTimeSpan = TimeSpan.FromSeconds(GetSettingValue<int>(IwbZeroSettingNames.UserManagement.UserLockOut.DefaultAccountLockoutSeconds, tenantId));
  538. MaxFailedAccessAttemptsBeforeLockout = GetSettingValue<int>(IwbZeroSettingNames.UserManagement.UserLockOut.MaxFailedAccessAttemptsBeforeLockout, tenantId);
  539. }
  540. public override async Task<IList<string>> GetValidTwoFactorProvidersAsync(long userId)
  541. {
  542. var user = await GetUserByIdAsync(userId);
  543. RegisterTwoFactorProviders(user.TenantId);
  544. return await base.GetValidTwoFactorProvidersAsync(userId);
  545. }
  546. public override async Task<IdentityResult> NotifyTwoFactorTokenAsync(long userId, string twoFactorProvider, string token)
  547. {
  548. var user = await GetUserByIdAsync(userId);
  549. RegisterTwoFactorProviders(user.TenantId);
  550. return await base.NotifyTwoFactorTokenAsync(userId, twoFactorProvider, token);
  551. }
  552. public override async Task<string> GenerateTwoFactorTokenAsync(long userId, string twoFactorProvider)
  553. {
  554. var user = await GetUserByIdAsync(userId);
  555. RegisterTwoFactorProviders(user.TenantId);
  556. return await base.GenerateTwoFactorTokenAsync(userId, twoFactorProvider);
  557. }
  558. public override async Task<bool> VerifyTwoFactorTokenAsync(long userId, string twoFactorProvider, string token)
  559. {
  560. var user = await GetUserByIdAsync(userId);
  561. RegisterTwoFactorProviders(user.TenantId);
  562. return await base.VerifyTwoFactorTokenAsync(userId, twoFactorProvider, token);
  563. }
  564. protected virtual Task<string> GetOldUserNameAsync(long userId)
  565. {
  566. return IwbStore.GetUserNameFromDatabaseAsync(userId);
  567. }
  568. private async Task<UserPermissionCacheItem> GetUserPermissionCacheItemAsync(long userId)
  569. {
  570. var cacheKey = userId + "@" + (GetCurrentTenantId() ?? 0);
  571. return await _cacheManager.GetUserPermissionCache().GetAsync(cacheKey, async () =>
  572. {
  573. var user = await FindByIdAsync(userId);
  574. if (user == null)
  575. {
  576. return null;
  577. }
  578. var newCacheItem = new UserPermissionCacheItem(userId);
  579. foreach (var roleName in await GetRolesAsync(userId))
  580. {
  581. newCacheItem.RoleIds.Add((await RoleManager.GetRoleByNameAsync(roleName)).Id);
  582. }
  583. foreach (var permissionInfo in await UserPermissionStore.GetPermissionsAsync(userId))
  584. {
  585. if (permissionInfo.IsGranted)
  586. {
  587. newCacheItem.GrantedPermissions.Add(permissionInfo.Name);
  588. }
  589. else
  590. {
  591. newCacheItem.ProhibitedPermissions.Add(permissionInfo.Name);
  592. }
  593. }
  594. return newCacheItem;
  595. });
  596. }
  597. private async Task<UserPermissionCacheItem> GetUserDataPermissionCacheItemAsync(long userId)
  598. {
  599. var cacheKey = $"Data-{userId}@{GetCurrentTenantId() ?? 0}";
  600. return await _cacheManager.GetUserPermissionCache().GetAsync(cacheKey, async () =>
  601. {
  602. var user = await FindByIdAsync(userId);
  603. if (user == null)
  604. {
  605. return null;
  606. }
  607. var newCacheItem = new UserPermissionCacheItem(userId);
  608. foreach (var roleName in await GetRolesAsync(userId))
  609. {
  610. newCacheItem.RoleIds.Add((await RoleManager.GetRoleByNameAsync(roleName)).Id);
  611. }
  612. foreach (var permissionInfo in await UserPermissionStore.GetPermissionsAsync(userId))
  613. {
  614. if (permissionInfo.OperType == 0 || string.IsNullOrEmpty(permissionInfo.DataKey))
  615. {
  616. continue;
  617. }
  618. if (permissionInfo.IsGranted)
  619. {
  620. if (permissionInfo.OperType == 1)
  621. {
  622. newCacheItem.GrantedPermissions.Add($"{permissionInfo.Name}@{permissionInfo.DataKey}@{(int)OperType.Create}");
  623. newCacheItem.GrantedPermissions.Add($"{permissionInfo.Name}@{permissionInfo.DataKey}@{(int)OperType.Update}");
  624. newCacheItem.GrantedPermissions.Add($"{permissionInfo.Name}@{permissionInfo.DataKey}@{(int)OperType.Delete}");
  625. newCacheItem.GrantedPermissions.Add($"{permissionInfo.Name}@{permissionInfo.DataKey}@{(int)OperType.Query}");
  626. }
  627. else
  628. {
  629. newCacheItem.GrantedPermissions.Add($"{permissionInfo.Name}@{permissionInfo.DataKey}@{permissionInfo.OperType}");
  630. }
  631. }
  632. else
  633. {
  634. newCacheItem.ProhibitedPermissions.Add($"{permissionInfo.Name}@{permissionInfo.DataKey}@{permissionInfo.OperType}");
  635. }
  636. }
  637. return newCacheItem;
  638. });
  639. }
  640. private bool IsTrue(string settingName, int? tenantId)
  641. {
  642. return GetSettingValue<bool>(settingName, tenantId);
  643. }
  644. private T GetSettingValue<T>(string settingName, int? tenantId) where T : struct
  645. {
  646. return tenantId == null
  647. ? _settingManager.GetSettingValueForApplication<T>(settingName)
  648. : _settingManager.GetSettingValueForTenant<T>(settingName, tenantId.Value);
  649. }
  650. protected virtual string L(string name)
  651. {
  652. return LocalizationManager.GetString(LocalizationSourceName, name);
  653. }
  654. protected virtual string L(string name, CultureInfo cultureInfo)
  655. {
  656. return LocalizationManager.GetString(LocalizationSourceName, name, cultureInfo);
  657. }
  658. private int? GetCurrentTenantId()
  659. {
  660. if (_unitOfWorkManager.Current != null)
  661. {
  662. return _unitOfWorkManager.Current.GetTenantId();
  663. }
  664. return AbpSession.TenantId;
  665. }
  666. private MultiTenancySides GetCurrentMultiTenancySide()
  667. {
  668. if (_unitOfWorkManager.Current != null)
  669. {
  670. return MultiTenancy.IsEnabled && !_unitOfWorkManager.Current.GetTenantId().HasValue
  671. ? MultiTenancySides.Host
  672. : MultiTenancySides.Tenant;
  673. }
  674. return AbpSession.MultiTenancySide;
  675. }
  676. }
  677. }