71 lines
2.3 KiB
Go
71 lines
2.3 KiB
Go
// Copyright © 2023 OpenIM open source community. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package admin
|
|
|
|
import (
|
|
"context"
|
|
|
|
"git.imall.cloud/openim/chat/pkg/common/db/dbutil"
|
|
"git.imall.cloud/openim/chat/pkg/eerrs"
|
|
"git.imall.cloud/openim/chat/pkg/protocol/admin"
|
|
)
|
|
|
|
func (o *adminServer) CheckRegisterForbidden(ctx context.Context, req *admin.CheckRegisterForbiddenReq) (*admin.CheckRegisterForbiddenResp, error) {
|
|
forbiddens, err := o.Database.FindIPForbidden(ctx, []string{req.Ip})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for _, forbidden := range forbiddens {
|
|
if forbidden.LimitRegister {
|
|
return nil, eerrs.ErrForbidden.Wrap()
|
|
}
|
|
}
|
|
return &admin.CheckRegisterForbiddenResp{}, nil
|
|
}
|
|
|
|
func (o *adminServer) CheckLoginForbidden(ctx context.Context, req *admin.CheckLoginForbiddenReq) (*admin.CheckLoginForbiddenResp, error) {
|
|
forbiddens, err := o.Database.FindIPForbidden(ctx, []string{req.Ip})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for _, forbidden := range forbiddens {
|
|
if forbidden.LimitLogin {
|
|
return nil, eerrs.ErrForbidden.WrapMsg("ip forbidden")
|
|
}
|
|
}
|
|
if _, err := o.Database.GetLimitUserLoginIP(ctx, req.UserID, req.Ip); err != nil {
|
|
if !dbutil.IsDBNotFound(err) {
|
|
return nil, err
|
|
}
|
|
count, err := o.Database.CountLimitUserLoginIP(ctx, req.UserID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if count > 0 {
|
|
return nil, eerrs.ErrForbidden.WrapMsg("user ip forbidden")
|
|
}
|
|
}
|
|
if forbiddenAccount, err := o.Database.GetBlockInfo(ctx, req.UserID); err == nil {
|
|
reason := "账户已被封禁"
|
|
if forbiddenAccount.Reason != "" {
|
|
reason = "账户已被封禁:" + forbiddenAccount.Reason
|
|
}
|
|
return nil, eerrs.ErrAccountBlocked.WrapMsg(reason)
|
|
} else if !dbutil.IsDBNotFound(err) {
|
|
return nil, err
|
|
}
|
|
return &admin.CheckLoginForbiddenResp{}, nil
|
|
}
|