mirror of
https://github.com/netcccyun/dnsmgr.git
synced 2024-11-16 11:42:35 +08:00
a3b26085a6
增加代理连通性测试
118 lines
5.1 KiB
PHP
118 lines
5.1 KiB
PHP
<?php
|
|
|
|
namespace app\controller;
|
|
|
|
use app\BaseController;
|
|
use think\facade\Db;
|
|
|
|
class Auth extends BaseController
|
|
{
|
|
|
|
public function login()
|
|
{
|
|
$login_limit_count = 5; //登录失败次数
|
|
$login_limit_file = app()->getRuntimePath() . '@login.lock';
|
|
|
|
if ($this->request->islogin) {
|
|
return redirect('/');
|
|
}
|
|
|
|
if ($this->request->isAjax()) {
|
|
$username = input('post.username', null, 'trim');
|
|
$password = input('post.password', null, 'trim');
|
|
$code = input('post.code', null, 'trim');
|
|
|
|
if (empty($username) || empty($password)) {
|
|
return json(['code' => -1, 'msg' => '用户名或密码不能为空']);
|
|
}
|
|
if (!captcha_check($code)) {
|
|
return json(['code' => -1, 'msg' => '验证码错误', 'vcode' => 1]);
|
|
}
|
|
if (file_exists($login_limit_file)) {
|
|
$login_limit = unserialize(file_get_contents($login_limit_file));
|
|
if ($login_limit['count'] >= $login_limit_count && $login_limit['time'] > time() - 7200) {
|
|
return json(['code' => -1, 'msg' => '多次登录失败,暂时禁止登录。可删除/runtime/@login.lock文件解除限制', 'vcode' => 1]);
|
|
}
|
|
}
|
|
$user = Db::name('user')->where('username', $username)->find();
|
|
if ($user && password_verify($password, $user['password'])) {
|
|
if ($user['status'] == 0) return json(['code' => -1, 'msg' => '此用户已被封禁', 'vcode' => 1]);
|
|
Db::name('log')->insert(['uid' => $user['id'], 'action' => '登录后台', 'data' => 'IP:' . $this->clientip, 'addtime' => date("Y-m-d H:i:s")]);
|
|
DB::name('user')->where('id', $user['id'])->update(['lasttime' => date("Y-m-d H:i:s")]);
|
|
$session = md5($user['id'] . $user['password']);
|
|
$expiretime = time() + 2562000;
|
|
$token = authcode("user\t{$user['id']}\t{$session}\t{$expiretime}", 'ENCODE', config_get('sys_key'));
|
|
cookie('user_token', $token, ['expire' => $expiretime, 'httponly' => true]);
|
|
if (file_exists($login_limit_file)) {
|
|
unlink($login_limit_file);
|
|
}
|
|
return json(['code' => 0]);
|
|
} else {
|
|
if ($user) {
|
|
Db::name('log')->insert(['uid' => $user['id'], 'action' => '登录失败', 'data' => 'IP:' . $this->clientip, 'addtime' => date("Y-m-d H:i:s")]);
|
|
}
|
|
if (!file_exists($login_limit_file)) {
|
|
$login_limit = ['count' => 0, 'time' => 0];
|
|
}
|
|
$login_limit['count']++;
|
|
$login_limit['time'] = time();
|
|
file_put_contents($login_limit_file, serialize($login_limit));
|
|
$retry_times = $login_limit_count - $login_limit['count'];
|
|
if ($retry_times == 0) {
|
|
return json(['code' => -1, 'msg' => '多次登录失败,暂时禁止登录。可删除/runtime/@login.lock文件解除限制', 'vcode' => 1]);
|
|
} else {
|
|
return json(['code' => -1, 'msg' => '用户名或密码错误,你还可以尝试' . $retry_times . '次', 'vcode' => 1]);
|
|
}
|
|
}
|
|
}
|
|
|
|
return view();
|
|
}
|
|
|
|
public function logout()
|
|
{
|
|
cookie('user_token', null);
|
|
return redirect('/login');
|
|
}
|
|
|
|
public function quicklogin()
|
|
{
|
|
$domain = input('get.domain', null, 'trim');
|
|
$timestamp = input('get.timestamp', null, 'trim');
|
|
$token = input('get.token', null, 'trim');
|
|
$sign = input('get.sign', null, 'trim');
|
|
if (empty($domain) || empty($timestamp) || empty($token) || empty($sign)) {
|
|
return $this->alert('error', '参数错误');
|
|
}
|
|
if ($timestamp < time() - 300 || $timestamp > time() + 300) {
|
|
return $this->alert('error', '时间戳无效');
|
|
}
|
|
if (md5(config_get('sys_key') . $domain . $timestamp . $token . config_get('sys_key')) !== $sign) {
|
|
return $this->alert('error', '签名错误');
|
|
}
|
|
if ($token != cache('quicklogin_' . $domain)) {
|
|
return $this->alert('error', 'Token无效');
|
|
}
|
|
$row = Db::name('domain')->where('name', $domain)->find();
|
|
if (!$row) {
|
|
return $this->alert('error', '该域名不存在');
|
|
}
|
|
if (!$row['is_sso']) {
|
|
return $this->alert('error', '该域名不支持快捷登录');
|
|
}
|
|
|
|
Db::name('log')->insert(['uid' => 0, 'action' => '域名快捷登录', 'data' => 'IP:' . $this->clientip, 'addtime' => date("Y-m-d H:i:s"), 'domain' => $domain]);
|
|
|
|
$session = md5($row['id'] . $row['name']);
|
|
$expiretime = time() + 2562000;
|
|
$token = authcode("domain\t{$row['id']}\t{$session}\t{$expiretime}", 'ENCODE', config_get('sys_key'));
|
|
cookie('user_token', $token, ['expire' => $expiretime, 'httponly' => true]);
|
|
return redirect('/record/' . $row['id']);
|
|
}
|
|
|
|
public function verifycode()
|
|
{
|
|
return captcha();
|
|
}
|
|
}
|