user.go 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156
  1. package service
  2. import (
  3. "errors"
  4. "github.com/mhsanaei/3x-ui/v2/database"
  5. "github.com/mhsanaei/3x-ui/v2/database/model"
  6. "github.com/mhsanaei/3x-ui/v2/logger"
  7. "github.com/mhsanaei/3x-ui/v2/util/crypto"
  8. ldaputil "github.com/mhsanaei/3x-ui/v2/util/ldap"
  9. "github.com/xlzd/gotp"
  10. "gorm.io/gorm"
  11. )
  12. // UserService provides business logic for user management and authentication.
  13. // It handles user creation, login, password management, and 2FA operations.
  14. type UserService struct {
  15. settingService SettingService
  16. }
  17. // GetFirstUser retrieves the first user from the database.
  18. // This is typically used for initial setup or when there's only one admin user.
  19. func (s *UserService) GetFirstUser() (*model.User, error) {
  20. db := database.GetDB()
  21. user := &model.User{}
  22. err := db.Model(model.User{}).
  23. First(user).
  24. Error
  25. if err != nil {
  26. return nil, err
  27. }
  28. return user, nil
  29. }
  30. func (s *UserService) CheckUser(username string, password string, twoFactorCode string) *model.User {
  31. db := database.GetDB()
  32. user := &model.User{}
  33. err := db.Model(model.User{}).
  34. Where("username = ?", username).
  35. First(user).
  36. Error
  37. if err == gorm.ErrRecordNotFound {
  38. return nil
  39. } else if err != nil {
  40. logger.Warning("check user err:", err)
  41. return nil
  42. }
  43. // If LDAP enabled and local password check fails, attempt LDAP auth
  44. if !crypto.CheckPasswordHash(user.Password, password) {
  45. ldapEnabled, _ := s.settingService.GetLdapEnable()
  46. if !ldapEnabled {
  47. return nil
  48. }
  49. host, _ := s.settingService.GetLdapHost()
  50. port, _ := s.settingService.GetLdapPort()
  51. useTLS, _ := s.settingService.GetLdapUseTLS()
  52. bindDN, _ := s.settingService.GetLdapBindDN()
  53. ldapPass, _ := s.settingService.GetLdapPassword()
  54. baseDN, _ := s.settingService.GetLdapBaseDN()
  55. userFilter, _ := s.settingService.GetLdapUserFilter()
  56. userAttr, _ := s.settingService.GetLdapUserAttr()
  57. cfg := ldaputil.Config{
  58. Host: host,
  59. Port: port,
  60. UseTLS: useTLS,
  61. BindDN: bindDN,
  62. Password: ldapPass,
  63. BaseDN: baseDN,
  64. UserFilter: userFilter,
  65. UserAttr: userAttr,
  66. }
  67. ok, err := ldaputil.AuthenticateUser(cfg, username, password)
  68. if err != nil || !ok {
  69. return nil
  70. }
  71. // On successful LDAP auth, continue 2FA checks below
  72. }
  73. twoFactorEnable, err := s.settingService.GetTwoFactorEnable()
  74. if err != nil {
  75. logger.Warning("check two factor err:", err)
  76. return nil
  77. }
  78. if twoFactorEnable {
  79. twoFactorToken, err := s.settingService.GetTwoFactorToken()
  80. if err != nil {
  81. logger.Warning("check two factor token err:", err)
  82. return nil
  83. }
  84. if gotp.NewDefaultTOTP(twoFactorToken).Now() != twoFactorCode {
  85. return nil
  86. }
  87. }
  88. return user
  89. }
  90. func (s *UserService) UpdateUser(id int, username string, password string) error {
  91. db := database.GetDB()
  92. hashedPassword, err := crypto.HashPasswordAsBcrypt(password)
  93. if err != nil {
  94. return err
  95. }
  96. twoFactorEnable, err := s.settingService.GetTwoFactorEnable()
  97. if err != nil {
  98. return err
  99. }
  100. if twoFactorEnable {
  101. s.settingService.SetTwoFactorEnable(false)
  102. s.settingService.SetTwoFactorToken("")
  103. }
  104. return db.Model(model.User{}).
  105. Where("id = ?", id).
  106. Updates(map[string]any{"username": username, "password": hashedPassword}).
  107. Error
  108. }
  109. func (s *UserService) UpdateFirstUser(username string, password string) error {
  110. if username == "" {
  111. return errors.New("username can not be empty")
  112. } else if password == "" {
  113. return errors.New("password can not be empty")
  114. }
  115. hashedPassword, er := crypto.HashPasswordAsBcrypt(password)
  116. if er != nil {
  117. return er
  118. }
  119. db := database.GetDB()
  120. user := &model.User{}
  121. err := db.Model(model.User{}).First(user).Error
  122. if database.IsNotFound(err) {
  123. user.Username = username
  124. user.Password = hashedPassword
  125. return db.Model(model.User{}).Create(user).Error
  126. } else if err != nil {
  127. return err
  128. }
  129. user.Username = username
  130. user.Password = hashedPassword
  131. return db.Save(user).Error
  132. }