user.go 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127
  1. package service
  2. import (
  3. "errors"
  4. "github.com/mhsanaei/3x-ui/v2/database"
  5. "github.com/mhsanaei/3x-ui/v2/database/model"
  6. "github.com/mhsanaei/3x-ui/v2/logger"
  7. "github.com/mhsanaei/3x-ui/v2/util/crypto"
  8. "github.com/xlzd/gotp"
  9. "gorm.io/gorm"
  10. )
  11. // UserService provides business logic for user management and authentication.
  12. // It handles user creation, login, password management, and 2FA operations.
  13. type UserService struct {
  14. settingService SettingService
  15. }
  16. // GetFirstUser retrieves the first user from the database.
  17. // This is typically used for initial setup or when there's only one admin user.
  18. func (s *UserService) GetFirstUser() (*model.User, error) {
  19. db := database.GetDB()
  20. user := &model.User{}
  21. err := db.Model(model.User{}).
  22. First(user).
  23. Error
  24. if err != nil {
  25. return nil, err
  26. }
  27. return user, nil
  28. }
  29. func (s *UserService) CheckUser(username string, password string, twoFactorCode string) *model.User {
  30. db := database.GetDB()
  31. user := &model.User{}
  32. err := db.Model(model.User{}).
  33. Where("username = ?", username).
  34. First(user).
  35. Error
  36. if err == gorm.ErrRecordNotFound {
  37. return nil
  38. } else if err != nil {
  39. logger.Warning("check user err:", err)
  40. return nil
  41. }
  42. if !crypto.CheckPasswordHash(user.Password, password) {
  43. return nil
  44. }
  45. twoFactorEnable, err := s.settingService.GetTwoFactorEnable()
  46. if err != nil {
  47. logger.Warning("check two factor err:", err)
  48. return nil
  49. }
  50. if twoFactorEnable {
  51. twoFactorToken, err := s.settingService.GetTwoFactorToken()
  52. if err != nil {
  53. logger.Warning("check two factor token err:", err)
  54. return nil
  55. }
  56. if gotp.NewDefaultTOTP(twoFactorToken).Now() != twoFactorCode {
  57. return nil
  58. }
  59. }
  60. return user
  61. }
  62. func (s *UserService) UpdateUser(id int, username string, password string) error {
  63. db := database.GetDB()
  64. hashedPassword, err := crypto.HashPasswordAsBcrypt(password)
  65. if err != nil {
  66. return err
  67. }
  68. twoFactorEnable, err := s.settingService.GetTwoFactorEnable()
  69. if err != nil {
  70. return err
  71. }
  72. if twoFactorEnable {
  73. s.settingService.SetTwoFactorEnable(false)
  74. s.settingService.SetTwoFactorToken("")
  75. }
  76. return db.Model(model.User{}).
  77. Where("id = ?", id).
  78. Updates(map[string]any{"username": username, "password": hashedPassword}).
  79. Error
  80. }
  81. func (s *UserService) UpdateFirstUser(username string, password string) error {
  82. if username == "" {
  83. return errors.New("username can not be empty")
  84. } else if password == "" {
  85. return errors.New("password can not be empty")
  86. }
  87. hashedPassword, er := crypto.HashPasswordAsBcrypt(password)
  88. if er != nil {
  89. return er
  90. }
  91. db := database.GetDB()
  92. user := &model.User{}
  93. err := db.Model(model.User{}).First(user).Error
  94. if database.IsNotFound(err) {
  95. user.Username = username
  96. user.Password = hashedPassword
  97. return db.Model(model.User{}).Create(user).Error
  98. } else if err != nil {
  99. return err
  100. }
  101. user.Username = username
  102. user.Password = hashedPassword
  103. return db.Save(user).Error
  104. }