Files
trihuy-russian/web/service/user.go
T

124 lines
2.6 KiB
Go
Raw Normal View History

2023-02-09 22:48:06 +03:30
package service
import (
"errors"
2024-03-11 01:01:24 +03:30
2025-09-19 10:05:43 +02:00
"github.com/mhsanaei/3x-ui/v2/database"
"github.com/mhsanaei/3x-ui/v2/database/model"
"github.com/mhsanaei/3x-ui/v2/logger"
"github.com/mhsanaei/3x-ui/v2/util/crypto"
2023-02-09 22:48:06 +03:30
2025-05-08 21:20:58 +07:00
"github.com/xlzd/gotp"
2023-02-09 22:48:06 +03:30
"gorm.io/gorm"
)
2025-05-08 21:20:58 +07:00
type UserService struct {
settingService SettingService
}
2023-02-09 22:48:06 +03:30
func (s *UserService) GetFirstUser() (*model.User, error) {
db := database.GetDB()
user := &model.User{}
err := db.Model(model.User{}).
First(user).
Error
if err != nil {
return nil, err
}
return user, nil
}
2025-05-08 21:20:58 +07:00
func (s *UserService) CheckUser(username string, password string, twoFactorCode string) *model.User {
2023-02-09 22:48:06 +03:30
db := database.GetDB()
user := &model.User{}
2025-05-03 12:27:53 +03:00
2023-02-09 22:48:06 +03:30
err := db.Model(model.User{}).
2025-05-08 21:20:58 +07:00
Where("username = ?", username).
2023-02-09 22:48:06 +03:30
First(user).
Error
if err == gorm.ErrRecordNotFound {
return nil
} else if err != nil {
logger.Warning("check user err:", err)
return nil
}
2025-05-03 12:27:53 +03:00
2025-05-08 21:20:58 +07:00
if !crypto.CheckPasswordHash(user.Password, password) {
return nil
2025-05-03 12:27:53 +03:00
}
2025-05-08 21:20:58 +07:00
twoFactorEnable, err := s.settingService.GetTwoFactorEnable()
2025-05-03 12:27:53 +03:00
if err != nil {
2025-05-08 21:20:58 +07:00
logger.Warning("check two factor err:", err)
return nil
2025-05-03 12:27:53 +03:00
}
2025-05-08 21:20:58 +07:00
if twoFactorEnable {
twoFactorToken, err := s.settingService.GetTwoFactorToken()
2023-02-09 22:48:06 +03:30
2025-05-08 21:20:58 +07:00
if err != nil {
logger.Warning("check two factor token err:", err)
return nil
}
2023-04-21 19:00:14 +03:30
2025-05-08 21:20:58 +07:00
if gotp.NewDefaultTOTP(twoFactorToken).Now() != twoFactorCode {
return nil
}
2023-04-21 19:00:14 +03:30
}
2025-05-08 21:20:58 +07:00
2023-04-21 19:00:14 +03:30
return user
}
2025-05-08 21:20:58 +07:00
func (s *UserService) UpdateUser(id int, username string, password string) error {
2024-03-12 20:45:44 +03:30
db := database.GetDB()
2025-05-08 21:20:58 +07:00
hashedPassword, err := crypto.HashPasswordAsBcrypt(password)
2024-03-12 20:45:44 +03:30
if err != nil {
2025-05-08 21:20:58 +07:00
return err
2024-03-12 20:45:44 +03:30
}
twoFactorEnable, err := s.settingService.GetTwoFactorEnable()
if err != nil {
return err
}
if twoFactorEnable {
s.settingService.SetTwoFactorEnable(false)
s.settingService.SetTwoFactorToken("")
}
2025-05-08 21:20:58 +07:00
return db.Model(model.User{}).
Where("id = ?", id).
Updates(map[string]any{"username": username, "password": hashedPassword}).
Error
2024-03-12 20:45:44 +03:30
}
2023-02-09 22:48:06 +03:30
func (s *UserService) UpdateFirstUser(username string, password string) error {
if username == "" {
return errors.New("username can not be empty")
} else if password == "" {
return errors.New("password can not be empty")
}
2025-05-03 12:27:53 +03:00
hashedPassword, er := crypto.HashPasswordAsBcrypt(password)
if er != nil {
return er
}
2023-02-09 22:48:06 +03:30
db := database.GetDB()
user := &model.User{}
err := db.Model(model.User{}).First(user).Error
if database.IsNotFound(err) {
user.Username = username
2025-05-03 12:27:53 +03:00
user.Password = hashedPassword
2023-02-09 22:48:06 +03:30
return db.Model(model.User{}).Create(user).Error
} else if err != nil {
return err
}
user.Username = username
2025-05-03 12:27:53 +03:00
user.Password = hashedPassword
2023-02-09 22:48:06 +03:30
return db.Save(user).Error
}