265 lines
7.1 KiB
Go
265 lines
7.1 KiB
Go
package service
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/google/uuid"
|
|
"github.com/xmdhs/authlib-skin/config"
|
|
"github.com/xmdhs/authlib-skin/db/cache"
|
|
"github.com/xmdhs/authlib-skin/db/ent"
|
|
"github.com/xmdhs/authlib-skin/db/ent/user"
|
|
"github.com/xmdhs/authlib-skin/db/ent/userprofile"
|
|
"github.com/xmdhs/authlib-skin/model"
|
|
"github.com/xmdhs/authlib-skin/service/auth"
|
|
"github.com/xmdhs/authlib-skin/service/captcha"
|
|
"github.com/xmdhs/authlib-skin/service/email"
|
|
"github.com/xmdhs/authlib-skin/utils"
|
|
)
|
|
|
|
var (
|
|
ErrExistUser = errors.New("邮箱已存在")
|
|
ErrExitsName = errors.New("用户名已存在")
|
|
ErrRegLimit = errors.New("超过注册 ip 限制")
|
|
ErrPassWord = errors.New("错误的密码或用户名")
|
|
ErrChangeName = errors.New("离线模式 uuid 不允许修改用户名")
|
|
)
|
|
|
|
type UserService struct {
|
|
config config.Config
|
|
client *ent.Client
|
|
captchaService *captcha.CaptchaService
|
|
authService *auth.AuthService
|
|
cache cache.Cache
|
|
emailService *email.EmailService
|
|
}
|
|
|
|
func NewUserSerice(config config.Config, client *ent.Client, captchaService *captcha.CaptchaService,
|
|
authService *auth.AuthService, cache cache.Cache, emailService *email.EmailService) *UserService {
|
|
return &UserService{
|
|
config: config,
|
|
client: client,
|
|
captchaService: captchaService,
|
|
authService: authService,
|
|
cache: cache,
|
|
emailService: emailService,
|
|
}
|
|
}
|
|
|
|
func (w *UserService) Reg(ctx context.Context, u model.UserReg, ipPrefix, ip string) (model.LoginRep, error) {
|
|
var userUuid string
|
|
if w.config.OfflineUUID {
|
|
userUuid = utils.UUIDGen(u.Name)
|
|
} else {
|
|
userUuid = strings.ReplaceAll(uuid.New().String(), "-", "")
|
|
}
|
|
|
|
if w.config.Email.Enable {
|
|
err := w.emailService.VerifyJwt(u.Email, u.EmailJwt)
|
|
if err != nil {
|
|
return model.LoginRep{}, fmt.Errorf("Reg: %w", err)
|
|
}
|
|
}
|
|
|
|
err := w.captchaService.VerifyCaptcha(ctx, u.CaptchaToken, ip)
|
|
if err != nil {
|
|
return model.LoginRep{}, fmt.Errorf("Reg: %w", err)
|
|
}
|
|
|
|
if w.config.MaxIpUser != 0 {
|
|
c, err := w.client.User.Query().Where(user.RegIPEQ(ipPrefix)).Count(ctx)
|
|
if err != nil {
|
|
return model.LoginRep{}, fmt.Errorf("Reg: %w", err)
|
|
}
|
|
if c >= w.config.MaxIpUser {
|
|
return model.LoginRep{}, fmt.Errorf("Reg: %w", ErrRegLimit)
|
|
}
|
|
}
|
|
|
|
p, s := utils.Argon2ID(u.Password)
|
|
|
|
var du *ent.User
|
|
|
|
err = utils.WithTx(ctx, w.client, func(tx *ent.Tx) error {
|
|
count, err := tx.User.Query().Where(user.EmailEQ(u.Email)).ForUpdateA().Count(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if count != 0 {
|
|
return ErrExistUser
|
|
}
|
|
nameCount, err := tx.UserProfile.Query().Where(userprofile.NameEQ(u.Name)).ForUpdateA().Count(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if nameCount != 0 {
|
|
return ErrExitsName
|
|
}
|
|
du, err = tx.User.Create().
|
|
SetEmail(u.Email).
|
|
SetPassword(p).
|
|
SetSalt(s).
|
|
SetRegTime(time.Now().Unix()).
|
|
SetRegIP(ipPrefix).
|
|
SetState(0).Save(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
_, err = tx.UserProfile.Create().
|
|
SetUser(du).
|
|
SetName(u.Name).
|
|
SetUUID(userUuid).
|
|
Save(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if du.ID == 1 {
|
|
err := tx.User.UpdateOne(du).SetState(auth.SetAdmin(0, true)).Exec(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
if err != nil {
|
|
return model.LoginRep{}, fmt.Errorf("Reg: %w", err)
|
|
}
|
|
jwt, err := w.authService.CreateToken(ctx, du, "web", userUuid)
|
|
if err != nil {
|
|
return model.LoginRep{}, fmt.Errorf("Login: %w", err)
|
|
}
|
|
|
|
return model.LoginRep{
|
|
Token: jwt,
|
|
Name: u.Name,
|
|
UUID: userUuid,
|
|
}, nil
|
|
}
|
|
|
|
func (w *UserService) Login(ctx context.Context, l model.Login, ip string) (model.LoginRep, error) {
|
|
err := w.captchaService.VerifyCaptcha(ctx, l.CaptchaToken, ip)
|
|
if err != nil {
|
|
return model.LoginRep{}, fmt.Errorf("Login: %w", err)
|
|
}
|
|
u, err := w.client.User.Query().Where(user.Email(l.Email)).WithProfile().Only(ctx)
|
|
if err != nil {
|
|
var ne *ent.NotFoundError
|
|
if errors.As(err, &ne) {
|
|
return model.LoginRep{}, fmt.Errorf("Login: %w", ErrPassWord)
|
|
}
|
|
return model.LoginRep{}, fmt.Errorf("Login: %w", err)
|
|
}
|
|
err = validatePass(ctx, u, l.Password)
|
|
if err != nil {
|
|
return model.LoginRep{}, fmt.Errorf("Login: %w", err)
|
|
}
|
|
jwt, err := w.authService.CreateToken(ctx, u, "web", u.Edges.Profile.UUID)
|
|
if err != nil {
|
|
return model.LoginRep{}, fmt.Errorf("Login: %w", err)
|
|
}
|
|
return model.LoginRep{
|
|
Token: jwt,
|
|
Name: u.Edges.Profile.Name,
|
|
UUID: u.Edges.Profile.UUID,
|
|
}, nil
|
|
}
|
|
|
|
func (w *UserService) Info(ctx context.Context, t *model.TokenClaims) (model.UserInfo, error) {
|
|
u, err := w.client.User.Query().Where(user.ID(t.UID)).First(ctx)
|
|
if err != nil {
|
|
return model.UserInfo{}, fmt.Errorf("Info: %w", err)
|
|
}
|
|
isAdmin := auth.IsAdmin(u.State)
|
|
return model.UserInfo{
|
|
UID: t.UID,
|
|
UUID: t.Subject,
|
|
IsAdmin: isAdmin,
|
|
}, nil
|
|
}
|
|
|
|
func (w *UserService) ChangePasswd(ctx context.Context, p model.ChangePasswd, t *model.TokenClaims) error {
|
|
u, err := w.client.User.Query().Where(user.IDEQ(t.UID)).WithToken().First(ctx)
|
|
if err != nil {
|
|
return fmt.Errorf("ChangePasswd: %w", err)
|
|
}
|
|
err = validatePass(ctx, u, p.Old)
|
|
if err != nil {
|
|
return fmt.Errorf("ChangePasswd: %w", err)
|
|
}
|
|
pass, salt := utils.Argon2ID(p.New)
|
|
if u.Edges.Token != nil {
|
|
err := w.client.UserToken.UpdateOne(u.Edges.Token).AddTokenID(1).Exec(ctx)
|
|
if err != nil {
|
|
return fmt.Errorf("ChangePasswd: %w", err)
|
|
}
|
|
}
|
|
err = w.cache.Del([]byte("auth" + strconv.Itoa(t.UID)))
|
|
if err != nil {
|
|
return fmt.Errorf("ChangePasswd: %w", err)
|
|
}
|
|
err = w.client.User.UpdateOne(u).SetPassword(pass).SetSalt(salt).Exec(ctx)
|
|
if err != nil {
|
|
return fmt.Errorf("ChangePasswd: %w", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (w *UserService) changeName(ctx context.Context, newName string, uid int, uuid string) error {
|
|
if w.config.OfflineUUID {
|
|
return fmt.Errorf("changeName: %w", ErrChangeName)
|
|
}
|
|
c, err := w.client.UserProfile.Query().Where(userprofile.Name(newName)).Count(ctx)
|
|
if err != nil {
|
|
return fmt.Errorf("changeName: %w", err)
|
|
}
|
|
if c != 0 {
|
|
return fmt.Errorf("changeName: %w", ErrExitsName)
|
|
}
|
|
err = w.client.UserProfile.Update().Where(userprofile.HasUserWith(user.ID(uid))).SetName(newName).Exec(ctx)
|
|
if err != nil {
|
|
return fmt.Errorf("changeName: %w", err)
|
|
}
|
|
w.cache.Del([]byte("Profile" + uuid))
|
|
return err
|
|
}
|
|
|
|
func (w *UserService) ChangeName(ctx context.Context, newName string, t *model.TokenClaims) error {
|
|
err := w.changeName(ctx, newName, t.UID, t.Subject)
|
|
if err != nil {
|
|
return fmt.Errorf("ChangeName: %w", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
var ErrNotAllowDomain = errors.New("不在允许域名列表内")
|
|
|
|
func (w *UserService) SendRegEmail(ctx context.Context, email, CaptchaToken, host, ip string) error {
|
|
if len(w.config.Email.AllowDomain) != 0 {
|
|
allow := false
|
|
for _, v := range w.config.Email.AllowDomain {
|
|
if strings.HasSuffix(email, v) {
|
|
allow = true
|
|
break
|
|
}
|
|
}
|
|
if !allow {
|
|
return fmt.Errorf("SendRegEmail: %w", ErrNotAllowDomain)
|
|
}
|
|
}
|
|
|
|
err := w.captchaService.VerifyCaptcha(ctx, CaptchaToken, ip)
|
|
if err != nil {
|
|
return fmt.Errorf("SendRegEmail: %w", err)
|
|
}
|
|
|
|
err = w.emailService.SendVerifyUrl(ctx, email, 60, host)
|
|
if err != nil {
|
|
return fmt.Errorf("SendRegEmail: %w", err)
|
|
}
|
|
return nil
|
|
}
|