Files
nginx-ui/api/user/auth.go
2026-04-04 09:48:18 +08:00

126 lines
2.7 KiB
Go

package user
import (
"math/rand/v2"
"net/http"
"sync"
"time"
"github.com/0xJacky/Nginx-UI/internal/middleware"
"github.com/0xJacky/Nginx-UI/internal/user"
"github.com/0xJacky/Nginx-UI/query"
"github.com/0xJacky/Nginx-UI/settings"
"github.com/gin-gonic/gin"
"github.com/uozi-tech/cosy"
"github.com/uozi-tech/cosy/logger"
)
var mutex = &sync.Mutex{}
type LoginUser struct {
Name string `json:"name" binding:"required,max=255"`
Password string `json:"password" binding:"required,max=255"`
OTP string `json:"otp"`
RecoveryCode string `json:"recovery_code"`
}
const (
ErrMaxAttempts = 4291
Enabled2FA = 199
Error2FACode = 4034
LoginSuccess = 200
)
type LoginResponse struct {
Message string `json:"message"`
Error string `json:"error,omitempty"`
Code int `json:"code"`
*user.AccessTokenPayload
SecureSessionID string `json:"secure_session_id,omitempty"`
}
func Login(c *gin.Context) {
// make sure that only one request is processed at a time
mutex.Lock()
defer mutex.Unlock()
// check if the ip is banned
clientIP := c.ClientIP()
b := query.BanIP
banIP, _ := b.Where(b.IP.Eq(clientIP),
b.ExpiredAt.Gte(time.Now().Unix()),
b.Attempts.Gte(settings.AuthSettings.MaxAttempts),
).Count()
if banIP > 0 {
c.JSON(http.StatusTooManyRequests, LoginResponse{
Message: "Max attempts",
Code: ErrMaxAttempts,
})
return
}
var json LoginUser
ok := cosy.BindAndValid(c, &json)
if !ok {
return
}
u, err := user.Login(json.Name, json.Password)
if err != nil {
user.BanIP(clientIP)
random := time.Duration(rand.Int() % 10)
time.Sleep(random * time.Second)
cosy.ErrHandler(c, err)
return
}
// Check if the user enables 2FA
var secureSessionID string
if u.EnabledOTP() {
if json.OTP == "" && json.RecoveryCode == "" {
c.JSON(http.StatusOK, LoginResponse{
Message: "The user has enabled 2FA",
Code: Enabled2FA,
})
user.BanIP(clientIP)
return
}
if err = user.VerifyOTP(u, json.OTP, json.RecoveryCode); err != nil {
cosy.ErrHandler(c, err)
user.BanIP(clientIP)
return
}
secureSessionID = user.SetSecureSessionID(u.ID)
}
// login success, clear banned record
_, _ = b.Where(b.IP.Eq(clientIP)).Delete()
logger.Info("[User Login]", u.Name)
accessToken, err := user.GenerateJWT(u)
if err != nil {
cosy.ErrHandler(c, err)
return
}
middleware.EnsureSecureSessionCookie(c)
c.JSON(http.StatusOK, LoginResponse{
Code: LoginSuccess,
Message: "ok",
AccessTokenPayload: accessToken,
SecureSessionID: secureSessionID,
})
}
func Logout(c *gin.Context) {
token := c.GetHeader("Authorization")
if token != "" {
user.DeleteToken(token)
}
c.JSON(http.StatusNoContent, nil)
}