2024-10-16 04:34:57 +00:00
|
|
|
package models
|
|
|
|
|
|
|
|
import (
|
2024-11-11 19:55:01 +00:00
|
|
|
"database/sql"
|
|
|
|
"errors"
|
|
|
|
"strings"
|
|
|
|
"time"
|
2024-10-16 04:34:57 +00:00
|
|
|
|
2024-11-11 19:55:01 +00:00
|
|
|
"github.com/mattn/go-sqlite3"
|
|
|
|
"golang.org/x/crypto/bcrypt"
|
2024-10-16 04:34:57 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type User struct {
|
2024-11-11 19:55:01 +00:00
|
|
|
ID int
|
|
|
|
ShortId uint64
|
2024-10-16 04:34:57 +00:00
|
|
|
Username string
|
|
|
|
Email string
|
|
|
|
IsDeleted bool
|
2024-11-11 19:55:01 +00:00
|
|
|
IsBanned bool
|
|
|
|
HashedPassword []byte
|
|
|
|
Created time.Time
|
2024-10-16 04:34:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type UserModel struct {
|
|
|
|
DB *sql.DB
|
|
|
|
}
|
|
|
|
|
2024-11-11 19:55:01 +00:00
|
|
|
func (m *UserModel) Insert(shortId uint64, username string, email string, password string) error {
|
|
|
|
hashedPassword, err := bcrypt.GenerateFromPassword([]byte(password), 12)
|
2024-10-16 04:34:57 +00:00
|
|
|
if err != nil {
|
2024-11-11 19:55:01 +00:00
|
|
|
return err
|
2024-10-16 04:34:57 +00:00
|
|
|
}
|
2024-11-11 19:55:01 +00:00
|
|
|
stmt := `INSERT INTO users (ShortId, Username, Email, IsDeleted, IsBanned, HashedPassword, Created)
|
|
|
|
VALUES (?, ?, ?, FALSE, FALSE, ?, ?)`
|
|
|
|
_, err = m.DB.Exec(stmt, shortId, username, email, hashedPassword, time.Now().UTC())
|
|
|
|
if err != nil {
|
|
|
|
if sqliteError, ok := err.(sqlite3.Error); ok {
|
|
|
|
if sqliteError.ExtendedCode == 2067 && strings.Contains(sqliteError.Error(), "Email") {
|
|
|
|
return ErrDuplicateEmail
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *UserModel) Get(id uint64) (User, error) {
|
|
|
|
stmt := `SELECT Id, ShortId, Username, Email, Created FROM users WHERE ShortId = ? AND IsDeleted = FALSE`
|
|
|
|
row := m.DB.QueryRow(stmt, id)
|
|
|
|
var u User
|
|
|
|
err := row.Scan(&u.ID, &u.ShortId, &u.Username, &u.Email, &u.Created)
|
|
|
|
if err != nil {
|
|
|
|
if errors.Is(err, sql.ErrNoRows) {
|
|
|
|
return User{}, ErrNoRecord
|
|
|
|
}
|
|
|
|
return User{}, err
|
|
|
|
}
|
|
|
|
return u, nil
|
2024-10-16 04:34:57 +00:00
|
|
|
}
|
|
|
|
|
2024-11-11 19:55:01 +00:00
|
|
|
func (m *UserModel) GetById(id int64) (User, error) {
|
|
|
|
stmt := `SELECT Id, ShortId, Username, Email, Created FROM users WHERE Id = ? AND IsDeleted = FALSE`
|
2024-10-16 04:34:57 +00:00
|
|
|
row := m.DB.QueryRow(stmt, id)
|
|
|
|
var u User
|
2024-11-11 19:55:01 +00:00
|
|
|
err := row.Scan(&u.ID, &u.ShortId, &u.Username, &u.Email, &u.Created)
|
2024-10-16 04:34:57 +00:00
|
|
|
if err != nil {
|
2024-10-23 05:25:30 +00:00
|
|
|
if errors.Is(err, sql.ErrNoRows) {
|
|
|
|
return User{}, ErrNoRecord
|
|
|
|
}
|
2024-10-16 04:34:57 +00:00
|
|
|
return User{}, err
|
|
|
|
}
|
|
|
|
return u, nil
|
|
|
|
}
|
2024-10-23 05:25:30 +00:00
|
|
|
|
|
|
|
func (m *UserModel) GetAll() ([]User, error) {
|
2024-11-11 19:55:01 +00:00
|
|
|
stmt := `SELECT Id, ShortId, Username, Email, Created FROM users WHERE IsDeleted = FALSE`
|
2024-10-23 05:25:30 +00:00
|
|
|
rows, err := m.DB.Query(stmt)
|
|
|
|
var users []User
|
|
|
|
for rows.Next() {
|
|
|
|
var u User
|
2024-11-11 19:55:01 +00:00
|
|
|
err = rows.Scan(&u.ID, &u.ShortId, &u.Username, &u.Email, &u.Created)
|
2024-10-23 05:25:30 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
users = append(users, u)
|
|
|
|
}
|
|
|
|
if err = rows.Err(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return users, nil
|
|
|
|
}
|
2024-11-11 19:55:01 +00:00
|
|
|
|
|
|
|
func (m *UserModel) Authenticate(email, password string) (int64, error) {
|
|
|
|
var id int64
|
|
|
|
var hashedPassword []byte
|
|
|
|
|
|
|
|
stmt := `SELECT Id, HashedPassword FROM users WHERE Email = ?`
|
|
|
|
err := m.DB.QueryRow(stmt, email).Scan(&id, &hashedPassword)
|
|
|
|
if err != nil {
|
|
|
|
if errors.Is(err, sql.ErrNoRows) {
|
|
|
|
return 0, ErrInvalidCredentials
|
|
|
|
} else {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err = bcrypt.CompareHashAndPassword(hashedPassword, []byte(password))
|
|
|
|
if err != nil {
|
|
|
|
if errors.Is(err, bcrypt.ErrMismatchedHashAndPassword) {
|
|
|
|
return 0, ErrInvalidCredentials
|
|
|
|
} else {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return id, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *UserModel) Exists(id int64) (bool, error) {
|
|
|
|
var exists bool
|
|
|
|
stmt := `SELECT EXISTS(SELECT true FROM users WHERE Id = ? AND IsDeleted = False)`
|
|
|
|
err := m.DB.QueryRow(stmt, id).Scan(&exists)
|
|
|
|
return exists, err
|
|
|
|
}
|