Files
lndhub.go/lib/service/user.go
Michael Bumann e33693398e Soft delete users (#476)
* Update Makefile

* Optionally load test DB from env variable

* Add option to soft-delete a user

This allows users to be marked as deleted.
An additional middleware checks if a user is deleted or deactivated and rejects
requests for those as StatusUnauthorized.

note: the middelware adds an additional DB query to load the user.
2024-01-09 19:38:01 +02:00

334 lines
10 KiB
Go

package service
import (
"context"
"database/sql"
"fmt"
"math"
"time"
"github.com/getAlby/lndhub.go/common"
"github.com/getAlby/lndhub.go/db/models"
"github.com/getAlby/lndhub.go/lib/responses"
"github.com/getAlby/lndhub.go/lib/security"
"github.com/getAlby/lndhub.go/lnd"
"github.com/getsentry/sentry-go"
"github.com/labstack/echo/v4"
"github.com/labstack/gommon/log"
"github.com/uptrace/bun"
passwordvalidator "github.com/wagslane/go-password-validator"
)
func (svc *LndhubService) CreateUser(ctx context.Context, login string, password string) (user *models.User, err error) {
user = &models.User{}
// generate user login/password if not provided
user.Login = login
if login == "" {
randLoginBytes, err := randBytesFromStr(20, alphaNumBytes)
if err != nil {
return nil, err
}
user.Login = string(randLoginBytes)
}
if password == "" {
randPasswordBytes, err := randBytesFromStr(20, alphaNumBytes)
if err != nil {
return nil, err
}
password = string(randPasswordBytes)
} else {
if svc.Config.MinPasswordEntropy > 0 {
entropy := passwordvalidator.GetEntropy(password)
if entropy < float64(svc.Config.MinPasswordEntropy) {
return nil, fmt.Errorf("password entropy is too low (%f), required is %d", entropy, svc.Config.MinPasswordEntropy)
}
}
}
// we only store the hashed password but return the initial plain text password in the HTTP response
hashedPassword := security.HashPassword(password)
user.Password = hashedPassword
// Create user and the user's accounts
// We use double-entry bookkeeping so we use 4 accounts: incoming, current, outgoing and fees
// Wrapping this in a transaction in case something fails
err = svc.DB.RunInTx(ctx, &sql.TxOptions{}, func(ctx context.Context, tx bun.Tx) error {
if _, err := tx.NewInsert().Model(user).Exec(ctx); err != nil {
return err
}
accountTypes := []string{
common.AccountTypeIncoming,
common.AccountTypeCurrent,
common.AccountTypeOutgoing,
common.AccountTypeFees,
}
for _, accountType := range accountTypes {
account := models.Account{UserID: user.ID, Type: accountType}
if _, err := tx.NewInsert().Model(&account).Exec(ctx); err != nil {
return err
}
}
return nil
})
//return actual password in the response, not the hashed one
user.Password = password
return user, err
}
func (svc *LndhubService) UpdateUser(ctx context.Context, userId int64, login *string, password *string, deactivated *bool, deleted *bool) (user *models.User, err error) {
user, err = svc.FindUser(ctx, userId)
if err != nil {
return nil, err
}
if login != nil {
user.Login = *login
}
if password != nil {
if svc.Config.MinPasswordEntropy > 0 {
entropy := passwordvalidator.GetEntropy(*password)
if entropy < float64(svc.Config.MinPasswordEntropy) {
return nil, fmt.Errorf("password entropy is too low (%f), required is %d", entropy, svc.Config.MinPasswordEntropy)
}
}
hashedPassword := security.HashPassword(*password)
user.Password = hashedPassword
}
if deactivated != nil {
user.Deactivated = *deactivated
}
// if a user gets deleted we mark it as deactivated and deleted
// un-deleting it is not supported currently
if deleted != nil {
if *deleted == true {
user.Deactivated = true
user.Deleted = true
}
}
_, err = svc.DB.NewUpdate().Model(user).WherePK().Exec(ctx)
if err != nil {
return nil, err
}
return user, nil
}
func (svc *LndhubService) FindUser(ctx context.Context, userId int64) (*models.User, error) {
var user models.User
err := svc.DB.NewSelect().Model(&user).Where("id = ?", userId).Limit(1).Scan(ctx)
if err != nil {
return &user, err
}
return &user, nil
}
func (svc *LndhubService) FindUserByLogin(ctx context.Context, login string) (*models.User, error) {
var user models.User
err := svc.DB.NewSelect().Model(&user).Where("login = ?", login).Limit(1).Scan(ctx)
if err != nil {
return &user, err
}
return &user, nil
}
func (svc *LndhubService) CheckOutgoingPaymentAllowed(c echo.Context, lnpayReq *lnd.LNPayReq, userId int64) (result *responses.ErrorResponse, err error) {
limits := svc.GetLimits(c)
if limits.MaxSendAmount > 0 {
if lnpayReq.PayReq.NumSatoshis > limits.MaxSendAmount {
svc.Logger.Errorf("Max send amount exceeded for user_id %v (amount:%v)", userId, lnpayReq.PayReq.NumSatoshis)
return &responses.SendExceededError, nil
}
}
if limits.MaxSendVolume > 0 {
volume, err := svc.GetVolumeOverPeriod(c.Request().Context(), userId, common.InvoiceTypeOutgoing, time.Duration(svc.Config.MaxVolumePeriod*int64(time.Second)))
if err != nil {
svc.Logger.Errorj(
log.JSON{
"message": "error fetching volume",
"error": err,
"lndhub_user_id": userId,
},
)
return nil, err
}
if volume > limits.MaxSendVolume {
svc.Logger.Errorj(
log.JSON{
"message": "transaction volume exceeded",
"lndhub_user_id": userId,
},
)
sentry.CaptureMessage(fmt.Sprintf("transaction volume exceeded for user %d", userId))
return &responses.TooMuchVolumeError, nil
}
}
currentBalance, err := svc.CurrentUserBalance(c.Request().Context(), userId)
if err != nil {
svc.Logger.Errorj(
log.JSON{
"message": "error checking balance",
"error": err,
"lndhub_user_id": userId,
},
)
return nil, err
}
minimumBalance := lnpayReq.PayReq.NumSatoshis
if svc.Config.FeeReserve {
minimumBalance += svc.CalcFeeLimit(lnpayReq.PayReq.Destination, lnpayReq.PayReq.NumSatoshis)
}
if currentBalance < minimumBalance {
return &responses.NotEnoughBalanceError, nil
}
return nil, nil
}
func (svc *LndhubService) CheckIncomingPaymentAllowed(c echo.Context, amount, userId int64) (result *responses.ErrorResponse, err error) {
limits := svc.GetLimits(c)
if limits.MaxReceiveAmount > 0 {
if amount > limits.MaxReceiveAmount {
svc.Logger.Errorf("Max receive amount exceeded for user_id %d", userId)
return &responses.ReceiveExceededError, nil
}
}
if limits.MaxReceiveVolume > 0 {
volume, err := svc.GetVolumeOverPeriod(c.Request().Context(), userId, common.InvoiceTypeIncoming, time.Duration(svc.Config.MaxVolumePeriod*int64(time.Second)))
if err != nil {
svc.Logger.Errorj(
log.JSON{
"message": "error fetching volume",
"error": err,
"lndhub_user_id": userId,
},
)
return nil, err
}
if volume > limits.MaxReceiveVolume {
svc.Logger.Errorf("Transaction volume exceeded for user_id %d", userId)
sentry.CaptureMessage(fmt.Sprintf("transaction volume exceeded for user %d", userId))
return &responses.TooMuchVolumeError, nil
}
}
if limits.MaxAccountBalance > 0 {
currentBalance, err := svc.CurrentUserBalance(c.Request().Context(), userId)
if err != nil {
svc.Logger.Errorj(
log.JSON{
"message": "error fetching balance",
"lndhub_user_id": userId,
"error": err,
},
)
return nil, err
}
if currentBalance+amount > limits.MaxAccountBalance {
svc.Logger.Errorf("Max account balance exceeded for user_id %d", userId)
return &responses.BalanceExceededError, nil
}
}
return nil, nil
}
func (svc *LndhubService) CalcFeeLimit(destination string, amount int64) int64 {
if svc.LndClient.IsIdentityPubkey(destination) {
return 0
}
limit := int64(10)
if amount > 1000 {
limit = int64(math.Ceil(float64(amount)*float64(0.01)) + 1)
}
if limit > svc.Config.MaxFeeAmount {
limit = svc.Config.MaxFeeAmount
}
return limit
}
func (svc *LndhubService) CurrentUserBalance(ctx context.Context, userId int64) (int64, error) {
var balance int64
account, err := svc.AccountFor(ctx, common.AccountTypeCurrent, userId)
if err != nil {
return balance, err
}
err = svc.DB.NewSelect().Table("account_ledgers").ColumnExpr("sum(account_ledgers.amount) as balance").Where("account_ledgers.account_id = ?", account.ID).Scan(ctx, &balance)
return balance, err
}
func (svc *LndhubService) AccountFor(ctx context.Context, accountType string, userId int64) (models.Account, error) {
account := models.Account{}
err := svc.DB.NewSelect().Model(&account).Where("user_id = ? AND type= ?", userId, accountType).Limit(1).Scan(ctx)
return account, err
}
func (svc *LndhubService) TransactionEntriesFor(ctx context.Context, userId int64) ([]models.TransactionEntry, error) {
transactionEntries := []models.TransactionEntry{}
err := svc.DB.NewSelect().Model(&transactionEntries).Where("user_id = ?", userId).Scan(ctx)
return transactionEntries, err
}
func (svc *LndhubService) InvoicesFor(ctx context.Context, userId int64, invoiceType string) ([]models.Invoice, error) {
var invoices []models.Invoice
query := svc.DB.NewSelect().Model(&invoices).Where("user_id = ?", userId)
if invoiceType != "" {
query.Where("type = ? AND state NOT IN(?, ?)", invoiceType, common.InvoiceStateInitialized, common.InvoiceStateError)
}
query.OrderExpr("id DESC").Limit(100)
err := query.Scan(ctx)
if err != nil {
return nil, err
}
return invoices, nil
}
func (svc *LndhubService) GetVolumeOverPeriod(ctx context.Context, userId int64, invoiceType string, period time.Duration) (result int64, err error) {
err = svc.DB.NewSelect().Table("invoices").
ColumnExpr("sum(invoices.amount) as result").
Where("invoices.user_id = ?", userId).
Where("invoices.type = ?", invoiceType).
Where("invoices.settled_at >= ?", time.Now().Add(-1*period)).
Scan(ctx, &result)
if err != nil {
return 0, err
}
return result, nil
}
func (svc *LndhubService) GetLimits(c echo.Context) (limits *Limits) {
limits = &Limits{
MaxSendVolume: svc.Config.MaxSendVolume,
MaxSendAmount: svc.Config.MaxSendAmount,
MaxReceiveVolume: svc.Config.MaxReceiveVolume,
MaxReceiveAmount: svc.Config.MaxReceiveAmount,
MaxAccountBalance: svc.Config.MaxAccountBalance,
}
if val, ok := c.Get("MaxSendVolume").(int64); ok && val > 0 {
limits.MaxSendVolume = val
}
if val, ok := c.Get("MaxSendAmount").(int64); ok && val > 0 {
limits.MaxSendAmount = val
}
if val, ok := c.Get("MaxReceiveVolume").(int64); ok && val > 0 {
limits.MaxReceiveVolume = val
}
if val, ok := c.Get("MaxReceiveAmount").(int64); ok && val > 0 {
limits.MaxReceiveAmount = val
}
if val, ok := c.Get("MaxAccountBalance").(int64); ok && val > 0 {
limits.MaxAccountBalance = val
}
return limits
}