9 "github.com/dchest/passwordreset"
10 "github.com/gin-gonic/gin"
12 "immae.eu/Immae/Projets/Cryptomonnaies/Cryptoportfolio/Front/db"
16 VALID_EMAIL_REGEX = `(?i)^[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4}$`
19 func IsValidEmailAddress(email string) bool {
20 r := regexp.MustCompile(VALID_EMAIL_REGEX)
22 return r.MatchString(email)
25 type SignParams struct {
30 type SignResult struct {
31 Token string `json:"token"`
34 func (s SignParams) Validate() *Error {
35 if !IsValidEmailAddress(s.Email) {
36 return &Error{InvalidEmail, "invalid email", fmt.Errorf("'%v' is not a valid email", s.Email)}
40 return &Error{InvalidPassword, "invalid password", fmt.Errorf("invalid password")}
46 type SignupQuery struct {
50 func (q SignupQuery) ValidateParams() *Error {
51 return q.In.Validate()
54 func (q SignupQuery) Run() (interface{}, *Error) {
55 user, err := db.GetUserByEmail(q.In.Email)
57 return nil, NewInternalError(err)
61 return nil, &Error{EmailExists, "email already taken", fmt.Errorf("'%v' is already registered '%v'", q.In.Email, user)}
64 newUser := db.User{Email: q.In.Email, Status: db.AwaitingConfirmation}
65 newUser.PasswordHash, err = db.HashPassword(q.In.Password)
67 return nil, NewInternalError(err)
70 err = db.InsertUser(&newUser)
72 return nil, NewInternalError(err)
75 token, err := CreateJwtToken(newUser.Id)
77 return nil, NewInternalError(fmt.Errorf("cannot create jwt token %v", err))
80 if CONFIG.FreeSMSUser != "" {
81 err := SendSMS(CONFIG.FreeSMSUser, CONFIG.FreeSMSPass, fmt.Sprintf("New user signup '%v'", q.In.Email))
83 return nil, NewInternalError(err)
87 configMap := make(map[string]string)
89 configMap["secret"] = ""
91 _, err = db.SetUserMarketConfig(newUser.Id, "poloniex", configMap)
93 return nil, NewInternalError(err)
96 if MAIL_CONFIG.IsEnabled {
97 mailConfirmationToken := passwordreset.NewToken(q.In.Email, time.Hour*24*1, []byte(strconv.FormatUint(uint64(newUser.Status), 10)), PASSWORD_RESET_SECRET)
98 err = SendConfirmationMail(q.In.Email, mailConfirmationToken)
100 return nil, NewInternalError(err)
104 if CONFIG.FreeSMSUser != "" {
105 err := SendSMS(CONFIG.FreeSMSUser, CONFIG.FreeSMSPass, fmt.Sprintf("'%v' request a password reset. Token '/change-password?token=%v'", q.In.Email, token))
107 return nil, NewInternalError(err)
111 return SignResult{token}, nil
114 type SigninQuery struct {
118 func (q SigninQuery) ValidateParams() *Error {
119 return q.In.Validate()
122 func (q SigninQuery) Run() (interface{}, *Error) {
123 user, err := db.GetUserByEmail(q.In.Email)
125 return nil, NewInternalError(err)
129 return nil, &Error{InvalidCredentials, "invalid credentials", fmt.Errorf("no email '%v' found", q.In.Email)}
132 err = db.ValidatePassword(q.In.Password, user.PasswordHash)
134 return nil, &Error{InvalidCredentials, "invalid credentials", err}
137 token, err := CreateJwtToken(user.Id)
139 return nil, NewInternalError(err)
142 return SignResult{token}, nil
145 func UserConfirmed(c *gin.Context) *Error {
146 user, exists := c.Get("user")
149 return &Error{NotAuthorized, "not authorized", fmt.Errorf("no user key in context")}
152 if user.(db.User).Status != db.Confirmed {
153 return &Error{UserNotConfirmed, "user awaiting admin validation", fmt.Errorf("user '%v' not confirmed", user)}
159 func GetUser(c *gin.Context) db.User {
160 user, _ := c.Get("user")
162 return user.(db.User)
165 type ConfirmEmailQuery struct {
171 func (q ConfirmEmailQuery) ValidateParams() *Error {
173 if q.In.Token == "" {
174 return &Error{BadRequest, "invalid token", fmt.Errorf("invalid token")}
180 func (q ConfirmEmailQuery) Run() (interface{}, *Error) {
183 email, err := passwordreset.VerifyToken(q.In.Token, func(email string) ([]byte, error) {
185 user, err = db.GetUserByEmail(email)
191 return nil, fmt.Errorf("'%v' is not registered", email)
194 return []byte(strconv.FormatUint(uint64(user.Status), 10)), nil
196 }, PASSWORD_RESET_SECRET)
198 if err != nil && (err == passwordreset.ErrExpiredToken) {
199 return nil, &Error{BadRequest, "expired token", fmt.Errorf("expired token")}
200 } else if err != nil && (err == passwordreset.ErrMalformedToken || err == passwordreset.ErrWrongSignature) {
201 return nil, &Error{BadRequest, "wrong token", fmt.Errorf("wrong token")}
202 } else if err != nil {
203 return nil, NewInternalError(err)
207 return nil, &Error{BadRequest, "bad request", fmt.Errorf("no user found for email '%v'", email)}
210 err = db.SetUserStatus(user, db.Confirmed)
212 return nil, NewInternalError(err)