X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=api%2Fuser.go;h=9fca34c98dd585cc19f6a62adc20996b5bf07a46;hb=574bf1e47f1b611449faa8fa5848ba63dfc7d0e9;hp=9fd947985210e186608cc290572078a12c8388aa;hpb=85545aba62546f219a9c9730945511412a3174ef;p=perso%2FImmae%2FProjets%2FCryptomonnaies%2FCryptoportfolio%2FFront.git diff --git a/api/user.go b/api/user.go index 9fd9479..9fca34c 100644 --- a/api/user.go +++ b/api/user.go @@ -3,16 +3,53 @@ package api import ( "fmt" "regexp" + "strconv" + "time" + "github.com/dchest/passwordreset" "github.com/gin-gonic/gin" - "immae.eu/Immae/Projets/Cryptomonnaies/Cryptoportfolio/Front/db" + "git.immae.eu/Cryptoportfolio/Front.git/db" ) const ( VALID_EMAIL_REGEX = `(?i)^[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4}$` ) +func UserConfirmed(c *gin.Context) *Error { + user, exists := c.Get("user") + + if !exists { + return &Error{NotAuthorized, "not authorized", fmt.Errorf("no user key in context")} + } + + if user.(db.User).Status != db.Confirmed { + return &Error{UserNotConfirmed, "user awaiting admin validation", fmt.Errorf("user '%v' not confirmed", user)} + } + + return nil +} + +func UserIsAdmin(c *gin.Context) *Error { + user, exists := c.Get("user") + + if !exists { + return &Error{NotAuthorized, "not authorized", fmt.Errorf("no user key in context")} + } + + if user.(db.User).Role != db.RoleAdmin { + return &Error{NotAuthorized, "not authorized", fmt.Errorf("user '%v' is not admin", user)} + } + + return nil +} + +func GetUser(c *gin.Context) db.User { + user, _ := c.Get("user") + + return user.(db.User) +} + func IsValidEmailAddress(email string) bool { r := regexp.MustCompile(VALID_EMAIL_REGEX) @@ -25,7 +62,8 @@ type SignParams struct { } type SignResult struct { - Token string `json:"token"` + Token string `json:"token"` + IsAdmin bool `json:"isAdmin"` } func (s SignParams) Validate() *Error { @@ -76,12 +114,29 @@ func (q SignupQuery) Run() (interface{}, *Error) { if CONFIG.FreeSMSUser != "" { err := SendSMS(CONFIG.FreeSMSUser, CONFIG.FreeSMSPass, fmt.Sprintf("New user signup '%v'", q.In.Email)) + if err != nil { + log.Error(err) + } + } + + configMap := make(map[string]string) + configMap["key"] = "" + configMap["secret"] = "" + + _, err = db.SetUserMarketConfig(newUser.Id, "poloniex", configMap) + if err != nil { + return nil, NewInternalError(err) + } + + if MAIL_CONFIG.IsEnabled { + mailConfirmationToken := passwordreset.NewToken(q.In.Email, time.Hour*24*1, []byte(strconv.FormatUint(uint64(newUser.Status), 10)), PASSWORD_RESET_SECRET) + err = SendConfirmationMail(q.In.Email, mailConfirmationToken) if err != nil { return nil, NewInternalError(err) } } - return SignResult{token}, nil + return SignResult{token, newUser.Role == db.RoleAdmin}, nil } type SigninQuery struct { @@ -112,25 +167,77 @@ func (q SigninQuery) Run() (interface{}, *Error) { return nil, NewInternalError(err) } - return SignResult{token}, nil + return SignResult{token, user.Role == db.RoleAdmin}, nil } -func UserConfirmed(c *gin.Context) *Error { - user, exists := c.Get("user") +type ConfirmEmailQuery struct { + In struct { + Token string + } +} - if !exists { - return &Error{NotAuthorized, "not authorized", fmt.Errorf("no user key in context")} +func (q ConfirmEmailQuery) ValidateParams() *Error { + + if q.In.Token == "" { + return &Error{BadRequest, "invalid token", fmt.Errorf("invalid token")} } - if user.(db.User).Status != db.Confirmed { - return &Error{UserNotConfirmed, "user awaiting admin validation", fmt.Errorf("user '%v' not confirmed", user)} + return nil +} + +func (q ConfirmEmailQuery) Run() (interface{}, *Error) { + var user *db.User + + email, err := passwordreset.VerifyToken(q.In.Token, func(email string) ([]byte, error) { + var err error + user, err = db.GetUserByEmail(email) + if err != nil { + return nil, err + } + + if user == nil { + return nil, fmt.Errorf("'%v' is not registered", email) + } + + return []byte(strconv.FormatUint(uint64(user.Status), 10)), nil + + }, PASSWORD_RESET_SECRET) + + if err != nil && (err == passwordreset.ErrExpiredToken) { + return nil, &Error{BadRequest, "expired token", fmt.Errorf("expired token")} + } else if err != nil && (err == passwordreset.ErrMalformedToken || err == passwordreset.ErrWrongSignature) { + return nil, &Error{BadRequest, "wrong token", fmt.Errorf("wrong token")} + } else if err != nil { + return nil, NewInternalError(err) + } + + if user == nil { + return nil, &Error{BadRequest, "bad request", fmt.Errorf("no user found for email '%v'", email)} + } + + err = db.SetUserStatus(user, db.Confirmed) + if err != nil { + return nil, NewInternalError(err) } + return nil, nil +} + +type UserAccountQuery struct { + In struct { + User db.User + } + Out struct { + Email string `json:"email"` + } +} + +func (q UserAccountQuery) ValidateParams() *Error { return nil } -func GetUser(c *gin.Context) db.User { - user, _ := c.Get("user") +func (q UserAccountQuery) Run() (interface{}, *Error) { + q.Out.Email = q.In.User.Email - return user.(db.User) + return q.Out, nil }