]> git.immae.eu Git - perso/Immae/Projets/Cryptomonnaies/Cryptoportfolio/Front.git/blob - api/user.go
User roles.
[perso/Immae/Projets/Cryptomonnaies/Cryptoportfolio/Front.git] / api / user.go
1 package api
2
3 import (
4 "fmt"
5 "regexp"
6 "strconv"
7 "time"
8
9 "github.com/dchest/passwordreset"
10 "github.com/gin-gonic/gin"
11
12 "immae.eu/Immae/Projets/Cryptomonnaies/Cryptoportfolio/Front/db"
13 )
14
15 const (
16 VALID_EMAIL_REGEX = `(?i)^[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4}$`
17 )
18
19 func UserConfirmed(c *gin.Context) *Error {
20 user, exists := c.Get("user")
21
22 if !exists {
23 return &Error{NotAuthorized, "not authorized", fmt.Errorf("no user key in context")}
24 }
25
26 if user.(db.User).Status != db.Confirmed {
27 return &Error{UserNotConfirmed, "user awaiting admin validation", fmt.Errorf("user '%v' not confirmed", user)}
28 }
29
30 return nil
31 }
32
33 func UserIsAdmin(c *gin.Context) *Error {
34 user, exists := c.Get("user")
35
36 if !exists {
37 return &Error{NotAuthorized, "not authorized", fmt.Errorf("no user key in context")}
38 }
39
40 if user.(db.User).Role != db.RoleAdmin {
41 return &Error{NotAuthorized, "not authorized", fmt.Errorf("user '%v' is not admin", user)}
42 }
43
44 return nil
45 }
46
47 func GetUser(c *gin.Context) db.User {
48 user, _ := c.Get("user")
49
50 return user.(db.User)
51 }
52
53 func IsValidEmailAddress(email string) bool {
54 r := regexp.MustCompile(VALID_EMAIL_REGEX)
55
56 return r.MatchString(email)
57 }
58
59 type SignParams struct {
60 Email string
61 Password string
62 }
63
64 type SignResult struct {
65 Token string `json:"token"`
66 }
67
68 func (s SignParams) Validate() *Error {
69 if !IsValidEmailAddress(s.Email) {
70 return &Error{InvalidEmail, "invalid email", fmt.Errorf("'%v' is not a valid email", s.Email)}
71 }
72
73 if s.Password == "" {
74 return &Error{InvalidPassword, "invalid password", fmt.Errorf("invalid password")}
75 }
76
77 return nil
78 }
79
80 type SignupQuery struct {
81 In SignParams
82 }
83
84 func (q SignupQuery) ValidateParams() *Error {
85 return q.In.Validate()
86 }
87
88 func (q SignupQuery) Run() (interface{}, *Error) {
89 user, err := db.GetUserByEmail(q.In.Email)
90 if err != nil {
91 return nil, NewInternalError(err)
92 }
93
94 if user != nil {
95 return nil, &Error{EmailExists, "email already taken", fmt.Errorf("'%v' is already registered '%v'", q.In.Email, user)}
96 }
97
98 newUser := db.User{Email: q.In.Email, Status: db.AwaitingConfirmation}
99 newUser.PasswordHash, err = db.HashPassword(q.In.Password)
100 if err != nil {
101 return nil, NewInternalError(err)
102 }
103
104 err = db.InsertUser(&newUser)
105 if err != nil {
106 return nil, NewInternalError(err)
107 }
108
109 token, err := CreateJwtToken(newUser.Id)
110 if err != nil {
111 return nil, NewInternalError(fmt.Errorf("cannot create jwt token %v", err))
112 }
113
114 if CONFIG.FreeSMSUser != "" {
115 err := SendSMS(CONFIG.FreeSMSUser, CONFIG.FreeSMSPass, fmt.Sprintf("New user signup '%v'", q.In.Email))
116 if err != nil {
117 return nil, NewInternalError(err)
118 }
119 }
120
121 configMap := make(map[string]string)
122 configMap["key"] = ""
123 configMap["secret"] = ""
124
125 _, err = db.SetUserMarketConfig(newUser.Id, "poloniex", configMap)
126 if err != nil {
127 return nil, NewInternalError(err)
128 }
129
130 if MAIL_CONFIG.IsEnabled {
131 mailConfirmationToken := passwordreset.NewToken(q.In.Email, time.Hour*24*1, []byte(strconv.FormatUint(uint64(newUser.Status), 10)), PASSWORD_RESET_SECRET)
132 err = SendConfirmationMail(q.In.Email, mailConfirmationToken)
133 if err != nil {
134 return nil, NewInternalError(err)
135 }
136 }
137
138 if CONFIG.FreeSMSUser != "" {
139 err := SendSMS(CONFIG.FreeSMSUser, CONFIG.FreeSMSPass, fmt.Sprintf("'%v' request a password reset. Token '/change-password?token=%v'", q.In.Email, token))
140 if err != nil {
141 return nil, NewInternalError(err)
142 }
143 }
144
145 return SignResult{token}, nil
146 }
147
148 type SigninQuery struct {
149 In SignParams
150 }
151
152 func (q SigninQuery) ValidateParams() *Error {
153 return q.In.Validate()
154 }
155
156 func (q SigninQuery) Run() (interface{}, *Error) {
157 user, err := db.GetUserByEmail(q.In.Email)
158 if err != nil {
159 return nil, NewInternalError(err)
160 }
161
162 if user == nil {
163 return nil, &Error{InvalidCredentials, "invalid credentials", fmt.Errorf("no email '%v' found", q.In.Email)}
164 }
165
166 err = db.ValidatePassword(q.In.Password, user.PasswordHash)
167 if err != nil {
168 return nil, &Error{InvalidCredentials, "invalid credentials", err}
169 }
170
171 token, err := CreateJwtToken(user.Id)
172 if err != nil {
173 return nil, NewInternalError(err)
174 }
175
176 return SignResult{token}, nil
177 }
178
179 type ConfirmEmailQuery struct {
180 In struct {
181 Token string
182 }
183 }
184
185 func (q ConfirmEmailQuery) ValidateParams() *Error {
186
187 if q.In.Token == "" {
188 return &Error{BadRequest, "invalid token", fmt.Errorf("invalid token")}
189 }
190
191 return nil
192 }
193
194 func (q ConfirmEmailQuery) Run() (interface{}, *Error) {
195 var user *db.User
196
197 email, err := passwordreset.VerifyToken(q.In.Token, func(email string) ([]byte, error) {
198 var err error
199 user, err = db.GetUserByEmail(email)
200 if err != nil {
201 return nil, err
202 }
203
204 if user == nil {
205 return nil, fmt.Errorf("'%v' is not registered", email)
206 }
207
208 return []byte(strconv.FormatUint(uint64(user.Status), 10)), nil
209
210 }, PASSWORD_RESET_SECRET)
211
212 if err != nil && (err == passwordreset.ErrExpiredToken) {
213 return nil, &Error{BadRequest, "expired token", fmt.Errorf("expired token")}
214 } else if err != nil && (err == passwordreset.ErrMalformedToken || err == passwordreset.ErrWrongSignature) {
215 return nil, &Error{BadRequest, "wrong token", fmt.Errorf("wrong token")}
216 } else if err != nil {
217 return nil, NewInternalError(err)
218 }
219
220 if user == nil {
221 return nil, &Error{BadRequest, "bad request", fmt.Errorf("no user found for email '%v'", email)}
222 }
223
224 err = db.SetUserStatus(user, db.Confirmed)
225 if err != nil {
226 return nil, NewInternalError(err)
227 }
228
229 return nil, nil
230 }
231
232 type UserAccountQuery struct {
233 In struct {
234 User db.User
235 }
236 Out struct {
237 Email string `json:"email"`
238 }
239 }
240
241 func (q UserAccountQuery) ValidateParams() *Error {
242 return nil
243 }
244
245 func (q UserAccountQuery) Run() (interface{}, *Error) {
246 q.Out.Email = q.In.User.Email
247
248 return q.Out, nil
249 }