]> git.immae.eu Git - perso/Immae/Projets/Cryptomonnaies/Cryptoportfolio/Front.git/blob - api/user.go
c1d9d6c608feed7e963a215c1fe05092e5a8dcec
[perso/Immae/Projets/Cryptomonnaies/Cryptoportfolio/Front.git] / api / user.go
1 package api
2
3 import (
4 "fmt"
5 "regexp"
6
7 "github.com/gin-gonic/gin"
8
9 "immae.eu/Immae/Projets/Cryptomonnaies/Cryptoportfolio/Front/db"
10 )
11
12 const (
13 VALID_EMAIL_REGEX = `(?i)^[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4}$`
14 )
15
16 func IsValidEmailAddress(email string) bool {
17 r := regexp.MustCompile(VALID_EMAIL_REGEX)
18
19 return r.MatchString(email)
20 }
21
22 type SignParams struct {
23 Email string
24 Password string
25 }
26
27 type SignResult struct {
28 Token string `json:"token"`
29 }
30
31 func (s SignParams) Validate() *Error {
32 if !IsValidEmailAddress(s.Email) {
33 return &Error{InvalidEmail, "invalid email", fmt.Errorf("'%v' is not a valid email", s.Email)}
34 }
35
36 if s.Password == "" {
37 return &Error{InvalidPassword, "invalid password", fmt.Errorf("invalid password")}
38 }
39
40 return nil
41 }
42
43 type SignupQuery struct {
44 In SignParams
45 }
46
47 func (q SignupQuery) ValidateParams() *Error {
48 return q.In.Validate()
49 }
50
51 func (q SignupQuery) Run() (interface{}, *Error) {
52 user, err := db.GetUserByEmail(q.In.Email)
53 if err != nil {
54 return nil, NewInternalError(err)
55 }
56
57 if user != nil {
58 return nil, &Error{EmailExists, "email already taken", fmt.Errorf("'%v' is already registered '%v'", q.In.Email, user)}
59 }
60
61 newUser := db.User{Email: q.In.Email, Status: db.AwaitingConfirmation}
62 newUser.PasswordHash, err = db.HashPassword(q.In.Password)
63 if err != nil {
64 return nil, NewInternalError(err)
65 }
66
67 err = db.InsertUser(&newUser)
68 if err != nil {
69 return nil, NewInternalError(err)
70 }
71
72 token, err := CreateJwtToken(newUser.Id)
73 if err != nil {
74 return nil, NewInternalError(fmt.Errorf("cannot create jwt token %v", err))
75 }
76
77 if CONFIG.FreeSMSUser != "" {
78 err := SendSMS(CONFIG.FreeSMSUser, CONFIG.FreeSMSPass, fmt.Sprintf("New user signup '%v'", q.In.Email))
79 if err != nil {
80 return nil, NewInternalError(err)
81 }
82 }
83
84 configMap := make(map[string]string)
85 configMap["key"] = ""
86 configMap["secret"] = ""
87
88 _, err = db.SetUserMarketConfig(newUser.Id, "poloniex", configMap)
89 if err != nil {
90 return nil, NewInternalError(err)
91 }
92
93 return SignResult{token}, nil
94 }
95
96 type SigninQuery struct {
97 In SignParams
98 }
99
100 func (q SigninQuery) ValidateParams() *Error {
101 return q.In.Validate()
102 }
103
104 func (q SigninQuery) Run() (interface{}, *Error) {
105 user, err := db.GetUserByEmail(q.In.Email)
106 if err != nil {
107 return nil, NewInternalError(err)
108 }
109
110 if user == nil {
111 return nil, &Error{InvalidCredentials, "invalid credentials", fmt.Errorf("no email '%v' found", q.In.Email)}
112 }
113
114 err = db.ValidatePassword(q.In.Password, user.PasswordHash)
115 if err != nil {
116 return nil, &Error{InvalidCredentials, "invalid credentials", err}
117 }
118
119 token, err := CreateJwtToken(user.Id)
120 if err != nil {
121 return nil, NewInternalError(err)
122 }
123
124 return SignResult{token}, nil
125 }
126
127 func UserConfirmed(c *gin.Context) *Error {
128 user, exists := c.Get("user")
129
130 if !exists {
131 return &Error{NotAuthorized, "not authorized", fmt.Errorf("no user key in context")}
132 }
133
134 if user.(db.User).Status != db.Confirmed {
135 return &Error{UserNotConfirmed, "user awaiting admin validation", fmt.Errorf("user '%v' not confirmed", user)}
136 }
137
138 return nil
139 }
140
141 func GetUser(c *gin.Context) db.User {
142 user, _ := c.Get("user")
143
144 return user.(db.User)
145 }