package api import ( "fmt" "time" "github.com/dchest/passwordreset" "git.immae.eu/Cryptoportfolio/Front.git/db" ) var PASSWORD_RESET_SECRET []byte type PasswordResetQuery struct { In struct { Email string } } func (q PasswordResetQuery) ValidateParams() *Error { if q.In.Email == "" { return &Error{InvalidEmail, "invalid email", fmt.Errorf("invalid email")} } return nil } func (q PasswordResetQuery) Run() (interface{}, *Error) { user, err := db.GetUserByEmail(q.In.Email) if err != nil { return nil, NewInternalError(err) } if user == nil { return nil, &Error{NotFound, "account not found", fmt.Errorf("'%v' is not registered", q.In.Email)} } token := passwordreset.NewToken(q.In.Email, time.Hour*24*1, []byte(user.PasswordHash), PASSWORD_RESET_SECRET) if CONFIG.FreeSMSUser != "" { err := SendSMS(CONFIG.FreeSMSUser, CONFIG.FreeSMSPass, fmt.Sprintf("'%v' request a password reset. Token '/change-password?token=%v'", q.In.Email, token)) if err != nil { log.Error(err) } } if MAIL_CONFIG.IsEnabled { err = SendResetPasswordMail(q.In.Email, token) if err != nil { return nil, NewInternalError(err) } } return nil, nil } type ChangePasswordQuery struct { In struct { Token string Password string } } func (q ChangePasswordQuery) ValidateParams() *Error { if q.In.Password == "" { return &Error{InvalidPassword, "invalid password", fmt.Errorf("invalid password")} } if q.In.Token == "" { return &Error{BadRequest, "invalid token", fmt.Errorf("invalid token")} } return nil } func (q ChangePasswordQuery) Run() (interface{}, *Error) { var user *db.User email, err := passwordreset.VerifyToken(q.In.Token, func(email string) ([]byte, error) { var err error user, err = db.GetUserByEmail(email) if err != nil { return nil, err } if user == nil { return nil, fmt.Errorf("'%v' is not registered", email) } return []byte(user.PasswordHash), nil }, PASSWORD_RESET_SECRET) if err != nil && (err == passwordreset.ErrExpiredToken) { return nil, &Error{BadRequest, "expired token", fmt.Errorf("expired token")} } else if err != nil && (err == passwordreset.ErrMalformedToken || err == passwordreset.ErrWrongSignature) { return nil, &Error{BadRequest, "wrong token", fmt.Errorf("wrong token")} } else if err != nil { return nil, NewInternalError(err) } if user == nil { return nil, &Error{BadRequest, "bad request", fmt.Errorf("no user found for email '%v'", email)} } err = db.SetPassword(user, q.In.Password) if err != nil { return nil, NewInternalError(err) } return nil, nil }