aboutsummaryrefslogblamecommitdiff
path: root/api/password_reset.go
blob: 0c55c0204a5afb65c2d9312c9ae3505bfdaf3d1d (plain) (tree)
1
2
3
4
5
6
7
8






                                         
                                                   



































                                                                                                                                                                          






                                                              
                       























































                                                                                                                    
                       
 
package api

import (
	"fmt"
	"time"

	"github.com/dchest/passwordreset"
	"git.immae.eu/Cryptoportfolio/Front.git/db"
)

var PASSWORD_RESET_SECRET []byte

type PasswordResetQuery struct {
	In struct {
		Email string
	}
}

func (q PasswordResetQuery) ValidateParams() *Error {
	if q.In.Email == "" {
		return &Error{InvalidEmail, "invalid email", fmt.Errorf("invalid email")}
	}

	return nil
}

func (q PasswordResetQuery) Run() (interface{}, *Error) {
	user, err := db.GetUserByEmail(q.In.Email)
	if err != nil {
		return nil, NewInternalError(err)
	}

	if user == nil {
		return nil, &Error{NotFound, "account not found", fmt.Errorf("'%v' is not registered", q.In.Email)}
	}

	token := passwordreset.NewToken(q.In.Email, time.Hour*24*1, []byte(user.PasswordHash), PASSWORD_RESET_SECRET)
	if CONFIG.FreeSMSUser != "" {
		err := SendSMS(CONFIG.FreeSMSUser, CONFIG.FreeSMSPass, fmt.Sprintf("'%v' request a password reset. Token '/change-password?token=%v'", q.In.Email, token))
		if err != nil {
			return nil, NewInternalError(err)
		}
	}

	if MAIL_CONFIG.IsEnabled {
		err = SendResetPasswordMail(q.In.Email, token)
		if err != nil {
			return nil, NewInternalError(err)
		}
	}

	return nil, nil
}

type ChangePasswordQuery struct {
	In struct {
		Token    string
		Password string
	}
}

func (q ChangePasswordQuery) ValidateParams() *Error {
	if q.In.Password == "" {
		return &Error{InvalidPassword, "invalid password", fmt.Errorf("invalid password")}
	}

	if q.In.Token == "" {
		return &Error{BadRequest, "invalid token", fmt.Errorf("invalid token")}
	}

	return nil
}

func (q ChangePasswordQuery) Run() (interface{}, *Error) {
	var user *db.User

	email, err := passwordreset.VerifyToken(q.In.Token, func(email string) ([]byte, error) {
		var err error
		user, err = db.GetUserByEmail(email)
		if err != nil {
			return nil, err
		}

		if user == nil {
			return nil, fmt.Errorf("'%v' is not registered", email)
		}

		return []byte(user.PasswordHash), nil

	}, PASSWORD_RESET_SECRET)

	if err != nil && (err == passwordreset.ErrExpiredToken) {
		return nil, &Error{BadRequest, "expired token", fmt.Errorf("expired token")}
	} else if err != nil && (err == passwordreset.ErrMalformedToken || err == passwordreset.ErrWrongSignature) {
		return nil, &Error{BadRequest, "wrong token", fmt.Errorf("wrong token")}
	} else if err != nil {
		return nil, NewInternalError(err)
	}

	if user == nil {
		return nil, &Error{BadRequest, "bad request", fmt.Errorf("no user found for email '%v'", email)}
	}

	err = db.SetPassword(user, q.In.Password)
	if err != nil {
		return nil, NewInternalError(err)
	}

	return nil, nil
}