490 lines
14 KiB
Go
490 lines
14 KiB
Go
// Copyright 2023 Harran Ali <harran.m@gmail.com>. All rights reserved.
|
|
// Copyright (c) 2024 Zeni Kim <zenik@smarteching.com>
|
|
// Use of this source code is governed by MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package controllers
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
|
|
"net/http"
|
|
"os"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"git.smarteching.com/goffee/core"
|
|
"git.smarteching.com/goffee/cup/events"
|
|
"git.smarteching.com/goffee/cup/models"
|
|
"git.smarteching.com/goffee/cup/utils"
|
|
"github.com/google/uuid"
|
|
"gorm.io/gorm"
|
|
|
|
"git.smarteching.com/goffee/core/template/components"
|
|
)
|
|
|
|
func Signup(c *core.Context) *core.Response {
|
|
name := c.GetRequestParam("name")
|
|
email := c.GetRequestParam("email")
|
|
password := c.GetRequestParam("password")
|
|
// check if email exists
|
|
var user models.User
|
|
res := c.GetGorm().Where("email = ?", c.CastToString(email)).First(&user)
|
|
if res.Error != nil && !errors.Is(res.Error, gorm.ErrRecordNotFound) {
|
|
c.GetLogger().Error(res.Error.Error())
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]string{
|
|
"message": "internal error",
|
|
}))
|
|
}
|
|
if res.Error == nil {
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "email already exists in the database",
|
|
}))
|
|
}
|
|
|
|
// validation data
|
|
data := map[string]interface{}{
|
|
"name": name,
|
|
"email": email,
|
|
"password": password,
|
|
}
|
|
// validation rules
|
|
rules := map[string]interface{}{
|
|
"name": "required|alphaNumeric",
|
|
"email": "required|email",
|
|
"password": "required|length:6,10",
|
|
}
|
|
// validate
|
|
v := c.GetValidator().Validate(data, rules)
|
|
if v.Failed() {
|
|
c.GetLogger().Error(v.GetErrorMessagesJson())
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(v.GetErrorMessagesJson())
|
|
}
|
|
|
|
//hash the password
|
|
passwordHashed, err := c.GetHashing().HashPassword(c.CastToString(password))
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]interface{}{
|
|
"message": err.Error(),
|
|
}))
|
|
}
|
|
// store the record in db
|
|
user = models.User{
|
|
Name: c.CastToString(name),
|
|
Email: c.CastToString(email),
|
|
Password: passwordHashed,
|
|
}
|
|
res = c.GetGorm().Create(&user)
|
|
if res.Error != nil {
|
|
c.GetLogger().Error(res.Error.Error())
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]string{
|
|
"message": res.Error.Error(),
|
|
}))
|
|
}
|
|
|
|
token, err := c.GetJWT().GenerateToken(map[string]interface{}{
|
|
"userID": user.ID,
|
|
})
|
|
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]string{
|
|
"message": "internal server error",
|
|
}))
|
|
}
|
|
|
|
// cache the token
|
|
userAgent := c.GetUserAgent()
|
|
hashedCacheKey := utils.CreateAuthTokenHashedCacheKey(user.ID, userAgent)
|
|
err = c.GetCache().Set(hashedCacheKey, token)
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]interface{}{
|
|
"message": "internal server error",
|
|
}))
|
|
}
|
|
|
|
// fire user registered event
|
|
err = c.GetEventsManager().Fire(&core.Event{Name: events.USER_REGISTERED, Payload: map[string]interface{}{
|
|
"user": user,
|
|
}})
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]string{
|
|
"message": "internal server error",
|
|
}))
|
|
}
|
|
|
|
return c.Response.Json(c.MapToJson(map[string]string{
|
|
"token": token,
|
|
}))
|
|
}
|
|
|
|
func Signin(c *core.Context) *core.Response {
|
|
email := c.GetRequestParam("email")
|
|
password := c.GetRequestParam("password")
|
|
|
|
// check if template engine is enable
|
|
TemplateEnableStr := os.Getenv("TEMPLATE_ENABLE")
|
|
if TemplateEnableStr == "" {
|
|
TemplateEnableStr = "false"
|
|
}
|
|
TemplateEnable, _ := strconv.ParseBool(TemplateEnableStr)
|
|
|
|
data := map[string]interface{}{
|
|
"email": email,
|
|
"password": password,
|
|
}
|
|
rules := map[string]interface{}{
|
|
"email": "required|email",
|
|
"password": "required",
|
|
}
|
|
v := c.GetValidator().Validate(data, rules)
|
|
|
|
if v.Failed() {
|
|
c.GetLogger().Error(v.GetErrorMessagesJson())
|
|
if TemplateEnable {
|
|
// TODO set error in session
|
|
return c.Response.Redirect("/applogin")
|
|
} else {
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(v.GetErrorMessagesJson())
|
|
}
|
|
}
|
|
|
|
var user models.User
|
|
res := c.GetGorm().Where("email = ?", c.CastToString(email)).First(&user)
|
|
if res.Error != nil && !errors.Is(res.Error, gorm.ErrRecordNotFound) {
|
|
c.GetLogger().Error(res.Error.Error())
|
|
if TemplateEnable {
|
|
// TODO set error in session
|
|
return c.Response.Redirect("/applogin")
|
|
} else {
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]string{
|
|
"message": "internal server error",
|
|
}))
|
|
}
|
|
}
|
|
|
|
if res.Error != nil && errors.Is(res.Error, gorm.ErrRecordNotFound) {
|
|
if TemplateEnable {
|
|
// TODO set error in session
|
|
return c.Response.Redirect("/applogin")
|
|
} else {
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "invalid email or password",
|
|
}))
|
|
}
|
|
}
|
|
|
|
ok, err := c.GetHashing().CheckPasswordHash(user.Password, c.CastToString(password))
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
if TemplateEnable {
|
|
// TODO set error in session
|
|
return c.Response.Redirect("/applogin")
|
|
} else {
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]string{
|
|
"message": err.Error(),
|
|
}))
|
|
}
|
|
}
|
|
|
|
if !ok {
|
|
if TemplateEnable {
|
|
// TODO set error in session
|
|
return c.Response.Redirect("/applogin")
|
|
} else {
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "invalid email or password",
|
|
}))
|
|
}
|
|
}
|
|
|
|
token, err := c.GetJWT().GenerateToken(map[string]interface{}{
|
|
"userID": user.ID,
|
|
})
|
|
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
// TODO set error in session
|
|
if TemplateEnable {
|
|
return c.Response.Redirect("/applogin")
|
|
} else {
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]string{
|
|
"message": "internal server error",
|
|
}))
|
|
}
|
|
}
|
|
// cache the token
|
|
userAgent := c.GetUserAgent()
|
|
hashedCacheKey := utils.CreateAuthTokenHashedCacheKey(user.ID, userAgent)
|
|
err = c.GetCache().Set(hashedCacheKey, token)
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
if TemplateEnable {
|
|
// TODO set error in session
|
|
return c.Response.Redirect("/applogin")
|
|
} else {
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]interface{}{
|
|
"message": "internal server error",
|
|
}))
|
|
}
|
|
}
|
|
|
|
if TemplateEnable {
|
|
// create cookie
|
|
err = core.SetCookie(c.Response.HttpResponseWriter, email.(string), token)
|
|
if err != nil {
|
|
panic(fmt.Sprintf("Error write encrypted cookie: %v", err))
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError)
|
|
}
|
|
|
|
// redirecto to app
|
|
return c.Response.Redirect("/appsample")
|
|
} else {
|
|
return c.Response.Json(c.MapToJson(map[string]string{
|
|
"token": token,
|
|
}))
|
|
}
|
|
}
|
|
|
|
func ResetPasswordRequest(c *core.Context) *core.Response {
|
|
email := c.GetRequestParam("email")
|
|
|
|
// validation data
|
|
data := map[string]interface{}{
|
|
"email": email,
|
|
}
|
|
// validation rules
|
|
rules := map[string]interface{}{
|
|
"email": "required|email",
|
|
}
|
|
// validate
|
|
v := c.GetValidator().Validate(data, rules)
|
|
if v.Failed() {
|
|
c.GetLogger().Error(v.GetErrorMessagesJson())
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(v.GetErrorMessagesJson())
|
|
}
|
|
|
|
// check email in the database
|
|
var user models.User
|
|
res := c.GetGorm().Where("email = ?", c.CastToString(email)).First(&user)
|
|
if res.Error != nil && !errors.Is(res.Error, gorm.ErrRecordNotFound) {
|
|
c.GetLogger().Error(res.Error.Error())
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]string{
|
|
"message": "internal server error",
|
|
}))
|
|
}
|
|
if res.Error != nil && errors.Is(res.Error, gorm.ErrRecordNotFound) {
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "email not found in our database",
|
|
}))
|
|
}
|
|
|
|
// generate the link
|
|
expiresAt := time.Now().Add(time.Hour * 3).Unix()
|
|
linkCodeData := map[string]string{
|
|
"userID": c.CastToString(user.ID),
|
|
"expiresAt": c.CastToString(expiresAt),
|
|
}
|
|
code := uuid.NewString()
|
|
c.GetCache().SetWithExpiration(code, c.MapToJson(linkCodeData), time.Hour*3)
|
|
err := c.GetEventsManager().Fire(&core.Event{Name: events.USER_PASSWORD_RESET_REQUESTED, Payload: map[string]interface{}{
|
|
"user": user,
|
|
"code": code,
|
|
}})
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]string{
|
|
"message": "internal server error",
|
|
}))
|
|
}
|
|
|
|
return c.Response.Json(c.MapToJson(map[string]string{
|
|
"message": "reset password email sent successfully",
|
|
}))
|
|
}
|
|
|
|
func SetNewPassword(c *core.Context) *core.Response {
|
|
urlCode := c.CastToString(c.GetPathParam("code"))
|
|
linkCodeDataStr, err := c.GetCache().Get(urlCode)
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "invalid link",
|
|
}))
|
|
}
|
|
var linkCode map[string]interface{}
|
|
json.Unmarshal([]byte(linkCodeDataStr), &linkCode)
|
|
expiresAtUnix, err := strconv.ParseInt(c.CastToString(linkCode["expiresAt"]), 10, 64)
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "invalid link",
|
|
}))
|
|
}
|
|
expiresAt := time.Unix(expiresAtUnix, 0)
|
|
if time.Now().After(expiresAt) {
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "invalid link",
|
|
}))
|
|
}
|
|
userID, err := strconv.ParseUint(c.CastToString(linkCode["userID"]), 10, 64)
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "invalid link",
|
|
}))
|
|
}
|
|
|
|
oldPassword := c.CastToString(c.GetRequestParam("old_password"))
|
|
newPassword := c.CastToString(c.GetRequestParam("new_password"))
|
|
newPasswordConfirm := c.CastToString(c.GetRequestParam("new_password_confirm"))
|
|
|
|
// validation data
|
|
data := map[string]interface{}{
|
|
"old_password": oldPassword,
|
|
"new_password": newPassword,
|
|
"new_password_confirm": newPasswordConfirm,
|
|
}
|
|
// validation rules
|
|
rules := map[string]interface{}{
|
|
"old_password": "required|length:6,10",
|
|
"new_password": "required|length:6,10",
|
|
"new_password_confirm": "required|length:6,10",
|
|
}
|
|
// validate
|
|
v := c.GetValidator().Validate(data, rules)
|
|
if v.Failed() {
|
|
c.GetLogger().Error(v.GetErrorMessagesJson())
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(v.GetErrorMessagesJson())
|
|
}
|
|
|
|
var user models.User
|
|
res := c.GetGorm().Where("id = ?", userID).First(&user)
|
|
if res.Error != nil {
|
|
c.GetLogger().Error(res.Error.Error())
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "invalid link",
|
|
}))
|
|
}
|
|
|
|
SamePassword, err := c.GetHashing().CheckPasswordHash(user.Password, oldPassword)
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "invalid link",
|
|
}))
|
|
}
|
|
|
|
if !SamePassword {
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "the old password is incorrect",
|
|
}))
|
|
}
|
|
|
|
if newPassword != newPasswordConfirm {
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "new password does not match new password confirmation",
|
|
}))
|
|
}
|
|
|
|
hashedNewPassword, err := c.GetHashing().HashPassword(newPassword)
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
return c.Response.SetStatusCode(http.StatusUnprocessableEntity).Json(c.MapToJson(map[string]string{
|
|
"message": "invalid password",
|
|
}))
|
|
}
|
|
|
|
user.Password = hashedNewPassword
|
|
c.GetGorm().Save(&user)
|
|
|
|
err = c.GetEventsManager().Fire(&core.Event{Name: events.PASSWORD_CHANGED, Payload: map[string]interface{}{
|
|
"user": user,
|
|
}})
|
|
|
|
if err != nil {
|
|
c.GetLogger().Error(err.Error())
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]string{
|
|
"message": "internal server error",
|
|
}))
|
|
}
|
|
|
|
return c.Response.Json(c.MapToJson(map[string]string{
|
|
"message": "password changed successfully",
|
|
}))
|
|
}
|
|
|
|
func Signout(c *core.Context) *core.Response {
|
|
tokenRaw := c.GetHeader("Authorization")
|
|
token := strings.TrimSpace(strings.Replace(tokenRaw, "Bearer", "", 1))
|
|
if token == "" {
|
|
return c.Response.SetStatusCode(http.StatusUnauthorized).Json(c.MapToJson(map[string]interface{}{
|
|
"message": "unauthorized",
|
|
}))
|
|
}
|
|
payload, err := c.GetJWT().DecodeToken(token)
|
|
if err != nil {
|
|
return c.Response.SetStatusCode(http.StatusUnauthorized).Json(c.MapToJson(map[string]interface{}{
|
|
"message": "unauthorized",
|
|
}))
|
|
}
|
|
userAgent := c.GetUserAgent()
|
|
hashedCacheKey := utils.CreateAuthTokenHashedCacheKey(uint(c.CastToInt(payload["userID"])), userAgent)
|
|
|
|
err = c.GetCache().Delete(hashedCacheKey)
|
|
if err != nil {
|
|
return c.Response.SetStatusCode(http.StatusInternalServerError).Json(c.MapToJson(map[string]interface{}{
|
|
"message": "internal error",
|
|
}))
|
|
}
|
|
|
|
return c.Response.SetStatusCode(http.StatusOK).Json(c.MapToJson(map[string]interface{}{
|
|
"message": "signed out successfully",
|
|
}))
|
|
}
|
|
|
|
// Show basic app login
|
|
func AppLogin(c *core.Context) *core.Response {
|
|
|
|
// first, include all compoments
|
|
// first, include all compoments
|
|
type templateData struct {
|
|
PageCard components.PageCard
|
|
}
|
|
|
|
// now fill data of the components
|
|
tmplData := templateData{
|
|
PageCard: components.PageCard{
|
|
CardTitle: "Card title",
|
|
CardBody: "Loerm ipsum at deim",
|
|
},
|
|
}
|
|
return c.Response.Template("login.html", tmplData)
|
|
}
|
|
|
|
// Show basic app sample
|
|
func AppSample(c *core.Context) *core.Response {
|
|
|
|
// first, include all compoments
|
|
type templateData struct {
|
|
PageCard components.PageCard
|
|
}
|
|
|
|
// now fill data of the components
|
|
tmplData := templateData{
|
|
PageCard: components.PageCard{
|
|
CardTitle: "Protected page",
|
|
CardBody: "If you can see this page, your are loggedin",
|
|
},
|
|
}
|
|
//fmt.Printf("Outside cookie user is: %s", user.Email)
|
|
|
|
return c.Response.Template("app.html", tmplData)
|
|
|
|
}
|