mirror of
https://github.com/muety/wakapi.git
synced 2023-08-10 21:12:56 +03:00
4b0a3cf0d6
chore(sentry): include stacktrace with panics
315 lines
11 KiB
Go
315 lines
11 KiB
Go
package routes
|
|
|
|
import (
|
|
"fmt"
|
|
"github.com/emvi/logbuch"
|
|
"github.com/gorilla/mux"
|
|
conf "github.com/muety/wakapi/config"
|
|
"github.com/muety/wakapi/models"
|
|
"github.com/muety/wakapi/models/view"
|
|
"github.com/muety/wakapi/services"
|
|
"github.com/muety/wakapi/utils"
|
|
"net/http"
|
|
"net/url"
|
|
"time"
|
|
)
|
|
|
|
type LoginHandler struct {
|
|
config *conf.Config
|
|
userSrvc services.IUserService
|
|
mailSrvc services.IMailService
|
|
}
|
|
|
|
func NewLoginHandler(userService services.IUserService, mailService services.IMailService) *LoginHandler {
|
|
return &LoginHandler{
|
|
config: conf.Get(),
|
|
userSrvc: userService,
|
|
mailSrvc: mailService,
|
|
}
|
|
}
|
|
|
|
func (h *LoginHandler) RegisterRoutes(router *mux.Router) {
|
|
router.Path("/login").Methods(http.MethodGet).HandlerFunc(h.GetIndex)
|
|
router.Path("/login").Methods(http.MethodPost).HandlerFunc(h.PostLogin)
|
|
router.Path("/logout").Methods(http.MethodPost).HandlerFunc(h.PostLogout)
|
|
router.Path("/signup").Methods(http.MethodGet).HandlerFunc(h.GetSignup)
|
|
router.Path("/signup").Methods(http.MethodPost).HandlerFunc(h.PostSignup)
|
|
router.Path("/set-password").Methods(http.MethodGet).HandlerFunc(h.GetSetPassword)
|
|
router.Path("/set-password").Methods(http.MethodPost).HandlerFunc(h.PostSetPassword)
|
|
router.Path("/reset-password").Methods(http.MethodGet).HandlerFunc(h.GetResetPassword)
|
|
router.Path("/reset-password").Methods(http.MethodPost).HandlerFunc(h.PostResetPassword)
|
|
}
|
|
|
|
func (h *LoginHandler) GetIndex(w http.ResponseWriter, r *http.Request) {
|
|
if h.config.IsDev() {
|
|
loadTemplates()
|
|
}
|
|
|
|
if cookie, err := r.Cookie(models.AuthCookieKey); err == nil && cookie.Value != "" {
|
|
http.Redirect(w, r, fmt.Sprintf("%s/summary", h.config.Server.BasePath), http.StatusFound)
|
|
return
|
|
}
|
|
|
|
templates[conf.LoginTemplate].Execute(w, h.buildViewModel(r))
|
|
}
|
|
|
|
func (h *LoginHandler) PostLogin(w http.ResponseWriter, r *http.Request) {
|
|
if h.config.IsDev() {
|
|
loadTemplates()
|
|
}
|
|
|
|
if cookie, err := r.Cookie(models.AuthCookieKey); err == nil && cookie.Value != "" {
|
|
http.Redirect(w, r, fmt.Sprintf("%s/summary", h.config.Server.BasePath), http.StatusFound)
|
|
return
|
|
}
|
|
|
|
var login models.Login
|
|
if err := r.ParseForm(); err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
templates[conf.LoginTemplate].Execute(w, h.buildViewModel(r).WithError("missing parameters"))
|
|
return
|
|
}
|
|
if err := loginDecoder.Decode(&login, r.PostForm); err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
templates[conf.LoginTemplate].Execute(w, h.buildViewModel(r).WithError("missing parameters"))
|
|
return
|
|
}
|
|
|
|
user, err := h.userSrvc.GetUserById(login.Username)
|
|
if err != nil {
|
|
w.WriteHeader(http.StatusNotFound)
|
|
templates[conf.LoginTemplate].Execute(w, h.buildViewModel(r).WithError("resource not found"))
|
|
return
|
|
}
|
|
|
|
if !utils.CompareBcrypt(user.Password, login.Password, h.config.Security.PasswordSalt) {
|
|
w.WriteHeader(http.StatusUnauthorized)
|
|
templates[conf.LoginTemplate].Execute(w, h.buildViewModel(r).WithError("invalid credentials"))
|
|
return
|
|
}
|
|
|
|
encoded, err := h.config.Security.SecureCookie.Encode(models.AuthCookieKey, login.Username)
|
|
if err != nil {
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
conf.Log().Request(r).Error("failed to encode secure cookie - %v", err)
|
|
templates[conf.LoginTemplate].Execute(w, h.buildViewModel(r).WithError("internal server error"))
|
|
return
|
|
}
|
|
|
|
user.LastLoggedInAt = models.CustomTime(time.Now())
|
|
h.userSrvc.Update(user)
|
|
|
|
http.SetCookie(w, h.config.CreateCookie(models.AuthCookieKey, encoded))
|
|
http.Redirect(w, r, fmt.Sprintf("%s/summary", h.config.Server.BasePath), http.StatusFound)
|
|
}
|
|
|
|
func (h *LoginHandler) PostLogout(w http.ResponseWriter, r *http.Request) {
|
|
if h.config.IsDev() {
|
|
loadTemplates()
|
|
}
|
|
|
|
http.SetCookie(w, h.config.GetClearCookie(models.AuthCookieKey))
|
|
http.Redirect(w, r, fmt.Sprintf("%s/", h.config.Server.BasePath), http.StatusFound)
|
|
}
|
|
|
|
func (h *LoginHandler) GetSignup(w http.ResponseWriter, r *http.Request) {
|
|
if h.config.IsDev() {
|
|
loadTemplates()
|
|
}
|
|
|
|
if cookie, err := r.Cookie(models.AuthCookieKey); err == nil && cookie.Value != "" {
|
|
http.Redirect(w, r, fmt.Sprintf("%s/summary", h.config.Server.BasePath), http.StatusFound)
|
|
return
|
|
}
|
|
|
|
templates[conf.SignupTemplate].Execute(w, h.buildViewModel(r))
|
|
}
|
|
|
|
func (h *LoginHandler) PostSignup(w http.ResponseWriter, r *http.Request) {
|
|
if h.config.IsDev() {
|
|
loadTemplates()
|
|
}
|
|
|
|
if !h.config.IsDev() && !h.config.Security.AllowSignup {
|
|
w.WriteHeader(http.StatusForbidden)
|
|
templates[conf.SignupTemplate].Execute(w, h.buildViewModel(r).WithError("registration is disabled on this server"))
|
|
return
|
|
}
|
|
|
|
if cookie, err := r.Cookie(models.AuthCookieKey); err == nil && cookie.Value != "" {
|
|
http.Redirect(w, r, fmt.Sprintf("%s/summary", h.config.Server.BasePath), http.StatusFound)
|
|
return
|
|
}
|
|
|
|
var signup models.Signup
|
|
if err := r.ParseForm(); err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
templates[conf.SignupTemplate].Execute(w, h.buildViewModel(r).WithError("missing parameters"))
|
|
return
|
|
}
|
|
if err := signupDecoder.Decode(&signup, r.PostForm); err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
templates[conf.SignupTemplate].Execute(w, h.buildViewModel(r).WithError("missing parameters"))
|
|
return
|
|
}
|
|
|
|
if !signup.IsValid() {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
templates[conf.SignupTemplate].Execute(w, h.buildViewModel(r).WithError("invalid parameters"))
|
|
return
|
|
}
|
|
|
|
numUsers, _ := h.userSrvc.Count()
|
|
|
|
_, created, err := h.userSrvc.CreateOrGet(&signup, numUsers == 0)
|
|
if err != nil {
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
conf.Log().Request(r).Error("failed to create new user - %v", err)
|
|
templates[conf.SignupTemplate].Execute(w, h.buildViewModel(r).WithError("failed to create new user"))
|
|
return
|
|
}
|
|
if !created {
|
|
w.WriteHeader(http.StatusConflict)
|
|
templates[conf.SignupTemplate].Execute(w, h.buildViewModel(r).WithError("user already existing"))
|
|
return
|
|
}
|
|
|
|
http.Redirect(w, r, fmt.Sprintf("%s/?success=%s", h.config.Server.BasePath, "account created successfully"), http.StatusFound)
|
|
}
|
|
|
|
func (h *LoginHandler) GetResetPassword(w http.ResponseWriter, r *http.Request) {
|
|
if h.config.IsDev() {
|
|
loadTemplates()
|
|
}
|
|
templates[conf.ResetPasswordTemplate].Execute(w, h.buildViewModel(r))
|
|
}
|
|
|
|
func (h *LoginHandler) GetSetPassword(w http.ResponseWriter, r *http.Request) {
|
|
if h.config.IsDev() {
|
|
loadTemplates()
|
|
}
|
|
|
|
values, _ := url.ParseQuery(r.URL.RawQuery)
|
|
token := values.Get("token")
|
|
if token == "" {
|
|
w.WriteHeader(http.StatusUnauthorized)
|
|
templates[conf.SetPasswordTemplate].Execute(w, h.buildViewModel(r).WithError("invalid or missing token"))
|
|
return
|
|
}
|
|
|
|
vm := &view.SetPasswordViewModel{
|
|
LoginViewModel: *h.buildViewModel(r),
|
|
Token: token,
|
|
}
|
|
|
|
templates[conf.SetPasswordTemplate].Execute(w, vm)
|
|
}
|
|
|
|
func (h *LoginHandler) PostSetPassword(w http.ResponseWriter, r *http.Request) {
|
|
if h.config.IsDev() {
|
|
loadTemplates()
|
|
}
|
|
|
|
var setRequest models.SetPasswordRequest
|
|
if err := r.ParseForm(); err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
templates[conf.SetPasswordTemplate].Execute(w, h.buildViewModel(r).WithError("missing parameters"))
|
|
return
|
|
}
|
|
if err := signupDecoder.Decode(&setRequest, r.PostForm); err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
templates[conf.SetPasswordTemplate].Execute(w, h.buildViewModel(r).WithError("missing parameters"))
|
|
return
|
|
}
|
|
|
|
user, err := h.userSrvc.GetUserByResetToken(setRequest.Token)
|
|
if err != nil {
|
|
w.WriteHeader(http.StatusUnauthorized)
|
|
templates[conf.SetPasswordTemplate].Execute(w, h.buildViewModel(r).WithError("invalid token"))
|
|
return
|
|
}
|
|
|
|
if !setRequest.IsValid() {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
templates[conf.SetPasswordTemplate].Execute(w, h.buildViewModel(r).WithError("invalid parameters"))
|
|
return
|
|
}
|
|
|
|
user.Password = setRequest.Password
|
|
user.ResetToken = ""
|
|
if hash, err := utils.HashBcrypt(user.Password, h.config.Security.PasswordSalt); err != nil {
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
conf.Log().Request(r).Error("failed to set new password - %v", err)
|
|
templates[conf.SetPasswordTemplate].Execute(w, h.buildViewModel(r).WithError("failed to set new password"))
|
|
return
|
|
} else {
|
|
user.Password = hash
|
|
}
|
|
|
|
if _, err := h.userSrvc.Update(user); err != nil {
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
conf.Log().Request(r).Error("failed to save new password - %v", err)
|
|
templates[conf.SetPasswordTemplate].Execute(w, h.buildViewModel(r).WithError("failed to save new password"))
|
|
return
|
|
}
|
|
|
|
http.Redirect(w, r, fmt.Sprintf("%s/login?success=%s", h.config.Server.BasePath, "password updated successfully"), http.StatusFound)
|
|
}
|
|
|
|
func (h *LoginHandler) PostResetPassword(w http.ResponseWriter, r *http.Request) {
|
|
if h.config.IsDev() {
|
|
loadTemplates()
|
|
}
|
|
|
|
if !h.config.Mail.Enabled {
|
|
w.WriteHeader(http.StatusNotImplemented)
|
|
templates[conf.ResetPasswordTemplate].Execute(w, h.buildViewModel(r).WithError("mailing is disabled on this server"))
|
|
return
|
|
}
|
|
|
|
var resetRequest models.ResetPasswordRequest
|
|
if err := r.ParseForm(); err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
templates[conf.ResetPasswordTemplate].Execute(w, h.buildViewModel(r).WithError("missing parameters"))
|
|
return
|
|
}
|
|
if err := resetPasswordDecoder.Decode(&resetRequest, r.PostForm); err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
templates[conf.ResetPasswordTemplate].Execute(w, h.buildViewModel(r).WithError("missing parameters"))
|
|
return
|
|
}
|
|
|
|
if user, err := h.userSrvc.GetUserByEmail(resetRequest.Email); user != nil && err == nil {
|
|
if u, err := h.userSrvc.GenerateResetToken(user); err != nil {
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
conf.Log().Request(r).Error("failed to generate password reset token - %v", err)
|
|
templates[conf.ResetPasswordTemplate].Execute(w, h.buildViewModel(r).WithError("failed to generate password reset token"))
|
|
return
|
|
} else {
|
|
go func(user *models.User) {
|
|
link := fmt.Sprintf("%s/set-password?token=%s", h.config.Server.GetPublicUrl(), user.ResetToken)
|
|
if err := h.mailSrvc.SendPasswordReset(user, link); err != nil {
|
|
conf.Log().Request(r).Error("failed to send password reset mail to %s - %v", user.ID, err)
|
|
} else {
|
|
logbuch.Info("sent password reset mail to %s", user.ID)
|
|
}
|
|
}(u)
|
|
}
|
|
} else {
|
|
conf.Log().Request(r).Warn("password reset requested for unregistered address '%s'", resetRequest.Email)
|
|
}
|
|
|
|
http.Redirect(w, r, fmt.Sprintf("%s/?success=%s", h.config.Server.BasePath, "an e-mail was sent to you in case your e-mail address was registered"), http.StatusFound)
|
|
}
|
|
|
|
func (h *LoginHandler) buildViewModel(r *http.Request) *view.LoginViewModel {
|
|
numUsers, _ := h.userSrvc.Count()
|
|
|
|
return &view.LoginViewModel{
|
|
Success: r.URL.Query().Get("success"),
|
|
Error: r.URL.Query().Get("error"),
|
|
TotalUsers: int(numUsers),
|
|
AllowSignup: h.config.IsDev() || h.config.Security.AllowSignup,
|
|
}
|
|
}
|