mirror of
https://github.com/dnote/dnote
synced 2026-03-15 23:15:50 +01:00
* Add app abstraction * Abstract out email sending * Get sender * Test * Move operations to app * Test * Test * Add license * Fix lint
161 lines
4.2 KiB
Go
161 lines
4.2 KiB
Go
/* Copyright (C) 2019 Monomax Software Pty Ltd
|
|
*
|
|
* This file is part of Dnote.
|
|
*
|
|
* Dnote is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Dnote is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
* along with Dnote. If not, see <https://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package app
|
|
|
|
import (
|
|
"time"
|
|
|
|
"github.com/dnote/dnote/pkg/server/crypt"
|
|
"github.com/dnote/dnote/pkg/server/database"
|
|
"github.com/jinzhu/gorm"
|
|
"github.com/pkg/errors"
|
|
"golang.org/x/crypto/bcrypt"
|
|
)
|
|
|
|
func generateResetToken() (string, error) {
|
|
ret, err := crypt.GetRandomStr(16)
|
|
if err != nil {
|
|
return "", errors.Wrap(err, "generating random token")
|
|
}
|
|
|
|
return ret, nil
|
|
}
|
|
|
|
func generateVerificationCode() (string, error) {
|
|
ret, err := crypt.GetRandomStr(16)
|
|
if err != nil {
|
|
return "", errors.Wrap(err, "generating random token")
|
|
}
|
|
|
|
return ret, nil
|
|
}
|
|
|
|
// TouchLastLoginAt updates the last login timestamp
|
|
func (a *App) TouchLastLoginAt(user database.User, tx *gorm.DB) error {
|
|
t := time.Now()
|
|
if err := tx.Model(&user).Update(database.User{LastLoginAt: &t}).Error; err != nil {
|
|
return errors.Wrap(err, "updating last_login_at")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func createEmailVerificaitonToken(user database.User, tx *gorm.DB) error {
|
|
verificationCode, err := generateVerificationCode()
|
|
if err != nil {
|
|
return errors.Wrap(err, "generating verification code")
|
|
}
|
|
token := database.Token{
|
|
UserID: user.ID,
|
|
Type: database.TokenTypeEmailVerification,
|
|
Value: verificationCode,
|
|
}
|
|
if err := tx.Save(&token).Error; err != nil {
|
|
return errors.Wrap(err, "saving verification token")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func createEmailPreference(user database.User, tx *gorm.DB) error {
|
|
p := database.EmailPreference{
|
|
UserID: user.ID,
|
|
}
|
|
if err := tx.Save(&p).Error; err != nil {
|
|
return errors.Wrap(err, "inserting email preference")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func createDefaultRepetitionRule(user database.User, tx *gorm.DB) error {
|
|
r := database.RepetitionRule{
|
|
Title: "Default repetition - all book",
|
|
UserID: user.ID,
|
|
Enabled: false,
|
|
Hour: 20,
|
|
Minute: 30,
|
|
Frequency: 604800000,
|
|
BookDomain: database.BookDomainAll,
|
|
Books: []database.Book{},
|
|
NoteCount: 20,
|
|
}
|
|
if err := tx.Save(&r).Error; err != nil {
|
|
return errors.Wrap(err, "inserting repetition rule")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// CreateUser creates a user
|
|
func (a *App) CreateUser(email, password string) (database.User, error) {
|
|
tx := a.DB.Begin()
|
|
|
|
hashedPassword, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)
|
|
if err != nil {
|
|
tx.Rollback()
|
|
return database.User{}, errors.Wrap(err, "hashing password")
|
|
}
|
|
|
|
// Grant all privileges if self-hosting
|
|
var pro bool
|
|
if a.OnPremise {
|
|
pro = true
|
|
} else {
|
|
pro = false
|
|
}
|
|
|
|
user := database.User{
|
|
Cloud: pro,
|
|
}
|
|
if err = tx.Save(&user).Error; err != nil {
|
|
tx.Rollback()
|
|
return database.User{}, errors.Wrap(err, "saving user")
|
|
}
|
|
account := database.Account{
|
|
Email: database.ToNullString(email),
|
|
Password: database.ToNullString(string(hashedPassword)),
|
|
UserID: user.ID,
|
|
}
|
|
if err = tx.Save(&account).Error; err != nil {
|
|
tx.Rollback()
|
|
return database.User{}, errors.Wrap(err, "saving account")
|
|
}
|
|
|
|
if err := createEmailVerificaitonToken(user, tx); err != nil {
|
|
tx.Rollback()
|
|
return database.User{}, errors.Wrap(err, "creating email verificaiton token")
|
|
}
|
|
if err := createEmailPreference(user, tx); err != nil {
|
|
tx.Rollback()
|
|
return database.User{}, errors.Wrap(err, "creating email preference")
|
|
}
|
|
if err := createDefaultRepetitionRule(user, tx); err != nil {
|
|
tx.Rollback()
|
|
return database.User{}, errors.Wrap(err, "creating default repetition rule")
|
|
}
|
|
if err := a.TouchLastLoginAt(user, tx); err != nil {
|
|
tx.Rollback()
|
|
return database.User{}, errors.Wrap(err, "updating last login")
|
|
}
|
|
|
|
tx.Commit()
|
|
|
|
return user, nil
|
|
}
|