create.go 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115
  1. package user
  2. import (
  3. "fmt"
  4. "net/http"
  5. "github.com/porter-dev/porter/api/server/authn"
  6. "github.com/porter-dev/porter/api/server/handlers"
  7. "github.com/porter-dev/porter/api/server/shared"
  8. "github.com/porter-dev/porter/api/server/shared/apierrors"
  9. "github.com/porter-dev/porter/api/server/shared/config"
  10. "github.com/porter-dev/porter/api/types"
  11. "github.com/porter-dev/porter/internal/analytics"
  12. "github.com/porter-dev/porter/internal/models"
  13. "github.com/porter-dev/porter/internal/repository"
  14. "golang.org/x/crypto/bcrypt"
  15. )
  16. type UserCreateHandler struct {
  17. handlers.PorterHandlerReadWriter
  18. }
  19. func NewUserCreateHandler(
  20. config *config.Config,
  21. decoderValidator shared.RequestDecoderValidator,
  22. writer shared.ResultWriter,
  23. ) *UserCreateHandler {
  24. return &UserCreateHandler{
  25. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  26. }
  27. }
  28. func (u *UserCreateHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  29. request := &types.CreateUserRequest{}
  30. ok := u.DecodeAndValidate(w, r, request)
  31. if !ok {
  32. return
  33. }
  34. user := &models.User{
  35. Email: request.Email,
  36. Password: request.Password,
  37. }
  38. // check if user exists
  39. doesExist := doesUserExist(u.Repo().User(), user)
  40. if doesExist {
  41. err := fmt.Errorf("email already taken")
  42. u.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  43. return
  44. }
  45. if err := checkUserRestrictions(u.Config().ServerConf, request.Email); err != nil {
  46. u.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  47. return
  48. }
  49. // hash the password using bcrypt
  50. hashedPw, err := bcrypt.GenerateFromPassword([]byte(user.Password), 8)
  51. if err != nil {
  52. u.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  53. return
  54. }
  55. user.Password = string(hashedPw)
  56. // write the user to the db
  57. user, err = u.Repo().User().CreateUser(user)
  58. if err != nil {
  59. u.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  60. return
  61. }
  62. // save the user as authenticated in the session
  63. redirect, err := authn.SaveUserAuthenticated(w, r, u.Config(), user)
  64. if err != nil {
  65. u.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  66. return
  67. }
  68. // non-fatal send email verification
  69. if !user.EmailVerified {
  70. err = startEmailVerification(u.Config(), w, r, user)
  71. if err != nil {
  72. u.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(err))
  73. }
  74. }
  75. u.Config().AnalyticsClient.Identify(analytics.CreateSegmentIdentifyUser(user))
  76. u.Config().AnalyticsClient.Track(analytics.UserCreateTrack(&analytics.UserCreateTrackOpts{
  77. UserScopedTrackOpts: analytics.GetUserScopedTrackOpts(user.ID),
  78. Email: user.Email,
  79. }))
  80. if redirect != "" {
  81. http.Redirect(w, r, redirect, http.StatusFound)
  82. return
  83. }
  84. u.WriteResult(w, r, user.ToUserType())
  85. }
  86. func doesUserExist(userRepo repository.UserRepository, user *models.User) bool {
  87. user, err := userRepo.ReadUserByEmail(user.Email)
  88. return user != nil && err == nil
  89. }