-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathusers.go
156 lines (127 loc) · 3.41 KB
/
users.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
package forum
import (
"errors"
"go.hasen.dev/generic"
"go.hasen.dev/vbeam"
"go.hasen.dev/vbolt"
"go.hasen.dev/vpack"
"golang.org/x/crypto/bcrypt"
)
// Models
// =============================================================================
type User struct {
Id int
Username string
Email string
IsAdmin bool
}
func PackUser(self *User, buf *vpack.Buffer) {
vpack.Version(1, buf)
vpack.Int(&self.Id, buf)
vpack.String(&self.Username, buf)
vpack.String(&self.Email, buf)
vpack.Bool(&self.IsAdmin, buf)
}
// Buckets
// =============================================================================
var UsersBkt = vbolt.Bucket(&dbInfo, "users", vpack.FInt, PackUser)
// user id => hashed passwd
var PasswdBkt = vbolt.Bucket(&dbInfo, "passwd", vpack.FInt, vpack.ByteSlice)
// this is to ensure username uniqueness
// username => userid
var UsernameBkt = vbolt.Bucket(&dbInfo, "username", vpack.StringZ, vpack.Int)
// Procedures
// =============================================================================
type AddUserRequest struct {
Username string
Email string
Password string
}
type UserListResponse struct {
Users []User
}
func fetchUsers(tx *vbolt.Tx) (users []User) {
vbolt.IterateAll(tx, UsersBkt, func(key int, value User) bool {
generic.Append(&users, value)
return true
})
return
}
func isUsernameValid(name string) bool {
if len(name) < 3 {
return false
}
for _, c := range name {
if c > 0xff {
return false
}
// alpha, ok
if (c >= 'a' && c <= 'z') || (c >= 'A' && c <= 'Z') {
continue
}
// numbers, ok
if c >= '0' && c <= '9' {
continue
}
// special separators, ok
if c == '.' || c == '-' || c == '_' {
continue
}
// unrecognized character
return false
}
// if we reach here, no problems were found
return true
}
func isPasswordValid(pwd string) bool {
// cannot hash a password with length over 72
return len(pwd) >= 8 && len(pwd) <= 72
}
var UsernameTaken = errors.New("UsernameTaken")
var UsernameInvalid = errors.New("UsernameInvalid")
var PasswordInvalid = errors.New("PasswordInvalid")
// AddUserTx adds the user without any validation; if username exists it will be
// over written!
func AddUserTx(tx *vbolt.Tx, req AddUserRequest, hash []byte) User {
var user User
user.Id = vbolt.NextIntId(tx, UsersBkt)
user.Username = req.Username
user.Email = req.Email
user.IsAdmin = user.Id < 2
vbolt.Write(tx, UsersBkt, user.Id, &user)
vbolt.Write(tx, PasswdBkt, user.Id, &hash)
vbolt.Write(tx, UsernameBkt, user.Username, &user.Id)
return user
}
func ValidateUserTx(tx *vbolt.Tx, req AddUserRequest) error {
if !isUsernameValid(req.Username) {
return UsernameInvalid
}
// check username is not already taken
if vbolt.HasKey(tx, UsernameBkt, req.Username) {
return UsernameTaken
}
if !isPasswordValid(req.Password) {
return PasswordInvalid
}
return nil
}
func AddUser(ctx *vbeam.Context, req AddUserRequest) (resp UserListResponse, err error) {
err = ValidateUserTx(ctx.Tx, req)
if err != nil {
return
}
hash, _ := bcrypt.GenerateFromPassword([]byte(req.Password), bcrypt.DefaultCost)
// start a write transaction!!
vbeam.UseWriteTx(ctx)
AddUserTx(ctx.Tx, req, hash)
resp.Users = fetchUsers(ctx.Tx)
generic.EnsureSliceNotNil(&resp.Users)
vbolt.TxCommit(ctx.Tx)
return
}
func ListUsers(ctx *vbeam.Context, req Empty) (resp UserListResponse, err error) {
resp.Users = fetchUsers(ctx.Tx)
generic.EnsureSliceNotNil(&resp.Users)
return
}