1
0
mirror of https://github.com/aclindsa/moneygo.git synced 2024-10-30 15:50:04 -04:00
moneygo/internal/handlers/users.go

217 lines
5.0 KiB
Go
Raw Normal View History

package handlers
2015-06-25 22:36:58 -04:00
import (
2017-06-21 21:25:38 -04:00
"errors"
2015-06-25 22:36:58 -04:00
"fmt"
"github.com/aclindsa/moneygo/internal/models"
2015-06-25 22:36:58 -04:00
"log"
"net/http"
)
type UserExistsError struct{}
func (ueu UserExistsError) Error() string {
return "User exists"
}
func GetUser(tx *Tx, userid int64) (*models.User, error) {
var u models.User
2015-06-25 22:36:58 -04:00
err := tx.SelectOne(&u, "SELECT * from users where UserId=?", userid)
2015-06-25 22:36:58 -04:00
if err != nil {
return nil, err
}
return &u, nil
}
func GetUserByUsername(tx *Tx, username string) (*models.User, error) {
var u models.User
2015-06-25 22:36:58 -04:00
err := tx.SelectOne(&u, "SELECT * from users where Username=?", username)
2015-06-25 22:36:58 -04:00
if err != nil {
return nil, err
}
return &u, nil
}
func InsertUser(tx *Tx, u *models.User) error {
2017-06-21 21:25:38 -04:00
security_template := FindCurrencyTemplate(u.DefaultCurrency)
if security_template == nil {
return errors.New("Invalid ISO4217 Default Currency")
}
existing, err := tx.SelectInt("SELECT count(*) from users where Username=?", u.Username)
2015-06-25 22:36:58 -04:00
if err != nil {
return err
}
if existing > 0 {
return UserExistsError{}
}
err = tx.Insert(u)
2015-06-25 22:36:58 -04:00
if err != nil {
return err
}
2017-06-21 21:25:38 -04:00
// Copy the security template and give it our new UserId
2017-12-03 06:38:22 -05:00
var security models.Security
2017-06-21 21:25:38 -04:00
security = *security_template
security.UserId = u.UserId
err = InsertSecurity(tx, &security)
2017-06-21 21:25:38 -04:00
if err != nil {
return err
}
// Update the user's DefaultCurrency to our new SecurityId
u.DefaultCurrency = security.SecurityId
count, err := tx.Update(u)
2017-06-21 21:25:38 -04:00
if err != nil {
return err
} else if count != 1 {
return errors.New("Would have updated more than one user")
}
2015-06-25 22:36:58 -04:00
return nil
}
func GetUserFromSession(tx *Tx, r *http.Request) (*models.User, error) {
s, err := GetSession(tx, r)
2015-06-25 22:36:58 -04:00
if err != nil {
return nil, err
}
return GetUser(tx, s.UserId)
2015-06-25 22:36:58 -04:00
}
func UpdateUser(tx *Tx, u *models.User) error {
security, err := GetSecurity(tx, u.DefaultCurrency, u.UserId)
2017-06-21 21:25:38 -04:00
if err != nil {
return err
} else if security.UserId != u.UserId || security.SecurityId != u.DefaultCurrency {
return errors.New("UserId and DefaultCurrency don't match the fetched security")
2017-12-03 06:38:22 -05:00
} else if security.Type != models.Currency {
2017-06-21 21:25:38 -04:00
return errors.New("New DefaultCurrency security is not a currency")
}
count, err := tx.Update(u)
2017-06-21 21:25:38 -04:00
if err != nil {
return err
} else if count != 1 {
return errors.New("Would have updated more than one user")
}
return nil
}
func DeleteUser(tx *Tx, u *models.User) error {
count, err := tx.Delete(u)
if err != nil {
return err
}
if count != 1 {
return fmt.Errorf("No user to delete")
}
_, err = tx.Exec("DELETE FROM prices WHERE prices.SecurityId IN (SELECT securities.SecurityId FROM securities WHERE securities.UserId=?)", u.UserId)
if err != nil {
return err
}
_, err = tx.Exec("DELETE FROM splits WHERE splits.TransactionId IN (SELECT transactions.TransactionId FROM transactions WHERE transactions.UserId=?)", u.UserId)
if err != nil {
return err
}
_, err = tx.Exec("DELETE FROM transactions WHERE transactions.UserId=?", u.UserId)
if err != nil {
return err
}
_, err = tx.Exec("DELETE FROM securities WHERE securities.UserId=?", u.UserId)
if err != nil {
return err
}
_, err = tx.Exec("DELETE FROM accounts WHERE accounts.UserId=?", u.UserId)
if err != nil {
return err
}
_, err = tx.Exec("DELETE FROM reports WHERE reports.UserId=?", u.UserId)
if err != nil {
return err
}
_, err = tx.Exec("DELETE FROM sessions WHERE sessions.UserId=?", u.UserId)
if err != nil {
return err
}
return nil
}
func UserHandler(r *http.Request, context *Context) ResponseWriterWriter {
2015-06-25 22:36:58 -04:00
if r.Method == "POST" {
var user models.User
if err := ReadJSON(r, &user); err != nil {
return NewError(3 /*Invalid Request*/)
2015-06-25 22:36:58 -04:00
}
user.UserId = -1
user.HashPassword()
err := InsertUser(context.Tx, &user)
2015-06-25 22:36:58 -04:00
if err != nil {
if _, ok := err.(UserExistsError); ok {
return NewError(4 /*User Exists*/)
2015-06-25 22:36:58 -04:00
} else {
log.Print(err)
return NewError(999 /*Internal Error*/)
2015-06-25 22:36:58 -04:00
}
}
return ResponseWrapper{201, &user}
2015-06-25 22:36:58 -04:00
} else {
user, err := GetUserFromSession(context.Tx, r)
2015-06-25 22:36:58 -04:00
if err != nil {
return NewError(1 /*Not Signed In*/)
2015-06-25 22:36:58 -04:00
}
userid, err := context.NextID()
2015-06-25 22:36:58 -04:00
if err != nil {
return NewError(3 /*Invalid Request*/)
2015-06-25 22:36:58 -04:00
}
if userid != user.UserId {
return NewError(2 /*Unauthorized Access*/)
2015-06-25 22:36:58 -04:00
}
if r.Method == "GET" {
return user
2015-06-25 22:36:58 -04:00
} else if r.Method == "PUT" {
// Save old PWHash in case the new password is bogus
old_pwhash := user.PasswordHash
if err := ReadJSON(r, &user); err != nil || user.UserId != userid {
return NewError(3 /*Invalid Request*/)
2015-06-25 22:36:58 -04:00
}
// If the user didn't create a new password, keep their old one
if user.Password != models.BogusPassword {
2015-06-25 22:36:58 -04:00
user.HashPassword()
} else {
user.Password = ""
user.PasswordHash = old_pwhash
}
err = UpdateUser(context.Tx, user)
2017-06-21 21:25:38 -04:00
if err != nil {
2015-06-25 22:36:58 -04:00
log.Print(err)
return NewError(999 /*Internal Error*/)
2015-06-25 22:36:58 -04:00
}
return user
2015-06-25 22:36:58 -04:00
} else if r.Method == "DELETE" {
err := DeleteUser(context.Tx, user)
if err != nil {
2015-06-25 22:36:58 -04:00
log.Print(err)
return NewError(999 /*Internal Error*/)
2015-06-25 22:36:58 -04:00
}
return SuccessWriter{}
2015-06-25 22:36:58 -04:00
}
}
return NewError(3 /*Invalid Request*/)
2015-06-25 22:36:58 -04:00
}