hydra-passwordless/internal/route/verify.go

83 lines
1.8 KiB
Go
Raw Normal View History

2020-05-20 11:13:14 +02:00
package route
import (
"net/http"
"forge.cadoles.com/wpetit/hydra-passwordless/internal/hydra"
"forge.cadoles.com/wpetit/hydra-passwordless/internal/query"
"github.com/pkg/errors"
"gitlab.com/wpetit/goweb/cqrs"
"gitlab.com/wpetit/goweb/logger"
"gitlab.com/wpetit/goweb/middleware/container"
)
func handleVerification(w http.ResponseWriter, r *http.Request) {
ctn := container.Must(r.Context())
bus := cqrs.Must(ctn)
token := r.URL.Query().Get("token")
if token == "" {
http.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
return
}
qry := &query.VerifyUserRequest{
Token: token,
}
ctx := r.Context()
result, err := bus.Query(ctx, qry)
if err != nil {
logger.Error(ctx, "could not verify token", logger.E(err))
2020-05-26 11:11:53 +02:00
err := renderErrorPage(
w, r,
http.StatusBadRequest,
"Lien invalide",
"Le lien de connexion utilisé est invalide ou a expiré.",
)
if err != nil {
panic(errors.Wrapf(err, "could not render '%s' page", r.URL.Path))
}
return
2020-05-20 11:13:14 +02:00
}
verifyUserData, ok := result.Data().(*query.VerifyUserData)
if !ok {
panic(errors.New("unexpected result data"))
}
hydr := hydra.Must(ctn)
accept := &hydra.AcceptLoginRequest{
2020-05-26 11:11:53 +02:00
Subject: verifyUserData.Email,
Remember: verifyUserData.RememberMe,
RememberFor: 3600,
Context: map[string]interface{}{
"email": verifyUserData.Email,
},
2020-05-20 11:13:14 +02:00
}
res, err := hydr.AcceptLoginRequest(verifyUserData.Challenge, accept)
if err != nil {
logger.Error(ctx, "could not retrieve hydra accept response", logger.E(err))
err := renderErrorPage(
w, r,
http.StatusBadRequest,
"Lien invalide",
"Le lien de connexion utilisé est invalide ou a expiré.",
)
if err != nil {
panic(errors.Wrapf(err, "could not render '%s' page", r.URL.Path))
}
return
2020-05-20 11:13:14 +02:00
}
http.Redirect(w, r, res.RedirectTo, http.StatusSeeOther)
}