package main import ( "errors" "net/http" "time" "greenlight.debuggingjon.dev/internal/data" "greenlight.debuggingjon.dev/internal/validator" ) func (app *application) registerUserHandler(w http.ResponseWriter, r *http.Request) { // Create an anonymous struct to hold the expected data from the request body. var input struct { Name string `json:"name"` Email string `json:"email"` Password string `json:"password"` } // Parse the request body into the anonymous struct. err := app.readJSON(w, r, &input) if err != nil { app.badRequestResponse(w, r, err) return } // Copy the data from the request body into a new User struct. Notice also that we // set the Activated field to false, which isn't strictly necessary because the // Activated field will have the zero-value of false by default. But setting this // explicitly helps to make our intentions clear to anyone reading the code. user := &data.User{ Name: input.Name, Email: input.Email, Activated: false, } // Use the Password.Set() method to generate and store the hashed and plaintext // passwords. err = user.Password.Set(input.Password) if err != nil { app.serverErrorResponse(w, r, err) return } v := validator.New() // Validate the user struct and return the error messages to the client if any of // the checks fail. if data.ValidateUser(v, user); !v.Valid() { app.failedValidationResponse(w, r, v.Errors) return } err = app.models.Users.Insert(user) if err != nil { switch { case errors.Is(err, data.ErrDuplicateEmail): v.AddError("email", "a user with this email address already exists") app.failedValidationResponse(w, r, v.Errors) default: app.serverErrorResponse(w, r, err) } return } // Add the "movies:read" permission for the new user. err = app.models.Permissions.AddForUser(user.ID, "movies:read") if err != nil { app.serverErrorResponse(w, r, err) return } // After the user record has been created in the database, generate a new activation // token for the user. token, err := app.models.Tokens.New(user.ID, 3*24*time.Hour, data.ScopeActivation) if err != nil { app.serverErrorResponse(w, r, err) return } app.background(func() { // As there are now multiple pieces of data that we want to pass to our email // templates, we create a map to act as a 'holding structure' for the data. This // contains the plaintext version of the activation token for the user, along // with their ID. data := map[string]any{ "activationToken": token.Plaintext, "userID": user.ID, } // Send the welcome email, passing in the map above as dynamic data. err = app.mailer.Send(user.Email, "user_welcome.tmpl", data) if err != nil { app.logger.PrintError(err, nil) } }) err = app.writeJSON(w, http.StatusAccepted, envelope{"user": user}, nil) if err != nil { app.serverErrorResponse(w, r, err) } } func (app *application) activateUserHandler(w http.ResponseWriter, r *http.Request) { // Parse the plaintext activation token from the request body. var input struct { TokenPlaintext string `json:"token"` } err := app.readJSON(w, r, &input) if err != nil { app.badRequestResponse(w, r, err) return } // Validate the plaintext token provided by the client. v := validator.New() if data.ValidateTokenPlaintext(v, input.TokenPlaintext); !v.Valid() { app.failedValidationResponse(w, r, v.Errors) return } // Retrieve the details of the user associated with the token using the // GetForToken() method (which we will create in a minute). If no matching record // is found, then we let the client know that the token they provided is not valid. user, err := app.models.Users.GetForToken(data.ScopeActivation, input.TokenPlaintext) if err != nil { switch { case errors.Is(err, data.ErrRecordNotFound): v.AddError("token", "invalid or expired activation token") app.failedValidationResponse(w, r, v.Errors) default: app.serverErrorResponse(w, r, err) } return } // Update the user's activation status. user.Activated = true // Save the updated user record in our database, checking for any edit conflicts in // the same way that we did for our movie records. err = app.models.Users.Update(user) if err != nil { switch { case errors.Is(err, data.ErrEditConflict): app.editConflictResponse(w, r) default: app.serverErrorResponse(w, r, err) } return } // If everything went successfully, then we delete all activation tokens for the // user. err = app.models.Tokens.DeleteAllForUser(data.ScopeActivation, user.ID) if err != nil { app.serverErrorResponse(w, r, err) return } // Send the updated user details to the client in a JSON response. err = app.writeJSON(w, http.StatusOK, envelope{"user": user}, nil) if err != nil { app.serverErrorResponse(w, r, err) } } // Verify the password reset token and set a new password for the user. func (app *application) updateUserPasswordHandler(w http.ResponseWriter, r *http.Request) { // Parse and validate the user's new password and password reset token. var input struct { Password string `json:"password"` TokenPlaintext string `json:"token"` } err := app.readJSON(w, r, &input) if err != nil { app.badRequestResponse(w, r, err) return } v := validator.New() data.ValidatePasswordPlaintext(v, input.Password) data.ValidateTokenPlaintext(v, input.TokenPlaintext) if !v.Valid() { app.failedValidationResponse(w, r, v.Errors) return } // Retrieve the details of the user associated with the password reset token, // returning an error message if no matching record was found. user, err := app.models.Users.GetForToken(data.ScopePasswordReset, input.TokenPlaintext) if err != nil { switch { case errors.Is(err, data.ErrRecordNotFound): v.AddError("token", "invalid or expired password reset token") app.failedValidationResponse(w, r, v.Errors) default: app.serverErrorResponse(w, r, err) } return } // Set the new password for the user. err = user.Password.Set(input.Password) if err != nil { app.serverErrorResponse(w, r, err) return } // Save the updated user record in our database, checking for any edit conflicts as // normal. err = app.models.Users.Update(user) if err != nil { switch { case errors.Is(err, data.ErrEditConflict): app.editConflictResponse(w, r) default: app.serverErrorResponse(w, r, err) } return } // If everything was successful, then delete all password reset tokens for the user. err = app.models.Tokens.DeleteAllForUser(data.ScopePasswordReset, user.ID) if err != nil { app.serverErrorResponse(w, r, err) return } // Send the user a confirmation message. env := envelope{"message": "your password was successfully reset"} err = app.writeJSON(w, http.StatusOK, env, nil) if err != nil { app.serverErrorResponse(w, r, err) } }