@ -14,6 +14,7 @@ services:
|
|||||||
redis:
|
redis:
|
||||||
image: redis:7.4.0
|
image: redis:7.4.0
|
||||||
container_name: redis-filekeeper
|
container_name: redis-filekeeper
|
||||||
|
command: ["redis-server", "--requirepass", "VerySecretPassword"]
|
||||||
networks:
|
networks:
|
||||||
- filekeeper
|
- filekeeper
|
||||||
|
|
||||||
@ -23,9 +24,9 @@ services:
|
|||||||
environment:
|
environment:
|
||||||
SERVER_HOST: 0.0.0.0
|
SERVER_HOST: 0.0.0.0
|
||||||
SERVER_PORT: 8000
|
SERVER_PORT: 8000
|
||||||
DOMAIN: filekeeper.fossy.my.id
|
DOMAIN: filekeeper.example.com
|
||||||
CORS_PROTO: https
|
CORS_PROTO: https
|
||||||
CORS_LIST: filekeeper.fossy.my.id:443,fossy.my.id:443
|
CORS_LIST: filekeeper.example.com:443,example.com:443
|
||||||
CORS_METHODS: POST,GET
|
CORS_METHODS: POST,GET
|
||||||
DB_HOST: postgres-filekeeper
|
DB_HOST: postgres-filekeeper
|
||||||
DB_PORT: 5432
|
DB_PORT: 5432
|
||||||
@ -48,7 +49,9 @@ services:
|
|||||||
- traefik
|
- traefik
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.filekeeper.rule=Host(`filekeeper-staging.com`)"
|
- "traefik.http.routers.filekeeper.rule=Host(`filekeeper.example.com`)"
|
||||||
|
- "traefik.http.routers.filekeeper.entrypoints=websecure"
|
||||||
|
- "traefik.http.routers.filekeeper.tls.certresolver=myresolver"
|
||||||
- "traefik.http.services.filekeeper.loadbalancer.server.port=8000"
|
- "traefik.http.services.filekeeper.loadbalancer.server.port=8000"
|
||||||
depends_on:
|
depends_on:
|
||||||
- postgres-server
|
- postgres-server
|
||||||
@ -61,18 +64,18 @@ services:
|
|||||||
command:
|
command:
|
||||||
- "--api.insecure=true"
|
- "--api.insecure=true"
|
||||||
- "--providers.docker=true"
|
- "--providers.docker=true"
|
||||||
- "--entrypoints.web.address=:80"
|
- "--providers.docker.exposedbydefault=false"
|
||||||
- "--entrypoints.websecure.address=:443"
|
- "--entrypoints.websecure.address=:443"
|
||||||
- "--certificatesresolvers.le.acme.tlschallenge=true"
|
- "--certificatesresolvers.myresolver.acme.tlschallenge=true"
|
||||||
- "--certificatesresolvers.le.acme.email=your-email@example.com"
|
- "--certificatesresolvers.myresolver.acme.email=bagas@example.com"
|
||||||
- "--certificatesresolvers.le.acme.storage=/letsencrypt/acme.json"
|
- "--certificatesresolvers.myresolver.acme.storage=/letsencrypt/acme.json"
|
||||||
ports:
|
ports:
|
||||||
- "80:80"
|
- "80:80"
|
||||||
- "443:443"
|
- "443:443"
|
||||||
- "8080:8080"
|
- "8080:8080"
|
||||||
volumes:
|
volumes:
|
||||||
- "/var/run/docker.sock:/var/run/docker.sock"
|
- "/var/run/docker.sock:/var/run/docker.sock"
|
||||||
- "./letsencrypt:/letsencrypt"
|
- "/opt/letsencrypt:/letsencrypt"
|
||||||
networks:
|
networks:
|
||||||
- filekeeper
|
- filekeeper
|
||||||
- traefik
|
- traefik
|
||||||
|
@ -3,13 +3,15 @@ package signupHandler
|
|||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"github.com/fossyy/filekeeper/app"
|
"github.com/fossyy/filekeeper/app"
|
||||||
"github.com/fossyy/filekeeper/utils"
|
"github.com/fossyy/filekeeper/utils"
|
||||||
"github.com/fossyy/filekeeper/view/client/email"
|
"github.com/fossyy/filekeeper/view/client/email"
|
||||||
signupView "github.com/fossyy/filekeeper/view/client/signup"
|
signupView "github.com/fossyy/filekeeper/view/client/signup"
|
||||||
|
"github.com/redis/go-redis/v9"
|
||||||
"net/http"
|
"net/http"
|
||||||
"sync"
|
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/fossyy/filekeeper/types"
|
"github.com/fossyy/filekeeper/types"
|
||||||
@ -20,41 +22,9 @@ import (
|
|||||||
type UnverifiedUser struct {
|
type UnverifiedUser struct {
|
||||||
User *models.User
|
User *models.User
|
||||||
Code string
|
Code string
|
||||||
mu sync.Mutex
|
|
||||||
CreateTime time.Time
|
CreateTime time.Time
|
||||||
}
|
}
|
||||||
|
|
||||||
var VerifyUser map[string]*UnverifiedUser
|
|
||||||
var VerifyEmail map[string]string
|
|
||||||
|
|
||||||
func init() {
|
|
||||||
VerifyUser = make(map[string]*UnverifiedUser)
|
|
||||||
VerifyEmail = make(map[string]string)
|
|
||||||
|
|
||||||
ticker := time.NewTicker(time.Minute)
|
|
||||||
go func() {
|
|
||||||
for {
|
|
||||||
<-ticker.C
|
|
||||||
currentTime := time.Now()
|
|
||||||
cacheClean := 0
|
|
||||||
cleanID := utils.GenerateRandomString(10)
|
|
||||||
app.Server.Logger.Info(fmt.Sprintf("Cache cleanup [signup] [%s] initiated at %02d:%02d:%02d", cleanID, currentTime.Hour(), currentTime.Minute(), currentTime.Second()))
|
|
||||||
|
|
||||||
for _, data := range VerifyUser {
|
|
||||||
data.mu.Lock()
|
|
||||||
if currentTime.Sub(data.CreateTime) > time.Minute*10 {
|
|
||||||
delete(VerifyUser, data.Code)
|
|
||||||
delete(VerifyEmail, data.User.Email)
|
|
||||||
cacheClean++
|
|
||||||
}
|
|
||||||
data.mu.Unlock()
|
|
||||||
}
|
|
||||||
|
|
||||||
app.Server.Logger.Info(fmt.Sprintf("Cache cleanup [signup] [%s] completed: %d entries removed. Finished at %s", cleanID, cacheClean, time.Since(currentTime)))
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
}
|
|
||||||
|
|
||||||
func GET(w http.ResponseWriter, r *http.Request) {
|
func GET(w http.ResponseWriter, r *http.Request) {
|
||||||
component := signupView.Main("Filekeeper - Sign up Page", types.Message{
|
component := signupView.Main("Filekeeper - Sign up Page", types.Message{
|
||||||
Code: 3,
|
Code: 3,
|
||||||
@ -136,16 +106,18 @@ func verifyEmail(user *models.User) error {
|
|||||||
var buffer bytes.Buffer
|
var buffer bytes.Buffer
|
||||||
var code string
|
var code string
|
||||||
|
|
||||||
code = VerifyEmail[user.Email]
|
storedCode, err := app.Server.Cache.GetCache(context.Background(), "VerificationCode:"+user.Email)
|
||||||
userData, ok := VerifyUser[code]
|
if err != nil {
|
||||||
|
if errors.Is(err, redis.Nil) {
|
||||||
if !ok {
|
|
||||||
code = utils.GenerateRandomString(64)
|
code = utils.GenerateRandomString(64)
|
||||||
} else {
|
} else {
|
||||||
code = userData.Code
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
code = storedCode
|
||||||
}
|
}
|
||||||
|
|
||||||
err := emailView.RegistrationEmail(user.Username, fmt.Sprintf("https://%s/signup/verify/%s", utils.Getenv("DOMAIN"), code)).Render(context.Background(), &buffer)
|
err = emailView.RegistrationEmail(user.Username, fmt.Sprintf("https://%s/signup/verify/%s", utils.Getenv("DOMAIN"), code)).Render(context.Background(), &buffer)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
@ -155,13 +127,25 @@ func verifyEmail(user *models.User) error {
|
|||||||
Code: code,
|
Code: code,
|
||||||
CreateTime: time.Now(),
|
CreateTime: time.Now(),
|
||||||
}
|
}
|
||||||
|
newUnverifiedUser, err := json.Marshal(unverifiedUser)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
VerifyUser[code] = &unverifiedUser
|
err = app.Server.Cache.SetCache(context.Background(), "UnverifiedUser:"+code, newUnverifiedUser, 10*time.Minute)
|
||||||
VerifyEmail[user.Email] = code
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
err = app.Server.Cache.SetCache(context.Background(), "VerificationCode:"+user.Email, code, 10*time.Minute)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
err = app.Server.Mail.Send(user.Email, "Account Registration Verification", buffer.String())
|
err = app.Server.Mail.Send(user.Email, "Account Registration Verification", buffer.String())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
@ -1,28 +1,45 @@
|
|||||||
package signupVerifyHandler
|
package signupVerifyHandler
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
"github.com/fossyy/filekeeper/app"
|
"github.com/fossyy/filekeeper/app"
|
||||||
|
signupHandler "github.com/fossyy/filekeeper/handler/signup"
|
||||||
signupView "github.com/fossyy/filekeeper/view/client/signup"
|
signupView "github.com/fossyy/filekeeper/view/client/signup"
|
||||||
|
"github.com/redis/go-redis/v9"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
signupHandler "github.com/fossyy/filekeeper/handler/signup"
|
|
||||||
"github.com/fossyy/filekeeper/types"
|
"github.com/fossyy/filekeeper/types"
|
||||||
)
|
)
|
||||||
|
|
||||||
func GET(w http.ResponseWriter, r *http.Request) {
|
func GET(w http.ResponseWriter, r *http.Request) {
|
||||||
code := r.PathValue("code")
|
code := r.PathValue("code")
|
||||||
data, ok := signupHandler.VerifyUser[code]
|
|
||||||
|
|
||||||
if !ok {
|
userDataStr, err := app.Server.Cache.GetCache(context.Background(), "UnverifiedUser:"+code)
|
||||||
|
if err != nil {
|
||||||
|
if errors.Is(err, redis.Nil) {
|
||||||
w.WriteHeader(http.StatusNotFound)
|
w.WriteHeader(http.StatusNotFound)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
app.Server.Logger.Error(err.Error())
|
||||||
|
w.WriteHeader(http.StatusInternalServerError)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
err := app.Server.Database.CreateUser(data.User)
|
var unverifiedUser signupHandler.UnverifiedUser
|
||||||
|
err = json.Unmarshal([]byte(userDataStr), &unverifiedUser)
|
||||||
|
if err != nil {
|
||||||
|
w.WriteHeader(http.StatusInternalServerError)
|
||||||
|
app.Server.Logger.Error(err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
err = app.Server.Database.CreateUser(unverifiedUser.User)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
component := signupView.Main("Filekeeper - Sign up Page", types.Message{
|
component := signupView.Main("Filekeeper - Sign up Page", types.Message{
|
||||||
Code: 0,
|
Code: 0,
|
||||||
Message: "Email or Username has been registered",
|
Message: "Email or Username has already been registered",
|
||||||
})
|
})
|
||||||
err := component.Render(r.Context(), w)
|
err := component.Render(r.Context(), w)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -33,11 +50,17 @@ func GET(w http.ResponseWriter, r *http.Request) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
delete(signupHandler.VerifyUser, code)
|
err = app.Server.Cache.DeleteCache(context.Background(), "UnverifiedUser:"+code)
|
||||||
delete(signupHandler.VerifyEmail, data.User.Email)
|
if err != nil {
|
||||||
|
app.Server.Logger.Error(err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
err = app.Server.Cache.DeleteCache(context.Background(), "VerificationCode:"+unverifiedUser.User.Email)
|
||||||
|
if err != nil {
|
||||||
|
app.Server.Logger.Error(err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
component := signupView.VerifySuccess("Filekeeper - Verify Page")
|
component := signupView.VerifySuccess("Filekeeper - Verify Page")
|
||||||
|
|
||||||
err = component.Render(r.Context(), w)
|
err = component.Render(r.Context(), w)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
w.WriteHeader(http.StatusInternalServerError)
|
w.WriteHeader(http.StatusInternalServerError)
|
||||||
|
@ -39,7 +39,7 @@ func (r *Service) GetUser(ctx context.Context, email string) (*models.User, erro
|
|||||||
}
|
}
|
||||||
|
|
||||||
newUserJSON, _ := json.Marshal(user)
|
newUserJSON, _ := json.Marshal(user)
|
||||||
err = r.cache.SetCache(ctx, email, newUserJSON, time.Hour*24)
|
err = r.cache.SetCache(ctx, "UserCache:"+email, newUserJSON, time.Hour*12)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -54,7 +54,7 @@ func Create(values types.User) (*Session, error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
err = app.Server.Cache.SetCache(context.Background(), "Session:"+id, string(sessionData), time.Hour*24)
|
err = app.Server.Cache.SetCache(context.Background(), "Session:"+id, string(sessionData), time.Hour*24*7)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
@ -106,7 +106,7 @@ func AddSessionInfo(email string, sessionInfo *SessionInfo) error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
err = app.Server.Cache.SetCache(context.Background(), "UserSessionInfo:"+email+":"+sessionInfo.SessionID, string(sessionInfoData), 0)
|
err = app.Server.Cache.SetCache(context.Background(), "UserSessionInfo:"+email+":"+sessionInfo.SessionID, string(sessionInfoData), time.Hour*24*7)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user