mirror of
https://bitbucket.org/wisemapping/wisemapping-open-source.git
synced 2024-06-03 00:54:32 +02:00
144 lines
5.4 KiB
Java
144 lines
5.4 KiB
Java
/*
|
|
* Copyright [2022] [wisemapping]
|
|
*
|
|
* Licensed under WiseMapping Public License, Version 1.0 (the "License").
|
|
* It is basically the Apache License, Version 2.0 (the "License") plus the
|
|
* "powered by wisemapping" text requirement on every single page;
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the license at
|
|
*
|
|
* http://www.wisemapping.org/license
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package com.wisemapping.rest;
|
|
|
|
import com.wisemapping.exceptions.EmailNotExistsException;
|
|
import com.wisemapping.exceptions.WiseMappingException;
|
|
import com.wisemapping.model.AuthenticationType;
|
|
import com.wisemapping.model.User;
|
|
import com.wisemapping.rest.model.RestResetPasswordResponse;
|
|
import com.wisemapping.rest.model.RestUserRegistration;
|
|
import com.wisemapping.service.*;
|
|
import com.wisemapping.validator.Messages;
|
|
import com.wisemapping.validator.UserValidator;
|
|
import org.apache.logging.log4j.LogManager;
|
|
import org.apache.logging.log4j.Logger;
|
|
import org.jetbrains.annotations.NotNull;
|
|
import org.springframework.beans.factory.annotation.Autowired;
|
|
import org.springframework.beans.factory.annotation.Qualifier;
|
|
import org.springframework.beans.factory.annotation.Value;
|
|
import org.springframework.http.HttpStatus;
|
|
import org.springframework.security.authentication.AuthenticationManager;
|
|
import org.springframework.stereotype.Controller;
|
|
import org.springframework.validation.BindException;
|
|
import org.springframework.web.bind.annotation.*;
|
|
|
|
import javax.servlet.http.HttpServletRequest;
|
|
import javax.servlet.http.HttpServletResponse;
|
|
|
|
import java.util.Arrays;
|
|
import java.util.List;
|
|
|
|
@Controller
|
|
@CrossOrigin
|
|
public class UserController extends BaseController {
|
|
@Qualifier("userService")
|
|
@Autowired
|
|
private UserService userService;
|
|
|
|
@Autowired
|
|
private RecaptchaService captchaService;
|
|
|
|
@Qualifier("authenticationManager")
|
|
@Autowired
|
|
private AuthenticationManager authManager;
|
|
|
|
@Value("${google.recaptcha2.enabled}")
|
|
private Boolean recatchaEnabled;
|
|
|
|
@Value("${accounts.exclusion.domain:''}")
|
|
private String domainBanExclusion;
|
|
|
|
private static final Logger logger = LogManager.getLogger();
|
|
private static final String REAL_IP_ADDRESS_HEADER = "X-Real-IP";
|
|
|
|
@RequestMapping(method = RequestMethod.POST, value = "/users", produces = { "application/json" })
|
|
@ResponseStatus(value = HttpStatus.CREATED)
|
|
public void registerUser(@RequestBody RestUserRegistration registration, @NotNull HttpServletRequest request,
|
|
@NotNull HttpServletResponse response) throws WiseMappingException, BindException {
|
|
logger.debug("Register new user:" + registration.getEmail());
|
|
|
|
// If tomcat is behind a reverse proxy, ip needs to be found in other header.
|
|
String remoteIp = request.getHeader(REAL_IP_ADDRESS_HEADER);
|
|
if (remoteIp == null || remoteIp.isEmpty()) {
|
|
remoteIp = request.getRemoteAddr();
|
|
}
|
|
logger.debug("Remote address" + remoteIp);
|
|
|
|
verify(registration, remoteIp);
|
|
|
|
final User user = new User();
|
|
user.setEmail(registration.getEmail().trim());
|
|
user.setFirstname(registration.getFirstname());
|
|
user.setLastname(registration.getLastname());
|
|
user.setPassword(registration.getPassword());
|
|
|
|
user.setAuthenticationType(AuthenticationType.DATABASE);
|
|
userService.createUser(user, false, true);
|
|
response.setHeader("Location", "/service/users/" + user.getId());
|
|
}
|
|
|
|
@RequestMapping(method = RequestMethod.PUT, value = "/users/resetPassword", produces = { "application/json" })
|
|
@ResponseStatus(value = HttpStatus.OK)
|
|
public RestResetPasswordResponse resetPassword(@RequestParam String email) throws InvalidAuthSchemaException, EmailNotExistsException {
|
|
try {
|
|
return userService.resetPassword(email);
|
|
} catch (InvalidUserEmailException e) {
|
|
throw new EmailNotExistsException(e);
|
|
}
|
|
}
|
|
|
|
private void verify(@NotNull final RestUserRegistration registration, @NotNull String remoteAddress)
|
|
throws BindException {
|
|
|
|
final BindException errors = new RegistrationException(registration, "registration");
|
|
final UserValidator validator = new UserValidator();
|
|
validator.setUserService(userService);
|
|
validator.validate(registration, errors);
|
|
|
|
// If captcha is enabled, generate it ...
|
|
if (recatchaEnabled) {
|
|
final String recaptcha = registration.getRecaptcha();
|
|
if (recaptcha != null) {
|
|
final String reCaptchaResponse = captchaService.verifyRecaptcha(remoteAddress, recaptcha);
|
|
if (reCaptchaResponse != null && !reCaptchaResponse.isEmpty()) {
|
|
errors.rejectValue("recaptcha", reCaptchaResponse);
|
|
}
|
|
} else {
|
|
errors.rejectValue("recaptcha", Messages.CAPTCHA_LOADING_ERROR);
|
|
}
|
|
} else {
|
|
logger.warn("captchaEnabled is enabled.Recommend to enable it for production environments.");
|
|
}
|
|
|
|
if (errors.hasErrors()) {
|
|
throw errors;
|
|
}
|
|
|
|
// Is excluded ?.
|
|
final List<String> excludedDomains = Arrays.asList(domainBanExclusion.split(","));
|
|
final String emailDomain = registration.getEmail().split("@")[1];
|
|
if (excludedDomains.contains(emailDomain)) {
|
|
throw new IllegalArgumentException(
|
|
"Email is part of ban exclusion list due to abuse. Please, contact site admin if you think this is an error."
|
|
+ emailDomain);
|
|
}
|
|
}
|
|
}
|