Support email verification.
The bulk of this commit is auto-modifying files to export variables (mostly our
request error types and our response type) so that they can be reused in a Go
client for that API.
We also implement the beginnings of a Go client for that API, implementing the
bare minimum we need for our immediate purposes: the ability to retrieve
information about a Login.
This, of course, means we need an API endpoint that will return information
about a Login, which in turn required us to implement a GetLogin method in our
profileStore. Which got in-memory and postgres implementations.
That done, we could add the Verification field and Verified field to the Login
type, to keep track of whether we've verified the user's ownership of those
communication methods (if the Login is, in fact, a communication method). This
required us to update sql/postgres_init.sql to account for the new fields we're
tracking. It also means that when creating a Login, we had to generate a UUID to
use as the Verification field.
To make things complete, we needed a verifyLogin method on the profileStore to
mark a Login as verified. That, in turn, required an endpoint to control this
through the API. While doing so, I lumped things together in an UpdateLogin
handler just so we could reuse the endpoint and logic when resending a
verification email that may have never reached the user, for whatever reason
(the quintessential "send again" button).
Finally, we implemented an email_verification listener that will pull
email_verification events off NSQ, check for the requisite data integrity, and
use mailgun to email out a verification/welcome email.
9 ErrNoScopeStore = errors.New("scopeStore not set in Context")
10 ErrScopeNotFound = errors.New("scope not found")
11 ErrScopeAlreadyExists = errors.New("scope already exists")
14 // Scope represents a limit on the access that a grant provides.
21 func (s *Scope) ApplyChange(change ScopeChange) {
22 if change.Name != nil {
25 if change.Description != nil {
26 s.Description = *change.Description
32 func (s Scopes) Len() int {
36 func (s Scopes) Swap(i, j int) {
37 s[i], s[j] = s[j], s[i]
40 func (s Scopes) Less(i, j int) bool {
41 return s[i].ID < s[j].ID
44 func (s Scopes) Strings() []string {
45 res := make([]string, len(s))
46 for pos, scope := range s {
52 func stringsToScopes(s []string) Scopes {
53 res := make(Scopes, len(s))
54 for pos, scope := range s {
55 res[pos] = Scope{ID: scope}
60 // ScopeChange represents a change to a Scope.
61 type ScopeChange struct {
66 func (s ScopeChange) Empty() bool {
67 return s.Name == nil && s.Description == nil
70 type scopeStore interface {
71 createScopes(scopes []Scope) error
72 getScopes(ids []string) ([]Scope, error)
73 updateScope(id string, change ScopeChange) error
74 removeScopes(ids []string) error
75 listScopes() ([]Scope, error)
78 func (m *memstore) createScopes(scopes []Scope) error {
80 defer m.scopeLock.Unlock()
82 for _, scope := range scopes {
83 if _, ok := m.scopes[scope.ID]; ok {
84 return ErrScopeAlreadyExists
87 for _, scope := range scopes {
88 m.scopes[scope.ID] = scope
93 func (m *memstore) getScopes(ids []string) ([]Scope, error) {
95 defer m.scopeLock.RUnlock()
98 for _, id := range ids {
99 scope, ok := m.scopes[id]
103 scopes = append(scopes, scope)
105 sorted := Scopes(scopes)
111 func (m *memstore) updateScope(id string, change ScopeChange) error {
113 defer m.scopeLock.Unlock()
115 scope, ok := m.scopes[id]
117 return ErrScopeNotFound
119 scope.ApplyChange(change)
124 func (m *memstore) removeScopes(ids []string) error {
126 defer m.scopeLock.Unlock()
128 for _, id := range ids {
129 if _, ok := m.scopes[id]; !ok {
130 return ErrScopeNotFound
133 for _, id := range ids {
139 func (m *memstore) listScopes() ([]Scope, error) {
141 defer m.scopeLock.RUnlock()
144 for _, scope := range m.scopes {
145 scopes = append(scopes, scope)
147 sorted := Scopes(scopes)