Commit graph

165 commits

Author SHA1 Message Date
Daniel Krol
a40f46dc08 remove test failure for now 2022-08-19 20:20:48 -04:00
Daniel Krol
da8210d66a try fixing path 2022-08-19 20:20:48 -04:00
Daniel Krol
40599c6acf See about creating an artifact 2022-08-19 20:20:48 -04:00
Daniel Krol
19129fb9bd Add Github workflow 2022-08-19 20:20:48 -04:00
Daniel Krol
0cd0bee5be goreleaser try it out 2022-08-19 16:52:50 -04:00
Daniel Krol
aa691dbc09 Use verify_token=null as verified to avoid unique constraint
We were using verify_token="" to mean that the user was verified. We need a unique constraint on verify_token to prevent two users from getting the same verify link in their email. This means that if we have two verified users, they will both have verify_token="", which triggers the unique constraint. Oops. However, null is an exception to unique constraints, so we're now using that instead to mean verified.
2022-08-13 22:15:19 -04:00
Daniel Krol
e2893c13e3 Add test to confirm that we can create two accounts on the server. 2022-08-13 19:37:54 -04:00
Daniel Krol
d1c5685045 Port 443 for Caddy so we have nice links in emails. No need for weird ports. 2022-08-13 15:03:06 -04:00
Daniel Krol
0e36bebdae Mailgun integration 2022-08-13 14:26:04 -04:00
Daniel Krol
58cefa4c1b test client: update_secrets -> update_derived_secrets
It doesn't update the root password.
2022-08-09 17:46:11 -04:00
Daniel Krol
126f600cac Note for auditor 2022-08-09 12:01:56 -04:00
Daniel Krol
6c9b9d07b2 Pass root password directly to SDK again.
Related to this: https://github.com/lbryio/wallet-sync-server/issues/4

Passing in a KDF output messes with the existing CLI UI for wallet locking. Also the SDK has its own encryption from password, may as well use it.
2022-08-09 10:16:48 -04:00
Daniel Krol
165bcf1964 scrypt inputs to consts, and fmt 2022-08-04 20:26:01 -04:00
Daniel Krol
f5650e8d96 Hosting configs FOR DEV ONLY to let lbry.id work out of the box again 2022-08-01 11:46:06 -04:00
Daniel Krol
1e37b0e7b1 Add mailgun env vars 2022-07-31 19:23:21 -04:00
Daniel Krol
510dfe2b96 Integration test (sort of) for account verify 2022-07-31 16:43:36 -04:00
Daniel Krol
f60e5659b6 Don't update verify tokens if the account is already verified 2022-07-31 14:13:30 -04:00
Daniel Krol
39144aa3c0 Comment assumptions on store functions 2022-07-31 13:54:40 -04:00
Daniel Krol
aa1361a5fa Human-friendly output for verify account endpoint 2022-07-31 12:59:46 -04:00
Daniel Krol
ea3b04eff6 store.VerifyToken 2022-07-31 12:42:03 -04:00
Daniel Krol
2dd3019b08 store.UpdateVerifyTokenString 2022-07-31 12:26:03 -04:00
Daniel Krol
eabfa9d54c No password change for unverified accounts 2022-07-30 23:09:33 -04:00
Daniel Krol
4a205bbda7 GetUserId - Return error if account unverified 2022-07-30 15:06:27 -04:00
Daniel Krol
dee2882fe9 Verify token db fields, CreateAccount changes 2022-07-30 14:24:33 -04:00
Daniel Krol
3b44a55f5a Connect the latest handlers to endpoints. 2022-07-29 20:53:28 -04:00
Daniel Krol
5ffcddf8f7 Endpoint to re-send verify token string 2022-07-29 20:49:00 -04:00
Daniel Krol
c8620f7c8c Comment 2022-07-29 20:34:47 -04:00
Daniel Krol
19396e9797 Make error message more accurate. Rename test. 2022-07-29 15:52:23 -04:00
Daniel Krol
e6f5628a94 Note for when getting auth token fails 2022-07-29 14:34:54 -04:00
Daniel Krol
4ecf8538be log.Printf istead fmt.Printf to be uniform 2022-07-29 13:43:27 -04:00
Daniel Krol
be0e022c92 Check/log email configs on startup. 2022-07-29 13:42:25 -04:00
Daniel Krol
f2ba31d972 Warning for self-hosting users 2022-07-29 13:38:26 -04:00
Daniel Krol
0948e95932 Forgot the mail package 2022-07-29 09:42:12 -04:00
Daniel Krol
fcbab29d06 Test make new verify token 2022-07-29 09:14:25 -04:00
Daniel Krol
6672175a25 Server test/implement send verify-account email 2022-07-27 19:45:09 -04:00
Daniel Krol
f15875c4a6 Verify account endpoint 2022-07-26 16:36:57 -04:00
Daniel Krol
0c6964df0e Oops delete way outdated comment 2022-07-26 12:48:44 -04:00
Daniel Krol
2f4ffd752c Temporarily fix integration tests for email verify
Require email verify. As of now we don't have the "verified" bit in the storage layer so it passes. Once we put that in, we'll have to go back and add a call to the verification endpoint.
2022-07-26 11:21:55 -04:00
Daniel Krol
aee351a2b1 Don't allow password change for unverified accounts
Mainly because wallet change is tied up in it
2022-07-26 11:18:43 -04:00
Daniel Krol
5985631410 Don't hand out auth tokens if they're not verified 2022-07-26 10:53:31 -04:00
Daniel Krol
55db62e2f9 Register endpoint handles "verified" status
Based on the verification mode specified in env. The db doesn't do anything with it yet.
2022-07-26 10:16:44 -04:00
Daniel Krol
832778ffd1 env: rename things, export type 2022-07-25 18:02:25 -04:00
Daniel Krol
f792ba5846 env package provides config values 2022-07-24 16:03:37 -04:00
Daniel Krol
ade526f4f9 Create environmental var package 2022-07-23 19:03:51 -04:00
Daniel Krol
36659ef720 More unique metric name; comment 2022-07-23 16:47:18 -04:00
Daniel Krol
41b14dad44 Prometheus - track wallet requests 2022-07-22 19:49:30 -04:00
Daniel Krol
3ff36f169c Add prometheus packages 2022-07-22 19:29:08 -04:00
Daniel Krol
4f8a648cc4 Notes for auditor. 2022-07-22 16:37:27 -04:00
Daniel Krol
aefda1245b Make emails case insensitive (for now).
Prevents duplicate accounts. Also allows case insensitive search (user id, salt seed, etc) while still having an index. This is done by storing normalized as a separate field from originally formated (which we'll use for sending emails, etc).
2022-07-22 16:29:03 -04:00
Daniel Krol
f10cc8aa26 Salt Seed, used to generate secrets on client 2022-07-21 19:10:16 -04:00