1
|
package eu.dnetlib.openaire.usermanagement;
|
2
|
|
3
|
import eu.dnetlib.openaire.user.utils.*;
|
4
|
import eu.dnetlib.openaire.usermanagement.utils.UrlConstructor;
|
5
|
import org.apache.commons.validator.routines.EmailValidator;
|
6
|
import org.apache.log4j.Logger;
|
7
|
import org.springframework.beans.factory.annotation.Autowired;
|
8
|
import org.springframework.beans.factory.annotation.Value;
|
9
|
import org.springframework.web.context.support.SpringBeanAutowiringSupport;
|
10
|
|
11
|
import javax.mail.MessagingException;
|
12
|
import javax.servlet.ServletConfig;
|
13
|
import javax.servlet.ServletException;
|
14
|
import javax.servlet.http.HttpServlet;
|
15
|
import javax.servlet.http.HttpServletRequest;
|
16
|
import javax.servlet.http.HttpServletResponse;
|
17
|
import java.io.IOException;
|
18
|
import java.io.PrintWriter;
|
19
|
import java.sql.Timestamp;
|
20
|
import java.util.Date;
|
21
|
import java.util.UUID;
|
22
|
|
23
|
/**
|
24
|
* Created by sofia on 20/10/2017.
|
25
|
*/
|
26
|
public class RegisterServlet extends HttpServlet {
|
27
|
|
28
|
@Autowired
|
29
|
private VerificationActions verificationActions;
|
30
|
|
31
|
@Autowired
|
32
|
private EmailSender emailSender;
|
33
|
|
34
|
@Autowired
|
35
|
private LDAPActions ldapActions;
|
36
|
|
37
|
@Value("${google.recaptcha.secret}")
|
38
|
private String secret;
|
39
|
|
40
|
@Value("${google.recaptcha.key}")
|
41
|
private String sitekey;
|
42
|
|
43
|
|
44
|
public void init(ServletConfig config) throws ServletException {
|
45
|
super.init(config);
|
46
|
SpringBeanAutowiringSupport.processInjectionBasedOnServletContext(this,
|
47
|
config.getServletContext());
|
48
|
config.getServletContext().setAttribute("sitekey", sitekey);
|
49
|
}
|
50
|
|
51
|
private static Logger logger = Logger.getLogger(RegisterServlet.class);
|
52
|
|
53
|
@Override
|
54
|
protected void doPost(HttpServletRequest request, HttpServletResponse response) throws IOException {
|
55
|
response.setContentType("text/html");
|
56
|
PrintWriter printWriter = response.getWriter();
|
57
|
|
58
|
String firstName = request.getParameter("first_name").trim();
|
59
|
String lastName = request.getParameter("last_name").trim();
|
60
|
String organization = request.getParameter("organization").trim();
|
61
|
String username = request.getParameter("username").trim();
|
62
|
String email =request.getParameter("email").trim();
|
63
|
String confirmEmail = request.getParameter("email_conf").trim();
|
64
|
String password = request.getParameter("password");
|
65
|
String confirmPassword = request.getParameter("password_conf");
|
66
|
|
67
|
String gRecaptchaResponse = request.getParameter("g-recaptcha-response");
|
68
|
|
69
|
boolean isRecaptchaVerified = VerifyRecaptcha.verify(gRecaptchaResponse, secret);
|
70
|
//System.out.println("RESPONSE " + gRecaptchaResponse);
|
71
|
|
72
|
if (organization == null){
|
73
|
logger.info("organization is null");
|
74
|
}
|
75
|
|
76
|
if (firstName != null && lastName != null && username != null && email!= null &&
|
77
|
email.equals(confirmEmail) && password!= null && password.equals(confirmPassword) &&
|
78
|
EmailValidator.getInstance().isValid(email) && InputValidator.isValidPassword(password) && isRecaptchaVerified) {
|
79
|
|
80
|
try {
|
81
|
if (InputValidator.isValidUsername(username) && !ldapActions.usernameExists(username) && !ldapActions.emailExists(email)
|
82
|
&& !ldapActions.isZombieUsersEmail(email) && !ldapActions.isZombieUsersUsername(username) && EmailValidator.getInstance().isValid(email)) {
|
83
|
|
84
|
ldapActions.createZombieUser(username, email, firstName, lastName, organization, password);
|
85
|
logger.info("Zombie user successfully created");
|
86
|
|
87
|
UUID verificationCode = UUID.randomUUID();
|
88
|
Date creationDate = new Date();
|
89
|
String vCode = verificationCode.toString();
|
90
|
|
91
|
Timestamp timestamp = new Timestamp(creationDate.getTime());
|
92
|
|
93
|
if (!verificationActions.verificationEntryExists(username)) {
|
94
|
verificationActions.addVerificationEntry(username, vCode, timestamp);
|
95
|
|
96
|
} else {
|
97
|
verificationActions.updateVerificationEntry(username, vCode, timestamp);
|
98
|
}
|
99
|
|
100
|
String resultPath = UrlConstructor.getRedirectUrl(request, "activate.jsp");
|
101
|
String resultPathWithVCode = UrlConstructor.getVerificationLink(resultPath, vCode);
|
102
|
|
103
|
String verificationCodeMsg = "<p>Hello " + username + ",</p>" +
|
104
|
"<p> A request has been made to verify your email and activate your OpenAIRE account. To activate your " +
|
105
|
"account, you will need to submit your username and this activation code in order to verify that the " +
|
106
|
"request was legitimate.</p>" +
|
107
|
"<p>" +
|
108
|
"The activation code is " + vCode +
|
109
|
"</p>" +
|
110
|
"Click the URL below and proceed with activating your password." +
|
111
|
"<p><a href=" + resultPathWithVCode + ">" + resultPathWithVCode + "</a></p>" +
|
112
|
"<p>The activation code is valid for 24 hours.</p>" +
|
113
|
"<p>Thank you,</p>" +
|
114
|
"<p>OpenAIRE technical team</p>";
|
115
|
|
116
|
String verificationCodeSubject = "Activate your OpenAIRE account";
|
117
|
|
118
|
emailSender.sendEmail(email, verificationCodeSubject, verificationCodeMsg);
|
119
|
|
120
|
response.sendRedirect("./activate.jsp");
|
121
|
|
122
|
} else {
|
123
|
|
124
|
validateUsername(request, username);
|
125
|
|
126
|
if (ldapActions.usernameExists(username) || ldapActions.isZombieUsersUsername(username)) {
|
127
|
request.getSession().setAttribute("username_message", "Username already exists! Choose another one.");
|
128
|
logger.info("Username already exists");
|
129
|
}
|
130
|
|
131
|
if (!EmailValidator.getInstance().isValid(email)) {
|
132
|
request.getSession().setAttribute("email_message", "Please enter a valid email.");
|
133
|
logger.info("Invalid email.");
|
134
|
}
|
135
|
|
136
|
if (ldapActions.emailExists(email)) {
|
137
|
request.getSession().setAttribute("email_message", "There is another user with this email.");
|
138
|
logger.info("There is another user with this email");
|
139
|
}
|
140
|
|
141
|
if (ldapActions.isZombieUsersEmail(email)) {
|
142
|
request.getSession().setAttribute("email_message", "You have already registered with this email address! Please check your email to activate your account or contact OpenAIRE <a href=\"https://www.openaire.eu/support/helpdesk\">helpdesk</a>.");
|
143
|
logger.info("There is another user with this email");
|
144
|
}
|
145
|
|
146
|
request.getSession().setAttribute("first_name", firstName);
|
147
|
request.getSession().setAttribute("msg_first_name_error_display", "display:none");
|
148
|
|
149
|
request.getSession().setAttribute("last_name", lastName);
|
150
|
request.getSession().setAttribute("msg_last_name_error_display", "display:none");
|
151
|
|
152
|
request.getSession().setAttribute("organization", organization);
|
153
|
request.getSession().setAttribute("username", username);
|
154
|
request.getSession().setAttribute("email", email);
|
155
|
request.getSession().setAttribute("msg_email_error_display", "display:none" );
|
156
|
|
157
|
request.getSession().setAttribute("email_conf", confirmEmail);
|
158
|
request.getSession().setAttribute("msg_email_conf_error_display", "display:none");
|
159
|
request.getSession().setAttribute("msg_email_validation_error_display", "display:none");
|
160
|
|
161
|
request.getSession().setAttribute("msg_password_error_display", "display:none" );
|
162
|
request.getSession().setAttribute("msg_pass_conf_error_display", "display:none" );
|
163
|
request.getSession().setAttribute("msg_invalid_password_display", "display:none");
|
164
|
|
165
|
request.getSession().setAttribute("recaptcha_error_display", "display:none");
|
166
|
|
167
|
response.sendRedirect("./register.jsp");
|
168
|
}
|
169
|
|
170
|
|
171
|
} catch (MessagingException e) {
|
172
|
logger.error("Error in sending email", e);
|
173
|
request.getSession().setAttribute("message","Error sending email");
|
174
|
response.sendRedirect(UrlConstructor.getRedirectUrl(request, ".register.jsp"));
|
175
|
|
176
|
//TODO better handling of these exceptions
|
177
|
} catch (Exception e) {
|
178
|
logger.error("LDAP error in creating user", e);
|
179
|
response.sendRedirect(UrlConstructor.getRedirectUrl(request, "error.jsp"));
|
180
|
}
|
181
|
|
182
|
} else {
|
183
|
|
184
|
request.getSession().setAttribute("first_name", firstName);
|
185
|
request.getSession().setAttribute("last_name", lastName);
|
186
|
request.getSession().setAttribute("organization", organization);
|
187
|
request.getSession().setAttribute("username", username);
|
188
|
request.getSession().setAttribute("email", email);
|
189
|
request.getSession().setAttribute("email_conf", confirmEmail);
|
190
|
|
191
|
if (!InputValidator.isFilled(firstName)) {
|
192
|
logger.info("No first name");
|
193
|
request.getSession().setAttribute("msg_first_name_error_display", "display:block" );
|
194
|
}
|
195
|
|
196
|
if (!InputValidator.isFilled(lastName)) {
|
197
|
logger.info("No last name");
|
198
|
request.getSession().setAttribute("msg_last_name_error_display", "display:block" );
|
199
|
}
|
200
|
|
201
|
if (!InputValidator.isFilled(username)) {
|
202
|
request.getSession().setAttribute("username_message", "Minimum username length 5 characters.");
|
203
|
logger.info("No username");
|
204
|
|
205
|
} else {
|
206
|
validateUsername(request, username);
|
207
|
}
|
208
|
|
209
|
if (!InputValidator.isFilled(password)) {
|
210
|
logger.info("No valid password");
|
211
|
request.getSession().setAttribute("msg_password_error_display", "display:block" );
|
212
|
}
|
213
|
|
214
|
if(!EmailValidator.getInstance().isValid(email)) {
|
215
|
logger.info("No valid e-mail");
|
216
|
request.getSession().setAttribute("msg_email_validation_error_display", "display:block");
|
217
|
}
|
218
|
|
219
|
if (!email.equals(confirmEmail)) {
|
220
|
logger.info("No matching e-mails");
|
221
|
request.getSession().setAttribute("msg_email_conf_error_display", "display:block" );
|
222
|
}
|
223
|
|
224
|
if(!InputValidator.isValidPassword(password)) {
|
225
|
logger.info("No valid password");
|
226
|
request.getSession().setAttribute("msg_invalid_password_display", "display:block");
|
227
|
}
|
228
|
|
229
|
if (!password.equals(confirmPassword)){
|
230
|
logger.info("No matching passwords");
|
231
|
request.getSession().setAttribute("msg_pass_conf_error_display", "display:block" );
|
232
|
}
|
233
|
|
234
|
if (!isRecaptchaVerified) {
|
235
|
logger.info("No valid recaptcha");
|
236
|
request.getSession().setAttribute("recaptcha_error_display", "display:block" );
|
237
|
}
|
238
|
|
239
|
response.sendRedirect("./register.jsp");
|
240
|
|
241
|
}
|
242
|
|
243
|
printWriter.close();
|
244
|
|
245
|
}
|
246
|
|
247
|
private void validateUsername(HttpServletRequest request, String username) {
|
248
|
|
249
|
if(!InputValidator.isValidUsername(username)) {
|
250
|
logger.info("No valid username");
|
251
|
|
252
|
if (InputValidator.containsLessCharsThan(5,username)) {
|
253
|
request.getSession().setAttribute("username_message", "Minimum username length 5 characters.");
|
254
|
logger.info("Minimum username length 5 characters.");
|
255
|
}
|
256
|
|
257
|
if (InputValidator.containsMoreCharsThan(150,username)) {
|
258
|
request.getSession().setAttribute("username_message", "Maximum username length 150 characters.");
|
259
|
logger.info("Maximum username length 150 characters.");
|
260
|
}
|
261
|
|
262
|
if (!InputValidator.containsOnlyAllowedChars(username)) {
|
263
|
request.getSession().setAttribute("username_allowed_chars_message", "You can use letters, numbers, underscores, hyphens and periods.");
|
264
|
logger.info("Only letters, numbers, underscores, hyphens and periods.");
|
265
|
}
|
266
|
|
267
|
if (!InputValidator.startsWithLetterOrDigit(username)) {
|
268
|
request.getSession().setAttribute("username_first_char_message", "The username must start with letter or digit.");
|
269
|
logger.info("The username must start with letter or digit.");
|
270
|
}
|
271
|
}
|
272
|
}
|
273
|
}
|
274
|
|