Ejemplo n.º 1
0
// validateParams these parameters conform to AcceptedParams, and pass validation
func validateParams(unsafeParams map[string]string) error {

	// Now check params are as we expect

	if len(unsafeParams["name"]) > 0 {
		err := validate.Length(unsafeParams["name"], 1, 100)
		if err != nil {
			return router.BadRequestError(err, "Name too short", "Your name must be between 1 and 100 characters long.")
		}
	}

	if len(unsafeParams["email"]) > 0 {
		err := validate.Length(unsafeParams["email"], 3, 100)
		if err != nil {
			return router.BadRequestError(err, "Email too short", "Your email must be between 3 and 100 characters long.")
		}
	}

	// Password may be blank
	if len(unsafeParams["password"]) > 0 {
		// Report error for length between 0 and 5 chars
		err := validate.Length(unsafeParams["password"], 5, 100)
		if err != nil {
			return router.BadRequestError(err, "Password too short", "Your password must be at least 5 characters long.")
		}

		ep, err := auth.HashPassword(unsafeParams["password"])
		if err != nil {
			return err
		}
		unsafeParams["encrypted_password"] = ep

	}

	// Delete password param
	delete(unsafeParams, "password")

	return nil
}
Ejemplo n.º 2
0
// validateParams checks these params pass validation checks
// TODO: reconsider best interface for this - don't like the bool
func validateParams(params map[string]string, checkAll bool) error {

	if checkAll || len(params["name"]) > 0 {
		err := validate.Length(params["name"], 2, 300)
		if err != nil {
			return router.BadRequestError(err, "Invalid Name", "The name must be over 2 characters")
		}
	}

	if checkAll || len(params["url"]) > 0 {

		err := validate.Length(params["url"], 5, 1000)
		if err != nil {
			return router.BadRequestError(err, "Invalid URL", "The URL must be over 5 characters")
		}

		if !strings.HasPrefix(params["url"], "http://") && !strings.HasPrefix(params["url"], "https://") {
			return router.BadRequestError(nil, "Invalid URL", "The URL must have scheme https:// or http://")
		}

	}

	return nil
}