153 lines
3.8 KiB
Go
153 lines
3.8 KiB
Go
package auth
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"log"
|
|
"net/http"
|
|
|
|
"golang.org/x/crypto/bcrypt"
|
|
"gorm.io/gorm"
|
|
|
|
"git.schreifuchs.ch/schreifuchs/ng-blog/internal/model"
|
|
)
|
|
|
|
// Signup handles user signup by decoding request body, hashing the password, and saving user data to the database.
|
|
func (s *Service) Signup(w http.ResponseWriter, r *http.Request) {
|
|
var err error
|
|
var login Login
|
|
user := model.NewUser()
|
|
|
|
if err = json.NewDecoder(r.Body).Decode(&login); err != nil {
|
|
w.WriteHeader(http.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
if len([]byte(login.Password)) > 72 {
|
|
fmt.Fprint(w, "Password to long, max 72 bytes")
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
if user.Password, err = bcrypt.GenerateFromPassword([]byte(login.Password), 6); err != nil {
|
|
log.Println("Error: ", err)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
user.Name = login.Name
|
|
user.Role = s.cfg.DefaultRole
|
|
|
|
err = s.db.Save(&user).Error
|
|
if err != nil {
|
|
if errors.Is(err, gorm.ErrCheckConstraintViolated) {
|
|
fmt.Fprint(w, "Username is already in use")
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
log.Printf("Error: %v", err)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
}
|
|
}
|
|
|
|
// Signup handles user signup by decoding request body, hashing the password, and saving user data to the database.
|
|
func (s *Service) ChangePassword(w http.ResponseWriter, r *http.Request) {
|
|
var err error
|
|
var login Login
|
|
var password []byte
|
|
|
|
claims, ok := ExtractClaims(r.Context())
|
|
if !ok {
|
|
log.Println("Error while extracting claims")
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
if err = json.NewDecoder(r.Body).Decode(&login); err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
if len([]byte(login.Password)) > 72 {
|
|
fmt.Fprint(w, "Password to long, max 72 bytes")
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
if password, err = bcrypt.GenerateFromPassword([]byte(login.Password), 6); err != nil {
|
|
log.Println("Error: ", err)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
err = s.db.Model(&model.User{}).Where("id = ?", claims.UserID).Update("password", password).Error
|
|
if err != nil {
|
|
|
|
log.Printf("Error: %v", err)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
}
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
}
|
|
|
|
// Login handles user login by decoding request body, verifying credentials, and returning a JWT token.
|
|
func (s *Service) Login(w http.ResponseWriter, r *http.Request) {
|
|
var login Login
|
|
var user model.User
|
|
|
|
if err := json.NewDecoder(r.Body).Decode(&login); err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
if err := s.db.First(&user).Error; err != nil {
|
|
fmt.Fprint(w, "user not found")
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
}
|
|
if err := bcrypt.CompareHashAndPassword(user.Password, []byte(login.Password)); err != nil {
|
|
fmt.Fprint(w, "Invalid Password")
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
}
|
|
|
|
token, err := s.createJWT(&user)
|
|
if err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
res, err := json.Marshal(&LoginResponse{
|
|
Token: token,
|
|
})
|
|
if err != nil {
|
|
log.Println("Error: ", err)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
w.Write(res)
|
|
}
|
|
|
|
// Logout handles user logout by invalidating the JWT and saving it to the database.
|
|
func (s *Service) Logout(w http.ResponseWriter, r *http.Request) {
|
|
token, err := extractToken(r)
|
|
if err != nil {
|
|
log.Printf("Error while extracting token: %s", err.Error())
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
claims, err := s.validateJWT(token)
|
|
if err != nil {
|
|
fmt.Fprint(w, "Invalid token")
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
if err = s.db.Save(&model.InvalidJWT{JWT: token, ValidUntil: claims.ExpiresAt.Time}).Error; err != nil {
|
|
log.Printf("Error while saving logout token: %v", err)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
w.WriteHeader(http.StatusNoContent)
|
|
}
|