All checks were successful
ci/woodpecker/push/build Pipeline was successful
Signed-off-by: Nikolai Rodionov <allanger@badhouseplants.net>
105 lines
2.7 KiB
Go
105 lines
2.7 KiB
Go
package controllers
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
"errors"
|
|
"fmt"
|
|
"time"
|
|
|
|
"gitea.badhouseplants.net/softplayer/softplayer-backend/internal/helpers/hash"
|
|
"gitea.badhouseplants.net/softplayer/softplayer-backend/internal/tools/logger"
|
|
"github.com/golang-jwt/jwt/v5"
|
|
"github.com/google/uuid"
|
|
"github.com/redis/go-redis/v9"
|
|
)
|
|
|
|
type AccountController struct {
|
|
DB *sql.DB
|
|
Redis *redis.Client
|
|
DevMode bool
|
|
HashCost int16
|
|
AccessTokenTTL time.Duration
|
|
RefreshTokenTTL time.Duration
|
|
JWTSecret []byte
|
|
}
|
|
|
|
type JWT struct {
|
|
RefreshToken string
|
|
AccessToken string
|
|
}
|
|
|
|
type AccountParams struct{}
|
|
|
|
type AccountData struct {
|
|
Username string
|
|
Password string
|
|
Email string
|
|
UUID string
|
|
}
|
|
|
|
func (c *AccountController) Create(ctx context.Context, data *AccountData) (string, error) {
|
|
data.UUID = uuid.New().String()
|
|
|
|
passwordHash, err := hash.HashPassword(data.Password, int(c.HashCost))
|
|
if err != nil {
|
|
return "", nil
|
|
}
|
|
|
|
query := "INSERT INTO users (uuid, username, email, password_hash) VALUES ($1, $2, $3, $4)"
|
|
if _, err := c.DB.Query(query, data.UUID, data.Username, data.Email, passwordHash); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return data.UUID, nil
|
|
}
|
|
|
|
func (c *AccountController) GenerateAccessToken(userID string) (string, error) {
|
|
claims := jwt.MapClaims{
|
|
"user_id": userID,
|
|
"type": "access",
|
|
"exp": time.Now().Add(c.AccessTokenTTL).Unix(),
|
|
}
|
|
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
|
return token.SignedString(c.JWTSecret)
|
|
}
|
|
|
|
func redisKey(id string) string {
|
|
return fmt.Sprintf("refresh:%s", id)
|
|
}
|
|
|
|
func (c *AccountController) GenerateRefreshToken(ctx context.Context, userID string) (string, error) {
|
|
tokenID := uuid.New().String()
|
|
claims := jwt.MapClaims{
|
|
"user_id": userID,
|
|
"token_id": tokenID,
|
|
"type": "refresh",
|
|
"exp": time.Now().Add(c.RefreshTokenTTL).Unix(),
|
|
}
|
|
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
|
if err := c.Redis.Set(ctx, redisKey(tokenID), userID, c.RefreshTokenTTL).Err(); err != nil {
|
|
return "", err
|
|
}
|
|
return token.SignedString(c.JWTSecret)
|
|
}
|
|
|
|
// It must validate the refresh token
|
|
// Get it's id from the content
|
|
// Find a corresponding token in redis, and if it's found, remove it and create a new one
|
|
func (c *AccountController) ValidateRefreshToken(ctx context.Context, tokenID, userID string) (string, error) {
|
|
log := logger.FromContext(ctx)
|
|
userIDRedis := c.Redis.Get(ctx, redisKey(tokenID)).Val()
|
|
if err := c.Redis.Del(ctx, redisKey(tokenID)).Err(); err != nil {
|
|
log.Error(err, "Couldn't delete redis entry")
|
|
return "", err
|
|
}
|
|
log.Info(userIDRedis)
|
|
log.Info(userID)
|
|
if userID != userIDRedis {
|
|
return "", errors.New("user id doesn't match")
|
|
}
|
|
return userIDRedis, nil
|
|
}
|