aboutsummaryrefslogtreecommitdiff
path: root/auth
diff options
context:
space:
mode:
authorVidhu Kant Sharma <vidhukant@vidhukant.com>2023-10-05 15:29:50 +0530
committerVidhu Kant Sharma <vidhukant@vidhukant.com>2023-10-05 15:29:50 +0530
commitb643f7852f93f73843aa5f52f9b4545321713e10 (patch)
tree09938550f85f699fd665127888c4c668f0f1b2a9 /auth
parentd8c1d5fedfac65a79490120195e273b5d5fc75e9 (diff)
added invoice route (barebones)v0.0.11
Diffstat (limited to 'auth')
-rw-r--r--auth/:w182
1 files changed, 0 insertions, 182 deletions
diff --git a/auth/:w b/auth/:w
deleted file mode 100644
index 7e3346e..0000000
--- a/auth/:w
+++ /dev/null
@@ -1,182 +0,0 @@
-/* openbills - Server for web based Libre Billing Software
- * Copyright (C) 2023 Vidhu Kant Sharma <vidhukant@vidhukant.com>
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <https://www.gnu.org/licenses/>.
- */
-
-package auth
-
-import (
- "github.com/gin-gonic/gin"
- "github.com/golang-jwt/jwt/v5"
- "github.com/spf13/viper"
- "golang.org/x/crypto/bcrypt"
- "vidhukant.com/openbills/user"
- "net/http"
- "time"
- "vidhukant.com/openbills/errors"
-)
-
-var (
- COST int
- AUTH_KEY, REFRESH_KEY []byte
-)
-func init() {
- COST = viper.GetInt("cryptography.password_hashing_cost")
- AUTH_KEY = []byte(viper.GetString("cryptography.auth_key"))
- REFRESH_KEY = []byte(viper.GetString("cryptography.refresh_key"))
-}
-
-func handleSignUp (ctx *gin.Context) {
- var user user.User
- ctx.Bind(&user)
-
- var err error
-
- // hash password
- var bytes []byte
- bytes, err = bcrypt.GenerateFromPassword([]byte(user.Password), 14)
- if err != nil {
- // TODO: handle potential errors
- ctx.Error(err)
- ctx.Abort()
- return
- }
- user.Password = string(bytes)
-
- err = user.Create()
- if err != nil {
- ctx.Error(err)
- ctx.Abort()
- return
- }
-
- // remove password hash from response
- user.Password = ""
-
- ctx.JSON(http.StatusOK, gin.H{
- "message": "success",
- "data": user,
- })
-}
-
-func handleSignIn (ctx *gin.Context) {
- var req LoginReq
- ctx.Bind(&req)
-
- var err error
- var u user.User
-
- err = user.CheckPassword(&u, req.AccountName, req.Method, req.Password)
- if err != nil {
- // TODO: handle potential errors
- ctx.Error(err)
- ctx.Abort()
- return
- }
-
- authToken, err := jwt.NewWithClaims(jwt.SigningMethodHS256,
- AuthClaims {
- jwt.RegisteredClaims {
- IssuedAt: jwt.NewNumericDate(time.Now()),
- ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Minute * 2)),
- },
- u.ID,
- },
- ).SignedString(AUTH_KEY)
- if err != nil {
- // TODO: handle potential errors
- ctx.Error(err)
- ctx.Abort()
- return
- }
-
- refreshToken, err := jwt.NewWithClaims(jwt.SigningMethodHS256,
- AuthClaims {
- jwt.RegisteredClaims {
- IssuedAt: jwt.NewNumericDate(time.Now()),
- ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Hour * 6)),
- },
- u.ID,
- },
- ).SignedString(REFRESH_KEY)
- if err != nil {
- // TODO: handle potential errors
- ctx.Error(err)
- ctx.Abort()
- return
- }
-
- // remove password hash from response
- u.Password = ""
-
- ctx.JSON(http.StatusOK, gin.H{
- "auth_token": authToken,
- "refresh_token": refreshToken,
- "message": "success",
- "data": u,
- })
-}
-
-func handleRefresh (ctx *gin.Context) {
- var req RefreshReq
- ctx.Bind(&req)
-
- tk, _ := jwt.ParseWithClaims(req.RefreshToken, &AuthClaims{}, func (token *jwt.Token) (interface{}, error) {
- return []byte(REFRESH_KEY), nil
- })
-
- claims, ok := tk.Claims.(*AuthClaims)
- if !ok {
- ctx.Error(errors.ErrUnauthorized)
- ctx.Abort()
- return
- }
-
- if !tk.Valid {
- eat := claims.ExpiresAt.Unix()
- if eat != 0 && eat < time.Now().Unix() {
- ctx.Error(errors.ErrSessionExpired)
- } else {
- ctx.Error(errors.ErrUnauthorized)
- }
-
- ctx.Abort()
- return
- }
-
- // TODO: if token is valid, check if user even exists before generating authToken
-
- authToken, err := jwt.NewWithClaims(jwt.SigningMethodHS256,
- AuthClaims {
- jwt.RegisteredClaims {
- IssuedAt: jwt.NewNumericDate(time.Now()),
- ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Minute * 2)),
- },
- claims.UserID,
- },
- ).SignedString(AUTH_KEY)
- if err != nil {
- // TODO: handle potential errors
- ctx.Error(err)
- ctx.Abort()
- return
- }
-
- ctx.JSON(http.StatusOK, gin.H{
- "auth_token": authToken,
- "message": "success",
- //"data": u,
- })
-}