feat: added session guid and token type fields to jwt tokens;
feat: very minimal implementation of registration functions; refactor: login function now uses the transactional db helper function and creates a session; feat: enum for jwt token type
This commit is contained in:
@@ -34,6 +34,8 @@ type Claims struct {
|
|||||||
jwt.RegisteredClaims
|
jwt.RegisteredClaims
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TODO: validate token type
|
||||||
|
// TODO: validate session guid
|
||||||
func AuthMiddleware() gin.HandlerFunc {
|
func AuthMiddleware() gin.HandlerFunc {
|
||||||
return func(c *gin.Context) {
|
return func(c *gin.Context) {
|
||||||
cfg := config.GetConfig()
|
cfg := config.GetConfig()
|
||||||
|
|||||||
@@ -24,12 +24,13 @@ import (
|
|||||||
"easywish/internal/utils"
|
"easywish/internal/utils"
|
||||||
"easywish/internal/utils/enums"
|
"easywish/internal/utils/enums"
|
||||||
|
|
||||||
|
"github.com/jackc/pgx/v5"
|
||||||
"go.uber.org/zap"
|
"go.uber.org/zap"
|
||||||
)
|
)
|
||||||
|
|
||||||
type AuthService interface {
|
type AuthService interface {
|
||||||
RegistrationBegin(request models.RegistrationBeginRequest) (bool, error)
|
RegistrationBegin(request models.RegistrationBeginRequest) (bool, error)
|
||||||
RegistrationComplete(request models.RegistrationBeginRequest) (*models.RegistrationCompleteResponse, error)
|
RegistrationComplete(request models.RegistrationCompleteRequest) (*models.RegistrationCompleteResponse, error)
|
||||||
Login(request models.LoginRequest) (*models.LoginResponse, error)
|
Login(request models.LoginRequest) (*models.LoginResponse, error)
|
||||||
Refresh(request models.RefreshRequest) (*models.RefreshResponse, error)
|
Refresh(request models.RefreshRequest) (*models.RefreshResponse, error)
|
||||||
}
|
}
|
||||||
@@ -53,7 +54,7 @@ func (a *authServiceImpl) RegistrationBegin(request models.RegistrationBeginRequ
|
|||||||
|
|
||||||
var err error
|
var err error
|
||||||
|
|
||||||
if user, err = db.TXQueries.CreateUser(db.CTX, request.Username); err != nil { // TODO: validation
|
if user, err = db.TXQueries.CreateUser(db.CTX, request.Username); err != nil {
|
||||||
a.log.Error("Failed to add user to database", zap.Error(err))
|
a.log.Error("Failed to add user to database", zap.Error(err))
|
||||||
return false, errs.ErrServerError
|
return false, errs.ErrServerError
|
||||||
}
|
}
|
||||||
@@ -94,31 +95,190 @@ func (a *authServiceImpl) RegistrationBegin(request models.RegistrationBeginRequ
|
|||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *authServiceImpl) RegistrationComplete(request models.RegistrationBeginRequest) (*models.RegistrationCompleteResponse, error) {
|
func (a *authServiceImpl) RegistrationComplete(request models.RegistrationCompleteRequest) (*models.RegistrationCompleteResponse, error) {
|
||||||
return nil, errs.ErrNotImplemented
|
|
||||||
|
var user database.User
|
||||||
|
var profile database.Profile
|
||||||
|
var session database.Session
|
||||||
|
var confirmationCode database.ConfirmationCode
|
||||||
|
var accessToken, refreshToken string
|
||||||
|
var err error
|
||||||
|
|
||||||
|
helper, db, _ := database.NewDbHelperTransaction(a.dbctx)
|
||||||
|
|
||||||
|
user, err = db.TXQueries.GetUserByUsername(db.CTX, request.Username)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
a.log.Error(
|
||||||
|
"Failed to find user attempting to complete registration",
|
||||||
|
zap.String("username", request.Username),
|
||||||
|
zap.Error(err))
|
||||||
|
return nil, errs.ErrUserNotFound
|
||||||
|
}
|
||||||
|
|
||||||
|
confirmationCode, err = db.TXQueries.GetConfirmationCodeByCode(db.CTX, database.GetConfirmationCodeByCodeParams{
|
||||||
|
UserID: user.ID,
|
||||||
|
CodeType: int32(enums.RegistrationCodeType),
|
||||||
|
Code: request.VerificationCode,
|
||||||
|
})
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
a.log.Warn(
|
||||||
|
"User supplied wrong confirmation code for completing registration",
|
||||||
|
zap.String("username", user.Username),
|
||||||
|
zap.Error(err))
|
||||||
|
return nil, errs.ErrForbidden
|
||||||
|
}
|
||||||
|
|
||||||
|
err = db.TXQueries.UpdateConfirmationCode(db.CTX, database.UpdateConfirmationCodeParams{
|
||||||
|
ID: confirmationCode.ID,
|
||||||
|
Used: utils.NewPointer(true),
|
||||||
|
})
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
a.log.Error(
|
||||||
|
"Failed to update the user's registration code used state",
|
||||||
|
zap.String("username", user.Username),
|
||||||
|
zap.Int64("confirmation_code_id", confirmationCode.ID),
|
||||||
|
zap.Error(err),
|
||||||
|
)
|
||||||
|
return nil, errs.ErrServerError
|
||||||
|
}
|
||||||
|
|
||||||
|
err = db.TXQueries.UpdateUser(db.CTX, database.UpdateUserParams{
|
||||||
|
Verified: utils.NewPointer(true),
|
||||||
|
})
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
a.log.Error("Failed to update verified status for user",
|
||||||
|
zap.String("username", user.Username),
|
||||||
|
zap.Error(err))
|
||||||
|
return nil, errs.ErrServerError
|
||||||
|
}
|
||||||
|
|
||||||
|
profile, err = db.TXQueries.CreateProfile(db.CTX, database.CreateProfileParams{
|
||||||
|
UserID: user.ID,
|
||||||
|
Name: request.Name,
|
||||||
|
AvatarUrl: request.AvatarUrl,
|
||||||
|
})
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
a.log.Error("Failed to create profile for user",
|
||||||
|
zap.String("username", user.Username),
|
||||||
|
|
||||||
|
)
|
||||||
|
return nil, errs.ErrServerError
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = db.TXQueries.CreateProfileSettings(db.CTX, profile.ID)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
a.log.Error("Failed to create profile settings for user",
|
||||||
|
zap.String("username", user.Username),
|
||||||
|
zap.Error(err))
|
||||||
|
return nil, errs.ErrServerError
|
||||||
|
}
|
||||||
|
|
||||||
|
session, err = db.TXQueries.CreateSession(db.CTX, database.CreateSessionParams{
|
||||||
|
UserID: user.ID,
|
||||||
|
Name: utils.NewPointer("First device"),
|
||||||
|
Platform: utils.NewPointer("Unknown"),
|
||||||
|
LatestIp: utils.NewPointer("Unknown"),
|
||||||
|
})
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
a.log.Error(
|
||||||
|
"Failed to create a new session during registration, rolling back registration",
|
||||||
|
zap.String("username", user.Username),
|
||||||
|
zap.Error(err))
|
||||||
|
return nil, errs.ErrServerError
|
||||||
|
}
|
||||||
|
|
||||||
|
accessToken, refreshToken, err = utils.GenerateTokens(user.Username, session.Guid.String())
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
a.log.Error(
|
||||||
|
"Failed to create tokens for newly registered user, rolling back registration",
|
||||||
|
zap.String("username", user.Username),
|
||||||
|
zap.Error(err))
|
||||||
|
return nil, errs.ErrServerError
|
||||||
|
}
|
||||||
|
|
||||||
|
helper.Commit()
|
||||||
|
|
||||||
|
response := models.RegistrationCompleteResponse{Tokens: models.Tokens{
|
||||||
|
AccessToken: accessToken,
|
||||||
|
RefreshToken: refreshToken,
|
||||||
|
}}
|
||||||
|
|
||||||
|
return &response, errs.ErrNotImplemented
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TODO: totp
|
||||||
|
// TODO: banned user check
|
||||||
func (a *authServiceImpl) Login(request models.LoginRequest) (*models.LoginResponse, error) {
|
func (a *authServiceImpl) Login(request models.LoginRequest) (*models.LoginResponse, error) {
|
||||||
conn, ctx, err := utils.GetDbConn()
|
var userRow database.GetUserByLoginCredentialsRow
|
||||||
if err != nil {
|
var session database.Session
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
defer conn.Close(ctx)
|
|
||||||
|
|
||||||
queries := database.New(conn)
|
helper, db, _ := database.NewDbHelperTransaction(a.dbctx)
|
||||||
|
defer helper.Rollback()
|
||||||
|
|
||||||
user, err := queries.GetUserByLoginCredentials(ctx, database.GetUserByLoginCredentialsParams{
|
var err error
|
||||||
|
|
||||||
|
userRow, err = db.TXQueries.GetUserByLoginCredentials(db.CTX, database.GetUserByLoginCredentialsParams{
|
||||||
Username: request.Username,
|
Username: request.Username,
|
||||||
Password: request.Password,
|
Password: request.Password,
|
||||||
})
|
})
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errs.ErrUnauthorized
|
a.log.Warn(
|
||||||
|
"Failed login attempt",
|
||||||
|
zap.Error(err))
|
||||||
|
|
||||||
|
var returnedError error
|
||||||
|
|
||||||
|
switch err {
|
||||||
|
case pgx.ErrNoRows:
|
||||||
|
returnedError = errs.ErrForbidden
|
||||||
|
default:
|
||||||
|
returnedError = errs.ErrServerError
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil, returnedError
|
||||||
}
|
}
|
||||||
|
|
||||||
accessToken, refreshToken, err := utils.GenerateTokens(user.Username)
|
session, err = db.TXlessQueries.CreateSession(db.CTX, database.CreateSessionParams{
|
||||||
|
UserID: userRow.ID,
|
||||||
|
Name: utils.NewPointer("New device"),
|
||||||
|
Platform: utils.NewPointer("Unknown"),
|
||||||
|
LatestIp: utils.NewPointer("Unknown"),
|
||||||
|
})
|
||||||
|
|
||||||
return &models.LoginResponse{Tokens: models.Tokens{AccessToken: accessToken, RefreshToken: refreshToken}}, nil
|
if err != nil {
|
||||||
|
a.log.Error(
|
||||||
|
"Failed to create session for a new login",
|
||||||
|
zap.String("username", userRow.Username),
|
||||||
|
zap.Error(err))
|
||||||
|
return nil, errs.ErrServerError
|
||||||
|
}
|
||||||
|
|
||||||
|
accessToken, refreshToken, err := utils.GenerateTokens(userRow.Username, session.Guid.String())
|
||||||
|
if err != nil {
|
||||||
|
a.log.Error(
|
||||||
|
"Failed to generate tokens for a new login",
|
||||||
|
zap.String("username", userRow.Username),
|
||||||
|
zap.Error(err))
|
||||||
|
return nil, errs.ErrServerError
|
||||||
|
}
|
||||||
|
|
||||||
|
helper.Commit()
|
||||||
|
|
||||||
|
response := models.LoginResponse{Tokens: models.Tokens{
|
||||||
|
AccessToken: accessToken,
|
||||||
|
RefreshToken: refreshToken,
|
||||||
|
}}
|
||||||
|
|
||||||
|
return &response, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a *authServiceImpl) Refresh(request models.RefreshRequest) (*models.RefreshResponse, error) {
|
func (a *authServiceImpl) Refresh(request models.RefreshRequest) (*models.RefreshResponse, error) {
|
||||||
|
|||||||
@@ -29,3 +29,9 @@ const (
|
|||||||
UserRole
|
UserRole
|
||||||
AdminRole
|
AdminRole
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type JwtTokenType int32
|
||||||
|
const (
|
||||||
|
JwtAccessTokenType JwtTokenType = iota
|
||||||
|
JwtRefreshTokenType
|
||||||
|
)
|
||||||
|
|||||||
@@ -19,22 +19,27 @@ package utils
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"easywish/config"
|
"easywish/config"
|
||||||
|
"easywish/internal/utils/enums"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/golang-jwt/jwt/v5"
|
"github.com/golang-jwt/jwt/v5"
|
||||||
)
|
)
|
||||||
|
|
||||||
func GenerateTokens(username string) (accessToken, refreshToken string, err error) {
|
func GenerateTokens(username string, sessionGuid string) (accessToken, refreshToken string, err error) {
|
||||||
cfg := config.GetConfig()
|
cfg := config.GetConfig()
|
||||||
|
|
||||||
accessClaims := jwt.MapClaims{
|
accessClaims := jwt.MapClaims{
|
||||||
"username": username,
|
"username": username,
|
||||||
|
"guid": sessionGuid,
|
||||||
|
"type": enums.JwtAccessTokenType,
|
||||||
"exp": time.Now().Add(time.Minute * time.Duration(cfg.JwtExpAccess)).Unix(),
|
"exp": time.Now().Add(time.Minute * time.Duration(cfg.JwtExpAccess)).Unix(),
|
||||||
}
|
}
|
||||||
accessToken, err = jwt.NewWithClaims(jwt.SigningMethodHS256, accessClaims).SignedString([]byte(cfg.JwtSecret))
|
accessToken, err = jwt.NewWithClaims(jwt.SigningMethodHS256, accessClaims).SignedString([]byte(cfg.JwtSecret))
|
||||||
|
|
||||||
refreshClaims := jwt.MapClaims{
|
refreshClaims := jwt.MapClaims{
|
||||||
"username": username,
|
"username": username,
|
||||||
|
"guid": sessionGuid,
|
||||||
|
"type": enums.JwtRefreshTokenType,
|
||||||
"exp": time.Now().Add(time.Hour * time.Duration(cfg.JwtExpRefresh)).Unix(),
|
"exp": time.Now().Add(time.Hour * time.Duration(cfg.JwtExpRefresh)).Unix(),
|
||||||
}
|
}
|
||||||
refreshToken, err = jwt.NewWithClaims(jwt.SigningMethodHS256, refreshClaims).SignedString([]byte(cfg.JwtSecret))
|
refreshToken, err = jwt.NewWithClaims(jwt.SigningMethodHS256, refreshClaims).SignedString([]byte(cfg.JwtSecret))
|
||||||
|
|||||||
Reference in New Issue
Block a user