shiori/internal/domains/accounts.go
Felipe Martin 6f19c12c95
Start working on new REST API. Refactor logic in domains. (#497)
* added 404 template

* added auth domain

* added embed file for frontend

* added base config and dependencies

* added basic new http server

* added separated server command

* updated go modules

* removed modd file

* Added shortcut to send internal server error response

* Added JWT support to Auth Domain

* Added JWT support to API

* docs: added comments to response struct

* naming

* inline returns

* updated dependencies

* production logger

* bookmarks endpoint

* reverted old views api path

* frontend for api v1

* proper 404 error (not working atm)

* use response

* removed 404 html

* server error handler

* login and basic auth

* adjusted session duration

* properly retrieve tags

* properly delete bookmark

* cleanup

* archiver domain

* debug routes

* bookmark routes

* expiration by parameter

* move to logrus

* logout

* frontend cache

* updated dependencies

* http: migrated to gin

* linted

* Added version command

* unit tests, docs

* response test utils and tests

* remove logout handler

* auth

* createtag

* improved http test utilities

* assert message equals

* Remove 1.19 from test matrix

* moved api to v1 folder

* docs: contribute docs

* updated makefile

* updated usage docs

* warn in server command

* updaed docs with shiori version command

* Updated documentation

* deps: update
2023-07-17 14:30:18 +01:00

89 lines
2.2 KiB
Go

package domains
import (
"context"
"fmt"
"time"
"github.com/go-shiori/shiori/internal/database"
"github.com/go-shiori/shiori/internal/model"
"github.com/golang-jwt/jwt/v5"
"github.com/pkg/errors"
"github.com/sirupsen/logrus"
"golang.org/x/crypto/bcrypt"
)
type AccountsDomain struct {
logger *logrus.Logger
db database.DB
secret []byte
}
type JWTClaim struct {
jwt.RegisteredClaims
Account *model.Account
}
func (d *AccountsDomain) CheckToken(ctx context.Context, userJWT string) (*model.Account, error) {
token, err := jwt.ParseWithClaims(userJWT, &JWTClaim{}, func(token *jwt.Token) (interface{}, error) {
// Validate algorithm
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"])
}
return d.secret, nil
})
if err != nil {
return nil, errors.Wrap(err, "error parsing token")
}
if claims, ok := token.Claims.(*JWTClaim); ok && token.Valid {
if claims.Account.ID > 0 {
return claims.Account, nil
}
if err != nil {
return nil, err
}
return claims.Account, nil
}
return nil, fmt.Errorf("error obtaining user from JWT claims")
}
func (d *AccountsDomain) GetAccountFromCredentials(ctx context.Context, username, password string) (*model.Account, error) {
account, _, err := d.db.GetAccount(ctx, username)
if err != nil {
return nil, fmt.Errorf("username and password do not match")
}
if err := bcrypt.CompareHashAndPassword([]byte(account.Password), []byte(password)); err != nil {
return nil, fmt.Errorf("username and password do not match")
}
return &account, nil
}
func (d *AccountsDomain) CreateTokenForAccount(account *model.Account, expiration time.Time) (string, error) {
claims := jwt.MapClaims{
"account": account,
"exp": expiration.UTC().Unix(),
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
t, err := token.SignedString(d.secret)
if err != nil {
d.logger.WithError(err).Error("error signing token")
}
return t, err
}
func NewAccountsDomain(logger *logrus.Logger, secretKey string, db database.DB) AccountsDomain {
return AccountsDomain{
logger: logger,
db: db,
secret: []byte(secretKey),
}
}