126 lines
3.0 KiB
Go
126 lines
3.0 KiB
Go
package auth
|
|
|
|
import (
|
|
"net/http"
|
|
"time"
|
|
|
|
"codeberg.org/u1f320/pronouns.cc/backend/db"
|
|
"codeberg.org/u1f320/pronouns.cc/backend/server"
|
|
"emperror.dev/errors"
|
|
"github.com/go-chi/render"
|
|
"github.com/rs/xid"
|
|
)
|
|
|
|
type getTokenResponse struct {
|
|
TokenID xid.ID `json:"id"`
|
|
APIOnly bool `json:"api_only"`
|
|
ReadOnly bool `json:"read_only"`
|
|
Created time.Time `json:"created"`
|
|
Expires time.Time `json:"expires"`
|
|
}
|
|
|
|
func dbTokenToGetResponse(t db.Token) getTokenResponse {
|
|
return getTokenResponse{
|
|
TokenID: t.TokenID,
|
|
APIOnly: t.APIOnly,
|
|
ReadOnly: t.ReadOnly,
|
|
Created: t.Created,
|
|
Expires: t.Expires,
|
|
}
|
|
}
|
|
|
|
func (s *Server) getTokens(w http.ResponseWriter, r *http.Request) error {
|
|
ctx := r.Context()
|
|
claims, _ := server.ClaimsFromContext(ctx)
|
|
|
|
if claims.APIToken {
|
|
return server.APIError{Code: server.ErrMissingPermissions, Details: "This endpoint cannot be used by API tokens"}
|
|
}
|
|
|
|
tokens, err := s.DB.Tokens(ctx, claims.UserID)
|
|
if err != nil {
|
|
return errors.Wrap(err, "getting tokens")
|
|
}
|
|
|
|
resps := make([]getTokenResponse, len(tokens))
|
|
for i := range tokens {
|
|
resps[i] = dbTokenToGetResponse(tokens[i])
|
|
}
|
|
|
|
render.JSON(w, r, resps)
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) deleteToken(w http.ResponseWriter, r *http.Request) error {
|
|
ctx := r.Context()
|
|
claims, _ := server.ClaimsFromContext(ctx)
|
|
|
|
if claims.APIToken {
|
|
return server.APIError{Code: server.ErrMissingPermissions, Details: "This endpoint cannot be used by API tokens"}
|
|
}
|
|
|
|
tx, err := s.DB.Begin(ctx)
|
|
if err != nil {
|
|
return errors.Wrap(err, "beginning transaction")
|
|
}
|
|
defer tx.Rollback(ctx)
|
|
|
|
err = s.DB.InvalidateAllTokens(ctx, tx, claims.UserID)
|
|
if err != nil {
|
|
return errors.Wrap(err, "invalidating tokens")
|
|
}
|
|
|
|
err = tx.Commit(ctx)
|
|
if err != nil {
|
|
return errors.Wrap(err, "committing transaction")
|
|
}
|
|
|
|
render.NoContent(w, r)
|
|
return nil
|
|
}
|
|
|
|
type createTokenResponse struct {
|
|
Token string `json:"token"`
|
|
TokenID xid.ID `json:"id"`
|
|
APIOnly bool `json:"api_only"`
|
|
ReadOnly bool `json:"read_only"`
|
|
Created time.Time `json:"created"`
|
|
Expires time.Time `json:"expires"`
|
|
}
|
|
|
|
func (s *Server) createToken(w http.ResponseWriter, r *http.Request) error {
|
|
ctx := r.Context()
|
|
claims, _ := server.ClaimsFromContext(ctx)
|
|
|
|
if claims.APIToken {
|
|
return server.APIError{Code: server.ErrMissingPermissions, Details: "This endpoint cannot be used by API tokens"}
|
|
}
|
|
|
|
u, err := s.DB.User(ctx, claims.UserID)
|
|
if err != nil {
|
|
return errors.Wrap(err, "getting me user")
|
|
}
|
|
|
|
readOnly := r.FormValue("read_only") == "true"
|
|
tokenID := xid.New()
|
|
tokenStr, err := s.Auth.CreateToken(claims.UserID, tokenID, u.IsAdmin, true, !readOnly)
|
|
if err != nil {
|
|
return errors.Wrap(err, "creating token")
|
|
}
|
|
|
|
t, err := s.DB.SaveToken(ctx, claims.UserID, tokenID, true, readOnly)
|
|
if err != nil {
|
|
return errors.Wrap(err, "saving token")
|
|
}
|
|
|
|
render.JSON(w, r, createTokenResponse{
|
|
Token: tokenStr,
|
|
TokenID: t.TokenID,
|
|
APIOnly: t.APIOnly,
|
|
ReadOnly: t.ReadOnly,
|
|
Created: t.Created,
|
|
Expires: t.Expires,
|
|
})
|
|
return nil
|
|
}
|