Merge remote-tracking branch 'origin/dev' into auth-uploads

This commit is contained in:
grngxd 2025-06-08 19:00:09 +01:00
commit 036d20561e
11 changed files with 596 additions and 581 deletions

View file

@ -1,117 +1,117 @@
package client
import (
"encoding/json"
"errors"
"fmt"
"io"
"net/http"
"net/url"
"strings"
"time"
"stereo.cat/backend/internal/auth"
)
type Client struct {
RedirectUri string
ClientSecret string
ClientId string
}
const api = "https://discord.com/api/v10"
func New(redirectUri, clientId, clientSecret string) Client {
return Client{
RedirectUri: redirectUri,
ClientId: clientId,
ClientSecret: clientSecret,
}
}
func (c Client) GetUser(t auth.TokenResponse) (auth.User, error) {
user := auth.User{
Blacklisted: false,
CreatedAt: time.Now(),
}
req, err := http.NewRequest(http.MethodGet, fmt.Sprintf("%s/%s", api, "users/@me"), nil)
if err != nil {
return user, nil
}
req.Header.Add("Content-Type", "application/json")
req.Header.Add("Authorization", "Bearer "+t.AccessToken)
resp, err := http.DefaultClient.Do(req)
if resp.StatusCode != http.StatusOK {
bodyBytes, err := io.ReadAll(resp.Body)
if err != nil {
return user, err
}
return user, errors.New(string(bodyBytes))
}
if err != nil {
return user, err
}
defer resp.Body.Close()
err = json.NewDecoder(resp.Body).Decode(&user)
if err != nil {
return user, err
}
return user, nil
}
func (c Client) ExchangeCode(code string) (auth.TokenResponse, error) {
var tokenResponse auth.TokenResponse
requestBody := url.Values{
"grant_type": {"authorization_code"},
"code": {code},
"redirect_uri": {c.RedirectUri},
}
req, err := http.NewRequest(http.MethodPost, fmt.Sprintf("%s/%s", api, "/oauth2/token"), strings.NewReader(requestBody.Encode()))
if err != nil {
return tokenResponse, err
}
req.Header.Add("Content-Type", "application/x-www-form-urlencoded")
req.SetBasicAuth(c.ClientId, c.ClientSecret)
resp, err := http.DefaultClient.Do(req)
if resp.StatusCode != http.StatusOK {
bodyBytes, err := io.ReadAll(resp.Body)
if err != nil {
return tokenResponse, err
}
return tokenResponse, errors.New(string(bodyBytes))
}
if err != nil {
return tokenResponse, err
}
defer resp.Body.Close()
err = json.NewDecoder(resp.Body).Decode(&tokenResponse)
if err != nil {
return tokenResponse, err
}
return tokenResponse, nil
}
package client
import (
"encoding/json"
"errors"
"fmt"
"io"
"net/http"
"net/url"
"strings"
"time"
"stereo.cat/backend/internal/auth"
)
type Client struct {
RedirectUri string
ClientSecret string
ClientId string
}
const api = "https://discord.com/api/v10"
func New(redirectUri, clientId, clientSecret string) Client {
return Client{
RedirectUri: redirectUri,
ClientId: clientId,
ClientSecret: clientSecret,
}
}
func (c Client) GetUser(t auth.TokenResponse) (auth.User, error) {
user := auth.User{
Blacklisted: false,
CreatedAt: time.Now(),
}
req, err := http.NewRequest(http.MethodGet, fmt.Sprintf("%s/%s", api, "users/@me"), nil)
if err != nil {
return user, nil
}
req.Header.Add("Content-Type", "application/json")
req.Header.Add("Authorization", "Bearer "+t.AccessToken)
resp, err := http.DefaultClient.Do(req)
if resp.StatusCode != http.StatusOK {
bodyBytes, err := io.ReadAll(resp.Body)
if err != nil {
return user, err
}
return user, errors.New(string(bodyBytes))
}
if err != nil {
return user, err
}
defer resp.Body.Close()
err = json.NewDecoder(resp.Body).Decode(&user)
if err != nil {
return user, err
}
return user, nil
}
func (c Client) ExchangeCode(code string) (auth.TokenResponse, error) {
var tokenResponse auth.TokenResponse
requestBody := url.Values{
"grant_type": {"authorization_code"},
"code": {code},
"redirect_uri": {c.RedirectUri},
}
req, err := http.NewRequest(http.MethodPost, fmt.Sprintf("%s/%s", api, "/oauth2/token"), strings.NewReader(requestBody.Encode()))
if err != nil {
return tokenResponse, err
}
req.Header.Add("Content-Type", "application/x-www-form-urlencoded")
req.SetBasicAuth(c.ClientId, c.ClientSecret)
resp, err := http.DefaultClient.Do(req)
if resp.StatusCode != http.StatusOK {
bodyBytes, err := io.ReadAll(resp.Body)
if err != nil {
return tokenResponse, err
}
return tokenResponse, errors.New(string(bodyBytes))
}
if err != nil {
return tokenResponse, err
}
defer resp.Body.Close()
err = json.NewDecoder(resp.Body).Decode(&tokenResponse)
if err != nil {
return tokenResponse, err
}
return tokenResponse, nil
}

View file

@ -1,83 +1,83 @@
package auth
import (
"encoding/json"
"fmt"
"net/http"
"strings"
"github.com/gin-gonic/gin"
"github.com/golang-jwt/jwt/v5"
)
func GenerateJWT(key string, user User, expiryTimestamp uint64) (string, error) {
claims := Claims{
User: user,
Exp: expiryTimestamp,
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
return token.SignedString([]byte(key))
}
func invalidAuth(c *gin.Context) {
c.String(http.StatusUnauthorized, "Unauthorized.")
c.Abort()
}
func JwtMiddleware(secret string) gin.HandlerFunc {
return func(c *gin.Context) {
jwtSplit := strings.Split(c.GetHeader("Authorization"), " ")
if len(jwtSplit) < 2 || jwtSplit[0] != "Bearer" {
invalidAuth(c)
return
}
claims, err := ValidateJWT(jwtSplit[1], secret)
if err != nil {
invalidAuth(c)
return
}
if userClaims, ok := claims["user"].(map[string]interface{}); ok {
userJSON, err := json.Marshal(userClaims) // Convert map to JSON
if err != nil {
invalidAuth(c)
return
}
var user User
err = json.Unmarshal(userJSON, &user)
if err != nil {
invalidAuth(c)
return
}
claims["user"] = user
}
c.Set("claims", claims)
c.Next()
}
}
func ValidateJWT(jwtString, key string) (jwt.MapClaims, error) {
token, err := jwt.Parse(jwtString, func(token *jwt.Token) (any, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("Invalid signing method!")
}
return []byte(key), nil
})
if err != nil {
return nil, err
}
if claims, ok := token.Claims.(jwt.MapClaims); ok && token.Valid {
return claims, nil
}
return nil, fmt.Errorf("Invalid token!")
}
package auth
import (
"encoding/json"
"fmt"
"net/http"
"strings"
"github.com/gin-gonic/gin"
"github.com/golang-jwt/jwt/v5"
)
func GenerateJWT(key string, user User, expiryTimestamp uint64) (string, error) {
claims := Claims{
User: user,
Exp: expiryTimestamp,
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
return token.SignedString([]byte(key))
}
func invalidAuth(c *gin.Context) {
c.String(http.StatusUnauthorized, "Unauthorized.")
c.Abort()
}
func JwtMiddleware(secret string) gin.HandlerFunc {
return func(c *gin.Context) {
jwtSplit := strings.Split(c.GetHeader("Authorization"), " ")
if len(jwtSplit) < 2 || jwtSplit[0] != "Bearer" {
invalidAuth(c)
return
}
claims, err := ValidateJWT(jwtSplit[1], secret)
if err != nil {
invalidAuth(c)
return
}
if userClaims, ok := claims["user"].(map[string]interface{}); ok {
userJSON, err := json.Marshal(userClaims) // Convert map to JSON
if err != nil {
invalidAuth(c)
return
}
var user User
err = json.Unmarshal(userJSON, &user)
if err != nil {
invalidAuth(c)
return
}
claims["user"] = user
}
c.Set("claims", claims)
c.Next()
}
}
func ValidateJWT(jwtString, key string) (jwt.MapClaims, error) {
token, err := jwt.Parse(jwtString, func(token *jwt.Token) (any, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("Invalid signing method!")
}
return []byte(key), nil
})
if err != nil {
return nil, err
}
if claims, ok := token.Claims.(jwt.MapClaims); ok && token.Valid {
return claims, nil
}
return nil, fmt.Errorf("Invalid token!")
}

View file

@ -1,40 +1,40 @@
package auth
import (
"time"
"github.com/golang-jwt/jwt/v5"
)
type TokenResponse struct {
AccessToken string `json:"access_token"`
TokenType string `json:"token_type"`
ExpiresIn int64 `json:"expires_in"`
RefreshToken string `json:"refresh_token"`
Scope string `json:"scope"`
}
type User struct {
ID string `json:"id" gorm:"primaryKey"`
Username string `json:"username"`
Blacklisted bool `json:"blacklisted"`
Email string `json:"email"`
CreatedAt time.Time `json:"created_at"`
}
type AvatarDecorationData struct {
Asset string
SkuID string
}
type ExchangeCodeRequest struct {
GrantType string `json:"grant_type"`
Code string `json:"code"`
RedirectUri string `json:"redirect_uri"`
}
type Claims struct {
User User `json:"user"`
Exp uint64 `json:"exp"`
jwt.RegisteredClaims
}
package auth
import (
"time"
"github.com/golang-jwt/jwt/v5"
)
type TokenResponse struct {
AccessToken string `json:"access_token"`
TokenType string `json:"token_type"`
ExpiresIn int64 `json:"expires_in"`
RefreshToken string `json:"refresh_token"`
Scope string `json:"scope"`
}
type User struct {
ID string `json:"id" gorm:"primaryKey"`
Username string `json:"username"`
Blacklisted bool `json:"blacklisted"`
Email string `json:"email"`
CreatedAt time.Time `json:"created_at"`
}
type AvatarDecorationData struct {
Asset string
SkuID string
}
type ExchangeCodeRequest struct {
GrantType string `json:"grant_type"`
Code string `json:"code"`
RedirectUri string `json:"redirect_uri"`
}
type Claims struct {
User User `json:"user"`
Exp uint64 `json:"exp"`
jwt.RegisteredClaims
}