Compare commits

..

1 commit

Author SHA1 Message Date
hex
0521b523c4 feat: database user creation && readme explanation 2025-05-10 15:31:34 +02:00
6 changed files with 23 additions and 33 deletions

1
.gitignore vendored
View file

@ -1,4 +1,3 @@
.env .env
tmp tmp
*.db *.db
imgs

View file

@ -1,3 +1,8 @@
# stereo.cat backend # stereo.cat backend
written in Go, uses Gin. written in Go, uses Gin.
## database shit
Instead of using Discord oAuth as a database, we instead use it as a login source, only using it to source a username/id, avatar data and a secure login/registration flow.
We store these attributes alongside stereo.cat specific attributes in our own database. There is a trade-off however: this means that avatar & username data is not updated in real-time, only when the oauth flow is executed.

View file

@ -31,7 +31,17 @@ func RegisterAuthRoutes(cfg *types.StereoConfig, api *gin.RouterGroup) {
panic(err) panic(err)
} }
c.String(http.StatusOK, jwt) res := cfg.Database.FirstOrCreate(&user)
if res.Error != nil {
panic(res.Error)
}
// TODO: redirect to dashboard
c.JSON(http.StatusOK, gin.H{
"jwt": jwt,
"known": res.RowsAffected == 0,
})
}) })
api.GET("/auth/me", auth.JwtMiddleware(cfg.JWTSecret), func(c *gin.Context) { api.GET("/auth/me", auth.JwtMiddleware(cfg.JWTSecret), func(c *gin.Context) {

View file

@ -4,36 +4,22 @@ import (
"path/filepath" "path/filepath"
"github.com/gin-gonic/gin" "github.com/gin-gonic/gin"
"github.com/golang-jwt/jwt/v5"
"stereo.cat/backend/internal/auth"
"stereo.cat/backend/internal/types" "stereo.cat/backend/internal/types"
) )
func RegisterUploadRoutes(cfg *types.StereoConfig, api *gin.RouterGroup) { func RegisterUploadRoutes(cfg *types.StereoConfig, api *gin.RouterGroup) {
api.POST("/upload", auth.JwtMiddleware(cfg.JWTSecret), func(c *gin.Context) { api.POST("/upload", func(c *gin.Context) {
claims := c.MustGet("claims").(jwt.MapClaims)
user := claims["user"].(auth.User)
uid := user.ID
if uid == "" {
c.JSON(401, gin.H{"error": "unauthorized"})
return
}
file, err := c.FormFile("file") file, err := c.FormFile("file")
if err != nil { if err != nil {
c.JSON(400, gin.H{"error": "file is required"}) c.JSON(400, gin.H{"error": "file is required"})
return return
} }
filePath := filepath.Join(cfg.ImagePath, uid, file.Filename) filePath := filepath.Join(cfg.ImagePath, file.Filename)
if err := c.SaveUploadedFile(file, filePath); err != nil { if err := c.SaveUploadedFile(file, filePath); err != nil {
c.JSON(500, gin.H{"error": "failed to save file"}) c.JSON(500, gin.H{"error": "failed to save file"})
return return
} }
c.JSON(200, gin.H{"message": "file uploaded successfully"})
}) })
api.GET("/:name", func(c *gin.Context) { api.GET("/:name", func(c *gin.Context) {

View file

@ -11,9 +11,9 @@ import (
) )
func GenerateJWT(key string, user User, expiryTimestamp uint64) (string, error) { func GenerateJWT(key string, user User, expiryTimestamp uint64) (string, error) {
claims := Claims{ claims := jwt.MapClaims{
User: user, "user": user,
Exp: expiryTimestamp, "exp": expiryTimestamp,
} }
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims) token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)

View file

@ -1,10 +1,6 @@
package auth package auth
import ( import "time"
"time"
"github.com/golang-jwt/jwt/v5"
)
type TokenResponse struct { type TokenResponse struct {
AccessToken string `json:"access_token"` AccessToken string `json:"access_token"`
@ -32,9 +28,3 @@ type ExchangeCodeRequest struct {
Code string `json:"code"` Code string `json:"code"`
RedirectUri string `json:"redirect_uri"` RedirectUri string `json:"redirect_uri"`
} }
type Claims struct {
User User `json:"user"`
Exp uint64 `json:"exp"`
jwt.RegisteredClaims
}