personal-site/auth/auth.go
2021-12-16 07:29:16 -05:00

150 lines
3.4 KiB
Go

package auth
import (
"crypto/rand"
"encoding/hex"
"errors"
"time"
"goweb/config"
"goweb/ent"
"goweb/ent/passwordtoken"
"goweb/ent/user"
"github.com/labstack/echo-contrib/session"
"github.com/labstack/echo/v4"
"golang.org/x/crypto/bcrypt"
)
const (
sessionName = "ua"
sessionKeyUserID = "user_id"
sessionKeyAuthenticated = "authenticated"
)
type NotAuthenticatedError struct{}
// Error implements the error interface.
func (e NotAuthenticatedError) Error() string {
return "user not authenticated"
}
type Client struct {
config *config.Config
orm *ent.Client
}
func NewClient(cfg *config.Config, orm *ent.Client) *Client {
return &Client{
config: cfg,
orm: orm,
}
}
func (c *Client) Login(ctx echo.Context, userID int) error {
sess, err := session.Get(sessionName, ctx)
if err != nil {
return err
}
sess.Values[sessionKeyUserID] = userID
sess.Values[sessionKeyAuthenticated] = true
return sess.Save(ctx.Request(), ctx.Response())
}
func (c *Client) Logout(ctx echo.Context) error {
sess, err := session.Get(sessionName, ctx)
if err != nil {
return err
}
sess.Values[sessionKeyAuthenticated] = false
return sess.Save(ctx.Request(), ctx.Response())
}
func (c *Client) GetAuthenticatedUserID(ctx echo.Context) (int, error) {
sess, err := session.Get(sessionName, ctx)
if err != nil {
return 0, err
}
if sess.Values[sessionKeyAuthenticated] == true {
return sess.Values[sessionKeyUserID].(int), nil
}
return 0, NotAuthenticatedError{}
}
func (c *Client) GetAuthenticatedUser(ctx echo.Context) (*ent.User, error) {
if userID, err := c.GetAuthenticatedUserID(ctx); err == nil {
return c.orm.User.Query().
Where(user.ID(userID)).
First(ctx.Request().Context())
}
return nil, NotAuthenticatedError{}
}
func (c *Client) HashPassword(password string) (string, error) {
hash, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)
if err != nil {
return "", err
}
return string(hash), nil
}
func (c *Client) CheckPassword(password, hash string) error {
return bcrypt.CompareHashAndPassword([]byte(hash), []byte(password))
}
func (c *Client) GeneratePasswordResetToken(ctx echo.Context, userID int) (string, *ent.PasswordToken, error) {
// Generate the token, which is what will go in the URL, but not the database
token := c.RandomToken(64)
// Hash the token, which is what will be stored in the database
hash, err := c.HashPassword(token)
if err != nil {
return "", nil, err
}
// Create and save the password reset token
pt, err := c.orm.PasswordToken.
Create().
SetHash(hash).
SetUserID(userID).
Save(ctx.Request().Context())
return token, pt, err
}
func (c *Client) GetValidPasswordToken(ctx echo.Context, token string) (*ent.PasswordToken, error) {
// Hash the token in order to match in the database
hash, err := c.HashPassword(token)
if err != nil {
return nil, err
}
// Query to find a matching token
pt, err := c.orm.PasswordToken.
Query().
Where(passwordtoken.Hash(hash)).
First(ctx.Request().Context())
if err != nil {
ctx.Logger().Error(err)
return nil, err
}
// Check if the token is no longer valid
if pt.CreatedAt.Before(time.Now().Add(-c.config.App.PasswordTokenExpiration)) {
return nil, errors.New("token has expired")
}
return pt, nil
}
func (c *Client) RandomToken(length int) string {
b := make([]byte, length)
if _, err := rand.Read(b); err != nil {
return ""
}
return hex.EncodeToString(b)
}