115 lines
2.7 KiB
Go
115 lines
2.7 KiB
Go
|
|
package server
|
||
|
|
|
||
|
|
import (
|
||
|
|
"encoding/json"
|
||
|
|
"net/http"
|
||
|
|
"time"
|
||
|
|
|
||
|
|
"github.com/golang-jwt/jwt/v5"
|
||
|
|
)
|
||
|
|
|
||
|
|
type Claims struct {
|
||
|
|
UserID int64 `json:"user_id"`
|
||
|
|
Username string `json:"username"`
|
||
|
|
Role string `json:"role"`
|
||
|
|
jwt.RegisteredClaims
|
||
|
|
}
|
||
|
|
|
||
|
|
type loginRequest struct {
|
||
|
|
Username string `json:"username"`
|
||
|
|
Password string `json:"password"`
|
||
|
|
}
|
||
|
|
|
||
|
|
type loginResponse struct {
|
||
|
|
Token string `json:"token"`
|
||
|
|
Username string `json:"username"`
|
||
|
|
Role string `json:"role"`
|
||
|
|
}
|
||
|
|
|
||
|
|
func (s *Server) handleLogin(w http.ResponseWriter, r *http.Request) {
|
||
|
|
var req loginRequest
|
||
|
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||
|
|
http.Error(w, "Invalid request body", http.StatusBadRequest)
|
||
|
|
return
|
||
|
|
}
|
||
|
|
|
||
|
|
user, err := s.DB.AuthenticateUser(req.Username, req.Password)
|
||
|
|
if err != nil {
|
||
|
|
http.Error(w, "Internal error", http.StatusInternalServerError)
|
||
|
|
return
|
||
|
|
}
|
||
|
|
if user == nil {
|
||
|
|
http.Error(w, "Invalid credentials", http.StatusUnauthorized)
|
||
|
|
return
|
||
|
|
}
|
||
|
|
|
||
|
|
// Generate JWT
|
||
|
|
claims := &Claims{
|
||
|
|
UserID: user.ID,
|
||
|
|
Username: user.Username,
|
||
|
|
Role: user.Role,
|
||
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
||
|
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(24 * time.Hour)),
|
||
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
||
|
|
},
|
||
|
|
}
|
||
|
|
|
||
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
||
|
|
tokenStr, err := token.SignedString(s.JWTKey)
|
||
|
|
if err != nil {
|
||
|
|
http.Error(w, "Token generation failed", http.StatusInternalServerError)
|
||
|
|
return
|
||
|
|
}
|
||
|
|
|
||
|
|
// Set cookie
|
||
|
|
http.SetCookie(w, &http.Cookie{
|
||
|
|
Name: "setec_token",
|
||
|
|
Value: tokenStr,
|
||
|
|
Path: "/",
|
||
|
|
HttpOnly: true,
|
||
|
|
Secure: s.Config.Server.TLS,
|
||
|
|
SameSite: http.SameSiteStrictMode,
|
||
|
|
MaxAge: 86400,
|
||
|
|
})
|
||
|
|
|
||
|
|
writeJSON(w, http.StatusOK, loginResponse{
|
||
|
|
Token: tokenStr,
|
||
|
|
Username: user.Username,
|
||
|
|
Role: user.Role,
|
||
|
|
})
|
||
|
|
}
|
||
|
|
|
||
|
|
func (s *Server) handleLogout(w http.ResponseWriter, r *http.Request) {
|
||
|
|
http.SetCookie(w, &http.Cookie{
|
||
|
|
Name: "setec_token",
|
||
|
|
Value: "",
|
||
|
|
Path: "/",
|
||
|
|
HttpOnly: true,
|
||
|
|
MaxAge: -1,
|
||
|
|
})
|
||
|
|
writeJSON(w, http.StatusOK, map[string]string{"status": "logged out"})
|
||
|
|
}
|
||
|
|
|
||
|
|
func (s *Server) handleAuthStatus(w http.ResponseWriter, r *http.Request) {
|
||
|
|
claims := getClaimsFromContext(r.Context())
|
||
|
|
if claims == nil {
|
||
|
|
http.Error(w, "Not authenticated", http.StatusUnauthorized)
|
||
|
|
return
|
||
|
|
}
|
||
|
|
writeJSON(w, http.StatusOK, map[string]interface{}{
|
||
|
|
"user_id": claims.UserID,
|
||
|
|
"username": claims.Username,
|
||
|
|
"role": claims.Role,
|
||
|
|
})
|
||
|
|
}
|
||
|
|
|
||
|
|
func (s *Server) handleLoginPage(w http.ResponseWriter, r *http.Request) {
|
||
|
|
s.renderTemplate(w, "login.html", nil)
|
||
|
|
}
|
||
|
|
|
||
|
|
func writeJSON(w http.ResponseWriter, status int, v interface{}) {
|
||
|
|
w.Header().Set("Content-Type", "application/json")
|
||
|
|
w.WriteHeader(status)
|
||
|
|
json.NewEncoder(w).Encode(v)
|
||
|
|
}
|