summaryrefslogtreecommitdiff
path: root/api/handlers
diff options
context:
space:
mode:
authorSanto Cariotti <santo@dcariotti.me>2025-04-02 19:31:12 +0200
committerSanto Cariotti <santo@dcariotti.me>2025-04-02 19:37:12 +0200
commita9b84f3f3b1d92335188d43048587e32e0921079 (patch)
treea4313f7660a99745d7d5da4d92dc9509d0dbe35e /api/handlers
parent2e92ccd66eb5c31b8fbbcd205d7b4a882450e9d0 (diff)
Init login and frontend
Diffstat (limited to 'api/handlers')
-rw-r--r--api/handlers/handlers.go68
1 files changed, 68 insertions, 0 deletions
diff --git a/api/handlers/handlers.go b/api/handlers/handlers.go
new file mode 100644
index 0000000..7d5fd10
--- /dev/null
+++ b/api/handlers/handlers.go
@@ -0,0 +1,68 @@
+package handlers
+
+import (
+ "encoding/json"
+ "net/http"
+
+ "github.com/boozec/rahanna/api/auth"
+ "github.com/boozec/rahanna/api/database"
+ "golang.org/x/crypto/bcrypt"
+)
+
+func RegisterUser(w http.ResponseWriter, r *http.Request) {
+ var user database.User
+ err := json.NewDecoder(r.Body).Decode(&user)
+ if err != nil {
+ http.Error(w, err.Error(), http.StatusBadRequest)
+ return
+ }
+
+ hashedPassword, err := bcrypt.GenerateFromPassword([]byte(user.Password), bcrypt.DefaultCost)
+ if err != nil {
+ http.Error(w, err.Error(), http.StatusInternalServerError)
+ return
+ }
+ user.Password = string(hashedPassword)
+
+ db, _ := database.GetDb()
+
+ result := db.Create(&user)
+ if result.Error != nil {
+ http.Error(w, result.Error.Error(), http.StatusInternalServerError)
+ return
+ }
+
+ w.WriteHeader(http.StatusCreated)
+}
+
+func LoginUser(w http.ResponseWriter, r *http.Request) {
+ var inputUser database.User
+ err := json.NewDecoder(r.Body).Decode(&inputUser)
+ if err != nil {
+ http.Error(w, err.Error(), http.StatusBadRequest)
+ return
+ }
+
+ var storedUser database.User
+
+ db, _ := database.GetDb()
+ result := db.Where("username = ?", inputUser.Username).First(&storedUser)
+ if result.Error != nil {
+ http.Error(w, "Invalid credentials", http.StatusUnauthorized)
+ return
+ }
+
+ err = bcrypt.CompareHashAndPassword([]byte(storedUser.Password), []byte(inputUser.Password))
+ if err != nil {
+ http.Error(w, "Invalid credentials", http.StatusUnauthorized)
+ return
+ }
+
+ token, err := auth.GenerateJWT(storedUser.ID)
+ if err != nil {
+ http.Error(w, err.Error(), http.StatusInternalServerError)
+ return
+ }
+
+ json.NewEncoder(w).Encode(map[string]string{"token": token})
+}