summaryrefslogtreecommitdiff
path: root/api/handlers/handlers.go
blob: cc7a9d9517dd836349f2d13244be520cc57bf01e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
package handlers

import (
	"encoding/json"
	"log/slog"
	"net/http"

	"github.com/boozec/rahanna/api/auth"
	"github.com/boozec/rahanna/api/database"
	utils "github.com/boozec/rahanna/pkg"
	"golang.org/x/crypto/bcrypt"
)

func RegisterUser(w http.ResponseWriter, r *http.Request) {
	slog.Info("POST /register")
	var user database.User
	err := json.NewDecoder(r.Body).Decode(&user)
	if err != nil {
		utils.JsonError(&w, err.Error())
		return
	}

	if len(user.Password) < 4 {
		utils.JsonError(&w, "password too short")
		return
	}

	var storedUser database.User
	db, _ := database.GetDb()
	result := db.Where("username = ?", user.Username).First(&storedUser)

	if result.Error == nil {
		utils.JsonError(&w, "user with this username already exists")
		return
	}

	hashedPassword, err := bcrypt.GenerateFromPassword([]byte(user.Password), bcrypt.DefaultCost)
	if err != nil {
		utils.JsonError(&w, err.Error())
		return
	}
	user.Password = string(hashedPassword)

	result = db.Create(&user)
	if result.Error != nil {
		utils.JsonError(&w, result.Error.Error())
		return
	}

	token, err := auth.GenerateJWT(user.ID)
	if err != nil {
		utils.JsonError(&w, err.Error())
		return
	}

	json.NewEncoder(w).Encode(map[string]string{"token": token})
}

func LoginUser(w http.ResponseWriter, r *http.Request) {
	slog.Info("POST /login")
	var inputUser database.User
	err := json.NewDecoder(r.Body).Decode(&inputUser)
	if err != nil {
		utils.JsonError(&w, err.Error())
		return
	}

	var storedUser database.User

	db, _ := database.GetDb()
	result := db.Where("username = ?", inputUser.Username).First(&storedUser)
	if result.Error != nil {
		utils.JsonError(&w, "invalid credentials")
		return
	}

	err = bcrypt.CompareHashAndPassword([]byte(storedUser.Password), []byte(inputUser.Password))
	if err != nil {
		utils.JsonError(&w, "invalid credentials")
		return
	}

	token, err := auth.GenerateJWT(storedUser.ID)
	if err != nil {
		utils.JsonError(&w, err.Error())
		return
	}

	json.NewEncoder(w).Encode(map[string]string{"token": token})
}