feat: initial auth service support
This commit is contained in:
parent
6ed47b667c
commit
bbe57e07d5
10 changed files with 938 additions and 1 deletions
6
Dockerfiles/Dockerfile_auth
Normal file
6
Dockerfiles/Dockerfile_auth
Normal file
|
|
@ -0,0 +1,6 @@
|
||||||
|
FROM ubuntu:22.04
|
||||||
|
|
||||||
|
WORKDIR /app
|
||||||
|
COPY --chmod=755 modules/auth/auth /app
|
||||||
|
EXPOSE 8082
|
||||||
|
ENTRYPOINT ["/app/auth"]
|
||||||
329
auth/auth.gen.go
Normal file
329
auth/auth.gen.go
Normal file
|
|
@ -0,0 +1,329 @@
|
||||||
|
// Package auth provides primitives to interact with the openapi HTTP API.
|
||||||
|
//
|
||||||
|
// Code generated by github.com/oapi-codegen/oapi-codegen/v2 version v2.5.0 DO NOT EDIT.
|
||||||
|
package auth
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/gin-gonic/gin"
|
||||||
|
strictgin "github.com/oapi-codegen/runtime/strictmiddleware/gin"
|
||||||
|
)
|
||||||
|
|
||||||
|
// PostAuthSignInJSONBody defines parameters for PostAuthSignIn.
|
||||||
|
type PostAuthSignInJSONBody struct {
|
||||||
|
Nickname string `json:"nickname"`
|
||||||
|
Pass string `json:"pass"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthSignUpJSONBody defines parameters for PostAuthSignUp.
|
||||||
|
type PostAuthSignUpJSONBody struct {
|
||||||
|
Nickname string `json:"nickname"`
|
||||||
|
Pass string `json:"pass"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthVerifyTokenJSONBody defines parameters for PostAuthVerifyToken.
|
||||||
|
type PostAuthVerifyTokenJSONBody struct {
|
||||||
|
// Token JWT token to validate
|
||||||
|
Token string `json:"token"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthSignInJSONRequestBody defines body for PostAuthSignIn for application/json ContentType.
|
||||||
|
type PostAuthSignInJSONRequestBody PostAuthSignInJSONBody
|
||||||
|
|
||||||
|
// PostAuthSignUpJSONRequestBody defines body for PostAuthSignUp for application/json ContentType.
|
||||||
|
type PostAuthSignUpJSONRequestBody PostAuthSignUpJSONBody
|
||||||
|
|
||||||
|
// PostAuthVerifyTokenJSONRequestBody defines body for PostAuthVerifyToken for application/json ContentType.
|
||||||
|
type PostAuthVerifyTokenJSONRequestBody PostAuthVerifyTokenJSONBody
|
||||||
|
|
||||||
|
// ServerInterface represents all server handlers.
|
||||||
|
type ServerInterface interface {
|
||||||
|
// Sign in a user and return JWT
|
||||||
|
// (POST /auth/sign-in)
|
||||||
|
PostAuthSignIn(c *gin.Context)
|
||||||
|
// Sign up a new user
|
||||||
|
// (POST /auth/sign-up)
|
||||||
|
PostAuthSignUp(c *gin.Context)
|
||||||
|
// Verify JWT validity
|
||||||
|
// (POST /auth/verify-token)
|
||||||
|
PostAuthVerifyToken(c *gin.Context)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ServerInterfaceWrapper converts contexts to parameters.
|
||||||
|
type ServerInterfaceWrapper struct {
|
||||||
|
Handler ServerInterface
|
||||||
|
HandlerMiddlewares []MiddlewareFunc
|
||||||
|
ErrorHandler func(*gin.Context, error, int)
|
||||||
|
}
|
||||||
|
|
||||||
|
type MiddlewareFunc func(c *gin.Context)
|
||||||
|
|
||||||
|
// PostAuthSignIn operation middleware
|
||||||
|
func (siw *ServerInterfaceWrapper) PostAuthSignIn(c *gin.Context) {
|
||||||
|
|
||||||
|
for _, middleware := range siw.HandlerMiddlewares {
|
||||||
|
middleware(c)
|
||||||
|
if c.IsAborted() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
siw.Handler.PostAuthSignIn(c)
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthSignUp operation middleware
|
||||||
|
func (siw *ServerInterfaceWrapper) PostAuthSignUp(c *gin.Context) {
|
||||||
|
|
||||||
|
for _, middleware := range siw.HandlerMiddlewares {
|
||||||
|
middleware(c)
|
||||||
|
if c.IsAborted() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
siw.Handler.PostAuthSignUp(c)
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthVerifyToken operation middleware
|
||||||
|
func (siw *ServerInterfaceWrapper) PostAuthVerifyToken(c *gin.Context) {
|
||||||
|
|
||||||
|
for _, middleware := range siw.HandlerMiddlewares {
|
||||||
|
middleware(c)
|
||||||
|
if c.IsAborted() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
siw.Handler.PostAuthVerifyToken(c)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GinServerOptions provides options for the Gin server.
|
||||||
|
type GinServerOptions struct {
|
||||||
|
BaseURL string
|
||||||
|
Middlewares []MiddlewareFunc
|
||||||
|
ErrorHandler func(*gin.Context, error, int)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RegisterHandlers creates http.Handler with routing matching OpenAPI spec.
|
||||||
|
func RegisterHandlers(router gin.IRouter, si ServerInterface) {
|
||||||
|
RegisterHandlersWithOptions(router, si, GinServerOptions{})
|
||||||
|
}
|
||||||
|
|
||||||
|
// RegisterHandlersWithOptions creates http.Handler with additional options
|
||||||
|
func RegisterHandlersWithOptions(router gin.IRouter, si ServerInterface, options GinServerOptions) {
|
||||||
|
errorHandler := options.ErrorHandler
|
||||||
|
if errorHandler == nil {
|
||||||
|
errorHandler = func(c *gin.Context, err error, statusCode int) {
|
||||||
|
c.JSON(statusCode, gin.H{"msg": err.Error()})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
wrapper := ServerInterfaceWrapper{
|
||||||
|
Handler: si,
|
||||||
|
HandlerMiddlewares: options.Middlewares,
|
||||||
|
ErrorHandler: errorHandler,
|
||||||
|
}
|
||||||
|
|
||||||
|
router.POST(options.BaseURL+"/auth/sign-in", wrapper.PostAuthSignIn)
|
||||||
|
router.POST(options.BaseURL+"/auth/sign-up", wrapper.PostAuthSignUp)
|
||||||
|
router.POST(options.BaseURL+"/auth/verify-token", wrapper.PostAuthVerifyToken)
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthSignInRequestObject struct {
|
||||||
|
Body *PostAuthSignInJSONRequestBody
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthSignInResponseObject interface {
|
||||||
|
VisitPostAuthSignInResponse(w http.ResponseWriter) error
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthSignIn200JSONResponse struct {
|
||||||
|
Error *string `json:"error"`
|
||||||
|
Success *bool `json:"success,omitempty"`
|
||||||
|
|
||||||
|
// Token JWT token to access protected endpoints
|
||||||
|
Token *string `json:"token"`
|
||||||
|
UserId *string `json:"user_id"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (response PostAuthSignIn200JSONResponse) VisitPostAuthSignInResponse(w http.ResponseWriter) error {
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.WriteHeader(200)
|
||||||
|
|
||||||
|
return json.NewEncoder(w).Encode(response)
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthSignUpRequestObject struct {
|
||||||
|
Body *PostAuthSignUpJSONRequestBody
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthSignUpResponseObject interface {
|
||||||
|
VisitPostAuthSignUpResponse(w http.ResponseWriter) error
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthSignUp200JSONResponse struct {
|
||||||
|
Error *string `json:"error"`
|
||||||
|
Success *bool `json:"success,omitempty"`
|
||||||
|
UserId *string `json:"user_id"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (response PostAuthSignUp200JSONResponse) VisitPostAuthSignUpResponse(w http.ResponseWriter) error {
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.WriteHeader(200)
|
||||||
|
|
||||||
|
return json.NewEncoder(w).Encode(response)
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthVerifyTokenRequestObject struct {
|
||||||
|
Body *PostAuthVerifyTokenJSONRequestBody
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthVerifyTokenResponseObject interface {
|
||||||
|
VisitPostAuthVerifyTokenResponse(w http.ResponseWriter) error
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthVerifyToken200JSONResponse struct {
|
||||||
|
// Error Error message if token is invalid
|
||||||
|
Error *string `json:"error"`
|
||||||
|
|
||||||
|
// UserId User ID extracted from token if valid
|
||||||
|
UserId *string `json:"user_id"`
|
||||||
|
|
||||||
|
// Valid True if token is valid
|
||||||
|
Valid *bool `json:"valid,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (response PostAuthVerifyToken200JSONResponse) VisitPostAuthVerifyTokenResponse(w http.ResponseWriter) error {
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.WriteHeader(200)
|
||||||
|
|
||||||
|
return json.NewEncoder(w).Encode(response)
|
||||||
|
}
|
||||||
|
|
||||||
|
// StrictServerInterface represents all server handlers.
|
||||||
|
type StrictServerInterface interface {
|
||||||
|
// Sign in a user and return JWT
|
||||||
|
// (POST /auth/sign-in)
|
||||||
|
PostAuthSignIn(ctx context.Context, request PostAuthSignInRequestObject) (PostAuthSignInResponseObject, error)
|
||||||
|
// Sign up a new user
|
||||||
|
// (POST /auth/sign-up)
|
||||||
|
PostAuthSignUp(ctx context.Context, request PostAuthSignUpRequestObject) (PostAuthSignUpResponseObject, error)
|
||||||
|
// Verify JWT validity
|
||||||
|
// (POST /auth/verify-token)
|
||||||
|
PostAuthVerifyToken(ctx context.Context, request PostAuthVerifyTokenRequestObject) (PostAuthVerifyTokenResponseObject, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
type StrictHandlerFunc = strictgin.StrictGinHandlerFunc
|
||||||
|
type StrictMiddlewareFunc = strictgin.StrictGinMiddlewareFunc
|
||||||
|
|
||||||
|
func NewStrictHandler(ssi StrictServerInterface, middlewares []StrictMiddlewareFunc) ServerInterface {
|
||||||
|
return &strictHandler{ssi: ssi, middlewares: middlewares}
|
||||||
|
}
|
||||||
|
|
||||||
|
type strictHandler struct {
|
||||||
|
ssi StrictServerInterface
|
||||||
|
middlewares []StrictMiddlewareFunc
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthSignIn operation middleware
|
||||||
|
func (sh *strictHandler) PostAuthSignIn(ctx *gin.Context) {
|
||||||
|
var request PostAuthSignInRequestObject
|
||||||
|
|
||||||
|
var body PostAuthSignInJSONRequestBody
|
||||||
|
if err := ctx.ShouldBindJSON(&body); err != nil {
|
||||||
|
ctx.Status(http.StatusBadRequest)
|
||||||
|
ctx.Error(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
request.Body = &body
|
||||||
|
|
||||||
|
handler := func(ctx *gin.Context, request interface{}) (interface{}, error) {
|
||||||
|
return sh.ssi.PostAuthSignIn(ctx, request.(PostAuthSignInRequestObject))
|
||||||
|
}
|
||||||
|
for _, middleware := range sh.middlewares {
|
||||||
|
handler = middleware(handler, "PostAuthSignIn")
|
||||||
|
}
|
||||||
|
|
||||||
|
response, err := handler(ctx, request)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
ctx.Error(err)
|
||||||
|
ctx.Status(http.StatusInternalServerError)
|
||||||
|
} else if validResponse, ok := response.(PostAuthSignInResponseObject); ok {
|
||||||
|
if err := validResponse.VisitPostAuthSignInResponse(ctx.Writer); err != nil {
|
||||||
|
ctx.Error(err)
|
||||||
|
}
|
||||||
|
} else if response != nil {
|
||||||
|
ctx.Error(fmt.Errorf("unexpected response type: %T", response))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthSignUp operation middleware
|
||||||
|
func (sh *strictHandler) PostAuthSignUp(ctx *gin.Context) {
|
||||||
|
var request PostAuthSignUpRequestObject
|
||||||
|
|
||||||
|
var body PostAuthSignUpJSONRequestBody
|
||||||
|
if err := ctx.ShouldBindJSON(&body); err != nil {
|
||||||
|
ctx.Status(http.StatusBadRequest)
|
||||||
|
ctx.Error(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
request.Body = &body
|
||||||
|
|
||||||
|
handler := func(ctx *gin.Context, request interface{}) (interface{}, error) {
|
||||||
|
return sh.ssi.PostAuthSignUp(ctx, request.(PostAuthSignUpRequestObject))
|
||||||
|
}
|
||||||
|
for _, middleware := range sh.middlewares {
|
||||||
|
handler = middleware(handler, "PostAuthSignUp")
|
||||||
|
}
|
||||||
|
|
||||||
|
response, err := handler(ctx, request)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
ctx.Error(err)
|
||||||
|
ctx.Status(http.StatusInternalServerError)
|
||||||
|
} else if validResponse, ok := response.(PostAuthSignUpResponseObject); ok {
|
||||||
|
if err := validResponse.VisitPostAuthSignUpResponse(ctx.Writer); err != nil {
|
||||||
|
ctx.Error(err)
|
||||||
|
}
|
||||||
|
} else if response != nil {
|
||||||
|
ctx.Error(fmt.Errorf("unexpected response type: %T", response))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthVerifyToken operation middleware
|
||||||
|
func (sh *strictHandler) PostAuthVerifyToken(ctx *gin.Context) {
|
||||||
|
var request PostAuthVerifyTokenRequestObject
|
||||||
|
|
||||||
|
var body PostAuthVerifyTokenJSONRequestBody
|
||||||
|
if err := ctx.ShouldBindJSON(&body); err != nil {
|
||||||
|
ctx.Status(http.StatusBadRequest)
|
||||||
|
ctx.Error(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
request.Body = &body
|
||||||
|
|
||||||
|
handler := func(ctx *gin.Context, request interface{}) (interface{}, error) {
|
||||||
|
return sh.ssi.PostAuthVerifyToken(ctx, request.(PostAuthVerifyTokenRequestObject))
|
||||||
|
}
|
||||||
|
for _, middleware := range sh.middlewares {
|
||||||
|
handler = middleware(handler, "PostAuthVerifyToken")
|
||||||
|
}
|
||||||
|
|
||||||
|
response, err := handler(ctx, request)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
ctx.Error(err)
|
||||||
|
ctx.Status(http.StatusInternalServerError)
|
||||||
|
} else if validResponse, ok := response.(PostAuthVerifyTokenResponseObject); ok {
|
||||||
|
if err := validResponse.VisitPostAuthVerifyTokenResponse(ctx.Writer); err != nil {
|
||||||
|
ctx.Error(err)
|
||||||
|
}
|
||||||
|
} else if response != nil {
|
||||||
|
ctx.Error(fmt.Errorf("unexpected response type: %T", response))
|
||||||
|
}
|
||||||
|
}
|
||||||
329
auth/auth/auth.gen.go
Normal file
329
auth/auth/auth.gen.go
Normal file
|
|
@ -0,0 +1,329 @@
|
||||||
|
// Package oapi_auth provides primitives to interact with the openapi HTTP API.
|
||||||
|
//
|
||||||
|
// Code generated by github.com/oapi-codegen/oapi-codegen/v2 version v2.5.0 DO NOT EDIT.
|
||||||
|
package oapi_auth
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/gin-gonic/gin"
|
||||||
|
strictgin "github.com/oapi-codegen/runtime/strictmiddleware/gin"
|
||||||
|
)
|
||||||
|
|
||||||
|
// PostAuthSignInJSONBody defines parameters for PostAuthSignIn.
|
||||||
|
type PostAuthSignInJSONBody struct {
|
||||||
|
Nickname string `json:"nickname"`
|
||||||
|
Pass string `json:"pass"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthSignUpJSONBody defines parameters for PostAuthSignUp.
|
||||||
|
type PostAuthSignUpJSONBody struct {
|
||||||
|
Nickname string `json:"nickname"`
|
||||||
|
Pass string `json:"pass"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthVerifyTokenJSONBody defines parameters for PostAuthVerifyToken.
|
||||||
|
type PostAuthVerifyTokenJSONBody struct {
|
||||||
|
// Token JWT token to validate
|
||||||
|
Token string `json:"token"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthSignInJSONRequestBody defines body for PostAuthSignIn for application/json ContentType.
|
||||||
|
type PostAuthSignInJSONRequestBody PostAuthSignInJSONBody
|
||||||
|
|
||||||
|
// PostAuthSignUpJSONRequestBody defines body for PostAuthSignUp for application/json ContentType.
|
||||||
|
type PostAuthSignUpJSONRequestBody PostAuthSignUpJSONBody
|
||||||
|
|
||||||
|
// PostAuthVerifyTokenJSONRequestBody defines body for PostAuthVerifyToken for application/json ContentType.
|
||||||
|
type PostAuthVerifyTokenJSONRequestBody PostAuthVerifyTokenJSONBody
|
||||||
|
|
||||||
|
// ServerInterface represents all server handlers.
|
||||||
|
type ServerInterface interface {
|
||||||
|
// Sign in a user and return JWT
|
||||||
|
// (POST /auth/sign-in)
|
||||||
|
PostAuthSignIn(c *gin.Context)
|
||||||
|
// Sign up a new user
|
||||||
|
// (POST /auth/sign-up)
|
||||||
|
PostAuthSignUp(c *gin.Context)
|
||||||
|
// Verify JWT validity
|
||||||
|
// (POST /auth/verify-token)
|
||||||
|
PostAuthVerifyToken(c *gin.Context)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ServerInterfaceWrapper converts contexts to parameters.
|
||||||
|
type ServerInterfaceWrapper struct {
|
||||||
|
Handler ServerInterface
|
||||||
|
HandlerMiddlewares []MiddlewareFunc
|
||||||
|
ErrorHandler func(*gin.Context, error, int)
|
||||||
|
}
|
||||||
|
|
||||||
|
type MiddlewareFunc func(c *gin.Context)
|
||||||
|
|
||||||
|
// PostAuthSignIn operation middleware
|
||||||
|
func (siw *ServerInterfaceWrapper) PostAuthSignIn(c *gin.Context) {
|
||||||
|
|
||||||
|
for _, middleware := range siw.HandlerMiddlewares {
|
||||||
|
middleware(c)
|
||||||
|
if c.IsAborted() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
siw.Handler.PostAuthSignIn(c)
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthSignUp operation middleware
|
||||||
|
func (siw *ServerInterfaceWrapper) PostAuthSignUp(c *gin.Context) {
|
||||||
|
|
||||||
|
for _, middleware := range siw.HandlerMiddlewares {
|
||||||
|
middleware(c)
|
||||||
|
if c.IsAborted() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
siw.Handler.PostAuthSignUp(c)
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthVerifyToken operation middleware
|
||||||
|
func (siw *ServerInterfaceWrapper) PostAuthVerifyToken(c *gin.Context) {
|
||||||
|
|
||||||
|
for _, middleware := range siw.HandlerMiddlewares {
|
||||||
|
middleware(c)
|
||||||
|
if c.IsAborted() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
siw.Handler.PostAuthVerifyToken(c)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GinServerOptions provides options for the Gin server.
|
||||||
|
type GinServerOptions struct {
|
||||||
|
BaseURL string
|
||||||
|
Middlewares []MiddlewareFunc
|
||||||
|
ErrorHandler func(*gin.Context, error, int)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RegisterHandlers creates http.Handler with routing matching OpenAPI spec.
|
||||||
|
func RegisterHandlers(router gin.IRouter, si ServerInterface) {
|
||||||
|
RegisterHandlersWithOptions(router, si, GinServerOptions{})
|
||||||
|
}
|
||||||
|
|
||||||
|
// RegisterHandlersWithOptions creates http.Handler with additional options
|
||||||
|
func RegisterHandlersWithOptions(router gin.IRouter, si ServerInterface, options GinServerOptions) {
|
||||||
|
errorHandler := options.ErrorHandler
|
||||||
|
if errorHandler == nil {
|
||||||
|
errorHandler = func(c *gin.Context, err error, statusCode int) {
|
||||||
|
c.JSON(statusCode, gin.H{"msg": err.Error()})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
wrapper := ServerInterfaceWrapper{
|
||||||
|
Handler: si,
|
||||||
|
HandlerMiddlewares: options.Middlewares,
|
||||||
|
ErrorHandler: errorHandler,
|
||||||
|
}
|
||||||
|
|
||||||
|
router.POST(options.BaseURL+"/auth/sign-in", wrapper.PostAuthSignIn)
|
||||||
|
router.POST(options.BaseURL+"/auth/sign-up", wrapper.PostAuthSignUp)
|
||||||
|
router.POST(options.BaseURL+"/auth/verify-token", wrapper.PostAuthVerifyToken)
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthSignInRequestObject struct {
|
||||||
|
Body *PostAuthSignInJSONRequestBody
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthSignInResponseObject interface {
|
||||||
|
VisitPostAuthSignInResponse(w http.ResponseWriter) error
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthSignIn200JSONResponse struct {
|
||||||
|
Error *string `json:"error"`
|
||||||
|
Success *bool `json:"success,omitempty"`
|
||||||
|
|
||||||
|
// Token JWT token to access protected endpoints
|
||||||
|
Token *string `json:"token"`
|
||||||
|
UserId *string `json:"user_id"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (response PostAuthSignIn200JSONResponse) VisitPostAuthSignInResponse(w http.ResponseWriter) error {
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.WriteHeader(200)
|
||||||
|
|
||||||
|
return json.NewEncoder(w).Encode(response)
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthSignUpRequestObject struct {
|
||||||
|
Body *PostAuthSignUpJSONRequestBody
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthSignUpResponseObject interface {
|
||||||
|
VisitPostAuthSignUpResponse(w http.ResponseWriter) error
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthSignUp200JSONResponse struct {
|
||||||
|
Error *string `json:"error"`
|
||||||
|
Success *bool `json:"success,omitempty"`
|
||||||
|
UserId *string `json:"user_id"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (response PostAuthSignUp200JSONResponse) VisitPostAuthSignUpResponse(w http.ResponseWriter) error {
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.WriteHeader(200)
|
||||||
|
|
||||||
|
return json.NewEncoder(w).Encode(response)
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthVerifyTokenRequestObject struct {
|
||||||
|
Body *PostAuthVerifyTokenJSONRequestBody
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthVerifyTokenResponseObject interface {
|
||||||
|
VisitPostAuthVerifyTokenResponse(w http.ResponseWriter) error
|
||||||
|
}
|
||||||
|
|
||||||
|
type PostAuthVerifyToken200JSONResponse struct {
|
||||||
|
// Error Error message if token is invalid
|
||||||
|
Error *string `json:"error"`
|
||||||
|
|
||||||
|
// UserId User ID extracted from token if valid
|
||||||
|
UserId *string `json:"user_id"`
|
||||||
|
|
||||||
|
// Valid True if token is valid
|
||||||
|
Valid *bool `json:"valid,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (response PostAuthVerifyToken200JSONResponse) VisitPostAuthVerifyTokenResponse(w http.ResponseWriter) error {
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.WriteHeader(200)
|
||||||
|
|
||||||
|
return json.NewEncoder(w).Encode(response)
|
||||||
|
}
|
||||||
|
|
||||||
|
// StrictServerInterface represents all server handlers.
|
||||||
|
type StrictServerInterface interface {
|
||||||
|
// Sign in a user and return JWT
|
||||||
|
// (POST /auth/sign-in)
|
||||||
|
PostAuthSignIn(ctx context.Context, request PostAuthSignInRequestObject) (PostAuthSignInResponseObject, error)
|
||||||
|
// Sign up a new user
|
||||||
|
// (POST /auth/sign-up)
|
||||||
|
PostAuthSignUp(ctx context.Context, request PostAuthSignUpRequestObject) (PostAuthSignUpResponseObject, error)
|
||||||
|
// Verify JWT validity
|
||||||
|
// (POST /auth/verify-token)
|
||||||
|
PostAuthVerifyToken(ctx context.Context, request PostAuthVerifyTokenRequestObject) (PostAuthVerifyTokenResponseObject, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
type StrictHandlerFunc = strictgin.StrictGinHandlerFunc
|
||||||
|
type StrictMiddlewareFunc = strictgin.StrictGinMiddlewareFunc
|
||||||
|
|
||||||
|
func NewStrictHandler(ssi StrictServerInterface, middlewares []StrictMiddlewareFunc) ServerInterface {
|
||||||
|
return &strictHandler{ssi: ssi, middlewares: middlewares}
|
||||||
|
}
|
||||||
|
|
||||||
|
type strictHandler struct {
|
||||||
|
ssi StrictServerInterface
|
||||||
|
middlewares []StrictMiddlewareFunc
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthSignIn operation middleware
|
||||||
|
func (sh *strictHandler) PostAuthSignIn(ctx *gin.Context) {
|
||||||
|
var request PostAuthSignInRequestObject
|
||||||
|
|
||||||
|
var body PostAuthSignInJSONRequestBody
|
||||||
|
if err := ctx.ShouldBindJSON(&body); err != nil {
|
||||||
|
ctx.Status(http.StatusBadRequest)
|
||||||
|
ctx.Error(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
request.Body = &body
|
||||||
|
|
||||||
|
handler := func(ctx *gin.Context, request interface{}) (interface{}, error) {
|
||||||
|
return sh.ssi.PostAuthSignIn(ctx, request.(PostAuthSignInRequestObject))
|
||||||
|
}
|
||||||
|
for _, middleware := range sh.middlewares {
|
||||||
|
handler = middleware(handler, "PostAuthSignIn")
|
||||||
|
}
|
||||||
|
|
||||||
|
response, err := handler(ctx, request)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
ctx.Error(err)
|
||||||
|
ctx.Status(http.StatusInternalServerError)
|
||||||
|
} else if validResponse, ok := response.(PostAuthSignInResponseObject); ok {
|
||||||
|
if err := validResponse.VisitPostAuthSignInResponse(ctx.Writer); err != nil {
|
||||||
|
ctx.Error(err)
|
||||||
|
}
|
||||||
|
} else if response != nil {
|
||||||
|
ctx.Error(fmt.Errorf("unexpected response type: %T", response))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthSignUp operation middleware
|
||||||
|
func (sh *strictHandler) PostAuthSignUp(ctx *gin.Context) {
|
||||||
|
var request PostAuthSignUpRequestObject
|
||||||
|
|
||||||
|
var body PostAuthSignUpJSONRequestBody
|
||||||
|
if err := ctx.ShouldBindJSON(&body); err != nil {
|
||||||
|
ctx.Status(http.StatusBadRequest)
|
||||||
|
ctx.Error(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
request.Body = &body
|
||||||
|
|
||||||
|
handler := func(ctx *gin.Context, request interface{}) (interface{}, error) {
|
||||||
|
return sh.ssi.PostAuthSignUp(ctx, request.(PostAuthSignUpRequestObject))
|
||||||
|
}
|
||||||
|
for _, middleware := range sh.middlewares {
|
||||||
|
handler = middleware(handler, "PostAuthSignUp")
|
||||||
|
}
|
||||||
|
|
||||||
|
response, err := handler(ctx, request)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
ctx.Error(err)
|
||||||
|
ctx.Status(http.StatusInternalServerError)
|
||||||
|
} else if validResponse, ok := response.(PostAuthSignUpResponseObject); ok {
|
||||||
|
if err := validResponse.VisitPostAuthSignUpResponse(ctx.Writer); err != nil {
|
||||||
|
ctx.Error(err)
|
||||||
|
}
|
||||||
|
} else if response != nil {
|
||||||
|
ctx.Error(fmt.Errorf("unexpected response type: %T", response))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostAuthVerifyToken operation middleware
|
||||||
|
func (sh *strictHandler) PostAuthVerifyToken(ctx *gin.Context) {
|
||||||
|
var request PostAuthVerifyTokenRequestObject
|
||||||
|
|
||||||
|
var body PostAuthVerifyTokenJSONRequestBody
|
||||||
|
if err := ctx.ShouldBindJSON(&body); err != nil {
|
||||||
|
ctx.Status(http.StatusBadRequest)
|
||||||
|
ctx.Error(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
request.Body = &body
|
||||||
|
|
||||||
|
handler := func(ctx *gin.Context, request interface{}) (interface{}, error) {
|
||||||
|
return sh.ssi.PostAuthVerifyToken(ctx, request.(PostAuthVerifyTokenRequestObject))
|
||||||
|
}
|
||||||
|
for _, middleware := range sh.middlewares {
|
||||||
|
handler = middleware(handler, "PostAuthVerifyToken")
|
||||||
|
}
|
||||||
|
|
||||||
|
response, err := handler(ctx, request)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
ctx.Error(err)
|
||||||
|
ctx.Status(http.StatusInternalServerError)
|
||||||
|
} else if validResponse, ok := response.(PostAuthVerifyTokenResponseObject); ok {
|
||||||
|
if err := validResponse.VisitPostAuthVerifyTokenResponse(ctx.Writer); err != nil {
|
||||||
|
ctx.Error(err)
|
||||||
|
}
|
||||||
|
} else if response != nil {
|
||||||
|
ctx.Error(fmt.Errorf("unexpected response type: %T", response))
|
||||||
|
}
|
||||||
|
}
|
||||||
6
auth/oapi-auth-codegen.yaml
Normal file
6
auth/oapi-auth-codegen.yaml
Normal file
|
|
@ -0,0 +1,6 @@
|
||||||
|
package: auth
|
||||||
|
generate:
|
||||||
|
strict-server: true
|
||||||
|
gin-server: true
|
||||||
|
models: true
|
||||||
|
output: auth/auth.gen.go
|
||||||
112
auth/openapi-auth.yaml
Normal file
112
auth/openapi-auth.yaml
Normal file
|
|
@ -0,0 +1,112 @@
|
||||||
|
openapi: 3.1.0
|
||||||
|
info:
|
||||||
|
title: Auth Service
|
||||||
|
version: 1.0.0
|
||||||
|
|
||||||
|
paths:
|
||||||
|
/auth/sign-up:
|
||||||
|
post:
|
||||||
|
summary: Sign up a new user
|
||||||
|
tags: [Auth]
|
||||||
|
requestBody:
|
||||||
|
required: true
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: object
|
||||||
|
required: [nickname, pass]
|
||||||
|
properties:
|
||||||
|
nickname:
|
||||||
|
type: string
|
||||||
|
pass:
|
||||||
|
type: string
|
||||||
|
format: password
|
||||||
|
responses:
|
||||||
|
"200":
|
||||||
|
description: Sign-up result
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
success:
|
||||||
|
type: boolean
|
||||||
|
error:
|
||||||
|
type: string
|
||||||
|
nullable: true
|
||||||
|
user_id:
|
||||||
|
type: string
|
||||||
|
nullable: true
|
||||||
|
|
||||||
|
/auth/sign-in:
|
||||||
|
post:
|
||||||
|
summary: Sign in a user and return JWT
|
||||||
|
tags: [Auth]
|
||||||
|
requestBody:
|
||||||
|
required: true
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: object
|
||||||
|
required: [nickname, pass]
|
||||||
|
properties:
|
||||||
|
nickname:
|
||||||
|
type: string
|
||||||
|
pass:
|
||||||
|
type: string
|
||||||
|
format: password
|
||||||
|
responses:
|
||||||
|
"200":
|
||||||
|
description: Sign-in result with JWT
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
success:
|
||||||
|
type: boolean
|
||||||
|
error:
|
||||||
|
type: string
|
||||||
|
nullable: true
|
||||||
|
user_id:
|
||||||
|
type: string
|
||||||
|
nullable: true
|
||||||
|
token:
|
||||||
|
type: string
|
||||||
|
description: JWT token to access protected endpoints
|
||||||
|
nullable: true
|
||||||
|
|
||||||
|
/auth/verify-token:
|
||||||
|
post:
|
||||||
|
summary: Verify JWT validity
|
||||||
|
tags: [Auth]
|
||||||
|
requestBody:
|
||||||
|
required: true
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: object
|
||||||
|
required: [token]
|
||||||
|
properties:
|
||||||
|
token:
|
||||||
|
type: string
|
||||||
|
description: JWT token to validate
|
||||||
|
responses:
|
||||||
|
"200":
|
||||||
|
description: Token validation result
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
valid:
|
||||||
|
type: boolean
|
||||||
|
description: True if token is valid
|
||||||
|
user_id:
|
||||||
|
type: string
|
||||||
|
nullable: true
|
||||||
|
description: User ID extracted from token if valid
|
||||||
|
error:
|
||||||
|
type: string
|
||||||
|
nullable: true
|
||||||
|
description: Error message if token is invalid
|
||||||
3
go.mod
3
go.mod
|
|
@ -5,10 +5,10 @@ go 1.25.0
|
||||||
require (
|
require (
|
||||||
github.com/gin-contrib/cors v1.7.6
|
github.com/gin-contrib/cors v1.7.6
|
||||||
github.com/gin-gonic/gin v1.11.0
|
github.com/gin-gonic/gin v1.11.0
|
||||||
|
github.com/golang-jwt/jwt/v5 v5.3.0
|
||||||
github.com/jackc/pgx/v5 v5.7.6
|
github.com/jackc/pgx/v5 v5.7.6
|
||||||
github.com/oapi-codegen/runtime v1.1.2
|
github.com/oapi-codegen/runtime v1.1.2
|
||||||
github.com/pelletier/go-toml/v2 v2.2.4
|
github.com/pelletier/go-toml/v2 v2.2.4
|
||||||
golang.org/x/crypto v0.40.0
|
|
||||||
)
|
)
|
||||||
|
|
||||||
require (
|
require (
|
||||||
|
|
@ -38,6 +38,7 @@ require (
|
||||||
github.com/ugorji/go/codec v1.3.0 // indirect
|
github.com/ugorji/go/codec v1.3.0 // indirect
|
||||||
go.uber.org/mock v0.5.0 // indirect
|
go.uber.org/mock v0.5.0 // indirect
|
||||||
golang.org/x/arch v0.20.0 // indirect
|
golang.org/x/arch v0.20.0 // indirect
|
||||||
|
golang.org/x/crypto v0.40.0 // indirect
|
||||||
golang.org/x/mod v0.25.0 // indirect
|
golang.org/x/mod v0.25.0 // indirect
|
||||||
golang.org/x/net v0.42.0 // indirect
|
golang.org/x/net v0.42.0 // indirect
|
||||||
golang.org/x/sync v0.16.0 // indirect
|
golang.org/x/sync v0.16.0 // indirect
|
||||||
|
|
|
||||||
2
go.sum
2
go.sum
|
|
@ -31,6 +31,8 @@ github.com/goccy/go-json v0.10.5 h1:Fq85nIqj+gXn/S5ahsiTlK3TmC85qgirsdTP/+DeaC4=
|
||||||
github.com/goccy/go-json v0.10.5/go.mod h1:oq7eo15ShAhp70Anwd5lgX2pLfOS3QCiwU/PULtXL6M=
|
github.com/goccy/go-json v0.10.5/go.mod h1:oq7eo15ShAhp70Anwd5lgX2pLfOS3QCiwU/PULtXL6M=
|
||||||
github.com/goccy/go-yaml v1.18.0 h1:8W7wMFS12Pcas7KU+VVkaiCng+kG8QiFeFwzFb+rwuw=
|
github.com/goccy/go-yaml v1.18.0 h1:8W7wMFS12Pcas7KU+VVkaiCng+kG8QiFeFwzFb+rwuw=
|
||||||
github.com/goccy/go-yaml v1.18.0/go.mod h1:XBurs7gK8ATbW4ZPGKgcbrY1Br56PdM69F7LkFRi1kA=
|
github.com/goccy/go-yaml v1.18.0/go.mod h1:XBurs7gK8ATbW4ZPGKgcbrY1Br56PdM69F7LkFRi1kA=
|
||||||
|
github.com/golang-jwt/jwt/v5 v5.3.0 h1:pv4AsKCKKZuqlgs5sUmn4x8UlGa0kEVt/puTpKx9vvo=
|
||||||
|
github.com/golang-jwt/jwt/v5 v5.3.0/go.mod h1:fxCRLWMO43lRc8nhHWY6LGqRcf+1gQWArsqaEUEa5bE=
|
||||||
github.com/google/go-cmp v0.7.0 h1:wk8382ETsv4JYUZwIsn6YpYiWiBsYLSJiTsyBybVuN8=
|
github.com/google/go-cmp v0.7.0 h1:wk8382ETsv4JYUZwIsn6YpYiWiBsYLSJiTsyBybVuN8=
|
||||||
github.com/google/go-cmp v0.7.0/go.mod h1:pXiqmnSA92OHEEa9HXL2W4E7lf9JzCmGVUdgjX3N/iU=
|
github.com/google/go-cmp v0.7.0/go.mod h1:pXiqmnSA92OHEEa9HXL2W4E7lf9JzCmGVUdgjX3N/iU=
|
||||||
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
||||||
|
|
|
||||||
108
modules/auth/handlers/handlers.go
Normal file
108
modules/auth/handlers/handlers.go
Normal file
|
|
@ -0,0 +1,108 @@
|
||||||
|
package handlers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
auth "nyanimedb/auth"
|
||||||
|
sqlc "nyanimedb/sql"
|
||||||
|
"strconv"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/golang-jwt/jwt/v5"
|
||||||
|
)
|
||||||
|
|
||||||
|
var secretKey = []byte("my_secret_key")
|
||||||
|
|
||||||
|
func generateToken(userID string) (string, error) {
|
||||||
|
claims := jwt.MapClaims{
|
||||||
|
"user_id": userID,
|
||||||
|
"exp": time.Now().Add(time.Hour * 24).Unix(),
|
||||||
|
}
|
||||||
|
|
||||||
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
||||||
|
return token.SignedString(secretKey)
|
||||||
|
}
|
||||||
|
|
||||||
|
var UserDb = make(map[string]string) //TEMP
|
||||||
|
|
||||||
|
type Server struct {
|
||||||
|
db *sqlc.Queries
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewServer(db *sqlc.Queries) Server {
|
||||||
|
return Server{db: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
func parseInt64(s string) (int32, error) {
|
||||||
|
i, err := strconv.ParseInt(s, 10, 64)
|
||||||
|
return int32(i), err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s Server) PostAuthSignIn(ctx context.Context, req auth.PostAuthSignInRequestObject) (auth.PostAuthSignInResponseObject, error) {
|
||||||
|
err := ""
|
||||||
|
success := true
|
||||||
|
t, _ := generateToken(req.Body.Nickname)
|
||||||
|
|
||||||
|
UserDb[req.Body.Nickname] = req.Body.Pass
|
||||||
|
|
||||||
|
return auth.PostAuthSignIn200JSONResponse{
|
||||||
|
Error: &err,
|
||||||
|
Success: &success,
|
||||||
|
UserId: &req.Body.Nickname,
|
||||||
|
Token: &t,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s Server) PostAuthSignUp(ctx context.Context, req auth.PostAuthSignUpRequestObject) (auth.PostAuthSignUpResponseObject, error) {
|
||||||
|
err := ""
|
||||||
|
success := true
|
||||||
|
UserDb[req.Body.Nickname] = req.Body.Pass
|
||||||
|
|
||||||
|
return auth.PostAuthSignUp200JSONResponse{
|
||||||
|
Error: &err,
|
||||||
|
Success: &success,
|
||||||
|
UserId: &req.Body.Nickname,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s Server) PostAuthVerifyToken(ctx context.Context, req auth.PostAuthVerifyTokenRequestObject) (auth.PostAuthVerifyTokenResponseObject, error) {
|
||||||
|
valid := false
|
||||||
|
var userID *string
|
||||||
|
var errStr *string
|
||||||
|
|
||||||
|
token, err := jwt.Parse(req.Body.Token, func(t *jwt.Token) (interface{}, error) {
|
||||||
|
if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok {
|
||||||
|
return nil, fmt.Errorf("unexpected signing method")
|
||||||
|
}
|
||||||
|
return secretKey, nil
|
||||||
|
})
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
e := err.Error()
|
||||||
|
errStr = &e
|
||||||
|
return auth.PostAuthVerifyToken200JSONResponse{
|
||||||
|
Valid: &valid,
|
||||||
|
UserId: userID,
|
||||||
|
Error: errStr,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if claims, ok := token.Claims.(jwt.MapClaims); ok && token.Valid {
|
||||||
|
if uid, ok := claims["user_id"].(string); ok {
|
||||||
|
valid = true
|
||||||
|
userID = &uid
|
||||||
|
} else {
|
||||||
|
e := "user_id not found in token"
|
||||||
|
errStr = &e
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
e := "invalid token claims"
|
||||||
|
errStr = &e
|
||||||
|
}
|
||||||
|
|
||||||
|
return auth.PostAuthVerifyToken200JSONResponse{
|
||||||
|
Valid: &valid,
|
||||||
|
UserId: userID,
|
||||||
|
Error: errStr,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
38
modules/auth/main.go
Normal file
38
modules/auth/main.go
Normal file
|
|
@ -0,0 +1,38 @@
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"time"
|
||||||
|
|
||||||
|
auth "nyanimedb/auth"
|
||||||
|
handlers "nyanimedb/modules/auth/handlers"
|
||||||
|
sqlc "nyanimedb/sql"
|
||||||
|
|
||||||
|
"github.com/gin-contrib/cors"
|
||||||
|
"github.com/gin-gonic/gin"
|
||||||
|
)
|
||||||
|
|
||||||
|
var AppConfig Config
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
r := gin.Default()
|
||||||
|
|
||||||
|
var queries *sqlc.Queries = nil
|
||||||
|
|
||||||
|
server := handlers.NewServer(queries)
|
||||||
|
|
||||||
|
r.Use(cors.New(cors.Config{
|
||||||
|
AllowOrigins: []string{"*"}, // allow all origins, change to specific domains in production
|
||||||
|
AllowMethods: []string{"GET", "POST", "PUT", "DELETE"},
|
||||||
|
AllowHeaders: []string{"Origin", "Content-Type", "Accept"},
|
||||||
|
ExposeHeaders: []string{"Content-Length"},
|
||||||
|
AllowCredentials: true,
|
||||||
|
MaxAge: 12 * time.Hour,
|
||||||
|
}))
|
||||||
|
|
||||||
|
auth.RegisterHandlers(r, auth.NewStrictHandler(
|
||||||
|
server,
|
||||||
|
[]auth.StrictMiddlewareFunc{},
|
||||||
|
))
|
||||||
|
|
||||||
|
r.Run(":8082")
|
||||||
|
}
|
||||||
6
modules/auth/types.go
Normal file
6
modules/auth/types.go
Normal file
|
|
@ -0,0 +1,6 @@
|
||||||
|
package main
|
||||||
|
|
||||||
|
type Config struct {
|
||||||
|
JwtPrivateKey string
|
||||||
|
LogLevel string `toml:"LogLevel" env:"LOG_LEVEL"`
|
||||||
|
}
|
||||||
Loading…
Add table
Add a link
Reference in a new issue