implemented login logic

This commit is contained in:
2026-03-11 19:23:58 +01:00
parent ebfe80133c
commit 744dd7f42d
6 changed files with 106 additions and 15 deletions
+20 -10
View File
@@ -21,7 +21,7 @@ func InitDatabase(ctx context.Context) {
CREATE TABLE IF NOT EXISTS users ( CREATE TABLE IF NOT EXISTS users (
Id SERIAL PRIMARY KEY, Id SERIAL PRIMARY KEY,
Name VARCHAR(20) UNIQUE NOT NULL, Name VARCHAR(20) UNIQUE NOT NULL,
pass_hash VARCHAR(60) NOT NULL, PassHash VARCHAR(60) NOT NULL,
Color VARCHAR(3) NOT NULL Color VARCHAR(3) NOT NULL
) )
`) `)
@@ -31,8 +31,8 @@ func InitDatabase(ctx context.Context) {
dbConnection = conn dbConnection = conn
} }
func AddNewUser(ctx context.Context, user User) (uint, error) { func AddNewUser(ctx context.Context, user User) (uint32, error) {
var id uint var id uint32
var err error var err error
if len(user.Name) == 0 || len(user.Name) > 20 { if len(user.Name) == 0 || len(user.Name) > 20 {
@@ -54,16 +54,16 @@ func AddNewUser(ctx context.Context, user User) (uint, error) {
return 0, errors.New("color invalid") return 0, errors.New("color invalid")
} }
err = dbConnection.QueryRow(ctx, ` err = dbConnection.QueryRow(ctx, `
INSERT INTO users (Name, pass_hash, Color) INSERT INTO users (Name, PassHash, Color)
VALUES ($1, $2, $3) VALUES ($1, $2, $3)
RETURNING Id RETURNING Id
`, user.Name, user.IsPasswordHashed, user.Color).Scan(&id) `, user.Name, user.IsPasswordHashed, user.Color).Scan(&id)
return id, err return id, err
} }
func CheckPassword(ctx context.Context, id string, plainPassword string) bool { func isPassValid(ctx context.Context, id uint32, plainPassword string) bool {
var controlHash string var controlHash string
err := dbConnection.QueryRow(ctx, "SELECT pass_hash FROM users WHERE Id = $1", id).Scan(&controlHash) err := dbConnection.QueryRow(ctx, "SELECT PassHash FROM users WHERE Id = $1", id).Scan(&controlHash)
if err != nil { if err != nil {
return false return false
} }
@@ -71,13 +71,23 @@ func CheckPassword(ctx context.Context, id string, plainPassword string) bool {
return bcrypt.CompareHashAndPassword([]byte(controlHash), []byte(plainPassword)) == nil return bcrypt.CompareHashAndPassword([]byte(controlHash), []byte(plainPassword)) == nil
} }
func GetUserData(ctx context.Context, id string) (User, error) { func GetUserDataById(ctx context.Context, id uint32) (*User, error) {
var user User var user User
err := dbConnection.QueryRow(ctx, "SELECT Id, Name, pass_hash, Color FROM users WHERE Id = $1", id). err := dbConnection.QueryRow(ctx, "SELECT Id, Name, PassHash, Color FROM users WHERE Id = $1", id).
Scan(&user.Id, &user.Name, &user.Password, &user.Color) Scan(&user.Id, &user.Name, &user.Password, &user.Color)
if err != nil { if err != nil {
return User{}, err return &User{}, err
} }
user.IsPasswordHashed = true user.IsPasswordHashed = true
return user, nil return &user, nil
}
func GetUserDataByName(ctx context.Context, name string) (*User, error) {
var user User
err := dbConnection.QueryRow(ctx, "SELECT Id, Name, PassHash, Color FROM users WHERE Name = $1", name).
Scan(&user.Id, &user.Name, &user.Password, &user.Color)
if err != nil {
return &User{}, err
}
user.IsPasswordHashed = true
return &user, nil
} }
+68
View File
@@ -0,0 +1,68 @@
package main
import (
"net/http"
"golang.org/x/crypto/bcrypt"
)
func RegisterHandler(response http.ResponseWriter, request *http.Request) {
if request.Method != http.MethodPost {
http.Error(response, "POST only", http.StatusMethodNotAllowed)
return
}
ctx := request.Context()
username := request.FormValue("username")
password := request.FormValue("password")
if len(username) < 2 {
http.Error(response, "short username", http.StatusBadRequest)
return
}
if len(password) < 8 {
http.Error(response, "short password", http.StatusBadRequest)
return
}
if _, err := GetUserDataByName(ctx, username); err == nil {
http.Error(response, "User already exists", http.StatusBadRequest)
return
}
if _, err := AddNewUser(ctx, User{0, username, password, "xxx", false}); err != nil {
http.Error(response, "Internal server error", http.StatusInternalServerError)
return
}
}
func LoginHandler(response http.ResponseWriter, request *http.Request) {
if request.Method != http.MethodPost {
http.Error(response, "POST only", http.StatusMethodNotAllowed)
}
ctx := request.Context()
username := request.FormValue("username")
password := request.FormValue("password")
if len(username) < 2 {
http.Error(response, "short username", http.StatusBadRequest)
return
}
user, err := GetUserDataByName(ctx, username)
if err != nil {
http.Error(response, "Bad login", http.StatusBadRequest)
return
}
if bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password)) == nil {
token, err := GetToken(user)
if err != nil {
http.Error(response, "Internal server error", http.StatusInternalServerError)
return
}
if _, err = response.Write([]byte(token)); err != nil {
return
}
}
}
+2
View File
@@ -36,5 +36,7 @@ func main() {
http.Handle("/ws", srv) http.Handle("/ws", srv)
log.Println("server listening on :8080") log.Println("server listening on :8080")
http.HandleFunc("POST /register", RegisterHandler)
http.HandleFunc("POST /login", LoginHandler)
log.Fatal(http.ListenAndServe(":8080", nil)) log.Fatal(http.ListenAndServe(":8080", nil))
} }
+1 -1
View File
@@ -3,7 +3,7 @@ package main
import "github.com/coder/websocket" import "github.com/coder/websocket"
type User struct { type User struct {
Id uint Id uint32
Name string Name string
Password string Password string
Color string Color string
+3 -2
View File
@@ -3,6 +3,7 @@ package main
import ( import (
"errors" "errors"
"fmt" "fmt"
"strconv"
"time" "time"
"github.com/golang-jwt/jwt/v5" "github.com/golang-jwt/jwt/v5"
@@ -11,10 +12,10 @@ import (
var secretKey = []byte("replace-with-env-variable") var secretKey = []byte("replace-with-env-variable")
func GetToken(userID string) (string, error) { func GetToken(user *User) (string, error) {
token := jwt.NewWithClaims(jwt.SigningMethodHS256, token := jwt.NewWithClaims(jwt.SigningMethodHS256,
jwt.RegisteredClaims{ jwt.RegisteredClaims{
Subject: userID, Subject: strconv.Itoa(int(user.Id)),
ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Hour)), ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Hour)),
IssuedAt: jwt.NewNumericDate(time.Now()), IssuedAt: jwt.NewNumericDate(time.Now()),
}, },
+12 -2
View File
@@ -4,6 +4,7 @@ import (
"context" "context"
"log" "log"
"net/http" "net/http"
"strconv"
"sync" "sync"
"time" "time"
@@ -109,13 +110,22 @@ func handleUnauthenticatedMessage(ctx context.Context, conn *websocket.Conn, msg
conn.Close(websocket.StatusPolicyViolation, "invalid token") conn.Close(websocket.StatusPolicyViolation, "invalid token")
return return
} }
user, err := GetUserData(ctx, subject)
var subjectId uint32
parsed, err := strconv.ParseUint(subject, 10, 32)
subjectId = uint32(parsed)
if err != nil {
conn.Close(websocket.StatusPolicyViolation, "invalid token")
return
}
user, err := GetUserDataById(ctx, subjectId)
if err != nil { if err != nil {
conn.Close(websocket.StatusPolicyViolation, "invalid token") conn.Close(websocket.StatusPolicyViolation, "invalid token")
return return
} }
mu.Lock() mu.Lock()
authenticatedConnections = append(authenticatedConnections, AuthConnection{connection: conn, user: user}) authenticatedConnections = append(authenticatedConnections, AuthConnection{connection: conn, user: *user})
mu.Unlock() mu.Unlock()
sendAndCloseIfFails(conn, map[string]any{ sendAndCloseIfFails(conn, map[string]any{
"authAs": user.Name, "authAs": user.Name,