idk
This commit is contained in:
@@ -4,6 +4,7 @@ import "sync"
|
|||||||
|
|
||||||
var (
|
var (
|
||||||
mu sync.RWMutex
|
mu sync.RWMutex
|
||||||
|
Clients = make(map[uint32]Client)
|
||||||
ChatGroups = make(map[uint32]ChatGroup)
|
ChatGroups = make(map[uint32]ChatGroup)
|
||||||
ClientsMap = make(map[uint32]map[uint32]*Client)
|
ClientsMap = make(map[uint32]map[uint32]*Client)
|
||||||
)
|
)
|
||||||
@@ -22,7 +23,7 @@ func RemoveGroupFromCache(chatGroup *ChatGroup) {
|
|||||||
delete(ClientsMap, chatGroup.Id)
|
delete(ClientsMap, chatGroup.Id)
|
||||||
}
|
}
|
||||||
|
|
||||||
func AddUserToCache(client *Client) {
|
func AddAuthenticatedClientToCache(client *Client) {
|
||||||
mu.Lock()
|
mu.Lock()
|
||||||
defer mu.Unlock()
|
defer mu.Unlock()
|
||||||
for _, groupIn := range client.Groups {
|
for _, groupIn := range client.Groups {
|
||||||
@@ -41,3 +42,7 @@ func RemoveClientFromCache(client *Client) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func GetClientData(uint32 *Client) {
|
||||||
|
|
||||||
|
}
|
||||||
|
|||||||
+47
@@ -0,0 +1,47 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
//"golang.org/x/crypto/bcrypt"
|
||||||
|
|
||||||
|
"github.com/jackc/pgx/v5"
|
||||||
|
)
|
||||||
|
|
||||||
|
var dbConn *pgx.Conn
|
||||||
|
|
||||||
|
func InitDatabase(ctx context.Context) {
|
||||||
|
conn, err := pgx.Connect(ctx, "postgres://master:secret@localhost:5432")
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = conn.Exec(ctx, `
|
||||||
|
CREATE TABLE IF NOT EXISTS users (
|
||||||
|
id SERIAL PRIMARY KEY,
|
||||||
|
name VARCHAR(20) UNIQUE NOT NULL,
|
||||||
|
pass_hash VARCHAR(60) NOT NULL,
|
||||||
|
color VARCHAR(3) DEFAULT NULL
|
||||||
|
);
|
||||||
|
CREATE TABLE IF NOT EXISTS chat_groups (
|
||||||
|
id SERIAL PRIMARY KEY,
|
||||||
|
name VARCHAR(48) NOT NULL,
|
||||||
|
creator_id INTEGER NOT NULL REFERENCES users(id) ON DELETE CASCADE,
|
||||||
|
owner_id INTEGER NOT NULL REFERENCES users(id) ON DELETE CASCADE,
|
||||||
|
enable_user_colors BOOLEAN NOT NULL DEFAULT true,
|
||||||
|
group_color VARCHAR(3),
|
||||||
|
created_at TIMESTAMP NOT NULL DEFAULT NOW()
|
||||||
|
);
|
||||||
|
CREATE TABLE IF NOT EXISTS chat_group_members (
|
||||||
|
group_id INTEGER NOT NULL REFERENCES chat_groups(id) ON DELETE CASCADE,
|
||||||
|
user_id INTEGER NOT NULL REFERENCES users(id) ON DELETE CASCADE,
|
||||||
|
joined_at TIMESTAMP NOT NULL DEFAULT NOW(),
|
||||||
|
PRIMARY KEY (group_id, user_id)
|
||||||
|
);
|
||||||
|
`)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
dbConn = conn
|
||||||
|
}
|
||||||
@@ -2,6 +2,15 @@ module go-socket
|
|||||||
|
|
||||||
go 1.26
|
go 1.26
|
||||||
|
|
||||||
require github.com/coder/websocket v1.8.14
|
require (
|
||||||
|
github.com/coder/websocket v1.8.14
|
||||||
|
github.com/jackc/pgx/v5 v5.8.0
|
||||||
|
golang.org/x/crypto v0.49.0
|
||||||
|
)
|
||||||
|
|
||||||
require github.com/golang-jwt/jwt/v5 v5.3.1 // indirect
|
require (
|
||||||
|
github.com/golang-jwt/jwt/v5 v5.3.1
|
||||||
|
github.com/jackc/pgpassfile v1.0.0 // indirect
|
||||||
|
github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761 // indirect
|
||||||
|
golang.org/x/text v0.35.0 // indirect
|
||||||
|
)
|
||||||
|
|||||||
@@ -10,6 +10,7 @@ type Client struct {
|
|||||||
Connection *websocket.Conn
|
Connection *websocket.Conn
|
||||||
Id uint32
|
Id uint32
|
||||||
Color [3]byte
|
Color [3]byte
|
||||||
|
IsAuthenticated bool
|
||||||
}
|
}
|
||||||
|
|
||||||
type ChatGroup struct {
|
type ChatGroup struct {
|
||||||
|
|||||||
@@ -1,8 +1,6 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
|
||||||
"fmt"
|
|
||||||
"strconv"
|
"strconv"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
@@ -11,51 +9,45 @@ import (
|
|||||||
|
|
||||||
var secretKey = []byte("replace-with-env-variable")
|
var secretKey = []byte("replace-with-env-variable")
|
||||||
|
|
||||||
type UserClaims struct {
|
|
||||||
Name string `json:"name"`
|
|
||||||
Color [3]byte `json:"color"`
|
|
||||||
jwt.RegisteredClaims
|
|
||||||
}
|
|
||||||
|
|
||||||
func GetToken(client *Client) (string, error) {
|
func GetToken(client *Client) (string, error) {
|
||||||
token := jwt.NewWithClaims(jwt.SigningMethodHS256,
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256,
|
||||||
UserClaims{
|
jwt.RegisteredClaims{
|
||||||
Name: client.Name,
|
|
||||||
Color: client.Color,
|
|
||||||
RegisteredClaims: jwt.RegisteredClaims{
|
|
||||||
Subject: strconv.Itoa(int(client.Id)),
|
Subject: strconv.Itoa(int(client.Id)),
|
||||||
ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
||||||
IssuedAt: jwt.NewNumericDate(time.Now()),
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
||||||
},
|
},
|
||||||
},
|
|
||||||
)
|
)
|
||||||
return token.SignedString(secretKey)
|
return token.SignedString(secretKey)
|
||||||
}
|
}
|
||||||
|
|
||||||
func SetClientFromToken(client *Client, tokenString string) error {
|
func GetDataFromToken(token *string) (uint32, error) {
|
||||||
token, err := jwt.ParseWithClaims(tokenString, &UserClaims{}, func(t *jwt.Token) (interface{}, error) {
|
parsed, err := jwt.ParseWithClaims(*token, &jwt.RegisteredClaims{}, func(t *jwt.Token) (any, error) {
|
||||||
if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok {
|
if _, ok := t.Method.(*jwt.SigningMethodHMAC); !ok {
|
||||||
return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"])
|
return nil, jwt.ErrSignatureInvalid
|
||||||
}
|
}
|
||||||
return secretKey, nil
|
return secretKey, nil
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return 0, err
|
||||||
}
|
}
|
||||||
|
|
||||||
claims, ok := token.Claims.(*UserClaims)
|
claims, ok := parsed.Claims.(*jwt.RegisteredClaims)
|
||||||
if !ok || !token.Valid {
|
if !ok || !parsed.Valid {
|
||||||
return errors.New("invalid token")
|
return 0, jwt.ErrTokenInvalidClaims
|
||||||
}
|
}
|
||||||
|
|
||||||
id, err := strconv.ParseUint(claims.Subject, 10, 32)
|
id, err := strconv.ParseUint(claims.Subject, 10, 32)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("invalid subject: %w", err)
|
return 0, err
|
||||||
}
|
}
|
||||||
|
return uint32(id), nil
|
||||||
|
}
|
||||||
|
|
||||||
client.Id = uint32(id)
|
func SetClientFromToken(client *Client, token string) error {
|
||||||
client.Name = claims.Name
|
id, err := GetDataFromToken(&token)
|
||||||
client.Color = claims.Color
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
client.Id = id
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|||||||
+12
-14
@@ -21,13 +21,9 @@ func ServeConnection(responseWriter http.ResponseWriter, request *http.Request)
|
|||||||
ctx, cancel := context.WithTimeout(context.Background(), time.Second*30)
|
ctx, cancel := context.WithTimeout(context.Background(), time.Second*30)
|
||||||
defer cancel()
|
defer cancel()
|
||||||
|
|
||||||
var (
|
client := Client{}
|
||||||
isAuthenticated = false
|
|
||||||
continueConnection = true
|
|
||||||
client = Client{}
|
|
||||||
)
|
|
||||||
|
|
||||||
for continueConnection {
|
for {
|
||||||
var clientMessage map[string]any
|
var clientMessage map[string]any
|
||||||
err := wsjson.Read(ctx, connection, &clientMessage)
|
err := wsjson.Read(ctx, connection, &clientMessage)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -36,10 +32,13 @@ func ServeConnection(responseWriter http.ResponseWriter, request *http.Request)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if len(clientMessage) > 0 {
|
if len(clientMessage) > 0 {
|
||||||
if isAuthenticated {
|
if client.IsAuthenticated {
|
||||||
handleAuthenticatedMessage()
|
handleAuthenticatedMessage()
|
||||||
} else {
|
} else {
|
||||||
handleUnauthenticatedMessage(connection, &client, &clientMessage, &isAuthenticated, &continueConnection)
|
if !handleUnauthenticatedMessage(connection, &client, &clientMessage) {
|
||||||
|
closeConnection(connection)
|
||||||
|
return
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -58,7 +57,7 @@ func sendMessageCloseIfTimeout(conn *websocket.Conn, message *map[string]any) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func handleUnauthenticatedMessage(conn *websocket.Conn, client *Client, message *map[string]any, isAuthenticated *bool, continueConnection *bool) {
|
func handleUnauthenticatedMessage(conn *websocket.Conn, client *Client, message *map[string]any) bool {
|
||||||
token, ok := (*message)["token"].(string)
|
token, ok := (*message)["token"].(string)
|
||||||
if !ok {
|
if !ok {
|
||||||
var errmsg = map[string]any{
|
var errmsg = map[string]any{
|
||||||
@@ -66,7 +65,7 @@ func handleUnauthenticatedMessage(conn *websocket.Conn, client *Client, message
|
|||||||
"message": "token required",
|
"message": "token required",
|
||||||
}
|
}
|
||||||
sendMessageCloseIfTimeout(conn, &errmsg)
|
sendMessageCloseIfTimeout(conn, &errmsg)
|
||||||
return
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
err := SetClientFromToken(client, token)
|
err := SetClientFromToken(client, token)
|
||||||
@@ -76,11 +75,10 @@ func handleUnauthenticatedMessage(conn *websocket.Conn, client *Client, message
|
|||||||
"message": "bad token",
|
"message": "bad token",
|
||||||
}
|
}
|
||||||
sendMessageCloseIfTimeout(conn, &errmsg)
|
sendMessageCloseIfTimeout(conn, &errmsg)
|
||||||
continueConnection = false
|
return false
|
||||||
return
|
|
||||||
}
|
}
|
||||||
isAuthenticated = true
|
client.IsAuthenticated = true
|
||||||
clientInCache, ok := ClientsMap[]
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
func handleAuthenticatedMessage() {
|
func handleAuthenticatedMessage() {
|
||||||
|
|||||||
Reference in New Issue
Block a user