/
verifysigature.go
62 lines (53 loc) · 1.63 KB
/
verifysigature.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
package verifysignature
import (
"errors"
"fmt"
"net/http"
"github.com/TheLazarusNetwork/go-helpers/httpo"
"github.com/TheLazarusNetwork/go-helpers/logo"
"github.com/Weareflexable/Superiad/models/user"
"github.com/Weareflexable/Superiad/pkg/network/polygon"
"gorm.io/gorm"
"github.com/gin-gonic/gin"
)
// ApplyRoutes applies router to gin Router
func ApplyRoutes(r *gin.RouterGroup) {
g := r.Group("/verify-signature")
{
g.POST("", verifySignature)
}
}
func verifySignature(c *gin.Context) {
network := "matic"
var req VerifySignatureRequest
if err := c.ShouldBindJSON(&req); err != nil {
err := fmt.Errorf("body is invalid: %w", err)
httpo.NewErrorResponse(http.StatusBadRequest, err.Error()).SendD(c)
return
}
mnemonic, err := user.GetMnemonic(req.UserId)
if err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
httpo.NewErrorResponse(httpo.UserNotFound, "user not found").Send(c, 404)
return
}
httpo.NewErrorResponse(http.StatusInternalServerError, "failed to fetch user").SendD(c)
logo.Errorf("failed to fetch user mnemonic for userId: %v, error: %s",
req.UserId, err)
return
}
res, err := polygon.VerifySignature(mnemonic, req.Message, req.Signature)
if err != nil {
httpo.NewErrorResponse(http.StatusInternalServerError, "failed to verify signature").SendD(c)
logo.Errorf("failed to verify signature from wallet of userId: %v and network: %v, error: %s",
req.UserId, network, err)
return
}
payload := VerifySignaturePayload{}
if !res {
payload.IsSignedByUser = false
} else {
payload.IsSignedByUser = true
}
httpo.NewSuccessResponseP(200, "signature is valid", payload).SendD(c)
}