-
Notifications
You must be signed in to change notification settings - Fork 0
/
user.go
96 lines (79 loc) · 2.48 KB
/
user.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
package models
import (
u "DummyMessengerAPI/utils"
"github.com/dgrijalva/jwt-go"
"github.com/jinzhu/gorm"
"golang.org/x/crypto/bcrypt"
"os"
"time"
)
type Token struct {
UserId uint
ExpirationTime int64
jwt.StandardClaims
}
type User struct {
gorm.Model
Login string `json:"login"`
Password string `json:"password"`
Token string `sql:"-";json:"token"`
}
func (user *User) Validate() (map[string]interface{}, bool) {
tmp := &User{}
err := GetDB().Table("users").Where("login = ?", user.Login).First(tmp).Error
if err != nil && err != gorm.ErrRecordNotFound {
return u.Message(false, "Connection error. Please retry"), false
}
if tmp.Login != "" {
return u.Message(false, "Login already exists."), false
}
return u.Message(false, "Requirement passed"), true
}
func (user *User) Create() map[string]interface{} {
if resp, ok := user.Validate(); !ok {
return resp
}
hashedPassword, _ := bcrypt.GenerateFromPassword([]byte(user.Password), bcrypt.DefaultCost)
user.Password = string(hashedPassword)
GetDB().Create(user)
if user.ID <= 0 {
return u.Message(false, "Failed to create account, connection error.")
}
return u.Message(true, "Account has been created")
}
func Login(login, password string) map[string]interface{} {
user := &User{}
err := GetDB().Table("users").Where("login = ?", login).First(user).Error
if err != nil {
if err == gorm.ErrRecordNotFound {
return u.Message(false, "Login not found: " + login)
}
return u.Message(false, "Connection error. Please retry")
}
err = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password))
if err != nil && err == bcrypt.ErrMismatchedHashAndPassword {
return u.Message(false, "Invalid login credentials. Please try again")
}
tokenExpDate := time.Now().Add(6 * time.Hour)
tk := &Token{UserId: user.ID, ExpirationTime: tokenExpDate.Unix()}
token := jwt.NewWithClaims(jwt.GetSigningMethod("HS256"), tk)
tokenString, _ := token.SignedString([]byte(os.Getenv("token_password")))
resp := u.Message(true, "Logged In")
resp["token"] = tokenString
resp["ID"] = user.ID
resp["tokenExpDate"] = tokenExpDate
return resp
}
func Logout(token string) map[string]interface{} {
GetDB().Exec("INSERT INTO tokens_blacklist(token) VALUES('" + token + "')")
return u.Message(true, "Logged Out")
}
func getUser(id uint) *User {
user := &User{}
err := GetDB().Table("users").Where("id = ?", id).First(user).Error
if err == gorm.ErrRecordNotFound {
return nil
}
user.Password = ""
return user
}