blasphem/pkg/wsapi/auth.go

68 lines
1.3 KiB
Go
Raw Normal View History

2022-12-19 19:24:01 -05:00
package wsapi
import (
2022-12-20 11:34:25 -05:00
"encoding/json"
"io"
2022-12-19 19:24:01 -05:00
"dynatron.me/x/blasphem/pkg/auth"
"github.com/rs/zerolog/log"
)
type authPhase struct {
*wsSession
}
func (ws *wsSession) sendAuthRequired() error {
2022-12-20 13:16:30 -05:00
authReq := &struct {
2022-12-19 19:24:01 -05:00
MsgBase
Version string `json:"version"`
}{
MsgBase{"auth_required"},
ws.b.Version(),
}
return ws.WriteJSON(&authReq)
}
type authMsg struct {
MsgBase
AccessToken auth.AccessToken `json:"access_token"`
}
func (ap *authPhase) msgSchema() interface{} {
return &authMsg{}
}
func (ap *authPhase) finishAuth(rt *auth.RefreshToken) {
ap.user = rt.User
ap.refreshToken = rt
ap.h = &cmdHandler{ap.wsSession}
2022-12-20 19:05:45 -05:00
ap.sendAuthOK()
}
func (ap *authPhase) sendAuthOK() error {
return ap.WriteJSON(struct {
Type string `json:"type"`
Version string `json:"version"`
}{Type: "auth_ok", Version: ap.Blas().Version()})
2022-12-19 19:24:01 -05:00
}
2022-12-20 11:34:25 -05:00
func (ap *authPhase) handleMsg(r io.Reader) error {
2022-12-20 19:05:45 -05:00
log.Debug().Interface("ap", ap).Msg("auth handlemsg")
2022-12-20 11:34:25 -05:00
var authMsg authMsg
err := json.NewDecoder(r).Decode(&authMsg)
if err != nil {
return err
}
2022-12-19 19:24:01 -05:00
refreshToken := ap.b.ValidateAccessToken(authMsg.AccessToken)
if refreshToken != nil {
ap.finishAuth(refreshToken)
2022-12-20 19:05:45 -05:00
return ap.sendAuthOK()
2022-12-19 19:24:01 -05:00
}
log.Error().Str("remote", ap.ec.Request().RemoteAddr).Msg("websocket auth failed")
return auth.ErrInvalidAuth
}