Compare commits

...

191 Commits

Author SHA1 Message Date
e86f73ec02 Add LICENSE 2025-06-16 19:48:56 +02:00
bdc42beb27 Merge pull request 'sessions' (#2) from sessions into main
Reviewed-on: #2
2025-06-16 19:03:01 +02:00
72083fa0a4 hot+fix: round expires in number 2025-06-16 19:01:28 +02:00
b3ad13e55d feat: ignore .env.remote 2025-06-15 22:16:17 +02:00
0db54e0268 feat: update service session on refresh 2025-06-15 21:13:33 +02:00
b3ef96a0ce feat: update service session's tokens 2025-06-15 21:13:23 +02:00
a773f1f8b4 feat: signed token type 2025-06-15 21:05:09 +02:00
1a71f50914 fix: 'boolean' instead of 'bool' 2025-06-15 21:05:03 +02:00
d17e154e42 feat: logical columns for service sessions table 2025-06-15 21:04:50 +02:00
bad26775eb fix: don't redirect due to credentials modal 2025-06-15 21:04:40 +02:00
c3fd6637a5 fix: numeration 2025-06-15 21:04:22 +02:00
20173ea140 fix: numeration 2025-06-15 21:04:07 +02:00
41d439beab feat: create service session 2025-06-15 21:02:38 +02:00
b36b6e18ca feat: use signed token from types 2025-06-15 21:02:22 +02:00
1765485027 feat: decrease inner spacing 2025-06-15 19:41:05 +02:00
c5fb5e674a feat: revoke service session 2025-06-15 19:40:54 +02:00
03bf655051 feat: service sessions feature 2025-06-15 19:36:02 +02:00
f8589fce5d feat: refetch sessions 2025-06-15 19:29:03 +02:00
ac62158de9 feat: pagination + session revoking UI 2025-06-15 19:27:02 +02:00
44e1a18e9a feat: user sessions state 2025-06-15 19:26:52 +02:00
e0f2c3219f feat: message populating from responswe 2025-06-15 19:26:43 +02:00
d2d52dc041 feat: pagination + revoke session API 2025-06-15 19:26:27 +02:00
d7d142152c feat: repo update 2025-06-15 19:26:18 +02:00
5c321311cd feat: pagination support + fix: able to get inactive session 2025-06-15 19:26:01 +02:00
ffc8a5f44d feat: session verification 2025-06-15 19:25:21 +02:00
dbff94e7b3 feat: pass repo access to middleware 2025-06-15 19:25:13 +02:00
0b1ef77689 feat: user/service sessions type 2025-06-15 18:10:47 +02:00
b0005c6702 feat: add new nav item for user sessions 2025-06-15 18:10:31 +02:00
c2abf1a5ba feat: add admin sessions page 2025-06-15 18:10:21 +02:00
ac50929e6e feat: ui pagination component draft 2025-06-15 18:10:11 +02:00
32785398ca feat: user sessions list page 2025-06-15 18:10:00 +02:00
cc497b6016 feat: sessions API 2025-06-15 18:09:48 +02:00
97ffcbdaa4 feat: sessions endpoints 2025-06-15 18:09:26 +02:00
d09bf8ff02 feat: install moment 2025-06-15 18:09:08 +02:00
c0814093e5 feat: get user sessions joined with user data 2025-06-15 18:08:58 +02:00
d48519741d feat: add user-sessions routes 2025-06-15 18:08:44 +02:00
213991126d feat: move api services dto into separate types file 2025-06-15 18:08:34 +02:00
c7e88606e3 feat: return status of request 2025-06-13 21:46:06 +02:00
a0d506fb76 feat: navigate to list page after successful create 2025-06-13 21:45:53 +02:00
0ec7743fca feat: delimiter handling/support 2025-06-13 21:45:39 +02:00
a8a0fa55b7 feat: delimiter def 2025-06-13 21:45:32 +02:00
7321448ce7 fix: reload accounts 2025-06-11 21:06:36 +02:00
6d5e0fc9a9 feat: signout API 2025-06-11 21:00:22 +02:00
ef05d66787 feat: register signout route 2025-06-11 20:52:30 +02:00
b3296c45ad feat: get request JTI helper 2025-06-11 20:52:22 +02:00
7fd163f957 feat: signout endpoitn 2025-06-11 20:51:39 +02:00
0f0d50a684 feat: set token jti in request 2025-06-11 20:39:34 +02:00
68074e02bc feat: jti request key 2025-06-11 20:39:20 +02:00
8d38a86f86 feat: get client ip util 2025-06-11 20:35:38 +02:00
e0c095c24d feat: create/update session when refreshing 2025-06-11 20:34:56 +02:00
4c318b15cd feat: refactor login 2025-06-11 20:33:49 +02:00
5ea6bc4251 feat: build device info util 2025-06-11 20:33:34 +02:00
1cbe908489 fix: use printf 2025-06-11 18:49:39 +02:00
53ee156e67 feat: get location util 2025-06-11 18:48:54 +02:00
07a936acc7 feat: device info type 2025-06-11 18:48:48 +02:00
f892f0da24 feat: update session + ps type overriding 2025-06-11 18:48:41 +02:00
38955ee4e6 fix: use the token 2025-06-11 18:48:08 +02:00
7fa7e87e88 feat: token sign with meta data 2025-06-11 18:47:59 +02:00
f085f2e271 feat: create user session 2025-06-11 18:47:45 +02:00
08add259a4 feat: install uasurfer 2025-06-11 18:47:34 +02:00
5b6142dfa6 feat: user/service sessions repo 2025-06-10 19:46:37 +02:00
dc41521a99 fix+feat: use verify oauth client helper in token as well 2025-06-09 15:55:36 +02:00
299e7eddc4 feat: verify api service in code generation 2025-06-09 15:39:56 +02:00
b4699e987c feat: service and user session queries 2025-06-08 22:59:33 +02:00
be9d4f2a1b feat: user and service sessions 2025-06-08 22:59:24 +02:00
db99236501 Merge branch 'main' of git.adalspace.com:admin/hspguard 2025-06-08 17:00:36 +02:00
e33fb04c99 feat: specify supported grant tyoes 2025-06-08 16:59:49 +02:00
c3d4208e12 Update README.md 2025-06-08 16:43:13 +02:00
3f945fa329 Update README.md 2025-06-08 16:38:26 +02:00
93a5cd7c70 feat: center icon 2025-06-07 22:08:23 +02:00
951de989af fix: remove unnecessary double message 2025-06-07 22:07:38 +02:00
c5cf253a15 feat: log error when failing to put object 2025-06-07 22:07:28 +02:00
d70032e36d feat: copy redis.conf 2025-06-07 22:07:16 +02:00
445ac50537 feat: list of permissions 2025-06-07 19:50:51 +02:00
c13e564b01 feat: icon_url field in api service 2025-06-07 19:47:31 +02:00
5d3a77133d feat: fetch api service state 2025-06-07 19:47:22 +02:00
44592ebc08 feat: show api service's information 2025-06-07 19:47:12 +02:00
1b941cb0c3 fix: correct uri for fetching api service 2025-06-07 19:47:02 +02:00
1cb520c2b6 feat: expose api services fetching by client id 2025-06-07 19:46:34 +02:00
b3fdd3bc18 feat: expose icon url 2025-06-07 19:46:25 +02:00
9110db2f08 feat: api service fetch by client id api 2025-06-07 19:23:42 +02:00
5972735102 fix: separate pathname for getting api service by client id 2025-06-07 19:23:34 +02:00
14c69349cc feat: get api service by client handler and endpoint 2025-06-07 19:22:44 +02:00
3ceeab04e1 feat: add icon url to api service 2025-06-07 19:21:14 +02:00
b7a67c208f feat: pass client id by code generation 2025-06-07 19:17:48 +02:00
cee885a84d feat: remove unused access to user profile 2025-06-07 19:17:39 +02:00
4b496ea9bd feat: split claims into 2 2025-06-07 19:17:29 +02:00
570ae6ac8c feat: generate 3 tokens for api service 2025-06-07 19:17:15 +02:00
f0d3a61e7b feat: accept access to cache 2025-06-07 19:16:57 +02:00
b09567620f feat: generate auth code and save 2025-06-07 19:16:45 +02:00
2209846525 feat: check for redirect uris allowed 2025-06-07 19:16:28 +02:00
108ed61961 feat: save & get auth code cache 2025-06-07 19:16:14 +02:00
b73bfd590b feat: allow custom claims for verify 2025-06-07 19:15:59 +02:00
19d56159ba feat: pass access to cache 2025-06-07 19:15:00 +02:00
b9ccf6adac feat: require client id for code API 2025-06-07 18:46:46 +02:00
9a0870dbbc fix: let user see verify welcome message 2025-06-07 11:41:52 +02:00
70429f69a2 feat: reset verify states after completion 2025-06-07 11:17:10 +02:00
ad635008eb fix: scrolling + background + height on devices 2025-06-07 02:37:03 +02:00
eacc8fdd89 fix: no need for h-full 2025-06-07 02:21:17 +02:00
d309fb3f57 fix: better scrolling on mobile 2025-06-07 02:21:06 +02:00
f4fd993679 feat: admin default page is api-services 2025-06-07 02:20:41 +02:00
016879b53f feat: upload avatar API 2025-06-07 02:10:55 +02:00
70bba15cda feat: redirect + upload avatar store 2025-06-07 02:10:46 +02:00
57daf175ab fix: fallback to empty array 2025-06-07 02:10:35 +02:00
0817a65272 feat: final verify trigger 2025-06-07 02:10:24 +02:00
13f9da1a67 feat: handle avatar uploading on verify 2025-06-07 02:10:11 +02:00
83535acf1c feat: no users found text in table 2025-06-07 02:09:59 +02:00
441ce2daca feat: redirection after verification 2025-06-07 02:09:44 +02:00
f9848d2110 feat: set redirect in state 2025-06-07 02:09:35 +02:00
7f0511b0d4 feat: finish verification API 2025-06-07 02:09:20 +02:00
a27f2ad593 feat: verify user's avatar + full url for profile picture 2025-06-07 02:09:10 +02:00
715a984241 feat: register finish verify route 2025-06-07 02:08:52 +02:00
66e1756ade feat: finish verification handler 2025-06-07 02:08:43 +02:00
849403a137 feat: confirm OTP integration 2025-06-07 01:34:48 +02:00
8d15c9b8b2 feat: request OTP query 2025-06-07 01:34:38 +02:00
87af1834cf feat: email verify state 2025-06-07 01:34:28 +02:00
357583f54d feat: navigate to current stage of verification 2025-06-07 01:34:13 +02:00
aa6de76ded feat: redirect to verify pages 2025-06-07 01:33:50 +02:00
ab3c2d1eb0 feat: stepper improvements 2025-06-07 01:33:40 +02:00
644cf2a358 feat: email verify APIs 2025-06-07 01:33:21 +02:00
5b1ed9925d feat: verify routes 2025-06-07 01:33:14 +02:00
4071a50a37 feat: split auth routes in files 2025-06-07 01:32:56 +02:00
dd7c51efd8 feat: update user verifications 2025-06-07 01:32:37 +02:00
8902f4d187 feat: redis configuration & client 2025-06-07 01:32:22 +02:00
6666b20464 feat: go-redis pkg 2025-06-07 01:31:55 +02:00
c5f288ba1e feat: redis configuration 2025-06-07 01:31:47 +02:00
cc49ab1655 feat: verify state 2025-06-07 00:14:09 +02:00
06c60b3491 feat: verification layout 2025-06-07 00:14:03 +02:00
b584a7b07f feat: UI stepper component 2025-06-07 00:13:54 +02:00
410e420a46 feat: use dark background overlay 2025-06-07 00:13:45 +02:00
eeb0f6eac1 feat: user profile verification fields 2025-06-07 00:13:29 +02:00
fb622f918a feat: redirect to verify when required 2025-06-07 00:13:17 +02:00
a50bad417f feat: mask email util 2025-06-07 00:12:56 +02:00
c395729446 feat: register verification pages 2025-06-07 00:12:50 +02:00
eaa92d2fe4 feat: verification pages 2025-06-07 00:12:41 +02:00
a9e382d713 feat: new dark overlay img 2025-06-07 00:12:22 +02:00
974244025e feat: remove unused @emotion/react 2025-06-07 00:12:04 +02:00
ae41076673 feat: move UserDTO logic into single file 2025-06-07 00:11:46 +02:00
cc7f7f40c4 feat: add verification levels 2025-06-07 00:11:02 +02:00
e2ae03f2a6 feat: use avatar directly as URI 2025-06-06 12:37:34 +02:00
9319564dea feat: image full URI in avatar 2025-06-06 12:12:03 +02:00
83e3e5a2e9 feat: new env variable for server URI 2025-06-06 12:04:25 +02:00
2b40e4e922 feat: specify user creator + list only users related to admin 2025-06-06 11:58:47 +02:00
ed33d03fda feat: find users related to specific admin repo 2025-06-06 11:58:20 +02:00
34c152a459 fix: correct uri for user creation page 2025-06-05 20:50:44 +02:00
ad09e98bba feat: create user page 2025-06-05 20:50:27 +02:00
d3fd5cba16 feat: create user state 2025-06-05 20:49:52 +02:00
64dbb4368c feat: create user API 2025-06-05 20:49:43 +02:00
cb3a6ddc58 feat: add support for new fields in user table 2025-06-05 20:49:35 +02:00
e774f415d8 feat: craete user route 2025-06-05 20:49:20 +02:00
d5a22895e7 feat: user creator and verified columns 2025-06-05 20:49:05 +02:00
9983c51e3a fix: use fetch for single item 2025-06-04 21:12:30 +02:00
6a1fc193f4 fix: double scrollbar on desktop 2025-06-04 20:07:58 +02:00
118877f727 feat: user update last login 2025-06-04 20:07:48 +02:00
7b8fe6baf2 fix: set content-type to json 2025-06-04 20:07:39 +02:00
e85b23b3e8 feat: admin view user page 2025-06-04 19:33:41 +02:00
6164b77bee fix: avatar explicit color for icon 2025-06-04 19:33:28 +02:00
8b5a5744ab feat: get single user state 2025-06-04 19:33:12 +02:00
d9e9c5ab38 feat: get single user API 2025-06-04 19:33:07 +02:00
0dcef81b59 feat: get single user endpoint 2025-06-04 19:32:56 +02:00
426b70a1de feat: AdminUsersPage implementation 2025-06-04 19:17:20 +02:00
912973cdb5 feat: admin users state 2025-06-04 19:17:08 +02:00
e4ff799f05 feat: background enhancements 2025-06-04 19:16:48 +02:00
320715f5aa feat: move api services related pages to own folder 2025-06-04 19:11:51 +02:00
a3b04b6243 fix: correct spelling for is_admin 2025-06-04 19:11:28 +02:00
f610d7480f feat: register user related pages 2025-06-04 19:11:10 +02:00
11ac92a026 feat: dynamic user based roles 2025-06-04 19:11:01 +02:00
98ae3e06e9 feat: longer live time for token + correct user based role 2025-06-04 19:10:32 +02:00
a1146ce371 feat: separate file for api services store 2025-06-04 12:49:57 +02:00
a67ec7e78c fix: rename useAdmin to useApiServices 2025-06-04 12:46:48 +02:00
9895392b50 feat: fetch users API 2025-06-04 12:46:36 +02:00
c6998f33e1 feat: move user dto outside 2025-06-04 12:46:24 +02:00
81659181e4 feat: add get users route 2025-06-04 12:33:58 +02:00
849b5935c2 fix: type overriding 2025-06-04 12:33:22 +02:00
c27d837ab0 feat: get users endpoint 2025-06-04 12:33:06 +02:00
92e9b87227 feat: better types overriding 2025-06-04 12:32:47 +02:00
243b7cce33 fix: avatars width setting 2025-06-03 13:03:02 +02:00
76d960619f feat: api service edit page 2025-06-03 12:59:05 +02:00
3e59c78287 feat: api services updated modal 2025-06-03 12:58:57 +02:00
6cd9da69ab feat: update api service state 2025-06-03 12:58:40 +02:00
29b97a87b3 feat: link to edit page 2025-06-03 12:57:36 +02:00
8bc4603274 feat: update api service API 2025-06-03 12:54:20 +02:00
cc60a1ba86 feat: register edit service page in router 2025-06-03 12:54:10 +02:00
89c7dc43e5 feat: use updateapiservice endpoint 2025-06-03 12:53:57 +02:00
95c330568d feat: UI bind api service toggling 2025-06-03 00:07:09 +02:00
900d314a95 feat: don't require view service id 2025-06-03 00:07:00 +02:00
0d8a3b1b39 feat: store toggle active api service 2025-06-03 00:05:43 +02:00
4b7396c210 feat: toggle api service API 2025-06-03 00:05:32 +02:00
d4e2cbdd4f feat: activate api service query 2025-06-03 00:05:20 +02:00
5024ac8151 feat: register toggle endpoint 2025-06-03 00:05:05 +02:00
3bf08c5933 feat: toggle api service endpoint 2025-06-03 00:04:36 +02:00
112 changed files with 6436 additions and 976 deletions

View File

@ -1,9 +1,12 @@
GUARD_PORT=3001 GUARD_PORT=3001
GUARD_HOST="127.0.0.1" GUARD_HOST="127.0.0.1"
GUARD_URI="http://localhost:3001"
GUARD_DB_URL="postgres://<user>:<user>@<host>:<port>/<db>?sslmode=disable" GUARD_DB_URL="postgres://<user>:<user>@<host>:<port>/<db>?sslmode=disable"
GUARD_REDIS_URL="redis://guard:guard@localhost:6379/0"
GUARD_ADMIN_NAME="admin" GUARD_ADMIN_NAME="admin"
GUARD_ADMIN_EMAIL="admin@test.net" GUARD_ADMIN_EMAIL="admin@test.net"
GUARD_ADMIN_PASSWORD="secret" GUARD_ADMIN_PASSWORD="secret"
@ -11,7 +14,6 @@ GUARD_ADMIN_PASSWORD="secret"
GUARD_JWT_PRIVATE="rsa" GUARD_JWT_PRIVATE="rsa"
GUARD_JWT_PUBLIC="rsa" GUARD_JWT_PUBLIC="rsa"
GUARD_JWT_KID="my-rsa-key-1" GUARD_JWT_KID="my-rsa-key-1"
GUARD_JWT_ISSUER="http://localhost:3001"
GUARD_MINIO_ENDPOINT="localhost:9000" GUARD_MINIO_ENDPOINT="localhost:9000"
GUARD_MINIO_ACCESS_KEY="" GUARD_MINIO_ACCESS_KEY=""
@ -20,5 +22,3 @@ GUARD_MINIO_SECRET_KEY=""
GOOSE_DRIVER="postgres" GOOSE_DRIVER="postgres"
GOOSE_DBSTRING=$DATABASE_URL GOOSE_DBSTRING=$DATABASE_URL
GOOSE_MIGRATION_DIR="./migrations" GOOSE_MIGRATION_DIR="./migrations"

1
.gitignore vendored
View File

@ -27,6 +27,7 @@ go.work.sum
# env file # env file
.env .env
.env.remote
# key files # key files
*.pem *.pem

View File

@ -26,6 +26,8 @@ RUN apt-get update && apt-get install -y ca-certificates && rm -rf /var/lib/apt/
COPY --from=backend-builder /app/bin/hspguard . COPY --from=backend-builder /app/bin/hspguard .
COPY --from=frontend-builder /app/dist ./dist COPY --from=frontend-builder /app/dist ./dist
COPY redis.conf /config/redis.conf
# Optional: copy default .env file if used # Optional: copy default .env file if used
# COPY .env .env # COPY .env .env
@ -33,6 +35,7 @@ COPY --from=frontend-builder /app/dist ./dist
ENV ENV=production \ ENV ENV=production \
GUARD_PORT=3001 \ GUARD_PORT=3001 \
GUARD_HOST="127.0.0.1" \ GUARD_HOST="127.0.0.1" \
GUARD_URI="http://localhost:3001" \
GUARD_DB_URL="postgres://user:user@localhost:5432/db?sslmode=disable" \ GUARD_DB_URL="postgres://user:user@localhost:5432/db?sslmode=disable" \
GUARD_ADMIN_NAME="admin" \ GUARD_ADMIN_NAME="admin" \
GUARD_ADMIN_EMAIL="admin@test.net" \ GUARD_ADMIN_EMAIL="admin@test.net" \
@ -40,7 +43,6 @@ ENV ENV=production \
GUARD_JWT_PRIVATE="rsa" \ GUARD_JWT_PRIVATE="rsa" \
GUARD_JWT_PUBLIC="rsa" \ GUARD_JWT_PUBLIC="rsa" \
GUARD_JWT_KID="my-rsa-key-1" \ GUARD_JWT_KID="my-rsa-key-1" \
GUARD_JWT_ISSUER="http://localhost:3001" \
GUARD_MINIO_ENDPOINT="localhost:9000" \ GUARD_MINIO_ENDPOINT="localhost:9000" \
GUARD_MINIO_ACCESS_KEY="" \ GUARD_MINIO_ACCESS_KEY="" \
GUARD_MINIO_SECRET_KEY="" \ GUARD_MINIO_SECRET_KEY="" \

373
LICENSE Normal file
View File

@ -0,0 +1,373 @@
Mozilla Public License Version 2.0
==================================
1. Definitions
--------------
1.1. "Contributor"
means each individual or legal entity that creates, contributes to
the creation of, or owns Covered Software.
1.2. "Contributor Version"
means the combination of the Contributions of others (if any) used
by a Contributor and that particular Contributor's Contribution.
1.3. "Contribution"
means Covered Software of a particular Contributor.
1.4. "Covered Software"
means Source Code Form to which the initial Contributor has attached
the notice in Exhibit A, the Executable Form of such Source Code
Form, and Modifications of such Source Code Form, in each case
including portions thereof.
1.5. "Incompatible With Secondary Licenses"
means
(a) that the initial Contributor has attached the notice described
in Exhibit B to the Covered Software; or
(b) that the Covered Software was made available under the terms of
version 1.1 or earlier of the License, but not also under the
terms of a Secondary License.
1.6. "Executable Form"
means any form of the work other than Source Code Form.
1.7. "Larger Work"
means a work that combines Covered Software with other material, in
a separate file or files, that is not Covered Software.
1.8. "License"
means this document.
1.9. "Licensable"
means having the right to grant, to the maximum extent possible,
whether at the time of the initial grant or subsequently, any and
all of the rights conveyed by this License.
1.10. "Modifications"
means any of the following:
(a) any file in Source Code Form that results from an addition to,
deletion from, or modification of the contents of Covered
Software; or
(b) any new file in Source Code Form that contains any Covered
Software.
1.11. "Patent Claims" of a Contributor
means any patent claim(s), including without limitation, method,
process, and apparatus claims, in any patent Licensable by such
Contributor that would be infringed, but for the grant of the
License, by the making, using, selling, offering for sale, having
made, import, or transfer of either its Contributions or its
Contributor Version.
1.12. "Secondary License"
means either the GNU General Public License, Version 2.0, the GNU
Lesser General Public License, Version 2.1, the GNU Affero General
Public License, Version 3.0, or any later versions of those
licenses.
1.13. "Source Code Form"
means the form of the work preferred for making modifications.
1.14. "You" (or "Your")
means an individual or a legal entity exercising rights under this
License. For legal entities, "You" includes any entity that
controls, is controlled by, or is under common control with You. For
purposes of this definition, "control" means (a) the power, direct
or indirect, to cause the direction or management of such entity,
whether by contract or otherwise, or (b) ownership of more than
fifty percent (50%) of the outstanding shares or beneficial
ownership of such entity.
2. License Grants and Conditions
--------------------------------
2.1. Grants
Each Contributor hereby grants You a world-wide, royalty-free,
non-exclusive license:
(a) under intellectual property rights (other than patent or trademark)
Licensable by such Contributor to use, reproduce, make available,
modify, display, perform, distribute, and otherwise exploit its
Contributions, either on an unmodified basis, with Modifications, or
as part of a Larger Work; and
(b) under Patent Claims of such Contributor to make, use, sell, offer
for sale, have made, import, and otherwise transfer either its
Contributions or its Contributor Version.
2.2. Effective Date
The licenses granted in Section 2.1 with respect to any Contribution
become effective for each Contribution on the date the Contributor first
distributes such Contribution.
2.3. Limitations on Grant Scope
The licenses granted in this Section 2 are the only rights granted under
this License. No additional rights or licenses will be implied from the
distribution or licensing of Covered Software under this License.
Notwithstanding Section 2.1(b) above, no patent license is granted by a
Contributor:
(a) for any code that a Contributor has removed from Covered Software;
or
(b) for infringements caused by: (i) Your and any other third party's
modifications of Covered Software, or (ii) the combination of its
Contributions with other software (except as part of its Contributor
Version); or
(c) under Patent Claims infringed by Covered Software in the absence of
its Contributions.
This License does not grant any rights in the trademarks, service marks,
or logos of any Contributor (except as may be necessary to comply with
the notice requirements in Section 3.4).
2.4. Subsequent Licenses
No Contributor makes additional grants as a result of Your choice to
distribute the Covered Software under a subsequent version of this
License (see Section 10.2) or under the terms of a Secondary License (if
permitted under the terms of Section 3.3).
2.5. Representation
Each Contributor represents that the Contributor believes its
Contributions are its original creation(s) or it has sufficient rights
to grant the rights to its Contributions conveyed by this License.
2.6. Fair Use
This License is not intended to limit any rights You have under
applicable copyright doctrines of fair use, fair dealing, or other
equivalents.
2.7. Conditions
Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted
in Section 2.1.
3. Responsibilities
-------------------
3.1. Distribution of Source Form
All distribution of Covered Software in Source Code Form, including any
Modifications that You create or to which You contribute, must be under
the terms of this License. You must inform recipients that the Source
Code Form of the Covered Software is governed by the terms of this
License, and how they can obtain a copy of this License. You may not
attempt to alter or restrict the recipients' rights in the Source Code
Form.
3.2. Distribution of Executable Form
If You distribute Covered Software in Executable Form then:
(a) such Covered Software must also be made available in Source Code
Form, as described in Section 3.1, and You must inform recipients of
the Executable Form how they can obtain a copy of such Source Code
Form by reasonable means in a timely manner, at a charge no more
than the cost of distribution to the recipient; and
(b) You may distribute such Executable Form under the terms of this
License, or sublicense it under different terms, provided that the
license for the Executable Form does not attempt to limit or alter
the recipients' rights in the Source Code Form under this License.
3.3. Distribution of a Larger Work
You may create and distribute a Larger Work under terms of Your choice,
provided that You also comply with the requirements of this License for
the Covered Software. If the Larger Work is a combination of Covered
Software with a work governed by one or more Secondary Licenses, and the
Covered Software is not Incompatible With Secondary Licenses, this
License permits You to additionally distribute such Covered Software
under the terms of such Secondary License(s), so that the recipient of
the Larger Work may, at their option, further distribute the Covered
Software under the terms of either this License or such Secondary
License(s).
3.4. Notices
You may not remove or alter the substance of any license notices
(including copyright notices, patent notices, disclaimers of warranty,
or limitations of liability) contained within the Source Code Form of
the Covered Software, except that You may alter any license notices to
the extent required to remedy known factual inaccuracies.
3.5. Application of Additional Terms
You may choose to offer, and to charge a fee for, warranty, support,
indemnity or liability obligations to one or more recipients of Covered
Software. However, You may do so only on Your own behalf, and not on
behalf of any Contributor. You must make it absolutely clear that any
such warranty, support, indemnity, or liability obligation is offered by
You alone, and You hereby agree to indemnify every Contributor for any
liability incurred by such Contributor as a result of warranty, support,
indemnity or liability terms You offer. You may include additional
disclaimers of warranty and limitations of liability specific to any
jurisdiction.
4. Inability to Comply Due to Statute or Regulation
---------------------------------------------------
If it is impossible for You to comply with any of the terms of this
License with respect to some or all of the Covered Software due to
statute, judicial order, or regulation then You must: (a) comply with
the terms of this License to the maximum extent possible; and (b)
describe the limitations and the code they affect. Such description must
be placed in a text file included with all distributions of the Covered
Software under this License. Except to the extent prohibited by statute
or regulation, such description must be sufficiently detailed for a
recipient of ordinary skill to be able to understand it.
5. Termination
--------------
5.1. The rights granted under this License will terminate automatically
if You fail to comply with any of its terms. However, if You become
compliant, then the rights granted under this License from a particular
Contributor are reinstated (a) provisionally, unless and until such
Contributor explicitly and finally terminates Your grants, and (b) on an
ongoing basis, if such Contributor fails to notify You of the
non-compliance by some reasonable means prior to 60 days after You have
come back into compliance. Moreover, Your grants from a particular
Contributor are reinstated on an ongoing basis if such Contributor
notifies You of the non-compliance by some reasonable means, this is the
first time You have received notice of non-compliance with this License
from such Contributor, and You become compliant prior to 30 days after
Your receipt of the notice.
5.2. If You initiate litigation against any entity by asserting a patent
infringement claim (excluding declaratory judgment actions,
counter-claims, and cross-claims) alleging that a Contributor Version
directly or indirectly infringes any patent, then the rights granted to
You by any and all Contributors for the Covered Software under Section
2.1 of this License shall terminate.
5.3. In the event of termination under Sections 5.1 or 5.2 above, all
end user license agreements (excluding distributors and resellers) which
have been validly granted by You or Your distributors under this License
prior to termination shall survive termination.
************************************************************************
* *
* 6. Disclaimer of Warranty *
* ------------------------- *
* *
* Covered Software is provided under this License on an "as is" *
* basis, without warranty of any kind, either expressed, implied, or *
* statutory, including, without limitation, warranties that the *
* Covered Software is free of defects, merchantable, fit for a *
* particular purpose or non-infringing. The entire risk as to the *
* quality and performance of the Covered Software is with You. *
* Should any Covered Software prove defective in any respect, You *
* (not any Contributor) assume the cost of any necessary servicing, *
* repair, or correction. This disclaimer of warranty constitutes an *
* essential part of this License. No use of any Covered Software is *
* authorized under this License except under this disclaimer. *
* *
************************************************************************
************************************************************************
* *
* 7. Limitation of Liability *
* -------------------------- *
* *
* Under no circumstances and under no legal theory, whether tort *
* (including negligence), contract, or otherwise, shall any *
* Contributor, or anyone who distributes Covered Software as *
* permitted above, be liable to You for any direct, indirect, *
* special, incidental, or consequential damages of any character *
* including, without limitation, damages for lost profits, loss of *
* goodwill, work stoppage, computer failure or malfunction, or any *
* and all other commercial damages or losses, even if such party *
* shall have been informed of the possibility of such damages. This *
* limitation of liability shall not apply to liability for death or *
* personal injury resulting from such party's negligence to the *
* extent applicable law prohibits such limitation. Some *
* jurisdictions do not allow the exclusion or limitation of *
* incidental or consequential damages, so this exclusion and *
* limitation may not apply to You. *
* *
************************************************************************
8. Litigation
-------------
Any litigation relating to this License may be brought only in the
courts of a jurisdiction where the defendant maintains its principal
place of business and such litigation shall be governed by laws of that
jurisdiction, without reference to its conflict-of-law provisions.
Nothing in this Section shall prevent a party's ability to bring
cross-claims or counter-claims.
9. Miscellaneous
----------------
This License represents the complete agreement concerning the subject
matter hereof. If any provision of this License is held to be
unenforceable, such provision shall be reformed only to the extent
necessary to make it enforceable. Any law or regulation which provides
that the language of a contract shall be construed against the drafter
shall not be used to construe this License against a Contributor.
10. Versions of the License
---------------------------
10.1. New Versions
Mozilla Foundation is the license steward. Except as provided in Section
10.3, no one other than the license steward has the right to modify or
publish new versions of this License. Each version will be given a
distinguishing version number.
10.2. Effect of New Versions
You may distribute the Covered Software under the terms of the version
of the License under which You originally received the Covered Software,
or under the terms of any subsequent version published by the license
steward.
10.3. Modified Versions
If you create software not governed by this License, and you want to
create a new license for such software, you may create and use a
modified version of this License if you rename the license and remove
any references to the name of the license steward (except to note that
such modified license differs from this License).
10.4. Distributing Source Code Form that is Incompatible With Secondary
Licenses
If You choose to distribute Source Code Form that is Incompatible With
Secondary Licenses under the terms of this version of the License, the
notice described in Exhibit B of this License must be attached.
Exhibit A - Source Code Form License Notice
-------------------------------------------
This Source Code Form is subject to the terms of the Mozilla Public
License, v. 2.0. If a copy of the MPL was not distributed with this
file, You can obtain one at https://mozilla.org/MPL/2.0/.
If it is not possible or desirable to put the notice in a particular
file, then You may include the notice in a location (such as a LICENSE
file in a relevant directory) where a recipient would be likely to look
for such a notice.
You may add additional accurate notices of copyright ownership.
Exhibit B - "Incompatible With Secondary Licenses" Notice
---------------------------------------------------------
This Source Code Form is "Incompatible With Secondary Licenses", as
defined by the Mozilla Public License, v. 2.0.

168
README.md
View File

@ -1,123 +1,139 @@
# HSP Guard
**HSP Guard** is an internal security service for your home lab, designed to manage user access to various home services and tools. It dynamically controls permissions and prevents unauthorized or unexpected users from accessing sensitive services. # 🛡️ HSP Guard
**HSP Guard** is a modern OpenID Connect (OIDC) identity provider and access management system for home labs. It provides secure authentication and granular authorization for all your self-hosted services, combining ease of use with enterprise-level control — without any vendor lock-in.
--- ---
## 📌 Overview ## ✨ Features
HSP Guard authorizes user requests and provides an efficient way to: - **OIDC Provider**: Central login for your home lab apps
- **Admin UI**: Manage apps, users, roles, permissions, and sessions
- Manage permissions for individual services/tools - **API Tokens**: Issue access tokens with embedded roles and permissions
- Define roles for easier access control - **Flexible Authorization**: Support for roles, permissions, and groups (future)
- Validate and authorize users via JWT tokens - **App Registration**: Register OAuth/OIDC clients with custom permissions
- Securely integrate with new services during installation - **Automatic Permission Sync**: Optionally fetch app permissions from `/.well-known/guard-configuration`
- **User & Admin Sessions**: See and revoke active user/app sessions
- **Pluggable**: Easily integrate new apps and services
- **Audit Logging**: Track actions for security and troubleshooting (planned)
--- ---
## 📚 Concepts ## 🚀 Getting Started
### 🔐 Permission ### 1. **Run HSP Guard**
Permissions define access to specific features or tools. You can run HSP Guard via Docker, Docker Compose, or natively (see below).
By default, HSP Guard includes predefined administrative permissions that allow an admin to log in and configure the system.
Once logged in, the admin can: ### 2. **Register Your First App**
- Manually create new permissions for specific applications 1. **Login as admin**
- Allow new applications to register their own permissions 2. Go to **Apps → Register New App**
- Assign permissions to users, granting them access to corresponding tools 3. Enter:
- **Name** of your app
- **Redirect URIs** (for OIDC/OAuth callbacks)
- (Optional) **Permissions** (manual or auto-discovered from the app)
4. Save to receive a `client_id` and `client_secret`
5. Configure your app to use these for OIDC login
### 3. **Assign Permissions & Roles**
- Assign **default roles** to new users automatically (configurable)
- Create custom **roles** to bundle permissions (e.g., `FAMILY_MEMBER`)
- Assign users to roles and/or groups for flexible access control
--- ---
### 🧩 Role ## 🏗️ Concepts
A **Role** is a named collection of permissions (e.g., `GUEST`, `FRIEND`, `FAMILY_MEMBER`) created by the admin. ### 🔑 **Permissions**
Roles simplify user management by allowing bulk assignment of permissions. Instead of assigning multiple permissions individually, a role bundles them under one label. Fine-grained controls for app features (e.g., `music.play`, `dashboard.edit`).
Can be manually defined or auto-discovered from an apps `.well-known/guard-configuration` endpoint.
### 🧩 **Roles**
Named bundles of permissions (e.g., `GUEST`, `FAMILY_MEMBER`, `ADMIN`).
Assign to users/groups for easier management.
### 👥 **Groups**
(Planned) Logical user collections (e.g., “Family”, “Guests”, “Admins”) for batch management of roles/permissions.
### 👤 **Users**
Each user has a unique profile, roles, and group memberships.
--- ---
### 👥 Group *(Coming Soon)* ## 🔗 OIDC/OAuth Integration
This feature is planned for future releases. Groups will help organize users or services into logical clusters for simplified access control. **HSP Guard** is a standard-compliant OIDC Provider. Any app supporting OIDC/OAuth can integrate.
- Register app in admin panel to get `client_id` & `client_secret`
- Configure your apps OIDC integration (see your apps docs)
- Token claims include `permissions` and `roles` for easy authorization
#### **Example Token Claims**
```json
{
"sub": "123456",
"name": "Alex Example",
"email": "alex@example.com",
"roles": ["GUEST"],
"permissions": ["dashboard.view", "music.play"]
}
```
--- ---
## 📡 API ## 📡 **App Permission Discovery**
### ✅ User Authorization If your app supports permission discovery:
- Expose `/.well-known/guard-configuration` endpoint listing available permissions
- When registering in HSP Guard, auto-fetch and display for approval
To verify whether a request is made by a valid and authorized user, applications can require a **JWT token** as part of the request. #### **Example guard-configuration JSON**
This token is sent to HSP Guard, which: ```json
{
- Validates the token "permissions": [
- Returns user details (e.g., ID, name, email) for logging, auditing, or request tracing "dashboard.view",
"dashboard.edit",
"dashboard.admin"
]
}
```
--- ---
### 🔑 Permission Checking ## 🔄 **User & Admin Sessions**
Applications can also verify whether a user holds specific permissions before granting access to certain services or features. - List all active sessions (browser, app, device, timestamp)
- Revoke sessions (logout) from user or admin panel
To do this, an app sends:
- The user's JWT token
- A list of required permissions
HSP Guard checks the users assigned permissions and responds with the authorization status.
> **Best Practice:** Applications should directly integrate with HSP Guard to enforce permission-based access control.
--- ---
## 🔄 User Authorization Flow ## 📦 **Planned Features & Roadmap**
When a user tries to access a home lab service that requires authentication: - [ ] **Group Management** for batch assignments
- [ ] **Audit Logging** of all admin/user actions
1. The application will **offer an authorization URL** to the user. - [ ] **Permission Expiry** (time-limited access)
2. The user follows the URL and is taken to the **HSP Guard login page**. - [ ] **Advanced Web UI** (dark mode, mobile)
3. The user selects or signs into an account they wish to use for that service. - [ ] **External Identity Providers** (login with Google, GitHub, etc.)
4. Once authenticated and authorized, the user is redirected to the **application-defined redirect URL**.
5. The application can now:
- Retrieve a **JWT token** from the redirect callback
- **Optionally cache the session/token** to avoid prompting the user every time
This process is similar to how external identity providers like **Google Sign-In** or **GitHub OAuth** work — providing a seamless and secure authentication experience for the user.
--- ---
## Integrating New Services & Tools ## 🛠 **Development**
When a new service or tool is installed: - See [CONTRIBUTING.md](CONTRIBUTING.md) for how to contribute!
- Pull requests and issues are welcome.
1. It provides a configuration file to HSP Guard
2. Guard extracts and registers any defined permissions
3. These permissions are **isolated** — even if a name overlaps with existing permissions, a prefix is added to avoid conflicts
--- ---
## 👤 User Registration & Onboarding ## 📝 **License**
New users (e.g., family, friends, guests) must complete a registration process to access your home lab. MIT — open source, for the home lab community.
They can:
- Visit a user-friendly registration webpage
- Fill out a form with basic information (name, email, password, etc.)
Once registered, the admin can assign roles or individual permissions as needed.
--- ---
## 🚧 Roadmap ## 💬 **Feedback**
- [ ] Group Management Open an [issue](https://github.com/yourusername/hsp-guard/issues) or join the discussion!
- [ ] Web UI Enhancements
- [ ] Audit Logging
- [ ] Permission Expiry & Time-Based Access
--- ---
## 📬 Feedback & Contribution
Feel free to open an issue or pull request if youd like to contribute or report bugs. HSP Guard is a personal home lab project, but feedback is always welcome!

View File

@ -8,6 +8,7 @@ import (
"gitea.local/admin/hspguard/internal/admin" "gitea.local/admin/hspguard/internal/admin"
"gitea.local/admin/hspguard/internal/auth" "gitea.local/admin/hspguard/internal/auth"
"gitea.local/admin/hspguard/internal/cache"
"gitea.local/admin/hspguard/internal/config" "gitea.local/admin/hspguard/internal/config"
"gitea.local/admin/hspguard/internal/oauth" "gitea.local/admin/hspguard/internal/oauth"
"gitea.local/admin/hspguard/internal/repository" "gitea.local/admin/hspguard/internal/repository"
@ -21,14 +22,16 @@ type APIServer struct {
addr string addr string
repo *repository.Queries repo *repository.Queries
storage *storage.FileStorage storage *storage.FileStorage
cache *cache.Client
cfg *config.AppConfig cfg *config.AppConfig
} }
func NewAPIServer(addr string, db *repository.Queries, minio *storage.FileStorage, cfg *config.AppConfig) *APIServer { func NewAPIServer(addr string, db *repository.Queries, minio *storage.FileStorage, cache *cache.Client, cfg *config.AppConfig) *APIServer {
return &APIServer{ return &APIServer{
addr: addr, addr: addr,
repo: db, repo: db,
storage: minio, storage: minio,
cache: cache,
cfg: cfg, cfg: cfg,
} }
} }
@ -41,13 +44,13 @@ func (s *APIServer) Run() error {
// staticDir := http.Dir(filepath.Join(workDir, "static")) // staticDir := http.Dir(filepath.Join(workDir, "static"))
// FileServer(router, "/static", staticDir) // FileServer(router, "/static", staticDir)
oauthHandler := oauth.NewOAuthHandler(s.repo, s.cfg) oauthHandler := oauth.NewOAuthHandler(s.repo, s.cache, s.cfg)
router.Route("/api/v1", func(r chi.Router) { router.Route("/api/v1", func(r chi.Router) {
userHandler := user.NewUserHandler(s.repo, s.storage, s.cfg) userHandler := user.NewUserHandler(s.repo, s.storage, s.cfg)
userHandler.RegisterRoutes(r) userHandler.RegisterRoutes(r)
authHandler := auth.NewAuthHandler(s.repo, s.cfg) authHandler := auth.NewAuthHandler(s.repo, s.cache, s.cfg)
authHandler.RegisterRoutes(r) authHandler.RegisterRoutes(r)
oauthHandler.RegisterRoutes(r) oauthHandler.RegisterRoutes(r)

View File

@ -7,6 +7,7 @@ import (
"os" "os"
"gitea.local/admin/hspguard/cmd/hspguard/api" "gitea.local/admin/hspguard/cmd/hspguard/api"
"gitea.local/admin/hspguard/internal/cache"
"gitea.local/admin/hspguard/internal/config" "gitea.local/admin/hspguard/internal/config"
"gitea.local/admin/hspguard/internal/repository" "gitea.local/admin/hspguard/internal/repository"
"gitea.local/admin/hspguard/internal/storage" "gitea.local/admin/hspguard/internal/storage"
@ -41,9 +42,11 @@ func main() {
fStorage := storage.New(&cfg) fStorage := storage.New(&cfg)
cache := cache.NewClient(&cfg)
user.EnsureAdminUser(ctx, &cfg, repo) user.EnsureAdminUser(ctx, &cfg, repo)
server := api.NewAPIServer(fmt.Sprintf("%s:%s", cfg.Host, cfg.Port), repo, fStorage, &cfg) server := api.NewAPIServer(fmt.Sprintf("%s:%s", cfg.Host, cfg.Port), repo, fStorage, cache, &cfg)
if err := server.Run(); err != nil { if err := server.Run(); err != nil {
log.Fatalln("ERR: Failed to start server:", err) log.Fatalln("ERR: Failed to start server:", err)
} }

View File

@ -8,3 +8,18 @@ services:
POSTGRES_PASSWORD: guard POSTGRES_PASSWORD: guard
ports: ports:
- "5432:5432" - "5432:5432"
cache:
image: redis:7.2 # or newer
container_name: guard-redis
ports:
- "6379:6379"
volumes:
- redis-data:/data
- ./redis.conf:/usr/local/etc/redis/redis.conf
command: ["redis-server", "/usr/local/etc/redis/redis.conf"]
restart: unless-stopped
volumes:
redis-data:
driver: local

4
go.mod
View File

@ -11,6 +11,9 @@ require (
) )
require ( require (
github.com/avct/uasurfer v0.0.0-20250506104815-f2613aa2d406 // indirect
github.com/cespare/xxhash/v2 v2.3.0 // indirect
github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f // indirect
github.com/dustin/go-humanize v1.0.1 // indirect github.com/dustin/go-humanize v1.0.1 // indirect
github.com/go-ini/ini v1.67.0 // indirect github.com/go-ini/ini v1.67.0 // indirect
github.com/goccy/go-json v0.10.5 // indirect github.com/goccy/go-json v0.10.5 // indirect
@ -23,6 +26,7 @@ require (
github.com/minio/md5-simd v1.1.2 // indirect github.com/minio/md5-simd v1.1.2 // indirect
github.com/minio/minio-go/v7 v7.0.92 // indirect github.com/minio/minio-go/v7 v7.0.92 // indirect
github.com/philhofer/fwd v1.1.3-0.20240916144458-20a13a1f6b7c // indirect github.com/philhofer/fwd v1.1.3-0.20240916144458-20a13a1f6b7c // indirect
github.com/redis/go-redis/v9 v9.10.0 // indirect
github.com/rs/xid v1.6.0 // indirect github.com/rs/xid v1.6.0 // indirect
github.com/tinylib/msgp v1.3.0 // indirect github.com/tinylib/msgp v1.3.0 // indirect
golang.org/x/crypto v0.38.0 // indirect golang.org/x/crypto v0.38.0 // indirect

8
go.sum
View File

@ -1,6 +1,12 @@
github.com/avct/uasurfer v0.0.0-20250506104815-f2613aa2d406 h1:5/KfwL9TS8yNtUSunutqifcSC8rdX9PNdvbSsw/X/lQ=
github.com/avct/uasurfer v0.0.0-20250506104815-f2613aa2d406/go.mod h1:s+GCtuP4kZNxh1WGoqdWI1+PbluBcycrMMWuKQ9e5Nk=
github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs=
github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c= github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f h1:lO4WD4F/rVNCu3HqELle0jiPLLBs70cWOduZpkS1E78=
github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f/go.mod h1:cuUVRXasLTGF7a8hSLbxyZXjz+1KgoB3wDUb6vlszIc=
github.com/dustin/go-humanize v1.0.1 h1:GzkhY7T5VNhEkwH0PVJgjz+fX1rhBrR7pRT3mDkpeCY= github.com/dustin/go-humanize v1.0.1 h1:GzkhY7T5VNhEkwH0PVJgjz+fX1rhBrR7pRT3mDkpeCY=
github.com/dustin/go-humanize v1.0.1/go.mod h1:Mu1zIs6XwVuF/gI1OepvI0qD18qycQx+mFykh5fBlto= github.com/dustin/go-humanize v1.0.1/go.mod h1:Mu1zIs6XwVuF/gI1OepvI0qD18qycQx+mFykh5fBlto=
github.com/go-chi/chi/v5 v5.2.1 h1:KOIHODQj58PmL80G2Eak4WdvUzjSJSm0vG72crDCqb8= github.com/go-chi/chi/v5 v5.2.1 h1:KOIHODQj58PmL80G2Eak4WdvUzjSJSm0vG72crDCqb8=
@ -38,6 +44,8 @@ github.com/philhofer/fwd v1.1.3-0.20240916144458-20a13a1f6b7c h1:dAMKvw0MlJT1Gsh
github.com/philhofer/fwd v1.1.3-0.20240916144458-20a13a1f6b7c/go.mod h1:RqIHx9QI14HlwKwm98g9Re5prTQ6LdeRQn+gXJFxsJM= github.com/philhofer/fwd v1.1.3-0.20240916144458-20a13a1f6b7c/go.mod h1:RqIHx9QI14HlwKwm98g9Re5prTQ6LdeRQn+gXJFxsJM=
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
github.com/redis/go-redis/v9 v9.10.0 h1:FxwK3eV8p/CQa0Ch276C7u2d0eNC9kCmAYQ7mCXCzVs=
github.com/redis/go-redis/v9 v9.10.0/go.mod h1:huWgSWd8mW6+m0VPhJjSSQ+d6Nh1VICQ6Q5lHuCH/Iw=
github.com/rs/xid v1.6.0 h1:fV591PaemRlL6JfRxGDEPl69wICngIQ3shQtzfy2gxU= github.com/rs/xid v1.6.0 h1:fV591PaemRlL6JfRxGDEPl69wICngIQ3shQtzfy2gxU=
github.com/rs/xid v1.6.0/go.mod h1:7XoLgs4eV+QndskICGsho+ADou8ySMSjJKDIan90Nz0= github.com/rs/xid v1.6.0/go.mod h1:7XoLgs4eV+QndskICGsho+ADou8ySMSjJKDIan90Nz0=
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=

View File

@ -4,44 +4,15 @@ import (
"encoding/json" "encoding/json"
"log" "log"
"net/http" "net/http"
"time"
"gitea.local/admin/hspguard/internal/repository" "gitea.local/admin/hspguard/internal/repository"
"gitea.local/admin/hspguard/internal/types"
"gitea.local/admin/hspguard/internal/util" "gitea.local/admin/hspguard/internal/util"
"gitea.local/admin/hspguard/internal/web" "gitea.local/admin/hspguard/internal/web"
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
"github.com/google/uuid" "github.com/google/uuid"
"github.com/jackc/pgx/v5/pgtype"
) )
type ApiServiceDTO struct {
ID uuid.UUID `json:"id"`
ClientID string `json:"client_id"`
Name string `json:"name"`
Description string `json:"description"`
RedirectUris []string `json:"redirect_uris"`
Scopes []string `json:"scopes"`
GrantTypes []string `json:"grant_types"`
CreatedAt time.Time `json:"created_at"`
UpdatedAt time.Time `json:"updated_at"`
IsActive bool `json:"is_active"`
}
func NewApiServiceDTO(service repository.ApiService) ApiServiceDTO {
return ApiServiceDTO{
ID: service.ID,
ClientID: service.ClientID,
Name: service.Name,
Description: service.Description.String,
RedirectUris: service.RedirectUris,
Scopes: service.Scopes,
GrantTypes: service.GrantTypes,
CreatedAt: service.CreatedAt,
UpdatedAt: service.UpdatedAt,
IsActive: service.IsActive,
}
}
func (h *AdminHandler) GetApiServices(w http.ResponseWriter, r *http.Request) { func (h *AdminHandler) GetApiServices(w http.ResponseWriter, r *http.Request) {
services, err := h.repo.ListApiServices(r.Context()) services, err := h.repo.ListApiServices(r.Context())
if err != nil { if err != nil {
@ -50,19 +21,21 @@ func (h *AdminHandler) GetApiServices(w http.ResponseWriter, r *http.Request) {
return return
} }
apiServices := make([]ApiServiceDTO, 0) apiServices := make([]types.ApiServiceDTO, 0)
for _, service := range services { for _, service := range services {
apiServices = append(apiServices, NewApiServiceDTO(service)) apiServices = append(apiServices, types.NewApiServiceDTO(service))
} }
type Response struct { type Response struct {
Items []ApiServiceDTO `json:"items"` Items []types.ApiServiceDTO `json:"items"`
Count int `json:"count"` Count int `json:"count"`
} }
encoder := json.NewEncoder(w) encoder := json.NewEncoder(w)
w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(Response{ if err := encoder.Encode(Response{
Items: apiServices, Items: apiServices,
Count: len(apiServices), Count: len(apiServices),
@ -129,10 +102,7 @@ func (h *AdminHandler) AddApiService(w http.ResponseWriter, r *http.Request) {
} }
if req.Description != "" { if req.Description != "" {
params.Description = pgtype.Text{ params.Description = &req.Description
String: req.Description,
Valid: true,
}
} }
service, err := h.repo.CreateApiService(r.Context(), params) service, err := h.repo.CreateApiService(r.Context(), params)
@ -146,13 +116,16 @@ func (h *AdminHandler) AddApiService(w http.ResponseWriter, r *http.Request) {
service.ClientSecret = clientSecret service.ClientSecret = clientSecret
type Response struct { type Response struct {
Service ApiServiceDTO `json:"service"` Service types.ApiServiceDTO `json:"service"`
Credentials ApiServiceCredentials `json:"credentials"` Credentials ApiServiceCredentials `json:"credentials"`
} }
encoder := json.NewEncoder(w) encoder := json.NewEncoder(w)
w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(Response{ if err := encoder.Encode(Response{
Service: NewApiServiceDTO(service), Service: types.NewApiServiceDTO(service),
Credentials: ApiServiceCredentials{ Credentials: ApiServiceCredentials{
ClientId: service.ClientID, ClientId: service.ClientID,
ClientSecret: service.ClientSecret, ClientSecret: service.ClientSecret,
@ -178,7 +151,27 @@ func (h *AdminHandler) GetApiService(w http.ResponseWriter, r *http.Request) {
encoder := json.NewEncoder(w) encoder := json.NewEncoder(w)
if err := encoder.Encode(NewApiServiceDTO(service)); err != nil { w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(types.NewApiServiceDTO(service)); err != nil {
web.Error(w, "failed to encode response", http.StatusInternalServerError)
}
}
func (h *AdminHandler) GetApiServiceCID(w http.ResponseWriter, r *http.Request) {
clientId := chi.URLParam(r, "client_id")
service, err := h.repo.GetApiServiceCID(r.Context(), clientId)
if err != nil {
web.Error(w, "service with provided client id not found", http.StatusNotFound)
return
}
encoder := json.NewEncoder(w)
w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(types.NewApiServiceDTO(service)); err != nil {
web.Error(w, "failed to encode response", http.StatusInternalServerError) web.Error(w, "failed to encode response", http.StatusInternalServerError)
} }
} }
@ -213,6 +206,8 @@ func (h *AdminHandler) RegenerateApiServiceSecret(w http.ResponseWriter, r *http
encoder := json.NewEncoder(w) encoder := json.NewEncoder(w)
w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(ApiServiceCredentials{ if err := encoder.Encode(ApiServiceCredentials{
ClientId: service.ClientID, ClientId: service.ClientID,
ClientSecret: clientSecret, ClientSecret: clientSecret,
@ -262,12 +257,9 @@ func (h *AdminHandler) UpdateApiService(w http.ResponseWriter, r *http.Request)
} }
updated, err := h.repo.UpdateApiService(r.Context(), repository.UpdateApiServiceParams{ updated, err := h.repo.UpdateApiService(r.Context(), repository.UpdateApiServiceParams{
ClientID: service.ClientID, ClientID: service.ClientID,
Name: req.Name, Name: req.Name,
Description: pgtype.Text{ Description: &req.Description,
String: req.Description,
Valid: true,
},
RedirectUris: req.RedirectUris, RedirectUris: req.RedirectUris,
Scopes: req.Scopes, Scopes: req.Scopes,
GrantTypes: req.GrantTypes, GrantTypes: req.GrantTypes,
@ -279,7 +271,42 @@ func (h *AdminHandler) UpdateApiService(w http.ResponseWriter, r *http.Request)
encoder := json.NewEncoder(w) encoder := json.NewEncoder(w)
if err := encoder.Encode(NewApiServiceDTO(updated)); err != nil { w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(types.NewApiServiceDTO(updated)); err != nil {
web.Error(w, "failed to send updated api service", http.StatusInternalServerError) web.Error(w, "failed to send updated api service", http.StatusInternalServerError)
} }
} }
func (h *AdminHandler) ToggleApiService(w http.ResponseWriter, r *http.Request) {
var err error
serviceId := chi.URLParam(r, "id")
parsed, err := uuid.Parse(serviceId)
if err != nil {
web.Error(w, "provided service id is not valid", http.StatusBadRequest)
return
}
service, err := h.repo.GetApiServiceId(r.Context(), parsed)
if err != nil {
web.Error(w, "service with provided id not found", http.StatusNotFound)
return
}
if service.IsActive {
log.Println("INFO: Service is active. Deactivating...")
err = h.repo.DeactivateApiService(r.Context(), service.ClientID)
} else {
log.Println("INFO: Service is inactive. Activating...")
err = h.repo.ActivateApiService(r.Context(), service.ClientID)
}
if err != nil {
log.Printf("ERR: Failed to toggle api service (cid: %s): %v\n", service.ClientID, err)
web.Error(w, "failed to toggle api service", http.StatusInternalServerError)
return
}
w.WriteHeader(http.StatusOK)
}

View File

@ -21,7 +21,7 @@ func New(repo *repository.Queries, cfg *config.AppConfig) *AdminHandler {
func (h *AdminHandler) RegisterRoutes(router chi.Router) { func (h *AdminHandler) RegisterRoutes(router chi.Router) {
router.Route("/admin", func(r chi.Router) { router.Route("/admin", func(r chi.Router) {
authMiddleware := imiddleware.NewAuthMiddleware(h.cfg) authMiddleware := imiddleware.NewAuthMiddleware(h.cfg, h.repo)
adminMiddleware := imiddleware.NewAdminMiddleware(h.repo) adminMiddleware := imiddleware.NewAdminMiddleware(h.repo)
r.Use(authMiddleware.Runner, adminMiddleware.Runner) r.Use(authMiddleware.Runner, adminMiddleware.Runner)
@ -29,6 +29,19 @@ func (h *AdminHandler) RegisterRoutes(router chi.Router) {
r.Get("/api-services/{id}", h.GetApiService) r.Get("/api-services/{id}", h.GetApiService)
r.Post("/api-services", h.AddApiService) r.Post("/api-services", h.AddApiService)
r.Patch("/api-services/{id}", h.RegenerateApiServiceSecret) r.Patch("/api-services/{id}", h.RegenerateApiServiceSecret)
r.Put("/api-services/{id}", h.RegenerateApiServiceSecret) r.Put("/api-services/{id}", h.UpdateApiService)
r.Patch("/api-services/toggle/{id}", h.ToggleApiService)
r.Get("/users", h.GetUsers)
r.Post("/users", h.CreateUser)
r.Get("/users/{id}", h.GetUser)
r.Get("/user-sessions", h.GetUserSessions)
r.Patch("/user-sessions/revoke/{id}", h.RevokeUserSession)
r.Get("/service-sessions", h.GetServiceSessions)
r.Patch("/service-sessions/revoke/{id}", h.RevokeUserSession)
}) })
router.Get("/api-services/client/{client_id}", h.GetApiServiceCID)
} }

182
internal/admin/sessions.go Normal file
View File

@ -0,0 +1,182 @@
package admin
import (
"encoding/json"
"log"
"math"
"net/http"
"strconv"
"gitea.local/admin/hspguard/internal/repository"
"gitea.local/admin/hspguard/internal/types"
"gitea.local/admin/hspguard/internal/web"
"github.com/go-chi/chi/v5"
"github.com/google/uuid"
)
type GetSessionsParams struct {
PageSize int `json:"size"`
Page int `json:"page"`
// TODO: More filtering possibilities like onlyActive, expired, not-expired etc.
}
func (h *AdminHandler) GetUserSessions(w http.ResponseWriter, r *http.Request) {
q := r.URL.Query()
params := GetSessionsParams{}
if pageSize, err := strconv.Atoi(q.Get("size")); err == nil {
params.PageSize = pageSize
} else {
params.PageSize = 15
}
if page, err := strconv.Atoi(q.Get("page")); err == nil {
params.Page = page
} else {
web.Error(w, "page is required", http.StatusBadRequest)
return
}
sessions, err := h.repo.GetUserSessions(r.Context(), repository.GetUserSessionsParams{
Limit: int32(params.PageSize),
Offset: int32(params.Page-1) * int32(params.PageSize),
})
if err != nil {
log.Println("ERR: Failed to read user sessions from db:", err)
web.Error(w, "failed to retrieve sessions", http.StatusInternalServerError)
return
}
totalSessions, err := h.repo.GetUserSessionsCount(r.Context())
if err != nil {
log.Println("ERR: Failed to get total count of user sessions:", err)
web.Error(w, "failed to retrieve sessions", http.StatusInternalServerError)
return
}
mapped := make([]*types.UserSessionDTO, 0)
for _, session := range sessions {
mapped = append(mapped, types.NewUserSessionDTO(&session))
}
type Response struct {
Items []*types.UserSessionDTO `json:"items"`
Page int `json:"page"`
TotalPages int `json:"total_pages"`
}
response := Response{
Items: mapped,
Page: params.Page,
TotalPages: int(math.Ceil(float64(totalSessions) / float64(params.PageSize))),
}
w.Header().Set("Content-Type", "application/json")
if err := json.NewEncoder(w).Encode(response); err != nil {
log.Println("ERR: Failed to encode sessions in response:", err)
web.Error(w, "failed to encode sessions", http.StatusInternalServerError)
return
}
}
func (h *AdminHandler) RevokeUserSession(w http.ResponseWriter, r *http.Request) {
sessionId := chi.URLParam(r, "id")
parsed, err := uuid.Parse(sessionId)
if err != nil {
web.Error(w, "provided service id is not valid", http.StatusBadRequest)
return
}
if err := h.repo.RevokeUserSession(r.Context(), parsed); err != nil {
log.Println("ERR: Failed to revoke user session:", err)
web.Error(w, "failed to revoke user session", http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json")
w.WriteHeader(http.StatusOK)
w.Write([]byte("{\"success\":true}"))
}
func (h *AdminHandler) GetServiceSessions(w http.ResponseWriter, r *http.Request) {
q := r.URL.Query()
params := GetSessionsParams{}
if pageSize, err := strconv.Atoi(q.Get("size")); err == nil {
params.PageSize = pageSize
} else {
params.PageSize = 15
}
if page, err := strconv.Atoi(q.Get("page")); err == nil {
params.Page = page
} else {
web.Error(w, "page is required", http.StatusBadRequest)
return
}
sessions, err := h.repo.GetServiceSessions(r.Context(), repository.GetServiceSessionsParams{
Limit: int32(params.PageSize),
Offset: int32(params.Page-1) * int32(params.PageSize),
})
if err != nil {
log.Println("ERR: Failed to read api sessions from db:", err)
web.Error(w, "failed to retrieve sessions", http.StatusInternalServerError)
return
}
totalSessions, err := h.repo.GetServiceSessionsCount(r.Context())
if err != nil {
log.Println("ERR: Failed to get total count of service sessions:", err)
web.Error(w, "failed to retrieve sessions", http.StatusInternalServerError)
return
}
mapped := make([]*types.ServiceSessionDTO, 0)
for _, session := range sessions {
mapped = append(mapped, types.NewServiceSessionDTO(&session))
}
type Response struct {
Items []*types.ServiceSessionDTO `json:"items"`
Page int `json:"page"`
TotalPages int `json:"total_pages"`
}
response := Response{
Items: mapped,
Page: params.Page,
TotalPages: int(math.Ceil(float64(totalSessions) / float64(params.PageSize))),
}
w.Header().Set("Content-Type", "application/json")
if err := json.NewEncoder(w).Encode(response); err != nil {
log.Println("ERR: Failed to encode sessions in response:", err)
web.Error(w, "failed to encode sessions", http.StatusInternalServerError)
}
}
func (h *AdminHandler) RevokeServiceSession(w http.ResponseWriter, r *http.Request) {
sessionId := chi.URLParam(r, "id")
parsed, err := uuid.Parse(sessionId)
if err != nil {
web.Error(w, "provided service id is not valid", http.StatusBadRequest)
return
}
if err := h.repo.RevokeServiceSession(r.Context(), parsed); err != nil {
log.Println("ERR: Failed to revoke service session:", err)
web.Error(w, "failed to revoke service session", http.StatusInternalServerError)
return
}
w.WriteHeader(http.StatusOK)
w.Write([]byte("{\"success\":true}"))
}

165
internal/admin/users.go Normal file
View File

@ -0,0 +1,165 @@
package admin
import (
"encoding/json"
"log"
"net/http"
"gitea.local/admin/hspguard/internal/repository"
"gitea.local/admin/hspguard/internal/types"
"gitea.local/admin/hspguard/internal/util"
"gitea.local/admin/hspguard/internal/web"
"github.com/go-chi/chi/v5"
"github.com/google/uuid"
)
func (h *AdminHandler) GetUsers(w http.ResponseWriter, r *http.Request) {
userId, ok := util.GetRequestUserId(r.Context())
if !ok {
web.Error(w, "failed to get user id from auth session", http.StatusInternalServerError)
return
}
user, err := h.repo.FindUserId(r.Context(), uuid.MustParse(userId))
if err != nil {
web.Error(w, "failed to get access information", http.StatusUnauthorized)
return
}
users, err := h.repo.FindAdminUsers(r.Context(), &user.ID)
if err != nil {
log.Println("ERR: Failed to query users from db:", err)
web.Error(w, "failed to get all users", http.StatusInternalServerError)
return
}
type Response struct {
Items []types.UserDTO `json:"items"`
Count int `json:"count"`
}
var items []types.UserDTO
for _, user := range users {
items = append(items, types.NewUserDTO(&user))
}
encoder := json.NewEncoder(w)
w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(&Response{
Items: items,
Count: len(items),
}); err != nil {
web.Error(w, "failed to send response", http.StatusInternalServerError)
}
}
func (h *AdminHandler) GetUser(w http.ResponseWriter, r *http.Request) {
userId := chi.URLParam(r, "id")
parsed, err := uuid.Parse(userId)
if err != nil {
web.Error(w, "user id provided is not a valid uuid", http.StatusBadRequest)
return
}
user, err := h.repo.FindUserId(r.Context(), parsed)
if err != nil {
web.Error(w, "user with provided id not found", http.StatusNotFound)
return
}
encoder := json.NewEncoder(w)
w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(types.NewUserDTO(&user)); err != nil {
web.Error(w, "failed to encode user dto", http.StatusInternalServerError)
}
}
type CreateUserRequest struct {
Email string `json:"email"`
FullName string `json:"full_name"`
Password string `json:"password"`
IsAdmin bool `json:"is_admin"`
}
func (h *AdminHandler) CreateUser(w http.ResponseWriter, r *http.Request) {
userId, ok := util.GetRequestUserId(r.Context())
if !ok {
web.Error(w, "failed to get user id from auth session", http.StatusInternalServerError)
return
}
user, err := h.repo.FindUserId(r.Context(), uuid.MustParse(userId))
if err != nil {
web.Error(w, "failed to get access information", http.StatusUnauthorized)
return
}
var req CreateUserRequest
decoder := json.NewDecoder(r.Body)
if err := decoder.Decode(&req); err != nil {
web.Error(w, "invalid request body", http.StatusBadRequest)
return
}
if req.Email == "" {
web.Error(w, "email is required", http.StatusBadRequest)
return
}
if req.FullName == "" {
web.Error(w, "full name is required", http.StatusBadRequest)
return
}
if req.Password == "" {
web.Error(w, "password is required", http.StatusBadRequest)
return
}
_, err = h.repo.FindUserEmail(r.Context(), req.Email)
if err == nil {
web.Error(w, "user with provided email already exists", http.StatusBadRequest)
return
}
hash, err := util.HashPassword(req.Password)
if err != nil {
log.Println("ERR: Failed to hash password for new user:", err)
web.Error(w, "failed to create user account", http.StatusInternalServerError)
return
}
params := repository.InsertUserParams{
Email: req.Email,
FullName: req.FullName,
PasswordHash: hash,
IsAdmin: false,
CreatedBy: &user.ID,
}
log.Println("INFO: params for user creation:", params)
id, err := h.repo.InsertUser(r.Context(), params)
if err != nil {
log.Println("ERR: Failed to insert user into database:", err)
web.Error(w, "failed to create user", http.StatusInternalServerError)
return
}
type Response struct {
ID string `json:"id"`
}
encoder := json.NewEncoder(w)
if err := encoder.Encode(Response{
ID: id.String(),
}); err != nil {
web.Error(w, "failed to encode response", http.StatusInternalServerError)
}
}

107
internal/auth/login.go Normal file
View File

@ -0,0 +1,107 @@
package auth
import (
"encoding/json"
"log"
"net/http"
"gitea.local/admin/hspguard/internal/repository"
"gitea.local/admin/hspguard/internal/util"
"gitea.local/admin/hspguard/internal/web"
)
type LoginParams struct {
Email string `json:"email"`
Password string `json:"password"`
}
func (h *AuthHandler) login(w http.ResponseWriter, r *http.Request) {
var params LoginParams
decoder := json.NewDecoder(r.Body)
if err := decoder.Decode(&params); err != nil {
web.Error(w, "failed to parse request body", http.StatusBadRequest)
return
}
if params.Email == "" || params.Password == "" {
web.Error(w, "missing required fields", http.StatusBadRequest)
return
}
log.Printf("DEBUG: looking for user with following params: %#v\n", params)
user, err := h.repo.FindUserEmail(r.Context(), params.Email)
if err != nil {
log.Printf("DEBUG: No user found with '%s' email: %v\n", params.Email, err)
web.Error(w, "email or/and password are incorrect", http.StatusBadRequest)
return
}
if !util.VerifyPassword(params.Password, user.PasswordHash) {
log.Printf("DEBUG: Incorrect password '%s' for '%s' email: %v\n", params.Password, params.Email, err)
web.Error(w, "email or/and password are incorrect", http.StatusBadRequest)
return
}
access, refresh, err := h.signTokens(&user)
if err != nil {
web.Error(w, "failed to generate tokens", http.StatusInternalServerError)
return
}
userAgent := r.UserAgent()
ipAddr := util.GetClientIP(r)
deviceInfo := util.BuildDeviceInfo(userAgent, ipAddr)
// Create User Session
session, err := h.repo.CreateUserSession(r.Context(), repository.CreateUserSessionParams{
UserID: user.ID,
SessionType: "user",
ExpiresAt: &refresh.ExpiresAt,
LastActive: nil,
IpAddress: &ipAddr,
UserAgent: &userAgent,
AccessTokenID: &access.ID,
RefreshTokenID: &refresh.ID,
DeviceInfo: deviceInfo,
})
if err != nil {
log.Printf("ERR: Failed to create user session after logging in: %v\n", err)
}
log.Printf("INFO: User session created for '%s' with '%s' id\n", user.Email, session.ID.String())
if err := h.repo.UpdateLastLogin(r.Context(), user.ID); err != nil {
web.Error(w, "failed to update user's last login", http.StatusInternalServerError)
return
}
encoder := json.NewEncoder(w)
type Response struct {
AccessToken string `json:"access"`
RefreshToken string `json:"refresh"`
// fields required for UI in account selector, e.g. email, full name and avatar
FullName string `json:"full_name"`
Email string `json:"email"`
Id string `json:"id"`
ProfilePicture *string `json:"profile_picture"`
// Avatar
}
w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(Response{
AccessToken: access.Token,
RefreshToken: refresh.Token,
FullName: user.FullName,
Email: user.Email,
Id: user.ID.String(),
ProfilePicture: user.ProfilePicture,
// Avatar
}); err != nil {
web.Error(w, "failed to encode response", http.StatusInternalServerError)
}
}

31
internal/auth/profile.go Normal file
View File

@ -0,0 +1,31 @@
package auth
import (
"encoding/json"
"net/http"
"gitea.local/admin/hspguard/internal/types"
"gitea.local/admin/hspguard/internal/util"
"gitea.local/admin/hspguard/internal/web"
"github.com/google/uuid"
)
func (h *AuthHandler) getProfile(w http.ResponseWriter, r *http.Request) {
userId, ok := util.GetRequestUserId(r.Context())
if !ok {
web.Error(w, "failed to get user id from auth session", http.StatusInternalServerError)
return
}
user, err := h.repo.FindUserId(r.Context(), uuid.MustParse(userId))
if err != nil {
web.Error(w, "user with provided id does not exist", http.StatusUnauthorized)
return
}
w.Header().Set("Content-Type", "application/json")
if err := json.NewEncoder(w).Encode(types.NewUserDTO(&user)); err != nil {
web.Error(w, "failed to encode user profile", http.StatusInternalServerError)
}
}

122
internal/auth/refresh.go Normal file
View File

@ -0,0 +1,122 @@
package auth
import (
"encoding/json"
"fmt"
"log"
"net/http"
"strings"
"time"
"gitea.local/admin/hspguard/internal/repository"
"gitea.local/admin/hspguard/internal/types"
"gitea.local/admin/hspguard/internal/util"
"gitea.local/admin/hspguard/internal/web"
"github.com/google/uuid"
)
func (h *AuthHandler) refreshToken(w http.ResponseWriter, r *http.Request) {
authHeader := r.Header.Get("Authorization")
if authHeader == "" {
web.Error(w, "unauthorized", http.StatusUnauthorized)
return
}
parts := strings.Split(authHeader, "Bearer ")
if len(parts) != 2 {
web.Error(w, "invalid auth header format", http.StatusUnauthorized)
return
}
tokenStr := parts[1]
var userClaims types.UserClaims
token, err := util.VerifyToken(tokenStr, h.cfg.Jwt.PublicKey, &userClaims)
if err != nil || !token.Valid {
http.Error(w, fmt.Sprintf("invalid token: %v", err), http.StatusUnauthorized)
return
}
expire, err := userClaims.GetExpirationTime()
if err != nil {
web.Error(w, "failed to retrieve enough info from the token", http.StatusInternalServerError)
return
}
if time.Now().After(expire.Time) {
web.Error(w, "token is expired", http.StatusUnauthorized)
return
}
userId, err := uuid.Parse(userClaims.Subject)
if err != nil {
web.Error(w, "failed to parsej user id from token", http.StatusInternalServerError)
return
}
user, err := h.repo.FindUserId(r.Context(), userId)
if err != nil {
web.Error(w, "user with provided email does not exists", http.StatusBadRequest)
return
}
access, refresh, err := h.signTokens(&user)
if err != nil {
web.Error(w, "failed to generate tokens", http.StatusInternalServerError)
return
}
jti, err := uuid.Parse(userClaims.ID)
if session, err := h.repo.GetUserSessionByRefreshJTI(r.Context(), &jti); err != nil {
log.Printf("WARN: No existing user session found for user with '%s' email (jti: '%s'): %v\n", user.Email, userClaims.ID, err)
userAgent := r.UserAgent()
ipAddr := util.GetClientIP(r)
deviceInfo := util.BuildDeviceInfo(userAgent, ipAddr)
// Create User Session
session, err := h.repo.CreateUserSession(r.Context(), repository.CreateUserSessionParams{
UserID: user.ID,
SessionType: "user",
ExpiresAt: &refresh.ExpiresAt,
LastActive: nil,
IpAddress: &ipAddr,
UserAgent: &userAgent,
AccessTokenID: &access.ID,
RefreshTokenID: &refresh.ID,
DeviceInfo: deviceInfo,
})
if err != nil {
log.Printf("ERR: Failed to create user session after logging in: %v\n", err)
}
log.Printf("INFO: User session created for '%s' with '%s' id\n", user.Email, session.ID.String())
} else {
err := h.repo.UpdateSessionTokens(r.Context(), repository.UpdateSessionTokensParams{
ID: session.ID,
AccessTokenID: &access.ID,
RefreshTokenID: &refresh.ID,
ExpiresAt: &refresh.ExpiresAt,
})
if err != nil {
log.Printf("ERR: Failed to update user session with '%s' id: %v\n", session.ID.String(), err)
}
}
type Response struct {
AccessToken string `json:"access"`
RefreshToken string `json:"refresh"`
}
encoder := json.NewEncoder(w)
w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(Response{
AccessToken: access.Token,
RefreshToken: refresh.Token,
}); err != nil {
web.Error(w, "failed to encode response", http.StatusInternalServerError)
}
}

View File

@ -1,68 +1,73 @@
package auth package auth
import ( import (
"encoding/json"
"fmt"
"log"
"net/http"
"strings"
"time" "time"
"gitea.local/admin/hspguard/internal/cache"
"gitea.local/admin/hspguard/internal/config" "gitea.local/admin/hspguard/internal/config"
imiddleware "gitea.local/admin/hspguard/internal/middleware" imiddleware "gitea.local/admin/hspguard/internal/middleware"
"gitea.local/admin/hspguard/internal/repository" "gitea.local/admin/hspguard/internal/repository"
"gitea.local/admin/hspguard/internal/types" "gitea.local/admin/hspguard/internal/types"
"gitea.local/admin/hspguard/internal/util" "gitea.local/admin/hspguard/internal/util"
"gitea.local/admin/hspguard/internal/web"
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
"github.com/golang-jwt/jwt/v5" "github.com/golang-jwt/jwt/v5"
"github.com/google/uuid" "github.com/google/uuid"
) )
type AuthHandler struct { type AuthHandler struct {
repo *repository.Queries repo *repository.Queries
cfg *config.AppConfig cache *cache.Client
cfg *config.AppConfig
} }
func (h *AuthHandler) signTokens(user *repository.User) (string, string, error) { func (h *AuthHandler) signTokens(user *repository.User) (*types.SignedToken, *types.SignedToken, error) {
accessExpiresAt := time.Now().Add(15 * time.Minute)
accessJTI := uuid.New()
accessClaims := types.UserClaims{ accessClaims := types.UserClaims{
UserEmail: user.Email, UserEmail: user.Email,
IsAdmin: user.IsAdmin, IsAdmin: user.IsAdmin,
RegisteredClaims: jwt.RegisteredClaims{ RegisteredClaims: jwt.RegisteredClaims{
Issuer: h.cfg.Jwt.Issuer, Issuer: h.cfg.Uri,
Subject: user.ID.String(), Subject: user.ID.String(),
IssuedAt: jwt.NewNumericDate(time.Now()), IssuedAt: jwt.NewNumericDate(time.Now()),
ExpiresAt: jwt.NewNumericDate(time.Now().Add(15 * time.Second)), ExpiresAt: jwt.NewNumericDate(accessExpiresAt),
ID: accessJTI.String(),
}, },
} }
accessToken, err := util.SignJwtToken(accessClaims, h.cfg.Jwt.PrivateKey) accessToken, err := util.SignJwtToken(accessClaims, h.cfg.Jwt.PrivateKey)
if err != nil { if err != nil {
return "", "", err return nil, nil, err
} }
refreshExpiresAt := time.Now().Add(30 * 24 * time.Hour)
refreshJTI := uuid.New()
refreshClaims := types.UserClaims{ refreshClaims := types.UserClaims{
UserEmail: user.Email, UserEmail: user.Email,
IsAdmin: user.IsAdmin, IsAdmin: user.IsAdmin,
RegisteredClaims: jwt.RegisteredClaims{ RegisteredClaims: jwt.RegisteredClaims{
Issuer: h.cfg.Jwt.Issuer, Issuer: h.cfg.Uri,
Subject: user.ID.String(), Subject: user.ID.String(),
IssuedAt: jwt.NewNumericDate(time.Now()), IssuedAt: jwt.NewNumericDate(time.Now()),
ExpiresAt: jwt.NewNumericDate(time.Now().Add(30 * 24 * time.Hour)), ExpiresAt: jwt.NewNumericDate(refreshExpiresAt),
ID: refreshJTI.String(),
}, },
} }
refreshToken, err := util.SignJwtToken(refreshClaims, h.cfg.Jwt.PrivateKey) refreshToken, err := util.SignJwtToken(refreshClaims, h.cfg.Jwt.PrivateKey)
if err != nil { if err != nil {
return "", "", err return nil, nil, err
} }
return accessToken, refreshToken, nil return types.NewSignedToken(accessToken, accessExpiresAt, accessJTI), types.NewSignedToken(refreshToken, refreshExpiresAt, refreshJTI), nil
} }
func NewAuthHandler(repo *repository.Queries, cfg *config.AppConfig) *AuthHandler { func NewAuthHandler(repo *repository.Queries, cache *cache.Client, cfg *config.AppConfig) *AuthHandler {
return &AuthHandler{ return &AuthHandler{
repo, repo,
cache,
cfg, cfg,
} }
} }
@ -70,173 +75,17 @@ func NewAuthHandler(repo *repository.Queries, cfg *config.AppConfig) *AuthHandle
func (h *AuthHandler) RegisterRoutes(api chi.Router) { func (h *AuthHandler) RegisterRoutes(api chi.Router) {
api.Route("/auth", func(r chi.Router) { api.Route("/auth", func(r chi.Router) {
r.Group(func(protected chi.Router) { r.Group(func(protected chi.Router) {
authMiddleware := imiddleware.NewAuthMiddleware(h.cfg) authMiddleware := imiddleware.NewAuthMiddleware(h.cfg, h.repo)
protected.Use(authMiddleware.Runner) protected.Use(authMiddleware.Runner)
protected.Get("/profile", h.getProfile) protected.Get("/profile", h.getProfile)
protected.Post("/email", h.requestEmailOtp)
protected.Post("/email/otp", h.confirmOtp)
protected.Post("/verify", h.finishVerification)
protected.Post("/signout", h.signOut)
}) })
r.Post("/login", h.login) r.Post("/login", h.login)
r.Post("/refresh", h.refreshToken) r.Post("/refresh", h.refreshToken)
}) })
} }
func (h *AuthHandler) refreshToken(w http.ResponseWriter, r *http.Request) {
authHeader := r.Header.Get("Authorization")
if authHeader == "" {
web.Error(w, "unauthorized", http.StatusUnauthorized)
return
}
parts := strings.Split(authHeader, "Bearer ")
if len(parts) != 2 {
web.Error(w, "invalid auth header format", http.StatusUnauthorized)
return
}
tokenStr := parts[1]
token, userClaims, err := util.VerifyToken(tokenStr, h.cfg.Jwt.PublicKey)
if err != nil || !token.Valid {
http.Error(w, fmt.Sprintf("invalid token: %v", err), http.StatusUnauthorized)
return
}
expire, err := userClaims.GetExpirationTime()
if err != nil {
web.Error(w, "failed to retrieve enough info from the token", http.StatusInternalServerError)
return
}
if time.Now().After(expire.Time) {
web.Error(w, "token is expired", http.StatusUnauthorized)
return
}
userId, err := uuid.Parse(userClaims.Subject)
if err != nil {
web.Error(w, "failed to parsej user id from token", http.StatusInternalServerError)
return
}
user, err := h.repo.FindUserId(r.Context(), userId)
if err != nil {
web.Error(w, "user with provided email does not exists", http.StatusBadRequest)
return
}
access, refresh, err := h.signTokens(&user)
if err != nil {
web.Error(w, "failed to generate tokens", http.StatusInternalServerError)
return
}
type Response struct {
AccessToken string `json:"access"`
RefreshToken string `json:"refresh"`
}
encoder := json.NewEncoder(w)
if err := encoder.Encode(Response{
AccessToken: access,
RefreshToken: refresh,
}); err != nil {
web.Error(w, "failed to encode response", http.StatusInternalServerError)
}
}
func (h *AuthHandler) getProfile(w http.ResponseWriter, r *http.Request) {
userId, ok := util.GetRequestUserId(r.Context())
if !ok {
web.Error(w, "failed to get user id from auth session", http.StatusInternalServerError)
return
}
user, err := h.repo.FindUserId(r.Context(), uuid.MustParse(userId))
if err != nil {
web.Error(w, "user with provided id does not exist", http.StatusUnauthorized)
return
}
w.Header().Set("Content-Type", "application/json")
if err := json.NewEncoder(w).Encode(map[string]any{
"id": user.ID.String(),
"full_name": user.FullName,
"email": user.Email,
"phone_number": user.PhoneNumber,
"isAdmin": user.IsAdmin,
"last_login": user.LastLogin,
"profile_picture": user.ProfilePicture.String,
"updated_at": user.UpdatedAt,
"created_at": user.CreatedAt,
}); err != nil {
web.Error(w, "failed to encode user profile", http.StatusInternalServerError)
}
}
type LoginParams struct {
Email string `json:"email"`
Password string `json:"password"`
}
func (h *AuthHandler) login(w http.ResponseWriter, r *http.Request) {
var params LoginParams
decoder := json.NewDecoder(r.Body)
if err := decoder.Decode(&params); err != nil {
web.Error(w, "failed to parse request body", http.StatusBadRequest)
return
}
if params.Email == "" || params.Password == "" {
web.Error(w, "missing required fields", http.StatusBadRequest)
return
}
log.Printf("DEBUG: looking for user with following params: %#v\n", params)
user, err := h.repo.FindUserEmail(r.Context(), params.Email)
if err != nil {
web.Error(w, "user with provided email does not exists", http.StatusBadRequest)
return
}
if !util.VerifyPassword(params.Password, user.PasswordHash) {
web.Error(w, "username or/and password are incorrect", http.StatusBadRequest)
return
}
access, refresh, err := h.signTokens(&user)
if err != nil {
web.Error(w, "failed to generate tokens", http.StatusInternalServerError)
return
}
encoder := json.NewEncoder(w)
type Response struct {
AccessToken string `json:"access"`
RefreshToken string `json:"refresh"`
// fields required for UI in account selector, e.g. email, full name and avatar
FullName string `json:"full_name"`
Email string `json:"email"`
Id string `json:"id"`
ProfilePicture string `json:"profile_picture"`
// Avatar
}
w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(Response{
AccessToken: access,
RefreshToken: refresh,
FullName: user.FullName,
Email: user.Email,
Id: user.ID.String(),
ProfilePicture: user.ProfilePicture.String,
// Avatar
}); err != nil {
web.Error(w, "failed to encode response", http.StatusInternalServerError)
}
}

40
internal/auth/signout.go Normal file
View File

@ -0,0 +1,40 @@
package auth
import (
"log"
"net/http"
"gitea.local/admin/hspguard/internal/util"
"github.com/google/uuid"
)
func (h *AuthHandler) signOut(w http.ResponseWriter, r *http.Request) {
defer func() {
w.WriteHeader(http.StatusOK)
w.Write([]byte("{\"status\": \"ok\"}"))
}()
jti, ok := util.GetRequestJTI(r.Context())
if !ok {
log.Println("WARN: No JTI found in request")
return
}
jtiId, err := uuid.Parse(jti)
if err != nil {
log.Printf("ERR: Failed to parse jti '%s' as v4 uuid: %v\n", jti, err)
return
}
session, err := h.repo.GetUserSessionByAccessJTI(r.Context(), &jtiId)
if err != nil {
log.Printf("WARN: Could not find session by jti id '%s': %v\n", jtiId.String(), err)
return
}
if err := h.repo.RevokeUserSession(r.Context(), session.ID); err != nil {
log.Printf("ERR: Failed to revoke session with '%s' id: %v\n", session.ID.String(), err)
} else {
log.Printf("INFO: Revoked session with jti = '%s' and session id = '%s'\n", jtiId.String(), session.ID.String())
}
}

126
internal/auth/verify.go Normal file
View File

@ -0,0 +1,126 @@
package auth
import (
"encoding/json"
"fmt"
"log"
"math/rand"
"net/http"
"time"
"gitea.local/admin/hspguard/internal/util"
"gitea.local/admin/hspguard/internal/web"
"github.com/google/uuid"
)
func (h *AuthHandler) requestEmailOtp(w http.ResponseWriter, r *http.Request) {
userId, ok := util.GetRequestUserId(r.Context())
if !ok {
web.Error(w, "failed to get user id from auth session", http.StatusInternalServerError)
return
}
user, err := h.repo.FindUserId(r.Context(), uuid.MustParse(userId))
if err != nil {
web.Error(w, "user with provided id does not exist", http.StatusUnauthorized)
return
}
if user.EmailVerified {
web.Error(w, "email is already verified", http.StatusBadRequest)
return
}
number := rand.Intn(1000000) // 0 to 999999
padded := fmt.Sprintf("%06d", number) // Always 6 characters
if _, err := h.cache.Set(r.Context(), fmt.Sprintf("otp-%s", user.ID.String()), padded, 5*time.Minute).Result(); err != nil {
log.Println("ERR: Failed to save OTP in cache:", err)
web.Error(w, "failed to generate otp", http.StatusInternalServerError)
return
}
log.Printf("INFO: Saved OTP %s\n", padded)
w.WriteHeader(http.StatusCreated)
}
type ConfirmOtpRequest struct {
OTP string `json:"otp"`
}
func (h *AuthHandler) confirmOtp(w http.ResponseWriter, r *http.Request) {
userId, ok := util.GetRequestUserId(r.Context())
if !ok {
web.Error(w, "failed to get user id from auth session", http.StatusInternalServerError)
return
}
user, err := h.repo.FindUserId(r.Context(), uuid.MustParse(userId))
if err != nil {
web.Error(w, "user with provided id does not exist", http.StatusUnauthorized)
return
}
if user.EmailVerified {
web.Error(w, "email is already verified", http.StatusBadRequest)
return
}
var req ConfirmOtpRequest
decoder := json.NewDecoder(r.Body)
if err := decoder.Decode(&req); err != nil {
web.Error(w, "invalid request", http.StatusBadRequest)
return
}
val, err := h.cache.Get(r.Context(), fmt.Sprintf("otp-%s", user.ID.String())).Result()
if err != nil {
web.Error(w, "otp verification session not found", http.StatusNotFound)
return
}
log.Printf("INFO: Comparing OTP %s == %s\n", req.OTP, val)
if req.OTP == val {
err := h.repo.UserVerifyEmail(r.Context(), user.ID)
if err != nil {
log.Println("ERR: Failed to update email_verified:", err)
web.Error(w, "failed to verify email", http.StatusInternalServerError)
return
}
} else {
web.Error(w, "otp verification failed", http.StatusBadRequest)
return
}
w.WriteHeader(http.StatusOK)
}
func (h *AuthHandler) finishVerification(w http.ResponseWriter, r *http.Request) {
userId, ok := util.GetRequestUserId(r.Context())
if !ok {
web.Error(w, "failed to get user id from auth session", http.StatusInternalServerError)
return
}
user, err := h.repo.FindUserId(r.Context(), uuid.MustParse(userId))
if err != nil {
web.Error(w, "user with provided id does not exist", http.StatusUnauthorized)
return
}
if !user.EmailVerified || !user.AvatarVerified {
web.Error(w, "finish other verification steps before final verify", http.StatusBadRequest)
return
}
if err := h.repo.UserVerifyComplete(r.Context(), user.ID); err != nil {
log.Println("ERR: Failed to update verified on user:", err)
web.Error(w, "failed to verify user", http.StatusInternalServerError)
return
}
w.WriteHeader(http.StatusOK)
}

84
internal/cache/mod.go vendored Normal file
View File

@ -0,0 +1,84 @@
package cache
import (
"encoding/json"
"fmt"
"log"
"time"
"gitea.local/admin/hspguard/internal/config"
"github.com/redis/go-redis/v9"
"golang.org/x/net/context"
)
type Client struct {
rClient *redis.Client
}
func NewClient(cfg *config.AppConfig) *Client {
opts, err := redis.ParseURL(cfg.RedisURL)
if err != nil {
log.Fatalln("ERR: Failed to get redis options:", err)
return nil
}
client := redis.NewClient(opts)
return &Client{
rClient: client,
}
}
type OAuthCode struct {
ClientID string `json:"client_id"`
UserID string `json:"user_id"`
Nonce string `json:"nonce"`
}
type SaveAuthCodeParams struct {
AuthCode string
UserID string
ClientID string
Nonce string
}
func (c *Client) Set(ctx context.Context, key string, value any, expiration time.Duration) *redis.StatusCmd {
return c.rClient.Set(ctx, key, value, expiration)
}
func (c *Client) SaveAuthCode(ctx context.Context, params *SaveAuthCodeParams) error {
code := OAuthCode{
ClientID: params.ClientID,
UserID: params.UserID,
Nonce: params.Nonce,
}
row, err := json.Marshal(&code)
if err != nil {
return err
}
return c.Set(ctx, fmt.Sprintf("oauth.%s", params.AuthCode), string(row), 5*time.Minute).Err()
}
func (c *Client) GetAuthCode(ctx context.Context, authCode string) (*OAuthCode, error) {
row, err := c.Get(ctx, fmt.Sprintf("oauth.%s", authCode)).Result()
if err != nil {
return nil, err
}
if len(row) == 0 {
return nil, fmt.Errorf("no auth params found under %s", authCode)
}
var parsed OAuthCode
if err := json.Unmarshal([]byte(row), &parsed); err != nil {
return nil, err
}
return &parsed, nil
}
func (c *Client) Get(ctx context.Context, key string) *redis.StringCmd {
return c.rClient.Get(ctx, key)
}

View File

@ -4,5 +4,4 @@ type JwtConfig struct {
PrivateKey string `env:"GUARD_JWT_PRIVATE" required:"true"` PrivateKey string `env:"GUARD_JWT_PRIVATE" required:"true"`
PublicKey string `env:"GUARD_JWT_PUBLIC" required:"true"` PublicKey string `env:"GUARD_JWT_PUBLIC" required:"true"`
KID string `env:"GUARD_JWT_KID" default:"guard-rsa"` KID string `env:"GUARD_JWT_KID" default:"guard-rsa"`
Issuer string `env:"GUARD_JWT_ISSUER" required:"true"`
} }

View File

@ -12,7 +12,9 @@ import (
type AppConfig struct { type AppConfig struct {
Port string `env:"GUARD_PORT" default:"3001"` Port string `env:"GUARD_PORT" default:"3001"`
Host string `env:"GUARD_HOST" default:"127.0.0.1"` Host string `env:"GUARD_HOST" default:"127.0.0.1"`
Uri string `env:"GUARD_URI" default:"http://127.0.0.1:3001"`
DatabaseURL string `env:"GUARD_DB_URL" required:"true"` DatabaseURL string `env:"GUARD_DB_URL" required:"true"`
RedisURL string `env:"GUARD_REDIS_URL" default:"redis://localhost:6379/0"`
Admin AdminConfig Admin AdminConfig
Jwt JwtConfig Jwt JwtConfig
Minio MinioConfig Minio MinioConfig

View File

@ -3,22 +3,27 @@ package middleware
import ( import (
"context" "context"
"fmt" "fmt"
"log"
"net/http" "net/http"
"strings" "strings"
"gitea.local/admin/hspguard/internal/config" "gitea.local/admin/hspguard/internal/config"
"gitea.local/admin/hspguard/internal/repository"
"gitea.local/admin/hspguard/internal/types" "gitea.local/admin/hspguard/internal/types"
"gitea.local/admin/hspguard/internal/util" "gitea.local/admin/hspguard/internal/util"
"gitea.local/admin/hspguard/internal/web" "gitea.local/admin/hspguard/internal/web"
"github.com/google/uuid"
) )
type AuthMiddleware struct { type AuthMiddleware struct {
cfg *config.AppConfig cfg *config.AppConfig
repo *repository.Queries
} }
func NewAuthMiddleware(cfg *config.AppConfig) *AuthMiddleware { func NewAuthMiddleware(cfg *config.AppConfig, repo *repository.Queries) *AuthMiddleware {
return &AuthMiddleware{ return &AuthMiddleware{
cfg, cfg,
repo,
} }
} }
@ -37,13 +42,36 @@ func (m *AuthMiddleware) Runner(next http.Handler) http.Handler {
} }
tokenStr := parts[1] tokenStr := parts[1]
token, userClaims, err := util.VerifyToken(tokenStr, m.cfg.Jwt.PublicKey) var userClaims types.UserClaims
token, err := util.VerifyToken(tokenStr, m.cfg.Jwt.PublicKey, &userClaims)
if err != nil || !token.Valid { if err != nil || !token.Valid {
web.Error(w, fmt.Sprintf("invalid token: %v", err), http.StatusUnauthorized) web.Error(w, fmt.Sprintf("invalid token: %v", err), http.StatusUnauthorized)
return return
} }
// TODO: redis caching
parsed, err := uuid.Parse(userClaims.ID)
if err != nil {
log.Printf("ERR: Failed to parse token JTI '%s': %v\n", userClaims.ID, err)
web.Error(w, "failed to get session", http.StatusUnauthorized)
return
}
session, err := m.repo.GetUserSessionByAccessJTI(r.Context(), &parsed)
if err != nil {
log.Printf("ERR: Failed to find session with '%s' JTI: %v\n", parsed.String(), err)
web.Error(w, "no session found", http.StatusUnauthorized)
return
}
if !session.IsActive {
log.Printf("INFO: Inactive session trying to authorize: %s\n", session.AccessTokenID)
web.Error(w, "no session found", http.StatusUnauthorized)
return
}
ctx := context.WithValue(r.Context(), types.UserIdKey, userClaims.Subject) ctx := context.WithValue(r.Context(), types.UserIdKey, userClaims.Subject)
ctx = context.WithValue(ctx, types.JTIKey, userClaims.ID)
next.ServeHTTP(w, r.WithContext(ctx)) next.ServeHTTP(w, r.WithContext(ctx))
}) })
} }

View File

@ -3,7 +3,6 @@ package oauth
import ( import (
"fmt" "fmt"
"net/http" "net/http"
"slices"
"strings" "strings"
"gitea.local/admin/hspguard/internal/web" "gitea.local/admin/hspguard/internal/web"
@ -29,37 +28,17 @@ func (h *OAuthHandler) AuthorizeClient(w http.ResponseWriter, r *http.Request) {
return return
} }
client, err := h.repo.GetApiServiceCID(r.Context(), clientId) scopes := strings.Split(strings.TrimSpace(r.URL.Query().Get("scope")), " ")
if err != nil {
uri := fmt.Sprintf("%s?error=access_denied&error_description=Service+not+authorized", redirectUri) if uri, err := h.verifyOAuthClient(r.Context(), &VerifyOAuthClientParams{
if state != "" { ClientID: clientId,
uri += "&state=" + state RedirectURI: &redirectUri,
} State: state,
Scopes: &scopes,
}); err != nil {
http.Redirect(w, r, uri, http.StatusFound) http.Redirect(w, r, uri, http.StatusFound)
return return
} }
if !client.IsActive {
uri := fmt.Sprintf("%s?error=temporarily_unavailable&error_description=Service+not+active", redirectUri)
if state != "" {
uri += "&state=" + state
}
http.Redirect(w, r, uri, http.StatusFound)
return
}
scopes := strings.SplitSeq(strings.TrimSpace(r.URL.Query().Get("scope")), " ")
for scope := range scopes {
if !slices.Contains(client.Scopes, scope) {
uri := fmt.Sprintf("%s?error=invalid_scope&error_description=Scope+%s+is+not+allowed", redirectUri, strings.ReplaceAll(scope, " ", "+"))
if state != "" {
uri += "&state=" + state
}
http.Redirect(w, r, uri, http.StatusFound)
return
}
}
http.Redirect(w, r, fmt.Sprintf("/auth?%s", r.URL.Query().Encode()), http.StatusFound) http.Redirect(w, r, fmt.Sprintf("/auth?%s", r.URL.Query().Encode()), http.StatusFound)
} }

58
internal/oauth/client.go Normal file
View File

@ -0,0 +1,58 @@
package oauth
import (
"context"
"fmt"
"slices"
"strings"
)
type VerifyOAuthClientParams struct {
ClientID string `json:"client_id"`
RedirectURI *string `json:"redirect_uri"`
State string `json:"state"`
Scopes *[]string `json:"scopes"`
}
func (h *OAuthHandler) verifyOAuthClient(ctx context.Context, params *VerifyOAuthClientParams) (string, error) {
client, err := h.repo.GetApiServiceCID(ctx, params.ClientID)
if err != nil {
uri := fmt.Sprintf("%s?error=access_denied&error_description=Service+not+authorized", *params.RedirectURI)
if params.State != "" {
uri += "&state=" + params.State
}
return uri, fmt.Errorf("target oauth service with client id '%s' is not registered", params.ClientID)
}
if !client.IsActive {
uri := fmt.Sprintf("%s?error=temporarily_unavailable&error_description=Service+not+active", *params.RedirectURI)
if params.State != "" {
uri += "&state=" + params.State
}
return uri, fmt.Errorf("target oauth service with client id '%s' is not available", client.ClientID)
}
if params.Scopes != nil {
for _, scope := range *params.Scopes {
if !slices.Contains(client.Scopes, scope) {
uri := fmt.Sprintf("%s?error=invalid_scope&error_description=Scope+%s+is+not+allowed", *params.RedirectURI, strings.ReplaceAll(scope, " ", "+"))
if params.State != "" {
uri += "&state=" + params.State
}
return uri, fmt.Errorf("unallowed scope '%s' requested", scope)
}
}
}
if params.RedirectURI != nil {
if !slices.Contains(client.RedirectUris, *params.RedirectURI) {
uri := fmt.Sprintf("%s?error=invalid_request&error_description=Redirect+URI+is+not+allowed", *params.RedirectURI)
if params.State != "" {
uri += "&state=" + params.State
}
return uri, fmt.Errorf("redirect uri '%s' is unallowed", *params.RedirectURI)
}
}
return "", nil
}

View File

@ -1,10 +1,13 @@
package oauth package oauth
import ( import (
"crypto/rand"
"encoding/base64"
"encoding/json" "encoding/json"
"fmt" "log"
"net/http" "net/http"
"gitea.local/admin/hspguard/internal/cache"
"gitea.local/admin/hspguard/internal/util" "gitea.local/admin/hspguard/internal/util"
"gitea.local/admin/hspguard/internal/web" "gitea.local/admin/hspguard/internal/web"
"github.com/google/uuid" "github.com/google/uuid"
@ -24,7 +27,8 @@ func (h *OAuthHandler) getAuthCode(w http.ResponseWriter, r *http.Request) {
} }
type Request struct { type Request struct {
Nonce string `json:"nonce"` Nonce string `json:"nonce"`
ClientID string `json:"client_id"`
} }
var req Request var req Request
@ -35,7 +39,39 @@ func (h *OAuthHandler) getAuthCode(w http.ResponseWriter, r *http.Request) {
return return
} }
// TODO: Create real authorization code if _, err := h.verifyOAuthClient(r.Context(), &VerifyOAuthClientParams{
ClientID: req.ClientID,
RedirectURI: nil,
State: "",
Scopes: nil,
}); err != nil {
web.Error(w, err.Error(), http.StatusInternalServerError)
return
}
buf := make([]byte, 32)
_, err = rand.Read(buf)
if err != nil {
log.Println("ERR: Failed to generate auth code:", err)
web.Error(w, "failed to create authorization code", http.StatusInternalServerError)
return
}
authCode := base64.RawURLEncoding.EncodeToString(buf)
params := cache.SaveAuthCodeParams{
AuthCode: authCode,
UserID: user.ID.String(),
ClientID: req.ClientID,
Nonce: req.Nonce,
}
log.Printf("DEBUG: Saving auth code session with params: %#v\n", params)
if err := h.cache.SaveAuthCode(r.Context(), &params); err != nil {
log.Println("ERR: Failed to save auth code in redis:", err)
web.Error(w, "failed to generate auth code", http.StatusInternalServerError)
return
}
type Response struct { type Response struct {
Code string `json:"code"` Code string `json:"code"`
@ -46,7 +82,7 @@ func (h *OAuthHandler) getAuthCode(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json") w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(Response{ if err := encoder.Encode(Response{
Code: fmt.Sprintf("%s,%s", user.ID.String(), req.Nonce), Code: authCode,
}); err != nil { }); err != nil {
web.Error(w, "failed to encode response", http.StatusInternalServerError) web.Error(w, "failed to encode response", http.StatusInternalServerError)
} }

View File

@ -9,22 +9,30 @@ import (
func (h *OAuthHandler) OpenIdConfiguration(w http.ResponseWriter, r *http.Request) { func (h *OAuthHandler) OpenIdConfiguration(w http.ResponseWriter, r *http.Request) {
type Response struct { type Response struct {
TokenEndpoint string `json:"token_endpoint"` TokenEndpoint string `json:"token_endpoint"`
AuthorizationEndpoint string `json:"authorization_endpoint"` AuthorizationEndpoint string `json:"authorization_endpoint"`
JwksURI string `json:"jwks_uri"` JwksURI string `json:"jwks_uri"`
Issuer string `json:"issuer"` Issuer string `json:"issuer"`
EndSessionEndpoint string `json:"end_session_endpoint"` EndSessionEndpoint string `json:"end_session_endpoint"`
GrantTypesSupported []string `json:"grant_types_supported"`
} }
w.Header().Set("Content-Type", "application/json") w.Header().Set("Content-Type", "application/json")
encoder := json.NewEncoder(w) encoder := json.NewEncoder(w)
w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(Response{ if err := encoder.Encode(Response{
TokenEndpoint: h.cfg.Jwt.Issuer + "/api/v1/oauth/token", TokenEndpoint: h.cfg.Uri + "/api/v1/oauth/token",
AuthorizationEndpoint: h.cfg.Jwt.Issuer + "/api/v1/oauth/authorize", AuthorizationEndpoint: h.cfg.Uri + "/api/v1/oauth/authorize",
JwksURI: h.cfg.Jwt.Issuer + "/.well-known/jwks.json", JwksURI: h.cfg.Uri + "/.well-known/jwks.json",
Issuer: h.cfg.Jwt.Issuer, Issuer: h.cfg.Uri,
EndSessionEndpoint: h.cfg.Jwt.Issuer + "/api/v1/oauth/logout", EndSessionEndpoint: h.cfg.Uri + "/api/v1/oauth/logout",
GrantTypesSupported: []string{
"authorization_code",
"refresh_token",
},
}); err != nil { }); err != nil {
web.Error(w, "failed to encode response", http.StatusInternalServerError) web.Error(w, "failed to encode response", http.StatusInternalServerError)
} }

View File

@ -1,6 +1,7 @@
package oauth package oauth
import ( import (
"gitea.local/admin/hspguard/internal/cache"
"gitea.local/admin/hspguard/internal/config" "gitea.local/admin/hspguard/internal/config"
imiddleware "gitea.local/admin/hspguard/internal/middleware" imiddleware "gitea.local/admin/hspguard/internal/middleware"
"gitea.local/admin/hspguard/internal/repository" "gitea.local/admin/hspguard/internal/repository"
@ -8,13 +9,15 @@ import (
) )
type OAuthHandler struct { type OAuthHandler struct {
repo *repository.Queries repo *repository.Queries
cfg *config.AppConfig cache *cache.Client
cfg *config.AppConfig
} }
func NewOAuthHandler(repo *repository.Queries, cfg *config.AppConfig) *OAuthHandler { func NewOAuthHandler(repo *repository.Queries, cache *cache.Client, cfg *config.AppConfig) *OAuthHandler {
return &OAuthHandler{ return &OAuthHandler{
repo, repo,
cache,
cfg, cfg,
} }
} }
@ -22,7 +25,7 @@ func NewOAuthHandler(repo *repository.Queries, cfg *config.AppConfig) *OAuthHand
func (h *OAuthHandler) RegisterRoutes(router chi.Router) { func (h *OAuthHandler) RegisterRoutes(router chi.Router) {
router.Route("/oauth", func(r chi.Router) { router.Route("/oauth", func(r chi.Router) {
r.Group(func(protected chi.Router) { r.Group(func(protected chi.Router) {
authMiddleware := imiddleware.NewAuthMiddleware(h.cfg) authMiddleware := imiddleware.NewAuthMiddleware(h.cfg, h.repo)
protected.Use(authMiddleware.Runner) protected.Use(authMiddleware.Runner)
protected.Post("/code", h.getAuthCode) protected.Post("/code", h.getAuthCode)

View File

@ -5,10 +5,12 @@ import (
"encoding/json" "encoding/json"
"fmt" "fmt"
"log" "log"
"math"
"net/http" "net/http"
"strings" "strings"
"time" "time"
"gitea.local/admin/hspguard/internal/repository"
"gitea.local/admin/hspguard/internal/types" "gitea.local/admin/hspguard/internal/types"
"gitea.local/admin/hspguard/internal/util" "gitea.local/admin/hspguard/internal/util"
"gitea.local/admin/hspguard/internal/web" "gitea.local/admin/hspguard/internal/web"
@ -16,6 +18,84 @@ import (
"github.com/google/uuid" "github.com/google/uuid"
) )
func (h *OAuthHandler) signApiTokens(user *repository.User, apiService *repository.ApiService, nonce *string) (*types.SignedToken, *types.SignedToken, *types.SignedToken, error) {
accessExpiresIn := 15 * time.Minute
accessExpiresAt := time.Now().Add(accessExpiresIn)
accessJTI := uuid.New()
accessClaims := types.ApiClaims{
Permissions: []string{},
RegisteredClaims: jwt.RegisteredClaims{
Issuer: h.cfg.Uri,
Subject: apiService.ClientID,
Audience: jwt.ClaimStrings{apiService.ClientID},
IssuedAt: jwt.NewNumericDate(time.Now()),
ExpiresAt: jwt.NewNumericDate(accessExpiresAt),
ID: accessJTI.String(),
},
}
access, err := util.SignJwtToken(accessClaims, h.cfg.Jwt.PrivateKey)
if err != nil {
return nil, nil, nil, err
}
var roles = []string{"user"}
if user.IsAdmin {
roles = append(roles, "admin")
}
idExpiresIn := 15 * time.Minute
idExpiresAt := time.Now().Add(idExpiresIn)
idJTI := uuid.New()
idClaims := types.IdTokenClaims{
Email: user.Email,
EmailVerified: user.EmailVerified,
Name: user.FullName,
Picture: user.ProfilePicture,
Nonce: nonce,
Roles: roles,
RegisteredClaims: jwt.RegisteredClaims{
Issuer: h.cfg.Uri,
Subject: user.ID.String(),
Audience: jwt.ClaimStrings{apiService.ClientID},
IssuedAt: jwt.NewNumericDate(time.Now()),
ExpiresAt: jwt.NewNumericDate(idExpiresAt),
ID: idJTI.String(),
},
}
idToken, err := util.SignJwtToken(idClaims, h.cfg.Jwt.PrivateKey)
if err != nil {
return nil, nil, nil, err
}
refreshExpiresIn := 24 * time.Hour
refreshExpiresAt := time.Now().Add(refreshExpiresIn)
refreshJTI := uuid.New()
refreshClaims := types.ApiRefreshClaims{
UserID: user.ID.String(),
RegisteredClaims: jwt.RegisteredClaims{
Issuer: h.cfg.Uri,
Subject: apiService.ClientID,
Audience: jwt.ClaimStrings{apiService.ClientID},
IssuedAt: jwt.NewNumericDate(time.Now()),
ExpiresAt: jwt.NewNumericDate(refreshExpiresAt),
ID: refreshJTI.String(),
},
}
refresh, err := util.SignJwtToken(refreshClaims, h.cfg.Jwt.PrivateKey)
if err != nil {
return nil, nil, nil, err
}
return types.NewSignedToken(idToken, idExpiresAt, idJTI), types.NewSignedToken(access, accessExpiresAt, accessJTI), types.NewSignedToken(refresh, refreshExpiresAt, refreshJTI), nil
}
func (h *OAuthHandler) tokenEndpoint(w http.ResponseWriter, r *http.Request) { func (h *OAuthHandler) tokenEndpoint(w http.ResponseWriter, r *http.Request) {
log.Println("[OAUTH] New request to token endpoint") log.Println("[OAUTH] New request to token endpoint")
@ -55,68 +135,204 @@ func (h *OAuthHandler) tokenEndpoint(w http.ResponseWriter, r *http.Request) {
} }
grantType := r.FormValue("grant_type") grantType := r.FormValue("grant_type")
redirectUri := r.FormValue("redirect_uri")
log.Printf("Redirect URI is %s\n", redirectUri) log.Println("DEBUG: Verifying target oauth client before proceeding...")
if _, err := h.verifyOAuthClient(r.Context(), &VerifyOAuthClientParams{
ClientID: clientId,
RedirectURI: nil,
State: "",
Scopes: nil,
}); err != nil {
web.Error(w, err.Error(), http.StatusInternalServerError)
return
}
switch grantType { switch grantType {
case "authorization_code": case "authorization_code":
redirectUri := r.FormValue("redirect_uri")
log.Printf("Redirect URI is %s\n", redirectUri)
code := r.FormValue("code") code := r.FormValue("code")
fmt.Printf("Code received: %s\n", code) fmt.Printf("Code received: %s\n", code)
// TODO: Verify code from another db table codeSession, err := h.cache.GetAuthCode(r.Context(), code)
nonce := strings.Split(code, ",")[1] if err != nil {
log.Printf("ERR: Failed to find session under the code %s: %v\n", code, err)
web.Error(w, "no session found under this auth code", http.StatusNotFound)
return
}
userId := strings.Split(code, ",")[0] log.Printf("DEBUG: Fetched code session: %#v\n", codeSession)
user, err := h.repo.FindUserId(r.Context(), uuid.MustParse(userId)) apiService, err := h.repo.GetApiServiceCID(r.Context(), codeSession.ClientID)
if err != nil {
log.Printf("ERR: Could not find API service with client %s: %v\n", codeSession.ClientID, err)
web.Error(w, "service is not registered", http.StatusForbidden)
return
}
if codeSession.ClientID != clientId {
web.Error(w, "invalid auth", http.StatusUnauthorized)
return
}
user, err := h.repo.FindUserId(r.Context(), uuid.MustParse(codeSession.UserID))
if err != nil { if err != nil {
web.Error(w, "requested user not found", http.StatusNotFound) web.Error(w, "requested user not found", http.StatusNotFound)
return return
} }
claims := types.ApiClaims{ id, access, refresh, err := h.signApiTokens(&user, &apiService, &codeSession.Nonce)
Email: user.Email, if err != nil {
// TODO: log.Println("ERR: Failed to sign api tokens:", err)
EmailVerified: true, web.Error(w, "failed to sign tokens", http.StatusInternalServerError)
Name: user.FullName, return
Picture: user.ProfilePicture.String,
Nonce: nonce,
Roles: []string{"user", "admin"},
RegisteredClaims: jwt.RegisteredClaims{
Issuer: h.cfg.Jwt.Issuer,
// TODO: use dedicated API id that is in local DB and bind to user there
Subject: user.ID.String(),
Audience: jwt.ClaimStrings{clientId},
IssuedAt: jwt.NewNumericDate(time.Now()),
ExpiresAt: jwt.NewNumericDate(time.Now().Add(15 * time.Minute)),
},
} }
idToken, err := util.SignJwtToken(claims, h.cfg.Jwt.PrivateKey) log.Printf("DEBUG: Created api tokens: %v\n\n%v\n\n%v\n", id.ID.String(), access.ID.String(), refresh.ID.String())
userId, err := uuid.Parse(codeSession.UserID)
if err != nil { if err != nil {
web.Error(w, "failed to sign id token", http.StatusInternalServerError) log.Printf("ERR: Failed to parse user '%s' uuid: %v\n", codeSession.UserID, err)
web.Error(w, "failed to sign tokens", http.StatusInternalServerError)
return
}
ipAddr := util.GetClientIP(r)
ua := r.UserAgent()
session, err := h.repo.CreateServiceSession(r.Context(), repository.CreateServiceSessionParams{
ServiceID: apiService.ID,
ClientID: apiService.ClientID,
UserID: &userId,
ExpiresAt: &refresh.ExpiresAt,
LastActive: nil,
IpAddress: &ipAddr,
UserAgent: &ua,
AccessTokenID: &access.ID,
RefreshTokenID: &refresh.ID,
})
if err != nil {
log.Printf("ERR: Failed to create new service session: %v\n", err)
web.Error(w, "failed to create session", http.StatusInternalServerError)
return
}
log.Printf("INFO: Service session created for '%s' client_id with '%s' id\n", apiService.ClientID, session.ID.String())
type Response struct {
IdToken string `json:"id_token"`
TokenType string `json:"token_type"`
AccessToken string `json:"access_token"`
Email string `json:"email"`
RefreshToken string `json:"refresh_token"`
ExpiresIn float64 `json:"expires_in"`
// TODO: add scope (RFC 8693 $2)
}
response := Response{
IdToken: id.Token,
TokenType: "Bearer",
AccessToken: access.Token,
RefreshToken: refresh.Token,
ExpiresIn: math.Ceil(access.ExpiresAt.Sub(time.Now()).Seconds()),
Email: user.Email,
}
log.Printf("sending following response: %#v\n", response)
w.Header().Set("Content-Type", "application/json")
encoder := json.NewEncoder(w)
if err := encoder.Encode(response); err != nil {
web.Error(w, "failed to encode response", http.StatusInternalServerError)
}
case "refresh_token":
refreshToken := r.FormValue("refresh_token")
var claims types.ApiRefreshClaims
token, err := util.VerifyToken(refreshToken, h.cfg.Jwt.PublicKey, &claims)
if err != nil || !token.Valid {
http.Error(w, fmt.Sprintf("invalid token: %v", err), http.StatusUnauthorized)
return
}
expire, err := claims.GetExpirationTime()
if err != nil {
web.Error(w, "failed to retrieve enough info from the token", http.StatusInternalServerError)
return
}
if time.Now().After(expire.Time) {
web.Error(w, "token is expired", http.StatusUnauthorized)
return
}
refreshJTI, err := uuid.Parse(claims.ID)
if err != nil {
log.Printf("ERR: Failed to parse refresh token JTI as uuid: %v\n", err)
web.Error(w, "failed to refresh token", http.StatusInternalServerError)
return
}
session, err := h.repo.GetServiceSessionByRefreshJTI(r.Context(), &refreshJTI)
if err != nil {
log.Printf("ERR: Failed to find session by '%s' refresh jti: %v\n", refreshJTI.String(), err)
web.Error(w, "session invalid", http.StatusUnauthorized)
return
}
if !session.IsActive {
log.Printf("INFO: Session with id '%s' is not active", session.ID.String())
web.Error(w, "session ended", http.StatusUnauthorized)
return
}
userID, err := uuid.Parse(claims.UserID)
if err != nil {
web.Error(w, "invalid user credentials in refresh token", http.StatusBadRequest)
return
}
user, err := h.repo.FindUserId(r.Context(), userID)
apiService, err := h.repo.GetApiServiceCID(r.Context(), claims.Subject)
if err != nil {
web.Error(w, "api service is not registered", http.StatusUnauthorized)
return
}
id, access, refresh, err := h.signApiTokens(&user, &apiService, nil)
if err := h.repo.UpdateServiceSessionTokens(r.Context(), repository.UpdateServiceSessionTokensParams{
ID: session.ID,
AccessTokenID: &access.ID,
RefreshTokenID: &refresh.ID,
ExpiresAt: &refresh.ExpiresAt,
}); err != nil {
log.Printf("ERR: Failed to update service session with '%s' id: %v\n", session.ID.String(), err)
web.Error(w, "failed to update session", http.StatusInternalServerError)
return return
} }
type Response struct { type Response struct {
IdToken string `json:"id_token"` IdToken string `json:"id_token"`
TokenType string `json:"token_type"` TokenType string `json:"token_type"`
AccessToken string `json:"access_token"` AccessToken string `json:"access_token"`
Email string `json:"email"` RefreshToken string `json:"refresh_token"`
// TODO: add expires_in, refresh_token, scope (RFC 8693 $2) ExpiresIn float64 `json:"expires_in"`
} }
response := Response{ response := Response{
IdToken: idToken, IdToken: id.Token,
TokenType: "Bearer", TokenType: "Bearer",
// FIXME: AccessToken: access.Token,
AccessToken: idToken, RefreshToken: refresh.Token,
Email: user.Email, ExpiresIn: math.Ceil(access.ExpiresAt.Sub(time.Now()).Seconds()),
} }
log.Printf("sending following response: %#v\n", response) log.Printf("DEBUG: refresh - sending following response: %#v\n", response)
w.Header().Set("Content-Type", "application/json") w.Header().Set("Content-Type", "application/json")
encoder := json.NewEncoder(w) encoder := json.NewEncoder(w)

View File

@ -9,26 +9,37 @@ import (
"context" "context"
"github.com/google/uuid" "github.com/google/uuid"
"github.com/jackc/pgx/v5/pgtype"
) )
const activateApiService = `-- name: ActivateApiService :exec
UPDATE api_services
SET is_active = true,
updated_at = NOW()
WHERE client_id = $1
`
func (q *Queries) ActivateApiService(ctx context.Context, clientID string) error {
_, err := q.db.Exec(ctx, activateApiService, clientID)
return err
}
const createApiService = `-- name: CreateApiService :one const createApiService = `-- name: CreateApiService :one
INSERT INTO api_services ( INSERT INTO api_services (
client_id, client_secret, name, description, redirect_uris, scopes, grant_types, is_active client_id, client_secret, name, description, redirect_uris, scopes, grant_types, is_active
) VALUES ( ) VALUES (
$1, $2, $3, $4, $5, $6, $7, $8 $1, $2, $3, $4, $5, $6, $7, $8
) RETURNING id, client_id, client_secret, name, redirect_uris, scopes, grant_types, created_at, updated_at, is_active, description ) RETURNING id, client_id, client_secret, name, redirect_uris, scopes, grant_types, created_at, updated_at, is_active, description, icon_url
` `
type CreateApiServiceParams struct { type CreateApiServiceParams struct {
ClientID string `json:"client_id"` ClientID string `json:"client_id"`
ClientSecret string `json:"client_secret"` ClientSecret string `json:"client_secret"`
Name string `json:"name"` Name string `json:"name"`
Description pgtype.Text `json:"description"` Description *string `json:"description"`
RedirectUris []string `json:"redirect_uris"` RedirectUris []string `json:"redirect_uris"`
Scopes []string `json:"scopes"` Scopes []string `json:"scopes"`
GrantTypes []string `json:"grant_types"` GrantTypes []string `json:"grant_types"`
IsActive bool `json:"is_active"` IsActive bool `json:"is_active"`
} }
func (q *Queries) CreateApiService(ctx context.Context, arg CreateApiServiceParams) (ApiService, error) { func (q *Queries) CreateApiService(ctx context.Context, arg CreateApiServiceParams) (ApiService, error) {
@ -55,6 +66,7 @@ func (q *Queries) CreateApiService(ctx context.Context, arg CreateApiServicePara
&i.UpdatedAt, &i.UpdatedAt,
&i.IsActive, &i.IsActive,
&i.Description, &i.Description,
&i.IconUrl,
) )
return i, err return i, err
} }
@ -72,7 +84,7 @@ func (q *Queries) DeactivateApiService(ctx context.Context, clientID string) err
} }
const getApiServiceCID = `-- name: GetApiServiceCID :one const getApiServiceCID = `-- name: GetApiServiceCID :one
SELECT id, client_id, client_secret, name, redirect_uris, scopes, grant_types, created_at, updated_at, is_active, description FROM api_services SELECT id, client_id, client_secret, name, redirect_uris, scopes, grant_types, created_at, updated_at, is_active, description, icon_url FROM api_services
WHERE client_id = $1 WHERE client_id = $1
AND is_active = true AND is_active = true
LIMIT 1 LIMIT 1
@ -93,12 +105,13 @@ func (q *Queries) GetApiServiceCID(ctx context.Context, clientID string) (ApiSer
&i.UpdatedAt, &i.UpdatedAt,
&i.IsActive, &i.IsActive,
&i.Description, &i.Description,
&i.IconUrl,
) )
return i, err return i, err
} }
const getApiServiceId = `-- name: GetApiServiceId :one const getApiServiceId = `-- name: GetApiServiceId :one
SELECT id, client_id, client_secret, name, redirect_uris, scopes, grant_types, created_at, updated_at, is_active, description FROM api_services SELECT id, client_id, client_secret, name, redirect_uris, scopes, grant_types, created_at, updated_at, is_active, description, icon_url FROM api_services
WHERE id = $1 WHERE id = $1
LIMIT 1 LIMIT 1
` `
@ -118,12 +131,13 @@ func (q *Queries) GetApiServiceId(ctx context.Context, id uuid.UUID) (ApiService
&i.UpdatedAt, &i.UpdatedAt,
&i.IsActive, &i.IsActive,
&i.Description, &i.Description,
&i.IconUrl,
) )
return i, err return i, err
} }
const listApiServices = `-- name: ListApiServices :many const listApiServices = `-- name: ListApiServices :many
SELECT id, client_id, client_secret, name, redirect_uris, scopes, grant_types, created_at, updated_at, is_active, description FROM api_services SELECT id, client_id, client_secret, name, redirect_uris, scopes, grant_types, created_at, updated_at, is_active, description, icon_url FROM api_services
ORDER BY created_at DESC ORDER BY created_at DESC
` `
@ -148,6 +162,7 @@ func (q *Queries) ListApiServices(ctx context.Context) ([]ApiService, error) {
&i.UpdatedAt, &i.UpdatedAt,
&i.IsActive, &i.IsActive,
&i.Description, &i.Description,
&i.IconUrl,
); err != nil { ); err != nil {
return nil, err return nil, err
} }
@ -169,16 +184,16 @@ SET
grant_types = $6, grant_types = $6,
updated_at = NOW() updated_at = NOW()
WHERE client_id = $1 WHERE client_id = $1
RETURNING id, client_id, client_secret, name, redirect_uris, scopes, grant_types, created_at, updated_at, is_active, description RETURNING id, client_id, client_secret, name, redirect_uris, scopes, grant_types, created_at, updated_at, is_active, description, icon_url
` `
type UpdateApiServiceParams struct { type UpdateApiServiceParams struct {
ClientID string `json:"client_id"` ClientID string `json:"client_id"`
Name string `json:"name"` Name string `json:"name"`
Description pgtype.Text `json:"description"` Description *string `json:"description"`
RedirectUris []string `json:"redirect_uris"` RedirectUris []string `json:"redirect_uris"`
Scopes []string `json:"scopes"` Scopes []string `json:"scopes"`
GrantTypes []string `json:"grant_types"` GrantTypes []string `json:"grant_types"`
} }
func (q *Queries) UpdateApiService(ctx context.Context, arg UpdateApiServiceParams) (ApiService, error) { func (q *Queries) UpdateApiService(ctx context.Context, arg UpdateApiServiceParams) (ApiService, error) {
@ -203,6 +218,7 @@ func (q *Queries) UpdateApiService(ctx context.Context, arg UpdateApiServicePara
&i.UpdatedAt, &i.UpdatedAt,
&i.IsActive, &i.IsActive,
&i.Description, &i.Description,
&i.IconUrl,
) )
return i, err return i, err
} }

View File

@ -8,32 +8,70 @@ import (
"time" "time"
"github.com/google/uuid" "github.com/google/uuid"
"github.com/jackc/pgx/v5/pgtype"
) )
type ApiService struct { type ApiService struct {
ID uuid.UUID `json:"id"` ID uuid.UUID `json:"id"`
ClientID string `json:"client_id"` ClientID string `json:"client_id"`
ClientSecret string `json:"client_secret"` ClientSecret string `json:"client_secret"`
Name string `json:"name"` Name string `json:"name"`
RedirectUris []string `json:"redirect_uris"` RedirectUris []string `json:"redirect_uris"`
Scopes []string `json:"scopes"` Scopes []string `json:"scopes"`
GrantTypes []string `json:"grant_types"` GrantTypes []string `json:"grant_types"`
CreatedAt time.Time `json:"created_at"` CreatedAt time.Time `json:"created_at"`
UpdatedAt time.Time `json:"updated_at"` UpdatedAt time.Time `json:"updated_at"`
IsActive bool `json:"is_active"` IsActive bool `json:"is_active"`
Description pgtype.Text `json:"description"` Description *string `json:"description"`
IconUrl *string `json:"icon_url"`
}
type ServiceSession struct {
ID uuid.UUID `json:"id"`
ServiceID uuid.UUID `json:"service_id"`
ClientID string `json:"client_id"`
UserID *uuid.UUID `json:"user_id"`
IssuedAt time.Time `json:"issued_at"`
ExpiresAt *time.Time `json:"expires_at"`
LastActive *time.Time `json:"last_active"`
IpAddress *string `json:"ip_address"`
UserAgent *string `json:"user_agent"`
AccessTokenID *uuid.UUID `json:"access_token_id"`
RefreshTokenID *uuid.UUID `json:"refresh_token_id"`
IsActive bool `json:"is_active"`
RevokedAt *time.Time `json:"revoked_at"`
Scope *string `json:"scope"`
Claims []byte `json:"claims"`
} }
type User struct { type User struct {
ID uuid.UUID `json:"id"` ID uuid.UUID `json:"id"`
Email string `json:"email"` Email string `json:"email"`
FullName string `json:"full_name"` FullName string `json:"full_name"`
PasswordHash string `json:"password_hash"` PasswordHash string `json:"password_hash"`
IsAdmin bool `json:"is_admin"` IsAdmin bool `json:"is_admin"`
CreatedAt pgtype.Timestamptz `json:"created_at"` CreatedAt *time.Time `json:"created_at"`
UpdatedAt pgtype.Timestamptz `json:"updated_at"` UpdatedAt *time.Time `json:"updated_at"`
LastLogin pgtype.Timestamptz `json:"last_login"` LastLogin *time.Time `json:"last_login"`
PhoneNumber pgtype.Text `json:"phone_number"` PhoneNumber *string `json:"phone_number"`
ProfilePicture pgtype.Text `json:"profile_picture"` ProfilePicture *string `json:"profile_picture"`
CreatedBy *uuid.UUID `json:"created_by"`
EmailVerified bool `json:"email_verified"`
AvatarVerified bool `json:"avatar_verified"`
Verified bool `json:"verified"`
}
type UserSession struct {
ID uuid.UUID `json:"id"`
UserID uuid.UUID `json:"user_id"`
SessionType string `json:"session_type"`
IssuedAt time.Time `json:"issued_at"`
ExpiresAt *time.Time `json:"expires_at"`
LastActive *time.Time `json:"last_active"`
IpAddress *string `json:"ip_address"`
UserAgent *string `json:"user_agent"`
AccessTokenID *uuid.UUID `json:"access_token_id"`
RefreshTokenID *uuid.UUID `json:"refresh_token_id"`
DeviceInfo []byte `json:"device_info"`
IsActive bool `json:"is_active"`
RevokedAt *time.Time `json:"revoked_at"`
} }

View File

@ -0,0 +1,419 @@
// Code generated by sqlc. DO NOT EDIT.
// versions:
// sqlc v1.29.0
// source: service_sessions.sql
package repository
import (
"context"
"time"
"github.com/google/uuid"
)
const createServiceSession = `-- name: CreateServiceSession :one
INSERT INTO service_sessions (
service_id, client_id, user_id, issued_at, expires_at, last_active,
ip_address, user_agent, access_token_id, refresh_token_id,
is_active, scope, claims
) VALUES (
$1, $2, $3, NOW(), $4, $5,
$6, $7, $8, $9,
TRUE, $10, $11
)
RETURNING id, service_id, client_id, user_id, issued_at, expires_at, last_active, ip_address, user_agent, access_token_id, refresh_token_id, is_active, revoked_at, scope, claims
`
type CreateServiceSessionParams struct {
ServiceID uuid.UUID `json:"service_id"`
ClientID string `json:"client_id"`
UserID *uuid.UUID `json:"user_id"`
ExpiresAt *time.Time `json:"expires_at"`
LastActive *time.Time `json:"last_active"`
IpAddress *string `json:"ip_address"`
UserAgent *string `json:"user_agent"`
AccessTokenID *uuid.UUID `json:"access_token_id"`
RefreshTokenID *uuid.UUID `json:"refresh_token_id"`
Scope *string `json:"scope"`
Claims []byte `json:"claims"`
}
func (q *Queries) CreateServiceSession(ctx context.Context, arg CreateServiceSessionParams) (ServiceSession, error) {
row := q.db.QueryRow(ctx, createServiceSession,
arg.ServiceID,
arg.ClientID,
arg.UserID,
arg.ExpiresAt,
arg.LastActive,
arg.IpAddress,
arg.UserAgent,
arg.AccessTokenID,
arg.RefreshTokenID,
arg.Scope,
arg.Claims,
)
var i ServiceSession
err := row.Scan(
&i.ID,
&i.ServiceID,
&i.ClientID,
&i.UserID,
&i.IssuedAt,
&i.ExpiresAt,
&i.LastActive,
&i.IpAddress,
&i.UserAgent,
&i.AccessTokenID,
&i.RefreshTokenID,
&i.IsActive,
&i.RevokedAt,
&i.Scope,
&i.Claims,
)
return i, err
}
const getServiceSessionByAccessJTI = `-- name: GetServiceSessionByAccessJTI :one
SELECT id, service_id, client_id, user_id, issued_at, expires_at, last_active, ip_address, user_agent, access_token_id, refresh_token_id, is_active, revoked_at, scope, claims FROM service_sessions
WHERE access_token_id = $1
AND is_active = TRUE
`
func (q *Queries) GetServiceSessionByAccessJTI(ctx context.Context, accessTokenID *uuid.UUID) (ServiceSession, error) {
row := q.db.QueryRow(ctx, getServiceSessionByAccessJTI, accessTokenID)
var i ServiceSession
err := row.Scan(
&i.ID,
&i.ServiceID,
&i.ClientID,
&i.UserID,
&i.IssuedAt,
&i.ExpiresAt,
&i.LastActive,
&i.IpAddress,
&i.UserAgent,
&i.AccessTokenID,
&i.RefreshTokenID,
&i.IsActive,
&i.RevokedAt,
&i.Scope,
&i.Claims,
)
return i, err
}
const getServiceSessionByRefreshJTI = `-- name: GetServiceSessionByRefreshJTI :one
SELECT id, service_id, client_id, user_id, issued_at, expires_at, last_active, ip_address, user_agent, access_token_id, refresh_token_id, is_active, revoked_at, scope, claims FROM service_sessions
WHERE refresh_token_id = $1
`
func (q *Queries) GetServiceSessionByRefreshJTI(ctx context.Context, refreshTokenID *uuid.UUID) (ServiceSession, error) {
row := q.db.QueryRow(ctx, getServiceSessionByRefreshJTI, refreshTokenID)
var i ServiceSession
err := row.Scan(
&i.ID,
&i.ServiceID,
&i.ClientID,
&i.UserID,
&i.IssuedAt,
&i.ExpiresAt,
&i.LastActive,
&i.IpAddress,
&i.UserAgent,
&i.AccessTokenID,
&i.RefreshTokenID,
&i.IsActive,
&i.RevokedAt,
&i.Scope,
&i.Claims,
)
return i, err
}
const getServiceSessions = `-- name: GetServiceSessions :many
SELECT session.id, session.service_id, session.client_id, session.user_id, session.issued_at, session.expires_at, session.last_active, session.ip_address, session.user_agent, session.access_token_id, session.refresh_token_id, session.is_active, session.revoked_at, session.scope, session.claims, service.id, service.client_id, service.client_secret, service.name, service.redirect_uris, service.scopes, service.grant_types, service.created_at, service.updated_at, service.is_active, service.description, service.icon_url, u.id, u.email, u.full_name, u.password_hash, u.is_admin, u.created_at, u.updated_at, u.last_login, u.phone_number, u.profile_picture, u.created_by, u.email_verified, u.avatar_verified, u.verified
FROM service_sessions AS session
JOIN api_services AS service ON service.id = session.service_id
JOIN users AS u ON u.id = session.user_id
ORDER BY session.issued_at DESC
LIMIT $1 OFFSET $2
`
type GetServiceSessionsParams struct {
Limit int32 `json:"limit"`
Offset int32 `json:"offset"`
}
type GetServiceSessionsRow struct {
ServiceSession ServiceSession `json:"service_session"`
ApiService ApiService `json:"api_service"`
User User `json:"user"`
}
func (q *Queries) GetServiceSessions(ctx context.Context, arg GetServiceSessionsParams) ([]GetServiceSessionsRow, error) {
rows, err := q.db.Query(ctx, getServiceSessions, arg.Limit, arg.Offset)
if err != nil {
return nil, err
}
defer rows.Close()
var items []GetServiceSessionsRow
for rows.Next() {
var i GetServiceSessionsRow
if err := rows.Scan(
&i.ServiceSession.ID,
&i.ServiceSession.ServiceID,
&i.ServiceSession.ClientID,
&i.ServiceSession.UserID,
&i.ServiceSession.IssuedAt,
&i.ServiceSession.ExpiresAt,
&i.ServiceSession.LastActive,
&i.ServiceSession.IpAddress,
&i.ServiceSession.UserAgent,
&i.ServiceSession.AccessTokenID,
&i.ServiceSession.RefreshTokenID,
&i.ServiceSession.IsActive,
&i.ServiceSession.RevokedAt,
&i.ServiceSession.Scope,
&i.ServiceSession.Claims,
&i.ApiService.ID,
&i.ApiService.ClientID,
&i.ApiService.ClientSecret,
&i.ApiService.Name,
&i.ApiService.RedirectUris,
&i.ApiService.Scopes,
&i.ApiService.GrantTypes,
&i.ApiService.CreatedAt,
&i.ApiService.UpdatedAt,
&i.ApiService.IsActive,
&i.ApiService.Description,
&i.ApiService.IconUrl,
&i.User.ID,
&i.User.Email,
&i.User.FullName,
&i.User.PasswordHash,
&i.User.IsAdmin,
&i.User.CreatedAt,
&i.User.UpdatedAt,
&i.User.LastLogin,
&i.User.PhoneNumber,
&i.User.ProfilePicture,
&i.User.CreatedBy,
&i.User.EmailVerified,
&i.User.AvatarVerified,
&i.User.Verified,
); err != nil {
return nil, err
}
items = append(items, i)
}
if err := rows.Err(); err != nil {
return nil, err
}
return items, nil
}
const getServiceSessionsCount = `-- name: GetServiceSessionsCount :one
SELECT COUNT(*) FROM service_sessions
`
func (q *Queries) GetServiceSessionsCount(ctx context.Context) (int64, error) {
row := q.db.QueryRow(ctx, getServiceSessionsCount)
var count int64
err := row.Scan(&count)
return count, err
}
const listActiveServiceSessionsByClient = `-- name: ListActiveServiceSessionsByClient :many
SELECT id, service_id, client_id, user_id, issued_at, expires_at, last_active, ip_address, user_agent, access_token_id, refresh_token_id, is_active, revoked_at, scope, claims FROM service_sessions
WHERE client_id = $1
AND is_active = TRUE
ORDER BY issued_at DESC
LIMIT $1 OFFSET $2
`
type ListActiveServiceSessionsByClientParams struct {
Limit int32 `json:"limit"`
Offset int32 `json:"offset"`
}
func (q *Queries) ListActiveServiceSessionsByClient(ctx context.Context, arg ListActiveServiceSessionsByClientParams) ([]ServiceSession, error) {
rows, err := q.db.Query(ctx, listActiveServiceSessionsByClient, arg.Limit, arg.Offset)
if err != nil {
return nil, err
}
defer rows.Close()
var items []ServiceSession
for rows.Next() {
var i ServiceSession
if err := rows.Scan(
&i.ID,
&i.ServiceID,
&i.ClientID,
&i.UserID,
&i.IssuedAt,
&i.ExpiresAt,
&i.LastActive,
&i.IpAddress,
&i.UserAgent,
&i.AccessTokenID,
&i.RefreshTokenID,
&i.IsActive,
&i.RevokedAt,
&i.Scope,
&i.Claims,
); err != nil {
return nil, err
}
items = append(items, i)
}
if err := rows.Err(); err != nil {
return nil, err
}
return items, nil
}
const listActiveServiceSessionsByUser = `-- name: ListActiveServiceSessionsByUser :many
SELECT id, service_id, client_id, user_id, issued_at, expires_at, last_active, ip_address, user_agent, access_token_id, refresh_token_id, is_active, revoked_at, scope, claims FROM service_sessions
WHERE user_id = $1
AND is_active = TRUE
ORDER BY issued_at DESC
LIMIT $1 OFFSET $2
`
type ListActiveServiceSessionsByUserParams struct {
Limit int32 `json:"limit"`
Offset int32 `json:"offset"`
}
func (q *Queries) ListActiveServiceSessionsByUser(ctx context.Context, arg ListActiveServiceSessionsByUserParams) ([]ServiceSession, error) {
rows, err := q.db.Query(ctx, listActiveServiceSessionsByUser, arg.Limit, arg.Offset)
if err != nil {
return nil, err
}
defer rows.Close()
var items []ServiceSession
for rows.Next() {
var i ServiceSession
if err := rows.Scan(
&i.ID,
&i.ServiceID,
&i.ClientID,
&i.UserID,
&i.IssuedAt,
&i.ExpiresAt,
&i.LastActive,
&i.IpAddress,
&i.UserAgent,
&i.AccessTokenID,
&i.RefreshTokenID,
&i.IsActive,
&i.RevokedAt,
&i.Scope,
&i.Claims,
); err != nil {
return nil, err
}
items = append(items, i)
}
if err := rows.Err(); err != nil {
return nil, err
}
return items, nil
}
const listAllServiceSessions = `-- name: ListAllServiceSessions :many
SELECT id, service_id, client_id, user_id, issued_at, expires_at, last_active, ip_address, user_agent, access_token_id, refresh_token_id, is_active, revoked_at, scope, claims FROM service_sessions
ORDER BY issued_at DESC
LIMIT $1 OFFSET $2
`
type ListAllServiceSessionsParams struct {
Limit int32 `json:"limit"`
Offset int32 `json:"offset"`
}
func (q *Queries) ListAllServiceSessions(ctx context.Context, arg ListAllServiceSessionsParams) ([]ServiceSession, error) {
rows, err := q.db.Query(ctx, listAllServiceSessions, arg.Limit, arg.Offset)
if err != nil {
return nil, err
}
defer rows.Close()
var items []ServiceSession
for rows.Next() {
var i ServiceSession
if err := rows.Scan(
&i.ID,
&i.ServiceID,
&i.ClientID,
&i.UserID,
&i.IssuedAt,
&i.ExpiresAt,
&i.LastActive,
&i.IpAddress,
&i.UserAgent,
&i.AccessTokenID,
&i.RefreshTokenID,
&i.IsActive,
&i.RevokedAt,
&i.Scope,
&i.Claims,
); err != nil {
return nil, err
}
items = append(items, i)
}
if err := rows.Err(); err != nil {
return nil, err
}
return items, nil
}
const revokeServiceSession = `-- name: RevokeServiceSession :exec
UPDATE service_sessions
SET is_active = FALSE,
revoked_at = NOW()
WHERE id = $1
AND is_active = TRUE
`
func (q *Queries) RevokeServiceSession(ctx context.Context, id uuid.UUID) error {
_, err := q.db.Exec(ctx, revokeServiceSession, id)
return err
}
const updateServiceSessionLastActive = `-- name: UpdateServiceSessionLastActive :exec
UPDATE service_sessions
SET last_active = NOW()
WHERE id = $1
AND is_active = TRUE
`
func (q *Queries) UpdateServiceSessionLastActive(ctx context.Context, id uuid.UUID) error {
_, err := q.db.Exec(ctx, updateServiceSessionLastActive, id)
return err
}
const updateServiceSessionTokens = `-- name: UpdateServiceSessionTokens :exec
UPDATE service_sessions
SET access_token_id = $2, refresh_token_id = $3, expires_at = $4
WHERE id = $1
AND is_active = TRUE
`
type UpdateServiceSessionTokensParams struct {
ID uuid.UUID `json:"id"`
AccessTokenID *uuid.UUID `json:"access_token_id"`
RefreshTokenID *uuid.UUID `json:"refresh_token_id"`
ExpiresAt *time.Time `json:"expires_at"`
}
func (q *Queries) UpdateServiceSessionTokens(ctx context.Context, arg UpdateServiceSessionTokensParams) error {
_, err := q.db.Exec(ctx, updateServiceSessionTokens,
arg.ID,
arg.AccessTokenID,
arg.RefreshTokenID,
arg.ExpiresAt,
)
return err
}

View File

@ -0,0 +1,334 @@
// Code generated by sqlc. DO NOT EDIT.
// versions:
// sqlc v1.29.0
// source: user_sessions.sql
package repository
import (
"context"
"time"
"github.com/google/uuid"
)
const createUserSession = `-- name: CreateUserSession :one
INSERT INTO user_sessions (
user_id, session_type, issued_at, expires_at, last_active,
ip_address, user_agent, access_token_id, refresh_token_id,
device_info, is_active
) VALUES (
$1, $2, NOW(), $3, $4,
$5, $6, $7, $8,
$9, TRUE
)
RETURNING id, user_id, session_type, issued_at, expires_at, last_active, ip_address, user_agent, access_token_id, refresh_token_id, device_info, is_active, revoked_at
`
type CreateUserSessionParams struct {
UserID uuid.UUID `json:"user_id"`
SessionType string `json:"session_type"`
ExpiresAt *time.Time `json:"expires_at"`
LastActive *time.Time `json:"last_active"`
IpAddress *string `json:"ip_address"`
UserAgent *string `json:"user_agent"`
AccessTokenID *uuid.UUID `json:"access_token_id"`
RefreshTokenID *uuid.UUID `json:"refresh_token_id"`
DeviceInfo []byte `json:"device_info"`
}
func (q *Queries) CreateUserSession(ctx context.Context, arg CreateUserSessionParams) (UserSession, error) {
row := q.db.QueryRow(ctx, createUserSession,
arg.UserID,
arg.SessionType,
arg.ExpiresAt,
arg.LastActive,
arg.IpAddress,
arg.UserAgent,
arg.AccessTokenID,
arg.RefreshTokenID,
arg.DeviceInfo,
)
var i UserSession
err := row.Scan(
&i.ID,
&i.UserID,
&i.SessionType,
&i.IssuedAt,
&i.ExpiresAt,
&i.LastActive,
&i.IpAddress,
&i.UserAgent,
&i.AccessTokenID,
&i.RefreshTokenID,
&i.DeviceInfo,
&i.IsActive,
&i.RevokedAt,
)
return i, err
}
const getUserSessionByAccessJTI = `-- name: GetUserSessionByAccessJTI :one
SELECT id, user_id, session_type, issued_at, expires_at, last_active, ip_address, user_agent, access_token_id, refresh_token_id, device_info, is_active, revoked_at FROM user_sessions
WHERE access_token_id = $1
AND is_active = TRUE
`
func (q *Queries) GetUserSessionByAccessJTI(ctx context.Context, accessTokenID *uuid.UUID) (UserSession, error) {
row := q.db.QueryRow(ctx, getUserSessionByAccessJTI, accessTokenID)
var i UserSession
err := row.Scan(
&i.ID,
&i.UserID,
&i.SessionType,
&i.IssuedAt,
&i.ExpiresAt,
&i.LastActive,
&i.IpAddress,
&i.UserAgent,
&i.AccessTokenID,
&i.RefreshTokenID,
&i.DeviceInfo,
&i.IsActive,
&i.RevokedAt,
)
return i, err
}
const getUserSessionByRefreshJTI = `-- name: GetUserSessionByRefreshJTI :one
SELECT id, user_id, session_type, issued_at, expires_at, last_active, ip_address, user_agent, access_token_id, refresh_token_id, device_info, is_active, revoked_at FROM user_sessions
WHERE refresh_token_id = $1
`
func (q *Queries) GetUserSessionByRefreshJTI(ctx context.Context, refreshTokenID *uuid.UUID) (UserSession, error) {
row := q.db.QueryRow(ctx, getUserSessionByRefreshJTI, refreshTokenID)
var i UserSession
err := row.Scan(
&i.ID,
&i.UserID,
&i.SessionType,
&i.IssuedAt,
&i.ExpiresAt,
&i.LastActive,
&i.IpAddress,
&i.UserAgent,
&i.AccessTokenID,
&i.RefreshTokenID,
&i.DeviceInfo,
&i.IsActive,
&i.RevokedAt,
)
return i, err
}
const getUserSessions = `-- name: GetUserSessions :many
SELECT session.id, session.user_id, session.session_type, session.issued_at, session.expires_at, session.last_active, session.ip_address, session.user_agent, session.access_token_id, session.refresh_token_id, session.device_info, session.is_active, session.revoked_at, u.id, u.email, u.full_name, u.password_hash, u.is_admin, u.created_at, u.updated_at, u.last_login, u.phone_number, u.profile_picture, u.created_by, u.email_verified, u.avatar_verified, u.verified
FROM user_sessions AS session
JOIN users AS u ON u.id = session.user_id
ORDER BY session.issued_at DESC
LIMIT $1 OFFSET $2
`
type GetUserSessionsParams struct {
Limit int32 `json:"limit"`
Offset int32 `json:"offset"`
}
type GetUserSessionsRow struct {
UserSession UserSession `json:"user_session"`
User User `json:"user"`
}
func (q *Queries) GetUserSessions(ctx context.Context, arg GetUserSessionsParams) ([]GetUserSessionsRow, error) {
rows, err := q.db.Query(ctx, getUserSessions, arg.Limit, arg.Offset)
if err != nil {
return nil, err
}
defer rows.Close()
var items []GetUserSessionsRow
for rows.Next() {
var i GetUserSessionsRow
if err := rows.Scan(
&i.UserSession.ID,
&i.UserSession.UserID,
&i.UserSession.SessionType,
&i.UserSession.IssuedAt,
&i.UserSession.ExpiresAt,
&i.UserSession.LastActive,
&i.UserSession.IpAddress,
&i.UserSession.UserAgent,
&i.UserSession.AccessTokenID,
&i.UserSession.RefreshTokenID,
&i.UserSession.DeviceInfo,
&i.UserSession.IsActive,
&i.UserSession.RevokedAt,
&i.User.ID,
&i.User.Email,
&i.User.FullName,
&i.User.PasswordHash,
&i.User.IsAdmin,
&i.User.CreatedAt,
&i.User.UpdatedAt,
&i.User.LastLogin,
&i.User.PhoneNumber,
&i.User.ProfilePicture,
&i.User.CreatedBy,
&i.User.EmailVerified,
&i.User.AvatarVerified,
&i.User.Verified,
); err != nil {
return nil, err
}
items = append(items, i)
}
if err := rows.Err(); err != nil {
return nil, err
}
return items, nil
}
const getUserSessionsCount = `-- name: GetUserSessionsCount :one
SELECT COUNT(*) FROM user_sessions
`
func (q *Queries) GetUserSessionsCount(ctx context.Context) (int64, error) {
row := q.db.QueryRow(ctx, getUserSessionsCount)
var count int64
err := row.Scan(&count)
return count, err
}
const listActiveUserSessions = `-- name: ListActiveUserSessions :many
SELECT id, user_id, session_type, issued_at, expires_at, last_active, ip_address, user_agent, access_token_id, refresh_token_id, device_info, is_active, revoked_at FROM user_sessions
WHERE user_id = $1
AND is_active = TRUE
ORDER BY issued_at DESC
`
func (q *Queries) ListActiveUserSessions(ctx context.Context, userID uuid.UUID) ([]UserSession, error) {
rows, err := q.db.Query(ctx, listActiveUserSessions, userID)
if err != nil {
return nil, err
}
defer rows.Close()
var items []UserSession
for rows.Next() {
var i UserSession
if err := rows.Scan(
&i.ID,
&i.UserID,
&i.SessionType,
&i.IssuedAt,
&i.ExpiresAt,
&i.LastActive,
&i.IpAddress,
&i.UserAgent,
&i.AccessTokenID,
&i.RefreshTokenID,
&i.DeviceInfo,
&i.IsActive,
&i.RevokedAt,
); err != nil {
return nil, err
}
items = append(items, i)
}
if err := rows.Err(); err != nil {
return nil, err
}
return items, nil
}
const listAllSessions = `-- name: ListAllSessions :many
SELECT id, user_id, session_type, issued_at, expires_at, last_active, ip_address, user_agent, access_token_id, refresh_token_id, device_info, is_active, revoked_at FROM user_sessions
ORDER BY issued_at DESC
LIMIT $1 OFFSET $2
`
type ListAllSessionsParams struct {
Limit int32 `json:"limit"`
Offset int32 `json:"offset"`
}
func (q *Queries) ListAllSessions(ctx context.Context, arg ListAllSessionsParams) ([]UserSession, error) {
rows, err := q.db.Query(ctx, listAllSessions, arg.Limit, arg.Offset)
if err != nil {
return nil, err
}
defer rows.Close()
var items []UserSession
for rows.Next() {
var i UserSession
if err := rows.Scan(
&i.ID,
&i.UserID,
&i.SessionType,
&i.IssuedAt,
&i.ExpiresAt,
&i.LastActive,
&i.IpAddress,
&i.UserAgent,
&i.AccessTokenID,
&i.RefreshTokenID,
&i.DeviceInfo,
&i.IsActive,
&i.RevokedAt,
); err != nil {
return nil, err
}
items = append(items, i)
}
if err := rows.Err(); err != nil {
return nil, err
}
return items, nil
}
const revokeUserSession = `-- name: RevokeUserSession :exec
UPDATE user_sessions
SET is_active = FALSE,
revoked_at = NOW()
WHERE id = $1
AND is_active = TRUE
`
func (q *Queries) RevokeUserSession(ctx context.Context, id uuid.UUID) error {
_, err := q.db.Exec(ctx, revokeUserSession, id)
return err
}
const updateSessionLastActive = `-- name: UpdateSessionLastActive :exec
UPDATE user_sessions
SET last_active = NOW()
WHERE id = $1
AND is_active = TRUE
`
func (q *Queries) UpdateSessionLastActive(ctx context.Context, id uuid.UUID) error {
_, err := q.db.Exec(ctx, updateSessionLastActive, id)
return err
}
const updateSessionTokens = `-- name: UpdateSessionTokens :exec
UPDATE user_sessions
SET access_token_id = $2, refresh_token_id = $3, expires_at = $4
WHERE id = $1
AND is_active = TRUE
`
type UpdateSessionTokensParams struct {
ID uuid.UUID `json:"id"`
AccessTokenID *uuid.UUID `json:"access_token_id"`
RefreshTokenID *uuid.UUID `json:"refresh_token_id"`
ExpiresAt *time.Time `json:"expires_at"`
}
func (q *Queries) UpdateSessionTokens(ctx context.Context, arg UpdateSessionTokensParams) error {
_, err := q.db.Exec(ctx, updateSessionTokens,
arg.ID,
arg.AccessTokenID,
arg.RefreshTokenID,
arg.ExpiresAt,
)
return err
}

View File

@ -9,11 +9,49 @@ import (
"context" "context"
"github.com/google/uuid" "github.com/google/uuid"
"github.com/jackc/pgx/v5/pgtype"
) )
const findAdminUsers = `-- name: FindAdminUsers :many
SELECT id, email, full_name, password_hash, is_admin, created_at, updated_at, last_login, phone_number, profile_picture, created_by, email_verified, avatar_verified, verified FROM users WHERE created_by = $1
`
func (q *Queries) FindAdminUsers(ctx context.Context, createdBy *uuid.UUID) ([]User, error) {
rows, err := q.db.Query(ctx, findAdminUsers, createdBy)
if err != nil {
return nil, err
}
defer rows.Close()
var items []User
for rows.Next() {
var i User
if err := rows.Scan(
&i.ID,
&i.Email,
&i.FullName,
&i.PasswordHash,
&i.IsAdmin,
&i.CreatedAt,
&i.UpdatedAt,
&i.LastLogin,
&i.PhoneNumber,
&i.ProfilePicture,
&i.CreatedBy,
&i.EmailVerified,
&i.AvatarVerified,
&i.Verified,
); err != nil {
return nil, err
}
items = append(items, i)
}
if err := rows.Err(); err != nil {
return nil, err
}
return items, nil
}
const findAllUsers = `-- name: FindAllUsers :many const findAllUsers = `-- name: FindAllUsers :many
SELECT id, email, full_name, password_hash, is_admin, created_at, updated_at, last_login, phone_number, profile_picture FROM users SELECT id, email, full_name, password_hash, is_admin, created_at, updated_at, last_login, phone_number, profile_picture, created_by, email_verified, avatar_verified, verified FROM users
` `
func (q *Queries) FindAllUsers(ctx context.Context) ([]User, error) { func (q *Queries) FindAllUsers(ctx context.Context) ([]User, error) {
@ -36,6 +74,10 @@ func (q *Queries) FindAllUsers(ctx context.Context) ([]User, error) {
&i.LastLogin, &i.LastLogin,
&i.PhoneNumber, &i.PhoneNumber,
&i.ProfilePicture, &i.ProfilePicture,
&i.CreatedBy,
&i.EmailVerified,
&i.AvatarVerified,
&i.Verified,
); err != nil { ); err != nil {
return nil, err return nil, err
} }
@ -48,7 +90,7 @@ func (q *Queries) FindAllUsers(ctx context.Context) ([]User, error) {
} }
const findUserEmail = `-- name: FindUserEmail :one const findUserEmail = `-- name: FindUserEmail :one
SELECT id, email, full_name, password_hash, is_admin, created_at, updated_at, last_login, phone_number, profile_picture FROM users WHERE email = $1 LIMIT 1 SELECT id, email, full_name, password_hash, is_admin, created_at, updated_at, last_login, phone_number, profile_picture, created_by, email_verified, avatar_verified, verified FROM users WHERE email = $1 LIMIT 1
` `
func (q *Queries) FindUserEmail(ctx context.Context, email string) (User, error) { func (q *Queries) FindUserEmail(ctx context.Context, email string) (User, error) {
@ -65,12 +107,16 @@ func (q *Queries) FindUserEmail(ctx context.Context, email string) (User, error)
&i.LastLogin, &i.LastLogin,
&i.PhoneNumber, &i.PhoneNumber,
&i.ProfilePicture, &i.ProfilePicture,
&i.CreatedBy,
&i.EmailVerified,
&i.AvatarVerified,
&i.Verified,
) )
return i, err return i, err
} }
const findUserId = `-- name: FindUserId :one const findUserId = `-- name: FindUserId :one
SELECT id, email, full_name, password_hash, is_admin, created_at, updated_at, last_login, phone_number, profile_picture FROM users WHERE id = $1 LIMIT 1 SELECT id, email, full_name, password_hash, is_admin, created_at, updated_at, last_login, phone_number, profile_picture, created_by, email_verified, avatar_verified, verified FROM users WHERE id = $1 LIMIT 1
` `
func (q *Queries) FindUserId(ctx context.Context, id uuid.UUID) (User, error) { func (q *Queries) FindUserId(ctx context.Context, id uuid.UUID) (User, error) {
@ -87,24 +133,29 @@ func (q *Queries) FindUserId(ctx context.Context, id uuid.UUID) (User, error) {
&i.LastLogin, &i.LastLogin,
&i.PhoneNumber, &i.PhoneNumber,
&i.ProfilePicture, &i.ProfilePicture,
&i.CreatedBy,
&i.EmailVerified,
&i.AvatarVerified,
&i.Verified,
) )
return i, err return i, err
} }
const insertUser = `-- name: InsertUser :one const insertUser = `-- name: InsertUser :one
INSERT INTO users ( INSERT INTO users (
email, full_name, password_hash, is_admin email, full_name, password_hash, is_admin, created_by
) VALUES ( ) VALUES (
$1, $2, $3, $4 $1, $2, $3, $4, $5
) )
RETURNING id RETURNING id
` `
type InsertUserParams struct { type InsertUserParams struct {
Email string `json:"email"` Email string `json:"email"`
FullName string `json:"full_name"` FullName string `json:"full_name"`
PasswordHash string `json:"password_hash"` PasswordHash string `json:"password_hash"`
IsAdmin bool `json:"is_admin"` IsAdmin bool `json:"is_admin"`
CreatedBy *uuid.UUID `json:"created_by"`
} }
func (q *Queries) InsertUser(ctx context.Context, arg InsertUserParams) (uuid.UUID, error) { func (q *Queries) InsertUser(ctx context.Context, arg InsertUserParams) (uuid.UUID, error) {
@ -113,12 +164,24 @@ func (q *Queries) InsertUser(ctx context.Context, arg InsertUserParams) (uuid.UU
arg.FullName, arg.FullName,
arg.PasswordHash, arg.PasswordHash,
arg.IsAdmin, arg.IsAdmin,
arg.CreatedBy,
) )
var id uuid.UUID var id uuid.UUID
err := row.Scan(&id) err := row.Scan(&id)
return id, err return id, err
} }
const updateLastLogin = `-- name: UpdateLastLogin :exec
UPDATE users
SET last_login = NOW()
WHERE id = $1
`
func (q *Queries) UpdateLastLogin(ctx context.Context, id uuid.UUID) error {
_, err := q.db.Exec(ctx, updateLastLogin, id)
return err
}
const updateProfilePicture = `-- name: UpdateProfilePicture :exec const updateProfilePicture = `-- name: UpdateProfilePicture :exec
UPDATE users UPDATE users
SET profile_picture = $1 SET profile_picture = $1
@ -126,11 +189,44 @@ WHERE id = $2
` `
type UpdateProfilePictureParams struct { type UpdateProfilePictureParams struct {
ProfilePicture pgtype.Text `json:"profile_picture"` ProfilePicture *string `json:"profile_picture"`
ID uuid.UUID `json:"id"` ID uuid.UUID `json:"id"`
} }
func (q *Queries) UpdateProfilePicture(ctx context.Context, arg UpdateProfilePictureParams) error { func (q *Queries) UpdateProfilePicture(ctx context.Context, arg UpdateProfilePictureParams) error {
_, err := q.db.Exec(ctx, updateProfilePicture, arg.ProfilePicture, arg.ID) _, err := q.db.Exec(ctx, updateProfilePicture, arg.ProfilePicture, arg.ID)
return err return err
} }
const userVerifyAvatar = `-- name: UserVerifyAvatar :exec
UPDATE users
SET avatar_verified = true
WHERE id = $1
`
func (q *Queries) UserVerifyAvatar(ctx context.Context, id uuid.UUID) error {
_, err := q.db.Exec(ctx, userVerifyAvatar, id)
return err
}
const userVerifyComplete = `-- name: UserVerifyComplete :exec
UPDATE users
SET verified = true
WHERE id = $1
`
func (q *Queries) UserVerifyComplete(ctx context.Context, id uuid.UUID) error {
_, err := q.db.Exec(ctx, userVerifyComplete, id)
return err
}
const userVerifyEmail = `-- name: UserVerifyEmail :exec
UPDATE users
SET email_verified = true
WHERE id = $1
`
func (q *Queries) UserVerifyEmail(ctx context.Context, id uuid.UUID) error {
_, err := q.db.Exec(ctx, userVerifyEmail, id)
return err
}

View File

@ -0,0 +1,38 @@
package types
import (
"time"
"gitea.local/admin/hspguard/internal/repository"
"github.com/google/uuid"
)
type ApiServiceDTO struct {
ID uuid.UUID `json:"id"`
ClientID string `json:"client_id"`
Name string `json:"name"`
Description *string `json:"description"`
IconUrl *string `json:"icon_url"`
RedirectUris []string `json:"redirect_uris"`
Scopes []string `json:"scopes"`
GrantTypes []string `json:"grant_types"`
CreatedAt time.Time `json:"created_at"`
UpdatedAt time.Time `json:"updated_at"`
IsActive bool `json:"is_active"`
}
func NewApiServiceDTO(service repository.ApiService) ApiServiceDTO {
return ApiServiceDTO{
ID: service.ID,
ClientID: service.ClientID,
Name: service.Name,
Description: service.Description,
IconUrl: service.IconUrl,
RedirectUris: service.RedirectUris,
Scopes: service.Scopes,
GrantTypes: service.GrantTypes,
CreatedAt: service.CreatedAt,
UpdatedAt: service.UpdatedAt,
IsActive: service.IsActive,
}
}

View File

@ -8,13 +8,26 @@ type UserClaims struct {
jwt.RegisteredClaims jwt.RegisteredClaims
} }
type ApiClaims struct { type IdTokenClaims struct {
Email string `json:"email"` Email string `json:"email"`
EmailVerified bool `json:"email_verified"` EmailVerified bool `json:"email_verified"`
Name string `json:"name"` Name string `json:"name"`
Picture string `json:"picture"` Picture *string `json:"picture"`
Nonce string `json:"nonce"` Nonce *string `json:"nonce"`
Roles []string `json:"roles"` Roles []string `json:"roles"`
// TODO: add given_name, family_name, locale... // TODO: add given_name, family_name, locale...
jwt.RegisteredClaims jwt.RegisteredClaims
} }
type ApiClaims struct {
// FIXME: correct permissions
Permissions []string `json:"permissions"`
jwt.RegisteredClaims
// Subject = ClientID
}
type ApiRefreshClaims struct {
UserID string `json:"user_id"`
jwt.RegisteredClaims
// Subject = ClientID
}

12
internal/types/device.go Normal file
View File

@ -0,0 +1,12 @@
package types
type DeviceInfo struct {
DeviceType string `json:"device_type"`
OS string `json:"os"`
OSVersion string `json:"os_version"`
Browser string `json:"browser"`
BrowserVersion string `json:"browser_version"`
DeviceName string `json:"device_name"`
UserAgent string `json:"user_agent"`
Location string `json:"location"`
}

View File

@ -3,4 +3,4 @@ package types
type contextKey string type contextKey string
const UserIdKey contextKey = "userID" const UserIdKey contextKey = "userID"
const JTIKey contextKey = "jti"

29
internal/types/session.go Normal file
View File

@ -0,0 +1,29 @@
package types
import "gitea.local/admin/hspguard/internal/repository"
type ServiceSessionDTO struct {
User UserDTO `json:"user"`
ApiService ApiServiceDTO `json:"api_service"`
repository.ServiceSession
}
func NewServiceSessionDTO(row *repository.GetServiceSessionsRow) *ServiceSessionDTO {
return &ServiceSessionDTO{
User: NewUserDTO(&row.User),
ApiService: NewApiServiceDTO(row.ApiService),
ServiceSession: row.ServiceSession,
}
}
type UserSessionDTO struct {
User UserDTO `json:"user"`
repository.UserSession
}
func NewUserSessionDTO(row *repository.GetUserSessionsRow) *UserSessionDTO {
return &UserSessionDTO{
User: NewUserDTO(&row.User),
UserSession: row.UserSession,
}
}

21
internal/types/token.go Normal file
View File

@ -0,0 +1,21 @@
package types
import (
"time"
"github.com/google/uuid"
)
type SignedToken struct {
Token string
ExpiresAt time.Time
ID uuid.UUID
}
func NewSignedToken(token string, expiresAt time.Time, jti uuid.UUID) *SignedToken {
return &SignedToken{
Token: token,
ExpiresAt: expiresAt,
ID: jti,
}
}

40
internal/types/user.go Normal file
View File

@ -0,0 +1,40 @@
package types
import (
"time"
"gitea.local/admin/hspguard/internal/repository"
"github.com/google/uuid"
)
type UserDTO struct {
ID uuid.UUID `json:"id"`
Email string `json:"email"`
FullName string `json:"full_name"`
IsAdmin bool `json:"is_admin"`
CreatedAt *time.Time `json:"created_at"`
UpdatedAt *time.Time `json:"updated_at"`
LastLogin *time.Time `json:"last_login"`
PhoneNumber *string `json:"phone_number"`
ProfilePicture *string `json:"profile_picture"`
EmailVerified bool `json:"email_verified"`
AvatarVerified bool `json:"avatar_verified"`
Verified bool `json:"verified"`
}
func NewUserDTO(row *repository.User) UserDTO {
return UserDTO{
ID: row.ID,
Email: row.Email,
FullName: row.FullName,
IsAdmin: row.IsAdmin,
CreatedAt: row.CreatedAt,
UpdatedAt: row.UpdatedAt,
LastLogin: row.LastLogin,
PhoneNumber: row.PhoneNumber,
ProfilePicture: row.ProfilePicture,
EmailVerified: row.EmailVerified,
AvatarVerified: row.AvatarVerified,
Verified: row.Verified,
}
}

View File

@ -19,7 +19,6 @@ import (
"gitea.local/admin/hspguard/internal/web" "gitea.local/admin/hspguard/internal/web"
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
"github.com/google/uuid" "github.com/google/uuid"
"github.com/jackc/pgx/v5/pgtype"
"github.com/minio/minio-go/v7" "github.com/minio/minio-go/v7"
) )
@ -39,7 +38,7 @@ func NewUserHandler(repo *repository.Queries, minio *storage.FileStorage, cfg *c
func (h *UserHandler) RegisterRoutes(api chi.Router) { func (h *UserHandler) RegisterRoutes(api chi.Router) {
api.Group(func(protected chi.Router) { api.Group(func(protected chi.Router) {
authMiddleware := imiddleware.NewAuthMiddleware(h.cfg) authMiddleware := imiddleware.NewAuthMiddleware(h.cfg, h.repo)
protected.Use(authMiddleware.Runner) protected.Use(authMiddleware.Runner)
protected.Put("/avatar", h.uploadAvatar) protected.Put("/avatar", h.uploadAvatar)
@ -99,6 +98,8 @@ func (h *UserHandler) register(w http.ResponseWriter, r *http.Request) {
Id string `json:"id"` Id string `json:"id"`
} }
w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(Response{ if err := encoder.Encode(Response{
Id: id.String(), Id: id.String(),
}); err != nil { }); err != nil {
@ -165,30 +166,40 @@ func (h *UserHandler) uploadAvatar(w http.ResponseWriter, r *http.Request) {
ContentType: header.Header.Get("Content-Type"), ContentType: header.Header.Get("Content-Type"),
}) })
if err != nil { if err != nil {
log.Println("ERR: Failed to put object:", err)
web.Error(w, "failed to upload image", http.StatusInternalServerError) web.Error(w, "failed to upload image", http.StatusInternalServerError)
return return
} }
imgURI := fmt.Sprintf("%s/api/v1/avatar/%s", h.cfg.Uri, uploadInfo.Key)
if err := h.repo.UpdateProfilePicture(r.Context(), repository.UpdateProfilePictureParams{ if err := h.repo.UpdateProfilePicture(r.Context(), repository.UpdateProfilePictureParams{
ProfilePicture: pgtype.Text{ ProfilePicture: &imgURI,
String: uploadInfo.Key, ID: user.ID,
Valid: true,
},
ID: user.ID,
}); err != nil { }); err != nil {
web.Error(w, "failed to update profile picture", http.StatusInternalServerError) web.Error(w, "failed to update profile picture", http.StatusInternalServerError)
return return
} }
if !user.AvatarVerified {
if err := h.repo.UserVerifyAvatar(r.Context(), user.ID); err != nil {
log.Println("ERR: Failed to update avatar_verified:", err)
web.Error(w, "failed to verify avatar", http.StatusInternalServerError)
return
}
}
type Response struct { type Response struct {
AvatarID string `json:"url"` URL string `json:"url"`
} }
w.Header().Set("Content-Type", "application/json") w.Header().Set("Content-Type", "application/json")
w.WriteHeader(http.StatusOK) w.WriteHeader(http.StatusOK)
encoder := json.NewEncoder(w) encoder := json.NewEncoder(w)
if err := encoder.Encode(Response{AvatarID: uploadInfo.Key}); err != nil { w.Header().Set("Content-Type", "application/json")
if err := encoder.Encode(Response{URL: fmt.Sprintf("%s/avatar/%s", h.cfg.Uri, uploadInfo.Key)}); err != nil {
web.Error(w, "failed to write response", http.StatusInternalServerError) web.Error(w, "failed to write response", http.StatusInternalServerError)
} }
} }

View File

@ -6,7 +6,6 @@ import (
"encoding/base64" "encoding/base64"
"fmt" "fmt"
"gitea.local/admin/hspguard/internal/types"
"github.com/golang-jwt/jwt/v5" "github.com/golang-jwt/jwt/v5"
) )
@ -57,13 +56,12 @@ func SignJwtToken(claims jwt.Claims, key string) (string, error) {
return s, nil return s, nil
} }
func VerifyToken(token string, key string) (*jwt.Token, *types.UserClaims, error) { func VerifyToken(token string, key string, claims jwt.Claims) (*jwt.Token, error) {
publicKey, err := ParseBase64PublicKey(key) publicKey, err := ParseBase64PublicKey(key)
if err != nil { if err != nil {
return nil, nil, err return nil, err
} }
claims := &types.UserClaims{}
parsed, err := jwt.ParseWithClaims(token, claims, func(t *jwt.Token) (any, error) { parsed, err := jwt.ParseWithClaims(token, claims, func(t *jwt.Token) (any, error) {
if _, ok := t.Method.(*jwt.SigningMethodRSA); !ok { if _, ok := t.Method.(*jwt.SigningMethodRSA); !ok {
return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"]) return nil, fmt.Errorf("unexpected signing method: %v", t.Header["alg"])
@ -72,12 +70,12 @@ func VerifyToken(token string, key string) (*jwt.Token, *types.UserClaims, error
}) })
if err != nil { if err != nil {
return nil, nil, fmt.Errorf("invalid token: %w", err) return nil, fmt.Errorf("invalid token: %w", err)
} }
if !parsed.Valid { if !parsed.Valid {
return nil, nil, fmt.Errorf("token is not valid") return nil, fmt.Errorf("token is not valid")
} }
return parsed, claims, nil return parsed, nil
} }

46
internal/util/location.go Normal file
View File

@ -0,0 +1,46 @@
package util
import (
"encoding/json"
"log"
"net"
"net/http"
"strings"
)
type LocationResult struct {
Country string `json:"country"`
Region string `json:"regionName"`
City string `json:"city"`
}
func GetLocation(ip string) (LocationResult, error) {
var loc LocationResult
// Example using ipinfo.io free API
resp, err := http.Get("http://ip-api.com/json/" + ip + "?fields=25")
if err != nil {
return loc, err
}
defer resp.Body.Close()
json.NewDecoder(resp.Body).Decode(&loc)
return loc, nil
}
func GetClientIP(r *http.Request) string {
// This header will be set by ngrok to the original client IP
if xff := r.Header.Get("X-Forwarded-For"); xff != "" {
log.Printf("DEBUG: Getting IP from X-Forwarded-For: %s\n", xff)
// X-Forwarded-For: client, proxy1, proxy2, ...
ips := strings.Split(xff, ",")
if len(ips) > 0 {
return strings.TrimSpace(ips[0])
}
}
// Fallback to RemoteAddr (not the real client IP, but just in case)
host, _, err := net.SplitHostPort(r.RemoteAddr)
log.Printf("DEBUG: Falling to request remote addr: %s (%s)\n", host, r.RemoteAddr)
if err != nil {
return r.RemoteAddr
}
return host
}

View File

@ -11,3 +11,7 @@ func GetRequestUserId(ctx context.Context) (string, bool) {
return userId, ok return userId, ok
} }
func GetRequestJTI(ctx context.Context) (string, bool) {
jti, ok := ctx.Value(types.JTIKey).(string)
return jti, ok
}

39
internal/util/session.go Normal file
View File

@ -0,0 +1,39 @@
package util
import (
"encoding/json"
"fmt"
"log"
"gitea.local/admin/hspguard/internal/types"
"github.com/avct/uasurfer"
)
func BuildDeviceInfo(userAgent string, remoteAddr string) []byte {
var deviceInfo types.DeviceInfo
parsed := uasurfer.Parse(userAgent)
deviceInfo.Browser = parsed.Browser.Name.StringTrimPrefix()
deviceInfo.BrowserVersion = fmt.Sprintf("%d.%d.%d", parsed.Browser.Version.Major, parsed.Browser.Version.Minor, parsed.Browser.Version.Patch)
deviceInfo.DeviceName = fmt.Sprintf("%s %s", parsed.OS.Platform.StringTrimPrefix(), parsed.OS.Name.StringTrimPrefix())
deviceInfo.DeviceType = parsed.DeviceType.StringTrimPrefix()
deviceInfo.OS = parsed.OS.Platform.StringTrimPrefix()
deviceInfo.OSVersion = fmt.Sprintf("%d.%d.%d", parsed.OS.Version.Major, parsed.OS.Version.Minor, parsed.OS.Version.Patch)
deviceInfo.UserAgent = userAgent
if location, err := GetLocation(remoteAddr); err != nil {
log.Printf("WARN: Failed to get location from ip (%s): %v\n", remoteAddr, err)
} else {
log.Printf("DEBUG: Response from IP fetcher: %#v\n", location)
deviceInfo.Location = fmt.Sprintf("%s, %s, %s", location.Country, location.Region, location.City)
}
serialized, err := json.Marshal(deviceInfo)
if err != nil {
log.Printf("ERR: Failed to serialize device info: %v\n", err)
serialized = []byte{'{', '}'}
}
return serialized
}

View File

@ -0,0 +1,12 @@
-- +goose Up
-- +goose StatementBegin
ALTER TABLE users
ADD COLUMN created_by UUID REFERENCES users (id) ON DELETE SET NULL;
-- +goose StatementEnd
-- +goose Down
-- +goose StatementBegin
ALTER TABLE users
DROP COLUMN created_by;
-- +goose StatementEnd

View File

@ -0,0 +1,12 @@
-- +goose Up
-- +goose StatementBegin
ALTER TABLE users
ADD COLUMN email_verified BOOLEAN NOT NULL DEFAULT FALSE;
-- +goose StatementEnd
-- +goose Down
-- +goose StatementBegin
ALTER TABLE users
DROP COLUMN email_verified;
-- +goose StatementEnd

View File

@ -0,0 +1,12 @@
-- +goose Up
-- +goose StatementBegin
ALTER TABLE users
ADD COLUMN avatar_verified BOOLEAN NOT NULL DEFAULT FALSE;
-- +goose StatementEnd
-- +goose Down
-- +goose StatementBegin
ALTER TABLE users
DROP COLUMN avatar_verified;
-- +goose StatementEnd

View File

@ -0,0 +1,12 @@
-- +goose Up
-- +goose StatementBegin
ALTER TABLE users
ADD COLUMN verified BOOLEAN NOT NULL DEFAULT FALSE;
-- +goose StatementEnd
-- +goose Down
-- +goose StatementBegin
ALTER TABLE users
DROP COLUMN verified;
-- +goose StatementEnd

View File

@ -0,0 +1,12 @@
-- +goose Up
-- +goose StatementBegin
ALTER TABLE api_services
ADD COLUMN icon_url TEXT DEFAULT NULL;
-- +goose StatementEnd
-- +goose Down
-- +goose StatementBegin
ALTER TABLE api_services
DROP COLUMN icon_url;
-- +goose StatementEnd

View File

@ -0,0 +1,34 @@
-- +goose Up
-- +goose StatementBegin
CREATE TABLE user_sessions (
id UUID PRIMARY KEY DEFAULT gen_random_uuid (),
user_id UUID REFERENCES users (id) NOT NULL,
session_type VARCHAR(32) NOT NULL DEFAULT 'user', -- e.g. 'user', 'admin'
issued_at TIMESTAMP
WITH
TIME ZONE NOT NULL DEFAULT NOW (),
expires_at TIMESTAMP
WITH
TIME ZONE,
last_active TIMESTAMP
WITH
TIME ZONE,
ip_address VARCHAR(45), -- supports IPv4/IPv6
user_agent TEXT,
access_token_id UUID,
refresh_token_id UUID,
device_info JSONB, -- optional: structured info (browser, OS, etc.)
is_active BOOLEAN NOT NULL DEFAULT TRUE,
revoked_at TIMESTAMP
WITH
TIME ZONE
);
CREATE INDEX IF NOT EXISTS idx_user_sessions_user_id ON user_sessions (user_id);
-- +goose StatementEnd
-- +goose Down
-- +goose StatementBegin
DROP TABLE IF EXISTS user_sessions;
-- +goose StatementEnd

View File

@ -0,0 +1,38 @@
-- +goose Up
-- +goose StatementBegin
CREATE TABLE service_sessions (
id UUID PRIMARY KEY DEFAULT gen_random_uuid (),
service_id UUID REFERENCES api_services (id) NOT NULL,
client_id TEXT NOT NULL,
user_id UUID REFERENCES users (id), -- user on behalf of whom the service is acting, nullable for direct use with client creds
issued_at TIMESTAMP
WITH
TIME ZONE NOT NULL DEFAULT NOW (),
expires_at TIMESTAMP
WITH
TIME ZONE,
last_active TIMESTAMP
WITH
TIME ZONE,
ip_address VARCHAR(45),
user_agent TEXT,
access_token_id UUID,
refresh_token_id UUID,
is_active BOOLEAN NOT NULL DEFAULT TRUE,
revoked_at TIMESTAMP
WITH
TIME ZONE,
scope TEXT, -- what scopes/permissions this session was issued for
claims JSONB -- snapshot of claims at session start, optional
);
CREATE INDEX IF NOT EXISTS idx_service_sessions_client_id ON service_sessions (client_id);
CREATE INDEX IF NOT EXISTS idx_service_sessions_user_id ON service_sessions (user_id);
-- +goose StatementEnd
-- +goose Down
-- +goose StatementBegin
DROP TABLE IF EXISTS service_sessions;
-- +goose StatementEnd

View File

@ -38,6 +38,12 @@ SET is_active = false,
updated_at = NOW() updated_at = NOW()
WHERE client_id = $1; WHERE client_id = $1;
-- name: ActivateApiService :exec
UPDATE api_services
SET is_active = true,
updated_at = NOW()
WHERE client_id = $1;
-- name: UpdateClientSecret :exec -- name: UpdateClientSecret :exec
UPDATE api_services UPDATE api_services
SET client_secret = $2, SET client_secret = $2,

View File

@ -0,0 +1,69 @@
-- name: CreateServiceSession :one
INSERT INTO service_sessions (
service_id, client_id, user_id, issued_at, expires_at, last_active,
ip_address, user_agent, access_token_id, refresh_token_id,
is_active, scope, claims
) VALUES (
$1, $2, $3, NOW(), $4, $5,
$6, $7, $8, $9,
TRUE, $10, $11
)
RETURNING *;
-- name: ListActiveServiceSessionsByClient :many
SELECT * FROM service_sessions
WHERE client_id = $1
AND is_active = TRUE
ORDER BY issued_at DESC
LIMIT $1 OFFSET $2;
-- name: ListActiveServiceSessionsByUser :many
SELECT * FROM service_sessions
WHERE user_id = $1
AND is_active = TRUE
ORDER BY issued_at DESC
LIMIT $1 OFFSET $2;
-- name: GetServiceSessionByAccessJTI :one
SELECT * FROM service_sessions
WHERE access_token_id = $1
AND is_active = TRUE;
-- name: GetServiceSessionByRefreshJTI :one
SELECT * FROM service_sessions
WHERE refresh_token_id = $1;
-- name: RevokeServiceSession :exec
UPDATE service_sessions
SET is_active = FALSE,
revoked_at = NOW()
WHERE id = $1
AND is_active = TRUE;
-- name: UpdateServiceSessionLastActive :exec
UPDATE service_sessions
SET last_active = NOW()
WHERE id = $1
AND is_active = TRUE;
-- name: UpdateServiceSessionTokens :exec
UPDATE service_sessions
SET access_token_id = $2, refresh_token_id = $3, expires_at = $4
WHERE id = $1
AND is_active = TRUE;
-- name: ListAllServiceSessions :many
SELECT * FROM service_sessions
ORDER BY issued_at DESC
LIMIT $1 OFFSET $2;
-- name: GetServiceSessions :many
SELECT sqlc.embed(session), sqlc.embed(service), sqlc.embed(u)
FROM service_sessions AS session
JOIN api_services AS service ON service.id = session.service_id
JOIN users AS u ON u.id = session.user_id
ORDER BY session.issued_at DESC
LIMIT $1 OFFSET $2;
-- name: GetServiceSessionsCount :one
SELECT COUNT(*) FROM service_sessions;

60
queries/user_sessions.sql Normal file
View File

@ -0,0 +1,60 @@
-- name: CreateUserSession :one
INSERT INTO user_sessions (
user_id, session_type, issued_at, expires_at, last_active,
ip_address, user_agent, access_token_id, refresh_token_id,
device_info, is_active
) VALUES (
$1, $2, NOW(), $3, $4,
$5, $6, $7, $8,
$9, TRUE
)
RETURNING *;
-- name: ListActiveUserSessions :many
SELECT * FROM user_sessions
WHERE user_id = $1
AND is_active = TRUE
ORDER BY issued_at DESC;
-- name: GetUserSessionByAccessJTI :one
SELECT * FROM user_sessions
WHERE access_token_id = $1
AND is_active = TRUE;
-- name: GetUserSessionByRefreshJTI :one
SELECT * FROM user_sessions
WHERE refresh_token_id = $1;
-- name: RevokeUserSession :exec
UPDATE user_sessions
SET is_active = FALSE,
revoked_at = NOW()
WHERE id = $1
AND is_active = TRUE;
-- name: UpdateSessionLastActive :exec
UPDATE user_sessions
SET last_active = NOW()
WHERE id = $1
AND is_active = TRUE;
-- name: UpdateSessionTokens :exec
UPDATE user_sessions
SET access_token_id = $2, refresh_token_id = $3, expires_at = $4
WHERE id = $1
AND is_active = TRUE;
-- name: ListAllSessions :many
SELECT * FROM user_sessions
ORDER BY issued_at DESC
LIMIT $1 OFFSET $2;
-- name: GetUserSessions :many
SELECT sqlc.embed(session), sqlc.embed(u)
FROM user_sessions AS session
JOIN users AS u ON u.id = session.user_id
ORDER BY session.issued_at DESC
LIMIT $1 OFFSET $2;
-- name: GetUserSessionsCount :one
SELECT COUNT(*) FROM user_sessions;

View File

@ -1,11 +1,14 @@
-- name: FindAllUsers :many -- name: FindAllUsers :many
SELECT * FROM users; SELECT * FROM users;
-- name: FindAdminUsers :many
SELECT * FROM users WHERE created_by = $1;
-- name: InsertUser :one -- name: InsertUser :one
INSERT INTO users ( INSERT INTO users (
email, full_name, password_hash, is_admin email, full_name, password_hash, is_admin, created_by
) VALUES ( ) VALUES (
$1, $2, $3, $4 $1, $2, $3, $4, $5
) )
RETURNING id; RETURNING id;
@ -19,3 +22,23 @@ SELECT * FROM users WHERE id = $1 LIMIT 1;
UPDATE users UPDATE users
SET profile_picture = $1 SET profile_picture = $1
WHERE id = $2; WHERE id = $2;
-- name: UserVerifyEmail :exec
UPDATE users
SET email_verified = true
WHERE id = $1;
-- name: UserVerifyAvatar :exec
UPDATE users
SET avatar_verified = true
WHERE id = $1;
-- name: UserVerifyComplete :exec
UPDATE users
SET verified = true
WHERE id = $1;
-- name: UpdateLastLogin :exec
UPDATE users
SET last_login = NOW()
WHERE id = $1;

4
redis.conf Normal file
View File

@ -0,0 +1,4 @@
# Enable ACL
user default off
user guard on >guard allcommands allkeys

111
sqlc.yaml
View File

@ -1,4 +1,3 @@
version: "2" version: "2"
sql: sql:
- engine: "postgresql" - engine: "postgresql"
@ -14,8 +13,114 @@ sql:
- db_type: "uuid" - db_type: "uuid"
go_type: go_type:
import: "github.com/google/uuid" import: "github.com/google/uuid"
type: "UUID" type: UUID
- db_type: "timestamptz" - db_type: "uuid"
nullable: true
go_type:
import: "github.com/google/uuid"
type: UUID
pointer: true
# ───── bool ──────────────────────────────────────────
- db_type: "pg_catalog.bool" # or just "bool"
go_type: { type: "bool" }
- db_type: "bool" # or just "bool"
go_type: { type: "bool" }
- db_type: "pg_catalog.bool"
nullable: true
go_type:
type: "bool"
pointer: true # ⇒ *bool for NULLable columns
- db_type: "bool"
nullable: true
go_type:
type: "bool"
pointer: true # ⇒ *bool for NULLable columns
# ───── text ──────────────────────────────────────────
- db_type: "pg_catalog.text"
go_type: { type: "string" }
- db_type: "text"
go_type: { type: "string" }
- db_type: "pg_catalog.text"
nullable: true
go_type:
type: "string"
pointer: true
- db_type: "text"
nullable: true
go_type:
type: "string"
pointer: true
- db_type: "pg_catalog.varchar"
go_type: { type: "string" }
- db_type: "varchar"
go_type: { type: "string" }
- db_type: "pg_catalog.varchar"
nullable: true
go_type:
type: "string"
pointer: true
- db_type: "varchar"
nullable: true
go_type:
type: "string"
pointer: true
# ───── timestamp (WITHOUT TZ) ────────────────────────
- db_type: "pg_catalog.timestamp" # or "timestamp"
go_type: go_type:
import: "time" import: "time"
type: "Time" type: "Time"
- db_type: "timestamp" # or "timestamp"
go_type:
import: "time"
type: "Time"
- db_type: "pg_catalog.timestamp"
nullable: true
go_type:
import: "time"
type: "Time"
pointer: true
- db_type: "timestamp"
nullable: true
go_type:
import: "time"
type: "Time"
pointer: true
# ───── timestamptz (WITH TZ) ─────────────────────────
- db_type: "pg_catalog.timestamptz" # or "timestamptz"
go_type:
import: "time"
type: "Time"
- db_type: "timestamptz" # or "timestamptz"
go_type:
import: "time"
type: "Time"
- db_type: "pg_catalog.timestamptz"
nullable: true
go_type:
import: "time"
type: "Time"
pointer: true
- db_type: "timestamptz"
nullable: true
go_type:
import: "time"
type: "Time"
pointer: true

349
web/package-lock.json generated
View File

@ -8,11 +8,11 @@
"name": "web", "name": "web",
"version": "0.0.0", "version": "0.0.0",
"dependencies": { "dependencies": {
"@emotion/react": "^11.14.0",
"@tailwindcss/vite": "^4.1.7", "@tailwindcss/vite": "^4.1.7",
"axios": "^1.9.0", "axios": "^1.9.0",
"idb": "^8.0.3", "idb": "^8.0.3",
"lucide-react": "^0.511.0", "lucide-react": "^0.511.0",
"moment": "^2.30.1",
"next-themes": "^0.4.6", "next-themes": "^0.4.6",
"react": "^19.1.0", "react": "^19.1.0",
"react-dom": "^19.1.0", "react-dom": "^19.1.0",
@ -58,6 +58,7 @@
"version": "7.27.1", "version": "7.27.1",
"resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.27.1.tgz", "resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.27.1.tgz",
"integrity": "sha512-cjQ7ZlQ0Mv3b47hABuTevyTuYN4i+loJKGeV9flcCgIK37cCXRh+L1bd3iBHlynerhQ7BhCkn2BPbQUL+rGqFg==", "integrity": "sha512-cjQ7ZlQ0Mv3b47hABuTevyTuYN4i+loJKGeV9flcCgIK37cCXRh+L1bd3iBHlynerhQ7BhCkn2BPbQUL+rGqFg==",
"dev": true,
"license": "MIT", "license": "MIT",
"dependencies": { "dependencies": {
"@babel/helper-validator-identifier": "^7.27.1", "@babel/helper-validator-identifier": "^7.27.1",
@ -113,6 +114,7 @@
"version": "7.27.1", "version": "7.27.1",
"resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.27.1.tgz", "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.27.1.tgz",
"integrity": "sha512-UnJfnIpc/+JO0/+KRVQNGU+y5taA5vCbwN8+azkX6beii/ZF+enZJSOKo11ZSzGJjlNfJHfQtmQT8H+9TXPG2w==", "integrity": "sha512-UnJfnIpc/+JO0/+KRVQNGU+y5taA5vCbwN8+azkX6beii/ZF+enZJSOKo11ZSzGJjlNfJHfQtmQT8H+9TXPG2w==",
"dev": true,
"license": "MIT", "license": "MIT",
"dependencies": { "dependencies": {
"@babel/parser": "^7.27.1", "@babel/parser": "^7.27.1",
@ -146,6 +148,7 @@
"version": "7.27.1", "version": "7.27.1",
"resolved": "https://registry.npmjs.org/@babel/helper-module-imports/-/helper-module-imports-7.27.1.tgz", "resolved": "https://registry.npmjs.org/@babel/helper-module-imports/-/helper-module-imports-7.27.1.tgz",
"integrity": "sha512-0gSFWUPNXNopqtIPQvlD5WgXYI5GY2kP2cCvoT8kczjbfcfuIljTbcWrulD1CIPIX2gt1wghbDy08yE1p+/r3w==", "integrity": "sha512-0gSFWUPNXNopqtIPQvlD5WgXYI5GY2kP2cCvoT8kczjbfcfuIljTbcWrulD1CIPIX2gt1wghbDy08yE1p+/r3w==",
"dev": true,
"license": "MIT", "license": "MIT",
"dependencies": { "dependencies": {
"@babel/traverse": "^7.27.1", "@babel/traverse": "^7.27.1",
@ -187,6 +190,7 @@
"version": "7.27.1", "version": "7.27.1",
"resolved": "https://registry.npmjs.org/@babel/helper-string-parser/-/helper-string-parser-7.27.1.tgz", "resolved": "https://registry.npmjs.org/@babel/helper-string-parser/-/helper-string-parser-7.27.1.tgz",
"integrity": "sha512-qMlSxKbpRlAridDExk92nSobyDdpPijUq2DW6oDnUqd0iOGxmQjyqhMIihI9+zv4LPyZdRje2cavWPbCbWm3eA==", "integrity": "sha512-qMlSxKbpRlAridDExk92nSobyDdpPijUq2DW6oDnUqd0iOGxmQjyqhMIihI9+zv4LPyZdRje2cavWPbCbWm3eA==",
"dev": true,
"license": "MIT", "license": "MIT",
"engines": { "engines": {
"node": ">=6.9.0" "node": ">=6.9.0"
@ -196,6 +200,7 @@
"version": "7.27.1", "version": "7.27.1",
"resolved": "https://registry.npmjs.org/@babel/helper-validator-identifier/-/helper-validator-identifier-7.27.1.tgz", "resolved": "https://registry.npmjs.org/@babel/helper-validator-identifier/-/helper-validator-identifier-7.27.1.tgz",
"integrity": "sha512-D2hP9eA+Sqx1kBZgzxZh0y1trbuU+JoDkiEwqhQ36nodYqJwyEIhPSdMNd7lOm/4io72luTPWH20Yda0xOuUow==", "integrity": "sha512-D2hP9eA+Sqx1kBZgzxZh0y1trbuU+JoDkiEwqhQ36nodYqJwyEIhPSdMNd7lOm/4io72luTPWH20Yda0xOuUow==",
"dev": true,
"license": "MIT", "license": "MIT",
"engines": { "engines": {
"node": ">=6.9.0" "node": ">=6.9.0"
@ -229,6 +234,7 @@
"version": "7.27.2", "version": "7.27.2",
"resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.27.2.tgz", "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.27.2.tgz",
"integrity": "sha512-QYLs8299NA7WM/bZAdp+CviYYkVoYXlDW2rzliy3chxd1PQjej7JORuMJDJXJUb9g0TT+B99EwaVLKmX+sPXWw==", "integrity": "sha512-QYLs8299NA7WM/bZAdp+CviYYkVoYXlDW2rzliy3chxd1PQjej7JORuMJDJXJUb9g0TT+B99EwaVLKmX+sPXWw==",
"dev": true,
"license": "MIT", "license": "MIT",
"dependencies": { "dependencies": {
"@babel/types": "^7.27.1" "@babel/types": "^7.27.1"
@ -272,19 +278,11 @@
"@babel/core": "^7.0.0-0" "@babel/core": "^7.0.0-0"
} }
}, },
"node_modules/@babel/runtime": {
"version": "7.27.1",
"resolved": "https://registry.npmjs.org/@babel/runtime/-/runtime-7.27.1.tgz",
"integrity": "sha512-1x3D2xEk2fRo3PAhwQwu5UubzgiVWSXTBfWpVd2Mx2AzRqJuDJCsgaDVZ7HB5iGzDW1Hl1sWN2mFyKjmR9uAog==",
"license": "MIT",
"engines": {
"node": ">=6.9.0"
}
},
"node_modules/@babel/template": { "node_modules/@babel/template": {
"version": "7.27.2", "version": "7.27.2",
"resolved": "https://registry.npmjs.org/@babel/template/-/template-7.27.2.tgz", "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.27.2.tgz",
"integrity": "sha512-LPDZ85aEJyYSd18/DkjNh4/y1ntkE5KwUHWTiqgRxruuZL2F1yuHligVHLvcHY2vMHXttKFpJn6LwfI7cw7ODw==", "integrity": "sha512-LPDZ85aEJyYSd18/DkjNh4/y1ntkE5KwUHWTiqgRxruuZL2F1yuHligVHLvcHY2vMHXttKFpJn6LwfI7cw7ODw==",
"dev": true,
"license": "MIT", "license": "MIT",
"dependencies": { "dependencies": {
"@babel/code-frame": "^7.27.1", "@babel/code-frame": "^7.27.1",
@ -299,6 +297,7 @@
"version": "7.27.1", "version": "7.27.1",
"resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.27.1.tgz", "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.27.1.tgz",
"integrity": "sha512-ZCYtZciz1IWJB4U61UPu4KEaqyfj+r5T1Q5mqPo+IBpcG9kHv30Z0aD8LXPgC1trYa6rK0orRyAhqUgk4MjmEg==", "integrity": "sha512-ZCYtZciz1IWJB4U61UPu4KEaqyfj+r5T1Q5mqPo+IBpcG9kHv30Z0aD8LXPgC1trYa6rK0orRyAhqUgk4MjmEg==",
"dev": true,
"license": "MIT", "license": "MIT",
"dependencies": { "dependencies": {
"@babel/code-frame": "^7.27.1", "@babel/code-frame": "^7.27.1",
@ -317,6 +316,7 @@
"version": "11.12.0", "version": "11.12.0",
"resolved": "https://registry.npmjs.org/globals/-/globals-11.12.0.tgz", "resolved": "https://registry.npmjs.org/globals/-/globals-11.12.0.tgz",
"integrity": "sha512-WOBp/EEGUiIsJSp7wcv/y6MO+lV9UoncWqxuFfm8eBwzWNgyfBd6Gz+IeKQ9jCmyhoH99g15M3T+QaVHFjizVA==", "integrity": "sha512-WOBp/EEGUiIsJSp7wcv/y6MO+lV9UoncWqxuFfm8eBwzWNgyfBd6Gz+IeKQ9jCmyhoH99g15M3T+QaVHFjizVA==",
"dev": true,
"license": "MIT", "license": "MIT",
"engines": { "engines": {
"node": ">=4" "node": ">=4"
@ -326,6 +326,7 @@
"version": "7.27.1", "version": "7.27.1",
"resolved": "https://registry.npmjs.org/@babel/types/-/types-7.27.1.tgz", "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.27.1.tgz",
"integrity": "sha512-+EzkxvLNfiUeKMgy/3luqfsCWFRXLb7U6wNQTk60tovuckwB15B191tJWvpp4HjiQWdJkCxO3Wbvc6jlk3Xb2Q==", "integrity": "sha512-+EzkxvLNfiUeKMgy/3luqfsCWFRXLb7U6wNQTk60tovuckwB15B191tJWvpp4HjiQWdJkCxO3Wbvc6jlk3Xb2Q==",
"dev": true,
"license": "MIT", "license": "MIT",
"dependencies": { "dependencies": {
"@babel/helper-string-parser": "^7.27.1", "@babel/helper-string-parser": "^7.27.1",
@ -335,126 +336,6 @@
"node": ">=6.9.0" "node": ">=6.9.0"
} }
}, },
"node_modules/@emotion/babel-plugin": {
"version": "11.13.5",
"resolved": "https://registry.npmjs.org/@emotion/babel-plugin/-/babel-plugin-11.13.5.tgz",
"integrity": "sha512-pxHCpT2ex+0q+HH91/zsdHkw/lXd468DIN2zvfvLtPKLLMo6gQj7oLObq8PhkrxOZb/gGCq03S3Z7PDhS8pduQ==",
"license": "MIT",
"dependencies": {
"@babel/helper-module-imports": "^7.16.7",
"@babel/runtime": "^7.18.3",
"@emotion/hash": "^0.9.2",
"@emotion/memoize": "^0.9.0",
"@emotion/serialize": "^1.3.3",
"babel-plugin-macros": "^3.1.0",
"convert-source-map": "^1.5.0",
"escape-string-regexp": "^4.0.0",
"find-root": "^1.1.0",
"source-map": "^0.5.7",
"stylis": "4.2.0"
}
},
"node_modules/@emotion/babel-plugin/node_modules/convert-source-map": {
"version": "1.9.0",
"resolved": "https://registry.npmjs.org/convert-source-map/-/convert-source-map-1.9.0.tgz",
"integrity": "sha512-ASFBup0Mz1uyiIjANan1jzLQami9z1PoYSZCiiYW2FczPbenXc45FZdBZLzOT+r6+iciuEModtmCti+hjaAk0A==",
"license": "MIT"
},
"node_modules/@emotion/cache": {
"version": "11.14.0",
"resolved": "https://registry.npmjs.org/@emotion/cache/-/cache-11.14.0.tgz",
"integrity": "sha512-L/B1lc/TViYk4DcpGxtAVbx0ZyiKM5ktoIyafGkH6zg/tj+mA+NE//aPYKG0k8kCHSHVJrpLpcAlOBEXQ3SavA==",
"license": "MIT",
"dependencies": {
"@emotion/memoize": "^0.9.0",
"@emotion/sheet": "^1.4.0",
"@emotion/utils": "^1.4.2",
"@emotion/weak-memoize": "^0.4.0",
"stylis": "4.2.0"
}
},
"node_modules/@emotion/hash": {
"version": "0.9.2",
"resolved": "https://registry.npmjs.org/@emotion/hash/-/hash-0.9.2.tgz",
"integrity": "sha512-MyqliTZGuOm3+5ZRSaaBGP3USLw6+EGykkwZns2EPC5g8jJ4z9OrdZY9apkl3+UP9+sdz76YYkwCKP5gh8iY3g==",
"license": "MIT"
},
"node_modules/@emotion/memoize": {
"version": "0.9.0",
"resolved": "https://registry.npmjs.org/@emotion/memoize/-/memoize-0.9.0.tgz",
"integrity": "sha512-30FAj7/EoJ5mwVPOWhAyCX+FPfMDrVecJAM+Iw9NRoSl4BBAQeqj4cApHHUXOVvIPgLVDsCFoz/hGD+5QQD1GQ==",
"license": "MIT"
},
"node_modules/@emotion/react": {
"version": "11.14.0",
"resolved": "https://registry.npmjs.org/@emotion/react/-/react-11.14.0.tgz",
"integrity": "sha512-O000MLDBDdk/EohJPFUqvnp4qnHeYkVP5B0xEG0D/L7cOKP9kefu2DXn8dj74cQfsEzUqh+sr1RzFqiL1o+PpA==",
"license": "MIT",
"dependencies": {
"@babel/runtime": "^7.18.3",
"@emotion/babel-plugin": "^11.13.5",
"@emotion/cache": "^11.14.0",
"@emotion/serialize": "^1.3.3",
"@emotion/use-insertion-effect-with-fallbacks": "^1.2.0",
"@emotion/utils": "^1.4.2",
"@emotion/weak-memoize": "^0.4.0",
"hoist-non-react-statics": "^3.3.1"
},
"peerDependencies": {
"react": ">=16.8.0"
},
"peerDependenciesMeta": {
"@types/react": {
"optional": true
}
}
},
"node_modules/@emotion/serialize": {
"version": "1.3.3",
"resolved": "https://registry.npmjs.org/@emotion/serialize/-/serialize-1.3.3.tgz",
"integrity": "sha512-EISGqt7sSNWHGI76hC7x1CksiXPahbxEOrC5RjmFRJTqLyEK9/9hZvBbiYn70dw4wuwMKiEMCUlR6ZXTSWQqxA==",
"license": "MIT",
"dependencies": {
"@emotion/hash": "^0.9.2",
"@emotion/memoize": "^0.9.0",
"@emotion/unitless": "^0.10.0",
"@emotion/utils": "^1.4.2",
"csstype": "^3.0.2"
}
},
"node_modules/@emotion/sheet": {
"version": "1.4.0",
"resolved": "https://registry.npmjs.org/@emotion/sheet/-/sheet-1.4.0.tgz",
"integrity": "sha512-fTBW9/8r2w3dXWYM4HCB1Rdp8NLibOw2+XELH5m5+AkWiL/KqYX6dc0kKYlaYyKjrQ6ds33MCdMPEwgs2z1rqg==",
"license": "MIT"
},
"node_modules/@emotion/unitless": {
"version": "0.10.0",
"resolved": "https://registry.npmjs.org/@emotion/unitless/-/unitless-0.10.0.tgz",
"integrity": "sha512-dFoMUuQA20zvtVTuxZww6OHoJYgrzfKM1t52mVySDJnMSEa08ruEvdYQbhvyu6soU+NeLVd3yKfTfT0NeV6qGg==",
"license": "MIT"
},
"node_modules/@emotion/use-insertion-effect-with-fallbacks": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/@emotion/use-insertion-effect-with-fallbacks/-/use-insertion-effect-with-fallbacks-1.2.0.tgz",
"integrity": "sha512-yJMtVdH59sxi/aVJBpk9FQq+OR8ll5GT8oWd57UpeaKEVGab41JWaCFA7FRLoMLloOZF/c/wsPoe+bfGmRKgDg==",
"license": "MIT",
"peerDependencies": {
"react": ">=16.8.0"
}
},
"node_modules/@emotion/utils": {
"version": "1.4.2",
"resolved": "https://registry.npmjs.org/@emotion/utils/-/utils-1.4.2.tgz",
"integrity": "sha512-3vLclRofFziIa3J2wDh9jjbkUz9qk5Vi3IZ/FSTKViB0k+ef0fPV7dYrUIugbgupYDx7v9ud/SjrtEP8Y4xLoA==",
"license": "MIT"
},
"node_modules/@emotion/weak-memoize": {
"version": "0.4.0",
"resolved": "https://registry.npmjs.org/@emotion/weak-memoize/-/weak-memoize-0.4.0.tgz",
"integrity": "sha512-snKqtPW01tN0ui7yu9rGv69aJXr/a/Ywvl11sUjNtEcRc+ng/mQriFL0wLXMef74iHa/EkftbDzU9F8iFbH+zg==",
"license": "MIT"
},
"node_modules/@esbuild/aix-ppc64": { "node_modules/@esbuild/aix-ppc64": {
"version": "0.25.4", "version": "0.25.4",
"resolved": "https://registry.npmjs.org/@esbuild/aix-ppc64/-/aix-ppc64-0.25.4.tgz", "resolved": "https://registry.npmjs.org/@esbuild/aix-ppc64/-/aix-ppc64-0.25.4.tgz",
@ -2068,12 +1949,6 @@
"undici-types": "~6.21.0" "undici-types": "~6.21.0"
} }
}, },
"node_modules/@types/parse-json": {
"version": "4.0.2",
"resolved": "https://registry.npmjs.org/@types/parse-json/-/parse-json-4.0.2.tgz",
"integrity": "sha512-dISoDXWWQwUquiKsyZ4Ng+HX2KsPL7LyHKHQwgGFEA3IaKac4Obd+h2a/a6waisAoepJlBcx9paWqjA8/HVjCw==",
"license": "MIT"
},
"node_modules/@types/react": { "node_modules/@types/react": {
"version": "19.1.4", "version": "19.1.4",
"resolved": "https://registry.npmjs.org/@types/react/-/react-19.1.4.tgz", "resolved": "https://registry.npmjs.org/@types/react/-/react-19.1.4.tgz",
@ -2423,21 +2298,6 @@
"proxy-from-env": "^1.1.0" "proxy-from-env": "^1.1.0"
} }
}, },
"node_modules/babel-plugin-macros": {
"version": "3.1.0",
"resolved": "https://registry.npmjs.org/babel-plugin-macros/-/babel-plugin-macros-3.1.0.tgz",
"integrity": "sha512-Cg7TFGpIr01vOQNODXOOaGz2NpCU5gl8x1qJFbb6hbZxR7XrcE2vtbAsTAbJ7/xwJtUuJEw8K8Zr/AE0LHlesg==",
"license": "MIT",
"dependencies": {
"@babel/runtime": "^7.12.5",
"cosmiconfig": "^7.0.0",
"resolve": "^1.19.0"
},
"engines": {
"node": ">=10",
"npm": ">=6"
}
},
"node_modules/balanced-match": { "node_modules/balanced-match": {
"version": "1.0.2", "version": "1.0.2",
"resolved": "https://registry.npmjs.org/balanced-match/-/balanced-match-1.0.2.tgz", "resolved": "https://registry.npmjs.org/balanced-match/-/balanced-match-1.0.2.tgz",
@ -2519,6 +2379,7 @@
"version": "3.1.0", "version": "3.1.0",
"resolved": "https://registry.npmjs.org/callsites/-/callsites-3.1.0.tgz", "resolved": "https://registry.npmjs.org/callsites/-/callsites-3.1.0.tgz",
"integrity": "sha512-P8BjAsXvZS+VIDUI11hHCQEv74YT67YUi5JJFNWIqL235sBmjX4+qx9Muvls5ivyNENctx46xQLQ3aTuE7ssaQ==", "integrity": "sha512-P8BjAsXvZS+VIDUI11hHCQEv74YT67YUi5JJFNWIqL235sBmjX4+qx9Muvls5ivyNENctx46xQLQ3aTuE7ssaQ==",
"dev": true,
"license": "MIT", "license": "MIT",
"engines": { "engines": {
"node": ">=6" "node": ">=6"
@ -2642,31 +2503,6 @@
"node": ">=18" "node": ">=18"
} }
}, },
"node_modules/cosmiconfig": {
"version": "7.1.0",
"resolved": "https://registry.npmjs.org/cosmiconfig/-/cosmiconfig-7.1.0.tgz",
"integrity": "sha512-AdmX6xUzdNASswsFtmwSt7Vj8po9IuqXm0UXz7QKPuEUmPB4XyjGfaAr2PSuELMwkRMVH1EpIkX5bTZGRB3eCA==",
"license": "MIT",
"dependencies": {
"@types/parse-json": "^4.0.0",
"import-fresh": "^3.2.1",
"parse-json": "^5.0.0",
"path-type": "^4.0.0",
"yaml": "^1.10.0"
},
"engines": {
"node": ">=10"
}
},
"node_modules/cosmiconfig/node_modules/yaml": {
"version": "1.10.2",
"resolved": "https://registry.npmjs.org/yaml/-/yaml-1.10.2.tgz",
"integrity": "sha512-r3vXyErRCYJ7wg28yvBY5VSoAF8ZvlcW9/BwUzEtUsjvX/DKs24dIkuwjtuprwJJHsbyUbLApepYTR1BN4uHrg==",
"license": "ISC",
"engines": {
"node": ">= 6"
}
},
"node_modules/cross-spawn": { "node_modules/cross-spawn": {
"version": "7.0.6", "version": "7.0.6",
"resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-7.0.6.tgz", "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-7.0.6.tgz",
@ -2686,12 +2522,14 @@
"version": "3.1.3", "version": "3.1.3",
"resolved": "https://registry.npmjs.org/csstype/-/csstype-3.1.3.tgz", "resolved": "https://registry.npmjs.org/csstype/-/csstype-3.1.3.tgz",
"integrity": "sha512-M1uQkMl8rQK/szD0LNhtqxIPLpimGm8sOBwU7lLnCpSbTyY3yeU1Vc7l4KT5zT4s/yOxHH5O7tIuuLOCnLADRw==", "integrity": "sha512-M1uQkMl8rQK/szD0LNhtqxIPLpimGm8sOBwU7lLnCpSbTyY3yeU1Vc7l4KT5zT4s/yOxHH5O7tIuuLOCnLADRw==",
"devOptional": true,
"license": "MIT" "license": "MIT"
}, },
"node_modules/debug": { "node_modules/debug": {
"version": "4.4.1", "version": "4.4.1",
"resolved": "https://registry.npmjs.org/debug/-/debug-4.4.1.tgz", "resolved": "https://registry.npmjs.org/debug/-/debug-4.4.1.tgz",
"integrity": "sha512-KcKCqiftBJcZr++7ykoDIEwSa3XWowTfNPo92BYxjXiyYEVrUQh2aLyhxBCwww+heortUFxEJYcRzosstTEBYQ==", "integrity": "sha512-KcKCqiftBJcZr++7ykoDIEwSa3XWowTfNPo92BYxjXiyYEVrUQh2aLyhxBCwww+heortUFxEJYcRzosstTEBYQ==",
"dev": true,
"license": "MIT", "license": "MIT",
"dependencies": { "dependencies": {
"ms": "^2.1.3" "ms": "^2.1.3"
@ -2768,15 +2606,6 @@
"node": ">=10.13.0" "node": ">=10.13.0"
} }
}, },
"node_modules/error-ex": {
"version": "1.3.2",
"resolved": "https://registry.npmjs.org/error-ex/-/error-ex-1.3.2.tgz",
"integrity": "sha512-7dFHNmqeFSEt2ZBsCriorKnn3Z2pj+fd9kmI6QoWw4//DL+icEBfc0U7qJCisqrTsKTjw4fNFy2pW9OqStD84g==",
"license": "MIT",
"dependencies": {
"is-arrayish": "^0.2.1"
}
},
"node_modules/es-define-property": { "node_modules/es-define-property": {
"version": "1.0.1", "version": "1.0.1",
"resolved": "https://registry.npmjs.org/es-define-property/-/es-define-property-1.0.1.tgz", "resolved": "https://registry.npmjs.org/es-define-property/-/es-define-property-1.0.1.tgz",
@ -2876,6 +2705,7 @@
"version": "4.0.0", "version": "4.0.0",
"resolved": "https://registry.npmjs.org/escape-string-regexp/-/escape-string-regexp-4.0.0.tgz", "resolved": "https://registry.npmjs.org/escape-string-regexp/-/escape-string-regexp-4.0.0.tgz",
"integrity": "sha512-TtpcNJ3XAzx3Gq8sWRzJaVajRs0uVxA2YAkdb1jm2YkPz4G6egUFAyA3n5vtEIZefPk5Wa4UXbKuS5fKkJWdgA==", "integrity": "sha512-TtpcNJ3XAzx3Gq8sWRzJaVajRs0uVxA2YAkdb1jm2YkPz4G6egUFAyA3n5vtEIZefPk5Wa4UXbKuS5fKkJWdgA==",
"dev": true,
"license": "MIT", "license": "MIT",
"engines": { "engines": {
"node": ">=10" "node": ">=10"
@ -3149,12 +2979,6 @@
"node": ">=8" "node": ">=8"
} }
}, },
"node_modules/find-root": {
"version": "1.1.0",
"resolved": "https://registry.npmjs.org/find-root/-/find-root-1.1.0.tgz",
"integrity": "sha512-NKfW6bec6GfKc0SGx1e07QZY9PE99u0Bft/0rzSD5k3sO/vwkVUpDUKVm5Gpp5Ue3YfShPFTX2070tDs5kB9Ng==",
"license": "MIT"
},
"node_modules/find-up": { "node_modules/find-up": {
"version": "5.0.0", "version": "5.0.0",
"resolved": "https://registry.npmjs.org/find-up/-/find-up-5.0.0.tgz", "resolved": "https://registry.npmjs.org/find-up/-/find-up-5.0.0.tgz",
@ -3398,15 +3222,6 @@
"node": ">= 0.4" "node": ">= 0.4"
} }
}, },
"node_modules/hoist-non-react-statics": {
"version": "3.3.2",
"resolved": "https://registry.npmjs.org/hoist-non-react-statics/-/hoist-non-react-statics-3.3.2.tgz",
"integrity": "sha512-/gGivxi8JPKWNm/W0jSmzcMPpfpPLc3dY/6GxhX2hQ9iGj3aDfklV4ET7NjKpSinLpJ5vafa9iiGIEZg10SfBw==",
"license": "BSD-3-Clause",
"dependencies": {
"react-is": "^16.7.0"
}
},
"node_modules/idb": { "node_modules/idb": {
"version": "8.0.3", "version": "8.0.3",
"resolved": "https://registry.npmjs.org/idb/-/idb-8.0.3.tgz", "resolved": "https://registry.npmjs.org/idb/-/idb-8.0.3.tgz",
@ -3434,6 +3249,7 @@
"version": "3.3.1", "version": "3.3.1",
"resolved": "https://registry.npmjs.org/import-fresh/-/import-fresh-3.3.1.tgz", "resolved": "https://registry.npmjs.org/import-fresh/-/import-fresh-3.3.1.tgz",
"integrity": "sha512-TR3KfrTZTYLPB6jUjfx6MF9WcWrHL9su5TObK4ZkYgBdWKPOFoSoQIdEuTuR82pmtxH2spWG9h6etwfr1pLBqQ==", "integrity": "sha512-TR3KfrTZTYLPB6jUjfx6MF9WcWrHL9su5TObK4ZkYgBdWKPOFoSoQIdEuTuR82pmtxH2spWG9h6etwfr1pLBqQ==",
"dev": true,
"license": "MIT", "license": "MIT",
"dependencies": { "dependencies": {
"parent-module": "^1.0.0", "parent-module": "^1.0.0",
@ -3463,27 +3279,6 @@
"dev": true, "dev": true,
"license": "ISC" "license": "ISC"
}, },
"node_modules/is-arrayish": {
"version": "0.2.1",
"resolved": "https://registry.npmjs.org/is-arrayish/-/is-arrayish-0.2.1.tgz",
"integrity": "sha512-zz06S8t0ozoDXMG+ube26zeCTNXcKIPJZJi8hBrF4idCLms4CG9QtK7qBl1boi5ODzFpjswb5JPmHCbMpjaYzg==",
"license": "MIT"
},
"node_modules/is-core-module": {
"version": "2.16.1",
"resolved": "https://registry.npmjs.org/is-core-module/-/is-core-module-2.16.1.tgz",
"integrity": "sha512-UfoeMA6fIJ8wTYFEUjelnaGI67v6+N7qXJEvQuIGa99l4xsCruSYOVSQ0uPANn4dAzm8lkYPaKLrrijLq7x23w==",
"license": "MIT",
"dependencies": {
"hasown": "^2.0.2"
},
"engines": {
"node": ">= 0.4"
},
"funding": {
"url": "https://github.com/sponsors/ljharb"
}
},
"node_modules/is-extglob": { "node_modules/is-extglob": {
"version": "2.1.1", "version": "2.1.1",
"resolved": "https://registry.npmjs.org/is-extglob/-/is-extglob-2.1.1.tgz", "resolved": "https://registry.npmjs.org/is-extglob/-/is-extglob-2.1.1.tgz",
@ -3537,6 +3332,7 @@
"version": "4.0.0", "version": "4.0.0",
"resolved": "https://registry.npmjs.org/js-tokens/-/js-tokens-4.0.0.tgz", "resolved": "https://registry.npmjs.org/js-tokens/-/js-tokens-4.0.0.tgz",
"integrity": "sha512-RdJUflcE3cUzKiMqQgsCu06FPu9UdIJO0beYbPhHN4k6apgJtifcoCtT9bcxOpYBtpD2kCM6Sbzg4CausW/PKQ==", "integrity": "sha512-RdJUflcE3cUzKiMqQgsCu06FPu9UdIJO0beYbPhHN4k6apgJtifcoCtT9bcxOpYBtpD2kCM6Sbzg4CausW/PKQ==",
"dev": true,
"license": "MIT" "license": "MIT"
}, },
"node_modules/js-yaml": { "node_modules/js-yaml": {
@ -3556,6 +3352,7 @@
"version": "3.1.0", "version": "3.1.0",
"resolved": "https://registry.npmjs.org/jsesc/-/jsesc-3.1.0.tgz", "resolved": "https://registry.npmjs.org/jsesc/-/jsesc-3.1.0.tgz",
"integrity": "sha512-/sM3dO2FOzXjKQhJuo0Q173wf2KOo8t4I8vHy6lF9poUp7bKT0/NHE8fPX23PwfhnykfqnC2xRxOnVw5XuGIaA==", "integrity": "sha512-/sM3dO2FOzXjKQhJuo0Q173wf2KOo8t4I8vHy6lF9poUp7bKT0/NHE8fPX23PwfhnykfqnC2xRxOnVw5XuGIaA==",
"dev": true,
"license": "MIT", "license": "MIT",
"bin": { "bin": {
"jsesc": "bin/jsesc" "jsesc": "bin/jsesc"
@ -3571,12 +3368,6 @@
"dev": true, "dev": true,
"license": "MIT" "license": "MIT"
}, },
"node_modules/json-parse-even-better-errors": {
"version": "2.3.1",
"resolved": "https://registry.npmjs.org/json-parse-even-better-errors/-/json-parse-even-better-errors-2.3.1.tgz",
"integrity": "sha512-xyFwyhro/JEof6Ghe2iz2NcXoj2sloNsWr/XsERDK/oiPCfaNhl5ONfp+jQdAZRQQ0IJWNzH9zIZF7li91kh2w==",
"license": "MIT"
},
"node_modules/json-schema-traverse": { "node_modules/json-schema-traverse": {
"version": "0.4.1", "version": "0.4.1",
"resolved": "https://registry.npmjs.org/json-schema-traverse/-/json-schema-traverse-0.4.1.tgz", "resolved": "https://registry.npmjs.org/json-schema-traverse/-/json-schema-traverse-0.4.1.tgz",
@ -3865,12 +3656,6 @@
"node": ">=8" "node": ">=8"
} }
}, },
"node_modules/lines-and-columns": {
"version": "1.2.4",
"resolved": "https://registry.npmjs.org/lines-and-columns/-/lines-and-columns-1.2.4.tgz",
"integrity": "sha512-7ylylesZQ/PV29jhEDl3Ufjo6ZX7gCqJr5F7PKrqc93v7fzSymt1BpwEU8nAUXs8qzzvqhbjhK5QZg6Mt/HkBg==",
"license": "MIT"
},
"node_modules/locate-path": { "node_modules/locate-path": {
"version": "6.0.0", "version": "6.0.0",
"resolved": "https://registry.npmjs.org/locate-path/-/locate-path-6.0.0.tgz", "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-6.0.0.tgz",
@ -4025,10 +3810,20 @@
"url": "https://github.com/sponsors/isaacs" "url": "https://github.com/sponsors/isaacs"
} }
}, },
"node_modules/moment": {
"version": "2.30.1",
"resolved": "https://registry.npmjs.org/moment/-/moment-2.30.1.tgz",
"integrity": "sha512-uEmtNhbDOrWPFS+hdjFCBfy9f2YoyzRpwcl+DqpC6taX21FzsTLQVbMV/W7PzNSX6x/bhC1zA3c2UQ5NzH6how==",
"license": "MIT",
"engines": {
"node": "*"
}
},
"node_modules/ms": { "node_modules/ms": {
"version": "2.1.3", "version": "2.1.3",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.3.tgz", "resolved": "https://registry.npmjs.org/ms/-/ms-2.1.3.tgz",
"integrity": "sha512-6FlzubTLZG3J2a/NVCAleEhjzq5oxgHyaCU9yYXvcLsvoVaHJq/s5xXI6/XXP6tz7R9xAOtHnSO/tXtF3WRTlA==", "integrity": "sha512-6FlzubTLZG3J2a/NVCAleEhjzq5oxgHyaCU9yYXvcLsvoVaHJq/s5xXI6/XXP6tz7R9xAOtHnSO/tXtF3WRTlA==",
"dev": true,
"license": "MIT" "license": "MIT"
}, },
"node_modules/nanoid": { "node_modules/nanoid": {
@ -4134,6 +3929,7 @@
"version": "1.0.1", "version": "1.0.1",
"resolved": "https://registry.npmjs.org/parent-module/-/parent-module-1.0.1.tgz", "resolved": "https://registry.npmjs.org/parent-module/-/parent-module-1.0.1.tgz",
"integrity": "sha512-GQ2EWRpQV8/o+Aw8YqtfZZPfNRWZYkbidE9k5rpl/hC3vtHHBfGm2Ifi6qWV+coDGkrUKZAxE3Lot5kcsRlh+g==", "integrity": "sha512-GQ2EWRpQV8/o+Aw8YqtfZZPfNRWZYkbidE9k5rpl/hC3vtHHBfGm2Ifi6qWV+coDGkrUKZAxE3Lot5kcsRlh+g==",
"dev": true,
"license": "MIT", "license": "MIT",
"dependencies": { "dependencies": {
"callsites": "^3.0.0" "callsites": "^3.0.0"
@ -4142,24 +3938,6 @@
"node": ">=6" "node": ">=6"
} }
}, },
"node_modules/parse-json": {
"version": "5.2.0",
"resolved": "https://registry.npmjs.org/parse-json/-/parse-json-5.2.0.tgz",
"integrity": "sha512-ayCKvm/phCGxOkYRSCM82iDwct8/EonSEgCSxWxD7ve6jHggsFl4fZVQBPRNgQoKiuV/odhFrGzQXZwbifC8Rg==",
"license": "MIT",
"dependencies": {
"@babel/code-frame": "^7.0.0",
"error-ex": "^1.3.1",
"json-parse-even-better-errors": "^2.3.0",
"lines-and-columns": "^1.1.6"
},
"engines": {
"node": ">=8"
},
"funding": {
"url": "https://github.com/sponsors/sindresorhus"
}
},
"node_modules/path": { "node_modules/path": {
"version": "0.12.7", "version": "0.12.7",
"resolved": "https://registry.npmjs.org/path/-/path-0.12.7.tgz", "resolved": "https://registry.npmjs.org/path/-/path-0.12.7.tgz",
@ -4191,21 +3969,6 @@
"node": ">=8" "node": ">=8"
} }
}, },
"node_modules/path-parse": {
"version": "1.0.7",
"resolved": "https://registry.npmjs.org/path-parse/-/path-parse-1.0.7.tgz",
"integrity": "sha512-LDJzPVEEEPR+y48z93A0Ed0yXb8pAByGWo/k5YYdYgpY2/2EsOsksJrq7lOHxryrVOn1ejG6oAp8ahvOIQD8sw==",
"license": "MIT"
},
"node_modules/path-type": {
"version": "4.0.0",
"resolved": "https://registry.npmjs.org/path-type/-/path-type-4.0.0.tgz",
"integrity": "sha512-gDKb8aZMDeD/tZWs9P6+q0J9Mwkdl6xMV8TjnGP3qJVJ06bdMgkbBlLU8IdfOsIsFz2BW1rNVT3XuNEl8zPAvw==",
"license": "MIT",
"engines": {
"node": ">=8"
}
},
"node_modules/picocolors": { "node_modules/picocolors": {
"version": "1.1.1", "version": "1.1.1",
"resolved": "https://registry.npmjs.org/picocolors/-/picocolors-1.1.1.tgz", "resolved": "https://registry.npmjs.org/picocolors/-/picocolors-1.1.1.tgz",
@ -4372,12 +4135,6 @@
"react": "*" "react": "*"
} }
}, },
"node_modules/react-is": {
"version": "16.13.1",
"resolved": "https://registry.npmjs.org/react-is/-/react-is-16.13.1.tgz",
"integrity": "sha512-24e6ynE2H+OKt4kqsOvNd8kBpV65zoxbA4BVsEOB3ARVWQki/DHzaUoC5KuON/BiccDaCCTZBuOcfZs70kR8bQ==",
"license": "MIT"
},
"node_modules/react-jwt": { "node_modules/react-jwt": {
"version": "1.3.0", "version": "1.3.0",
"resolved": "https://registry.npmjs.org/react-jwt/-/react-jwt-1.3.0.tgz", "resolved": "https://registry.npmjs.org/react-jwt/-/react-jwt-1.3.0.tgz",
@ -4439,30 +4196,11 @@
"url": "https://paulmillr.com/funding/" "url": "https://paulmillr.com/funding/"
} }
}, },
"node_modules/resolve": {
"version": "1.22.10",
"resolved": "https://registry.npmjs.org/resolve/-/resolve-1.22.10.tgz",
"integrity": "sha512-NPRy+/ncIMeDlTAsuqwKIiferiawhefFJtkNSW0qZJEqMEb+qBt/77B/jGeeek+F0uOeN05CDa6HXbbIgtVX4w==",
"license": "MIT",
"dependencies": {
"is-core-module": "^2.16.0",
"path-parse": "^1.0.7",
"supports-preserve-symlinks-flag": "^1.0.0"
},
"bin": {
"resolve": "bin/resolve"
},
"engines": {
"node": ">= 0.4"
},
"funding": {
"url": "https://github.com/sponsors/ljharb"
}
},
"node_modules/resolve-from": { "node_modules/resolve-from": {
"version": "4.0.0", "version": "4.0.0",
"resolved": "https://registry.npmjs.org/resolve-from/-/resolve-from-4.0.0.tgz", "resolved": "https://registry.npmjs.org/resolve-from/-/resolve-from-4.0.0.tgz",
"integrity": "sha512-pb/MYmXstAkysRFx8piNI1tGFNQIFA3vkE3Gq4EuA1dF6gHp/+vgZqsCGJapvy8N3Q+4o7FwvquPJcnZ7RYy4g==", "integrity": "sha512-pb/MYmXstAkysRFx8piNI1tGFNQIFA3vkE3Gq4EuA1dF6gHp/+vgZqsCGJapvy8N3Q+4o7FwvquPJcnZ7RYy4g==",
"dev": true,
"license": "MIT", "license": "MIT",
"engines": { "engines": {
"node": ">=4" "node": ">=4"
@ -4608,15 +4346,6 @@
"node": ">=8" "node": ">=8"
} }
}, },
"node_modules/source-map": {
"version": "0.5.7",
"resolved": "https://registry.npmjs.org/source-map/-/source-map-0.5.7.tgz",
"integrity": "sha512-LbrmJOMUSdEVxIKvdcJzQC+nQhe8FUZQTXQy6+I75skNgn3OoQ0DZA8YnFa7gp8tqtL3KPf1kmo0R5DoApeSGQ==",
"license": "BSD-3-Clause",
"engines": {
"node": ">=0.10.0"
}
},
"node_modules/source-map-js": { "node_modules/source-map-js": {
"version": "1.2.1", "version": "1.2.1",
"resolved": "https://registry.npmjs.org/source-map-js/-/source-map-js-1.2.1.tgz", "resolved": "https://registry.npmjs.org/source-map-js/-/source-map-js-1.2.1.tgz",
@ -4639,12 +4368,6 @@
"url": "https://github.com/sponsors/sindresorhus" "url": "https://github.com/sponsors/sindresorhus"
} }
}, },
"node_modules/stylis": {
"version": "4.2.0",
"resolved": "https://registry.npmjs.org/stylis/-/stylis-4.2.0.tgz",
"integrity": "sha512-Orov6g6BB1sDfYgzWfTHDOxamtX1bE/zo104Dh9e6fqJ3PooipYyfJ0pUmrZO2wAvO8YbEyeFrkV91XTsGMSrw==",
"license": "MIT"
},
"node_modules/supports-color": { "node_modules/supports-color": {
"version": "7.2.0", "version": "7.2.0",
"resolved": "https://registry.npmjs.org/supports-color/-/supports-color-7.2.0.tgz", "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-7.2.0.tgz",
@ -4658,18 +4381,6 @@
"node": ">=8" "node": ">=8"
} }
}, },
"node_modules/supports-preserve-symlinks-flag": {
"version": "1.0.0",
"resolved": "https://registry.npmjs.org/supports-preserve-symlinks-flag/-/supports-preserve-symlinks-flag-1.0.0.tgz",
"integrity": "sha512-ot0WnXS9fgdkgIcePe6RHNk1WA8+muPa6cSjeR3V8K27q9BB1rTE3R1p7Hv0z1ZyAc8s6Vvv8DIyWf681MAt0w==",
"license": "MIT",
"engines": {
"node": ">= 0.4"
},
"funding": {
"url": "https://github.com/sponsors/ljharb"
}
},
"node_modules/tailwindcss": { "node_modules/tailwindcss": {
"version": "4.1.7", "version": "4.1.7",
"resolved": "https://registry.npmjs.org/tailwindcss/-/tailwindcss-4.1.7.tgz", "resolved": "https://registry.npmjs.org/tailwindcss/-/tailwindcss-4.1.7.tgz",

View File

@ -11,11 +11,11 @@
"preview": "vite preview" "preview": "vite preview"
}, },
"dependencies": { "dependencies": {
"@emotion/react": "^11.14.0",
"@tailwindcss/vite": "^4.1.7", "@tailwindcss/vite": "^4.1.7",
"axios": "^1.9.0", "axios": "^1.9.0",
"idb": "^8.0.3", "idb": "^8.0.3",
"lucide-react": "^0.511.0", "lucide-react": "^0.511.0",
"moment": "^2.30.1",
"next-themes": "^0.4.6", "next-themes": "^0.4.6",
"react": "^19.1.0", "react": "^19.1.0",
"react-dom": "^19.1.0", "react-dom": "^19.1.0",

Binary file not shown.

Before

Width:  |  Height:  |  Size: 416 KiB

After

Width:  |  Height:  |  Size: 59 KiB

View File

@ -1,5 +1,5 @@
import { type FC } from "react"; import { type FC } from "react";
import { createBrowserRouter, RouterProvider } from "react-router"; import { createBrowserRouter, Navigate, RouterProvider } from "react-router";
import IndexPage from "./pages/Index"; import IndexPage from "./pages/Index";
import LoginPage from "./pages/Login"; import LoginPage from "./pages/Login";
@ -9,12 +9,24 @@ import AuthenticatePage from "./pages/Authenticate";
import AuthLayout from "./layout/AuthLayout"; import AuthLayout from "./layout/AuthLayout";
import DashboardLayout from "./layout/DashboardLayout"; import DashboardLayout from "./layout/DashboardLayout";
import PersonalInfoPage from "./pages/PersonalInfo"; import PersonalInfoPage from "./pages/PersonalInfo";
import ApiServicesPage from "./pages/ApiServices"; import ApiServicesPage from "./pages/Admin/ApiServices";
import AdminLayout from "./layout/AdminLayout"; import AdminLayout from "./layout/AdminLayout";
import ApiServiceCreatePage from "./pages/ApiServices/Create"; import ApiServiceCreatePage from "./pages/Admin/ApiServices/Create";
import ViewApiServicePage from "./pages/ApiServices/View"; import ViewApiServicePage from "./pages/Admin/ApiServices/View";
import NotAllowedPage from "./pages/NotAllowed"; import NotAllowedPage from "./pages/NotAllowed";
import NotFoundPage from "./pages/NotFound"; import NotFoundPage from "./pages/NotFound";
import ApiServiceEditPage from "./pages/Admin/ApiServices/Update";
import AdminUsersPage from "./pages/Admin/Users";
import AdminViewUserPage from "./pages/Admin/Users/View";
import AdminCreateUserPage from "./pages/Admin/Users/Create";
import VerificationLayout from "./layout/VerificationLayout";
import VerifyStartPage from "./pages/Verify";
import VerifyEmailPage from "./pages/Verify/Email";
import VerifyEmailOtpPage from "./pages/Verify/Email/OTP";
import VerifyAvatarPage from "./pages/Verify/Avatar";
import VerifyReviewPage from "./pages/Verify/Review";
import AdminUserSessionsPage from "./pages/Admin/UserSessions";
import AdminServiceSessionsPage from "./pages/Admin/ServiceSessions";
const router = createBrowserRouter([ const router = createBrowserRouter([
{ {
@ -37,6 +49,10 @@ const router = createBrowserRouter([
path: "admin", path: "admin",
element: <AdminLayout />, element: <AdminLayout />,
children: [ children: [
{
index: true,
element: <Navigate to="/admin/api-services" />,
},
{ {
path: "api-services", path: "api-services",
children: [ children: [
@ -46,6 +62,35 @@ const router = createBrowserRouter([
path: "view/:serviceId", path: "view/:serviceId",
element: <ViewApiServicePage />, element: <ViewApiServicePage />,
}, },
{
path: "edit/:serviceId",
element: <ApiServiceEditPage />,
},
],
},
{
path: "users",
children: [
{ index: true, element: <AdminUsersPage /> },
{ path: "create", element: <AdminCreateUserPage /> },
{
path: "view/:userId",
element: <AdminViewUserPage />,
},
// {
// path: "edit/:serviceId",
// element: <ApiServiceEditPage />,
// },
],
},
{
path: "user-sessions",
children: [{ index: true, element: <AdminUserSessionsPage /> }],
},
{
path: "service-sessions",
children: [
{ index: true, element: <AdminServiceSessionsPage /> },
], ],
}, },
], ],
@ -54,6 +99,38 @@ const router = createBrowserRouter([
}, },
], ],
}, },
{
path: "/verify",
element: <AuthLayout />,
children: [
{
path: "/verify",
element: <VerificationLayout />,
children: [
{
index: true,
element: <VerifyStartPage />,
},
{
path: "email",
element: <VerifyEmailPage />,
},
{
path: "email/otp",
element: <VerifyEmailOtpPage />,
},
{
path: "avatar",
element: <VerifyAvatarPage />,
},
{
path: "review",
element: <VerifyReviewPage />,
},
],
},
],
},
{ {
path: "/auth", path: "/auth",
element: <AuthLayout />, element: <AuthLayout />,

View File

@ -55,3 +55,50 @@ export const getApiService = async (id: string): Promise<ApiService> => {
return response.data; return response.data;
}; };
export const getApiServiceCID = async (
clientId: string,
): Promise<ApiService> => {
const response = await axios.get<ApiService>(
`/api/v1/api-services/client/${clientId}`,
);
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
return response.data;
};
export const patchToggleApiService = async (id: string): Promise<void> => {
const response = await axios.patch(`/api/v1/admin/api-services/toggle/${id}`);
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
return response.data;
};
export interface UpdateApiServiceRequest {
name: string;
description: string;
redirect_uris: string[];
scopes: string[];
grant_types: string[];
}
export type UpdateApiServiceResponse = ApiService;
export const putApiService = async (
serviceId: string,
req: UpdateApiServiceRequest,
): Promise<UpdateApiServiceResponse> => {
const response = await axios.put<UpdateApiServiceResponse>(
`/api/v1/admin/api-services/${serviceId}`,
req,
);
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
return response.data;
};

View File

@ -0,0 +1,78 @@
import type { ServiceSession, UserSession } from "@/types";
import { axios, handleApiError } from "..";
export interface FetchUserSessionsRequest {
page: number;
size: number;
}
export interface FetchUserSessionsResponse {
items: UserSession[];
page: number;
total_pages: number;
}
export const adminGetUserSessionsApi = async (
req: FetchUserSessionsRequest,
): Promise<FetchUserSessionsResponse> => {
const response = await axios.get<FetchUserSessionsResponse>(
"/api/v1/admin/user-sessions",
{
params: req,
},
);
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
return response.data;
};
export const adminRevokeUserSessionApi = async (
sessionId: string,
): Promise<void> => {
const response = await axios.patch<FetchServiceSessionsResponse>(
`/api/v1/admin/user-sessions/revoke/${sessionId}`,
);
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
};
export interface FetchServiceSessionsRequest {
page: number;
size: number;
}
export interface FetchServiceSessionsResponse {
items: ServiceSession[];
page: number;
total_pages: number;
}
export const adminGetServiceSessionsApi = async (
req: FetchServiceSessionsRequest,
): Promise<FetchServiceSessionsResponse> => {
const response = await axios.get<FetchServiceSessionsResponse>(
"/api/v1/admin/service-sessions",
{
params: req,
},
);
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
return response.data;
};
export const adminRevokeServiceSessionApi = async (
sessionId: string,
): Promise<void> => {
const response = await axios.patch<FetchServiceSessionsResponse>(
`/api/v1/admin/service-sessions/revoke/${sessionId}`,
);
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
};

View File

@ -0,0 +1,56 @@
import type { UserProfile } from "@/types";
import { axios, handleApiError } from "..";
export interface FetchUsersResponse {
items: UserProfile[];
count: number;
}
export const adminGetUsersApi = async (): Promise<FetchUsersResponse> => {
const response = await axios.get<FetchUsersResponse>("/api/v1/admin/users");
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
return response.data;
};
export type FetchUserResponse = UserProfile;
export const adminGetUserApi = async (
id: string,
): Promise<FetchUserResponse> => {
const response = await axios.get<FetchUserResponse>(
`/api/v1/admin/users/${id}`,
);
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
return response.data;
};
export interface CreateUserRequest {
email: string;
full_name: string;
password: string;
is_admin: boolean;
}
export interface CreateUserResponse {
id: string;
}
export const postUser = async (
req: CreateUserRequest,
): Promise<CreateUserResponse> => {
const response = await axios.post<CreateUserResponse>(
"/api/v1/admin/users",
req,
);
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
return response.data;
};

17
web/src/api/avatar.ts Normal file
View File

@ -0,0 +1,17 @@
import { axios, handleApiError } from ".";
export const uploadAvatarApi = async (imageFile: File): Promise<string> => {
const formData = new FormData();
formData.append("image", imageFile);
const response = await axios.put("/api/v1/avatar", formData, {
headers: {
"Content-Type": "multipart/form-data",
},
});
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
return response.data;
};

View File

@ -4,10 +4,14 @@ export interface CodeResponse {
code: string; code: string;
} }
export const codeApi = async (accessToken: string, nonce: string) => { export const codeApi = async (
accessToken: string,
nonce: string,
clientId: string,
) => {
const response = await axios.post( const response = await axios.post(
"/api/v1/oauth/code", "/api/v1/oauth/code",
{ nonce }, { nonce, client_id: clientId },
{ {
headers: { headers: {
"Content-Type": "application/json", "Content-Type": "application/json",

View File

@ -27,11 +27,13 @@ const processRefreshQueue = async (token: string | null) => {
const logout = async (accountId: string) => { const logout = async (accountId: string) => {
const db = useDbStore.getState().db; const db = useDbStore.getState().db;
const requireSignIn = useAuth.getState().requireSignIn; const { requireSignIn, loadAccounts } = useAuth.getState();
if (db) { if (db) {
await deleteAccount(db, accountId); await deleteAccount(db, accountId);
} }
await loadAccounts();
requireSignIn?.(); requireSignIn?.();
}; };

21
web/src/api/signout.ts Normal file
View File

@ -0,0 +1,21 @@
import axios from "axios";
import { handleApiError } from ".";
export const signoutApi = async (token: string) => {
const response = await axios.post(
"/api/v1/auth/signout",
{},
{
headers: {
Authorization: `Bearer ${token}`,
},
},
);
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
const data = response.data;
return data;
};

34
web/src/api/verify.ts Normal file
View File

@ -0,0 +1,34 @@
import { axios, handleApiError } from ".";
export const requestEmailOtpApi = async (): Promise<void> => {
const response = await axios.post("/api/v1/auth/email");
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
return response.data;
};
export interface ConfirmEmailRequest {
otp: string;
}
export const confirmEmailApi = async (
req: ConfirmEmailRequest,
): Promise<void> => {
const response = await axios.post("/api/v1/auth/email/otp", req);
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
return response.data;
};
export const finishVerificationApi = async (): Promise<void> => {
const response = await axios.post("/api/v1/auth/verify");
if (response.status !== 200 && response.status !== 201)
throw await handleApiError(response);
return response.data;
};

View File

@ -7,17 +7,32 @@ const Sidebar: FC = () => {
return ( return (
<div className="hidden sm:flex flex-col gap-2 items-stretch border-r border-gray-300 dark:border-gray-700 min-w-80 w-80 p-5 pt-18 min-h-screen select-none"> <div className="hidden sm:flex flex-col gap-2 items-stretch border-r border-gray-300 dark:border-gray-700 min-w-80 w-80 p-5 pt-18 min-h-screen select-none">
{barItems.map((item) => ( {barItems.map((item, index) =>
<Link to={item.pathname} key={item.tab}> item.type !== "delimiter" ? (
<Link to={item.pathname} key={item.tab}>
<div
className={`dark:text-gray-200 transition-colors text-sm cursor-pointer p-4 rounded-lg flex flex-row items-center gap-3${
isActive(item) ? " bg-gray-200 dark:bg-gray-900" : ""
}`}
>
{item.icon} {item.title}
</div>
</Link>
) : (
<div <div
className={`dark:text-gray-200 transition-colors text-sm cursor-pointer p-4 rounded-lg flex flex-row items-center gap-3${ key={item.key}
isActive(item) ? " bg-gray-200 dark:bg-gray-900" : "" className={`flex flex-row items-center gap-4 my-2 ${index === 0 ? "mt-0" : "mt-4"}`}
}`}
> >
{item.icon} {item.title} <div className="w-full h-[2px] rounded-lg bg-gray-800"></div>
{typeof item.title === "string" && (
<p className="text-gray-800 dark:text-gray-400 text-sm">
{item.title}
</p>
)}
<div className="w-full h-[2px] rounded-lg bg-gray-800"></div>
</div> </div>
</Link> ),
))} )}
</div> </div>
); );
}; };

View File

@ -6,20 +6,22 @@ const TopBar: FC = () => {
const [barItems, isActive] = useBarItems(); const [barItems, isActive] = useBarItems();
return ( return (
<div className="sm:hidden flex w-full overflow-x-auto sm:overflow-x-visible max-w-full min-w-full sm:justify-center sm:space-x-4 no-scrollbar shadow-md shadow-gray-300 dark:shadow-gray-700 dark:bg-black/70 bg-white/70 pt-14"> <div className="sm:hidden flex w-full overflow-x-auto sm:overflow-x-visible max-w-full min-w-full sm:justify-center sm:space-x-4 no-scrollbar shadow-md shadow-gray-300 dark:shadow-gray-700 dark:bg-black/70 bg-white/70">
{barItems.map((item) => ( {barItems
<Link to={item.pathname} key={item.tab}> .filter((item) => item.type !== "delimiter")
<div .map((item) => (
className={`flex-shrink-0 transition-all border-b-4 px-4 py-2 min-w-[120px] sm:min-w-0 sm:flex-1 flex items-center justify-center cursor-pointer select-none whitespace-nowrap text-sm font-medium ${ <Link to={item.pathname} key={item.tab}>
isActive(item) <div
? " border-b-4 border-b-blue-500 text-blue-500" className={`flex-shrink-0 transition-all border-b-4 px-4 py-2 min-w-[120px] sm:min-w-0 sm:flex-1 flex items-center justify-center cursor-pointer select-none whitespace-nowrap text-sm font-medium ${
: " border-b-transparent text-gray-500" isActive(item)
}`} ? " border-b-4 border-b-blue-500 text-blue-500"
> : " border-b-transparent text-gray-500"
{item.title} }`}
</div> >
</Link> {item.title}
))} </div>
</Link>
))}
</div> </div>
); );
}; };

View File

@ -0,0 +1,64 @@
import { ArrowLeft, ArrowRight } from "lucide-react";
import React, { useCallback } from "react";
import { Button } from "./button";
type PaginationProps = {
currentPage: number;
totalPages: number;
onPageChange: (page: number) => void;
};
const Pagination: React.FC<PaginationProps> = ({
currentPage,
totalPages,
onPageChange,
}) => {
const getPageNumbers = useCallback(() => {
const delta = 2;
const pages = [];
for (
let i = Math.max(1, currentPage - delta);
i <= Math.min(totalPages, currentPage + delta);
i++
) {
pages.push(i);
}
return pages;
}, [currentPage, totalPages]);
if (totalPages <= 1) return null;
return (
<nav className="flex justify-center items-center gap-2 mt-4">
<Button
onClick={() => onPageChange(currentPage - 1)}
disabled={currentPage === 1}
variant="outlined"
>
<ArrowLeft size={17} />
</Button>
{getPageNumbers().map((page) => (
<Button
key={page}
onClick={() => onPageChange(page)}
variant={page === currentPage ? "contained" : "outlined"}
>
<p className="text-sm">{page}</p>
</Button>
))}
<Button
onClick={() => onPageChange(currentPage + 1)}
disabled={currentPage === totalPages}
variant="outlined"
>
<ArrowRight size={17} />
</Button>
</nav>
);
};
export default Pagination;

View File

@ -0,0 +1,91 @@
import React, { useMemo } from "react";
type Step = {
id: string;
label: string;
description?: string;
icon?: React.ReactNode;
};
type StepperProps = {
steps: Step[];
currentStep: string;
};
export const Stepper: React.FC<StepperProps> = ({ steps, currentStep }) => {
const stepIndex = useMemo(
() => steps.findIndex((s) => s.id === currentStep),
[currentStep, steps],
);
const percent = useMemo(() => {
return steps.length === 1
? 100
: Math.round((stepIndex / (steps.length - 1)) * 100);
}, [stepIndex, steps.length]);
return (
<div className="flex flex-col sm:flex-row sm:items-center w-full max-w-2xl mx-auto mb-5 sm:mb-8 gap-5 relative">
{steps.map((step, idx) => (
<div
key={idx}
className={`sm:flex p-4 pb-0 sm:p-0 flex-1 items-center ${idx < stepIndex ? "opacity-70" : ""} ${idx === stepIndex ? "flex" : "hidden"}`}
>
{/* Step circle */}
<div
className={`relative z-10 flex items-center justify-center w-12 h-12 min-w-12 sm:w-10 sm:h-10 sm:min-w-10 rounded-full
${
idx < stepIndex
? "bg-blue-400 text-white"
: idx === stepIndex
? "bg-blue-600 text-white"
: "bg-gray-100 dark:bg-gray-800/60 text-gray-500"
}
`}
>
{idx < stepIndex ? (
// Check icon for completed steps
<svg
className="w-5 h-5"
fill="none"
stroke="currentColor"
strokeWidth={3}
viewBox="0 0 24 24"
>
<path
strokeLinecap="round"
strokeLinejoin="round"
d="M5 13l4 4L19 7"
/>
</svg>
) : (
(step.icon ?? <span className="font-bold">{idx + 1}</span>)
)}
</div>
{/* Step label */}
<div className="flex flex-col ml-2 mr-2 sm:ml-4 sm:mr-4">
<span className="text-base text-gray-700 dark:text-gray-200 sm:text-sm font-medium">
{step.label}
</span>
{step.description && (
<span className="text-sm sm:text-xs text-gray-500 dark:text-gray-400">
{step.description}
</span>
)}
</div>
{/* {idx < steps.length - 1 && (
<div className="flex-1 h-1 mx-2 min-w sm:mx-4 rounded bg-gray-300 dark:bg-gray-600" />
)} */}
</div>
))}
<div className="sm:hidden relative h-1 w-full bg-gray-200 dark:bg-gray-700 overflow-hidden">
<div
className="absolute left-0 top-0 h-full bg-blue-500 transition-all ease-in duration-500"
style={{ width: `${percent}%` }}
/>
</div>
</div>
);
};

View File

@ -2,7 +2,7 @@ import { createPortal } from "react-dom";
import { Button } from "@/components/ui/button"; import { Button } from "@/components/ui/button";
import { Input } from "@/components/ui/input"; import { Input } from "@/components/ui/input";
import { X } from "lucide-react"; import { X } from "lucide-react";
import { useAdmin } from "@/store/admin"; import { useApiServices } from "@/store/admin/apiServices";
import type { ApiServiceCredentials } from "@/types"; import type { ApiServiceCredentials } from "@/types";
const download = (credentials: ApiServiceCredentials) => { const download = (credentials: ApiServiceCredentials) => {
@ -19,8 +19,8 @@ const download = (credentials: ApiServiceCredentials) => {
}; };
const ApiServiceCredentialsModal = () => { const ApiServiceCredentialsModal = () => {
const credentials = useAdmin((state) => state.createdCredentials); const credentials = useApiServices((state) => state.createdCredentials);
const resetCredentials = useAdmin((state) => state.resetCredentials); const resetCredentials = useApiServices((state) => state.resetCredentials);
const portalRoot = document.getElementById("portal-root"); const portalRoot = document.getElementById("portal-root");
if (!portalRoot || !credentials) return null; if (!portalRoot || !credentials) return null;

View File

@ -0,0 +1,44 @@
import { createPortal } from "react-dom";
import { Button } from "@/components/ui/button";
import { CircleCheckBig, X } from "lucide-react";
import { useApiServices } from "@/store/admin/apiServices";
const ApiServiceUpdatedModal = () => {
const resetUpdated = useApiServices((state) => state.resetUpdated);
const portalRoot = document.getElementById("portal-root");
if (!portalRoot) return null;
return createPortal(
<div className="fixed z-50 inset-0 flex items-center justify-center bg-black/30 dark:bg-white/30 px-5">
<div className="rounded-2xl flex flex-col items-stretch bg-white dark:bg-black min-w-[300px] max-w-md w-full">
<div className="flex flex-row items-center justify-between p-4 border-b dark:border-gray-800 border-gray-300">
<p className="text-gray-800 dark:text-gray-200">Service Updated</p>
<Button variant="icon" onClick={resetUpdated}>
<X />
</Button>
</div>
<div className="p-4">
<div className="mb-4 flex flex-col items-center p-4 text-green-400 gap-3">
<CircleCheckBig size={64} />
<h2 className="text-gray-800 dark:text-gray-200 text-xl">
Service has updated successfully!
</h2>
</div>
<div className="mt-4 w-full">
<Button
variant="outlined"
className="w-full"
onClick={resetUpdated}
>
Close
</Button>
</div>
</div>
</div>
</div>,
portalRoot,
);
};
export default ApiServiceUpdatedModal;

View File

@ -22,12 +22,12 @@ const Avatar: FC<AvatarProps> = ({ iconSize = 32, className, avatarId }) => {
> >
{avatar ? ( {avatar ? (
<img <img
src={`/api/v1/avatar/${avatar?.toString()}`} src={avatar}
className="w-full h-full flex-1 object-cover" className="w-full h-full flex-1 object-cover"
alt="profile" alt="profile"
/> />
) : ( ) : (
<User size={iconSize} /> <User size={iconSize} className="text-gray-800" />
)} )}
</div> </div>
); );

View File

@ -1,21 +1,31 @@
import { useAuth } from "@/store/auth"; import { useAuth } from "@/store/auth";
import { Blocks, Home, Settings2, User, Users } from "lucide-react"; import { Blocks, EarthLock, Home, User, UserLock, Users } from "lucide-react";
import { useCallback, type ReactNode } from "react"; import { useCallback, type ReactNode } from "react";
import { useLocation } from "react-router"; import { useLocation } from "react-router";
export interface BarDelimiter {
type: "delimiter";
key: string;
title?: string;
}
export interface BarItem { export interface BarItem {
type?: "nav";
icon: ReactNode; icon: ReactNode;
title: string; title: string;
tab: string; tab: string;
pathname: string; pathname: string;
} }
export const useBarItems = (): [BarItem[], (item: BarItem) => boolean] => { export type Item = BarItem | BarDelimiter;
export const useBarItems = (): [Item[], (item: Item) => boolean] => {
const profile = useAuth((state) => state.profile); const profile = useAuth((state) => state.profile);
const location = useLocation(); const location = useLocation();
const isActive = useCallback( const isActive = useCallback(
(item: BarItem) => { (item: Item) => {
if (item.type === "delimiter") return false;
if (item.pathname === "/") return location.pathname === item.pathname; if (item.pathname === "/") return location.pathname === item.pathname;
return location.pathname.startsWith(item.pathname); return location.pathname.startsWith(item.pathname);
}, },
@ -28,6 +38,11 @@ export const useBarItems = (): [BarItem[], (item: BarItem) => boolean] => {
return [ return [
[ [
{
type: "delimiter" as const,
title: "Basic",
key: "basic-del",
},
{ {
icon: <Home />, icon: <Home />,
title: "Home", title: "Home",
@ -40,14 +55,20 @@ export const useBarItems = (): [BarItem[], (item: BarItem) => boolean] => {
tab: "personal-info", tab: "personal-info",
pathname: "/personal-info", pathname: "/personal-info",
}, },
{ // TODO:
icon: <Settings2 />, // {
title: "Data & Personalization", // icon: <Settings2 />,
tab: "data-personalization", // title: "Data & Personalization",
pathname: "/data-personalize", // tab: "data-personalization",
}, // pathname: "/data-personalize",
...(profile.isAdmin // },
...(profile.is_admin
? [ ? [
{
type: "delimiter" as const,
title: "Admin",
key: "admin-del",
},
{ {
icon: <Blocks />, icon: <Blocks />,
title: "API Services", title: "API Services",
@ -60,6 +81,18 @@ export const useBarItems = (): [BarItem[], (item: BarItem) => boolean] => {
tab: "admin.users", tab: "admin.users",
pathname: "/admin/users", pathname: "/admin/users",
}, },
{
icon: <UserLock />,
title: "User Sessions",
tab: "admin.user-sessions",
pathname: "/admin/user-sessions",
},
{
icon: <EarthLock />,
title: "Service Sessions",
tab: "admin.service-sessions",
pathname: "/admin/service-sessions",
},
] ]
: []), : []),
], ],

View File

@ -32,7 +32,7 @@ const AdminLayout: FC = () => {
</div>; </div>;
} }
if (!profile?.isAdmin) { if (!profile?.is_admin) {
return <Navigate to="/not-allowed" />; return <Navigate to="/not-allowed" />;
} }

View File

@ -31,6 +31,8 @@ const AuthLayout = () => {
const authenticate = useAuth((state) => state.authenticate); const authenticate = useAuth((state) => state.authenticate);
const hasAuthenticated = useAuth((state) => state.hasAuthenticated); const hasAuthenticated = useAuth((state) => state.hasAuthenticated);
const authProfile = useAuth((s) => s.profile);
const signInRequired = useAuth((state) => state.signInRequired); const signInRequired = useAuth((state) => state.signInRequired);
const location = useLocation(); const location = useLocation();
@ -61,6 +63,18 @@ const AuthLayout = () => {
connecting, connecting,
]); ]);
const verificationRequired = useMemo(() => {
return (
authProfile?.email_verified === false ||
authProfile?.avatar_verified === false ||
authProfile?.verified === false
);
}, [
authProfile?.avatar_verified,
authProfile?.email_verified,
authProfile?.verified,
]);
// OAuth // OAuth
useEffect(() => { useEffect(() => {
console.log( console.log(
@ -136,6 +150,14 @@ const AuthLayout = () => {
); );
} }
if (
!signInRequired &&
verificationRequired &&
!location.pathname.startsWith("/verify")
) {
return <Navigate to="/verify" state={{ from: location.pathname }} />;
}
return ( return (
<BackgroundLayout> <BackgroundLayout>
<Outlet /> <Outlet />

View File

@ -6,7 +6,9 @@ export interface IBackgroundLayoutProps {
const BackgroundLayout: FC<IBackgroundLayoutProps> = ({ children }) => { const BackgroundLayout: FC<IBackgroundLayoutProps> = ({ children }) => {
return ( return (
<div className="relative min-h-screen bg-cover bg-center bg-white dark:bg-black bg-[url(/overlay.jpg)] dark:bg-[url(/dark-overlay.jpg)]"> // <div className="relative min-h-screen bg-[url(/overlay.jpg)] bg-[#f8f9fb] dark:bg-gradient-to-br from-[#101112] to-[#041758]">
// <div className="relative min-h-screen bg-cover bg-center bg-[url(/overlay.jpg)] bg-[#f8f9fb] dark:bg-[#101112] dark:bg-[url(/background-dark.png)]">
<div className="relative min-h-screen bg-cover bg-center bg-[#f8f9fb] dark:bg-black bg-[url(/overlay.jpg)] dark:bg-[url(/dark-overlay.jpg)]">
{children} {children}
</div> </div>
); );

View File

@ -7,9 +7,9 @@ import { Outlet } from "react-router";
const DashboardLayout: FC = () => { const DashboardLayout: FC = () => {
return ( return (
<div className="relative z-10 flex items-center justify-center min-h-screen"> <div className="relative z-10 flex items-center justify-center min-h-screen">
<Card className="overflow-y-auto min-h-screen w-full min-w-full shadow-lg bg-white/85 dark:bg-black/85 backdrop-blur-md sm:rounded-none"> <Card className="min-h-screen w-full min-w-full h-screen max-h-screen shadow-lg bg-white/85 dark:bg-black/85 backdrop-blur-md sm:rounded-none overflow-y-auto sm:overflow-hidden">
<div className="flex flex-col w-full h-full flex-1 items-center sm:pt-0 relative"> <div className="flex flex-col w-full h-full flex-1 items-center sm:pt-0">
<div className="flex flex-row items-center absolute left-4 top-4"> <div className="flex w-full sm:w-auto p-4 sm:p-0 flex-row items-center sm:absolute sm:left-4 sm:top-4">
<img src="/icon.png" alt="icon" className="w-6 h-6" /> <img src="/icon.png" alt="icon" className="w-6 h-6" />
<div className="ml-2"> <div className="ml-2">
@ -20,12 +20,12 @@ const DashboardLayout: FC = () => {
</div> </div>
<CardContent <CardContent
className="w-full h-full max-h-full space-y-4 flex-1 bg-black/5 dark:bg-white/5" className="w-full space-y-4 flex-1 bg-black/5 dark:bg-white/5"
spacing={false} spacing={false}
> >
<div className="flex flex-row"> <div className="flex flex-row">
<Sidebar /> <Sidebar />
<div className="max-w-full flex-1 sm:max-h-screen overflow-y-auto"> <div className="max-w-full flex-1 sm:overflow-y-auto sm:max-h-screen">
<div className="flex flex-col w-full items-center gap-2"> <div className="flex flex-col w-full items-center gap-2">
<TopBar /> <TopBar />
</div> </div>

View File

@ -0,0 +1,86 @@
import { Stepper } from "@/components/ui/stepper";
import { useAuth } from "@/store/auth";
import { useVerify } from "@/store/verify";
import { Eye, MailCheck, ScanFace } from "lucide-react";
import { useEffect, type FC } from "react";
import { Navigate, Outlet, useLocation, useNavigate } from "react-router";
const steps = [
{
id: "email",
icon: <MailCheck size={18} />,
label: "Verify Email",
description: "Confirm your address",
},
{
id: "avatar",
icon: <ScanFace size={20} />,
label: "Profile Picture",
description: "Add profile image",
},
{
id: "review",
icon: <Eye size={20} />,
label: "Done",
description: "Review & Quit",
},
];
const VerificationLayout: FC = () => {
const location = useLocation();
const profile = useAuth((s) => s.profile);
const step = useVerify((s) => s.step);
const loadStep = useVerify((s) => s.loadStep);
const redirect = useVerify((s) => s.redirect);
const setRedirect = useVerify((s) => s.setRedirect);
const navigate = useNavigate();
useEffect(() => {
if (profile) loadStep(profile);
}, [loadStep, profile]);
useEffect(() => {
if (location.state?.from) {
setRedirect(location.state.from);
}
}, [location.state?.from, setRedirect]);
useEffect(() => {
if (step === false) {
navigate(redirect ?? "/", { state: { reset: true } });
}
}, [navigate, redirect, step]);
if (
step === "email" &&
!location.pathname.startsWith("/verify/email") &&
location.pathname.replace(/\/$/i, "") !== "/verify"
) {
return <Navigate to="/verify/email" />;
}
if (step === "avatar" && !location.pathname.startsWith("/verify/avatar")) {
return <Navigate to="/verify/avatar" />;
}
if (step === "review" && !location.pathname.startsWith("/verify/review")) {
return <Navigate to="/verify/review" />;
}
return (
<div className="w-full h-screen max-h-screen overflow-y-auto flex flex-col items-center sm:justify-center bg-white/50 dark:bg-black/50">
<div className="w-full h-full sm:w-auto sm:h-auto">
{location.pathname.replace(/\/$/i, "") !== "/verify" &&
typeof step === "string" && (
<Stepper steps={steps} currentStep={step} />
)}
<Outlet />
</div>
</div>
);
};
export default VerificationLayout;

View File

@ -2,7 +2,7 @@ import Breadcrumbs from "@/components/ui/breadcrumbs";
import { Button } from "@/components/ui/button"; import { Button } from "@/components/ui/button";
import { Input } from "@/components/ui/input"; import { Input } from "@/components/ui/input";
import ApiServiceCredentialsModal from "@/feature/ApiServiceCredentialsModal"; import ApiServiceCredentialsModal from "@/feature/ApiServiceCredentialsModal";
import { useAdmin } from "@/store/admin"; import { useApiServices } from "@/store/admin/apiServices";
import { useCallback, type FC } from "react"; import { useCallback, type FC } from "react";
import { useForm } from "react-hook-form"; import { useForm } from "react-hook-form";
import { Link } from "react-router"; import { Link } from "react-router";
@ -28,14 +28,14 @@ const ApiServiceCreatePage: FC = () => {
}, },
}); });
const createApiService = useAdmin((state) => state.createApiService); const createApiService = useApiServices((state) => state.create);
const credentials = useAdmin((state) => state.createdCredentials); const credentials = useApiServices((state) => state.createdCredentials);
const onSubmit = useCallback( const onSubmit = useCallback(
(data: FormData) => { async (data: FormData) => {
console.log("Form submitted:", data); console.log("Form submitted:", data);
createApiService({ await createApiService({
name: data.name, name: data.name,
description: data.description ?? "", description: data.description ?? "",
redirect_uris: data.redirectUris.trim().split("\n"), redirect_uris: data.redirectUris.trim().split("\n"),
@ -45,6 +45,9 @@ const ApiServiceCreatePage: FC = () => {
: ["authorization_code"], : ["authorization_code"],
is_active: data.enabled, is_active: data.enabled,
}); });
// if (success) {
// navigate("/admin/api-services");
// }
}, },
[createApiService], [createApiService],
); );

View File

@ -0,0 +1,199 @@
import Breadcrumbs from "@/components/ui/breadcrumbs";
import { Button } from "@/components/ui/button";
import { Input } from "@/components/ui/input";
import ApiServiceUpdatedModal from "@/feature/ApiServiceUpdatedModal";
import { useApiServices } from "@/store/admin/apiServices";
import { useCallback, useEffect, type FC } from "react";
import { useForm } from "react-hook-form";
import { Link, useParams } from "react-router";
interface FormData {
name: string;
description: string;
redirectUris: string;
scopes: string;
grantTypes: string;
}
const ApiServiceEditPage: FC = () => {
const {
register,
handleSubmit,
formState: { errors },
setValue,
} = useForm<FormData>({
defaultValues: {
scopes: "openid",
},
});
const { serviceId } = useParams();
const apiService = useApiServices((state) => state.view);
const loadService = useApiServices((state) => state.fetchSingle);
const updateApiService = useApiServices((state) => state.update);
const updating = useApiServices((state) => state.updating);
const updated = useApiServices((state) => state.updated);
const onSubmit = useCallback(
(data: FormData) => {
console.log("Form submitted:", data);
updateApiService({
name: data.name,
description: data.description ?? "",
redirect_uris: data.redirectUris.trim().split("\n"),
scopes: data.scopes.trim().split(" "),
grant_types: data.grantTypes
? data.grantTypes.trim().split(" ")
: ["authorization_code"],
});
},
[updateApiService],
);
useEffect(() => {
if (typeof serviceId === "string") loadService(serviceId);
}, [loadService, serviceId]);
useEffect(() => {
if (apiService != null) {
setValue("name", apiService.name);
setValue("description", apiService.description);
setValue("redirectUris", apiService.redirect_uris.join("\n"));
setValue("scopes", apiService.scopes.join(" "));
setValue("grantTypes", apiService.grant_types.join(" "));
}
}, [apiService, setValue]);
return (
<div className="p-4">
{updated && <ApiServiceUpdatedModal />}
<Breadcrumbs
items={[
{ href: "/admin", label: "Admin" },
{ href: "/admin/api-services", label: "API Services" },
{ label: "Create new API Service" },
]}
/>
<form onSubmit={handleSubmit(onSubmit)}>
{/* Service Information */}
<div className="border dark:border-gray-800 border-gray-300 rounded mt-4 flex flex-col">
<div className="p-4 border-b dark:border-gray-800 border-gray-300">
<h2 className="text-gray-800 dark:text-gray-200">
Service Information
</h2>
</div>
<div className="p-4">
<div className="flex flex-col gap-2 mb-4">
<p className="text-gray-600 dark:text-gray-400 text-sm">Name</p>
<Input
placeholder="Display Name"
{...register("name", { required: "Name is required" })}
/>
{errors.name && (
<span className="text-red-500 text-sm">
{errors.name.message}
</span>
)}
</div>
<div className="flex flex-col gap-2 mb-4">
<p className="text-gray-600 dark:text-gray-400 text-sm">
Description
</p>
<textarea
{...register("description", {
required: "Description is required",
})}
className="dark:text-gray-100 border border-gray-300 dark:border-gray-700 rounded placeholder:text-gray-600 text-sm p-2 focus:outline-none focus:ring-2 focus:ring-blue-500"
placeholder="Some description goes here..."
></textarea>
{errors.description && (
<span className="text-red-500 text-sm">
{errors.description.message}
</span>
)}
</div>
</div>
</div>
{/* OpenID Connect */}
<div className="border dark:border-gray-800 border-gray-300 rounded mt-4 flex flex-col">
<div className="p-4 border-b dark:border-gray-800 border-gray-300">
<h2 className="text-gray-800 dark:text-gray-200">OpenID Connect</h2>
</div>
<div className="p-4">
<div className="flex flex-col gap-2 mb-4">
<p className="text-gray-600 dark:text-gray-400 text-sm">
Redirect URIs
</p>
<textarea
{...register("redirectUris", {
required: "At least one URI is required",
})}
className="dark:text-gray-100 border border-gray-300 dark:border-gray-700 rounded placeholder:text-gray-600 text-sm p-2 focus:outline-none focus:ring-2 focus:ring-blue-500"
placeholder="Enter multiple URIs separated with new line"
></textarea>
{errors.redirectUris && (
<span className="text-red-500 text-sm">
{errors.redirectUris.message}
</span>
)}
</div>
<div className="flex flex-col gap-2 mb-4">
<p className="text-gray-600 dark:text-gray-400 text-sm">Scopes</p>
<Input
placeholder="Scopes separated with space"
{...register("scopes", { required: "Scopes are required" })}
/>
{errors.scopes && (
<span className="text-red-500 text-sm">
{errors.scopes.message}
</span>
)}
</div>
<div className="flex flex-col gap-2 mb-4">
<p className="text-gray-600 dark:text-gray-400 text-sm">
Grant Types
</p>
<Input
placeholder="Leave empty for 'authorization_code'"
{...register("grantTypes")}
/>
</div>
</div>
</div>
{/* Final Section */}
<div className="border dark:border-gray-800 border-gray-300 rounded mt-4 flex flex-col">
<div className="p-4 border-b dark:border-gray-800 border-gray-300">
<h2 className="text-gray-800 dark:text-gray-200">
Approve & Submit
</h2>
</div>
<div className="p-4">
<div className="flex flex-row items-center justify-between gap-2 mt-4">
<Button type="submit" loading={updating}>
Update
</Button>
<Link to="/admin/api-services">
<Button
variant="text"
className="text-red-400 hover:text-red-500"
>
Cancel
</Button>
</Link>
</div>
</div>
</div>
</form>
</div>
);
};
export default ApiServiceEditPage;

View File

@ -1,7 +1,7 @@
import Breadcrumbs from "@/components/ui/breadcrumbs"; import Breadcrumbs from "@/components/ui/breadcrumbs";
import { Button } from "@/components/ui/button"; import { Button } from "@/components/ui/button";
import { Input } from "@/components/ui/input"; import { Input } from "@/components/ui/input";
import { useAdmin } from "@/store/admin"; import { useApiServices } from "@/store/admin/apiServices";
import { useEffect, type FC } from "react"; import { useEffect, type FC } from "react";
import { Link, useParams } from "react-router"; import { Link, useParams } from "react-router";
@ -24,10 +24,13 @@ const InfoCard = ({
const ViewApiServicePage: FC = () => { const ViewApiServicePage: FC = () => {
const { serviceId } = useParams(); const { serviceId } = useParams();
const apiService = useAdmin((state) => state.viewApiService); const apiService = useApiServices((state) => state.view);
// const loading = useAdmin((state) => state.fetchingApiService); // const loading = useApiServices((state) => state.fetchingApiService);
const loadService = useAdmin((state) => state.fetchApiService); const loadService = useApiServices((state) => state.fetchSingle);
const toggling = useApiServices((state) => state.toggling);
const toggle = useApiServices((state) => state.toggle);
useEffect(() => { useEffect(() => {
if (typeof serviceId === "string") loadService(serviceId); if (typeof serviceId === "string") loadService(serviceId);
@ -181,13 +184,17 @@ const ViewApiServicePage: FC = () => {
? "text-red-400 hover:text-red-500" ? "text-red-400 hover:text-red-500"
: "text-green-400 hover:text-green-500" : "text-green-400 hover:text-green-500"
} }
onClick={() => {}} onClick={toggle}
loading={toggling}
> >
{apiService.is_active ? "Disable" : "Enable"} {apiService.is_active ? "Disable" : "Enable"}
</Button> </Button>
<Button variant="contained" disabled> <Link
Edit to={`/admin/api-services/edit/${serviceId}`}
</Button> className="hover:underline hover:text-gray-600 dark:hover:text-gray-300 transition-colors"
>
<Button variant="contained">Edit</Button>
</Link>
</div> </div>
</div> </div>
</div> </div>

View File

@ -1,21 +1,21 @@
import Breadcrumbs from "@/components/ui/breadcrumbs"; import Breadcrumbs from "@/components/ui/breadcrumbs";
import { Button } from "@/components/ui/button"; import { Button } from "@/components/ui/button";
import { useAdmin } from "@/store/admin"; import { useApiServices } from "@/store/admin/apiServices";
import { Plus } from "lucide-react"; import { Plus } from "lucide-react";
import { useEffect, type FC } from "react"; import { useEffect, type FC } from "react";
import { Link } from "react-router"; import { Link } from "react-router";
const ApiServicesPage: FC = () => { const ApiServicesPage: FC = () => {
const apiServices = useAdmin((state) => state.apiServices); const apiServices = useApiServices((state) => state.apiServices);
const loading = useAdmin((state) => state.loadingApiServices); const loading = useApiServices((state) => state.loading);
const fetchApiServices = useAdmin((state) => state.fetchApiServices); const fetchApiServices = useApiServices((state) => state.fetch);
useEffect(() => { useEffect(() => {
fetchApiServices(); fetchApiServices();
}, [fetchApiServices]); }, [fetchApiServices]);
return ( return (
<div className="relative flex flex-col items-stretch w-full h-full"> <div className="relative flex flex-col items-stretch w-full">
<div className="p-4"> <div className="p-4">
<Breadcrumbs <Breadcrumbs
className="pb-2" className="pb-2"

View File

@ -0,0 +1,214 @@
import Breadcrumbs from "@/components/ui/breadcrumbs";
import { Button } from "@/components/ui/button";
import Avatar from "@/feature/Avatar";
import { Ban } from "lucide-react";
import { useCallback, useEffect, type FC } from "react";
import { Link } from "react-router";
import moment from "moment";
import Pagination from "@/components/ui/pagination";
import { useAuth } from "@/store/auth";
import { useServiceSessions } from "@/store/admin/serviceSessions";
const AdminServiceSessionsPage: FC = () => {
const loading = useServiceSessions((s) => s.loading);
const sessions = useServiceSessions((s) => s.items);
const page = useServiceSessions((s) => s.page);
const totalPages = useServiceSessions((s) => s.totalPages);
const fetchSessions = useServiceSessions((s) => s.fetch);
const revokeSession = useServiceSessions((s) => s.revoke);
const revokingId = useServiceSessions((s) => s.revokingId);
const profile = useAuth((s) => s.profile);
const handleRevokeSession = useCallback(
(id: string) => {
revokeSession(id);
},
[revokeSession],
);
useEffect(() => {
fetchSessions(1);
}, [fetchSessions]);
return (
<div className="relative flex flex-col items-stretch w-full">
<div className="p-4">
<Breadcrumbs
className="pb-2"
items={[
{
href: "/admin",
label: "Admin",
},
{
label: "Service Sessions",
},
]}
/>
</div>
<div className="p-4 flex flex-row items-center justify-between">
<p className="text-gray-800 dark:text-gray-300">Search...</p>
{/* TODO: Filters */}
</div>
<div className="flex-1 overflow-x-auto">
<table className="relative min-w-full border-l-0 border border-gray-300 dark:border-gray-700 border-collapse divide-y divide-gray-200 dark:divide-gray-800">
{loading && (
<div className="absolute inset-0 z-10 flex items-center justify-center bg-white/60 dark:bg-gray-900/60 backdrop-blur-sm">
<div className="text-gray-800 dark:text-gray-200 font-medium">
Loading...
</div>
</div>
)}
<thead className="bg-black/5 dark:bg-white/5 text-nowrap">
<tr>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Service
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
User + IP
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Status
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Issued At
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Expires At
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Last Active
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Revoked At
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Actions
</th>
</tr>
</thead>
<tbody className="divide-y divide-gray-200 dark:divide-gray-700">
{!loading && sessions.length === 0 ? (
<tr>
<td
colSpan={5}
className="px-6 py-12 text-center text-gray-500 dark:text-gray-400"
>
No sessions found.
</td>
</tr>
) : (
sessions.map((session) => (
<tr
key={session.id}
className="hover:bg-gray-50 dark:hover:bg-gray-800"
>
<td className="px-5 py-3 text-sm text-gray-700 dark:text-gray-300 border border-gray-300 dark:border-gray-700">
{/* <SessionSource deviceInfo={session.} /> */}
{typeof session.api_service?.icon_url === "string" && (
<Avatar
avatarId={session.api_service.icon_url}
className="w-7 h-7 min-w-7"
/>
)}
<Link to={`/admin/api-services/view/${session.service_id}`}>
<p className="cursor-pointer text-blue-500 text-nowrap">
{session.api_service?.name ?? session.client_id}
</p>
</Link>
</td>
<td className="px-5 py-3 text-sm text-gray-700 dark:text-gray-300 border border-gray-300 dark:border-gray-700">
<div className="flex flex-col items-stretch gap-2 justify-start">
<div className="flex flex-row items-center gap-2 justify-start">
{typeof session.user?.profile_picture === "string" && (
<Avatar
avatarId={session.user.profile_picture}
className="w-7 h-7 min-w-7"
/>
)}
<div className="flex flex-col items-stretch justify-center">
<Link to={`/admin/users/view/${session.user_id}`}>
<p className="cursor-pointer text-blue-500 text-nowrap">
{session.user?.full_name ?? ""}{" "}
{session.user_id === profile?.id ? "(You)" : ""}
</p>
</Link>
<p className="opacity-75">
{session.ip_address ?? "No IP available"}
</p>
</div>
</div>
</div>
</td>
<td className="px-5 py-3 text-sm border border-gray-300 dark:border-gray-700">
<span
className={`inline-block px-2 py-1 text-xs rounded-full font-semibold ${
!session.is_active ||
(session.expires_at &&
moment(session.expires_at).isSameOrBefore(
moment(new Date()),
))
? "bg-red-100 text-red-800 dark:bg-red-900 dark:text-red-300"
: "bg-green-100 text-green-800 dark:bg-green-900 dark:text-green-300"
}`}
>
{session.is_active ? "Active" : "Inactive"}
{moment(session.expires_at).isSameOrBefore(
moment(new Date()),
) && " (Expired)"}
</span>
</td>
<td className="px-5 py-3 text-sm text-gray-500 dark:text-gray-400 border border-gray-300 dark:border-gray-700">
{moment(session.issued_at).format("LLLL")}
</td>
<td className="px-5 py-3 text-sm text-gray-500 dark:text-gray-400 border border-gray-300 dark:border-gray-700">
{session.expires_at
? moment(session.expires_at).format("LLLL")
: "never"}
</td>
<td className="px-5 py-3 text-sm text-gray-500 dark:text-gray-400 border border-gray-300 dark:border-gray-700">
{session.last_active
? moment(session.last_active).format("LLLL")
: "never"}
</td>
<td className="px-5 py-3 text-sm text-gray-500 dark:text-gray-400 border border-gray-300 dark:border-gray-700">
{session.revoked_at
? new Date(session.revoked_at).toLocaleString()
: "never"}
</td>
<td>
<div className="flex flex-row items-center justify-center gap-2">
<Button
variant="contained"
className="bg-red-500 hover:bg-red-600 !px-1.5 !py-1.5"
onClick={() => handleRevokeSession(session.id)}
disabled={revokingId === session.id}
>
<Ban size={18} />
</Button>
</div>
</td>
</tr>
))
)}
</tbody>
</table>
</div>
<Pagination
currentPage={page}
onPageChange={(newPage) => fetchSessions(newPage)}
totalPages={totalPages}
/>
</div>
);
};
export default AdminServiceSessionsPage;

View File

@ -0,0 +1,209 @@
import Breadcrumbs from "@/components/ui/breadcrumbs";
import { Button } from "@/components/ui/button";
import Avatar from "@/feature/Avatar";
import type { DeviceInfo } from "@/types";
import { Ban } from "lucide-react";
import { useCallback, useEffect, useMemo, type FC } from "react";
import { Link } from "react-router";
import moment from "moment";
import Pagination from "@/components/ui/pagination";
import { useUserSessions } from "@/store/admin/userSessions";
import { useAuth } from "@/store/auth";
const SessionSource: FC<{ deviceInfo: string }> = ({ deviceInfo }) => {
const parsed = useMemo<DeviceInfo>(
() => JSON.parse(atob(deviceInfo)),
[deviceInfo],
);
return (
<p>
{parsed.os} {parsed.os_version} {parsed.browser} {parsed.browser_version}
</p>
);
};
const AdminUserSessionsPage: FC = () => {
const loading = useUserSessions((s) => s.loading);
const sessions = useUserSessions((s) => s.items);
const page = useUserSessions((s) => s.page);
const totalPages = useUserSessions((s) => s.totalPages);
const fetchSessions = useUserSessions((s) => s.fetch);
const revokeSession = useUserSessions((s) => s.revoke);
const revokingId = useUserSessions((s) => s.revokingId);
const profile = useAuth((s) => s.profile);
const handleRevokeSession = useCallback(
(id: string) => {
revokeSession(id);
},
[revokeSession],
);
useEffect(() => {
fetchSessions(1);
}, [fetchSessions]);
return (
<div className="relative flex flex-col items-stretch w-full">
<div className="p-4">
<Breadcrumbs
className="pb-2"
items={[
{
href: "/admin",
label: "Admin",
},
{
label: "User Sessions",
},
]}
/>
</div>
<div className="p-4 flex flex-row items-center justify-between">
<p className="text-gray-800 dark:text-gray-300">Search...</p>
{/* TODO: Filters */}
</div>
<div className="flex-1 overflow-x-auto">
<table className="relative min-w-full border-l-0 border border-gray-300 dark:border-gray-700 border-collapse divide-y divide-gray-200 dark:divide-gray-800">
{loading && (
<div className="absolute inset-0 z-10 flex items-center justify-center bg-white/60 dark:bg-gray-900/60 backdrop-blur-sm">
<div className="text-gray-800 dark:text-gray-200 font-medium">
Loading...
</div>
</div>
)}
<thead className="bg-black/5 dark:bg-white/5 text-nowrap">
<tr>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
User
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Source
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Status
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Issued At
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Expires At
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Last Active
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Revoked At
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Actions
</th>
</tr>
</thead>
<tbody className="divide-y divide-gray-200 dark:divide-gray-700">
{!loading && sessions.length === 0 ? (
<tr>
<td
colSpan={5}
className="px-6 py-12 text-center text-gray-500 dark:text-gray-400"
>
No sessions found.
</td>
</tr>
) : (
sessions.map((session) => (
<tr
key={session.id}
className="hover:bg-gray-50 dark:hover:bg-gray-800"
>
<td className="px-5 py-3 text-sm text-gray-700 dark:text-gray-300 border border-gray-300 dark:border-gray-700">
<div className="flex flex-row items-center gap-2 justify-start">
{typeof session.user?.profile_picture === "string" && (
<Avatar
avatarId={session.user.profile_picture}
className="w-7 h-7 min-w-7"
/>
)}
<Link to={`/admin/users/view/${session.user_id}`}>
<p className="cursor-pointer text-blue-500 text-nowrap">
{session.user?.full_name ?? ""}{" "}
{session.user_id === profile?.id ? "(You)" : ""}
</p>
</Link>
</div>
</td>
<td className="px-5 py-3 text-sm text-gray-700 dark:text-gray-300 border border-gray-300 dark:border-gray-700">
<SessionSource deviceInfo={session.device_info} />
</td>
<td className="px-5 py-3 text-sm border border-gray-300 dark:border-gray-700">
<span
className={`inline-block px-2 py-1 text-xs rounded-full font-semibold ${
!session.is_active ||
(session.expires_at &&
moment(session.expires_at).isSameOrBefore(
moment(new Date()),
))
? "bg-red-100 text-red-800 dark:bg-red-900 dark:text-red-300"
: "bg-green-100 text-green-800 dark:bg-green-900 dark:text-green-300"
}`}
>
{session.is_active ? "Active" : "Inactive"}
{moment(session.expires_at).isSameOrBefore(
moment(new Date()),
) && " (Expired)"}
</span>
</td>
<td className="px-5 py-3 text-sm text-gray-500 dark:text-gray-400 border border-gray-300 dark:border-gray-700">
{moment(session.issued_at).format("LLLL")}
</td>
<td className="px-5 py-3 text-sm text-gray-500 dark:text-gray-400 border border-gray-300 dark:border-gray-700">
{session.expires_at
? moment(session.expires_at).format("LLLL")
: "never"}
</td>
<td className="px-5 py-3 text-sm text-gray-500 dark:text-gray-400 border border-gray-300 dark:border-gray-700">
{session.last_active
? moment(session.last_active).format("LLLL")
: "never"}
</td>
<td className="px-5 py-3 text-sm text-gray-500 dark:text-gray-400 border border-gray-300 dark:border-gray-700">
{session.revoked_at
? new Date(session.revoked_at).toLocaleString()
: "never"}
</td>
<td>
<div className="flex flex-row items-center justify-center gap-2">
<Button
variant="contained"
className="bg-red-500 hover:bg-red-600 !px-1.5 !py-1.5"
onClick={() => handleRevokeSession(session.id)}
disabled={revokingId === session.id}
>
<Ban size={18} />
</Button>
</div>
</td>
</tr>
))
)}
</tbody>
</table>
</div>
<Pagination
currentPage={page}
onPageChange={(newPage) => fetchSessions(newPage)}
totalPages={totalPages}
/>
</div>
);
};
export default AdminUserSessionsPage;

View File

@ -0,0 +1,193 @@
import Breadcrumbs from "@/components/ui/breadcrumbs";
import { Button } from "@/components/ui/button";
import { Input } from "@/components/ui/input";
import { useUsers } from "@/store/admin/users";
import { useCallback, type FC } from "react";
import { useForm } from "react-hook-form";
import { Link, useNavigate } from "react-router";
interface FormData {
fullName: string;
email: string;
phoneNumber: string;
password: string;
repeatPassword: string;
isAdmin: boolean;
}
const AdminCreateUserPage: FC = () => {
const {
register,
handleSubmit,
formState: { errors },
} = useForm<FormData>();
const createUser = useUsers((state) => state.createUser);
const navigate = useNavigate();
const onSubmit = useCallback(
async (data: FormData) => {
console.log("Form submitted:", data);
const success = await createUser({
email: data.email,
full_name: data.fullName,
password: data.password,
is_admin: data.isAdmin,
});
if (success) {
navigate("/admin/users");
}
},
[createUser, navigate],
);
return (
<div className="p-4">
<Breadcrumbs
items={[
{ href: "/admin", label: "Admin" },
{ href: "/admin/users", label: "Users" },
{ label: "Create new User" },
]}
/>
<form onSubmit={handleSubmit(onSubmit)}>
{/* Personal Information */}
<div className="border dark:border-gray-800 border-gray-300 rounded mt-4 flex flex-col">
<div className="p-4 border-b dark:border-gray-800 border-gray-300">
<h2 className="text-gray-800 dark:text-gray-200">
User Personal Info
</h2>
</div>
<div className="p-4">
<div className="flex flex-col gap-2 mb-4">
<p className="text-gray-600 dark:text-gray-400 text-sm">Name</p>
<Input
placeholder="Full Name"
{...register("fullName", { required: "Full Name is required" })}
/>
{errors.fullName && (
<span className="text-red-500 text-sm">
{errors.fullName.message}
</span>
)}
</div>
<div className="flex flex-col gap-2 mb-4">
<p className="text-gray-600 dark:text-gray-400 text-sm">
Email Address
</p>
<Input
placeholder="user@company.org"
{...register("email", {
required: true,
pattern: {
value: /\S+@\S+\.\S+/,
message: "Invalid email",
},
})}
className="dark:text-gray-100 border border-gray-300 dark:border-gray-700 rounded placeholder:text-gray-600 text-sm p-2 focus:outline-none focus:ring-2 focus:ring-blue-500"
/>
{errors.email && (
<span className="text-red-500 text-sm">
{errors.email.message}
</span>
)}
</div>
<div className="flex flex-col gap-2 mb-4">
<p className="text-gray-600 dark:text-gray-400 text-sm">
Password
</p>
<Input
placeholder="secret"
{...register("password", {
required: true,
validate: (password) => {
if (password.length < 8) {
return "Password must be at least 8 characters long";
}
if (!password.match(/[a-zA-Z]+/gi)) {
return "Password must contain characters";
}
if (password.split("").every((c) => c.toLowerCase() == c)) {
return "Password should contain at least 1 uppercase character";
}
if (!password.match(/\d+/gi)) {
return "Password should contain at least 1 digit";
}
},
})}
className="dark:text-gray-100 border border-gray-300 dark:border-gray-700 rounded placeholder:text-gray-600 text-sm p-2 focus:outline-none focus:ring-2 focus:ring-blue-500"
/>
{errors.password && (
<span className="text-red-500 text-sm">
{errors.password.message}
</span>
)}
</div>
<div className="flex flex-col gap-2 mb-4">
<p className="text-gray-600 dark:text-gray-400 text-sm">
Repeat Password
</p>
<Input
placeholder="secret-again"
{...register("repeatPassword", {
required: true,
validate: (repeatPassword, { password }) => {
if (repeatPassword != password) {
return "Password does not match";
}
},
})}
className="dark:text-gray-100 border border-gray-300 dark:border-gray-700 rounded placeholder:text-gray-600 text-sm p-2 focus:outline-none focus:ring-2 focus:ring-blue-500"
/>
{errors.repeatPassword && (
<span className="text-red-500 text-sm">
{errors.repeatPassword.message}
</span>
)}
</div>
</div>
</div>
{/* Final Section */}
<div className="border dark:border-gray-800 border-gray-300 rounded mt-4 flex flex-col">
<div className="p-4 border-b dark:border-gray-800 border-gray-300">
<h2 className="text-gray-800 dark:text-gray-200">
Final Customization & Submit
</h2>
</div>
<div className="p-4">
<label className="inline-flex items-center cursor-pointer">
<input
type="checkbox"
className="sr-only peer"
{...register("isAdmin")}
/>
<div className="relative w-11 h-6 bg-gray-200 peer-focus:outline-none peer-focus:ring-4 peer-focus:ring-blue-300 dark:peer-focus:ring-blue-800 rounded-full peer dark:bg-gray-700 peer-checked:after:translate-x-full peer-checked:after:border-white after:content-[''] after:absolute after:top-[2px] after:start-[2px] after:bg-white after:border-gray-300 after:border after:rounded-full after:h-5 after:w-5 after:transition-all dark:border-gray-600 peer-checked:bg-blue-600 dark:peer-checked:bg-blue-600"></div>
<span className="ms-3 text-sm font-medium text-gray-900 dark:text-gray-300">
Is Admin
</span>
</label>
<div className="flex flex-row items-center justify-between gap-2 mt-4">
<Button type="submit">Create</Button>
<Link to="/admin/users">
<Button
variant="text"
className="text-red-400 hover:text-red-500"
>
Cancel
</Button>
</Link>
</div>
</div>
</div>
</form>
</div>
);
};
export default AdminCreateUserPage;

View File

@ -0,0 +1,139 @@
import Breadcrumbs from "@/components/ui/breadcrumbs";
import { Button } from "@/components/ui/button";
import Avatar from "@/feature/Avatar";
import { useUsers } from "@/store/admin/users";
import { useEffect, type FC } from "react";
import { Link, useParams } from "react-router";
const InfoCard = ({
title,
children,
}: {
title: string;
children: React.ReactNode;
}) => (
<div className="border dark:border-gray-800 border-gray-300 rounded mb-4">
<div className="p-4 border-b dark:border-gray-800 border-gray-300">
<h2 className="text-gray-800 dark:text-gray-200 font-semibold text-lg">
{title}
</h2>
</div>
<div className="p-4">{children}</div>
</div>
);
const AdminViewUserPage: FC = () => {
const { userId } = useParams();
const user = useUsers((state) => state.current);
// const loading = useApiServices((state) => state.fetchingApiService);
const loadUser = useUsers((state) => state.fetchUser);
useEffect(() => {
if (typeof userId === "string") loadUser(userId);
}, [loadUser, userId]);
if (!user) {
return (
<div className="p-4 flex items-center justify-center h-[60vh]">
<div className="text-center">
<div className="animate-spin rounded-full h-8 w-8 border-2 border-blue-500 border-t-transparent mx-auto mb-3" />
<p className="text-gray-600 dark:text-gray-400">Loading User...</p>
</div>
</div>
);
}
return (
<div className="dark:text-gray-200 text-gray-800 p-4">
<Breadcrumbs
items={[
{ href: "/admin", label: "Admin" },
{ href: "/admin/users", label: "Users" },
{ label: "View User" },
]}
/>
<div className="sm:p-4 pt-4">
{/* 📋 Main Details */}
<InfoCard title="Personal Info">
<div className="flex flex-col gap-4 text-sm">
<div className="flex flex-col gap-4">
<span className="font-medium text-gray-900 dark:text-white">
Avatar:
</span>
<Avatar
avatarId={user.profile_picture ?? undefined}
className="w-16 h-16"
iconSize={28}
/>
</div>
<div>
<span className="font-medium text-gray-900 dark:text-white">
Full Name:
</span>{" "}
{user.full_name}
</div>
<div>
<span className="font-medium text-gray-900 dark:text-white">
Email:
</span>{" "}
{user.email}
</div>
<div>
<span className="font-medium text-gray-900 dark:text-white">
Phone Number:
</span>{" "}
{user.phone_number || "-"}{" "}
</div>
<div>
<span className="font-medium text-gray-900 dark:text-white">
Is Admin:
</span>{" "}
<span
className={`font-semibold px-2 py-1 rounded ${
user.is_admin
? "bg-green-200 text-green-800 dark:bg-green-700/20 dark:text-green-300"
: "bg-red-200 text-red-800 dark:bg-red-700/20 dark:text-red-300"
}`}
>
{user.is_admin ? "Yes" : "No"}
</span>
</div>
<div>
<span className="font-medium text-gray-900 dark:text-white">
Created At:
</span>{" "}
{new Date(user.created_at).toLocaleString()}
</div>
<div>
<span className="font-medium text-gray-900 dark:text-white">
Last Login At:
</span>{" "}
{user.last_login
? new Date(user.last_login).toLocaleString()
: "never"}
</div>
</div>
</InfoCard>
{/* 🚀 Actions */}
<div className="flex flex-wrap gap-4 mt-6 justify-between items-center">
<Link to="/admin/users">
<Button variant="outlined">Back</Button>
</Link>
<div className="flex flex-row items-center gap-4">
<Link
to={`/admin/users/edit/${userId}`}
className="hover:underline hover:text-gray-600 dark:hover:text-gray-300 transition-colors"
>
<Button variant="contained">Edit</Button>
</Link>
</div>
</div>
</div>
</div>
);
};
export default AdminViewUserPage;

View File

@ -0,0 +1,135 @@
import Breadcrumbs from "@/components/ui/breadcrumbs";
import { Button } from "@/components/ui/button";
import Avatar from "@/feature/Avatar";
import { useUsers } from "@/store/admin/users";
import { UserPlus } from "lucide-react";
import { useEffect, type FC } from "react";
import { Link } from "react-router";
const AdminUsersPage: FC = () => {
const users = useUsers((state) => state.users);
const loading = useUsers((state) => state.fetching);
const fetchUsers = useUsers((state) => state.fetchUsers);
useEffect(() => {
fetchUsers();
}, [fetchUsers]);
return (
<div className="relative flex flex-col items-stretch w-full">
<div className="p-4">
<Breadcrumbs
className="pb-2"
items={[
{
href: "/admin",
label: "Admin",
},
{
label: "Users",
},
]}
/>
</div>
<div className="p-4 flex flex-row items-center justify-between">
<p className="text-gray-800 dark:text-gray-300">Search...</p>
<Link to="/admin/users/create">
<Button className="flex flex-row items-center gap-2">
<UserPlus /> Add User
</Button>
</Link>
</div>
<div className="flex-1 overflow-x-auto">
<table className="relative min-w-full border-l-0 border border-gray-300 dark:border-gray-700 border-collapse divide-y divide-gray-200 dark:divide-gray-800">
{loading && (
<div className="absolute inset-0 z-10 flex items-center justify-center bg-white/60 dark:bg-gray-900/60 backdrop-blur-sm">
<div className="text-gray-800 dark:text-gray-200 font-medium">
Loading...
</div>
</div>
)}
<thead className="bg-black/5 dark:bg-white/5 text-nowrap">
<tr>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Full Name
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Email
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Is Admin
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Created At
</th>
<th className="px-6 py-3 text-left text-sm font-semibold text-gray-700 dark:text-white/70 border border-l-0 border-gray-300 dark:border-gray-700">
Last Login
</th>
</tr>
</thead>
<tbody className="divide-y divide-gray-200 dark:divide-gray-700">
{!loading && users.length === 0 ? (
<tr>
<td
colSpan={5}
className="px-6 py-12 text-center text-gray-500 dark:text-gray-400"
>
No users found.
</td>
</tr>
) : (
users.map((user) => (
<tr
key={user.id}
className="hover:bg-gray-50 dark:hover:bg-gray-800"
>
<td className="px-6 py-4 text-sm font-medium text-blue-600 border border-gray-300 dark:border-gray-700">
<Link
to={`/admin/users/view/${user.id}`}
className="hover:underline hover:text-gray-600 dark:hover:text-gray-300 transition-colors"
>
<div className="flex flex-row items-center gap-3">
<Avatar
iconSize={21}
className="w-8 h-8"
avatarId={user.profile_picture ?? undefined}
/>
<p>{user.full_name}</p>
</div>
</Link>
</td>
<td className="px-6 py-4 text-sm text-gray-700 dark:text-gray-300 border border-gray-300 dark:border-gray-700">
{user.email}
</td>
<td className="px-6 py-4 text-sm border border-gray-300 dark:border-gray-700">
<span
className={`inline-block px-2 py-1 text-xs rounded-full font-semibold ${
user.is_admin
? "bg-green-100 text-green-800 dark:bg-green-900 dark:text-green-300"
: "bg-red-100 text-red-800 dark:bg-red-900 dark:text-red-300"
}`}
>
{user.is_admin ? "Yes" : "No"}
</span>
</td>
<td className="px-6 py-4 text-sm text-gray-500 dark:text-gray-400 border border-gray-300 dark:border-gray-700">
{new Date(user.created_at).toLocaleString()}
</td>
<td className="px-6 py-4 text-sm text-gray-500 dark:text-gray-400 border border-gray-300 dark:border-gray-700">
{user.last_login
? new Date(user.last_login).toLocaleString()
: "never"}
</td>
</tr>
))
)}
</tbody>
</table>
</div>
</div>
);
};
export default AdminUsersPage;

View File

@ -1,7 +1,7 @@
import { useCallback, type FC } from "react"; import { useCallback, useEffect, type FC } from "react";
import { Card, CardContent } from "@/components/ui/card"; import { Card, CardContent } from "@/components/ui/card";
import { ArrowLeftRight, ChevronDown } from "lucide-react"; import { ArrowLeftRight, ChevronDown, LayoutDashboard } from "lucide-react";
import { Button } from "@/components/ui/button"; import { Button } from "@/components/ui/button";
import Avatar from "@/feature/Avatar"; import Avatar from "@/feature/Avatar";
import { useAuth } from "@/store/auth"; import { useAuth } from "@/store/auth";
@ -13,6 +13,12 @@ const AuthorizePage: FC = () => {
const profile = useAuth((state) => state.profile); const profile = useAuth((state) => state.profile);
const fetchService = useOAuth((s) => s.fetchApiService);
const fetching = useOAuth((s) => s.fetching);
const clientId = useOAuth((s) => s.clientID);
const apiService = useOAuth((s) => s.apiService);
const selectSession = useOAuth((state) => state.selectSession); const selectSession = useOAuth((state) => state.selectSession);
const handleAgree = useCallback(() => { const handleAgree = useCallback(() => {
@ -20,12 +26,44 @@ const AuthorizePage: FC = () => {
selectSession(activeAccount.access); selectSession(activeAccount.access);
}, [activeAccount, selectSession]); }, [activeAccount, selectSession]);
useEffect(() => {
if (clientId) {
fetchService();
}
}, [clientId, fetchService]);
return ( return (
<div <div
className={`relative min-h-screen bg-cover bg-center bg-white dark:bg-black bg-[url(/overlay.jpg)] dark:bg-[url(/dark-overlay.jpg)]`} className={`relative min-h-screen bg-cover bg-center bg-white dark:bg-black bg-[url(/overlay.jpg)] dark:bg-[url(/dark-overlay.jpg)]`}
> >
<div className="relative z-10 flex items-center justify-center min-h-screen"> <div className="relative z-10 flex items-center justify-center min-h-screen">
<Card className="sm:w-[425px] sm:min-w-[425px] sm:max-w-96 sm:min-h-auto p-3 min-h-screen w-full min-w-full shadow-lg bg-white/65 dark:bg-black/65 backdrop-blur-md"> <Card
className={`relative sm:w-[425px] sm:min-w-[425px] sm:max-w-96 sm:min-h-auto min-h-screen w-full min-w-full shadow-lg bg-white/65 dark:bg-black/65 backdrop-blur-md ${!fetching ? "p-3" : ""}`}
>
{fetching && (
<div
role="status"
className="absolute w-full h-full flex-1 flex items-center justify-center bg-black/25 dark:bg-white/25"
>
<svg
aria-hidden="true"
className="w-12 h-12 text-gray-400 animate-spin fill-white"
viewBox="0 0 100 101"
fill="none"
xmlns="http://www.w3.org/2000/svg"
>
<path
d="M100 50.5908C100 78.2051 77.6142 100.591 50 100.591C22.3858 100.591 0 78.2051 0 50.5908C0 22.9766 22.3858 0.59082 50 0.59082C77.6142 0.59082 100 22.9766 100 50.5908ZM9.08144 50.5908C9.08144 73.1895 27.4013 91.5094 50 91.5094C72.5987 91.5094 90.9186 73.1895 90.9186 50.5908C90.9186 27.9921 72.5987 9.67226 50 9.67226C27.4013 9.67226 9.08144 27.9921 9.08144 50.5908Z"
fill="currentColor"
/>
<path
d="M93.9676 39.0409C96.393 38.4038 97.8624 35.9116 97.0079 33.5539C95.2932 28.8227 92.871 24.3692 89.8167 20.348C85.8452 15.1192 80.8826 10.7238 75.2124 7.41289C69.5422 4.10194 63.2754 1.94025 56.7698 1.05124C51.7666 0.367541 46.6976 0.446843 41.7345 1.27873C39.2613 1.69328 37.813 4.19778 38.4501 6.62326C39.0873 9.04874 41.5694 10.4717 44.0505 10.1071C47.8511 9.54855 51.7191 9.52689 55.5402 10.0491C60.8642 10.7766 65.9928 12.5457 70.6331 15.2552C75.2735 17.9648 79.3347 21.5619 82.5849 25.841C84.9175 28.9121 86.7997 32.2913 88.1811 35.8758C89.083 38.2158 91.5421 39.6781 93.9676 39.0409Z"
fill="currentFill"
/>
</svg>
<span className="sr-only">Loading...</span>
</div>
)}
<div className="flex flex-col items-center pt-10 sm:pt-0"> <div className="flex flex-col items-center pt-10 sm:pt-0">
<div className="flex flex-col items-center flex-5/6"> <div className="flex flex-col items-center flex-5/6">
{/* <img {/* <img
@ -38,22 +76,27 @@ const AuthorizePage: FC = () => {
<div className="text-gray-400 dark:text-gray-600"> <div className="text-gray-400 dark:text-gray-600">
<ArrowLeftRight /> <ArrowLeftRight />
</div> </div>
<div className="p-2 rounded-full bg-gray-900 ring ring-gray-400 dark:ring dark:ring-gray-500"> <div className="w-12 h-12 rounded-full flex items-center justify-center overflow-hidden bg-gray-900 ring ring-gray-400 dark:ring dark:ring-gray-500">
{/* <img {/* <img
src="https://lucide.dev/logo.dark.svg" src="https://lucide.dev/logo.dark.svg"
className="w-8 h-8" className="w-8 h-8"
/> */} /> */}
<img {apiService?.icon_url ? (
src="https://developer.mozilla.org/favicon.svg" <img
className="w-8 h-8" src={apiService.icon_url}
/> className="w-full h-full"
alt="service_icon"
/>
) : (
<LayoutDashboard size={32} color="#fefefe" />
)}
</div> </div>
</div> </div>
<div className="px-4 sm:mt-4 mt-8"> <div className="px-4 sm:mt-4 mt-8">
<h2 className="text-2xl font-medium text-gray-800 dark:text-gray-300 text-center w-full mb-2"> <h2 className="text-2xl font-medium text-gray-800 dark:text-gray-300 text-center w-full mb-2">
<a href="#" className="text-blue-500"> <a href="#" className="text-blue-500">
MDN Lab Services {apiService?.name ?? "Service"}
</a>{" "} </a>{" "}
wants to access your Home Account wants to access your Home Account
</h2> </h2>
@ -73,7 +116,7 @@ const AuthorizePage: FC = () => {
<h4 className="text-base mb-3 text-gray-400 dark:text-gray-500 text-left"> <h4 className="text-base mb-3 text-gray-400 dark:text-gray-500 text-left">
This will allow{" "} This will allow{" "}
<a href="#" className="text-blue-500"> <a href="#" className="text-blue-500">
MDN Lab Services {apiService?.name ?? "service"}
</a>{" "} </a>{" "}
to: to:
</h4> </h4>
@ -83,23 +126,26 @@ const AuthorizePage: FC = () => {
{/* <LogIn className="w-8 h-8 text-gray-700 mb-4" /> */} {/* <LogIn className="w-8 h-8 text-gray-700 mb-4" /> */}
<CardContent className="w-full space-y-4 text-sm"> <CardContent className="w-full space-y-4 text-sm">
<div className="flex flex-col gap-3 mb-8"> <div className="flex flex-col gap-3 mb-8">
<div className="flex flex-row items-center justify-between text-gray-600 dark:text-gray-400"> {(apiService?.scopes?.length ?? 0) > 0 &&
<div className="flex flex-row items-center gap-4"> apiService!.scopes.map((scope) => (
<div className="w-3 h-3 rounded-full bg-blue-500"></div> <div className="flex flex-row items-center justify-between text-gray-600 dark:text-gray-400">
<p>View your full name, email and profile image</p> <div className="flex flex-row items-center gap-4">
</div> <div className="w-3 h-3 rounded-full bg-blue-500"></div>
</div> <p>
<div className="flex flex-row items-center justify-between text-gray-600 dark:text-gray-400"> {scope === "openid" &&
<div className="flex flex-row items-center gap-4"> "Access your account id and use it"}
<div className="w-3 h-3 rounded-full bg-blue-500"></div> {scope === "email" && "View your email address"}
<p>View your permission from "MDN" group</p> {scope === "profile" && "View your profile image"}
</div> </p>
</div> </div>
</div>
))}
</div> </div>
<div className="mb-10"> <div className="mb-10">
<p className="font-medium mb-4 dark:text-gray-200"> <p className="font-medium mb-4 dark:text-gray-200">
Are you sure you want to trust MDN Lab Services? Are you sure you want to trust {apiService?.name ?? "service"}
?
</p> </p>
<p className="text-sm text-gray-400 dark:text-gray-500"> <p className="text-sm text-gray-400 dark:text-gray-500">
Please do not share any sensitive, personal, or unnecessary Please do not share any sensitive, personal, or unnecessary

View File

@ -12,9 +12,7 @@ const IndexPage: FC = () => {
return ( return (
<div className="flex flex-col items-center gap-2 p-7"> <div className="flex flex-col items-center gap-2 p-7">
<div className="w-24 h-24 sm:w-36 sm:h-36 overflow-hidden rounded-full flex items-center justify-center bg-gray-300"> <Avatar iconSize={64} className="w-24 h-24 sm:w-36 sm:h-36" />
<Avatar iconSize={64} />
</div>
<h1 className="dark:text-gray-200 text-gray-800 text-2xl select-none"> <h1 className="dark:text-gray-200 text-gray-800 text-2xl select-none">
Welcome, {profile?.full_name} Welcome, {profile?.full_name}
</h1> </h1>

View File

@ -62,8 +62,9 @@ export default function LoginPage() {
} catch (err: any) { } catch (err: any) {
console.log(err); console.log(err);
setError( setError(
"Failed to create account. " + err.response?.data?.error ??
(err.message ?? "Unexpected error happened"), err.message ??
"Unexpected error happened",
); );
} finally { } finally {
setLoading(false); setLoading(false);

View File

@ -38,9 +38,7 @@ const PersonalInfoPage: FC = () => {
</p> </p>
</div> </div>
<div> <div>
<div className="w-16 h-16 overflow-hidden rounded-full dark:bg-gray-400 bg-gray-700"> <Avatar iconSize={28} className="w-16 h-16" />
<Avatar iconSize={12} />
</div>
</div> </div>
</div> </div>

View File

@ -0,0 +1,202 @@
import { Button } from "@/components/ui/button";
import { useAuth } from "@/store/auth";
import { useVerify } from "@/store/verify";
import { User } from "lucide-react";
import { useCallback, useEffect, useRef, useState, type FC } from "react";
import { Link } from "react-router";
const VerifyAvatarPage: FC = () => {
const profile = useAuth((s) => s.profile);
const videoRef = useRef<HTMLVideoElement | null>(null);
const canvasRef = useRef<HTMLCanvasElement | null>(null);
const [stream, setStream] = useState<MediaStream | null>(null);
const [avatar, setAvatar] = useState<string | null>(null);
const [error, setError] = useState<string | null>(null);
const [takingPicture, setTakingPicture] = useState(false);
const fileInputRef = useRef<HTMLInputElement | null>(null);
const uploadAvatar = useVerify((s) => s.uploadAvatar);
const uploading = useVerify((s) => s.uploading);
useEffect(() => {
if (profile?.profile_picture) setAvatar(profile.profile_picture);
}, [profile?.profile_picture]);
// Request camera stream
useEffect(() => {
if (!takingPicture) return;
if (!navigator.mediaDevices?.getUserMedia) {
setError("Camera not supported on this device/browser.");
return;
}
navigator.mediaDevices
.getUserMedia({ video: true })
.then((mediaStream) => {
setStream(mediaStream);
setError(null);
if (videoRef.current) {
videoRef.current.srcObject = mediaStream;
}
})
.catch(() => setError("Unable to access camera."));
return () => {
// Clean up camera stream when component unmounts or stops taking picture
if (stream) {
stream.getTracks().forEach((track) => track.stop());
setStream(null);
}
};
// eslint-disable-next-line
}, [takingPicture]);
const handleTakePicture = useCallback(() => {
setTakingPicture(true);
}, []);
const handleCapture = useCallback(() => {
if (!videoRef.current || !canvasRef.current) return;
const context = canvasRef.current.getContext("2d");
if (!context) return;
// Set canvas size to video size
canvasRef.current.width = videoRef.current.videoWidth;
canvasRef.current.height = videoRef.current.videoHeight;
context.drawImage(
videoRef.current,
0,
0,
videoRef.current.videoWidth,
videoRef.current.videoHeight,
);
const imageData = canvasRef.current.toDataURL("image/png");
setAvatar(imageData);
setTakingPicture(false);
}, []);
const handleSelectFromDevice = useCallback(() => {
fileInputRef.current?.click();
}, []);
const handleFileChange = useCallback(
(e: React.ChangeEvent<HTMLInputElement>) => {
const file = e.target.files?.[0];
if (!file) return;
if (!file.type.startsWith("image/")) {
setError("Please select an image file.");
return;
}
const reader = new FileReader();
reader.onload = (event) => {
setAvatar(event.target?.result as string);
setError(null);
};
reader.readAsDataURL(file);
},
[],
);
const handleRetake = useCallback(() => {
setAvatar(null);
setTakingPicture(false);
}, []);
const handleUpload = useCallback(async () => {
if (!avatar) return;
const res = await fetch(avatar);
const blob = await res.blob();
const file = new File([blob], "avatar.png", { type: blob.type });
uploadAvatar(file);
}, [avatar, uploadAvatar]);
return (
<div className="w-full sm:max-w-sm mx-auto p-4">
<div className="flex flex-col gap-2 w-full max-w-xs mx-auto">
<h1 className="text-xl font-medium dark:text-gray-200">
Profile Picture
</h1>
<p className="dark:text-gray-400 mb-6">
Please take a photo of yourself for your avatar in order to continue.
</p>
<div className="relative w-48 h-48 mx-auto rounded-full border-4 border-blue-500 overflow-hidden bg-gray-100 dark:bg-gray-800 flex items-center justify-center mb-6">
{takingPicture ? (
<video
ref={videoRef}
autoPlay
playsInline
className="w-full h-full object-cover rounded-lg bg-black"
/>
) : avatar ? (
<img
src={avatar}
alt="Avatar"
className="w-full h-full object-cover"
/>
) : (
<span className="text-4xl text-gray-400">
<User size={48} />
</span>
)}
</div>
{error && <div className="text-red-500 text-center">{error}</div>}
{/* File input (hidden) */}
<input
ref={fileInputRef}
type="file"
accept="image/*"
className="hidden"
onChange={handleFileChange}
/>
{!avatar && !takingPicture && (
<Button onClick={handleTakePicture}>Take Photo</Button>
)}
{!avatar && !takingPicture && (
<Button variant="outlined" onClick={handleSelectFromDevice}>
Pick from Device
</Button>
)}
{takingPicture && (
<div className="flex flex-col items-center gap-2 w-full">
<Button onClick={handleCapture}>Capture</Button>
<Button variant="outlined" onClick={() => setTakingPicture(false)}>
Cancel
</Button>
</div>
)}
{/* Hidden canvas for snapshot */}
<canvas ref={canvasRef} style={{ display: "none" }} />
{avatar && (
<>
<Link to="/verify/review" className="w-full">
<Button
className="w-full"
loading={uploading}
disabled={uploading}
onClick={handleUpload}
>
Next
</Button>
</Link>
<Button
className="border-yellow-500 text-yellow-500 hover:border-yellow-600 hover:text-yellow-600"
variant="outlined"
onClick={handleRetake}
>
Retake/Choose Another
</Button>
</>
)}
</div>
</div>
);
};
export default VerifyAvatarPage;

View File

@ -0,0 +1,48 @@
import { Button } from "@/components/ui/button";
import { Input } from "@/components/ui/input";
import { useVerify } from "@/store/verify";
import { useCallback, useState, type FC } from "react";
const VerifyEmailOtpPage: FC = () => {
const [otp, setOtp] = useState("");
const confirmOtp = useVerify((s) => s.confirmOTP);
const confirming = useVerify((s) => s.confirming);
const handleVerify = useCallback(() => {
if (otp.length !== 6) return;
confirmOtp({
otp,
});
}, [confirmOtp, otp]);
return (
<div className="flex flex-col items-stretch gap-2 max-w-sm mx-auto p-4">
<h1 className="text-xl font-medium dark:text-gray-200">
OTP Verification
</h1>
<p className="text-sm dark:text-gray-400">
We've sent you verification code on your email address, please open your
mailbox and enter the verification code in order to continue.
</p>
<Input
placeholder="Enter OTP"
value={otp}
onChange={(e) => {
e.preventDefault();
setOtp(e.target.value);
}}
/>
<Button
className="mt-3 w-full"
onClick={handleVerify}
loading={confirming}
disabled={confirming}
>
Verify
</Button>
</div>
);
};
export default VerifyEmailOtpPage;

Some files were not shown because too many files have changed in this diff Show More