vikunja-api/pkg/routes/api/v1/login.go

123 lines
3.5 KiB
Go
Raw Normal View History

2020-02-07 17:27:45 +01:00
// Vikunja is a to-do list application to facilitate your life.
2020-01-09 18:33:22 +01:00
// Copyright 2018-2020 Vikunja and contributors. All rights reserved.
2018-11-26 21:17:33 +01:00
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
2018-11-26 21:17:33 +01:00
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
2018-11-26 21:17:33 +01:00
//
// You should have received a copy of the GNU General Public License
// along with this program. If not, see <https://www.gnu.org/licenses/>.
2018-11-26 21:17:33 +01:00
2018-06-10 11:34:59 +02:00
package v1
2018-06-10 11:11:41 +02:00
import (
2018-10-31 13:42:38 +01:00
"code.vikunja.io/api/pkg/models"
user2 "code.vikunja.io/api/pkg/user"
2018-12-01 00:26:56 +01:00
"code.vikunja.io/web/handler"
2019-12-07 20:52:04 +01:00
"github.com/dgrijalva/jwt-go"
2019-05-07 21:42:24 +02:00
"github.com/labstack/echo/v4"
2018-06-10 11:11:41 +02:00
"net/http"
)
// Token represents an authentification token
type Token struct {
Token string `json:"token"`
}
2018-06-10 11:11:41 +02:00
// Login is the login handler
// @Summary Login
// @Description Logs a user in. Returns a JWT-Token to authenticate further requests.
// @tags user
// @Accept json
// @Produce json
2020-06-28 16:25:46 +02:00
// @Param credentials body user.Login true "The login credentials"
// @Success 200 {object} v1.Token
// @Failure 400 {object} models.Message "Invalid user password model."
// @Failure 412 {object} models.Message "Invalid totp passcode."
// @Failure 403 {object} models.Message "Invalid username or password."
// @Router /login [post]
2018-06-10 11:11:41 +02:00
func Login(c echo.Context) error {
u := user2.Login{}
2018-07-11 00:28:53 +02:00
if err := c.Bind(&u); err != nil {
2018-06-10 11:11:41 +02:00
return c.JSON(http.StatusBadRequest, models.Message{"Please provide a username and password."})
}
// Check user
user, err := user2.CheckUserCredentials(&u)
2018-06-10 11:11:41 +02:00
if err != nil {
2018-12-01 00:26:56 +01:00
return handler.HandleHTTPError(err, c)
2018-06-10 11:11:41 +02:00
}
totpEnabled, err := user2.TOTPEnabledForUser(user)
if err != nil {
return handler.HandleHTTPError(err, c)
}
if totpEnabled {
_, err = user2.ValidateTOTPPasscode(&user2.TOTPPasscode{
User: user,
Passcode: u.TOTPPasscode,
})
if err != nil {
return handler.HandleHTTPError(err, c)
}
}
2018-06-10 11:11:41 +02:00
// Create token
t, err := NewUserJWTAuthtoken(user)
2019-04-21 20:18:17 +02:00
if err != nil {
return err
}
return c.JSON(http.StatusOK, Token{Token: t})
}
2019-12-07 20:52:04 +01:00
// RenewToken gives a new token to every user with a valid token
// If the token is valid is checked in the middleware.
// @Summary Renew user token
// @Description Returns a new valid jwt user token with an extended length.
// @tags user
// @Accept json
// @Produce json
// @Success 200 {object} v1.Token
// @Failure 400 {object} models.Message "Only user token are available for renew."
// @Router /user/token [post]
func RenewToken(c echo.Context) (err error) {
2019-12-07 20:52:04 +01:00
jwtinf := c.Get("user").(*jwt.Token)
claims := jwtinf.Claims.(jwt.MapClaims)
typ := int(claims["type"].(float64))
if typ == AuthTypeLinkShare {
share := &models.LinkSharing{}
share.ID = int64(claims["id"].(float64))
err := share.ReadOne()
if err != nil {
return handler.HandleHTTPError(err, c)
}
t, err := NewLinkShareJWTAuthtoken(share)
if err != nil {
return handler.HandleHTTPError(err, c)
}
return c.JSON(http.StatusOK, Token{Token: t})
2019-12-07 20:52:04 +01:00
}
user, err := user2.GetUserFromClaims(claims)
2019-12-07 20:52:04 +01:00
if err != nil {
return handler.HandleHTTPError(err, c)
}
// Create token
t, err := NewUserJWTAuthtoken(user)
if err != nil {
return err
}
return c.JSON(http.StatusOK, Token{Token: t})
}