drone/internal/api/handler/account/login.go
Johannes Batzill 1115a5083b Add Paths support and error improvements (#11)
This change is adding the concept of Paths.
A repository and space always have a Primary Path which always is represents the ancestry to the root space.
All access history / resource visibility / child listings / UI traversal / etc. is done via that path.

Additionally, repos and spaces can have Alias Paths, which as the name states are aliases. via the primary path.
They sole impact is that a space or repo can be reached via different paths from the UI / rest apis / git apis.
This fulfills two major purposes:
- Customers can rename or move projects and spaces without breaking any existing references from CI pipeliens / code bases / local repos / ...
- Customer can create shorter aliases for important repos when in harness embeded mode! (acc/org/proj/repo can be shortened to acc/repo, or acc/repo'

Apart from the path changes, this PR adds:

Improved User facing errors
Improved internal error handling and wrapping
update / rename operation for repo and space
path list / delete / create operation for repo and space
2022-09-08 21:39:15 -07:00

80 lines
2.0 KiB
Go

// Copyright 2021 Harness Inc. All rights reserved.
// Use of this source code is governed by the Polyform Free Trial License
// that can be found in the LICENSE.md file for this repository.
package account
import (
"net/http"
"time"
"github.com/harness/gitness/internal/api/render"
"github.com/harness/gitness/internal/store"
"github.com/harness/gitness/internal/token"
"github.com/harness/gitness/types"
"github.com/rs/zerolog/hlog"
"golang.org/x/crypto/bcrypt"
)
// HandleLogin returns an http.HandlerFunc that authenticates
// the user and returns an authentication token on success.
func HandleLogin(users store.UserStore, system store.SystemStore) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
ctx := r.Context()
log := hlog.FromRequest(r)
username := r.FormValue("username")
password := r.FormValue("password")
user, err := users.FindEmail(ctx, username)
if err != nil {
log.Debug().Err(err).
Str("user", username).
Msg("cannot find user")
// always give not found error as extra security measurement.
render.NotFoundf(w, "Invalid email or password")
return
}
err = bcrypt.CompareHashAndPassword(
[]byte(user.Password),
[]byte(password),
)
if err != nil {
log.Debug().Err(err).
Str("user", username).
Msg("invalid password")
render.NotFoundf(w, "Invalid email or password")
return
}
expires := time.Now().Add(system.Config(ctx).Token.Expire)
token_, err := token.GenerateExp(user, expires.Unix(), user.Salt)
if err != nil {
log.Err(err).
Str("user", username).
Msg("failed to generate token")
render.InternalErrorf(w, "Failed to create session")
return
}
// return the token if the with_user boolean
// query parameter is set to true.
if r.FormValue("return_user") == "true" {
render.JSON(w, &types.UserToken{
User: user,
Token: &types.Token{
Value: token_,
Expires: expires.UTC(),
},
}, 200)
} else {
// else return the token only.
render.JSON(w, &types.Token{Value: token_}, 200)
}
}
}