-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20
-
21
-
22
-
23
-
24
-
25
-
26
-
27
-
28
-
29
-
30
-
31
-
32
-
33
-
34
-
35
-
36
-
37
-
38
-
39
-
40
-
41
-
42
-
43
-
44
-
45
-
46
-
47
-
48
-
49
-
50
-
51
-
52
-
53
-
54
-
55
-
56
-
57
-
58
-
59
-
60
-
61
-
62
-
63
-
64
-
65
-
66
-
67
-
68
-
69
-
70
-
71
-
72
-
73
-
74
-
75
-
76
-
77
-
78
-
79
-
80
-
81
-
82
-
83
-
84
-
85
-
86
-
87
-
88
-
89
-
90
-
91
-
92
-
93
-
94
-
95
-
96
-
97
-
98
-
99
-
100
-
101
-
102
-
103
-
104
-
105
-
106
-
107
-
108
-
109
-
110
-
111
-
112
-
113
-
114
-
115
-
116
-
117
-
118
-
119
-
120
-
121
-
122
-
123
-
124
-
125
-
126
-
127
-
128
-
129
-
130
-
131
-
132
-
133
-
134
-
135
-
136
-
137
-
138
-
139
-
140
-
141
-
142
-
143
-
144
-
145
-
146
-
147
-
148
-
149
-
150
-
151
-
152
-
153
-
154
-
155
-
156
-
157
-
158
-
159
-
160
-
161
-
162
-
163
-
164
-
165
-
166
-
167
-
168
-
169
-
170
-
171
-
172
-
173
-
174
-
175
-
176
-
177
-
178
-
179
-
180
-
181
-
182
-
183
-
184
-
185
-
186
-
187
-
188
-
189
-
190
-
191
-
192
-
193
-
194
-
195
-
196
-
197
-
198
-
199
-
200
-
201
-
202
-
203
-
204
-
205
-
206
-
207
-
208
-
209
-
210
-
211
-
212
-
213
-
214
-
215
-
216
-
217
-
218
-
219
-
220
-
221
-
222
-
223
-
224
-
225
-
226
-
227
-
228
-
229
-
230
-
231
-
232
-
233
-
234
-
235
-
236
-
237
-
238
-
239
// Copyright 2025 Shota FUJI
//
// This source code is licensed under Zero-Clause BSD License.
// You can find a copy of the Zero-Clause BSD License at LICENSES/0BSD.txt
// You may also obtain a copy of the Zero-Clause BSD License at
// <https://opensource.org/license/0bsd>
//
// SPDX-License-Identifier: 0BSD
package routes
import (
"bytes"
"database/sql"
_ "embed"
"fmt"
"html/template"
"net/http"
"time"
"github.com/charmbracelet/log"
"github.com/google/uuid"
"google.golang.org/protobuf/proto"
"pocka.jp/x/event_sourcing_user_management_poc/auth"
"pocka.jp/x/event_sourcing_user_management_poc/events"
"pocka.jp/x/event_sourcing_user_management_poc/gen/event"
"pocka.jp/x/event_sourcing_user_management_poc/gen/model"
"pocka.jp/x/event_sourcing_user_management_poc/projections/initial_admin_creation_password"
"pocka.jp/x/event_sourcing_user_management_poc/projections/users"
)
//go:embed initial_admin_creation.html
var initialAdminCreationHtml string
//go:embed logged_in.html.tmpl
var loggedInHTMLTmpl string
//go:embed login.html
var loginHTML string
type loggedInAdminPipeline struct {
DisplayName string
Role string
}
func Handler(db *sql.DB, logger *log.Logger) (http.Handler, error) {
mux := http.NewServeMux()
loggedInAdminHtml, err := template.New("loggedInAdminHtml").Parse(loggedInHTMLTmpl)
if err != nil {
return nil, err
}
mux.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
events, err := events.List(db)
if err != nil {
logger.Error(err)
http.Error(w, "Server error: event loading failure", http.StatusInternalServerError)
return
}
initialAdminPass := initial_admin_creation_password.GetFromUserEvents(events)
if initialAdminPass != nil {
fmt.Fprint(w, initialAdminCreationHtml)
return
}
id, err := r.Cookie("id")
if err != nil {
w.WriteHeader(http.StatusUnauthorized)
fmt.Fprint(w, loginHTML)
return
}
p, _, err := users.GetProjection(db)
if err != nil {
w.Header().Add("Content-Type", "text/html;charset=utf-8")
w.WriteHeader(http.StatusInternalServerError)
fmt.Fprint(w, loginHTML)
return
}
for _, user := range p.Users {
// No real auth. No security.
if *user.Id == id.Value {
loggedInAdminHtml.Execute(w, loggedInAdminPipeline{
DisplayName: *user.DisplayName,
Role: user.Role.String(),
})
return
}
}
w.WriteHeader(http.StatusUnauthorized)
fmt.Fprint(w, loginHTML)
return
})
mux.HandleFunc("/initial-admin", func(w http.ResponseWriter, r *http.Request) {
if r.Method != "POST" {
http.Error(w, "Not found", http.StatusMethodNotAllowed)
return
}
evs, err := events.List(db)
if err != nil {
logger.Error(err)
http.Error(w, "Server error: event loading failure", http.StatusInternalServerError)
return
}
initialAdminPass := initial_admin_creation_password.GetFromUserEvents(evs)
if initialAdminPass == nil {
logger.Debug("Found no active initial admin creation password at POST /initial-admin, redirecting")
http.Redirect(w, r, "/", http.StatusSeeOther)
return
}
r.ParseForm()
username := r.PostForm.Get("username")
email := r.PostForm.Get("email")
password := r.PostForm.Get("password")
initPassword := r.PostForm.Get("init_password")
if username == "" || email == "" || password == "" || initPassword == "" {
w.WriteHeader(http.StatusBadRequest)
fmt.Fprint(w, initialAdminCreationHtml)
return
}
initPwHash := auth.HashPassword(initPassword, initialAdminPass.Salt)
if !bytes.Equal(initialAdminPass.Hash, initPwHash) {
w.WriteHeader(http.StatusUnauthorized)
fmt.Fprint(w, initialAdminCreationHtml)
return
}
pwHash, salt := auth.HashPasswordWithRandomSalt(password)
id := uuid.New().String()
if err := events.Insert(db, []proto.Message{
&event.UserCreated{
Id: proto.String(id),
DisplayName: proto.String(username),
Email: proto.String(email),
},
&event.PasswordLoginConfigured{
UserId: proto.String(id),
PasswordHash: pwHash,
Salt: salt,
},
&event.RoleAssigned{
UserId: proto.String(id),
Role: model.Role.Enum(model.Role_ROLE_ADMIN),
},
}); err != nil {
logger.Error(err)
w.WriteHeader(http.StatusInternalServerError)
fmt.Fprint(w, initialAdminCreationHtml)
return
}
go func() {
logger.Debug("Creating snapshot (trigger=initial admin creation)")
err := users.SaveSnapshot(db)
if err != nil {
logger.Errorf("Failed to update users snapshot: %s", err)
}
logger.Debug("Created snapshot (trigger=initial admin creation)")
}()
// This project is PoC for event sourcing. UI and security is completely out-of-scope.
http.SetCookie(w, &http.Cookie{
Name: "id",
Value: id,
})
http.Redirect(w, r, "/", http.StatusFound)
})
mux.HandleFunc("/login", func(w http.ResponseWriter, r *http.Request) {
r.ParseForm()
p, _, err := users.GetProjection(db)
if err != nil {
w.Header().Add("Content-Type", "text/html;charset=utf-8")
w.WriteHeader(http.StatusInternalServerError)
fmt.Fprint(w, loginHTML)
return
}
email := r.PostForm.Get("email")
password := r.PostForm.Get("password")
if email == "" || password == "" {
w.WriteHeader(http.StatusBadRequest)
fmt.Fprint(w, loginHTML)
return
}
for _, user := range p.Users {
// No real auth. No security.
if *user.Email == email && user.PasswordLogin != nil {
hash := auth.HashPassword(password, user.PasswordLogin.Salt)
if bytes.Equal(user.PasswordLogin.Hash, hash) {
// This project is PoC for event sourcing. UI and security is completely out-of-scope.
http.SetCookie(w, &http.Cookie{
Name: "id",
Value: *user.Id,
})
http.Redirect(w, r, "/", http.StatusFound)
return
}
}
}
w.WriteHeader(http.StatusUnauthorized)
fmt.Fprint(w, loginHTML)
return
})
mux.HandleFunc("/logout", func(w http.ResponseWriter, r *http.Request) {
http.SetCookie(w, &http.Cookie{
Name: "id",
Value: "",
Expires: time.Now(),
})
http.Redirect(w, r, "/", http.StatusFound)
})
return mux, nil
}