package handlers import ( "context" "github.com/labstack/echo/v4" "github.com/labstack/echo/v4/middleware" "git.jamestombleson.com/jtom38/newsbot-portal/apiclient" "git.jamestombleson.com/jtom38/newsbot-portal/internal/config" ) const ( ErrParameterIdMissing = "The requested parameter ID was not found." ErrParameterMissing = "The requested parameter was not found found:" ErrUnableToParseId = "Unable to parse the requested ID" ErrRecordMissing = "The requested record was not found" ErrFailedToCreateRecord = "The record was not created due to a database problem" ErrFailedToUpdateRecord = "The requested record was not updated due to a database problem" ErrUserUnknown = "User is unknown" ErrYouDontOwnTheRecord = "The record requested does not belong to you" ResponseMessageSuccess = "Success" ) var ( ErrIdValueMissing string = "id value is missing" ErrValueNotUuid string = "a value given was expected to be a uuid but was not correct." ErrNoRecordFound string = "no record was found." ErrUnableToConvertToJson string = "Unable to convert to json" ) type Handler struct { Router *echo.Echo config config.Configs api apiclient.ApiClient } func NewServer(ctx context.Context, configs config.Configs, apiClient apiclient.ApiClient) *Handler { s := &Handler{ config: configs, api: apiClient, } //jwtConfig := echojwt.Config{ // NewClaimsFunc: func(c echo.Context) jwt.Claims { // return new(JwtToken) // }, // SigningKey: []byte(configs.JwtSecret), //} router := echo.New() router.Pre(middleware.RemoveTrailingSlash()) router.Pre(middleware.Logger()) router.Pre(middleware.Recover()) router.GET("/", s.HomeIndex) router.GET("/about", s.HomeAbout) debug := router.Group("/debug") debug.GET("/cookies", s.DebugCookies) articles := router.Group("/articles") articles.GET("", s.ArticlesList) users := router.Group("/users") users.GET("/login", s.UserLogin) users.POST("/login", s.UserAfterLogin) users.GET("/signup", s.UserSignUp) users.POST("/signup", s.UserAfterSignUp) s.Router = router return s } // If the token is not valid then an json error will be returned. // If the token has the wrong scope, a json error will be returned. // If the token passes all the checks, it is valid and is returned back to the caller. //func (s *Handler) ValidateJwtToken(c echo.Context, requiredScope string) (JwtToken, error) { // token, err := s.getJwtTokenFromContext(c) // if err != nil { // s.WriteMessage(c, ErrJwtMissing, http.StatusUnauthorized) // } // // err = token.hasExpired() // if err != nil { // return JwtToken{}, errors.New(ErrJwtExpired) // //s.WriteMessage(c, ErrJwtExpired, http.StatusUnauthorized) // } // // err = token.hasScope(requiredScope) // if err != nil { // return JwtToken{}, errors.New(ErrJwtScopeMissing) // //s.WriteMessage(c, ErrJwtScopeMissing, http.StatusUnauthorized) // } // // if token.Iss != s.config.ServerAddress { // return JwtToken{}, errors.New(ErrJwtInvalidIssuer) // //s.WriteMessage(c, ErrJwtInvalidIssuer, http.StatusUnauthorized) // } // // return token, nil //} //func (s *Handler) GetUserIdFromJwtToken(c echo.Context) int64 { // token, err := s.getJwtTokenFromContext(c) // if err != nil { // s.WriteMessage(c, ErrJwtMissing, http.StatusUnauthorized) // } // // return token.GetUserId() //}