* feat(auth): add email verification login flow with 401 auto-redirect Replace the old OAuth-based login with email verification codes: - Backend: send-code / verify-code endpoints, verification_codes table (migration 009), rate limiting, Resend email service - Frontend: two-step login UI (email → 6-digit OTP), auth store with sendCode/verifyCode - SDK: ApiClient gains onUnauthorized callback; 401 responses auto-clear token and redirect to /login - Fix login button staying disabled due to global isLoading state Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * fix(auth): add brute-force protection, redirect loop guard, and expired code cleanup - VerifyCode: increment attempts on wrong code, reject after 5 failed tries (migration 010) - onUnauthorized: skip redirect if already on /login to prevent infinite loops - SendCode: best-effort cleanup of expired verification codes older than 1 hour Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * feat(auth): add master verification code for non-production environments Allow code "888888" to bypass email verification in non-production environments to simplify development and testing workflows. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * feat(auth): add personal access tokens for CLI and API authentication Add full-stack PAT support: users create tokens in Settings, CLI authenticates via `multica auth login`. Server stores SHA-256 hashes only. Auth middleware extended to accept both JWTs and PATs (distinguished by `mul_` prefix). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
132 lines
3.3 KiB
Go
132 lines
3.3 KiB
Go
package handler
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/http"
|
|
"time"
|
|
|
|
"github.com/go-chi/chi/v5"
|
|
"github.com/jackc/pgx/v5/pgtype"
|
|
"github.com/multica-ai/multica/server/internal/auth"
|
|
db "github.com/multica-ai/multica/server/pkg/db/generated"
|
|
)
|
|
|
|
type PersonalAccessTokenResponse struct {
|
|
ID string `json:"id"`
|
|
Name string `json:"name"`
|
|
Prefix string `json:"token_prefix"`
|
|
ExpiresAt *string `json:"expires_at"`
|
|
LastUsedAt *string `json:"last_used_at"`
|
|
CreatedAt string `json:"created_at"`
|
|
}
|
|
|
|
type CreatePATResponse struct {
|
|
PersonalAccessTokenResponse
|
|
Token string `json:"token"`
|
|
}
|
|
|
|
func patToResponse(pat db.PersonalAccessToken) PersonalAccessTokenResponse {
|
|
return PersonalAccessTokenResponse{
|
|
ID: uuidToString(pat.ID),
|
|
Name: pat.Name,
|
|
Prefix: pat.TokenPrefix,
|
|
ExpiresAt: timestampToPtr(pat.ExpiresAt),
|
|
LastUsedAt: timestampToPtr(pat.LastUsedAt),
|
|
CreatedAt: timestampToString(pat.CreatedAt),
|
|
}
|
|
}
|
|
|
|
type CreatePATRequest struct {
|
|
Name string `json:"name"`
|
|
ExpiresInDays *int `json:"expires_in_days"`
|
|
}
|
|
|
|
func (h *Handler) CreatePersonalAccessToken(w http.ResponseWriter, r *http.Request) {
|
|
userID, ok := requireUserID(w, r)
|
|
if !ok {
|
|
return
|
|
}
|
|
|
|
var req CreatePATRequest
|
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
|
writeError(w, http.StatusBadRequest, "invalid request body")
|
|
return
|
|
}
|
|
if req.Name == "" {
|
|
writeError(w, http.StatusBadRequest, "name is required")
|
|
return
|
|
}
|
|
|
|
rawToken, err := auth.GeneratePATToken()
|
|
if err != nil {
|
|
writeError(w, http.StatusInternalServerError, "failed to generate token")
|
|
return
|
|
}
|
|
|
|
var expiresAt pgtype.Timestamptz
|
|
if req.ExpiresInDays != nil && *req.ExpiresInDays > 0 {
|
|
expiresAt = pgtype.Timestamptz{
|
|
Time: time.Now().Add(time.Duration(*req.ExpiresInDays) * 24 * time.Hour),
|
|
Valid: true,
|
|
}
|
|
}
|
|
|
|
prefix := rawToken
|
|
if len(prefix) > 12 {
|
|
prefix = prefix[:12]
|
|
}
|
|
|
|
pat, err := h.Queries.CreatePersonalAccessToken(r.Context(), db.CreatePersonalAccessTokenParams{
|
|
UserID: parseUUID(userID),
|
|
Name: req.Name,
|
|
TokenHash: auth.HashToken(rawToken),
|
|
TokenPrefix: prefix,
|
|
ExpiresAt: expiresAt,
|
|
})
|
|
if err != nil {
|
|
writeError(w, http.StatusInternalServerError, "failed to create token")
|
|
return
|
|
}
|
|
|
|
writeJSON(w, http.StatusCreated, CreatePATResponse{
|
|
PersonalAccessTokenResponse: patToResponse(pat),
|
|
Token: rawToken,
|
|
})
|
|
}
|
|
|
|
func (h *Handler) ListPersonalAccessTokens(w http.ResponseWriter, r *http.Request) {
|
|
userID, ok := requireUserID(w, r)
|
|
if !ok {
|
|
return
|
|
}
|
|
|
|
pats, err := h.Queries.ListPersonalAccessTokensByUser(r.Context(), parseUUID(userID))
|
|
if err != nil {
|
|
writeError(w, http.StatusInternalServerError, "failed to list tokens")
|
|
return
|
|
}
|
|
|
|
resp := make([]PersonalAccessTokenResponse, len(pats))
|
|
for i, pat := range pats {
|
|
resp[i] = patToResponse(pat)
|
|
}
|
|
writeJSON(w, http.StatusOK, resp)
|
|
}
|
|
|
|
func (h *Handler) RevokePersonalAccessToken(w http.ResponseWriter, r *http.Request) {
|
|
userID, ok := requireUserID(w, r)
|
|
if !ok {
|
|
return
|
|
}
|
|
|
|
id := chi.URLParam(r, "id")
|
|
if err := h.Queries.RevokePersonalAccessToken(r.Context(), db.RevokePersonalAccessTokenParams{
|
|
ID: parseUUID(id),
|
|
UserID: parseUUID(userID),
|
|
}); err != nil {
|
|
writeError(w, http.StatusInternalServerError, "failed to revoke token")
|
|
return
|
|
}
|
|
|
|
w.WriteHeader(http.StatusNoContent)
|
|
}
|