initial public commit
This commit is contained in:
@@ -0,0 +1,26 @@
|
||||
package tokens
|
||||
|
||||
import (
|
||||
"github.com/golang-jwt/jwt/v4"
|
||||
"github.com/pocketbase/pocketbase/core"
|
||||
"github.com/pocketbase/pocketbase/models"
|
||||
"github.com/pocketbase/pocketbase/tools/security"
|
||||
)
|
||||
|
||||
// NewAdminAuthToken generates and returns a new admin authentication token.
|
||||
func NewAdminAuthToken(app core.App, admin *models.Admin) (string, error) {
|
||||
return security.NewToken(
|
||||
jwt.MapClaims{"id": admin.Id, "type": "admin"},
|
||||
(admin.TokenKey + app.Settings().AdminAuthToken.Secret),
|
||||
app.Settings().AdminAuthToken.Duration,
|
||||
)
|
||||
}
|
||||
|
||||
// NewAdminResetPasswordToken generates and returns a new admin password reset request token.
|
||||
func NewAdminResetPasswordToken(app core.App, admin *models.Admin) (string, error) {
|
||||
return security.NewToken(
|
||||
jwt.MapClaims{"id": admin.Id, "type": "admin", "email": admin.Email},
|
||||
(admin.TokenKey + app.Settings().AdminPasswordResetToken.Secret),
|
||||
app.Settings().AdminPasswordResetToken.Duration,
|
||||
)
|
||||
}
|
||||
@@ -0,0 +1,54 @@
|
||||
package tokens_test
|
||||
|
||||
import (
|
||||
"testing"
|
||||
|
||||
"github.com/pocketbase/pocketbase/tests"
|
||||
"github.com/pocketbase/pocketbase/tokens"
|
||||
)
|
||||
|
||||
func TestNewAdminAuthToken(t *testing.T) {
|
||||
app, _ := tests.NewTestApp()
|
||||
defer app.Cleanup()
|
||||
|
||||
admin, err := app.Dao().FindAdminByEmail("test@example.com")
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
token, err := tokens.NewAdminAuthToken(app, admin)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
tokenAdmin, _ := app.Dao().FindAdminByToken(
|
||||
token,
|
||||
app.Settings().AdminAuthToken.Secret,
|
||||
)
|
||||
if tokenAdmin == nil || tokenAdmin.Id != admin.Id {
|
||||
t.Fatalf("Expected admin %v, got %v", admin, tokenAdmin)
|
||||
}
|
||||
}
|
||||
|
||||
func TestNewAdminResetPasswordToken(t *testing.T) {
|
||||
app, _ := tests.NewTestApp()
|
||||
defer app.Cleanup()
|
||||
|
||||
admin, err := app.Dao().FindAdminByEmail("test@example.com")
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
token, err := tokens.NewAdminResetPasswordToken(app, admin)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
tokenAdmin, _ := app.Dao().FindAdminByToken(
|
||||
token,
|
||||
app.Settings().AdminPasswordResetToken.Secret,
|
||||
)
|
||||
if tokenAdmin == nil || tokenAdmin.Id != admin.Id {
|
||||
t.Fatalf("Expected admin %v, got %v", admin, tokenAdmin)
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,2 @@
|
||||
// Package tokens implements various user and admin tokens generation methods.
|
||||
package tokens
|
||||
@@ -0,0 +1,44 @@
|
||||
package tokens
|
||||
|
||||
import (
|
||||
"github.com/golang-jwt/jwt/v4"
|
||||
"github.com/pocketbase/pocketbase/core"
|
||||
"github.com/pocketbase/pocketbase/models"
|
||||
"github.com/pocketbase/pocketbase/tools/security"
|
||||
)
|
||||
|
||||
// NewUserAuthToken generates and returns a new user authentication token.
|
||||
func NewUserAuthToken(app core.App, user *models.User) (string, error) {
|
||||
return security.NewToken(
|
||||
jwt.MapClaims{"id": user.Id, "type": "user"},
|
||||
(user.TokenKey + app.Settings().UserAuthToken.Secret),
|
||||
app.Settings().UserAuthToken.Duration,
|
||||
)
|
||||
}
|
||||
|
||||
// NewUserVerifyToken generates and returns a new user verification token.
|
||||
func NewUserVerifyToken(app core.App, user *models.User) (string, error) {
|
||||
return security.NewToken(
|
||||
jwt.MapClaims{"id": user.Id, "type": "user", "email": user.Email},
|
||||
(user.TokenKey + app.Settings().UserVerificationToken.Secret),
|
||||
app.Settings().UserVerificationToken.Duration,
|
||||
)
|
||||
}
|
||||
|
||||
// NewUserResetPasswordToken generates and returns a new user password reset request token.
|
||||
func NewUserResetPasswordToken(app core.App, user *models.User) (string, error) {
|
||||
return security.NewToken(
|
||||
jwt.MapClaims{"id": user.Id, "type": "user", "email": user.Email},
|
||||
(user.TokenKey + app.Settings().UserPasswordResetToken.Secret),
|
||||
app.Settings().UserPasswordResetToken.Duration,
|
||||
)
|
||||
}
|
||||
|
||||
// NewUserChangeEmailToken generates and returns a new user change email request token.
|
||||
func NewUserChangeEmailToken(app core.App, user *models.User, newEmail string) (string, error) {
|
||||
return security.NewToken(
|
||||
jwt.MapClaims{"id": user.Id, "type": "user", "email": user.Email, "newEmail": newEmail},
|
||||
(user.TokenKey + app.Settings().UserEmailChangeToken.Secret),
|
||||
app.Settings().UserEmailChangeToken.Duration,
|
||||
)
|
||||
}
|
||||
@@ -0,0 +1,100 @@
|
||||
package tokens_test
|
||||
|
||||
import (
|
||||
"testing"
|
||||
|
||||
"github.com/pocketbase/pocketbase/tests"
|
||||
"github.com/pocketbase/pocketbase/tokens"
|
||||
)
|
||||
|
||||
func TestNewUserAuthToken(t *testing.T) {
|
||||
app, _ := tests.NewTestApp()
|
||||
defer app.Cleanup()
|
||||
|
||||
user, err := app.Dao().FindUserByEmail("test@example.com")
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
token, err := tokens.NewUserAuthToken(app, user)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
tokenUser, _ := app.Dao().FindUserByToken(
|
||||
token,
|
||||
app.Settings().UserAuthToken.Secret,
|
||||
)
|
||||
if tokenUser == nil || tokenUser.Id != user.Id {
|
||||
t.Fatalf("Expected user %v, got %v", user, tokenUser)
|
||||
}
|
||||
}
|
||||
|
||||
func TestNewUserVerifyToken(t *testing.T) {
|
||||
app, _ := tests.NewTestApp()
|
||||
defer app.Cleanup()
|
||||
|
||||
user, err := app.Dao().FindUserByEmail("test@example.com")
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
token, err := tokens.NewUserVerifyToken(app, user)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
tokenUser, _ := app.Dao().FindUserByToken(
|
||||
token,
|
||||
app.Settings().UserVerificationToken.Secret,
|
||||
)
|
||||
if tokenUser == nil || tokenUser.Id != user.Id {
|
||||
t.Fatalf("Expected user %v, got %v", user, tokenUser)
|
||||
}
|
||||
}
|
||||
|
||||
func TestNewUserResetPasswordToken(t *testing.T) {
|
||||
app, _ := tests.NewTestApp()
|
||||
defer app.Cleanup()
|
||||
|
||||
user, err := app.Dao().FindUserByEmail("test@example.com")
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
token, err := tokens.NewUserResetPasswordToken(app, user)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
tokenUser, _ := app.Dao().FindUserByToken(
|
||||
token,
|
||||
app.Settings().UserPasswordResetToken.Secret,
|
||||
)
|
||||
if tokenUser == nil || tokenUser.Id != user.Id {
|
||||
t.Fatalf("Expected user %v, got %v", user, tokenUser)
|
||||
}
|
||||
}
|
||||
|
||||
func TestNewUserChangeEmailToken(t *testing.T) {
|
||||
app, _ := tests.NewTestApp()
|
||||
defer app.Cleanup()
|
||||
|
||||
user, err := app.Dao().FindUserByEmail("test@example.com")
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
token, err := tokens.NewUserChangeEmailToken(app, user, "test_new@example.com")
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
tokenUser, _ := app.Dao().FindUserByToken(
|
||||
token,
|
||||
app.Settings().UserEmailChangeToken.Secret,
|
||||
)
|
||||
if tokenUser == nil || tokenUser.Id != user.Id {
|
||||
t.Fatalf("Expected user %v, got %v", user, tokenUser)
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user