aboutsummaryrefslogtreecommitdiff
path: root/pkg/ext/auth.go
diff options
context:
space:
mode:
authorGabriel Arakaki Giovanini <mail@gabrielgio.me>2023-07-19 21:01:23 +0200
committerGabriel Arakaki Giovanini <mail@gabrielgio.me>2023-07-19 21:01:23 +0200
commitfbcac585cf626917e2baf1d0065c7b632341ba01 (patch)
tree82a0ca1812f92500588c0503cc80b23cffd159e8 /pkg/ext/auth.go
parent52276ba99540d6c61195772ccdd50944e96f4959 (diff)
downloadlens-fbcac585cf626917e2baf1d0065c7b632341ba01.tar.gz
lens-fbcac585cf626917e2baf1d0065c7b632341ba01.tar.bz2
lens-fbcac585cf626917e2baf1d0065c7b632341ba01.zip
ref: Move auth functions to service
Diffstat (limited to 'pkg/ext/auth.go')
-rw-r--r--pkg/ext/auth.go72
1 files changed, 0 insertions, 72 deletions
diff --git a/pkg/ext/auth.go b/pkg/ext/auth.go
deleted file mode 100644
index ed122bb..0000000
--- a/pkg/ext/auth.go
+++ /dev/null
@@ -1,72 +0,0 @@
-package ext
-
-import (
- "bytes"
- "crypto/aes"
- "crypto/cipher"
- "crypto/rand"
- "encoding/gob"
- "errors"
- "io"
-)
-
-type Token struct {
- UserID uint
- Username string
-}
-
-func ReadToken(data []byte, key []byte) (*Token, error) {
- block, err := aes.NewCipher(key)
- if err != nil {
- return nil, err
- }
-
- aesgcm, err := cipher.NewGCM(block)
- if err != nil {
- panic(err.Error())
- }
-
- nonceSize := aesgcm.NonceSize()
- if len(data) < nonceSize {
- return nil, errors.New("nonce size greater than data's size")
- }
-
- nonce, ciphertext := data[:nonceSize], data[nonceSize:]
- plaintext, err := aesgcm.Open(nil, nonce, ciphertext, nil)
- if err != nil {
- return nil, err
- }
-
- r := bytes.NewReader(plaintext)
- var token Token
- dec := gob.NewDecoder(r)
- if err = dec.Decode(&token); err != nil {
- return nil, err
- }
- return &token, nil
-}
-
-func WriteToken(token *Token, key []byte) ([]byte, error) {
- block, err := aes.NewCipher(key)
- if err != nil {
- return nil, err
- }
-
- aesgcm, err := cipher.NewGCM(block)
- if err != nil {
- return nil, err
- }
-
- var buffer bytes.Buffer
- enc := gob.NewEncoder(&buffer)
- if err := enc.Encode(token); err != nil {
- return nil, err
- }
- nonce := make([]byte, aesgcm.NonceSize())
- if _, err = io.ReadFull(rand.Reader, nonce); err != nil {
- return nil, err
- }
-
- ciphertext := aesgcm.Seal(nonce, nonce, buffer.Bytes(), nil)
- return ciphertext, nil
-}