Compare commits
	
		
			No commits in common. 'main' and 'drew/lets-go' have entirely different histories. 
		
	
	
		
			main
			...
			drew/lets-
		
	
		
	@ -1,15 +0,0 @@
 | 
			
		||||
kind: pipeline
 | 
			
		||||
type: docker
 | 
			
		||||
name: CI Test Pipeline
 | 
			
		||||
 | 
			
		||||
steps:
 | 
			
		||||
- name: Unit Tests
 | 
			
		||||
  image: golang:1.23
 | 
			
		||||
  privileged: true
 | 
			
		||||
  commands:
 | 
			
		||||
    - go test -v ./...
 | 
			
		||||
 | 
			
		||||
trigger:
 | 
			
		||||
  event:
 | 
			
		||||
    - pull_request
 | 
			
		||||
    - push
 | 
			
		||||
@ -1,74 +0,0 @@
 | 
			
		||||
package main
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"io"
 | 
			
		||||
	"log/slog"
 | 
			
		||||
	"net/http"
 | 
			
		||||
	"net/http/cookiejar"
 | 
			
		||||
	"net/http/httptest"
 | 
			
		||||
	"testing"
 | 
			
		||||
	"time"
 | 
			
		||||
 | 
			
		||||
	"git.runcible.io/learning/ratchet/internal/model/mock"
 | 
			
		||||
	"git.runcible.io/learning/ratchet/internal/server"
 | 
			
		||||
	"github.com/alexedwards/scs/v2"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Create a newTestApplication helper which returns an instance of our
 | 
			
		||||
// application struct containing mocked dependencies.
 | 
			
		||||
func newTestApplication(t *testing.T) *server.RatchetApp {
 | 
			
		||||
 | 
			
		||||
	//tc, err := server.InitTemplateCache()
 | 
			
		||||
	tc, err := server.InitFSTemplateCache()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	sessionManager := scs.New()
 | 
			
		||||
	sessionManager.Lifetime = 12 * time.Hour
 | 
			
		||||
	sessionManager.Cookie.Secure = true
 | 
			
		||||
 | 
			
		||||
	rs := server.NewRatchetApp(slog.New(slog.NewTextHandler(io.Discard, nil)), tc, &mock.SnippetService{}, &mock.UserService{}, sessionManager)
 | 
			
		||||
	return rs
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// create out own test server with additional receiver functions for ease of testing
 | 
			
		||||
type testServer struct {
 | 
			
		||||
	*httptest.Server
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func newTestServer(t *testing.T, h http.Handler) *testServer {
 | 
			
		||||
	ts := httptest.NewTLSServer(h)
 | 
			
		||||
 | 
			
		||||
	jar, err := cookiejar.New(nil)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Any response cookies will be stored and sent on subsequent requests
 | 
			
		||||
	ts.Client().Jar = jar
 | 
			
		||||
 | 
			
		||||
	// Disable redirect-following for test server client by setting custom
 | 
			
		||||
	// CheckRedirect function. Called whenever 3xx response. By returning a
 | 
			
		||||
	// http.ErrUseLastResponse error it forces the client to immediately return
 | 
			
		||||
	// the received response
 | 
			
		||||
	ts.Client().CheckRedirect = func(req *http.Request, via []*http.Request) error {
 | 
			
		||||
		return http.ErrUseLastResponse
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return &testServer{ts}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (ts *testServer) get(t *testing.T, urlPath string) (int, http.Header, string) {
 | 
			
		||||
	resp, err := ts.Client().Get(ts.URL + urlPath)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	defer resp.Body.Close()
 | 
			
		||||
	body, err := io.ReadAll(resp.Body)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
	return resp.StatusCode, resp.Header, string(body)
 | 
			
		||||
}
 | 
			
		||||
@ -1,9 +0,0 @@
 | 
			
		||||
INSERT INTO users VALUES(
 | 
			
		||||
    1337,
 | 
			
		||||
    'tester',
 | 
			
		||||
    'tester@example.com',
 | 
			
		||||
    /* thisisinsecure */
 | 
			
		||||
    '$2a$12$M51w5lWkveAOhwoanoCxO.hJe3s1m8qJuCzbzdETt0SThjpq4BPRq',
 | 
			
		||||
    '2025-02-25 18:58:44',
 | 
			
		||||
    '2025-02-25 18:58:44'
 | 
			
		||||
);
 | 
			
		||||
@ -1,52 +0,0 @@
 | 
			
		||||
package integration
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"database/sql"
 | 
			
		||||
	"os"
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"git.runcible.io/learning/ratchet/migrations"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const testerPasswd = "thisisinsecure"
 | 
			
		||||
 | 
			
		||||
func newTestDB(t *testing.T) *sql.DB {
 | 
			
		||||
	dbFile, err := os.CreateTemp("", "ratchet-*.db")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	db, err := sql.Open("sqlite3", dbFile.Name())
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		db.Close()
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	err = migrations.Migrate(db)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		db.Close()
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	script, err := os.ReadFile("./testdata/seed.sql")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		db.Close()
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	_, err = db.Exec(string(script))
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		db.Close()
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	t.Cleanup(func() {
 | 
			
		||||
		db.Close()
 | 
			
		||||
		err := os.Remove(dbFile.Name())
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			t.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
	})
 | 
			
		||||
 | 
			
		||||
	return db
 | 
			
		||||
}
 | 
			
		||||
@ -1,51 +0,0 @@
 | 
			
		||||
package integration
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"git.runcible.io/learning/ratchet/internal/assert"
 | 
			
		||||
	"git.runcible.io/learning/ratchet/internal/model"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func TestUserModelExists(t *testing.T) {
 | 
			
		||||
	// Skip the test if the "-short" flag is provided when running the test.
 | 
			
		||||
	if testing.Short() {
 | 
			
		||||
		t.Skip("models: skipping model integration test")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	tests := []struct {
 | 
			
		||||
		name   string
 | 
			
		||||
		userID int
 | 
			
		||||
		want   bool
 | 
			
		||||
	}{{
 | 
			
		||||
		name:   "Valid ID",
 | 
			
		||||
		userID: 1337,
 | 
			
		||||
		want:   true,
 | 
			
		||||
	},
 | 
			
		||||
		{
 | 
			
		||||
			name:   "Zero ID",
 | 
			
		||||
			userID: 0,
 | 
			
		||||
			want:   false,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name:   "Zero ID",
 | 
			
		||||
			userID: 2,
 | 
			
		||||
			want:   false,
 | 
			
		||||
		},
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, test := range tests {
 | 
			
		||||
		t.Run(test.name, func(t *testing.T) {
 | 
			
		||||
			db := newTestDB(t)
 | 
			
		||||
 | 
			
		||||
			userService := model.UserService{db}
 | 
			
		||||
 | 
			
		||||
			exists, err := userService.Exists(test.userID)
 | 
			
		||||
 | 
			
		||||
			assert.Equal(t, exists, test.want)
 | 
			
		||||
			assert.NilError(t, err)
 | 
			
		||||
 | 
			
		||||
		})
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
@ -1,35 +0,0 @@
 | 
			
		||||
package mock
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"database/sql"
 | 
			
		||||
	"time"
 | 
			
		||||
 | 
			
		||||
	"git.runcible.io/learning/ratchet/internal/model"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
var mockSnippet = model.Snippet{
 | 
			
		||||
	ID:        1,
 | 
			
		||||
	Title:     sql.NullString{String: "Hello golang mocking", Valid: true},
 | 
			
		||||
	Content:   sql.NullString{String: "Hello golang mocking", Valid: true},
 | 
			
		||||
	CreatedAt: time.Now(),
 | 
			
		||||
	UpdatedAt: time.Now(),
 | 
			
		||||
	ExpiresAt: time.Now(),
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type SnippetService struct{}
 | 
			
		||||
 | 
			
		||||
func (s *SnippetService) Insert(title, content string, expiresAt int) (int, error) {
 | 
			
		||||
	return 2, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (s *SnippetService) Get(id int) (model.Snippet, error) {
 | 
			
		||||
	if id == mockSnippet.ID {
 | 
			
		||||
		return mockSnippet, nil
 | 
			
		||||
	} else {
 | 
			
		||||
		return model.Snippet{}, model.ErrNoRecord
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (s *SnippetService) Lastest() ([]model.Snippet, error) {
 | 
			
		||||
	return []model.Snippet{mockSnippet}, nil
 | 
			
		||||
}
 | 
			
		||||
@ -1,34 +0,0 @@
 | 
			
		||||
package mock
 | 
			
		||||
 | 
			
		||||
import "git.runcible.io/learning/ratchet/internal/model"
 | 
			
		||||
 | 
			
		||||
var MockEmail = "drew@fake.com"
 | 
			
		||||
var MockPassword = "thisisinsecure"
 | 
			
		||||
 | 
			
		||||
type UserService struct{}
 | 
			
		||||
 | 
			
		||||
func (u *UserService) Insert(name, email, password string) (int, error) {
 | 
			
		||||
	switch email {
 | 
			
		||||
	case "dupe@example.com":
 | 
			
		||||
		return 0, model.ErrDuplicateEmail
 | 
			
		||||
	default:
 | 
			
		||||
		return 1, nil
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (u *UserService) Authenticate(email, password string) (int, error) {
 | 
			
		||||
	if email == MockEmail && password == MockPassword {
 | 
			
		||||
		return 1, nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return 0, model.ErrInvalidCredentials
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (u *UserService) Exists(id int) (bool, error) {
 | 
			
		||||
	switch id {
 | 
			
		||||
	case 1:
 | 
			
		||||
		return true, nil
 | 
			
		||||
	default:
 | 
			
		||||
		return false, nil
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
@ -1,99 +1,75 @@
 | 
			
		||||
package model
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"database/sql"
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"log/slog"
 | 
			
		||||
	"context"
 | 
			
		||||
	"time"
 | 
			
		||||
 | 
			
		||||
	"github.com/mattn/go-sqlite3"
 | 
			
		||||
	"golang.org/x/crypto/bcrypt"
 | 
			
		||||
	"git.runcible.io/learning/ratchet/internal/apperror"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type User struct {
 | 
			
		||||
	ID             int
 | 
			
		||||
	Name           string
 | 
			
		||||
	Email          string
 | 
			
		||||
	HashedPassword []byte
 | 
			
		||||
	CreatedAt      time.Time
 | 
			
		||||
	UpdatedAt      time.Time
 | 
			
		||||
}
 | 
			
		||||
	ID int `json:"id"`
 | 
			
		||||
 | 
			
		||||
type UserServiceInterface interface {
 | 
			
		||||
	Insert(name, email, password string) (int, error)
 | 
			
		||||
	Authenticate(email, password string) (int, error)
 | 
			
		||||
	Exists(id int) (bool, error)
 | 
			
		||||
}
 | 
			
		||||
	// User prefered name and email
 | 
			
		||||
	Name  string `json:"name"`
 | 
			
		||||
	Email string `json:"email"`
 | 
			
		||||
 | 
			
		||||
// TODD add logger to service
 | 
			
		||||
type UserService struct {
 | 
			
		||||
	DB *sql.DB
 | 
			
		||||
}
 | 
			
		||||
	// Randomly generated API key for use with the API
 | 
			
		||||
	// "-" omits the key from serialization
 | 
			
		||||
	APIKey string `json:"-"`
 | 
			
		||||
 | 
			
		||||
func (u *UserService) Insert(name, email, password string) (int, error) {
 | 
			
		||||
	hashedPassword, err := bcrypt.GenerateFromPassword([]byte(password), 12)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return 0, err
 | 
			
		||||
	}
 | 
			
		||||
	// Timestamps for user creatation and last update
 | 
			
		||||
	CreatedAt time.Time `json:"createdAt"`
 | 
			
		||||
	UpdatedAt time.Time `json:"updatedAt"`
 | 
			
		||||
 | 
			
		||||
	stmt := `INSERT INTO users (name, email, hashed_password) 
 | 
			
		||||
	VALUES (?,?,?)`
 | 
			
		||||
 | 
			
		||||
	result, err := u.DB.Exec(stmt, name, email, string(hashedPassword))
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		slog.Debug(fmt.Sprintf("Error encounters on insert: %s", err.Error()))
 | 
			
		||||
		// This is a assertion that err is of type sqlite3.Error. If it is ok is true.
 | 
			
		||||
		if serr, ok := err.(sqlite3.Error); ok {
 | 
			
		||||
			slog.Debug("Error is sqlite3.Error type.")
 | 
			
		||||
			if serr.ExtendedCode == sqlite3.ErrConstraintUnique {
 | 
			
		||||
				slog.Debug("Error is a unique contraint violation.")
 | 
			
		||||
				return 0, ErrDuplicateEmail
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
		return 0, err
 | 
			
		||||
	}
 | 
			
		||||
	// List of associated Oauth authentication Objects
 | 
			
		||||
	// Not yet implemented
 | 
			
		||||
	// Auths []*Auth `json:"auths"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
	lastId, err := result.LastInsertId()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		slog.Debug("An error occured when retrieving insert result id.")
 | 
			
		||||
		return 0, err
 | 
			
		||||
func (u *User) Validate() error {
 | 
			
		||||
	if u.Name == "" {
 | 
			
		||||
		return apperror.Errorf(apperror.EINVALID, "User name required.")
 | 
			
		||||
	}
 | 
			
		||||
	slog.Debug(fmt.Sprintf("Inserted new user. User pk: %d", int(lastId)))
 | 
			
		||||
	return int(lastId), nil
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (u *UserService) Authenticate(email, password string) (int, error) {
 | 
			
		||||
	var id int
 | 
			
		||||
	var hashedPassword []byte
 | 
			
		||||
	stmt := `SELECT id, hashed_password FROM users WHERE email == ?`
 | 
			
		||||
 | 
			
		||||
	err := u.DB.QueryRow(stmt, email).Scan(&id, &hashedPassword)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		if errors.Is(err, sql.ErrNoRows) {
 | 
			
		||||
			return 0, ErrInvalidCredentials
 | 
			
		||||
		} else {
 | 
			
		||||
			return 0, err
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
// UserService represents a service for managing users.
 | 
			
		||||
type UserService interface {
 | 
			
		||||
	// Retrieves a user by ID along with their associated auth objects
 | 
			
		||||
	// Returns ENOTFOUND if user does not exist.
 | 
			
		||||
	FindUserByID(ctx context.Context, id int) (*User, error)
 | 
			
		||||
 | 
			
		||||
	err = bcrypt.CompareHashAndPassword(hashedPassword, []byte(password))
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		if errors.Is(err, bcrypt.ErrMismatchedHashAndPassword) {
 | 
			
		||||
			return 0, ErrInvalidCredentials
 | 
			
		||||
		} else {
 | 
			
		||||
			return 0, err
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	// Retrieves a list of users by filter. Also returns total count of matching users
 | 
			
		||||
	// which may differ from retruned results if filter.Limit is specified.
 | 
			
		||||
	FindUsers(ctc context.Context, filter UserFilter) ([]*User, int, error)
 | 
			
		||||
 | 
			
		||||
	// Creates a new use. This is only used for testing since users are typically
 | 
			
		||||
	// cretaed during the OAuth creation process in the AuthService.CreateAuth().
 | 
			
		||||
	CreateUser(ctx context.Context, user *User) error
 | 
			
		||||
 | 
			
		||||
	return id, nil
 | 
			
		||||
	// Updates a user object. Returns EUNAUTHORIZED if current user is not
 | 
			
		||||
	// the user that is being updated. Returns ENOTFOUND if the user does not exist.
 | 
			
		||||
	UpdateUser(ctx context.Context, id int, upd UserUpdate) (*User, error)
 | 
			
		||||
 | 
			
		||||
	// Permanently deletes a user and all owned application resources. Returns EUNAUTHORIZED
 | 
			
		||||
	// if current user is not the user being deleted. Returns ENOTFOUND if the user
 | 
			
		||||
	// does not exist.
 | 
			
		||||
	DeleteUser(ctx context.Context, id int) error
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (u *UserService) Exists(id int) (bool, error) {
 | 
			
		||||
	var exists bool
 | 
			
		||||
// UserFilter respresents a filter passed to FindUsers().
 | 
			
		||||
type UserFilter struct {
 | 
			
		||||
	ID     *int    `json:"id"`
 | 
			
		||||
	Email  *string `json:"email"`
 | 
			
		||||
	APIKey *string `json:"apiKey"`
 | 
			
		||||
 | 
			
		||||
	stmt := "SELECT EXISTS(SELECT true FROM users WHERE id = ?)"
 | 
			
		||||
	// Restrict to subset of results
 | 
			
		||||
	Offset int `json:"offset"`
 | 
			
		||||
	Limit  int `json:"limit"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
	err := u.DB.QueryRow(stmt, id).Scan(&exists)
 | 
			
		||||
	return exists, err
 | 
			
		||||
type UserUpdate struct {
 | 
			
		||||
	Name  *string `json:"name"`
 | 
			
		||||
	Email *string `json:"email"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -1,75 +0,0 @@
 | 
			
		||||
package model
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"time"
 | 
			
		||||
 | 
			
		||||
	"git.runcible.io/learning/ratchet/internal/apperror"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type Userwtf struct {
 | 
			
		||||
	ID int `json:"id"`
 | 
			
		||||
 | 
			
		||||
	// User prefered name and email
 | 
			
		||||
	Name  string `json:"name"`
 | 
			
		||||
	Email string `json:"email"`
 | 
			
		||||
 | 
			
		||||
	// Randomly generated API key for use with the API
 | 
			
		||||
	// "-" omits the key from serialization
 | 
			
		||||
	APIKey string `json:"-"`
 | 
			
		||||
 | 
			
		||||
	// Timestamps for user creatation and last update
 | 
			
		||||
	CreatedAt time.Time `json:"createdAt"`
 | 
			
		||||
	UpdatedAt time.Time `json:"updatedAt"`
 | 
			
		||||
 | 
			
		||||
	// List of associated Oauth authentication Objects
 | 
			
		||||
	// Not yet implemented
 | 
			
		||||
	// Auths []*Auth `json:"auths"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (u *Userwtf) Validate() error {
 | 
			
		||||
	if u.Name == "" {
 | 
			
		||||
		return apperror.Errorf(apperror.EINVALID, "User name required.")
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// UserService represents a service for managing users.
 | 
			
		||||
type UserServicewtf interface {
 | 
			
		||||
	// Retrieves a user by ID along with their associated auth objects
 | 
			
		||||
	// Returns ENOTFOUND if user does not exist.
 | 
			
		||||
	FindUserByID(ctx context.Context, id int) (*Userwtf, error)
 | 
			
		||||
 | 
			
		||||
	// Retrieves a list of users by filter. Also returns total count of matching users
 | 
			
		||||
	// which may differ from retruned results if filter.Limit is specified.
 | 
			
		||||
	FindUsers(ctc context.Context, filter UserFilter) ([]*Userwtf, int, error)
 | 
			
		||||
 | 
			
		||||
	// Creates a new use. This is only used for testing since users are typically
 | 
			
		||||
	// cretaed during the OAuth creation process in the AuthService.CreateAuth().
 | 
			
		||||
	CreateUser(ctx context.Context, user *Userwtf) error
 | 
			
		||||
 | 
			
		||||
	// Updates a user object. Returns EUNAUTHORIZED if current user is not
 | 
			
		||||
	// the user that is being updated. Returns ENOTFOUND if the user does not exist.
 | 
			
		||||
	UpdateUser(ctx context.Context, id int, upd UserUpdate) (*Userwtf, error)
 | 
			
		||||
 | 
			
		||||
	// Permanently deletes a user and all owned application resources. Returns EUNAUTHORIZED
 | 
			
		||||
	// if current user is not the user being deleted. Returns ENOTFOUND if the user
 | 
			
		||||
	// does not exist.
 | 
			
		||||
	DeleteUser(ctx context.Context, id int) error
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// UserFilter respresents a filter passed to FindUsers().
 | 
			
		||||
type UserFilter struct {
 | 
			
		||||
	ID     *int    `json:"id"`
 | 
			
		||||
	Email  *string `json:"email"`
 | 
			
		||||
	APIKey *string `json:"apiKey"`
 | 
			
		||||
 | 
			
		||||
	// Restrict to subset of results
 | 
			
		||||
	Offset int `json:"offset"`
 | 
			
		||||
	Limit  int `json:"limit"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type UserUpdate struct {
 | 
			
		||||
	Name  *string `json:"name"`
 | 
			
		||||
	Email *string `json:"email"`
 | 
			
		||||
}
 | 
			
		||||
@ -1,5 +0,0 @@
 | 
			
		||||
package server
 | 
			
		||||
 | 
			
		||||
type contextKey string
 | 
			
		||||
 | 
			
		||||
const isAuthenticatedKey = contextKey("isAuthenticated")
 | 
			
		||||
@ -1,66 +0,0 @@
 | 
			
		||||
// test
 | 
			
		||||
package server
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"errors"
 | 
			
		||||
	"net/http"
 | 
			
		||||
 | 
			
		||||
	"git.runcible.io/learning/ratchet/internal/validator"
 | 
			
		||||
	"github.com/go-playground/form/v4"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Define a snippetCreateForm struct to represent the form data and validation
 | 
			
		||||
// errors for the form fields. Note that all the struct fields are deliberately
 | 
			
		||||
// exported (i.e. start with a capital letter). This is because struct fields
 | 
			
		||||
// must be exported in order to be read by the html/template package when
 | 
			
		||||
// rendering the template.
 | 
			
		||||
//
 | 
			
		||||
// Remove the explicit FieldErrors struct field and instead embed the Validator
 | 
			
		||||
// struct. Embedding this means that our snippetCreateForm "inherits" all the
 | 
			
		||||
// fields and methods of our Validator struct (including the FieldErrors field).
 | 
			
		||||
//
 | 
			
		||||
// MOVING TO go-playground/form
 | 
			
		||||
// Update our snippetCreateForm struct to include struct tags which tell the
 | 
			
		||||
// decoder how to map HTML form values into the different struct fields. So, for
 | 
			
		||||
// example, here we're telling the decoder to store the value from the HTML form
 | 
			
		||||
// input with the name "title" in the Title field. The struct tag `form:"-"`
 | 
			
		||||
// tells the decoder to completely ignore a field during decoding.
 | 
			
		||||
type snippetCreateForm struct {
 | 
			
		||||
	Title               string `form:"title"`
 | 
			
		||||
	Content             string `form:"content"`
 | 
			
		||||
	Expires             int    `form:"expires"`
 | 
			
		||||
	validator.Validator `form:"-"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type userSignupForm struct {
 | 
			
		||||
	Name                string `form:"name"`
 | 
			
		||||
	Email               string `form:"email"`
 | 
			
		||||
	Password            string `form:"password"`
 | 
			
		||||
	validator.Validator `form:"-"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type userLoginForm struct {
 | 
			
		||||
	Email               string `form:"email"`
 | 
			
		||||
	Password            string `form:"password"`
 | 
			
		||||
	validator.Validator `form:"-"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func decodePostForm(r *http.Request, fd *form.Decoder, dst any) error {
 | 
			
		||||
	err := r.ParseForm()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	err = fd.Decode(dst, r.PostForm)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		var invalidDecoderError *form.InvalidDecoderError
 | 
			
		||||
 | 
			
		||||
		if errors.As(err, &invalidDecoderError) {
 | 
			
		||||
			// if called in the handler, recovery middleware
 | 
			
		||||
			// will log and send 500 response back
 | 
			
		||||
			panic(err)
 | 
			
		||||
		}
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
@ -1,77 +0,0 @@
 | 
			
		||||
package server
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"bytes"
 | 
			
		||||
	"io"
 | 
			
		||||
	"net/http"
 | 
			
		||||
	"net/http/httptest"
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"git.runcible.io/learning/ratchet/internal/assert"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func TestCommonHeadersMiddleware(t *testing.T) {
 | 
			
		||||
	rr := httptest.NewRecorder()
 | 
			
		||||
 | 
			
		||||
	r, err := http.NewRequest(http.MethodGet, "/", nil)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// mock http.Handler
 | 
			
		||||
	next := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
		w.Write([]byte("OK"))
 | 
			
		||||
	})
 | 
			
		||||
 | 
			
		||||
	// Pass the mock HTTP handler to our commonHeaders middleware. Because
 | 
			
		||||
	// commonHeaders *returns* a http.Handler we can call its ServeHTTP()
 | 
			
		||||
	// method, passing in the http.ResponseRecorder and dummy http.Request to
 | 
			
		||||
	// execute it.
 | 
			
		||||
	CommonHeaderMiddleware(next).ServeHTTP(rr, r)
 | 
			
		||||
 | 
			
		||||
	resp := rr.Result()
 | 
			
		||||
 | 
			
		||||
	// Check that the middleware has correctly set the Content-Security-Policy
 | 
			
		||||
	// header on the response.
 | 
			
		||||
	expectedValue := "default-src 'self'; style-src 'self' fonts.googleapis.com; font-src fonts.gstatic.com"
 | 
			
		||||
	assert.Equal(t, resp.Header.Get("Content-Security-Policy"), expectedValue)
 | 
			
		||||
 | 
			
		||||
	// Check that the middleware has correctly set the Referrer-Policy
 | 
			
		||||
	// header on the response.
 | 
			
		||||
	expectedValue = "origin-when-cross-origin"
 | 
			
		||||
	assert.Equal(t, resp.Header.Get("Referrer-Policy"), expectedValue)
 | 
			
		||||
 | 
			
		||||
	// Check that the middleware has correctly set the X-Content-Type-Options
 | 
			
		||||
	// header on the response.
 | 
			
		||||
	expectedValue = "nosniff"
 | 
			
		||||
	assert.Equal(t, resp.Header.Get("X-Content-Type-Options"), expectedValue)
 | 
			
		||||
 | 
			
		||||
	// Check that the middleware has correctly set the X-Frame-Options header
 | 
			
		||||
	// on the response.
 | 
			
		||||
	expectedValue = "deny"
 | 
			
		||||
	assert.Equal(t, resp.Header.Get("X-Frame-Options"), expectedValue)
 | 
			
		||||
 | 
			
		||||
	// Check that the middleware has correctly set the X-XSS-Protection header
 | 
			
		||||
	// on the response
 | 
			
		||||
	expectedValue = "0"
 | 
			
		||||
	assert.Equal(t, resp.Header.Get("X-XSS-Protection"), expectedValue)
 | 
			
		||||
 | 
			
		||||
	// Check that the middleware has correctly set the Server header on the
 | 
			
		||||
	// response.
 | 
			
		||||
	expectedValue = "Go"
 | 
			
		||||
	assert.Equal(t, resp.Header.Get("Server"), expectedValue)
 | 
			
		||||
 | 
			
		||||
	// Check that the middleware has correctly called the next handler in line
 | 
			
		||||
	// and the response status code and body are as expected.
 | 
			
		||||
	assert.Equal(t, resp.StatusCode, http.StatusOK)
 | 
			
		||||
 | 
			
		||||
	defer resp.Body.Close()
 | 
			
		||||
 | 
			
		||||
	body, err := io.ReadAll(resp.Body)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
	body = bytes.TrimSpace(body)
 | 
			
		||||
 | 
			
		||||
	assert.Equal(t, string(body), "OK")
 | 
			
		||||
}
 | 
			
		||||
@ -1,55 +1,29 @@
 | 
			
		||||
package server
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"database/sql"
 | 
			
		||||
	"log/slog"
 | 
			
		||||
	"net/http"
 | 
			
		||||
 | 
			
		||||
	"git.runcible.io/learning/ratchet/ui"
 | 
			
		||||
	"git.runcible.io/learning/ratchet/internal/model"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func addBaseMiddleware(app *RatchetApp, next http.Handler, requireAuth bool) http.Handler {
 | 
			
		||||
	var h http.Handler
 | 
			
		||||
	h = next
 | 
			
		||||
	if requireAuth {
 | 
			
		||||
		h = RequireAuthenticationMiddleware(h, app.sessionManager)
 | 
			
		||||
	}
 | 
			
		||||
	h = AuthenticateMiddleware(h, app.sessionManager, app.userService)
 | 
			
		||||
	h = NoSurfMiddleware(h)
 | 
			
		||||
	h = app.sessionManager.LoadAndSave(h)
 | 
			
		||||
	return h
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (a *RatchetApp) Routes() http.Handler {
 | 
			
		||||
 | 
			
		||||
	// TODO implement middleware that disables directory listings
 | 
			
		||||
	// This line was superceded by using the embedded filesystem
 | 
			
		||||
	// fileServer := http.FileServer(http.Dir("./ui/static/"))
 | 
			
		||||
	router := http.NewServeMux()
 | 
			
		||||
 | 
			
		||||
	// Subtree pattern for static assets
 | 
			
		||||
	// This line was superceded by using the embedded filesystem
 | 
			
		||||
	// router.Handle("GET /static/", http.StripPrefix("/static/", fileServer))
 | 
			
		||||
	router.Handle("GET /static/", CacheHeaders(http.FileServerFS(ui.Files)))
 | 
			
		||||
 | 
			
		||||
	router.Handle("GET /ping", PingHandler())
 | 
			
		||||
func addRoutes(mux *http.ServeMux,
 | 
			
		||||
	logger *slog.Logger,
 | 
			
		||||
	tc *TemplateCache,
 | 
			
		||||
	db *sql.DB,
 | 
			
		||||
	snippetService *model.SnippetService) http.Handler {
 | 
			
		||||
 | 
			
		||||
	// /{$} is used to prevent subtree path patterns from acting like a wildcard
 | 
			
		||||
	// resulting in this route requiring an exact match on "/" only
 | 
			
		||||
	// You can only include one HTTP method in a route pattern if you choose
 | 
			
		||||
	// GET will match GET & HEAD http request methods
 | 
			
		||||
	router.Handle("GET /{$}", addBaseMiddleware(a, handleHome(a.logger, a.templateCache, a.sessionManager, a.snippetService), false)) // might be time to swith to github.com/justinas/alice dynamic chain
 | 
			
		||||
	router.Handle("GET /snippet/view/{id}", addBaseMiddleware(a, handleSnippetView(a.logger, a.templateCache, a.sessionManager, a.snippetService), false))
 | 
			
		||||
	router.Handle("GET /snippet/create", addBaseMiddleware(a, handleSnippetCreateGet(a.templateCache, a.sessionManager), true))
 | 
			
		||||
	router.Handle("POST /snippet/create", addBaseMiddleware(a, handleSnippetCreatePost(a.logger, a.templateCache, a.formDecoder, a.sessionManager, a.snippetService), true))
 | 
			
		||||
	mux.Handle("GET /{$}", handleHome(logger, tc, snippetService))
 | 
			
		||||
	mux.Handle("GET /snippet/view/{id}", handleSnippetView(logger, tc, snippetService))
 | 
			
		||||
	mux.Handle("GET /snippet/create", handleSnippetCreateGet())
 | 
			
		||||
	mux.Handle("POST /snippet/create", handleSnippetCreatePost(logger, tc, snippetService))
 | 
			
		||||
	// mux.Handle("/something", handleSomething(logger, config))
 | 
			
		||||
	// mux.Handle("/healthz", handleHealthzPlease(logger))
 | 
			
		||||
	// mux.Handle("/", http.NotFoundHandler())
 | 
			
		||||
 | 
			
		||||
	router.Handle("GET /user/signup", addBaseMiddleware(a, handleUserSignupGet(a.templateCache, a.sessionManager), false))
 | 
			
		||||
	router.Handle("POST /user/signup", addBaseMiddleware(a, handleUserSignupPost(a.logger, a.templateCache, a.formDecoder, a.sessionManager, a.userService), false))
 | 
			
		||||
	router.Handle("GET /user/login", addBaseMiddleware(a, handleUserLoginGet(a.templateCache, a.sessionManager), false))
 | 
			
		||||
	router.Handle("POST /user/login", addBaseMiddleware(a, handleUserLoginPost(a.logger, a.templateCache, a.sessionManager, a.formDecoder, a.userService), false))
 | 
			
		||||
 | 
			
		||||
	// Requires auth
 | 
			
		||||
	router.Handle("POST /user/logout", addBaseMiddleware(a, handleUserLogoutPost(a.logger, a.sessionManager), true))
 | 
			
		||||
	return RecoveryMiddleware(RequestLoggingMiddleware(CommonHeaderMiddleware(router), a.logger))
 | 
			
		||||
	return mux
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -1,32 +1,41 @@
 | 
			
		||||
package server
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"database/sql"
 | 
			
		||||
	"log/slog"
 | 
			
		||||
	"net/http"
 | 
			
		||||
 | 
			
		||||
	"git.runcible.io/learning/ratchet/internal/model"
 | 
			
		||||
	"github.com/alexedwards/scs/v2"
 | 
			
		||||
	"github.com/go-playground/form/v4"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type RatchetApp struct {
 | 
			
		||||
type RatchetServer struct {
 | 
			
		||||
	http.Handler
 | 
			
		||||
 | 
			
		||||
	logger        *slog.Logger
 | 
			
		||||
	templateCache *TemplateCache
 | 
			
		||||
	//Services used by HTTP routes
 | 
			
		||||
	snippetService model.SnippetServiceInterface
 | 
			
		||||
	userService    model.UserServiceInterface
 | 
			
		||||
	formDecoder    *form.Decoder
 | 
			
		||||
	sessionManager *scs.SessionManager
 | 
			
		||||
	snippetService *model.SnippetService
 | 
			
		||||
	UserService    model.UserService
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// TODO this function presents some challenges because it both instantiates new data objects
 | 
			
		||||
// and configures route / middleware setup
 | 
			
		||||
func NewRatchetApp(logger *slog.Logger, tc *TemplateCache, snippetService model.SnippetServiceInterface, userService model.UserServiceInterface, sm *scs.SessionManager) *RatchetApp {
 | 
			
		||||
	rs := new(RatchetApp)
 | 
			
		||||
func NewRatchetServer(logger *slog.Logger, tc *TemplateCache, db *sql.DB) *RatchetServer {
 | 
			
		||||
	rs := new(RatchetServer)
 | 
			
		||||
	rs.logger = logger
 | 
			
		||||
	rs.snippetService = snippetService
 | 
			
		||||
	rs.userService = userService
 | 
			
		||||
	rs.formDecoder = form.NewDecoder()
 | 
			
		||||
	rs.snippetService = &model.SnippetService{DB: db}
 | 
			
		||||
 | 
			
		||||
	rs.templateCache = tc
 | 
			
		||||
	rs.sessionManager = sm
 | 
			
		||||
	// TODO implement middleware that disables directory listings
 | 
			
		||||
	fileServer := http.FileServer(http.Dir("./ui/static/"))
 | 
			
		||||
	router := http.NewServeMux()
 | 
			
		||||
 | 
			
		||||
	// Subtree pattern for static assets
 | 
			
		||||
	router.Handle("GET /static/", http.StripPrefix("/static/", fileServer))
 | 
			
		||||
 | 
			
		||||
	// Mux Router implements the Handler interface. AKA it has a ServeHTTP receiver.
 | 
			
		||||
	// SEE we can really clean things up by moving this into routes.go and handlers.go
 | 
			
		||||
	wrappedMux := addRoutes(router, rs.logger, rs.templateCache, db, rs.snippetService)
 | 
			
		||||
	rs.Handler = CommonHeaderMiddleware(wrappedMux)
 | 
			
		||||
	rs.Handler = RequestLoggingMiddleware(rs.Handler, logger)
 | 
			
		||||
	rs.Handler = RecoveryMiddleware(rs.Handler)
 | 
			
		||||
	return rs
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -1,49 +0,0 @@
 | 
			
		||||
package server
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"testing"
 | 
			
		||||
	"time"
 | 
			
		||||
 | 
			
		||||
	"git.runcible.io/learning/ratchet/internal/assert"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func TestHumanDate(t *testing.T) {
 | 
			
		||||
 | 
			
		||||
	// Table driven test
 | 
			
		||||
	tests := []struct {
 | 
			
		||||
		name string
 | 
			
		||||
		tm   time.Time
 | 
			
		||||
		want string
 | 
			
		||||
	}{
 | 
			
		||||
		{
 | 
			
		||||
			name: "UTC",
 | 
			
		||||
			tm:   time.Date(2077, time.April, 12, 23, 0, 0, 0, time.UTC),
 | 
			
		||||
			want: "12 Apr 2077 at 23:00",
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "UTC",
 | 
			
		||||
			tm:   time.Date(2025, time.March, 3, 2, 31, 0, 0, time.UTC),
 | 
			
		||||
			want: "03 Mar 2025 at 02:31",
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "Empty",
 | 
			
		||||
			tm:   time.Time{},
 | 
			
		||||
			want: "",
 | 
			
		||||
		},
 | 
			
		||||
		// CET is one hour ahead of UTC but we print in UTC
 | 
			
		||||
		{
 | 
			
		||||
			name: "CET",
 | 
			
		||||
			tm:   time.Date(2024, 3, 17, 10, 15, 0, 0, time.FixedZone("CET", 1*60*60)),
 | 
			
		||||
			want: "17 Mar 2024 at 09:15",
 | 
			
		||||
		},
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, test := range tests {
 | 
			
		||||
		t.Run(test.name, func(t *testing.T) {
 | 
			
		||||
			got := humanDate(test.tm)
 | 
			
		||||
 | 
			
		||||
			assert.Equal(t, got, test.want)
 | 
			
		||||
		})
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
@ -1,86 +0,0 @@
 | 
			
		||||
// See also https://www.alexedwards.net/blog/validation-snippets-for-go
 | 
			
		||||
// for more validation snippets
 | 
			
		||||
//
 | 
			
		||||
// A NonFieldError for example would be "Your email or password is incorrect".
 | 
			
		||||
// more secure because it does not leak which field was in error. Used in the login
 | 
			
		||||
// form
 | 
			
		||||
 | 
			
		||||
package validator
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"regexp"
 | 
			
		||||
	"slices"
 | 
			
		||||
	"strings"
 | 
			
		||||
	"unicode/utf8"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type Validator struct {
 | 
			
		||||
	NonFieldErrors []string
 | 
			
		||||
	FieldErrors    map[string]string
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Valid() returns true if the FieldErrors map doesn't contain any entries.
 | 
			
		||||
func (v *Validator) Valid() bool {
 | 
			
		||||
	return len(v.FieldErrors) == 0 && len(v.NonFieldErrors) == 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (v *Validator) AddNonFieldError(message string) {
 | 
			
		||||
	v.NonFieldErrors = append(v.NonFieldErrors, message)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// AddFieldError() adds an error message to the FieldErrors map (so long as no
 | 
			
		||||
// entry already exists for the given key).
 | 
			
		||||
func (v *Validator) AddFieldError(key, message string) {
 | 
			
		||||
	if v.FieldErrors == nil {
 | 
			
		||||
		v.FieldErrors = make(map[string]string)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if _, exists := v.FieldErrors[key]; !exists {
 | 
			
		||||
		v.FieldErrors[key] = message
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// CheckField() adds an error message to the FieldErrors map only if a
 | 
			
		||||
// validation check is not 'ok'.
 | 
			
		||||
func (v *Validator) CheckField(ok bool, key, message string) {
 | 
			
		||||
	if !ok {
 | 
			
		||||
		v.AddFieldError(key, message)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// NotBlank() returns true if a value is not an empty string.
 | 
			
		||||
func NotBlank(value string) bool {
 | 
			
		||||
	return strings.TrimSpace(value) != ""
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// MinChars() returns true if the value contains equal to or greater than n characters
 | 
			
		||||
func MinChars(value string, n int) bool {
 | 
			
		||||
	return utf8.RuneCountInString(value) >= n
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// MaxChars() returns true if a value contains no more than n characters.
 | 
			
		||||
func MaxChars(value string, n int) bool {
 | 
			
		||||
	return utf8.RuneCountInString(value) <= n
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// PermittedValue() returns true if a value is in a list of specific permitted
 | 
			
		||||
// values.
 | 
			
		||||
func PermittedValue[T comparable](value T, permittedValues ...T) bool {
 | 
			
		||||
	return slices.Contains(permittedValues, value)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Use the regexp.MustCompile() function to parse a regular expression pattern
 | 
			
		||||
// for sanity checking the format of an email address. This returns a pointer to
 | 
			
		||||
// a 'compiled' regexp.Regexp type, or panics in the event of an error. Parsing
 | 
			
		||||
// this pattern once at startup and storing the compiled *regexp.Regexp in a
 | 
			
		||||
// variable is more performant than re-parsing the pattern each time we need it.
 | 
			
		||||
// This pattern is recommended by the W3C and Web Hypertext Application Technology Working Group for validating email addresses
 | 
			
		||||
// https://html.spec.whatwg.org/multipage/input.html#valid-e-mail-address
 | 
			
		||||
// Because the EmailRX regexp pattern is written as an interpreted string literal, we need to double-escape special characters in the regexp with \\ for it to work correctly
 | 
			
		||||
var EmailRX = regexp.MustCompile("^[a-zA-Z0-9.!#$%&'*+/=?^_`{|}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$")
 | 
			
		||||
 | 
			
		||||
// Matches() returns true if a value matches a provided compiled regular
 | 
			
		||||
// expression pattern.
 | 
			
		||||
func Matches(value string, rx *regexp.Regexp) bool {
 | 
			
		||||
	return rx.MatchString(value)
 | 
			
		||||
}
 | 
			
		||||
@ -1 +0,0 @@
 | 
			
		||||
DROP TABLE IF EXISTS sessions;
 | 
			
		||||
@ -1,7 +0,0 @@
 | 
			
		||||
CREATE TABLE sessions (
 | 
			
		||||
	token TEXT PRIMARY KEY,
 | 
			
		||||
	data BLOB NOT NULL,
 | 
			
		||||
	expiry REAL NOT NULL
 | 
			
		||||
);
 | 
			
		||||
 | 
			
		||||
CREATE INDEX sessions_expiry_idx ON sessions(expiry);
 | 
			
		||||
@ -1 +0,0 @@
 | 
			
		||||
DROP TABLE IF EXISTS users;
 | 
			
		||||
@ -1,16 +0,0 @@
 | 
			
		||||
CREATE TABLE users (
 | 
			
		||||
    id INTEGER PRIMARY KEY AUTOINCREMENT,
 | 
			
		||||
    name TEXT NOT NULL,
 | 
			
		||||
    email TEXT NOT NULL UNIQUE,
 | 
			
		||||
    hashed_password TEXT NOT NULL,
 | 
			
		||||
    created_at DATETIME DEFAULT CURRENT_TIMESTAMP,
 | 
			
		||||
    updated_at DATETIME DEFAULT CURRENT_TIMESTAMP
 | 
			
		||||
);
 | 
			
		||||
 | 
			
		||||
-- Add a trigger to keep timestamp updated.
 | 
			
		||||
CREATE TRIGGER users_update_timestamp
 | 
			
		||||
AFTER UPDATE ON users
 | 
			
		||||
FOR EACH ROW
 | 
			
		||||
BEGIN
 | 
			
		||||
    UPDATE users SET updated_at = CURRENT_TIMESTAMP WHERE id = OLD.id;
 | 
			
		||||
END;
 | 
			
		||||
@ -1,48 +0,0 @@
 | 
			
		||||
package migrations
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"database/sql"
 | 
			
		||||
	"embed"
 | 
			
		||||
	"fmt"
 | 
			
		||||
 | 
			
		||||
	"github.com/golang-migrate/migrate/v4"
 | 
			
		||||
	"github.com/golang-migrate/migrate/v4/database/sqlite3"
 | 
			
		||||
	_ "github.com/golang-migrate/migrate/v4/source/file"
 | 
			
		||||
	"github.com/golang-migrate/migrate/v4/source/iofs"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
//go:embed *.sql
 | 
			
		||||
var migrationFiles embed.FS
 | 
			
		||||
 | 
			
		||||
func Migrate(db *sql.DB) error {
 | 
			
		||||
	// Create a database driver for the specific database type
 | 
			
		||||
	driver, err := sqlite3.WithInstance(db, &sqlite3.Config{})
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return fmt.Errorf("failed to create database driver: %w", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Create an IFS source from the embedded files
 | 
			
		||||
	source, err := iofs.New(migrationFiles, ".")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return fmt.Errorf("failed to create migration source: %w", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Create a new migrate instance
 | 
			
		||||
	m, err := migrate.NewWithInstance("iofs", source, "sqlite3", driver)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return fmt.Errorf("failed to create migrate instance: %w", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Run migrations
 | 
			
		||||
	if err := m.Up(); err != nil && err != migrate.ErrNoChange {
 | 
			
		||||
		return fmt.Errorf("failed to run migrations: %w", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// set WAL mode
 | 
			
		||||
	_, err = db.Exec("PRAGMA journal_mode = WAL; PRAGMA synchronous = NORMAL;")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return fmt.Errorf("failed to set wall mode: %w", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
@ -1,17 +0,0 @@
 | 
			
		||||
package ui
 | 
			
		||||
 | 
			
		||||
import "embed"
 | 
			
		||||
 | 
			
		||||
// The below is actually a comment directive. Comment directives must be
 | 
			
		||||
// placed immediately above the variable used. The path provided is relative
 | 
			
		||||
// to the .go file it is in. You can only embed on global variables at a package
 | 
			
		||||
// level. Paths cannot contain . or .. or begin with / So you are effectively
 | 
			
		||||
// restricted to embedding files within the same directory as the .go file.
 | 
			
		||||
// You can provide multiple passes "static/css" "static/img" "static/js" to help with
 | 
			
		||||
// avoiding shipping things like a PostCSS(tailwind) css file.
 | 
			
		||||
// Can also us static/css/*.css. "all:static" will embed . and _ files too.
 | 
			
		||||
// Lastly the embedded file system is always rooted in the directory that contains
 | 
			
		||||
// the embed directive. So in this example the root is in our ui dir.
 | 
			
		||||
 | 
			
		||||
//go:embed "static" "html"
 | 
			
		||||
var Files embed.FS
 | 
			
		||||
@ -1,39 +0,0 @@
 | 
			
		||||
{{define "title"}}Create a New Snippet{{end}}
 | 
			
		||||
 | 
			
		||||
{{define "main"}}
 | 
			
		||||
<form action='/snippet/create' method='POST'>
 | 
			
		||||
    <!-- Include the CSRF token -->
 | 
			
		||||
    <input type='hidden' name='csrf_token' value='{{.CSRFToken}}'>
 | 
			
		||||
    <div>
 | 
			
		||||
        <label>Title:</label>
 | 
			
		||||
        <!-- Use the `with` action to render the value of .Form.FieldErrors.title
 | 
			
		||||
        if it is not empty. -->
 | 
			
		||||
        {{with .Form.FieldErrors.title}}
 | 
			
		||||
            <label class='error'>{{.}}</label>
 | 
			
		||||
        {{end}}
 | 
			
		||||
        <input type='text' name='title' value="{{.Form.Title}}">
 | 
			
		||||
    </div>
 | 
			
		||||
    <div>
 | 
			
		||||
        <label>Content:</label>
 | 
			
		||||
        <!-- Likewise render the value of .Form.FieldErrors.content if it is not
 | 
			
		||||
        empty. -->
 | 
			
		||||
        {{with .Form.FieldErrors.content}}
 | 
			
		||||
            <label class='error'>{{.}}</label>
 | 
			
		||||
        {{end}}
 | 
			
		||||
        <textarea name='content'>{{.Form.Content}}</textarea>
 | 
			
		||||
    </div>
 | 
			
		||||
    <div>
 | 
			
		||||
        <label>Delete in:</label>
 | 
			
		||||
        <!-- And render the value of .Form.FieldErrors.expires if it is not empty. -->
 | 
			
		||||
        {{with .Form.FieldErrors.expires}}
 | 
			
		||||
            <label class='error'>{{.}}</label>
 | 
			
		||||
        {{end}}
 | 
			
		||||
        <input type='radio' name='expires' value='365' {{if (eq .Form.Expires 365)}}checked{{end}}> One Year
 | 
			
		||||
        <input type='radio' name='expires' value='7' {{if (eq .Form.Expires 7)}}checked{{end}}> One Week
 | 
			
		||||
        <input type='radio' name='expires' value='1' {{if (eq .Form.Expires 1)}}checked{{end}}> One Day
 | 
			
		||||
    </div>
 | 
			
		||||
    <div>
 | 
			
		||||
        <input type='submit' value='Publish snippet'>
 | 
			
		||||
    </div>
 | 
			
		||||
</form>
 | 
			
		||||
{{end}}
 | 
			
		||||
@ -1,30 +0,0 @@
 | 
			
		||||
{{define "title"}}Login{{end}}
 | 
			
		||||
 | 
			
		||||
{{define "main"}}
 | 
			
		||||
<form action='/user/login' method='POST' novalidate>
 | 
			
		||||
    <!-- Include the CSRF token -->
 | 
			
		||||
    <input type='hidden' name='csrf_token' value='{{.CSRFToken}}'>
 | 
			
		||||
    <!-- Notice that here we are looping over the NonFieldErrors and displaying
 | 
			
		||||
    them, if any exist -->
 | 
			
		||||
    {{range .Form.NonFieldErrors}}
 | 
			
		||||
        <div class='error'>{{.}}</div>
 | 
			
		||||
    {{end}}
 | 
			
		||||
    <div>
 | 
			
		||||
        <label>Email:</label>
 | 
			
		||||
        {{with .Form.FieldErrors.email}}
 | 
			
		||||
            <label class='error'>{{.}}</label>
 | 
			
		||||
        {{end}}
 | 
			
		||||
        <input type='email' name='email' value='{{.Form.Email}}'>
 | 
			
		||||
    </div>
 | 
			
		||||
    <div>
 | 
			
		||||
        <label>Password:</label>
 | 
			
		||||
        {{with .Form.FieldErrors.password}}
 | 
			
		||||
            <label class='error'>{{.}}</label>
 | 
			
		||||
        {{end}}
 | 
			
		||||
        <input type='password' name='password'>
 | 
			
		||||
    </div>
 | 
			
		||||
    <div>
 | 
			
		||||
        <input type='submit' value='Login'>
 | 
			
		||||
    </div>
 | 
			
		||||
</form>
 | 
			
		||||
{{end}}
 | 
			
		||||
@ -1,32 +0,0 @@
 | 
			
		||||
{{ define "title"}}Signup{{end}}
 | 
			
		||||
 | 
			
		||||
{{define "main"}}
 | 
			
		||||
<form action='/user/signup' method='POST' novalidate>
 | 
			
		||||
    <!-- Include the CSRF token -->
 | 
			
		||||
    <input type='hidden' name='csrf_token' value='{{.CSRFToken}}'>
 | 
			
		||||
    <div>
 | 
			
		||||
        <label>Name:</label>
 | 
			
		||||
        {{with .Form.FieldErrors.name}}
 | 
			
		||||
            <label class='error'>{{.}}</label>
 | 
			
		||||
        {{end}}
 | 
			
		||||
        <input type='text' name='name' value='{{.Form.Name}}'>
 | 
			
		||||
    </div>
 | 
			
		||||
    <div>
 | 
			
		||||
        <label>Email:</label>
 | 
			
		||||
        {{with .Form.FieldErrors.email}}
 | 
			
		||||
            <label class='error'>{{.}}</label>
 | 
			
		||||
        {{end}}
 | 
			
		||||
        <input type='email' name='email' value='{{.Form.Email}}'>
 | 
			
		||||
    </div>
 | 
			
		||||
    <div>
 | 
			
		||||
        <label>Password:</label>
 | 
			
		||||
        {{with .Form.FieldErrors.password}}
 | 
			
		||||
            <label class='error'>{{.}}</label>
 | 
			
		||||
        {{end}}
 | 
			
		||||
        <input type='password' name='password'>
 | 
			
		||||
    </div>
 | 
			
		||||
    <div>
 | 
			
		||||
        <input type='submit' value='Signup'>
 | 
			
		||||
    </div>
 | 
			
		||||
</form>
 | 
			
		||||
{{end}}
 | 
			
		||||
@ -1,22 +1,5 @@
 | 
			
		||||
{{define "nav" -}}
 | 
			
		||||
        <nav>
 | 
			
		||||
            <div>
 | 
			
		||||
                <a href='/'>Home</a>
 | 
			
		||||
                {{ if .IsAuthenticated }}
 | 
			
		||||
                <a href='/snippet/create'>Create snippet</a>
 | 
			
		||||
                {{ end }}
 | 
			
		||||
            </div>
 | 
			
		||||
            <div>
 | 
			
		||||
                {{ if .IsAuthenticated }}
 | 
			
		||||
                <form action='/user/logout' method='POST'>
 | 
			
		||||
                        <!-- Include the CSRF token -->
 | 
			
		||||
                    <input type='hidden' name='csrf_token' value='{{.CSRFToken}}'>
 | 
			
		||||
                    <button>Logout</button>
 | 
			
		||||
                </form>
 | 
			
		||||
                {{ else }}
 | 
			
		||||
                <a href='/user/signup'>Signup</a>
 | 
			
		||||
                <a href='/user/login'>Login</a>
 | 
			
		||||
                {{ end }}
 | 
			
		||||
            </div>
 | 
			
		||||
            <a href='/'>Home</a>
 | 
			
		||||
        </nav>
 | 
			
		||||
{{- end}}
 | 
			
		||||
					Loading…
					
					
				
		Reference in New Issue