mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-10 21:09:11 +00:00
* feat(database): create schema for hway and motr * fix(gateway): correct naming inconsistencies in handlers * build: update schema file to be compatible with postgresql syntax * fix: update schema to be compatible with PostgreSQL syntax * chore: update query_hway.sql to follow sqlc syntax * ```text refactor: update query_hway.sql for PostgreSQL and sqlc ``` * feat: add vaults table to store encrypted data * refactor: Update vaults table schema for sqlc compatibility * chore(deps): Upgrade dependencies and add pgx/v5 * refactor(Makefile): move sqlc generate to internal/models * docs(foundations): remove outdated pages * chore(build): add Taskfile for build tasks * refactor(embed): move embed files to internal package * docs: add documentation for Cosmos SDK ORM
84 lines
2.5 KiB
Go
84 lines
2.5 KiB
Go
package middleware
|
|
|
|
import (
|
|
"net/http"
|
|
|
|
"github.com/labstack/echo/v4"
|
|
"github.com/onsonr/sonr/internal/models/drivers/hwayorm"
|
|
)
|
|
|
|
func ListCredentials(c echo.Context, handle string) ([]*CredentialDescriptor, error) {
|
|
cc, ok := c.(*GatewayContext)
|
|
if !ok {
|
|
return nil, echo.NewHTTPError(http.StatusInternalServerError, "Credentials Context not found")
|
|
}
|
|
creds, err := cc.dbq.GetCredentialsByHandle(bgCtx(), handle)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return CredentialArrayToDescriptors(creds), nil
|
|
}
|
|
|
|
func SubmitCredential(c echo.Context, cred *CredentialDescriptor) error {
|
|
origin := GetOrigin(c)
|
|
handle := GetHandle(c)
|
|
md := cred.ToModel(handle, origin)
|
|
|
|
cc, ok := c.(*GatewayContext)
|
|
if !ok {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Credentials Context not found")
|
|
}
|
|
|
|
_, err := cc.dbq.InsertCredential(bgCtx(), hwayorm.InsertCredentialParams{
|
|
Handle: handle,
|
|
CredentialID: md.CredentialID,
|
|
Origin: origin,
|
|
Type: md.Type,
|
|
Transports: md.Transports,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Define the credential structure matching our frontend data
|
|
type CredentialDescriptor struct {
|
|
ID string `json:"id"`
|
|
RawID string `json:"rawId"`
|
|
Type string `json:"type"`
|
|
AuthenticatorAttachment string `json:"authenticatorAttachment"`
|
|
Transports string `json:"transports"`
|
|
ClientExtensionResults map[string]string `json:"clientExtensionResults"`
|
|
Response struct {
|
|
AttestationObject string `json:"attestationObject"`
|
|
ClientDataJSON string `json:"clientDataJSON"`
|
|
} `json:"response"`
|
|
}
|
|
|
|
func (c *CredentialDescriptor) ToModel(handle, origin string) *hwayorm.Credential {
|
|
return &hwayorm.Credential{
|
|
Handle: handle,
|
|
Origin: origin,
|
|
CredentialID: c.ID,
|
|
Type: c.Type,
|
|
Transports: c.Transports,
|
|
AuthenticatorAttachment: c.AuthenticatorAttachment,
|
|
}
|
|
}
|
|
|
|
func CredentialArrayToDescriptors(credentials []hwayorm.Credential) []*CredentialDescriptor {
|
|
var descriptors []*CredentialDescriptor
|
|
for _, cred := range credentials {
|
|
cd := &CredentialDescriptor{
|
|
ID: cred.CredentialID,
|
|
RawID: cred.CredentialID,
|
|
Type: cred.Type,
|
|
AuthenticatorAttachment: cred.AuthenticatorAttachment,
|
|
Transports: cred.Transports,
|
|
}
|
|
descriptors = append(descriptors, cd)
|
|
}
|
|
return descriptors
|
|
}
|