sojorn/go-backend/internal/handlers/key_handler.go
Patrick Britton da5984d67c refactor: rename Go module from github.com/patbritton to gitlab.com/patrickbritton3
- Rename module path from github.com/patbritton/sojorn-backend to gitlab.com/patrickbritton3/sojorn/go-backend
- Updated 78 references across 41 files
- Matches new GitLab repository structure
2026-02-16 23:58:39 -06:00

153 lines
4.7 KiB
Go

package handlers
import (
"encoding/base64"
"encoding/json"
"fmt"
"math"
"net/http"
"strconv"
"github.com/gin-gonic/gin"
"github.com/google/uuid"
"gitlab.com/patrickbritton3/sojorn/go-backend/internal/repository"
)
type KeyHandler struct {
repo *repository.UserRepository
}
func NewKeyHandler(repo *repository.UserRepository) *KeyHandler {
return &KeyHandler{repo: repo}
}
type PublishKeysRequest struct {
IdentityKeyPublic string `json:"identity_key_public" binding:"required"`
SignedPrekeyPublic string `json:"signed_prekey_public" binding:"required"`
SignedPrekeyID int `json:"signed_prekey_id"`
SignedPrekeySignature string `json:"signed_prekey_signature"`
OneTimePrekeys json.RawMessage `json:"one_time_prekeys"`
RegistrationID int `json:"registration_id" binding:"required"`
}
func (h *KeyHandler) PublishKeys(c *gin.Context) {
fmt.Println("[KEYS] POST /api/v1/keys called - uploading key bundle")
userIDStr, _ := c.Get("user_id")
userID, _ := uuid.Parse(userIDStr.(string))
fmt.Printf("[KEYS] User ID: %s\n", userID.String())
var req PublishKeysRequest
if err := c.ShouldBindJSON(&req); err != nil {
fmt.Printf("[KEYS] ERROR: Failed to parse key bundle: %v\n", err)
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
// Debug: Log OTK count
fmt.Printf("[KEYS] Received bundle with %d OTKs\n", len(req.OneTimePrekeys))
// CRITICAL: Log signature details
fmt.Printf("[KEYS] Received SPK signature: %s\n", req.SignedPrekeySignature)
fmt.Printf("[KEYS] SPK signature length: %d\n", len(req.SignedPrekeySignature))
// Decode and verify signature is not all zeros
sigBytes, err := base64.StdEncoding.DecodeString(req.SignedPrekeySignature)
if err != nil {
fmt.Printf("[KEYS] ERROR: Invalid signature encoding: %v\n", err)
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid signature encoding"})
return
}
fmt.Printf("[KEYS] Decoded signature length: %d bytes\n", len(sigBytes))
if len(sigBytes) > 0 {
fmt.Printf("[KEYS] Signature (first 16 bytes): %x\n", sigBytes[:int(math.Min(float64(16), float64(len(sigBytes))))])
}
allZeros := true
for _, b := range sigBytes {
if b != 0 {
allZeros = false
break
}
}
if allZeros {
fmt.Printf("[KEYS] ERROR: Signature is all zeros! Rejecting upload.\n")
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid signature - all zeros"})
return
}
fmt.Printf("[KEYS] Signature validation passed\n")
err = h.repo.UpsertKeys(c.Request.Context(), userID.String(), repository.SignalKeysInput{
IdentityKeyPublic: req.IdentityKeyPublic,
SignedPrekeyPublic: req.SignedPrekeyPublic,
SignedPrekeyID: req.SignedPrekeyID,
SignedPrekeySignature: req.SignedPrekeySignature,
OneTimePrekeys: req.OneTimePrekeys,
RegistrationID: req.RegistrationID,
})
if err != nil {
fmt.Printf("[KEYS] ERROR: Failed to upsert keys for user %s: %v\n", userID.String(), err)
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to update keys", "details": err.Error()})
return
}
fmt.Println("[KEYS] Key bundle stored successfully")
fmt.Printf("[KEYS] SUCCESS: Keys upserted for user %s\n", userID.String())
c.JSON(http.StatusOK, gin.H{"message": "Keys published successfully"})
}
func (h *KeyHandler) DeleteUsedOTK(c *gin.Context) {
userIDStr, _ := c.Get("user_id")
userID := userIDStr.(string)
keyIDStr := c.Param("keyId")
keyID, err := strconv.Atoi(keyIDStr)
if err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid key ID"})
return
}
err = h.repo.DeleteUsedOTK(c.Request.Context(), userID, keyID)
if err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to delete OTK"})
return
}
c.JSON(http.StatusOK, gin.H{"message": "OTK deleted successfully"})
}
func (h *KeyHandler) GetKeyBundle(c *gin.Context) {
targetUserID := c.Param("id")
fmt.Printf("[KEYS] GET request for user: %s\n", targetUserID)
requesterID, exists := c.Get("user_id")
if !exists {
fmt.Println("[KEYS] ERROR: Unauthorized - no user_id in context")
c.JSON(http.StatusUnauthorized, gin.H{"error": "Unauthorized"})
return
}
if targetUserID == "" {
fmt.Println("[KEYS] ERROR: User ID required but not provided")
c.JSON(http.StatusBadRequest, gin.H{"error": "User ID required"})
return
}
fmt.Printf("[KEYS] Fetching key bundle for user %s (requested by %s)\n", targetUserID, requesterID)
bundle, err := h.repo.GetSignalKeyBundle(c.Request.Context(), targetUserID)
if err != nil {
fmt.Printf("[KEYS] ERROR: Key bundle not found for %s: %v\n", targetUserID, err)
c.JSON(http.StatusNotFound, gin.H{"error": "Key bundle not found"})
return
}
fmt.Printf("[KEYS] SUCCESS: Returning key bundle for user %s\n", targetUserID)
c.JSON(http.StatusOK, bundle)
}