Initial commit: Open sourcing all of the Maple Open Technologies code.
This commit is contained in:
commit
755d54a99d
2010 changed files with 448675 additions and 0 deletions
|
|
@ -0,0 +1,53 @@
|
|||
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/auth/complete_login.go
|
||||
package auth
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
|
||||
"go.uber.org/zap"
|
||||
|
||||
svc_auth "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/auth"
|
||||
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
|
||||
)
|
||||
|
||||
type CompleteLoginHandler struct {
|
||||
logger *zap.Logger
|
||||
service svc_auth.CompleteLoginService
|
||||
}
|
||||
|
||||
func NewCompleteLoginHandler(
|
||||
logger *zap.Logger,
|
||||
service svc_auth.CompleteLoginService,
|
||||
) *CompleteLoginHandler {
|
||||
return &CompleteLoginHandler{
|
||||
logger: logger.Named("CompleteLoginHandler"),
|
||||
service: service,
|
||||
}
|
||||
}
|
||||
|
||||
func (h *CompleteLoginHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
|
||||
var req svc_auth.CompleteLoginRequestDTO
|
||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||
h.logger.Error("Failed to decode complete login request", zap.Error(err))
|
||||
problem := httperror.NewBadRequestError("Invalid request payload. Expected JSON with 'email', 'challengeId', and 'decryptedData' fields.").
|
||||
WithInstance(r.URL.Path).
|
||||
WithTraceID(httperror.ExtractRequestID(r))
|
||||
httperror.RespondWithProblem(w, problem)
|
||||
return
|
||||
}
|
||||
|
||||
resp, err := h.service.Execute(ctx, &req)
|
||||
if err != nil {
|
||||
h.logger.Error("Complete login failed", zap.Error(err))
|
||||
// Service returns RFC 9457 errors, use RespondWithError to handle them
|
||||
httperror.RespondWithError(w, r, err)
|
||||
return
|
||||
}
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusOK)
|
||||
json.NewEncoder(w).Encode(resp)
|
||||
}
|
||||
|
|
@ -0,0 +1,49 @@
|
|||
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/auth/recovery_complete.go
|
||||
package auth
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
|
||||
"go.uber.org/zap"
|
||||
|
||||
svc_auth "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/auth"
|
||||
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
|
||||
)
|
||||
|
||||
type RecoveryCompleteHandler struct {
|
||||
logger *zap.Logger
|
||||
service svc_auth.RecoveryCompleteService
|
||||
}
|
||||
|
||||
func NewRecoveryCompleteHandler(
|
||||
logger *zap.Logger,
|
||||
service svc_auth.RecoveryCompleteService,
|
||||
) *RecoveryCompleteHandler {
|
||||
return &RecoveryCompleteHandler{
|
||||
logger: logger.Named("RecoveryCompleteHandler"),
|
||||
service: service,
|
||||
}
|
||||
}
|
||||
|
||||
func (h *RecoveryCompleteHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
|
||||
var req svc_auth.RecoveryCompleteRequestDTO
|
||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||
h.logger.Error("Failed to decode recovery complete request", zap.Error(err))
|
||||
httperror.RespondWithError(w, r, httperror.NewForBadRequestWithSingleField("payload", "Invalid request payload"))
|
||||
return
|
||||
}
|
||||
|
||||
resp, err := h.service.Execute(ctx, &req)
|
||||
if err != nil {
|
||||
h.logger.Error("Recovery complete failed", zap.Error(err))
|
||||
httperror.RespondWithError(w, r, err)
|
||||
return
|
||||
}
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusOK)
|
||||
json.NewEncoder(w).Encode(resp)
|
||||
}
|
||||
|
|
@ -0,0 +1,49 @@
|
|||
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/auth/recovery_initiate.go
|
||||
package auth
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
|
||||
"go.uber.org/zap"
|
||||
|
||||
svc_auth "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/auth"
|
||||
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
|
||||
)
|
||||
|
||||
type RecoveryInitiateHandler struct {
|
||||
logger *zap.Logger
|
||||
service svc_auth.RecoveryInitiateService
|
||||
}
|
||||
|
||||
func NewRecoveryInitiateHandler(
|
||||
logger *zap.Logger,
|
||||
service svc_auth.RecoveryInitiateService,
|
||||
) *RecoveryInitiateHandler {
|
||||
return &RecoveryInitiateHandler{
|
||||
logger: logger.Named("RecoveryInitiateHandler"),
|
||||
service: service,
|
||||
}
|
||||
}
|
||||
|
||||
func (h *RecoveryInitiateHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
|
||||
var req svc_auth.RecoveryInitiateRequestDTO
|
||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||
h.logger.Error("Failed to decode recovery initiate request", zap.Error(err))
|
||||
httperror.RespondWithError(w, r, httperror.NewForBadRequestWithSingleField("payload", "Invalid request payload"))
|
||||
return
|
||||
}
|
||||
|
||||
resp, err := h.service.Execute(ctx, &req)
|
||||
if err != nil {
|
||||
h.logger.Error("Recovery initiate failed", zap.Error(err))
|
||||
httperror.RespondWithError(w, r, err)
|
||||
return
|
||||
}
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusOK)
|
||||
json.NewEncoder(w).Encode(resp)
|
||||
}
|
||||
|
|
@ -0,0 +1,49 @@
|
|||
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/auth/recovery_verify.go
|
||||
package auth
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
|
||||
"go.uber.org/zap"
|
||||
|
||||
svc_auth "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/auth"
|
||||
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
|
||||
)
|
||||
|
||||
type RecoveryVerifyHandler struct {
|
||||
logger *zap.Logger
|
||||
service svc_auth.RecoveryVerifyService
|
||||
}
|
||||
|
||||
func NewRecoveryVerifyHandler(
|
||||
logger *zap.Logger,
|
||||
service svc_auth.RecoveryVerifyService,
|
||||
) *RecoveryVerifyHandler {
|
||||
return &RecoveryVerifyHandler{
|
||||
logger: logger.Named("RecoveryVerifyHandler"),
|
||||
service: service,
|
||||
}
|
||||
}
|
||||
|
||||
func (h *RecoveryVerifyHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
|
||||
var req svc_auth.RecoveryVerifyRequestDTO
|
||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||
h.logger.Error("Failed to decode recovery verify request", zap.Error(err))
|
||||
httperror.RespondWithError(w, r, httperror.NewForBadRequestWithSingleField("payload", "Invalid request payload"))
|
||||
return
|
||||
}
|
||||
|
||||
resp, err := h.service.Execute(ctx, &req)
|
||||
if err != nil {
|
||||
h.logger.Error("Recovery verify failed", zap.Error(err))
|
||||
httperror.RespondWithError(w, r, err)
|
||||
return
|
||||
}
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusOK)
|
||||
json.NewEncoder(w).Encode(resp)
|
||||
}
|
||||
|
|
@ -0,0 +1,49 @@
|
|||
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/auth/refresh_token.go
|
||||
package auth
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
|
||||
"go.uber.org/zap"
|
||||
|
||||
svc_auth "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/auth"
|
||||
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
|
||||
)
|
||||
|
||||
type RefreshTokenHandler struct {
|
||||
logger *zap.Logger
|
||||
service svc_auth.RefreshTokenService
|
||||
}
|
||||
|
||||
func NewRefreshTokenHandler(
|
||||
logger *zap.Logger,
|
||||
service svc_auth.RefreshTokenService,
|
||||
) *RefreshTokenHandler {
|
||||
return &RefreshTokenHandler{
|
||||
logger: logger.Named("RefreshTokenHandler"),
|
||||
service: service,
|
||||
}
|
||||
}
|
||||
|
||||
func (h *RefreshTokenHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
|
||||
var req svc_auth.RefreshTokenRequestDTO
|
||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||
h.logger.Error("Failed to decode refresh token request", zap.Error(err))
|
||||
httperror.RespondWithError(w, r, httperror.NewForBadRequestWithSingleField("payload", "Invalid request payload"))
|
||||
return
|
||||
}
|
||||
|
||||
resp, err := h.service.Execute(ctx, &req)
|
||||
if err != nil {
|
||||
h.logger.Error("Refresh token failed", zap.Error(err))
|
||||
httperror.RespondWithError(w, r, err)
|
||||
return
|
||||
}
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusOK)
|
||||
json.NewEncoder(w).Encode(resp)
|
||||
}
|
||||
|
|
@ -0,0 +1,77 @@
|
|||
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/auth/register.go
|
||||
package auth
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
|
||||
"go.uber.org/zap"
|
||||
|
||||
svc_auth "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/auth"
|
||||
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
|
||||
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/validation"
|
||||
)
|
||||
|
||||
// RegisterHandler handles user registration
|
||||
type RegisterHandler struct {
|
||||
logger *zap.Logger
|
||||
service svc_auth.RegisterService
|
||||
}
|
||||
|
||||
// NewRegisterHandler creates a new registration handler
|
||||
func NewRegisterHandler(
|
||||
logger *zap.Logger,
|
||||
service svc_auth.RegisterService,
|
||||
) *RegisterHandler {
|
||||
return &RegisterHandler{
|
||||
logger: logger.Named("RegisterHandler"),
|
||||
service: service,
|
||||
}
|
||||
}
|
||||
|
||||
// ServeHTTP handles the HTTP request
|
||||
func (h *RegisterHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
|
||||
// Extract request ID from existing middleware
|
||||
requestID := httperror.ExtractRequestID(r)
|
||||
|
||||
// Decode request
|
||||
var req svc_auth.RegisterRequestDTO
|
||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||
h.logger.Error("Failed to decode register request", zap.Error(err))
|
||||
problem := httperror.NewBadRequestError("Invalid request payload: " + err.Error())
|
||||
problem.WithInstance(r.URL.Path).WithTraceID(requestID)
|
||||
httperror.RespondWithProblem(w, problem)
|
||||
return
|
||||
}
|
||||
|
||||
// Call service - service handles validation and returns RFC 9457 errors
|
||||
resp, err := h.service.Execute(ctx, &req)
|
||||
if err != nil {
|
||||
// Check if error is already a ProblemDetail
|
||||
if problem, ok := err.(*httperror.ProblemDetail); ok {
|
||||
h.logger.Warn("Registration failed with validation errors",
|
||||
zap.String("email", validation.MaskEmail(req.Email)),
|
||||
zap.Int("error_count", len(problem.Errors)))
|
||||
problem.WithInstance(r.URL.Path).WithTraceID(requestID)
|
||||
httperror.RespondWithProblem(w, problem)
|
||||
return
|
||||
}
|
||||
|
||||
// Unexpected error - wrap in internal server error
|
||||
h.logger.Error("Registration failed with unexpected error",
|
||||
zap.String("email", validation.MaskEmail(req.Email)),
|
||||
zap.Error(err))
|
||||
problem := httperror.NewInternalServerError("Registration failed: " + err.Error())
|
||||
problem.WithInstance(r.URL.Path).WithTraceID(requestID)
|
||||
httperror.RespondWithProblem(w, problem)
|
||||
return
|
||||
}
|
||||
|
||||
// Return success response
|
||||
h.logger.Info("User registered successfully", zap.String("user_id", resp.UserID))
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusCreated)
|
||||
json.NewEncoder(w).Encode(resp)
|
||||
}
|
||||
|
|
@ -0,0 +1,53 @@
|
|||
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/auth/request_ott.go
|
||||
package auth
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
|
||||
"go.uber.org/zap"
|
||||
|
||||
svc_auth "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/auth"
|
||||
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
|
||||
)
|
||||
|
||||
type RequestOTTHandler struct {
|
||||
logger *zap.Logger
|
||||
service svc_auth.RequestOTTService
|
||||
}
|
||||
|
||||
func NewRequestOTTHandler(
|
||||
logger *zap.Logger,
|
||||
service svc_auth.RequestOTTService,
|
||||
) *RequestOTTHandler {
|
||||
return &RequestOTTHandler{
|
||||
logger: logger.Named("RequestOTTHandler"),
|
||||
service: service,
|
||||
}
|
||||
}
|
||||
|
||||
func (h *RequestOTTHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
|
||||
var req svc_auth.RequestOTTRequestDTO
|
||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||
h.logger.Error("Failed to decode request OTT request", zap.Error(err))
|
||||
problem := httperror.NewBadRequestError("Invalid request payload. Expected JSON with 'email' field.").
|
||||
WithInstance(r.URL.Path).
|
||||
WithTraceID(httperror.ExtractRequestID(r))
|
||||
httperror.RespondWithProblem(w, problem)
|
||||
return
|
||||
}
|
||||
|
||||
resp, err := h.service.Execute(ctx, &req)
|
||||
if err != nil {
|
||||
h.logger.Error("Request OTT failed", zap.Error(err))
|
||||
// Service returns RFC 9457 errors, use RespondWithError to handle them
|
||||
httperror.RespondWithError(w, r, err)
|
||||
return
|
||||
}
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusOK)
|
||||
json.NewEncoder(w).Encode(resp)
|
||||
}
|
||||
|
|
@ -0,0 +1,59 @@
|
|||
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/auth/resend_verification.go
|
||||
package auth
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
|
||||
"go.uber.org/zap"
|
||||
|
||||
svc_auth "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/auth"
|
||||
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
|
||||
)
|
||||
|
||||
// ResendVerificationHandler handles resending verification emails
|
||||
type ResendVerificationHandler struct {
|
||||
logger *zap.Logger
|
||||
service svc_auth.ResendVerificationService
|
||||
}
|
||||
|
||||
// NewResendVerificationHandler creates a new resend verification handler
|
||||
func NewResendVerificationHandler(
|
||||
logger *zap.Logger,
|
||||
service svc_auth.ResendVerificationService,
|
||||
) *ResendVerificationHandler {
|
||||
return &ResendVerificationHandler{
|
||||
logger: logger.Named("ResendVerificationHandler"),
|
||||
service: service,
|
||||
}
|
||||
}
|
||||
|
||||
// ServeHTTP handles the HTTP request
|
||||
func (h *ResendVerificationHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
|
||||
// Decode request
|
||||
var req svc_auth.ResendVerificationRequestDTO
|
||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||
h.logger.Error("Failed to decode resend verification request", zap.Error(err))
|
||||
problem := httperror.NewBadRequestError("Invalid request payload. Expected JSON with 'email' field.").
|
||||
WithInstance(r.URL.Path).
|
||||
WithTraceID(httperror.ExtractRequestID(r))
|
||||
httperror.RespondWithProblem(w, problem)
|
||||
return
|
||||
}
|
||||
|
||||
// Call service (service now handles validation and returns RFC 9457 errors)
|
||||
resp, err := h.service.Execute(ctx, &req)
|
||||
if err != nil {
|
||||
h.logger.Error("Resend verification failed", zap.Error(err))
|
||||
// Service returns RFC 9457 errors, use RespondWithError to handle them
|
||||
httperror.RespondWithError(w, r, err)
|
||||
return
|
||||
}
|
||||
|
||||
// Return success response
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusOK)
|
||||
json.NewEncoder(w).Encode(resp)
|
||||
}
|
||||
|
|
@ -0,0 +1,59 @@
|
|||
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/auth/verify_email.go
|
||||
package auth
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
|
||||
"go.uber.org/zap"
|
||||
|
||||
svc_auth "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/auth"
|
||||
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
|
||||
)
|
||||
|
||||
// VerifyEmailHandler handles email verification
|
||||
type VerifyEmailHandler struct {
|
||||
logger *zap.Logger
|
||||
service svc_auth.VerifyEmailService
|
||||
}
|
||||
|
||||
// NewVerifyEmailHandler creates a new verify email handler
|
||||
func NewVerifyEmailHandler(
|
||||
logger *zap.Logger,
|
||||
service svc_auth.VerifyEmailService,
|
||||
) *VerifyEmailHandler {
|
||||
return &VerifyEmailHandler{
|
||||
logger: logger.Named("VerifyEmailHandler"),
|
||||
service: service,
|
||||
}
|
||||
}
|
||||
|
||||
// ServeHTTP handles the HTTP request
|
||||
func (h *VerifyEmailHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
|
||||
// Decode request
|
||||
var req svc_auth.VerifyEmailRequestDTO
|
||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||
h.logger.Error("Failed to decode verify email request", zap.Error(err))
|
||||
problem := httperror.NewBadRequestError("Invalid request payload. Expected JSON with 'code' field.").
|
||||
WithInstance(r.URL.Path).
|
||||
WithTraceID(httperror.ExtractRequestID(r))
|
||||
httperror.RespondWithProblem(w, problem)
|
||||
return
|
||||
}
|
||||
|
||||
// Call service
|
||||
resp, err := h.service.Execute(ctx, &req)
|
||||
if err != nil {
|
||||
h.logger.Error("Email verification failed", zap.Error(err))
|
||||
// Service returns RFC 9457 errors, use RespondWithError to handle them
|
||||
httperror.RespondWithError(w, r, err)
|
||||
return
|
||||
}
|
||||
|
||||
// Return success response
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusOK)
|
||||
json.NewEncoder(w).Encode(resp)
|
||||
}
|
||||
|
|
@ -0,0 +1,53 @@
|
|||
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/auth/verify_ott.go
|
||||
package auth
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"net/http"
|
||||
|
||||
"go.uber.org/zap"
|
||||
|
||||
svc_auth "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/auth"
|
||||
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
|
||||
)
|
||||
|
||||
type VerifyOTTHandler struct {
|
||||
logger *zap.Logger
|
||||
service svc_auth.VerifyOTTService
|
||||
}
|
||||
|
||||
func NewVerifyOTTHandler(
|
||||
logger *zap.Logger,
|
||||
service svc_auth.VerifyOTTService,
|
||||
) *VerifyOTTHandler {
|
||||
return &VerifyOTTHandler{
|
||||
logger: logger.Named("VerifyOTTHandler"),
|
||||
service: service,
|
||||
}
|
||||
}
|
||||
|
||||
func (h *VerifyOTTHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
|
||||
var req svc_auth.VerifyOTTRequestDTO
|
||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||
h.logger.Error("Failed to decode verify OTT request", zap.Error(err))
|
||||
problem := httperror.NewBadRequestError("Invalid request payload. Expected JSON with 'email' and 'ott' fields.").
|
||||
WithInstance(r.URL.Path).
|
||||
WithTraceID(httperror.ExtractRequestID(r))
|
||||
httperror.RespondWithProblem(w, problem)
|
||||
return
|
||||
}
|
||||
|
||||
resp, err := h.service.Execute(ctx, &req)
|
||||
if err != nil {
|
||||
h.logger.Error("Verify OTT failed", zap.Error(err))
|
||||
// Service returns RFC 9457 errors, use RespondWithError to handle them
|
||||
httperror.RespondWithError(w, r, err)
|
||||
return
|
||||
}
|
||||
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusOK)
|
||||
json.NewEncoder(w).Encode(resp)
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue