// verify it's signed
// store pubkey in db
// create user with pubkey and name truncated pubkey
import { secp256k1 } from '@noble/curves/secp256k1'
import models from '@/api/models'

const HOUR = 1000 * 60 * 60

export default async ({ query }, res) => {
  try {
    const sig = Buffer.from(query.sig, 'hex')
    const k1 = Buffer.from(query.k1, 'hex')
    const key = Buffer.from(query.key, 'hex')
    if (secp256k1.verify(sig, k1, key)) {
      const auth = await models.lnAuth.findUnique({ where: { k1: query.k1 } })
      if (!auth || auth.pubkey || auth.createdAt < Date.now() - HOUR) {
        return res.status(400).json({ status: 'ERROR', reason: 'token expired' })
      }

      await models.lnAuth.update({ where: { k1: query.k1 }, data: { pubkey: query.key } })
      return res.status(200).json({ status: 'OK' })
    }
  } catch (error) {
    console.log(error)
  }

  let reason = 'signature verification failed'
  if (!query.sig) {
    reason = 'no sig query variable provided'
  } else if (!query.k1) {
    reason = 'no k1 query variable provided'
  } else if (!query.key) {
    reason = 'no key query variable provided'
  }
  return res.status(400).json({ status: 'ERROR', reason })
}