1
|
|
|
package auth |
2
|
|
|
|
3
|
|
|
import ( |
4
|
|
|
"context" |
5
|
|
|
"log/slog" |
6
|
|
|
"strings" |
7
|
|
|
|
8
|
|
|
"github.com/gofiber/fiber/v2/log" |
9
|
|
|
"github.com/memnix/memnix-rest/domain" |
10
|
|
|
"github.com/memnix/memnix-rest/pkg/jwt" |
11
|
|
|
"github.com/memnix/memnix-rest/services/user" |
12
|
|
|
"github.com/pkg/errors" |
13
|
|
|
"golang.org/x/crypto/bcrypt" |
14
|
|
|
"gorm.io/gorm" |
15
|
|
|
) |
16
|
|
|
|
17
|
|
|
// UseCase is the auth use case. |
18
|
|
|
type UseCase struct { |
19
|
|
|
user.IRepository |
20
|
|
|
} |
21
|
|
|
|
22
|
|
|
// NewUseCase creates a new auth use case. |
23
|
|
|
func NewUseCase(repo user.IRepository) IUseCase { |
24
|
|
|
return &UseCase{IRepository: repo} |
25
|
|
|
} |
26
|
|
|
|
27
|
|
|
// Login logs in a user |
28
|
|
|
// Returns a token and error. |
29
|
|
|
func (a *UseCase) Login(ctx context.Context, password string, email string) (string, error) { |
30
|
|
|
userModel, err := a.IRepository.GetByEmail(ctx, email) |
31
|
|
|
if err != nil { |
32
|
|
|
log.WithContext(ctx).Error("user not found ", slog.Any("error", err), slog.String(" email", email)) |
33
|
|
|
return "", errors.New("user not found") |
34
|
|
|
} |
35
|
|
|
|
36
|
|
|
ok, err := ComparePasswords(ctx, password, []byte(userModel.Password)) |
37
|
|
|
if errors.Is(err, bcrypt.ErrMismatchedHashAndPassword) || !ok { |
38
|
|
|
return "", errors.New("invalid password") |
39
|
|
|
} |
40
|
|
|
if err != nil { |
41
|
|
|
return "", err |
42
|
|
|
} |
43
|
|
|
|
44
|
|
|
token, err := jwt.GetJwtInstance().GetJwt().GenerateToken(ctx, userModel.ID) |
45
|
|
|
if err != nil { |
46
|
|
|
return "", err |
47
|
|
|
} |
48
|
|
|
|
49
|
|
|
return token, nil |
50
|
|
|
} |
51
|
|
|
|
52
|
|
|
// Register registers a new user |
53
|
|
|
// Returns an error. |
54
|
|
|
func (a *UseCase) Register(ctx context.Context, registerStruct domain.Register) (domain.User, error) { |
55
|
|
|
if err := VerifyPassword(registerStruct.Password); err != nil { |
56
|
|
|
return domain.User{}, errors.Wrap(err, "Verify password failed") |
57
|
|
|
} |
58
|
|
|
|
59
|
|
|
hash, err := GenerateEncryptedPassword(ctx, registerStruct.Password) |
60
|
|
|
if err != nil { |
61
|
|
|
return domain.User{}, errors.Wrap(err, "Generate encrypted password failed") |
62
|
|
|
} |
63
|
|
|
|
64
|
|
|
registerStruct.Password = string(hash) |
65
|
|
|
registerStruct.Email = strings.ToLower(registerStruct.Email) |
66
|
|
|
userModel := registerStruct.ToUser() |
67
|
|
|
|
68
|
|
|
if err = a.Create(ctx, &userModel); err != nil { |
69
|
|
|
log.WithContext(ctx).Error("failed to create registerStruct in register", slog.Any("error", err)) |
70
|
|
|
return domain.User{}, errors.Wrap(err, "failed to create registerStruct in register") |
71
|
|
|
} |
72
|
|
|
|
73
|
|
|
userModel, err = a.GetByEmail(ctx, registerStruct.Email) |
74
|
|
|
if err != nil { |
75
|
|
|
return domain.User{}, errors.Wrap(err, "failed to get registerStruct in register") |
76
|
|
|
} |
77
|
|
|
|
78
|
|
|
return userModel, nil |
79
|
|
|
} |
80
|
|
|
|
81
|
|
|
// Logout returns an empty string |
82
|
|
|
// It might be used to invalidate a token in the future. |
83
|
|
|
func (*UseCase) Logout(_ context.Context) (string, error) { |
84
|
|
|
return "", nil |
85
|
|
|
} |
86
|
|
|
|
87
|
|
|
// RefreshToken refreshes a token. |
88
|
|
|
func (*UseCase) RefreshToken(ctx context.Context, user domain.User) (string, error) { |
89
|
|
|
token, err := jwt.GetJwtInstance().GetJwt().GenerateToken(ctx, user.ID) |
90
|
|
|
if err != nil { |
91
|
|
|
return "", err |
92
|
|
|
} |
93
|
|
|
|
94
|
|
|
return token, nil |
95
|
|
|
} |
96
|
|
|
|
97
|
|
|
// RegisterOauth registers a new user with oauth. |
98
|
|
|
func (a *UseCase) RegisterOauth(ctx context.Context, user domain.User) error { |
99
|
|
|
return a.Create(ctx, &user) |
100
|
|
|
} |
101
|
|
|
|
102
|
|
|
func (a *UseCase) LoginOauth(ctx context.Context, user domain.User) (string, error) { |
103
|
|
|
userModel, err := a.GetByEmail(ctx, user.Email) |
104
|
|
|
if err != nil && !errors.Is(err, gorm.ErrRecordNotFound) { |
105
|
|
|
log.WithContext(ctx).Error("failed to get user", slog.Any("error", err)) |
106
|
|
|
return "", err |
107
|
|
|
} |
108
|
|
|
|
109
|
|
|
if err == nil && userModel.OauthProvider != user.OauthProvider && userModel.OauthProvider != "" { |
110
|
|
|
log.WithContext(ctx).Warn("user is already registered with another provider") |
111
|
|
|
return "", errors.New("user is already registered with another provider") |
112
|
|
|
} |
113
|
|
|
|
114
|
|
|
if err != nil && errors.Is(err, gorm.ErrRecordNotFound) { |
115
|
|
|
err = a.RegisterOauth(ctx, user) |
116
|
|
|
if err != nil { |
117
|
|
|
log.WithContext(ctx).Error("failed to register user", slog.Any("error", err)) |
118
|
|
|
return "", errors.Wrap(err, "failed to register user") |
119
|
|
|
} |
120
|
|
|
|
121
|
|
|
userModel, err = a.GetByEmail(ctx, user.Email) |
122
|
|
|
if err != nil { |
123
|
|
|
log.WithContext(ctx).Error("failed to get user", slog.Any("error", err)) |
124
|
|
|
return "", errors.New("failed to get user") |
125
|
|
|
} |
126
|
|
|
} |
127
|
|
|
|
128
|
|
|
// Check if user is up to date |
129
|
|
|
if userModel.OauthID == "" { |
130
|
|
|
userModel.OauthID = user.OauthID |
131
|
|
|
userModel.OauthProvider = user.OauthProvider |
132
|
|
|
if user.Avatar != "" { |
133
|
|
|
userModel.Avatar = user.Avatar |
134
|
|
|
} |
135
|
|
|
err = a.Update(ctx, &userModel) |
136
|
|
|
if err != nil { |
137
|
|
|
log.WithContext(ctx).Error("failed to update user", slog.Any("error", err)) |
138
|
|
|
return "", errors.Wrap(err, "failed to update user") |
139
|
|
|
} |
140
|
|
|
} |
141
|
|
|
|
142
|
|
|
return jwt.GetJwtInstance().GetJwt().GenerateToken(ctx, userModel.ID) |
143
|
|
|
} |
144
|
|
|
|