mirror of
https://github.com/FJurmanovic/wallet-go-api.git
synced 2026-02-06 06:08:16 +00:00
196 lines
4.6 KiB
Go
196 lines
4.6 KiB
Go
package services
|
|
|
|
import (
|
|
"context"
|
|
"os"
|
|
"time"
|
|
"wallet-api/pkg/models"
|
|
"wallet-api/pkg/utl/common"
|
|
"wallet-api/pkg/utl/configs"
|
|
|
|
jwt "github.com/dgrijalva/jwt-go"
|
|
"golang.org/x/crypto/bcrypt"
|
|
|
|
"github.com/go-pg/pg/v10"
|
|
)
|
|
|
|
type UsersService struct {
|
|
Db *pg.DB
|
|
}
|
|
|
|
|
|
/*
|
|
Create
|
|
|
|
Inserts new row to users table.
|
|
Args:
|
|
context.Context: Application context
|
|
*models.User: User object to create
|
|
Returns:
|
|
*models.User: User object from database
|
|
*models.Exception
|
|
*/
|
|
func (us *UsersService) Create(ctx context.Context, registerBody *models.User) (*models.User, *models.Exception) {
|
|
db := us.Db.WithContext(ctx)
|
|
|
|
check := new(models.User)
|
|
exceptionReturn := new(models.Exception)
|
|
|
|
tx, _ := db.Begin()
|
|
defer tx.Rollback()
|
|
|
|
tx.Model(check).Where("? = ?", pg.Ident("username"), registerBody.Username).WhereOr("? = ?", pg.Ident("email"), registerBody.Email).Select()
|
|
if check.Username != "" || check.Email != "" {
|
|
exceptionReturn.Message = "User already exists"
|
|
exceptionReturn.ErrorCode = "400101"
|
|
exceptionReturn.StatusCode = 400
|
|
return check, exceptionReturn
|
|
}
|
|
|
|
hashedPassword, err := bcrypt.GenerateFromPassword([]byte(registerBody.Password), bcrypt.DefaultCost)
|
|
common.CheckError(err)
|
|
|
|
registerBody.Password = string(hashedPassword)
|
|
_, err = tx.Model(registerBody).Insert()
|
|
|
|
if err != nil {
|
|
exceptionReturn.Message = "Error creating user"
|
|
exceptionReturn.ErrorCode = "400102"
|
|
exceptionReturn.StatusCode = 400
|
|
}
|
|
|
|
tx.Commit()
|
|
|
|
return registerBody, exceptionReturn
|
|
}
|
|
|
|
/*
|
|
Login
|
|
|
|
Gets row from users table by email and valid password.
|
|
Args:
|
|
context.Context: Application context
|
|
*models.Login: object to search
|
|
Returns:
|
|
*models.Token: new session token
|
|
*models.Exception
|
|
*/
|
|
func (us *UsersService) Login(ctx context.Context, loginBody *models.Login) (*models.Token, *models.Exception) {
|
|
db := us.Db.WithContext(ctx)
|
|
|
|
check := new(models.User)
|
|
exceptionReturn := new(models.Exception)
|
|
tokenPayload := new(models.Token)
|
|
|
|
db.Model(check).Where("? = ?", pg.Ident("email"), loginBody.Email).Select()
|
|
if check.Email == "" {
|
|
exceptionReturn.Message = "Email not found"
|
|
exceptionReturn.ErrorCode = "400103"
|
|
exceptionReturn.StatusCode = 400
|
|
return tokenPayload, exceptionReturn
|
|
}
|
|
|
|
if !check.IsActive {
|
|
exceptionReturn.Message = "Can't log in. User is deactivated."
|
|
exceptionReturn.ErrorCode = "400106"
|
|
exceptionReturn.StatusCode = 400
|
|
return tokenPayload, exceptionReturn
|
|
}
|
|
|
|
if bcrypt.CompareHashAndPassword([]byte(check.Password), []byte(loginBody.Password)) != nil {
|
|
exceptionReturn.Message = "Incorrect password"
|
|
exceptionReturn.ErrorCode = "400104"
|
|
exceptionReturn.StatusCode = 400
|
|
return tokenPayload, exceptionReturn
|
|
}
|
|
|
|
token, err := CreateToken(check, loginBody.RememberMe)
|
|
common.CheckError(err)
|
|
|
|
tokenPayload.Token = token
|
|
|
|
return tokenPayload, exceptionReturn
|
|
}
|
|
|
|
/*
|
|
Deactivate
|
|
|
|
Updates row in users table.
|
|
|
|
IsActive column is set to false
|
|
Args:
|
|
context.Context: Application context
|
|
*models.Auth: Authentication object
|
|
Returns:
|
|
*models.MessageResponse
|
|
*models.Exception
|
|
*/
|
|
func (us *UsersService) Deactivate(ctx context.Context, auth *models.Auth) (*models.MessageResponse, *models.Exception) {
|
|
db := us.Db.WithContext(ctx)
|
|
|
|
mm := new(models.MessageResponse)
|
|
me := new(models.Exception)
|
|
um := new(models.User)
|
|
|
|
tx, _ := db.Begin()
|
|
defer tx.Rollback()
|
|
|
|
err := tx.Model(um).Where("? = ?", pg.Ident("id"), auth.Id).Select()
|
|
|
|
if err != nil {
|
|
me.ErrorCode = "404101"
|
|
me.Message = "User not found"
|
|
me.StatusCode = 404
|
|
return mm, me
|
|
}
|
|
um.IsActive = false
|
|
_, err = tx.Model(um).Where("? = ?", pg.Ident("id"), auth.Id).Update()
|
|
|
|
if err != nil {
|
|
me.ErrorCode = "400105"
|
|
me.Message = "Could not deactivate user"
|
|
me.StatusCode = 400
|
|
return mm, me
|
|
}
|
|
|
|
mm.Message = "User successfully deactivated."
|
|
|
|
tx.Commit()
|
|
|
|
return mm, me
|
|
}
|
|
|
|
/*
|
|
CreateToken
|
|
|
|
Generates new jwt token.
|
|
|
|
It encodes the user id. Based on rememberMe it is valid through 48hours or 2hours.
|
|
Args:
|
|
*models.User: User object to encode
|
|
bool: Should function generate longer lasting token (48hrs)
|
|
Returns:
|
|
string: Generated token
|
|
error: Error that occured in the process
|
|
*/
|
|
func CreateToken(user *models.User, rememberMe bool) (string, error) {
|
|
atClaims := jwt.MapClaims{}
|
|
atClaims["authorized"] = true
|
|
atClaims["id"] = user.Id
|
|
if rememberMe {
|
|
atClaims["exp"] = time.Now().Add(time.Hour * 48).Unix()
|
|
} else {
|
|
atClaims["exp"] = time.Now().Add(time.Hour * 2).Unix()
|
|
}
|
|
|
|
secret := os.Getenv("ACCESS_SECRET")
|
|
if secret == "" {
|
|
secret = configs.Secret
|
|
}
|
|
|
|
at := jwt.NewWithClaims(jwt.SigningMethodHS256, atClaims)
|
|
token, err := at.SignedString([]byte(secret))
|
|
|
|
return token, err
|
|
}
|