Files
drive/apps/backend/internal/auth/service.go

131 lines
2.6 KiB
Go
Raw Normal View History

package auth
import (
"context"
"encoding/hex"
"errors"
2025-11-26 01:09:42 +00:00
"github.com/get-drexa/drexa/internal/user"
"github.com/google/uuid"
"github.com/uptrace/bun"
)
type LoginResult struct {
2025-11-26 01:09:42 +00:00
User *user.User
AccessToken string
RefreshToken string
}
var ErrInvalidCredentials = errors.New("invalid credentials")
var ErrUserExists = errors.New("user already exists")
type Service struct {
db *bun.DB
2025-11-26 01:09:42 +00:00
userService *user.Service
tokenConfig TokenConfig
}
type registerOptions struct {
displayName string
email string
password string
}
2025-11-26 01:09:42 +00:00
func NewService(db *bun.DB, userService *user.Service, tokenConfig TokenConfig) *Service {
return &Service{
db: db,
2025-11-26 01:09:42 +00:00
userService: userService,
tokenConfig: tokenConfig,
}
}
func (s *Service) LoginWithEmailAndPassword(ctx context.Context, email, password string) (*LoginResult, error) {
2025-11-26 01:09:42 +00:00
var u user.User
2025-11-26 01:09:42 +00:00
err := s.db.NewSelect().Model(&u).Where("email = ?", email).Scan(ctx)
if err != nil {
return nil, err
}
2025-11-26 01:09:42 +00:00
ok, err := VerifyPassword(password, u.Password)
if err != nil || !ok {
return nil, ErrInvalidCredentials
}
2025-11-26 01:09:42 +00:00
at, err := GenerateAccessToken(&u, &s.tokenConfig)
if err != nil {
return nil, err
}
2025-11-26 01:09:42 +00:00
rt, err := GenerateRefreshToken(&u, &s.tokenConfig)
if err != nil {
return nil, err
}
_, err = s.db.NewInsert().Model(rt).Exec(ctx)
if err != nil {
return nil, err
}
return &LoginResult{
2025-11-26 01:09:42 +00:00
User: &u,
AccessToken: at,
RefreshToken: hex.EncodeToString(rt.Token),
}, nil
}
func (s *Service) Register(ctx context.Context, opts registerOptions) (*LoginResult, error) {
2025-11-26 01:09:42 +00:00
u := user.User{
Email: opts.email,
DisplayName: opts.displayName,
}
2025-11-26 01:09:42 +00:00
exists, err := s.db.NewSelect().Model(&u).Where("email = ?", opts.email).Exists(ctx)
if err != nil {
return nil, err
}
if exists {
return nil, ErrUserExists
}
2025-11-26 01:09:42 +00:00
u.Password, err = HashPassword(opts.password)
if err != nil {
return nil, err
}
2025-11-26 01:09:42 +00:00
_, err = s.db.NewInsert().Model(&u).Exec(ctx)
if err != nil {
return nil, err
}
2025-11-26 01:09:42 +00:00
at, err := GenerateAccessToken(&u, &s.tokenConfig)
if err != nil {
return nil, err
}
2025-11-26 01:09:42 +00:00
rt, err := GenerateRefreshToken(&u, &s.tokenConfig)
if err != nil {
return nil, err
}
return &LoginResult{
2025-11-26 01:09:42 +00:00
User: &u,
AccessToken: at,
RefreshToken: hex.EncodeToString(rt.Token),
}, nil
}
2025-11-26 01:09:42 +00:00
func (s *Service) AuthenticateWithAccessToken(ctx context.Context, token string) (*user.User, error) {
claims, err := ParseAccessToken(token, &s.tokenConfig)
if err != nil {
return nil, err
}
id, err := uuid.Parse(claims.Subject)
if err != nil {
return nil, newInvalidAccessTokenError(err)
}
return s.userService.UserByID(ctx, id)
}