Files
smart-search-back/internal/service/auth.go
vallyenfail e2968722ed
Some checks failed
Deploy Smart Search Backend / deploy (push) Failing after 1m54s
add service
2026-01-17 20:41:37 +03:00

117 lines
3.4 KiB
Go

package service
import (
"context"
"time"
"git.techease.ru/Smart-search/smart-search-back/internal/model"
"git.techease.ru/Smart-search/smart-search-back/internal/repository"
"git.techease.ru/Smart-search/smart-search-back/pkg/crypto"
"git.techease.ru/Smart-search/smart-search-back/pkg/errors"
"git.techease.ru/Smart-search/smart-search-back/pkg/jwt"
)
type authService struct {
userRepo repository.UserRepository
sessionRepo repository.SessionRepository
jwtSecret string
cryptoHelper *crypto.Crypto
}
func NewAuthService(userRepo repository.UserRepository, sessionRepo repository.SessionRepository, jwtSecret, cryptoSecret string) AuthService {
return &authService{
userRepo: userRepo,
sessionRepo: sessionRepo,
jwtSecret: jwtSecret,
cryptoHelper: crypto.NewCrypto(cryptoSecret),
}
}
func (s *authService) Login(ctx context.Context, email, password, ip, userAgent string) (accessToken, refreshToken string, err error) {
emailHash := s.cryptoHelper.EmailHash(email)
user, err := s.userRepo.FindByEmailHash(ctx, emailHash)
if err != nil {
return "", "", err
}
passwordHash := crypto.PasswordHash(password)
if user.PasswordHash != passwordHash {
return "", "", errors.NewBusinessError(errors.AuthInvalidCredentials, "Invalid email or password")
}
accessToken, err = jwt.GenerateAccessToken(user.ID, s.jwtSecret)
if err != nil {
return "", "", errors.NewInternalError(errors.InternalError, "failed to generate access token", err)
}
refreshToken, err = jwt.GenerateRefreshToken(user.ID, s.jwtSecret)
if err != nil {
return "", "", errors.NewInternalError(errors.InternalError, "failed to generate refresh token", err)
}
session := &model.Session{
UserID: user.ID,
AccessToken: accessToken,
RefreshToken: refreshToken,
IP: ip,
UserAgent: userAgent,
ExpiresAt: time.Now().Add(30 * 24 * time.Hour),
}
if err := s.sessionRepo.Create(ctx, session); err != nil {
return "", "", err
}
return accessToken, refreshToken, nil
}
func (s *authService) Refresh(ctx context.Context, refreshToken string) (string, error) {
session, err := s.sessionRepo.FindByRefreshToken(ctx, refreshToken)
if err != nil {
return "", err
}
newAccessToken, err := jwt.GenerateAccessToken(session.UserID, s.jwtSecret)
if err != nil {
return "", errors.NewInternalError(errors.InternalError, "failed to generate access token", err)
}
if err := s.sessionRepo.UpdateAccessToken(ctx, refreshToken, newAccessToken); err != nil {
return "", err
}
return newAccessToken, nil
}
func (s *authService) Validate(ctx context.Context, accessToken string) (int, error) {
claims, err := jwt.ValidateToken(accessToken, s.jwtSecret)
if err != nil {
return 0, errors.NewBusinessError(errors.AuthInvalidToken, "Invalid or expired token")
}
if claims.Type != "access" {
return 0, errors.NewBusinessError(errors.AuthInvalidToken, "Token is not an access token")
}
userID, err := jwt.GetUserIDFromToken(accessToken, s.jwtSecret)
if err != nil {
return 0, errors.NewBusinessError(errors.AuthInvalidToken, "Invalid user ID in token")
}
isValid, err := s.sessionRepo.IsAccessTokenValid(ctx, accessToken)
if err != nil {
return 0, err
}
if !isValid {
return 0, errors.NewBusinessError(errors.AuthInvalidToken, "Token has been revoked or expired")
}
return userID, nil
}
func (s *authService) Logout(ctx context.Context, accessToken string) error {
return s.sessionRepo.RevokeByAccessToken(ctx, accessToken)
}