Files
backend/internal/core/auth_service.go
2025-06-18 09:01:14 +03:00

102 lines
2.6 KiB
Go

package core
import (
"context"
"errors"
"os"
"strings"
"time"
"gitea.mrixs.me/minecraft-platform/backend/internal/database"
"gitea.mrixs.me/minecraft-platform/backend/internal/models"
"github.com/golang-jwt/jwt/v5"
"github.com/google/uuid"
"golang.org/x/crypto/bcrypt"
)
var (
ErrInvalidCredentials = errors.New("invalid credentials")
)
type AuthService struct {
UserRepo *database.UserRepository
}
// Authenticate проверяет учетные данные и возвращает данные для ответа Yggdrasil.
func (s *AuthService) Authenticate(ctx context.Context, req models.AuthenticateRequest) (*models.AuthenticateResponse, error) {
user, err := s.UserRepo.GetUserByUsername(ctx, req.Username)
if err != nil {
if errors.Is(err, database.ErrUserNotFound) {
return nil, ErrInvalidCredentials
}
return nil, err
}
err = bcrypt.CompareHashAndPassword([]byte(user.PasswordHash), []byte(req.Password))
if err != nil {
return nil, ErrInvalidCredentials
}
accessToken := uuid.New().String()
err = s.UserRepo.CreateAccessToken(ctx, user.ID, accessToken, req.ClientToken)
if err != nil {
return nil, err
}
profile := models.ProfileInfo{
ID: strings.ReplaceAll(user.UUID.String(), "-", ""),
Name: user.Username,
}
response := &models.AuthenticateResponse{
AccessToken: accessToken,
ClientToken: req.ClientToken,
AvailableProfiles: []models.ProfileInfo{profile},
SelectedProfile: profile,
User: &models.UserProperty{
ID: user.UUID.String(),
Properties: []any{},
},
}
return response, nil
}
// LoginUser проверяет учетные данные и генерирует JWT для веб-сессии.
func (s *AuthService) LoginUser(ctx context.Context, req models.LoginRequest) (string, *models.User, error) {
user, err := s.UserRepo.GetUserByLogin(ctx, req.Login)
if err != nil {
if errors.Is(err, database.ErrUserNotFound) {
return "", nil, ErrInvalidCredentials
}
return "", nil, err
}
err = bcrypt.CompareHashAndPassword([]byte(user.PasswordHash), []byte(req.Password))
if err != nil {
return "", nil, ErrInvalidCredentials
}
expirationTime := time.Now().Add(72 * time.Hour)
claims := &jwt.MapClaims{
"exp": expirationTime.Unix(),
"iat": time.Now().Unix(),
"user_id": user.ID,
"role": user.Role,
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
jwtSecret := os.Getenv("JWT_SECRET_KEY")
tokenString, err := token.SignedString([]byte(jwtSecret))
if err != nil {
return "", nil, err
}
user.PasswordHash = ""
return tokenString, user, nil
}