136 lines
3.5 KiB
Go
136 lines
3.5 KiB
Go
package services
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/golang-jwt/jwt/v5"
|
|
"github.com/pahmiudahgede/senggoldong/dto"
|
|
"github.com/pahmiudahgede/senggoldong/internal/repositories"
|
|
"github.com/pahmiudahgede/senggoldong/model"
|
|
"github.com/pahmiudahgede/senggoldong/utils"
|
|
"golang.org/x/crypto/bcrypt"
|
|
)
|
|
|
|
type UserService interface {
|
|
Login(credentials dto.LoginDTO) (*dto.UserResponseWithToken, error)
|
|
Register(user dto.RegisterDTO) (*model.User, error)
|
|
}
|
|
|
|
type userService struct {
|
|
UserRepo repositories.UserRepository
|
|
RoleRepo repositories.RoleRepository
|
|
SecretKey string
|
|
}
|
|
|
|
func NewUserService(userRepo repositories.UserRepository, roleRepo repositories.RoleRepository, secretKey string) UserService {
|
|
return &userService{UserRepo: userRepo, RoleRepo: roleRepo, SecretKey: secretKey}
|
|
}
|
|
|
|
func (s *userService) Login(credentials dto.LoginDTO) (*dto.UserResponseWithToken, error) {
|
|
if credentials.RoleID == "" {
|
|
return nil, errors.New("roleId is required")
|
|
}
|
|
|
|
user, err := s.UserRepo.FindByIdentifierAndRole(credentials.Identifier, credentials.RoleID)
|
|
if err != nil {
|
|
return nil, errors.New("akun dengan role tersebut belum terdaftar")
|
|
}
|
|
|
|
if !CheckPasswordHash(credentials.Password, user.Password) {
|
|
return nil, errors.New("password yang anda masukkan salah")
|
|
}
|
|
|
|
token, err := s.generateJWT(user)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
err = utils.SetData(credentials.Identifier, token, time.Hour*24)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &dto.UserResponseWithToken{
|
|
RoleName: user.Role.RoleName,
|
|
UserID: user.ID,
|
|
Token: token,
|
|
}, nil
|
|
}
|
|
|
|
func (s *userService) generateJWT(user *model.User) (string, error) {
|
|
claims := jwt.MapClaims{
|
|
"sub": user.ID,
|
|
"iat": time.Now().Unix(),
|
|
"exp": time.Now().Add(time.Hour * 24).Unix(),
|
|
}
|
|
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
|
|
|
tokenString, err := token.SignedString([]byte(s.SecretKey))
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return tokenString, nil
|
|
}
|
|
|
|
func CheckPasswordHash(password, hashedPassword string) bool {
|
|
err := bcrypt.CompareHashAndPassword([]byte(hashedPassword), []byte(password))
|
|
return err == nil
|
|
}
|
|
|
|
func (s *userService) Register(user dto.RegisterDTO) (*model.User, error) {
|
|
if user.Password != user.ConfirmPassword {
|
|
return nil, fmt.Errorf("password and confirm password do not match")
|
|
}
|
|
|
|
if user.RoleID == "" {
|
|
return nil, fmt.Errorf("roleId is required")
|
|
}
|
|
|
|
role, err := s.RoleRepo.FindByID(user.RoleID)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("invalid roleId")
|
|
}
|
|
|
|
existingUser, _ := s.UserRepo.FindByUsername(user.Username)
|
|
if existingUser != nil {
|
|
return nil, fmt.Errorf("username is already taken")
|
|
}
|
|
|
|
existingPhone, _ := s.UserRepo.FindByPhoneAndRole(user.Phone, user.RoleID)
|
|
if existingPhone != nil {
|
|
return nil, fmt.Errorf("phone number is already used for this role")
|
|
}
|
|
|
|
existingEmail, _ := s.UserRepo.FindByEmailAndRole(user.Email, user.RoleID)
|
|
if existingEmail != nil {
|
|
return nil, fmt.Errorf("email is already used for this role")
|
|
}
|
|
|
|
hashedPassword, err := bcrypt.GenerateFromPassword([]byte(user.Password), bcrypt.DefaultCost)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to hash password: %v", err)
|
|
}
|
|
|
|
newUser := model.User{
|
|
Username: user.Username,
|
|
Name: user.Name,
|
|
Phone: user.Phone,
|
|
Email: user.Email,
|
|
Password: string(hashedPassword),
|
|
RoleID: user.RoleID,
|
|
}
|
|
|
|
err = s.UserRepo.Create(&newUser)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to create user: %v", err)
|
|
}
|
|
|
|
newUser.Role = *role
|
|
|
|
return &newUser, nil
|
|
}
|