MIF_E31222379_BE/internal/services/auth_service.go

214 lines
5.7 KiB
Go

package services
import (
"context"
"errors"
"fmt"
"time"
"github.com/golang-jwt/jwt/v5"
"github.com/pahmiudahgede/senggoldong/dto"
"github.com/pahmiudahgede/senggoldong/internal/repositories"
"github.com/pahmiudahgede/senggoldong/model"
"github.com/pahmiudahgede/senggoldong/utils"
"golang.org/x/crypto/bcrypt"
)
type UserService interface {
Login(credentials dto.LoginDTO) (*dto.UserResponseWithToken, error)
Register(user dto.RegisterDTO) (*model.User, error)
GetUserProfile(userID string) (*dto.UserResponseDTO, error)
}
type userService struct {
UserRepo repositories.UserRepository
RoleRepo repositories.RoleRepository
SecretKey string
}
func NewUserService(userRepo repositories.UserRepository, roleRepo repositories.RoleRepository, secretKey string) UserService {
return &userService{UserRepo: userRepo, RoleRepo: roleRepo, SecretKey: secretKey}
}
func (s *userService) Login(credentials dto.LoginDTO) (*dto.UserResponseWithToken, error) {
if credentials.RoleID == "" {
return nil, errors.New("roleId is required")
}
user, err := s.UserRepo.FindByIdentifierAndRole(credentials.Identifier, credentials.RoleID)
if err != nil {
return nil, errors.New("akun dengan role tersebut belum terdaftar")
}
if !CheckPasswordHash(credentials.Password, user.Password) {
return nil, errors.New("password yang anda masukkan salah")
}
token, err := s.generateJWT(user)
if err != nil {
return nil, err
}
ctx := context.Background()
sessionKey := fmt.Sprintf("session:%s", user.ID)
sessionData := map[string]interface{}{
"userID": user.ID,
"roleID": user.RoleID,
"roleName": user.Role.RoleName,
}
err = utils.SetJSONData(ctx, sessionKey, sessionData, time.Hour*24)
if err != nil {
return nil, err
}
return &dto.UserResponseWithToken{
RoleName: user.Role.RoleName,
UserID: user.ID,
Token: token,
}, nil
}
func (s *userService) generateJWT(user *model.User) (string, error) {
claims := jwt.MapClaims{
"sub": user.ID,
"iat": time.Now().Unix(),
"exp": time.Now().Add(time.Hour * 24).Unix(),
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
tokenString, err := token.SignedString([]byte(s.SecretKey))
if err != nil {
return "", err
}
return tokenString, nil
}
func CheckPasswordHash(password, hashedPassword string) bool {
err := bcrypt.CompareHashAndPassword([]byte(hashedPassword), []byte(password))
return err == nil
}
func (s *userService) GetUserProfile(userID string) (*dto.UserResponseDTO, error) {
ctx := context.Background()
cacheKey := "user:profile:" + userID
if exists, _ := utils.CheckKeyExists(ctx, cacheKey); exists {
cachedUser, _ := utils.GetJSONData(ctx, cacheKey)
if cachedUser != nil {
if userDTO, ok := mapToUserResponseDTO(cachedUser); ok {
return userDTO, nil
}
}
}
user, err := s.UserRepo.FindByID(userID)
if err != nil {
return nil, errors.New("user not found")
}
createdAt, _ := utils.FormatDateToIndonesianFormat(user.CreatedAt)
updatedAt, _ := utils.FormatDateToIndonesianFormat(user.UpdatedAt)
userResponse := &dto.UserResponseDTO{
ID: user.ID,
Username: user.Username,
Name: user.Name,
Phone: user.Phone,
Email: user.Email,
EmailVerified: user.EmailVerified,
RoleName: user.Role.RoleName,
CreatedAt: createdAt,
UpdatedAt: updatedAt,
}
err = utils.SetJSONData(ctx, cacheKey, userResponse, 5*time.Minute)
if err != nil {
return nil, errors.New("failed to cache user data")
}
return userResponse, nil
}
func mapToUserResponseDTO(data map[string]interface{}) (*dto.UserResponseDTO, bool) {
id, idOk := data["id"].(string)
username, usernameOk := data["username"].(string)
name, nameOk := data["name"].(string)
phone, phoneOk := data["phone"].(string)
email, emailOk := data["email"].(string)
emailVerified, emailVerifiedOk := data["emailVerified"].(bool)
roleName, roleNameOk := data["roleName"].(string)
createdAt, createdAtOk := data["createdAt"].(string)
updatedAt, updatedAtOk := data["updatedAt"].(string)
if !(idOk && usernameOk && nameOk && phoneOk && emailOk && emailVerifiedOk && roleNameOk && createdAtOk && updatedAtOk) {
return nil, false
}
return &dto.UserResponseDTO{
ID: id,
Username: username,
Name: name,
Phone: phone,
Email: email,
EmailVerified: emailVerified,
RoleName: roleName,
CreatedAt: createdAt,
UpdatedAt: updatedAt,
}, true
}
func (s *userService) Register(user dto.RegisterDTO) (*model.User, error) {
if user.Password != user.ConfirmPassword {
return nil, fmt.Errorf("password and confirm password do not match")
}
if user.RoleID == "" {
return nil, fmt.Errorf("roleId is required")
}
role, err := s.RoleRepo.FindByID(user.RoleID)
if err != nil {
return nil, fmt.Errorf("invalid roleId")
}
existingUser, _ := s.UserRepo.FindByUsername(user.Username)
if existingUser != nil {
return nil, fmt.Errorf("username is already taken")
}
existingPhone, _ := s.UserRepo.FindByPhoneAndRole(user.Phone, user.RoleID)
if existingPhone != nil {
return nil, fmt.Errorf("phone number is already used for this role")
}
existingEmail, _ := s.UserRepo.FindByEmailAndRole(user.Email, user.RoleID)
if existingEmail != nil {
return nil, fmt.Errorf("email is already used for this role")
}
hashedPassword, err := bcrypt.GenerateFromPassword([]byte(user.Password), bcrypt.DefaultCost)
if err != nil {
return nil, fmt.Errorf("failed to hash password: %v", err)
}
newUser := model.User{
Username: user.Username,
Name: user.Name,
Phone: user.Phone,
Email: user.Email,
Password: string(hashedPassword),
RoleID: user.RoleID,
}
err = s.UserRepo.Create(&newUser)
if err != nil {
return nil, fmt.Errorf("failed to create user: %v", err)
}
newUser.Role = *role
return &newUser, nil
}