user.go 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393
  1. package handlers
  2. import (
  3. "time"
  4. "git.linuxforward.com/byom/byom-core/common"
  5. "git.linuxforward.com/byom/byom-core/hook"
  6. "git.linuxforward.com/byom/byom-core/jwtutils"
  7. "git.linuxforward.com/byom/byom-core/smtp"
  8. "git.linuxforward.com/byom/byom-core/store"
  9. "github.com/gin-gonic/gin"
  10. "github.com/golang-jwt/jwt/v5"
  11. "github.com/google/uuid"
  12. "github.com/sirupsen/logrus"
  13. "golang.org/x/crypto/bcrypt"
  14. )
  15. type UserHandler struct {
  16. store *store.DataStore
  17. emailService *smtp.Service
  18. jwtService *jwtutils.Service
  19. logger *logrus.Entry
  20. hook *hook.HookClient
  21. }
  22. func NewUserHandler(db *store.DataStore, emailSvc *smtp.Service, jwtSvc *jwtutils.Service, hook *hook.HookClient) *UserHandler {
  23. logger := logrus.WithField("core", "user-handler")
  24. return &UserHandler{
  25. store: db,
  26. emailService: emailSvc,
  27. jwtService: jwtSvc,
  28. logger: logger,
  29. hook: hook,
  30. }
  31. }
  32. func (h *UserHandler) InitWorkspaceOwner(c *gin.Context) {
  33. var req common.InitWorkspaceOwnerRequest
  34. if err := c.ShouldBindJSON(&req); err != nil {
  35. c.JSON(400, gin.H{"error": "Invalid request"})
  36. return
  37. }
  38. user := &common.User{
  39. ID: uuid.New(),
  40. Email: req.Email,
  41. Name: req.Name,
  42. Role: "owner",
  43. Status: "pending",
  44. CreatedAt: time.Now(),
  45. UpdatedAt: time.Now(),
  46. }
  47. if err := h.store.CreateUser(c, user); err != nil {
  48. c.JSON(500, gin.H{"error": "Failed to create user"})
  49. return
  50. }
  51. c.JSON(201, user)
  52. }
  53. func (h *UserHandler) CreateWorkspaceOwner(c *gin.Context) {
  54. var req common.CreateWorkspaceOwnerRequest
  55. if err := c.ShouldBindJSON(&req); err != nil {
  56. c.JSON(400, gin.H{"error": "Invalid request"})
  57. return
  58. }
  59. //check if the received email is already the one from the owner
  60. tmpOwner, err := h.store.GetUserByEmail(c, req.Email)
  61. if err != nil {
  62. c.JSON(500, gin.H{"error": "Failed to get user"})
  63. return
  64. }
  65. if tmpOwner.Email != req.Email {
  66. c.JSON(400, gin.H{"error": "Email does not match the owner"})
  67. return
  68. }
  69. hashedPassword, _ := bcrypt.GenerateFromPassword([]byte(req.Password), bcrypt.DefaultCost)
  70. user := &common.User{
  71. ID: tmpOwner.ID,
  72. Email: tmpOwner.Email,
  73. Name: tmpOwner.Name,
  74. PhoneNumber: tmpOwner.PhoneNumber,
  75. Password: string(hashedPassword),
  76. PasswordCreated: true,
  77. Role: tmpOwner.Role,
  78. Status: "active",
  79. CreatedAt: tmpOwner.CreatedAt,
  80. UpdatedAt: time.Now(),
  81. }
  82. if err := h.store.UpdateUser(c, user); err != nil {
  83. c.JSON(500, gin.H{"error": "Failed to create user"})
  84. return
  85. }
  86. user.Password = ""
  87. c.JSON(201, user)
  88. }
  89. func (h *UserHandler) CreateInvitedUser(c *gin.Context) {
  90. var req common.CreateInvitedUserRequest
  91. if err := c.ShouldBindJSON(&req); err != nil {
  92. c.JSON(400, gin.H{"error": "Invalid request"})
  93. return
  94. }
  95. invite, err := h.store.GetInvite(c, req.Token)
  96. if err != nil {
  97. c.JSON(400, gin.H{"error": "Invalid invitation"})
  98. return
  99. }
  100. tx := h.store.BeginTx()
  101. hashedPassword, _ := bcrypt.GenerateFromPassword([]byte(req.Password), bcrypt.DefaultCost)
  102. user := &common.User{
  103. ID: uuid.New(),
  104. Email: req.Email,
  105. Name: req.Name,
  106. PhoneNumber: req.PhoneNumber,
  107. Password: string(hashedPassword),
  108. PasswordCreated: true,
  109. Role: invite.Role,
  110. Status: "active",
  111. CreatedAt: time.Now(),
  112. UpdatedAt: time.Now(),
  113. }
  114. if err := h.store.CreateUserTx(c, tx, user); err != nil {
  115. tx.Rollback()
  116. c.JSON(500, gin.H{"error": "Failed to create user"})
  117. return
  118. }
  119. //add user to workspace
  120. workspaceID, err := uuid.Parse(invite.Workspace)
  121. if err != nil {
  122. tx.Rollback()
  123. c.JSON(400, gin.H{"error": "Invalid workspace ID"})
  124. return
  125. }
  126. if err := h.store.AddUserToWorkspaceTx(c, tx, invite.Role, user.ID, workspaceID); err != nil {
  127. tx.Rollback()
  128. c.JSON(500, gin.H{"error": "Failed to add user to workspace"})
  129. return
  130. }
  131. //update invite status
  132. invite.Status = "accepted"
  133. if err := h.store.UpdateInviteStatusTx(c, tx, invite); err != nil {
  134. tx.Rollback()
  135. c.JSON(500, gin.H{"error": "Failed to update invitation"})
  136. return
  137. }
  138. if err := tx.Commit().Error; err != nil {
  139. c.JSON(500, gin.H{"error": "Failed to complete registration"})
  140. return
  141. }
  142. user.Password = ""
  143. resp := common.CreateInvitedUserResponse{
  144. User: *user,
  145. Worspace: invite.Workspace,
  146. }
  147. c.JSON(201, resp)
  148. }
  149. // Invite handlers
  150. func (h *UserHandler) InviteUser(c *gin.Context) {
  151. var req common.InviteUserRequest
  152. if err := c.ShouldBindJSON(&req); err != nil {
  153. c.JSON(400, gin.H{"error": "Invalid request"})
  154. return
  155. }
  156. //check if user exists
  157. _, err := h.store.GetUserByEmail(c, req.Email)
  158. if err == nil {
  159. c.JSON(400, gin.H{"error": "User already exists"})
  160. return
  161. }
  162. //generate jwt token
  163. token, err := h.jwtService.GenerateToken(
  164. req.Email,
  165. req.Role,
  166. )
  167. if err != nil {
  168. c.JSON(500, gin.H{"error": "Failed to generate token"})
  169. return
  170. }
  171. //store token in db
  172. invite := &common.Invite{
  173. ID: uuid.New(),
  174. Email: req.Email,
  175. Role: req.Role,
  176. Workspace: req.Workspace,
  177. Token: token,
  178. Status: "pending",
  179. ExpiresAt: time.Now().Add(24 * time.Hour),
  180. CreatedAt: time.Now(),
  181. UpdatedAt: time.Now(),
  182. }
  183. //return invite
  184. if err := h.store.CreateInvite(c, invite); err != nil {
  185. c.JSON(500, gin.H{"error": "Failed to create invitation"})
  186. return
  187. }
  188. //send email with token
  189. if err := h.emailService.SendInviteEmail(req.Email, token, req.Workspace); err != nil {
  190. c.JSON(500, gin.H{"error": "Failed to send email"})
  191. return
  192. }
  193. c.JSON(201, invite)
  194. }
  195. func (h *UserHandler) ValidateInvitedUser(c *gin.Context) {
  196. //request token from query
  197. token := c.Query("token")
  198. h.logger.WithField("token", token).Info("Validating invitation")
  199. inv, err := h.store.GetInvite(c, token)
  200. if err != nil {
  201. c.JSON(400, gin.H{"error": "Invalid invitation"})
  202. return
  203. }
  204. //validate token
  205. _, err = h.jwtService.ValidateToken(token)
  206. if err != nil {
  207. if err == jwt.ErrTokenExpired {
  208. //update invite status
  209. inv.Status = "expired"
  210. if err := h.store.UpdateInvite(c, inv); err != nil {
  211. c.JSON(500, gin.H{"error": "Failed to update invitation"})
  212. return
  213. }
  214. c.JSON(400, gin.H{"error": "Invalid token"})
  215. return
  216. }
  217. }
  218. response := common.ValidateInvitedUserRequest{
  219. Valid: true,
  220. WorkspaceID: inv.Workspace,
  221. Email: inv.Email,
  222. }
  223. c.JSON(200, response)
  224. }
  225. func (h *UserHandler) Login(c *gin.Context) {
  226. var req common.LoginRequest
  227. var resp common.LoginResponse
  228. if err := c.ShouldBindJSON(&req); err != nil {
  229. c.JSON(400, gin.H{"error": "Invalid request"})
  230. return
  231. }
  232. user, err := h.store.GetUserByEmail(c, req.Email)
  233. if err != nil {
  234. c.JSON(400, gin.H{"error": "Invalid email or password"})
  235. return
  236. }
  237. err = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(req.Password))
  238. if err != nil {
  239. c.JSON(400, gin.H{"error": "Invalid email or password"})
  240. return
  241. }
  242. token, err := h.jwtService.GenerateToken(
  243. user.Email,
  244. user.Role,
  245. )
  246. if err != nil {
  247. c.JSON(500, gin.H{"error": "Failed to generate token"})
  248. return
  249. }
  250. resp.Token = token
  251. c.JSON(200, resp)
  252. }
  253. func (h *UserHandler) AddUserToWorkspace(c *gin.Context) {
  254. var req common.AddUserToWorkspaceRequest
  255. if err := c.ShouldBindJSON(&req); err != nil {
  256. c.JSON(400, gin.H{"error": "Invalid request"})
  257. return
  258. }
  259. //retrieve user from token
  260. claimsValue, exists := c.Get("claims")
  261. if !exists {
  262. c.JSON(500, gin.H{"error": "Failed to get user claims"})
  263. return
  264. }
  265. claims := claimsValue.(jwt.MapClaims)
  266. if claims == nil {
  267. c.JSON(500, gin.H{"error": "Failed to get user claims"})
  268. return
  269. }
  270. email := h.jwtService.ExtractEmailFromClaims(claims)
  271. if email == "" {
  272. c.JSON(500, gin.H{"error": "Failed to get user email"})
  273. return
  274. }
  275. user, err := h.store.GetUserByEmail(c, email)
  276. if err != nil {
  277. c.JSON(500, gin.H{"error": "Failed to get user"})
  278. return
  279. }
  280. //add user to workspace
  281. if err := h.store.AddUserToWorkspace(c, user.ID, req.WorkspaceID, req.Role); err != nil {
  282. c.JSON(500, gin.H{"error": "Failed to add user to workspace"})
  283. return
  284. }
  285. c.JSON(200, gin.H{"message": "User added to workspace"})
  286. }
  287. func (h *UserHandler) CancelInvitation(c *gin.Context) {
  288. // Implementation
  289. }
  290. func (h *UserHandler) GetCurrentUser(c *gin.Context) {
  291. // Get claims from context that were set by middleware
  292. claimsValue, exists := c.Get("claims")
  293. if !exists {
  294. c.JSON(500, gin.H{"error": "Failed to get user claims"})
  295. return
  296. }
  297. claims := claimsValue.(jwt.MapClaims)
  298. if claims == nil {
  299. c.JSON(500, gin.H{"error": "Failed to get user claims"})
  300. return
  301. }
  302. email := h.jwtService.ExtractEmailFromClaims(claims)
  303. if email == "" {
  304. c.JSON(500, gin.H{"error": "Failed to get user email"})
  305. return
  306. }
  307. user, err := h.store.GetUserByEmail(c, email)
  308. if err != nil {
  309. c.JSON(500, gin.H{"error": "Failed to get user"})
  310. return
  311. }
  312. workspaces, err := h.store.GetWorkspacesByUserID(c, user.ID)
  313. if err != nil {
  314. c.JSON(500, gin.H{"error": "Failed to get user workspace role"})
  315. return
  316. }
  317. resp := common.UserMe{
  318. User: *user,
  319. Workspaces: workspaces,
  320. }
  321. c.JSON(200, resp)
  322. }
  323. func (h *UserHandler) UpdateCurrentUser(c *gin.Context) {
  324. // Implementation
  325. }