This commit is contained in:
2026-04-18 10:21:51 +03:00
commit 90d027025b
37 changed files with 6493 additions and 0 deletions

View File

@@ -0,0 +1,39 @@
package auth
import (
"errors"
"net/http"
"github.com/gin-gonic/gin"
"gorm.io/gorm"
"social-raiting.nekiiinkognito.ru/internal/models"
)
func RequireAdmin(db *gorm.DB) gin.HandlerFunc {
return func(ctx *gin.Context) {
userID, exists := ctx.Get("userID")
if !exists {
ctx.AbortWithStatusJSON(http.StatusUnauthorized, gin.H{"error": "missing user context"})
return
}
var user models.User
if err := db.First(&user, "id = ?", userID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
ctx.AbortWithStatusJSON(http.StatusUnauthorized, gin.H{"error": "user not found"})
return
}
ctx.AbortWithStatusJSON(http.StatusInternalServerError, gin.H{"error": "failed to load user"})
return
}
if !user.IsAdmin {
ctx.AbortWithStatusJSON(http.StatusForbidden, gin.H{"error": "admin access required"})
return
}
ctx.Next()
}
}

View File

@@ -0,0 +1,123 @@
package auth
import (
"errors"
"net/http"
"strings"
"github.com/gin-gonic/gin"
"golang.org/x/crypto/bcrypt"
"gorm.io/gorm"
"social-raiting.nekiiinkognito.ru/internal/models"
)
type Handler struct {
DB *gorm.DB
JWTSecret string
}
func NewHandler(db *gorm.DB, jwtSecret string) Handler {
return Handler{
DB: db,
JWTSecret: jwtSecret,
}
}
func (h Handler) Register(ctx *gin.Context) {
var req RegisterRequest
if err := ctx.ShouldBindJSON(&req); err != nil {
ctx.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
email := strings.ToLower(strings.TrimSpace(req.Email))
passwordHash, err := bcrypt.GenerateFromPassword([]byte(req.Password), bcrypt.DefaultCost)
if err != nil {
ctx.JSON(http.StatusInternalServerError, gin.H{"error": "failed to hash password"})
return
}
user := models.User{
Email: email,
PasswordHash: string(passwordHash),
IsAdmin: req.IsAdmin,
}
if err := h.DB.Create(&user).Error; err != nil {
if isDuplicateEmailError(err) {
ctx.JSON(http.StatusConflict, gin.H{"error": "email is already registered"})
return
}
ctx.JSON(http.StatusInternalServerError, gin.H{"error": "failed to create user"})
return
}
ctx.JSON(http.StatusCreated, UserResponse{User: user})
}
func (h Handler) Login(ctx *gin.Context) {
var req LoginRequest
if err := ctx.ShouldBindJSON(&req); err != nil {
ctx.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
var user models.User
if err := h.DB.Where("email = ?", strings.ToLower(strings.TrimSpace(req.Email))).First(&user).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
ctx.JSON(http.StatusUnauthorized, gin.H{"error": "invalid credentials"})
return
}
ctx.JSON(http.StatusInternalServerError, gin.H{"error": "failed to load user"})
return
}
if err := bcrypt.CompareHashAndPassword([]byte(user.PasswordHash), []byte(req.Password)); err != nil {
ctx.JSON(http.StatusUnauthorized, gin.H{"error": "invalid credentials"})
return
}
token, err := GenerateToken(user.ID, h.JWTSecret, TokenOptions{})
if err != nil {
ctx.JSON(http.StatusInternalServerError, gin.H{"error": "failed to create token"})
return
}
ctx.JSON(http.StatusOK, AuthResponse{
Token: token,
User: user,
})
}
func (h Handler) Me(ctx *gin.Context) {
userID, exists := ctx.Get("userID")
if !exists {
ctx.JSON(http.StatusUnauthorized, gin.H{"error": "missing user context"})
return
}
var user models.User
if err := h.DB.First(&user, "id = ?", userID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
ctx.JSON(http.StatusNotFound, gin.H{"error": "user not found"})
return
}
ctx.JSON(http.StatusInternalServerError, gin.H{"error": "failed to load user"})
return
}
ctx.JSON(http.StatusOK, UserResponse{User: user})
}
func isDuplicateEmailError(err error) bool {
if err == nil {
return false
}
errText := strings.ToLower(err.Error())
return strings.Contains(errText, "duplicate") || strings.Contains(errText, "1062")
}

View File

@@ -0,0 +1,28 @@
package auth
import (
"fmt"
"time"
"github.com/golang-jwt/jwt/v5"
)
func GenerateToken(userID uint, jwtSecret string, options TokenOptions) (string, error) {
ttl := options.TTL
if ttl <= 0 {
ttl = 24 * time.Hour
}
now := time.Now()
claims := JWTClaims{
UserID: userID,
RegisteredClaims: jwt.RegisteredClaims{
Subject: fmt.Sprintf("%d", userID),
IssuedAt: jwt.NewNumericDate(now),
ExpiresAt: jwt.NewNumericDate(now.Add(ttl)),
},
}
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
return token.SignedString([]byte(jwtSecret))
}

View File

@@ -0,0 +1,42 @@
package auth
import (
"fmt"
"net/http"
"strings"
"github.com/gin-gonic/gin"
"github.com/golang-jwt/jwt/v5"
)
func Middleware(jwtSecret string) gin.HandlerFunc {
return func(ctx *gin.Context) {
header := strings.TrimSpace(ctx.GetHeader("Authorization"))
if header == "" {
ctx.AbortWithStatusJSON(http.StatusUnauthorized, gin.H{"error": "missing authorization header"})
return
}
parts := strings.SplitN(header, " ", 2)
if len(parts) != 2 || !strings.EqualFold(parts[0], "Bearer") {
ctx.AbortWithStatusJSON(http.StatusUnauthorized, gin.H{"error": "invalid authorization header"})
return
}
claims := &JWTClaims{}
token, err := jwt.ParseWithClaims(parts[1], claims, func(token *jwt.Token) (any, error) {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
}
return []byte(jwtSecret), nil
})
if err != nil || !token.Valid {
ctx.AbortWithStatusJSON(http.StatusUnauthorized, gin.H{"error": "invalid token"})
return
}
ctx.Set("userID", claims.UserID)
ctx.Next()
}
}

View File

@@ -0,0 +1,38 @@
package auth
import (
"time"
"github.com/golang-jwt/jwt/v5"
"social-raiting.nekiiinkognito.ru/internal/models"
)
type RegisterRequest struct {
Email string `json:"email" binding:"required,email"`
Password string `json:"password" binding:"required,min=8"`
IsAdmin bool `json:"isAdmin"`
}
type LoginRequest struct {
Email string `json:"email" binding:"required,email"`
Password string `json:"password" binding:"required"`
}
type AuthResponse struct {
Token string `json:"token"`
User models.User `json:"user"`
}
type JWTClaims struct {
UserID uint `json:"userId"`
jwt.RegisteredClaims
}
type UserResponse struct {
User models.User `json:"user"`
}
type TokenOptions struct {
TTL time.Duration
}