package auth import ( "database/sql" "net/http" "studia/internal/user" "time" "github.com/gin-gonic/gin" "github.com/golang-jwt/jwt/v5" ) type LoginRequest struct { Email string `json:"email"` Password string `json:"password"` } type RegisterRequest struct { Email string `json:"email"` Password string `json:"password"` Username string `json:"username"` } const defaultRole = "user" var secret = []byte("secret") func Login(c *gin.Context, db *sql.DB) { var req LoginRequest if err := c.ShouldBindJSON(&req); err != nil { c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid request"}) return } if req.Email == "" || req.Password == "" { c.JSON(http.StatusBadRequest, gin.H{"error": "Email and password are required"}) return } User, err := user.GetUserByEmail(db, req.Email) if err != nil { c.JSON(http.StatusUnauthorized, gin.H{"error": "Invalid email or password"}) return } if !user.CheckPasswordHash(db, User.Email, req.Password) { c.JSON(http.StatusUnauthorized, gin.H{"error": "Invalid email or password"}) return } token, err := GenerateJWT(User.ID, User.Email, User.Role) if err != nil { c.JSON(http.StatusInternalServerError, gin.H{"error": "Could not generate token"}) return } c.JSON(http.StatusOK, gin.H{"token": token}) } func Register(c *gin.Context, db *sql.DB) { var req RegisterRequest if err := c.ShouldBindJSON(&req); err != nil { c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid request"}) return } if req.Email == "" || req.Password == "" || req.Username == "" { c.JSON(http.StatusBadRequest, gin.H{"error": "Email and password are required"}) return } error := user.CreateUser(db, req.Email, req.Username, req.Password, []string{defaultRole}) if error != nil { c.JSON(http.StatusBadRequest, gin.H{"error": error.Error()}) return } c.JSON(http.StatusOK, gin.H{"message": "User created successfully"}) } func GenerateJWT(uuid string, email string, roles []string) (any, error) { token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{ "user": uuid, "email": email, "role": roles, "exp": time.Now().Add(24 * time.Hour).Unix(), }) return token.SignedString(secret) }