add
This commit is contained in:
@@ -0,0 +1,86 @@
|
|||||||
|
package handler
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"common/types"
|
||||||
|
"user/internal/model"
|
||||||
|
"user/internal/service"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Handler struct {
|
||||||
|
S *service.Service
|
||||||
|
}
|
||||||
|
|
||||||
|
func New(s *service.Service) *Handler {
|
||||||
|
return &Handler{S: s}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *Handler) Register(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if r.Method != http.MethodPost {
|
||||||
|
writeJSON(w, http.StatusMethodNotAllowed, false, "method not allowed", nil)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
var req model.RegisterReq
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||||
|
writeJSON(w, http.StatusBadRequest, false, "invalid json", nil)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
userID, err := h.S.Register(req.Account, req.Password)
|
||||||
|
if err != nil {
|
||||||
|
switch err {
|
||||||
|
case service.ErrInvalidInput:
|
||||||
|
writeJSON(w, http.StatusBadRequest, false, "invalid account or password", nil)
|
||||||
|
case service.ErrAccountExists:
|
||||||
|
writeJSON(w, http.StatusConflict, false, "account exists", nil)
|
||||||
|
default:
|
||||||
|
writeJSON(w, http.StatusInternalServerError, false, "internal error", nil)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
writeJSON(w, http.StatusCreated, true, "ok", map[string]string{"user_id": userID})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *Handler) Login(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if r.Method != http.MethodPost {
|
||||||
|
writeJSON(w, http.StatusMethodNotAllowed, false, "method not allowed", nil)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
var req model.LoginReq
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||||
|
writeJSON(w, http.StatusBadRequest, false, "invalid json", nil)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
userID, err := h.S.Login(req.Account, req.Password)
|
||||||
|
if err != nil {
|
||||||
|
switch err {
|
||||||
|
case service.ErrInvalidInput:
|
||||||
|
writeJSON(w, http.StatusBadRequest, false, "invalid account or password", nil)
|
||||||
|
case service.ErrUnauthorized:
|
||||||
|
writeJSON(w, http.StatusUnauthorized, false, "unauthorized", nil)
|
||||||
|
default:
|
||||||
|
writeJSON(w, http.StatusInternalServerError, false, "internal error", nil)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
writeJSON(w, http.StatusOK, true, "ok", map[string]string{"user_id": userID})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *Handler) Healthz(w http.ResponseWriter, r *http.Request) {
|
||||||
|
writeJSON(w, http.StatusOK, true, "ok", nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *Handler) Version(w http.ResponseWriter, r *http.Request) {
|
||||||
|
writeJSON(w, http.StatusOK, true, "ok", map[string]string{"version": "user-service v0.1.0"})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *Handler) Root(w http.ResponseWriter, r *http.Request) {
|
||||||
|
writeJSON(w, http.StatusOK, true, "ok", map[string]string{"service": "user"})
|
||||||
|
}
|
||||||
|
|
||||||
|
func writeJSON(w http.ResponseWriter, code int, status bool, msg string, data interface{}) {
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.WriteHeader(code)
|
||||||
|
json.NewEncoder(w).Encode(types.Response{Status: status, Message: msg, Data: data})
|
||||||
|
}
|
||||||
11
trading_assistant_api/services/user/internal/model/types.go
Normal file
11
trading_assistant_api/services/user/internal/model/types.go
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
package model
|
||||||
|
|
||||||
|
type RegisterReq struct {
|
||||||
|
Account string `json:"account"`
|
||||||
|
Password string `json:"password"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type LoginReq struct {
|
||||||
|
Account string `json:"account"`
|
||||||
|
Password string `json:"password"`
|
||||||
|
}
|
||||||
@@ -0,0 +1,47 @@
|
|||||||
|
package repository
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Repo struct {
|
||||||
|
DB *sql.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func New(db *sql.DB) *Repo {
|
||||||
|
return &Repo{DB: db}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Repo) CreateUser(tx *sql.Tx) (string, error) {
|
||||||
|
var userID string
|
||||||
|
if err := tx.QueryRow(`INSERT INTO users DEFAULT VALUES RETURNING user_id`).Scan(&userID); err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return userID, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Repo) CreateLoginAccount(tx *sql.Tx, userID, account string) error {
|
||||||
|
_, err := tx.Exec(`INSERT INTO user_login_accounts (user_id, value, deleted) VALUES ($1, $2, false)`, userID, account)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Repo) CreateLoginPassword(tx *sql.Tx, userID, hashed string) error {
|
||||||
|
_, err := tx.Exec(`INSERT INTO user_login_passwords (user_id, value, deleted) VALUES ($1, $2, false)`, userID, hashed)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Repo) GetUserIDByAccount(account string) (string, error) {
|
||||||
|
var userID string
|
||||||
|
if err := r.DB.QueryRow(`SELECT user_id FROM user_login_accounts WHERE value = $1 AND deleted = false`, account).Scan(&userID); err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return userID, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Repo) GetHashedPassword(userID string) (string, error) {
|
||||||
|
var hashed string
|
||||||
|
if err := r.DB.QueryRow(`SELECT value FROM user_login_passwords WHERE user_id = $1 AND deleted = false`, userID).Scan(&hashed); err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return hashed, nil
|
||||||
|
}
|
||||||
@@ -0,0 +1,17 @@
|
|||||||
|
package router
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"user/internal/handler"
|
||||||
|
)
|
||||||
|
|
||||||
|
func New(h *handler.Handler) http.Handler {
|
||||||
|
mux := http.NewServeMux()
|
||||||
|
mux.HandleFunc("/healthz", h.Healthz)
|
||||||
|
mux.HandleFunc("/version", h.Version)
|
||||||
|
mux.HandleFunc("/", h.Root)
|
||||||
|
mux.HandleFunc("/register", h.Register)
|
||||||
|
mux.HandleFunc("/login", h.Login)
|
||||||
|
return mux
|
||||||
|
}
|
||||||
@@ -0,0 +1,92 @@
|
|||||||
|
package service
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
"errors"
|
||||||
|
|
||||||
|
"github.com/jackc/pgconn"
|
||||||
|
"golang.org/x/crypto/bcrypt"
|
||||||
|
"user/internal/repository"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
ErrInvalidInput = errors.New("invalid_input")
|
||||||
|
ErrAccountExists = errors.New("account_exists")
|
||||||
|
ErrUnauthorized = errors.New("unauthorized")
|
||||||
|
)
|
||||||
|
|
||||||
|
type Service struct {
|
||||||
|
Repo *repository.Repo
|
||||||
|
}
|
||||||
|
|
||||||
|
func New(repo *repository.Repo) *Service {
|
||||||
|
return &Service{Repo: repo}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Service) Register(account, password string) (string, error) {
|
||||||
|
if !validAccount(account) || !validPassword(password) {
|
||||||
|
return "", ErrInvalidInput
|
||||||
|
}
|
||||||
|
hashed, err := bcrypt.GenerateFromPassword([]byte(password), 12)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
tx, err := s.Repo.DB.Begin()
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
defer func() { _ = tx.Rollback() }()
|
||||||
|
userID, err := s.Repo.CreateUser(tx)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
if err := s.Repo.CreateLoginAccount(tx, userID, account); err != nil {
|
||||||
|
if isUniqueViolation(err) {
|
||||||
|
return "", ErrAccountExists
|
||||||
|
}
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
if err := s.Repo.CreateLoginPassword(tx, userID, string(hashed)); err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
if err := tx.Commit(); err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return userID, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Service) Login(account, password string) (string, error) {
|
||||||
|
if !validAccount(account) || !validPassword(password) {
|
||||||
|
return "", ErrInvalidInput
|
||||||
|
}
|
||||||
|
userID, err := s.Repo.GetUserIDByAccount(account)
|
||||||
|
if err != nil {
|
||||||
|
return "", ErrUnauthorized
|
||||||
|
}
|
||||||
|
hashed, err := s.Repo.GetHashedPassword(userID)
|
||||||
|
if err != nil {
|
||||||
|
return "", ErrUnauthorized
|
||||||
|
}
|
||||||
|
if bcrypt.CompareHashAndPassword([]byte(hashed), []byte(password)) != nil {
|
||||||
|
return "", ErrUnauthorized
|
||||||
|
}
|
||||||
|
return userID, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func validAccount(a string) bool {
|
||||||
|
n := len(a)
|
||||||
|
return n >= 3 && n <= 100
|
||||||
|
}
|
||||||
|
|
||||||
|
func validPassword(p string) bool {
|
||||||
|
n := len(p)
|
||||||
|
return n >= 8 && n <= 128
|
||||||
|
}
|
||||||
|
|
||||||
|
func isUniqueViolation(err error) bool {
|
||||||
|
var pe *pgconn.PgError
|
||||||
|
if errors.As(err, &pe) {
|
||||||
|
return pe.Code == "23505"
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
@@ -2,11 +2,6 @@ package main
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
|
||||||
"io"
|
|
||||||
"encoding/json"
|
|
||||||
"errors"
|
|
||||||
"strings"
|
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
"os/signal"
|
"os/signal"
|
||||||
@@ -17,9 +12,10 @@ import (
|
|||||||
"common/db"
|
"common/db"
|
||||||
"common/logger"
|
"common/logger"
|
||||||
"common/utils"
|
"common/utils"
|
||||||
"common/types"
|
"user/internal/handler"
|
||||||
"golang.org/x/crypto/bcrypt"
|
"user/internal/repository"
|
||||||
"github.com/jackc/pgconn"
|
"user/internal/router"
|
||||||
|
"user/internal/service"
|
||||||
)
|
)
|
||||||
|
|
||||||
var pg *sql.DB
|
var pg *sql.DB
|
||||||
@@ -65,133 +61,10 @@ func main() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func routes() http.Handler {
|
func routes() http.Handler {
|
||||||
mux := http.NewServeMux()
|
repo := repository.New(pg)
|
||||||
mux.HandleFunc("/healthz", func(w http.ResponseWriter, r *http.Request) {
|
svc := service.New(repo)
|
||||||
writeJSON(w, http.StatusOK, true, "ok", nil)
|
h := handler.New(svc)
|
||||||
})
|
return router.New(h)
|
||||||
mux.HandleFunc("/version", func(w http.ResponseWriter, r *http.Request) {
|
|
||||||
writeJSON(w, http.StatusOK, true, "ok", map[string]string{"version": "user-service v0.1.0"})
|
|
||||||
})
|
|
||||||
mux.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
|
|
||||||
writeJSON(w, http.StatusOK, true, "ok", map[string]string{"service": "user"})
|
|
||||||
})
|
|
||||||
mux.HandleFunc("/register", registerHandler)
|
|
||||||
mux.HandleFunc("/login", loginHandler)
|
|
||||||
return mux
|
|
||||||
}
|
|
||||||
|
|
||||||
type registerReq struct {
|
|
||||||
Account string `json:"account"`
|
|
||||||
Password string `json:"password"`
|
|
||||||
}
|
|
||||||
type loginReq struct {
|
|
||||||
Account string `json:"account"`
|
|
||||||
Password string `json:"password"`
|
|
||||||
}
|
|
||||||
type loginResp struct {
|
|
||||||
UserID string `json:"user_id"`
|
|
||||||
}
|
|
||||||
|
|
||||||
func registerHandler(w http.ResponseWriter, r *http.Request) {
|
|
||||||
if r.Method != http.MethodPost {
|
|
||||||
writeJSON(w, http.StatusMethodNotAllowed, false, "method not allowed", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
var req registerReq
|
|
||||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
|
||||||
writeJSON(w, http.StatusBadRequest, false, "invalid json", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if !validAccount(req.Account) || !validPassword(req.Password) {
|
|
||||||
writeJSON(w, http.StatusBadRequest, false, "invalid account or password", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
hashed, err := bcrypt.GenerateFromPassword([]byte(req.Password), 12)
|
|
||||||
if err != nil {
|
|
||||||
writeJSON(w, http.StatusInternalServerError, false, "internal error", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
tx, err := pg.Begin()
|
|
||||||
if err != nil {
|
|
||||||
writeJSON(w, http.StatusInternalServerError, false, "internal error", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
defer func() {
|
|
||||||
_ = tx.Rollback()
|
|
||||||
}()
|
|
||||||
var userID string
|
|
||||||
if err := tx.QueryRow(`INSERT INTO users DEFAULT VALUES RETURNING user_id`).Scan(&userID); err != nil {
|
|
||||||
writeJSON(w, http.StatusInternalServerError, false, "internal error", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if _, err := tx.Exec(`INSERT INTO user_login_accounts (user_id, value, deleted) VALUES ($1, $2, false)`, userID, req.Account); err != nil {
|
|
||||||
if isUniqueViolation(err) {
|
|
||||||
writeJSON(w, http.StatusConflict, false, "account exists", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
writeJSON(w, http.StatusInternalServerError, false, "internal error", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if _, err := tx.Exec(`INSERT INTO user_login_passwords (user_id, value, deleted) VALUES ($1, $2, false)`, userID, string(hashed)); err != nil {
|
|
||||||
writeJSON(w, http.StatusInternalServerError, false, "internal error", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if err := tx.Commit(); err != nil {
|
|
||||||
writeJSON(w, http.StatusInternalServerError, false, "internal error", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
writeJSON(w, http.StatusCreated, true, "ok", map[string]string{"user_id": userID})
|
|
||||||
}
|
|
||||||
|
|
||||||
func loginHandler(w http.ResponseWriter, r *http.Request) {
|
|
||||||
if r.Method != http.MethodPost {
|
|
||||||
writeJSON(w, http.StatusMethodNotAllowed, false, "method not allowed", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
var req loginReq
|
|
||||||
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
|
||||||
writeJSON(w, http.StatusBadRequest, false, "invalid json", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if !validAccount(req.Account) || !validPassword(req.Password) {
|
|
||||||
writeJSON(w, http.StatusBadRequest, false, "invalid account or password", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
var userID string
|
|
||||||
if err := pg.QueryRow(`SELECT user_id FROM user_login_accounts WHERE value = $1 AND deleted = false`, req.Account).Scan(&userID); err != nil {
|
|
||||||
writeJSON(w, http.StatusUnauthorized, false, "unauthorized", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
var hashed string
|
|
||||||
if err := pg.QueryRow(`SELECT value FROM user_login_passwords WHERE user_id = $1 AND deleted = false`, userID).Scan(&hashed); err != nil {
|
|
||||||
writeJSON(w, http.StatusUnauthorized, false, "unauthorized", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if bcrypt.CompareHashAndPassword([]byte(hashed), []byte(req.Password)) != nil {
|
|
||||||
writeJSON(w, http.StatusUnauthorized, false, "unauthorized", nil)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
writeJSON(w, http.StatusOK, true, "ok", map[string]string{"user_id": userID})
|
|
||||||
}
|
|
||||||
|
|
||||||
func validAccount(a string) bool {
|
|
||||||
n := len(a)
|
|
||||||
return n >= 3 && n <= 100
|
|
||||||
}
|
|
||||||
func validPassword(p string) bool {
|
|
||||||
n := len(p)
|
|
||||||
return n >= 8 && n <= 128
|
|
||||||
}
|
|
||||||
|
|
||||||
func isUniqueViolation(err error) bool {
|
|
||||||
var pe *pgconn.PgError
|
|
||||||
if errors.As(err, &pe) {
|
|
||||||
return pe.Code == "23505"
|
|
||||||
}
|
|
||||||
if err != nil && (strings.Contains(err.Error(), "duplicate key") || strings.Contains(err.Error(), "unique constraint")) {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func applySchema(path string) error {
|
func applySchema(path string) error {
|
||||||
@@ -202,9 +75,3 @@ func applySchema(path string) error {
|
|||||||
_, err = pg.Exec(string(b))
|
_, err = pg.Exec(string(b))
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
func writeJSON(w http.ResponseWriter, code int, status bool, msg string, data interface{}) {
|
|
||||||
w.Header().Set("Content-Type", "application/json")
|
|
||||||
w.WriteHeader(code)
|
|
||||||
json.NewEncoder(w).Encode(types.Response{Status: status, Message: msg, Data: data})
|
|
||||||
}
|
|
||||||
|
|||||||
Reference in New Issue
Block a user