162 lines
4.5 KiB
Go
162 lines
4.5 KiB
Go
package handler
|
|
|
|
import (
|
|
"github.com/Wei-Shaw/sub2api/internal/handler/dto"
|
|
"github.com/Wei-Shaw/sub2api/internal/pkg/response"
|
|
middleware2 "github.com/Wei-Shaw/sub2api/internal/server/middleware"
|
|
"github.com/Wei-Shaw/sub2api/internal/service"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
)
|
|
|
|
// AuthHandler handles authentication-related requests
|
|
type AuthHandler struct {
|
|
authService *service.AuthService
|
|
userService *service.UserService
|
|
}
|
|
|
|
// NewAuthHandler creates a new AuthHandler
|
|
func NewAuthHandler(authService *service.AuthService, userService *service.UserService) *AuthHandler {
|
|
return &AuthHandler{
|
|
authService: authService,
|
|
userService: userService,
|
|
}
|
|
}
|
|
|
|
// RegisterRequest represents the registration request payload
|
|
type RegisterRequest struct {
|
|
Email string `json:"email" binding:"required,email"`
|
|
Password string `json:"password" binding:"required,min=6"`
|
|
VerifyCode string `json:"verify_code"`
|
|
TurnstileToken string `json:"turnstile_token"`
|
|
}
|
|
|
|
// SendVerifyCodeRequest 发送验证码请求
|
|
type SendVerifyCodeRequest struct {
|
|
Email string `json:"email" binding:"required,email"`
|
|
TurnstileToken string `json:"turnstile_token"`
|
|
}
|
|
|
|
// SendVerifyCodeResponse 发送验证码响应
|
|
type SendVerifyCodeResponse struct {
|
|
Message string `json:"message"`
|
|
Countdown int `json:"countdown"` // 倒计时秒数
|
|
}
|
|
|
|
// LoginRequest represents the login request payload
|
|
type LoginRequest struct {
|
|
Email string `json:"email" binding:"required,email"`
|
|
Password string `json:"password" binding:"required"`
|
|
TurnstileToken string `json:"turnstile_token"`
|
|
}
|
|
|
|
// AuthResponse 认证响应格式(匹配前端期望)
|
|
type AuthResponse struct {
|
|
AccessToken string `json:"access_token"`
|
|
TokenType string `json:"token_type"`
|
|
User *dto.User `json:"user"`
|
|
}
|
|
|
|
// Register handles user registration
|
|
// POST /api/v1/auth/register
|
|
func (h *AuthHandler) Register(c *gin.Context) {
|
|
var req RegisterRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
response.BadRequest(c, "Invalid request: "+err.Error())
|
|
return
|
|
}
|
|
|
|
// Turnstile 验证(当提供了邮箱验证码时跳过,因为发送验证码时已验证过)
|
|
if req.VerifyCode == "" {
|
|
if err := h.authService.VerifyTurnstile(c.Request.Context(), req.TurnstileToken, c.ClientIP()); err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
}
|
|
|
|
token, user, err := h.authService.RegisterWithVerification(c.Request.Context(), req.Email, req.Password, req.VerifyCode)
|
|
if err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
response.Success(c, AuthResponse{
|
|
AccessToken: token,
|
|
TokenType: "Bearer",
|
|
User: dto.UserFromService(user),
|
|
})
|
|
}
|
|
|
|
// SendVerifyCode 发送邮箱验证码
|
|
// POST /api/v1/auth/send-verify-code
|
|
func (h *AuthHandler) SendVerifyCode(c *gin.Context) {
|
|
var req SendVerifyCodeRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
response.BadRequest(c, "Invalid request: "+err.Error())
|
|
return
|
|
}
|
|
|
|
// Turnstile 验证
|
|
if err := h.authService.VerifyTurnstile(c.Request.Context(), req.TurnstileToken, c.ClientIP()); err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
result, err := h.authService.SendVerifyCodeAsync(c.Request.Context(), req.Email)
|
|
if err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
response.Success(c, SendVerifyCodeResponse{
|
|
Message: "Verification code sent successfully",
|
|
Countdown: result.Countdown,
|
|
})
|
|
}
|
|
|
|
// Login handles user login
|
|
// POST /api/v1/auth/login
|
|
func (h *AuthHandler) Login(c *gin.Context) {
|
|
var req LoginRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
response.BadRequest(c, "Invalid request: "+err.Error())
|
|
return
|
|
}
|
|
|
|
// Turnstile 验证
|
|
if err := h.authService.VerifyTurnstile(c.Request.Context(), req.TurnstileToken, c.ClientIP()); err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
token, user, err := h.authService.Login(c.Request.Context(), req.Email, req.Password)
|
|
if err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
response.Success(c, AuthResponse{
|
|
AccessToken: token,
|
|
TokenType: "Bearer",
|
|
User: dto.UserFromService(user),
|
|
})
|
|
}
|
|
|
|
// GetCurrentUser handles getting current authenticated user
|
|
// GET /api/v1/auth/me
|
|
func (h *AuthHandler) GetCurrentUser(c *gin.Context) {
|
|
subject, ok := middleware2.GetAuthSubjectFromContext(c)
|
|
if !ok {
|
|
response.Unauthorized(c, "User not authenticated")
|
|
return
|
|
}
|
|
|
|
user, err := h.userService.GetByID(c.Request.Context(), subject.UserID)
|
|
if err != nil {
|
|
response.ErrorFrom(c, err)
|
|
return
|
|
}
|
|
|
|
response.Success(c, dto.UserFromService(user))
|
|
}
|