193 lines
5.4 KiB
Go
193 lines
5.4 KiB
Go
package handlers
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"log"
|
|
"net/http"
|
|
"strings"
|
|
"time"
|
|
|
|
"aggios-app/backend/internal/config"
|
|
"aggios-app/backend/internal/domain"
|
|
"aggios-app/backend/internal/service"
|
|
|
|
"github.com/golang-jwt/jwt/v5"
|
|
"github.com/google/uuid"
|
|
)
|
|
|
|
// AgencyRegistrationHandler handles agency management endpoints
|
|
type AgencyRegistrationHandler struct {
|
|
agencyService *service.AgencyService
|
|
cfg *config.Config
|
|
}
|
|
|
|
// NewAgencyRegistrationHandler creates a new agency registration handler
|
|
func NewAgencyRegistrationHandler(agencyService *service.AgencyService, cfg *config.Config) *AgencyRegistrationHandler {
|
|
return &AgencyRegistrationHandler{
|
|
agencyService: agencyService,
|
|
cfg: cfg,
|
|
}
|
|
}
|
|
|
|
// RegisterAgency handles agency registration (SUPERADMIN only)
|
|
func (h *AgencyRegistrationHandler) RegisterAgency(w http.ResponseWriter, r *http.Request) {
|
|
if r.Method != http.MethodPost {
|
|
http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
|
|
return
|
|
}
|
|
|
|
var req domain.RegisterAgencyRequest
|
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
|
log.Printf("❌ Error decoding request: %v", err)
|
|
http.Error(w, "Invalid request body", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
log.Printf("📥 Registering agency: %s (subdomain: %s)", req.AgencyName, req.Subdomain)
|
|
|
|
tenant, admin, err := h.agencyService.RegisterAgency(req)
|
|
if err != nil {
|
|
log.Printf("❌ Error registering agency: %v", err)
|
|
switch err {
|
|
case service.ErrSubdomainTaken:
|
|
http.Error(w, err.Error(), http.StatusConflict)
|
|
case service.ErrEmailAlreadyExists:
|
|
http.Error(w, err.Error(), http.StatusConflict)
|
|
case service.ErrWeakPassword:
|
|
http.Error(w, err.Error(), http.StatusBadRequest)
|
|
default:
|
|
http.Error(w, "Internal server error", http.StatusInternalServerError)
|
|
}
|
|
return
|
|
}
|
|
|
|
log.Printf("✅ Agency created: %s (ID: %s)", tenant.Name, tenant.ID)
|
|
|
|
// Generate JWT token for the new admin
|
|
claims := jwt.MapClaims{
|
|
"user_id": admin.ID.String(),
|
|
"email": admin.Email,
|
|
"role": admin.Role,
|
|
"tenant_id": tenant.ID.String(),
|
|
"exp": time.Now().Add(time.Hour * 24 * 7).Unix(), // 7 days
|
|
"iat": time.Now().Unix(),
|
|
}
|
|
|
|
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
|
|
tokenString, err := token.SignedString([]byte(h.cfg.JWT.Secret))
|
|
if err != nil {
|
|
http.Error(w, "Failed to generate token", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
protocol := "http://"
|
|
if h.cfg.App.Environment == "production" {
|
|
protocol = "https://"
|
|
}
|
|
|
|
response := map[string]interface{}{
|
|
"token": tokenString,
|
|
"id": admin.ID,
|
|
"email": admin.Email,
|
|
"name": admin.Name,
|
|
"role": admin.Role,
|
|
"tenantId": tenant.ID,
|
|
"company": tenant.Name,
|
|
"subdomain": tenant.Subdomain,
|
|
"message": "Agency registered successfully",
|
|
"access_url": protocol + tenant.Domain,
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
w.WriteHeader(http.StatusCreated)
|
|
json.NewEncoder(w).Encode(response)
|
|
}
|
|
|
|
// RegisterClient handles client registration (ADMIN_AGENCIA only)
|
|
func (h *AgencyRegistrationHandler) RegisterClient(w http.ResponseWriter, r *http.Request) {
|
|
if r.Method != http.MethodPost {
|
|
http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
|
|
return
|
|
}
|
|
|
|
// TODO: Get tenant_id from authenticated user context
|
|
// For now, this would need the auth middleware to set it
|
|
|
|
var req domain.RegisterClientRequest
|
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
|
http.Error(w, "Invalid request body", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
// Get tenantID from context (set by middleware)
|
|
tenantIDStr := r.Header.Get("X-Tenant-ID")
|
|
if tenantIDStr == "" {
|
|
http.Error(w, "Tenant not found", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
// Parse tenant ID
|
|
// tenantID, _ := uuid.Parse(tenantIDStr)
|
|
|
|
// client, err := h.agencyService.RegisterClient(req, tenantID)
|
|
// ... handle response
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
w.WriteHeader(http.StatusCreated)
|
|
json.NewEncoder(w).Encode(map[string]string{
|
|
"message": "Client registration endpoint - implementation pending",
|
|
})
|
|
}
|
|
|
|
// HandleAgency supports GET (details) and DELETE operations for a specific agency
|
|
func (h *AgencyRegistrationHandler) HandleAgency(w http.ResponseWriter, r *http.Request) {
|
|
if r.URL.Path == "/api/admin/agencies/" {
|
|
http.Error(w, "Agency ID required", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
agencyID := strings.TrimPrefix(r.URL.Path, "/api/admin/agencies/")
|
|
if agencyID == "" || agencyID == r.URL.Path {
|
|
http.NotFound(w, r)
|
|
return
|
|
}
|
|
|
|
id, err := uuid.Parse(agencyID)
|
|
if err != nil {
|
|
http.Error(w, "Invalid agency ID", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
switch r.Method {
|
|
case http.MethodGet:
|
|
details, err := h.agencyService.GetAgencyDetails(id)
|
|
if err != nil {
|
|
if errors.Is(err, service.ErrTenantNotFound) {
|
|
http.Error(w, "Agency not found", http.StatusNotFound)
|
|
return
|
|
}
|
|
http.Error(w, "Internal server error", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
json.NewEncoder(w).Encode(details)
|
|
|
|
case http.MethodDelete:
|
|
if err := h.agencyService.DeleteAgency(id); err != nil {
|
|
if errors.Is(err, service.ErrTenantNotFound) {
|
|
http.Error(w, "Agency not found", http.StatusNotFound)
|
|
return
|
|
}
|
|
http.Error(w, "Internal server error", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
w.WriteHeader(http.StatusNoContent)
|
|
|
|
default:
|
|
http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
|
|
}
|
|
}
|