gohorsejobs/backend/internal/api/handlers/credentials_handler.go
NANDO9322 8f331c97d3 feat(backoffice): Implementa gestão de credenciais e novas abas administrativas
BACKEND:
- Implementa [CredentialsHandler](cci:2://file:///C:/Projetos/gohorsejobs/backend/internal/api/handlers/credentials_handler.go:9:0-11:1) e rotas /api/v1/system/credentials para gestão segura de chaves.
- Adiciona criptografia RSA no [CredentialsService](cci:2://file:///C:/Projetos/gohorsejobs/backend/internal/services/credentials_service.go:17:0-22:1) para proteger chaves de API (Stripe, Cloudflare, etc).
- Automatiza geração de pares de chaves RSA no .env via script.

FRONTEND:
- Refatora /dashboard/backoffice organizando em Abas: Dashboard, Planos, Stripe e Sistema.
- Implementa CRUD completo para gestão de Planos (criar, editar, remover).
- Adiciona visualização de status do Stripe e botão para limpar cache Cloudflare.
- Ajusta formatação de data nos logs para fuso horário America/Sao_Paulo.
- Atualiza pi.ts para suportar novos endpoints de planos e credenciais.
2026-01-09 17:18:51 -03:00

95 lines
2.9 KiB
Go

package handlers
import (
"encoding/json"
"net/http"
"github.com/rede5/gohorsejobs/backend/internal/services"
)
type CredentialsHandler struct {
credentialsService *services.CredentialsService
}
func NewCredentialsHandler(s *services.CredentialsService) *CredentialsHandler {
return &CredentialsHandler{credentialsService: s}
}
// ListCredentials returns a list of configured services (metadata only, no secrets)
// GET /api/v1/system/credentials
func (h *CredentialsHandler) ListCredentials(w http.ResponseWriter, r *http.Request) {
services, err := h.credentialsService.ListConfiguredServices(r.Context())
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
response := map[string]interface{}{
"services": services,
}
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(response)
}
// SaveCredential saves encrypted credentials for a service
// POST /api/v1/system/credentials
func (h *CredentialsHandler) SaveCredential(w http.ResponseWriter, r *http.Request) {
var req struct {
ServiceName string `json:"serviceName"`
Payload interface{} `json:"payload"`
}
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
http.Error(w, "Invalid request body", http.StatusBadRequest)
return
}
if req.ServiceName == "" {
http.Error(w, "Service name is required", http.StatusBadRequest)
return
}
// Marshaling the payload to JSON string before encryption
payloadBytes, err := json.Marshal(req.Payload)
if err != nil {
http.Error(w, "Invalid payload format", http.StatusBadRequest)
return
}
// Encrypt using the service
encryptedPayload, err := h.credentialsService.EncryptPayload(string(payloadBytes))
if err != nil {
http.Error(w, "Failed to encrypt credentials: "+err.Error(), http.StatusInternalServerError)
return
}
// Determine user making the change (from context or default)
updatedBy := "admin" // TODO: Extract from context keys if available
if err := h.credentialsService.SaveCredentials(r.Context(), req.ServiceName, encryptedPayload, updatedBy); err != nil {
http.Error(w, "Failed to save credentials: "+err.Error(), http.StatusInternalServerError)
return
}
w.WriteHeader(http.StatusOK)
json.NewEncoder(w).Encode(map[string]string{"message": "Credentials saved successfully"})
}
// DeleteCredential removes credentials for a service
// DELETE /api/v1/system/credentials/{service}
func (h *CredentialsHandler) DeleteCredential(w http.ResponseWriter, r *http.Request) {
serviceName := r.PathValue("service")
if serviceName == "" {
http.Error(w, "Service name is required", http.StatusBadRequest)
return
}
if err := h.credentialsService.DeleteCredentials(r.Context(), serviceName); err != nil {
http.Error(w, "Failed to delete credentials: "+err.Error(), http.StatusInternalServerError)
return
}
w.WriteHeader(http.StatusOK)
json.NewEncoder(w).Encode(map[string]string{"message": "Credentials deleted successfully"})
}