photum/frontend/contexts/AuthContext.tsx
NANDO9322 78c284c28a feat: Implementado a API de backend inicial e a interface de usuário de frontend para autenticação, gerenciamento de usuários e cadastro profissional.
implementação de listagem de usuários admin, padronização de roles e melhorias nos cadastros
Backend:
- Adicionados endpoints administrativos [ListUsers](cci:1://file:///c:/Projetos/photum/backend/internal/auth/service.go:268:0-270:1) e [GetUser](cci:1://file:///c:/Projetos/photum/backend/internal/auth/handler.go:475:0-514:1).
- Padronizadas as constantes de [UserRole](cci:1://file:///c:/Projetos/photum/backend/internal/auth/service.go:202:0-216:1) (`SUPERADMIN`, `BUSINESS_OWNER`, etc.) para alinhar com o frontend.
- Atualizada a função [EnsureDemoUsers](cci:1://file:///c:/Projetos/photum/backend/internal/auth/service.go:230:0-266:1) para migrar usuários existentes para as novas roles.
- Documentação Swagger regenerada.
Frontend:
- Adicionado busca automática de CEP no formulário de Cadastro Profissional (AwesomeAPI).
- Adicionado texto de ajuda e ordenação (priorizando "Não Cadastrado") no select de Empresas.
2025-12-15 11:17:34 -03:00

186 lines
6 KiB
TypeScript

import React, { createContext, useContext, useState, ReactNode } from 'react';
import { User, UserRole } from '../types';
// Mock Users Database
const MOCK_USERS: User[] = [
{
id: 'superadmin-1',
name: 'Dev Admin',
email: 'admin@photum.com',
role: UserRole.SUPERADMIN,
avatar: 'https://i.pravatar.cc/150?u=admin'
},
{
id: 'owner-1',
name: 'PHOTUM CEO',
email: 'empresa@photum.com',
role: UserRole.BUSINESS_OWNER,
avatar: 'https://i.pravatar.cc/150?u=ceo'
},
{
id: 'photographer-1',
name: 'COLABORADOR PHOTUM',
email: 'foto@photum.com',
role: UserRole.PHOTOGRAPHER,
avatar: 'https://i.pravatar.cc/150?u=photo'
},
{
id: 'client-1',
name: 'PARCEIRO PHOTUM',
email: 'cliente@photum.com',
role: UserRole.EVENT_OWNER,
avatar: 'https://i.pravatar.cc/150?u=client'
}
];
interface AuthContextType {
user: User | null;
login: (email: string, password?: string) => Promise<boolean>;
logout: () => void;
register: (data: { nome: string; email: string; senha: string; telefone: string; role: string }) => Promise<{ success: boolean; userId?: string; token?: string }>;
availableUsers: User[]; // Helper for the login screen demo
}
const AuthContext = createContext<AuthContextType | undefined>(undefined);
export const AuthProvider: React.FC<{ children: ReactNode }> = ({ children }) => {
const [user, setUser] = useState<User | null>(null);
const getErrorMessage = (errorKey: string): string => {
// Map backend error messages to Portuguese
const errorMap: { [key: string]: string } = {
"email already registered": "Este e-mail já está cadastrado.",
"invalid credentials": "E-mail ou senha incorretos.",
"user not found": "Usuário não encontrado.",
"crypto/bcrypt: hashedPassword is not the hash of the given password": "Senha incorreta.",
"password is too short": "A senha é muito curta.",
"cpf already registered": "CPF já cadastrado.",
};
// Check for partial matches or exact matches
if (errorMap[errorKey]) return errorMap[errorKey];
// Fallbacks
if (errorKey.includes('hashedPassword')) return "Senha incorreta.";
if (errorKey.includes('email')) return "Erro relacionado ao e-mail.";
if (errorKey.includes('password')) return "Erro relacionado à senha.";
return "Ocorreu um erro inesperado. Tente novamente.";
};
const login = async (email: string, password?: string) => {
// 1. Check for Demo/Mock users first - REMOVED to force API usage
// const mockUser = MOCK_USERS.find(u => u.email === email);
// if (mockUser) {
// await new Promise(resolve => setTimeout(resolve, 800)); // Simulate delay
// setUser({ ...mockUser, ativo: true });
// return true;
// }
// 2. Try Real API
try {
const response = await fetch(`${import.meta.env.VITE_API_URL}/auth/login`, {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify({ email, senha: password })
});
if (!response.ok) {
const errorData = await response.json().catch(() => ({}));
throw new Error(getErrorMessage(errorData.error || 'Falha no login'));
}
const data = await response.json();
// Store token (optional, if you need it for other requests outside cookies)
localStorage.setItem('token', data.access_token);
const backendUser = data.user;
// Enforce active check
if (!backendUser.ativo) {
throw new Error("Cadastro pendente de aprovação.");
}
// Map backend user to frontend User type
const mappedUser: User = {
id: backendUser.id,
email: backendUser.email,
name: backendUser.email.split('@')[0], // Fallback name or from profile if available
role: backendUser.role as UserRole,
ativo: backendUser.ativo,
// ... propagate other fields if needed or fetch profile
};
setUser(mappedUser);
return true;
} catch (err) {
console.error('Login error:', err);
throw err;
}
};
const logout = () => {
localStorage.removeItem('token');
setUser(null);
};
const register = async (data: { nome: string; email: string; senha: string; telefone: string; role: string }) => {
try {
const response = await fetch(`${import.meta.env.VITE_API_URL}/auth/register`, {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify(data)
});
if (!response.ok) {
const errorData = await response.json().catch(() => ({}));
const rawError = errorData.error || 'Falha no cadastro';
throw new Error(getErrorMessage(rawError));
}
const responseData = await response.json();
if (responseData.access_token) {
localStorage.setItem('token', responseData.access_token);
}
// IF user is returned (auto-login), logic:
// Only set user if they are ACTIVE (which they won't be for standard clients)
// This allows the "Pending Approval" modal to show instead of auto-redirecting.
if (responseData.user && responseData.user.ativo) {
const backendUser = responseData.user;
const mappedUser: User = {
id: backendUser.id,
email: backendUser.email,
name: backendUser.nome || backendUser.email.split('@')[0],
role: backendUser.role as UserRole,
ativo: backendUser.ativo,
};
setUser(mappedUser);
}
return {
success: true,
userId: responseData.user?.id || responseData.userId,
token: responseData.access_token
};
} catch (err) {
console.error('Registration error:', err);
throw err;
}
};
return (
<AuthContext.Provider value={{ user, login, logout, register, availableUsers: MOCK_USERS }}>
{children}
</AuthContext.Provider>
);
};
export const useAuth = () => {
const context = useContext(AuthContext);
if (!context) throw new Error('useAuth must be used within an AuthProvider');
return context;
};