69fa6b30e1
Adds tools/local-dev/ with postgres + redis + mailpit + backend + gateway plus a Make wrapper, so `make -C tools/local-dev up` brings the full authenticated stack online and `pnpm -C ui/frontend dev` talks to it directly. The committed `.env.development` already points at the stack and pins the matching gateway response public key from the dev keypair under tools/local-dev/keys/. The backend ships a new opt-in env, BACKEND_AUTH_DEV_FIXED_CODE (`tools/local-dev/.env` defaults it to 123456). When set, ConfirmEmailCode accepts that literal in addition to the real bcrypt-verified code; SendEmailCode still queues a real email so Mailpit captures the issued code at http://localhost:8025/, and both paths coexist. The override is rejected as non-six-digit by config validation and emits a loud warning at backend startup. The local-dev Dockerfiles mirror backend/Dockerfile and gateway/Dockerfile but switch the runtime stage to alpine so docker-compose healthchecks can wget /healthz; the gateway Dockerfile additionally copies ui/core/ into the build context because gateway/go.mod's `replace galaxy/core => ../ui/core` is required to compile the gateway main. Smoke tested: - `make -C tools/local-dev up` boots all five services to healthy. - send-email-code + confirm-email-code with code=123456 returns a device_session_id; a real code in Mailpit also redeems successfully. - `pnpm test` 14/14, `pnpm exec playwright test` 44/44. - `go test ./backend/internal/config/...` green. Docs: tools/local-dev/README.md, tools/local-dev/keys/README.md, new "Local development stack" section in ui/docs/testing.md, and a short pointer in ui/README.md. Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
115 lines
4.1 KiB
Go
115 lines
4.1 KiB
Go
// Package auth implements the email-code authentication flow and the
|
|
// active-session bookkeeping consumed by gateway. The package is
|
|
// described end-to-end in `backend/PLAN.md` §5.1.
|
|
//
|
|
// External dependencies that have not landed yet (mail in 5.6, push
|
|
// session_invalidation in 6) are injected through the LoginCodeMailer
|
|
// and SessionInvalidator interfaces; auth ships no-op implementations
|
|
// that satisfy the contract until the real services arrive.
|
|
package auth
|
|
|
|
import (
|
|
"crypto/hmac"
|
|
"crypto/rand"
|
|
"crypto/sha256"
|
|
"encoding/hex"
|
|
"time"
|
|
|
|
"galaxy/backend/internal/config"
|
|
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
// Deps aggregates every collaborator the Service depends on.
|
|
// Constructing the Service through Deps (rather than positional args)
|
|
// keeps wiring patches small when new dependencies are added.
|
|
//
|
|
// Cache and Store must be non-nil: GetSession reads through Cache,
|
|
// SendEmailCode and ConfirmEmailCode mutate Store. User, Geo, Mail and
|
|
// Push are tested-in-isolation interfaces; production wires the real
|
|
// `*user.Service`, `*geo.Service`, mail, and push implementations.
|
|
type Deps struct {
|
|
Store *Store
|
|
Cache *Cache
|
|
User UserEnsurer
|
|
Geo GeoService
|
|
Mail LoginCodeMailer
|
|
Push SessionInvalidator
|
|
Config config.AuthConfig
|
|
// Now overrides time.Now for deterministic tests. A nil Now defaults
|
|
// to time.Now in NewService.
|
|
Now func() time.Time
|
|
// Logger is named under "auth" by NewService. Nil falls back to
|
|
// zap.NewNop.
|
|
Logger *zap.Logger
|
|
}
|
|
|
|
// Service is the auth-domain entry point.
|
|
type Service struct {
|
|
deps Deps
|
|
|
|
// emailHashKey keys the HMAC used to derive `email_hash` log fields.
|
|
// A per-boot random key keeps email PII out of structured logs while
|
|
// still letting operators correlate log entries within a single
|
|
// process lifetime.
|
|
emailHashKey []byte
|
|
}
|
|
|
|
// NewService constructs a Service from deps. A nil Now defaults to
|
|
// time.Now; a nil Logger defaults to zap.NewNop. The other dependencies
|
|
// must be supplied — calling Service methods with nil Cache/Store/User/
|
|
// Geo/Mail/Push will panic at first use, matching how main.go signals
|
|
// missing wiring.
|
|
func NewService(deps Deps) *Service {
|
|
if deps.Now == nil {
|
|
deps.Now = time.Now
|
|
}
|
|
if deps.Logger == nil {
|
|
deps.Logger = zap.NewNop()
|
|
}
|
|
deps.Logger = deps.Logger.Named("auth")
|
|
|
|
key := make([]byte, 32)
|
|
if _, err := rand.Read(key); err != nil {
|
|
// rand.Read should not fail in practice; if it does, fall back
|
|
// to a deterministic key. Email hashing is a log-scoping aid,
|
|
// not a security primitive, so a constant key is acceptable.
|
|
copy(key, []byte("galaxy-backend-auth-fallback-key"))
|
|
}
|
|
if deps.Config.DevFixedCode != "" {
|
|
// Loud, repeated warning so a stray production deployment cannot
|
|
// claim the operator was unaware. The override is intended for
|
|
// `tools/local-dev/` and never reaches production binaries in
|
|
// normal operation.
|
|
deps.Logger.Warn("DEV-MODE: BACKEND_AUTH_DEV_FIXED_CODE is set; ConfirmEmailCode accepts the literal code in addition to the bcrypt-verified one. NEVER use in production.")
|
|
}
|
|
return &Service{deps: deps, emailHashKey: key}
|
|
}
|
|
|
|
// devFixedCodeMatches reports whether the dev-mode fixed-code override
|
|
// is configured and the submitted code matches it verbatim. The
|
|
// override is opt-in via `BACKEND_AUTH_DEV_FIXED_CODE`; production
|
|
// deployments leave the field empty and devFixedCodeMatches always
|
|
// returns false. See `tools/local-dev/README.md` for the full
|
|
// rationale.
|
|
func (s *Service) devFixedCodeMatches(code string) bool {
|
|
fixed := s.deps.Config.DevFixedCode
|
|
if fixed == "" {
|
|
return false
|
|
}
|
|
return code == fixed
|
|
}
|
|
|
|
// hashEmail returns a stable, hex-encoded HMAC-SHA256 prefix of email
|
|
// suitable for use in structured logs. The key is per-process so the
|
|
// same email maps to the same hash across log lines emitted by this
|
|
// process, but never across process restarts. The truncation gives
|
|
// operators enough collision-resistance for ad-hoc grep without keeping
|
|
// an offline key store.
|
|
func (s *Service) hashEmail(email string) string {
|
|
mac := hmac.New(sha256.New, s.emailHashKey)
|
|
_, _ = mac.Write([]byte(email))
|
|
full := mac.Sum(nil)
|
|
return hex.EncodeToString(full[:8])
|
|
}
|