api_user.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. package httpd
  2. import (
  3. "errors"
  4. "net/http"
  5. "strconv"
  6. "github.com/go-chi/chi"
  7. "github.com/go-chi/render"
  8. "github.com/drakkan/sftpgo/dataprovider"
  9. "github.com/drakkan/sftpgo/utils"
  10. )
  11. func getUsers(w http.ResponseWriter, r *http.Request) {
  12. limit := 100
  13. offset := 0
  14. order := dataprovider.OrderASC
  15. username := ""
  16. var err error
  17. if _, ok := r.URL.Query()["limit"]; ok {
  18. limit, err = strconv.Atoi(r.URL.Query().Get("limit"))
  19. if err != nil {
  20. err = errors.New("Invalid limit")
  21. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  22. return
  23. }
  24. if limit > 500 {
  25. limit = 500
  26. }
  27. }
  28. if _, ok := r.URL.Query()["offset"]; ok {
  29. offset, err = strconv.Atoi(r.URL.Query().Get("offset"))
  30. if err != nil {
  31. err = errors.New("Invalid offset")
  32. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  33. return
  34. }
  35. }
  36. if _, ok := r.URL.Query()["order"]; ok {
  37. order = r.URL.Query().Get("order")
  38. if order != dataprovider.OrderASC && order != dataprovider.OrderDESC {
  39. err = errors.New("Invalid order")
  40. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  41. return
  42. }
  43. }
  44. if _, ok := r.URL.Query()["username"]; ok {
  45. username = r.URL.Query().Get("username")
  46. }
  47. users, err := dataprovider.GetUsers(limit, offset, order, username)
  48. if err == nil {
  49. render.JSON(w, r, users)
  50. } else {
  51. sendAPIResponse(w, r, err, "", http.StatusInternalServerError)
  52. }
  53. }
  54. func getUserByID(w http.ResponseWriter, r *http.Request) {
  55. userID, err := strconv.ParseInt(chi.URLParam(r, "userID"), 10, 64)
  56. if err != nil {
  57. err = errors.New("Invalid userID")
  58. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  59. return
  60. }
  61. user, err := dataprovider.GetUserByID(userID)
  62. if err == nil {
  63. render.JSON(w, r, dataprovider.HideUserSensitiveData(&user))
  64. } else {
  65. sendAPIResponse(w, r, err, "", getRespStatus(err))
  66. }
  67. }
  68. func addUser(w http.ResponseWriter, r *http.Request) {
  69. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  70. var user dataprovider.User
  71. err := render.DecodeJSON(r.Body, &user)
  72. if err != nil {
  73. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  74. return
  75. }
  76. err = dataprovider.AddUser(user)
  77. if err == nil {
  78. user, err = dataprovider.UserExists(user.Username)
  79. if err == nil {
  80. render.JSON(w, r, dataprovider.HideUserSensitiveData(&user))
  81. } else {
  82. sendAPIResponse(w, r, err, "", getRespStatus(err))
  83. }
  84. } else {
  85. sendAPIResponse(w, r, err, "", getRespStatus(err))
  86. }
  87. }
  88. func updateUser(w http.ResponseWriter, r *http.Request) {
  89. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  90. userID, err := strconv.ParseInt(chi.URLParam(r, "userID"), 10, 64)
  91. if err != nil {
  92. err = errors.New("Invalid userID")
  93. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  94. return
  95. }
  96. user, err := dataprovider.GetUserByID(userID)
  97. if err != nil {
  98. sendAPIResponse(w, r, err, "", getRespStatus(err))
  99. return
  100. }
  101. currentPermissions := user.Permissions
  102. currentS3AccessSecret := ""
  103. if user.FsConfig.Provider == 1 {
  104. currentS3AccessSecret = user.FsConfig.S3Config.AccessSecret
  105. }
  106. user.Permissions = make(map[string][]string)
  107. err = render.DecodeJSON(r.Body, &user)
  108. if err != nil {
  109. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  110. return
  111. }
  112. // we use new Permissions if passed otherwise the old ones
  113. if len(user.Permissions) == 0 {
  114. user.Permissions = currentPermissions
  115. }
  116. // we use the new access secret if different from the old one and not empty
  117. if user.FsConfig.Provider == 1 {
  118. if utils.RemoveDecryptionKey(currentS3AccessSecret) == user.FsConfig.S3Config.AccessSecret ||
  119. (len(user.FsConfig.S3Config.AccessSecret) == 0 && len(user.FsConfig.S3Config.AccessKey) > 0) {
  120. user.FsConfig.S3Config.AccessSecret = currentS3AccessSecret
  121. }
  122. }
  123. if user.ID != userID {
  124. sendAPIResponse(w, r, err, "user ID in request body does not match user ID in path parameter", http.StatusBadRequest)
  125. return
  126. }
  127. err = dataprovider.UpdateUser(user)
  128. if err != nil {
  129. sendAPIResponse(w, r, err, "", getRespStatus(err))
  130. } else {
  131. sendAPIResponse(w, r, err, "User updated", http.StatusOK)
  132. }
  133. }
  134. func deleteUser(w http.ResponseWriter, r *http.Request) {
  135. userID, err := strconv.ParseInt(chi.URLParam(r, "userID"), 10, 64)
  136. if err != nil {
  137. err = errors.New("Invalid userID")
  138. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  139. return
  140. }
  141. user, err := dataprovider.GetUserByID(userID)
  142. if err != nil {
  143. sendAPIResponse(w, r, err, "", getRespStatus(err))
  144. return
  145. }
  146. err = dataprovider.DeleteUser(user)
  147. if err != nil {
  148. sendAPIResponse(w, r, err, "", http.StatusInternalServerError)
  149. } else {
  150. sendAPIResponse(w, r, err, "User deleted", http.StatusOK)
  151. }
  152. }