api_eventrule.go 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248
  1. // Copyright (C) 2019-2023 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "context"
  17. "fmt"
  18. "net/http"
  19. "github.com/go-chi/render"
  20. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  21. "github.com/drakkan/sftpgo/v2/internal/util"
  22. )
  23. func getEventActions(w http.ResponseWriter, r *http.Request) {
  24. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  25. limit, offset, order, err := getSearchFilters(w, r)
  26. if err != nil {
  27. return
  28. }
  29. actions, err := dataprovider.GetEventActions(limit, offset, order, false)
  30. if err != nil {
  31. sendAPIResponse(w, r, err, "", http.StatusInternalServerError)
  32. return
  33. }
  34. render.JSON(w, r, actions)
  35. }
  36. func renderEventAction(w http.ResponseWriter, r *http.Request, name string, status int) {
  37. action, err := dataprovider.EventActionExists(name)
  38. if err != nil {
  39. sendAPIResponse(w, r, err, "", getRespStatus(err))
  40. return
  41. }
  42. action.PrepareForRendering()
  43. if status != http.StatusOK {
  44. ctx := context.WithValue(r.Context(), render.StatusCtxKey, status)
  45. render.JSON(w, r.WithContext(ctx), action)
  46. } else {
  47. render.JSON(w, r, action)
  48. }
  49. }
  50. func getEventActionByName(w http.ResponseWriter, r *http.Request) {
  51. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  52. name := getURLParam(r, "name")
  53. renderEventAction(w, r, name, http.StatusOK)
  54. }
  55. func addEventAction(w http.ResponseWriter, r *http.Request) {
  56. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  57. claims, err := getTokenClaims(r)
  58. if err != nil || claims.Username == "" {
  59. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  60. return
  61. }
  62. var action dataprovider.BaseEventAction
  63. err = render.DecodeJSON(r.Body, &action)
  64. if err != nil {
  65. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  66. return
  67. }
  68. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  69. err = dataprovider.AddEventAction(&action, claims.Username, ipAddr, claims.Role)
  70. if err != nil {
  71. sendAPIResponse(w, r, err, "", getRespStatus(err))
  72. return
  73. }
  74. w.Header().Add("Location", fmt.Sprintf("%s/%s", eventActionsPath, action.Name))
  75. renderEventAction(w, r, action.Name, http.StatusCreated)
  76. }
  77. func updateEventAction(w http.ResponseWriter, r *http.Request) {
  78. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  79. claims, err := getTokenClaims(r)
  80. if err != nil || claims.Username == "" {
  81. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  82. return
  83. }
  84. name := getURLParam(r, "name")
  85. action, err := dataprovider.EventActionExists(name)
  86. if err != nil {
  87. sendAPIResponse(w, r, err, "", getRespStatus(err))
  88. return
  89. }
  90. var updatedAction dataprovider.BaseEventAction
  91. err = render.DecodeJSON(r.Body, &updatedAction)
  92. if err != nil {
  93. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  94. return
  95. }
  96. updatedAction.ID = action.ID
  97. updatedAction.Name = action.Name
  98. updatedAction.Options.SetEmptySecretsIfNil()
  99. switch updatedAction.Type {
  100. case dataprovider.ActionTypeHTTP:
  101. if updatedAction.Options.HTTPConfig.Password.IsNotPlainAndNotEmpty() {
  102. updatedAction.Options.HTTPConfig.Password = action.Options.HTTPConfig.Password
  103. }
  104. }
  105. err = dataprovider.UpdateEventAction(&updatedAction, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  106. if err != nil {
  107. sendAPIResponse(w, r, err, "", getRespStatus(err))
  108. return
  109. }
  110. sendAPIResponse(w, r, nil, "Event action updated", http.StatusOK)
  111. }
  112. func deleteEventAction(w http.ResponseWriter, r *http.Request) {
  113. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  114. claims, err := getTokenClaims(r)
  115. if err != nil || claims.Username == "" {
  116. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  117. return
  118. }
  119. name := getURLParam(r, "name")
  120. err = dataprovider.DeleteEventAction(name, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  121. if err != nil {
  122. sendAPIResponse(w, r, err, "", getRespStatus(err))
  123. return
  124. }
  125. sendAPIResponse(w, r, err, "Event action deleted", http.StatusOK)
  126. }
  127. func getEventRules(w http.ResponseWriter, r *http.Request) {
  128. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  129. limit, offset, order, err := getSearchFilters(w, r)
  130. if err != nil {
  131. return
  132. }
  133. rules, err := dataprovider.GetEventRules(limit, offset, order)
  134. if err != nil {
  135. sendAPIResponse(w, r, err, "", http.StatusInternalServerError)
  136. return
  137. }
  138. render.JSON(w, r, rules)
  139. }
  140. func renderEventRule(w http.ResponseWriter, r *http.Request, name string, status int) {
  141. rule, err := dataprovider.EventRuleExists(name)
  142. if err != nil {
  143. sendAPIResponse(w, r, err, "", getRespStatus(err))
  144. return
  145. }
  146. rule.PrepareForRendering()
  147. if status != http.StatusOK {
  148. ctx := context.WithValue(r.Context(), render.StatusCtxKey, status)
  149. render.JSON(w, r.WithContext(ctx), rule)
  150. } else {
  151. render.JSON(w, r, rule)
  152. }
  153. }
  154. func getEventRuleByName(w http.ResponseWriter, r *http.Request) {
  155. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  156. name := getURLParam(r, "name")
  157. renderEventRule(w, r, name, http.StatusOK)
  158. }
  159. func addEventRule(w http.ResponseWriter, r *http.Request) {
  160. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  161. claims, err := getTokenClaims(r)
  162. if err != nil || claims.Username == "" {
  163. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  164. return
  165. }
  166. var rule dataprovider.EventRule
  167. err = render.DecodeJSON(r.Body, &rule)
  168. if err != nil {
  169. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  170. return
  171. }
  172. ipAddr := util.GetIPFromRemoteAddress(r.RemoteAddr)
  173. if err := dataprovider.AddEventRule(&rule, claims.Username, ipAddr, claims.Role); err != nil {
  174. sendAPIResponse(w, r, err, "", getRespStatus(err))
  175. return
  176. }
  177. w.Header().Add("Location", fmt.Sprintf("%s/%s", eventRulesPath, rule.Name))
  178. renderEventRule(w, r, rule.Name, http.StatusCreated)
  179. }
  180. func updateEventRule(w http.ResponseWriter, r *http.Request) {
  181. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  182. claims, err := getTokenClaims(r)
  183. if err != nil || claims.Username == "" {
  184. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  185. return
  186. }
  187. rule, err := dataprovider.EventRuleExists(getURLParam(r, "name"))
  188. if err != nil {
  189. sendAPIResponse(w, r, err, "", getRespStatus(err))
  190. return
  191. }
  192. var updatedRule dataprovider.EventRule
  193. err = render.DecodeJSON(r.Body, &updatedRule)
  194. if err != nil {
  195. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  196. return
  197. }
  198. updatedRule.ID = rule.ID
  199. updatedRule.Name = rule.Name
  200. err = dataprovider.UpdateEventRule(&updatedRule, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  201. if err != nil {
  202. sendAPIResponse(w, r, err, "", getRespStatus(err))
  203. return
  204. }
  205. sendAPIResponse(w, r, nil, "Event rules updated", http.StatusOK)
  206. }
  207. func deleteEventRule(w http.ResponseWriter, r *http.Request) {
  208. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  209. claims, err := getTokenClaims(r)
  210. if err != nil || claims.Username == "" {
  211. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  212. return
  213. }
  214. name := getURLParam(r, "name")
  215. err = dataprovider.DeleteEventRule(name, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  216. if err != nil {
  217. sendAPIResponse(w, r, err, "", getRespStatus(err))
  218. return
  219. }
  220. sendAPIResponse(w, r, err, "Event rule deleted", http.StatusOK)
  221. }