123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179 |
- package httpd
- import (
- "context"
- "errors"
- "net/http"
- "github.com/go-chi/jwtauth/v5"
- "github.com/go-chi/render"
- "github.com/drakkan/sftpgo/v2/dataprovider"
- "github.com/drakkan/sftpgo/v2/utils"
- )
- func getAdmins(w http.ResponseWriter, r *http.Request) {
- limit, offset, order, err := getSearchFilters(w, r)
- if err != nil {
- return
- }
- admins, err := dataprovider.GetAdmins(limit, offset, order)
- if err != nil {
- sendAPIResponse(w, r, err, "", getRespStatus(err))
- return
- }
- render.JSON(w, r, admins)
- }
- func getAdminByUsername(w http.ResponseWriter, r *http.Request) {
- username := getURLParam(r, "username")
- renderAdmin(w, r, username, http.StatusOK)
- }
- func renderAdmin(w http.ResponseWriter, r *http.Request, username string, status int) {
- admin, err := dataprovider.AdminExists(username)
- if err != nil {
- sendAPIResponse(w, r, err, "", getRespStatus(err))
- return
- }
- admin.HideConfidentialData()
- if status != http.StatusOK {
- ctx := context.WithValue(r.Context(), render.StatusCtxKey, http.StatusCreated)
- render.JSON(w, r.WithContext(ctx), admin)
- } else {
- render.JSON(w, r, admin)
- }
- }
- func addAdmin(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- var admin dataprovider.Admin
- err := render.DecodeJSON(r.Body, &admin)
- if err != nil {
- sendAPIResponse(w, r, err, "", http.StatusBadRequest)
- return
- }
- err = dataprovider.AddAdmin(&admin)
- if err != nil {
- sendAPIResponse(w, r, err, "", getRespStatus(err))
- return
- }
- renderAdmin(w, r, admin.Username, http.StatusCreated)
- }
- func updateAdmin(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- username := getURLParam(r, "username")
- admin, err := dataprovider.AdminExists(username)
- if err != nil {
- sendAPIResponse(w, r, err, "", getRespStatus(err))
- return
- }
- adminID := admin.ID
- err = render.DecodeJSON(r.Body, &admin)
- if err != nil {
- sendAPIResponse(w, r, err, "", http.StatusBadRequest)
- return
- }
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
- return
- }
- if username == claims.Username {
- if claims.isCriticalPermRemoved(admin.Permissions) {
- sendAPIResponse(w, r, errors.New("you cannot remove these permissions to yourself"), "", http.StatusBadRequest)
- return
- }
- if admin.Status == 0 {
- sendAPIResponse(w, r, errors.New("you cannot disable yourself"), "", http.StatusBadRequest)
- return
- }
- }
- admin.ID = adminID
- admin.Username = username
- if err := dataprovider.UpdateAdmin(&admin); err != nil {
- sendAPIResponse(w, r, err, "", getRespStatus(err))
- return
- }
- sendAPIResponse(w, r, nil, "Admin updated", http.StatusOK)
- }
- func deleteAdmin(w http.ResponseWriter, r *http.Request) {
- username := getURLParam(r, "username")
- claims, err := getTokenClaims(r)
- if err != nil || claims.Username == "" {
- sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
- return
- }
- if username == claims.Username {
- sendAPIResponse(w, r, errors.New("you cannot delete yourself"), "", http.StatusBadRequest)
- return
- }
- err = dataprovider.DeleteAdmin(username)
- if err != nil {
- sendAPIResponse(w, r, err, "", getRespStatus(err))
- return
- }
- sendAPIResponse(w, r, err, "Admin deleted", http.StatusOK)
- }
- func changeAdminPassword(w http.ResponseWriter, r *http.Request) {
- r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
- var pwd pwdChange
- err := render.DecodeJSON(r.Body, &pwd)
- if err != nil {
- sendAPIResponse(w, r, err, "", http.StatusBadRequest)
- return
- }
- err = doChangeAdminPassword(r, pwd.CurrentPassword, pwd.NewPassword, pwd.NewPassword)
- if err != nil {
- sendAPIResponse(w, r, err, "", getRespStatus(err))
- return
- }
- sendAPIResponse(w, r, err, "Password updated", http.StatusOK)
- }
- func doChangeAdminPassword(r *http.Request, currentPassword, newPassword, confirmNewPassword string) error {
- if currentPassword == "" || newPassword == "" || confirmNewPassword == "" {
- return utils.NewValidationError("please provide the current password and the new one two times")
- }
- if newPassword != confirmNewPassword {
- return utils.NewValidationError("the two password fields do not match")
- }
- if currentPassword == newPassword {
- return utils.NewValidationError("the new password must be different from the current one")
- }
- claims, err := getTokenClaims(r)
- if err != nil {
- return err
- }
- admin, err := dataprovider.AdminExists(claims.Username)
- if err != nil {
- return err
- }
- match, err := admin.CheckPassword(currentPassword)
- if !match || err != nil {
- return utils.NewValidationError("current password does not match")
- }
- admin.Password = newPassword
- return dataprovider.UpdateAdmin(&admin)
- }
- func getTokenClaims(r *http.Request) (jwtTokenClaims, error) {
- tokenClaims := jwtTokenClaims{}
- _, claims, err := jwtauth.FromContext(r.Context())
- if err != nil {
- return tokenClaims, err
- }
- tokenClaims.Decode(claims)
- return tokenClaims, nil
- }
|