api_eventrule.go 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249
  1. // Copyright (C) 2019-2022 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "context"
  17. "net/http"
  18. "github.com/go-chi/render"
  19. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  20. "github.com/drakkan/sftpgo/v2/internal/util"
  21. )
  22. func getEventActions(w http.ResponseWriter, r *http.Request) {
  23. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  24. limit, offset, order, err := getSearchFilters(w, r)
  25. if err != nil {
  26. return
  27. }
  28. actions, err := dataprovider.GetEventActions(limit, offset, order, false)
  29. if err != nil {
  30. sendAPIResponse(w, r, err, "", http.StatusInternalServerError)
  31. return
  32. }
  33. render.JSON(w, r, actions)
  34. }
  35. func renderEventAction(w http.ResponseWriter, r *http.Request, name string, status int) {
  36. action, err := dataprovider.EventActionExists(name)
  37. if err != nil {
  38. sendAPIResponse(w, r, err, "", getRespStatus(err))
  39. return
  40. }
  41. action.PrepareForRendering()
  42. if status != http.StatusOK {
  43. ctx := context.WithValue(r.Context(), render.StatusCtxKey, status)
  44. render.JSON(w, r.WithContext(ctx), action)
  45. } else {
  46. render.JSON(w, r, action)
  47. }
  48. }
  49. func getEventActionByName(w http.ResponseWriter, r *http.Request) {
  50. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  51. name := getURLParam(r, "name")
  52. renderEventAction(w, r, name, http.StatusOK)
  53. }
  54. func addEventAction(w http.ResponseWriter, r *http.Request) {
  55. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  56. claims, err := getTokenClaims(r)
  57. if err != nil || claims.Username == "" {
  58. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  59. return
  60. }
  61. var action dataprovider.BaseEventAction
  62. err = render.DecodeJSON(r.Body, &action)
  63. if err != nil {
  64. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  65. return
  66. }
  67. err = dataprovider.AddEventAction(&action, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  68. if err != nil {
  69. sendAPIResponse(w, r, err, "", getRespStatus(err))
  70. return
  71. }
  72. renderEventAction(w, r, action.Name, http.StatusCreated)
  73. }
  74. func updateEventAction(w http.ResponseWriter, r *http.Request) {
  75. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  76. claims, err := getTokenClaims(r)
  77. if err != nil || claims.Username == "" {
  78. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  79. return
  80. }
  81. name := getURLParam(r, "name")
  82. action, err := dataprovider.EventActionExists(name)
  83. if err != nil {
  84. sendAPIResponse(w, r, err, "", getRespStatus(err))
  85. return
  86. }
  87. actionID := action.ID
  88. name = action.Name
  89. currentHTTPPassword := action.Options.HTTPConfig.Password
  90. action.Options = dataprovider.BaseEventActionOptions{}
  91. err = render.DecodeJSON(r.Body, &action)
  92. if err != nil {
  93. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  94. return
  95. }
  96. action.ID = actionID
  97. action.Name = name
  98. action.Options.SetEmptySecretsIfNil()
  99. switch action.Type {
  100. case dataprovider.ActionTypeHTTP:
  101. if action.Options.HTTPConfig.Password.IsNotPlainAndNotEmpty() {
  102. action.Options.HTTPConfig.Password = currentHTTPPassword
  103. }
  104. }
  105. err = dataprovider.UpdateEventAction(&action, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  106. if err != nil {
  107. sendAPIResponse(w, r, err, "", getRespStatus(err))
  108. return
  109. }
  110. sendAPIResponse(w, r, nil, "Event target updated", http.StatusOK)
  111. }
  112. func deleteEventAction(w http.ResponseWriter, r *http.Request) {
  113. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  114. claims, err := getTokenClaims(r)
  115. if err != nil || claims.Username == "" {
  116. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  117. return
  118. }
  119. name := getURLParam(r, "name")
  120. err = dataprovider.DeleteEventAction(name, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  121. if err != nil {
  122. sendAPIResponse(w, r, err, "", getRespStatus(err))
  123. return
  124. }
  125. sendAPIResponse(w, r, err, "Event action deleted", http.StatusOK)
  126. }
  127. func getEventRules(w http.ResponseWriter, r *http.Request) {
  128. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  129. limit, offset, order, err := getSearchFilters(w, r)
  130. if err != nil {
  131. return
  132. }
  133. rules, err := dataprovider.GetEventRules(limit, offset, order)
  134. if err != nil {
  135. sendAPIResponse(w, r, err, "", http.StatusInternalServerError)
  136. return
  137. }
  138. render.JSON(w, r, rules)
  139. }
  140. func renderEventRule(w http.ResponseWriter, r *http.Request, name string, status int) {
  141. rule, err := dataprovider.EventRuleExists(name)
  142. if err != nil {
  143. sendAPIResponse(w, r, err, "", getRespStatus(err))
  144. return
  145. }
  146. rule.PrepareForRendering()
  147. if status != http.StatusOK {
  148. ctx := context.WithValue(r.Context(), render.StatusCtxKey, status)
  149. render.JSON(w, r.WithContext(ctx), rule)
  150. } else {
  151. render.JSON(w, r, rule)
  152. }
  153. }
  154. func getEventRuleByName(w http.ResponseWriter, r *http.Request) {
  155. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  156. name := getURLParam(r, "name")
  157. renderEventRule(w, r, name, http.StatusOK)
  158. }
  159. func addEventRule(w http.ResponseWriter, r *http.Request) {
  160. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  161. claims, err := getTokenClaims(r)
  162. if err != nil || claims.Username == "" {
  163. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  164. return
  165. }
  166. var rule dataprovider.EventRule
  167. err = render.DecodeJSON(r.Body, &rule)
  168. if err != nil {
  169. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  170. return
  171. }
  172. err = dataprovider.AddEventRule(&rule, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  173. if err != nil {
  174. sendAPIResponse(w, r, err, "", getRespStatus(err))
  175. return
  176. }
  177. renderEventRule(w, r, rule.Name, http.StatusCreated)
  178. }
  179. func updateEventRule(w http.ResponseWriter, r *http.Request) {
  180. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  181. claims, err := getTokenClaims(r)
  182. if err != nil || claims.Username == "" {
  183. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  184. return
  185. }
  186. name := getURLParam(r, "name")
  187. rule, err := dataprovider.EventRuleExists(name)
  188. if err != nil {
  189. sendAPIResponse(w, r, err, "", getRespStatus(err))
  190. return
  191. }
  192. ruleID := rule.ID
  193. name = rule.Name
  194. rule.Actions = nil
  195. err = render.DecodeJSON(r.Body, &rule)
  196. if err != nil {
  197. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  198. return
  199. }
  200. rule.ID = ruleID
  201. rule.Name = name
  202. err = dataprovider.UpdateEventRule(&rule, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  203. if err != nil {
  204. sendAPIResponse(w, r, err, "", getRespStatus(err))
  205. return
  206. }
  207. sendAPIResponse(w, r, nil, "Event rules updated", http.StatusOK)
  208. }
  209. func deleteEventRule(w http.ResponseWriter, r *http.Request) {
  210. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  211. claims, err := getTokenClaims(r)
  212. if err != nil || claims.Username == "" {
  213. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  214. return
  215. }
  216. name := getURLParam(r, "name")
  217. err = dataprovider.DeleteEventRule(name, claims.Username, util.GetIPFromRemoteAddress(r.RemoteAddr), claims.Role)
  218. if err != nil {
  219. sendAPIResponse(w, r, err, "", getRespStatus(err))
  220. return
  221. }
  222. sendAPIResponse(w, r, err, "Event rule deleted", http.StatusOK)
  223. }