api_admin.go 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183
  1. package httpd
  2. import (
  3. "context"
  4. "errors"
  5. "net/http"
  6. "github.com/go-chi/jwtauth"
  7. "github.com/go-chi/render"
  8. "github.com/drakkan/sftpgo/dataprovider"
  9. )
  10. type adminPwd struct {
  11. CurrentPassword string `json:"current_password"`
  12. NewPassword string `json:"new_password"`
  13. }
  14. func getAdmins(w http.ResponseWriter, r *http.Request) {
  15. limit, offset, order, err := getSearchFilters(w, r)
  16. if err != nil {
  17. return
  18. }
  19. admins, err := dataprovider.GetAdmins(limit, offset, order)
  20. if err != nil {
  21. sendAPIResponse(w, r, err, "", getRespStatus(err))
  22. return
  23. }
  24. render.JSON(w, r, admins)
  25. }
  26. func getAdminByUsername(w http.ResponseWriter, r *http.Request) {
  27. username := getURLParam(r, "username")
  28. renderAdmin(w, r, username, http.StatusOK)
  29. }
  30. func renderAdmin(w http.ResponseWriter, r *http.Request, username string, status int) {
  31. admin, err := dataprovider.AdminExists(username)
  32. if err != nil {
  33. sendAPIResponse(w, r, err, "", getRespStatus(err))
  34. return
  35. }
  36. admin.HideConfidentialData()
  37. if status != http.StatusOK {
  38. ctx := context.WithValue(r.Context(), render.StatusCtxKey, http.StatusCreated)
  39. render.JSON(w, r.WithContext(ctx), admin)
  40. } else {
  41. render.JSON(w, r, admin)
  42. }
  43. }
  44. func addAdmin(w http.ResponseWriter, r *http.Request) {
  45. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  46. var admin dataprovider.Admin
  47. err := render.DecodeJSON(r.Body, &admin)
  48. if err != nil {
  49. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  50. return
  51. }
  52. err = dataprovider.AddAdmin(&admin)
  53. if err != nil {
  54. sendAPIResponse(w, r, err, "", getRespStatus(err))
  55. return
  56. }
  57. renderAdmin(w, r, admin.Username, http.StatusCreated)
  58. }
  59. func updateAdmin(w http.ResponseWriter, r *http.Request) {
  60. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  61. username := getURLParam(r, "username")
  62. admin, err := dataprovider.AdminExists(username)
  63. if err != nil {
  64. sendAPIResponse(w, r, err, "", getRespStatus(err))
  65. return
  66. }
  67. adminID := admin.ID
  68. err = render.DecodeJSON(r.Body, &admin)
  69. if err != nil {
  70. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  71. return
  72. }
  73. claims, err := getTokenClaims(r)
  74. if err != nil || claims.Username == "" {
  75. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  76. return
  77. }
  78. if username == claims.Username {
  79. if claims.isCriticalPermRemoved(admin.Permissions) {
  80. sendAPIResponse(w, r, errors.New("You cannot remove these permissions to yourself"), "", http.StatusBadRequest)
  81. return
  82. }
  83. if admin.Status == 0 {
  84. sendAPIResponse(w, r, errors.New("You cannot disable yourself"), "", http.StatusBadRequest)
  85. return
  86. }
  87. }
  88. admin.ID = adminID
  89. admin.Username = username
  90. if err := dataprovider.UpdateAdmin(&admin); err != nil {
  91. sendAPIResponse(w, r, err, "", getRespStatus(err))
  92. return
  93. }
  94. sendAPIResponse(w, r, nil, "Admin updated", http.StatusOK)
  95. }
  96. func deleteAdmin(w http.ResponseWriter, r *http.Request) {
  97. username := getURLParam(r, "username")
  98. claims, err := getTokenClaims(r)
  99. if err != nil || claims.Username == "" {
  100. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  101. return
  102. }
  103. if username == claims.Username {
  104. sendAPIResponse(w, r, errors.New("You cannot delete yourself"), "", http.StatusBadRequest)
  105. return
  106. }
  107. err = dataprovider.DeleteAdmin(username)
  108. if err != nil {
  109. sendAPIResponse(w, r, err, "", getRespStatus(err))
  110. return
  111. }
  112. sendAPIResponse(w, r, err, "Admin deleted", http.StatusOK)
  113. }
  114. func changeAdminPassword(w http.ResponseWriter, r *http.Request) {
  115. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  116. var pwd adminPwd
  117. err := render.DecodeJSON(r.Body, &pwd)
  118. if err != nil {
  119. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  120. return
  121. }
  122. err = doChangeAdminPassword(r, pwd.CurrentPassword, pwd.NewPassword, pwd.NewPassword)
  123. if err != nil {
  124. sendAPIResponse(w, r, err, "", getRespStatus(err))
  125. return
  126. }
  127. sendAPIResponse(w, r, err, "Password updated", http.StatusOK)
  128. }
  129. func doChangeAdminPassword(r *http.Request, currentPassword, newPassword, confirmNewPassword string) error {
  130. if currentPassword == "" || newPassword == "" || confirmNewPassword == "" {
  131. return dataprovider.NewValidationError("please provide the current password and the new one two times")
  132. }
  133. if newPassword != confirmNewPassword {
  134. return dataprovider.NewValidationError("the two password fields do not match")
  135. }
  136. if currentPassword == newPassword {
  137. return dataprovider.NewValidationError("the new password must be different from the current one")
  138. }
  139. claims, err := getTokenClaims(r)
  140. if err != nil {
  141. return err
  142. }
  143. admin, err := dataprovider.AdminExists(claims.Username)
  144. if err != nil {
  145. return err
  146. }
  147. match, err := admin.CheckPassword(currentPassword)
  148. if !match || err != nil {
  149. return dataprovider.NewValidationError("current password does not match")
  150. }
  151. admin.Password = newPassword
  152. return dataprovider.UpdateAdmin(&admin)
  153. }
  154. func getTokenClaims(r *http.Request) (jwtTokenClaims, error) {
  155. tokenClaims := jwtTokenClaims{}
  156. _, claims, err := jwtauth.FromContext(r.Context())
  157. if err != nil {
  158. return tokenClaims, err
  159. }
  160. tokenClaims.Decode(claims)
  161. return tokenClaims, nil
  162. }