api_admin.go 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187
  1. package httpd
  2. import (
  3. "context"
  4. "errors"
  5. "net/http"
  6. "github.com/go-chi/jwtauth/v5"
  7. "github.com/go-chi/render"
  8. "github.com/drakkan/sftpgo/v2/dataprovider"
  9. "github.com/drakkan/sftpgo/v2/util"
  10. )
  11. func getAdmins(w http.ResponseWriter, r *http.Request) {
  12. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  13. limit, offset, order, err := getSearchFilters(w, r)
  14. if err != nil {
  15. return
  16. }
  17. admins, err := dataprovider.GetAdmins(limit, offset, order)
  18. if err != nil {
  19. sendAPIResponse(w, r, err, "", getRespStatus(err))
  20. return
  21. }
  22. render.JSON(w, r, admins)
  23. }
  24. func getAdminByUsername(w http.ResponseWriter, r *http.Request) {
  25. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  26. username := getURLParam(r, "username")
  27. renderAdmin(w, r, username, http.StatusOK)
  28. }
  29. func renderAdmin(w http.ResponseWriter, r *http.Request, username string, status int) {
  30. admin, err := dataprovider.AdminExists(username)
  31. if err != nil {
  32. sendAPIResponse(w, r, err, "", getRespStatus(err))
  33. return
  34. }
  35. admin.HideConfidentialData()
  36. if status != http.StatusOK {
  37. ctx := context.WithValue(r.Context(), render.StatusCtxKey, http.StatusCreated)
  38. render.JSON(w, r.WithContext(ctx), admin)
  39. } else {
  40. render.JSON(w, r, admin)
  41. }
  42. }
  43. func addAdmin(w http.ResponseWriter, r *http.Request) {
  44. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  45. var admin dataprovider.Admin
  46. err := render.DecodeJSON(r.Body, &admin)
  47. if err != nil {
  48. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  49. return
  50. }
  51. err = dataprovider.AddAdmin(&admin)
  52. if err != nil {
  53. sendAPIResponse(w, r, err, "", getRespStatus(err))
  54. return
  55. }
  56. renderAdmin(w, r, admin.Username, http.StatusCreated)
  57. }
  58. func updateAdmin(w http.ResponseWriter, r *http.Request) {
  59. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  60. username := getURLParam(r, "username")
  61. admin, err := dataprovider.AdminExists(username)
  62. if err != nil {
  63. sendAPIResponse(w, r, err, "", getRespStatus(err))
  64. return
  65. }
  66. adminID := admin.ID
  67. err = render.DecodeJSON(r.Body, &admin)
  68. if err != nil {
  69. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  70. return
  71. }
  72. claims, err := getTokenClaims(r)
  73. if err != nil || claims.Username == "" {
  74. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  75. return
  76. }
  77. if username == claims.Username {
  78. if claims.APIKeyID != "" {
  79. sendAPIResponse(w, r, errors.New("updating the admin impersonated with an API key is not allowed"), "",
  80. http.StatusBadRequest)
  81. return
  82. }
  83. if claims.isCriticalPermRemoved(admin.Permissions) {
  84. sendAPIResponse(w, r, errors.New("you cannot remove these permissions to yourself"), "", http.StatusBadRequest)
  85. return
  86. }
  87. if admin.Status == 0 {
  88. sendAPIResponse(w, r, errors.New("you cannot disable yourself"), "", http.StatusBadRequest)
  89. return
  90. }
  91. }
  92. admin.ID = adminID
  93. admin.Username = username
  94. if err := dataprovider.UpdateAdmin(&admin); err != nil {
  95. sendAPIResponse(w, r, err, "", getRespStatus(err))
  96. return
  97. }
  98. sendAPIResponse(w, r, nil, "Admin updated", http.StatusOK)
  99. }
  100. func deleteAdmin(w http.ResponseWriter, r *http.Request) {
  101. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  102. username := getURLParam(r, "username")
  103. claims, err := getTokenClaims(r)
  104. if err != nil || claims.Username == "" {
  105. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  106. return
  107. }
  108. if username == claims.Username {
  109. sendAPIResponse(w, r, errors.New("you cannot delete yourself"), "", http.StatusBadRequest)
  110. return
  111. }
  112. err = dataprovider.DeleteAdmin(username)
  113. if err != nil {
  114. sendAPIResponse(w, r, err, "", getRespStatus(err))
  115. return
  116. }
  117. sendAPIResponse(w, r, err, "Admin deleted", http.StatusOK)
  118. }
  119. func changeAdminPassword(w http.ResponseWriter, r *http.Request) {
  120. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  121. var pwd pwdChange
  122. err := render.DecodeJSON(r.Body, &pwd)
  123. if err != nil {
  124. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  125. return
  126. }
  127. err = doChangeAdminPassword(r, pwd.CurrentPassword, pwd.NewPassword, pwd.NewPassword)
  128. if err != nil {
  129. sendAPIResponse(w, r, err, "", getRespStatus(err))
  130. return
  131. }
  132. sendAPIResponse(w, r, err, "Password updated", http.StatusOK)
  133. }
  134. func doChangeAdminPassword(r *http.Request, currentPassword, newPassword, confirmNewPassword string) error {
  135. if currentPassword == "" || newPassword == "" || confirmNewPassword == "" {
  136. return util.NewValidationError("please provide the current password and the new one two times")
  137. }
  138. if newPassword != confirmNewPassword {
  139. return util.NewValidationError("the two password fields do not match")
  140. }
  141. if currentPassword == newPassword {
  142. return util.NewValidationError("the new password must be different from the current one")
  143. }
  144. claims, err := getTokenClaims(r)
  145. if err != nil {
  146. return err
  147. }
  148. admin, err := dataprovider.AdminExists(claims.Username)
  149. if err != nil {
  150. return err
  151. }
  152. match, err := admin.CheckPassword(currentPassword)
  153. if !match || err != nil {
  154. return util.NewValidationError("current password does not match")
  155. }
  156. admin.Password = newPassword
  157. return dataprovider.UpdateAdmin(&admin)
  158. }
  159. func getTokenClaims(r *http.Request) (jwtTokenClaims, error) {
  160. tokenClaims := jwtTokenClaims{}
  161. _, claims, err := jwtauth.FromContext(r.Context())
  162. if err != nil {
  163. return tokenClaims, err
  164. }
  165. tokenClaims.Decode(claims)
  166. return tokenClaims, nil
  167. }