2021-06-05 14:07:09 +00:00
|
|
|
package httpd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
2021-07-23 08:19:27 +00:00
|
|
|
"io"
|
2021-06-05 14:07:09 +00:00
|
|
|
"net/http"
|
2021-07-23 08:19:27 +00:00
|
|
|
"os"
|
|
|
|
"path"
|
2021-06-05 14:07:09 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/go-chi/render"
|
|
|
|
"github.com/rs/xid"
|
|
|
|
|
2021-06-26 05:31:41 +00:00
|
|
|
"github.com/drakkan/sftpgo/v2/common"
|
|
|
|
"github.com/drakkan/sftpgo/v2/dataprovider"
|
2021-07-23 08:19:27 +00:00
|
|
|
"github.com/drakkan/sftpgo/v2/logger"
|
2021-07-11 13:26:51 +00:00
|
|
|
"github.com/drakkan/sftpgo/v2/util"
|
2021-06-05 14:07:09 +00:00
|
|
|
)
|
|
|
|
|
2021-07-23 08:19:27 +00:00
|
|
|
func getUserConnection(w http.ResponseWriter, r *http.Request) (*Connection, error) {
|
2021-06-05 14:07:09 +00:00
|
|
|
claims, err := getTokenClaims(r)
|
|
|
|
if err != nil || claims.Username == "" {
|
|
|
|
sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
|
2021-07-23 08:19:27 +00:00
|
|
|
return nil, fmt.Errorf("invalid token claims %w", err)
|
2021-06-05 14:07:09 +00:00
|
|
|
}
|
|
|
|
user, err := dataprovider.UserExists(claims.Username)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, nil, "Unable to retrieve your user", getRespStatus(err))
|
2021-07-23 08:19:27 +00:00
|
|
|
return nil, err
|
2021-06-05 14:07:09 +00:00
|
|
|
}
|
|
|
|
connID := xid.New().String()
|
|
|
|
connectionID := fmt.Sprintf("%v_%v", common.ProtocolHTTP, connID)
|
|
|
|
if err := checkHTTPClientUser(&user, r, connectionID); err != nil {
|
|
|
|
sendAPIResponse(w, r, err, http.StatusText(http.StatusForbidden), http.StatusForbidden)
|
2021-07-23 08:19:27 +00:00
|
|
|
return nil, err
|
2021-06-05 14:07:09 +00:00
|
|
|
}
|
|
|
|
connection := &Connection{
|
2021-07-24 18:11:17 +00:00
|
|
|
BaseConnection: common.NewBaseConnection(connID, common.ProtocolHTTP, util.GetHTTPLocalAddress(r),
|
|
|
|
r.RemoteAddr, user),
|
|
|
|
request: r,
|
2021-06-05 14:07:09 +00:00
|
|
|
}
|
2021-07-23 08:19:27 +00:00
|
|
|
return connection, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func readUserFolder(w http.ResponseWriter, r *http.Request) {
|
2021-08-17 16:08:32 +00:00
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
2021-07-23 08:19:27 +00:00
|
|
|
connection, err := getUserConnection(w, r)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
2021-06-05 14:07:09 +00:00
|
|
|
common.Connections.Add(connection)
|
|
|
|
defer common.Connections.Remove(connection.GetID())
|
|
|
|
|
2021-07-11 13:26:51 +00:00
|
|
|
name := util.CleanPath(r.URL.Query().Get("path"))
|
2021-06-05 14:07:09 +00:00
|
|
|
contents, err := connection.ReadDir(name)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, "Unable to get directory contents", getMappedStatusCode(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
results := make([]map[string]interface{}, 0, len(contents))
|
|
|
|
for _, info := range contents {
|
|
|
|
res := make(map[string]interface{})
|
|
|
|
res["name"] = info.Name()
|
|
|
|
if info.Mode().IsRegular() {
|
|
|
|
res["size"] = info.Size()
|
|
|
|
}
|
|
|
|
res["mode"] = info.Mode()
|
|
|
|
res["last_modified"] = info.ModTime().UTC().Format(time.RFC3339)
|
|
|
|
results = append(results, res)
|
|
|
|
}
|
|
|
|
|
|
|
|
render.JSON(w, r, results)
|
|
|
|
}
|
|
|
|
|
2021-07-23 08:19:27 +00:00
|
|
|
func createUserDir(w http.ResponseWriter, r *http.Request) {
|
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
connection, err := getUserConnection(w, r)
|
|
|
|
if err != nil {
|
2021-06-05 14:07:09 +00:00
|
|
|
return
|
|
|
|
}
|
2021-07-23 08:19:27 +00:00
|
|
|
common.Connections.Add(connection)
|
|
|
|
defer common.Connections.Remove(connection.GetID())
|
|
|
|
|
|
|
|
name := util.CleanPath(r.URL.Query().Get("path"))
|
|
|
|
err = connection.CreateDir(name)
|
2021-06-05 14:07:09 +00:00
|
|
|
if err != nil {
|
2021-07-23 08:19:27 +00:00
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Unable to create directory %#v", name), getMappedStatusCode(err))
|
2021-06-05 14:07:09 +00:00
|
|
|
return
|
|
|
|
}
|
2021-07-23 08:19:27 +00:00
|
|
|
sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %#v created", name), http.StatusCreated)
|
|
|
|
}
|
|
|
|
|
|
|
|
func renameUserDir(w http.ResponseWriter, r *http.Request) {
|
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
connection, err := getUserConnection(w, r)
|
|
|
|
if err != nil {
|
2021-06-05 14:07:09 +00:00
|
|
|
return
|
|
|
|
}
|
2021-07-23 08:19:27 +00:00
|
|
|
common.Connections.Add(connection)
|
|
|
|
defer common.Connections.Remove(connection.GetID())
|
|
|
|
|
|
|
|
oldName := util.CleanPath(r.URL.Query().Get("path"))
|
|
|
|
newName := util.CleanPath(r.URL.Query().Get("target"))
|
|
|
|
err = connection.Rename(oldName, newName)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Unable to rename directory %#v to %#v", oldName, newName),
|
|
|
|
getMappedStatusCode(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %#v renamed to %#v", oldName, newName), http.StatusOK)
|
|
|
|
}
|
|
|
|
|
|
|
|
func deleteUserDir(w http.ResponseWriter, r *http.Request) {
|
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
connection, err := getUserConnection(w, r)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
common.Connections.Add(connection)
|
|
|
|
defer common.Connections.Remove(connection.GetID())
|
|
|
|
|
|
|
|
name := util.CleanPath(r.URL.Query().Get("path"))
|
|
|
|
err = connection.RemoveDir(name)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete directory %#v", name), getMappedStatusCode(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
sendAPIResponse(w, r, nil, fmt.Sprintf("Directory %#v deleted", name), http.StatusOK)
|
|
|
|
}
|
|
|
|
|
|
|
|
func getUserFile(w http.ResponseWriter, r *http.Request) {
|
2021-08-17 16:08:32 +00:00
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
2021-07-23 08:19:27 +00:00
|
|
|
connection, err := getUserConnection(w, r)
|
|
|
|
if err != nil {
|
|
|
|
return
|
2021-06-05 14:07:09 +00:00
|
|
|
}
|
|
|
|
common.Connections.Add(connection)
|
|
|
|
defer common.Connections.Remove(connection.GetID())
|
|
|
|
|
2021-07-11 13:26:51 +00:00
|
|
|
name := util.CleanPath(r.URL.Query().Get("path"))
|
2021-06-05 14:07:09 +00:00
|
|
|
if name == "/" {
|
|
|
|
sendAPIResponse(w, r, nil, "Please set the path to a valid file", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
info, err := connection.Stat(name, 0)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, "Unable to stat the requested file", getMappedStatusCode(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if info.IsDir() {
|
|
|
|
sendAPIResponse(w, r, nil, fmt.Sprintf("Please set the path to a valid file, %#v is a directory", name), http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if status, err := downloadFile(w, r, connection, name, info); err != nil {
|
|
|
|
resp := apiResponse{
|
|
|
|
Error: err.Error(),
|
|
|
|
Message: http.StatusText(status),
|
|
|
|
}
|
|
|
|
ctx := r.Context()
|
|
|
|
if status != 0 {
|
|
|
|
ctx = context.WithValue(ctx, render.StatusCtxKey, status)
|
|
|
|
}
|
|
|
|
render.JSON(w, r.WithContext(ctx), resp)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-23 08:19:27 +00:00
|
|
|
func uploadUserFiles(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if maxUploadFileSize > 0 {
|
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxUploadFileSize)
|
|
|
|
}
|
|
|
|
|
|
|
|
connection, err := getUserConnection(w, r)
|
|
|
|
if err != nil {
|
2021-06-05 14:07:09 +00:00
|
|
|
return
|
|
|
|
}
|
2021-07-23 08:19:27 +00:00
|
|
|
common.Connections.Add(connection)
|
|
|
|
defer common.Connections.Remove(connection.GetID())
|
|
|
|
|
|
|
|
err = r.ParseMultipartForm(maxMultipartMem)
|
2021-06-05 14:07:09 +00:00
|
|
|
if err != nil {
|
2021-07-23 08:19:27 +00:00
|
|
|
sendAPIResponse(w, r, err, "Unable to parse multipart form", http.StatusBadRequest)
|
2021-06-05 14:07:09 +00:00
|
|
|
return
|
|
|
|
}
|
2021-07-23 19:41:02 +00:00
|
|
|
defer r.MultipartForm.RemoveAll() //nolint:errcheck
|
2021-07-23 08:19:27 +00:00
|
|
|
|
|
|
|
parentDir := util.CleanPath(r.URL.Query().Get("path"))
|
|
|
|
files := r.MultipartForm.File["filename"]
|
|
|
|
if len(files) == 0 {
|
|
|
|
sendAPIResponse(w, r, err, "No files uploaded!", http.StatusBadRequest)
|
2021-06-05 14:07:09 +00:00
|
|
|
return
|
|
|
|
}
|
2021-07-23 08:19:27 +00:00
|
|
|
|
|
|
|
for _, f := range files {
|
|
|
|
file, err := f.Open()
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Unable to read uploaded file %#v", f.Filename), getMappedStatusCode(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer file.Close()
|
|
|
|
|
|
|
|
filePath := path.Join(parentDir, f.Filename)
|
|
|
|
writer, err := connection.getFileWriter(filePath)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Unable to write file %#v", f.Filename), getMappedStatusCode(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
_, err = io.Copy(writer, file)
|
|
|
|
if err != nil {
|
|
|
|
writer.Close() //nolint:errcheck
|
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Error saving file %#v", f.Filename), getMappedStatusCode(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
err = writer.Close()
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Error closing file %#v", f.Filename), getMappedStatusCode(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sendAPIResponse(w, r, nil, "Upload completed", http.StatusCreated)
|
|
|
|
}
|
|
|
|
|
|
|
|
func renameUserFile(w http.ResponseWriter, r *http.Request) {
|
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
connection, err := getUserConnection(w, r)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
common.Connections.Add(connection)
|
|
|
|
defer common.Connections.Remove(connection.GetID())
|
|
|
|
|
|
|
|
oldName := util.CleanPath(r.URL.Query().Get("path"))
|
|
|
|
newName := util.CleanPath(r.URL.Query().Get("target"))
|
|
|
|
err = connection.Rename(oldName, newName)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Unable to rename file %#v to %#v", oldName, newName),
|
|
|
|
getMappedStatusCode(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
sendAPIResponse(w, r, nil, fmt.Sprintf("File %#v renamed to %#v", oldName, newName), http.StatusOK)
|
|
|
|
}
|
|
|
|
|
|
|
|
func deleteUserFile(w http.ResponseWriter, r *http.Request) {
|
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
connection, err := getUserConnection(w, r)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
common.Connections.Add(connection)
|
|
|
|
defer common.Connections.Remove(connection.GetID())
|
|
|
|
|
|
|
|
name := util.CleanPath(r.URL.Query().Get("path"))
|
|
|
|
fs, p, err := connection.GetFsAndResolvedPath(name)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %#v", name), getMappedStatusCode(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var fi os.FileInfo
|
|
|
|
if fi, err = fs.Lstat(p); err != nil {
|
|
|
|
connection.Log(logger.LevelWarn, "failed to remove a file %#v: stat error: %+v", p, err)
|
|
|
|
err = connection.GetFsError(fs, err)
|
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %#v", name), getMappedStatusCode(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if fi.IsDir() && fi.Mode()&os.ModeSymlink == 0 {
|
|
|
|
connection.Log(logger.LevelDebug, "cannot remove %#v is not a file/symlink", p)
|
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Unable delete %#v, it is not a file/symlink", name), http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
err = connection.RemoveFile(fs, p, name, fi)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, fmt.Sprintf("Unable to delete file %#v", name), getMappedStatusCode(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
sendAPIResponse(w, r, nil, fmt.Sprintf("File %#v deleted", name), http.StatusOK)
|
|
|
|
}
|
|
|
|
|
|
|
|
func getUserFilesAsZipStream(w http.ResponseWriter, r *http.Request) {
|
2021-08-17 16:08:32 +00:00
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
2021-07-23 08:19:27 +00:00
|
|
|
connection, err := getUserConnection(w, r)
|
|
|
|
if err != nil {
|
|
|
|
return
|
2021-06-05 14:07:09 +00:00
|
|
|
}
|
|
|
|
common.Connections.Add(connection)
|
|
|
|
defer common.Connections.Remove(connection.GetID())
|
|
|
|
|
|
|
|
var filesList []string
|
|
|
|
err = render.DecodeJSON(r.Body, &filesList)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, "", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
baseDir := "/"
|
|
|
|
for idx := range filesList {
|
2021-07-11 13:26:51 +00:00
|
|
|
filesList[idx] = util.CleanPath(filesList[idx])
|
2021-06-05 14:07:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Disposition", "attachment; filename=\"sftpgo-download.zip\"")
|
|
|
|
renderCompressedFiles(w, connection, baseDir, filesList)
|
|
|
|
}
|
|
|
|
|
|
|
|
func getUserPublicKeys(w http.ResponseWriter, r *http.Request) {
|
2021-08-17 16:08:32 +00:00
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
2021-06-05 14:07:09 +00:00
|
|
|
claims, err := getTokenClaims(r)
|
|
|
|
if err != nil || claims.Username == "" {
|
|
|
|
sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
user, err := dataprovider.UserExists(claims.Username)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, nil, "Unable to retrieve your user", getRespStatus(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
render.JSON(w, r, user.PublicKeys)
|
|
|
|
}
|
|
|
|
|
|
|
|
func setUserPublicKeys(w http.ResponseWriter, r *http.Request) {
|
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
|
|
|
|
claims, err := getTokenClaims(r)
|
|
|
|
if err != nil || claims.Username == "" {
|
|
|
|
sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
user, err := dataprovider.UserExists(claims.Username)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, nil, "Unable to retrieve your user", getRespStatus(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var publicKeys []string
|
|
|
|
err = render.DecodeJSON(r.Body, &publicKeys)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, "", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
user.PublicKeys = publicKeys
|
|
|
|
err = dataprovider.UpdateUser(&user)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
sendAPIResponse(w, r, err, "Public keys updated", http.StatusOK)
|
|
|
|
}
|
|
|
|
|
2021-09-29 16:46:15 +00:00
|
|
|
func getUserProfile(w http.ResponseWriter, r *http.Request) {
|
2021-09-06 16:46:35 +00:00
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
claims, err := getTokenClaims(r)
|
|
|
|
if err != nil || claims.Username == "" {
|
|
|
|
sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
user, err := dataprovider.UserExists(claims.Username)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
|
|
|
return
|
|
|
|
}
|
2021-09-29 16:46:15 +00:00
|
|
|
resp := userProfile{
|
|
|
|
baseProfile: baseProfile{
|
|
|
|
Email: user.Email,
|
|
|
|
Description: user.Description,
|
|
|
|
AllowAPIKeyAuth: user.Filters.AllowAPIKeyAuth,
|
|
|
|
},
|
|
|
|
PublicKeys: user.PublicKeys,
|
2021-09-06 16:46:35 +00:00
|
|
|
}
|
|
|
|
render.JSON(w, r, resp)
|
|
|
|
}
|
|
|
|
|
2021-09-29 16:46:15 +00:00
|
|
|
func updateUserProfile(w http.ResponseWriter, r *http.Request) {
|
2021-09-06 16:46:35 +00:00
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
claims, err := getTokenClaims(r)
|
|
|
|
if err != nil || claims.Username == "" {
|
|
|
|
sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
2021-09-29 16:46:15 +00:00
|
|
|
var req userProfile
|
2021-09-06 16:46:35 +00:00
|
|
|
err = render.DecodeJSON(r.Body, &req)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, "", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
user, err := dataprovider.UserExists(claims.Username)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
|
|
|
return
|
|
|
|
}
|
2021-09-29 16:46:15 +00:00
|
|
|
if !user.CanManagePublicKeys() && !user.CanChangeAPIKeyAuth() && !user.CanChangeInfo() {
|
|
|
|
sendAPIResponse(w, r, nil, "You are not allowed to change anything", http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if user.CanManagePublicKeys() {
|
|
|
|
user.PublicKeys = req.PublicKeys
|
|
|
|
}
|
|
|
|
if user.CanChangeAPIKeyAuth() {
|
|
|
|
user.Filters.AllowAPIKeyAuth = req.AllowAPIKeyAuth
|
|
|
|
}
|
|
|
|
if user.CanChangeInfo() {
|
|
|
|
user.Email = req.Email
|
|
|
|
user.Description = req.Description
|
|
|
|
}
|
2021-09-06 16:46:35 +00:00
|
|
|
if err := dataprovider.UpdateUser(&user); err != nil {
|
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
|
|
|
return
|
|
|
|
}
|
2021-09-29 16:46:15 +00:00
|
|
|
sendAPIResponse(w, r, err, "Profile updated", http.StatusOK)
|
2021-09-06 16:46:35 +00:00
|
|
|
}
|
|
|
|
|
2021-06-05 14:07:09 +00:00
|
|
|
func changeUserPassword(w http.ResponseWriter, r *http.Request) {
|
|
|
|
r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
|
|
|
|
|
|
|
|
var pwd pwdChange
|
|
|
|
err := render.DecodeJSON(r.Body, &pwd)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, "", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
err = doChangeUserPassword(r, pwd.CurrentPassword, pwd.NewPassword, pwd.NewPassword)
|
|
|
|
if err != nil {
|
|
|
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
sendAPIResponse(w, r, err, "Password updated", http.StatusOK)
|
|
|
|
}
|
|
|
|
|
|
|
|
func doChangeUserPassword(r *http.Request, currentPassword, newPassword, confirmNewPassword string) error {
|
|
|
|
if currentPassword == "" || newPassword == "" || confirmNewPassword == "" {
|
2021-07-11 13:26:51 +00:00
|
|
|
return util.NewValidationError("please provide the current password and the new one two times")
|
2021-06-05 14:07:09 +00:00
|
|
|
}
|
|
|
|
if newPassword != confirmNewPassword {
|
2021-07-11 13:26:51 +00:00
|
|
|
return util.NewValidationError("the two password fields do not match")
|
2021-06-05 14:07:09 +00:00
|
|
|
}
|
|
|
|
if currentPassword == newPassword {
|
2021-07-11 13:26:51 +00:00
|
|
|
return util.NewValidationError("the new password must be different from the current one")
|
2021-06-05 14:07:09 +00:00
|
|
|
}
|
|
|
|
claims, err := getTokenClaims(r)
|
|
|
|
if err != nil || claims.Username == "" {
|
|
|
|
return errors.New("invalid token claims")
|
|
|
|
}
|
2021-07-11 13:26:51 +00:00
|
|
|
user, err := dataprovider.CheckUserAndPass(claims.Username, currentPassword, util.GetIPFromRemoteAddress(r.RemoteAddr),
|
2021-06-05 14:07:09 +00:00
|
|
|
common.ProtocolHTTP)
|
|
|
|
if err != nil {
|
2021-07-11 13:26:51 +00:00
|
|
|
return util.NewValidationError("current password does not match")
|
2021-06-05 14:07:09 +00:00
|
|
|
}
|
|
|
|
user.Password = newPassword
|
|
|
|
|
|
|
|
return dataprovider.UpdateUser(&user)
|
|
|
|
}
|