177 lines
5.7 KiB
Go
177 lines
5.7 KiB
Go
package server
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/http"
|
|
"strings"
|
|
"unicode"
|
|
)
|
|
|
|
// Admin user management
|
|
// GET /api/v1/admin/users?tenant=1
|
|
// POST /api/v1/admin/users {tenant, role, email, password}
|
|
// POST /api/v1/admin/users/{id}?status=0|1
|
|
// POST /api/v1/admin/users/{id}/password {password}
|
|
func IsValidGlobalUsername(v string) bool {
|
|
if len(v) < 6 {
|
|
return false
|
|
}
|
|
for _, r := range v {
|
|
if r > unicode.MaxASCII || !unicode.IsLetter(r) {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
func (s *Server) HandleAdminUsers(w http.ResponseWriter, r *http.Request) {
|
|
if s.store == nil {
|
|
writeJSON(w, http.StatusInternalServerError, `{"error":1,"message":"store not ready"}`)
|
|
return
|
|
}
|
|
// list
|
|
if r.Method == http.MethodGet {
|
|
tenantID := int64(0)
|
|
_ = r.ParseForm()
|
|
fmt.Sscanf(r.Form.Get("tenant"), "%d", &tenantID)
|
|
if tenantID <= 0 {
|
|
writeJSON(w, http.StatusBadRequest, `{"error":1,"message":"tenant required"}`)
|
|
return
|
|
}
|
|
users, err := s.store.ListUsers(tenantID)
|
|
if err != nil {
|
|
writeJSON(w, http.StatusInternalServerError, `{"error":1,"message":"list users failed"}`)
|
|
return
|
|
}
|
|
// strip password hash
|
|
out := make([]map[string]any, 0, len(users))
|
|
for _, u := range users {
|
|
out = append(out, map[string]any{
|
|
"id": u.ID,
|
|
"tenant_id": u.TenantID,
|
|
"role": u.Role,
|
|
"email": u.Email,
|
|
"status": u.Status,
|
|
"created_at": u.CreatedAt,
|
|
})
|
|
}
|
|
resp := struct {
|
|
Error int `json:"error"`
|
|
Message string `json:"message"`
|
|
Users interface{} `json:"users"`
|
|
}{0, "ok", out}
|
|
b, _ := json.Marshal(resp)
|
|
writeJSON(w, http.StatusOK, string(b))
|
|
return
|
|
}
|
|
|
|
// update status or password
|
|
if r.Method == http.MethodPost && strings.Contains(r.URL.Path, "/admin/users/") {
|
|
parts := strings.Split(strings.Trim(r.URL.Path, "/"), "/")
|
|
var id int64
|
|
// /api/v1/admin/users/{id}/password
|
|
if strings.HasSuffix(r.URL.Path, "/password") && len(parts) >= 5 {
|
|
_, _ = fmt.Sscanf(parts[len(parts)-2], "%d", &id)
|
|
} else if strings.HasSuffix(r.URL.Path, "/delete") && len(parts) >= 5 {
|
|
_, _ = fmt.Sscanf(parts[len(parts)-2], "%d", &id)
|
|
} else {
|
|
_, _ = fmt.Sscanf(parts[len(parts)-1], "%d", &id)
|
|
}
|
|
if id <= 0 {
|
|
writeJSON(w, http.StatusBadRequest, `{"error":1,"message":"bad request"}`)
|
|
return
|
|
}
|
|
// /password
|
|
if strings.HasSuffix(r.URL.Path, "/password") {
|
|
var req struct {
|
|
Password string `json:"password"`
|
|
}
|
|
_ = json.NewDecoder(r.Body).Decode(&req)
|
|
if req.Password == "" || len(req.Password) < 6 {
|
|
writeJSON(w, http.StatusBadRequest, `{"error":1,"message":"password too short"}`)
|
|
return
|
|
}
|
|
if err := s.store.UpdateUserPassword(id, req.Password); err != nil {
|
|
writeJSON(w, http.StatusInternalServerError, `{"error":1,"message":"update password failed"}`)
|
|
return
|
|
}
|
|
if ac := GetAccessContext(r); ac != nil {
|
|
_ = s.store.AddAuditLog(ac.Kind, fmt.Sprintf("%d", ac.UserID), "user_password", "user", fmt.Sprintf("%d", id), "", r.RemoteAddr)
|
|
}
|
|
writeJSON(w, http.StatusOK, `{"error":0,"message":"ok"}`)
|
|
return
|
|
}
|
|
// delete
|
|
if strings.HasSuffix(r.URL.Path, "/delete") {
|
|
if err := s.store.UpdateUserStatus(id, 0); err != nil {
|
|
writeJSON(w, http.StatusInternalServerError, `{"error":1,"message":"delete failed"}`)
|
|
return
|
|
}
|
|
if ac := GetAccessContext(r); ac != nil {
|
|
_ = s.store.AddAuditLog(ac.Kind, fmt.Sprintf("%d", ac.UserID), "user_delete", "user", fmt.Sprintf("%d", id), "", r.RemoteAddr)
|
|
}
|
|
writeJSON(w, http.StatusOK, `{"error":0,"message":"ok"}`)
|
|
return
|
|
}
|
|
// status
|
|
st := r.URL.Query().Get("status")
|
|
if st == "" {
|
|
writeJSON(w, http.StatusBadRequest, `{"error":1,"message":"status required"}`)
|
|
return
|
|
}
|
|
status := 0
|
|
if st == "1" {
|
|
status = 1
|
|
}
|
|
if err := s.store.UpdateUserStatus(id, status); err != nil {
|
|
writeJSON(w, http.StatusInternalServerError, `{"error":1,"message":"update status failed"}`)
|
|
return
|
|
}
|
|
if ac := GetAccessContext(r); ac != nil {
|
|
_ = s.store.AddAuditLog(ac.Kind, fmt.Sprintf("%d", ac.UserID), "user_status", "user", fmt.Sprintf("%d", id), fmt.Sprintf("status=%d", status), r.RemoteAddr)
|
|
}
|
|
writeJSON(w, http.StatusOK, `{"error":0,"message":"ok"}`)
|
|
return
|
|
}
|
|
|
|
// create
|
|
if r.Method != http.MethodPost {
|
|
writeJSON(w, http.StatusMethodNotAllowed, `{"error":1,"message":"method not allowed"}`)
|
|
return
|
|
}
|
|
var req struct {
|
|
TenantID int64 `json:"tenant"`
|
|
Role string `json:"role"`
|
|
Email string `json:"email"`
|
|
Password string `json:"password"`
|
|
}
|
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil || req.TenantID <= 0 || req.Role == "" || req.Email == "" || req.Password == "" {
|
|
writeJSON(w, http.StatusBadRequest, `{"error":1,"message":"bad request"}`)
|
|
return
|
|
}
|
|
if len(req.Password) < 6 {
|
|
writeJSON(w, http.StatusBadRequest, `{"error":1,"message":"password too short"}`)
|
|
return
|
|
}
|
|
if !IsValidGlobalUsername(req.Email) {
|
|
writeJSON(w, http.StatusBadRequest, `{"error":1,"message":"username must be letters only and >=6"}`)
|
|
return
|
|
}
|
|
if exists, err := s.store.UserEmailExistsGlobal(req.Email); err != nil {
|
|
writeJSON(w, http.StatusInternalServerError, `{"error":1,"message":"check user failed"}`)
|
|
return
|
|
} else if exists {
|
|
writeJSON(w, http.StatusBadRequest, `{"error":1,"message":"username exists"}`)
|
|
return
|
|
}
|
|
if _, err := s.store.CreateUser(req.TenantID, req.Role, req.Email, req.Password, 1); err != nil {
|
|
writeJSON(w, http.StatusInternalServerError, `{"error":1,"message":"create user failed"}`)
|
|
return
|
|
}
|
|
if ac := GetAccessContext(r); ac != nil {
|
|
_ = s.store.AddAuditLog(ac.Kind, fmt.Sprintf("%d", ac.UserID), "user_create", "tenant", fmt.Sprintf("%d", req.TenantID), req.Email, r.RemoteAddr)
|
|
}
|
|
writeJSON(w, http.StatusOK, `{"error":0,"message":"ok"}`)
|
|
}
|