Semaphore/api/users.go

182 lines
4.1 KiB
Go
Raw Normal View History

2016-05-24 11:55:48 +02:00
package api
import (
"github.com/ansible-semaphore/semaphore/api/helpers"
"github.com/ansible-semaphore/semaphore/db"
log "github.com/sirupsen/logrus"
"net/http"
"github.com/ansible-semaphore/semaphore/util"
"github.com/gorilla/context"
)
2023-09-18 19:46:55 +02:00
type minimalUser struct {
ID int `json:"id"`
Username string `json:"username"`
Name string `json:"name"`
}
func getUsers(w http.ResponseWriter, r *http.Request) {
2023-09-18 19:46:55 +02:00
currentUser := context.Get(r, "user").(*db.User)
users, err := helpers.Store(r).GetUsers(db.RetrieveQueryParams{})
if err != nil {
panic(err)
}
2016-04-29 09:33:08 +02:00
2023-09-18 19:46:55 +02:00
if currentUser.Admin {
helpers.WriteJSON(w, http.StatusOK, users)
} else {
2023-09-18 22:04:23 +02:00
var result = make([]minimalUser, 0)
2023-09-18 19:46:55 +02:00
for _, user := range users {
result = append(result, minimalUser{
ID: user.ID,
Name: user.Name,
Username: user.Username,
})
}
helpers.WriteJSON(w, http.StatusOK, result)
}
}
func addUser(w http.ResponseWriter, r *http.Request) {
var user db.UserWithPwd
if !helpers.Bind(w, r, &user) {
return
}
editor := context.Get(r, "user").(*db.User)
if !editor.Admin {
log.Warn(editor.Username + " is not permitted to create users")
w.WriteHeader(http.StatusUnauthorized)
return
}
newUser, err := helpers.Store(r).CreateUser(user)
if err != nil {
2020-12-01 18:16:29 +01:00
log.Warn(editor.Username + " is not created: " + err.Error())
w.WriteHeader(http.StatusBadRequest)
return
}
helpers.WriteJSON(w, http.StatusCreated, newUser)
}
func getUserMiddleware(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
userID, err := helpers.GetIntParam("user_id", w, r)
if err != nil {
return
}
user, err := helpers.Store(r).GetUser(userID)
if err != nil {
2020-12-17 15:00:05 +01:00
helpers.WriteError(w, err)
return
}
editor := context.Get(r, "user").(*db.User)
if !editor.Admin && editor.ID != user.ID {
log.Warn(editor.Username + " is not permitted to edit users")
w.WriteHeader(http.StatusUnauthorized)
return
}
context.Set(r, "_user", user)
next.ServeHTTP(w, r)
})
}
func updateUser(w http.ResponseWriter, r *http.Request) {
2023-09-17 16:15:44 +02:00
targetUser := context.Get(r, "_user").(db.User)
editor := context.Get(r, "user").(*db.User)
var user db.UserWithPwd
if !helpers.Bind(w, r, &user) {
return
}
2023-09-17 16:15:44 +02:00
if !editor.Admin && editor.ID != targetUser.ID {
log.Warn(editor.Username + " is not permitted to edit users")
w.WriteHeader(http.StatusUnauthorized)
return
}
2023-09-17 16:15:44 +02:00
if editor.ID == targetUser.ID && targetUser.Admin != user.Admin {
log.Warn("User can't edit his own role")
w.WriteHeader(http.StatusUnauthorized)
return
}
2023-09-17 16:15:44 +02:00
if targetUser.External && targetUser.Username != user.Username {
2023-04-16 23:57:56 +02:00
log.Warn("Username is not editable for external users")
w.WriteHeader(http.StatusBadRequest)
return
}
2023-09-17 16:15:44 +02:00
user.ID = targetUser.ID
if err := helpers.Store(r).UpdateUser(user); err != nil {
2020-10-02 22:10:41 +02:00
log.Error(err.Error())
w.WriteHeader(http.StatusBadRequest)
return
}
w.WriteHeader(http.StatusNoContent)
}
func updateUserPassword(w http.ResponseWriter, r *http.Request) {
user := context.Get(r, "_user").(db.User)
editor := context.Get(r, "user").(*db.User)
var pwd struct {
Pwd string `json:"password"`
}
if !editor.Admin && editor.ID != user.ID {
log.Warn(editor.Username + " is not permitted to edit users")
w.WriteHeader(http.StatusUnauthorized)
return
}
if user.External {
2023-04-16 23:57:56 +02:00
log.Warn("Password is not editable for external users")
w.WriteHeader(http.StatusBadRequest)
return
}
if !helpers.Bind(w, r, &pwd) {
return
}
if err := helpers.Store(r).SetUserPassword(user.ID, pwd.Pwd); err != nil {
util.LogWarning(err)
w.WriteHeader(http.StatusInternalServerError)
return
}
w.WriteHeader(http.StatusNoContent)
}
func deleteUser(w http.ResponseWriter, r *http.Request) {
user := context.Get(r, "_user").(db.User)
editor := context.Get(r, "user").(*db.User)
if !editor.Admin && editor.ID != user.ID {
log.Warn(editor.Username + " is not permitted to delete users")
w.WriteHeader(http.StatusUnauthorized)
return
}
if err := helpers.Store(r).DeleteUser(user.ID); err != nil {
w.WriteHeader(http.StatusInternalServerError)
}
w.WriteHeader(http.StatusNoContent)
}