user.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package api // import "miniflux.app/v2/internal/api"
  4. import (
  5. json_parser "encoding/json"
  6. "errors"
  7. "net/http"
  8. "miniflux.app/v2/internal/http/request"
  9. "miniflux.app/v2/internal/http/response/json"
  10. "miniflux.app/v2/internal/model"
  11. "miniflux.app/v2/internal/validator"
  12. )
  13. func (h *handler) currentUser(w http.ResponseWriter, r *http.Request) {
  14. user, err := h.store.UserByID(request.UserID(r))
  15. if err != nil {
  16. json.ServerError(w, r, err)
  17. return
  18. }
  19. json.OK(w, r, user)
  20. }
  21. func (h *handler) createUser(w http.ResponseWriter, r *http.Request) {
  22. if !request.IsAdminUser(r) {
  23. json.Forbidden(w, r)
  24. return
  25. }
  26. var userCreationRequest model.UserCreationRequest
  27. if err := json_parser.NewDecoder(r.Body).Decode(&userCreationRequest); err != nil {
  28. json.BadRequest(w, r, err)
  29. return
  30. }
  31. if validationErr := validator.ValidateUserCreationWithPassword(h.store, &userCreationRequest); validationErr != nil {
  32. json.BadRequest(w, r, validationErr.Error())
  33. return
  34. }
  35. user, err := h.store.CreateUser(&userCreationRequest)
  36. if err != nil {
  37. json.ServerError(w, r, err)
  38. return
  39. }
  40. json.Created(w, r, user)
  41. }
  42. func (h *handler) updateUser(w http.ResponseWriter, r *http.Request) {
  43. userID := request.RouteInt64Param(r, "userID")
  44. var userModificationRequest model.UserModificationRequest
  45. if err := json_parser.NewDecoder(r.Body).Decode(&userModificationRequest); err != nil {
  46. json.BadRequest(w, r, err)
  47. return
  48. }
  49. originalUser, err := h.store.UserByID(userID)
  50. if err != nil {
  51. json.ServerError(w, r, err)
  52. return
  53. }
  54. if originalUser == nil {
  55. json.NotFound(w, r)
  56. return
  57. }
  58. if !request.IsAdminUser(r) {
  59. if originalUser.ID != request.UserID(r) {
  60. json.Forbidden(w, r)
  61. return
  62. }
  63. if userModificationRequest.IsAdmin != nil && *userModificationRequest.IsAdmin {
  64. json.BadRequest(w, r, errors.New("Only administrators can change permissions of standard users"))
  65. return
  66. }
  67. }
  68. if validationErr := validator.ValidateUserModification(h.store, originalUser.ID, &userModificationRequest); validationErr != nil {
  69. json.BadRequest(w, r, validationErr.Error())
  70. return
  71. }
  72. userModificationRequest.Patch(originalUser)
  73. if err = h.store.UpdateUser(originalUser); err != nil {
  74. json.ServerError(w, r, err)
  75. return
  76. }
  77. json.Created(w, r, originalUser)
  78. }
  79. func (h *handler) markUserAsRead(w http.ResponseWriter, r *http.Request) {
  80. userID := request.RouteInt64Param(r, "userID")
  81. if userID != request.UserID(r) {
  82. json.Forbidden(w, r)
  83. return
  84. }
  85. if _, err := h.store.UserByID(userID); err != nil {
  86. json.NotFound(w, r)
  87. return
  88. }
  89. if err := h.store.MarkAllAsRead(userID); err != nil {
  90. json.ServerError(w, r, err)
  91. return
  92. }
  93. json.NoContent(w, r)
  94. }
  95. func (h *handler) users(w http.ResponseWriter, r *http.Request) {
  96. if !request.IsAdminUser(r) {
  97. json.Forbidden(w, r)
  98. return
  99. }
  100. users, err := h.store.Users()
  101. if err != nil {
  102. json.ServerError(w, r, err)
  103. return
  104. }
  105. users.UseTimezone(request.UserTimezone(r))
  106. json.OK(w, r, users)
  107. }
  108. func (h *handler) userByID(w http.ResponseWriter, r *http.Request) {
  109. if !request.IsAdminUser(r) {
  110. json.Forbidden(w, r)
  111. return
  112. }
  113. userID := request.RouteInt64Param(r, "userID")
  114. user, err := h.store.UserByID(userID)
  115. if err != nil {
  116. json.BadRequest(w, r, errors.New("Unable to fetch this user from the database"))
  117. return
  118. }
  119. if user == nil {
  120. json.NotFound(w, r)
  121. return
  122. }
  123. user.UseTimezone(request.UserTimezone(r))
  124. json.OK(w, r, user)
  125. }
  126. func (h *handler) userByUsername(w http.ResponseWriter, r *http.Request) {
  127. if !request.IsAdminUser(r) {
  128. json.Forbidden(w, r)
  129. return
  130. }
  131. username := request.RouteStringParam(r, "username")
  132. user, err := h.store.UserByUsername(username)
  133. if err != nil {
  134. json.BadRequest(w, r, errors.New("Unable to fetch this user from the database"))
  135. return
  136. }
  137. if user == nil {
  138. json.NotFound(w, r)
  139. return
  140. }
  141. json.OK(w, r, user)
  142. }
  143. func (h *handler) removeUser(w http.ResponseWriter, r *http.Request) {
  144. if !request.IsAdminUser(r) {
  145. json.Forbidden(w, r)
  146. return
  147. }
  148. userID := request.RouteInt64Param(r, "userID")
  149. user, err := h.store.UserByID(userID)
  150. if err != nil {
  151. json.ServerError(w, r, err)
  152. return
  153. }
  154. if user == nil {
  155. json.NotFound(w, r)
  156. return
  157. }
  158. if user.ID == request.UserID(r) {
  159. json.BadRequest(w, r, errors.New("You cannot remove yourself"))
  160. return
  161. }
  162. h.store.RemoveUserAsync(user.ID)
  163. json.NoContent(w, r)
  164. }