| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216 |
- // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
- // SPDX-License-Identifier: Apache-2.0
- package api // import "miniflux.app/v2/internal/api"
- import (
- json_parser "encoding/json"
- "errors"
- "net/http"
- "miniflux.app/v2/internal/http/request"
- "miniflux.app/v2/internal/http/response/json"
- "miniflux.app/v2/internal/model"
- "miniflux.app/v2/internal/validator"
- )
- func (h *handler) currentUser(w http.ResponseWriter, r *http.Request) {
- user, err := h.store.UserByID(request.UserID(r))
- if err != nil {
- json.ServerError(w, r, err)
- return
- }
- json.OK(w, r, user)
- }
- func (h *handler) createUser(w http.ResponseWriter, r *http.Request) {
- if !request.IsAdminUser(r) {
- json.Forbidden(w, r)
- return
- }
- var userCreationRequest model.UserCreationRequest
- if err := json_parser.NewDecoder(r.Body).Decode(&userCreationRequest); err != nil {
- json.BadRequest(w, r, err)
- return
- }
- if validationErr := validator.ValidateUserCreationWithPassword(h.store, &userCreationRequest); validationErr != nil {
- json.BadRequest(w, r, validationErr.Error())
- return
- }
- user, err := h.store.CreateUser(&userCreationRequest)
- if err != nil {
- json.ServerError(w, r, err)
- return
- }
- json.Created(w, r, user)
- }
- func (h *handler) updateUser(w http.ResponseWriter, r *http.Request) {
- userID := request.RouteInt64Param(r, "userID")
- var userModificationRequest model.UserModificationRequest
- if err := json_parser.NewDecoder(r.Body).Decode(&userModificationRequest); err != nil {
- json.BadRequest(w, r, err)
- return
- }
- originalUser, err := h.store.UserByID(userID)
- if err != nil {
- json.ServerError(w, r, err)
- return
- }
- if originalUser == nil {
- json.NotFound(w, r)
- return
- }
- if !request.IsAdminUser(r) {
- if originalUser.ID != request.UserID(r) {
- json.Forbidden(w, r)
- return
- }
- if userModificationRequest.IsAdmin != nil && *userModificationRequest.IsAdmin {
- json.BadRequest(w, r, errors.New("only administrators can change permissions of standard users"))
- return
- }
- }
- if validationErr := validator.ValidateUserModification(h.store, originalUser.ID, &userModificationRequest); validationErr != nil {
- json.BadRequest(w, r, validationErr.Error())
- return
- }
- userModificationRequest.Patch(originalUser)
- if err = h.store.UpdateUser(originalUser); err != nil {
- json.ServerError(w, r, err)
- return
- }
- json.Created(w, r, originalUser)
- }
- func (h *handler) markUserAsRead(w http.ResponseWriter, r *http.Request) {
- userID := request.RouteInt64Param(r, "userID")
- if userID != request.UserID(r) {
- json.Forbidden(w, r)
- return
- }
- if _, err := h.store.UserByID(userID); err != nil {
- json.NotFound(w, r)
- return
- }
- if err := h.store.MarkAllAsRead(userID); err != nil {
- json.ServerError(w, r, err)
- return
- }
- json.NoContent(w, r)
- }
- func (h *handler) getIntegrationsStatus(w http.ResponseWriter, r *http.Request) {
- userID := request.UserID(r)
- if _, err := h.store.UserByID(userID); err != nil {
- json.NotFound(w, r)
- return
- }
- hasIntegrations := h.store.HasSaveEntry(userID)
- json.OK(w, r, integrationsStatusResponse{HasIntegrations: hasIntegrations})
- }
- func (h *handler) users(w http.ResponseWriter, r *http.Request) {
- if !request.IsAdminUser(r) {
- json.Forbidden(w, r)
- return
- }
- users, err := h.store.Users()
- if err != nil {
- json.ServerError(w, r, err)
- return
- }
- users.UseTimezone(request.UserTimezone(r))
- json.OK(w, r, users)
- }
- func (h *handler) userByID(w http.ResponseWriter, r *http.Request) {
- if !request.IsAdminUser(r) {
- json.Forbidden(w, r)
- return
- }
- userID := request.RouteInt64Param(r, "userID")
- user, err := h.store.UserByID(userID)
- if err != nil {
- json.BadRequest(w, r, errors.New("unable to fetch this user from the database"))
- return
- }
- if user == nil {
- json.NotFound(w, r)
- return
- }
- user.UseTimezone(request.UserTimezone(r))
- json.OK(w, r, user)
- }
- func (h *handler) userByUsername(w http.ResponseWriter, r *http.Request) {
- if !request.IsAdminUser(r) {
- json.Forbidden(w, r)
- return
- }
- username := request.RouteStringParam(r, "username")
- user, err := h.store.UserByUsername(username)
- if err != nil {
- json.BadRequest(w, r, errors.New("unable to fetch this user from the database"))
- return
- }
- if user == nil {
- json.NotFound(w, r)
- return
- }
- json.OK(w, r, user)
- }
- func (h *handler) removeUser(w http.ResponseWriter, r *http.Request) {
- if !request.IsAdminUser(r) {
- json.Forbidden(w, r)
- return
- }
- userID := request.RouteInt64Param(r, "userID")
- user, err := h.store.UserByID(userID)
- if err != nil {
- json.ServerError(w, r, err)
- return
- }
- if user == nil {
- json.NotFound(w, r)
- return
- }
- if user.ID == request.UserID(r) {
- json.BadRequest(w, r, errors.New("you cannot remove yourself"))
- return
- }
- h.store.RemoveUserAsync(user.ID)
- json.NoContent(w, r)
- }
|