user_handlers.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package api // import "miniflux.app/v2/internal/api"
  4. import (
  5. json_parser "encoding/json"
  6. "errors"
  7. "net/http"
  8. "miniflux.app/v2/internal/http/request"
  9. "miniflux.app/v2/internal/http/response"
  10. "miniflux.app/v2/internal/model"
  11. "miniflux.app/v2/internal/validator"
  12. )
  13. func (h *handler) currentUserHandler(w http.ResponseWriter, r *http.Request) {
  14. user, err := h.store.UserByID(request.UserID(r))
  15. if err != nil {
  16. response.JSONServerError(w, r, err)
  17. return
  18. }
  19. response.JSON(w, r, user)
  20. }
  21. func (h *handler) createUserHandler(w http.ResponseWriter, r *http.Request) {
  22. if !request.IsAdminUser(r) {
  23. response.JSONForbidden(w, r)
  24. return
  25. }
  26. var userCreationRequest model.UserCreationRequest
  27. if err := json_parser.NewDecoder(r.Body).Decode(&userCreationRequest); err != nil {
  28. response.JSONBadRequest(w, r, err)
  29. return
  30. }
  31. if validationErr := validator.ValidateUserCreationWithPassword(h.store, &userCreationRequest); validationErr != nil {
  32. response.JSONBadRequest(w, r, validationErr.Error())
  33. return
  34. }
  35. user, err := h.store.CreateUser(&userCreationRequest)
  36. if err != nil {
  37. response.JSONServerError(w, r, err)
  38. return
  39. }
  40. response.JSONCreated(w, r, user)
  41. }
  42. func (h *handler) updateUserHandler(w http.ResponseWriter, r *http.Request) {
  43. userID := request.RouteInt64Param(r, "userID")
  44. if userID == 0 {
  45. response.JSONBadRequest(w, r, errors.New("invalid user ID"))
  46. return
  47. }
  48. var userModificationRequest model.UserModificationRequest
  49. if err := json_parser.NewDecoder(r.Body).Decode(&userModificationRequest); err != nil {
  50. response.JSONBadRequest(w, r, err)
  51. return
  52. }
  53. originalUser, err := h.store.UserByID(userID)
  54. if err != nil {
  55. response.JSONServerError(w, r, err)
  56. return
  57. }
  58. if originalUser == nil {
  59. response.JSONNotFound(w, r)
  60. return
  61. }
  62. if !request.IsAdminUser(r) {
  63. if originalUser.ID != request.UserID(r) {
  64. response.JSONForbidden(w, r)
  65. return
  66. }
  67. if userModificationRequest.IsAdmin != nil && *userModificationRequest.IsAdmin {
  68. response.JSONBadRequest(w, r, errors.New("only administrators can change permissions of standard users"))
  69. return
  70. }
  71. }
  72. if validationErr := validator.ValidateUserModification(h.store, originalUser.ID, &userModificationRequest); validationErr != nil {
  73. response.JSONBadRequest(w, r, validationErr.Error())
  74. return
  75. }
  76. userModificationRequest.Patch(originalUser)
  77. if err = h.store.UpdateUser(originalUser); err != nil {
  78. response.JSONServerError(w, r, err)
  79. return
  80. }
  81. response.JSONCreated(w, r, originalUser)
  82. }
  83. func (h *handler) markUserAsReadHandler(w http.ResponseWriter, r *http.Request) {
  84. userID := request.RouteInt64Param(r, "userID")
  85. if userID == 0 {
  86. response.JSONBadRequest(w, r, errors.New("invalid user ID"))
  87. return
  88. }
  89. if userID != request.UserID(r) {
  90. response.JSONForbidden(w, r)
  91. return
  92. }
  93. if _, err := h.store.UserByID(userID); err != nil {
  94. response.JSONNotFound(w, r)
  95. return
  96. }
  97. if err := h.store.MarkAllAsRead(userID); err != nil {
  98. response.JSONServerError(w, r, err)
  99. return
  100. }
  101. response.NoContent(w, r)
  102. }
  103. func (h *handler) getIntegrationsStatusHandler(w http.ResponseWriter, r *http.Request) {
  104. userID := request.UserID(r)
  105. if _, err := h.store.UserByID(userID); err != nil {
  106. response.JSONNotFound(w, r)
  107. return
  108. }
  109. hasIntegrations := h.store.HasSaveEntry(userID)
  110. response.JSON(w, r, integrationsStatusResponse{HasIntegrations: hasIntegrations})
  111. }
  112. func (h *handler) usersHandler(w http.ResponseWriter, r *http.Request) {
  113. if !request.IsAdminUser(r) {
  114. response.JSONForbidden(w, r)
  115. return
  116. }
  117. users, err := h.store.Users()
  118. if err != nil {
  119. response.JSONServerError(w, r, err)
  120. return
  121. }
  122. users.UseTimezone(request.UserTimezone(r))
  123. response.JSON(w, r, users)
  124. }
  125. func (h *handler) dispatchUserLookupHandler(w http.ResponseWriter, r *http.Request) {
  126. identifier := request.RouteStringParam(r, "identifier")
  127. userID := request.RouteInt64Param(r, "identifier")
  128. if userID > 0 {
  129. r.SetPathValue("userID", identifier)
  130. h.userByIDHandler(w, r)
  131. return
  132. }
  133. r.SetPathValue("username", identifier)
  134. h.userByUsernameHandler(w, r)
  135. }
  136. func (h *handler) userByIDHandler(w http.ResponseWriter, r *http.Request) {
  137. if !request.IsAdminUser(r) {
  138. response.JSONForbidden(w, r)
  139. return
  140. }
  141. userID := request.RouteInt64Param(r, "userID")
  142. if userID == 0 {
  143. response.JSONBadRequest(w, r, errors.New("invalid user ID"))
  144. return
  145. }
  146. user, err := h.store.UserByID(userID)
  147. if err != nil {
  148. response.JSONBadRequest(w, r, errors.New("unable to fetch this user from the database"))
  149. return
  150. }
  151. if user == nil {
  152. response.JSONNotFound(w, r)
  153. return
  154. }
  155. user.UseTimezone(request.UserTimezone(r))
  156. response.JSON(w, r, user)
  157. }
  158. func (h *handler) userByUsernameHandler(w http.ResponseWriter, r *http.Request) {
  159. if !request.IsAdminUser(r) {
  160. response.JSONForbidden(w, r)
  161. return
  162. }
  163. username := request.RouteStringParam(r, "username")
  164. user, err := h.store.UserByUsername(username)
  165. if err != nil {
  166. response.JSONBadRequest(w, r, errors.New("unable to fetch this user from the database"))
  167. return
  168. }
  169. if user == nil {
  170. response.JSONNotFound(w, r)
  171. return
  172. }
  173. response.JSON(w, r, user)
  174. }
  175. func (h *handler) removeUserHandler(w http.ResponseWriter, r *http.Request) {
  176. if !request.IsAdminUser(r) {
  177. response.JSONForbidden(w, r)
  178. return
  179. }
  180. userID := request.RouteInt64Param(r, "userID")
  181. if userID == 0 {
  182. response.JSONBadRequest(w, r, errors.New("invalid user ID"))
  183. return
  184. }
  185. user, err := h.store.UserByID(userID)
  186. if err != nil {
  187. response.JSONServerError(w, r, err)
  188. return
  189. }
  190. if user == nil {
  191. response.JSONNotFound(w, r)
  192. return
  193. }
  194. if user.ID == request.UserID(r) {
  195. response.JSONBadRequest(w, r, errors.New("you cannot remove yourself"))
  196. return
  197. }
  198. h.store.RemoveUserAsync(user.ID)
  199. response.NoContent(w, r)
  200. }