user.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package api // import "miniflux.app/v2/internal/api"
  4. import (
  5. json_parser "encoding/json"
  6. "errors"
  7. "net/http"
  8. "miniflux.app/v2/internal/http/request"
  9. "miniflux.app/v2/internal/http/response/json"
  10. "miniflux.app/v2/internal/model"
  11. "miniflux.app/v2/internal/validator"
  12. )
  13. func (h *handler) currentUser(w http.ResponseWriter, r *http.Request) {
  14. user, err := h.store.UserByID(request.UserID(r))
  15. if err != nil {
  16. json.ServerError(w, r, err)
  17. return
  18. }
  19. json.OK(w, r, user)
  20. }
  21. func (h *handler) createUser(w http.ResponseWriter, r *http.Request) {
  22. if !request.IsAdminUser(r) {
  23. json.Forbidden(w, r)
  24. return
  25. }
  26. var userCreationRequest model.UserCreationRequest
  27. if err := json_parser.NewDecoder(r.Body).Decode(&userCreationRequest); err != nil {
  28. json.BadRequest(w, r, err)
  29. return
  30. }
  31. if validationErr := validator.ValidateUserCreationWithPassword(h.store, &userCreationRequest); validationErr != nil {
  32. json.BadRequest(w, r, validationErr.Error())
  33. return
  34. }
  35. user, err := h.store.CreateUser(&userCreationRequest)
  36. if err != nil {
  37. json.ServerError(w, r, err)
  38. return
  39. }
  40. json.Created(w, r, user)
  41. }
  42. func (h *handler) updateUser(w http.ResponseWriter, r *http.Request) {
  43. userID := request.RouteInt64Param(r, "userID")
  44. var userModificationRequest model.UserModificationRequest
  45. if err := json_parser.NewDecoder(r.Body).Decode(&userModificationRequest); err != nil {
  46. json.BadRequest(w, r, err)
  47. return
  48. }
  49. originalUser, err := h.store.UserByID(userID)
  50. if err != nil {
  51. json.ServerError(w, r, err)
  52. return
  53. }
  54. if originalUser == nil {
  55. json.NotFound(w, r)
  56. return
  57. }
  58. if !request.IsAdminUser(r) {
  59. if originalUser.ID != request.UserID(r) {
  60. json.Forbidden(w, r)
  61. return
  62. }
  63. if userModificationRequest.IsAdmin != nil && *userModificationRequest.IsAdmin {
  64. json.BadRequest(w, r, errors.New("only administrators can change permissions of standard users"))
  65. return
  66. }
  67. }
  68. if validationErr := validator.ValidateUserModification(h.store, originalUser.ID, &userModificationRequest); validationErr != nil {
  69. json.BadRequest(w, r, validationErr.Error())
  70. return
  71. }
  72. userModificationRequest.Patch(originalUser)
  73. if err = h.store.UpdateUser(originalUser); err != nil {
  74. json.ServerError(w, r, err)
  75. return
  76. }
  77. json.Created(w, r, originalUser)
  78. }
  79. func (h *handler) markUserAsRead(w http.ResponseWriter, r *http.Request) {
  80. userID := request.RouteInt64Param(r, "userID")
  81. if userID != request.UserID(r) {
  82. json.Forbidden(w, r)
  83. return
  84. }
  85. if _, err := h.store.UserByID(userID); err != nil {
  86. json.NotFound(w, r)
  87. return
  88. }
  89. if err := h.store.MarkAllAsRead(userID); err != nil {
  90. json.ServerError(w, r, err)
  91. return
  92. }
  93. json.NoContent(w, r)
  94. }
  95. func (h *handler) getIntegrationsStatus(w http.ResponseWriter, r *http.Request) {
  96. userID := request.UserID(r)
  97. if _, err := h.store.UserByID(userID); err != nil {
  98. json.NotFound(w, r)
  99. return
  100. }
  101. hasIntegrations := h.store.HasSaveEntry(userID)
  102. response := struct {
  103. HasIntegrations bool `json:"has_integrations"`
  104. }{
  105. HasIntegrations: hasIntegrations,
  106. }
  107. json.OK(w, r, response)
  108. }
  109. func (h *handler) users(w http.ResponseWriter, r *http.Request) {
  110. if !request.IsAdminUser(r) {
  111. json.Forbidden(w, r)
  112. return
  113. }
  114. users, err := h.store.Users()
  115. if err != nil {
  116. json.ServerError(w, r, err)
  117. return
  118. }
  119. users.UseTimezone(request.UserTimezone(r))
  120. json.OK(w, r, users)
  121. }
  122. func (h *handler) userByID(w http.ResponseWriter, r *http.Request) {
  123. if !request.IsAdminUser(r) {
  124. json.Forbidden(w, r)
  125. return
  126. }
  127. userID := request.RouteInt64Param(r, "userID")
  128. user, err := h.store.UserByID(userID)
  129. if err != nil {
  130. json.BadRequest(w, r, errors.New("unable to fetch this user from the database"))
  131. return
  132. }
  133. if user == nil {
  134. json.NotFound(w, r)
  135. return
  136. }
  137. user.UseTimezone(request.UserTimezone(r))
  138. json.OK(w, r, user)
  139. }
  140. func (h *handler) userByUsername(w http.ResponseWriter, r *http.Request) {
  141. if !request.IsAdminUser(r) {
  142. json.Forbidden(w, r)
  143. return
  144. }
  145. username := request.RouteStringParam(r, "username")
  146. user, err := h.store.UserByUsername(username)
  147. if err != nil {
  148. json.BadRequest(w, r, errors.New("unable to fetch this user from the database"))
  149. return
  150. }
  151. if user == nil {
  152. json.NotFound(w, r)
  153. return
  154. }
  155. json.OK(w, r, user)
  156. }
  157. func (h *handler) removeUser(w http.ResponseWriter, r *http.Request) {
  158. if !request.IsAdminUser(r) {
  159. json.Forbidden(w, r)
  160. return
  161. }
  162. userID := request.RouteInt64Param(r, "userID")
  163. user, err := h.store.UserByID(userID)
  164. if err != nil {
  165. json.ServerError(w, r, err)
  166. return
  167. }
  168. if user == nil {
  169. json.NotFound(w, r)
  170. return
  171. }
  172. if user.ID == request.UserID(r) {
  173. json.BadRequest(w, r, errors.New("you cannot remove yourself"))
  174. return
  175. }
  176. h.store.RemoveUserAsync(user.ID)
  177. json.NoContent(w, r)
  178. }