2023-09-15 13:06:31 +01:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"github.com/1f349/tulip/database"
|
|
|
|
"github.com/1f349/tulip/pages"
|
2023-09-24 18:24:16 +01:00
|
|
|
"github.com/emersion/go-message/mail"
|
2023-09-15 13:06:31 +01:00
|
|
|
"github.com/google/uuid"
|
|
|
|
"github.com/julienschmidt/httprouter"
|
2023-09-24 18:24:16 +01:00
|
|
|
"log"
|
2023-09-15 13:06:31 +01:00
|
|
|
"net/http"
|
|
|
|
"net/url"
|
|
|
|
"strconv"
|
2023-10-10 18:06:43 +01:00
|
|
|
"strings"
|
2023-09-24 18:24:16 +01:00
|
|
|
"time"
|
2023-09-15 13:06:31 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
func (h *HttpServer) ManageUsersGet(rw http.ResponseWriter, req *http.Request, _ httprouter.Params, auth UserAuth) {
|
|
|
|
offset := 0
|
|
|
|
q := req.URL.Query()
|
|
|
|
if q.Has("offset") {
|
|
|
|
var err error
|
|
|
|
offset, err = strconv.Atoi(q.Get("offset"))
|
|
|
|
if err != nil {
|
|
|
|
http.Error(rw, "400 Bad Request: Invalid offset", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var role database.UserRole
|
|
|
|
var userList []database.User
|
|
|
|
if h.DbTx(rw, func(tx *database.Tx) (err error) {
|
2024-02-09 15:24:40 +00:00
|
|
|
role, err = tx.GetUserRole(auth.ID)
|
2023-09-15 13:06:31 +01:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
userList, err = tx.GetUserList(offset)
|
|
|
|
return
|
|
|
|
}) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if role != database.RoleAdmin {
|
|
|
|
http.Error(rw, "403 Forbidden", http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
m := map[string]any{
|
2023-10-10 18:06:43 +01:00
|
|
|
"ServiceName": h.conf.ServiceName,
|
2023-09-15 13:06:31 +01:00
|
|
|
"Users": userList,
|
|
|
|
"Offset": offset,
|
|
|
|
"EmailShow": req.URL.Query().Has("show-email"),
|
2024-02-09 15:24:40 +00:00
|
|
|
"CurrentAdmin": auth.ID,
|
2023-10-10 18:06:43 +01:00
|
|
|
"Namespace": h.conf.Namespace,
|
2023-09-15 13:06:31 +01:00
|
|
|
}
|
|
|
|
if q.Has("edit") {
|
|
|
|
for _, i := range userList {
|
2024-02-09 15:24:40 +00:00
|
|
|
if i.Sub == q.Get("edit") {
|
2023-09-15 13:06:31 +01:00
|
|
|
m["Edit"] = i
|
|
|
|
goto validEdit
|
|
|
|
}
|
|
|
|
}
|
|
|
|
http.Error(rw, "400 Bad Request: Invalid user to edit", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
validEdit:
|
|
|
|
rw.Header().Set("Content-Type", "text/html")
|
|
|
|
rw.WriteHeader(http.StatusOK)
|
|
|
|
pages.RenderPageTemplate(rw, "manage-users", m)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *HttpServer) ManageUsersPost(rw http.ResponseWriter, req *http.Request, _ httprouter.Params, auth UserAuth) {
|
|
|
|
err := req.ParseForm()
|
|
|
|
if err != nil {
|
|
|
|
http.Error(rw, "400 Bad Request: Failed to parse form", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var role database.UserRole
|
|
|
|
if h.DbTx(rw, func(tx *database.Tx) (err error) {
|
2024-02-09 15:24:40 +00:00
|
|
|
role, err = tx.GetUserRole(auth.ID)
|
2023-09-15 13:06:31 +01:00
|
|
|
return
|
|
|
|
}) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if role != database.RoleAdmin {
|
2023-10-15 13:49:58 +01:00
|
|
|
http.Error(rw, "400 Bad Request: Only admin users can manage users", http.StatusBadRequest)
|
2023-09-15 13:06:31 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
offset := req.Form.Get("offset")
|
|
|
|
action := req.Form.Get("action")
|
|
|
|
name := req.Form.Get("name")
|
|
|
|
username := req.Form.Get("username")
|
|
|
|
email := req.Form.Get("email")
|
|
|
|
newRole, err := parseRoleValue(req.Form.Get("role"))
|
|
|
|
if err != nil {
|
|
|
|
http.Error(rw, "400 Bad Request: Invalid role", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
active := req.Form.Has("active")
|
|
|
|
|
|
|
|
switch action {
|
|
|
|
case "create":
|
2023-09-24 18:24:16 +01:00
|
|
|
// parse email for headers
|
|
|
|
address, err := mail.ParseAddress(email)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(rw, "500 Internal Server Error: Failed to parse user email address", http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
2023-10-10 18:06:43 +01:00
|
|
|
n := strings.IndexByte(address.Address, '@')
|
|
|
|
// This case should never happen and fail the above address parsing
|
|
|
|
if n == -1 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
addrDomain := address.Address[n+1:]
|
|
|
|
|
|
|
|
var userSub uuid.UUID
|
|
|
|
if h.DbTx(rw, func(tx *database.Tx) (err error) {
|
|
|
|
userSub, err = tx.InsertUser(name, username, "", email, addrDomain == h.conf.Namespace, newRole, active)
|
|
|
|
return err
|
|
|
|
}) {
|
|
|
|
return
|
|
|
|
}
|
2023-09-24 18:24:16 +01:00
|
|
|
|
2024-02-09 15:24:40 +00:00
|
|
|
u, u2 := uuid.NewString(), uuid.NewString()
|
|
|
|
h.mailLinkCache.Set(mailLinkKey{mailLinkResetPassword, u}, userSub.String(), time.Now().Add(10*time.Minute))
|
|
|
|
h.mailLinkCache.Set(mailLinkKey{mailLinkDelete, u2}, userSub.String(), time.Now().Add(10*time.Minute))
|
2023-09-24 18:24:16 +01:00
|
|
|
|
2023-10-10 18:06:43 +01:00
|
|
|
err = h.conf.Mail.SendEmailTemplate("mail-register-admin", "Register", name, address, map[string]any{
|
2024-02-09 15:24:40 +00:00
|
|
|
"RegisterUrl": h.conf.BaseUrl + "/mail/password/" + u,
|
2023-09-24 18:24:16 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
log.Println("[Tulip] Login: Failed to send register email:", err)
|
|
|
|
http.Error(rw, "500 Internal Server Error: Failed to send register email", http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
2023-09-15 13:06:31 +01:00
|
|
|
case "edit":
|
|
|
|
if h.DbTx(rw, func(tx *database.Tx) error {
|
2024-02-09 15:24:40 +00:00
|
|
|
sub := req.Form.Get("subject")
|
2023-09-15 13:06:31 +01:00
|
|
|
return tx.UpdateUser(sub, newRole, active)
|
|
|
|
}) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
http.Error(rw, "400 Bad Request: Invalid action", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
redirectUrl := url.URL{Path: "/manage/users", RawQuery: url.Values{"offset": []string{offset}}.Encode()}
|
|
|
|
http.Redirect(rw, req, redirectUrl.String(), http.StatusFound)
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseRoleValue(role string) (database.UserRole, error) {
|
|
|
|
switch role {
|
|
|
|
case "member":
|
|
|
|
return database.RoleMember, nil
|
|
|
|
case "admin":
|
|
|
|
return database.RoleAdmin, nil
|
|
|
|
}
|
|
|
|
return 0, errors.New("invalid role value")
|
|
|
|
}
|