mirror of
https://github.com/knadh/listmonk.git
synced 2025-09-14 02:17:25 +08:00
293 lines
7.9 KiB
Go
293 lines
7.9 KiB
Go
package main
|
|
|
|
import (
|
|
"net/http"
|
|
"regexp"
|
|
"strings"
|
|
|
|
"github.com/knadh/listmonk/internal/auth"
|
|
"github.com/knadh/listmonk/internal/core"
|
|
"github.com/knadh/listmonk/internal/utils"
|
|
"github.com/labstack/echo/v4"
|
|
"gopkg.in/volatiletech/null.v6"
|
|
)
|
|
|
|
var (
|
|
reUsername = regexp.MustCompile(`^[a-zA-Z0-9_\-\.@]+$`)
|
|
)
|
|
|
|
// GetUser retrieves a single user by ID.
|
|
func (a *App) GetUser(c echo.Context) error {
|
|
// Get the user from the DB.
|
|
id := getID(c)
|
|
out, err := a.core.GetUser(id, "", "")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Blank out the password hash in the response.
|
|
out.Password = null.String{}
|
|
|
|
return c.JSON(http.StatusOK, okResp{out})
|
|
}
|
|
|
|
// GetUsers retrieves all users.
|
|
func (a *App) GetUsers(c echo.Context) error {
|
|
// Get all users from the DB.
|
|
out, err := a.core.GetUsers()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Blank out the password hash in the response.
|
|
for n := range out {
|
|
out[n].Password = null.String{}
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, okResp{out})
|
|
}
|
|
|
|
// CreateUser handles user creation.
|
|
func (a *App) CreateUser(c echo.Context) error {
|
|
var u auth.User
|
|
if err := c.Bind(&u); err != nil {
|
|
return err
|
|
}
|
|
|
|
u.Username = strings.TrimSpace(u.Username)
|
|
u.Name = strings.TrimSpace(u.Name)
|
|
email := strings.ToLower(strings.TrimSpace(u.Email.String))
|
|
|
|
// Validate fields.
|
|
if !strHasLen(u.Username, 3, stdInputMaxLen) {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.Ts("globals.messages.invalidFields", "name", "username"))
|
|
}
|
|
if !reUsername.MatchString(u.Username) {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.Ts("globals.messages.invalidFields", "name", "username"))
|
|
}
|
|
if u.Type != auth.UserTypeAPI {
|
|
if !utils.ValidateEmail(email) {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.Ts("globals.messages.invalidFields", "name", "email"))
|
|
}
|
|
if u.PasswordLogin {
|
|
if !strHasLen(u.Password.String, 8, stdInputMaxLen) {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.Ts("globals.messages.invalidFields", "name", "password"))
|
|
}
|
|
}
|
|
|
|
u.Email = null.String{String: email, Valid: true}
|
|
}
|
|
|
|
if u.Name == "" {
|
|
u.Name = u.Username
|
|
}
|
|
|
|
// Create the user in the DB.
|
|
user, err := a.core.CreateUser(u)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Blank out the password hash in the response.
|
|
if user.Type != auth.UserTypeAPI {
|
|
user.Password = null.String{}
|
|
}
|
|
|
|
// Cache the API token for in-memory, off-DB /api/* request auth.
|
|
if _, err := cacheUsers(a.core, a.auth); err != nil {
|
|
return err
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, okResp{user})
|
|
}
|
|
|
|
// UpdateUser handles user modification.
|
|
func (a *App) UpdateUser(c echo.Context) error {
|
|
// Incoming params.
|
|
var u auth.User
|
|
if err := c.Bind(&u); err != nil {
|
|
return err
|
|
}
|
|
|
|
u.Username = strings.TrimSpace(u.Username)
|
|
u.Name = strings.TrimSpace(u.Name)
|
|
email := strings.ToLower(strings.TrimSpace(u.Email.String))
|
|
|
|
// Validate fields.
|
|
if !strHasLen(u.Username, 3, stdInputMaxLen) {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.Ts("globals.messages.invalidFields", "name", "username"))
|
|
}
|
|
if !reUsername.MatchString(u.Username) {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.Ts("globals.messages.invalidFields", "name", "username"))
|
|
}
|
|
|
|
// Get the user ID.
|
|
id := getID(c)
|
|
if u.Type != auth.UserTypeAPI {
|
|
if !utils.ValidateEmail(email) {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.Ts("globals.messages.invalidFields", "name", "email"))
|
|
}
|
|
|
|
// Validate password if password login is enabled.
|
|
if u.PasswordLogin && u.Password.String != "" {
|
|
if !strHasLen(u.Password.String, 8, stdInputMaxLen) {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.Ts("globals.messages.invalidFields", "name", "password"))
|
|
}
|
|
|
|
if u.Password.String != "" {
|
|
// If a password is sent, validate it before updating in the DB. If it's not set, leave the password in the DB untouched.
|
|
if !strHasLen(u.Password.String, 8, stdInputMaxLen) {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.Ts("globals.messages.invalidFields", "name", "password"))
|
|
}
|
|
} else {
|
|
// Get the user from the DB.
|
|
user, err := a.core.GetUser(id, "", "")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// If password login is enabled, but there's no password in the DB and there's no incoming
|
|
// password, throw an error.
|
|
if !user.HasPassword {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.Ts("globals.messages.invalidFields", "name", "password"))
|
|
}
|
|
}
|
|
}
|
|
|
|
u.Email = null.String{String: email, Valid: true}
|
|
}
|
|
|
|
// Default the name to username if not set.
|
|
if u.Name == "" {
|
|
u.Name = u.Username
|
|
}
|
|
|
|
// Update the user in the DB.
|
|
user, err := a.core.UpdateUser(id, u)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Blank out the password hash in the response.
|
|
user.Password = null.String{}
|
|
|
|
// Cache the API token for in-memory, off-DB /api/* request auth.
|
|
if _, err := cacheUsers(a.core, a.auth); err != nil {
|
|
return err
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, okResp{user})
|
|
}
|
|
|
|
// DeleteUser handles the deletion of a single user by ID.
|
|
func (a *App) DeleteUser(c echo.Context) error {
|
|
// Delete the user(s) from the DB.
|
|
id := getID(c)
|
|
if err := a.core.DeleteUsers([]int{id}); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Cache the API token for in-memory, off-DB /api/* request auth.
|
|
if _, err := cacheUsers(a.core, a.auth); err != nil {
|
|
return err
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, okResp{true})
|
|
}
|
|
|
|
// DeleteUsers handles user deletion, either a single one (ID in the URI), or a list.
|
|
func (a *App) DeleteUsers(c echo.Context) error {
|
|
ids, err := getQueryInts("id", c.QueryParams())
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.T("globals.messages.invalidID"))
|
|
}
|
|
|
|
// Delete the user(s) from the DB.
|
|
if err := a.core.DeleteUsers(ids); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Cache the API token for in-memory, off-DB /api/* request auth.
|
|
if _, err := cacheUsers(a.core, a.auth); err != nil {
|
|
return err
|
|
}
|
|
|
|
return c.JSON(http.StatusOK, okResp{true})
|
|
}
|
|
|
|
// GetUserProfile fetches the uesr profile for the currently logged in user.
|
|
func (a *App) GetUserProfile(c echo.Context) error {
|
|
// Get the authenticated user.
|
|
user := auth.GetUser(c)
|
|
|
|
// Blank out the password hash in the response.
|
|
user.Password.String = ""
|
|
user.Password.Valid = false
|
|
|
|
return c.JSON(http.StatusOK, okResp{user})
|
|
}
|
|
|
|
// UpdateUserProfile update's the current user's profile.
|
|
func (a *App) UpdateUserProfile(c echo.Context) error {
|
|
// Get the authenticated user.
|
|
user := auth.GetUser(c)
|
|
|
|
// Incoming params.
|
|
u := auth.User{}
|
|
if err := c.Bind(&u); err != nil {
|
|
return err
|
|
}
|
|
u.PasswordLogin = user.PasswordLogin
|
|
u.Name = strings.TrimSpace(u.Name)
|
|
email := strings.TrimSpace(u.Email.String)
|
|
|
|
// Validate fields.
|
|
if user.PasswordLogin {
|
|
if !utils.ValidateEmail(email) {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.Ts("globals.messages.invalidFields", "name", "email"))
|
|
}
|
|
u.Email = null.String{String: email, Valid: true}
|
|
}
|
|
|
|
if u.PasswordLogin && u.Password.String != "" {
|
|
if !strHasLen(u.Password.String, 8, stdInputMaxLen) {
|
|
return echo.NewHTTPError(http.StatusBadRequest, a.i18n.Ts("globals.messages.invalidFields", "name", "password"))
|
|
}
|
|
}
|
|
|
|
// Update the user in the DB.
|
|
out, err := a.core.UpdateUserProfile(user.ID, u)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Blank out the password hash in the response.
|
|
out.Password = null.String{}
|
|
|
|
return c.JSON(http.StatusOK, okResp{out})
|
|
}
|
|
|
|
// cacheUsers fetches (API) users and caches them in the auth module.
|
|
// It also returns a bool indicating whether there are any actual users in the DB at all,
|
|
// which if there aren't, the first time user setup needs to be run.
|
|
func cacheUsers(co *core.Core, a *auth.Auth) (bool, error) {
|
|
users, err := co.GetUsers()
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
hasUser := false
|
|
apiUsers := make([]auth.User, 0, len(users))
|
|
for _, u := range users {
|
|
if u.Type == auth.UserTypeAPI && u.Status == auth.UserStatusEnabled {
|
|
apiUsers = append(apiUsers, u)
|
|
}
|
|
|
|
if u.Type == auth.UserTypeUser {
|
|
hasUser = true
|
|
}
|
|
}
|
|
|
|
a.CacheAPIUsers(apiUsers)
|
|
return hasUser, nil
|
|
}
|