|
@@ -67,13 +67,13 @@ func (s *SSOHandler) HandleEditUser(w http.ResponseWriter, r *http.Request) {
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- if !(s.SSO_UserExists(userID)) {
|
|
|
+ if !(s.SSOUserExists(userID)) {
|
|
|
utils.SendErrorResponse(w, "user not found")
|
|
|
return
|
|
|
}
|
|
|
|
|
|
//Load the user entry from database
|
|
|
- userEntry, err := s.SSO_GetUser(userID)
|
|
|
+ userEntry, err := s.GetSSOUser(userID)
|
|
|
if err != nil {
|
|
|
utils.SendErrorResponse(w, "failed to load user entry")
|
|
|
return
|
|
@@ -108,7 +108,7 @@ func (s *SSOHandler) HandleRemoveUser(w http.ResponseWriter, r *http.Request) {
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- if !(s.SSO_UserExists(userID)) {
|
|
|
+ if !(s.SSOUserExists(userID)) {
|
|
|
utils.SendErrorResponse(w, "user not found")
|
|
|
return
|
|
|
}
|
|
@@ -124,23 +124,16 @@ func (s *SSOHandler) HandleRemoveUser(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
|
// HandleListUser list all users in the SSO system
|
|
|
func (s *SSOHandler) HandleListUser(w http.ResponseWriter, r *http.Request) {
|
|
|
- entries, err := s.Config.Database.ListTable("sso_users")
|
|
|
+ ssoUsers, err := s.ListSSOUsers()
|
|
|
if err != nil {
|
|
|
utils.SendErrorResponse(w, "failed to list users")
|
|
|
return
|
|
|
}
|
|
|
- ssoUsers := map[string]*UserEntry{}
|
|
|
- for _, keypairs := range entries {
|
|
|
- userid := string(keypairs[0])
|
|
|
- group := new(UserEntry)
|
|
|
- json.Unmarshal(keypairs[1], &group)
|
|
|
- ssoUsers[userid] = group
|
|
|
- }
|
|
|
-
|
|
|
js, _ := json.Marshal(ssoUsers)
|
|
|
utils.SendJSONResponse(w, string(js))
|
|
|
}
|
|
|
|
|
|
+// HandleAddSubdomain add a subdomain to a user
|
|
|
func (s *SSOHandler) HandleAddSubdomain(w http.ResponseWriter, r *http.Request) {
|
|
|
userid, err := utils.PostPara(r, "user_id")
|
|
|
if err != nil {
|
|
@@ -148,12 +141,12 @@ func (s *SSOHandler) HandleAddSubdomain(w http.ResponseWriter, r *http.Request)
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- if !(s.SSO_UserExists(userid)) {
|
|
|
+ if !(s.SSOUserExists(userid)) {
|
|
|
utils.SendErrorResponse(w, "user not found")
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- UserEntry, err := s.SSO_GetUser(userid)
|
|
|
+ UserEntry, err := s.GetSSOUser(userid)
|
|
|
if err != nil {
|
|
|
utils.SendErrorResponse(w, "failed to load user entry")
|
|
|
return
|
|
@@ -185,6 +178,7 @@ func (s *SSOHandler) HandleAddSubdomain(w http.ResponseWriter, r *http.Request)
|
|
|
utils.SendOK(w)
|
|
|
}
|
|
|
|
|
|
+// HandleRemoveSubdomain remove a subdomain from a user
|
|
|
func (s *SSOHandler) HandleRemoveSubdomain(w http.ResponseWriter, r *http.Request) {
|
|
|
userid, err := utils.PostPara(r, "user_id")
|
|
|
if err != nil {
|
|
@@ -192,12 +186,12 @@ func (s *SSOHandler) HandleRemoveSubdomain(w http.ResponseWriter, r *http.Reques
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- if !(s.SSO_UserExists(userid)) {
|
|
|
+ if !(s.SSOUserExists(userid)) {
|
|
|
utils.SendErrorResponse(w, "user not found")
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- UserEntry, err := s.SSO_GetUser(userid)
|
|
|
+ UserEntry, err := s.GetSSOUser(userid)
|
|
|
if err != nil {
|
|
|
utils.SendErrorResponse(w, "failed to load user entry")
|
|
|
return
|
|
@@ -220,6 +214,7 @@ func (s *SSOHandler) HandleRemoveSubdomain(w http.ResponseWriter, r *http.Reques
|
|
|
utils.SendOK(w)
|
|
|
}
|
|
|
|
|
|
+// HandleEnable2FA enable 2FA for a user
|
|
|
func (s *SSOHandler) HandleEnable2FA(w http.ResponseWriter, r *http.Request) {
|
|
|
userid, err := utils.PostPara(r, "user_id")
|
|
|
if err != nil {
|
|
@@ -227,12 +222,12 @@ func (s *SSOHandler) HandleEnable2FA(w http.ResponseWriter, r *http.Request) {
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- if !(s.SSO_UserExists(userid)) {
|
|
|
+ if !(s.SSOUserExists(userid)) {
|
|
|
utils.SendErrorResponse(w, "user not found")
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- UserEntry, err := s.SSO_GetUser(userid)
|
|
|
+ UserEntry, err := s.GetSSOUser(userid)
|
|
|
if err != nil {
|
|
|
utils.SendErrorResponse(w, "failed to load user entry")
|
|
|
return
|
|
@@ -258,12 +253,12 @@ func (s *SSOHandler) HandleDisable2FA(w http.ResponseWriter, r *http.Request) {
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- if !(s.SSO_UserExists(userid)) {
|
|
|
+ if !(s.SSOUserExists(userid)) {
|
|
|
utils.SendErrorResponse(w, "user not found")
|
|
|
return
|
|
|
}
|
|
|
|
|
|
- UserEntry, err := s.SSO_GetUser(userid)
|
|
|
+ UserEntry, err := s.GetSSOUser(userid)
|
|
|
if err != nil {
|
|
|
utils.SendErrorResponse(w, "failed to load user entry")
|
|
|
return
|
|
@@ -288,12 +283,12 @@ func (s *SSOHandler) HandleVerify2FA(w http.ResponseWriter, r *http.Request) (bo
|
|
|
return false, errors.New("invalid user ID given")
|
|
|
}
|
|
|
|
|
|
- if !(s.SSO_UserExists(userid)) {
|
|
|
+ if !(s.SSOUserExists(userid)) {
|
|
|
utils.SendErrorResponse(w, "user not found")
|
|
|
return false, errors.New("user not found")
|
|
|
}
|
|
|
|
|
|
- UserEntry, err := s.SSO_GetUser(userid)
|
|
|
+ UserEntry, err := s.GetSSOUser(userid)
|
|
|
if err != nil {
|
|
|
utils.SendErrorResponse(w, "failed to load user entry")
|
|
|
return false, errors.New("failed to load user entry")
|