123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263 |
- package agi
- import (
- "io/ioutil"
- "net/http"
- "path/filepath"
- "imuslab.com/arozos/mod/utils"
- )
- //Handle AGI Exectuion Request with token, design for letting other web scripting language like php to interface with AGI
- func (g *Gateway) HandleAgiExecutionRequestWithToken(w http.ResponseWriter, r *http.Request) {
- token, err := utils.Mv(r, "token", false)
- if err != nil {
- //Username not defined
- utils.SendErrorResponse(w, "Token not defined or empty.")
- return
- }
- script, err := utils.Mv(r, "script", false)
- if err != nil {
- //Username not defined
- utils.SendErrorResponse(w, "Script path not defined or empty.")
- return
- }
- //Try to get the username from token
- username, err := g.Option.UserHandler.GetAuthAgent().GetUsernameFromToken(token)
- if err != nil {
- //This token is not valid
- w.WriteHeader(http.StatusUnauthorized)
- w.Write([]byte("401 - Unauthorized (Token not valid)"))
- return
- }
- //Check if user exists and have access to the script
- targetUser, err := g.Option.UserHandler.GetUserInfoFromUsername(username)
- if err != nil {
- //This user not exists
- w.WriteHeader(http.StatusUnauthorized)
- w.Write([]byte("401 - Unauthorized (User not exists)"))
- return
- }
- scriptScope := ""
- allowAccess := checkUserAccessToScript(targetUser, script, scriptScope)
- if !allowAccess {
- w.WriteHeader(http.StatusUnauthorized)
- w.Write([]byte("401 - Unauthorized (Permission Denied)"))
- return
- }
- //Get the content of the script
- scriptContentByte, err := ioutil.ReadFile(filepath.Join("./web/", script))
- if err != nil {
- w.WriteHeader(http.StatusNotFound)
- w.Write([]byte("404 - Script Not Found"))
- return
- }
- scriptContent := string(scriptContentByte)
- g.ExecuteAGIScript(scriptContent, nil, script, scriptScope, w, r, targetUser)
- }
|