user.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415
  1. package main
  2. /*
  3. User Management System
  4. Entry points for handler user functions
  5. */
  6. import (
  7. "encoding/json"
  8. "log"
  9. "net/http"
  10. "strconv"
  11. "strings"
  12. uuid "github.com/satori/go.uuid"
  13. auth "imuslab.com/arozos/mod/auth"
  14. "imuslab.com/arozos/mod/common"
  15. module "imuslab.com/arozos/mod/modules"
  16. prout "imuslab.com/arozos/mod/prouter"
  17. user "imuslab.com/arozos/mod/user"
  18. )
  19. func UserSystemInit() {
  20. //Create a new User Handler
  21. uh, err := user.NewUserHandler(sysdb, authAgent, permissionHandler, baseStoragePool, &shareEntryTable)
  22. if err != nil {
  23. panic(err)
  24. }
  25. userHandler = uh
  26. /*
  27. router := prout.NewModuleRouter(prout.RouterOption{
  28. ModuleName: "System Settings",
  29. AdminOnly: false,
  30. UserHandler: userHandler,
  31. DeniedHandler: func(w http.ResponseWriter, r *http.Request) {
  32. common.SendErrorResponse(w, "Permission Denied")
  33. },
  34. })
  35. */
  36. //Create Endpoint Listeners
  37. http.HandleFunc("/system/users/list", user_handleList)
  38. //Everyone logged in should have permission to view their profile and change their password
  39. http.HandleFunc("/system/users/userinfo", func(w http.ResponseWriter, r *http.Request) {
  40. authAgent.HandleCheckAuth(w, r, user_handleUserInfo)
  41. })
  42. //Interface info should be able to view by everyone logged in
  43. http.HandleFunc("/system/users/interfaceinfo", func(w http.ResponseWriter, r *http.Request) {
  44. authAgent.HandleCheckAuth(w, r, user_getInterfaceInfo)
  45. })
  46. //Register setting interface for module configuration
  47. registerSetting(settingModule{
  48. Name: "My Account",
  49. Desc: "Manage your account and password",
  50. IconPath: "SystemAO/users/img/small_icon.png",
  51. Group: "Users",
  52. StartDir: "SystemAO/users/account.html",
  53. RequireAdmin: false,
  54. })
  55. registerSetting(settingModule{
  56. Name: "User List",
  57. Desc: "A list of users registered on this system",
  58. IconPath: "SystemAO/users/img/small_icon.png",
  59. Group: "Users",
  60. StartDir: "SystemAO/users/userList.html",
  61. RequireAdmin: true,
  62. })
  63. //Register auth management events that requires user handler
  64. adminRouter := prout.NewModuleRouter(prout.RouterOption{
  65. ModuleName: "System Settings",
  66. AdminOnly: true,
  67. UserHandler: userHandler,
  68. DeniedHandler: func(w http.ResponseWriter, r *http.Request) {
  69. common.SendErrorResponse(w, "Permission Denied")
  70. },
  71. })
  72. //Handle Authentication Unregister Handler
  73. adminRouter.HandleFunc("/system/auth/unregister", authAgent.HandleUnregister)
  74. adminRouter.HandleFunc("/system/users/editUser", user_handleUserEdit)
  75. adminRouter.HandleFunc("/system/users/removeUser", user_handleUserRemove)
  76. }
  77. //Remove a user from the system
  78. func user_handleUserRemove(w http.ResponseWriter, r *http.Request) {
  79. username, err := common.Mv(r, "username", true)
  80. if err != nil {
  81. common.SendErrorResponse(w, "Username not defined")
  82. return
  83. }
  84. if !authAgent.UserExists(username) {
  85. common.SendErrorResponse(w, "User not exists")
  86. return
  87. }
  88. userinfo, err := userHandler.GetUserInfoFromUsername(username)
  89. if err != nil {
  90. common.SendErrorResponse(w, err.Error())
  91. return
  92. }
  93. currentUserinfo, err := userHandler.GetUserInfoFromRequest(w, r)
  94. if err != nil {
  95. //This user has not logged in
  96. common.SendErrorResponse(w, "User not logged in")
  97. return
  98. }
  99. if currentUserinfo.Username == userinfo.Username {
  100. //This user has not logged in
  101. common.SendErrorResponse(w, "You can't remove yourself")
  102. return
  103. }
  104. //Clear Core User Data
  105. userinfo.RemoveUser()
  106. //Clearn Up FileSystem preferences
  107. system_fs_removeUserPreferences(username)
  108. common.SendOK(w)
  109. }
  110. func user_handleUserEdit(w http.ResponseWriter, r *http.Request) {
  111. userinfo, err := userHandler.GetUserInfoFromRequest(w, r)
  112. if err != nil {
  113. //This user has not logged in
  114. common.SendErrorResponse(w, "User not logged in")
  115. return
  116. }
  117. if userinfo.IsAdmin() == false {
  118. //Require admin access
  119. common.SendErrorResponse(w, "Permission Denied")
  120. return
  121. }
  122. opr, _ := common.Mv(r, "opr", true)
  123. username, _ := common.Mv(r, "username", true)
  124. if !authAgent.UserExists(username) {
  125. common.SendErrorResponse(w, "User not exists")
  126. return
  127. }
  128. if opr == "" {
  129. //List this user information
  130. type returnValue struct {
  131. Username string
  132. Icondata string
  133. Usergroup []string
  134. Quota int64
  135. }
  136. iconData := getUserIcon(username)
  137. userGroup, err := permissionHandler.GetUsersPermissionGroup(username)
  138. if err != nil {
  139. common.SendErrorResponse(w, "Unable to get user group")
  140. return
  141. }
  142. //Parse the user permission groupts
  143. userGroupNames := []string{}
  144. for _, gp := range userGroup {
  145. userGroupNames = append(userGroupNames, gp.Name)
  146. }
  147. //Get the user's storaeg quota
  148. userinfo, _ := userHandler.GetUserInfoFromUsername(username)
  149. jsonString, _ := json.Marshal(returnValue{
  150. Username: username,
  151. Icondata: iconData,
  152. Usergroup: userGroupNames,
  153. Quota: userinfo.StorageQuota.GetUserStorageQuota(),
  154. })
  155. common.SendJSONResponse(w, string(jsonString))
  156. } else if opr == "updateUserGroup" {
  157. //Update the target user's group
  158. newgroup, err := common.Mv(r, "newgroup", true)
  159. if err != nil {
  160. log.Println(err.Error())
  161. common.SendErrorResponse(w, "New Group not defined")
  162. return
  163. }
  164. newQuota, err := common.Mv(r, "quota", true)
  165. if err != nil {
  166. log.Println(err.Error())
  167. common.SendErrorResponse(w, "Quota not defined")
  168. return
  169. }
  170. quotaInt, err := strconv.Atoi(newQuota)
  171. if err != nil {
  172. log.Println(err.Error())
  173. common.SendErrorResponse(w, "Invalid Quota Value")
  174. return
  175. }
  176. newGroupKeys := []string{}
  177. err = json.Unmarshal([]byte(newgroup), &newGroupKeys)
  178. if err != nil {
  179. log.Println(err.Error())
  180. common.SendErrorResponse(w, "Unable to parse new groups")
  181. return
  182. }
  183. if len(newGroupKeys) == 0 {
  184. common.SendErrorResponse(w, "User must be in at least one user permission group")
  185. return
  186. }
  187. //Check if each group exists
  188. for _, thisgp := range newGroupKeys {
  189. if !permissionHandler.GroupExists(thisgp) {
  190. common.SendErrorResponse(w, "Group not exists, given: "+thisgp)
  191. return
  192. }
  193. }
  194. //OK to proceed
  195. userinfo, err := userHandler.GetUserInfoFromUsername(username)
  196. if err != nil {
  197. common.SendErrorResponse(w, err.Error())
  198. return
  199. }
  200. //Check if the current user is the only one admin in the administrator group and he is leaving the group
  201. allAdministratorGroupUsers, err := userHandler.GetUsersInPermissionGroup("administrator")
  202. if err == nil {
  203. //Skip checking if error
  204. if len(allAdministratorGroupUsers) == 1 && userinfo.UserIsInOneOfTheGroupOf([]string{"administrator"}) && !common.StringInArray(newGroupKeys, "administrator") {
  205. //Current administrator group only contain 1 user
  206. //This user is in the administrator group
  207. //The user want to unset himself from administrator group
  208. //Reject the operation as this will cause system lockdown
  209. common.SendErrorResponse(w, "You are the only administrator. You cannot remove yourself from the administrator group.")
  210. return
  211. }
  212. }
  213. //Get the permission groups by their ids
  214. newPermissioGroups := userHandler.GetPermissionHandler().GetPermissionGroupByNameList(newGroupKeys)
  215. //Set the user's permission to these groups
  216. userinfo.SetUserPermissionGroup(newPermissioGroups)
  217. if err != nil {
  218. common.SendErrorResponse(w, err.Error())
  219. return
  220. }
  221. //Write to quota handler
  222. userinfo.StorageQuota.SetUserStorageQuota(int64(quotaInt))
  223. common.SendOK(w)
  224. } else if opr == "resetPassword" {
  225. //Reset password for this user
  226. //Generate a random password for this user
  227. tmppassword := uuid.NewV4().String()
  228. hashedPassword := auth.Hash(tmppassword)
  229. err := sysdb.Write("auth", "passhash/"+username, hashedPassword)
  230. if err != nil {
  231. common.SendErrorResponse(w, err.Error())
  232. return
  233. }
  234. //Finish. Send back the reseted password
  235. common.SendJSONResponse(w, "\""+tmppassword+"\"")
  236. } else {
  237. common.SendErrorResponse(w, "Not supported opr")
  238. return
  239. }
  240. }
  241. //Get the user interface info for the user to launch into
  242. func user_getInterfaceInfo(w http.ResponseWriter, r *http.Request) {
  243. userinfo, err := userHandler.GetUserInfoFromRequest(w, r)
  244. if err != nil {
  245. //User not logged in
  246. common.SendErrorResponse(w, "User not logged in")
  247. return
  248. }
  249. interfacingModules := userinfo.GetInterfaceModules()
  250. interfaceModuleInfos := []module.ModuleInfo{}
  251. for _, im := range interfacingModules {
  252. interfaceModuleInfos = append(interfaceModuleInfos, *moduleHandler.GetModuleInfoByID(im))
  253. }
  254. jsonString, _ := json.Marshal(interfaceModuleInfos)
  255. common.SendJSONResponse(w, string(jsonString))
  256. }
  257. func user_handleUserInfo(w http.ResponseWriter, r *http.Request) {
  258. username, err := authAgent.GetUserName(w, r)
  259. if err != nil {
  260. common.SendErrorResponse(w, "User not logged in")
  261. return
  262. }
  263. opr, _ := common.Mv(r, "opr", true)
  264. if opr == "" {
  265. //Listing mode
  266. iconData := getUserIcon(username)
  267. userGroup, err := permissionHandler.GetUsersPermissionGroup(username)
  268. if err != nil {
  269. common.SendErrorResponse(w, "Unable to get user group")
  270. return
  271. }
  272. userGroupNames := []string{}
  273. for _, group := range userGroup {
  274. userGroupNames = append(userGroupNames, group.Name)
  275. }
  276. type returnValue struct {
  277. Username string
  278. Icondata string
  279. Usergroup []string
  280. }
  281. jsonString, _ := json.Marshal(returnValue{
  282. Username: username,
  283. Icondata: iconData,
  284. Usergroup: userGroupNames,
  285. })
  286. common.SendJSONResponse(w, string(jsonString))
  287. return
  288. } else if opr == "changepw" {
  289. oldpw, _ := common.Mv(r, "oldpw", true)
  290. newpw, _ := common.Mv(r, "newpw", true)
  291. if oldpw == "" || newpw == "" {
  292. common.SendErrorResponse(w, "Password cannot be empty")
  293. return
  294. }
  295. //valid the old password
  296. hashedPassword := auth.Hash(oldpw)
  297. var passwordInDB string
  298. err = sysdb.Read("auth", "passhash/"+username, &passwordInDB)
  299. if hashedPassword != passwordInDB {
  300. //Old password entry invalid.
  301. common.SendErrorResponse(w, "Invalid old password.")
  302. return
  303. }
  304. //OK! Change user password
  305. newHashedPassword := auth.Hash(newpw)
  306. sysdb.Write("auth", "passhash/"+username, newHashedPassword)
  307. common.SendOK(w)
  308. } else if opr == "changeprofilepic" {
  309. picdata, _ := common.Mv(r, "picdata", true)
  310. if picdata != "" {
  311. setUserIcon(username, picdata)
  312. common.SendOK(w)
  313. } else {
  314. common.SendErrorResponse(w, "Empty image data received.")
  315. return
  316. }
  317. } else {
  318. common.SendErrorResponse(w, "Not supported opr")
  319. return
  320. }
  321. }
  322. func user_handleList(w http.ResponseWriter, r *http.Request) {
  323. userinfo, err := userHandler.GetUserInfoFromRequest(w, r)
  324. if err != nil {
  325. //This user has not logged in
  326. common.SendErrorResponse(w, "User not logged in")
  327. return
  328. }
  329. if authAgent.CheckAuth(r) {
  330. entries, _ := sysdb.ListTable("auth")
  331. var results [][]interface{}
  332. for _, keypairs := range entries {
  333. if strings.Contains(string(keypairs[0]), "group/") {
  334. username := strings.Split(string(keypairs[0]), "/")[1]
  335. group := []string{}
  336. //Get user icon if it exists in the database
  337. userIcon := getUserIcon(username)
  338. json.Unmarshal(keypairs[1], &group)
  339. var thisUserInfo []interface{}
  340. thisUserInfo = append(thisUserInfo, username)
  341. thisUserInfo = append(thisUserInfo, group)
  342. thisUserInfo = append(thisUserInfo, userIcon)
  343. thisUserInfo = append(thisUserInfo, username == userinfo.Username)
  344. results = append(results, thisUserInfo)
  345. }
  346. }
  347. jsonString, _ := json.Marshal(results)
  348. common.SendJSONResponse(w, string(jsonString))
  349. } else {
  350. common.SendErrorResponse(w, "Permission Denied")
  351. }
  352. }
  353. func getUserIcon(username string) string {
  354. var userIconpath []byte
  355. sysdb.Read("auth", "profilepic/"+username, &userIconpath)
  356. return string(userIconpath)
  357. }
  358. func setUserIcon(username string, base64data string) {
  359. sysdb.Write("auth", "profilepic/"+username, []byte(base64data))
  360. return
  361. }