Compare commits

..

26 Commits

Author SHA1 Message Date
68bce99e1d add docs to gitignore 2026-01-03 15:47:04 +02:00
d64645599d front 2026-01-03 15:46:06 +02:00
6ce7edd194 add internal gorm erros 2026-01-03 15:45:47 +02:00
c718db565e add internal token erorrs 2026-01-03 15:45:34 +02:00
af7770eb06 add user struct returning 2026-01-03 15:45:23 +02:00
8e67bae683 add error handling logic 2026-01-03 15:44:48 +02:00
5468c831c4 add internal auth errors 2026-01-03 15:44:25 +02:00
600cf84776 add revoke method 2026-01-03 15:43:43 +02:00
0485fd3bee add register method 2026-01-03 15:43:22 +02:00
f2f7819f8c add refresh method 2026-01-03 15:43:12 +02:00
48d9c14944 add me method (not implemented) 2026-01-03 15:43:00 +02:00
cadb42d17a add logout method 2026-01-03 15:42:29 +02:00
0510103125 add login method 2026-01-03 15:42:19 +02:00
e75390f673 add get user data method 2026-01-03 15:42:09 +02:00
bf96ca1263 errors file 2026-01-03 15:41:39 +02:00
ca569d25bc refactor and documentation 2026-01-03 15:41:21 +02:00
1468937589 move ProblemDetails 2026-01-03 15:39:42 +02:00
9070b4138e add real ip logging 2026-01-03 15:39:00 +02:00
ac26a981b2 swag fmt 2025-12-21 22:21:58 +02:00
e9d8877fbf fully implement acl backend and interface 2025-12-21 22:18:29 +02:00
85f8ac60e7 some changes 2025-12-21 00:00:03 +02:00
904f446447 basicly implement acl crud ops with roles and resources 2025-12-20 17:38:15 +02:00
c188b46519 gitignore add data dir 2025-12-20 17:37:34 +02:00
8e31a84b0e get some modules 2025-12-20 17:36:52 +02:00
bd06d071b2 add swagger 2025-12-20 17:36:36 +02:00
f0d7d79e0f add swagger 2025-12-20 17:36:24 +02:00
49 changed files with 3038 additions and 903 deletions

4
.gitignore vendored
View File

@@ -3,4 +3,6 @@ config.yaml
*.sqlite3 *.sqlite3
panic.log panic.log
testdata/ testdata/
secret/ secret/
data/
docs/

View File

@@ -20,7 +20,7 @@ imports-tools:
go install golang.org/x/tools/cmd/goimports@latest; \ go install golang.org/x/tools/cmd/goimports@latest; \
fi fi
.PHONY: all build run test lint fmt imports .PHONY: all swag build run test lint fmt imports
all: build all: build
@@ -30,6 +30,12 @@ run: build
BUILD_PARAMS = -trimpath -ldflags "-X git.oblat.lv/alex/triggerssmith/internal/vars.Version=$(VERSION)" BUILD_PARAMS = -trimpath -ldflags "-X git.oblat.lv/alex/triggerssmith/internal/vars.Version=$(VERSION)"
build-with-swag: swag build
swag:
@echo "-- generating swagger docs"
@swag init -g cmd/serve.go
build: build:
@echo "-- building $(NAME)" @echo "-- building $(NAME)"
@go build $(BUILD_PARAMS) -o $(BINARY) $(ENTRY) @go build $(BUILD_PARAMS) -o $(BINARY) $(ENTRY)

View File

@@ -0,0 +1,11 @@
package api_acladmin
type errorInvalidRequestBody struct {
Error string `json:"error" example:"INVALID_REQUEST_BODY"`
Details string `json:"details" example:"Request body is not valid JSON"`
}
type errorInternalServerError struct {
Error string `json:"error"`
Details string `json:"details"`
}

28
api/acl_admin/errors.go Normal file
View File

@@ -0,0 +1,28 @@
package api_acladmin
const (
ErrorInvalidRequestBody = "INVALID_REQUEST_BODY"
ErrorInternalServerError = "INTERNAL_SERVER_ERROR"
// Roles
ErrorFailedToCreateRole = "FAILED_TO_CREATE_ROLE"
ErrorFailedToGetRole = "FAILED_TO_GET_ROLE"
ErrorFailedToUpdateRole = "FAILED_TO_UPDATE_ROLE"
ErrorFailedToDeleteRole = "FAILED_TO_DELETE_ROLE"
ErrorInvalidRoleID = "INVALID_ROLE_ID"
ErrorRoleNotFound = "ROLE_NOT_FOUND"
// Resources
ErrorFailedToCreateResource = "FAILED_TO_CREATE_RESOURCE"
ErrorFailedToGetResource = "FAILED_TO_GET_RESOURCE"
ErrorFailedToUpdateResource = "FAILED_TO_UPDATE_RESOURCE"
ErrorFailedToDeleteResource = "FAILED_TO_DELETE_RESOURCE"
ErrorInvalidResourceID = "INVALID_RESOURCE_ID"
ErrorResourceNotFound = "RESOURCE_NOT_FOUND"
)
const (
ErrorACLServiceNotInitialized = "ACL service is not initialized"
)

View File

@@ -1,13 +1,11 @@
package api_acladmin package api_acladmin
import ( import (
"encoding/json"
"net/http"
"git.oblat.lv/alex/triggerssmith/internal/acl" "git.oblat.lv/alex/triggerssmith/internal/acl"
"git.oblat.lv/alex/triggerssmith/internal/auth" "git.oblat.lv/alex/triggerssmith/internal/auth"
"git.oblat.lv/alex/triggerssmith/internal/config" "git.oblat.lv/alex/triggerssmith/internal/config"
"git.oblat.lv/alex/triggerssmith/internal/server"
//"git.oblat.lv/alex/triggerssmith/internal/server"
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
) )
@@ -32,91 +30,230 @@ func MustRoute(config *config.Config, aclService *acl.Service, authService *auth
a: aclService, a: aclService,
auth: authService, auth: authService,
} }
// GET /roles — список ролей
// POST /roles — создать роль
// GET /roles/{roleId} — получить роль
// PATCH /roles/{roleId} — обновить роль (если нужно)
// DELETE /roles/{roleId} — удалить роль
// GET /resources — список ресурсов
// POST /resources — создать ресурс
// GET /resources/{resId} — получить ресурс
// PATCH /resources/{resId} — обновить ресурс
// DELETE /resources/{resId} — удалить ресурс
// GET /users/{userId}/roles — роли пользователя
// POST /users/{userId}/roles — назначить роль пользователю
// DELETE /users/{userId}/roles/{roleId} — снять роль
// GET /roles/{roleId}/resources — ресурсы роли
// POST /roles/{roleId}/resources — назначить ресурс роли
// DELETE /roles/{roleId}/resources/{resId} — убрать ресурс
return func(r chi.Router) { return func(r chi.Router) {
r.Get("/roles", h.getRoles) // Roles
r.Post("/create-role", h.createRole) r.Get("/roles", h.getRoles) // list all roles
r.Post("/assign-role", h.assignRoleToUser) r.Post("/roles", h.createRole) // create a new role
r.Get("/user-roles", h.getUserRoles) r.Get("/roles/{roleId}", h.getRole) // get a role by ID
r.Post("/remove-role", h.removeRoleFromUser) r.Get("/roles/{roleId}/users", h.getRoleUsers) // get all assigned users to a role
r.Get("/roles/{roleId}/resources", h.getRoleResources) // get all resources assigned to a role
r.Patch("/roles/{roleId}", h.updateRole) // update a role by ID
r.Delete("/roles/{roleId}", h.deleteRole) // delete a role by ID
r.Post("/roles/{roleId}/resources", h.assignResourceToRole) // assign a resource to a role
r.Delete("/roles/{roleId}/resources/{resId}", h.removeResourceFromRole) // remove a resource from a role
r.Get("/resources", h.getResources) // Resources
r.Post("/create-resource", h.createResource) r.Get("/resources", h.getResources) // list all resources
r.Post("/assign-resource", h.assignResourceToRole) r.Post("/resources", h.createResource) // create a new resource
r.Get("/role-resources", h.getRoleResources) r.Get("/resources/{resourceId}", h.getResource) // get a resource by ID
r.Post("/remove-resource", h.removeResourceFromRole) r.Patch("/resources/{resourceId}", h.updateResource) // update a resource by ID
r.Delete("/resources/{resourceId}", h.deleteResource) // delete a resource by ID
r.Get("/permissions", h.getResources) // legacy support // Users
r.Post("/create-permissions", h.createResource) // legacy support r.Get("/users/{userId}/roles", h.getUserRoles) // get all roles for a user
r.Post("/assign-permissions", h.assignResourceToRole) // legacy support r.Post("/users/{userId}/roles", h.assignRoleToUser) // assign a role to a user
r.Get("/role-permissions", h.getRoleResources) // legacy support r.Delete("/users/{userId}/roles/{roleId}", h.removeRoleFromUser) // remove a role from a user
r.Post("/remove-permissions", h.removeResourceFromRole) // legacy support
// Users
// r.Get("/users/{userId}/roles", h.getUserRoles) // get all roles for a user
// r.Post("/users/{userId}/roles", h.assignRoleToUser) // assign a role to a user
// r.Delete("/users/{userId}/roles/{roleId}", h.removeRoleFromUser) // remove a role from a user
// r.Get("/roles", h.getRoles)
// r.Post("/create-role", h.createRole)
// r.Post("/assign-role", h.assignRoleToUser)
// r.Get("/user-roles", h.getUserRoles)
// r.Post("/remove-role", h.removeRoleFromUser)
// r.Get("/resources", h.getResources)
// r.Post("/create-resource", h.createResource)
// r.Post("/assign-resource", h.assignResourceToRole)
// r.Get("/role-resources", h.getRoleResources)
// r.Post("/remove-resource", h.removeResourceFromRole)
// r.Get("/permissions", h.getResources) // legacy support
// r.Post("/create-permissions", h.createResource) // legacy support
// r.Post("/assign-permissions", h.assignResourceToRole) // legacy support
// r.Get("/role-permissions", h.getRoleResources) // legacy support
// r.Post("/remove-permissions", h.removeResourceFromRole) // legacy support
} }
} }
type rolesResponse []struct { // type assignRoleRequest struct {
ID uint `json:"id"` // UserID int `json:"userId"`
Name string `json:"name"` // RoleID int `json:"roleId"`
} // }
func (h *aclAdminHandler) getRoles(w http.ResponseWriter, r *http.Request) { // func (h *aclAdminHandler) assignRoleToUser(w http.ResponseWriter, r *http.Request) {
roles, err := h.a.GetRoles() // var req assignRoleRequest
if err != nil { // if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
http.Error(w, "Internal server error", http.StatusInternalServerError) // http.Error(w, "Invalid request body", http.StatusBadRequest)
return // return
} // }
w.Header().Set("Content-Type", "application/json") // if req.UserID < 0 || req.RoleID < 0 {
err = json.NewEncoder(w).Encode(func() rolesResponse { // http.Error(w, "Invalid user or role ID", http.StatusBadRequest)
// Transform acl.Role to rolesResponse // return
resp := make(rolesResponse, 0, len(roles)) // }
for _, role := range roles { // if err := h.a.AssignRoleToUser(uint(req.RoleID), uint(req.UserID)); err != nil {
resp = append(resp, struct { // http.Error(w, "Failed to assign role to user", http.StatusConflict)
ID uint `json:"id"` // return
Name string `json:"name"` // }
}{ // w.WriteHeader(http.StatusCreated)
ID: role.ID, // }
Name: role.Name,
})
}
return resp
}())
if err != nil {
http.Error(w, "Failed to encode response", http.StatusInternalServerError)
return
}
}
func (h *aclAdminHandler) createRole(w http.ResponseWriter, r *http.Request) { // type getUserRolesResponse getRolesResponse
server.NotImplemented(w)
}
func (h *aclAdminHandler) assignRoleToUser(w http.ResponseWriter, r *http.Request) { // func (h *aclAdminHandler) getUserRoles(w http.ResponseWriter, r *http.Request) {
server.NotImplemented(w) // uidStr := r.URL.Query().Get("userId")
} // if uidStr == "" {
// http.Error(w, "Missing userId parameter", http.StatusBadRequest)
// return
// }
// userID, err := strconv.Atoi(uidStr)
// if err != nil || userID < 0 {
// http.Error(w, "Invalid userId parameter", http.StatusBadRequest)
// return
// }
// roles, err := h.a.GetUserRoles(uint(userID))
// if err != nil {
// http.Error(w, "Internal server error", http.StatusInternalServerError)
// return
// }
// w.Header().Set("Content-Type", "application/json")
// err = json.NewEncoder(w).Encode(func() getUserRolesResponse {
// // Transform acl.Role to getUserRolesResponse
// resp := make(getUserRolesResponse, 0, len(roles))
// for _, role := range roles {
// resp = append(resp, struct {
// ID uint `json:"id"`
// Name string `json:"name"`
// }{
// ID: role.ID,
// Name: role.Name,
// })
// }
// return resp
// }())
// if err != nil {
// http.Error(w, "Failed to encode response", http.StatusInternalServerError)
// return
// }
// }
func (h *aclAdminHandler) getUserRoles(w http.ResponseWriter, r *http.Request) { // type removeRoleRequest struct {
server.NotImplemented(w) // UserID int `json:"userId"`
} // RoleID int `json:"roleId"`
// }
func (h *aclAdminHandler) removeRoleFromUser(w http.ResponseWriter, r *http.Request) { // func (h *aclAdminHandler) removeRoleFromUser(w http.ResponseWriter, r *http.Request) {
server.NotImplemented(w) // var req removeRoleRequest
} // if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
// http.Error(w, "Invalid request body", http.StatusBadRequest)
// return
// }
// if req.UserID < 0 || req.RoleID < 0 {
// http.Error(w, "Invalid user or role ID", http.StatusBadRequest)
// return
// }
// if err := h.a.RemoveRoleFromUser(uint(req.RoleID), uint(req.UserID)); err != nil {
// http.Error(w, "Failed to remove role from user", http.StatusConflict)
// return
// }
// w.WriteHeader(http.StatusNoContent)
// }
func (h *aclAdminHandler) getResources(w http.ResponseWriter, r *http.Request) { // type getResourcesResponse getRolesResponse
server.NotImplemented(w)
}
func (h *aclAdminHandler) createResource(w http.ResponseWriter, r *http.Request) { // func (h *aclAdminHandler) getResources(w http.ResponseWriter, r *http.Request) {
server.NotImplemented(w) // resources, err := h.a.GetResources()
} // if err != nil {
// http.Error(w, "Internal server error", http.StatusInternalServerError)
// return
// }
// w.Header().Set("Content-Type", "application/json")
// err = json.NewEncoder(w).Encode(func() getResourcesResponse {
// // Transform acl.Resource to getResourcesResponse
// resp := make(getResourcesResponse, 0, len(resources))
// for _, res := range resources {
// resp = append(resp, struct {
// ID uint `json:"id"`
// Name string `json:"name"`
// }{
// ID: res.ID,
// Name: res.Key,
// })
// }
// return resp
// }())
// if err != nil {
// http.Error(w, "Failed to encode response", http.StatusInternalServerError)
// return
// }
// }
func (h *aclAdminHandler) assignResourceToRole(w http.ResponseWriter, r *http.Request) { // type createResourceRequest struct {
server.NotImplemented(w) // Name string `json:"name"`
} // }
func (h *aclAdminHandler) getRoleResources(w http.ResponseWriter, r *http.Request) { // type createResourceResponse struct {
server.NotImplemented(w) // ID uint `json:"id"`
} // Name string `json:"name"`
// }
func (h *aclAdminHandler) removeResourceFromRole(w http.ResponseWriter, r *http.Request) { // func (h *aclAdminHandler) createResource(w http.ResponseWriter, r *http.Request) {
server.NotImplemented(w) // var req createResourceRequest
} // if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
// http.Error(w, "Invalid request body", http.StatusBadRequest)
// return
// }
// if req.Name == "" {
// http.Error(w, "Name is required", http.StatusBadRequest)
// return
// }
// id, err := h.a.CreateResource(req.Name)
// if err != nil {
// http.Error(w, "Failed to create resource", http.StatusConflict)
// return
// }
// w.WriteHeader(http.StatusCreated)
// w.Header().Set("Content-Type", "application/json")
// err = json.NewEncoder(w).Encode(createResourceResponse{
// ID: id,
// Name: req.Name,
// })
// if err != nil {
// http.Error(w, "Failed to encode response", http.StatusInternalServerError)
// return
// }
// }
// func (h *aclAdminHandler) assignResourceToRole(w http.ResponseWriter, r *http.Request) {
// server.NotImplemented(w)
// }
// func (h *aclAdminHandler) getRoleResources(w http.ResponseWriter, r *http.Request) {
// server.NotImplemented(w)
// }
// func (h *aclAdminHandler) removeResourceFromRole(w http.ResponseWriter, r *http.Request) {
// server.NotImplemented(w)
// }

224
api/acl_admin/resources.go Normal file
View File

@@ -0,0 +1,224 @@
package api_acladmin
import (
"encoding/json"
"log/slog"
"net/http"
"strconv"
"git.oblat.lv/alex/triggerssmith/internal/acl"
"git.oblat.lv/alex/triggerssmith/internal/server"
"github.com/go-chi/chi/v5"
)
// @Summary Get all resources
// @Tags acl/resources
// @Produce json
// @Success 200 {object} getResourcesResponse
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/resources [get]
func (h *aclAdminHandler) getResources(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
resources, err := h.a.GetResources()
if err != nil {
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "acl service is not initialized", r)
default:
slog.Error("unexpected server error", "error", err.Error())
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
type R struct {
ID uint `json:"id" example:"1"`
Key string `json:"key" example:"html.view"`
}
resp := make([]R, 0, len(resources))
for _, res := range resources {
resp = append(resp, R{ID: res.ID, Key: res.Key})
}
_ = json.NewEncoder(w).Encode(resp)
}
// @Summary Get resource by ID
// @Tags acl/resources
// @Produce json
// @Param resourceId path int true "Resource ID" example(1)
// @Success 200 {object} getResourceResponse
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/resources/{resourceId} [get]
func (h *aclAdminHandler) getResource(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
resourceIDStr := chi.URLParam(r, "resourceId")
resourceID, err := strconv.Atoi(resourceIDStr)
if err != nil || resourceID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-resource-id", "Invalid resource ID", "Resource ID must be positive integer", r)
return
}
resource, err := h.a.GetResourceByID(uint(resourceID))
if err != nil {
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "acl service is not initialized", r)
case acl.ErrResourceNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/resource-not-found", "Resource not found", "No resource with ID "+resourceIDStr, r)
default:
slog.Error("unexpected server error", "error", err.Error())
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
_ = json.NewEncoder(w).Encode(getResourceResponse{
ID: resource.ID,
Key: resource.Key,
})
}
// @Summary Create resource
// @Tags acl/resources
// @Accept json
// @Produce json
// @Param request body createResourceRequest true "Resource"
// @Success 201 {object} createResourceResponse
// @Failure 400 {object} server.ProblemDetails
// @Failure 409 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/resources [post]
func (h *aclAdminHandler) createResource(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
var req createResourceRequest
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
server.WriteProblem(w, http.StatusBadRequest, "/errors/invalid-request-body", "Invalid request body", "Body is not valid JSON", r)
return
}
resourceID, err := h.a.CreateResource(req.Key)
if err != nil {
slog.Error("Failed to create resource", "error", err)
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "acl service is not initialized", r)
case acl.ErrInvalidResourceKey:
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-resource-key", "Invalid resource key", "Resource key must be non-empty", r)
case acl.ErrResourceAlreadyExists:
server.WriteProblem(w, http.StatusConflict, "/errors/acl/resource-already-exists", "Resource already exists", "Resource '"+req.Key+"' already exists", r)
default:
slog.Error("unexpected server error", "error", err.Error())
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
w.WriteHeader(http.StatusCreated)
_ = json.NewEncoder(w).Encode(createResourceResponse{
ID: resourceID,
Key: req.Key,
})
}
// @Summary Update resource
// @Tags acl/resources
// @Accept json
// @Produce json
// @Param resourceId path int true "Resource ID" example(1)
// @Param request body updateResourceRequest true "Resource"
// @Success 200 {object} updateResourceResponse
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 409 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/resources/{resourceId} [patch]
func (h *aclAdminHandler) updateResource(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
var req updateResourceRequest
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
server.WriteProblem(w, http.StatusBadRequest, "/errors/invalid-request-body", "Invalid request body", "Body is not valid JSON", r)
return
}
resourceIDStr := chi.URLParam(r, "resourceId")
resourceID, err := strconv.Atoi(resourceIDStr)
if err != nil || resourceID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-resource-id", "Invalid resource ID", "Resource ID must be positive integer", r)
return
}
err = h.a.UpdateResource(uint(resourceID), req.Key)
if err != nil {
slog.Error("Failed to update resource", "error", err)
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "acl service is not initialized", r)
case acl.ErrInvalidResourceKey:
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-resource-key", "Invalid resource key", "Resource key must be non-empty", r)
case acl.ErrResourceNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/resource-not-found", "Resource not found", "No resource with ID "+resourceIDStr, r)
case acl.ErrSameResourceKey:
server.WriteProblem(w, http.StatusConflict, "/errors/acl/resource-key-already-exists", "Resource key already exists", "Resource key '"+req.Key+"' already exists", r)
default:
slog.Error("unexpected server error", "error", err.Error())
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
_ = json.NewEncoder(w).Encode(updateResourceResponse{
ID: uint(resourceID),
Key: req.Key,
})
}
// @Summary Delete resource
// @Tags acl/resources
// @Produce json
// @Param resourceId path int true "Resource ID" example(1)
// @Success 200
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 409 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/resources/{resourceId} [delete]
func (h *aclAdminHandler) deleteResource(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
resourceIDStr := chi.URLParam(r, "resourceId")
resourceID, err := strconv.Atoi(resourceIDStr)
if err != nil || resourceID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-resource-id", "Invalid resource ID", "Resource ID must be positive integer", r)
return
}
err = h.a.DeleteResource(uint(resourceID))
if err != nil {
slog.Error("Failed to delete resource", "error", err)
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "acl service is not initialized", r)
case acl.ErrResourceNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/resource-not-found", "Resource not found", "No resource with ID "+resourceIDStr, r)
case acl.ErrResourceInUse:
server.WriteProblem(w, http.StatusConflict, "/errors/acl/resource-in-use", "Resource in use", "Resource "+resourceIDStr+" is in use", r)
default:
slog.Error("unexpected server error", "error", err.Error())
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
w.WriteHeader(http.StatusOK)
}

View File

@@ -0,0 +1,39 @@
package api_acladmin
/*******************************************************************/
// used in getResources()
type getResourcesResponse []struct {
ID uint `json:"id" example:"1"`
Key string `json:"key" example:"html.view"`
}
var _ getResourcesResponse // for documentation
/*******************************************************************/
// used in getResource()
type getResourceResponse struct {
ID uint `json:"id" example:"1"`
Key string `json:"key" example:"html.view"`
}
/*******************************************************************/
// used in createResource()
type createResourceRequest struct {
Key string `json:"key" example:"html.view"`
}
type createResourceResponse struct {
ID uint `json:"id" example:"1"`
Key string `json:"key" example:"html.view"`
}
/*******************************************************************/
// used in updateResource()
type updateResourceRequest struct {
Key string `json:"key" example:"html.view"`
}
type updateResourceResponse struct {
ID uint `json:"id" example:"1"`
Key string `json:"key" example:"html.view"`
}

391
api/acl_admin/roles.go Normal file
View File

@@ -0,0 +1,391 @@
package api_acladmin
import (
"encoding/json"
"log/slog"
"net/http"
"strconv"
"git.oblat.lv/alex/triggerssmith/internal/acl"
"git.oblat.lv/alex/triggerssmith/internal/server"
"github.com/go-chi/chi/v5"
)
// @Summary Get all roles
// @Tags acl/roles
// @Produce json
// @Success 200 {array} getRolesResponse
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/roles [get]
func (h *aclAdminHandler) getRoles(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
roles, err := h.a.GetRoles()
if err != nil {
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "ACL service is not initialized", r)
default:
slog.Error("unexpected server error", "error", err.Error())
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
type R struct {
ID uint `json:"id" example:"1"`
Name string `json:"name" example:"admin"`
}
resp := make([]R, 0, len(roles))
for _, role := range roles {
resp = append(resp, R{ID: role.ID, Name: role.Name})
}
_ = json.NewEncoder(w).Encode(resp)
}
// @Summary Get role by ID
// @Tags acl/roles
// @Produce json
// @Param roleId path int true "Role ID" example(1)
// @Success 200 {object} getRoleResponse
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/roles/{roleId} [get]
func (h *aclAdminHandler) getRole(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
roleIDStr := chi.URLParam(r, "roleId")
roleID, err := strconv.Atoi(roleIDStr)
if err != nil || roleID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-role-id", "Invalid role ID", "Role ID must be positive integer", r)
return
}
role, err := h.a.GetRoleByID(uint(roleID))
if err != nil {
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "ACL service is not initialized", r)
case acl.ErrRoleNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/role-not-found", "Role not found", "No role with ID "+roleIDStr, r)
default:
slog.Error("unexpected server error", "error", err.Error())
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
_ = json.NewEncoder(w).Encode(getRoleResponse{
ID: role.ID,
Name: role.Name,
})
}
// @Summary Get role users
// @Tags acl/roles
// @Produce json
// @Param roleId path int true "Role ID" example(1)
// @Success 200 {array} getRoleUsersResponse
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/roles/{roleId}/users [get]
func (h *aclAdminHandler) getRoleUsers(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
roleIDStr := chi.URLParam(r, "roleId")
roleID, err := strconv.Atoi(roleIDStr)
if err != nil || roleID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-role-id", "Invalid role ID", "Role ID must be positive integer", r)
return
}
role, err := h.a.GetRoleByID(uint(roleID))
if err != nil {
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "ACL service is not initialized", r)
case acl.ErrRoleNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/role-not-found", "Role not found", "No role with ID "+roleIDStr, r)
default:
slog.Error("unexpected server error", "error", err.Error())
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
if len(role.Users) == 0 {
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/role-has-no-users", "Role has no users", "Role has no users", r)
return
}
var respUsers getRoleUsersResponse
for _, user := range role.Users {
respUsers = append(respUsers, getRoleUser{
ID: user.ID,
Name: user.Username,
Email: user.Email,
})
}
_ = json.NewEncoder(w).Encode(respUsers)
}
// @Summary Get role resources
// @Tags acl/roles
// @Produce json
// @Param roleId path int true "Role ID" example(1)
// @Success 200 {array} getRoleResourcesResponse
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/roles/{roleId}/resources [get]
func (h *aclAdminHandler) getRoleResources(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
roleIDStr := chi.URLParam(r, "roleId")
roleID, err := strconv.Atoi(roleIDStr)
if err != nil || roleID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-role-id", "Invalid role ID", "Role ID must be positive integer", r)
return
}
role, err := h.a.GetRoleByID(uint(roleID))
if err != nil {
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "ACL service is not initialized", r)
case acl.ErrRoleNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/role-not-found", "Role not found", "No role with ID "+roleIDStr, r)
default:
slog.Error("unexpected server error", "error", err.Error())
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
if len(role.Resources) == 0 {
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/role-has-no-users", "Role has no users", "Role has no users", r)
return
}
var respResources getRoleResourcesResponse
for _, user := range role.Resources {
respResources = append(respResources, getRoleResource{
ID: user.ID,
Name: user.Key,
})
}
_ = json.NewEncoder(w).Encode(respResources)
}
// @Summary Create role
// @Tags acl/roles
// @Accept json
// @Produce json
// @Param request body createRoleRequest true "Role"
// @Success 201 {object} createRoleResponse
// @Failure 400 {object} server.ProblemDetails
// @Failure 409 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/roles [post]
func (h *aclAdminHandler) createRole(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
var req createRoleRequest
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
server.WriteProblem(w, http.StatusBadRequest, "/errors/invalid-request-body", "Invalid request body", "Body is not valid JSON", r)
return
}
roleID, err := h.a.CreateRole(req.Name)
if err != nil {
slog.Error("Failed to create role", "error", err.Error())
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "ACL service is not initialized", r)
case acl.ErrInvalidRoleName:
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-role-name", "Invalid role name", "Role name must be non-empty", r)
case acl.ErrRoleAlreadyExists:
server.WriteProblem(w, http.StatusConflict, "/errors/acl/role-already-exists", "Role already exists", "Role '"+req.Name+"' already exists", r)
default:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
w.WriteHeader(http.StatusCreated)
_ = json.NewEncoder(w).Encode(createRoleResponse{
ID: roleID,
Name: req.Name,
})
}
// @Summary Update role
// @Tags acl/roles
// @Accept json
// @Produce json
// @Param roleId path int true "Role ID" example(1)
// @Param request body updateRoleRequest true "Role"
// @Success 200 {object} updateRoleResponse
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 409 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/roles/{roleId} [patch]
func (h *aclAdminHandler) updateRole(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
var req updateRoleRequest
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
server.WriteProblem(w, http.StatusBadRequest, "/errors/invalid-request-body", "Invalid request body", "Body is not valid JSON", r)
return
}
roleIDStr := chi.URLParam(r, "roleId")
roleID, err := strconv.Atoi(roleIDStr)
if err != nil || roleID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-role-id", "Invalid role ID", "Role ID must be positive integer", r)
return
}
err = h.a.UpdateRole(uint(roleID), req.Name)
if err != nil {
slog.Error("Failed to update role", "error", err.Error())
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "ACL service is not initialized", r)
case acl.ErrInvalidRoleName:
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-role-name", "Invalid role name", "Role name must be non-empty", r)
case acl.ErrRoleNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/role-not-found", "Role not found", "No role with ID "+roleIDStr, r)
case acl.ErrSameRoleName:
server.WriteProblem(w, http.StatusConflict, "/errors/acl/role-name-already-exists", "Role name already exists", "Role '"+req.Name+"' already exists", r)
default:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
_ = json.NewEncoder(w).Encode(updateRoleResponse{
ID: uint(roleID),
Name: req.Name,
})
}
// @Summary Delete role
// @Tags acl/roles
// @Produce json
// @Param roleId path int true "Role ID" example(1)
// @Success 204
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 409 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/roles/{roleId} [delete]
func (h *aclAdminHandler) deleteRole(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
roleIDStr := chi.URLParam(r, "roleId")
roleID, err := strconv.Atoi(roleIDStr)
if err != nil || roleID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-role-id", "Invalid role ID", "Role ID must be positive integer", r)
return
}
err = h.a.DeleteRole(uint(roleID))
if err != nil {
slog.Error("Failed to delete role", "error", err.Error())
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "ACL service is not initialized", r)
case acl.ErrRoleNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/role-not-found", "Role not found", "No role with ID "+roleIDStr, r)
case acl.ErrRoleInUse:
server.WriteProblem(w, http.StatusConflict, "/errors/acl/role-in-use", "Role in use", "Role "+roleIDStr+" is assigned to at least one user and cannot be deleted", r)
default:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
w.WriteHeader(http.StatusNoContent)
}
// @Summary Assign resource to role
// @Tags acl/roles
// @Produce json
// @Param roleId path int true "Role ID" example(1)
// @Param request body assignResourceToRoleRequest true "Resource"
// @Success 201
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 409 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/roles/{roleId}/resources [post]
func (h *aclAdminHandler) assignResourceToRole(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
roleIDStr := chi.URLParam(r, "roleId")
roleID, err := strconv.Atoi(roleIDStr)
if err != nil || roleID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-role-id", "Invalid role ID", "Role ID must be positive integer", r)
return
}
var req assignResourceToRoleRequest
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-request-body", "Invalid request body", "Invalid JSON body", r)
return
}
if err := h.a.AssignResourceToRole(uint(roleID), req.ResourceID); err != nil {
slog.Error("Failed to assign resource to role", "error", err.Error())
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "ACL service is not initialized", r)
case acl.ErrRoleNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/role-not-found", "Role not found", "No role with ID "+roleIDStr, r)
case acl.ErrResourceNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/resource-not-found", "Resource not found", "No resource with ID "+strconv.Itoa(int(req.ResourceID)), r)
case acl.ErrResourceAlreadyAssigned:
server.WriteProblem(w, http.StatusConflict, "/errors/acl/resource-already-assigned", "Resource already assigned", "Resource with ID "+strconv.Itoa(int(req.ResourceID))+" is already assigned to role with ID "+roleIDStr, r)
default:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
w.WriteHeader(http.StatusCreated)
}
// @Summary Remove resource from role
// @Tags acl/roles
// @Produce json
// @Param roleId path int true "Role ID" example(1)
// @Param resId path int true "Resource ID" example(1)
// @Success 204
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/roles/{roleId}/resources/{resId} [delete]
func (h *aclAdminHandler) removeResourceFromRole(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
roleIDStr := chi.URLParam(r, "roleId")
roleID, err := strconv.Atoi(roleIDStr)
if err != nil || roleID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-role-id", "Invalid role ID", "Role ID must be positive integer", r)
return
}
resourceIDStr := chi.URLParam(r, "resId")
resourceID, err := strconv.Atoi(resourceIDStr)
if err != nil || resourceID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-resource-id", "Invalid resource ID", "Resource ID must be positive integer", r)
return
}
if err := h.a.RemoveResourceFromRole(uint(roleID), uint(resourceID)); err != nil {
slog.Error("Failed to remove resource from role", "error", err.Error())
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "ACL service is not initialized", r)
case acl.ErrRoleNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/role-not-found", "Role not found", "No role with ID "+roleIDStr, r)
case acl.ErrResourceNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/resource-not-found", "Resource not found", "No resource with ID "+strconv.Itoa(int(resourceID)), r)
case acl.ErrRoleResourceNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/role-resource-not-found", "Role resource not found", "No role-resource pair with role ID "+roleIDStr+" and resource ID "+strconv.Itoa(int(resourceID)), r)
default:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
w.WriteHeader(http.StatusNoContent)
}

View File

@@ -0,0 +1,62 @@
package api_acladmin
/*******************************************************************/
// used in getRoles()
type getRolesResponse []struct {
ID uint `json:"id" example:"1"`
Name string `json:"name" example:"admin"`
}
var _ getRolesResponse
/*******************************************************************/
// used in getRole()
type getRoleResponse struct {
ID uint `json:"id" example:"1"`
Name string `json:"name" example:"admin"`
}
/*******************************************************************/
// used in getRoleUsers()
type getRoleUser struct {
ID uint `json:"id" example:"1"`
Name string `json:"username" example:"admin"`
Email string `json:"email" example:"admin@triggerssmith.com"`
}
type getRoleUsersResponse []getRoleUser
/*******************************************************************/
// used in getRoleResources()
type getRoleResource struct {
ID uint `json:"id" example:"1"`
Name string `json:"name" example:"*"`
}
type getRoleResourcesResponse []getRoleResource
/*******************************************************************/
// used in createRole()
type createRoleRequest struct {
Name string `json:"name" example:"admin"`
}
type createRoleResponse struct {
ID uint `json:"id" example:"1"`
Name string `json:"name" example:"admin"`
}
/*******************************************************************/
// used in updateRole()
type updateRoleRequest struct {
Name string `json:"name" example:"admin"`
}
type updateRoleResponse struct {
ID uint `json:"id" example:"1"`
Name string `json:"name" example:"admin"`
}
/*******************************************************************/
// used in assignResourceToRole()
type assignResourceToRoleRequest struct {
ResourceID uint `json:"resourceId" example:"1"`
}

137
api/acl_admin/users.go Normal file
View File

@@ -0,0 +1,137 @@
package api_acladmin
import (
"encoding/json"
"log/slog"
"net/http"
"strconv"
"git.oblat.lv/alex/triggerssmith/internal/acl"
"git.oblat.lv/alex/triggerssmith/internal/server"
"github.com/go-chi/chi/v5"
)
// @Summary Get user roles by user ID
// @Tags acl/users
// @Produce json
// @Param userId path int true "User ID" example(1)
// @Success 200 {object} getUserRolesResponse
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/users/{userId}/roles [get]
func (h *aclAdminHandler) getUserRoles(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
userIDStr := chi.URLParam(r, "userId")
userID, err := strconv.Atoi(userIDStr)
if err != nil {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-user-id", "Invalid user ID", "User ID must be positive integer", r)
return
}
roles, err := h.a.GetUserRoles(uint(userID))
if err != nil {
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "ACL service is not initialized", r)
case acl.ErrUserNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/user-not-found", "User not found", "User not found", r)
case acl.ErrRoleNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/no-role-found", "No role found", "No role found for user "+strconv.Itoa(userID), r)
default:
slog.Error("unexpected server error", "error", err.Error())
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
resp := make(getUserRolesResponse, 0, len(roles))
for _, role := range roles {
resp = append(resp, getUserRole{ID: role.ID, Name: role.Name})
}
_ = json.NewEncoder(w).Encode(resp)
}
// @Summary Assign role to user
// @Tags acl/users
// @Produce json
// @Param userId path int true "User ID" example(1)
// @Param body body assignRoleToUserRequest true "Role ID"
// @Success 201
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 409 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/users/{userId}/roles [post]
func (h *aclAdminHandler) assignRoleToUser(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
userIDStr := chi.URLParam(r, "userId")
userID, err := strconv.Atoi(userIDStr)
if err != nil || userID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-user-id", "Invalid user ID", "User ID must be positive integer", r)
return
}
var req assignRoleToUserRequest
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-request-body", "Invalid request body", "Invalid JSON body", r)
return
}
if err := h.a.AssignRoleToUser(req.RoleID, uint(userID)); err != nil {
slog.Error("Failed to assign role to user", "error", err.Error())
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "ACL service is not initialized", r)
case acl.ErrUserNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/user-not-found", "User not found", "User not found", r)
case acl.ErrRoleNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/no-role-found", "No role found", "No role found for user "+strconv.Itoa(userID), r)
case acl.ErrRoleAlreadyAssigned:
server.WriteProblem(w, http.StatusConflict, "/errors/acl/role-already-assigned", "Role already assigned", "Role with ID "+strconv.Itoa(int(req.RoleID))+" is already assigned to user "+strconv.Itoa(userID), r)
default:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
w.WriteHeader(http.StatusCreated)
}
// @Summary Remove role from user
// @Tags acl/users
// @Produce json
// @Param userId path int true "User ID" example(1)
// @Param roleId path int true "Role ID" example(1)
// @Success 204
// @Failure 400 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/acl/users/{userId}/roles/{roleId} [delete]
func (h *aclAdminHandler) removeRoleFromUser(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
userIDStr := chi.URLParam(r, "userId")
userID, err := strconv.Atoi(userIDStr)
if err != nil || userID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-user-id", "Invalid user ID", "User ID must be positive integer", r)
return
}
roleIDStr := chi.URLParam(r, "roleId")
roleID, err := strconv.Atoi(roleIDStr)
if err != nil || roleID < 0 {
server.WriteProblem(w, http.StatusBadRequest, "/errors/acl/invalid-role-id", "Invalid role ID", "Role ID must be positive integer", r)
return
}
err = h.a.RemoveRoleFromUser(uint(roleID), uint(userID))
if err != nil {
slog.Error("Failed to remove role from user", "error", err.Error())
switch err {
case acl.ErrNotInitialized:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "ACL service is not initialized", r)
case acl.ErrUserNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/user-not-found", "User not found", "User not found", r)
case acl.ErrRoleNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/no-role-found", "No role found", "No role found for user "+strconv.Itoa(userID), r)
case acl.ErrUserRoleNotFound:
server.WriteProblem(w, http.StatusNotFound, "/errors/acl/user-role-not-found", "User role not found", "User "+strconv.Itoa(userID)+" does not have role "+strconv.Itoa(roleID), r)
default:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
}
w.WriteHeader(http.StatusNoContent)
}

View File

@@ -0,0 +1,16 @@
package api_acladmin
/*******************************************************************/
// used in getUserRoles()
type getUserRole struct {
ID uint `json:"id" example:"1"`
Name string `json:"name" example:"*"`
}
type getUserRolesResponse []getUserRole
/*******************************************************************/
// used in assignRoleToUser()
type assignRoleToUserRequest struct {
RoleID uint `json:"roleId" example:"1"`
}

7
api/auth/errors.go Normal file
View File

@@ -0,0 +1,7 @@
package api_auth
const (
ErrorInvalidCredentials = "INVALID_CREDENTIALS"
ErrorInvalidToken = "INVALID_TOKEN"
ErrorExpiredToken = "EXPIRED_TOKEN"
)

35
api/auth/get_user_data.go Normal file
View File

@@ -0,0 +1,35 @@
package api_auth
import (
"encoding/json"
"net/http"
)
type GetUserDataResponse struct {
UserID uint `json:"id"`
Username string `json:"username"`
Email string `json:"email"`
}
func (h *authHandler) handleGetUserData(w http.ResponseWriter, r *http.Request) {
by := r.URL.Query().Get("by")
value := r.URL.Query().Get("value")
if value == "" {
value = r.URL.Query().Get(by)
}
user, err := h.a.Get(by, value)
if err != nil {
http.Error(w, "Failed to get user", http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(meResponse{
UserID: user.ID,
Username: user.Username,
Email: user.Email,
})
if err != nil {
http.Error(w, "Failed to encode response", http.StatusInternalServerError)
return
}
}

View File

@@ -3,23 +3,19 @@
package api_auth package api_auth
import ( import (
"encoding/json"
"fmt"
"net/http" "net/http"
"time" "time"
"git.oblat.lv/alex/triggerssmith/internal/auth" "git.oblat.lv/alex/triggerssmith/internal/auth"
"git.oblat.lv/alex/triggerssmith/internal/config" "git.oblat.lv/alex/triggerssmith/internal/config"
"git.oblat.lv/alex/triggerssmith/internal/server"
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
"github.com/golang-jwt/jwt/v5"
) )
func setRefreshCookie(w http.ResponseWriter, token string, ttl time.Duration, secure bool) { func setRefreshCookie(w http.ResponseWriter, token string, ttl time.Duration, secure bool) {
http.SetCookie(w, &http.Cookie{ http.SetCookie(w, &http.Cookie{
Name: "refresh_token", Name: "refresh_token",
Value: token, Value: token,
Path: "/api/auth/refresh", Path: "/api/auth/",
HttpOnly: true, HttpOnly: true,
SameSite: http.SameSiteLaxMode, SameSite: http.SameSiteLaxMode,
MaxAge: int(ttl.Seconds()), MaxAge: int(ttl.Seconds()),
@@ -57,163 +53,3 @@ func MustRoute(config *config.Config, authService *auth.Service) func(chi.Router
r.Post("/revoke", h.handleRevoke) // not implemented r.Post("/revoke", h.handleRevoke) // not implemented
} }
} }
type registerRequest struct {
Username string `json:"username"`
Email string `json:"email"`
Password string `json:"password"`
}
type registerResponse struct {
UserID int64 `json:"id"`
Username string `json:"username"`
}
func (h *authHandler) handleRegister(w http.ResponseWriter, r *http.Request) {
var req registerRequest
err := json.NewDecoder(r.Body).Decode(&req)
if err != nil {
http.Error(w, "Invalid request payload", http.StatusBadRequest)
return
}
user, err := h.a.Register(req.Username, req.Email, req.Password)
if err != nil {
http.Error(w, "Registration failed", http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(registerResponse{
UserID: user.ID,
Username: user.Username,
})
if err != nil {
http.Error(w, "Failed to encode response", http.StatusInternalServerError)
return
}
}
type loginRequest struct {
Username string `json:"username"`
Password string `json:"password"`
}
type loginResponse struct {
Token string `json:"accessToken"`
}
func (h *authHandler) handleLogin(w http.ResponseWriter, r *http.Request) {
var req loginRequest
err := json.NewDecoder(r.Body).Decode(&req)
if err != nil {
http.Error(w, "Invalid request payload", http.StatusBadRequest)
return
}
tokens, err := h.a.Login(req.Username, req.Password)
if err != nil {
http.Error(w, "Authentication failed", http.StatusUnauthorized)
return
}
setRefreshCookie(w, tokens.Refresh, h.cfg.Auth.RefreshTokenTTL, false)
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(loginResponse{Token: tokens.Access})
if err != nil {
http.Error(w, "Failed to encode response", http.StatusInternalServerError)
return
}
}
func (h *authHandler) handleLogout(w http.ResponseWriter, r *http.Request) {
claims, err := h.a.AuthenticateRequest(r)
if err != nil {
w.WriteHeader(http.StatusUnauthorized)
return
}
rjti := claims.(jwt.MapClaims)["rjti"].(string)
err = h.a.Logout(rjti)
if err != nil {
http.Error(w, "Failed to logout, taking cookie anyways", http.StatusInternalServerError)
}
http.SetCookie(w, &http.Cookie{
Name: "refresh_token",
Value: "",
MaxAge: -1,
Path: "/api/users/refresh",
HttpOnly: true,
SameSite: http.SameSiteLaxMode,
})
if err == nil {
w.WriteHeader(http.StatusOK)
}
}
type meResponse struct {
UserID int64 `json:"id"`
Username string `json:"username"`
Email string `json:"email"`
}
func (h *authHandler) handleMe(w http.ResponseWriter, r *http.Request) {
refresh_token_cookie, err := r.Cookie("refresh_token")
if err != nil {
w.WriteHeader(http.StatusUnauthorized)
return
}
userID, err := h.a.ValidateRefreshToken(refresh_token_cookie.Value)
if err != nil {
w.WriteHeader(http.StatusUnauthorized)
return
}
user, err := h.a.Get("id", fmt.Sprint(userID))
if err != nil {
http.Error(w, "Failed to get user", http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(meResponse{
UserID: user.ID,
Username: user.Username,
Email: user.Email,
})
if err != nil {
http.Error(w, "Failed to encode response", http.StatusInternalServerError)
return
}
}
type GetUserDataResponse meResponse
func (h *authHandler) handleGetUserData(w http.ResponseWriter, r *http.Request) {
by := r.URL.Query().Get("by")
value := r.URL.Query().Get("value")
if value == "" {
value = r.URL.Query().Get(by)
}
user, err := h.a.Get(by, value)
if err != nil {
http.Error(w, "Failed to get user", http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(meResponse{
UserID: user.ID,
Username: user.Username,
Email: user.Email,
})
if err != nil {
http.Error(w, "Failed to encode response", http.StatusInternalServerError)
return
}
}
func (h *authHandler) handleRevoke(w http.ResponseWriter, r *http.Request) {
server.NotImplemented(w)
}
func (h *authHandler) handleRefresh(w http.ResponseWriter, r *http.Request) {
server.NotImplemented(w)
}

55
api/auth/login.go Normal file
View File

@@ -0,0 +1,55 @@
package api_auth
import (
"encoding/json"
"fmt"
"log/slog"
"net/http"
"git.oblat.lv/alex/triggerssmith/internal/auth"
"git.oblat.lv/alex/triggerssmith/internal/server"
)
type loginRequest struct {
Username string `json:"username"`
Password string `json:"password"`
}
type loginResponse struct {
Token string `json:"accessToken"`
}
// @Summary Login
// @Tags auth
// @Produce json
// @Param request body loginRequest true "Login request"
// @Success 200 {object} loginResponse
// @Failure 400 {object} server.ProblemDetails
// @Failure 401 {object} server.ProblemDetails
// @Router /api/auth/login [post]
func (h *authHandler) handleLogin(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
var req loginRequest
err := json.NewDecoder(r.Body).Decode(&req)
if err != nil {
server.WriteProblem(w, http.StatusBadRequest, "/errors/invalid-request-body", "Invalid request body", "Body is not valid JSON", r)
return
}
tokens, err := h.a.Login(req.Username, req.Password)
if err != nil {
slog.Error("Login failed", "error", err.Error())
switch err {
case auth.ErrInvalidUsername:
server.WriteProblem(w, http.StatusUnauthorized, "/errors/auth/invalid-credentials", "Invalid credentials", fmt.Sprintf("User with username %s not found", req.Username), r)
case auth.ErrInvalidPassword:
server.WriteProblem(w, http.StatusUnauthorized, "/errors/auth/invalid-credentials", "Invalid credentials", fmt.Sprintf("Invalid password for user %s", req.Username), r)
default:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error", r)
}
return
}
setRefreshCookie(w, tokens.Refresh, h.cfg.Auth.RefreshTokenTTL, false)
_ = json.NewEncoder(w).Encode(loginResponse{Token: tokens.Access})
}

82
api/auth/logout.go Normal file
View File

@@ -0,0 +1,82 @@
package api_auth
import (
"errors"
"fmt"
"log/slog"
"net/http"
"git.oblat.lv/alex/triggerssmith/internal/auth"
"git.oblat.lv/alex/triggerssmith/internal/server"
"github.com/golang-jwt/jwt/v5"
)
// @Summary Logout
// @Description Requires valid refresh token
// @Tags auth
// @Success 204
// @Failure 401 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/auth/logout [post]
func (h *authHandler) handleLogout(w http.ResponseWriter, r *http.Request) {
// claims, err := h.a.AuthenticateRequest(r)
// if err != nil {
// slog.Error("failed to AuthenticateRequest", "error", err.Error())
// switch err {
// case auth.ErrInvalidToken:
// server.WriteProblem(w, http.StatusUnauthorized, "/errors/auth/invalid-token", "Invalid token", "Invalid token: taking cookies anyways", r)
// case auth.ErrTokenIsMissing:
// server.WriteProblem(w, http.StatusUnauthorized, "/errors/auth/invalid-token", "Invalid token", "Token is missing: taking cookies anyway", r)
// default:
// server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error: taking cookies anyway", r)
// }
// http.SetCookie(w, &http.Cookie{
// Name: "refresh_token",
// Value: "",
// MaxAge: -1,
// Path: "/api/auth/",
// HttpOnly: true,
// SameSite: http.SameSiteLaxMode,
// })
// return
// }
// rjti := claims.(jwt.MapClaims)["rjti"].(string)
refreshCookie, err := r.Cookie("refresh_token")
if err != nil && errors.Is(err, http.ErrNoCookie) {
server.WriteProblem(w, http.StatusUnauthorized, "/errors/auth/refresh-token-not-found", "Refresh token is missing", "Refresh token is missing", r)
return
}
refreshStr := refreshCookie.Value
if refreshStr == "" {
server.WriteProblem(w, http.StatusUnauthorized, "/errors/auth/refresh-token-not-found", "Refresh token is missing", "Refresh token is missing", r)
return
}
claims, err := h.a.ValidateRefreshToken(refreshStr)
if err != nil {
slog.Error("failed to ValidateRefreshToken", "error", err.Error())
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error while validating refresh token: maybe invalid", r)
return
}
rjti := claims.(jwt.MapClaims)["jti"].(string)
err = h.a.Logout(rjti)
if err != nil {
slog.Error("failed to Logout", "error", err.Error())
switch err {
case auth.ErrInvalidToken:
server.WriteProblem(w, http.StatusUnauthorized, "/errors/auth/already-revoked", "Token already revoked", fmt.Sprintf("Token with rjti '%s' is already revoked", rjti), r)
default:
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error: taking cookies anyway", r)
}
}
http.SetCookie(w, &http.Cookie{
Name: "refresh_token",
Value: "",
MaxAge: -1,
Path: "/api/auth/",
HttpOnly: true,
SameSite: http.SameSiteLaxMode,
})
if err == nil {
w.WriteHeader(http.StatusNoContent)
}
}

42
api/auth/me.go Normal file
View File

@@ -0,0 +1,42 @@
package api_auth
import (
"net/http"
"git.oblat.lv/alex/triggerssmith/internal/server"
)
type meResponse struct {
UserID uint `json:"id"`
Username string `json:"username"`
Email string `json:"email"`
}
func (h *authHandler) handleMe(w http.ResponseWriter, r *http.Request) {
server.NotImplemented(w)
// refresh_token_cookie, err := r.Cookie("refresh_token")
// if err != nil {
// w.WriteHeader(http.StatusUnauthorized)
// return
// }
// userID, err := h.a.ValidateRefreshToken(refresh_token_cookie.Value)
// if err != nil {
// w.WriteHeader(http.StatusUnauthorized)
// return
// }
// user, err := h.a.Get("id", fmt.Sprint(userID))
// if err != nil {
// http.Error(w, "Failed to get user", http.StatusInternalServerError)
// return
// }
// w.Header().Set("Content-Type", "application/json")
// err = json.NewEncoder(w).Encode(meResponse{
// UserID: user.ID,
// Username: user.Username,
// Email: user.Email,
// })
// if err != nil {
// http.Error(w, "Failed to encode response", http.StatusInternalServerError)
// return
// }
}

56
api/auth/refresh.go Normal file
View File

@@ -0,0 +1,56 @@
package api_auth
import (
"encoding/json"
"errors"
"net/http"
"git.oblat.lv/alex/triggerssmith/internal/auth"
"git.oblat.lv/alex/triggerssmith/internal/server"
)
type refreshResponse struct {
Access string `json:"accessToken"`
}
// @Summary Refresh tokens
// @Description Requires valid HttpOnly refresh_token cookie
// @Tags auth
// @Produce json
// @Security RefreshCookieAuth
// @Success 200 {object} refreshResponse
// @Failure 401 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/auth/refresh [post]
func (h *authHandler) handleRefresh(w http.ResponseWriter, r *http.Request) {
refreshCookie, err := r.Cookie("refresh_token")
if err != nil && errors.Is(err, http.ErrNoCookie) {
server.WriteProblem(w, http.StatusUnauthorized, "/errors/auth/refresh-token-not-found", "Refresh token is missing", "Refresh token is missing", r)
return
}
refreshStr := refreshCookie.Value
if refreshStr == "" {
server.WriteProblem(w, http.StatusUnauthorized, "/errors/auth/refresh-token-not-found", "Refresh token is missing", "Refresh token is missing", r)
return
}
tokens, err := h.a.RefreshTokens(refreshStr)
if err != nil {
if errors.Is(err, auth.ErrInvalidToken) {
server.WriteProblem(w, http.StatusUnauthorized, "/errors/auth/refresh-token-invalid", "Refresh token is invalid", "Refresh token is invalid", r)
} else {
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "unexpected error: taking cookies anyway", r)
}
return
}
http.SetCookie(w, &http.Cookie{
Name: "refresh_token",
Value: tokens.Refresh,
MaxAge: 3600,
Path: "/api/auth/refresh",
HttpOnly: true,
SameSite: http.SameSiteLaxMode,
})
var resp refreshResponse
resp.Access = tokens.Access
_ = json.NewEncoder(w).Encode(resp)
}

45
api/auth/register.go Normal file
View File

@@ -0,0 +1,45 @@
package api_auth
import (
"encoding/json"
"log/slog"
"net/http"
)
type registerRequest struct {
Username string `json:"username"`
Email string `json:"email"`
Password string `json:"password"`
}
type registerResponse struct {
UserID uint `json:"id"`
Username string `json:"username"`
}
func (h *authHandler) handleRegister(w http.ResponseWriter, r *http.Request) {
var req registerRequest
err := json.NewDecoder(r.Body).Decode(&req)
if err != nil {
http.Error(w, "Invalid request payload", http.StatusBadRequest)
return
}
user, err := h.a.Register(req.Username, req.Email, req.Password)
if err != nil {
slog.Error("Failed to register user", "error", err)
http.Error(w, "Registration failed", http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(registerResponse{
UserID: user.ID,
Username: user.Username,
})
if err != nil {
http.Error(w, "Failed to encode response", http.StatusInternalServerError)
return
}
w.WriteHeader(http.StatusCreated)
}

11
api/auth/revoke.go Normal file
View File

@@ -0,0 +1,11 @@
package api_auth
import (
"net/http"
"git.oblat.lv/alex/triggerssmith/internal/server"
)
func (h *authHandler) handleRevoke(w http.ResponseWriter, r *http.Request) {
server.NotImplemented(w)
}

View File

@@ -16,6 +16,7 @@ import (
"path/filepath" "path/filepath"
"git.oblat.lv/alex/triggerssmith/internal/config" "git.oblat.lv/alex/triggerssmith/internal/config"
"git.oblat.lv/alex/triggerssmith/internal/server"
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
) )
@@ -41,16 +42,26 @@ func MustRoute(config *config.Config) func(chi.Router) {
} }
} }
// @Summary Get block
// @Tags block
// @Produce json
// @Param blockPath path string true "Block Path" example(menu)
// @Success 200 {object} Block
// @Failure 403 {object} server.ProblemDetails
// @Failure 404 {object} server.ProblemDetails
// @Failure 500 {object} server.ProblemDetails
// @Router /api/block/{blockPath} [get]
func (h *blockHandler) handleBlock(w http.ResponseWriter, r *http.Request) { func (h *blockHandler) handleBlock(w http.ResponseWriter, r *http.Request) {
if !h.cfg.Server.BlockConfig.Enabled { if !h.cfg.Server.BlockConfig.Enabled {
http.Error(w, "Block serving is disabled", http.StatusForbidden) server.WriteProblem(w, http.StatusForbidden, "/errors/block/block-serving-disabled", "Block serving is disabled", "Block serving is disabled", r)
return return
} }
blockPath := r.URL.Path[len("/api/block/"):] blockPath := r.URL.Path[len("/api/block/"):]
block, err := LoadBlock(blockPath, h.cfg) block, err := LoadBlock(blockPath, h.cfg)
if err != nil { if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError) slog.Error("failed to load block", slog.String("path", blockPath), slog.String("err", err.Error()))
server.WriteProblem(w, http.StatusInternalServerError, "/errors/internal-server-error", "Internal Server Error", "failed to load block", r)
return return
} }
w.Header().Set("Content-Type", "application/json") w.Header().Set("Content-Type", "application/json")

View File

@@ -11,12 +11,15 @@ import (
api_acladmin "git.oblat.lv/alex/triggerssmith/api/acl_admin" api_acladmin "git.oblat.lv/alex/triggerssmith/api/acl_admin"
api_auth "git.oblat.lv/alex/triggerssmith/api/auth" api_auth "git.oblat.lv/alex/triggerssmith/api/auth"
api_block "git.oblat.lv/alex/triggerssmith/api/block" api_block "git.oblat.lv/alex/triggerssmith/api/block"
_ "git.oblat.lv/alex/triggerssmith/docs"
"git.oblat.lv/alex/triggerssmith/internal/acl" "git.oblat.lv/alex/triggerssmith/internal/acl"
"git.oblat.lv/alex/triggerssmith/internal/auth" "git.oblat.lv/alex/triggerssmith/internal/auth"
"git.oblat.lv/alex/triggerssmith/internal/config" "git.oblat.lv/alex/triggerssmith/internal/config"
"git.oblat.lv/alex/triggerssmith/internal/server"
"git.oblat.lv/alex/triggerssmith/internal/vars" "git.oblat.lv/alex/triggerssmith/internal/vars"
"github.com/go-chi/chi/v5" "github.com/go-chi/chi/v5"
"github.com/go-chi/chi/v5/middleware" "github.com/go-chi/chi/v5/middleware"
httpSwagger "github.com/swaggo/http-swagger"
) )
type Router struct { type Router struct {
@@ -57,6 +60,7 @@ func NewRouter(deps RouterDependencies) *Router {
// RouteHandler sets up the routes and middleware for the router. // RouteHandler sets up the routes and middleware for the router.
// TODO: implement hot reload for static files enabled/disabled // TODO: implement hot reload for static files enabled/disabled
func (r *Router) MustRoute() chi.Router { func (r *Router) MustRoute() chi.Router {
r.r.Use(middleware.RealIP)
r.r.Use(middleware.Logger) r.r.Use(middleware.Logger)
r.r.Use(middleware.Recoverer) r.r.Use(middleware.Recoverer)
r.r.Use(middleware.Timeout(r.cfg.Server.TimeoutSeconds)) r.r.Use(middleware.Timeout(r.cfg.Server.TimeoutSeconds))
@@ -66,7 +70,7 @@ func (r *Router) MustRoute() chi.Router {
slog.String("dir", r.cfg.Server.StaticConfig.Dir), slog.String("dir", r.cfg.Server.StaticConfig.Dir),
slog.String("index_file", r.cfg.Server.StaticConfig.IndexFile), slog.String("index_file", r.cfg.Server.StaticConfig.IndexFile),
) )
r.r.Get("/", func(w http.ResponseWriter, req *http.Request) { r.r.Get("/*", func(w http.ResponseWriter, req *http.Request) {
http.ServeFile(w, req, filepath.Join(r.cfg.Server.StaticConfig.Dir, r.cfg.Server.StaticConfig.IndexFile)) http.ServeFile(w, req, filepath.Join(r.cfg.Server.StaticConfig.Dir, r.cfg.Server.StaticConfig.IndexFile))
}) })
fs := http.FileServer(http.Dir(r.cfg.Server.StaticConfig.Dir)) fs := http.FileServer(http.Dir(r.cfg.Server.StaticConfig.Dir))
@@ -82,10 +86,13 @@ func (r *Router) MustRoute() chi.Router {
} }
r.r.Route("/api", func(api chi.Router) { r.r.Route("/api", func(api chi.Router) {
api.Get("/swagger/*", httpSwagger.Handler(
httpSwagger.URL("/api/swagger/doc.json"),
))
api.Route("/block", api_block.MustRoute(r.cfg)) api.Route("/block", api_block.MustRoute(r.cfg))
authRoute := api_auth.MustRoute(r.cfg, r.authService) authRoute := api_auth.MustRoute(r.cfg, r.authService)
api.Route("/auth", authRoute) api.Route("/auth", authRoute)
api.Route("/users", authRoute) // legacy support //api.Route("/users", authRoute) // legacy support
aclAdminRoute := api_acladmin.MustRoute(r.cfg, r.aclService, r.authService) aclAdminRoute := api_acladmin.MustRoute(r.cfg, r.aclService, r.authService)
api.Route("/acl", aclAdminRoute) api.Route("/acl", aclAdminRoute)
api.Route("/acl-admin", aclAdminRoute) // legacy support api.Route("/acl-admin", aclAdminRoute) // legacy support
@@ -101,6 +108,14 @@ func (r *Router) MustRoute() chi.Router {
}) })
w.Write([]byte(b)) w.Write([]byte(b))
}) })
r.r.NotFound(func(w http.ResponseWriter, req *http.Request) {
w.Header().Set("Content-Type", "application/problem+json")
server.WriteProblem(w, http.StatusNotFound, "/errors/not-found", "Not found", "Requested page not found", req)
})
r.r.MethodNotAllowed(func(w http.ResponseWriter, req *http.Request) {
w.Header().Set("Content-Type", "application/problem+json")
server.WriteProblem(w, http.StatusMethodNotAllowed, "/errors/method-not-allowed", "Method not allowed", "Requested method not allowed", req)
})
//r.r.Handle("/invoke/function/{function_id}/{function_version}", invoke.InvokeHandler(r.cfg)) //r.r.Handle("/invoke/function/{function_id}/{function_version}", invoke.InvokeHandler(r.cfg))
return r.r return r.r
} }

View File

@@ -202,7 +202,7 @@ var serveCmd = &cobra.Command{
} }
// also acl !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! // also acl !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
userData, err := gorm.Open(sqlite.Open(filepath.Join(cfg.Data.DataPath, "user_data.sqlite3")), &gorm.Config{}) userData, err := gorm.Open(sqlite.Open(filepath.Join(cfg.Data.DataPath, "user_data.sqlite3")+"?_foreign_keys=on"), &gorm.Config{})
if err != nil { if err != nil {
slog.Error("Failed to open user database", slog.String("error", err.Error())) slog.Error("Failed to open user database", slog.String("error", err.Error()))
return return

27
go.mod
View File

@@ -5,15 +5,32 @@ go 1.24.9
require ( require (
github.com/akyaiy/GSfass/core v0.0.0-20251115194535-2b7489bfc204 github.com/akyaiy/GSfass/core v0.0.0-20251115194535-2b7489bfc204
github.com/spf13/cobra v1.10.1 github.com/spf13/cobra v1.10.1
github.com/swaggo/http-swagger v1.3.4
github.com/swaggo/swag v1.16.6
golang.org/x/crypto v0.46.0
) )
require golang.org/x/crypto v0.46.0 // indirect require (
github.com/KyleBanks/depth v1.2.1 // indirect
github.com/go-openapi/jsonpointer v0.19.5 // indirect
github.com/go-openapi/jsonreference v0.20.0 // indirect
github.com/go-openapi/spec v0.20.6 // indirect
github.com/go-openapi/swag v0.19.15 // indirect
github.com/josharian/intern v1.0.0 // indirect
github.com/mailru/easyjson v0.7.6 // indirect
github.com/swaggo/files v0.0.0-20220610200504-28940afbdbfe // indirect
golang.org/x/mod v0.30.0 // indirect
golang.org/x/net v0.47.0 // indirect
golang.org/x/sync v0.19.0 // indirect
golang.org/x/tools v0.39.0 // indirect
gopkg.in/yaml.v2 v2.4.0 // indirect
)
require ( require (
github.com/fsnotify/fsnotify v1.9.0 // indirect github.com/fsnotify/fsnotify v1.9.0 // indirect
github.com/go-chi/chi/v5 v5.2.3 // indirect github.com/go-chi/chi/v5 v5.2.3
github.com/go-viper/mapstructure/v2 v2.4.0 // indirect github.com/go-viper/mapstructure/v2 v2.4.0 // indirect
github.com/golang-jwt/jwt/v5 v5.3.0 // indirect github.com/golang-jwt/jwt/v5 v5.3.0
github.com/google/uuid v1.6.0 github.com/google/uuid v1.6.0
github.com/inconshreveable/mousetrap v1.1.0 // indirect github.com/inconshreveable/mousetrap v1.1.0 // indirect
github.com/jinzhu/inflection v1.0.0 // indirect github.com/jinzhu/inflection v1.0.0 // indirect
@@ -30,6 +47,6 @@ require (
go.yaml.in/yaml/v3 v3.0.4 // indirect go.yaml.in/yaml/v3 v3.0.4 // indirect
golang.org/x/sys v0.39.0 // indirect golang.org/x/sys v0.39.0 // indirect
golang.org/x/text v0.32.0 // indirect golang.org/x/text v0.32.0 // indirect
gorm.io/driver/sqlite v1.6.0 // indirect gorm.io/driver/sqlite v1.6.0
gorm.io/gorm v1.31.1 // indirect gorm.io/gorm v1.31.1
) )

62
go.sum
View File

@@ -1,6 +1,10 @@
github.com/KyleBanks/depth v1.2.1 h1:5h8fQADFrWtarTdtDudMmGsC7GPbOAu6RVB3ffsVFHc=
github.com/KyleBanks/depth v1.2.1/go.mod h1:jzSb9d0L43HxTQfT+oSA1EEp2q+ne2uh6XgeJcm8brE=
github.com/akyaiy/GSfass/core v0.0.0-20251115194535-2b7489bfc204 h1:tvG9DIB1e58sWfDbYLdgOcXRdyZxSYy/wk2VHJHgzec= github.com/akyaiy/GSfass/core v0.0.0-20251115194535-2b7489bfc204 h1:tvG9DIB1e58sWfDbYLdgOcXRdyZxSYy/wk2VHJHgzec=
github.com/akyaiy/GSfass/core v0.0.0-20251115194535-2b7489bfc204/go.mod h1:Sk61563skjfIIYbmTUTJSWqGwBp9ODiBMjza8F5+UFY= github.com/akyaiy/GSfass/core v0.0.0-20251115194535-2b7489bfc204/go.mod h1:Sk61563skjfIIYbmTUTJSWqGwBp9ODiBMjza8F5+UFY=
github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g= github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g=
github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E=
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c= github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
github.com/frankban/quicktest v1.14.6 h1:7Xjx+VpznH+oBnejlPUj8oUpdxnVs4f8XU8WnHkI4W8= github.com/frankban/quicktest v1.14.6 h1:7Xjx+VpznH+oBnejlPUj8oUpdxnVs4f8XU8WnHkI4W8=
@@ -9,6 +13,16 @@ github.com/fsnotify/fsnotify v1.9.0 h1:2Ml+OJNzbYCTzsxtv8vKSFD9PbJjmhYF14k/jKC7S
github.com/fsnotify/fsnotify v1.9.0/go.mod h1:8jBTzvmWwFyi3Pb8djgCCO5IBqzKJ/Jwo8TRcHyHii0= github.com/fsnotify/fsnotify v1.9.0/go.mod h1:8jBTzvmWwFyi3Pb8djgCCO5IBqzKJ/Jwo8TRcHyHii0=
github.com/go-chi/chi/v5 v5.2.3 h1:WQIt9uxdsAbgIYgid+BpYc+liqQZGMHRaUwp0JUcvdE= github.com/go-chi/chi/v5 v5.2.3 h1:WQIt9uxdsAbgIYgid+BpYc+liqQZGMHRaUwp0JUcvdE=
github.com/go-chi/chi/v5 v5.2.3/go.mod h1:L2yAIGWB3H+phAw1NxKwWM+7eUH/lU8pOMm5hHcoops= github.com/go-chi/chi/v5 v5.2.3/go.mod h1:L2yAIGWB3H+phAw1NxKwWM+7eUH/lU8pOMm5hHcoops=
github.com/go-openapi/jsonpointer v0.19.3/go.mod h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
github.com/go-openapi/jsonpointer v0.19.5 h1:gZr+CIYByUqjcgeLXnQu2gHYQC9o73G2XUeOFYEICuY=
github.com/go-openapi/jsonpointer v0.19.5/go.mod h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
github.com/go-openapi/jsonreference v0.20.0 h1:MYlu0sBgChmCfJxxUKZ8g1cPWFOB37YSZqewK7OKeyA=
github.com/go-openapi/jsonreference v0.20.0/go.mod h1:Ag74Ico3lPc+zR+qjn4XBUmXymS4zJbYVCZmcgkasdo=
github.com/go-openapi/spec v0.20.6 h1:ich1RQ3WDbfoeTqTAb+5EIxNmpKVJZWBNah9RAT0jIQ=
github.com/go-openapi/spec v0.20.6/go.mod h1:2OpW+JddWPrpXSCIX8eOx7lZ5iyuWj3RYR6VaaBKcWA=
github.com/go-openapi/swag v0.19.5/go.mod h1:POnQmlKehdgb5mhVOsnJFsivZCEZ/vjK9gh66Z9tfKk=
github.com/go-openapi/swag v0.19.15 h1:D2NRCBzS9/pEY3gP9Nl8aDqGUcPFrwG2p+CNFrLyrCM=
github.com/go-openapi/swag v0.19.15/go.mod h1:QYRuS/SOXUCsnplDa677K7+DxSOj6IPNl/eQntq43wQ=
github.com/go-viper/mapstructure/v2 v2.4.0 h1:EBsztssimR/CONLSZZ04E8qAkxNYq4Qp9LvH92wZUgs= github.com/go-viper/mapstructure/v2 v2.4.0 h1:EBsztssimR/CONLSZZ04E8qAkxNYq4Qp9LvH92wZUgs=
github.com/go-viper/mapstructure/v2 v2.4.0/go.mod h1:oJDH3BJKyqBA2TXFhDsKDGDTlndYOZ6rGS0BRZIxGhM= github.com/go-viper/mapstructure/v2 v2.4.0/go.mod h1:oJDH3BJKyqBA2TXFhDsKDGDTlndYOZ6rGS0BRZIxGhM=
github.com/golang-jwt/jwt/v5 v5.3.0 h1:pv4AsKCKKZuqlgs5sUmn4x8UlGa0kEVt/puTpKx9vvo= github.com/golang-jwt/jwt/v5 v5.3.0 h1:pv4AsKCKKZuqlgs5sUmn4x8UlGa0kEVt/puTpKx9vvo=
@@ -23,12 +37,23 @@ github.com/jinzhu/inflection v1.0.0 h1:K317FqzuhWc8YvSVlFMCCUb36O/S9MCKRDI7QkRKD
github.com/jinzhu/inflection v1.0.0/go.mod h1:h+uFLlag+Qp1Va5pdKtLDYj+kHp5pxUVkryuEj+Srlc= github.com/jinzhu/inflection v1.0.0/go.mod h1:h+uFLlag+Qp1Va5pdKtLDYj+kHp5pxUVkryuEj+Srlc=
github.com/jinzhu/now v1.1.5 h1:/o9tlHleP7gOFmsnYNz3RGnqzefHA47wQpKrrdTIwXQ= github.com/jinzhu/now v1.1.5 h1:/o9tlHleP7gOFmsnYNz3RGnqzefHA47wQpKrrdTIwXQ=
github.com/jinzhu/now v1.1.5/go.mod h1:d3SSVoowX0Lcu0IBviAWJpolVfI5UJVZZ7cO71lE/z8= github.com/jinzhu/now v1.1.5/go.mod h1:d3SSVoowX0Lcu0IBviAWJpolVfI5UJVZZ7cO71lE/z8=
github.com/josharian/intern v1.0.0 h1:vlS4z54oSdjm0bgjRigI+G1HpF+tI+9rE5LLzOg8HmY=
github.com/josharian/intern v1.0.0/go.mod h1:5DoeVV0s6jJacbCEi61lwdGj/aVlrQvzHFFd8Hwg//Y=
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE= github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
github.com/kr/pretty v0.3.1/go.mod h1:hoEshYVHaxMs3cyo3Yncou5ZscifuDolrwPKZanG3xk= github.com/kr/pretty v0.3.1/go.mod h1:hoEshYVHaxMs3cyo3Yncou5ZscifuDolrwPKZanG3xk=
github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY= github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE= github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
github.com/mailru/easyjson v0.0.0-20190614124828-94de47d64c63/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
github.com/mailru/easyjson v0.0.0-20190626092158-b2ccc519800e/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
github.com/mailru/easyjson v0.7.6 h1:8yTIVnZgCoiM1TgqoeTl+LfU5Jg6/xL3QhGQnimLYnA=
github.com/mailru/easyjson v0.7.6/go.mod h1:xzfreul335JAWq5oZzymOObrkdz5UnU4kGfJJLY9Nlc=
github.com/mattn/go-sqlite3 v1.14.22 h1:2gZY6PC6kBnID23Tichd1K+Z0oS6nE/XwU+Vz/5o4kU= github.com/mattn/go-sqlite3 v1.14.22 h1:2gZY6PC6kBnID23Tichd1K+Z0oS6nE/XwU+Vz/5o4kU=
github.com/mattn/go-sqlite3 v1.14.22/go.mod h1:Uh1q+B4BYcTPb+yiD3kU8Ct7aC0hY9fxUwlHK0RXw+Y= github.com/mattn/go-sqlite3 v1.14.22/go.mod h1:Uh1q+B4BYcTPb+yiD3kU8Ct7aC0hY9fxUwlHK0RXw+Y=
github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e h1:fD57ERR4JtEqsWbfPhv4DMiApHyliiK5xCTNVSPiaAs=
github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno=
github.com/pelletier/go-toml/v2 v2.2.4 h1:mye9XuhQ6gvn5h28+VilKrrPoQVanw5PMw/TB0t5Ec4= github.com/pelletier/go-toml/v2 v2.2.4 h1:mye9XuhQ6gvn5h28+VilKrrPoQVanw5PMw/TB0t5Ec4=
github.com/pelletier/go-toml/v2 v2.2.4/go.mod h1:2gIqNv+qfxSVS7cM2xJQKtLSTLUE9V8t9Stt+h56mCY= github.com/pelletier/go-toml/v2 v2.2.4/go.mod h1:2gIqNv+qfxSVS7cM2xJQKtLSTLUE9V8t9Stt+h56mCY=
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
@@ -51,25 +76,50 @@ github.com/spf13/pflag v1.0.10 h1:4EBh2KAYBwaONj6b2Ye1GiHfwjqyROoF4RwYO+vPwFk=
github.com/spf13/pflag v1.0.10/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg= github.com/spf13/pflag v1.0.10/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
github.com/spf13/viper v1.21.0 h1:x5S+0EU27Lbphp4UKm1C+1oQO+rKx36vfCoaVebLFSU= github.com/spf13/viper v1.21.0 h1:x5S+0EU27Lbphp4UKm1C+1oQO+rKx36vfCoaVebLFSU=
github.com/spf13/viper v1.21.0/go.mod h1:P0lhsswPGWD/1lZJ9ny3fYnVqxiegrlNrEmgLjbTCAY= github.com/spf13/viper v1.21.0/go.mod h1:P0lhsswPGWD/1lZJ9ny3fYnVqxiegrlNrEmgLjbTCAY=
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
github.com/subosito/gotenv v1.6.0 h1:9NlTDc1FTs4qu0DDq7AEtTPNw6SVm7uBMsUCUjABIf8= github.com/subosito/gotenv v1.6.0 h1:9NlTDc1FTs4qu0DDq7AEtTPNw6SVm7uBMsUCUjABIf8=
github.com/subosito/gotenv v1.6.0/go.mod h1:Dk4QP5c2W3ibzajGcXpNraDfq2IrhjMIvMSWPKKo0FU= github.com/subosito/gotenv v1.6.0/go.mod h1:Dk4QP5c2W3ibzajGcXpNraDfq2IrhjMIvMSWPKKo0FU=
github.com/swaggo/files v0.0.0-20220610200504-28940afbdbfe h1:K8pHPVoTgxFJt1lXuIzzOX7zZhZFldJQK/CgKx9BFIc=
github.com/swaggo/files v0.0.0-20220610200504-28940afbdbfe/go.mod h1:lKJPbtWzJ9JhsTN1k1gZgleJWY/cqq0psdoMmaThG3w=
github.com/swaggo/http-swagger v1.3.4 h1:q7t/XLx0n15H1Q9/tk3Y9L4n210XzJF5WtnDX64a5ww=
github.com/swaggo/http-swagger v1.3.4/go.mod h1:9dAh0unqMBAlbp1uE2Uc2mQTxNMU/ha4UbucIg1MFkQ=
github.com/swaggo/swag v1.16.6 h1:qBNcx53ZaX+M5dxVyTrgQ0PJ/ACK+NzhwcbieTt+9yI=
github.com/swaggo/swag v1.16.6/go.mod h1:ngP2etMK5a0P3QBizic5MEwpRmluJZPHjXcMoj4Xesg=
go.yaml.in/yaml/v3 v3.0.4 h1:tfq32ie2Jv2UxXFdLJdh3jXuOzWiL1fo0bu/FbuKpbc= go.yaml.in/yaml/v3 v3.0.4 h1:tfq32ie2Jv2UxXFdLJdh3jXuOzWiL1fo0bu/FbuKpbc=
go.yaml.in/yaml/v3 v3.0.4/go.mod h1:DhzuOOF2ATzADvBadXxruRBLzYTpT36CKvDb3+aBEFg= go.yaml.in/yaml/v3 v3.0.4/go.mod h1:DhzuOOF2ATzADvBadXxruRBLzYTpT36CKvDb3+aBEFg=
golang.org/x/crypto v0.46.0 h1:cKRW/pmt1pKAfetfu+RCEvjvZkA9RimPbh7bhFjGVBU= golang.org/x/crypto v0.46.0 h1:cKRW/pmt1pKAfetfu+RCEvjvZkA9RimPbh7bhFjGVBU=
golang.org/x/crypto v0.46.0/go.mod h1:Evb/oLKmMraqjZ2iQTwDwvCtJkczlDuTmdJXoZVzqU0= golang.org/x/crypto v0.46.0/go.mod h1:Evb/oLKmMraqjZ2iQTwDwvCtJkczlDuTmdJXoZVzqU0=
golang.org/x/sys v0.29.0 h1:TPYlXGxvx1MGTn2GiZDhnjPA9wZzZeGKHHmKhHYvgaU= golang.org/x/mod v0.30.0 h1:fDEXFVZ/fmCKProc/yAXXUijritrDzahmwwefnjoPFk=
golang.org/x/sys v0.29.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= golang.org/x/mod v0.30.0/go.mod h1:lAsf5O2EvJeSFMiBxXDki7sCgAxEUcZHXoXMKT4GJKc=
golang.org/x/net v0.0.0-20210805182204-aaa1db679c0d/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
golang.org/x/net v0.47.0 h1:Mx+4dIFzqraBXUugkia1OOvlD6LemFo1ALMHjrXDOhY=
golang.org/x/net v0.47.0/go.mod h1:/jNxtkgq5yWUGYkaZGqo27cfGZ1c5Nen03aYrrKpVRU=
golang.org/x/sync v0.19.0 h1:vV+1eWNmZ5geRlYjzm2adRgW2/mcpevXNg50YZtPCE4=
golang.org/x/sync v0.19.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.39.0 h1:CvCKL8MeisomCi6qNZ+wbb0DN9E5AATixKsvNtMoMFk= golang.org/x/sys v0.39.0 h1:CvCKL8MeisomCi6qNZ+wbb0DN9E5AATixKsvNtMoMFk=
golang.org/x/sys v0.39.0/go.mod h1:OgkHotnGiDImocRcuBABYBEXf8A9a87e/uXjp9XT3ks= golang.org/x/sys v0.39.0/go.mod h1:OgkHotnGiDImocRcuBABYBEXf8A9a87e/uXjp9XT3ks=
golang.org/x/text v0.28.0 h1:rhazDwis8INMIwQ4tpjLDzUhx6RlXqZNPEM0huQojng= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
golang.org/x/text v0.28.0/go.mod h1:U8nCwOR8jO/marOQ0QbDiOngZVEBB7MAiitBuMjXiNU= golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
golang.org/x/text v0.32.0 h1:ZD01bjUt1FQ9WJ0ClOL5vxgxOI/sVCNgX1YtKwcY0mU= golang.org/x/text v0.32.0 h1:ZD01bjUt1FQ9WJ0ClOL5vxgxOI/sVCNgX1YtKwcY0mU=
golang.org/x/text v0.32.0/go.mod h1:o/rUWzghvpD5TXrTIBuJU77MTaN0ljMWE47kxGJQ7jY= golang.org/x/text v0.32.0/go.mod h1:o/rUWzghvpD5TXrTIBuJU77MTaN0ljMWE47kxGJQ7jY=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
golang.org/x/tools v0.39.0 h1:ik4ho21kwuQln40uelmciQPp9SipgNDdrafrYA4TmQQ=
golang.org/x/tools v0.39.0/go.mod h1:JnefbkDPyD8UU2kI5fuf8ZX4/yUeh9W877ZeBONxUqQ=
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15 h1:YR8cESwS4TdDjEe65xsg0ogRM/Nc3DYOhEAlW+xobZo= gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20200227125254-8fa46927fb4f h1:BLraFXnmrev5lT+xlilqcH8XK9/i0At2xKjWk4p6zsU=
gopkg.in/check.v1 v1.0.0-20200227125254-8fa46927fb4f/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
gopkg.in/yaml.v2 v2.4.0 h1:D8xgwECY7CYvx+Y2n4sBz93Jn9JRvxdiyyo8CTfuKaY=
gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gopkg.in/yaml.v3 v3.0.0-20200615113413-eeeca48fe776/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA= gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gorm.io/driver/sqlite v1.6.0 h1:WHRRrIiulaPiPFmDcod6prc4l2VGVWHz80KspNsxSfQ= gorm.io/driver/sqlite v1.6.0 h1:WHRRrIiulaPiPFmDcod6prc4l2VGVWHz80KspNsxSfQ=

27
internal/acl/errors.go Normal file
View File

@@ -0,0 +1,27 @@
package acl
// TODO: add more specific errors
import "fmt"
var (
ErrNotInitialized = fmt.Errorf("acl service is not initialized")
ErrRoleNotFound = fmt.Errorf("role not found")
ErrRoleAlreadyExists = fmt.Errorf("role already exists")
ErrInvalidRoleName = fmt.Errorf("role name is invalid")
ErrSameRoleName = fmt.Errorf("role name is the same as another role")
ErrRoleInUse = fmt.Errorf("role is in use")
ErrRoleAlreadyAssigned = fmt.Errorf("role is already assigned to user")
ErrResourceNotFound = fmt.Errorf("resource not found")
ErrResourceAlreadyExists = fmt.Errorf("resource already exists")
ErrInvalidResourceKey = fmt.Errorf("invalid resource key")
ErrResourceInUse = fmt.Errorf("resource is in use")
ErrSameResourceKey = fmt.Errorf("resource key is the same as another resource")
ErrResourceAlreadyAssigned = fmt.Errorf("resource is already assigned to role")
ErrRoleResourceNotFound = fmt.Errorf("assigned resource to role is not found")
ErrUserNotFound = fmt.Errorf("user not found")
ErrUserRoleNotFound = fmt.Errorf("user role not found")
)

View File

@@ -1,11 +1,13 @@
package acl package acl
type UserRole struct { import "git.oblat.lv/alex/triggerssmith/internal/user"
UserID uint `gorm:"primaryKey" json:"userId"`
RoleID uint `gorm:"primaryKey" json:"roleId"`
Role Role `gorm:"constraint:OnDelete:CASCADE;foreignKey:RoleID;references:ID" json:"role"` type UserRole struct {
//User user.User `gorm:"constraint:OnDelete:CASCADE;foreignKey:UserID;references:ID"` UserID uint `gorm:"index;not null;uniqueIndex:ux_user_role"`
RoleID uint `gorm:"index;not null;uniqueIndex:ux_user_role"`
Role Role `gorm:"constraint:OnDelete:CASCADE;foreignKey:RoleID;references:ID" json:"role"`
User user.User `gorm:"constraint:OnDelete:CASCADE;foreignKey:UserID;references:ID"`
} }
type Resource struct { type Resource struct {
@@ -17,8 +19,8 @@ type Role struct {
ID uint `gorm:"primaryKey;autoIncrement" json:"id"` ID uint `gorm:"primaryKey;autoIncrement" json:"id"`
Name string `gorm:"unique;not null" json:"name"` Name string `gorm:"unique;not null" json:"name"`
Resources []Resource `gorm:"many2many:role_resources" json:"resources"` Resources []Resource `gorm:"many2many:role_resources" json:"resources"`
//Users []user.User `gorm:"many2many:user_roles"` Users []user.User `gorm:"many2many:user_roles"`
} }
type RoleResource struct { type RoleResource struct {

220
internal/acl/resources.go Normal file
View File

@@ -0,0 +1,220 @@
package acl
import (
"errors"
"fmt"
"strings"
"gorm.io/gorm"
"gorm.io/gorm/clause"
)
// GetResources returns all resources.
// May return [ErrNotInitialized] or db error.
func (s *Service) GetResources() ([]Resource, error) {
if !s.isInitialized() {
return nil, ErrNotInitialized
}
var resources []Resource
if err := s.db.Order("id").Find(&resources).Error; err != nil {
return nil, fmt.Errorf("db error: %w", err)
}
return resources, nil
}
// CreateResource creates a new resource with the given key or returns existing one.
// Returns ID of created resource.
// May return [ErrNotInitialized], [ErrInvalidResourceKey], [ErrResourceAlreadyExists] or db error.
func (s *Service) CreateResource(key string) (uint, error) {
if !s.isInitialized() {
return 0, ErrNotInitialized
}
key = strings.TrimSpace(key)
if key == "" {
return 0, ErrInvalidResourceKey
}
var res Resource
if err := s.db.Where("key = ?", key).First(&res).Error; err == nil {
// already exists
return res.ID, ErrResourceAlreadyExists
} else if !errors.Is(err, gorm.ErrRecordNotFound) {
// other db error
return 0, fmt.Errorf("db error: %w", err)
}
res = Resource{Key: key}
if err := s.db.Create(&res).Error; err != nil {
return 0, fmt.Errorf("db error: %w", err)
}
return res.ID, nil
}
// GetResourceByID returns the resource with the given ID.
// May return [ErrNotInitialized], [ErrResourceNotFound] or db error.
func (s *Service) GetResourceByID(resourceID uint) (*Resource, error) {
if !s.isInitialized() {
return nil, ErrNotInitialized
}
var res Resource
if err := s.db.First(&res, resourceID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return nil, ErrResourceNotFound
}
return nil, fmt.Errorf("db error: %w", err)
}
return &res, nil
}
// UpdateResource updates the key of a resource.
// May return [ErrNotInitialized], [ErrInvalidResourceKey], [ErrResourceNotFound], [ErrSameResourceKey] or db error.
func (s *Service) UpdateResource(resourceID uint, newKey string) error {
if !s.isInitialized() {
return ErrNotInitialized
}
newKey = strings.TrimSpace(newKey)
if newKey == "" {
return ErrInvalidResourceKey
}
var res Resource
if err := s.db.First(&res, resourceID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return ErrResourceNotFound
}
return fmt.Errorf("db error: %w", err)
}
// same key?
if res.Key == newKey {
return ErrSameResourceKey
}
// check if key used by another resource
var count int64
if err := s.db.Model(&Resource{}).
Where("key = ? AND id != ?", newKey, resourceID).
Count(&count).Error; err != nil {
return fmt.Errorf("db error: %w", err)
}
if count > 0 {
return ErrSameResourceKey
}
res.Key = newKey
if err := s.db.Save(&res).Error; err != nil {
return fmt.Errorf("failed to update resource: %w", err)
}
return nil
}
// DeleteResource deletes a resource.
// May return [ErrNotInitialized], [ErrResourceNotFound], [ErrResourceInUse] or db error.
func (s *Service) DeleteResource(resourceID uint) error {
if !s.isInitialized() {
return ErrNotInitialized
}
result := s.db.Delete(&Resource{}, resourceID)
if err := result.Error; err != nil {
if strings.Contains(err.Error(), "FOREIGN KEY constraint failed") {
return ErrResourceInUse
}
return fmt.Errorf("db error: %w", err)
}
if result.RowsAffected == 0 {
return ErrResourceNotFound
}
return nil
}
// AssignResourceToRole assigns a resource to a role
// May return [ErrNotInitialized], [ErrRoleNotFound], [ErrResourceNotFound], [ErrAlreadyAssigned] or db error.
func (s *Service) AssignResourceToRole(roleID, resourceID uint) error {
if !s.isInitialized() {
return ErrNotInitialized
}
// check role exists
var r Role
if err := s.db.First(&r, roleID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return ErrRoleNotFound
}
return fmt.Errorf("failed to fetch role: %w", err)
}
// check resource exists
var res Resource
if err := s.db.First(&res, resourceID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return ErrResourceNotFound
}
return fmt.Errorf("failed to fetch resource: %w", err)
}
rr := RoleResource{
RoleID: roleID,
ResourceID: resourceID,
}
tx := s.db.Clauses(clause.OnConflict{DoNothing: true}).Create(&rr)
if tx.Error != nil {
return fmt.Errorf("failed to assign resource to role: %w", tx.Error)
}
// if nothing inserted — already assigned
if tx.RowsAffected == 0 {
return ErrResourceAlreadyAssigned
}
return nil
}
// RemoveResourceFromRole removes a resource from a role
// May return [ErrNotInitialized], [ErrRoleNotFound], [ErrResourceNotFound], [ErrRoleResourceNotFound] or db error.
func (s *Service) RemoveResourceFromRole(roleID, resourceID uint) error {
if !s.isInitialized() {
return ErrNotInitialized
}
// check role exists
var r Role
if err := s.db.First(&r, roleID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return ErrRoleNotFound
}
return fmt.Errorf("failed to fetch role: %w", err)
}
// check resource exists
var res Resource
if err := s.db.First(&res, resourceID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return ErrResourceNotFound
}
return fmt.Errorf("failed to fetch resource: %w", err)
}
tx := s.db.Where("role_id = ? AND resource_id = ?", roleID, resourceID).Delete(&RoleResource{})
if tx.Error != nil {
return fmt.Errorf("failed to remove resource from role: %w", tx.Error)
}
if tx.RowsAffected == 0 {
return ErrRoleResourceNotFound
}
return nil
}

240
internal/acl/roles.go Normal file
View File

@@ -0,0 +1,240 @@
package acl
import (
"errors"
"fmt"
"strings"
"git.oblat.lv/alex/triggerssmith/internal/user"
"gorm.io/gorm"
"gorm.io/gorm/clause"
)
// GetRoles returns all roles.
// May return [ErrNotInitialized] or db error.
func (s *Service) GetRoles() ([]Role, error) {
if !s.isInitialized() {
return nil, ErrNotInitialized
}
var roles []Role
if err := s.db.Preload("Resources").Preload("Users").Order("id").Find(&roles).Error; err != nil {
return nil, fmt.Errorf("db error: %w", err)
}
return roles, nil
}
// CreateRole creates a new role with the given name or returns existing one.
// Returns the ID of the created role.
// May return [ErrNotInitialized], [ErrInvalidRoleName], [ErrRoleAlreadyExists] or db error.
func (s *Service) CreateRole(name string) (uint, error) {
if !s.isInitialized() {
return 0, ErrNotInitialized
}
name = strings.TrimSpace(name)
if name == "" {
return 0, ErrInvalidRoleName
}
var role Role
if err := s.db.Where("name = ?", name).First(&role).Error; err == nil {
// already exists
return role.ID, ErrRoleAlreadyExists
} else if !errors.Is(err, gorm.ErrRecordNotFound) {
// other database error
return 0, fmt.Errorf("db error: %w", err)
}
role = Role{Name: name}
if err := s.db.Create(&role).Error; err != nil {
return 0, fmt.Errorf("db error: %w", err)
}
return role.ID, nil
}
// GetRoleByID returns the role with the given ID or an error.
// May return [ErrNotInitialized], [ErrRoleNotFound] or db error.
func (s *Service) GetRoleByID(roleID uint) (*Role, error) {
if !s.isInitialized() {
return nil, ErrNotInitialized
}
var role Role
err := s.db.Preload("Resources").Preload("Users").First(&role, roleID).Error
if err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return nil, ErrRoleNotFound
}
return nil, fmt.Errorf("db error: %w", err)
}
return &role, nil
}
// UpdateRole updates the name of a role.
// May return [ErrNotInitialized], [ErrInvalidRoleName], [ErrRoleNotFound], [ErrSameRoleName], or db error.
func (s *Service) UpdateRole(roleID uint, newName string) error {
if !s.isInitialized() {
return ErrNotInitialized
}
newName = strings.TrimSpace(newName)
if newName == "" {
return ErrInvalidRoleName
}
var role Role
err := s.db.First(&role, roleID).Error
if err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return ErrRoleNotFound
}
return fmt.Errorf("db error: %w", err)
}
// check for name conflicts
if role.Name == newName {
return ErrSameRoleName
}
var count int64
err = s.db.Model(&Role{}).Where("name = ? AND id != ?", newName, roleID).Count(&count).Error
if err != nil {
return fmt.Errorf("db error: %w", err)
}
if count > 0 {
return ErrSameRoleName
}
role.Name = newName
if err := s.db.Save(&role).Error; err != nil {
return fmt.Errorf("failed to update role: %w", err)
}
return nil
}
// DeleteRole deletes a role.
// May return [ErrNotInitialized], [ErrRoleNotFound], [ErrRoleInUse] or db error.
func (s *Service) DeleteRole(roleID uint) error {
if !s.isInitialized() {
return ErrNotInitialized
}
result := s.db.Delete(&Role{}, roleID)
if err := result.Error; err != nil {
if strings.Contains(err.Error(), "FOREIGN KEY constraint failed") {
return ErrRoleInUse
}
return fmt.Errorf("db error: %w", err)
}
if result.RowsAffected == 0 {
return ErrRoleNotFound
}
return nil
}
// GetUserRoles returns all roles for a given user.
// May return [ErrNotInitialized], [ErrUserNotFound], [ErrRoleNotFound] or db error.
func (s *Service) GetUserRoles(userID uint) ([]Role, error) {
if !s.isInitialized() {
return nil, ErrNotInitialized
}
var user user.User
if err := s.db.First(&user, userID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return nil, ErrUserNotFound
}
return nil, fmt.Errorf("failed to fetch user: %w", err)
}
var roles []Role
err := s.db.
Joins("JOIN user_roles ur ON ur.role_id = roles.id").
Where("ur.user_id = ?", userID).
Find(&roles).Error
if err != nil {
return nil, fmt.Errorf("failed to get user roles: %w", err)
}
if len(roles) == 0 {
return nil, ErrRoleNotFound
}
return roles, nil
}
// AssignRoleToUser assigns a role to a user.
// May return [ErrNotInitialized], [ErrUserNotFound], [ErrRoleNotFound], [ErrRoleAlreadyAssigned] or db error.
func (s *Service) AssignRoleToUser(roleID, userID uint) error {
if !s.isInitialized() {
return ErrNotInitialized
}
var user user.User
if err := s.db.First(&user, userID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return ErrUserNotFound
}
return fmt.Errorf("failed to fetch user: %w", err)
}
var r Role
if err := s.db.First(&r, roleID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return ErrRoleNotFound
}
return fmt.Errorf("failed to fetch role: %w", err)
}
ur := UserRole{
UserID: userID,
RoleID: roleID,
}
tx := s.db.Clauses(clause.OnConflict{DoNothing: true}).Create(&ur)
if tx.Error != nil {
return fmt.Errorf("failed to assign resource to role: %w", tx.Error)
}
if tx.RowsAffected == 0 {
return ErrRoleAlreadyAssigned
}
return nil
}
// RemoveRoleFromUser removes a role from a user.
// May return [ErrNotInitialized], [ErrUserNotFound], [ErrRoleNotFound], [ErrUserRoleNotFound] or db error.
func (s *Service) RemoveRoleFromUser(roleID, userID uint) error {
if !s.isInitialized() {
return ErrNotInitialized
}
var user user.User
if err := s.db.First(&user, userID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return ErrUserNotFound
}
return fmt.Errorf("failed to fetch user: %w", err)
}
var r Role
if err := s.db.First(&r, roleID).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
return ErrRoleNotFound
}
return fmt.Errorf("failed to fetch role: %w", err)
}
tx := s.db.Where("role_id = ? AND user_id = ?", roleID, userID).Delete(&UserRole{})
if tx.Error != nil {
return fmt.Errorf("failed to remove role from user: %w", tx.Error)
}
if tx.RowsAffected == 0 {
return ErrUserRoleNotFound
}
return nil
}

View File

@@ -39,105 +39,3 @@ func (s *Service) Init() error {
s.initialized = true s.initialized = true
return nil return nil
} }
// Admin crud functions
// CreateRole creates a new role with the given name
func (s *Service) CreateRole(name string) error {
if !s.isInitialized() {
return fmt.Errorf("acl service is not initialized")
}
role := Role{Name: name}
return s.db.FirstOrCreate(&role, &Role{Name: name}).Error
}
// CreateResource creates a new resource with the given key
func (s *Service) CreateResource(key string) error {
if !s.isInitialized() {
return fmt.Errorf("acl service is not initialized")
}
res := Resource{Key: key}
return s.db.FirstOrCreate(&res, &Resource{Key: key}).Error
}
// AssignResourceToRole assigns a resource to a role
func (s *Service) AssignResourceToRole(roleID, resourceID uint) error {
if !s.isInitialized() {
return fmt.Errorf("acl service is not initialized")
}
rr := RoleResource{
RoleID: roleID,
ResourceID: resourceID,
}
return s.db.FirstOrCreate(&rr, RoleResource{RoleID: roleID, ResourceID: resourceID}).Error
}
// AssignRoleToUser assigns a role to a user
func (s *Service) AssignRoleToUser(roleID, userID uint) error {
if !s.isInitialized() {
return fmt.Errorf("acl service is not initialized")
}
ur := UserRole{
UserID: userID,
RoleID: roleID,
}
return s.db.FirstOrCreate(&ur, UserRole{UserID: userID, RoleID: roleID}).Error
}
// RemoveResourceFromRole removes a resource from a role
func (s *Service) RemoveResourceFromRole(roleID, resourceID uint) error {
if !s.isInitialized() {
return fmt.Errorf("acl service is not initialized")
}
return s.db.Where("role_id = ? AND resource_id = ?", roleID, resourceID).Delete(&RoleResource{}).Error
}
// RemoveRoleFromUser removes a role from a user
func (s *Service) RemoveRoleFromUser(roleID, userID uint) error {
if !s.isInitialized() {
return fmt.Errorf("acl service is not initialized")
}
return s.db.Where("role_id = ? AND user_id = ?", roleID, userID).Delete(&UserRole{}).Error
}
// GetRoles returns all roles
func (s *Service) GetRoles() ([]Role, error) {
if !s.isInitialized() {
return nil, fmt.Errorf("acl service is not initialized")
}
var roles []Role
err := s.db.Preload("Resources").Order("id").Find(&roles).Error
return roles, err
}
// GetPermissions returns all permissions
func (s *Service) GetPermissions() ([]Resource, error) {
if !s.isInitialized() {
return nil, fmt.Errorf("acl service is not initialized")
}
var resources []Resource
err := s.db.Order("id").Find(&resources).Error
return resources, err
}
// GetRoleResources returns all resources for a given role
func (s *Service) GetRoleResources(roleID uint) ([]Resource, error) {
if !s.isInitialized() {
return nil, fmt.Errorf("acl service is not initialized")
}
var resources []Resource
err := s.db.Joins("JOIN role_resources rr ON rr.resource_id = resources.id").
Where("rr.role_id = ?", roleID).Find(&resources).Error
return resources, err
}
// GetUserRoles returns all roles for a given user
func (s *Service) GetUserRoles(userID uint) ([]Role, error) {
if !s.isInitialized() {
return nil, fmt.Errorf("acl service is not initialized")
}
var roles []Role
err := s.db.Joins("JOIN user_roles ur ON ur.role_id = roles.id").
Where("ur.user_id = ?", userID).Find(&roles).Error
return roles, err
}

View File

@@ -1,156 +1,158 @@
package acl_test package acl_test
import ( // DEPRECATED TEST FILE
"os"
"path/filepath"
"testing"
"git.oblat.lv/alex/triggerssmith/internal/acl" // import (
"git.oblat.lv/alex/triggerssmith/internal/user" // "os"
"gorm.io/driver/sqlite" // "path/filepath"
"gorm.io/gorm" // "testing"
)
func openTestDB(t *testing.T) *gorm.DB { // "git.oblat.lv/alex/triggerssmith/internal/acl"
t.Helper() // "git.oblat.lv/alex/triggerssmith/internal/user"
// "gorm.io/driver/sqlite"
// "gorm.io/gorm"
// )
// Путь к файлу базы // func openTestDB(t *testing.T) *gorm.DB {
dbPath := filepath.Join("testdata", "test.db") // t.Helper()
// Удаляем старую базу, если есть // // Путь к файлу базы
os.Remove(dbPath) // dbPath := filepath.Join("testdata", "test.db")
db, err := gorm.Open(sqlite.Open(dbPath), &gorm.Config{}) // // Удаляем старую базу, если есть
if err != nil { // os.Remove(dbPath)
t.Fatalf("failed to open test db: %v", err)
}
// Миграция таблицы User для связи с ACL // db, err := gorm.Open(sqlite.Open(dbPath), &gorm.Config{})
if err := db.AutoMigrate(&user.User{}); err != nil { // if err != nil {
t.Fatalf("failed to migrate User: %v", err) // t.Fatalf("failed to open test db: %v", err)
} // }
return db // // Миграция таблицы User для связи с ACL
} // if err := db.AutoMigrate(&user.User{}); err != nil {
// t.Fatalf("failed to migrate User: %v", err)
// }
func TestACLService_CRUD(t *testing.T) { // return db
db := openTestDB(t) // }
// Создаём сервис ACL // func TestACLService_CRUD(t *testing.T) {
svc, err := acl.NewService(db) // db := openTestDB(t)
if err != nil {
t.Fatalf("failed to create ACL service: %v", err)
}
if err := svc.Init(); err != nil { // // Создаём сервис ACL
t.Fatalf("failed to init ACL service: %v", err) // svc, err := acl.NewService(db)
} // if err != nil {
// t.Fatalf("failed to create ACL service: %v", err)
// }
// Создаём роли // if err := svc.Init(); err != nil {
if err := svc.CreateRole("admin"); err != nil { // t.Fatalf("failed to init ACL service: %v", err)
t.Fatalf("CreateRole failed: %v", err) // }
}
if err := svc.CreateRole("guest"); err != nil {
t.Fatalf("CreateRole failed: %v", err)
}
roles, err := svc.GetRoles() // // Создаём роли
if err != nil { // if err := svc.CreateRole("admin"); err != nil {
t.Fatalf("GetRoles failed: %v", err) // t.Fatalf("CreateRole failed: %v", err)
} // }
if len(roles) != 2 { // if err := svc.CreateRole("guest"); err != nil {
t.Fatalf("expected 2 roles, got %d", len(roles)) // t.Fatalf("CreateRole failed: %v", err)
} // }
// Создаём ресурсы // roles, err := svc.GetRoles()
if err := svc.CreateResource("*"); err != nil { // if err != nil {
t.Fatalf("CreateResource failed: %v", err) // t.Fatalf("GetRoles failed: %v", err)
} // }
if err := svc.CreateResource("html.view.*"); err != nil { // if len(roles) != 2 {
t.Fatalf("CreateResource failed: %v", err) // t.Fatalf("expected 2 roles, got %d", len(roles))
} // }
resources, err := svc.GetPermissions() // // Создаём ресурсы
if err != nil { // if err := svc.CreateResource("*"); err != nil {
t.Fatalf("GetPermissions failed: %v", err) // t.Fatalf("CreateResource failed: %v", err)
} // }
if len(resources) != 2 { // if err := svc.CreateResource("html.view.*"); err != nil {
t.Fatalf("expected 2 resources, got %d", len(resources)) // t.Fatalf("CreateResource failed: %v", err)
} // }
// 1. Создаём сервис user // resources, err := svc.GetPermissions()
store, err := user.NewGormUserStore(db) // if err != nil {
if err != nil { // t.Fatalf("GetPermissions failed: %v", err)
t.Fatalf("failed to create user store: %v", err) // }
} // if len(resources) != 2 {
userSvc, err := user.NewService(store) // t.Fatalf("expected 2 resources, got %d", len(resources))
if err != nil { // }
t.Fatalf("failed to create user service: %v", err)
}
// 2. Инициализируем // // 1. Создаём сервис user
if err := userSvc.Init(); err != nil { // store, err := user.NewGormUserStore(db)
t.Fatalf("failed to init user service: %v", err) // if err != nil {
} // t.Fatalf("failed to create user store: %v", err)
// }
// userSvc, err := user.NewService(store)
// if err != nil {
// t.Fatalf("failed to create user service: %v", err)
// }
user := &user.User{ // // 2. Инициализируем
Username: "testuser", // if err := userSvc.Init(); err != nil {
Email: "testuser@example.com", // t.Fatalf("failed to init user service: %v", err)
Password: "secret", // }
}
u := user // user := &user.User{
// Username: "testuser",
// Email: "testuser@example.com",
// Password: "secret",
// }
// 3. Создаём пользователя через сервис // u := user
err = userSvc.Create(user)
if err != nil {
t.Fatalf("failed to create user: %v", err)
}
// Привязываем роль к пользователю // // 3. Создаём пользователя через сервис
adminRoleID := roles[0].ID // err = userSvc.Create(user)
if err := svc.AssignRoleToUser(adminRoleID, uint(u.ID)); err != nil { // if err != nil {
t.Fatalf("AssignRoleToUser failed: %v", err) // t.Fatalf("failed to create user: %v", err)
} // }
userRoles, err := svc.GetUserRoles(uint(u.ID)) // // Привязываем роль к пользователю
if err != nil { // adminRoleID := roles[0].ID
t.Fatalf("GetUserRoles failed: %v", err) // if err := svc.AssignRoleToUser(adminRoleID, uint(u.ID)); err != nil {
} // t.Fatalf("AssignRoleToUser failed: %v", err)
if len(userRoles) != 1 || userRoles[0].ID != adminRoleID { // }
t.Fatalf("expected user to have admin role")
}
// Привязываем ресурсы к роли // userRoles, err := svc.GetUserRoles(uint(u.ID))
for _, res := range resources { // if err != nil {
if err := svc.AssignResourceToRole(adminRoleID, res.ID); err != nil { // t.Fatalf("GetUserRoles failed: %v", err)
t.Fatalf("AssignResourceToRole failed: %v", err) // }
} // if len(userRoles) != 1 || userRoles[0].ID != adminRoleID {
} // t.Fatalf("expected user to have admin role")
// }
roleResources, err := svc.GetRoleResources(adminRoleID) // // Привязываем ресурсы к роли
if err != nil { // for _, res := range resources {
t.Fatalf("GetRoleResources failed: %v", err) // if err := svc.AssignResourceToRole(adminRoleID, res.ID); err != nil {
} // t.Fatalf("AssignResourceToRole failed: %v", err)
if len(roleResources) != 2 { // }
t.Fatalf("expected role to have 2 resources") // }
}
// Удаляем ресурс из роли // roleResources, err := svc.GetRoleResources(adminRoleID)
if err := svc.RemoveResourceFromRole(adminRoleID, resources[0].ID); err != nil { // if err != nil {
t.Fatalf("RemoveResourceFromRole failed: %v", err) // t.Fatalf("GetRoleResources failed: %v", err)
} // }
roleResources, _ = svc.GetRoleResources(adminRoleID) // if len(roleResources) != 2 {
if len(roleResources) != 1 { // t.Fatalf("expected role to have 2 resources")
t.Fatalf("expected 1 resource after removal") // }
}
// Удаляем роль у пользователя // // Удаляем ресурс из роли
if err := svc.RemoveRoleFromUser(adminRoleID, uint(u.ID)); err != nil { // if err := svc.RemoveResourceFromRole(adminRoleID, resources[0].ID); err != nil {
t.Fatalf("RemoveRoleFromUser failed: %v", err) // t.Fatalf("RemoveResourceFromRole failed: %v", err)
} // }
userRoles, _ = svc.GetUserRoles(uint(u.ID)) // roleResources, _ = svc.GetRoleResources(adminRoleID)
if len(userRoles) != 0 { // if len(roleResources) != 1 {
t.Fatalf("expected user to have 0 roles after removal") // t.Fatalf("expected 1 resource after removal")
} // }
}
// // Удаляем роль у пользователя
// if err := svc.RemoveRoleFromUser(adminRoleID, uint(u.ID)); err != nil {
// t.Fatalf("RemoveRoleFromUser failed: %v", err)
// }
// userRoles, _ = svc.GetUserRoles(uint(u.ID))
// if len(userRoles) != 0 {
// t.Fatalf("expected user to have 0 roles after removal")
// }
// }

13
internal/auth/errors.go Normal file
View File

@@ -0,0 +1,13 @@
package auth
import "fmt"
var (
ErrUserNotFound = fmt.Errorf("user not found")
ErrInvalidPassword = fmt.Errorf("invalid password")
ErrInvalidEmail = fmt.Errorf("invalid email")
ErrInvalidUsername = fmt.Errorf("invalid username")
ErrTokenIsMissing = fmt.Errorf("token is missing")
ErrInvalidToken = fmt.Errorf("invalid token")
)

View File

@@ -1,6 +1,7 @@
package auth package auth
import ( import (
"errors"
"fmt" "fmt"
"net/http" "net/http"
"strings" "strings"
@@ -8,7 +9,7 @@ import (
"git.oblat.lv/alex/triggerssmith/internal/config" "git.oblat.lv/alex/triggerssmith/internal/config"
"git.oblat.lv/alex/triggerssmith/internal/jwt" "git.oblat.lv/alex/triggerssmith/internal/jwt"
"git.oblat.lv/alex/triggerssmith/internal/token" "git.oblat.lv/alex/triggerssmith/internal/token"
"git.oblat.lv/alex/triggerssmith/internal/user" user_p "git.oblat.lv/alex/triggerssmith/internal/user"
ejwt "github.com/golang-jwt/jwt/v5" ejwt "github.com/golang-jwt/jwt/v5"
"golang.org/x/crypto/bcrypt" "golang.org/x/crypto/bcrypt"
) )
@@ -23,7 +24,7 @@ type Service struct {
services struct { services struct {
jwt *jwt.Service jwt *jwt.Service
user *user.Service user *user_p.Service
token *token.Service token *token.Service
} }
} }
@@ -32,7 +33,7 @@ type AuthServiceDependencies struct {
Configuration *config.Config Configuration *config.Config
JWTService *jwt.Service JWTService *jwt.Service
UserService *user.Service UserService *user_p.Service
TokenService *token.Service TokenService *token.Service
} }
@@ -53,7 +54,7 @@ func NewAuthService(deps AuthServiceDependencies) (*Service, error) {
cfg: deps.Configuration, cfg: deps.Configuration,
services: struct { services: struct {
jwt *jwt.Service jwt *jwt.Service
user *user.Service user *user_p.Service
token *token.Service token *token.Service
}{ }{
jwt: deps.JWTService, jwt: deps.JWTService,
@@ -65,20 +66,20 @@ func NewAuthService(deps AuthServiceDependencies) (*Service, error) {
// Users // Users
func (s *Service) Get(by, value string) (*user.User, error) { func (s *Service) Get(by, value string) (*user_p.User, error) {
return s.services.user.GetBy(by, value) return s.services.user.GetBy(by, value)
} }
// Register creates a new user with the given username, email, and password. // Register creates a new user with the given username, email, and password.
// Password is hashed before storing. // Password is hashed before storing.
// Returns the created user or an error. // Returns the created user or an error.
func (s *Service) Register(username, email, password string) (*user.User, error) { func (s *Service) Register(username, email, password string) (*user_p.User, error) {
hashedPassword, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost) hashedPassword, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)
if err != nil { if err != nil {
return nil, fmt.Errorf("failed to hash password: %w", err) return nil, fmt.Errorf("failed to hash password: %w", err)
} }
user := &user.User{ user := &user_p.User{
Username: username, Username: username,
Email: email, Email: email,
Password: string(hashedPassword), Password: string(hashedPassword),
@@ -97,12 +98,15 @@ func (s *Service) Register(username, email, password string) (*user.User, error)
func (s *Service) Login(username, password string) (*Tokens, error) { func (s *Service) Login(username, password string) (*Tokens, error) {
user, err := s.services.user.GetBy("username", username) user, err := s.services.user.GetBy("username", username)
if err != nil { if err != nil {
if err == user_p.ErrUserNotFound {
return nil, ErrInvalidUsername
}
return nil, fmt.Errorf("failed to get user by username: %w", err) return nil, fmt.Errorf("failed to get user by username: %w", err)
} }
err = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password)) err = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password))
if err != nil { if err != nil {
return nil, fmt.Errorf("invalid password: %w", err) return nil, ErrInvalidPassword
} }
refreshToken, rjti, err := s.services.jwt.Generate(s.cfg.Auth.RefreshTokenTTL, ejwt.MapClaims{ refreshToken, rjti, err := s.services.jwt.Generate(s.cfg.Auth.RefreshTokenTTL, ejwt.MapClaims{
"sub": user.ID, "sub": user.ID,
@@ -122,39 +126,46 @@ func (s *Service) Login(username, password string) (*Tokens, error) {
// Logout revokes the refresh token identified by the given rjti. // Logout revokes the refresh token identified by the given rjti.
func (s *Service) Logout(rjti string) error { func (s *Service) Logout(rjti string) error {
return s.services.token.RevokeByRefreshDefault(rjti) err := s.services.token.RevokeByRefreshDefault(rjti)
if err != nil {
if errors.Is(err, token.ErrTokenIsRevoked) {
return ErrInvalidToken
}
return fmt.Errorf("failed to revoke token: %w", err)
}
return nil
} }
// Access tokens // Access tokens
// ValidateAccessToken validates the given access token string. // ValidateAccessToken validates the given access token string.
// Returns the user ID (sub claim) if valid, or an error. // Returns claims if valid, or an error.
func (s *Service) ValidateAccessToken(tokenStr string) (int64, error) { func (s *Service) ValidateAccessToken(tokenStr string) (ejwt.Claims, error) {
claims, _, err := s.services.jwt.Validate(tokenStr) claims, _, err := s.services.jwt.Validate(tokenStr)
if err != nil { if err != nil {
return 0, fmt.Errorf("failed to validate access token: %w", err) return nil, fmt.Errorf("failed to validate access token: %w", err)
} }
isRevoked, err := s.services.token.IsRevoked(claims["rjti"].(string)) isRevoked, err := s.services.token.IsRevoked(claims["rjti"].(string))
if err != nil { if err != nil {
return 0, fmt.Errorf("failed to check if token is revoked: %w", err) return nil, fmt.Errorf("failed to check if token is revoked: %w", err)
} }
if isRevoked { if isRevoked {
return 0, fmt.Errorf("token is revoked") return nil, fmt.Errorf("token is revoked")
} }
sub := claims["sub"].(float64) return claims, nil
return int64(sub), nil
} }
// Refresh tokens // Refresh tokens
// RefreshTokens validates the given refresh token and issues new access and refresh tokens. // RefreshTokens validates the given refresh token and issues new access and refresh tokens.
// Returns the new access and refresh tokens or an error. // Returns the new access and refresh tokens or an error.
// May return [ErrInvalidToken] if the refresh token is invalid or revoked.
func (s *Service) RefreshTokens(refreshTokenStr string) (*Tokens, error) { func (s *Service) RefreshTokens(refreshTokenStr string) (*Tokens, error) {
claims, rjti, err := s.services.jwt.Validate(refreshTokenStr) claims, rjti, err := s.services.jwt.Validate(refreshTokenStr)
if err != nil { if err != nil {
return nil, fmt.Errorf("failed to validate refresh token: %w", err) return nil, errors.Join(ErrInvalidToken, err)
} }
isRevoked, err := s.services.token.IsRevoked(rjti) isRevoked, err := s.services.token.IsRevoked(rjti)
@@ -162,7 +173,7 @@ func (s *Service) RefreshTokens(refreshTokenStr string) (*Tokens, error) {
return nil, fmt.Errorf("failed to check if token is revoked: %w", err) return nil, fmt.Errorf("failed to check if token is revoked: %w", err)
} }
if isRevoked { if isRevoked {
return nil, fmt.Errorf("refresh token is revoked") return nil, ErrInvalidToken
} }
sub := claims["sub"].(float64) sub := claims["sub"].(float64)
@@ -190,23 +201,22 @@ func (s *Service) RefreshTokens(refreshTokenStr string) (*Tokens, error) {
} }
// ValidateRefreshToken validates the given refresh token string. // ValidateRefreshToken validates the given refresh token string.
// Returns user id and error. // Returns claims and error.
func (s *Service) ValidateRefreshToken(tokenStr string) (int64, error) { func (s *Service) ValidateRefreshToken(tokenStr string) (ejwt.Claims, error) {
claims, _, err := s.services.jwt.Validate(tokenStr) claims, _, err := s.services.jwt.Validate(tokenStr)
if err != nil { if err != nil {
return 0, fmt.Errorf("failed to validate refresh token: %w", err) return nil, fmt.Errorf("failed to validate refresh token: %w", err)
} }
isRevoked, err := s.services.token.IsRevoked(claims["jti"].(string)) isRevoked, err := s.services.token.IsRevoked(claims["jti"].(string))
if err != nil { if err != nil {
return 0, fmt.Errorf("failed to check if token is revoked: %w", err) return nil, fmt.Errorf("failed to check if token is revoked: %w", err)
} }
if isRevoked { if isRevoked {
return 0, fmt.Errorf("refresh token is revoked") return nil, fmt.Errorf("refresh token is revoked")
} }
sub := claims["sub"].(float64) return claims, nil
return int64(sub), nil
} }
// RevokeRefresh revokes the refresh token identified by the given token string. // RevokeRefresh revokes the refresh token identified by the given token string.
@@ -232,10 +242,10 @@ func (s *Service) IsRefreshRevoked(token string) (bool, error) {
func (s *Service) AuthenticateRequest(r *http.Request) (ejwt.Claims, error) { func (s *Service) AuthenticateRequest(r *http.Request) (ejwt.Claims, error) {
header := r.Header.Get("Authorization") header := r.Header.Get("Authorization")
if header == "" { if header == "" {
return nil, fmt.Errorf("token is missing") return nil, ErrTokenIsMissing
} }
if !strings.HasPrefix(header, "Bearer ") { if !strings.HasPrefix(header, "Bearer ") {
return nil, fmt.Errorf("token is missing") return nil, ErrTokenIsMissing
} }
tokenString := strings.TrimPrefix(header, "Bearer ") tokenString := strings.TrimPrefix(header, "Bearer ")
tokenClaims, _, err := s.services.jwt.Validate(tokenString) tokenClaims, _, err := s.services.jwt.Validate(tokenString)

46
internal/server/error.go Normal file
View File

@@ -0,0 +1,46 @@
package server
import (
"encoding/json"
"log/slog"
"net/http"
)
type ErrorResponse struct {
Error string `json:"error"`
Details string `json:"details,omitempty"`
}
func WriteError(w http.ResponseWriter, error, details string, statusCode int) {
w.Header().Set("Content-Type", "application/json")
w.WriteHeader(statusCode)
json.NewEncoder(w).Encode(ErrorResponse{
Error: error,
Details: details,
})
}
// RFC-7807 (Problem Details)
type ProblemDetails struct {
Type string `json:"type" example:"https://api.triggerssmith.com/errors/role-not-found"`
Title string `json:"title" example:"Role not found"`
Status int `json:"status" example:"404"`
Detail string `json:"detail" example:"No role with ID 42"`
Instance string `json:"instance" example:"/api/acl/roles/42"`
}
var typeDomain = "https://api.triggerssmith.com"
func WriteProblem(w http.ResponseWriter, status int, typ, title, detail string, r *http.Request) {
w.Header().Set("Content-Type", "application/problem+json")
w.WriteHeader(status)
prob := ProblemDetails{
Type: typeDomain + typ,
Title: title,
Status: status,
Detail: detail,
Instance: r.URL.Path,
}
slog.Warn("new problem", "type", typ, "title", title, "detail", detail, "instance", r.URL.Path, "status", status)
_ = json.NewEncoder(w).Encode(prob)
}

7
internal/token/errors.go Normal file
View File

@@ -0,0 +1,7 @@
package token
import "fmt"
var (
ErrTokenIsRevoked = fmt.Errorf("token is revoked")
)

View File

@@ -29,6 +29,13 @@ func NewSQLiteTokenStore(db *gorm.DB) (*SQLiteTokenStore, error) {
} }
func (s *SQLiteTokenStore) revoke(tokenID string, expiresAt time.Time) error { func (s *SQLiteTokenStore) revoke(tokenID string, expiresAt time.Time) error {
if revoked, err := s.isRevoked(tokenID); err == nil {
if revoked {
return ErrTokenIsRevoked
}
} else {
return err
}
return s.db.Create(&Token{ return s.db.Create(&Token{
TokenID: tokenID, TokenID: tokenID,
Expiration: expiresAt, Expiration: expiresAt,

7
internal/user/errors.go Normal file
View File

@@ -0,0 +1,7 @@
package user
import "fmt"
var (
ErrUserNotFound = fmt.Errorf("user not found")
)

View File

@@ -1,6 +1,7 @@
package user package user
import ( import (
"errors"
"fmt" "fmt"
"gorm.io/gorm" "gorm.io/gorm"
@@ -24,6 +25,7 @@ func (s *GormUserStore) Create(user *User) error {
} }
// Search returns a user by username or id or email // Search returns a user by username or id or email
// May return [ErrUserNotFound] if user not found
func (s *GormUserStore) GetBy(by, value string) (*User, error) { func (s *GormUserStore) GetBy(by, value string) (*User, error) {
if by != "username" && by != "id" && by != "email" { if by != "username" && by != "id" && by != "email" {
return nil, fmt.Errorf("unsuppored field %s", by) return nil, fmt.Errorf("unsuppored field %s", by)
@@ -31,7 +33,10 @@ func (s *GormUserStore) GetBy(by, value string) (*User, error) {
var user User var user User
err := s.db.Where(fmt.Sprintf("%s = ?", by), value).First(&user).Error err := s.db.Where(fmt.Sprintf("%s = ?", by), value).First(&user).Error
if err != nil { if err != nil {
return nil, err if errors.Is(err, gorm.ErrRecordNotFound) {
return nil, ErrUserNotFound
}
return nil, fmt.Errorf("failed to get user: %w", err)
} }
return &user, nil return &user, nil
} }

View File

@@ -1,15 +1,13 @@
package user package user
import ( import (
"git.oblat.lv/alex/triggerssmith/internal/acl"
"gorm.io/gorm" "gorm.io/gorm"
) )
type User struct { type User struct {
ID int64 `gorm:"primaryKey"` ID uint `gorm:"primaryKey"`
Username string `gorm:"uniqueIndex;not null"` Username string `gorm:"uniqueIndex;not null"`
Email string `gorm:"uniqueIndex;not null"` Email string `gorm:"uniqueIndex;not null"`
Password string `gorm:"not null"` Password string `gorm:"not null"`
Roles []acl.Role `gorm:"many2many:user_roles"`
DeletedAt gorm.DeletedAt `gorm:"index"` DeletedAt gorm.DeletedAt `gorm:"index"`
} }

View File

@@ -1,84 +1,86 @@
package user package user
import ( // DEPRECATED TEST FILE
"os"
"path/filepath"
"testing"
"gorm.io/driver/sqlite" // import (
"gorm.io/gorm" // "os"
) // "path/filepath"
// "testing"
func setupTestDB(t *testing.T) *gorm.DB { // "gorm.io/driver/sqlite"
t.Helper() // "gorm.io/gorm"
// )
dbPath := filepath.Join("testdata", "users.db") // func setupTestDB(t *testing.T) *gorm.DB {
// t.Helper()
_ = os.Remove(dbPath) // dbPath := filepath.Join("testdata", "users.db")
db, err := gorm.Open(sqlite.Open(dbPath), &gorm.Config{}) // _ = os.Remove(dbPath)
if err != nil {
t.Fatalf("failed to open db: %v", err)
}
if err := db.AutoMigrate(&User{}); err != nil { // db, err := gorm.Open(sqlite.Open(dbPath), &gorm.Config{})
t.Fatalf("failed to migrate: %v", err) // if err != nil {
} // t.Fatalf("failed to open db: %v", err)
// }
return db // if err := db.AutoMigrate(&User{}); err != nil {
} // t.Fatalf("failed to migrate: %v", err)
// }
func TestUsersCRUD(t *testing.T) { // return db
db := setupTestDB(t) // }
store, err := NewGormUserStore(db) // func TestUsersCRUD(t *testing.T) {
if err != nil { // db := setupTestDB(t)
t.Fatalf("failed to create store: %v", err)
}
service, err := NewService(store) // store, err := NewGormUserStore(db)
if err != nil { // if err != nil {
t.Fatalf("failed to create service: %v", err) // t.Fatalf("failed to create store: %v", err)
} // }
user := &User{ // service, err := NewService(store)
Username: "testuser", // if err != nil {
Email: "test@example.com", // t.Fatalf("failed to create service: %v", err)
Password: "password123", // }
}
if err := service.Create(user); err != nil { // user := &User{
t.Fatalf("failed to create user: %v", err) // Username: "testuser",
} // Email: "test@example.com",
// retrieved, err := service.GetByID(user.ID) // Password: "password123",
// if err != nil { // }
// t.Fatalf("failed to get user by ID: %v", err)
// }
// if retrieved.Username != user.Username {
// t.Fatalf("expected username %s, got %s", user.Username, retrieved.Username)
// }
// retrievedByUsername, err := service.GetByUsername(user.Username) // if err := service.Create(user); err != nil {
// if err != nil { // t.Fatalf("failed to create user: %v", err)
// t.Fatalf("failed to get user by username: %v", err) // }
// } // // retrieved, err := service.GetByID(user.ID)
// if retrievedByUsername.Email != user.Email { // // if err != nil {
// t.Fatalf("expected email %s, got %s", user.Email, retrievedByUsername.Email) // // t.Fatalf("failed to get user by ID: %v", err)
// } // // }
// // if retrieved.Username != user.Username {
// // t.Fatalf("expected username %s, got %s", user.Username, retrieved.Username)
// // }
// user.Email = "newemail@example.com" // // retrievedByUsername, err := service.GetByUsername(user.Username)
// if err := service.Update(user); err != nil { // // if err != nil {
// t.Fatalf("failed to update user: %v", err) // // t.Fatalf("failed to get user by username: %v", err)
// } // // }
// retrieved, err = service.GetByID(user.ID) // // if retrievedByUsername.Email != user.Email {
// if err != nil { // // t.Fatalf("expected email %s, got %s", user.Email, retrievedByUsername.Email)
// t.Fatalf("failed to get user by ID: %v", err) // // }
// }
// if retrieved.Email != user.Email { // // user.Email = "newemail@example.com"
// t.Fatalf("expected email %s, got %s", user.Email, retrieved.Email) // // if err := service.Update(user); err != nil {
// } // // t.Fatalf("failed to update user: %v", err)
err = service.Delete(user.ID) // // }
if err != nil { // // retrieved, err = service.GetByID(user.ID)
t.Fatalf("failed to delete user: %v", err) // // if err != nil {
} // // t.Fatalf("failed to get user by ID: %v", err)
} // // }
// // if retrieved.Email != user.Email {
// // t.Fatalf("expected email %s, got %s", user.Email, retrieved.Email)
// // }
// err = service.Delete(user.ID)
// if err != nil {
// t.Fatalf("failed to delete user: %v", err)
// }
// }

View File

@@ -1,120 +1,33 @@
body { body {font-family: system-ui, sans-serif; margin: 0; display: flex; flex-direction: column; min-height: 100vh;}
font-family: system-ui, sans-serif; header {display: flex; align-items: center; justify-content: space-between; background: #333; color: white; padding: 10px 15px; position: relative;}
margin: 0; footer {background: #333; color: white; text-align: center; padding: 10px;}
display: flex; main {flex: 1; padding: 20px; max-width: 1000px; margin: 0 auto;}
flex-direction: column; button {cursor:pointer; border-radius: 8px; border: 1px solid #ccc; background:#e4e4e4; padding: 10px 12px; font-size: 16px;}
min-height: 100vh; button:hover {background: #aa92f8;}
} input {background: #ffffff; padding: 10px 12px; font-size: 15px; border-radius: 8px; border: 1px solid #ccc; transition: border 0.2s, box-shadow 0.2s; width:200px;}
input:focus {border-color: #7f57ff; box-shadow: 0 0 0 2px rgba(127, 87, 255, 0.2); outline: none;}
header { select{background: #ffffff; padding: 10px 12px; font-size: 15px; border-radius: 8px; border: 1px solid #ccc; transition: border 0.2s, box-shadow 0.2s; width:225px;}
display: flex; select:focus {border-color: #7f57ff; box-shadow: 0 0 0 2px rgba(127, 87, 255, 0.2); outline: none;}
align-items: center;
justify-content: space-between;
background: #333;
color: white;
padding: 10px 15px;
position: relative;
}
footer {
background: #333;
color: white;
text-align: center;
padding: 10px;
}
main {
flex: 1;
padding: 20px;
max-width: 1000px;
margin: 0 auto;
}
/* навигация */ /* навигация */
nav ul { nav ul {list-style: none; display: flex; gap: 20px; margin: 0; padding: 0;}
list-style: none; nav a {color: white; text-decoration: none; font-weight: 500;}
display: flex; nav a:hover {text-decoration: underline;}
gap: 20px;
margin: 0;
padding: 0;
}
nav a {
color: white;
text-decoration: none;
font-weight: 500;
}
nav a:hover {
text-decoration: underline;
}
/* бургер */ /* бургер */
.burger { .burger {display: none; flex-direction: column; justify-content: center; gap: 5px; width: 30px; height: 25px; background: none; border: none; cursor: pointer;}
display: none; .burger span {display: block; height: 3px; width: 100%; background: white; border-radius: 2px; transition: 0.3s;}
flex-direction: column; .burger.active span:nth-child(1) {transform: translateY(8px) rotate(45deg);}
justify-content: center; .burger.active span:nth-child(2) {opacity: 0;}
gap: 5px; .burger.active span:nth-child(3) {transform: translateY(-8px) rotate(-45deg);}
width: 30px;
height: 25px;
background: none;
border: none;
cursor: pointer;
}
.burger span {
display: block;
height: 3px;
width: 100%;
background: white;
border-radius: 2px;
transition: 0.3s;
}
.burger.active span:nth-child(1) {
transform: translateY(8px) rotate(45deg);
}
.burger.active span:nth-child(2) {
opacity: 0;
}
.burger.active span:nth-child(3) {
transform: translateY(-8px) rotate(-45deg);
}
/* сетка */ /* сетка */
.grid-3 { .grid-3 {display: grid; grid-template-columns: 15% 70% 15%; gap: 20px; margin-top: 20px;}
display: grid; .grid-block {background: #f5f5f5; padding: 15px; border-radius: 10px; box-shadow: 0 2px 5px rgba(0,0,0,0.1);}
grid-template-columns: 15% 70% 15%; /* Полупрозрачный фон */
gap: 20px; .overlay {position: fixed; top: 0; left: 0; width: 100%; height: 100%; background: rgba(0,0,0,0.5); display: flex; justify-content: center; align-items: center; z-index: 1000;}
margin-top: 20px;
}
.grid-block { /* Окна */
background: #f5f5f5;
padding: 15px;
border-radius: 10px;
box-shadow: 0 2px 5px rgba(0,0,0,0.1);
}
/* Полупрозрачный фон */
.overlay {
position: fixed;
top: 0;
left: 0;
width: 100%;
height: 100%;
background: rgba(0,0,0,0.5);
display: flex;
justify-content: center;
align-items: center;
z-index: 1000;
}
/* Окна */
/* Message */ /* Message */
.window-popup { width:400px; height:150px; background:#fff; border-radius:10px; display:flex; flex-direction:column; justify-content:center; align-items:center; padding:20px; box-shadow:0 0 10px rgba(0,0,0,0.3); } .window-popup {width:400px; height:150px; background:#fff; border-radius:10px; display:flex; flex-direction:column; justify-content:center; align-items:center; padding:20px; box-shadow:0 0 10px rgba(0,0,0,0.3); }
.window-popup button { margin-top:20px; padding:5px 10px; cursor:pointer; }
/* Menu */ /* Menu */
.window-menu { position:absolute; background:#fff; border-radius:10px; border:1px solid rgba(0,0,0,0.12); box-shadow:0 6px 18px rgba(0,0,0,0.12); min-width:160px; z-index:9999; overflow:hidden; } .window-menu { position:absolute; background:#fff; border-radius:10px; border:1px solid rgba(0,0,0,0.12); box-shadow:0 6px 18px rgba(0,0,0,0.12); min-width:160px; z-index:9999; overflow:hidden; }
@@ -135,39 +48,29 @@ nav a:hover {
/* адаптив */ /* адаптив */
@media (max-width: 425px) { @media (max-width: 425px) {
.grid-3 { .grid-3 {grid-template-columns: 1fr;}
grid-template-columns: 1fr; .burger {display: flex;}
} nav {position: absolute; top: 100%; left: 0; width: 100%; background: #222; display: none; flex-direction: column; text-align: center; padding: 10px 0; z-index: 10;}
nav.open {display: flex; animation: slideDown 0.3s ease;}
.burger { nav ul {flex-direction: column; gap: 10px;}
display: flex;
}
nav {
position: absolute;
top: 100%;
left: 0;
width: 100%;
background: #222;
display: none;
flex-direction: column;
text-align: center;
padding: 10px 0;
z-index: 10;
}
nav.open {
display: flex;
animation: slideDown 0.3s ease;
}
nav ul {
flex-direction: column;
gap: 10px;
}
@keyframes slideDown { @keyframes slideDown {
from { opacity: 0; transform: translateY(-10px); } from { opacity: 0; transform: translateY(-10px); }
to { opacity: 1; transform: translateY(0); } to { opacity: 1; transform: translateY(0); }
} }
} }
.ui-overlay {position: fixed; inset: 0; background: rgba(0,0,0,.4); display: flex; align-items: center; justify-content: center;}
.ui-alert {background: #fff; padding: 20px; border-radius: 16px; min-width: 300px; font-family: sans-serif; text-align: center;}
/* .ui-alert button {margin-top: 20px; border: 1px solid #ccc; padding: 8px 16px; cursor: pointer; border-radius: 8px;} */
.ui-popup-list {position: fixed; background: #fff; border: 1px solid #ccc; border-radius: 6px; box-shadow: 0 4px 10px rgba(0,0,0,.15); z-index: 1000;}
.ui-popup-list .icon {width: 16px; text-align: center;}
.ui-popup-list div {padding: 8px 12px; cursor: pointer; display: flex; align-items: center;}
.ui-popup-list div:hover {background: #eee;}
.ui-window {background: #fff; padding: 16px; border-radius: 8px; min-width: 300px; font-family: sans-serif; width: 360px;}
.ui-window .header {display: flex; justify-content: space-between; font-weight: bold; margin-bottom: 10px; cursor: move; user-select: none;}
.ui-window .row {display: flex; justify-content: space-between; padding: 4px 0;}
/* Tabs */
.tabs {display: flex; border-bottom: 1px solid #ccc; margin-bottom: 10px;}
.tab {padding: 6px 12px; cursor: pointer;}
.tab.active {border-bottom: 2px solid #0078d7; font-weight: bold;}
.tab-content {display: none;}
.tab-content.active {display: block;}

View File

@@ -1,117 +1,126 @@
/*********************************************************************** /***********************************************************************
* ГЛОБАЛЬНОЕ СОСТОЯНИЕ * access-token хранится только в памяти (без localStorage)
**********************************************************************/ **********************************************************************/
let accessToken = null; // access-token хранится только в памяти (без localStorage) let accessToken = null;
/*********************************************************************** /***********************************************************************
* sendRequest УНИВЕРСАЛЬНАЯ ФУНКЦИЯ ДЛЯ ОТПРАВКИ HTTP-ЗАПРОСОВ * user объект в котором хранятся данные пользователя
*
* sendRequest(url, options)
* - автоматически добавляет Content-Type и credentials
* - автоматически превращает body в JSON
* - проверяет response.ok
* - пробрасывает текст ошибки
* - возвращает JSON-ответ
**********************************************************************/ **********************************************************************/
//let accessToken = ""; // access только в памяти const user = {
id: 0,
async function apiProtected(path, options = {}) { name: ""
const send = async () =>
fetch(path, {
...options,
headers: {
...(options.headers || {}),
Authorization: "Bearer " + accessToken,
"Content-Type": "application/json"
}
});
let r = await send();
if ((r.status === 401)) {
// обновляем access
const rr = await fetch("/api/users/refresh", {
method: "POST",
credentials: "include"
});
if (!rr.ok) throw "refresh failed";
const j = await rr.json();
accessToken = j.access_token;
r = await send();
}
if (!r.ok) throw await r.text();
return r.json();
} }
/***********************************************************************
async function sendRequest(url, options = {}) { * apiProtected — это удобная функция для защищённых API-запросов,
// Базовые параметры * которая:
*
* - Подставляет стандартные и пользовательские настройки запроса.
* - Добавляет Authorization с токеном.
* - Автоматически сериализует JSON-тело.
* - Парсит ответ.
* - Обрабатывает устаревший токен (401) и повторяет запрос.
* - Выбрасывает ошибки для внешнего try...catch.
***********************************************************************/
async function apiProtected(path, options = {}) {
// Базовые настройки
const defaultOptions = { const defaultOptions = {
//method: "GET",
headers: { "Content-Type": "application/json" }, headers: { "Content-Type": "application/json" },
credentials: "include" credentials: "include"
}; };
// Объединяем настройки // Объединяем настройки
const finalOptions = { const finalOptions = {
...defaultOptions, ...defaultOptions,
...options, ...options,
headers: { ...defaultOptions.headers, ...(options.headers || {}) } headers: { ...defaultOptions.headers, ...(options.headers || {}) }
}; };
// Если есть тело и это объект — сериализуем
// Если тело — объект, превращаем в JSON
if (finalOptions.body && typeof finalOptions.body === "object") { if (finalOptions.body && typeof finalOptions.body === "object") {
finalOptions.body = JSON.stringify(finalOptions.body); finalOptions.body = JSON.stringify(finalOptions.body);
} }
// Вспомогательная функция отправки запроса
let response; const send = async () => {
try { try {
response = await fetch(url, finalOptions); // Добавляем Authorization, если токен есть
} catch (err) { if (accessToken) {
// Сетевые ошибки (сервер не доступен, нет интернета, CORS и т.д.) finalOptions.headers.Authorization = `Bearer ${accessToken}`;
return { }
ok: false, // Отправляем fetch запрос.
status: 0, const res = await fetch(path, finalOptions);
data: err.toString() const text = await res.text();
}; let data;
} // Пытаемся распарсить ответ как JSON, если не получается
// — возвращаем текст.
// Читаем тело ответа только один раз try {
let text = await response.text(); data = JSON.parse(text);
let data; } catch {
try { data = text;
data = JSON.parse(text); }
} catch { return { res, data };
data = text; } catch (err) {
} return { res: null, data: err.toString() };
}
return {
ok: response.ok,
status: response.status,
data
}; };
// Первый запрос
let { res, data } = await send();
// Если 401 — обновляем токен и повторяем
if (res && res.status === 401) {
await refreshAccess(); // обновляем accessToken
({ res, data } = await send()); // повторный запрос
}
// Если всё равно ошибка — кидаем
if (!res || !res.ok) {
throw { status: res ? res.status : 0, data };
}
return data; // возвращаем распарсенный JSON или текст
} }
/***************************************************************************
* refreshAccess() Обнавление токенов:
*
* - Отправляет POST на /api/users/refresh, используя refresh-токен в cookie.
* - Проверяет успешность ответа.
* - Сохраняет новый access-токен.
* - Декодирует токен, чтобы получить user_id.
* - Обновляет глобальные данные о пользователе (id и name).
****************************************************************************/
async function refreshAccess (){
//Отправка запроса на обновление токена
const rr = await fetch("/api/auth/refresh", {
method: "POST",
credentials: "include"
});
// Проверка ответа
if (!rr.ok) throw "refresh failed";
// Получение нового токена
const j = await rr.json();
accessToken = j.access_token;
// Декодирование payload JWT
const payload = JSON.parse(
atob(accessToken.split(".")[1].replace(/-/g, "+").replace(/_/g, "/"))
);
// Обновление данных пользователя
user.id = payload.user_id;
user.name = (await getUserDataByID(user.id)).name;
}
/********************************************************************************
/******************************************************************** * loadMenu функция загрузки блока меню страницы в формате Markdown
* loadMenu функция загрузки блока меню страницы в формате Markdown * ********************************************************************************/
********************************************************************/
async function loadMenu() { async function loadMenu() {
await loadBlock("menu/top1", "header"); await loadBlock("menu/top1", "header");
} }
/******************************************************************** /********************************************************************************
* loadPage функция загрузки блока страницы в формате Markdown * * loadPage функция загрузки блока страницы в формате Markdown
********************************************************************/ ********************************************************************************/
async function loadPage(path) { async function loadPage(path) {
await loadBlock(path, "content"); await loadBlock(path, "content");
} }
/******************************************************************** /*********************************************************************************
* loadMdScript функция загрузки Markdown библиотеки * * loadMdScript функция загрузки Markdown библиотеки
********************************************************************/ *********************************************************************************/
function loadMdScript(src) { function loadMdScript(src) {
return new Promise((resolve, reject) => { return new Promise((resolve, reject) => {
const script = document.createElement('script'); const script = document.createElement('script');
@@ -123,24 +132,32 @@ async function loadMenu() {
}); });
} }
/******************************************************************** /**********************************************************************************
* loadBlock функция загрузки блока в формате Markdown * * loadBlock — это универсальная функция для динамического контента:
********************************************************************/ *
* - Находит контейнер по id.
* - Очищает старый контент и связанные скрипты/стили.
* - Запрашивает блок через apiProtected.
* - Преобразует Markdown в HTML.
* - Добавляет CSS и JS динамически.
* - Вызывает pageInit() блока, если есть.
* - Обрабатывает ошибки.
**********************************************************************************/
async function loadBlock(path, block_Name) { async function loadBlock(path, block_Name) {
// Получаем контейнер блока
const container = document.getElementById(block_Name); const container = document.getElementById(block_Name);
if (!container) { if (!container) {
//console.warn(`loadBlock: контейнер #${block_Name} не найден — игнорируем`); return;
return; }
} // Обработка пути
path = path.replace(/\/$/, ""); path = path.replace(/\/$/, "");
//console.log(path);
if (!container) { if (!container) {
console.error(`loadBlock ERROR: element #${block_Name} not found`); console.error(`loadBlock ERROR: element #${block_Name} not found`);
return; return;
} }
const blockName = path === "pages" ? "pages/home" : path; const blockName = path === "pages" ? "pages/home" : path;
//console.log(blockName);
try { try {
// Очистка контейнера и старых динамических стилей/скриптов
container.innerHTML = ''; container.innerHTML = '';
document.querySelectorAll('style[data-dynamic], script[data-dynamic]').forEach(el => { document.querySelectorAll('style[data-dynamic], script[data-dynamic]').forEach(el => {
const name = el.getAttribute('data-dynamic'); const name = el.getAttribute('data-dynamic');
@@ -148,28 +165,27 @@ if (!container) {
el.remove(); el.remove();
} }
}); });
const response = await sendRequest(`/api/block/${blockName}`); // Получение блока с сервера
if (!response.ok) { const response = await apiProtected(`/api/block/${blockName}`, {method: "GET"});
throw new Error(`Failed to load block: ${response.status}`);
}
// Динамически подгружаем markdown-it, если он ещё не загружен // Динамически подгружаем markdown-it, если он ещё не загружен
if (!window.markdownit) { if (!window.markdownit) {
await loadMdScript('/static/js/markdown-it.min.js'); await loadMdScript('/static/js/markdown-it.min.js');
} }
const { content: mdContent, css, js } = response;
const { content: mdContent, css, js } = response.data;
// Преобразуем markdown в HTML // Преобразуем markdown в HTML
if (mdContent) { if (mdContent) {
const md = window.markdownit({ html: true, linkify: true, typographer: true }); const md = window.markdownit({ html: true, linkify: true, typographer: true });
container.innerHTML = md.render(mdContent); container.innerHTML = md.render(mdContent);
container?.id?.match(/^loadedBlock_\d+_view$/) && (document.getElementById(container.id.replace('_view', '_html')).innerHTML = mdContent);
} }
// Добавление CSS блока
if (css) { if (css) {
const style = document.createElement('style'); const style = document.createElement('style');
style.dataset.dynamic = block_Name; style.dataset.dynamic = block_Name;
style.textContent = css; style.textContent = css;
document.head.appendChild(style); document.head.appendChild(style);
} }
// Добавление JS блока
if (js) { if (js) {
const script = document.createElement('script'); const script = document.createElement('script');
script.dataset.dynamic = block_Name; script.dataset.dynamic = block_Name;
@@ -185,24 +201,35 @@ if (!container) {
`; `;
document.body.appendChild(script); document.body.appendChild(script);
} }
// Обработка ошибок
} catch (err) { } catch (err) {
console.error(err); console.error(err);
container.innerHTML = "<h2>блок не найден</h2>"; container.innerHTML = "<h2>блок не найден</h2>";
} }
} }
// SPA-навигация /*****************************************************************************
* SPA-навигация
*****************************************************************************/
function navigateTo(url, target) { function navigateTo(url, target) {
const clean = url.replace(/^\//, ""); const clean = url.replace(/^\//, "");
history.pushState({}, "", "/" + clean); history.pushState({}, "", "/" + clean);
loadBlock("pages/" + clean, target); loadBlock("pages/" + clean, target);
} }
// Поддержка кнопки "назад/вперед" /*****************************************************************************
* Поддержка кнопки "назад/вперед"
*****************************************************************************/
window.addEventListener("popstate", () => {loadBlock(location.pathname);}); window.addEventListener("popstate", () => {loadBlock(location.pathname);});
// Обработка истории браузера
/*****************************************************************************
* Обработка истории браузера
*****************************************************************************/
window.addEventListener("popstate", () => loadBlock(window.location.pathname)); window.addEventListener("popstate", () => loadBlock(window.location.pathname));
// Инициализация после загрузки DOM
/*****************************************************************************
* Инициализация после загрузки DOM
*****************************************************************************/
window.onload = async function () { window.onload = async function () {
let url = window.location.href; let url = window.location.href;
// Убираем слеш в конце, если он есть // Убираем слеш в конце, если он есть
@@ -215,13 +242,14 @@ window.onload = async function () {
await loadMenu(); await loadMenu();
await loadPage("pages"+window.location.pathname); await loadPage("pages"+window.location.pathname);
}; };
// Перехватчик ссылок
/*****************************************************************************
* Перехватчик ссылок
*****************************************************************************/
window.addEventListener("click", (event) => { window.addEventListener("click", (event) => {
const a = event.target.closest("a"); const a = event.target.closest("a");
if (!a) return; if (!a) return;
const href = a.getAttribute("href"); const href = a.getAttribute("href");
// игнорируем внешние ссылки и mailto: // игнорируем внешние ссылки и mailto:
if (!href || href.startsWith("http") || href.startsWith("mailto:")) return; if (!href || href.startsWith("http") || href.startsWith("mailto:")) return;
const target = a.dataset.target || "content"; // default = content const target = a.dataset.target || "content"; // default = content
@@ -229,64 +257,305 @@ window.addEventListener("click", (event) => {
navigateTo(href, target); navigateTo(href, target);
}); });
//popup
function popup(message, afterClose){
// Создаём overlay
const overlay = document.createElement('div');
overlay.className = 'overlay';
// Создаём popup
const popup = document.createElement('div');
popup.className = 'popup';
// Добавляем текст
const text = document.createElement('div');
text.textContent = message;
// Добавляем кнопку закрытия
const closeBtn = document.createElement('button');
closeBtn.textContent = 'Закрыть';
closeBtn.addEventListener('click', () => {
overlay.remove();
if (typeof afterClose === 'function') {
afterClose(); // ← ВАША ФУНКЦИЯ ПОСЛЕ ЗАКРЫТИЯ
}
});
}
//popupMenu
function popupMenu(message, afterClose){
// Создаём popupMenu
const popupMenu = document.createElement('div');
popup.className = 'popup_Menu';
// Добавляем текст
const text = document.createElement('div');
text.textContent = message;
// Добавляем кнопку закрытия
const closeBtn = document.createElement('button');
closeBtn.textContent = 'Закрыть';
closeBtn.addEventListener('click', () => {
overlay.remove();
if (typeof afterClose === 'function') {
afterClose(); // ← ВАША ФУНКЦИЯ ПОСЛЕ ЗАКРЫТИЯ
}
});
popup.appendChild(text);
popup.appendChild(closeBtn);
overlay.appendChild(popup);
document.body.appendChild(overlay);
};
/* ------------------- Переключение видимости пароля ------------------- */
/*****************************************************************************
* Переключение видимости пароля
*****************************************************************************/
document.addEventListener("click", (e) => { document.addEventListener("click", (e) => {
if (!e.target.classList.contains("toggle-pass")) return; if (!e.target.classList.contains("toggle-pass")) return;
//console.log("toggle"); console.log("toggle");
const input = e.target.previousElementSibling; const input = e.target.previousElementSibling;
if (!input) return; if (!input) return;
if (input.type === "password") { if (input.type === "password") {
input.type = "text"; input.type = "text";
e.target.textContent = "🙈"; e.target.textContent = "*";//🔓
} else { } else {
input.type = "password"; input.type = "password";
e.target.textContent = "👁"; e.target.textContent = "A";//🔒
} }
}); });
/*****************************************************************************
* Получение данных пользователя. Пример использования:
* btn.onclick = async function () {
* const user = await getUserDataByID(3);
* alert(user.name);
* };
*****************************************************************************/
async function getUserDataByID(id) {
const data = await apiProtected(
`/api/users/getUserData?userid=${encodeURIComponent(id)}&by=id`
);
return {
id: data.ID,
name: data.Username
}
}
/******************************************************************************
* Функция userLogin:
*
* - пытается залогиниться через API,
* - возвращает accessToken при успехе,
* - бросает понятные ошибки (INVALID_CREDENTIALS, LOGIN_FAILED) при неудаче.
******************************************************************************/
async function userLogin(username, password) {
try {
// Запрос логина
const r = await apiProtected(`/api/auth/login`, {
method: "POST",
headers: {
"Content-Type": "application/json"
},
body: JSON.stringify({
username,
password
})
});
// Проверка access token
if (!r?.access_token) {
throw new Error("Token not received");
}
const payload = JSON.parse(
atob(r.access_token.split(".")[1].replace(/-/g, "+").replace(/_/g, "/"))
);
// Успешный результат
user.name = username;
user.id = payload.user_id;
return {
accessToken: r.access_token
};
// Обработка ошибок (catch)
} catch (err) {
// err — объект { status, data } из apiProtected
if (err?.status === 401) {
throw new Error("INVALID_CREDENTIALS");
}
// Неверный логин / пароль
console.error("Login error:", err);
throw new Error("LOGIN_FAILED");
}
}
/******************************************************************************
* userLogout — это функция выхода пользователя из системы.
******************************************************************************/
async function userLogout() {
accessToken = "";
await fetch("/api/auth/logout", { method: "POST", credentials: "include" });
};
/******************************************************************************
* userRegister функция которая:
*
* - регистрирует нового пользователя,
* - возвращает ответ сервера при успехе,
* - преобразует HTTP-ошибки в бизнес-ошибки, понятные UI.
******************************************************************************/
async function userRegister(username, password) {
try {
// Запрос регистрации
const data = await apiProtected("/api/auth/register", {
method: "POST",
body: {
username,
password
}
});
// Успешный результат
return data;
// Перехват ошибок
} catch (err) {
// Сюда прилетают ошибки, брошенные apiProtected:
// Логирование
console.error("Register error:", err);
// Маппинг HTTP → бизнес-ошибки
// Некорректные данные
if (err?.status === 400) {
throw new Error("BAD_REQUEST");
}
// Пользователь уже существует
if (err?.status === 409) {
throw new Error("USER_EXISTS");
}
// Любая другая ошибка
throw new Error("REGISTER_FAILED");
}
}
/***************************************************************************
* Класса UIComponents это статический UI-helper, который:
*
* - не хранит состояние приложения
* - не зависит от фреймворков
* - создаёт всплывающие UI-элементы поверх страницы
*
* Содержит методы:
*
* - UIComponents.showAlert(...)
* - UIComponents.confirm(...)
* - UIComponents.showPopupList(...)
* - UIComponents.showFileProperties(...)
***************************************************************************/
class UIComponents {
/* ============== 1. АЛЕРТ С ОВЕРЛЕЕМ ============== */
/* Показывает модальное окно с кнопкой OK.
с затемняющим фоном, который перекрывает страницу*/
static showAlert(message) {//, title = 'Сообщение'
const overlay = document.createElement('div');
overlay.className = 'ui-overlay';
const alertBox = document.createElement('div');
alertBox.className = 'window-popup';//ui-alert
alertBox.innerHTML =
//<h3>${title}</h3>
`<p>${message}</p>
<button>OK</button>
`;
alertBox.querySelector('button').onclick = () => {
overlay.remove();
};
overlay.appendChild(alertBox);
document.body.appendChild(overlay);
}
/*==================== 2. confirm ===================== */
/* Аналог window.confirm */
static confirm(message, title = 'Подтверждение') {
return new Promise(resolve => {
const overlay = document.createElement('div');
overlay.className = 'ui-overlay';
const box = document.createElement('div');
box.className = 'ui-alert';
box.innerHTML = `
<h3>${title}</h3>
<p>${message}</p>
<div style="display:flex;justify-content:center;gap:12px;margin-top:16px">
<button data-yes>Да</button>
<button data-no>Нет</button>
</div>
`;
const close = (result) => {
overlay.remove();
resolve(result);
};
box.querySelector('[data-yes]').onclick = () => close(true);
box.querySelector('[data-no]').onclick = () => close(false);
overlay.appendChild(box);
document.body.appendChild(overlay);
});
}
/* ========== 3. ПОПАП СПИСОК ========== */
static showPopupList(items = {}, x = 0, y = 0) {
// Удаляем предыдущий popup
if (UIComponents.currentPopup) {
UIComponents.currentPopup.remove();
UIComponents.currentPopup = null;
}
const popup = document.createElement('div');
popup.className = 'ui-popup-list';
popup.style.left = x + 'px';
popup.style.top = y + 'px';
for (const [name, fn] of Object.entries(items)) {
const el = document.createElement('div');
el.textContent = name;
el.onclick = () => {
fn(); // вызываем конкретную функцию
popup.remove();
UIComponents.currentPopup = null;
};
popup.appendChild(el);
}
document.body.appendChild(popup);
UIComponents.currentPopup = popup;
const removePopup = () => {
if (UIComponents.currentPopup) {
UIComponents.currentPopup.remove();
UIComponents.currentPopup = null;
}
document.removeEventListener('click', removePopup);
};
setTimeout(() => document.addEventListener('click', removePopup), 0);
}
/* ========== 4. ОКНО "СВОЙСТВА ФАЙЛА" ========== */
static showFileProperties(general = {}, details = {}) {
const overlay = document.createElement('div');
overlay.className = 'ui-overlay';
const win = document.createElement('div');
win.className = 'ui-window';
win.style.position = 'absolute';
const rows = obj =>
Object.entries(obj)
.map(([k, v]) => `<div class="row"><span>${k}</span><span>${v}</span></div>`)
.join('');
win.innerHTML = `
<div class="header">
<span>Свойства</span>
<button>&times;</button>
</div>
<div class="tabs">
<div class="tab active" data-tab="general">Общие</div>
<div class="tab" data-tab="details">Подробно</div>
</div>
<div class="tab-content active" id="general">${rows(general)}</div>
<div class="tab-content" id="details">${rows(details)}</div>
`;
win.querySelector('button').onclick = () => overlay.remove();
/* tabs */
win.querySelectorAll('.tab').forEach(tab => {
tab.onclick = () => {
win.querySelectorAll('.tab, .tab-content')
.forEach(e => e.classList.remove('active'));
tab.classList.add('active');
win.querySelector('#' + tab.dataset.tab).classList.add('active');
};
});
/* drag */
const header = win.querySelector('.header');
header.onmousedown = (e) => {
const r = win.getBoundingClientRect();
const dx = e.clientX - r.left;
const dy = e.clientY - r.top;
document.onmousemove = e =>
Object.assign(win.style, {
left: e.clientX - dx + 'px',
top: e.clientY - dy + 'px'
});
document.onmouseup = () => document.onmousemove = null;
};
overlay.appendChild(win);
document.body.appendChild(overlay);
win.style.left = 'calc(50% - 180px)';
win.style.top = '20%';
}
}

View File

@@ -1,12 +1,11 @@
<!DOCTYPE html> <!DOCTYPE html>
<html lang="ru"> <html lang="ru">
<head> <head>
<meta charset="UTF-8"> <meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="viewport" content="width=device-width, initial-scale=1.0">
<base href="/"> <base href="/">
<link rel="icon" type="image/png" href="/static/img/favicon.png"> <link rel="icon" type="image/png" href="/img/favicon.png">
<title>JWT SPA project</title> <title>TS Web</title>
<link rel="stylesheet" href="/static/css/style.css"> <link rel="stylesheet" href="/static/css/style.css">
<script defer src="/static/js/app.js"></script> <script defer src="/static/js/app.js"></script>
</head> </head>
@@ -18,7 +17,7 @@
<main id="content"></main> <main id="content"></main>
<footer> <footer>
<p>© 2025 Go Markdown SPA</p> <p>© 2025 TriggersSmith web</p>
</footer> </footer>
</body> </body>
</html> </html>

View File

@@ -17,5 +17,6 @@
<li><a href="/gpt" data-link="true" data-target="content">GPT</a></li> <li><a href="/gpt" data-link="true" data-target="content">GPT</a></li>
<li><a href="/ACL" data-link="true" data-target="content">ACL</a></li> <li><a href="/ACL" data-link="true" data-target="content">ACL</a></li>
<li><a href="/userSlava/popup" data-link="true" data-target="content">Сообщения popup</a></li> <li><a href="/userSlava/popup" data-link="true" data-target="content">Сообщения popup</a></li>
<li><a href="/session" data-link="true" data-target="content">Сессия</a></li>
</ul> </ul>
</nav> </nav>

View File

@@ -12,7 +12,7 @@ async function UserLogin() {
const p = document.getElementById("password").value; const p = document.getElementById("password").value;
try { try {
const r = await fetch("/api/users/login", { const r = await fetch("/api/auth/login", {
method: "POST", method: "POST",
credentials: "include", credentials: "include",
headers: { "Content-Type": "application/json" }, headers: { "Content-Type": "application/json" },
@@ -35,7 +35,7 @@ async function UserLogin() {
async function UserLogout() { async function UserLogout() {
try { try {
await fetch("/api/users/logout", { method: "POST", credentials: "include" }); await fetch("/api/auth/logout", { method: "POST", credentials: "include" });
accessToken = ""; accessToken = "";
alert("logged out"); alert("logged out");
} catch (err) { } catch (err) {

View File

@@ -0,0 +1,19 @@
<div class="form1" id="login_block">
# Вход в систему
Пожалуйста, введите ваши данные для входа.
<div class="grid-block">
<label for="username">Имя пользователя</label>
<input type="text" id="username" name="username" required>
<label for="password">Пароль</label>
<input type="password" id="password" name="password" required>
<button type="submit" id="login_btn">Войти</button>
</div>
</div>
<div class="form1" id="user_block">
<p id="user_info"></p>
<button id="logout_btn">Выйти</button>
</div>

View File

@@ -0,0 +1,67 @@
async function initUser() {
try {
// Если нет токена, делаем refresh
if (!accessToken) {
await refreshAccess ();
}
// Проверяем, получили ли токен
if (!accessToken) throw new Error("no token");
// выводим имя пользователя
user_info.innerHTML = `Вы зашли как: ${user.name}. </br> Ваш ID:${user.id}`;
// Показываем блок пользователя
showUser()
} catch (e) {
// Показываем блок логина
showLogin()
console.error(e);
}
}
function showLogin() {
login_block.classList.remove("hiden_block");
user_block.classList.add("hiden_block");
}
function showUser() {
login_block.classList.add("hiden_block");
user_block.classList.remove("hiden_block");
}
initUser();
/* --------------------------- Логин ------------------------------- */
async function onLoginClick() {
try {
const { accessToken: token } = await userLogin(
username.value.trim(),
password.value
);
accessToken = token;
// UIComponents.showAlert("Вы успешно вошли как "+user.name+".</br> Ваш ID:"+user.id);
username.value = "";
password.value = "";
} catch (e) {
switch (e.message) {
case "INVALID_CREDENTIALS":
UIComponents.showAlert("Неверный логин или пароль");
break;
case "BAD_REQUEST":
UIComponents.showAlert("Некорректный запрос");
break;
default:
UIComponents.showAlert("Ошибка при логине");
}
}
initUser();
}
/* ------------------- Кнопки ------------------- */
logout_btn.onclick = async () => {
await userLogout(); // вызываем существующую функцию
initUser(); // делаем своё
};
login_btn.onclick = onLoginClick;

View File

@@ -0,0 +1,78 @@
.hiden_block{
display:none;
}
.form1 {
background: #fff;
padding: 10px;
border-radius: 16px;
box-shadow: 0 4px 20px rgba(0,0,0,0.1);
/*max-width: 250px;
width: 100%;*/
width: 250px;
}
.form1 h1 {
margin-top: 0;
text-align: center;
font-size: 26px;
color: #333;
}
.form1 p {
text-align: center;
color: #666;
margin-bottom: 25px;
}
.form1 .grid-block h3 {
margin-bottom: 15px;
color: #444;
text-align: center;
}
.form1 form {
display: flex;
flex-direction: column;
gap: 14px;
}
.form1 label {
font-size: 15px;
color: #555;
}
.form1 input {
padding: 10px 12px;
font-size: 15px;
border-radius: 8px;
border: 1px solid #ccc;
transition: border 0.2s, box-shadow 0.2s;
}
.form1 input:focus {
border-color: #7f57ff;
box-shadow: 0 0 0 2px rgba(127, 87, 255, 0.2);
outline: none;
}
.form1 button {
width: 100%;
padding: 10px 12px;
font-size: 16px;
background:#e4e4e4;
/* color: white; */
border: 1px solid #ccc;
border-radius: 8px;
cursor: pointer;
margin-top: 10px;
transition: background 0.25s, transform 0.1s;
}
.form1 button:hover {
background: #aa92f8;
}
.form1 button:active {
transform: scale(0.98);
}

View File

@@ -12,14 +12,14 @@ btn_prot.onclick = async () => {
async function UserLogout() { async function UserLogout() {
accessToken = ""; accessToken = "";
await fetch("/api/users/logout", { method: "POST", credentials: "include" }); await fetch("/api/auth/logout", { method: "POST", credentials: "include"});
}; };
async function UserLogin() { async function UserLogin() {
const u = log_user.value, const u = log_user.value,
p = log_pass.value; p = log_pass.value;
const r = await fetch("/api/users/login", { const r = await fetch("/api/auth/login", {
method: "POST", method: "POST",
credentials: "include", credentials: "include",
headers: { "Content-Type": "application/json" }, headers: { "Content-Type": "application/json" },