homebox/backend/app/api/v1/v1_ctrl_user.go

158 lines
4.2 KiB
Go
Raw Normal View History

2022-08-30 02:30:36 +00:00
package v1
import (
"net/http"
2022-08-30 18:05:11 +00:00
"github.com/google/uuid"
"github.com/hay-kot/homebox/backend/internal/repo"
"github.com/hay-kot/homebox/backend/internal/services"
"github.com/hay-kot/homebox/backend/pkgs/server"
2022-09-03 18:38:35 +00:00
"github.com/rs/zerolog/log"
2022-08-30 02:30:36 +00:00
)
2022-08-30 18:05:11 +00:00
// HandleUserSelf godoc
// @Summary Get the current user
// @Tags User
// @Produce json
// @Param payload body services.UserRegistration true "User Data"
// @Success 204
// @Router /v1/users/register [Post]
2022-08-30 18:05:11 +00:00
func (ctrl *V1Controller) HandleUserRegistration() http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
regData := services.UserRegistration{}
2022-08-30 18:05:11 +00:00
if err := server.Decode(r, &regData); err != nil {
2022-09-03 18:38:35 +00:00
log.Err(err).Msg("failed to decode user registration data")
2022-08-30 18:05:11 +00:00
server.RespondError(w, http.StatusInternalServerError, err)
return
}
2022-10-14 22:02:16 +00:00
if !ctrl.allowRegistration && regData.GroupToken == "" {
server.RespondError(w, http.StatusForbidden, nil)
return
}
2022-08-31 00:40:39 +00:00
_, err := ctrl.svc.User.RegisterUser(r.Context(), regData)
2022-08-30 18:05:11 +00:00
if err != nil {
log.Err(err).Msg("failed to register user")
2022-08-30 18:05:11 +00:00
server.RespondError(w, http.StatusInternalServerError, err)
return
}
2022-08-31 00:40:39 +00:00
server.Respond(w, http.StatusNoContent, nil)
2022-08-30 18:05:11 +00:00
}
}
2022-08-30 02:30:36 +00:00
// HandleUserSelf godoc
// @Summary Get the current user
// @Tags User
// @Produce json
// @Success 200 {object} server.Result{item=repo.UserOut}
// @Router /v1/users/self [GET]
// @Security Bearer
2022-08-30 02:30:36 +00:00
func (ctrl *V1Controller) HandleUserSelf() http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
token := services.UseTokenCtx(r.Context())
usr, err := ctrl.svc.User.GetSelf(r.Context(), token)
2022-08-30 18:05:11 +00:00
if usr.ID == uuid.Nil || err != nil {
2022-09-03 18:38:35 +00:00
log.Err(err).Msg("failed to get user")
2022-08-31 00:40:39 +00:00
server.RespondServerError(w)
2022-08-30 02:30:36 +00:00
return
}
2022-08-31 00:40:39 +00:00
server.Respond(w, http.StatusOK, server.Wrap(usr))
2022-08-30 02:30:36 +00:00
}
}
2022-09-04 02:42:03 +00:00
// HandleUserSelfUpdate godoc
// @Summary Update the current user
// @Tags User
// @Produce json
// @Param payload body repo.UserUpdate true "User Data"
// @Success 200 {object} server.Result{item=repo.UserUpdate}
// @Router /v1/users/self [PUT]
// @Security Bearer
2022-09-04 02:42:03 +00:00
func (ctrl *V1Controller) HandleUserSelfUpdate() http.HandlerFunc {
2022-08-30 02:30:36 +00:00
return func(w http.ResponseWriter, r *http.Request) {
updateData := repo.UserUpdate{}
2022-08-30 02:30:36 +00:00
if err := server.Decode(r, &updateData); err != nil {
2022-09-03 18:38:35 +00:00
log.Err(err).Msg("failed to decode user update data")
2022-08-30 02:30:36 +00:00
server.RespondError(w, http.StatusBadRequest, err)
return
}
actor := services.UseUserCtx(r.Context())
newData, err := ctrl.svc.User.UpdateSelf(r.Context(), actor.ID, updateData)
if err != nil {
server.RespondError(w, http.StatusInternalServerError, err)
return
}
2022-08-31 00:40:39 +00:00
server.Respond(w, http.StatusOK, server.Wrap(newData))
2022-08-30 02:30:36 +00:00
}
}
2022-09-04 02:42:03 +00:00
// HandleUserSelfDelete godoc
// @Summary Deletes the user account
// @Tags User
// @Produce json
// @Success 204
// @Router /v1/users/self [DELETE]
// @Security Bearer
2022-09-04 02:42:03 +00:00
func (ctrl *V1Controller) HandleUserSelfDelete() http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
if ctrl.isDemo {
server.RespondError(w, http.StatusForbidden, nil)
return
}
2022-09-04 02:42:03 +00:00
actor := services.UseUserCtx(r.Context())
if err := ctrl.svc.User.DeleteSelf(r.Context(), actor.ID); err != nil {
server.RespondError(w, http.StatusInternalServerError, err)
return
}
server.Respond(w, http.StatusNoContent, nil)
}
}
type (
ChangePassword struct {
Current string `json:"current,omitempty"`
New string `json:"new,omitempty"`
}
)
// HandleUserSelfChangePassword godoc
// @Summary Updates the users password
// @Tags User
// @Success 204
// @Param payload body ChangePassword true "Password Payload"
// @Router /v1/users/change-password [PUT]
// @Security Bearer
func (ctrl *V1Controller) HandleUserSelfChangePassword() http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
if ctrl.isDemo {
server.RespondError(w, http.StatusForbidden, nil)
return
}
var cp ChangePassword
err := server.Decode(r, &cp)
if err != nil {
log.Err(err).Msg("user failed to change password")
}
ctx := services.NewContext(r.Context())
ok := ctrl.svc.User.ChangePassword(ctx, cp.Current, cp.New)
if !ok {
server.RespondError(w, http.StatusInternalServerError, err)
return
}
server.Respond(w, http.StatusNoContent, nil)
}
}