2020-11-22 13:49:34 +01:00
|
|
|
class AuthD::Request
|
2023-06-13 03:15:08 +02:00
|
|
|
IPC::JSON.message AddUser, 9 do
|
2020-11-22 13:49:34 +01:00
|
|
|
property login : String
|
|
|
|
property password : String
|
2023-06-10 17:26:12 +02:00
|
|
|
property admin : Bool = false
|
2020-11-22 13:49:34 +01:00
|
|
|
property email : String? = nil
|
|
|
|
property profile : Hash(String, JSON::Any)? = nil
|
|
|
|
|
2023-06-12 23:24:49 +02:00
|
|
|
def initialize(@login, @password, @admin, @email, @profile)
|
2020-11-22 13:49:34 +01:00
|
|
|
end
|
|
|
|
|
2023-06-10 17:26:12 +02:00
|
|
|
def handle(authd : AuthD::Service, fd : Int32)
|
2023-06-12 14:40:03 +02:00
|
|
|
logged_user = authd.get_logged_user_full? fd
|
2023-06-11 16:39:16 +02:00
|
|
|
return Response::Error.new "you must be logged" if logged_user.nil?
|
2023-06-12 14:40:03 +02:00
|
|
|
|
|
|
|
logged_user.assert_permission("authd", "*", User::PermissionLevel::Admin)
|
2020-11-22 13:49:34 +01:00
|
|
|
|
|
|
|
if authd.users_per_login.get? @login
|
|
|
|
return Response::Error.new "login already used"
|
|
|
|
end
|
|
|
|
|
2023-06-11 16:39:16 +02:00
|
|
|
# No verification of the user's informations when an admin adds it.
|
|
|
|
# No mail address verification.
|
2020-11-22 13:49:34 +01:00
|
|
|
if authd.configuration.require_email && @email.nil?
|
|
|
|
return Response::Error.new "email required"
|
|
|
|
end
|
|
|
|
|
|
|
|
password_hash = authd.hash_password @password
|
|
|
|
|
|
|
|
uid = authd.new_uid
|
|
|
|
|
|
|
|
user = User.new uid, @login, password_hash
|
|
|
|
user.contact.email = @email unless @email.nil?
|
2023-06-10 17:26:12 +02:00
|
|
|
user.admin = @admin
|
2020-11-22 13:49:34 +01:00
|
|
|
|
|
|
|
@profile.try do |profile|
|
|
|
|
user.profile = profile
|
|
|
|
end
|
|
|
|
|
2023-06-11 16:39:16 +02:00
|
|
|
# We consider adding the user as a registration.
|
2020-11-22 13:49:34 +01:00
|
|
|
user.date_registration = Time.local
|
|
|
|
|
|
|
|
authd.users << user
|
2023-02-09 17:55:34 +01:00
|
|
|
authd.new_uid_commit uid
|
2020-11-22 13:49:34 +01:00
|
|
|
Response::UserAdded.new user.to_public
|
|
|
|
end
|
|
|
|
end
|
|
|
|
AuthD.requests << AddUser
|
2023-06-13 23:40:34 +02:00
|
|
|
|
|
|
|
IPC::JSON.message BootstrapFirstAdmin, 13 do
|
|
|
|
property login : String
|
|
|
|
property password : String
|
|
|
|
property email : String? = nil
|
|
|
|
property profile : Hash(String, JSON::Any)? = nil
|
|
|
|
|
|
|
|
def initialize(@login, @password, @email, @profile = nil)
|
|
|
|
end
|
|
|
|
|
|
|
|
def handle(authd : AuthD::Service, fd : Int32)
|
|
|
|
# Check if there already is a registered user.
|
|
|
|
if authd.users.to_a.size > 0
|
|
|
|
return Response::Error.new "already users in the database"
|
|
|
|
end
|
|
|
|
|
|
|
|
password_hash = authd.hash_password @password
|
|
|
|
|
|
|
|
uid = authd.new_uid
|
|
|
|
|
|
|
|
user = User.new uid, @login, password_hash
|
|
|
|
user.contact.email = @email unless @email.nil?
|
|
|
|
user.admin = true
|
|
|
|
|
|
|
|
@profile.try do |profile|
|
|
|
|
user.profile = profile
|
|
|
|
end
|
|
|
|
|
|
|
|
# We consider adding the user as a registration.
|
|
|
|
user.date_registration = Time.local
|
|
|
|
|
|
|
|
authd.users << user
|
|
|
|
authd.new_uid_commit uid
|
|
|
|
Response::UserAdded.new user.to_public
|
|
|
|
end
|
|
|
|
end
|
|
|
|
AuthD.requests << BootstrapFirstAdmin
|
2020-11-22 13:49:34 +01:00
|
|
|
end
|