authd/src/requests/admin.cr

109 lines
2.9 KiB
Crystal
Raw Normal View History

2020-11-22 13:49:34 +01:00
class AuthD::Request
2023-06-13 03:15:08 +02:00
IPC::JSON.message AddUser, 9 do
2020-11-22 13:49:34 +01:00
property login : String
property password : String
property admin : Bool = false
2020-11-22 13:49:34 +01:00
property email : String? = nil
property profile : Hash(String, JSON::Any)? = nil
def initialize(@login, @password, @admin, @email, @profile)
2020-11-22 13:49:34 +01:00
end
def handle(authd : AuthD::Service, fd : Int32)
logged_user = authd.get_logged_user_full? fd
2023-06-14 01:46:38 +02:00
return Response::ErrorMustBeAuthenticated.new if logged_user.nil?
logged_user.assert_permission("authd", "*", User::PermissionLevel::Admin)
2020-11-22 13:49:34 +01:00
if authd.users_per_login.get? @login
2023-06-14 01:46:38 +02:00
return Response::ErrorAlreadyUsedLogin.new
2020-11-22 13:49:34 +01:00
end
# No verification of the user's informations when an admin adds it.
# No mail address verification.
2020-11-22 13:49:34 +01:00
if authd.configuration.require_email && @email.nil?
2023-06-14 01:46:38 +02:00
return Response::ErrorMailRequired.new
2020-11-22 13:49:34 +01:00
end
password_hash = authd.hash_password @password
uid = authd.new_uid
user = User.new uid, @login, password_hash
user.contact.email = @email unless @email.nil?
user.admin = @admin
2020-11-22 13:49:34 +01:00
@profile.try do |profile|
user.profile = profile
end
# We consider adding the user as a registration.
2020-11-22 13:49:34 +01:00
user.date_registration = Time.local
authd.users << user
authd.new_uid_commit uid
2020-11-22 13:49:34 +01:00
Response::UserAdded.new user.to_public
end
end
AuthD.requests << AddUser
IPC::JSON.message BootstrapFirstAdmin, 13 do
property login : String
property password : String
property email : String? = nil
property profile : Hash(String, JSON::Any)? = nil
def initialize(@login, @password, @email, @profile = nil)
end
def handle(authd : AuthD::Service, fd : Int32)
# Check if there already is a registered user.
if authd.users.to_a.size > 0
return Response::ErrorAlreadyUsersInDB.new
end
password_hash = authd.hash_password @password
uid = authd.new_uid
user = User.new uid, @login, password_hash
user.contact.email = @email unless @email.nil?
user.admin = true
@profile.try do |profile|
user.profile = profile
end
# We consider adding the user as a registration.
user.date_registration = Time.local
authd.users << user
authd.new_uid_commit uid
Response::UserAdded.new user.to_public
end
end
AuthD.requests << BootstrapFirstAdmin
2023-06-14 18:39:23 +02:00
IPC::JSON.message DecodeToken, 14 do
property token : String
def initialize(@token)
end
def handle(authd : AuthD::Service, fd : Int32)
logged_user = authd.get_logged_user_full? fd
return Response::ErrorMustBeAuthenticated.new if logged_user.nil?
logged_user.assert_permission("authd", "*", User::PermissionLevel::Read)
token_payload = AuthD::Token.from_s authd.configuration.secret_key, token
user = authd.users_per_uid.get? token_payload.uid.to_s
if user
Response::User.new user.to_public
else
Response::ErrorUserNotFound.new
end
end
end
AuthD.requests << DecodeToken
2020-11-22 13:49:34 +01:00
end