mirror of
https://github.com/harness/drone.git
synced 2025-05-05 21:19:37 +08:00

This change introduces the concept of a principal (abstraction of call identity), and adds a new service account type principal. Also adds support for different tokens (session, PAT, SAT, OAuth2) and adds auth.Session which is being used to capture information about the caller and call method.
105 lines
2.6 KiB
Go
105 lines
2.6 KiB
Go
// Copyright 2021 Harness Inc. All rights reserved.
|
|
// Use of this source code is governed by the Polyform Free Trial License
|
|
// that can be found in the LICENSE.md file for this repository.
|
|
|
|
package users
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/http"
|
|
"time"
|
|
|
|
"github.com/gotidy/ptr"
|
|
"github.com/harness/gitness/internal/api/render"
|
|
"github.com/harness/gitness/internal/api/request"
|
|
"github.com/harness/gitness/internal/store"
|
|
"github.com/harness/gitness/types"
|
|
"github.com/harness/gitness/types/check"
|
|
"github.com/rs/zerolog/hlog"
|
|
|
|
"golang.org/x/crypto/bcrypt"
|
|
)
|
|
|
|
// GenerateFromPassword returns the bcrypt hash of the
|
|
// password at the given cost.
|
|
var hashPassword = bcrypt.GenerateFromPassword
|
|
|
|
// HandleUpdate returns a http.HandlerFunc that processes an http.Request
|
|
// to update a user account.
|
|
func HandleUpdate(userStore store.UserStore) http.HandlerFunc {
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
ctx := r.Context()
|
|
log := hlog.FromRequest(r)
|
|
user, _ := request.UserFrom(ctx)
|
|
|
|
in := new(types.UserInput)
|
|
if err := json.NewDecoder(r.Body).Decode(in); err != nil {
|
|
render.BadRequestf(w, "Invalid request body: %s.", err)
|
|
return
|
|
}
|
|
|
|
if in.Password != nil {
|
|
var hash []byte
|
|
hash, err := hashPassword([]byte(ptr.ToString(in.Password)), bcrypt.DefaultCost)
|
|
if err != nil {
|
|
log.Err(err).
|
|
Int64("user_id", user.ID).
|
|
Str("user_email", user.Email).
|
|
Msg("Failed to hash password")
|
|
|
|
render.InternalError(w)
|
|
return
|
|
}
|
|
user.Password = string(hash)
|
|
}
|
|
|
|
if in.Name != nil {
|
|
user.Name = ptr.ToString(in.Name)
|
|
}
|
|
|
|
if in.Admin != nil {
|
|
user.Admin = ptr.ToBool(in.Admin)
|
|
}
|
|
|
|
// TODO: why are we overwriting the password twice?
|
|
if in.Password != nil {
|
|
var hash []byte
|
|
hash, err := bcrypt.GenerateFromPassword([]byte(ptr.ToString(in.Password)), bcrypt.DefaultCost)
|
|
if err != nil {
|
|
log.Err(err).
|
|
Int64("user_id", user.ID).
|
|
Str("user_email", user.Email).
|
|
Msg("Failed to hash password")
|
|
|
|
render.InternalError(w)
|
|
return
|
|
}
|
|
user.Password = string(hash)
|
|
}
|
|
if err := check.User(user); err != nil {
|
|
log.Debug().Err(err).
|
|
Int64("user_id", user.ID).
|
|
Str("user_email", user.Email).
|
|
Msg("invalid user input")
|
|
|
|
render.UserfiedErrorOrInternal(w, err)
|
|
return
|
|
}
|
|
|
|
user.Updated = time.Now().UnixMilli()
|
|
|
|
err := userStore.Update(ctx, user)
|
|
if err != nil {
|
|
log.Err(err).
|
|
Int64("user_id", user.ID).
|
|
Str("user_email", user.Email).
|
|
Msg("Failed to update the usser")
|
|
|
|
render.UserfiedErrorOrInternal(w, err)
|
|
return
|
|
}
|
|
|
|
render.JSON(w, http.StatusOK, user)
|
|
}
|
|
}
|