oef/handlers/handlers.go

473 lines
12 KiB
Go
Raw Normal View History

2019-11-04 15:00:46 +01:00
package handlers
import (
"encoding/json"
"fmt"
"io/ioutil"
"log"
"net/http"
"path/filepath"
"reflect"
"runtime/debug"
"strconv"
"strings"
2019-12-04 10:11:18 +01:00
"git.andreafazzi.eu/andrea/oef/config"
"git.andreafazzi.eu/andrea/oef/i18n"
2019-11-04 15:00:46 +01:00
"git.andreafazzi.eu/andrea/oef/orm"
"git.andreafazzi.eu/andrea/oef/renderer"
2020-01-14 16:28:27 +01:00
jwtmiddleware "github.com/auth0/go-jwt-middleware"
2019-11-04 15:00:46 +01:00
jwt "github.com/dgrijalva/jwt-go"
"github.com/gorilla/mux"
2020-01-14 16:28:27 +01:00
"github.com/gorilla/sessions"
2019-11-22 11:16:27 +01:00
2019-11-04 15:00:46 +01:00
"github.com/jinzhu/inflection"
)
type PathPattern struct {
PathPattern string
RedirectPattern string
Methods []string
2019-12-04 12:20:34 +01:00
Permission int
}
2020-01-14 09:43:27 +01:00
type Handlers struct {
2020-01-14 16:28:27 +01:00
Config *config.ConfigT
Database *orm.Database
Models []interface{}
2020-01-14 09:43:27 +01:00
Renderer map[string]renderer.Renderer
Login func(db *orm.Database, store *sessions.CookieStore, signingKey []byte) http.Handler
2020-01-14 16:28:27 +01:00
Logout func(store *sessions.CookieStore) http.Handler
2020-01-14 09:43:27 +01:00
Home func() http.Handler
GetToken func(db *orm.Database, signingKey []byte) http.Handler
2020-01-14 09:43:27 +01:00
Static func() http.Handler
Recover func(next http.Handler) http.Handler
2020-01-16 12:47:35 +01:00
PathPatterns []PathPattern
APIPathPatterns []PathPattern
RolePermissions map[string]map[string][]int
2020-01-14 16:28:27 +01:00
CookieStore *sessions.CookieStore
JWTSigningKey []byte
JWTCookieMiddleware *jwtmiddleware.JWTMiddleware
JWTHeaderMiddleware *jwtmiddleware.JWTMiddleware
2020-01-14 09:43:27 +01:00
Router *mux.Router
}
2019-12-04 12:20:34 +01:00
var (
permissions map[string]map[string]bool
)
func init() {
permissions = make(map[string]map[string]bool, 0)
2019-11-04 15:00:46 +01:00
}
func (pp PathPattern) RedirectPath(model string, id ...uint) string {
if len(id) > 0 {
return fmt.Sprintf(pp.RedirectPattern, model, id[0], model)
}
return fmt.Sprintf(pp.RedirectPattern, model, model)
}
func (pp PathPattern) Path(model string) string {
return fmt.Sprintf(pp.PathPattern, model)
}
func modelName(s interface{}) string {
if t := reflect.TypeOf(s); t.Kind() == reflect.Ptr {
return t.Elem().Name()
} else {
return t.Name()
}
}
func pluralizedModelName(s interface{}) string {
return inflection.Plural(strings.ToLower(modelName(s)))
}
// Generate CRUD handlers for models
2020-01-14 09:43:27 +01:00
func (h *Handlers) generateModelHandlers(r *mux.Router, model interface{}) {
2019-11-04 15:00:46 +01:00
// Install standard paths
2020-01-16 12:47:35 +01:00
for _, pattern := range DefaultPathPatterns {
2019-11-22 11:16:27 +01:00
r.Handle(
pattern.Path(
pluralizedModelName(model),
),
2020-01-14 16:28:27 +01:00
h.JWTCookieMiddleware.Handler(
2020-01-14 09:43:27 +01:00
h.Recover(
h.modelHandler(
2019-11-22 11:16:27 +01:00
pluralizedModelName(model),
pattern,
)))).Methods(pattern.Methods...)
2019-11-04 15:00:46 +01:00
}
// Install API paths
2020-01-16 12:47:35 +01:00
for _, pattern := range h.APIPathPatterns {
2019-11-22 11:16:27 +01:00
r.Handle(pattern.Path(
pluralizedModelName(model),
),
2020-01-14 16:28:27 +01:00
h.JWTHeaderMiddleware.Handler(
2020-01-14 09:43:27 +01:00
h.Recover(
h.modelHandler(
2019-11-22 11:16:27 +01:00
pluralizedModelName(model),
pattern,
)))).Methods(pattern.Methods...)
2019-11-04 15:00:46 +01:00
}
2020-01-02 09:48:20 +01:00
// Set permissions for HTML patterns
2019-12-04 12:20:34 +01:00
2020-01-16 12:47:35 +01:00
for role, modelPermissions := range h.RolePermissions {
2019-12-04 12:20:34 +01:00
for m, perm := range modelPermissions {
if m == modelName(model) {
for _, p := range perm {
2020-01-16 12:47:35 +01:00
for _, pattern := range h.PathPatterns {
2019-12-04 12:20:34 +01:00
if pattern.Permission == p {
if permissions[role] == nil {
permissions[role] = make(map[string]bool)
}
permissions[role][pattern.Path(pluralizedModelName(model))] = true
}
}
2020-01-02 09:48:20 +01:00
2020-01-16 12:47:35 +01:00
for _, pattern := range DefaultAPIPathPatterns {
2020-01-02 09:48:20 +01:00
if pattern.Permission == p {
if permissions[role] == nil {
permissions[role] = make(map[string]bool)
}
permissions[role][pattern.Path(pluralizedModelName(model))] = true
}
}
2019-12-04 12:20:34 +01:00
}
}
}
}
2019-11-04 15:00:46 +01:00
}
2020-01-16 12:47:35 +01:00
func NewHandlers(
config *config.ConfigT,
renderer map[string]renderer.Renderer,
db *orm.Database,
models []interface{},
permissions map[string]map[string][]int,
pathPatterns []PathPattern,
apiPathPatterns []PathPattern,
) *Handlers {
2020-01-14 09:43:27 +01:00
handlers := new(Handlers)
2020-01-14 16:28:27 +01:00
handlers.Config = config
handlers.Renderer = renderer
handlers.Database = db
2020-01-14 16:28:27 +01:00
handlers.CookieStore = sessions.NewCookieStore([]byte(config.Keys.CookieStoreKey))
handlers.Login = handlers.DefaultLoginHandler
2020-01-14 09:43:27 +01:00
handlers.Logout = DefaultLogoutHandler
handlers.Recover = DefaultRecoverHandler
handlers.Home = DefaultHomeHandler
handlers.GetToken = DefaultGetTokenHandler
2020-01-16 12:47:35 +01:00
handlers.RolePermissions = permissions
handlers.PathPatterns = pathPatterns
handlers.APIPathPatterns = apiPathPatterns
2020-01-14 16:28:27 +01:00
handlers.JWTCookieMiddleware = jwtmiddleware.New(jwtmiddleware.Options{
ValidationKeyGetter: func(token *jwt.Token) (interface{}, error) {
return []byte(config.Keys.JWTSigningKey), nil
},
SigningMethod: jwt.SigningMethodHS256,
Extractor: handlers.cookieExtractor,
ErrorHandler: handlers.onError,
})
handlers.JWTHeaderMiddleware = jwtmiddleware.New(jwtmiddleware.Options{
ValidationKeyGetter: func(token *jwt.Token) (interface{}, error) {
return config.Keys.JWTSigningKey, nil
},
SigningMethod: jwt.SigningMethodHS256,
})
2019-11-04 15:00:46 +01:00
r := mux.NewRouter()
// Authentication
r.Handle("/login", handlers.Login(handlers.Database, handlers.CookieStore, []byte(config.Keys.JWTSigningKey)))
2020-01-14 16:28:27 +01:00
r.Handle("/logout", handlers.Logout(handlers.CookieStore))
2019-11-04 15:00:46 +01:00
2019-12-03 15:24:01 +01:00
// School subscription
r.Handle("/subscribe", handlers.Login(handlers.Database, handlers.CookieStore, []byte(config.Keys.JWTSigningKey)))
2019-12-03 15:24:01 +01:00
2020-01-14 09:43:27 +01:00
// Home
2019-11-04 15:00:46 +01:00
2020-01-14 16:28:27 +01:00
r.Handle("/", handlers.JWTCookieMiddleware.Handler(handlers.Recover(handlers.Home())))
2019-11-04 15:00:46 +01:00
// Generate CRUD handlers
for _, model := range models {
2020-01-14 09:43:27 +01:00
handlers.generateModelHandlers(r, model)
2019-11-04 15:00:46 +01:00
}
// Token handling
r.Handle("/get_token", handlers.GetToken(handlers.Database, []byte(config.Keys.JWTSigningKey)))
2019-11-04 15:00:46 +01:00
// Static file server
r.PathPrefix("/").Handler(http.FileServer(http.Dir("./dist/")))
2020-01-14 16:28:27 +01:00
handlers.Router = r
return handlers
2019-11-04 15:00:46 +01:00
}
2020-01-16 12:47:35 +01:00
func (h *Handlers) NewReadAllRequest(model interface{}) (*http.Request, error) {
name := inflection.Plural(orm.ModelName(model))
request, err := http.NewRequest("GET", "/contests?format=html&tpl_layout=base&tpl_content=contests", nil)
return request, err
}
2020-01-14 16:28:27 +01:00
func (h *Handlers) onError(w http.ResponseWriter, r *http.Request, err string) {
2019-11-04 15:00:46 +01:00
http.Redirect(w, r, "/login?tpl_layout=login&tpl_content=login", http.StatusTemporaryRedirect)
}
func respondWithStaticFile(w http.ResponseWriter, filename string) error {
f, err := ioutil.ReadFile(filepath.Join("public/html", filename))
if err != nil {
return err
}
w.Write(f)
return nil
}
2020-01-14 16:28:27 +01:00
func (h *Handlers) cookieExtractor(r *http.Request) (string, error) {
session, err := h.CookieStore.Get(r, "login-session")
2019-11-04 15:00:46 +01:00
if err != nil {
return "", nil
}
if session.Values["token"] == nil {
return "", nil
}
token := session.Values["token"].([]uint8)
return string(token), nil
}
2020-01-14 09:43:27 +01:00
func DefaultRecoverHandler(next http.Handler) http.Handler {
2019-11-04 15:00:46 +01:00
fn := func(w http.ResponseWriter, r *http.Request) {
defer func() {
if err := recover(); err != nil {
panicMsg := fmt.Sprintf("PANIC: %v\n\n== STACKTRACE ==\n%s", err, debug.Stack())
log.Print(panicMsg)
http.Error(w, panicMsg, http.StatusInternalServerError)
}
}()
next.ServeHTTP(w, r)
}
return http.HandlerFunc(fn)
}
2020-01-14 16:28:27 +01:00
func (h *Handlers) setFlashMessage(w http.ResponseWriter, r *http.Request, key string) error {
session, err := h.CookieStore.Get(r, "flash-session")
2019-12-04 10:11:18 +01:00
if err != nil {
return err
}
2020-01-14 16:28:27 +01:00
session.AddFlash(i18n.FlashMessages[key][h.Config.Language])
2019-12-04 10:11:18 +01:00
err = session.Save(r, w)
if err != nil {
return err
}
return nil
}
2019-12-04 12:20:34 +01:00
func hasPermission(role, path string) bool {
if permissions[role] == nil {
return false
}
return permissions[role][path]
}
2020-01-14 16:28:27 +01:00
func (h *Handlers) get(w http.ResponseWriter, r *http.Request, model string, pattern PathPattern) {
2019-11-04 15:00:46 +01:00
format := r.URL.Query().Get("format")
getFn, err := h.Database.GetFunc(pattern.Path(model))
2019-11-04 15:00:46 +01:00
if err != nil {
log.Println("Error:", err)
respondWithError(h, w, r, err)
2019-11-04 15:00:46 +01:00
} else {
2019-12-04 10:11:18 +01:00
claims := r.Context().Value("user").(*jwt.Token).Claims.(jwt.MapClaims)
role := claims["role"].(string)
2019-12-04 12:20:34 +01:00
if !hasPermission(role, pattern.Path(model)) {
2020-01-14 16:28:27 +01:00
h.setFlashMessage(w, r, "notAuthorized")
h.Renderer[format].Render(w, r, h.CookieStore, fmt.Errorf("%s", "Errore di autorizzazione"))
2019-11-04 15:00:46 +01:00
} else {
2019-12-04 10:11:18 +01:00
data, err := getFn(h.Database, mux.Vars(r), w, r)
2019-12-04 10:11:18 +01:00
if err != nil {
h.Renderer[format].Render(w, r, h.CookieStore, err)
2019-12-04 10:11:18 +01:00
} else {
h.Renderer[format].Render(w, r, h.CookieStore, data, r.URL.Query())
2019-12-04 10:11:18 +01:00
}
2019-11-04 15:00:46 +01:00
}
}
}
func (h *Handlers) post(w http.ResponseWriter, r *http.Request, model string, pattern PathPattern) {
2019-11-04 15:00:46 +01:00
var (
data interface{}
err error
)
respFormat := renderer.GetContentFormat(r)
postFn, err := h.Database.GetFunc(pattern.Path(model))
2019-11-04 15:00:46 +01:00
if err != nil {
respondWithError(h, w, r, err)
2019-11-04 15:00:46 +01:00
} else {
2019-12-19 13:56:54 +01:00
claims := r.Context().Value("user").(*jwt.Token).Claims.(jwt.MapClaims)
role := claims["role"].(string)
if !hasPermission(role, pattern.Path(model)) {
h.Renderer[respFormat].Render(w, r, h.CookieStore, fmt.Errorf("%s", "Errore di autorizzazione"))
2019-12-19 13:56:54 +01:00
} else {
data, err = postFn(h.Database, mux.Vars(r), w, r)
2019-12-19 13:56:54 +01:00
if err != nil {
respondWithError(h, w, r, err)
2019-12-19 13:56:54 +01:00
} else if pattern.RedirectPattern != "" {
if id := mux.Vars(r)["id"]; id != "" {
modelId, _ := strconv.Atoi(id)
http.Redirect(w, r, pattern.RedirectPath(model, uint(modelId)), http.StatusSeeOther)
} else {
http.Redirect(w, r, pattern.RedirectPath(model, data.(orm.IDer).GetID()), http.StatusSeeOther)
}
2019-11-04 15:00:46 +01:00
} else {
h.Renderer[respFormat].Render(w, r, h.CookieStore, data.(orm.IDer).GetID())
2019-11-04 15:00:46 +01:00
}
}
}
}
func (h *Handlers) delete(w http.ResponseWriter, r *http.Request, model string, pattern PathPattern) {
2019-12-19 13:56:54 +01:00
var data interface{}
2019-11-04 15:00:46 +01:00
respFormat := renderer.GetContentFormat(r)
2019-12-19 13:56:54 +01:00
claims := r.Context().Value("user").(*jwt.Token).Claims.(jwt.MapClaims)
2019-11-04 15:00:46 +01:00
2019-12-19 13:56:54 +01:00
role := claims["role"].(string)
if !hasPermission(role, pattern.Path(model)) {
h.Renderer[respFormat].Render(w, r, h.CookieStore, fmt.Errorf("%s", "Errore di autorizzazione"))
2019-11-04 15:00:46 +01:00
} else {
postFn, err := h.Database.GetFunc(pattern.Path(model))
2019-12-19 13:56:54 +01:00
if err != nil {
h.Renderer[r.URL.Query().Get("format")].Render(w, r, h.CookieStore, err)
2019-12-19 13:56:54 +01:00
}
data, err = postFn(h.Database, mux.Vars(r), w, r)
2019-12-19 13:56:54 +01:00
if err != nil {
h.Renderer["html"].Render(w, r, h.CookieStore, err)
2019-12-19 13:56:54 +01:00
} else if pattern.RedirectPattern != "" {
var data struct {
RedirectUrl string `json:"redirect_url"`
}
data.RedirectUrl = pattern.RedirectPath(model)
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(data)
} else {
h.Renderer[respFormat].Render(w, r, h.CookieStore, data.(orm.IDer).GetID())
2019-12-19 13:56:54 +01:00
}
2019-11-04 15:00:46 +01:00
}
}
func respondWithError(h *Handlers, w http.ResponseWriter, r *http.Request, err error) {
2019-11-04 15:00:46 +01:00
respFormat := renderer.GetContentFormat(r)
w.WriteHeader(http.StatusInternalServerError)
h.Renderer[respFormat].Render(w, r, h.CookieStore, err)
2019-11-04 15:00:46 +01:00
}
2020-01-14 09:43:27 +01:00
func (h *Handlers) modelHandler(model string, pattern PathPattern) http.Handler {
2019-11-04 15:00:46 +01:00
fn := func(w http.ResponseWriter, r *http.Request) {
// Replace "api" prefix
pattern.PathPattern = strings.Replace(pattern.PathPattern, "/api", "", -1)
switch r.Method {
case "GET":
2020-01-14 16:28:27 +01:00
h.get(w, r, model, pattern)
2019-11-04 15:00:46 +01:00
case "POST":
h.post(w, r, model, pattern)
2019-11-04 15:00:46 +01:00
case "DELETE":
h.delete(w, r, model, pattern)
2019-11-04 15:00:46 +01:00
}
}
return http.HandlerFunc(fn)
}
2020-01-14 09:43:27 +01:00
func DefaultHomeHandler() http.Handler {
2019-11-04 15:00:46 +01:00
fn := func(w http.ResponseWriter, r *http.Request) {
2019-11-22 11:16:27 +01:00
claims := r.Context().Value("user").(*jwt.Token).Claims.(jwt.MapClaims)
switch claims["role"] {
2019-12-03 15:24:01 +01:00
case "subscriber":
http.Redirect(
w,
r,
fmt.Sprintf(
"/schools/create/?format=html&tpl_layout=base&tpl_content=schools_add_update",
),
http.StatusSeeOther,
)
2019-11-22 11:16:27 +01:00
case "participant":
http.Redirect(
w,
r,
fmt.Sprintf(
"/participants/%s?format=html&tpl_layout=base&tpl_content=participants_show",
claims["user_id"].(string)),
http.StatusSeeOther,
)
case "school":
2019-12-03 15:24:01 +01:00
http.Redirect(
w,
r,
fmt.Sprintf(
"/schools/%s?format=html&tpl_layout=base&tpl_content=schools_show",
claims["user_id"].(string)),
http.StatusSeeOther,
)
2019-11-22 11:16:27 +01:00
default:
http.Redirect(
w,
r,
"/contests?format=html&tpl_layout=base&tpl_content=contests",
http.StatusSeeOther,
)
}
2019-11-04 15:00:46 +01:00
}
return http.HandlerFunc(fn)
}