2024-01-29 03:11:36 +00:00
|
|
|
package api
|
|
|
|
|
|
|
|
import (
|
|
|
|
"archive/zip"
|
|
|
|
"bufio"
|
2024-05-18 20:47:26 +00:00
|
|
|
"crypto/md5"
|
2024-01-29 03:11:36 +00:00
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"io/fs"
|
|
|
|
"mime/multipart"
|
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"slices"
|
2024-05-18 20:47:26 +00:00
|
|
|
"sort"
|
2024-01-29 03:11:36 +00:00
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2024-05-18 20:47:26 +00:00
|
|
|
argon2 "github.com/alexedwards/argon2id"
|
2024-01-29 03:11:36 +00:00
|
|
|
"github.com/gabriel-vasile/mimetype"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
|
|
"github.com/itchyny/gojq"
|
2024-05-18 20:47:26 +00:00
|
|
|
"github.com/pkg/errors"
|
2024-01-29 03:11:36 +00:00
|
|
|
log "github.com/sirupsen/logrus"
|
2024-05-18 20:47:26 +00:00
|
|
|
"reichard.io/antholume/database"
|
2024-02-25 01:45:26 +00:00
|
|
|
"reichard.io/antholume/metadata"
|
2024-05-18 20:47:26 +00:00
|
|
|
"reichard.io/antholume/utils"
|
2024-01-29 03:11:36 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type adminAction string
|
|
|
|
|
|
|
|
const (
|
|
|
|
adminBackup adminAction = "BACKUP"
|
|
|
|
adminRestore adminAction = "RESTORE"
|
|
|
|
adminMetadataMatch adminAction = "METADATA_MATCH"
|
|
|
|
adminCacheTables adminAction = "CACHE_TABLES"
|
|
|
|
)
|
|
|
|
|
|
|
|
type requestAdminAction struct {
|
|
|
|
Action adminAction `form:"action"`
|
|
|
|
|
|
|
|
// Backup Action
|
|
|
|
BackupTypes []backupType `form:"backup_types"`
|
|
|
|
|
|
|
|
// Restore Action
|
|
|
|
RestoreFile *multipart.FileHeader `form:"restore_file"`
|
|
|
|
}
|
|
|
|
|
|
|
|
type importType string
|
|
|
|
|
|
|
|
const (
|
|
|
|
importDirect importType = "DIRECT"
|
|
|
|
importCopy importType = "COPY"
|
|
|
|
)
|
|
|
|
|
|
|
|
type requestAdminImport struct {
|
|
|
|
Directory string `form:"directory"`
|
|
|
|
Select string `form:"select"`
|
|
|
|
Type importType `form:"type"`
|
|
|
|
}
|
|
|
|
|
2024-03-12 05:20:41 +00:00
|
|
|
type operationType string
|
|
|
|
|
|
|
|
const (
|
|
|
|
opUpdate operationType = "UPDATE"
|
|
|
|
opCreate operationType = "CREATE"
|
2024-05-18 20:47:26 +00:00
|
|
|
opDelete operationType = "DELETE"
|
2024-03-12 05:20:41 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type requestAdminUpdateUser struct {
|
|
|
|
User string `form:"user"`
|
2024-05-18 20:47:26 +00:00
|
|
|
Password *string `form:"password"`
|
2024-05-27 17:32:40 +00:00
|
|
|
IsAdmin *bool `form:"is_admin"`
|
2024-03-12 05:20:41 +00:00
|
|
|
Operation operationType `form:"operation"`
|
|
|
|
}
|
|
|
|
|
2024-01-29 03:11:36 +00:00
|
|
|
type requestAdminLogs struct {
|
|
|
|
Filter string `form:"filter"`
|
|
|
|
}
|
|
|
|
|
2024-05-18 20:47:26 +00:00
|
|
|
type importStatus string
|
|
|
|
|
|
|
|
const (
|
|
|
|
importFailed importStatus = "FAILED"
|
|
|
|
importSuccess importStatus = "SUCCESS"
|
|
|
|
importExists importStatus = "EXISTS"
|
|
|
|
)
|
|
|
|
|
|
|
|
type importResult struct {
|
|
|
|
ID string
|
|
|
|
Name string
|
|
|
|
Path string
|
|
|
|
Status importStatus
|
|
|
|
Error error
|
|
|
|
}
|
|
|
|
|
2024-01-29 03:11:36 +00:00
|
|
|
func (api *API) appPerformAdminAction(c *gin.Context) {
|
|
|
|
templateVars, _ := api.getBaseTemplateVars("admin", c)
|
|
|
|
|
|
|
|
var rAdminAction requestAdminAction
|
|
|
|
if err := c.ShouldBind(&rAdminAction); err != nil {
|
|
|
|
log.Error("Invalid Form Bind: ", err)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusBadRequest, "Invalid or missing form values")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
switch rAdminAction.Action {
|
|
|
|
case adminMetadataMatch:
|
|
|
|
// TODO
|
|
|
|
// 1. Documents xref most recent metadata table?
|
|
|
|
// 2. Select all / deselect?
|
|
|
|
case adminCacheTables:
|
2024-05-18 20:47:26 +00:00
|
|
|
go func() {
|
|
|
|
err := api.db.CacheTempTables()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Unable to cache temp tables: ", err)
|
|
|
|
}
|
|
|
|
}()
|
2024-01-29 03:11:36 +00:00
|
|
|
case adminRestore:
|
|
|
|
api.processRestoreFile(rAdminAction, c)
|
2024-02-02 01:05:35 +00:00
|
|
|
return
|
2024-01-29 03:11:36 +00:00
|
|
|
case adminBackup:
|
|
|
|
// Vacuum
|
|
|
|
_, err := api.db.DB.ExecContext(api.db.Ctx, "VACUUM;")
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Unable to vacuum DB: ", err)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to vacuum database")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set Headers
|
|
|
|
c.Header("Content-type", "application/octet-stream")
|
|
|
|
c.Header("Content-Disposition", fmt.Sprintf("attachment; filename=\"AnthoLumeBackup_%s.zip\"", time.Now().Format("20060102150405")))
|
|
|
|
|
|
|
|
// Stream Backup ZIP Archive
|
|
|
|
c.Stream(func(w io.Writer) bool {
|
|
|
|
var directories []string
|
|
|
|
for _, item := range rAdminAction.BackupTypes {
|
|
|
|
if item == backupCovers {
|
|
|
|
directories = append(directories, "covers")
|
|
|
|
} else if item == backupDocuments {
|
|
|
|
directories = append(directories, "documents")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err := api.createBackup(w, directories)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Backup Error: ", err)
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
})
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
c.HTML(http.StatusOK, "page/admin", templateVars)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (api *API) appGetAdmin(c *gin.Context) {
|
|
|
|
templateVars, _ := api.getBaseTemplateVars("admin", c)
|
|
|
|
c.HTML(http.StatusOK, "page/admin", templateVars)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (api *API) appGetAdminLogs(c *gin.Context) {
|
|
|
|
templateVars, _ := api.getBaseTemplateVars("admin-logs", c)
|
|
|
|
|
|
|
|
var rAdminLogs requestAdminLogs
|
|
|
|
if err := c.ShouldBindQuery(&rAdminLogs); err != nil {
|
|
|
|
log.Error("Invalid URI Bind")
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusNotFound, "Invalid URI parameters")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
rAdminLogs.Filter = strings.TrimSpace(rAdminLogs.Filter)
|
|
|
|
|
|
|
|
var jqFilter *gojq.Code
|
2024-12-02 00:48:51 +00:00
|
|
|
var basicFilter string
|
|
|
|
if strings.HasPrefix(rAdminLogs.Filter, "\"") && strings.HasSuffix(rAdminLogs.Filter, "\"") {
|
|
|
|
basicFilter = rAdminLogs.Filter[1 : len(rAdminLogs.Filter)-1]
|
|
|
|
} else if rAdminLogs.Filter != "" {
|
2024-01-29 03:11:36 +00:00
|
|
|
parsed, err := gojq.Parse(rAdminLogs.Filter)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Unable to parse JQ filter")
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusNotFound, "Unable to parse JQ filter")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
jqFilter, err = gojq.Compile(parsed)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Unable to compile JQ filter")
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusNotFound, "Unable to compile JQ filter")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Open Log File
|
|
|
|
logPath := filepath.Join(api.cfg.ConfigPath, "logs/antholume.log")
|
|
|
|
logFile, err := os.Open(logPath)
|
|
|
|
if err != nil {
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusBadRequest, "Missing AnthoLume log file")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
defer logFile.Close()
|
|
|
|
|
|
|
|
// Log Lines
|
|
|
|
var logLines []string
|
|
|
|
scanner := bufio.NewScanner(logFile)
|
|
|
|
for scanner.Scan() {
|
|
|
|
rawLog := scanner.Text()
|
|
|
|
|
|
|
|
// Attempt JSON Pretty
|
2024-05-26 23:56:59 +00:00
|
|
|
var jsonMap map[string]any
|
2024-01-29 03:11:36 +00:00
|
|
|
err := json.Unmarshal([]byte(rawLog), &jsonMap)
|
|
|
|
if err != nil {
|
|
|
|
logLines = append(logLines, scanner.Text())
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Parse JSON
|
|
|
|
rawData, err := json.MarshalIndent(jsonMap, "", " ")
|
|
|
|
if err != nil {
|
|
|
|
logLines = append(logLines, scanner.Text())
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2024-12-02 00:48:51 +00:00
|
|
|
// Basic Filter
|
|
|
|
if basicFilter != "" && strings.Contains(string(rawData), basicFilter) {
|
2024-01-29 03:11:36 +00:00
|
|
|
logLines = append(logLines, string(rawData))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2024-12-02 00:48:51 +00:00
|
|
|
// No JQ Filter
|
|
|
|
if jqFilter == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2024-01-29 03:11:36 +00:00
|
|
|
// Error or nil
|
|
|
|
result, _ := jqFilter.Run(jsonMap).Next()
|
|
|
|
if _, ok := result.(error); ok {
|
|
|
|
logLines = append(logLines, string(rawData))
|
|
|
|
continue
|
|
|
|
} else if result == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt filtered json
|
|
|
|
filteredData, err := json.MarshalIndent(result, "", " ")
|
|
|
|
if err == nil {
|
|
|
|
rawData = filteredData
|
|
|
|
}
|
|
|
|
|
|
|
|
logLines = append(logLines, string(rawData))
|
|
|
|
}
|
|
|
|
|
|
|
|
templateVars["Data"] = logLines
|
2024-02-02 01:05:35 +00:00
|
|
|
templateVars["Filter"] = rAdminLogs.Filter
|
2024-01-29 03:11:36 +00:00
|
|
|
|
|
|
|
c.HTML(http.StatusOK, "page/admin-logs", templateVars)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (api *API) appGetAdminUsers(c *gin.Context) {
|
|
|
|
templateVars, _ := api.getBaseTemplateVars("admin-users", c)
|
|
|
|
|
|
|
|
users, err := api.db.Queries.GetUsers(api.db.Ctx)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("GetUsers DB Error: ", err)
|
|
|
|
appErrorPage(c, http.StatusInternalServerError, fmt.Sprintf("GetUsers DB Error: %v", err))
|
2024-03-12 05:20:41 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
templateVars["Data"] = users
|
|
|
|
|
|
|
|
c.HTML(http.StatusOK, "page/admin-users", templateVars)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (api *API) appUpdateAdminUsers(c *gin.Context) {
|
|
|
|
templateVars, _ := api.getBaseTemplateVars("admin-users", c)
|
|
|
|
|
2024-05-27 17:32:40 +00:00
|
|
|
var rUpdate requestAdminUpdateUser
|
|
|
|
if err := c.ShouldBind(&rUpdate); err != nil {
|
2024-03-12 05:20:41 +00:00
|
|
|
log.Error("Invalid URI Bind")
|
2024-05-27 17:32:40 +00:00
|
|
|
appErrorPage(c, http.StatusNotFound, "Invalid user parameters")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure Username
|
|
|
|
if rUpdate.User == "" {
|
|
|
|
appErrorPage(c, http.StatusInternalServerError, "User cannot be empty")
|
2024-03-12 05:20:41 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
2024-05-27 17:32:40 +00:00
|
|
|
switch rUpdate.Operation {
|
2024-03-12 05:20:41 +00:00
|
|
|
case opCreate:
|
2024-05-27 17:32:40 +00:00
|
|
|
err = api.createUser(rUpdate.User, rUpdate.Password, rUpdate.IsAdmin)
|
2024-03-12 05:20:41 +00:00
|
|
|
case opUpdate:
|
2024-05-27 17:32:40 +00:00
|
|
|
err = api.updateUser(rUpdate.User, rUpdate.Password, rUpdate.IsAdmin)
|
2024-05-18 20:47:26 +00:00
|
|
|
case opDelete:
|
2024-05-27 17:32:40 +00:00
|
|
|
err = api.deleteUser(rUpdate.User)
|
2024-03-12 05:20:41 +00:00
|
|
|
default:
|
|
|
|
appErrorPage(c, http.StatusNotFound, "Unknown user operation")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
2024-05-18 20:47:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, fmt.Sprintf("Unable to create or update user: %v", err))
|
2024-03-12 05:20:41 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
users, err := api.db.Queries.GetUsers(api.db.Ctx)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("GetUsers DB Error: ", err)
|
|
|
|
appErrorPage(c, http.StatusInternalServerError, fmt.Sprintf("GetUsers DB Error: %v", err))
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
templateVars["Data"] = users
|
|
|
|
|
|
|
|
c.HTML(http.StatusOK, "page/admin-users", templateVars)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (api *API) appGetAdminImport(c *gin.Context) {
|
|
|
|
templateVars, _ := api.getBaseTemplateVars("admin-import", c)
|
|
|
|
|
|
|
|
var rImportFolder requestAdminImport
|
|
|
|
if err := c.ShouldBindQuery(&rImportFolder); err != nil {
|
|
|
|
log.Error("Invalid URI Bind")
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusNotFound, "Invalid directory")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if rImportFolder.Select != "" {
|
|
|
|
templateVars["SelectedDirectory"] = rImportFolder.Select
|
|
|
|
c.HTML(http.StatusOK, "page/admin-import", templateVars)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Default Path
|
|
|
|
if rImportFolder.Directory == "" {
|
|
|
|
dPath, err := filepath.Abs(api.cfg.DataPath)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Absolute filepath error: ", rImportFolder.Directory)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusNotFound, "Unable to get data directory absolute path")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
rImportFolder.Directory = dPath
|
|
|
|
}
|
|
|
|
|
|
|
|
entries, err := os.ReadDir(rImportFolder.Directory)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Invalid directory: ", rImportFolder.Directory)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusNotFound, "Invalid directory")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
allDirectories := []string{}
|
|
|
|
for _, e := range entries {
|
|
|
|
if !e.IsDir() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
allDirectories = append(allDirectories, e.Name())
|
|
|
|
}
|
|
|
|
|
|
|
|
templateVars["CurrentPath"] = filepath.Clean(rImportFolder.Directory)
|
|
|
|
templateVars["Data"] = allDirectories
|
|
|
|
|
|
|
|
c.HTML(http.StatusOK, "page/admin-import", templateVars)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (api *API) appPerformAdminImport(c *gin.Context) {
|
|
|
|
templateVars, _ := api.getBaseTemplateVars("admin-import", c)
|
|
|
|
|
|
|
|
var rAdminImport requestAdminImport
|
|
|
|
if err := c.ShouldBind(&rAdminImport); err != nil {
|
|
|
|
log.Error("Invalid URI Bind")
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusNotFound, "Invalid directory")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-05-18 20:47:26 +00:00
|
|
|
// Get import directory
|
2024-02-25 01:45:26 +00:00
|
|
|
importDirectory := filepath.Clean(rAdminImport.Directory)
|
2024-05-18 20:47:26 +00:00
|
|
|
|
|
|
|
// Get data directory
|
|
|
|
absoluteDataPath, _ := filepath.Abs(filepath.Join(api.cfg.DataPath, "documents"))
|
|
|
|
|
|
|
|
// Validate different path
|
|
|
|
if absoluteDataPath == importDirectory {
|
|
|
|
appErrorPage(c, http.StatusBadRequest, "Directory is the same as data path")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Do Transaction
|
|
|
|
tx, err := api.db.DB.Begin()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Transaction Begin DB Error:", err)
|
|
|
|
apiErrorPage(c, http.StatusBadRequest, "Unknown error")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Defer & Start Transaction
|
|
|
|
defer func() {
|
|
|
|
if err := tx.Rollback(); err != nil {
|
|
|
|
log.Error("DB Rollback Error:", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
qtx := api.db.Queries.WithTx(tx)
|
|
|
|
|
|
|
|
// Track imports
|
|
|
|
importResults := make([]importResult, 0)
|
|
|
|
|
|
|
|
// Walk Directory & Import
|
|
|
|
err = filepath.WalkDir(importDirectory, func(importPath string, f fs.DirEntry, err error) error {
|
2024-02-25 01:45:26 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2024-05-18 20:47:26 +00:00
|
|
|
|
2024-02-25 01:45:26 +00:00
|
|
|
if f.IsDir() {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-05-18 20:47:26 +00:00
|
|
|
// Get relative path
|
|
|
|
basePath := importDirectory
|
|
|
|
relFilePath, err := filepath.Rel(importDirectory, importPath)
|
|
|
|
if err != nil {
|
|
|
|
log.Warnf("path error: %v", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Track imports
|
|
|
|
iResult := importResult{
|
|
|
|
Path: relFilePath,
|
|
|
|
Status: importFailed,
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
importResults = append(importResults, iResult)
|
|
|
|
}()
|
|
|
|
|
2024-02-25 01:45:26 +00:00
|
|
|
// Get metadata
|
2024-05-18 20:47:26 +00:00
|
|
|
fileMeta, err := metadata.GetMetadata(importPath)
|
2024-02-25 01:45:26 +00:00
|
|
|
if err != nil {
|
2024-05-18 20:47:26 +00:00
|
|
|
log.Errorf("metadata error: %v", err)
|
|
|
|
iResult.Error = err
|
2024-02-25 01:45:26 +00:00
|
|
|
return nil
|
|
|
|
}
|
2024-05-18 20:47:26 +00:00
|
|
|
iResult.ID = *fileMeta.PartialMD5
|
|
|
|
iResult.Name = fmt.Sprintf("%s - %s", *fileMeta.Author, *fileMeta.Title)
|
2024-02-25 01:45:26 +00:00
|
|
|
|
2024-05-18 20:47:26 +00:00
|
|
|
// Check already exists
|
|
|
|
_, err = qtx.GetDocument(api.db.Ctx, *fileMeta.PartialMD5)
|
|
|
|
if err == nil {
|
|
|
|
log.Warnf("document already exists: %s", *fileMeta.PartialMD5)
|
|
|
|
iResult.Status = importExists
|
|
|
|
return nil
|
|
|
|
}
|
2024-02-25 01:45:26 +00:00
|
|
|
|
2024-05-18 20:47:26 +00:00
|
|
|
// Import Copy
|
|
|
|
if rAdminImport.Type == importCopy {
|
|
|
|
// Derive & Sanitize File Name
|
|
|
|
relFilePath = deriveBaseFileName(fileMeta)
|
|
|
|
safePath := filepath.Join(api.cfg.DataPath, "documents", relFilePath)
|
2024-02-25 01:45:26 +00:00
|
|
|
|
2024-05-18 20:47:26 +00:00
|
|
|
// Open Source File
|
|
|
|
srcFile, err := os.Open(importPath)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("unable to open current file: %v", err)
|
|
|
|
iResult.Error = err
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
defer srcFile.Close()
|
|
|
|
|
|
|
|
// Open Destination File
|
|
|
|
destFile, err := os.Create(safePath)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("unable to open destination file: %v", err)
|
|
|
|
iResult.Error = err
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
defer destFile.Close()
|
2024-02-25 01:45:26 +00:00
|
|
|
|
2024-05-18 20:47:26 +00:00
|
|
|
// Copy File
|
|
|
|
if _, err = io.Copy(destFile, srcFile); err != nil {
|
|
|
|
log.Errorf("unable to save file: %v", err)
|
|
|
|
iResult.Error = err
|
|
|
|
return nil
|
|
|
|
}
|
2024-02-25 01:45:26 +00:00
|
|
|
|
2024-05-18 20:47:26 +00:00
|
|
|
// Update Base & Path
|
|
|
|
basePath = filepath.Join(api.cfg.DataPath, "documents")
|
|
|
|
iResult.Path = relFilePath
|
|
|
|
}
|
|
|
|
|
|
|
|
// Upsert document
|
|
|
|
if _, err = qtx.UpsertDocument(api.db.Ctx, database.UpsertDocumentParams{
|
|
|
|
ID: *fileMeta.PartialMD5,
|
|
|
|
Title: fileMeta.Title,
|
|
|
|
Author: fileMeta.Author,
|
|
|
|
Description: fileMeta.Description,
|
|
|
|
Md5: fileMeta.MD5,
|
|
|
|
Words: fileMeta.WordCount,
|
|
|
|
Filepath: &relFilePath,
|
|
|
|
Basepath: &basePath,
|
|
|
|
}); err != nil {
|
|
|
|
log.Errorf("UpsertDocument DB Error: %v", err)
|
|
|
|
iResult.Error = err
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
iResult.Status = importSuccess
|
2024-02-25 01:45:26 +00:00
|
|
|
return nil
|
|
|
|
})
|
2024-05-18 20:47:26 +00:00
|
|
|
if err != nil {
|
|
|
|
appErrorPage(c, http.StatusInternalServerError, fmt.Sprintf("Import Failed: %v", err))
|
|
|
|
return
|
|
|
|
}
|
2024-01-29 03:11:36 +00:00
|
|
|
|
2024-05-18 20:47:26 +00:00
|
|
|
// Commit transaction
|
|
|
|
if err := tx.Commit(); err != nil {
|
|
|
|
log.Error("Transaction Commit DB Error: ", err)
|
|
|
|
appErrorPage(c, http.StatusInternalServerError, fmt.Sprintf("Import DB Error: %v", err))
|
|
|
|
return
|
|
|
|
}
|
2024-01-29 03:11:36 +00:00
|
|
|
|
2024-05-18 20:47:26 +00:00
|
|
|
// Sort import results
|
|
|
|
sort.Slice(importResults, func(i int, j int) bool {
|
|
|
|
return importStatusPriority(importResults[i].Status) <
|
|
|
|
importStatusPriority(importResults[j].Status)
|
|
|
|
})
|
|
|
|
|
|
|
|
templateVars["Data"] = importResults
|
|
|
|
c.HTML(http.StatusOK, "page/admin-import-results", templateVars)
|
2024-01-29 03:11:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (api *API) processRestoreFile(rAdminAction requestAdminAction, c *gin.Context) {
|
|
|
|
// Validate Type & Derive Extension on MIME
|
|
|
|
uploadedFile, err := rAdminAction.RestoreFile.Open()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("File Error: ", err)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to open file")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
fileMime, err := mimetype.DetectReader(uploadedFile)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("MIME Error")
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to detect filetype")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
fileExtension := fileMime.Extension()
|
|
|
|
|
|
|
|
// Validate Extension
|
|
|
|
if !slices.Contains([]string{".zip"}, fileExtension) {
|
|
|
|
log.Error("Invalid FileType: ", fileExtension)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusBadRequest, "Invalid filetype")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create Temp File
|
|
|
|
tempFile, err := os.CreateTemp("", "restore")
|
|
|
|
if err != nil {
|
|
|
|
log.Warn("Temp File Create Error: ", err)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to create temp file")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
defer os.Remove(tempFile.Name())
|
|
|
|
defer tempFile.Close()
|
|
|
|
|
|
|
|
// Save Temp
|
|
|
|
err = c.SaveUploadedFile(rAdminAction.RestoreFile, tempFile.Name())
|
|
|
|
if err != nil {
|
|
|
|
log.Error("File Error: ", err)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to save file")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// ZIP Info
|
|
|
|
fileInfo, err := tempFile.Stat()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("File Error: ", err)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to read file")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create ZIP Reader
|
|
|
|
zipReader, err := zip.NewReader(tempFile, fileInfo.Size())
|
|
|
|
if err != nil {
|
|
|
|
log.Error("ZIP Error: ", err)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to read zip")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate ZIP Contents
|
|
|
|
hasDBFile := false
|
|
|
|
hasUnknownFile := false
|
|
|
|
for _, file := range zipReader.File {
|
|
|
|
fileName := strings.TrimPrefix(file.Name, "/")
|
|
|
|
if fileName == "antholume.db" {
|
|
|
|
hasDBFile = true
|
|
|
|
break
|
|
|
|
} else if !strings.HasPrefix(fileName, "covers/") && !strings.HasPrefix(fileName, "documents/") {
|
|
|
|
hasUnknownFile = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Invalid ZIP
|
|
|
|
if !hasDBFile {
|
|
|
|
log.Error("Invalid ZIP File - Missing DB")
|
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Invalid Restore ZIP - Missing DB")
|
|
|
|
return
|
|
|
|
} else if hasUnknownFile {
|
|
|
|
log.Error("Invalid ZIP File - Invalid File(s)")
|
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Invalid Restore ZIP - Invalid File(s)")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create Backup File
|
|
|
|
backupFilePath := filepath.Join(api.cfg.ConfigPath, fmt.Sprintf("backups/AnthoLumeBackup_%s.zip", time.Now().Format("20060102150405")))
|
|
|
|
backupFile, err := os.Create(backupFilePath)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Unable to create backup file: ", err)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to create backup file")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
defer backupFile.Close()
|
|
|
|
|
|
|
|
// Save Backup File
|
|
|
|
w := bufio.NewWriter(backupFile)
|
|
|
|
err = api.createBackup(w, []string{"covers", "documents"})
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Unable to save backup file: ", err)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to save backup file")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove Data
|
|
|
|
err = api.removeData()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Unable to delete data: ", err)
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to delete data")
|
2024-01-29 03:11:36 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Restore Data
|
|
|
|
err = api.restoreData(zipReader)
|
|
|
|
if err != nil {
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to restore data")
|
2024-01-29 03:11:36 +00:00
|
|
|
log.Panic("Unable to restore data: ", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reinit DB
|
|
|
|
if err := api.db.Reload(); err != nil {
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to reload DB")
|
2024-01-29 03:11:36 +00:00
|
|
|
log.Panicf("Unable to reload DB: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Rotate Auth Hashes
|
|
|
|
if err := api.rotateAllAuthHashes(); err != nil {
|
2024-02-25 01:45:26 +00:00
|
|
|
appErrorPage(c, http.StatusInternalServerError, "Unable to rotate hashes")
|
2024-01-29 03:11:36 +00:00
|
|
|
log.Panicf("Unable to rotate auth hashes: %v", err)
|
|
|
|
}
|
2024-02-02 01:05:35 +00:00
|
|
|
|
|
|
|
// Redirect to login page
|
|
|
|
c.Redirect(http.StatusFound, "/login")
|
2024-01-29 03:11:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (api *API) restoreData(zipReader *zip.Reader) error {
|
|
|
|
// Ensure Directories
|
|
|
|
api.cfg.EnsureDirectories()
|
|
|
|
|
|
|
|
// Restore Data
|
|
|
|
for _, file := range zipReader.File {
|
|
|
|
rc, err := file.Open()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer rc.Close()
|
|
|
|
|
|
|
|
destPath := filepath.Join(api.cfg.DataPath, file.Name)
|
|
|
|
destFile, err := os.Create(destPath)
|
|
|
|
if err != nil {
|
2024-05-26 01:12:07 +00:00
|
|
|
log.Errorf("error creating destination file: %v", err)
|
2024-01-29 03:11:36 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer destFile.Close()
|
|
|
|
|
|
|
|
// Copy the contents from the zip file to the destination file.
|
|
|
|
if _, err := io.Copy(destFile, rc); err != nil {
|
2024-05-26 01:12:07 +00:00
|
|
|
log.Errorf("Error copying file contents: %v", err)
|
2024-01-29 03:11:36 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (api *API) removeData() error {
|
|
|
|
allPaths := []string{
|
|
|
|
"covers",
|
|
|
|
"documents",
|
|
|
|
"antholume.db",
|
|
|
|
"antholume.db-wal",
|
|
|
|
"antholume.db-shm",
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, name := range allPaths {
|
|
|
|
fullPath := filepath.Join(api.cfg.DataPath, name)
|
|
|
|
err := os.RemoveAll(fullPath)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Unable to delete %s: %v", name, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (api *API) createBackup(w io.Writer, directories []string) error {
|
2024-05-27 17:32:40 +00:00
|
|
|
// Vacuum DB
|
|
|
|
_, err := api.db.DB.ExecContext(api.db.Ctx, "VACUUM;")
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "Unable to vacuum database")
|
|
|
|
}
|
2024-01-29 03:11:36 +00:00
|
|
|
|
2024-05-27 17:32:40 +00:00
|
|
|
ar := zip.NewWriter(w)
|
2024-01-29 03:11:36 +00:00
|
|
|
exportWalker := func(currentPath string, f fs.DirEntry, err error) error {
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if f.IsDir() {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Open File on Disk
|
|
|
|
file, err := os.Open(currentPath)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer file.Close()
|
|
|
|
|
|
|
|
// Derive Export Structure
|
|
|
|
fileName := filepath.Base(currentPath)
|
|
|
|
folderName := filepath.Base(filepath.Dir(currentPath))
|
|
|
|
|
|
|
|
// Create File in Export
|
|
|
|
newF, err := ar.Create(filepath.Join(folderName, fileName))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Copy File in Export
|
|
|
|
_, err = io.Copy(newF, file)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get DB Path
|
|
|
|
fileName := fmt.Sprintf("%s.db", api.cfg.DBName)
|
|
|
|
dbLocation := filepath.Join(api.cfg.ConfigPath, fileName)
|
|
|
|
|
|
|
|
// Copy Database File
|
|
|
|
dbFile, err := os.Open(dbLocation)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer dbFile.Close()
|
|
|
|
|
|
|
|
newDbFile, err := ar.Create(fileName)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2024-05-18 20:47:26 +00:00
|
|
|
|
|
|
|
_, err = io.Copy(newDbFile, dbFile)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2024-01-29 03:11:36 +00:00
|
|
|
|
|
|
|
// Backup Covers & Documents
|
|
|
|
for _, dir := range directories {
|
|
|
|
err = filepath.WalkDir(filepath.Join(api.cfg.DataPath, dir), exportWalker)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ar.Close()
|
|
|
|
return nil
|
|
|
|
}
|
2024-05-18 20:47:26 +00:00
|
|
|
|
2024-05-27 17:32:40 +00:00
|
|
|
func (api *API) isLastAdmin(userID string) (bool, error) {
|
|
|
|
allUsers, err := api.db.Queries.GetUsers(api.db.Ctx)
|
|
|
|
if err != nil {
|
|
|
|
return false, errors.Wrap(err, fmt.Sprintf("GetUsers DB Error: %v", err))
|
|
|
|
}
|
|
|
|
|
|
|
|
hasAdmin := false
|
|
|
|
for _, user := range allUsers {
|
|
|
|
if user.Admin && user.ID != userID {
|
|
|
|
hasAdmin = true
|
|
|
|
break
|
|
|
|
}
|
2024-05-18 20:47:26 +00:00
|
|
|
}
|
2024-05-27 17:32:40 +00:00
|
|
|
|
|
|
|
return !hasAdmin, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (api *API) createUser(user string, rawPassword *string, isAdmin *bool) error {
|
|
|
|
// Validate Necessary Parameters
|
|
|
|
if rawPassword == nil || *rawPassword == "" {
|
2024-05-18 20:47:26 +00:00
|
|
|
return fmt.Errorf("password can't be empty")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Base Params
|
|
|
|
createParams := database.CreateUserParams{
|
2024-05-27 17:32:40 +00:00
|
|
|
ID: user,
|
2024-05-18 20:47:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Handle Admin (Explicit or False)
|
2024-05-27 17:32:40 +00:00
|
|
|
if isAdmin != nil {
|
|
|
|
createParams.Admin = *isAdmin
|
2024-05-18 20:47:26 +00:00
|
|
|
} else {
|
|
|
|
createParams.Admin = false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Parse Password
|
2024-05-27 17:32:40 +00:00
|
|
|
password := fmt.Sprintf("%x", md5.Sum([]byte(*rawPassword)))
|
2024-05-18 20:47:26 +00:00
|
|
|
hashedPassword, err := argon2.CreateHash(password, argon2.DefaultParams)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to create hashed password")
|
|
|
|
}
|
|
|
|
createParams.Pass = &hashedPassword
|
|
|
|
|
|
|
|
// Generate Auth Hash
|
|
|
|
rawAuthHash, err := utils.GenerateToken(64)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to create token for user")
|
|
|
|
}
|
|
|
|
authHash := fmt.Sprintf("%x", rawAuthHash)
|
|
|
|
createParams.AuthHash = &authHash
|
|
|
|
|
|
|
|
// Create user in DB
|
|
|
|
if rows, err := api.db.Queries.CreateUser(api.db.Ctx, createParams); err != nil {
|
|
|
|
log.Error("CreateUser DB Error:", err)
|
|
|
|
return fmt.Errorf("unable to create user")
|
|
|
|
} else if rows == 0 {
|
|
|
|
log.Warn("User Already Exists:", createParams.ID)
|
|
|
|
return fmt.Errorf("user already exists")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-05-27 17:32:40 +00:00
|
|
|
func (api *API) updateUser(user string, rawPassword *string, isAdmin *bool) error {
|
2024-05-18 20:47:26 +00:00
|
|
|
// Validate Necessary Parameters
|
2024-05-27 17:32:40 +00:00
|
|
|
if rawPassword == nil && isAdmin == nil {
|
2024-05-18 20:47:26 +00:00
|
|
|
return fmt.Errorf("nothing to update")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Base Params
|
|
|
|
updateParams := database.UpdateUserParams{
|
2024-05-27 17:32:40 +00:00
|
|
|
UserID: user,
|
2024-05-18 20:47:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Handle Admin (Update or Existing)
|
2024-05-27 17:32:40 +00:00
|
|
|
if isAdmin != nil {
|
|
|
|
updateParams.Admin = *isAdmin
|
2024-05-18 20:47:26 +00:00
|
|
|
} else {
|
2024-05-27 17:32:40 +00:00
|
|
|
user, err := api.db.Queries.GetUser(api.db.Ctx, user)
|
2024-05-18 20:47:26 +00:00
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, fmt.Sprintf("GetUser DB Error: %v", err))
|
|
|
|
}
|
|
|
|
updateParams.Admin = user.Admin
|
|
|
|
}
|
|
|
|
|
2024-06-17 00:00:41 +00:00
|
|
|
// Check Admins - Disallow Demotion
|
2024-05-27 17:32:40 +00:00
|
|
|
if isLast, err := api.isLastAdmin(user); err != nil {
|
2024-05-26 01:12:07 +00:00
|
|
|
return err
|
2024-06-17 00:00:41 +00:00
|
|
|
} else if isLast && !updateParams.Admin {
|
2024-05-27 17:32:40 +00:00
|
|
|
return fmt.Errorf("unable to demote %s - last admin", user)
|
2024-05-26 01:12:07 +00:00
|
|
|
}
|
2024-05-18 20:47:26 +00:00
|
|
|
|
|
|
|
// Handle Password
|
2024-05-27 17:32:40 +00:00
|
|
|
if rawPassword != nil {
|
|
|
|
if *rawPassword == "" {
|
2024-05-18 20:47:26 +00:00
|
|
|
return fmt.Errorf("password can't be empty")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Parse Password
|
2024-05-27 17:32:40 +00:00
|
|
|
password := fmt.Sprintf("%x", md5.Sum([]byte(*rawPassword)))
|
2024-05-18 20:47:26 +00:00
|
|
|
hashedPassword, err := argon2.CreateHash(password, argon2.DefaultParams)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to create hashed password")
|
|
|
|
}
|
|
|
|
updateParams.Password = &hashedPassword
|
|
|
|
|
|
|
|
// Generate Auth Hash
|
|
|
|
rawAuthHash, err := utils.GenerateToken(64)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to create token for user")
|
|
|
|
}
|
|
|
|
authHash := fmt.Sprintf("%x", rawAuthHash)
|
|
|
|
updateParams.AuthHash = &authHash
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update User
|
|
|
|
_, err := api.db.Queries.UpdateUser(api.db.Ctx, updateParams)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, fmt.Sprintf("UpdateUser DB Error: %v", err))
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-05-27 17:32:40 +00:00
|
|
|
func (api *API) deleteUser(user string) error {
|
2024-05-26 01:12:07 +00:00
|
|
|
// Check Admins
|
2024-05-27 17:32:40 +00:00
|
|
|
if isLast, err := api.isLastAdmin(user); err != nil {
|
2024-05-26 01:12:07 +00:00
|
|
|
return err
|
|
|
|
} else if isLast {
|
2024-05-27 17:32:40 +00:00
|
|
|
return fmt.Errorf("unable to delete %s - last admin", user)
|
2024-05-26 01:12:07 +00:00
|
|
|
}
|
|
|
|
|
2024-05-27 17:32:40 +00:00
|
|
|
// Create Backup File
|
|
|
|
backupFilePath := filepath.Join(api.cfg.ConfigPath, fmt.Sprintf("backups/AnthoLumeBackup_%s.zip", time.Now().Format("20060102150405")))
|
|
|
|
backupFile, err := os.Create(backupFilePath)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer backupFile.Close()
|
2024-05-26 01:12:07 +00:00
|
|
|
|
2024-05-27 17:32:40 +00:00
|
|
|
// Save Backup File (DB Only)
|
|
|
|
w := bufio.NewWriter(backupFile)
|
|
|
|
err = api.createBackup(w, []string{})
|
2024-05-26 01:12:07 +00:00
|
|
|
if err != nil {
|
2024-05-27 17:32:40 +00:00
|
|
|
return err
|
2024-05-26 01:12:07 +00:00
|
|
|
}
|
|
|
|
|
2024-05-27 17:32:40 +00:00
|
|
|
// Delete User
|
|
|
|
_, err = api.db.Queries.DeleteUser(api.db.Ctx, user)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, fmt.Sprintf("DeleteUser DB Error: %v", err))
|
2024-05-26 01:12:07 +00:00
|
|
|
}
|
|
|
|
|
2024-05-27 17:32:40 +00:00
|
|
|
return nil
|
2024-05-26 01:12:07 +00:00
|
|
|
}
|