mirror of
https://github.com/paralus/paralus.git
synced 2026-02-14 17:49:51 +00:00
* Upgrade kratos service to v0.10.1 Signed-off-by: Akshay Gaikwad <akgaikwad001@gmail.com> * Upgrade kratos-client-go to v0.10.1 Signed-off-by: Akshay Gaikwad <akgaikwad001@gmail.com> * generate password feature for kratos admin creation Signed-off-by: Akshay Gaikwad <akgaikwad001@gmail.com> * Add forceReset property in user spec Signed-off-by: Akshay Gaikwad <akgaikwad001@gmail.com> * added forcereset in the init script Signed-off-by: mabhi <abhijit.mukherjee@infracloud.io> * Resolve conflicts Signed-off-by: Akshay Gaikwad <akgaikwad001@gmail.com> * Stdout default admin password in initialize script Signed-off-by: Akshay Gaikwad <akgaikwad001@gmail.com> * setting password for new user and sending default password in create user response Signed-off-by: mabhi <abhijit.mukherjee@infracloud.io> * added new endpoint to service force reset flag update after resetting complete outside authz Signed-off-by: mabhi <abhijit.mukherjee@infracloud.io> * removed unnecessary overhead in the forcereset endpoint and updated user type proto to remove unused fields Signed-off-by: mabhi <abhijit.mukherjee@infracloud.io>
130 lines
3.9 KiB
Go
130 lines
3.9 KiB
Go
package server
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
|
|
"github.com/paralus/paralus/pkg/query"
|
|
"github.com/paralus/paralus/pkg/service"
|
|
rpcv3 "github.com/paralus/paralus/proto/rpc/user"
|
|
v3 "github.com/paralus/paralus/proto/types/commonpb/v3"
|
|
userpbv3 "github.com/paralus/paralus/proto/types/userpb/v3"
|
|
"google.golang.org/protobuf/types/known/timestamppb"
|
|
)
|
|
|
|
type userServer struct {
|
|
us service.UserService
|
|
ks service.ApiKeyService
|
|
}
|
|
|
|
// NewUserServer returns new user server implementation
|
|
func NewUserServer(ps service.UserService, as service.ApiKeyService) rpcv3.UserServiceServer {
|
|
return &userServer{us: ps, ks: as}
|
|
}
|
|
func updateUserStatus(req *userpbv3.User, resp *userpbv3.User, err error) *userpbv3.User {
|
|
if err != nil {
|
|
req.Status = &v3.Status{
|
|
ConditionStatus: v3.ConditionStatus_StatusFailed,
|
|
LastUpdated: timestamppb.Now(),
|
|
Reason: err.Error(),
|
|
}
|
|
return req
|
|
}
|
|
resp.Status = &v3.Status{ConditionStatus: v3.ConditionStatus_StatusOK}
|
|
return resp
|
|
}
|
|
|
|
func (s *userServer) CreateUser(ctx context.Context, req *userpbv3.User) (*userpbv3.User, error) {
|
|
resp, err := s.us.Create(ctx, req)
|
|
return updateUserStatus(req, resp, err), err
|
|
}
|
|
|
|
func (s *userServer) GetUsers(ctx context.Context, req *v3.QueryOptions) (*userpbv3.UserList, error) {
|
|
return s.us.List(ctx, query.WithOptions(req))
|
|
}
|
|
|
|
func (s *userServer) GetUser(ctx context.Context, req *userpbv3.User) (*userpbv3.User, error) {
|
|
resp, err := s.us.GetByName(ctx, req)
|
|
return updateUserStatus(req, resp, err), err
|
|
}
|
|
|
|
func (s *userServer) GetUserInfo(ctx context.Context, req *userpbv3.User) (*userpbv3.UserInfo, error) {
|
|
resp, err := s.us.GetUserInfo(ctx, req)
|
|
if err != nil {
|
|
req.Status = &v3.Status{
|
|
ConditionStatus: v3.ConditionStatus_StatusFailed,
|
|
LastUpdated: timestamppb.Now(),
|
|
Reason: err.Error(),
|
|
}
|
|
return resp, err
|
|
}
|
|
resp.Status = &v3.Status{ConditionStatus: v3.ConditionStatus_StatusOK}
|
|
return resp, nil
|
|
}
|
|
|
|
func (s *userServer) DeleteUser(ctx context.Context, req *userpbv3.User) (*rpcv3.UserDeleteApiKeysResponse, error) {
|
|
return s.us.Delete(ctx, req)
|
|
}
|
|
|
|
func (s *userServer) UpdateUser(ctx context.Context, req *userpbv3.User) (*userpbv3.User, error) {
|
|
resp, err := s.us.Update(ctx, req)
|
|
return updateUserStatus(req, resp, err), err
|
|
}
|
|
|
|
func (s *userServer) UpdateUserForceReset(ctx context.Context, req *rpcv3.UpdateForceResetRequest) (*rpcv3.UpdateForceResetResponse, error) {
|
|
sessData, ok := service.GetSessionDataFromContext(ctx)
|
|
if !ok {
|
|
return nil, fmt.Errorf("unable to retrieve session data")
|
|
}
|
|
|
|
err := s.us.UpdateForceResetFlag(ctx, sessData.Username)
|
|
return &rpcv3.UpdateForceResetResponse{}, err
|
|
}
|
|
|
|
func (s *userServer) DownloadCliConfig(ctx context.Context, req *rpcv3.CliConfigRequest) (*v3.HttpBody, error) {
|
|
sessData, ok := service.GetSessionDataFromContext(ctx)
|
|
if !ok {
|
|
return nil, fmt.Errorf("unable to retrieve session data")
|
|
}
|
|
request := &rpcv3.ApiKeyRequest{
|
|
Username: sessData.Username,
|
|
Id: sessData.Account,
|
|
}
|
|
cliConfig, err := s.us.RetrieveCliConfig(ctx, request)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
bb, err := json.Marshal(cliConfig)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &v3.HttpBody{
|
|
ContentType: "application/json",
|
|
Data: bb,
|
|
}, nil
|
|
}
|
|
|
|
func (s *userServer) UserListApiKeys(ctx context.Context, req *rpcv3.ApiKeyRequest) (*rpcv3.UserListApiKeysResponse, error) {
|
|
return s.ks.List(ctx, req)
|
|
}
|
|
|
|
func (s *userServer) UserDeleteApiKeys(ctx context.Context, req *rpcv3.ApiKeyRequest) (*rpcv3.UserDeleteApiKeysResponse, error) {
|
|
_, err := s.ks.Delete(ctx, req)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &rpcv3.UserDeleteApiKeysResponse{}, nil
|
|
}
|
|
|
|
func (s *userServer) UserForgotPassword(ctx context.Context, req *rpcv3.UserForgotPasswordRequest) (*rpcv3.UserForgotPasswordResponse, error) {
|
|
return s.us.ForgotPassword(ctx, req)
|
|
|
|
}
|
|
|
|
func (s *userServer) AuditLogWebhook(ctx context.Context, req *rpcv3.UserLoginAuditRequest) (*rpcv3.UserLoginAuditResponse, error) {
|
|
return s.us.CreateLoginAuditLog(ctx, req)
|
|
}
|