func TestSelectRole(t *testing.T) { selectedRole := new(data.Role) selectedRole.Title = role.Title err := Select(selectedRole) if err != nil { t.Error(err) } structJSONCompare(t, role, selectedRole) }
// Generic Delete handler func Delete(w http.ResponseWriter, r *http.Request) { user, permissions := auth.Challenge(w, r, true) if user == nil || permissions < 1 { http.Error(w, "Please Login", http.StatusUnauthorized) return } w.Header().Set("Access-Control-Allow-Origin", "*") w.Header().Set("Access-Control-Allow-Headers", "Origin, X-Requested-With, Content-Type, Accept") vars := mux.Vars(r) var ( val interface{} // Generic container for the deleted object err error ) // Build a URI like representation of the datatype types := []string{vars["datatype"]} if childtype, ok := vars["childtype"]; ok { types = append(types, childtype) } // Switch based on that URI like representation and instantiate something in the generic container. Also infer the identifier from the vars and perform validation. switch strings.Join(types, "/") { case "items": item := new(data.Item) item.ID, err = strconv.ParseInt(vars["key"], 10, 64) val = item case "items/comments": comment := new(data.ItemComment) comment.ID, err = strconv.ParseInt(vars["childkey"], 10, 64) val = comment case "users": if vars["key"] != user.Username { http.Error(w, "Please don't delete other users", http.StatusUnauthorized) return } user := new(data.User) user.Username = vars["key"] val = user case "roles": role := new(data.Role) role.Title = vars["key"] val = role case "taxonomy": term := new(data.Term) term.Term = vars["key"] val = term default: http.NotFound(w, r) return } if err != nil { log.Println(err) http.Error(w, "Malformed key in URI", http.StatusBadRequest) return } // Perform the delete err = storage.Delete(val) if err == storage.ErrZeroAffected { http.Error(w, "No matches for query", http.StatusNotFound) return } else if err != nil { log.Println(err) http.Error(w, "Delete Database error, likely due to malformed request", http.StatusInternalServerError) return } // Confirm the delete w.WriteHeader(http.StatusNoContent) }
// Generic Read handler for reading single objects func Read(w http.ResponseWriter, r *http.Request) { //No Auth for the moment w.Header().Set("Access-Control-Allow-Origin", "*") w.Header().Set("Access-Control-Allow-Headers", "Origin, X-Requested-With, Content-Type, Accept") vars := mux.Vars(r) var ( val interface{} // Generic container for the read object err error ) // Build a URI like representation of the datatype types := []string{vars["datatype"]} if childtype, ok := vars["childtype"]; ok { types = append(types, childtype) } // Switch based on that URI like representation and instantiate something in the generic container. Also infer the identifier from the vars and perform validation. switch strings.Join(types, "/") { case "items": item := new(data.Item) item.ID, err = strconv.ParseInt(vars["key"], 10, 64) val = item case "items/comments": comment := new(data.ItemComment) comment.ID, err = strconv.ParseInt(vars["childkey"], 10, 64) val = comment case "users": user := new(data.User) user.Username = vars["key"] val = user case "users/direction": direction := new(data.UserDirection) direction.Username = vars["key"] val = direction case "roles": role := new(data.Role) role.Title = vars["key"] val = role case "taxonomy": term := new(data.Term) term.Term = vars["key"] val = term case "taxonomy/ranking": ranking := new(data.TermRanking) ranking.Term = vars["key"] val = ranking default: http.NotFound(w, r) return } if err != nil { log.Println(err) http.Error(w, "Malformed key in URI", http.StatusBadRequest) return } // Perform the Select err = storage.Select(val) if err == storage.ErrZeroAffected { http.Error(w, "No matches for query", http.StatusNotFound) return } else if err != nil { log.Println(err) http.Error(w, "Select Database error, likely due to malformed request", http.StatusInternalServerError) return } // Important. Let's never send salt/hash out. switch v := val.(type) { case *data.User: v.Salt = "" v.Password = "" } w.Header().Set("Content-Type", "application/json") // Header are important when GZIP is enabled // Return the object we've selected from the database. encoder := json.NewEncoder(w) err = encoder.Encode(val) if err != nil { log.Println(err) } }
// Handle requests containing JSON with user credentials. If the credentials are valid the response will set a session cookie effectively logging in the user. // // Expected JSON format: // {"Username":"******", "Password":"******"} // // Invalid credentials will result in a 401 StatusUnauthorized response. Malformed JSON will result in a 400 StatusBadRequest or possibly 500 StatusInternalServerError. func AuthHandlerFunc(w http.ResponseWriter, r *http.Request) { // Parse the JSON into a user object loginInfo := new(data.User) decoder := json.NewDecoder(r.Body) err := decoder.Decode(&loginInfo) if err != nil { log.Println("JSON problem") log.Println(err) http.Error(w, "Malformed json.", http.StatusBadRequest) return } // Try and load the actual user user := new(data.User) user.Username = loginInfo.Username err = storage.Select(user) if err == storage.ErrZeroAffected { log.Println("No such user: "******"Invalid credentials.", http.StatusUnauthorized) return } else if err != nil { log.Println(err) http.Error(w, "Database error, likely due to malformed request.", http.StatusInternalServerError) return } // Validate if !user.Auth(loginInfo.Password) { log.Println("Wrong Password for: ", user.Username) http.Error(w, "Invalid credentials.", http.StatusUnauthorized) return } // Get role permissions role := new(data.Role) role.Title = user.Role err = storage.Select(role) if err != nil { log.Println("Issues loading role during auth", err) role.Permissions = 0 // Default to no permissions } // Build a cookie session session, _ := store.Get(r, "rter-credentials") session.Values["username"] = user.Username session.Values["role"] = user.Role session.Values["permissions"] = role.Permissions err = session.Save(r, w) if err != nil { log.Println(err) } }