160 lines
6.7 KiB
C#
160 lines
6.7 KiB
C#
using System.Collections.Generic;
|
|
using Microsoft.AspNetCore.Mvc;
|
|
using Microsoft.AspNetCore.Authorization;
|
|
using Oqtane.Enums;
|
|
using Oqtane.Models;
|
|
using Oqtane.Shared;
|
|
using Oqtane.Infrastructure;
|
|
using Oqtane.Repository;
|
|
using System.Linq;
|
|
using System.Net;
|
|
|
|
namespace Oqtane.Controllers
|
|
{
|
|
[Route(ControllerRoutes.ApiRoute)]
|
|
public class UserRoleController : Controller
|
|
{
|
|
private readonly IUserRoleRepository _userRoles;
|
|
private readonly IRoleRepository _roles;
|
|
private readonly ISyncManager _syncManager;
|
|
private readonly ILogManager _logger;
|
|
private readonly Alias _alias;
|
|
|
|
public UserRoleController(IUserRoleRepository userRoles, IRoleRepository roles, ITenantManager tenantManager, ISyncManager syncManager, ILogManager logger)
|
|
{
|
|
_userRoles = userRoles;
|
|
_roles = roles;
|
|
_syncManager = syncManager;
|
|
_logger = logger;
|
|
_alias = tenantManager.GetAlias();
|
|
}
|
|
|
|
// GET: api/<controller>?siteid=x
|
|
[HttpGet]
|
|
[Authorize(Roles = RoleNames.Admin)]
|
|
public IEnumerable<UserRole> Get(string siteid)
|
|
{
|
|
int SiteId;
|
|
if (int.TryParse(siteid, out SiteId) && SiteId == _alias.SiteId)
|
|
{
|
|
return _userRoles.GetUserRoles(SiteId);
|
|
}
|
|
else
|
|
{
|
|
_logger.Log(LogLevel.Error, this, LogFunction.Security, "Unauthorized UserRole Get Attempt {SiteId}", siteid);
|
|
HttpContext.Response.StatusCode = (int)HttpStatusCode.Forbidden;
|
|
return null;
|
|
}
|
|
}
|
|
|
|
// GET api/<controller>/5
|
|
[HttpGet("{id}")]
|
|
[Authorize(Roles = RoleNames.Admin)]
|
|
public UserRole Get(int id)
|
|
{
|
|
var userrole = _userRoles.GetUserRole(id);
|
|
if (userrole != null && SiteValid(userrole.Role.SiteId))
|
|
{
|
|
return userrole;
|
|
}
|
|
else
|
|
{
|
|
_logger.Log(LogLevel.Error, this, LogFunction.Security, "Unauthorized User Role Get Attempt {UserRoleId}", id);
|
|
HttpContext.Response.StatusCode = (int)HttpStatusCode.Forbidden;
|
|
return null;
|
|
}
|
|
}
|
|
|
|
// POST api/<controller>
|
|
[HttpPost]
|
|
[Authorize(Roles = RoleNames.Admin)]
|
|
public UserRole Post([FromBody] UserRole userRole)
|
|
{
|
|
var role = _roles.GetRole(userRole.RoleId);
|
|
if (ModelState.IsValid && role != null && SiteValid(role.SiteId) && RoleValid(role.Name))
|
|
{
|
|
if (role.Name == RoleNames.Host)
|
|
{
|
|
// host roles can only exist at global level - remove all site specific user roles
|
|
_userRoles.DeleteUserRoles(userRole.UserId);
|
|
_logger.Log(LogLevel.Information, this, LogFunction.Delete, "User Roles Deleted For UserId {UserId}", userRole.UserId);
|
|
}
|
|
|
|
userRole = _userRoles.AddUserRole(userRole);
|
|
_logger.Log(LogLevel.Information, this, LogFunction.Create, "User Role Added {UserRole}", userRole);
|
|
|
|
_syncManager.AddSyncEvent(_alias.TenantId, EntityNames.User, userRole.UserId);
|
|
}
|
|
else
|
|
{
|
|
_logger.Log(LogLevel.Error, this, LogFunction.Security, "Unauthorized UserRole Post Attempt {UserRole}", userRole);
|
|
HttpContext.Response.StatusCode = (int)HttpStatusCode.Forbidden;
|
|
userRole = null;
|
|
}
|
|
return userRole;
|
|
}
|
|
|
|
// PUT api/<controller>/5
|
|
[HttpPut("{id}")]
|
|
[Authorize(Roles = RoleNames.Admin)]
|
|
public UserRole Put(int id, [FromBody] UserRole userRole)
|
|
{
|
|
var role = _roles.GetRole(userRole.RoleId);
|
|
if (ModelState.IsValid && role != null && SiteValid(role.SiteId) && RoleValid(role.Name) && _userRoles.GetUserRole(userRole.UserRoleId, false) != null)
|
|
{
|
|
userRole = _userRoles.UpdateUserRole(userRole);
|
|
_syncManager.AddSyncEvent(_alias.TenantId, EntityNames.User, userRole.UserId);
|
|
_logger.Log(LogLevel.Information, this, LogFunction.Update, "User Role Updated {UserRole}", userRole);
|
|
}
|
|
else
|
|
{
|
|
_logger.Log(LogLevel.Error, this, LogFunction.Security, "Unauthorized User Role Put Attempt {UserRole}", userRole);
|
|
HttpContext.Response.StatusCode = (int)HttpStatusCode.Forbidden;
|
|
userRole = null;
|
|
}
|
|
return userRole;
|
|
}
|
|
|
|
// DELETE api/<controller>/5
|
|
[HttpDelete("{id}")]
|
|
[Authorize(Roles = RoleNames.Admin)]
|
|
public void Delete(int id)
|
|
{
|
|
UserRole userrole = _userRoles.GetUserRole(id);
|
|
if (userrole != null && SiteValid(userrole.Role.SiteId) && RoleValid(userrole.Role.Name))
|
|
{
|
|
_userRoles.DeleteUserRole(id);
|
|
_logger.Log(LogLevel.Information, this, LogFunction.Delete, "User Role Deleted {UserRole}", userrole);
|
|
|
|
if (userrole.Role.Name == RoleNames.Host)
|
|
{
|
|
// add site specific user roles to preserve user access
|
|
var role = _roles.GetRoles(_alias.SiteId).FirstOrDefault(item => item.Name == RoleNames.Registered);
|
|
userrole = _userRoles.AddUserRole(new UserRole { UserId = userrole.UserId, RoleId = role.RoleId, EffectiveDate = null, ExpiryDate = null });
|
|
_logger.Log(LogLevel.Information, this, LogFunction.Create, "User Role Added {UserRole}", userrole);
|
|
role = _roles.GetRoles(_alias.SiteId).FirstOrDefault(item => item.Name == RoleNames.Admin);
|
|
userrole = _userRoles.AddUserRole(new UserRole { UserId = userrole.UserId, RoleId = role.RoleId, EffectiveDate = null, ExpiryDate = null });
|
|
_logger.Log(LogLevel.Information, this, LogFunction.Create, "User Role Added {UserRole}", userrole);
|
|
}
|
|
|
|
_syncManager.AddSyncEvent(_alias.TenantId, EntityNames.User, userrole.UserId);
|
|
}
|
|
else
|
|
{
|
|
_logger.Log(LogLevel.Error, this, LogFunction.Security, "Unauthorized User Role Delete Attempt {UserRoleId}", id);
|
|
HttpContext.Response.StatusCode = (int)HttpStatusCode.Forbidden;
|
|
}
|
|
}
|
|
|
|
private bool SiteValid(int? SiteId)
|
|
{
|
|
return (SiteId == _alias.SiteId || (SiteId == null && User.IsInRole(RoleNames.Host)));
|
|
}
|
|
|
|
private bool RoleValid(string RoleName)
|
|
{
|
|
return (RoleName != RoleNames.Host || User.IsInRole(RoleNames.Host));
|
|
}
|
|
}
|
|
}
|