create.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234
  1. package user
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net/http"
  6. "github.com/porter-dev/porter/api/server/authn"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/api/types"
  12. "github.com/porter-dev/porter/internal/analytics"
  13. "github.com/porter-dev/porter/internal/encryption"
  14. "github.com/porter-dev/porter/internal/models"
  15. "github.com/porter-dev/porter/internal/repository"
  16. "golang.org/x/crypto/bcrypt"
  17. )
  18. type UserCreateHandler struct {
  19. handlers.PorterHandlerReadWriter
  20. }
  21. func NewUserCreateHandler(
  22. config *config.Config,
  23. decoderValidator shared.RequestDecoderValidator,
  24. writer shared.ResultWriter,
  25. ) *UserCreateHandler {
  26. return &UserCreateHandler{
  27. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  28. }
  29. }
  30. func (u *UserCreateHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  31. request := &types.CreateUserRequest{}
  32. ok := u.DecodeAndValidate(w, r, request)
  33. if !ok {
  34. return
  35. }
  36. user := &models.User{
  37. Email: request.Email,
  38. Password: request.Password,
  39. }
  40. // check if user exists
  41. doesExist := doesUserExist(u.Repo().User(), user)
  42. if doesExist {
  43. err := fmt.Errorf("email already taken")
  44. u.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  45. return
  46. }
  47. if err := checkUserRestrictions(u.Config().ServerConf, request.Email); err != nil {
  48. u.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  49. return
  50. }
  51. // hash the password using bcrypt
  52. hashedPw, err := bcrypt.GenerateFromPassword([]byte(user.Password), 8)
  53. if err != nil {
  54. u.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  55. return
  56. }
  57. user.Password = string(hashedPw)
  58. // write the user to the db
  59. user, err = u.Repo().User().CreateUser(user)
  60. if err != nil {
  61. u.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  62. return
  63. }
  64. err = addUserToDefaultProject(u.Config(), user)
  65. if err != nil {
  66. u.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  67. return
  68. }
  69. // save the user as authenticated in the session
  70. redirect, err := authn.SaveUserAuthenticated(w, r, u.Config(), user)
  71. if err != nil {
  72. u.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  73. return
  74. }
  75. // non-fatal send email verification
  76. if !user.EmailVerified {
  77. err = startEmailVerification(u.Config(), w, r, user)
  78. if err != nil {
  79. u.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(err))
  80. }
  81. }
  82. u.Config().AnalyticsClient.Identify(analytics.CreateSegmentIdentifyUser(user))
  83. u.Config().AnalyticsClient.Track(analytics.UserCreateTrack(&analytics.UserCreateTrackOpts{
  84. UserScopedTrackOpts: analytics.GetUserScopedTrackOpts(user.ID),
  85. Email: user.Email,
  86. }))
  87. if redirect != "" {
  88. http.Redirect(w, r, redirect, http.StatusFound)
  89. return
  90. }
  91. u.WriteResult(w, r, user.ToUserType())
  92. }
  93. func doesUserExist(userRepo repository.UserRepository, user *models.User) bool {
  94. user, err := userRepo.ReadUserByEmail(user.Email)
  95. return user != nil && err == nil
  96. }
  97. // addUserToDefaultProject adds the created user to any default projects if required by
  98. // config variables.
  99. func addUserToDefaultProject(config *config.Config, user *models.User) error {
  100. if config.ServerConf.InitInCluster {
  101. // if this is the first user, add the user to the default project
  102. if user.ID == 1 {
  103. // read the default project
  104. project, err := config.Repo.Project().ReadProject(1)
  105. if err != nil {
  106. return err
  107. }
  108. err = createNewRole(project.ID, types.RoleAdmin, config.Repo.ProjectRole(), config.Repo.Policy())
  109. if err != nil {
  110. return err
  111. }
  112. err = createNewRole(project.ID, types.RoleAdmin, config.Repo.ProjectRole(), config.Repo.Policy())
  113. if err != nil {
  114. return err
  115. }
  116. err = createNewRole(project.ID, types.RoleAdmin, config.Repo.ProjectRole(), config.Repo.Policy())
  117. if err != nil {
  118. return err
  119. }
  120. // attach user to admin role
  121. err = config.Repo.ProjectRole().UpdateUsersInProjectRole(project.ID, fmt.Sprintf("%d-%s", project.ID, types.RoleAdmin), []uint{user.ID})
  122. if err != nil {
  123. return err
  124. }
  125. }
  126. }
  127. return nil
  128. }
  129. func createNewRole(
  130. projectID uint,
  131. kind types.RoleKind,
  132. projectRoleRepo repository.ProjectRoleRepository,
  133. policyRepo repository.PolicyRepository,
  134. ) error {
  135. // for legacy roles - admin, developer, viewer (kinds)
  136. // default role name such as <project ID>-<kind> for uniqueness
  137. // similarly, create policy for each new default role as <project ID>-<kind>-project-role-policy
  138. uid, err := encryption.GenerateRandomBytes(16)
  139. if err != nil {
  140. return err
  141. }
  142. var policyBytes []byte
  143. switch kind {
  144. case types.RoleAdmin:
  145. policyBytes, err = json.Marshal(types.AdminPolicy)
  146. if err != nil {
  147. return err
  148. }
  149. case types.RoleDeveloper:
  150. policyBytes, err = json.Marshal(types.DeveloperPolicy)
  151. if err != nil {
  152. return err
  153. }
  154. case types.RoleViewer:
  155. policyBytes, err = json.Marshal(types.ViewerPolicy)
  156. if err != nil {
  157. return err
  158. }
  159. }
  160. newPolicy, err := policyRepo.CreatePolicy(&models.Policy{
  161. UniqueID: uid,
  162. ProjectID: projectID,
  163. Name: fmt.Sprintf("%s-project-role-policy", kind),
  164. PolicyBytes: policyBytes,
  165. })
  166. if err != nil {
  167. return err
  168. }
  169. _, err = projectRoleRepo.CreateProjectRole(&models.ProjectRole{
  170. UniqueID: fmt.Sprintf("%d-%s", projectID, kind),
  171. ProjectID: projectID,
  172. PolicyUID: newPolicy.UniqueID,
  173. Name: string(kind),
  174. })
  175. if err != nil {
  176. // delete newly created policy first
  177. policyRepo.DeletePolicy(newPolicy)
  178. return err
  179. }
  180. return nil
  181. }