statping/handlers/api.go

397 lines
12 KiB
Go
Raw Normal View History

2018-08-16 06:22:20 +00:00
// Statup
// Copyright (C) 2018. Hunter Long and the project contributors
// Written by Hunter Long <info@socialeck.com> and the project contributors
//
// https://github.com/hunterlong/statup
//
// The licenses for most software and other practical works are designed
// to take away your freedom to share and change the works. By contrast,
// the GNU General Public License is intended to guarantee your freedom to
// share and change all versions of a program--to make sure it remains free
// software for all its users.
//
// You should have received a copy of the GNU General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
2018-06-30 00:57:05 +00:00
package handlers
2018-06-15 04:30:10 +00:00
import (
2018-11-06 12:12:17 +00:00
"database/sql"
2018-06-25 07:09:31 +00:00
"encoding/json"
2018-11-03 00:27:29 +00:00
"fmt"
2018-06-25 07:09:31 +00:00
"github.com/gorilla/mux"
2018-06-30 00:57:05 +00:00
"github.com/hunterlong/statup/core"
2018-11-03 00:27:29 +00:00
"github.com/hunterlong/statup/core/notifier"
2018-07-14 02:37:39 +00:00
"github.com/hunterlong/statup/types"
2018-06-30 00:57:05 +00:00
"github.com/hunterlong/statup/utils"
2018-06-25 07:09:31 +00:00
"net/http"
"os"
"time"
2018-06-15 04:30:10 +00:00
)
2018-10-06 05:56:08 +00:00
type apiResponse struct {
2018-09-12 21:29:47 +00:00
Status string `json:"status"`
Object string `json:"type"`
Id int64 `json:"id"`
2018-09-12 21:29:47 +00:00
Method string `json:"method"`
}
func apiIndexHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
2018-09-12 21:29:47 +00:00
var out core.Core
out = *core.CoreApp
var services []types.ServiceInterface
for _, s := range out.Services {
service := s.Select()
service.Failures = nil
services = append(services, core.ReturnService(service))
}
out.Services = services
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(out)
2018-06-15 04:30:10 +00:00
}
func apiRenewHandler(w http.ResponseWriter, r *http.Request) {
2018-07-17 09:18:20 +00:00
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
var err error
core.CoreApp.ApiKey = utils.NewSHA1Hash(40)
core.CoreApp.ApiSecret = utils.NewSHA1Hash(40)
core.CoreApp, err = core.UpdateCore(core.CoreApp)
if err != nil {
utils.Log(3, err)
}
http.Redirect(w, r, "/settings", http.StatusSeeOther)
}
func apiCheckinHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
2018-06-22 06:56:44 +00:00
vars := mux.Vars(r)
2018-10-04 08:18:55 +00:00
checkin := core.SelectCheckin(vars["api"])
2018-07-14 02:37:39 +00:00
//checkin.Receivehit()
2018-06-22 06:56:44 +00:00
w.WriteHeader(http.StatusOK)
json.NewEncoder(w).Encode(checkin)
}
func apiServiceDataHandler(w http.ResponseWriter, r *http.Request) {
vars := mux.Vars(r)
service := core.SelectService(utils.StringInt(vars["id"]))
if service == nil {
http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
return
}
fields := parseGet(r)
grouping := fields.Get("group")
startField := utils.StringInt(fields.Get("start"))
endField := utils.StringInt(fields.Get("end"))
2018-11-02 23:19:52 +00:00
if startField == 0 || endField == 0 {
startField = 0
endField = 99999999999
}
obj := core.GraphDataRaw(service, time.Unix(startField, 0).UTC(), time.Unix(endField, 0).UTC(), grouping, "latency")
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(obj)
}
func apiServicePingDataHandler(w http.ResponseWriter, r *http.Request) {
vars := mux.Vars(r)
service := core.SelectService(utils.StringInt(vars["id"]))
if service == nil {
http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
return
}
fields := parseGet(r)
grouping := fields.Get("group")
startField := utils.StringInt(fields.Get("start"))
endField := utils.StringInt(fields.Get("end"))
obj := core.GraphDataRaw(service, time.Unix(startField, 0), time.Unix(endField, 0), grouping, "ping_time")
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(obj)
}
func apiServiceHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
2018-06-15 04:30:10 +00:00
vars := mux.Vars(r)
2018-06-30 00:57:05 +00:00
service := core.SelectService(utils.StringInt(vars["id"]))
if service == nil {
http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
return
}
2018-09-12 21:29:47 +00:00
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(service)
}
func apiCreateServiceHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
var service *types.Service
decoder := json.NewDecoder(r.Body)
err := decoder.Decode(&service)
if err != nil {
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
return
}
newService := core.ReturnService(service)
_, err = newService.Create(true)
if err != nil {
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
return
}
2018-09-12 21:29:47 +00:00
w.Header().Set("Content-Type", "application/json")
2018-06-15 04:30:10 +00:00
json.NewEncoder(w).Encode(service)
}
func apiServiceUpdateHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
2018-06-15 04:30:10 +00:00
vars := mux.Vars(r)
service := core.SelectService(utils.StringInt(vars["id"]))
if service == nil {
http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
return
}
var updatedService *types.Service
2018-06-15 04:30:10 +00:00
decoder := json.NewDecoder(r.Body)
decoder.Decode(&updatedService)
2018-09-12 21:29:47 +00:00
updatedService.Id = service.Id
service = core.ReturnService(updatedService)
err := service.Update(true)
if err != nil {
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
return
}
2018-09-12 21:29:47 +00:00
service.Check(true)
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(service)
}
func apiServiceDeleteHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
vars := mux.Vars(r)
service := core.SelectService(utils.StringInt(vars["id"]))
if service == nil {
http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
return
}
err := service.Delete()
if err != nil {
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
return
}
2018-10-06 05:56:08 +00:00
output := apiResponse{
Object: "service",
Method: "delete",
Id: service.Id,
Status: "success",
}
2018-09-12 21:29:47 +00:00
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(output)
2018-06-15 04:30:10 +00:00
}
func apiAllServicesHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
2018-09-12 21:29:47 +00:00
allServices := core.CoreApp.Services
var services []types.ServiceInterface
for _, s := range allServices {
service := s.Select()
service.Failures = nil
services = append(services, core.ReturnService(service))
}
w.Header().Set("Content-Type", "application/json")
2018-06-15 04:30:10 +00:00
json.NewEncoder(w).Encode(services)
}
func apiUserHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
2018-06-15 04:30:10 +00:00
vars := mux.Vars(r)
user, err := core.SelectUser(utils.StringInt(vars["id"]))
if err != nil {
http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
return
}
2018-09-12 21:29:47 +00:00
w.Header().Set("Content-Type", "application/json")
2018-06-15 04:30:10 +00:00
json.NewEncoder(w).Encode(user)
}
func apiUserUpdateHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
vars := mux.Vars(r)
user, err := core.SelectUser(utils.StringInt(vars["id"]))
if err != nil {
http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
return
}
var updateUser *types.User
decoder := json.NewDecoder(r.Body)
decoder.Decode(&updateUser)
2018-09-12 21:29:47 +00:00
updateUser.Id = user.Id
user = core.ReturnUser(updateUser)
err = user.Update()
if err != nil {
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
return
}
2018-09-12 21:29:47 +00:00
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(user)
}
func apiUserDeleteHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
vars := mux.Vars(r)
user, err := core.SelectUser(utils.StringInt(vars["id"]))
if err != nil {
http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
return
}
err = user.Delete()
if err != nil {
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
return
}
2018-10-06 05:56:08 +00:00
output := apiResponse{
Object: "user",
Method: "delete",
Id: user.Id,
Status: "success",
}
2018-09-12 21:29:47 +00:00
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(output)
}
func apiAllUsersHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
2018-06-30 00:57:05 +00:00
users, _ := core.SelectAllUsers()
2018-09-12 21:29:47 +00:00
w.Header().Set("Content-Type", "application/json")
2018-06-15 04:30:10 +00:00
json.NewEncoder(w).Encode(users)
}
func apiCreateUsersHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
var user *types.User
decoder := json.NewDecoder(r.Body)
err := decoder.Decode(&user)
if err != nil {
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
return
}
newUser := core.ReturnUser(user)
uId, err := newUser.Create()
if err != nil {
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
return
}
2018-10-06 05:56:08 +00:00
output := apiResponse{
Object: "user",
Method: "create",
Id: uId,
Status: "success",
}
2018-09-12 21:29:47 +00:00
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(output)
}
2018-11-03 00:27:29 +00:00
func apiNotifierGetHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
vars := mux.Vars(r)
2018-11-06 09:03:21 +00:00
_, notifierObj, err := notifier.SelectNotifier(vars["notifier"])
2018-11-03 00:27:29 +00:00
if err != nil {
http.Error(w, fmt.Sprintf("%v notifier was not found", vars["notifier"]), http.StatusInternalServerError)
return
}
2018-11-05 22:04:06 +00:00
w.Header().Set("Content-Type", "application/json")
2018-11-06 12:12:17 +00:00
json.NewEncoder(w).Encode(notifierObj)
2018-11-06 09:03:21 +00:00
}
func apiNotifierUpdateHandler(w http.ResponseWriter, r *http.Request) {
if !isAPIAuthorized(r) {
http.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)
return
}
vars := mux.Vars(r)
var notification *notifier.Notification
2018-11-06 12:12:17 +00:00
fmt.Println(r.Body)
2018-11-06 09:03:21 +00:00
decoder := json.NewDecoder(r.Body)
decoder.Decode(&notification)
2018-11-06 12:12:17 +00:00
notifer, not, err := notifier.SelectNotifier(vars["notifier"])
2018-11-06 09:03:21 +00:00
if err != nil {
http.Error(w, fmt.Sprintf("%v notifier was not found", vars["notifier"]), http.StatusInternalServerError)
return
}
2018-11-06 12:12:17 +00:00
notifer.Var1 = notification.Var1
notifer.Var2 = notification.Var2
notifer.Host = notification.Host
notifer.Port = notification.Port
notifer.Password = notification.Password
notifer.Username = notification.Username
notifer.Enabled = sql.NullBool{notification.Enabled.Bool, true}
notifer.ApiKey = notification.ApiKey
notifer.ApiSecret = notification.ApiSecret
2018-11-06 09:03:21 +00:00
2018-11-06 12:12:17 +00:00
_, err = notifier.Update(not, notifer)
2018-11-06 09:03:21 +00:00
if err != nil {
utils.Log(3, fmt.Sprintf("issue updating notifier: %v", err))
}
2018-11-06 12:12:17 +00:00
notifier.OnSave(notifer.Method)
2018-11-06 09:03:21 +00:00
w.Header().Set("Content-Type", "application/json")
2018-11-06 12:12:17 +00:00
json.NewEncoder(w).Encode(notifer)
2018-11-03 00:27:29 +00:00
}
func isAPIAuthorized(r *http.Request) bool {
if os.Getenv("GO_ENV") == "test" {
return true
}
if IsAuthenticated(r) {
return true
}
if isAuthorized(r) {
return true
}
return false
}