mirror of
https://github.com/gabehf/Koito.git
synced 2026-03-07 21:48:18 -08:00
* feat: single SOT for themes + basic custom support * fix: adjust colors for yuu theme * feat: Allow loading of environment variables from file (#20) * feat: allow loading of environment variables from file * Panic if a file for an environment variable cannot be read * Use log.Fatalf + os.Exit instead of panic * fix: remove supurfluous call to os.Exit() --------- Co-authored-by: adaexec <nixos-git.s1pht@simplelogin.com> Co-authored-by: Gabe Farrell <90876006+gabehf@users.noreply.github.com> * chore: add pr test workflow * chore: changelog * feat: make all activity grids configurable * fix: adjust activity grid style * fix: make background gradient consistent size * revert: remove year from activity grid opts * style: adjust top item list min size to 200px * feat: add support for custom themes * fix: stabilized the order of top items * chore: update changelog * feat: native import & export * fix: use correct request body for alias requests * fix: clear input when closing edit modal * chore: changelog * docs: make endpoint clearer for some apps * feat: add ui and handler for export * fix: fix pr test workflow --------- Co-authored-by: adaexec <78047743+adaexec@users.noreply.github.com> Co-authored-by: adaexec <nixos-git.s1pht@simplelogin.com>
183 lines
5.4 KiB
Go
183 lines
5.4 KiB
Go
package handlers
|
|
|
|
import (
|
|
"net/http"
|
|
"strconv"
|
|
|
|
"github.com/gabehf/koito/engine/middleware"
|
|
"github.com/gabehf/koito/internal/db"
|
|
"github.com/gabehf/koito/internal/logger"
|
|
"github.com/gabehf/koito/internal/utils"
|
|
)
|
|
|
|
func GenerateApiKeyHandler(store db.DB) http.HandlerFunc {
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
ctx := r.Context()
|
|
l := logger.FromContext(ctx)
|
|
|
|
l.Debug().Msg("GenerateApiKeyHandler: Received request")
|
|
|
|
user := middleware.GetUserFromContext(ctx)
|
|
if user == nil {
|
|
l.Debug().Msg("GenerateApiKeyHandler: Invalid user context")
|
|
utils.WriteError(w, "unauthorized", http.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
if err := r.ParseForm(); err != nil {
|
|
l.Debug().AnErr("error", err).Msg("GenerateApiKeyHandler: Failed to parse form")
|
|
utils.WriteError(w, "invalid request", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
label := r.FormValue("label")
|
|
if label == "" {
|
|
l.Debug().Msg("GenerateApiKeyHandler: Missing label parameter")
|
|
utils.WriteError(w, "label is required", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
apiKey, err := utils.GenerateRandomString(48)
|
|
if err != nil {
|
|
l.Error().Err(err).Msg("GenerateApiKeyHandler: Failed to generate API key")
|
|
utils.WriteError(w, "failed to generate api key", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
key, err := store.SaveApiKey(ctx, db.SaveApiKeyOpts{
|
|
UserID: user.ID,
|
|
Key: apiKey,
|
|
Label: label,
|
|
})
|
|
if err != nil {
|
|
l.Error().Err(err).Msg("GenerateApiKeyHandler: Failed to save API key")
|
|
utils.WriteError(w, "failed to save api key", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
l.Debug().Msgf("GenerateApiKeyHandler: Successfully generated API key ID %d", key.ID)
|
|
utils.WriteJSON(w, http.StatusCreated, key)
|
|
}
|
|
}
|
|
|
|
func DeleteApiKeyHandler(store db.DB) http.HandlerFunc {
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
ctx := r.Context()
|
|
l := logger.FromContext(ctx)
|
|
|
|
l.Debug().Msg("DeleteApiKeyHandler: Received request")
|
|
|
|
user := middleware.GetUserFromContext(ctx)
|
|
if user == nil {
|
|
l.Debug().Msg("DeleteApiKeyHandler: Invalid user context")
|
|
utils.WriteError(w, "unauthorized", http.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
idStr := r.URL.Query().Get("id")
|
|
if idStr == "" {
|
|
l.Debug().Msg("DeleteApiKeyHandler: Missing id parameter")
|
|
utils.WriteError(w, "id is required", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
apiKeyID, err := strconv.Atoi(idStr)
|
|
if err != nil {
|
|
l.Debug().AnErr("error", err).Msg("DeleteApiKeyHandler: Invalid API key ID")
|
|
utils.WriteError(w, "invalid id", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
if err := store.DeleteApiKey(ctx, int32(apiKeyID)); err != nil {
|
|
l.Error().Err(err).Msg("DeleteApiKeyHandler: Failed to delete API key")
|
|
utils.WriteError(w, "failed to delete api key", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
l.Debug().Msgf("DeleteApiKeyHandler: Successfully deleted API key ID %d", apiKeyID)
|
|
w.WriteHeader(http.StatusNoContent)
|
|
}
|
|
}
|
|
|
|
func GetApiKeysHandler(store db.DB) http.HandlerFunc {
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
ctx := r.Context()
|
|
l := logger.FromContext(ctx)
|
|
|
|
l.Debug().Msg("GetApiKeysHandler: Received request")
|
|
|
|
user := middleware.GetUserFromContext(ctx)
|
|
if user == nil {
|
|
l.Debug().Msg("GetApiKeysHandler: Invalid user context")
|
|
utils.WriteError(w, "unauthorized", http.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
apiKeys, err := store.GetApiKeysByUserID(ctx, user.ID)
|
|
if err != nil {
|
|
l.Error().Err(err).Msg("GetApiKeysHandler: Failed to retrieve API keys")
|
|
utils.WriteError(w, "failed to retrieve api keys", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
l.Debug().Msgf("GetApiKeysHandler: Retrieved %d API keys", len(apiKeys))
|
|
utils.WriteJSON(w, http.StatusOK, apiKeys)
|
|
}
|
|
}
|
|
|
|
func UpdateApiKeyLabelHandler(store db.DB) http.HandlerFunc {
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
ctx := r.Context()
|
|
l := logger.FromContext(ctx)
|
|
|
|
l.Debug().Msg("UpdateApiKeyLabelHandler: Received request")
|
|
|
|
user := middleware.GetUserFromContext(ctx)
|
|
if user == nil {
|
|
l.Debug().Msg("UpdateApiKeyLabelHandler: Invalid user context")
|
|
utils.WriteError(w, "unauthorized", http.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
err := r.ParseForm()
|
|
if err != nil {
|
|
l.Debug().Msg("UpdateApiKeyLabelHandler: Failed to parse form")
|
|
utils.WriteError(w, "form is invalid", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
idStr := r.FormValue("id")
|
|
if idStr == "" {
|
|
l.Debug().Msg("UpdateApiKeyLabelHandler: Missing id parameter")
|
|
utils.WriteError(w, "id is required", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
apiKeyID, err := strconv.Atoi(idStr)
|
|
if err != nil {
|
|
l.Debug().AnErr("error", err).Msg("UpdateApiKeyLabelHandler: Invalid API key ID")
|
|
utils.WriteError(w, "invalid id", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
label := r.FormValue("label")
|
|
if label == "" {
|
|
l.Debug().Msg("UpdateApiKeyLabelHandler: Missing label parameter")
|
|
utils.WriteError(w, "label is required", http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
if err := store.UpdateApiKeyLabel(ctx, db.UpdateApiKeyLabelOpts{
|
|
UserID: user.ID,
|
|
ID: int32(apiKeyID),
|
|
Label: label,
|
|
}); err != nil {
|
|
l.Error().Err(err).Msg("UpdateApiKeyLabelHandler: Failed to update API key label")
|
|
utils.WriteError(w, "failed to update api key label", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
l.Debug().Msgf("UpdateApiKeyLabelHandler: Successfully updated label for API key ID %d", apiKeyID)
|
|
w.WriteHeader(http.StatusOK)
|
|
}
|
|
}
|