2019-05-16 10:39:25 -04:00
|
|
|
package handlers
|
|
|
|
|
|
|
|
import (
|
2019-08-07 16:17:17 -08:00
|
|
|
"context"
|
2019-05-16 10:39:25 -04:00
|
|
|
"log"
|
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
|
2019-07-13 12:16:28 -08:00
|
|
|
"geeks-accelerator/oss/saas-starter-kit/internal/mid"
|
|
|
|
saasSwagger "geeks-accelerator/oss/saas-starter-kit/internal/mid/saas-swagger"
|
|
|
|
"geeks-accelerator/oss/saas-starter-kit/internal/platform/auth"
|
|
|
|
"geeks-accelerator/oss/saas-starter-kit/internal/platform/web"
|
2019-08-04 14:48:43 -08:00
|
|
|
"geeks-accelerator/oss/saas-starter-kit/internal/platform/web/webcontext"
|
2019-08-07 16:17:17 -08:00
|
|
|
"geeks-accelerator/oss/saas-starter-kit/internal/platform/web/weberror"
|
2019-08-05 19:49:30 -08:00
|
|
|
_ "geeks-accelerator/oss/saas-starter-kit/internal/platform/web/weberror"
|
2019-08-07 16:17:17 -08:00
|
|
|
"geeks-accelerator/oss/saas-starter-kit/internal/project"
|
2019-07-13 12:16:28 -08:00
|
|
|
_ "geeks-accelerator/oss/saas-starter-kit/internal/signup"
|
2019-05-23 14:32:24 -05:00
|
|
|
"github.com/jmoiron/sqlx"
|
2019-08-07 16:17:17 -08:00
|
|
|
"github.com/pkg/errors"
|
2019-06-24 17:36:42 -08:00
|
|
|
"gopkg.in/DataDog/dd-trace-go.v1/contrib/go-redis/redis"
|
2019-05-16 10:39:25 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// API returns a handler for a set of routes.
|
2019-07-31 18:34:27 -08:00
|
|
|
func API(shutdown chan os.Signal, log *log.Logger, env webcontext.Env, masterDB *sqlx.DB, redis *redis.Client, authenticator *auth.Authenticator, globalMids ...web.Middleware) http.Handler {
|
2019-07-12 11:41:41 -08:00
|
|
|
|
|
|
|
// Define base middlewares applied to all requests.
|
|
|
|
middlewares := []web.Middleware{
|
2019-08-04 14:48:43 -08:00
|
|
|
mid.Trace(), mid.Logger(log), mid.Errors(log, nil), mid.Metrics(), mid.Panics(),
|
2019-07-12 11:41:41 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Append any global middlewares if they were included.
|
|
|
|
if len(globalMids) > 0 {
|
|
|
|
middlewares = append(middlewares, globalMids...)
|
|
|
|
}
|
2019-05-16 10:39:25 -04:00
|
|
|
|
|
|
|
// Construct the web.App which holds all routes as well as common Middleware.
|
2019-07-31 13:47:30 -08:00
|
|
|
app := web.NewApp(shutdown, log, env, middlewares...)
|
2019-05-16 10:39:25 -04:00
|
|
|
|
|
|
|
// Register health check endpoint. This route is not authenticated.
|
|
|
|
check := Check{
|
|
|
|
MasterDB: masterDB,
|
2019-07-11 14:46:05 -08:00
|
|
|
Redis: redis,
|
2019-05-16 10:39:25 -04:00
|
|
|
}
|
|
|
|
app.Handle("GET", "/v1/health", check.Health)
|
2019-07-10 16:24:10 -08:00
|
|
|
app.Handle("GET", "/ping", check.Ping)
|
2019-05-16 10:39:25 -04:00
|
|
|
|
|
|
|
// Register user management and authentication endpoints.
|
|
|
|
u := User{
|
|
|
|
MasterDB: masterDB,
|
|
|
|
TokenGenerator: authenticator,
|
|
|
|
}
|
2019-07-31 18:34:27 -08:00
|
|
|
app.Handle("GET", "/v1/users", u.Find, mid.AuthenticateHeader(authenticator))
|
|
|
|
app.Handle("POST", "/v1/users", u.Create, mid.AuthenticateHeader(authenticator), mid.HasRole(auth.RoleAdmin))
|
|
|
|
app.Handle("GET", "/v1/users/:id", u.Read, mid.AuthenticateHeader(authenticator))
|
|
|
|
app.Handle("PATCH", "/v1/users", u.Update, mid.AuthenticateHeader(authenticator))
|
|
|
|
app.Handle("PATCH", "/v1/users/password", u.UpdatePassword, mid.AuthenticateHeader(authenticator))
|
|
|
|
app.Handle("PATCH", "/v1/users/archive", u.Archive, mid.AuthenticateHeader(authenticator), mid.HasRole(auth.RoleAdmin))
|
|
|
|
app.Handle("DELETE", "/v1/users/:id", u.Delete, mid.AuthenticateHeader(authenticator), mid.HasRole(auth.RoleAdmin))
|
|
|
|
app.Handle("PATCH", "/v1/users/switch-account/:account_id", u.SwitchAccount, mid.AuthenticateHeader(authenticator))
|
2019-05-16 10:39:25 -04:00
|
|
|
|
|
|
|
// This route is not authenticated
|
2019-06-24 22:41:21 -08:00
|
|
|
app.Handle("POST", "/v1/oauth/token", u.Token)
|
2019-05-16 10:39:25 -04:00
|
|
|
|
2019-06-26 20:21:00 -08:00
|
|
|
// Register user account management endpoints.
|
|
|
|
ua := UserAccount{
|
2019-06-27 04:48:18 -08:00
|
|
|
MasterDB: masterDB,
|
2019-06-26 20:21:00 -08:00
|
|
|
}
|
2019-07-31 18:34:27 -08:00
|
|
|
app.Handle("GET", "/v1/user_accounts", ua.Find, mid.AuthenticateHeader(authenticator))
|
|
|
|
app.Handle("POST", "/v1/user_accounts", ua.Create, mid.AuthenticateHeader(authenticator), mid.HasRole(auth.RoleAdmin))
|
2019-08-04 14:48:43 -08:00
|
|
|
app.Handle("GET", "/v1/user_accounts/:user_id/:account_id", ua.Read, mid.AuthenticateHeader(authenticator))
|
2019-07-31 18:34:27 -08:00
|
|
|
app.Handle("PATCH", "/v1/user_accounts", ua.Update, mid.AuthenticateHeader(authenticator))
|
|
|
|
app.Handle("PATCH", "/v1/user_accounts/archive", ua.Archive, mid.AuthenticateHeader(authenticator), mid.HasRole(auth.RoleAdmin))
|
|
|
|
app.Handle("DELETE", "/v1/user_accounts", ua.Delete, mid.AuthenticateHeader(authenticator), mid.HasRole(auth.RoleAdmin))
|
2019-06-26 20:21:00 -08:00
|
|
|
|
2019-06-24 17:36:42 -08:00
|
|
|
// Register account endpoints.
|
|
|
|
a := Account{
|
|
|
|
MasterDB: masterDB,
|
|
|
|
}
|
2019-07-31 18:34:27 -08:00
|
|
|
app.Handle("GET", "/v1/accounts/:id", a.Read, mid.AuthenticateHeader(authenticator))
|
|
|
|
app.Handle("PATCH", "/v1/accounts", a.Update, mid.AuthenticateHeader(authenticator), mid.HasRole(auth.RoleAdmin))
|
2019-06-24 17:36:42 -08:00
|
|
|
|
2019-06-25 02:40:29 -08:00
|
|
|
// Register signup endpoints.
|
|
|
|
s := Signup{
|
|
|
|
MasterDB: masterDB,
|
|
|
|
}
|
|
|
|
app.Handle("POST", "/v1/signup", s.Signup)
|
|
|
|
|
2019-06-24 17:36:42 -08:00
|
|
|
// Register project.
|
2019-05-16 18:05:39 -04:00
|
|
|
p := Project{
|
2019-05-16 10:39:25 -04:00
|
|
|
MasterDB: masterDB,
|
|
|
|
}
|
2019-07-31 18:34:27 -08:00
|
|
|
app.Handle("GET", "/v1/projects", p.Find, mid.AuthenticateHeader(authenticator))
|
|
|
|
app.Handle("POST", "/v1/projects", p.Create, mid.AuthenticateHeader(authenticator), mid.HasRole(auth.RoleAdmin))
|
|
|
|
app.Handle("GET", "/v1/projects/:id", p.Read, mid.AuthenticateHeader(authenticator))
|
|
|
|
app.Handle("PATCH", "/v1/projects", p.Update, mid.AuthenticateHeader(authenticator), mid.HasRole(auth.RoleAdmin))
|
|
|
|
app.Handle("PATCH", "/v1/projects/archive", p.Archive, mid.AuthenticateHeader(authenticator), mid.HasRole(auth.RoleAdmin))
|
|
|
|
app.Handle("DELETE", "/v1/projects/:id", p.Delete, mid.AuthenticateHeader(authenticator), mid.HasRole(auth.RoleAdmin))
|
2019-06-24 17:36:42 -08:00
|
|
|
|
2019-08-07 16:17:17 -08:00
|
|
|
app.Handle("GET", "/v1/examples/error-response", ExampleErrorResponse)
|
|
|
|
|
2019-06-24 17:36:42 -08:00
|
|
|
// Register swagger documentation.
|
2019-06-24 22:41:21 -08:00
|
|
|
// TODO: Add authentication. Current authenticator requires an Authorization header
|
|
|
|
// which breaks the browser experience.
|
2019-07-14 17:59:06 -08:00
|
|
|
app.Handle("GET", "/docs/", saasSwagger.WrapHandler)
|
|
|
|
app.Handle("GET", "/docs/*", saasSwagger.WrapHandler)
|
2019-05-16 10:39:25 -04:00
|
|
|
|
|
|
|
return app
|
|
|
|
}
|
2019-06-25 22:31:54 -08:00
|
|
|
|
2019-08-07 16:17:17 -08:00
|
|
|
// ExampleErrorResponse returns example error messages.
|
|
|
|
func ExampleErrorResponse(ctx context.Context, w http.ResponseWriter, r *http.Request, params map[string]string) error {
|
|
|
|
v, err := webcontext.ContextValues(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if qv := r.URL.Query().Get("test-validation-error"); qv != "" {
|
|
|
|
_, err := project.Create(ctx, auth.Claims{}, nil, project.ProjectCreateRequest{}, v.Now)
|
|
|
|
return web.RespondJsonError(ctx, w, err)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if qv := r.URL.Query().Get("test-web-error"); qv != "" {
|
|
|
|
terr := errors.New("Some random error")
|
|
|
|
terr = errors.WithMessage(terr, "Actual error message")
|
|
|
|
rerr := weberror.NewError(ctx, terr, http.StatusBadRequest).(*weberror.Error)
|
|
|
|
rerr.Message = "Test Web Error Message"
|
|
|
|
return web.RespondJsonError(ctx, w, rerr)
|
|
|
|
}
|
|
|
|
|
|
|
|
if qv := r.URL.Query().Get("test-error"); qv != "" {
|
|
|
|
terr := errors.New("Test error")
|
|
|
|
terr = errors.WithMessage(terr, "Error message")
|
|
|
|
return web.RespondJsonError(ctx, w, terr)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-06-25 22:31:54 -08:00
|
|
|
// Types godoc
|
|
|
|
// @Summary List of types.
|
2019-08-05 19:49:30 -08:00
|
|
|
// @Param data body weberror.FieldError false "Field Error"
|
2019-06-25 22:31:54 -08:00
|
|
|
// @Param data body web.TimeResponse false "Time Response"
|
|
|
|
// @Param data body web.EnumResponse false "Enum Response"
|
2019-08-05 19:49:30 -08:00
|
|
|
// @Param data body web.EnumMultiResponse false "Enum Multi Response"
|
2019-06-25 22:31:54 -08:00
|
|
|
// @Param data body web.EnumOption false "Enum Option"
|
2019-06-26 01:16:57 -08:00
|
|
|
// @Param data body signup.SignupAccount false "SignupAccount"
|
|
|
|
// @Param data body signup.SignupUser false "SignupUser"
|
2019-06-25 22:31:54 -08:00
|
|
|
// To support nested types not parsed by swag.
|
|
|
|
func Types() {}
|