mirror of
				https://github.com/Kareadita/Kavita.git
				synced 2025-11-03 19:17:05 -05:00 
			
		
		
		
	* Refactored all files to have Interfaces within the same file. Started moving over to file-scoped namespaces. * Refactored common methods for getting underlying file's cover, pages, and extracting into 1 interface. * More refactoring around removing dependence on explicit filetype testing for getting information. * Code is buildable, tests are broken. Huge refactor (not completed) which makes most of DirectoryService testable with a mock filesystem (and thus the services that utilize it). * Finished porting DirectoryService to use mocked filesystem implementation. * Added a null check * Added a null check * Finished all unit tests for DirectoryService. * Some misc cleanup on the code * Fixed up some bugs from refactoring scan loop. * Implemented CleanupService testing and refactored more of DirectoryService to be non-static. Fixed a bug where cover file cleanup wasn't properly finding files due to a regex bug. * Fixed an issue in CleanupBackup() where we weren't properly selecting database files older than 30 days. Finished CleanupService Tests. * Refactored Flatten and RemoveNonImages to directory service to allow CacheService to be testable. * Finally have CacheService tested. Rewrote GetCachedPagePath() to be much more straightforward & performant. * Updated DefaultParserTests.cs to contain all existing tests and follow new test layout format. * All tests fixed up
		
			
				
	
	
		
			264 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			C#
		
	
	
	
	
	
			
		
		
	
	
			264 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			C#
		
	
	
	
	
	
using System;
 | 
						|
using System.Collections.Generic;
 | 
						|
using System.Linq;
 | 
						|
using System.Reflection;
 | 
						|
using System.Threading.Tasks;
 | 
						|
using API.Constants;
 | 
						|
using API.Data;
 | 
						|
using API.DTOs;
 | 
						|
using API.DTOs.Account;
 | 
						|
using API.Entities;
 | 
						|
using API.Extensions;
 | 
						|
using API.Services;
 | 
						|
using AutoMapper;
 | 
						|
using Kavita.Common;
 | 
						|
using Microsoft.AspNetCore.Identity;
 | 
						|
using Microsoft.AspNetCore.Mvc;
 | 
						|
using Microsoft.EntityFrameworkCore;
 | 
						|
using Microsoft.Extensions.Logging;
 | 
						|
 | 
						|
namespace API.Controllers
 | 
						|
{
 | 
						|
    /// <summary>
 | 
						|
    /// All Account matters
 | 
						|
    /// </summary>
 | 
						|
    public class AccountController : BaseApiController
 | 
						|
    {
 | 
						|
        private readonly UserManager<AppUser> _userManager;
 | 
						|
        private readonly SignInManager<AppUser> _signInManager;
 | 
						|
        private readonly ITokenService _tokenService;
 | 
						|
        private readonly IUnitOfWork _unitOfWork;
 | 
						|
        private readonly ILogger<AccountController> _logger;
 | 
						|
        private readonly IMapper _mapper;
 | 
						|
        private readonly IAccountService _accountService;
 | 
						|
 | 
						|
        /// <inheritdoc />
 | 
						|
        public AccountController(UserManager<AppUser> userManager,
 | 
						|
            SignInManager<AppUser> signInManager,
 | 
						|
            ITokenService tokenService, IUnitOfWork unitOfWork,
 | 
						|
            ILogger<AccountController> logger,
 | 
						|
            IMapper mapper, IAccountService accountService)
 | 
						|
        {
 | 
						|
            _userManager = userManager;
 | 
						|
            _signInManager = signInManager;
 | 
						|
            _tokenService = tokenService;
 | 
						|
            _unitOfWork = unitOfWork;
 | 
						|
            _logger = logger;
 | 
						|
            _mapper = mapper;
 | 
						|
            _accountService = accountService;
 | 
						|
        }
 | 
						|
 | 
						|
        /// <summary>
 | 
						|
        /// Update a user's password
 | 
						|
        /// </summary>
 | 
						|
        /// <param name="resetPasswordDto"></param>
 | 
						|
        /// <returns></returns>
 | 
						|
        [HttpPost("reset-password")]
 | 
						|
        public async Task<ActionResult> UpdatePassword(ResetPasswordDto resetPasswordDto)
 | 
						|
        {
 | 
						|
            _logger.LogInformation("{UserName} is changing {ResetUser}'s password", User.GetUsername(), resetPasswordDto.UserName);
 | 
						|
            var user = await _userManager.Users.SingleAsync(x => x.UserName == resetPasswordDto.UserName);
 | 
						|
 | 
						|
            if (resetPasswordDto.UserName != User.GetUsername() && !User.IsInRole(PolicyConstants.AdminRole))
 | 
						|
                return Unauthorized("You are not permitted to this operation.");
 | 
						|
 | 
						|
            var errors = await _accountService.ChangeUserPassword(user, resetPasswordDto.Password);
 | 
						|
            if (errors.Any())
 | 
						|
            {
 | 
						|
                return BadRequest(errors);
 | 
						|
            }
 | 
						|
 | 
						|
            _logger.LogInformation("{User}'s Password has been reset", resetPasswordDto.UserName);
 | 
						|
            return Ok();
 | 
						|
        }
 | 
						|
 | 
						|
        /// <summary>
 | 
						|
        /// Register a new user on the server
 | 
						|
        /// </summary>
 | 
						|
        /// <param name="registerDto"></param>
 | 
						|
        /// <returns></returns>
 | 
						|
        [HttpPost("register")]
 | 
						|
        public async Task<ActionResult<UserDto>> Register(RegisterDto registerDto)
 | 
						|
        {
 | 
						|
            try
 | 
						|
            {
 | 
						|
                if (await _userManager.Users.AnyAsync(x => x.NormalizedUserName == registerDto.Username.ToUpper()))
 | 
						|
                {
 | 
						|
                    return BadRequest("Username is taken.");
 | 
						|
                }
 | 
						|
 | 
						|
                var user = _mapper.Map<AppUser>(registerDto);
 | 
						|
                user.UserPreferences ??= new AppUserPreferences();
 | 
						|
                user.ApiKey = HashUtil.ApiKey();
 | 
						|
 | 
						|
                var settings = await _unitOfWork.SettingsRepository.GetSettingsDtoAsync();
 | 
						|
                if (!settings.EnableAuthentication && !registerDto.IsAdmin)
 | 
						|
                {
 | 
						|
                    _logger.LogInformation("User {UserName} is being registered as non-admin with no server authentication. Using default password", registerDto.Username);
 | 
						|
                    registerDto.Password = AccountService.DefaultPassword;
 | 
						|
                }
 | 
						|
 | 
						|
                var result = await _userManager.CreateAsync(user, registerDto.Password);
 | 
						|
 | 
						|
                if (!result.Succeeded) return BadRequest(result.Errors);
 | 
						|
 | 
						|
                var role = registerDto.IsAdmin ? PolicyConstants.AdminRole : PolicyConstants.PlebRole;
 | 
						|
                var roleResult = await _userManager.AddToRoleAsync(user, role);
 | 
						|
 | 
						|
                if (!roleResult.Succeeded) return BadRequest(result.Errors);
 | 
						|
 | 
						|
                // When we register an admin, we need to grant them access to all Libraries.
 | 
						|
                if (registerDto.IsAdmin)
 | 
						|
                {
 | 
						|
                    _logger.LogInformation("{UserName} is being registered as admin. Granting access to all libraries",
 | 
						|
                        user.UserName);
 | 
						|
                    var libraries = (await _unitOfWork.LibraryRepository.GetLibrariesAsync()).ToList();
 | 
						|
                    foreach (var lib in libraries)
 | 
						|
                    {
 | 
						|
                        lib.AppUsers ??= new List<AppUser>();
 | 
						|
                        lib.AppUsers.Add(user);
 | 
						|
                    }
 | 
						|
 | 
						|
                    if (libraries.Any() && !await _unitOfWork.CommitAsync())
 | 
						|
                        _logger.LogError("There was an issue granting library access. Please do this manually");
 | 
						|
                }
 | 
						|
 | 
						|
                return new UserDto
 | 
						|
                {
 | 
						|
                    Username = user.UserName,
 | 
						|
                    Token = await _tokenService.CreateToken(user),
 | 
						|
                    ApiKey = user.ApiKey,
 | 
						|
                    Preferences = _mapper.Map<UserPreferencesDto>(user.UserPreferences)
 | 
						|
                };
 | 
						|
            }
 | 
						|
            catch (Exception ex)
 | 
						|
            {
 | 
						|
                _logger.LogError(ex, "Something went wrong when registering user");
 | 
						|
                await _unitOfWork.RollbackAsync();
 | 
						|
            }
 | 
						|
 | 
						|
            return BadRequest("Something went wrong when registering user");
 | 
						|
        }
 | 
						|
 | 
						|
        /// <summary>
 | 
						|
        /// Perform a login. Will send JWT Token of the logged in user back.
 | 
						|
        /// </summary>
 | 
						|
        /// <param name="loginDto"></param>
 | 
						|
        /// <returns></returns>
 | 
						|
        [HttpPost("login")]
 | 
						|
        public async Task<ActionResult<UserDto>> Login(LoginDto loginDto)
 | 
						|
        {
 | 
						|
            var user = await _userManager.Users
 | 
						|
                .Include(u => u.UserPreferences)
 | 
						|
                .SingleOrDefaultAsync(x => x.NormalizedUserName == loginDto.Username.ToUpper());
 | 
						|
 | 
						|
            if (user == null) return Unauthorized("Invalid username");
 | 
						|
 | 
						|
            var isAdmin = await _unitOfWork.UserRepository.IsUserAdmin(user);
 | 
						|
            var settings = await _unitOfWork.SettingsRepository.GetSettingsDtoAsync();
 | 
						|
            if (!settings.EnableAuthentication && !isAdmin)
 | 
						|
            {
 | 
						|
                _logger.LogDebug("User {UserName} is logging in with authentication disabled", loginDto.Username);
 | 
						|
                loginDto.Password = AccountService.DefaultPassword;
 | 
						|
            }
 | 
						|
 | 
						|
            var result = await _signInManager
 | 
						|
                .CheckPasswordSignInAsync(user, loginDto.Password, false);
 | 
						|
 | 
						|
            if (!result.Succeeded) return Unauthorized("Your credentials are not correct.");
 | 
						|
 | 
						|
            // Update LastActive on account
 | 
						|
            user.LastActive = DateTime.Now;
 | 
						|
            user.UserPreferences ??= new AppUserPreferences();
 | 
						|
 | 
						|
            _unitOfWork.UserRepository.Update(user);
 | 
						|
            await _unitOfWork.CommitAsync();
 | 
						|
 | 
						|
            _logger.LogInformation("{UserName} logged in at {Time}", user.UserName, user.LastActive);
 | 
						|
 | 
						|
            return new UserDto
 | 
						|
            {
 | 
						|
                Username = user.UserName,
 | 
						|
                Token = await _tokenService.CreateToken(user),
 | 
						|
                ApiKey = user.ApiKey,
 | 
						|
                Preferences = _mapper.Map<UserPreferencesDto>(user.UserPreferences)
 | 
						|
            };
 | 
						|
        }
 | 
						|
 | 
						|
        /// <summary>
 | 
						|
        /// Get All Roles back. See <see cref="PolicyConstants"/>
 | 
						|
        /// </summary>
 | 
						|
        /// <returns></returns>
 | 
						|
        [HttpGet("roles")]
 | 
						|
        public ActionResult<IList<string>> GetRoles()
 | 
						|
        {
 | 
						|
            return typeof(PolicyConstants)
 | 
						|
                .GetFields(BindingFlags.Public | BindingFlags.Static)
 | 
						|
                .Where(f => f.FieldType == typeof(string))
 | 
						|
                .ToDictionary(f => f.Name,
 | 
						|
                    f => (string) f.GetValue(null)).Values.ToList();
 | 
						|
        }
 | 
						|
 | 
						|
        /// <summary>
 | 
						|
        /// Sets the given roles to the user.
 | 
						|
        /// </summary>
 | 
						|
        /// <param name="updateRbsDto"></param>
 | 
						|
        /// <returns></returns>
 | 
						|
        [HttpPost("update-rbs")]
 | 
						|
        public async Task<ActionResult> UpdateRoles(UpdateRbsDto updateRbsDto)
 | 
						|
        {
 | 
						|
            var user = await _userManager.Users
 | 
						|
                .Include(u => u.UserPreferences)
 | 
						|
                .SingleOrDefaultAsync(x => x.NormalizedUserName == updateRbsDto.Username.ToUpper());
 | 
						|
            if (updateRbsDto.Roles.Contains(PolicyConstants.AdminRole) ||
 | 
						|
                updateRbsDto.Roles.Contains(PolicyConstants.PlebRole))
 | 
						|
            {
 | 
						|
                return BadRequest("Invalid Roles");
 | 
						|
            }
 | 
						|
 | 
						|
            var existingRoles = (await _userManager.GetRolesAsync(user))
 | 
						|
                .Where(s => s != PolicyConstants.AdminRole && s != PolicyConstants.PlebRole)
 | 
						|
                .ToList();
 | 
						|
 | 
						|
            // Find what needs to be added and what needs to be removed
 | 
						|
            var rolesToRemove = existingRoles.Except(updateRbsDto.Roles);
 | 
						|
            var result = await _userManager.AddToRolesAsync(user, updateRbsDto.Roles);
 | 
						|
 | 
						|
            if (!result.Succeeded)
 | 
						|
            {
 | 
						|
                await _unitOfWork.RollbackAsync();
 | 
						|
                return BadRequest("Something went wrong, unable to update user's roles");
 | 
						|
            }
 | 
						|
            if ((await _userManager.RemoveFromRolesAsync(user, rolesToRemove)).Succeeded)
 | 
						|
            {
 | 
						|
                return Ok();
 | 
						|
            }
 | 
						|
 | 
						|
            await _unitOfWork.RollbackAsync();
 | 
						|
            return BadRequest("Something went wrong, unable to update user's roles");
 | 
						|
 | 
						|
        }
 | 
						|
 | 
						|
        /// <summary>
 | 
						|
        /// Resets the API Key assigned with a user
 | 
						|
        /// </summary>
 | 
						|
        /// <returns></returns>
 | 
						|
        [HttpPost("reset-api-key")]
 | 
						|
        public async Task<ActionResult<string>> ResetApiKey()
 | 
						|
        {
 | 
						|
            var user = await _unitOfWork.UserRepository.GetUserByUsernameAsync(User.GetUsername());
 | 
						|
 | 
						|
            user.ApiKey = HashUtil.ApiKey();
 | 
						|
 | 
						|
            if (_unitOfWork.HasChanges() && await _unitOfWork.CommitAsync())
 | 
						|
            {
 | 
						|
                return Ok(user.ApiKey);
 | 
						|
            }
 | 
						|
 | 
						|
            await _unitOfWork.RollbackAsync();
 | 
						|
            return BadRequest("Something went wrong, unable to reset key");
 | 
						|
 | 
						|
        }
 | 
						|
    }
 | 
						|
}
 |