- Updated DNSProviderForm to include multi-credential mode toggle. - Integrated CredentialManager component for managing multiple credentials. - Added hooks for enabling multi-credentials and managing credential operations. - Implemented tests for CredentialManager and useCredentials hooks.
227 lines
6.9 KiB
Go
227 lines
6.9 KiB
Go
package handlers
|
|
|
|
import (
|
|
"net/http"
|
|
"strconv"
|
|
|
|
"github.com/Wikid82/charon/backend/internal/services"
|
|
"github.com/gin-gonic/gin"
|
|
)
|
|
|
|
// CredentialHandler handles HTTP requests for DNS provider credentials.
|
|
type CredentialHandler struct {
|
|
credentialService services.CredentialService
|
|
}
|
|
|
|
// NewCredentialHandler creates a new credential handler.
|
|
func NewCredentialHandler(credentialService services.CredentialService) *CredentialHandler {
|
|
return &CredentialHandler{
|
|
credentialService: credentialService,
|
|
}
|
|
}
|
|
|
|
// List handles GET /api/v1/dns-providers/:id/credentials
|
|
func (h *CredentialHandler) List(c *gin.Context) {
|
|
providerID, err := strconv.ParseUint(c.Param("id"), 10, 32)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid provider ID"})
|
|
return
|
|
}
|
|
|
|
credentials, err := h.credentialService.List(c.Request.Context(), uint(providerID))
|
|
if err != nil {
|
|
if err == services.ErrDNSProviderNotFound {
|
|
c.JSON(http.StatusNotFound, gin.H{"error": "DNS provider not found"})
|
|
return
|
|
}
|
|
if err == services.ErrMultiCredentialNotEnabled {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Multi-credential mode not enabled for this provider"})
|
|
return
|
|
}
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusOK, credentials)
|
|
}
|
|
|
|
// Create handles POST /api/v1/dns-providers/:id/credentials
|
|
func (h *CredentialHandler) Create(c *gin.Context) {
|
|
providerID, err := strconv.ParseUint(c.Param("id"), 10, 32)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid provider ID"})
|
|
return
|
|
}
|
|
|
|
var req services.CreateCredentialRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
|
|
credential, err := h.credentialService.Create(c.Request.Context(), uint(providerID), req)
|
|
if err != nil {
|
|
if err == services.ErrDNSProviderNotFound {
|
|
c.JSON(http.StatusNotFound, gin.H{"error": "DNS provider not found"})
|
|
return
|
|
}
|
|
if err == services.ErrMultiCredentialNotEnabled {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Multi-credential mode not enabled for this provider"})
|
|
return
|
|
}
|
|
if err == services.ErrInvalidProviderType || err == services.ErrInvalidCredentials {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
if err == services.ErrEncryptionFailed {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to encrypt credentials"})
|
|
return
|
|
}
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusCreated, credential)
|
|
}
|
|
|
|
// Get handles GET /api/v1/dns-providers/:id/credentials/:cred_id
|
|
func (h *CredentialHandler) Get(c *gin.Context) {
|
|
providerID, err := strconv.ParseUint(c.Param("id"), 10, 32)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid provider ID"})
|
|
return
|
|
}
|
|
|
|
credentialID, err := strconv.ParseUint(c.Param("cred_id"), 10, 32)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid credential ID"})
|
|
return
|
|
}
|
|
|
|
credential, err := h.credentialService.Get(c.Request.Context(), uint(providerID), uint(credentialID))
|
|
if err != nil {
|
|
if err == services.ErrCredentialNotFound {
|
|
c.JSON(http.StatusNotFound, gin.H{"error": "Credential not found"})
|
|
return
|
|
}
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusOK, credential)
|
|
}
|
|
|
|
// Update handles PUT /api/v1/dns-providers/:id/credentials/:cred_id
|
|
func (h *CredentialHandler) Update(c *gin.Context) {
|
|
providerID, err := strconv.ParseUint(c.Param("id"), 10, 32)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid provider ID"})
|
|
return
|
|
}
|
|
|
|
credentialID, err := strconv.ParseUint(c.Param("cred_id"), 10, 32)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid credential ID"})
|
|
return
|
|
}
|
|
|
|
var req services.UpdateCredentialRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
|
|
credential, err := h.credentialService.Update(c.Request.Context(), uint(providerID), uint(credentialID), req)
|
|
if err != nil {
|
|
if err == services.ErrCredentialNotFound {
|
|
c.JSON(http.StatusNotFound, gin.H{"error": "Credential not found"})
|
|
return
|
|
}
|
|
if err == services.ErrInvalidProviderType || err == services.ErrInvalidCredentials {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
if err == services.ErrEncryptionFailed {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to encrypt credentials"})
|
|
return
|
|
}
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusOK, credential)
|
|
}
|
|
|
|
// Delete handles DELETE /api/v1/dns-providers/:id/credentials/:cred_id
|
|
func (h *CredentialHandler) Delete(c *gin.Context) {
|
|
providerID, err := strconv.ParseUint(c.Param("id"), 10, 32)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid provider ID"})
|
|
return
|
|
}
|
|
|
|
credentialID, err := strconv.ParseUint(c.Param("cred_id"), 10, 32)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid credential ID"})
|
|
return
|
|
}
|
|
|
|
if err := h.credentialService.Delete(c.Request.Context(), uint(providerID), uint(credentialID)); err != nil {
|
|
if err == services.ErrCredentialNotFound {
|
|
c.JSON(http.StatusNotFound, gin.H{"error": "Credential not found"})
|
|
return
|
|
}
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusNoContent, nil)
|
|
}
|
|
|
|
// Test handles POST /api/v1/dns-providers/:id/credentials/:cred_id/test
|
|
func (h *CredentialHandler) Test(c *gin.Context) {
|
|
providerID, err := strconv.ParseUint(c.Param("id"), 10, 32)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid provider ID"})
|
|
return
|
|
}
|
|
|
|
credentialID, err := strconv.ParseUint(c.Param("cred_id"), 10, 32)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid credential ID"})
|
|
return
|
|
}
|
|
|
|
result, err := h.credentialService.Test(c.Request.Context(), uint(providerID), uint(credentialID))
|
|
if err != nil {
|
|
if err == services.ErrCredentialNotFound {
|
|
c.JSON(http.StatusNotFound, gin.H{"error": "Credential not found"})
|
|
return
|
|
}
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusOK, result)
|
|
}
|
|
|
|
// EnableMultiCredentials handles POST /api/v1/dns-providers/:id/enable-multi-credentials
|
|
func (h *CredentialHandler) EnableMultiCredentials(c *gin.Context) {
|
|
providerID, err := strconv.ParseUint(c.Param("id"), 10, 32)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid provider ID"})
|
|
return
|
|
}
|
|
|
|
if err := h.credentialService.EnableMultiCredentials(c.Request.Context(), uint(providerID)); err != nil {
|
|
if err == services.ErrDNSProviderNotFound {
|
|
c.JSON(http.StatusNotFound, gin.H{"error": "DNS provider not found"})
|
|
return
|
|
}
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": "Multi-credential mode enabled successfully"})
|
|
}
|