X-Git-Url: https://code.wpia.club/?a=blobdiff_plain;f=src%2Forg%2Fcacert%2Fgigi%2Fpages%2Fadmin%2Fsupport%2FSupportUserDetailsPage.java;h=eea69f6dbfcbb9ebe0961157b4b8c78bf920356d;hb=c9ed09f0007fc2c813815be927a5a24b23dab83c;hp=b9368e42edbb44872729afdb2b002ffe465a4a1b;hpb=5455212f844579b906488b025ea4142ee09aa31d;p=gigi.git diff --git a/src/org/cacert/gigi/pages/admin/support/SupportUserDetailsPage.java b/src/org/cacert/gigi/pages/admin/support/SupportUserDetailsPage.java index b9368e42..eea69f6d 100644 --- a/src/org/cacert/gigi/pages/admin/support/SupportUserDetailsPage.java +++ b/src/org/cacert/gigi/pages/admin/support/SupportUserDetailsPage.java @@ -1,39 +1,60 @@ package org.cacert.gigi.pages.admin.support; import java.io.IOException; -import java.security.GeneralSecurityException; -import java.util.Date; import java.util.HashMap; import java.util.Map; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; -import org.cacert.gigi.dbObjects.Certificate; -import org.cacert.gigi.dbObjects.CertificateProfile; +import org.cacert.gigi.dbObjects.Domain; import org.cacert.gigi.dbObjects.EmailAddress; -import org.cacert.gigi.dbObjects.Group; +import org.cacert.gigi.dbObjects.SupportedUser; import org.cacert.gigi.dbObjects.User; import org.cacert.gigi.localisation.Language; -import org.cacert.gigi.output.DateSelector; +import org.cacert.gigi.output.template.Form; +import org.cacert.gigi.output.template.Form.CSRFException; import org.cacert.gigi.output.template.IterableDataset; -import org.cacert.gigi.pages.Page; +import org.cacert.gigi.pages.LoginPage; +import org.cacert.gigi.pages.ManagedMultiFormPage; +import org.cacert.gigi.util.AuthorizationContext; -public class SupportUserDetailsPage extends Page { +public class SupportUserDetailsPage extends ManagedMultiFormPage { public static final String PATH = "/support/user/"; - public SupportUserDetailsPage(String title) { - super(title); + public SupportUserDetailsPage() { + super("Support: User Details"); } @Override public void doGet(HttpServletRequest req, HttpServletResponse resp) throws IOException { - int id; + User user = getUser(req, resp); + if (user == null) { + return; + } + SupportedUser targetUser = new SupportedUser(user, getUser(req), LoginPage.getAuthorizationContext(req).getSupporterTicketId()); + outputContents(req, resp, user, new SupportRevokeCertificatesForm(req, targetUser), new SupportUserDetailsForm(req, targetUser)); + } + + private User getUser(HttpServletRequest req, HttpServletResponse resp) throws IOException { + int id = -1; + if ( !req.getPathInfo().endsWith("/")) { + resp.sendError(404); + return null; + } String[] idP = req.getPathInfo().split("/"); - id = Integer.parseInt(idP[idP.length - 1]); + try { + id = Integer.parseInt(idP[idP.length - 1]); + } catch (NumberFormatException e) { + resp.sendError(404); + return null; + } final User user = User.getById(id); - SupportUserDetailsForm f = new SupportUserDetailsForm(req, user); + return user; + } + + private void outputContents(HttpServletRequest req, HttpServletResponse resp, final User user, SupportRevokeCertificatesForm certificatesForm, SupportUserDetailsForm f) throws IOException { HashMap vars = new HashMap(); vars.put("details", f); final EmailAddress[] addrs = user.getEmails(); @@ -43,63 +64,72 @@ public class SupportUserDetailsPage extends Page { @Override public boolean next(Language l, Map vars) { - String address = addrs[i].getAddress(); - if ( !address.equals(user.getEmail())) { - vars.put("secmail", address); + for (; i < addrs.length;) { + EmailAddress secAddress = addrs[i++]; + String address = secAddress.getAddress(); + if ( !address.equals(user.getEmail())) { + vars.put("secmail", address); + vars.put("status", l.getTranslation(secAddress.isVerified() ? "verified" : "not verified")); + return true; + } } - i++; - return i != addrs.length - 1; + return false; } }); - final Certificate[] certs = user.getCertificates(true); - final CertificateProfile[] profiles = CertificateProfile.getAll(); - vars.put("types", new IterableDataset() { - int typeIndex = 0; + final Domain[] doms = user.getDomains(); + vars.put("domains", new IterableDataset() { + + private int point = 0; @Override public boolean next(Language l, Map vars) { - if (typeIndex > profiles.length - 1) { + if (point >= doms.length) { return false; } - int valid = 0; - int total = 0; - long lastExpire = Long.MIN_VALUE; - for (int i = 0; i < certs.length; i++) { - try { - if (certs[i].getProfile().getId() != profiles[typeIndex].getId()) { - continue; - } - total++; - certs[i].cert().checkValidity(); - lastExpire = Math.max(lastExpire, certs[i].cert().getNotAfter().getTime()); - valid++; - } catch (GeneralSecurityException | IOException e) { - continue; - } - } - vars.put("total", total); - vars.put("profile", profiles[typeIndex].getVisibleName()); - vars.put("valid", valid); - vars.put("exp", total - valid); - vars.put("rev", "TODO"); - if (lastExpire == Long.MIN_VALUE) { - vars.put("lastdate", "-"); - } else { - vars.put("lastdate", DateSelector.getDateFormat().format(new Date(lastExpire))); - } - typeIndex++; + Domain domain = doms[point]; + vars.put("domain", domain.getSuffix()); + vars.put("status", l.getTranslation(domain.isVerified() ? "verified" : "not verified")); + point++; return true; } }); + + vars.put("certifrevoke", certificatesForm); getDefaultTemplate().output(resp.getWriter(), getLanguage(req), vars); } @Override - public boolean isPermitted(User u) { - if (u == null) { - return false; + public void doPost(HttpServletRequest req, HttpServletResponse resp) throws IOException { + User user = getUser(req, resp); + if (user == null) { + return; + } + if (Form.printFormErrors(req, resp.getWriter())) { + Form f = getForm(req); + SupportedUser targetUser = new SupportedUser(user, getUser(req), LoginPage.getAuthorizationContext(req).getSupporterTicketId()); + + if (f instanceof SupportUserDetailsForm) { + outputContents(req, resp, user, new SupportRevokeCertificatesForm(req, targetUser), (SupportUserDetailsForm) f); + } else if (f instanceof SupportRevokeCertificatesForm) { + outputContents(req, resp, user, (SupportRevokeCertificatesForm) f, new SupportUserDetailsForm(req, targetUser)); + } + } + + } + + @Override + public boolean isPermitted(AuthorizationContext ac) { + return ac != null && ac.canSupport(); + } + + @Override + public Form getForm(HttpServletRequest req) throws CSRFException { + if (req.getParameter("revokeall") != null) { + return Form.getForm(req, SupportRevokeCertificatesForm.class); + } else if (req.getParameter("detailupdate") != null || req.getParameter("resetPass") != null || req.getParameter("removeGroup") != null || req.getParameter("addGroup") != null) { + return Form.getForm(req, SupportUserDetailsForm.class); } - return u.isInGroup(Group.getByString("supporter")); + return null; } }