All checks were successful
Build & Publish Docker Image / build-and-push (push) Successful in 43s
45 lines
1.3 KiB
Go
45 lines
1.3 KiB
Go
package v1
|
|
|
|
import (
|
|
apimw "emly-api-go/internal/middleware"
|
|
"time"
|
|
|
|
"emly-api-go/internal/handlers"
|
|
|
|
"github.com/go-chi/chi/v5"
|
|
"github.com/go-chi/httprate"
|
|
"github.com/jmoiron/sqlx"
|
|
)
|
|
|
|
func registerAdmin(r chi.Router, db *sqlx.DB) {
|
|
r.Route("/admin", func(r chi.Router) {
|
|
|
|
// Auth — public, handles its own credential checks.
|
|
// Only /login is rate-limited: it is the only endpoint vulnerable to
|
|
// brute-force. /validate and /logout require a 256-bit session token
|
|
// and are called frequently by authenticated clients, so no limit is
|
|
// applied there.
|
|
r.Route("/auth", func(r chi.Router) {
|
|
r.Group(func(r chi.Router) {
|
|
r.Use(httprate.LimitByIP(30, time.Minute))
|
|
r.Post("/login", handlers.LoginUser(db))
|
|
})
|
|
r.Get("/validate", handlers.ValidateSession(db))
|
|
r.Post("/logout", handlers.LogoutSession(db))
|
|
})
|
|
|
|
// User management — protected via Admin Key
|
|
r.Route("/users", func(r chi.Router) {
|
|
r.Use(httprate.LimitByIP(30, time.Minute))
|
|
r.Use(apimw.AdminKeyAuth(db))
|
|
|
|
r.Get("/", handlers.ListUsers(db))
|
|
r.Post("/", handlers.CreateUser(db))
|
|
r.Get("/{id}", handlers.GetUserByID(db))
|
|
r.Patch("/{id}", handlers.UpdateUser(db))
|
|
r.Post("/{id}/reset-password", handlers.ResetPassword(db))
|
|
r.Delete("/{id}", handlers.DeleteUser(db))
|
|
})
|
|
})
|
|
}
|