workspace.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121
  1. package authz
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net/http"
  7. "github.com/porter-dev/porter/api/server/shared/apierrors"
  8. "github.com/porter-dev/porter/api/server/shared/requestutils"
  9. "github.com/porter-dev/porter/api/types"
  10. "github.com/porter-dev/porter/internal/models"
  11. "github.com/porter-dev/porter/provisioner/server/config"
  12. "gorm.io/gorm"
  13. )
  14. type WorkspaceScopedFactory struct {
  15. config *config.Config
  16. }
  17. func NewWorkspaceScopedFactory(
  18. config *config.Config,
  19. ) *WorkspaceScopedFactory {
  20. return &WorkspaceScopedFactory{config}
  21. }
  22. func (p *WorkspaceScopedFactory) Middleware(next http.Handler) http.Handler {
  23. return &WorkspaceScopedMiddleware{next, p.config}
  24. }
  25. type WorkspaceScopedMiddleware struct {
  26. next http.Handler
  27. config *config.Config
  28. }
  29. func (p *WorkspaceScopedMiddleware) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  30. workspaceID, reqErr := requestutils.GetURLParamString(r, types.URLParam("workspace_id"))
  31. if reqErr != nil {
  32. apierrors.HandleAPIError(
  33. p.config.Logger,
  34. p.config.Alerter, w, r,
  35. apierrors.NewErrForbidden(
  36. fmt.Errorf("could not get workspace id: %s", reqErr.Error()),
  37. ),
  38. true,
  39. )
  40. return
  41. }
  42. name, err := models.ParseWorkspaceID(workspaceID)
  43. if err != nil {
  44. apierrors.HandleAPIError(
  45. p.config.Logger,
  46. p.config.Alerter, w, r,
  47. apierrors.NewErrForbidden(
  48. fmt.Errorf("could not parse workspace id: %v", err),
  49. ),
  50. true,
  51. )
  52. return
  53. }
  54. // if a CE token is attached, make sure it matches the project ID
  55. if ceToken, ok := r.Context().Value("ce_token").(*models.CredentialsExchangeToken); ok {
  56. if ceToken.ProjectID != name.ProjectID {
  57. apierrors.HandleAPIError(
  58. p.config.Logger,
  59. p.config.Alerter, w, r,
  60. apierrors.NewErrForbidden(
  61. fmt.Errorf("credential exchange token project ID does not match requested project ID"),
  62. ),
  63. true,
  64. )
  65. return
  66. }
  67. }
  68. // look for infra with that ID and project ID
  69. infra, err := p.config.Repo.Infra().ReadInfra(name.ProjectID, name.InfraID)
  70. if err != nil {
  71. if err == gorm.ErrRecordNotFound {
  72. apierrors.HandleAPIError(
  73. p.config.Logger,
  74. p.config.Alerter, w, r,
  75. apierrors.NewErrForbidden(
  76. fmt.Errorf("could not read infra id %d in project %d", name.InfraID, name.ProjectID),
  77. ),
  78. true,
  79. )
  80. } else {
  81. apierrors.HandleAPIError(p.config.Logger, p.config.Alerter, w, r, apierrors.NewErrInternal(err), true)
  82. }
  83. return
  84. }
  85. // look for matching operation for the infra
  86. operation, err := p.config.Repo.Infra().ReadOperation(infra.ID, name.OperationUID)
  87. if err != nil {
  88. if errors.Is(err, gorm.ErrRecordNotFound) {
  89. apierrors.HandleAPIError(p.config.Logger, p.config.Alerter, w, r, apierrors.NewErrForbidden(err), true)
  90. return
  91. }
  92. apierrors.HandleAPIError(p.config.Logger, p.config.Alerter, w, r, apierrors.NewErrInternal(err), true)
  93. return
  94. }
  95. ctx := NewInfraContext(r.Context(), infra)
  96. ctx = NewOperationContext(ctx, operation)
  97. r = r.Clone(ctx)
  98. p.next.ServeHTTP(w, r)
  99. }
  100. func NewOperationContext(ctx context.Context, operation *models.Operation) context.Context {
  101. return context.WithValue(ctx, types.OperationScope, operation)
  102. }