create.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116
  1. package project_role
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net/http"
  6. "github.com/porter-dev/porter/api/server/handlers"
  7. "github.com/porter-dev/porter/api/server/shared"
  8. "github.com/porter-dev/porter/api/server/shared/apierrors"
  9. "github.com/porter-dev/porter/api/server/shared/config"
  10. "github.com/porter-dev/porter/api/types"
  11. "github.com/porter-dev/porter/internal/encryption"
  12. "github.com/porter-dev/porter/internal/models"
  13. )
  14. type CreateProjectRoleHandler struct {
  15. handlers.PorterHandlerReadWriter
  16. }
  17. func NewCreateProjectRoleHandler(
  18. config *config.Config,
  19. decoderValidator shared.RequestDecoderValidator,
  20. writer shared.ResultWriter,
  21. ) *CreateProjectRoleHandler {
  22. return &CreateProjectRoleHandler{
  23. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  24. }
  25. }
  26. func (c *CreateProjectRoleHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  27. project, _ := r.Context().Value(types.ProjectScope).(*models.Project)
  28. user, _ := r.Context().Value(types.UserScope).(*models.User)
  29. request := &types.CreateProjectRoleRequest{}
  30. if ok := c.DecodeAndValidate(w, r, request); !ok {
  31. return
  32. }
  33. if request.Name == string(types.RoleAdmin) ||
  34. request.Name == string(types.RoleDeveloper) ||
  35. request.Name == string(types.RoleViewer) {
  36. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  37. fmt.Errorf("default role names admin, developer, viewer are not allowed"), http.StatusConflict,
  38. ))
  39. return
  40. }
  41. uid, err := encryption.GenerateRandomBytes(16)
  42. if err != nil {
  43. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  44. return
  45. }
  46. policyBytes, err := json.Marshal([]*types.PolicyDocument{request.Policy})
  47. if err != nil {
  48. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  49. return
  50. }
  51. policy, err := c.Repo().Policy().CreatePolicy(&models.Policy{
  52. UniqueID: uid,
  53. ProjectID: project.ID,
  54. CreatedByUserID: user.ID,
  55. Name: fmt.Sprintf("%s-project-role-policy", request.Name),
  56. PolicyBytes: policyBytes,
  57. })
  58. if err != nil {
  59. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  60. return
  61. }
  62. uid, err = encryption.GenerateRandomBytes(16)
  63. if err != nil {
  64. // we need to delete the policy we just created
  65. c.Repo().Policy().DeletePolicy(policy)
  66. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  67. return
  68. }
  69. role, err := c.Repo().ProjectRole().CreateProjectRole(&models.ProjectRole{
  70. UniqueID: uid,
  71. ProjectID: project.ID,
  72. PolicyUID: policy.UniqueID,
  73. Name: request.Name,
  74. })
  75. if err != nil {
  76. // we need to delete the policy we just created
  77. c.Repo().Policy().DeletePolicy(policy)
  78. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  79. return
  80. }
  81. if len(request.Users) > 0 {
  82. err = c.Repo().ProjectRole().UpdateUsersInProjectRole(project.ID, role.UniqueID, request.Users)
  83. if err != nil {
  84. // we need to delete the policy and project role we just created
  85. c.Repo().Policy().DeletePolicy(policy)
  86. c.Repo().ProjectRole().DeleteProjectRole(role)
  87. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  88. return
  89. }
  90. }
  91. w.WriteHeader(http.StatusCreated)
  92. }