create.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156
  1. package project_role
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "net/http"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/api/types"
  12. "github.com/porter-dev/porter/internal/encryption"
  13. "github.com/porter-dev/porter/internal/models"
  14. "github.com/porter-dev/porter/internal/repository"
  15. "gorm.io/gorm"
  16. )
  17. type CreateProjectRoleHandler struct {
  18. handlers.PorterHandlerReadWriter
  19. }
  20. func NewCreateProjectRoleHandler(
  21. config *config.Config,
  22. decoderValidator shared.RequestDecoderValidator,
  23. writer shared.ResultWriter,
  24. ) *CreateProjectRoleHandler {
  25. return &CreateProjectRoleHandler{
  26. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  27. }
  28. }
  29. func (c *CreateProjectRoleHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  30. project, _ := r.Context().Value(types.ProjectScope).(*models.Project)
  31. user, _ := r.Context().Value(types.UserScope).(*models.User)
  32. if !project.AdvancedRBACEnabled {
  33. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  34. errors.New("advanced RBAC is not enabled for this project"), http.StatusPreconditionFailed,
  35. ))
  36. return
  37. }
  38. request := &types.CreateProjectRoleRequest{}
  39. if ok := c.DecodeAndValidate(w, r, request); !ok {
  40. return
  41. }
  42. if request.Name == string(types.RoleAdmin) ||
  43. request.Name == string(types.RoleDeveloper) ||
  44. request.Name == string(types.RoleViewer) {
  45. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  46. fmt.Errorf("default role names admin, developer, viewer are not allowed"), http.StatusConflict,
  47. ))
  48. return
  49. }
  50. uid, err := encryption.GenerateRandomBytes(16)
  51. if err != nil {
  52. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  53. return
  54. }
  55. policyBytes, err := json.Marshal([]*types.PolicyDocument{request.Policy})
  56. if err != nil {
  57. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  58. return
  59. }
  60. policy, err := c.Repo().Policy().CreatePolicy(&models.Policy{
  61. UniqueID: uid,
  62. ProjectID: project.ID,
  63. CreatedByUserID: user.ID,
  64. Name: fmt.Sprintf("%s-project-role-policy", request.Name),
  65. PolicyBytes: policyBytes,
  66. })
  67. if err != nil {
  68. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  69. return
  70. }
  71. uid, err = encryption.GenerateRandomBytes(16)
  72. if err != nil {
  73. // we need to delete the policy we just created
  74. c.Repo().Policy().DeletePolicy(policy)
  75. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  76. return
  77. }
  78. role, err := c.Repo().ProjectRole().CreateProjectRole(&models.ProjectRole{
  79. UniqueID: uid,
  80. ProjectID: project.ID,
  81. PolicyUID: policy.UniqueID,
  82. Name: request.Name,
  83. })
  84. if err != nil {
  85. // we need to delete the policy we just created
  86. c.Repo().Policy().DeletePolicy(policy)
  87. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  88. return
  89. }
  90. if len(request.Users) > 0 {
  91. for _, u := range request.Users {
  92. err := validateUserForProjectRole(c.Repo(), u, project.ID)
  93. if err != nil {
  94. c.HandleAPIError(w, r, err)
  95. return
  96. }
  97. }
  98. err = c.Repo().ProjectRole().UpdateUsersInProjectRole(project.ID, role.UniqueID, request.Users)
  99. if err != nil {
  100. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  101. return
  102. }
  103. }
  104. w.WriteHeader(http.StatusCreated)
  105. }
  106. func validateUserForProjectRole(repo repository.Repository, userID, projectID uint) apierrors.RequestError {
  107. // check for valid user
  108. _, err := repo.User().ReadUser(userID)
  109. if err != nil && errors.Is(err, gorm.ErrRecordNotFound) {
  110. return apierrors.NewErrNotFound(fmt.Errorf("user with id %d does not exist", userID))
  111. } else if err != nil {
  112. return apierrors.NewErrInternal(err)
  113. }
  114. // a user needs to have been a collaborator with at least one role already in a project to be added to a new role
  115. roles, err := repo.ProjectRole().ListAllRolesForUser(projectID, userID)
  116. if err != nil {
  117. return apierrors.NewErrInternal(err)
  118. }
  119. if len(roles) == 0 {
  120. return apierrors.NewErrPassThroughToClient(fmt.Errorf("user is not a collaborator in this project"),
  121. http.StatusBadRequest)
  122. }
  123. return nil
  124. }