| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156 |
- package project_role
- import (
- "encoding/json"
- "errors"
- "fmt"
- "net/http"
- "github.com/porter-dev/porter/api/server/handlers"
- "github.com/porter-dev/porter/api/server/shared"
- "github.com/porter-dev/porter/api/server/shared/apierrors"
- "github.com/porter-dev/porter/api/server/shared/config"
- "github.com/porter-dev/porter/api/types"
- "github.com/porter-dev/porter/internal/encryption"
- "github.com/porter-dev/porter/internal/models"
- "github.com/porter-dev/porter/internal/repository"
- "gorm.io/gorm"
- )
- type CreateProjectRoleHandler struct {
- handlers.PorterHandlerReadWriter
- }
- func NewCreateProjectRoleHandler(
- config *config.Config,
- decoderValidator shared.RequestDecoderValidator,
- writer shared.ResultWriter,
- ) *CreateProjectRoleHandler {
- return &CreateProjectRoleHandler{
- PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
- }
- }
- func (c *CreateProjectRoleHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- project, _ := r.Context().Value(types.ProjectScope).(*models.Project)
- user, _ := r.Context().Value(types.UserScope).(*models.User)
- if !project.AdvancedRBACEnabled {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
- errors.New("advanced RBAC is not enabled for this project"), http.StatusPreconditionFailed,
- ))
- return
- }
- request := &types.CreateProjectRoleRequest{}
- if ok := c.DecodeAndValidate(w, r, request); !ok {
- return
- }
- if request.Name == string(types.RoleAdmin) ||
- request.Name == string(types.RoleDeveloper) ||
- request.Name == string(types.RoleViewer) {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
- fmt.Errorf("default role names admin, developer, viewer are not allowed"), http.StatusConflict,
- ))
- return
- }
- uid, err := encryption.GenerateRandomBytes(16)
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- policyBytes, err := json.Marshal([]*types.PolicyDocument{request.Policy})
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- policy, err := c.Repo().Policy().CreatePolicy(&models.Policy{
- UniqueID: uid,
- ProjectID: project.ID,
- CreatedByUserID: user.ID,
- Name: fmt.Sprintf("%s-project-role-policy", request.Name),
- PolicyBytes: policyBytes,
- })
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- uid, err = encryption.GenerateRandomBytes(16)
- if err != nil {
- // we need to delete the policy we just created
- c.Repo().Policy().DeletePolicy(policy)
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- role, err := c.Repo().ProjectRole().CreateProjectRole(&models.ProjectRole{
- UniqueID: uid,
- ProjectID: project.ID,
- PolicyUID: policy.UniqueID,
- Name: request.Name,
- })
- if err != nil {
- // we need to delete the policy we just created
- c.Repo().Policy().DeletePolicy(policy)
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- if len(request.Users) > 0 {
- for _, u := range request.Users {
- err := validateUserForProjectRole(c.Repo(), u, project.ID)
- if err != nil {
- c.HandleAPIError(w, r, err)
- return
- }
- }
- err = c.Repo().ProjectRole().UpdateUsersInProjectRole(project.ID, role.UniqueID, request.Users)
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- }
- w.WriteHeader(http.StatusCreated)
- }
- func validateUserForProjectRole(repo repository.Repository, userID, projectID uint) apierrors.RequestError {
- // check for valid user
- _, err := repo.User().ReadUser(userID)
- if err != nil && errors.Is(err, gorm.ErrRecordNotFound) {
- return apierrors.NewErrNotFound(fmt.Errorf("user with id %d does not exist", userID))
- } else if err != nil {
- return apierrors.NewErrInternal(err)
- }
- // a user needs to have been a collaborator with at least one role already in a project to be added to a new role
- roles, err := repo.ProjectRole().ListAllRolesForUser(projectID, userID)
- if err != nil {
- return apierrors.NewErrInternal(err)
- }
- if len(roles) == 0 {
- return apierrors.NewErrPassThroughToClient(fmt.Errorf("user is not a collaborator in this project"),
- http.StatusBadRequest)
- }
- return nil
- }
|