delete.go 2.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495
  1. package project_role
  2. import (
  3. "errors"
  4. "fmt"
  5. "net/http"
  6. "github.com/porter-dev/porter/api/server/handlers"
  7. "github.com/porter-dev/porter/api/server/shared"
  8. "github.com/porter-dev/porter/api/server/shared/apierrors"
  9. "github.com/porter-dev/porter/api/server/shared/config"
  10. "github.com/porter-dev/porter/api/server/shared/requestutils"
  11. "github.com/porter-dev/porter/api/types"
  12. "github.com/porter-dev/porter/internal/models"
  13. "gorm.io/gorm"
  14. )
  15. type DeleteProjectRoleHandler struct {
  16. handlers.PorterHandlerReadWriter
  17. }
  18. func NewDeleteProjectRoleHandler(
  19. config *config.Config,
  20. decoderValidator shared.RequestDecoderValidator,
  21. writer shared.ResultWriter,
  22. ) *DeleteProjectRoleHandler {
  23. return &DeleteProjectRoleHandler{
  24. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  25. }
  26. }
  27. func (c *DeleteProjectRoleHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  28. project, _ := r.Context().Value(types.ProjectScope).(*models.Project)
  29. if !project.AdvancedRBACEnabled {
  30. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  31. errors.New("advanced RBAC is not enabled for this project"), http.StatusPreconditionFailed,
  32. ))
  33. return
  34. }
  35. roleUID, reqErr := requestutils.GetURLParamString(r, types.URLParamProjectRoleID)
  36. if reqErr != nil {
  37. c.HandleAPIError(w, r, reqErr)
  38. return
  39. }
  40. role, err := c.Repo().ProjectRole().ReadProjectRole(project.ID, roleUID)
  41. if err != nil {
  42. if errors.Is(err, gorm.ErrRecordNotFound) {
  43. c.HandleAPIError(w, r, apierrors.NewErrNotFound(fmt.Errorf("no such project role exists")))
  44. return
  45. }
  46. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  47. return
  48. }
  49. if role.IsDefaultRole() {
  50. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  51. fmt.Errorf("cannot delete default project role"), http.StatusConflict,
  52. ))
  53. return
  54. }
  55. if len(role.Users) > 0 {
  56. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  57. fmt.Errorf("role has one or more users assigned"), http.StatusPreconditionFailed,
  58. ))
  59. return
  60. }
  61. policy, err := c.Repo().Policy().ReadPolicy(project.ID, role.PolicyUID)
  62. if err != nil {
  63. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  64. return
  65. }
  66. _, err = c.Repo().Policy().DeletePolicy(policy)
  67. if err != nil {
  68. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  69. return
  70. }
  71. _, err = c.Repo().ProjectRole().DeleteProjectRole(role)
  72. if err != nil {
  73. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  74. return
  75. }
  76. }