// Copyright 2022 Harness Inc. All rights reserved. // Use of this source code is governed by the Polyform Free Trial License // that can be found in the LICENSE.md file for this repository. package serviceaccount import ( "context" "fmt" "time" "github.com/dchest/uniuri" apiauth "github.com/harness/gitness/internal/api/auth" "github.com/harness/gitness/internal/auth" "github.com/harness/gitness/types" "github.com/harness/gitness/types/enum" gonanoid "github.com/matoous/go-nanoid/v2" ) var ( serviceAccountUIDAlphabet = "abcdefghijklmnopqrstuvwxyz0123456789" serviceAccountUIDLength = 16 ) type CreateInput struct { Email string `json:"email"` DisplayName string `json:"displayName"` ParentType enum.ParentResourceType `json:"parentType"` ParentID int64 `json:"parentId"` } /* * Create creates a new service account. */ func (c *Controller) Create(ctx context.Context, session *auth.Session, in *CreateInput) (*types.ServiceAccount, error) { // Ensure principal has required permissions on parent (ensures that parent exists) // since it's a create, we use don't pass a resource name. if err := apiauth.CheckServiceAccount(ctx, c.authorizer, session, c.spaceStore, c.repoStore, in.ParentType, in.ParentID, "", enum.PermissionServiceAccountCreate); err != nil { return nil, err } uid, err := generateServiceAccountUID(in.ParentType, in.ParentID) if err != nil { return nil, fmt.Errorf("failed to generate service account UID: %w", err) } // TODO: There's a chance of duplicate error - we should retry? return c.CreateNoAuth(ctx, in, uid) } /* * CreateNoAuth creates a new service account without auth checks. * WARNING: Never call as part of user flow. * * Note: take uid separately to allow internally created non-random uids. */ func (c *Controller) CreateNoAuth(ctx context.Context, in *CreateInput, uid string) (*types.ServiceAccount, error) { sa := &types.ServiceAccount{ UID: uid, Email: in.Email, DisplayName: in.DisplayName, Salt: uniuri.NewLen(uniuri.UUIDLen), Created: time.Now().UnixMilli(), Updated: time.Now().UnixMilli(), ParentType: in.ParentType, ParentID: in.ParentID, } // validate service account if err := c.serviceAccountCheck(sa); err != nil { return nil, err } // TODO: Racing condition with parent (space/repo) being deleted! err := c.saStore.Create(ctx, sa) if err != nil { return nil, err } return sa, nil } // generateServiceAccountUID generates a new unique UID for a service account // NOTE: // This method generates 36^10 = ~8*10^24 unique UIDs per parent. // This should be enough for a very low chance of duplications. // // NOTE: // We generate it automatically to ensure unique UIDs on principals. // The downside is that they don't have very userfriendly handlers - though that should be okay for service accounts. // The other option would be take it as an input, but a globally unique uid of a service account // which itself is scoped to a space / repo might be weird. func generateServiceAccountUID(parentType enum.ParentResourceType, parentID int64) (string, error) { nid, err := gonanoid.Generate(serviceAccountUIDAlphabet, serviceAccountUIDLength) if err != nil { return "", err } return fmt.Sprintf("sa-%s-%d-%s", string(parentType), parentID, nid), nil }