// Copyright 2022 Harness Inc. All rights reserved. // Use of this source code is governed by the Polyform Free Trial License // that can be found in the LICENSE.md file for this repository. package secret import ( "context" "fmt" "strconv" "strings" "time" "github.com/harness/gitness/encrypt" apiauth "github.com/harness/gitness/internal/api/auth" "github.com/harness/gitness/internal/api/usererror" "github.com/harness/gitness/internal/auth" "github.com/harness/gitness/types" "github.com/harness/gitness/types/check" "github.com/harness/gitness/types/enum" ) var ( // errSecretRequiresParent if the user tries to create a secret without a parent space. errSecretRequiresParent = usererror.BadRequest( "Parent space required - standalone secret are not supported.") ) type CreateInput struct { Description string `json:"description"` SpaceRef string `json:"space_ref"` // Ref of the parent space UID string `json:"uid"` Data string `json:"data"` } func (c *Controller) Create(ctx context.Context, session *auth.Session, in *CreateInput) (*types.Secret, error) { parentSpace, err := c.spaceStore.FindByRef(ctx, in.SpaceRef) if err != nil { return nil, fmt.Errorf("could not find parent by ref: %w", err) } err = apiauth.CheckSecret(ctx, c.authorizer, session, parentSpace.Path, in.UID, enum.PermissionSecretEdit) if err != nil { return nil, err } if err := c.sanitizeCreateInput(in); err != nil { return nil, fmt.Errorf("failed to sanitize input: %w", err) } var secret *types.Secret now := time.Now().UnixMilli() secret = &types.Secret{ Description: in.Description, Data: in.Data, SpaceID: parentSpace.ID, UID: in.UID, Created: now, Updated: now, Version: 0, } secret, err = enc(c.encrypter, secret) if err != nil { return nil, fmt.Errorf("could not encrypt secret: %w", err) } err = c.secretStore.Create(ctx, secret) if err != nil { return nil, fmt.Errorf("secret creation failed: %w", err) } if err != nil { return nil, err } return secret, nil } func (c *Controller) sanitizeCreateInput(in *CreateInput) error { parentRefAsID, err := strconv.ParseInt(in.SpaceRef, 10, 64) if (err == nil && parentRefAsID <= 0) || (len(strings.TrimSpace(in.SpaceRef)) == 0) { return errSecretRequiresParent } if err := c.uidCheck(in.UID, false); err != nil { return err } in.Description = strings.TrimSpace(in.Description) if err := check.Description(in.Description); err != nil { return err } return nil } // helper function returns the same secret with encrypted data. func enc(encrypt encrypt.Encrypter, secret *types.Secret) (*types.Secret, error) { if secret == nil { return nil, fmt.Errorf("cannot encrypt a nil secret") } s := *secret ciphertext, err := encrypt.Encrypt(secret.Data) if err != nil { return nil, err } s.Data = string(ciphertext) return &s, nil } // helper function returns the same secret with decrypted data. func dec(encrypt encrypt.Encrypter, secret *types.Secret) (*types.Secret, error) { if secret == nil { return nil, fmt.Errorf("cannot decrypt a nil secret") } s := *secret plaintext, err := encrypt.Decrypt([]byte(secret.Data)) if err != nil { return nil, err } s.Data = plaintext return &s, nil }