drone/app/api/controller/repo/public_access_update.go

94 lines
2.5 KiB
Go

// Copyright 2023 Harness, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package repo
import (
"context"
"fmt"
apiauth "github.com/harness/gitness/app/api/auth"
"github.com/harness/gitness/app/auth"
"github.com/harness/gitness/app/paths"
"github.com/harness/gitness/audit"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/log"
)
type PublicAccessUpdateInput struct {
EnablePublic bool `json:"enable_public"`
}
func (c *Controller) PublicAccessUpdate(ctx context.Context,
session *auth.Session,
repoRef string,
in *PublicAccessUpdateInput,
) (*Repository, error) {
repo, err := c.getRepoCheckAccess(ctx, session, repoRef, enum.PermissionRepoEdit)
if err != nil {
return nil, err
}
if err = c.sanitizeVisibilityInput(in); err != nil {
return nil, fmt.Errorf("failed to sanitize input: %w", err)
}
repoClone := repo.Clone()
// get current public access vale for audit
isPublic, err := apiauth.CheckRepoIsPublic(ctx, c.publicAccess, repo)
if err != nil {
return nil, fmt.Errorf("failed to check current public access status: %w", err)
}
// no op
if isPublic == in.EnablePublic {
return GetRepoOutput(ctx, c.publicAccess, repo)
}
if err = c.publicAccess.Set(ctx, enum.PublicResourceTypeRepo, repo.Path, in.EnablePublic); err != nil {
return nil, fmt.Errorf("failed to update repo public access: %w", err)
}
err = c.auditService.Log(ctx,
session.Principal,
audit.NewResource(audit.ResourceTypeRepository, repo.Identifier),
audit.ActionUpdated,
paths.Parent(repo.Path),
audit.WithOldObject(&Repository{
Repository: repoClone,
IsPublic: isPublic,
}),
audit.WithNewObject(&Repository{
Repository: *repo,
IsPublic: in.EnablePublic,
}),
)
if err != nil {
log.Ctx(ctx).Warn().Msgf("failed to insert audit log for update repository operation: %s", err)
}
return GetRepoOutput(ctx, c.publicAccess, repo)
}
func (c *Controller) sanitizeVisibilityInput(in *PublicAccessUpdateInput) error {
if in.EnablePublic && !c.publicResourceCreationEnabled {
return errPublicRepoCreationDisabled
}
return nil
}