mirror of https://github.com/harness/drone.git
126 lines
3.3 KiB
Go
126 lines
3.3 KiB
Go
// Copyright 2023 Harness, Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package user
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
"time"
|
|
|
|
apiauth "github.com/harness/gitness/app/api/auth"
|
|
"github.com/harness/gitness/app/auth"
|
|
"github.com/harness/gitness/types"
|
|
"github.com/harness/gitness/types/check"
|
|
"github.com/harness/gitness/types/enum"
|
|
|
|
"github.com/dchest/uniuri"
|
|
"golang.org/x/crypto/bcrypt"
|
|
)
|
|
|
|
// CreateInput is the input used for create operations.
|
|
// On purpose don't expose admin, has to be enabled explicitly.
|
|
type CreateInput struct {
|
|
UID string `json:"uid"`
|
|
Email string `json:"email"`
|
|
DisplayName string `json:"display_name"`
|
|
Password string `json:"password"`
|
|
}
|
|
|
|
// Create creates a new user.
|
|
func (c *Controller) Create(ctx context.Context, session *auth.Session, in *CreateInput) (*types.User, error) {
|
|
// Ensure principal has required permissions (user is global, no explicit resource)
|
|
scope := &types.Scope{}
|
|
resource := &types.Resource{
|
|
Type: enum.ResourceTypeUser,
|
|
}
|
|
if err := apiauth.Check(ctx, c.authorizer, session, scope, resource, enum.PermissionUserCreate); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return c.CreateNoAuth(ctx, in, false)
|
|
}
|
|
|
|
/*
|
|
* CreateNoAuth creates a new user without auth checks.
|
|
* WARNING: Never call as part of user flow.
|
|
*
|
|
* Note: take admin separately to avoid potential vulnerabilities for user calls.
|
|
*/
|
|
func (c *Controller) CreateNoAuth(ctx context.Context, in *CreateInput, admin bool) (*types.User, error) {
|
|
if err := c.sanitizeCreateInput(in); err != nil {
|
|
return nil, fmt.Errorf("invalid input: %w", err)
|
|
}
|
|
|
|
hash, err := hashPassword([]byte(in.Password), bcrypt.DefaultCost)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to create hash: %w", err)
|
|
}
|
|
|
|
user := &types.User{
|
|
UID: in.UID,
|
|
DisplayName: in.DisplayName,
|
|
Email: in.Email,
|
|
Password: string(hash),
|
|
Salt: uniuri.NewLen(uniuri.UUIDLen),
|
|
Created: time.Now().UnixMilli(),
|
|
Updated: time.Now().UnixMilli(),
|
|
Admin: admin,
|
|
}
|
|
|
|
err = c.principalStore.CreateUser(ctx, user)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
uCount, err := c.principalStore.CountUsers(ctx, &types.UserFilter{})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// first 'user' principal will be admin by default.
|
|
if uCount == 1 {
|
|
user.Admin = true
|
|
err = c.principalStore.UpdateUser(ctx, user)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
return user, nil
|
|
}
|
|
|
|
func (c *Controller) sanitizeCreateInput(in *CreateInput) error {
|
|
if err := c.principalUIDCheck(in.UID); err != nil {
|
|
return err
|
|
}
|
|
|
|
in.Email = strings.TrimSpace(in.Email)
|
|
if err := check.Email(in.Email); err != nil {
|
|
return err
|
|
}
|
|
|
|
in.DisplayName = strings.TrimSpace(in.DisplayName)
|
|
if err := check.DisplayName(in.DisplayName); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := check.Password(in.Password); err != nil { //nolint:revive
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|