mirror of https://github.com/harness/drone.git
86 lines
2.4 KiB
Go
86 lines
2.4 KiB
Go
// Copyright 2023 Harness, Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package principal
|
|
|
|
import (
|
|
"net/http"
|
|
|
|
"github.com/harness/gitness/app/api/render"
|
|
"github.com/harness/gitness/app/api/request"
|
|
"github.com/harness/gitness/types"
|
|
"github.com/harness/gitness/types/enum"
|
|
|
|
"github.com/rs/zerolog/log"
|
|
)
|
|
|
|
/*
|
|
* RestrictTo returns an http.HandlerFunc middleware that ensures the principal
|
|
* is of the provided type. In case there is no authenticated principal,
|
|
* or the principal type doesn't match, an error is rendered.
|
|
*/
|
|
func RestrictTo(pType enum.PrincipalType) func(http.Handler) http.Handler {
|
|
return func(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
ctx := r.Context()
|
|
|
|
p, ok := request.PrincipalFrom(ctx)
|
|
if !ok {
|
|
log.Ctx(ctx).Debug().Msgf("Failed to get principal from session")
|
|
|
|
render.Forbidden(ctx, w)
|
|
return
|
|
}
|
|
if p.UID == types.AnonymousPrincipalUID {
|
|
log.Ctx(ctx).Debug().Msgf("Valid principal is required, received an Anonymous.")
|
|
|
|
render.Unauthorized(ctx, w)
|
|
return
|
|
}
|
|
|
|
if p.Type != pType {
|
|
log.Ctx(ctx).Debug().Msgf("Principal of type '%s' required.", pType)
|
|
|
|
render.Forbidden(ctx, w)
|
|
return
|
|
}
|
|
|
|
next.ServeHTTP(w, r)
|
|
})
|
|
}
|
|
}
|
|
|
|
/*
|
|
* RestrictToAdmin returns an http.HandlerFunc middleware that ensures the principal
|
|
* is an admin. In case there is no authenticated principal,
|
|
* or the principal isn't an admin, an error is rendered.
|
|
*/
|
|
func RestrictToAdmin() func(http.Handler) http.Handler {
|
|
return func(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
ctx := r.Context()
|
|
|
|
p, ok := request.PrincipalFrom(ctx)
|
|
if !ok || !p.Admin {
|
|
log.Ctx(ctx).Debug().Msg("No principal found or the principal is no admin")
|
|
|
|
render.Forbidden(ctx, w)
|
|
return
|
|
}
|
|
|
|
next.ServeHTTP(w, r)
|
|
})
|
|
}
|
|
}
|