mirror of https://github.com/harness/drone.git
111 lines
2.9 KiB
Go
111 lines
2.9 KiB
Go
// Copyright 2021 Harness Inc. All rights reserved.
|
|
// Use of this source code is governed by the Polyform Free Trial License
|
|
// that can be found in the LICENSE.md file for this repository.
|
|
|
|
package guard
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"net/http"
|
|
|
|
"github.com/harness/gitness/internal/api/render"
|
|
"github.com/harness/gitness/internal/api/request"
|
|
"github.com/harness/gitness/internal/auth/authz"
|
|
"github.com/harness/gitness/types"
|
|
"github.com/harness/gitness/types/enum"
|
|
)
|
|
|
|
type Guard struct {
|
|
authorizer authz.Authorizer
|
|
}
|
|
|
|
func New(authorizer authz.Authorizer) *Guard {
|
|
return &Guard{authorizer: authorizer}
|
|
}
|
|
|
|
/*
|
|
* EnforceAdmin is a middleware that enforces that the user is authenticated and an admin.
|
|
*/
|
|
func (g *Guard) EnforceAdmin(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
ctx := r.Context()
|
|
user, ok := request.UserFrom(ctx)
|
|
if !ok {
|
|
render.Unauthorized(w, errors.New("Requires authentication"))
|
|
return
|
|
}
|
|
|
|
if !user.Admin {
|
|
render.Forbidden(w, errors.New("Requires admin privileges."))
|
|
return
|
|
}
|
|
|
|
next.ServeHTTP(w, r)
|
|
})
|
|
}
|
|
|
|
/*
|
|
* EnforceAuthenticated is a middleware that enforces that the user is authenticated.
|
|
*/
|
|
func (g *Guard) EnforceAuthenticated(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
ctx := r.Context()
|
|
_, ok := request.UserFrom(ctx)
|
|
if !ok {
|
|
render.Unauthorized(w, errors.New("Requires authentication"))
|
|
return
|
|
}
|
|
|
|
next.ServeHTTP(w, r)
|
|
})
|
|
}
|
|
|
|
/*
|
|
* Enforces that the executing principal has requested permission on the resource.
|
|
* returns true if it's the case, otherwise renders the appropriate error and returns false.
|
|
*/
|
|
func (g *Guard) Enforce(w http.ResponseWriter, r *http.Request, resourceType enum.ResourceType, resourceId string, permission enum.Permission) bool {
|
|
err := g.Check(r, resourceType, resourceId, permission)
|
|
|
|
if IsNotAuthenticatedError(err) {
|
|
render.Unauthorized(w, err)
|
|
} else if IsNotAuthorizedError(err) {
|
|
render.Forbidden(w, err)
|
|
} else if err != nil {
|
|
render.InternalError(w, err)
|
|
}
|
|
|
|
return err == nil
|
|
}
|
|
|
|
/*
|
|
* Checks whether the principal executing the request has the requested permission on the resource.
|
|
* Returns nil if the user is confirmed to be permitted to execute the action, otherwise returns errors
|
|
* NotAuthenticated, NotAuthorized, or any unerlaying error.
|
|
*/
|
|
func (g *Guard) Check(r *http.Request, resourceType enum.ResourceType, resourceId string, permission enum.Permission) error {
|
|
u, present := request.UserFrom(r.Context())
|
|
if !present {
|
|
return newNotAuthenticatedError(permission, resourceType, resourceId)
|
|
}
|
|
|
|
authorized, err := g.authorizer.Check(
|
|
enum.PrincipalTypeUser,
|
|
fmt.Sprint(u.ID),
|
|
types.Resource{
|
|
Type: resourceType,
|
|
Identifier: resourceId,
|
|
},
|
|
permission)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if !authorized {
|
|
return newNotAuthorizedError(u, permission, resourceType, resourceId)
|
|
}
|
|
|
|
return nil
|
|
}
|