drone/internal/api/handler/space/create.go
Johannes Batzill 8c2f900c80 Principals, ServiceAccounts, Tokens and auth.Sessions (#15)
This change introduces the concept of a principal (abstraction of call identity), and adds a new service account type principal. Also adds support for different tokens (session, PAT, SAT, OAuth2) and adds auth.Session which is being used to capture information about the caller and call method.
2022-09-25 23:44:51 -07:00

125 lines
3.2 KiB
Go

// Copyright 2021 Harness Inc. All rights reserved.
// Use of this source code is governed by the Polyform Free Trial License
// that can be found in the LICENSE.md file for this repository.
package space
import (
"encoding/json"
"net/http"
"strings"
"time"
"github.com/harness/gitness/internal/api/guard"
"github.com/harness/gitness/internal/api/render"
"github.com/harness/gitness/internal/api/request"
"github.com/harness/gitness/internal/paths"
"github.com/harness/gitness/internal/store"
"github.com/harness/gitness/types"
"github.com/harness/gitness/types/check"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/hlog"
)
type spaceCreateRequest struct {
PathName string `json:"pathName"`
ParentID int64 `json:"parentId"`
Name string `json:"name"`
Description string `json:"description"`
IsPublic bool `json:"isPublic"`
}
/*
* HandleCreate returns an http.HandlerFunc that creates a new space.
*/
func HandleCreate(guard *guard.Guard, spaceStore store.SpaceStore) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
ctx := r.Context()
log := hlog.FromRequest(r)
in := new(spaceCreateRequest)
err := json.NewDecoder(r.Body).Decode(in)
if err != nil {
render.BadRequestf(w, "Invalid request body: %s.", err)
return
}
// get current principal (will be enforced to not be nil via explicit check or guard.Enforce)
principal, _ := request.PrincipalFrom(ctx)
// Collect parent path along the way - needed for duplicate error message
parentPath := ""
/*
* AUTHORIZATION
* Can only be done once we know the parent space
*/
if in.ParentID <= 0 {
// TODO: Restrict top level space creation.
if principal == nil {
render.Unauthorized(w)
return
}
} else {
// Create is a special case - we need the parent path
var parent *types.Space
parent, err = spaceStore.Find(ctx, in.ParentID)
if err != nil {
log.Err(err).Msgf("Failed to get space with id '%d'.", in.ParentID)
render.UserfiedErrorOrInternal(w, err)
return
}
scope := &types.Scope{SpacePath: parent.Path}
resource := &types.Resource{
Type: enum.ResourceTypeSpace,
Name: "",
}
if !guard.Enforce(w, r, scope, resource, enum.PermissionSpaceCreate) {
return
}
parentPath = parent.Path
}
// create new space object
space := &types.Space{
PathName: strings.ToLower(in.PathName),
ParentID: in.ParentID,
Name: in.Name,
Description: in.Description,
IsPublic: in.IsPublic,
CreatedBy: principal.ID,
Created: time.Now().UnixMilli(),
Updated: time.Now().UnixMilli(),
}
// validate space
if err = check.Space(space); err != nil {
render.UserfiedErrorOrInternal(w, err)
return
}
// Validate path length (Due to racing conditions we can't be 100% sure on the path here only best effort
// to have a quick failure)
path := paths.Concatinate(parentPath, space.PathName)
if err = check.Path(path, true); err != nil {
render.UserfiedErrorOrInternal(w, err)
return
}
// create in store
err = spaceStore.Create(ctx, space)
if err != nil {
log.Error().Err(err).
Msg("Space creation failed.")
render.UserfiedErrorOrInternal(w, err)
return
}
render.JSON(w, http.StatusOK, space)
}
}