mirror of
https://github.com/harness/drone.git
synced 2025-05-05 06:21:50 +08:00

This change introduces the concept of a principal (abstraction of call identity), and adds a new service account type principal. Also adds support for different tokens (session, PAT, SAT, OAuth2) and adds auth.Session which is being used to capture information about the caller and call method.
116 lines
3.4 KiB
Go
116 lines
3.4 KiB
Go
// Copyright 2021 Harness Inc. All rights reserved.
|
|
// Use of this source code is governed by the Polyform Free Trial License
|
|
// that can be found in the LICENSE.md file for this repository.
|
|
|
|
package space
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"github.com/harness/gitness/internal/api/guard"
|
|
"github.com/harness/gitness/internal/api/render"
|
|
"github.com/harness/gitness/internal/api/request"
|
|
"github.com/harness/gitness/internal/paths"
|
|
"github.com/harness/gitness/internal/store"
|
|
"github.com/harness/gitness/types"
|
|
"github.com/harness/gitness/types/check"
|
|
"github.com/harness/gitness/types/enum"
|
|
"github.com/rs/zerolog/hlog"
|
|
)
|
|
|
|
type spaceMoveRequest struct {
|
|
PathName *string `json:"pathName"`
|
|
ParentID *int64 `json:"parentId"`
|
|
KeepAsAlias bool `json:"keepAsAlias"`
|
|
}
|
|
|
|
// HandleMove moves an existing space.
|
|
//nolint:gocognit,goimports // exception for now, one of the more complicated parts of the code
|
|
func HandleMove(guard *guard.Guard, spaceStore store.SpaceStore) http.HandlerFunc {
|
|
return guard.Space(
|
|
enum.PermissionSpaceEdit,
|
|
false,
|
|
func(w http.ResponseWriter, r *http.Request) {
|
|
ctx := r.Context()
|
|
log := hlog.FromRequest(r)
|
|
principal, _ := request.PrincipalFrom(ctx)
|
|
space, _ := request.SpaceFrom(ctx)
|
|
|
|
in := new(spaceMoveRequest)
|
|
err := json.NewDecoder(r.Body).Decode(in)
|
|
if err != nil {
|
|
render.BadRequestf(w, "Invalid request body: %s.", err)
|
|
return
|
|
}
|
|
|
|
// backfill data
|
|
if in.PathName == nil {
|
|
in.PathName = &space.PathName
|
|
}
|
|
if in.ParentID == nil {
|
|
in.ParentID = &space.ParentID
|
|
}
|
|
|
|
// convert name to lower case for easy of api use
|
|
*in.PathName = strings.ToLower(*in.PathName)
|
|
|
|
// ensure we don't end up in any missconfiguration
|
|
if err = check.PathName(*in.PathName); err != nil {
|
|
render.UserfiedErrorOrInternal(w, err)
|
|
return
|
|
}
|
|
|
|
// block no-ops
|
|
if *in.ParentID == space.ParentID && *in.PathName == space.PathName {
|
|
render.BadRequestError(w, render.ErrNoChange)
|
|
return
|
|
}
|
|
|
|
// TODO: restrict top level move
|
|
// Ensure we can create spaces within the target space (using parent space as scope, similar to create)
|
|
if *in.ParentID > 0 && *in.ParentID != space.ParentID {
|
|
var newParent *types.Space
|
|
newParent, err = spaceStore.Find(ctx, *in.ParentID)
|
|
if err != nil {
|
|
log.Err(err).
|
|
Msgf("Failed to get target space with id %d for the move.", *in.ParentID)
|
|
|
|
render.UserfiedErrorOrInternal(w, err)
|
|
return
|
|
}
|
|
|
|
scope := &types.Scope{SpacePath: newParent.Path}
|
|
resource := &types.Resource{
|
|
Type: enum.ResourceTypeSpace,
|
|
Name: "",
|
|
}
|
|
if !guard.Enforce(w, r, scope, resource, enum.PermissionSpaceCreate) {
|
|
return
|
|
}
|
|
|
|
/*
|
|
* Validate path length (Due to racing conditions we can't be 100% sure on the path here only best
|
|
* effort to avoid big transaction failure)
|
|
* Only needed if we actually change the parent (and can skip top level, as we already validate the name)
|
|
*/
|
|
path := paths.Concatinate(newParent.Path, *in.PathName)
|
|
if err = check.Path(path, true); err != nil {
|
|
render.UserfiedErrorOrInternal(w, err)
|
|
return
|
|
}
|
|
}
|
|
|
|
res, err := spaceStore.Move(ctx, principal.ID, space.ID, *in.ParentID, *in.PathName, in.KeepAsAlias)
|
|
if err != nil {
|
|
log.Error().Err(err).Msg("Failed to move the space.")
|
|
|
|
render.UserfiedErrorOrInternal(w, err)
|
|
return
|
|
}
|
|
|
|
render.JSON(w, http.StatusOK, res)
|
|
})
|
|
}
|