drone/internal/api/handler/space/move.go
Johannes Batzill 8c2f900c80 Principals, ServiceAccounts, Tokens and auth.Sessions (#15)
This change introduces the concept of a principal (abstraction of call identity), and adds a new service account type principal. Also adds support for different tokens (session, PAT, SAT, OAuth2) and adds auth.Session which is being used to capture information about the caller and call method.
2022-09-25 23:44:51 -07:00

116 lines
3.4 KiB
Go

// Copyright 2021 Harness Inc. All rights reserved.
// Use of this source code is governed by the Polyform Free Trial License
// that can be found in the LICENSE.md file for this repository.
package space
import (
"encoding/json"
"net/http"
"strings"
"github.com/harness/gitness/internal/api/guard"
"github.com/harness/gitness/internal/api/render"
"github.com/harness/gitness/internal/api/request"
"github.com/harness/gitness/internal/paths"
"github.com/harness/gitness/internal/store"
"github.com/harness/gitness/types"
"github.com/harness/gitness/types/check"
"github.com/harness/gitness/types/enum"
"github.com/rs/zerolog/hlog"
)
type spaceMoveRequest struct {
PathName *string `json:"pathName"`
ParentID *int64 `json:"parentId"`
KeepAsAlias bool `json:"keepAsAlias"`
}
// HandleMove moves an existing space.
//nolint:gocognit,goimports // exception for now, one of the more complicated parts of the code
func HandleMove(guard *guard.Guard, spaceStore store.SpaceStore) http.HandlerFunc {
return guard.Space(
enum.PermissionSpaceEdit,
false,
func(w http.ResponseWriter, r *http.Request) {
ctx := r.Context()
log := hlog.FromRequest(r)
principal, _ := request.PrincipalFrom(ctx)
space, _ := request.SpaceFrom(ctx)
in := new(spaceMoveRequest)
err := json.NewDecoder(r.Body).Decode(in)
if err != nil {
render.BadRequestf(w, "Invalid request body: %s.", err)
return
}
// backfill data
if in.PathName == nil {
in.PathName = &space.PathName
}
if in.ParentID == nil {
in.ParentID = &space.ParentID
}
// convert name to lower case for easy of api use
*in.PathName = strings.ToLower(*in.PathName)
// ensure we don't end up in any missconfiguration
if err = check.PathName(*in.PathName); err != nil {
render.UserfiedErrorOrInternal(w, err)
return
}
// block no-ops
if *in.ParentID == space.ParentID && *in.PathName == space.PathName {
render.BadRequestError(w, render.ErrNoChange)
return
}
// TODO: restrict top level move
// Ensure we can create spaces within the target space (using parent space as scope, similar to create)
if *in.ParentID > 0 && *in.ParentID != space.ParentID {
var newParent *types.Space
newParent, err = spaceStore.Find(ctx, *in.ParentID)
if err != nil {
log.Err(err).
Msgf("Failed to get target space with id %d for the move.", *in.ParentID)
render.UserfiedErrorOrInternal(w, err)
return
}
scope := &types.Scope{SpacePath: newParent.Path}
resource := &types.Resource{
Type: enum.ResourceTypeSpace,
Name: "",
}
if !guard.Enforce(w, r, scope, resource, enum.PermissionSpaceCreate) {
return
}
/*
* Validate path length (Due to racing conditions we can't be 100% sure on the path here only best
* effort to avoid big transaction failure)
* Only needed if we actually change the parent (and can skip top level, as we already validate the name)
*/
path := paths.Concatinate(newParent.Path, *in.PathName)
if err = check.Path(path, true); err != nil {
render.UserfiedErrorOrInternal(w, err)
return
}
}
res, err := spaceStore.Move(ctx, principal.ID, space.ID, *in.ParentID, *in.PathName, in.KeepAsAlias)
if err != nil {
log.Error().Err(err).Msg("Failed to move the space.")
render.UserfiedErrorOrInternal(w, err)
return
}
render.JSON(w, http.StatusOK, res)
})
}