drone/internal/api/controller/serviceaccount/createToken.go
Johannes Batzill fad6e18898 Introduce Controller for Repo, Space, User, and ServiceAccount (#25)
Preparing the support for harness specific API router + http handler, which allows us to have complete control over the rest api naming and functionality, without having to do complex path rewrites or request / reponse rewrites inline.
2022-10-03 18:56:49 -07:00

55 lines
1.6 KiB
Go

// Copyright 2021 Harness Inc. All rights reserved.
// Use of this source code is governed by the Polyform Free Trial License
// that can be found in the LICENSE.md file for this repository.
package serviceaccount
import (
"context"
"time"
apiauth "github.com/harness/gitness/internal/api/auth"
"github.com/harness/gitness/internal/auth"
"github.com/harness/gitness/internal/token"
"github.com/harness/gitness/types"
"github.com/harness/gitness/types/check"
"github.com/harness/gitness/types/enum"
)
type CreateTokenInput struct {
Name string `json:"name"`
Lifetime time.Duration `json:"lifetime"`
Grants enum.AccessGrant `json:"grants"`
}
/*
* CreateToken creates a new service account access token.
*/
func (c *Controller) CreateToken(ctx context.Context, session *auth.Session,
saUID string, in *CreateTokenInput) (*types.TokenResponse, error) {
sa, err := findServiceAccountFromUID(ctx, c.saStore, saUID)
if err != nil {
return nil, err
}
if err = check.Name(in.Name); err != nil {
return nil, err
}
if err = check.TokenLifetime(in.Lifetime); err != nil {
return nil, err
}
// Ensure principal has required permissions on parent (ensures that parent exists)
if err = apiauth.CheckServiceAccount(ctx, c.authorizer, session, c.spaceStore, c.repoStore,
sa.ParentType, sa.ParentID, sa.UID, enum.PermissionServiceAccountEdit); err != nil {
return nil, err
}
token, jwtToken, err := token.CreateSAT(ctx, c.tokenStore, &session.Principal,
sa, in.Name, in.Lifetime, in.Grants)
if err != nil {
return nil, err
}
return &types.TokenResponse{Token: *token, AccessToken: jwtToken}, nil
}