mirror of
https://github.com/harness/drone.git
synced 2025-05-06 06:41:35 +08:00

* Make service account store code more consistent * Merge remote-tracking branch 'origin/main' into dd/service-account-bypass * Merge remote-tracking branch 'origin/main' into dd/service-account-bypass * Merge remote-tracking branch 'origin/main' into dd/service-account-bypass * Remove principal controller interface * Address review comments * Merge remote-tracking branch 'origin/main' into dd/service-account-bypass * Merge remote-tracking branch 'origin/main' into dd/service-account-bypass * Add pagination to repo/space list service account * Revert to non embedded Principal to ServiceAccount * Merge remote-tracking branch 'origin/main' into dd/service-account-bypass * Add query param to service account list * Add inherited param to principal filter * Merge remote-tracking branch 'origin/main' into akp/CODE-1805 * Merge remote-tracking branch 'origin/main' into akp/CODE-1805 * Return service account info instead of vanilla service account * Return principal info to return id instead o
53 lines
1.6 KiB
Go
53 lines
1.6 KiB
Go
// Copyright 2023 Harness, Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package serviceaccount
|
|
|
|
import (
|
|
"context"
|
|
|
|
apiauth "github.com/harness/gitness/app/api/auth"
|
|
"github.com/harness/gitness/app/auth"
|
|
"github.com/harness/gitness/types"
|
|
"github.com/harness/gitness/types/enum"
|
|
)
|
|
|
|
// Find tries to find the provided service account.
|
|
func (c *Controller) Find(
|
|
ctx context.Context,
|
|
session *auth.Session,
|
|
saUID string,
|
|
) (*types.ServiceAccount, error) {
|
|
sa, err := c.FindNoAuth(ctx, saUID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Ensure principal has required permissions on parent (ensures that parent exists)
|
|
if err = apiauth.CheckServiceAccount(ctx, c.authorizer, session, c.spaceStore, c.repoStore,
|
|
sa.ParentType, sa.ParentID, sa.UID, enum.PermissionServiceAccountView); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return sa, nil
|
|
}
|
|
|
|
/*
|
|
* FindNoAuth finds a service account without auth checks.
|
|
* WARNING: Never call as part of user flow.
|
|
*/
|
|
func (c *Controller) FindNoAuth(ctx context.Context, saUID string) (*types.ServiceAccount, error) {
|
|
return findServiceAccountFromUID(ctx, c.principalStore, saUID)
|
|
}
|