-
Notifications
You must be signed in to change notification settings - Fork 70
/
policies_create.go
92 lines (79 loc) · 2.47 KB
/
policies_create.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
package handlers
import (
"errors"
"fmt"
"io/ioutil"
"net/http"
"policy-server/api"
"policy-server/store"
"policy-server/uaa_client"
"code.cloudfoundry.org/lager"
)
//go:generate counterfeiter -o fakes/policy_guard.go --fake-name PolicyGuard . policyGuard
type policyGuard interface {
CheckAccess(policies []store.Policy, tokenData uaa_client.CheckTokenResponse) (bool, error)
}
//go:generate counterfeiter -o fakes/quota_guard.go --fake-name QuotaGuard . quotaGuard
type quotaGuard interface {
CheckAccess(policies []store.Policy, tokenData uaa_client.CheckTokenResponse) (bool, error)
}
type PoliciesCreate struct {
Store dataStore
Mapper api.PolicyMapper
PolicyGuard policyGuard
QuotaGuard quotaGuard
ErrorResponse errorResponse
}
func NewPoliciesCreate(store dataStore, mapper api.PolicyMapper,
policyGuard policyGuard, quotaGuard quotaGuard, errorResponse errorResponse) *PoliciesCreate {
return &PoliciesCreate{
Store: store,
Mapper: mapper,
PolicyGuard: policyGuard,
QuotaGuard: quotaGuard,
ErrorResponse: errorResponse,
}
}
func (h *PoliciesCreate) ServeHTTP(w http.ResponseWriter, req *http.Request) {
logger := getLogger(req)
logger = logger.Session("create-policies")
tokenData := getTokenData(req)
bodyBytes, err := ioutil.ReadAll(req.Body)
if err != nil {
h.ErrorResponse.BadRequest(logger, w, err, "failed reading request body")
return
}
policies, err := h.Mapper.AsStorePolicy(bodyBytes)
if err != nil {
h.ErrorResponse.BadRequest(logger, w, err, fmt.Sprintf("mapper: %s", err))
return
}
authorized, err := h.PolicyGuard.CheckAccess(policies, tokenData)
if err != nil {
h.ErrorResponse.InternalServerError(logger, w, err, "check access failed")
return
}
if !authorized {
err := errors.New("one or more applications cannot be found or accessed")
h.ErrorResponse.Forbidden(logger, w, err, err.Error())
return
}
authorized, err = h.QuotaGuard.CheckAccess(policies, tokenData)
if err != nil {
h.ErrorResponse.InternalServerError(logger, w, err, "check quota failed")
return
}
if !authorized {
err := errors.New("policy quota exceeded")
h.ErrorResponse.Forbidden(logger, w, err, err.Error())
return
}
err = h.Store.Create(policies)
if err != nil {
h.ErrorResponse.InternalServerError(logger, w, err, "database create failed")
return
}
logger.Info("created-policies", lager.Data{"policies": policies, "userName": tokenData.UserName})
w.WriteHeader(http.StatusOK)
w.Write([]byte("{}"))
}