forked from cloudfoundry/cli
-
Notifications
You must be signed in to change notification settings - Fork 0
/
set_org_role.go
112 lines (93 loc) · 3.53 KB
/
set_org_role.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
package user
import (
"fmt"
"github.com/cloudfoundry/cli/cf"
"github.com/cloudfoundry/cli/cf/api"
"github.com/cloudfoundry/cli/cf/api/featureflags"
"github.com/cloudfoundry/cli/cf/commandregistry"
"github.com/cloudfoundry/cli/cf/configuration/coreconfig"
. "github.com/cloudfoundry/cli/cf/i18n"
"github.com/cloudfoundry/cli/cf/models"
"github.com/cloudfoundry/cli/cf/requirements"
"github.com/cloudfoundry/cli/cf/terminal"
"github.com/cloudfoundry/cli/flags"
)
//go:generate counterfeiter . OrgRoleSetter
type OrgRoleSetter interface {
commandregistry.Command
SetOrgRole(orgGuid string, role, userGuid, userName string) error
}
type SetOrgRole struct {
ui terminal.UI
config coreconfig.Reader
flagRepo featureflags.FeatureFlagRepository
userRepo api.UserRepository
userReq requirements.UserRequirement
orgReq requirements.OrganizationRequirement
}
func init() {
commandregistry.Register(&SetOrgRole{})
}
func (cmd *SetOrgRole) MetaData() commandregistry.CommandMetadata {
return commandregistry.CommandMetadata{
Name: "set-org-role",
Description: T("Assign an org role to a user"),
Usage: []string{
T("CF_NAME set-org-role USERNAME ORG ROLE\n\n"),
T("ROLES:\n"),
fmt.Sprintf(" 'OrgManager' - %s", T("Invite and manage users, select and change plans, and set spending limits\n")),
fmt.Sprintf(" 'BillingManager' - %s", T("Create and manage the billing account and payment info\n")),
fmt.Sprintf(" 'OrgAuditor' - %s", T("Read-only access to org info and reports\n")),
},
}
}
func (cmd *SetOrgRole) Requirements(requirementsFactory requirements.Factory, fc flags.FlagContext) []requirements.Requirement {
if len(fc.Args()) != 3 {
cmd.ui.Failed(T("Incorrect Usage. Requires USERNAME, ORG, ROLE as arguments\n\n") + commandregistry.Commands.CommandUsage("set-org-role"))
}
var wantGuid bool
if cmd.config.IsMinApiVersion(cf.SetRolesByUsernameMinimumApiVersion) {
setRolesByUsernameFlag, err := cmd.flagRepo.FindByName("set_roles_by_username")
wantGuid = (err != nil || !setRolesByUsernameFlag.Enabled)
} else {
wantGuid = true
}
cmd.userReq = requirementsFactory.NewUserRequirement(fc.Args()[0], wantGuid)
cmd.orgReq = requirementsFactory.NewOrganizationRequirement(fc.Args()[1])
reqs := []requirements.Requirement{
requirementsFactory.NewLoginRequirement(),
cmd.userReq,
cmd.orgReq,
}
return reqs
}
func (cmd *SetOrgRole) SetDependency(deps commandregistry.Dependency, pluginCall bool) commandregistry.Command {
cmd.ui = deps.Ui
cmd.config = deps.Config
cmd.userRepo = deps.RepoLocator.GetUserRepository()
cmd.flagRepo = deps.RepoLocator.GetFeatureFlagRepository()
return cmd
}
func (cmd *SetOrgRole) Execute(c flags.FlagContext) {
user := cmd.userReq.GetUser()
org := cmd.orgReq.GetOrganization()
role := models.UserInputToOrgRole[c.Args()[2]]
cmd.ui.Say(T("Assigning role {{.Role}} to user {{.TargetUser}} in org {{.TargetOrg}} as {{.CurrentUser}}...",
map[string]interface{}{
"Role": terminal.EntityNameColor(role),
"TargetUser": terminal.EntityNameColor(user.Username),
"TargetOrg": terminal.EntityNameColor(org.Name),
"CurrentUser": terminal.EntityNameColor(cmd.config.Username()),
}))
err := cmd.SetOrgRole(org.Guid, role, user.Guid, user.Username)
if err != nil {
cmd.ui.Failed(err.Error())
}
cmd.ui.Ok()
}
func (cmd *SetOrgRole) SetOrgRole(orgGuid string, role, userGuid, userName string) error {
if len(userGuid) > 0 {
return cmd.userRepo.SetOrgRoleByGuid(userGuid, orgGuid, role)
}
return cmd.userRepo.SetOrgRoleByUsername(userName, orgGuid, role)
}