-
Notifications
You must be signed in to change notification settings - Fork 18
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'main' into make-cleanup
- Loading branch information
Showing
62 changed files
with
6,161 additions
and
1,282 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,156 @@ | ||
package v1beta1 | ||
|
||
import ( | ||
"context" | ||
"errors" | ||
|
||
guardianv1beta1 "github.com/odpf/guardian/api/proto/odpf/guardian/v1beta1" | ||
"github.com/odpf/guardian/core/access" | ||
"github.com/odpf/guardian/domain" | ||
"google.golang.org/grpc/codes" | ||
"google.golang.org/grpc/status" | ||
) | ||
|
||
func (s *GRPCServer) ListAccesses(ctx context.Context, req *guardianv1beta1.ListAccessesRequest) (*guardianv1beta1.ListAccessesResponse, error) { | ||
filter := domain.ListAccessesFilter{ | ||
Statuses: req.GetStatuses(), | ||
AccountIDs: req.GetAccountIds(), | ||
AccountTypes: req.GetAccountTypes(), | ||
ResourceIDs: req.GetResourceIds(), | ||
Roles: req.GetRoles(), | ||
ProviderTypes: req.GetProviderTypes(), | ||
ProviderURNs: req.GetProviderUrns(), | ||
ResourceTypes: req.GetResourceTypes(), | ||
ResourceURNs: req.GetResourceUrns(), | ||
CreatedBy: req.GetCreatedBy(), | ||
} | ||
accesses, err := s.listAccesses(ctx, filter) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
return &guardianv1beta1.ListAccessesResponse{ | ||
Accesses: accesses, | ||
}, nil | ||
} | ||
|
||
func (s *GRPCServer) ListUserAccesses(ctx context.Context, req *guardianv1beta1.ListUserAccessesRequest) (*guardianv1beta1.ListUserAccessesResponse, error) { | ||
user, err := s.getUser(ctx) | ||
if err != nil { | ||
return nil, status.Error(codes.Unauthenticated, "failed to get metadata: user") | ||
} | ||
|
||
filter := domain.ListAccessesFilter{ | ||
Statuses: req.GetStatuses(), | ||
AccountIDs: req.GetAccountIds(), | ||
AccountTypes: req.GetAccountTypes(), | ||
ResourceIDs: req.GetResourceIds(), | ||
Roles: req.GetRoles(), | ||
ProviderTypes: req.GetProviderTypes(), | ||
ProviderURNs: req.GetProviderUrns(), | ||
ResourceTypes: req.GetResourceTypes(), | ||
ResourceURNs: req.GetResourceUrns(), | ||
CreatedBy: user, | ||
} | ||
accesses, err := s.listAccesses(ctx, filter) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
return &guardianv1beta1.ListUserAccessesResponse{ | ||
Accesses: accesses, | ||
}, nil | ||
} | ||
|
||
func (s *GRPCServer) GetAccess(ctx context.Context, req *guardianv1beta1.GetAccessRequest) (*guardianv1beta1.GetAccessResponse, error) { | ||
a, err := s.accessService.GetByID(ctx, req.GetId()) | ||
if err != nil { | ||
if errors.Is(err, access.ErrAccessNotFound) { | ||
return nil, status.Errorf(codes.NotFound, "access %q not found: %v", req.GetId(), err) | ||
} | ||
return nil, status.Errorf(codes.Internal, "failed to get access details: %v", err) | ||
} | ||
|
||
accessProto, err := s.adapter.ToAccessProto(a) | ||
if err != nil { | ||
return nil, status.Errorf(codes.Internal, "failed to parse access: %v", err) | ||
} | ||
|
||
return &guardianv1beta1.GetAccessResponse{ | ||
Access: accessProto, | ||
}, nil | ||
} | ||
|
||
func (s *GRPCServer) RevokeAccess(ctx context.Context, req *guardianv1beta1.RevokeAccessRequest) (*guardianv1beta1.RevokeAccessResponse, error) { | ||
actor, err := s.getUser(ctx) | ||
if err != nil { | ||
return nil, status.Error(codes.Unauthenticated, "failed to get metadata: actor") | ||
} | ||
|
||
a, err := s.accessService.Revoke(ctx, req.GetId(), actor, req.GetReason()) | ||
if err != nil { | ||
if errors.Is(err, access.ErrAccessNotFound) { | ||
return nil, status.Error(codes.NotFound, "access not found") | ||
} | ||
return nil, status.Errorf(codes.Internal, "failed to revoke access: %v", err) | ||
} | ||
|
||
accessProto, err := s.adapter.ToAccessProto(a) | ||
if err != nil { | ||
return nil, status.Errorf(codes.Internal, "failed to parse access: %v", err) | ||
} | ||
|
||
return &guardianv1beta1.RevokeAccessResponse{ | ||
Access: accessProto, | ||
}, nil | ||
} | ||
|
||
func (s *GRPCServer) RevokeAccesses(ctx context.Context, req *guardianv1beta1.RevokeAccessesRequest) (*guardianv1beta1.RevokeAccessesResponse, error) { | ||
actor, err := s.getUser(ctx) | ||
if err != nil { | ||
return nil, status.Error(codes.Unauthenticated, "failed to get metadata: actor") | ||
} | ||
|
||
filter := domain.RevokeAccessesFilter{ | ||
AccountIDs: req.GetAccountIds(), | ||
ProviderTypes: req.GetProviderTypes(), | ||
ProviderURNs: req.GetProviderUrns(), | ||
ResourceTypes: req.GetResourceTypes(), | ||
ResourceURNs: req.GetResourceUrns(), | ||
} | ||
accesses, err := s.accessService.BulkRevoke(ctx, filter, actor, req.GetReason()) | ||
if err != nil { | ||
return nil, status.Error(codes.Internal, "failed to revoke accesses in bulk") | ||
} | ||
|
||
var accessesProto []*guardianv1beta1.Access | ||
for _, a := range accesses { | ||
accessProto, err := s.adapter.ToAccessProto(a) | ||
if err != nil { | ||
return nil, status.Errorf(codes.Internal, "failed to parse access: %v", err) | ||
} | ||
accessesProto = append(accessesProto, accessProto) | ||
} | ||
|
||
return &guardianv1beta1.RevokeAccessesResponse{ | ||
Accesses: accessesProto, | ||
}, nil | ||
} | ||
|
||
func (s *GRPCServer) listAccesses(ctx context.Context, filter domain.ListAccessesFilter) ([]*guardianv1beta1.Access, error) { | ||
accesses, err := s.accessService.List(ctx, filter) | ||
if err != nil { | ||
return nil, status.Errorf(codes.Internal, "failed to list accesses: %v", err) | ||
} | ||
|
||
var accessProtos []*guardianv1beta1.Access | ||
for i, a := range accesses { | ||
accessProto, err := s.adapter.ToAccessProto(&accesses[i]) | ||
if err != nil { | ||
return nil, status.Errorf(codes.Internal, "failed to parse access %q: %v", a.ID, err) | ||
} | ||
accessProtos = append(accessProtos, accessProto) | ||
} | ||
|
||
return accessProtos, nil | ||
} |
Oops, something went wrong.