mirror of
https://github.com/goharbor/harbor.git
synced 2024-11-05 01:59:44 +01:00
Merge pull request #2341 from ywk253100/170519_member
Refactor member API
This commit is contained in:
commit
a901297859
@ -17,9 +17,7 @@ package api
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strconv"
|
|
||||||
|
|
||||||
"github.com/vmware/harbor/src/common/api"
|
|
||||||
"github.com/vmware/harbor/src/common/dao"
|
"github.com/vmware/harbor/src/common/dao"
|
||||||
"github.com/vmware/harbor/src/common/models"
|
"github.com/vmware/harbor/src/common/models"
|
||||||
"github.com/vmware/harbor/src/common/utils/log"
|
"github.com/vmware/harbor/src/common/utils/log"
|
||||||
@ -27,7 +25,7 @@ import (
|
|||||||
|
|
||||||
// ProjectMemberAPI handles request to /api/projects/{}/members/{}
|
// ProjectMemberAPI handles request to /api/projects/{}/members/{}
|
||||||
type ProjectMemberAPI struct {
|
type ProjectMemberAPI struct {
|
||||||
api.BaseAPI
|
BaseController
|
||||||
memberID int
|
memberID int
|
||||||
currentUserID int
|
currentUserID int
|
||||||
project *models.Project
|
project *models.Project
|
||||||
@ -41,47 +39,82 @@ type memberReq struct {
|
|||||||
|
|
||||||
// Prepare validates the URL and parms
|
// Prepare validates the URL and parms
|
||||||
func (pma *ProjectMemberAPI) Prepare() {
|
func (pma *ProjectMemberAPI) Prepare() {
|
||||||
pid, err := strconv.ParseInt(pma.Ctx.Input.Param(":pid"), 10, 64)
|
pma.BaseController.Prepare()
|
||||||
if err != nil {
|
|
||||||
log.Errorf("Error parsing project id: %d, error: %v", pid, err)
|
if !pma.SecurityCtx.IsAuthenticated() {
|
||||||
pma.CustomAbort(http.StatusBadRequest, "invalid project Id")
|
pma.HandleUnauthorized()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
p, err := dao.GetProjectByID(pid)
|
user, err := dao.GetUser(models.User{
|
||||||
|
Username: pma.SecurityCtx.GetUsername(),
|
||||||
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Errorf("Error occurred in GetProjectById, error: %v", err)
|
pma.HandleInternalServerError(
|
||||||
pma.CustomAbort(http.StatusInternalServerError, "Internal error.")
|
fmt.Sprintf("failed to get user %s: %v",
|
||||||
|
pma.SecurityCtx.GetUsername(), err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
pma.currentUserID = user.UserID
|
||||||
|
|
||||||
|
pid, err := pma.GetInt64FromPath(":pid")
|
||||||
|
if err != nil || pid <= 0 {
|
||||||
|
text := "invalid project ID: "
|
||||||
|
if err != nil {
|
||||||
|
text += err.Error()
|
||||||
|
} else {
|
||||||
|
text += fmt.Sprintf("%d", pid)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
project, err := pma.ProjectMgr.Get(pid)
|
||||||
|
if err != nil {
|
||||||
|
pma.HandleInternalServerError(
|
||||||
|
fmt.Sprintf("failed to get project %d: %v", pid, err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if project == nil {
|
||||||
|
pma.HandleNotFound(fmt.Sprintf("project %d not found", pid))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
pma.project = project
|
||||||
|
|
||||||
|
if pma.Ctx.Input.IsGet() && !pma.SecurityCtx.HasReadPerm(pid) ||
|
||||||
|
!pma.SecurityCtx.HasAllPerm(pid) {
|
||||||
|
pma.HandleForbidden(pma.SecurityCtx.GetUsername())
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if p == nil {
|
if len(pma.GetStringFromPath(":mid")) != 0 {
|
||||||
log.Warningf("Project with id: %d does not exist.", pid)
|
mid, err := pma.GetInt64FromPath(":mid")
|
||||||
pma.CustomAbort(http.StatusNotFound, "Project does not exist")
|
if err != nil || mid <= 0 {
|
||||||
}
|
text := "invalid member ID: "
|
||||||
pma.project = p
|
if err != nil {
|
||||||
pma.currentUserID = pma.ValidateUser()
|
text += err.Error()
|
||||||
mid := pma.Ctx.Input.Param(":mid")
|
} else {
|
||||||
if mid == "current" {
|
text += fmt.Sprintf("%d", mid)
|
||||||
pma.memberID = pma.currentUserID
|
}
|
||||||
} else if len(mid) == 0 {
|
pma.HandleBadRequest(text)
|
||||||
pma.memberID = 0
|
return
|
||||||
} else if len(mid) > 0 {
|
|
||||||
memberID, err := strconv.Atoi(mid)
|
|
||||||
if err != nil {
|
|
||||||
log.Errorf("Invalid member Id, error: %v", err)
|
|
||||||
pma.CustomAbort(http.StatusBadRequest, "Invalid member id")
|
|
||||||
}
|
}
|
||||||
pma.memberID = memberID
|
|
||||||
|
member, err := dao.GetUser(models.User{
|
||||||
|
UserID: int(mid),
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
pma.HandleInternalServerError(fmt.Sprintf("failed to get user %d: %v", mid, err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if member == nil {
|
||||||
|
pma.HandleNotFound(fmt.Sprintf("member %d not found", mid))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
pma.memberID = member.UserID
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Get ...
|
// Get ...
|
||||||
func (pma *ProjectMemberAPI) Get() {
|
func (pma *ProjectMemberAPI) Get() {
|
||||||
pid := pma.project.ProjectID
|
pid := pma.project.ProjectID
|
||||||
if !checkProjectPermission(pma.currentUserID, pid) {
|
|
||||||
log.Warningf("Current user, user id: %d does not have permission for project, id: %d", pma.currentUserID, pid)
|
|
||||||
pma.RenderError(http.StatusForbidden, "")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if pma.memberID == 0 { //member id not set return list of the members
|
if pma.memberID == 0 { //member id not set return list of the members
|
||||||
username := pma.GetString("username")
|
username := pma.GetString("username")
|
||||||
queryUser := models.User{Username: username}
|
queryUser := models.User{Username: username}
|
||||||
@ -120,13 +153,7 @@ func (pma *ProjectMemberAPI) Get() {
|
|||||||
|
|
||||||
// Post ...
|
// Post ...
|
||||||
func (pma *ProjectMemberAPI) Post() {
|
func (pma *ProjectMemberAPI) Post() {
|
||||||
currentUserID := pma.currentUserID
|
|
||||||
projectID := pma.project.ProjectID
|
projectID := pma.project.ProjectID
|
||||||
if !hasProjectAdminRole(currentUserID, projectID) {
|
|
||||||
log.Warningf("Current user, id: %d does not have project admin role for project, id:", currentUserID, projectID)
|
|
||||||
pma.RenderError(http.StatusForbidden, "")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
var req memberReq
|
var req memberReq
|
||||||
pma.DecodeJSONReq(&req)
|
pma.DecodeJSONReq(&req)
|
||||||
@ -169,14 +196,7 @@ func (pma *ProjectMemberAPI) Post() {
|
|||||||
|
|
||||||
// Put ...
|
// Put ...
|
||||||
func (pma *ProjectMemberAPI) Put() {
|
func (pma *ProjectMemberAPI) Put() {
|
||||||
currentUserID := pma.currentUserID
|
|
||||||
pid := pma.project.ProjectID
|
pid := pma.project.ProjectID
|
||||||
if !hasProjectAdminRole(currentUserID, pid) {
|
|
||||||
log.Warningf("Current user, id: %d does not have project admin role for project, id:", currentUserID, pid)
|
|
||||||
pma.RenderError(http.StatusForbidden, "")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
mid := pma.memberID
|
mid := pma.memberID
|
||||||
|
|
||||||
var req memberReq
|
var req memberReq
|
||||||
@ -208,14 +228,7 @@ func (pma *ProjectMemberAPI) Put() {
|
|||||||
|
|
||||||
// Delete ...
|
// Delete ...
|
||||||
func (pma *ProjectMemberAPI) Delete() {
|
func (pma *ProjectMemberAPI) Delete() {
|
||||||
currentUserID := pma.currentUserID
|
|
||||||
pid := pma.project.ProjectID
|
pid := pma.project.ProjectID
|
||||||
if !hasProjectAdminRole(currentUserID, pid) {
|
|
||||||
log.Warningf("Current user, id: %d does not have project admin role for project, id:", currentUserID, pid)
|
|
||||||
pma.RenderError(http.StatusForbidden, "")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
mid := pma.memberID
|
mid := pma.memberID
|
||||||
|
|
||||||
err := dao.DeleteProjectMember(pid, mid)
|
err := dao.DeleteProjectMember(pid, mid)
|
||||||
|
@ -33,32 +33,6 @@ import (
|
|||||||
"github.com/vmware/harbor/src/ui/config"
|
"github.com/vmware/harbor/src/ui/config"
|
||||||
)
|
)
|
||||||
|
|
||||||
func checkProjectPermission(userID int, projectID int64) bool {
|
|
||||||
roles, err := listRoles(userID, projectID)
|
|
||||||
if err != nil {
|
|
||||||
log.Errorf("error occurred in getProjectPermission: %v", err)
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
return len(roles) > 0
|
|
||||||
}
|
|
||||||
|
|
||||||
// TODO remove
|
|
||||||
func hasProjectAdminRole(userID int, projectID int64) bool {
|
|
||||||
roles, err := listRoles(userID, projectID)
|
|
||||||
if err != nil {
|
|
||||||
log.Errorf("error occurred in getProjectPermission: %v", err)
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, role := range roles {
|
|
||||||
if role.RoleID == models.PROJECTADMIN {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
//sysadmin has all privileges to all projects
|
//sysadmin has all privileges to all projects
|
||||||
func listRoles(userID int, projectID int64) ([]models.Role, error) {
|
func listRoles(userID int, projectID int64) ([]models.Role, error) {
|
||||||
roles := make([]models.Role, 0, 1)
|
roles := make([]models.Role, 0, 1)
|
||||||
|
Loading…
Reference in New Issue
Block a user