// Copyright 2019 Sorint.lab // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied // See the License for the specific language governing permissions and // limitations under the License. package action import ( "context" "agola.io/agola/internal/errors" "agola.io/agola/internal/services/gateway/common" "agola.io/agola/internal/util" cstypes "agola.io/agola/services/configstore/types" ) func (h *ActionHandler) GetOrg(ctx context.Context, orgRef string) (*cstypes.Organization, error) { org, _, err := h.configstoreClient.GetOrg(ctx, orgRef) if err != nil { return nil, util.NewAPIError(util.KindFromRemoteError(err), err) } return org, nil } type GetOrgsRequest struct { Start string Limit int Asc bool } func (h *ActionHandler) GetOrgs(ctx context.Context, req *GetOrgsRequest) ([]*cstypes.Organization, error) { orgs, _, err := h.configstoreClient.GetOrgs(ctx, req.Start, req.Limit, req.Asc) if err != nil { return nil, util.NewAPIError(util.KindFromRemoteError(err), err) } return orgs, nil } type OrgMembersResponse struct { Organization *cstypes.Organization Members []*OrgMemberResponse } type OrgMemberResponse struct { User *cstypes.User Role cstypes.MemberRole } func (h *ActionHandler) GetOrgMembers(ctx context.Context, orgRef string) (*OrgMembersResponse, error) { org, _, err := h.configstoreClient.GetOrg(ctx, orgRef) if err != nil { return nil, util.NewAPIError(util.KindFromRemoteError(err), err) } orgMembers, _, err := h.configstoreClient.GetOrgMembers(ctx, orgRef) if err != nil { return nil, util.NewAPIError(util.KindFromRemoteError(err), err) } res := &OrgMembersResponse{ Organization: org, Members: make([]*OrgMemberResponse, len(orgMembers)), } for i, orgMember := range orgMembers { res.Members[i] = &OrgMemberResponse{ User: orgMember.User, Role: orgMember.Role, } } return res, nil } type CreateOrgRequest struct { Name string Visibility cstypes.Visibility CreatorUserID string } func (h *ActionHandler) CreateOrg(ctx context.Context, req *CreateOrgRequest) (*cstypes.Organization, error) { if !common.IsUserLoggedOrAdmin(ctx) { return nil, errors.Errorf("user not logged in") } if req.Name == "" { return nil, util.NewAPIError(util.ErrBadRequest, errors.Errorf("organization name required")) } if !util.ValidateName(req.Name) { return nil, util.NewAPIError(util.ErrBadRequest, errors.Errorf("invalid organization name %q", req.Name)) } org := &cstypes.Organization{ Name: req.Name, Visibility: req.Visibility, } if req.CreatorUserID != "" { org.CreatorUserID = req.CreatorUserID } h.log.Info().Msgf("creating organization") org, _, err := h.configstoreClient.CreateOrg(ctx, org) if err != nil { return nil, util.NewAPIError(util.KindFromRemoteError(err), errors.Wrapf(err, "failed to create organization")) } h.log.Info().Msgf("organization %s created, ID: %s", org.Name, org.ID) return org, nil } func (h *ActionHandler) DeleteOrg(ctx context.Context, orgRef string) error { org, _, err := h.configstoreClient.GetOrg(ctx, orgRef) if err != nil { return util.NewAPIError(util.KindFromRemoteError(err), err) } isOrgOwner, err := h.IsOrgOwner(ctx, org.ID) if err != nil { return errors.Wrapf(err, "failed to determine ownership") } if !isOrgOwner { return util.NewAPIError(util.ErrForbidden, errors.Errorf("user not authorized")) } if _, err := h.configstoreClient.DeleteOrg(ctx, orgRef); err != nil { return util.NewAPIError(util.KindFromRemoteError(err), errors.Wrapf(err, "failed to delete org")) } return nil } type AddOrgMemberResponse struct { OrganizationMember *cstypes.OrganizationMember Org *cstypes.Organization User *cstypes.User } func (h *ActionHandler) AddOrgMember(ctx context.Context, orgRef, userRef string, role cstypes.MemberRole) (*AddOrgMemberResponse, error) { org, _, err := h.configstoreClient.GetOrg(ctx, orgRef) if err != nil { return nil, util.NewAPIError(util.KindFromRemoteError(err), err) } user, _, err := h.configstoreClient.GetUser(ctx, userRef) if err != nil { return nil, util.NewAPIError(util.KindFromRemoteError(err), err) } isOrgOwner, err := h.IsOrgOwner(ctx, org.ID) if err != nil { return nil, errors.Wrapf(err, "failed to determine ownership") } if !isOrgOwner { return nil, util.NewAPIError(util.ErrForbidden, errors.Errorf("user not authorized")) } orgmember, _, err := h.configstoreClient.AddOrgMember(ctx, orgRef, userRef, role) if err != nil { return nil, util.NewAPIError(util.KindFromRemoteError(err), errors.Wrapf(err, "failed to add/update organization member")) } return &AddOrgMemberResponse{ OrganizationMember: orgmember, Org: org, User: user, }, nil } func (h *ActionHandler) RemoveOrgMember(ctx context.Context, orgRef, userRef string) error { org, _, err := h.configstoreClient.GetOrg(ctx, orgRef) if err != nil { return util.NewAPIError(util.KindFromRemoteError(err), err) } isOrgOwner, err := h.IsOrgOwner(ctx, org.ID) if err != nil { return errors.Wrapf(err, "failed to determine ownership") } if !isOrgOwner { return util.NewAPIError(util.ErrForbidden, errors.Errorf("user not authorized")) } if _, err = h.configstoreClient.RemoveOrgMember(ctx, orgRef, userRef); err != nil { return util.NewAPIError(util.KindFromRemoteError(err), errors.Wrapf(err, "failed to remove organization member")) } return nil }