| | package permission |
| |
|
| | import ( |
| | "context" |
| | "errors" |
| | "regexp" |
| | "strings" |
| | "sync/atomic" |
| |
|
| | "github.com/google/uuid" |
| | "github.com/target/goalert/util/log" |
| | ) |
| |
|
| | |
| | func SourceContext(ctx context.Context, src *SourceInfo) context.Context { |
| | if src == nil { |
| | return ctx |
| | } |
| | |
| | dup := *src |
| | ctx = log.WithField(ctx, "AuthSource", src.String()) |
| | return context.WithValue(ctx, contextKeySourceInfo, dup) |
| | } |
| |
|
| | |
| | func Source(ctx context.Context) *SourceInfo { |
| | src, ok := ctx.Value(contextKeySourceInfo).(SourceInfo) |
| | if !ok { |
| | return nil |
| | } |
| | return &src |
| | } |
| |
|
| | |
| | func UserSourceContext(ctx context.Context, id string, r Role, src *SourceInfo) context.Context { |
| | ctx = SourceContext(ctx, src) |
| | ctx = UserContext(ctx, id, r) |
| | return ctx |
| | } |
| |
|
| | |
| | func UserContext(ctx context.Context, id string, r Role) context.Context { |
| | id = strings.ToLower(id) |
| | ctx = context.WithValue(ctx, contextHasAuth, 1) |
| | ctx = context.WithValue(ctx, contextKeyUserID, id) |
| | ctx = ensureAuthCheckCountContext(ctx) |
| | ctx = context.WithValue(ctx, contextKeyUserRole, r) |
| | ctx = log.WithField(ctx, "AuthUserID", id) |
| | return ctx |
| | } |
| |
|
| | var sysRx = regexp.MustCompile(`^([a-zA-Z0-9]+|Sudo\[[a-zA-Z0-9]+\])$`) |
| |
|
| | |
| | |
| | func SystemContext(ctx context.Context, componentName string) context.Context { |
| | if !sysRx.MatchString(componentName) { |
| | panic(errors.New("invalid system component name: " + componentName)) |
| | } |
| | ctx = context.WithValue(ctx, contextHasAuth, 1) |
| | ctx = context.WithValue(ctx, contextKeySystem, componentName) |
| | ctx = AuthCheckCountContext(ctx, 0) |
| | ctx = log.WithField(ctx, "AuthSystemComponent", componentName) |
| | return ctx |
| | } |
| |
|
| | |
| | |
| | func AuthCheckCount(ctx context.Context) (value, max uint64) { |
| | val, ok := ctx.Value(contextKeyCheckCount).(*uint64) |
| | if ok { |
| | value = atomic.LoadUint64(val) |
| | } |
| |
|
| | max, _ = ctx.Value(contextKeyCheckCountMax).(uint64) |
| |
|
| | return value, max |
| | } |
| |
|
| | func ensureAuthCheckCountContext(ctx context.Context) context.Context { |
| | _, ok := ctx.Value(contextKeyCheckCount).(*uint64) |
| | if !ok { |
| | return AuthCheckCountContext(ctx, 0) |
| | } |
| | return ctx |
| | } |
| |
|
| | |
| | |
| | func AuthCheckCountContext(ctx context.Context, max uint64) context.Context { |
| | val, _ := ctx.Value(contextKeyCheckCount).(*uint64) |
| | if val == nil { |
| | ctx = context.WithValue(ctx, contextKeyCheckCount, new(uint64)) |
| | } |
| | ctx = context.WithValue(ctx, contextKeyCheckCountMax, max) |
| |
|
| | return ctx |
| | } |
| |
|
| | |
| | func ServiceSourceContext(ctx context.Context, id string, src *SourceInfo) context.Context { |
| | ctx = SourceContext(ctx, src) |
| | ctx = ServiceContext(ctx, id) |
| | return ctx |
| | } |
| |
|
| | |
| | func ServiceContext(ctx context.Context, serviceID string) context.Context { |
| | serviceID = strings.ToLower(serviceID) |
| | ctx = context.WithValue(ctx, contextHasAuth, 1) |
| | ctx = ensureAuthCheckCountContext(ctx) |
| | ctx = context.WithValue(ctx, contextKeyServiceID, serviceID) |
| | ctx = log.WithField(ctx, "AuthServiceID", serviceID) |
| |
|
| | return ctx |
| | } |
| |
|
| | |
| | func TeamContext(ctx context.Context, teamID string) context.Context { |
| | teamID = strings.ToLower(teamID) |
| | ctx = context.WithValue(ctx, contextHasAuth, 1) |
| | ctx = context.WithValue(ctx, contextKeyCheckCount, new(uint64)) |
| | ctx = context.WithValue(ctx, contextKeyTeamID, teamID) |
| | ctx = log.WithField(ctx, "AuthTeamID", teamID) |
| |
|
| | return ctx |
| | } |
| |
|
| | |
| | func WithoutAuth(ctx context.Context) context.Context { |
| | if System(ctx) { |
| | ctx = context.WithValue(ctx, contextKeySystem, nil) |
| | } |
| | if id, ok := ctx.Value(contextKeyUserID).(string); ok && id != "" { |
| | ctx = context.WithValue(ctx, contextKeyUserID, nil) |
| | ctx = context.WithValue(ctx, contextKeyUserRole, nil) |
| | } |
| | if Service(ctx) { |
| | ctx = context.WithValue(ctx, contextKeyServiceID, nil) |
| | } |
| |
|
| | v, _ := ctx.Value(contextHasAuth).(int) |
| | if v == 1 { |
| | ctx = context.WithValue(ctx, contextHasAuth, nil) |
| | } |
| |
|
| | return ctx |
| | } |
| |
|
| | |
| | |
| | func SudoContext(ctx context.Context, f func(context.Context)) { |
| | name := "Sudo" |
| | cname := SystemComponentName(ctx) |
| | if cname != "" { |
| | name += "[" + cname + "]" |
| | } |
| | sCtx, cancel := context.WithCancel(SystemContext(ctx, name)) |
| | defer cancel() |
| | f(sCtx) |
| | } |
| |
|
| | |
| | func UserID(ctx context.Context) string { |
| | uid, _ := ctx.Value(contextKeyUserID).(string) |
| | return uid |
| | } |
| |
|
| | |
| | func UserNullUUID(ctx context.Context) uuid.NullUUID { |
| | if id, err := uuid.Parse(UserID(ctx)); err == nil { |
| | return uuid.NullUUID{UUID: id, Valid: true} |
| | } |
| |
|
| | return uuid.NullUUID{} |
| | } |
| |
|
| | |
| | func ServiceNullUUID(ctx context.Context) uuid.NullUUID { |
| | if id, err := uuid.Parse(ServiceID(ctx)); err == nil { |
| | return uuid.NullUUID{UUID: id, Valid: true} |
| | } |
| |
|
| | return uuid.NullUUID{} |
| | } |
| |
|
| | |
| | func SystemComponentName(ctx context.Context) string { |
| | name, _ := ctx.Value(contextKeySystem).(string) |
| | return name |
| | } |
| |
|
| | |
| | func ServiceID(ctx context.Context) string { |
| | sid, _ := ctx.Value(contextKeyServiceID).(string) |
| | return sid |
| | } |
| |
|
| | |
| | func TeamID(ctx context.Context) string { |
| | sid, _ := ctx.Value(contextKeyTeamID).(string) |
| | return sid |
| | } |
| |
|