This repository has been archived by the owner on Mar 11, 2021. It is now read-only.
/
space.go
105 lines (86 loc) · 3.14 KB
/
space.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
package controller
import (
"github.com/fabric8-services/fabric8-auth/app"
"github.com/fabric8-services/fabric8-auth/application"
account "github.com/fabric8-services/fabric8-auth/authentication/account/repository"
"github.com/fabric8-services/fabric8-auth/authorization/token/manager"
"github.com/fabric8-services/fabric8-auth/errors"
"github.com/fabric8-services/fabric8-auth/jsonapi"
"github.com/fabric8-services/fabric8-auth/log"
"github.com/goadesign/goa"
)
// SpaceController implements the space resource.
type SpaceController struct {
*goa.Controller
app application.Application
}
// NewSpaceController creates a space controller.
func NewSpaceController(service *goa.Service, app application.Application) *SpaceController {
return &SpaceController{Controller: service.NewController("SpaceController"), app: app}
}
// Create runs the create action.
func (c *SpaceController) Create(ctx *app.CreateSpaceContext) error {
currentIdentity, err := c.app.UserService().LoadContextIdentityIfNotBanned(ctx)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
// Create AuthZ resource for the space as part of soft migration from deprecated Keycloak AuthZ API to new OSIO AuthZ API
err = c.app.SpaceService().CreateSpace(ctx, currentIdentity.ID, ctx.SpaceID.String())
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
"space_id": ctx.SpaceID,
}, "unable to register resource for space or assign space admin role to space creator")
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.OK(&app.SpaceResource{Data: &app.SpaceResourceData{
ResourceID: ctx.SpaceID.String(),
}})
}
// Delete runs the delete action.
func (c *SpaceController) Delete(ctx *app.DeleteSpaceContext) error {
currentIdentity, err := c.app.UserService().LoadContextIdentityIfNotBanned(ctx)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, err)
}
err = c.app.SpaceService().DeleteSpace(ctx, currentIdentity.ID, ctx.SpaceID.String())
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
"space_id": ctx.SpaceID,
}, "unable to delete authZ space resource")
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.OK([]byte{})
}
// ListTeams runs the listTeams action.
func (c *SpaceController) ListTeams(ctx *app.ListTeamsSpaceContext) error {
currentUser, err := manager.ContextIdentity(ctx)
if err != nil {
return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError(err.Error()))
}
if currentUser == nil {
return jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError("error finding the current user"))
}
teams, err := c.app.TeamService().ListTeamsInSpace(ctx, *currentUser, ctx.SpaceID)
if err != nil {
log.Error(ctx, map[string]interface{}{
"err": err,
}, "failed to list teams")
return jsonapi.JSONErrorResponse(ctx, err)
}
return ctx.OK(&app.TeamArray{
Data: convertToTeamData(teams),
})
}
func convertToTeamData(teams []account.Identity) []*app.TeamData {
results := []*app.TeamData{}
for _, team := range teams {
teamData := &app.TeamData{
ID: team.ID.String(),
Name: team.IdentityResource.Name,
}
results = append(results, teamData)
}
return results
}