Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions cmd/serve.go
Original file line number Diff line number Diff line change
Expand Up @@ -420,8 +420,6 @@ func buildAPIDependencies(
organizationService := organization.NewService(organizationRepository, relationService, userService,
authnService, policyService, preferenceService, auditRecordRepository, roleService)

userPATService := userpat.NewService(logger, userPATRepo, cfg.App.PAT, organizationService, roleService, policyService, auditRecordRepository)

auditRecordService := auditrecord.NewService(auditRecordRepository, userService, serviceUserService, sessionService)

orgKycRepository := postgres.NewOrgKycRepository(dbc)
Expand Down Expand Up @@ -466,6 +464,8 @@ func buildAPIDependencies(
projectService := project.NewService(projectRepository, relationService, userService, policyService,
authnService, serviceUserService, groupService)

userPATService := userpat.NewService(logger, userPATRepo, cfg.App.PAT, organizationService, roleService, policyService, projectService, auditRecordRepository)

orgPATsRepository := postgres.NewOrgPATsRepository(dbc)
orgPATsService := orgpats.NewService(orgPATsRepository, projectService)

Expand Down
1 change: 1 addition & 0 deletions core/userpat/errors/errors.go
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,5 @@ var (
ErrUnsupportedScope = errors.New("role scope is not supported for personal access tokens")
ErrScopeMismatch = errors.New("role does not support the specified scope")
ErrRoleNotFound = errors.New("one or more requested roles do not exist")
ErrProjectForbidden = errors.New("user does not have access to one or more specified projects")
)
100 changes: 100 additions & 0 deletions core/userpat/mocks/project_service.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

55 changes: 54 additions & 1 deletion core/userpat/service.go
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,10 @@ import (
"time"

"github.com/raystack/frontier/core/auditrecord/models"
"github.com/raystack/frontier/core/authenticate"
"github.com/raystack/frontier/core/organization"
"github.com/raystack/frontier/core/policy"
"github.com/raystack/frontier/core/project"
"github.com/raystack/frontier/core/role"
paterrors "github.com/raystack/frontier/core/userpat/errors"
patmodels "github.com/raystack/frontier/core/userpat/models"
Expand All @@ -40,6 +42,10 @@ type PolicyService interface {
Delete(ctx context.Context, id string) error
}

type ProjectService interface {
ListByUser(ctx context.Context, principal authenticate.Principal, flt project.Filter) ([]project.Project, error)
}

type AuditRecordRepository interface {
Create(ctx context.Context, auditRecord models.AuditRecord) (models.AuditRecord, error)
}
Expand All @@ -51,19 +57,21 @@ type Service struct {
orgService OrganizationService
roleService RoleService
policyService PolicyService
projectService ProjectService
auditRecordRepository AuditRecordRepository
deniedPerms map[string]struct{}
}

func NewService(logger log.Logger, repo Repository, config Config, orgService OrganizationService,
roleService RoleService, policyService PolicyService, auditRecordRepository AuditRecordRepository) *Service {
roleService RoleService, policyService PolicyService, projectService ProjectService, auditRecordRepository AuditRecordRepository) *Service {
return &Service{
repo: repo,
config: config,
logger: logger,
orgService: orgService,
roleService: roleService,
policyService: policyService,
projectService: projectService,
auditRecordRepository: auditRecordRepository,
deniedPerms: config.DeniedPermissionsSet(),
}
Expand Down Expand Up @@ -221,6 +229,9 @@ func (s *Service) Update(ctx context.Context, toUpdate patmodels.PAT) (patmodels
if err := s.validateScopes(ctx, toUpdate.Scopes); err != nil {
return patmodels.PAT{}, err
}
if err := s.validateProjectAccess(ctx, toUpdate.UserID, existing.OrgID, toUpdate.Scopes); err != nil {
return patmodels.PAT{}, err
}

oldTitle, oldScopes, err := s.captureOldScope(ctx, &existing)
if err != nil {
Expand Down Expand Up @@ -339,6 +350,9 @@ func (s *Service) Create(ctx context.Context, req CreateRequest) (patmodels.PAT,
if err := s.validateScopes(ctx, req.Scopes); err != nil {
return patmodels.PAT{}, "", err
}
if err := s.validateProjectAccess(ctx, req.UserID, req.OrgID, req.Scopes); err != nil {
return patmodels.PAT{}, "", err
}

patValue, secretHash, err := s.generatePAT()
if err != nil {
Expand Down Expand Up @@ -468,6 +482,45 @@ func (s *Service) validateScopes(ctx context.Context, scopes []patmodels.PATScop
return nil
}

// validateProjectAccess checks that the user has access to all project resource IDs in the scopes.
func (s *Service) validateProjectAccess(ctx context.Context, userID, orgID string, scopes []patmodels.PATScope) error {
var projectIDs []string
for _, sc := range scopes {
if sc.ResourceType == schema.ProjectNamespace {
projectIDs = append(projectIDs, sc.ResourceIDs...)
}
}
if len(projectIDs) == 0 {
return nil
}

principal := authenticate.Principal{
ID: userID,
Type: schema.UserPrincipal,
}
userProjects, err := s.projectService.ListByUser(ctx, principal, project.Filter{OrgID: orgID})
if err != nil {
return fmt.Errorf("listing user projects: %w", err)
}

userProjectSet := make(map[string]bool, len(userProjects))
for _, p := range userProjects {
userProjectSet[p.ID] = true
}

var forbidden []string
for _, id := range projectIDs {
if !userProjectSet[id] {
forbidden = append(forbidden, id)
}
}
if len(forbidden) > 0 {
s.logger.Error("user does not have access to projects", "project_ids", forbidden)
return paterrors.ErrProjectForbidden
}
return nil
}

// createPolicies creates SpiceDB policies from pre-validated scopes.
func (s *Service) createPolicies(ctx context.Context, patID, orgID string, scopes []patmodels.PATScope) error {
for _, sc := range scopes {
Expand Down
Loading
Loading