blob: abf451ed35061fd647aac23e19e83c61abfb20e3 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
|
# frozen_string_literal: true
module Clusters
module Agents
class AuthorizeProxyUserService < ::BaseService
include ::Gitlab::Utils::StrongMemoize
def initialize(current_user, agent)
@current_user = current_user
@agent = agent
end
def execute
return forbidden('`user_access` keyword is not found in agent config file.') unless user_access_config.present?
access_as = user_access_config['access_as']
return forbidden('`access_as` is not found under the `user_access` keyword.') unless access_as.present?
return forbidden('`access_as` must exist only once under the `user_access` keyword.') if access_as.size != 1
handle_access(access_as)
end
private
attr_reader :current_user, :agent
# Override in EE
def handle_access(access_as)
access_as_agent if access_as.key?('agent')
end
def authorizations
@authorizations ||= ::Clusters::Agents::Authorizations::UserAccess::Finder
.new(current_user, agent: agent).execute
end
def response_base
{
agent: {
id: agent.id,
config_project: { id: agent.project_id }
},
user: {
id: current_user.id,
username: current_user.username
}
}
end
def access_as_agent
if authorizations.empty?
return forbidden('You must be a member of `projects` or `groups` under the `user_access` keyword.')
end
success(payload: response_base.merge(access_as: { agent: {} }))
end
def user_access_config
agent.user_access_config
end
strong_memoize_attr :user_access_config
delegate :success, to: ServiceResponse, private: true
def forbidden(message)
ServiceResponse.error(reason: :forbidden, message: message)
end
end
end
end
Clusters::Agents::AuthorizeProxyUserService.prepend_mod
|