Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: org members #1728

Merged
merged 6 commits into from
Apr 8, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion backends/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ opentelemetry-appender-tracing = { workspace = true }
opentelemetry-http = { workspace = true }
opentelemetry-otlp = { workspace = true }
pin-project = { workspace = true }
permit-client-rs = { git = "https://github.com/shuttle-hq/permit-client-rs", rev = "27c7759" }
permit-client-rs = { git = "https://github.com/shuttle-hq/permit-client-rs", rev = "19085ba" }
permit-pdp-client-rs = { git = "https://github.com/shuttle-hq/permit-pdp-client-rs", rev = "37c7296" }
portpicker = { workspace = true, optional = true }
reqwest = { workspace = true, features = ["json"] }
Expand Down
190 changes: 133 additions & 57 deletions backends/src/client/permit.rs
Original file line number Diff line number Diff line change
@@ -1,4 +1,7 @@
use std::fmt::{Debug, Display};
use std::{
fmt::{Debug, Display},
str::FromStr,
};

use async_trait::async_trait;
use http::StatusCode;
Expand All @@ -8,7 +11,7 @@ use permit_client_rs::{
create_relationship_tuple, delete_relationship_tuple, list_relationship_tuples,
},
resource_instances_api::{create_resource_instance, delete_resource_instance},
role_assignments_api::{assign_role, unassign_role},
role_assignments_api::{assign_role, list_role_assignments, unassign_role},
users_api::{create_user, delete_user, get_user},
Error as PermitClientError,
},
Expand Down Expand Up @@ -91,6 +94,29 @@ pub trait PermissionsDal {
org_id: &str,
) -> Result<()>;

/// Add a user as a normal member to an organization
async fn add_organization_member(
&self,
admin_user: &str,
org_id: &str,
user_id: &str,
) -> Result<()>;

/// Remove a user from an organization
async fn remove_organization_member(
&self,
admin_user: &str,
org_id: &str,
user_id: &str,
) -> Result<()>;

/// Get a list of all the members of an organization
async fn get_organization_members(
&self,
user_id: &str,
org_id: &str,
) -> Result<Vec<organization::MemberResponse>>;

// Permissions queries

/// Get list of all projects user has permissions for
Expand Down Expand Up @@ -398,11 +424,10 @@ impl PermissionsDal for Client {
)
.await?;

let mut projects = Vec::with_capacity(relationships.len());

for rel in relationships {
projects.push(rel.object_details.expect("to have object details").key);
}
let projects = relationships
.into_iter()
.map(|rel| rel.object_details.expect("to have object details").key)
.collect();

Ok(projects)
}
Expand Down Expand Up @@ -514,60 +539,111 @@ impl PermissionsDal for Client {

Ok(())
}

async fn add_organization_member(
&self,
admin_user: &str,
org_id: &str,
user_id: &str,
) -> Result<()> {
if !self.allowed_org(admin_user, org_id, "manage").await? {
return Err(Error::ResponseError(ResponseContent {
status: StatusCode::FORBIDDEN,
content: "User does not have permission to modify the organization".to_owned(),
entity: "Organization".to_owned(),
}));
}

let user = self.get_user(user_id).await?;

if !user
.roles
.is_some_and(|roles| roles.iter().any(|r| r.role == AccountTier::Pro.to_string()))
{
return Err(Error::ResponseError(ResponseContent {
status: StatusCode::BAD_REQUEST,
content: "Only Pro users can be added to an organization".to_owned(),
entity: "Organization".to_owned(),
}));
}

self.assign_resource_role(user_id, format!("Organization:{org_id}"), "member")
.await?;

Ok(())
}

async fn remove_organization_member(
&self,
admin_user: &str,
org_id: &str,
user_id: &str,
) -> Result<()> {
if admin_user == user_id {
return Err(Error::ResponseError(ResponseContent {
status: StatusCode::BAD_REQUEST,
content: "Cannot remove yourself from an organization".to_owned(),
entity: "Organization".to_owned(),
}));
}

if !self.allowed_org(admin_user, org_id, "manage").await? {
return Err(Error::ResponseError(ResponseContent {
status: StatusCode::FORBIDDEN,
content: "User does not have permission to modify the organization".to_owned(),
entity: "Organization".to_owned(),
}));
}

self.unassign_resource_role(user_id, format!("Organization:{org_id}"), "member")
.await?;

Ok(())
}

async fn get_organization_members(
&self,
user_id: &str,
org_id: &str,
) -> Result<Vec<organization::MemberResponse>> {
if !self.allowed_org(user_id, org_id, "view").await? {
return Err(Error::ResponseError(ResponseContent {
status: StatusCode::FORBIDDEN,
content: "User does not have permission to view the organization".to_owned(),
entity: "Organization".to_owned(),
}));
}

let assignments = list_role_assignments(
&self.api,
&self.proj_id,
&self.env_id,
None,
None,
Some("default"),
None,
Some(&format!("Organization:{org_id}")),
None,
None,
None,
)
.await?;

let members = assignments
.into_iter()
.map(|assignment| organization::MemberResponse {
id: assignment.user,
role: organization::MemberRole::from_str(&assignment.role)
.unwrap_or(organization::MemberRole::Member),
})
.collect();

Ok(members)
}
}

// Helpers for trait methods
impl Client {
// pub async fn get_organization_members(&self, org_name: &str) -> Result<Vec<Value>> {
// self.api
// .get(
// &format!(
// "{}/role_assignments?resource_instance=Organization:{org_name}&role=member",
// self.facts
// ),
// None,
// )
// .await
// }

// pub async fn create_organization_member(
// &self,
// org_name: &str,
// user_id: &str,
// ) -> Result<()> {
// self.api
// .post(
// &format!("{}/role_assignments", self.facts),
// json!({
// "role": "member",
// "resource_instance": format!("Organization:{org_name}"),
// "tenant": "default",
// "user": user_id,
// }),
// None,
// )
// .await
// }

// pub async fn delete_organization_member(
// &self,
// org_name: &str,
// user_id: &str,
// ) -> Result<()> {
// self.api
// .delete(
// &format!("{}/role_assignments", self.facts),
// json!({
// "role": "member",
// "resource_instance": format!("Organization:{org_name}"),
// "tenant": "default",
// "user": user_id,
// }),
// None,
// )
// .await
// }

async fn create_user(&self, user_id: &str) -> Result<UserRead> {
Ok(create_user(
&self.api,
Expand Down
36 changes: 36 additions & 0 deletions backends/src/test_utils/gateway.rs
Original file line number Diff line number Diff line change
Expand Up @@ -232,4 +232,40 @@ impl PermissionsDal for PermissionsMock {
));
Ok(())
}

async fn add_organization_member(
&self,
admin_user: &str,
org_id: &str,
user_id: &str,
) -> Result<()> {
self.calls.lock().await.push(format!(
"add_organization_member {admin_user} {org_id} {user_id}"
));
Ok(())
}

async fn remove_organization_member(
&self,
admin_user: &str,
org_id: &str,
user_id: &str,
) -> Result<()> {
self.calls.lock().await.push(format!(
"remove_organization_member {admin_user} {org_id} {user_id}"
));
Ok(())
}

async fn get_organization_members(
&self,
user_id: &str,
org_id: &str,
) -> Result<Vec<organization::MemberResponse>> {
self.calls
.lock()
.await
.push(format!("get_organization_members {user_id} {org_id}"));
Ok(Default::default())
}
}
Loading