server/datasource/auth/perm.go (37 lines of code) (raw):
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package auth
import (
"context"
"github.com/apache/servicecomb-kie/server/config"
rbacmodel "github.com/go-chassis/cari/rbac"
)
// CheckPerm return the resource scope ...
func CheckPerm(ctx context.Context, targetResource *ResourceScope) ([]map[string]string, error) {
account, err := Identify(ctx)
if err != nil {
return nil, err
}
hasAdmin, normalRoles := filterRoles(account.Roles)
if hasAdmin {
return nil, nil
}
return Allow(ctx, normalRoles, targetResource)
}
func filterRoles(roleList []string) (hasAdmin bool, normalRoles []string) {
for _, r := range roleList {
if r == rbacmodel.RoleAdmin {
hasAdmin = true
return
}
normalRoles = append(normalRoles, r)
}
return
}
func CheckEnable(ctx context.Context) bool {
if !config.GetRBAC().Enabled {
return false
}
if !config.GetRBAC().AllowMissToken {
return true
}
claims, _ := rbacmodel.FromContext(ctx)
return claims != nil
}