chore(authorizer): refactor order of checks

Signed-off-by: Leonardo Di Donato <leodidonato@gmail.com>
pull/11382/head
Leonardo Di Donato 2019-01-22 01:22:39 +01:00 committed by Leo Di Donato
parent 83e321366e
commit 65622b4289
3 changed files with 8 additions and 7 deletions

View File

@ -53,12 +53,12 @@ func authorizeWriteSecret(ctx context.Context, orgID influxdb.ID) error {
// LoadSecret checks to see if the authorizer on context has read access to the secret key provided.
func (s *SecretService) LoadSecret(ctx context.Context, orgID influxdb.ID, key string) (string, error) {
secret, err := s.s.LoadSecret(ctx, orgID, key)
if err != nil {
if err := authorizeReadSecret(ctx, orgID); err != nil {
return "", err
}
if err := authorizeReadSecret(ctx, orgID); err != nil {
secret, err := s.s.LoadSecret(ctx, orgID, key)
if err != nil {
return "", err
}
@ -67,12 +67,12 @@ func (s *SecretService) LoadSecret(ctx context.Context, orgID influxdb.ID, key s
// GetSecretKeys checks to see if the authorizer on context has read access to all the secrets belonging to orgID.
func (s *SecretService) GetSecretKeys(ctx context.Context, orgID influxdb.ID) ([]string, error) {
secrets, err := s.s.GetSecretKeys(ctx, orgID)
if err != nil {
if err := authorizeReadSecret(ctx, orgID); err != nil {
return []string{}, err
}
if err := authorizeReadSecret(ctx, orgID); err != nil {
secrets, err := s.s.GetSecretKeys(ctx, orgID)
if err != nil {
return []string{}, err
}

View File

@ -250,6 +250,7 @@ func TestSecretService_GetSecretKeys(t *testing.T) {
OrgID: influxdbtesting.IDPtr(10),
},
},
org: influxdb.ID(10),
},
wants: wants{
err: &influxdb.Error{

View File

@ -115,7 +115,7 @@ const (
MacrosResourceType = ResourceType("macros") // 8
// ScraperResourceType gives permission to one or more scrapers.
ScraperResourceType = ResourceType("scrapers") // 9
// SecretsResourceType gives permission to one or more scrapers.
// SecretsResourceType gives permission to one or more secrets.
SecretsResourceType = ResourceType("secrets") // 10
)