diff --git a/tenant/middleware_org_auth.go b/tenant/middleware_org_auth.go new file mode 100644 index 0000000000..fb1abe0f56 --- /dev/null +++ b/tenant/middleware_org_auth.go @@ -0,0 +1,80 @@ +package tenant + +import ( + "context" + + "github.com/influxdata/influxdb" + "github.com/influxdata/influxdb/authorizer" +) + +var _ influxdb.OrganizationService = (*AuthedOrgService)(nil) + +// TODO (al): remove authorizer/org when the org service moves to tenant + +// AuthedOrgService wraps a influxdb.OrganizationService and authorizes actions +// against it appropriately. +type AuthedOrgService struct { + s influxdb.OrganizationService +} + +// NewAuthedOrgService constructs an instance of an authorizing org serivce. +func NewAuthedOrgService(s influxdb.OrganizationService) *AuthedOrgService { + return &AuthedOrgService{ + s: s, + } +} + +// FindOrganizationByID checks to see if the authorizer on context has read access to the id provided. +func (s *AuthedOrgService) FindOrganizationByID(ctx context.Context, id influxdb.ID) (*influxdb.Organization, error) { + if _, _, err := authorizer.AuthorizeReadOrg(ctx, id); err != nil { + return nil, err + } + return s.s.FindOrganizationByID(ctx, id) +} + +// FindOrganization retrieves the organization and checks to see if the authorizer on context has read access to the org. +func (s *AuthedOrgService) FindOrganization(ctx context.Context, filter influxdb.OrganizationFilter) (*influxdb.Organization, error) { + o, err := s.s.FindOrganization(ctx, filter) + if err != nil { + return nil, err + } + if _, _, err := authorizer.AuthorizeReadOrg(ctx, o.ID); err != nil { + return nil, err + } + return o, nil +} + +// FindOrganizations retrieves all organizations that match the provided filter and then filters the list down to only the resources that are authorized. +func (s *AuthedOrgService) FindOrganizations(ctx context.Context, filter influxdb.OrganizationFilter, opt ...influxdb.FindOptions) ([]*influxdb.Organization, int, error) { + // TODO: we'll likely want to push this operation into the database eventually since fetching the whole list of data + // will likely be expensive. + os, _, err := s.s.FindOrganizations(ctx, filter, opt...) + if err != nil { + return nil, 0, err + } + return authorizer.AuthorizeFindOrganizations(ctx, os) +} + +// CreateOrganization checks to see if the authorizer on context has write access to the global orgs resource. +func (s *AuthedOrgService) CreateOrganization(ctx context.Context, o *influxdb.Organization) error { + if _, _, err := authorizer.AuthorizeWriteGlobal(ctx, influxdb.OrgsResourceType); err != nil { + return err + } + return s.s.CreateOrganization(ctx, o) +} + +// UpdateOrganization checks to see if the authorizer on context has write access to the organization provided. +func (s *AuthedOrgService) UpdateOrganization(ctx context.Context, id influxdb.ID, upd influxdb.OrganizationUpdate) (*influxdb.Organization, error) { + if _, _, err := authorizer.AuthorizeWriteOrg(ctx, id); err != nil { + return nil, err + } + return s.s.UpdateOrganization(ctx, id, upd) +} + +// DeleteOrganization checks to see if the authorizer on context has write access to the organization provided. +func (s *AuthedOrgService) DeleteOrganization(ctx context.Context, id influxdb.ID) error { + if _, _, err := authorizer.AuthorizeWriteOrg(ctx, id); err != nil { + return err + } + return s.s.DeleteOrganization(ctx, id) +}