package authorizer import ( "context" "github.com/influxdata/influxdb/v2" ) var _ influxdb.TelegrafConfigStore = (*TelegrafConfigService)(nil) // TelegrafConfigService wraps a influxdb.TelegrafConfigStore and authorizes actions // against it appropriately. type TelegrafConfigService struct { s influxdb.TelegrafConfigStore influxdb.UserResourceMappingService } // NewTelegrafConfigService constructs an instance of an authorizing telegraf serivce. func NewTelegrafConfigService(s influxdb.TelegrafConfigStore, urm influxdb.UserResourceMappingService) *TelegrafConfigService { return &TelegrafConfigService{ s: s, UserResourceMappingService: urm, } } // FindTelegrafConfigByID checks to see if the authorizer on context has read access to the id provided. func (s *TelegrafConfigService) FindTelegrafConfigByID(ctx context.Context, id influxdb.ID) (*influxdb.TelegrafConfig, error) { tc, err := s.s.FindTelegrafConfigByID(ctx, id) if err != nil { return nil, err } if _, _, err := AuthorizeRead(ctx, influxdb.TelegrafsResourceType, tc.ID, tc.OrgID); err != nil { return nil, err } return tc, nil } // FindTelegrafConfigs retrieves all telegraf configs that match the provided filter and then filters the list down to only the resources that are authorized. func (s *TelegrafConfigService) FindTelegrafConfigs(ctx context.Context, filter influxdb.TelegrafConfigFilter, opt ...influxdb.FindOptions) ([]*influxdb.TelegrafConfig, int, error) { // TODO: we'll likely want to push this operation into the database eventually since fetching the whole list of data // will likely be expensive. ts, _, err := s.s.FindTelegrafConfigs(ctx, filter, opt...) if err != nil { return nil, 0, err } return AuthorizeFindTelegrafs(ctx, ts) } // CreateTelegrafConfig checks to see if the authorizer on context has write access to the global telegraf config resource. func (s *TelegrafConfigService) CreateTelegrafConfig(ctx context.Context, tc *influxdb.TelegrafConfig, userID influxdb.ID) error { if _, _, err := AuthorizeCreate(ctx, influxdb.TelegrafsResourceType, tc.OrgID); err != nil { return err } return s.s.CreateTelegrafConfig(ctx, tc, userID) } // UpdateTelegrafConfig checks to see if the authorizer on context has write access to the telegraf config provided. func (s *TelegrafConfigService) UpdateTelegrafConfig(ctx context.Context, id influxdb.ID, upd *influxdb.TelegrafConfig, userID influxdb.ID) (*influxdb.TelegrafConfig, error) { tc, err := s.FindTelegrafConfigByID(ctx, id) if err != nil { return nil, err } if _, _, err := AuthorizeWrite(ctx, influxdb.TelegrafsResourceType, tc.ID, tc.OrgID); err != nil { return nil, err } return s.s.UpdateTelegrafConfig(ctx, id, upd, userID) } // DeleteTelegrafConfig checks to see if the authorizer on context has write access to the telegraf config provided. func (s *TelegrafConfigService) DeleteTelegrafConfig(ctx context.Context, id influxdb.ID) error { tc, err := s.FindTelegrafConfigByID(ctx, id) if err != nil { return err } if _, _, err := AuthorizeWrite(ctx, influxdb.TelegrafsResourceType, tc.ID, tc.OrgID); err != nil { return err } return s.s.DeleteTelegrafConfig(ctx, id) }