go.chromium.org/luci@v0.0.0-20240309015107-7cdc2e660f33/teams/rpc/decorator.go (about)

     1  // Copyright 2024 The LUCI Authors.
     2  //
     3  // Licensed under the Apache License, Version 2.0 (the "License");
     4  // you may not use this file except in compliance with the License.
     5  // You may obtain a copy of the License at
     6  //
     7  //      http://www.apache.org/licenses/LICENSE-2.0
     8  //
     9  // Unless required by applicable law or agreed to in writing, software
    10  // distributed under the License is distributed on an "AS IS" BASIS,
    11  // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    12  // See the License for the specific language governing permissions and
    13  // limitations under the License.
    14  
    15  package rpc
    16  
    17  import (
    18  	"context"
    19  
    20  	"github.com/golang/protobuf/proto"
    21  	"google.golang.org/grpc/codes"
    22  
    23  	"go.chromium.org/luci/auth/identity"
    24  	"go.chromium.org/luci/common/errors"
    25  	"go.chromium.org/luci/grpc/appstatus"
    26  	"go.chromium.org/luci/server/auth"
    27  )
    28  
    29  const teamsAccessGroup = "luci-teams-access"
    30  
    31  // Checks if this call is allowed, returns an error if it is.
    32  func checkAllowedPrelude(ctx context.Context, methodName string, req proto.Message) (context.Context, error) {
    33  	if err := checkAllowed(ctx, teamsAccessGroup); err != nil {
    34  		return ctx, err
    35  	}
    36  	return ctx, nil
    37  }
    38  
    39  // Logs and converts the errors to GRPC type errors.
    40  func gRPCifyAndLogPostlude(ctx context.Context, methodName string, rsp proto.Message, err error) error {
    41  	return appstatus.GRPCifyAndLog(ctx, err)
    42  }
    43  
    44  func checkAllowed(ctx context.Context, allowedGroup string) error {
    45  	switch yes, err := auth.IsMember(ctx, allowedGroup); {
    46  	case err != nil:
    47  		return errors.Annotate(err, "failed to check ACL").Err()
    48  	case !yes:
    49  		if auth.CurrentIdentity(ctx).Kind() == identity.Anonymous {
    50  			return appstatus.Errorf(codes.PermissionDenied, "please log in for access")
    51  		}
    52  		return appstatus.Errorf(codes.PermissionDenied, "not a member of %s", allowedGroup)
    53  	default:
    54  		return nil
    55  	}
    56  }