go.chromium.org/luci@v0.0.0-20240309015107-7cdc2e660f33/tree_status/rpc/decorator.go (about) 1 // Copyright 2024 The LUCI Authors. 2 // 3 // Licensed under the Apache License, Version 2.0 (the "License"); 4 // you may not use this file except in compliance with the License. 5 // You may obtain a copy of the License at 6 // 7 // http://www.apache.org/licenses/LICENSE-2.0 8 // 9 // Unless required by applicable law or agreed to in writing, software 10 // distributed under the License is distributed on an "AS IS" BASIS, 11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 // See the License for the specific language governing permissions and 13 // limitations under the License. 14 15 package rpc 16 17 import ( 18 "context" 19 20 "github.com/golang/protobuf/proto" 21 "google.golang.org/grpc/codes" 22 23 "go.chromium.org/luci/auth/identity" 24 "go.chromium.org/luci/common/errors" 25 "go.chromium.org/luci/grpc/appstatus" 26 "go.chromium.org/luci/server/auth" 27 ) 28 29 const treeStatusAccessGroup = "luci-tree-status-access" 30 const treeStatusWriteAccessGroup = "luci-tree-status-writers" 31 32 // treeStatusAuditAccessGroup is the group which contains people authorised 33 // to see the details of the user who created entities. 34 const treeStatusAuditAccessGroup = "luci-tree-status-audit-access" 35 36 // Checks if this call is allowed, returns an error if it is. 37 func checkAllowedPrelude(ctx context.Context, methodName string, req proto.Message) (context.Context, error) { 38 if err := checkAllowed(ctx, treeStatusAccessGroup); err != nil { 39 return ctx, err 40 } 41 return ctx, nil 42 } 43 44 // Logs and converts the errors to GRPC type errors. 45 func gRPCifyAndLogPostlude(ctx context.Context, methodName string, rsp proto.Message, err error) error { 46 return appstatus.GRPCifyAndLog(ctx, err) 47 } 48 49 func checkAllowed(ctx context.Context, allowedGroup string) error { 50 switch yes, err := auth.IsMember(ctx, allowedGroup); { 51 case err != nil: 52 return errors.Annotate(err, "failed to check ACL").Err() 53 case !yes: 54 if auth.CurrentIdentity(ctx).Kind() == identity.Anonymous { 55 return appstatus.Errorf(codes.PermissionDenied, "please log in for access") 56 } 57 return appstatus.Errorf(codes.PermissionDenied, "not a member of %s", allowedGroup) 58 default: 59 return nil 60 } 61 }