You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
drone-go/plugin/admission/handler.go

101 lines
2.7 KiB
Go

// Copyright 2018 Drone.IO Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package admission
import (
"encoding/json"
"io/ioutil"
"net/http"
"git.awesome-for.me/liuzhiguo/drone-go/plugin/logger"
"github.com/99designs/httpsignatures-go"
)
// Handler returns a http.Handler that accepts JSON-encoded
// HTTP requests for a user, invokes the underlying admission
// plugin, and writes the JSON-encoded config to the HTTP response.
//
// The handler verifies the authenticity of the HTTP request
// using the http-signature, and returns a 400 Bad Request if
// the signature is missing or invalid.
//
// The handler can optionally encrypt the response body using
// aesgcm if the HTTP request includes the Accept-Encoding header
// set to aesgcm.
func Handler(plugin Plugin, secret string, logs logger.Logger) http.Handler {
handler := &handler{
secret: secret,
plugin: plugin,
logger: logs,
}
if handler.logger == nil {
handler.logger = logger.Discard()
}
return handler
}
type handler struct {
secret string
plugin Plugin
logger logger.Logger
}
func (p *handler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
signature, err := httpsignatures.FromRequest(r)
if err != nil {
p.logger.Debugf("admission: invalid or missing signature in http.Request")
http.Error(w, "Invalid or Missing Signature", http.StatusBadRequest)
return
}
if !signature.IsValid(p.secret, r) {
p.logger.Debugf("admission: invalid signature in http.Request")
http.Error(w, "Invalid Signature", http.StatusBadRequest)
return
}
body, err := ioutil.ReadAll(r.Body)
if err != nil {
p.logger.Debugf("admission: cannot read http.Request body")
w.WriteHeader(http.StatusBadRequest)
return
}
req := &Request{}
err = json.Unmarshal(body, req)
if err != nil {
p.logger.Debugf("admission: cannot unmarshal http.Request body")
http.Error(w, "Invalid Input", http.StatusBadRequest)
return
}
res, err := p.plugin.Admit(r.Context(), req)
if err != nil {
p.logger.Debugf("admission: denied: %s: %s",
req.User.Login,
err,
)
http.Error(w, err.Error(), http.StatusForbidden)
return
}
if res == nil {
w.WriteHeader(http.StatusNoContent)
return
}
out, _ := json.Marshal(res)
w.Header().Set("Content-Type", "application/json")
w.Write(out)
}