forked from wrenn/wrenn
Introduces an append-only audit trail for all user and system actions: sandbox lifecycle (create/pause/resume/destroy/auto-pause), snapshots, team rename, API key create/revoke, member add/remove/leave/role_update, and BYOC host add/delete/marked_down/marked_up. - New audit_logs table (migration) with team_id, actor, resource, action, scope (team|admin), status (success|info|warning|error), metadata, and created_at - AuditLogger (internal/audit) with named fire-and-forget methods per event; system actor used for background events (HostMonitor, TTL reaper) - GET /v1/audit-logs: JWT-only, cursor pagination (max 200), multi-value filters for resource_type and action (comma-sep or repeated params); members see team-scoped events only, admins/owners see all - AuthContext extended with APIKeyID + APIKeyName so API key requests record meaningful actor identity - HostMonitor wired with AuditLogger for auto-pause and host marked_down
69 lines
2.2 KiB
Go
69 lines
2.2 KiB
Go
package auth
|
|
|
|
import "context"
|
|
|
|
type contextKey int
|
|
|
|
const authCtxKey contextKey = 0
|
|
|
|
// AuthContext is stamped into request context by auth middleware.
|
|
type AuthContext struct {
|
|
TeamID string
|
|
UserID string // empty when authenticated via API key
|
|
Email string // empty when authenticated via API key
|
|
Name string // empty when authenticated via API key
|
|
Role string // owner, admin, or member; empty when authenticated via API key
|
|
IsAdmin bool // platform-level admin; always false when authenticated via API key
|
|
APIKeyID string // populated when authenticated via API key; empty for JWT auth
|
|
APIKeyName string // display name of the key, snapshotted at auth time; empty for JWT auth
|
|
}
|
|
|
|
// WithAuthContext returns a new context with the given AuthContext.
|
|
func WithAuthContext(ctx context.Context, a AuthContext) context.Context {
|
|
return context.WithValue(ctx, authCtxKey, a)
|
|
}
|
|
|
|
// FromContext retrieves the AuthContext. Returns zero value and false if absent.
|
|
func FromContext(ctx context.Context) (AuthContext, bool) {
|
|
a, ok := ctx.Value(authCtxKey).(AuthContext)
|
|
return a, ok
|
|
}
|
|
|
|
// MustFromContext retrieves the AuthContext. Panics if absent — only call
|
|
// inside handlers behind auth middleware.
|
|
func MustFromContext(ctx context.Context) AuthContext {
|
|
a, ok := FromContext(ctx)
|
|
if !ok {
|
|
panic("auth: MustFromContext called on unauthenticated request")
|
|
}
|
|
return a
|
|
}
|
|
|
|
const hostCtxKey contextKey = 1
|
|
|
|
// HostContext is stamped into request context by host token middleware.
|
|
type HostContext struct {
|
|
HostID string
|
|
}
|
|
|
|
// WithHostContext returns a new context with the given HostContext.
|
|
func WithHostContext(ctx context.Context, h HostContext) context.Context {
|
|
return context.WithValue(ctx, hostCtxKey, h)
|
|
}
|
|
|
|
// HostFromContext retrieves the HostContext. Returns zero value and false if absent.
|
|
func HostFromContext(ctx context.Context) (HostContext, bool) {
|
|
h, ok := ctx.Value(hostCtxKey).(HostContext)
|
|
return h, ok
|
|
}
|
|
|
|
// MustHostFromContext retrieves the HostContext. Panics if absent — only call
|
|
// inside handlers behind host token middleware.
|
|
func MustHostFromContext(ctx context.Context) HostContext {
|
|
h, ok := HostFromContext(ctx)
|
|
if !ok {
|
|
panic("auth: MustHostFromContext called on unauthenticated request")
|
|
}
|
|
return h
|
|
}
|