forked from wrenn/wrenn
- C1: Add sync.RWMutex to vm.Manager to protect concurrent vms map access - H1: Fix IP arithmetic overflow in network slot addressing (byte truncation) - H5: Fix MultiplexedChannel.Fork() TOCTOU race (move exited check inside lock) - H8: Remove snapshot overwrite — return template_name_taken conflict instead - H9: Wrap DeleteAccount DB ops in a transaction, make team deletion fatal - H10: Sanitize serviceErrToHTTP to stop leaking internal error messages - H11: Add deleted_at IS NULL to GetUserByEmail/GetUserByID queries - H12: Add id DESC to audit log composite index for cursor pagination - H15: Delete dead AuthModal.svelte component - H17: Move JWT from WebSocket URL query param to first WS message - H18: Fix $derived to $derived.by in FilesTab breadcrumbs
59 lines
2.0 KiB
Go
59 lines
2.0 KiB
Go
package api
|
|
|
|
import (
|
|
"net/http"
|
|
|
|
"git.omukk.dev/wrenn/wrenn/pkg/auth"
|
|
"git.omukk.dev/wrenn/wrenn/pkg/db"
|
|
"git.omukk.dev/wrenn/wrenn/pkg/id"
|
|
)
|
|
|
|
// injectPlatformTeam overwrites the AuthContext's TeamID with the platform
|
|
// sentinel UUID. This lets existing team-scoped handlers (exec, files, pty,
|
|
// metrics) work unchanged under admin routes. Must run after requireAdmin.
|
|
func injectPlatformTeam() func(http.Handler) http.Handler {
|
|
return func(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
if _, ok := auth.FromContext(r.Context()); !ok {
|
|
// No auth context yet (WS upgrade); handler will inject platform team after WS auth.
|
|
next.ServeHTTP(w, r)
|
|
return
|
|
}
|
|
ac := auth.MustFromContext(r.Context())
|
|
ac.TeamID = id.PlatformTeamID
|
|
ctx := auth.WithAuthContext(r.Context(), ac)
|
|
next.ServeHTTP(w, r.WithContext(ctx))
|
|
})
|
|
}
|
|
}
|
|
|
|
// requireAdmin validates that the authenticated user is a platform admin.
|
|
// Must run after requireJWT (depends on AuthContext being present).
|
|
// Re-validates against the DB — the JWT is_admin claim is for UI only;
|
|
// the DB is the source of truth for admin access.
|
|
// WebSocket upgrade requests without auth context are passed through —
|
|
// admin WS handlers verify admin status after upgrade via wsAuthenticateAdmin.
|
|
func requireAdmin(queries *db.Queries) func(http.Handler) http.Handler {
|
|
return func(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
ac, ok := auth.FromContext(r.Context())
|
|
if !ok {
|
|
if isWebSocketUpgrade(r) {
|
|
ctx := r.Context()
|
|
ctx = setAdminWSFlag(ctx)
|
|
next.ServeHTTP(w, r.WithContext(ctx))
|
|
return
|
|
}
|
|
writeError(w, http.StatusUnauthorized, "unauthorized", "authentication required")
|
|
return
|
|
}
|
|
user, err := queries.GetUserByID(r.Context(), ac.UserID)
|
|
if err != nil || !user.IsAdmin {
|
|
writeError(w, http.StatusForbidden, "forbidden", "admin access required")
|
|
return
|
|
}
|
|
next.ServeHTTP(w, r)
|
|
})
|
|
}
|
|
}
|