func fillInContext(context middleware.Context, r *http.Request, w http.ResponseWriter, s *schema.Schema, sync sync.Sync, identityService middleware.IdentityService) { context["path"] = r.URL.Path context["http_request"] = r context["http_response"] = w context["schema"] = s context["sync"] = sync context["identity_service"] = identityService context["service_auth"], _ = identityService.GetServiceAuthorization() }
func fillInContext(context middleware.Context, db db.DB, r *http.Request, w http.ResponseWriter, s *schema.Schema, p martini.Params, sync sync.Sync, identityService middleware.IdentityService, queue *job.Queue) { context["path"] = r.URL.Path context["http_request"] = r context["http_response"] = w context["schema"] = s context["params"] = p context["sync"] = sync context["db"] = db context["queue"] = queue context["identity_service"] = identityService context["service_auth"], _ = identityService.GetServiceAuthorization() context["openstack_client"] = identityService.GetClient() }
// UpdateResource updates the resource specified by the schema and ID using the dataMap func UpdateResource( context middleware.Context, dataStore db.DB, identityService middleware.IdentityService, resourceSchema *schema.Schema, resourceID string, dataMap map[string]interface{}, ) error { context["id"] = resourceID //load environment environmentManager := extension.GetManager() environment, ok := environmentManager.GetEnvironment(resourceSchema.ID) if !ok { return fmt.Errorf("No environment for schema") } auth := context["auth"].(schema.Authorization) //load policy policy, err := loadPolicy(context, "update", strings.Replace(resourceSchema.GetSingleURL(), ":id", resourceID, 1), auth) if err != nil { return err } context["policy"] = policy //fillup default values if tenantID, ok := dataMap["tenant_id"]; ok && tenantID != nil { dataMap["tenant_name"], err = identityService.GetTenantName(tenantID.(string)) } if err != nil { return ResourceError{err, err.Error(), Unauthorized} } //check policy err = policy.Check(schema.ActionUpdate, auth, dataMap) delete(dataMap, "tenant_name") if err != nil { return ResourceError{err, err.Error(), Unauthorized} } context["resource"] = dataMap if err := extension.HandleEvent(context, environment, "pre_update"); err != nil { return err } if resourceData, ok := context["resource"].(map[string]interface{}); ok { dataMap = resourceData } if err := InTransaction( context, dataStore, transaction.GetIsolationLevel(resourceSchema, schema.ActionUpdate), func() error { return UpdateResourceInTransaction(context, resourceSchema, resourceID, dataMap, policy.GetTenantIDFilter(schema.ActionUpdate, auth.TenantID())) }, ); err != nil { return err } if err := extension.HandleEvent(context, environment, "post_update"); err != nil { return err } if err := ApplyPolicyForResource(context, resourceSchema); err != nil { return ResourceError{err, "", NotFound} } return nil }
// CreateResource creates the resource specified by the schema and dataMap func CreateResource( context middleware.Context, dataStore db.DB, identityService middleware.IdentityService, resourceSchema *schema.Schema, dataMap map[string]interface{}, ) error { manager := schema.GetManager() // Load environment environmentManager := extension.GetManager() environment, ok := environmentManager.GetEnvironment(resourceSchema.ID) if !ok { return fmt.Errorf("No environment for schema") } auth := context["auth"].(schema.Authorization) //LoadPolicy policy, err := loadPolicy(context, "create", resourceSchema.GetPluralURL(), auth) if err != nil { return err } _, err = resourceSchema.GetPropertyByID("tenant_id") if _, ok := dataMap["tenant_id"]; err == nil && !ok { dataMap["tenant_id"] = context["tenant_id"] } if tenantID, ok := dataMap["tenant_id"]; ok && tenantID != nil { dataMap["tenant_name"], err = identityService.GetTenantName(tenantID.(string)) if err != nil { return ResourceError{err, err.Error(), Unauthorized} } } //Apply policy for api input err = policy.Check(schema.ActionCreate, auth, dataMap) if err != nil { return ResourceError{err, err.Error(), Unauthorized} } delete(dataMap, "tenant_name") // apply property filter err = policy.ApplyPropertyConditionFilter(schema.ActionCreate, dataMap, nil) if err != nil { return ResourceError{err, err.Error(), Unauthorized} } context["resource"] = dataMap if id, ok := dataMap["id"]; !ok || id == "" { dataMap["id"] = uuid.NewV4().String() } context["id"] = dataMap["id"] if err := extension.HandleEvent(context, environment, "pre_create"); err != nil { return err } if resourceData, ok := context["resource"].(map[string]interface{}); ok { dataMap = resourceData } //Validation err = resourceSchema.ValidateOnCreate(dataMap) if err != nil { return ResourceError{err, fmt.Sprintf("Validation error: %s", err), WrongData} } resource, err := manager.LoadResource(resourceSchema.ID, dataMap) if err != nil { return err } //Fillup default err = resource.PopulateDefaults() if err != nil { return err } context["resource"] = resource.Data() if err := InTransaction( context, dataStore, transaction.GetIsolationLevel(resourceSchema, schema.ActionCreate), func() error { return CreateResourceInTransaction(context, resource) }, ); err != nil { return err } if err := extension.HandleEvent(context, environment, "post_create"); err != nil { return err } if err := ApplyPolicyForResource(context, resourceSchema); err != nil { return ResourceError{err, "", Unauthorized} } return nil }