forked from
tangled.org/core
Monorepo for Tangled — https://tangled.org
1package xrpc
2
3import (
4 "encoding/json"
5 "fmt"
6 "net/http"
7 "time"
8
9 "github.com/bluesky-social/indigo/api/atproto"
10 "github.com/bluesky-social/indigo/atproto/syntax"
11 "github.com/bluesky-social/indigo/xrpc"
12 securejoin "github.com/cyphar/filepath-securejoin"
13 "tangled.sh/tangled.sh/core/api/tangled"
14 "tangled.sh/tangled.sh/core/rbac"
15 "tangled.sh/tangled.sh/core/spindle/secrets"
16)
17
18func (x *Xrpc) ListSecrets(w http.ResponseWriter, r *http.Request) {
19 l := x.Logger
20 fail := func(e XrpcError) {
21 l.Error("failed", "kind", e.Tag, "error", e.Message)
22 writeError(w, e, http.StatusBadRequest)
23 }
24
25 actorDid, ok := r.Context().Value(ActorDid).(syntax.DID)
26 if !ok {
27 fail(MissingActorDidError)
28 return
29 }
30
31 repoParam := r.URL.Query().Get("repo")
32 if repoParam == "" {
33 fail(GenericError(fmt.Errorf("empty params")))
34 return
35 }
36
37 // unfortunately we have to resolve repo-at here
38 repoAt, err := syntax.ParseATURI(repoParam)
39 if err != nil {
40 fail(InvalidRepoError(repoParam))
41 return
42 }
43
44 // resolve this aturi to extract the repo record
45 ident, err := x.Resolver.ResolveIdent(r.Context(), repoAt.Authority().String())
46 if err != nil || ident.Handle.IsInvalidHandle() {
47 fail(GenericError(fmt.Errorf("failed to resolve handle: %w", err)))
48 return
49 }
50
51 xrpcc := xrpc.Client{Host: ident.PDSEndpoint()}
52 resp, err := atproto.RepoGetRecord(r.Context(), &xrpcc, "", tangled.RepoNSID, repoAt.Authority().String(), repoAt.RecordKey().String())
53 if err != nil {
54 fail(GenericError(err))
55 return
56 }
57
58 repo := resp.Value.Val.(*tangled.Repo)
59 didPath, err := securejoin.SecureJoin(repo.Owner, repo.Name)
60 if err != nil {
61 fail(GenericError(err))
62 return
63 }
64
65 if ok, err := x.Enforcer.IsSettingsAllowed(actorDid.String(), rbac.ThisServer, didPath); !ok || err != nil {
66 l.Error("insufficent permissions", "did", actorDid.String())
67 writeError(w, AccessControlError(actorDid.String()), http.StatusUnauthorized)
68 return
69 }
70
71 ls, err := x.Vault.GetSecretsLocked(r.Context(), secrets.DidSlashRepo(didPath))
72 if err != nil {
73 l.Error("failed to get secret from vault", "did", actorDid.String(), "err", err)
74 writeError(w, GenericError(err), http.StatusInternalServerError)
75 return
76 }
77
78 var out tangled.RepoListSecrets_Output
79 for _, l := range ls {
80 out.Secrets = append(out.Secrets, &tangled.RepoListSecrets_Secret{
81 Repo: repoAt.String(),
82 Key: l.Key,
83 CreatedAt: l.CreatedAt.Format(time.RFC3339),
84 CreatedBy: l.CreatedBy.String(),
85 })
86 }
87
88 w.Header().Set("Content-Type", "application/json")
89 w.WriteHeader(http.StatusOK)
90 json.NewEncoder(w).Encode(out)
91}