forked from
tangled.org/core
Monorepo for Tangled — https://tangled.org
1package xrpc
2
3import (
4 "encoding/json"
5 "fmt"
6 "net/http"
7
8 "github.com/bluesky-social/indigo/api/atproto"
9 "github.com/bluesky-social/indigo/atproto/syntax"
10 "github.com/bluesky-social/indigo/xrpc"
11 securejoin "github.com/cyphar/filepath-securejoin"
12 "tangled.sh/tangled.sh/core/api/tangled"
13 "tangled.sh/tangled.sh/core/rbac"
14 "tangled.sh/tangled.sh/core/spindle/secrets"
15)
16
17func (x *Xrpc) RemoveSecret(w http.ResponseWriter, r *http.Request) {
18 l := x.Logger
19 fail := func(e XrpcError) {
20 l.Error("failed", "kind", e.Tag, "error", e.Message)
21 writeError(w, e, http.StatusBadRequest)
22 }
23
24 actorDid, ok := r.Context().Value(ActorDid).(syntax.DID)
25 if !ok {
26 fail(MissingActorDidError)
27 return
28 }
29
30 var data tangled.RepoRemoveSecret_Input
31 if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
32 fail(GenericError(err))
33 return
34 }
35
36 // unfortunately we have to resolve repo-at here
37 repoAt, err := syntax.ParseATURI(data.Repo)
38 if err != nil {
39 fail(InvalidRepoError(data.Repo))
40 return
41 }
42
43 // resolve this aturi to extract the repo record
44 ident, err := x.Resolver.ResolveIdent(r.Context(), repoAt.Authority().String())
45 if err != nil || ident.Handle.IsInvalidHandle() {
46 fail(GenericError(fmt.Errorf("failed to resolve handle: %w", err)))
47 return
48 }
49
50 xrpcc := xrpc.Client{Host: ident.PDSEndpoint()}
51 resp, err := atproto.RepoGetRecord(r.Context(), &xrpcc, "", tangled.RepoNSID, repoAt.Authority().String(), repoAt.RecordKey().String())
52 if err != nil {
53 fail(GenericError(err))
54 return
55 }
56
57 repo := resp.Value.Val.(*tangled.Repo)
58 didPath, err := securejoin.SecureJoin(repo.Owner, repo.Name)
59 if err != nil {
60 fail(GenericError(err))
61 return
62 }
63
64 if ok, err := x.Enforcer.IsSettingsAllowed(actorDid.String(), rbac.ThisServer, didPath); !ok || err != nil {
65 l.Error("insufficent permissions", "did", actorDid.String())
66 writeError(w, AccessControlError(actorDid.String()), http.StatusUnauthorized)
67 return
68 }
69
70 secret := secrets.Secret[any]{
71 Repo: secrets.DidSlashRepo(didPath),
72 Key: data.Key,
73 }
74 err = x.Vault.RemoveSecret(r.Context(), secret)
75 if err != nil {
76 l.Error("failed to remove secret from vault", "did", actorDid.String(), "err", err)
77 writeError(w, GenericError(err), http.StatusInternalServerError)
78 return
79 }
80
81 w.WriteHeader(http.StatusOK)
82}