debian-mirror-gitlab/app/services/clusters/aws/authorize_role_service.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

75 lines
2 KiB
Ruby
Raw Normal View History

2020-01-01 13:55:28 +05:30
# frozen_string_literal: true
module Clusters
module Aws
class AuthorizeRoleService
attr_reader :user
Response = Struct.new(:status, :body)
ERRORS = [
ActiveRecord::RecordInvalid,
2020-09-03 11:15:55 +05:30
ActiveRecord::RecordNotFound,
2020-01-01 13:55:28 +05:30
Clusters::Aws::FetchCredentialsService::MissingRoleError,
::Aws::Errors::MissingCredentialsError,
::Aws::STS::Errors::ServiceError
].freeze
def initialize(user, params:)
@user = user
2021-01-29 00:20:46 +05:30
@role_arn = params[:role_arn]
@region = params[:region]
2020-01-01 13:55:28 +05:30
end
def execute
2020-09-03 11:15:55 +05:30
ensure_role_exists!
update_role_arn!
2020-01-01 13:55:28 +05:30
Response.new(:ok, credentials)
2020-10-24 23:57:45 +05:30
rescue *ERRORS => e
Gitlab::ErrorTracking.track_exception(e)
2021-02-22 17:27:13 +05:30
Response.new(:unprocessable_entity, response_details(e))
2020-01-01 13:55:28 +05:30
end
private
2021-01-29 00:20:46 +05:30
attr_reader :role, :role_arn, :region
2020-01-01 13:55:28 +05:30
2020-09-03 11:15:55 +05:30
def ensure_role_exists!
@role = ::Aws::Role.find_by_user_id!(user.id)
end
2020-01-01 13:55:28 +05:30
2020-09-03 11:15:55 +05:30
def update_role_arn!
2021-01-29 00:20:46 +05:30
role.update!(role_arn: role_arn, region: region)
2020-01-01 13:55:28 +05:30
end
def credentials
Clusters::Aws::FetchCredentialsService.new(role).execute
end
2021-02-22 17:27:13 +05:30
def response_details(exception)
message =
case exception
when ::Aws::STS::Errors::AccessDenied
_("Access denied: %{error}") % { error: exception.message }
when ::Aws::STS::Errors::ServiceError
_("AWS service error: %{error}") % { error: exception.message }
when ActiveRecord::RecordNotFound
_("Error: Unable to find AWS role for current user")
when ActiveRecord::RecordInvalid
exception.message
when Clusters::Aws::FetchCredentialsService::MissingRoleError
_("Error: No AWS provision role found for user")
when ::Aws::Errors::MissingCredentialsError
_("Error: No AWS credentials were supplied")
else
_('An error occurred while authorizing your role')
end
{ message: message }.compact
end
2020-01-01 13:55:28 +05:30
end
end
end