Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ require (
github.com/lib/pq v1.10.9
github.com/mattn/go-sqlite3 v1.14.22
github.com/robfig/cron/v3 v3.0.1
golang.org/x/crypto v0.32.0
golang.org/x/oauth2 v0.34.0
gopkg.in/yaml.v3 v3.0.1
)
Expand Down Expand Up @@ -60,7 +61,6 @@ require (
github.com/twitchyliquid64/golang-asm v0.15.1 // indirect
github.com/ugorji/go/codec v1.2.11 // indirect
golang.org/x/arch v0.3.0 // indirect
golang.org/x/crypto v0.32.0 // indirect
golang.org/x/net v0.34.0 // indirect
golang.org/x/sys v0.29.0 // indirect
golang.org/x/text v0.21.0 // indirect
Expand Down
198 changes: 198 additions & 0 deletions internal/api/apikeys.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,198 @@
package api

import (
"net/http"
"strconv"
"time"

"github.com/flatrun/agent/internal/auth"
"github.com/gin-gonic/gin"
)

func (s *Server) getAPIKeyWithAuth(c *gin.Context) (*auth.APIKey, bool) {
idStr := c.Param("id")
id, err := strconv.ParseInt(idStr, 10, 64)
if err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid API key ID"})
return nil, false
}

key, err := s.authManager.GetAPIKey(id)
if err == auth.ErrAPIKeyNotFound {
c.JSON(http.StatusNotFound, gin.H{"error": "API key not found"})
return nil, false
}
if err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to get API key"})
return nil, false
}

actor := auth.GetActorFromContext(c)
if actor.Role != auth.RoleAdmin && (actor.User == nil || actor.User.ID != key.UserID) {
c.JSON(http.StatusForbidden, gin.H{"error": "Access denied"})
return nil, false
}

return key, true
}

func (s *Server) listAPIKeys(c *gin.Context) {
actor := auth.GetActorFromContext(c)
if actor == nil {
c.JSON(http.StatusUnauthorized, gin.H{"error": "Not authenticated"})
return
}

var keys []auth.APIKey
var err error

if actor.Role == auth.RoleAdmin {
keys, err = s.authManager.GetAllAPIKeys()
} else if actor.User != nil {
keys, err = s.authManager.GetAPIKeysByUser(actor.User.ID)
} else {
c.JSON(http.StatusForbidden, gin.H{"error": "Cannot list API keys"})
return
}

if err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to list API keys"})
return
}

response := make([]gin.H, 0, len(keys))
for _, k := range keys {
response = append(response, apiKeyToResponse(&k))
}

c.JSON(http.StatusOK, gin.H{"api_keys": response})
}

func (s *Server) getAPIKey(c *gin.Context) {
key, ok := s.getAPIKeyWithAuth(c)
if !ok {
return
}

c.JSON(http.StatusOK, gin.H{"api_key": apiKeyToResponse(key)})
}

func (s *Server) createAPIKey(c *gin.Context) {
actor := auth.GetActorFromContext(c)
if actor == nil || actor.User == nil {
c.JSON(http.StatusUnauthorized, gin.H{"error": "Not authenticated"})
return
}

var req struct {
Name string `json:"name" binding:"required"`
Description string `json:"description"`
Role auth.Role `json:"role"`
Permissions []string `json:"permissions"`
Deployments []string `json:"deployments"`
ExpiresIn int `json:"expires_in"`
UserID int64 `json:"user_id"`
}

if err := c.ShouldBindJSON(&req); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid request body"})
return
}

userID := actor.User.ID
if req.UserID > 0 && actor.Role == auth.RoleAdmin {
userID = req.UserID
}

if req.Role != "" && !req.Role.IsValid() {
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid role"})
return
}

if actor.Role != auth.RoleAdmin {
if req.Role == auth.RoleAdmin {
c.JSON(http.StatusForbidden, gin.H{"error": "Cannot create admin API key"})
return
}
for _, p := range req.Permissions {
if !actor.HasPermission(auth.Permission(p)) {
c.JSON(http.StatusForbidden, gin.H{"error": "Cannot grant permission you don't have: " + p})
return
}
}
}

var expiresAt time.Time
if req.ExpiresIn > 0 {
expiresAt = time.Now().Add(time.Duration(req.ExpiresIn) * time.Second)
}

key, plainKey, err := s.authManager.CreateAPIKey(
userID,
req.Name,
req.Description,
req.Role,
req.Permissions,
req.Deployments,
expiresAt,
)
if err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to create API key"})
return
}

response := apiKeyToResponse(key)
response["key"] = plainKey

c.JSON(http.StatusCreated, gin.H{
"api_key": response,
"message": "Save this key securely. It will not be shown again.",
})
}

func (s *Server) deleteAPIKey(c *gin.Context) {
key, ok := s.getAPIKeyWithAuth(c)
if !ok {
return
}

if err := s.authManager.DeleteAPIKey(key.ID); err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to delete API key"})
return
}

c.JSON(http.StatusOK, gin.H{"message": "API key deleted"})
}

func (s *Server) revokeAPIKey(c *gin.Context) {
key, ok := s.getAPIKeyWithAuth(c)
if !ok {
return
}

if err := s.authManager.DeactivateAPIKey(key.ID); err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to revoke API key"})
return
}

c.JSON(http.StatusOK, gin.H{"message": "API key revoked"})
}

func apiKeyToResponse(k *auth.APIKey) gin.H {
return gin.H{
"id": k.ID,
"key_id": k.KeyID,
"user_id": k.UserID,
"name": k.Name,
"description": k.Description,
"key_prefix": k.KeyPrefix,
"role": k.Role,
"permissions": k.Permissions,
"deployments": k.Deployments,
"expires_at": k.ExpiresAt,
"last_used_at": k.LastUsedAt,
"last_used_ip": k.LastUsedIP,
"is_active": k.IsActive,
"created_at": k.CreatedAt,
}
}
Loading
Loading