infrastructure for account delete api endpoint (#993)

This commit is contained in:
Michael Quigley 2025-06-25 14:04:23 -04:00
parent 2aefe7e963
commit 9d90f7a2cc
No known key found for this signature in database
GPG Key ID: 9B60314A9DD20A62
5 changed files with 122 additions and 31 deletions

View File

@ -58,6 +58,7 @@ func Run(inCfg *config.Config) error {
api.AdminCreateFrontendHandler = newCreateFrontendHandler() api.AdminCreateFrontendHandler = newCreateFrontendHandler()
api.AdminCreateIdentityHandler = newCreateIdentityHandler() api.AdminCreateIdentityHandler = newCreateIdentityHandler()
api.AdminCreateOrganizationHandler = newCreateOrganizationHandler() api.AdminCreateOrganizationHandler = newCreateOrganizationHandler()
api.AdminDeleteAccountHandler = newDeleteAccountHandler()
api.AdminDeleteFrontendGrantHandler = newDeleteFrontendGrantHandler() api.AdminDeleteFrontendGrantHandler = newDeleteFrontendGrantHandler()
api.AdminDeleteFrontendHandler = newDeleteFrontendHandler() api.AdminDeleteFrontendHandler = newDeleteFrontendHandler()
api.AdminDeleteOrganizationHandler = newDeleteOrganizationHandler() api.AdminDeleteOrganizationHandler = newDeleteOrganizationHandler()

View File

@ -16,7 +16,7 @@ func newCreateAccountHandler() *createAccountHandler {
func (h *createAccountHandler) Handle(params admin.CreateAccountParams, principal *rest_model_zrok.Principal) middleware.Responder { func (h *createAccountHandler) Handle(params admin.CreateAccountParams, principal *rest_model_zrok.Principal) middleware.Responder {
if !principal.Admin { if !principal.Admin {
logrus.Errorf("invalid admin principal") logrus.Error("invalid admin principal")
return admin.NewCreateAccountUnauthorized() return admin.NewCreateAccountUnauthorized()
} }
@ -36,9 +36,8 @@ func (h *createAccountHandler) Handle(params admin.CreateAccountParams, principa
logrus.Errorf("error starting transaction: %v", err) logrus.Errorf("error starting transaction: %v", err)
return admin.NewCreateAccountInternalServerError() return admin.NewCreateAccountInternalServerError()
} }
defer func() { defer trx.Rollback()
_ = trx.Rollback()
}()
a := &store.Account{ a := &store.Account{
Email: params.Body.Email, Email: params.Body.Email,
Salt: hpwd.Salt, Salt: hpwd.Salt,

View File

@ -0,0 +1,72 @@
package controller
import (
"github.com/go-openapi/runtime/middleware"
"github.com/openziti/zrok/controller/zrokEdgeSdk"
"github.com/openziti/zrok/rest_model_zrok"
"github.com/openziti/zrok/rest_server_zrok/operations/admin"
"github.com/sirupsen/logrus"
)
type deleteAccountHandler struct{}
func newDeleteAccountHandler() *deleteAccountHandler {
return &deleteAccountHandler{}
}
func (h *deleteAccountHandler) Handle(params admin.DeleteAccountParams, principal *rest_model_zrok.Principal) middleware.Responder {
if !principal.Admin {
logrus.Error("invalid admin principal")
return admin.NewDeleteAccountUnauthorized()
}
logrus.Infof("starting deletion of account with email '%s'", params.Body.Email)
trx, err := str.Begin()
if err != nil {
logrus.Errorf("error starting transaction: %v", err)
return admin.NewDeleteAccountInternalServerError()
}
defer trx.Rollback()
account, err := str.FindAccountWithEmail(params.Body.Email, trx)
if err != nil {
logrus.Errorf("error finding account with email '%s': %v", params.Body.Email, err)
return admin.NewDeleteAccountNotFound()
}
envs, err := str.FindEnvironmentsForAccount(account.Id, trx)
if err != nil {
logrus.Errorf("error finding environments for account '%s': %v", params.Body.Email, err)
return admin.NewDeleteAccountInternalServerError()
}
logrus.Infof("found %d environments to clean up for account '%s'", len(envs), params.Body.Email)
edge, err := zrokEdgeSdk.Client(cfg.Ziti)
if err != nil {
logrus.Errorf("error getting edge client: %v", err)
return admin.NewDeleteAccountInternalServerError()
}
for _, env := range envs {
logrus.Infof("disabling environment %d (ZId: %s) for account '%s'", env.Id, env.ZId, params.Body.Email)
if err := disableEnvironment(env, trx, edge); err != nil {
logrus.Errorf("error disabling environment %d for account '%s': %v", env.Id, params.Body.Email, err)
return admin.NewDeleteAccountInternalServerError()
}
logrus.Infof("successfully disabled environment %d for account '%s'", env.Id, params.Body.Email)
}
if err := str.DeleteAccount(account.Id, trx); err != nil {
logrus.Errorf("error deleting account '%s': %v", params.Body.Email, err)
return admin.NewDeleteAccountInternalServerError()
}
if err := trx.Commit(); err != nil {
logrus.Errorf("error committing transaction: %v", err)
return admin.NewDeleteAccountInternalServerError()
}
logrus.Infof("successfully deleted account '%s'", params.Body.Email)
return admin.NewDeleteAccountOK()
}

View File

@ -3,6 +3,8 @@ package controller
import ( import (
"context" "context"
"fmt" "fmt"
"time"
"github.com/go-openapi/runtime/middleware" "github.com/go-openapi/runtime/middleware"
"github.com/jmoiron/sqlx" "github.com/jmoiron/sqlx"
"github.com/openziti/edge-api/rest_management_api_client" "github.com/openziti/edge-api/rest_management_api_client"
@ -13,7 +15,6 @@ import (
"github.com/openziti/zrok/rest_server_zrok/operations/environment" "github.com/openziti/zrok/rest_server_zrok/operations/environment"
"github.com/pkg/errors" "github.com/pkg/errors"
"github.com/sirupsen/logrus" "github.com/sirupsen/logrus"
"time"
) )
type disableHandler struct{} type disableHandler struct{}
@ -29,48 +30,55 @@ func (h *disableHandler) Handle(params environment.DisableParams, principal *res
return environment.NewDisableInternalServerError() return environment.NewDisableInternalServerError()
} }
defer func() { _ = trx.Rollback() }() defer func() { _ = trx.Rollback() }()
env, err := str.FindEnvironmentForAccount(params.Body.Identity, int(principal.ID), trx) env, err := str.FindEnvironmentForAccount(params.Body.Identity, int(principal.ID), trx)
if err != nil { if err != nil {
logrus.Errorf("identity check failed for user '%v': %v", principal.Email, err) logrus.Errorf("identity check failed for user '%v': %v", principal.Email, err)
return environment.NewDisableUnauthorized() return environment.NewDisableUnauthorized()
} }
edge, err := zrokEdgeSdk.Client(cfg.Ziti) edge, err := zrokEdgeSdk.Client(cfg.Ziti)
if err != nil { if err != nil {
logrus.Errorf("error getting edge client for user '%v': %v", principal.Email, err) logrus.Errorf("error getting edge client for user '%v': %v", principal.Email, err)
return environment.NewDisableInternalServerError() return environment.NewDisableInternalServerError()
} }
if err := h.removeSharesForEnvironment(env, trx, edge); err != nil {
logrus.Errorf("error removing shares for environment for user '%v': %v", principal.Email, err) if err := disableEnvironment(env, trx, edge); err != nil {
return environment.NewDisableInternalServerError() logrus.Errorf("error disabling environment for user '%v': %v", principal.Email, err)
}
if err := h.removeFrontendsForEnvironment(env, trx, edge); err != nil {
logrus.Errorf("error removing frontends for environment for user '%v': %v", principal.Email, err)
return environment.NewDisableInternalServerError()
}
if err := h.removeAgentRemoteForEnvironment(env, trx, edge); err != nil {
logrus.Errorf("error removing agent remote for '%v' (%v): %v", env.ZId, principal.Email, err)
return environment.NewDisableInternalServerError()
}
if err := zrokEdgeSdk.DeleteEdgeRouterPolicy(env.ZId, edge); err != nil {
logrus.Errorf("error deleting edge router policy for user '%v': %v", principal.Email, err)
return environment.NewDisableInternalServerError()
}
if err := zrokEdgeSdk.DeleteIdentity(env.ZId, edge); err != nil {
logrus.Errorf("error deleting identity for user '%v': %v", principal.Email, err)
return environment.NewDisableInternalServerError()
}
if err := h.removeEnvironmentFromStore(env, trx); err != nil {
logrus.Errorf("error removing environment for user '%v': %v", principal.Email, err)
return environment.NewDisableInternalServerError() return environment.NewDisableInternalServerError()
} }
if err := trx.Commit(); err != nil { if err := trx.Commit(); err != nil {
logrus.Errorf("error committing for user '%v': %v", principal.Email, err) logrus.Errorf("error committing for user '%v': %v", principal.Email, err)
return environment.NewDisableInternalServerError() return environment.NewDisableInternalServerError()
} }
return environment.NewDisableOK() return environment.NewDisableOK()
} }
func (h *disableHandler) removeSharesForEnvironment(env *store.Environment, trx *sqlx.Tx, edge *rest_management_api_client.ZitiEdgeManagement) error { func disableEnvironment(env *store.Environment, trx *sqlx.Tx, edge *rest_management_api_client.ZitiEdgeManagement) error {
if err := removeSharesForEnvironment(env, trx, edge); err != nil {
return errors.Wrapf(err, "error removing shares for environment '%v'", env.ZId)
}
if err := removeFrontendsForEnvironment(env, trx, edge); err != nil {
return errors.Wrapf(err, "error removing frontends for environment '%v'", env.ZId)
}
if err := removeAgentRemoteForEnvironment(env, trx, edge); err != nil {
return errors.Wrapf(err, "error removing agent remote for '%v'", env.ZId)
}
if err := zrokEdgeSdk.DeleteEdgeRouterPolicy(env.ZId, edge); err != nil {
return errors.Wrapf(err, "error deleting edge router policy for environment '%v'", env.ZId)
}
if err := zrokEdgeSdk.DeleteIdentity(env.ZId, edge); err != nil {
return errors.Wrapf(err, "error deleting identity for environment '%v'", env.ZId)
}
if err := removeEnvironmentFromStore(env, trx); err != nil {
return errors.Wrapf(err, "error removing environment '%v' from store", env.ZId)
}
return nil
}
func removeSharesForEnvironment(env *store.Environment, trx *sqlx.Tx, edge *rest_management_api_client.ZitiEdgeManagement) error {
shrs, err := str.FindSharesForEnvironment(env.Id, trx) shrs, err := str.FindSharesForEnvironment(env.Id, trx)
if err != nil { if err != nil {
return err return err
@ -98,7 +106,7 @@ func (h *disableHandler) removeSharesForEnvironment(env *store.Environment, trx
return nil return nil
} }
func (h *disableHandler) removeFrontendsForEnvironment(env *store.Environment, trx *sqlx.Tx, edge *rest_management_api_client.ZitiEdgeManagement) error { func removeFrontendsForEnvironment(env *store.Environment, trx *sqlx.Tx, edge *rest_management_api_client.ZitiEdgeManagement) error {
fes, err := str.FindFrontendsForEnvironment(env.Id, trx) fes, err := str.FindFrontendsForEnvironment(env.Id, trx)
if err != nil { if err != nil {
return err return err
@ -111,7 +119,7 @@ func (h *disableHandler) removeFrontendsForEnvironment(env *store.Environment, t
return nil return nil
} }
func (h *disableHandler) removeAgentRemoteForEnvironment(env *store.Environment, trx *sqlx.Tx, edge *rest_management_api_client.ZitiEdgeManagement) error { func removeAgentRemoteForEnvironment(env *store.Environment, trx *sqlx.Tx, edge *rest_management_api_client.ZitiEdgeManagement) error {
enrolled, err := str.IsAgentEnrolledForEnvironment(env.Id, trx) enrolled, err := str.IsAgentEnrolledForEnvironment(env.Id, trx)
if err != nil { if err != nil {
return err return err
@ -160,7 +168,7 @@ func (h *disableHandler) removeAgentRemoteForEnvironment(env *store.Environment,
return nil return nil
} }
func (h *disableHandler) removeEnvironmentFromStore(env *store.Environment, trx *sqlx.Tx) error { func removeEnvironmentFromStore(env *store.Environment, trx *sqlx.Tx) error {
shrs, err := str.FindSharesForEnvironment(env.Id, trx) shrs, err := str.FindSharesForEnvironment(env.Id, trx)
if err != nil { if err != nil {
return errors.Wrapf(err, "error finding shares for environment '%d'", env.Id) return errors.Wrapf(err, "error finding shares for environment '%d'", env.Id)

View File

@ -70,3 +70,14 @@ func (str *Store) UpdateAccount(a *Account, tx *sqlx.Tx) (int, error) {
} }
return id, nil return id, nil
} }
func (str *Store) DeleteAccount(id int, trx *sqlx.Tx) error {
stmt, err := trx.Prepare("update accounts set deleted = true where id = $1")
if err != nil {
return errors.Wrap(err, "error preparing accounts delete statement")
}
if _, err := stmt.Exec(id); err != nil {
return errors.Wrap(err, "error executing accounts delete statement")
}
return nil
}