File size: 1,719 Bytes
1e92f2d |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 |
package permission
import "github.com/pkg/errors"
// Error represents an auth error where the context does not have
// a sufficient role for the operation.
type Error interface {
error
Permission() bool // Is the error permission denied?
Unauthorized() bool
}
type genericError struct {
unauthorized bool
reason string
stack errors.StackTrace
}
type stackTracer interface {
StackTrace() errors.StackTrace
}
func newGeneric(unauth bool, reason string) genericError {
return genericError{
unauthorized: unauth,
reason: reason,
stack: errors.New("").(stackTracer).StackTrace()[1:],
}
}
// NewAccessDenied will return a new generic access denied error.
func NewAccessDenied(reason string) error {
return newGeneric(false, reason)
}
// Unauthorized will return an unauthorized error.
func Unauthorized() error {
return newGeneric(true, "")
}
func (e genericError) ClientError() bool { return true }
func (e genericError) Permission() bool { return true }
func (e genericError) Unauthorized() bool { return e.unauthorized }
func (e genericError) Error() string {
prefix := "access denied"
if e.unauthorized {
prefix = "unauthorized"
}
if e.reason == "" {
return prefix
}
return prefix + ": " + e.reason
}
// IsPermissionError will determine if the root error cause is a permission error.
func IsPermissionError(err error) bool {
var e Error
if errors.As(err, &e) && e.Permission() {
return true
}
return false
}
// IsUnauthorized will determine if the root error cause is an unauthorized permission error.
func IsUnauthorized(err error) bool {
var e Error
if errors.As(err, &e) && e.Permission() && e.Unauthorized() {
return true
}
return false
}
|