@@ -183,22 +183,26 @@ func (handler BulkUpdateRestHandlerImpl) GetImpactedAppsName(w http.ResponseWrit
183
183
ok := handler .CheckAuthForImpactedObjects (deploymentTemplateImpactedApp .AppId , deploymentTemplateImpactedApp .EnvId , appResourceObjects , envResourceObjects , token )
184
184
if ! ok {
185
185
common .WriteJsonResp (w , fmt .Errorf ("unauthorized user" ), "Unauthorized User" , http .StatusForbidden )
186
+ return
186
187
}
187
188
}
188
189
for _ , configMapImpactedApp := range impactedApps .ConfigMap {
189
190
ok := handler .CheckAuthForImpactedObjects (configMapImpactedApp .AppId , configMapImpactedApp .EnvId , appResourceObjects , envResourceObjects , token )
190
191
if ! ok {
191
192
common .WriteJsonResp (w , fmt .Errorf ("unauthorized user" ), "Unauthorized User" , http .StatusForbidden )
193
+ return
192
194
}
193
195
}
194
196
for _ , secretImpactedApp := range impactedApps .Secret {
195
197
ok := handler .CheckAuthForImpactedObjects (secretImpactedApp .AppId , secretImpactedApp .EnvId , appResourceObjects , envResourceObjects , token )
196
198
if ! ok {
197
199
common .WriteJsonResp (w , fmt .Errorf ("unauthorized user" ), "Unauthorized User" , http .StatusForbidden )
200
+ return
198
201
}
199
202
}
200
203
common .WriteJsonResp (w , err , impactedApps , http .StatusOK )
201
204
}
205
+
202
206
func (handler BulkUpdateRestHandlerImpl ) CheckAuthForBulkUpdate (AppId int , EnvId int , AppName string , rbacObjects map [int ]string , token string ) bool {
203
207
resourceName := rbacObjects [AppId ]
204
208
if ok := handler .enforcer .Enforce (token , casbin .ResourceApplications , casbin .ActionUpdate , resourceName ); ! ok {
@@ -243,18 +247,21 @@ func (handler BulkUpdateRestHandlerImpl) BulkUpdate(w http.ResponseWriter, r *ht
243
247
ok := handler .CheckAuthForBulkUpdate (deploymentTemplateImpactedApp .AppId , deploymentTemplateImpactedApp .EnvId , deploymentTemplateImpactedApp .AppName , rbacObjects , token )
244
248
if ! ok {
245
249
common .WriteJsonResp (w , fmt .Errorf ("unauthorized user" ), "Unauthorized User" , http .StatusForbidden )
250
+ return
246
251
}
247
252
}
248
253
for _ , configMapImpactedApp := range impactedApps .ConfigMap {
249
254
ok := handler .CheckAuthForBulkUpdate (configMapImpactedApp .AppId , configMapImpactedApp .EnvId , configMapImpactedApp .AppName , rbacObjects , token )
250
255
if ! ok {
251
256
common .WriteJsonResp (w , fmt .Errorf ("unauthorized user" ), "Unauthorized User" , http .StatusForbidden )
257
+ return
252
258
}
253
259
}
254
260
for _ , secretImpactedApp := range impactedApps .Secret {
255
261
ok := handler .CheckAuthForBulkUpdate (secretImpactedApp .AppId , secretImpactedApp .EnvId , secretImpactedApp .AppName , rbacObjects , token )
256
262
if ! ok {
257
263
common .WriteJsonResp (w , fmt .Errorf ("unauthorized user" ), "Unauthorized User" , http .StatusForbidden )
264
+ return
258
265
}
259
266
}
260
267
isSuperAdmin := handler .enforcer .Enforce (token , casbin .ResourceGlobal , casbin .ActionCreate , "*" )
0 commit comments