@@ -32,6 +32,7 @@ import (
3232 "gopkg.in/go-playground/validator.v9"
3333 "net/http"
3434 "strconv"
35+ "strings"
3536)
3637
3738type UserRestHandler interface {
@@ -97,7 +98,7 @@ func (handler UserRestHandlerImpl) CreateUser(w http.ResponseWriter, r *http.Req
9798 if userInfo .RoleFilters != nil && len (userInfo .RoleFilters ) > 0 {
9899 for _ , filter := range userInfo .RoleFilters {
99100 if len (filter .Team ) > 0 {
100- if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionCreate , filter .Team ); ! ok {
101+ if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionCreate , strings . ToLower ( filter .Team ) ); ! ok {
101102 response .WriteResponse (http .StatusForbidden , "FORBIDDEN" , w , errors .New ("unauthorized" ))
102103 return
103104 }
@@ -122,7 +123,7 @@ func (handler UserRestHandlerImpl) CreateUser(w http.ResponseWriter, r *http.Req
122123 if groupRoles != nil && len (groupRoles ) > 0 {
123124 for _ , groupRole := range groupRoles {
124125 if len (groupRole .Team ) > 0 {
125- if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionCreate , groupRole .Team ); ! ok {
126+ if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionCreate , strings . ToLower ( groupRole .Team ) ); ! ok {
126127 response .WriteResponse (http .StatusForbidden , "FORBIDDEN" , w , errors .New ("unauthorized" ))
127128 return
128129 }
@@ -182,7 +183,7 @@ func (handler UserRestHandlerImpl) UpdateUser(w http.ResponseWriter, r *http.Req
182183 if userInfo .RoleFilters != nil && len (userInfo .RoleFilters ) > 0 {
183184 for _ , filter := range userInfo .RoleFilters {
184185 if len (filter .Team ) > 0 {
185- if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionUpdate , filter .Team ); ! ok {
186+ if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionUpdate , strings . ToLower ( filter .Team ) ); ! ok {
186187 response .WriteResponse (http .StatusForbidden , "FORBIDDEN" , w , errors .New ("unauthorized" ))
187188 return
188189 }
@@ -207,7 +208,7 @@ func (handler UserRestHandlerImpl) UpdateUser(w http.ResponseWriter, r *http.Req
207208 if groupRoles != nil && len (groupRoles ) > 0 {
208209 for _ , groupRole := range groupRoles {
209210 if len (groupRole .Team ) > 0 {
210- if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionUpdate , groupRole .Team ); ! ok {
211+ if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionUpdate , strings . ToLower ( groupRole .Team ) ); ! ok {
211212 response .WriteResponse (http .StatusForbidden , "FORBIDDEN" , w , errors .New ("unauthorized" ))
212213 return
213214 }
@@ -277,7 +278,7 @@ func (handler UserRestHandlerImpl) GetById(w http.ResponseWriter, r *http.Reques
277278 authPass := false
278279 for _ , filter := range res .RoleFilters {
279280 if len (filter .Team ) > 0 {
280- if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionGet , filter .Team ); ok {
281+ if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionGet , strings . ToLower ( filter .Team ) ); ok {
281282 authPass = true
282283 }
283284 }
@@ -338,7 +339,7 @@ func (handler UserRestHandlerImpl) GetUsersByFilter(w http.ResponseWriter, r *ht
338339 pass := true
339340 for _ , filter := range item .RoleFilters {
340341 if len (filter .Team ) > 0 {
341- if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionGet , filter .Team ); ! ok {
342+ if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionGet , strings . ToLower ( filter .Team ) ); ! ok {
342343 pass = false
343344 }
344345 }
@@ -370,7 +371,7 @@ func (handler UserRestHandlerImpl) GetUserByEmail(w http.ResponseWriter, r *http
370371 if res .RoleFilters != nil && len (res .RoleFilters ) > 0 {
371372 for _ , filter := range res .RoleFilters {
372373 if len (filter .Team ) > 0 {
373- if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionGet , filter .Team ); ! ok {
374+ if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionGet , strings . ToLower ( filter .Team ) ); ! ok {
374375 response .WriteResponse (http .StatusForbidden , "FORBIDDEN" , w , errors .New ("unauthorized" ))
375376 return
376377 }
@@ -408,7 +409,7 @@ func (handler UserRestHandlerImpl) DeleteUser(w http.ResponseWriter, r *http.Req
408409 if user .RoleFilters != nil && len (user .RoleFilters ) > 0 {
409410 for _ , filter := range user .RoleFilters {
410411 if len (filter .Team ) > 0 {
411- if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionDelete , filter .Team ); ! ok {
412+ if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionDelete , strings . ToLower ( filter .Team ) ); ! ok {
412413 response .WriteResponse (http .StatusForbidden , "FORBIDDEN" , w , errors .New ("unauthorized" ))
413414 return
414415 }
@@ -454,7 +455,7 @@ func (handler UserRestHandlerImpl) FetchRoleGroupById(w http.ResponseWriter, r *
454455 if res .RoleFilters != nil && len (res .RoleFilters ) > 0 {
455456 for _ , filter := range res .RoleFilters {
456457 if len (filter .Team ) > 0 {
457- if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionGet , filter .Team ); ! ok {
458+ if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionGet , strings . ToLower ( filter .Team ) ); ! ok {
458459 response .WriteResponse (http .StatusForbidden , "FORBIDDEN" , w , errors .New ("unauthorized" ))
459460 return
460461 }
@@ -488,7 +489,7 @@ func (handler UserRestHandlerImpl) CreateRoleGroup(w http.ResponseWriter, r *htt
488489 if request .RoleFilters != nil && len (request .RoleFilters ) > 0 {
489490 for _ , filter := range request .RoleFilters {
490491 if len (filter .Team ) > 0 {
491- if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionCreate , filter .Team ); ! ok {
492+ if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionCreate , strings . ToLower ( filter .Team ) ); ! ok {
492493 response .WriteResponse (http .StatusForbidden , "FORBIDDEN" , w , errors .New ("unauthorized" ))
493494 return
494495 }
@@ -543,7 +544,7 @@ func (handler UserRestHandlerImpl) UpdateRoleGroup(w http.ResponseWriter, r *htt
543544 if request .RoleFilters != nil && len (request .RoleFilters ) > 0 {
544545 for _ , filter := range request .RoleFilters {
545546 if len (filter .Team ) > 0 {
546- if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionUpdate , filter .Team ); ! ok {
547+ if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionUpdate , strings . ToLower ( filter .Team ) ); ! ok {
547548 response .WriteResponse (http .StatusForbidden , "FORBIDDEN" , w , errors .New ("unauthorized" ))
548549 return
549550 }
@@ -633,7 +634,7 @@ func (handler UserRestHandlerImpl) DeleteRoleGroup(w http.ResponseWriter, r *htt
633634 if userGroup .RoleFilters != nil && len (userGroup .RoleFilters ) > 0 {
634635 for _ , filter := range userGroup .RoleFilters {
635636 if len (filter .Team ) > 0 {
636- if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionDelete , filter .Team ); ! ok {
637+ if ok := handler .enforcer .Enforce (token , rbac .ResourceUser , rbac .ActionDelete , strings . ToLower ( filter .Team ) ); ! ok {
637638 response .WriteResponse (http .StatusForbidden , "FORBIDDEN" , w , errors .New ("unauthorized" ))
638639 return
639640 }
0 commit comments