422 lines
13 KiB
JavaScript
Raw Normal View History

'use strict';
2017-11-16 17:59:41 +01:00
const _ = require('lodash');
const request = require('request');
2017-12-07 18:16:18 +01:00
/**
* UsersPermissions.js service
*
* @description: A set of functions similar to controller's actions to avoid code duplication.
*/
const DEFAULT_PERMISSIONS = [
{ action: 'admincallback', controller: 'auth', type: 'users-permissions', roleType: 'public' },
{ action: 'adminregister', controller: 'auth', type: 'users-permissions', roleType: 'public' },
{ action: 'callback', controller: 'auth', type: 'users-permissions', roleType: 'public' },
{ action: 'connect', controller: 'auth', type: 'users-permissions', roleType: null },
{ action: 'forgotpassword', controller: 'auth', type: 'users-permissions', roleType: 'public' },
{ action: 'register', controller: 'auth', type: 'users-permissions', roleType: 'public' },
{
action: 'emailconfirmation',
controller: 'auth',
type: 'users-permissions',
roleType: 'public',
},
{ action: 'changepassword', controller: 'auth', type: 'users-permissions', roleType: 'public' },
{ action: 'init', controller: 'userspermissions', type: null, roleType: null },
{ action: 'me', controller: 'user', type: 'users-permissions', roleType: null },
{ action: 'autoreload', controller: null, type: null, roleType: null },
];
const isPermissionEnabled = (permission, role) =>
DEFAULT_PERMISSIONS.some(
defaultPerm =>
(defaultPerm.action === null || permission.action === defaultPerm.action) &&
(defaultPerm.controller === null || permission.controller === defaultPerm.controller) &&
(defaultPerm.type === null || permission.type === defaultPerm.type) &&
(defaultPerm.roleType === null || role.type === defaultPerm.roleType)
);
module.exports = {
async createRole(params) {
if (!params.type) {
params.type = _.snakeCase(_.deburr(_.toLower(params.name)));
}
const role = await strapi
.query('role', 'users-permissions')
.create(_.omit(params, ['users', 'permissions']));
const arrayOfPromises = Object.keys(params.permissions || {}).reduce((acc, type) => {
Object.keys(params.permissions[type].controllers).forEach(controller => {
Object.keys(params.permissions[type].controllers[controller]).forEach(action => {
acc.push(
strapi.query('permission', 'users-permissions').create({
role: role.id,
type,
controller,
action: action.toLowerCase(),
...params.permissions[type].controllers[controller][action],
})
);
});
});
2017-11-27 16:49:56 +01:00
return acc;
}, []);
// Use Content Manager business logic to handle relation.
2019-07-16 20:52:31 +02:00
if (params.users && params.users.length > 0)
arrayOfPromises.push(
strapi.query('role', 'users-permissions').update(
{
id: role.id,
},
{ users: params.users }
)
);
2017-12-01 16:06:16 +01:00
return await Promise.all(arrayOfPromises);
2017-11-27 17:02:45 +01:00
},
async deleteRole(roleID, publicRoleID) {
const role = await strapi
.query('role', 'users-permissions')
.findOne({ id: roleID }, ['users', 'permissions']);
if (!role) {
throw new Error('Cannot found this role');
}
// Move users to guest role.
const arrayOfPromises = role.users.reduce((acc, user) => {
acc.push(
strapi.query('user', 'users-permissions').update(
{
id: user.id,
},
{
role: publicRoleID,
}
)
);
return acc;
}, []);
2017-11-27 17:50:51 +01:00
// Remove permissions related to this role.
role.permissions.forEach(permission => {
arrayOfPromises.push(
strapi.query('permission', 'users-permissions').delete({
id: permission.id,
})
);
});
2017-12-01 16:06:16 +01:00
// Delete the role.
arrayOfPromises.push(strapi.query('role', 'users-permissions').delete({ id: roleID }));
2017-12-01 16:06:16 +01:00
return await Promise.all(arrayOfPromises);
2017-11-27 16:49:56 +01:00
},
getPlugins(lang = 'en') {
return new Promise(resolve => {
request(
{
uri: `https://marketplace.strapi.io/plugins?lang=${lang}`,
json: true,
timeout: 3000,
headers: {
'cache-control': 'max-age=3600',
},
},
(err, response, body) => {
if (err || response.statusCode !== 200) {
return resolve([]);
}
resolve(body);
2019-06-08 16:23:52 +02:00
}
);
});
},
getActions(plugins = [], withInfo = true) {
const generateActions = data =>
2017-11-17 14:22:59 +01:00
Object.keys(data).reduce((acc, key) => {
if (_.isFunction(data[key])) {
acc[key] = { enabled: false, policy: '' };
}
2017-11-17 14:22:59 +01:00
return acc;
}, {});
2017-11-17 14:22:59 +01:00
const appControllers = Object.keys(strapi.api || {})
.filter(key => !!strapi.api[key].controllers)
.reduce(
(acc, key) => {
Object.keys(strapi.api[key].controllers).forEach(controller => {
acc.controllers[controller] = generateActions(strapi.api[key].controllers[controller]);
});
return acc;
},
2019-06-08 16:23:52 +02:00
{ controllers: {} }
);
2017-11-16 17:59:41 +01:00
const pluginsPermissions = Object.keys(strapi.plugins).reduce((acc, key) => {
const initialState = {
controllers: {},
};
if (withInfo) {
initialState.information = plugins.find(plugin => plugin.id === key) || {};
}
acc[key] = Object.keys(strapi.plugins[key].controllers).reduce((obj, k) => {
obj.controllers[k] = generateActions(strapi.plugins[key].controllers[k]);
return obj;
}, initialState);
return acc;
}, {});
2017-11-16 17:59:41 +01:00
const permissions = {
application: {
controllers: appControllers.controllers,
},
2017-11-16 17:59:41 +01:00
};
return _.merge(permissions, pluginsPermissions);
2017-11-17 16:36:57 +01:00
},
2017-11-17 14:22:59 +01:00
async getRole(roleID, plugins) {
const role = await strapi
.query('role', 'users-permissions')
.findOne({ id: roleID }, ['users', 'permissions']);
if (!role) {
throw new Error('Cannot find this role');
}
2017-11-27 17:50:51 +01:00
2018-01-22 18:19:44 +01:00
// Group by `type`.
2019-07-18 15:49:24 +02:00
const permissions = role.permissions.reduce((acc, permission) => {
_.set(acc, `${permission.type}.controllers.${permission.controller}.${permission.action}`, {
enabled: _.toNumber(permission.enabled) == true,
policy: permission.policy,
});
if (permission.type !== 'application' && !acc[permission.type].information) {
acc[permission.type].information =
plugins.find(plugin => plugin.id === permission.type) || {};
2018-01-22 18:19:44 +01:00
}
return acc;
}, {});
2019-07-18 15:49:24 +02:00
return {
...role,
permissions,
};
2017-11-27 17:50:51 +01:00
},
async getRoles() {
const roles = await strapi.query('role', 'users-permissions').find({ _sort: 'name' }, []);
2017-11-27 16:04:57 +01:00
for (let i = 0; i < roles.length; ++i) {
roles[i].nb_users = await strapi
.query('user', 'users-permissions')
.count({ role: roles[i].id });
}
2017-11-27 16:04:57 +01:00
return roles;
2017-11-27 16:04:57 +01:00
},
async getRoutes() {
const routes = Object.keys(strapi.api || {}).reduce((acc, current) => {
return acc.concat(_.get(strapi.api[current].config, 'routes', []));
}, []);
const clonedPlugins = _.cloneDeep(strapi.plugins);
const pluginsRoutes = Object.keys(clonedPlugins || {}).reduce((acc, current) => {
const routes = _.get(clonedPlugins, [current, 'config', 'routes'], []).reduce((acc, curr) => {
const prefix = curr.config.prefix;
const path = prefix !== undefined ? `${prefix}${curr.path}` : `/${current}${curr.path}`;
_.set(curr, 'path', path);
2017-11-30 16:34:43 +01:00
return acc.concat(curr);
}, []);
acc[current] = routes;
return acc;
}, {});
2017-12-07 18:16:18 +01:00
return _.merge({ application: routes }, pluginsRoutes);
2017-11-30 16:34:43 +01:00
},
async updatePermissions() {
const { primaryKey } = strapi.query('permission', 'users-permissions');
const roles = await strapi.query('role', 'users-permissions').find({}, []);
const rolesMap = roles.reduce((map, role) => ({ ...map, [role[primaryKey]]: role }), {});
const dbPermissions = await strapi
.query('permission', 'users-permissions')
2019-04-09 16:01:01 +02:00
.find({ _limit: -1 });
let permissionsFoundInDB = dbPermissions.map(
p => `${p.type}.${p.controller}.${p.action}.${p.role[primaryKey]}`
);
permissionsFoundInDB = _.uniq(permissionsFoundInDB);
// Aggregate first level actions.
const appActions = Object.keys(strapi.api || {}).reduce((acc, api) => {
Object.keys(_.get(strapi.api[api], 'controllers', {})).forEach(controller => {
const actions = Object.keys(strapi.api[api].controllers[controller])
.filter(action => _.isFunction(strapi.api[api].controllers[controller][action]))
.map(action => `application.${controller}.${action.toLowerCase()}`);
acc = acc.concat(actions);
});
2017-11-17 16:36:57 +01:00
return acc;
}, []);
2017-11-17 16:36:57 +01:00
// Aggregate plugins' actions.
const pluginsActions = Object.keys(strapi.plugins).reduce((acc, plugin) => {
Object.keys(strapi.plugins[plugin].controllers).forEach(controller => {
const actions = Object.keys(strapi.plugins[plugin].controllers[controller])
.filter(action => _.isFunction(strapi.plugins[plugin].controllers[controller][action]))
.map(action => `${plugin}.${controller}.${action.toLowerCase()}`);
acc = acc.concat(actions);
});
2017-12-07 10:16:36 +01:00
return acc;
}, []);
2017-11-17 16:36:57 +01:00
const actionsFoundInFiles = appActions.concat(pluginsActions);
// create permissions for each role
let permissionsFoundInFiles = actionsFoundInFiles.reduce(
(acc, action) => [...acc, ...roles.map(role => `${action}.${role[primaryKey]}`)],
[]
);
permissionsFoundInFiles = _.uniq(permissionsFoundInFiles);
// Compare to know if actions have been added or removed from controllers.
if (!_.isEqual(permissionsFoundInDB.sort(), permissionsFoundInFiles.sort())) {
const splitted = str => {
const [type, controller, action, roleId] = str.split('.');
return { type, controller, action, roleId };
};
// We have to know the difference to add or remove the permissions entries in the database.
const toRemove = _.difference(permissionsFoundInDB, permissionsFoundInFiles).map(splitted);
const toAdd = _.difference(permissionsFoundInFiles, permissionsFoundInDB).map(splitted);
const query = strapi.query('permission', 'users-permissions');
// Execute request to update entries in database for each role.
await Promise.all([
Promise.all(
toAdd.map(permission =>
query.create({
type: permission.type,
controller: permission.controller,
action: permission.action,
enabled: isPermissionEnabled(permission, rolesMap[permission.roleId]),
policy: '',
role: permission.roleId,
})
)
),
Promise.all(
toRemove.map(permission => {
const { type, controller, action, roleId: role } = permission;
return query.delete({ type, controller, action, role });
})
),
]);
2017-11-17 14:22:59 +01:00
}
2017-11-17 16:36:57 +01:00
},
2017-11-17 14:22:59 +01:00
2019-08-12 15:35:40 +02:00
async initialize() {
const roleCount = await strapi.query('role', 'users-permissions').count();
if (roleCount === 0) {
await strapi.query('role', 'users-permissions').create({
name: 'Authenticated',
description: 'Default role given to authenticated user.',
type: 'authenticated',
});
await strapi.query('role', 'users-permissions').create({
name: 'Public',
description: 'Default role given to unauthenticated user.',
type: 'public',
});
}
2019-08-12 15:35:40 +02:00
return this.updatePermissions();
},
async updateRole(roleID, body) {
const [role, authenticated] = await Promise.all([
2018-01-22 18:19:44 +01:00
this.getRole(roleID, []),
strapi.query('role', 'users-permissions').findOne({ type: 'authenticated' }, []),
2018-01-22 18:19:44 +01:00
]);
2017-11-27 17:50:51 +01:00
2019-07-16 20:52:31 +02:00
await strapi
.query('role', 'users-permissions')
.update({ id: roleID }, _.pick(body, ['name', 'description']));
await Promise.all(
Object.keys(body.permissions || {}).reduce((acc, type) => {
Object.keys(body.permissions[type].controllers).forEach(controller => {
Object.keys(body.permissions[type].controllers[controller]).forEach(action => {
const bodyAction = body.permissions[type].controllers[controller][action];
const currentAction = _.get(
role.permissions,
`${type}.controllers.${controller}.${action}`,
{}
);
if (!_.isEqual(bodyAction, currentAction)) {
acc.push(
strapi.query('permission', 'users-permissions').update(
{
role: roleID,
type,
controller,
action: action.toLowerCase(),
},
bodyAction
)
);
2019-06-08 16:23:52 +02:00
}
});
2018-01-22 18:19:44 +01:00
});
return acc;
2019-07-16 20:52:31 +02:00
}, [])
);
2018-01-22 18:19:44 +01:00
// Add user to this role.
2019-07-16 20:52:31 +02:00
const newUsers = _.differenceBy(body.users, role.users, 'id');
await Promise.all(newUsers.map(user => this.updateUserRole(user, roleID)));
2017-12-05 16:44:54 +01:00
2019-07-16 20:52:31 +02:00
const oldUsers = _.differenceBy(role.users, body.users, 'id');
await Promise.all(oldUsers.map(user => this.updateUserRole(user, authenticated.id)));
2017-11-27 17:50:51 +01:00
},
async updateUserRole(user, role) {
return strapi.query('user', 'users-permissions').update({ id: user.id }, { role });
2017-12-07 10:16:36 +01:00
},
template(layout, data) {
2018-01-25 08:38:46 +01:00
const compiledObject = _.template(layout);
return compiledObject(data);
},
};