2020-05-29 17:23:42 +02:00
|
|
|
'use strict';
|
|
|
|
|
2020-06-11 10:54:26 +02:00
|
|
|
const _ = require('lodash');
|
2020-05-28 13:02:06 +02:00
|
|
|
const { createPermission } = require('../domain/permission');
|
2020-06-08 11:01:20 +02:00
|
|
|
const actionProvider = require('./action-provider');
|
2020-06-09 17:45:53 +02:00
|
|
|
const { validatePermissionsExist } = require('../validation/permission');
|
2020-06-09 19:00:57 +02:00
|
|
|
const createConditionProvider = require('./permission/condition-provider');
|
|
|
|
const createPermissionEngine = require('./permission/engine');
|
|
|
|
|
2020-06-16 11:13:01 +02:00
|
|
|
const conditionProvider = createConditionProvider();
|
2020-06-09 19:00:57 +02:00
|
|
|
const engine = createPermissionEngine(conditionProvider);
|
2020-05-28 13:02:06 +02:00
|
|
|
|
2020-05-29 17:23:42 +02:00
|
|
|
/**
|
|
|
|
* Delete permissions of roles in database
|
2020-06-08 15:13:26 +02:00
|
|
|
* @param rolesIds ids of roles
|
2020-05-29 17:23:42 +02:00
|
|
|
* @returns {Promise<array>}
|
|
|
|
*/
|
2020-05-29 11:09:17 +02:00
|
|
|
const deleteByRolesIds = rolesIds => {
|
|
|
|
return strapi.query('permission', 'admin').delete({ role_in: rolesIds });
|
|
|
|
};
|
|
|
|
|
2020-06-08 15:13:26 +02:00
|
|
|
/**
|
|
|
|
* Delete permissions
|
|
|
|
* @param ids ids of permissions
|
|
|
|
* @returns {Promise<array>}
|
|
|
|
*/
|
|
|
|
const deleteByIds = ids => {
|
|
|
|
return strapi.query('permission', 'admin').delete({ id_in: ids });
|
|
|
|
};
|
|
|
|
|
2020-05-28 11:29:59 +02:00
|
|
|
/**
|
|
|
|
* Find assigned permissions in the database
|
|
|
|
* @param params query params to find the permissions
|
|
|
|
* @returns {Promise<array<Object>>}
|
|
|
|
*/
|
|
|
|
const find = (params = {}) => {
|
|
|
|
return strapi.query('permission', 'admin').find(params, []);
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
2020-06-01 11:00:00 +02:00
|
|
|
* Assign permissions to a role
|
2020-05-28 11:29:59 +02:00
|
|
|
* @param {string|int} roleID - role ID
|
|
|
|
* @param {Array<Permission{action,subject,fields,conditions}>} permissions - permissions to assign to the role
|
|
|
|
*/
|
|
|
|
const assign = async (roleID, permissions = []) => {
|
2020-06-09 17:45:53 +02:00
|
|
|
try {
|
|
|
|
await validatePermissionsExist(permissions);
|
|
|
|
} catch (err) {
|
|
|
|
throw strapi.errors.badRequest('ValidationError', err);
|
2020-06-04 18:30:26 +02:00
|
|
|
}
|
2020-05-28 11:29:59 +02:00
|
|
|
|
|
|
|
await strapi.query('permission', 'admin').delete({ role: roleID });
|
|
|
|
|
2020-05-28 13:02:06 +02:00
|
|
|
const permissionsWithRole = permissions.map(permission => {
|
|
|
|
return createPermission({ ...permission, role: roleID });
|
|
|
|
});
|
2020-05-28 11:29:59 +02:00
|
|
|
|
|
|
|
const newPermissions = [];
|
|
|
|
for (const permission of permissionsWithRole) {
|
|
|
|
const result = await strapi.query('permission', 'admin').create(permission);
|
|
|
|
newPermissions.push(result);
|
|
|
|
}
|
|
|
|
|
|
|
|
return newPermissions;
|
|
|
|
};
|
|
|
|
|
2020-06-12 10:28:14 +02:00
|
|
|
/**
|
|
|
|
* Find all permissions for a user
|
|
|
|
* @param roles
|
|
|
|
* @returns {Promise<*[]|*>}
|
|
|
|
*/
|
2020-06-11 10:54:26 +02:00
|
|
|
const findUserPermissions = async ({ roles }) => {
|
|
|
|
if (!_.isArray(roles)) {
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
|
|
|
|
return strapi.query('permission', 'admin').find({ role_in: roles.map(_.property('id')) });
|
|
|
|
};
|
|
|
|
|
2020-06-12 10:28:14 +02:00
|
|
|
/**
|
|
|
|
* Removes unwanted fields from a permission
|
|
|
|
* @param permission
|
|
|
|
* @returns {*}
|
|
|
|
*/
|
2020-06-11 10:54:26 +02:00
|
|
|
const sanitizePermission = permission =>
|
|
|
|
_.pick(permission, ['action', 'subject', 'fields', 'conditions']);
|
|
|
|
|
2020-05-29 11:09:17 +02:00
|
|
|
module.exports = {
|
2020-05-28 11:29:59 +02:00
|
|
|
find,
|
2020-05-29 11:09:17 +02:00
|
|
|
deleteByRolesIds,
|
2020-06-08 15:13:26 +02:00
|
|
|
deleteByIds,
|
2020-05-28 11:29:59 +02:00
|
|
|
assign,
|
2020-06-11 10:54:26 +02:00
|
|
|
sanitizePermission,
|
|
|
|
findUserPermissions,
|
2020-06-09 19:00:57 +02:00
|
|
|
actionProvider,
|
|
|
|
engine,
|
|
|
|
conditionProvider,
|
2020-05-29 11:09:17 +02:00
|
|
|
};
|