2020-06-29 18:30:35 +02:00
|
|
|
'use strict';
|
|
|
|
|
|
|
|
const {
|
|
|
|
policy: { createPolicyFactory },
|
2021-04-29 13:51:12 +02:00
|
|
|
} = require('@strapi/utils');
|
2021-09-24 09:04:44 +02:00
|
|
|
const { validateHasPermissionsInput } = require('../validation/policies/hasPermissions');
|
2020-06-29 18:30:35 +02:00
|
|
|
|
|
|
|
module.exports = createPolicyFactory(
|
2021-09-24 09:35:25 +02:00
|
|
|
({ actions = [], hasAtLeastOne = false } = {}) => ({ ctx, strapi }) => {
|
2020-06-29 18:30:35 +02:00
|
|
|
const {
|
2020-07-02 15:58:12 +02:00
|
|
|
state: { userAbility, isAuthenticatedAdmin },
|
2020-06-29 18:30:35 +02:00
|
|
|
params: { model },
|
|
|
|
} = ctx;
|
|
|
|
|
2020-07-02 15:58:12 +02:00
|
|
|
if (!isAuthenticatedAdmin || !userAbility) {
|
2021-09-24 09:35:25 +02:00
|
|
|
return true;
|
2020-07-02 15:58:12 +02:00
|
|
|
}
|
|
|
|
|
2020-07-02 17:52:27 +02:00
|
|
|
const isAuthorized = hasAtLeastOne
|
|
|
|
? actions.some(action => userAbility.can(action, model))
|
|
|
|
: actions.every(action => userAbility.can(action, model));
|
2020-06-29 18:30:35 +02:00
|
|
|
|
|
|
|
if (!isAuthorized) {
|
|
|
|
throw strapi.errors.forbidden();
|
|
|
|
}
|
|
|
|
|
2021-09-24 09:35:25 +02:00
|
|
|
return true;
|
2020-06-29 18:30:35 +02:00
|
|
|
},
|
|
|
|
{
|
|
|
|
validator: validateHasPermissionsInput,
|
2021-08-06 18:09:49 +02:00
|
|
|
name: 'plugin::content-manager.hasPermissions',
|
2020-06-29 18:30:35 +02:00
|
|
|
}
|
|
|
|
);
|