2018-05-24 17:20:32 +02:00

57 lines
1.5 KiB
JavaScript

module.exports = async (ctx, next) => {
let role;
if (ctx.request && ctx.request.header && ctx.request.header.authorization) {
try {
const { _id, id } = await strapi.plugins['users-permissions'].services.jwt.getToken(ctx);
if ((id || _id) === undefined) {
throw new Error('Invalid token: Token did not contain required fields');
}
ctx.state.user = await strapi.query('user', 'users-permissions').findOne({ _id, id });
} catch (err) {
return ctx.unauthorized(err);
}
if (!ctx.state.user) {
return ctx.unauthorized(`User Not Found.`);
}
role = ctx.state.user.role;
if (role.type === 'root') {
return await next();
}
}
// Retrieve `public` role.
if (!role) {
role = await strapi.query('role', 'users-permissions').findOne({ type: 'public' }, []);
}
const route = ctx.request.route;
const permission = await strapi.query('permission', 'users-permissions').findOne({
role: role._id || role.id,
type: route.plugin || 'application',
controller: route.controller,
action: route.action,
enabled: true
}, []);
if (!permission) {
if (ctx.request.graphql === null) {
return ctx.request.graphql = strapi.errors.forbidden();
}
ctx.forbidden();
}
// Execute the policies.
if (permission.policy) {
return await strapi.plugins['users-permissions'].config.policies[permission.policy](ctx, next);
}
// Execute the action.
await next();
};