Merge pull request #3372 from specklesystems/fabians/core-ioc-104

chore(server): core IoC #104 - validatePermissionsWriteStreamFactory
This commit is contained in:
Alessandro Magionami 2024-10-23 09:58:42 +02:00 коммит произвёл GitHub
Родитель 9b5d935ccc 284d94f8ca
Коммит f6a87a4898
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: B5690EEEBB952194
5 изменённых файлов: 65 добавлений и 48 удалений

Просмотреть файл

@ -370,3 +370,11 @@ export type ValidatePermissionsReadStream = (
result: boolean
status: number
}>
export type ValidatePermissionsWriteStream = (
streamId: string,
req: express.Request
) => Promise<{
result: boolean
status: number
}>

Просмотреть файл

@ -1,45 +0,0 @@
'use strict'
const { validateScopes, authorizeResolver } = require('@/modules/shared')
const { Roles, Scopes } = require('@speckle/shared')
const { throwForNotHavingServerRole } = require('@/modules/shared/authz')
const { DatabaseError } = require('@/modules/shared/errors')
module.exports = {
async validatePermissionsWriteStream(streamId, req) {
if (!req.context || !req.context.auth) {
req.log.debug('User is not authenticated, so cannot write to stream.')
return { result: false, status: 401 }
}
try {
await throwForNotHavingServerRole(req.context, Roles.Server.Guest)
} catch (e) {
if (e instanceof DatabaseError) return { result: false, status: 500 }
req.log.info({ err: e }, 'Error while checking server role')
return { result: false, status: 401 }
}
try {
await validateScopes(req.context.scopes, Scopes.Streams.Write)
} catch (e) {
req.log.info({ err: e }, 'Error while checking scopes')
return { result: false, status: 401 }
}
try {
await authorizeResolver(
req.context.userId,
streamId,
Roles.Stream.Contributor,
req.context.resourceAccessRules
)
} catch (e) {
if (e instanceof DatabaseError) return { result: false, status: 500 }
req.log.info({ err: e }, 'Error while checking stream contributor role')
return { result: false, status: 401 }
}
return { result: true, status: 200 }
}
}

Просмотреть файл

@ -1,13 +1,18 @@
import zlib from 'zlib'
import { corsMiddleware } from '@/modules/core/configs/cors'
import { validatePermissionsWriteStream } from '@/modules/core/rest/authUtils'
import { chunk } from 'lodash'
import type { Application } from 'express'
import { hasObjectsFactory } from '@/modules/core/repositories/objects'
import { db } from '@/db/knex'
import { validatePermissionsWriteStreamFactory } from '@/modules/core/services/streams/auth'
import { authorizeResolver, validateScopes } from '@/modules/shared'
export default (app: Application) => {
const hasObjects = hasObjectsFactory({ db })
const validatePermissionsWriteStream = validatePermissionsWriteStreamFactory({
validateScopes,
authorizeResolver
})
app.options('/api/diff/:streamId', corsMiddleware())

Просмотреть файл

@ -1,7 +1,6 @@
import zlib from 'zlib'
import { corsMiddleware } from '@/modules/core/configs/cors'
import Busboy from 'busboy'
import { validatePermissionsWriteStream } from '@/modules/core/rest/authUtils'
import {
getFeatureFlags,
maximumObjectUploadFileSizeMb
@ -21,6 +20,8 @@ import {
} from '@/modules/core/repositories/objects'
import { db } from '@/db/knex'
import { RawSpeckleObject } from '@/modules/core/domain/objects/types'
import { validatePermissionsWriteStreamFactory } from '@/modules/core/services/streams/auth'
import { authorizeResolver, validateScopes } from '@/modules/shared'
const MAX_FILE_SIZE = maximumObjectUploadFileSizeMb() * 1024 * 1024
const { FF_NO_CLOSURE_WRITES } = getFeatureFlags()
@ -44,6 +45,11 @@ if (FF_NO_CLOSURE_WRITES) {
}
export default (app: Router) => {
const validatePermissionsWriteStream = validatePermissionsWriteStreamFactory({
validateScopes,
authorizeResolver
})
app.options('/objects/:streamId', corsMiddleware())
app.post('/objects/:streamId', corsMiddleware(), async (req, res) => {

Просмотреть файл

@ -1,6 +1,7 @@
import {
GetStream,
ValidatePermissionsReadStream
ValidatePermissionsReadStream,
ValidatePermissionsWriteStream
} from '@/modules/core/domain/streams/operations'
import { throwForNotHavingServerRole } from '@/modules/shared/authz'
import { AuthorizeResolver, ValidateScopes } from '@/modules/shared/domain/operations'
@ -55,3 +56,45 @@ export const validatePermissionsReadStreamFactory =
}
return { result: true, status: 200 }
}
export const validatePermissionsWriteStreamFactory =
(deps: {
validateScopes: ValidateScopes
authorizeResolver: AuthorizeResolver
}): ValidatePermissionsWriteStream =>
async (streamId, req) => {
if (!req.context || !req.context.auth) {
req.log.debug('User is not authenticated, so cannot write to stream.')
return { result: false, status: 401 }
}
try {
await throwForNotHavingServerRole(req.context, Roles.Server.Guest)
} catch (e) {
if (e instanceof DatabaseError) return { result: false, status: 500 }
req.log.info({ err: e }, 'Error while checking server role')
return { result: false, status: 401 }
}
try {
await deps.validateScopes(req.context.scopes, Scopes.Streams.Write)
} catch (e) {
req.log.info({ err: e }, 'Error while checking scopes')
return { result: false, status: 401 }
}
try {
await deps.authorizeResolver(
req.context.userId,
streamId,
Roles.Stream.Contributor,
req.context.resourceAccessRules
)
} catch (e) {
if (e instanceof DatabaseError) return { result: false, status: 500 }
req.log.info({ err: e }, 'Error while checking stream contributor role')
return { result: false, status: 401 }
}
return { result: true, status: 200 }
}