mirror of
https://github.com/hedgedoc/hedgedoc.git
synced 2024-11-28 22:54:29 -05:00
refactor: extract permission checking from controllers and guard
Signed-off-by: Yannick Bungers <git@innay.de> Signed-off-by: Tilman Vatteroth <git@tilmanvatteroth.de>
This commit is contained in:
parent
485f7cd338
commit
001a49329c
4 changed files with 60 additions and 21 deletions
|
@ -24,6 +24,7 @@ import { MediaService } from '../../../media/media.service';
|
||||||
import { MulterFile } from '../../../media/multer-file.interface';
|
import { MulterFile } from '../../../media/multer-file.interface';
|
||||||
import { Note } from '../../../notes/note.entity';
|
import { Note } from '../../../notes/note.entity';
|
||||||
import { Permission } from '../../../permissions/permissions.enum';
|
import { Permission } from '../../../permissions/permissions.enum';
|
||||||
|
import { PermissionsService } from '../../../permissions/permissions.service';
|
||||||
import { User } from '../../../users/user.entity';
|
import { User } from '../../../users/user.entity';
|
||||||
import { NoteHeaderInterceptor } from '../../utils/note-header.interceptor';
|
import { NoteHeaderInterceptor } from '../../utils/note-header.interceptor';
|
||||||
import { OpenApi } from '../../utils/openapi.decorator';
|
import { OpenApi } from '../../utils/openapi.decorator';
|
||||||
|
@ -40,6 +41,7 @@ export class MediaController {
|
||||||
constructor(
|
constructor(
|
||||||
private readonly logger: ConsoleLoggerService,
|
private readonly logger: ConsoleLoggerService,
|
||||||
private mediaService: MediaService,
|
private mediaService: MediaService,
|
||||||
|
private permissionsService: PermissionsService,
|
||||||
) {
|
) {
|
||||||
this.logger.setContext(MediaController.name);
|
this.logger.setContext(MediaController.name);
|
||||||
}
|
}
|
||||||
|
@ -106,12 +108,11 @@ export class MediaController {
|
||||||
@Param('filename') filename: string,
|
@Param('filename') filename: string,
|
||||||
): Promise<void> {
|
): Promise<void> {
|
||||||
const mediaUpload = await this.mediaService.findUploadByFilename(filename);
|
const mediaUpload = await this.mediaService.findUploadByFilename(filename);
|
||||||
const mediaUploadOwner = await mediaUpload.user;
|
|
||||||
const mediaUploadNote = await mediaUpload.note;
|
|
||||||
const mediaUploadNoteOwner = await mediaUploadNote?.owner;
|
|
||||||
if (
|
if (
|
||||||
mediaUploadOwner?.id === user.id ||
|
await this.permissionsService.checkMediaDeletePermission(
|
||||||
user.id === mediaUploadNoteOwner?.id
|
user,
|
||||||
|
mediaUpload,
|
||||||
|
)
|
||||||
) {
|
) {
|
||||||
this.logger.debug(
|
this.logger.debug(
|
||||||
`Deleting '${filename}' for user '${user.username}'`,
|
`Deleting '${filename}' for user '${user.username}'`,
|
||||||
|
@ -123,10 +124,11 @@ export class MediaController {
|
||||||
`${user.username} tried to delete '${filename}', but is not the owner of upload or connected note`,
|
`${user.username} tried to delete '${filename}', but is not the owner of upload or connected note`,
|
||||||
'deleteMedia',
|
'deleteMedia',
|
||||||
);
|
);
|
||||||
|
const mediaUploadNote = await mediaUpload.note;
|
||||||
throw new PermissionError(
|
throw new PermissionError(
|
||||||
`Neither file '${filename}' nor note '${
|
`Neither file '${filename}' nor note '${
|
||||||
mediaUploadNote?.id ?? 'unknown'
|
mediaUploadNote?.id ?? 'unknown'
|
||||||
}'is not owned by '${user.username}'`,
|
}'is owned by '${user.username}'`,
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -30,6 +30,7 @@ import { MediaService } from '../../../media/media.service';
|
||||||
import { MulterFile } from '../../../media/multer-file.interface';
|
import { MulterFile } from '../../../media/multer-file.interface';
|
||||||
import { Note } from '../../../notes/note.entity';
|
import { Note } from '../../../notes/note.entity';
|
||||||
import { Permission } from '../../../permissions/permissions.enum';
|
import { Permission } from '../../../permissions/permissions.enum';
|
||||||
|
import { PermissionsService } from '../../../permissions/permissions.service';
|
||||||
import { User } from '../../../users/user.entity';
|
import { User } from '../../../users/user.entity';
|
||||||
import { NoteHeaderInterceptor } from '../../utils/note-header.interceptor';
|
import { NoteHeaderInterceptor } from '../../utils/note-header.interceptor';
|
||||||
import { OpenApi } from '../../utils/openapi.decorator';
|
import { OpenApi } from '../../utils/openapi.decorator';
|
||||||
|
@ -47,6 +48,7 @@ export class MediaController {
|
||||||
constructor(
|
constructor(
|
||||||
private readonly logger: ConsoleLoggerService,
|
private readonly logger: ConsoleLoggerService,
|
||||||
private mediaService: MediaService,
|
private mediaService: MediaService,
|
||||||
|
private permissionsService: PermissionsService,
|
||||||
) {
|
) {
|
||||||
this.logger.setContext(MediaController.name);
|
this.logger.setContext(MediaController.name);
|
||||||
}
|
}
|
||||||
|
@ -113,12 +115,11 @@ export class MediaController {
|
||||||
@Param('filename') filename: string,
|
@Param('filename') filename: string,
|
||||||
): Promise<void> {
|
): Promise<void> {
|
||||||
const mediaUpload = await this.mediaService.findUploadByFilename(filename);
|
const mediaUpload = await this.mediaService.findUploadByFilename(filename);
|
||||||
const mediaUploadOwner = await mediaUpload.user;
|
|
||||||
const mediaUploadNote = await mediaUpload.note;
|
|
||||||
const mediaUploadNoteOwner = await mediaUploadNote?.owner;
|
|
||||||
if (
|
if (
|
||||||
mediaUploadOwner?.id === user.id ||
|
await this.permissionsService.checkMediaDeletePermission(
|
||||||
user.id === mediaUploadNoteOwner?.id
|
user,
|
||||||
|
mediaUpload,
|
||||||
|
)
|
||||||
) {
|
) {
|
||||||
this.logger.debug(
|
this.logger.debug(
|
||||||
`Deleting '${filename}' for user '${user.username}'`,
|
`Deleting '${filename}' for user '${user.username}'`,
|
||||||
|
@ -130,10 +131,11 @@ export class MediaController {
|
||||||
`${user.username} tried to delete '${filename}', but is not the owner of upload or connected note`,
|
`${user.username} tried to delete '${filename}', but is not the owner of upload or connected note`,
|
||||||
'deleteMedia',
|
'deleteMedia',
|
||||||
);
|
);
|
||||||
|
const mediaUploadNote = await mediaUpload.note;
|
||||||
throw new PermissionError(
|
throw new PermissionError(
|
||||||
`Neither file '${filename}' nor note '${
|
`Neither file '${filename}' nor note '${
|
||||||
mediaUploadNote?.id ?? 'unknown'
|
mediaUploadNote?.id ?? 'unknown'
|
||||||
}'is not owned by '${user.username}'`,
|
}'is owned by '${user.username}'`,
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -54,14 +54,10 @@ export class PermissionsGuard implements CanActivate {
|
||||||
if (noteIdOrAlias === undefined)
|
if (noteIdOrAlias === undefined)
|
||||||
noteIdOrAlias = request.headers['hedgedoc-note'] as string;
|
noteIdOrAlias = request.headers['hedgedoc-note'] as string;
|
||||||
const note = await getNote(this.noteService, noteIdOrAlias);
|
const note = await getNote(this.noteService, noteIdOrAlias);
|
||||||
switch (permissions[0]) {
|
return await this.permissionsService.checkPermissionOnNote(
|
||||||
case Permission.READ:
|
permissions[0],
|
||||||
return await this.permissionsService.mayRead(user, note);
|
user,
|
||||||
case Permission.WRITE:
|
note,
|
||||||
return await this.permissionsService.mayWrite(user, note);
|
);
|
||||||
case Permission.OWNER:
|
|
||||||
return await this.permissionsService.isOwner(user, note);
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -19,6 +19,7 @@ import { Group } from '../groups/group.entity';
|
||||||
import { GroupsService } from '../groups/groups.service';
|
import { GroupsService } from '../groups/groups.service';
|
||||||
import { SpecialGroup } from '../groups/groups.special';
|
import { SpecialGroup } from '../groups/groups.special';
|
||||||
import { ConsoleLoggerService } from '../logger/console-logger.service';
|
import { ConsoleLoggerService } from '../logger/console-logger.service';
|
||||||
|
import { MediaUpload } from '../media/media-upload.entity';
|
||||||
import { NotePermissionsUpdateDto } from '../notes/note-permissions.dto';
|
import { NotePermissionsUpdateDto } from '../notes/note-permissions.dto';
|
||||||
import { Note } from '../notes/note.entity';
|
import { Note } from '../notes/note.entity';
|
||||||
import { User } from '../users/user.entity';
|
import { User } from '../users/user.entity';
|
||||||
|
@ -26,6 +27,7 @@ import { UsersService } from '../users/users.service';
|
||||||
import { checkArrayForDuplicates } from '../utils/arrayDuplicatCheck';
|
import { checkArrayForDuplicates } from '../utils/arrayDuplicatCheck';
|
||||||
import { NoteGroupPermission } from './note-group-permission.entity';
|
import { NoteGroupPermission } from './note-group-permission.entity';
|
||||||
import { NoteUserPermission } from './note-user-permission.entity';
|
import { NoteUserPermission } from './note-user-permission.entity';
|
||||||
|
import { Permission } from './permissions.enum';
|
||||||
|
|
||||||
@Injectable()
|
@Injectable()
|
||||||
export class PermissionsService {
|
export class PermissionsService {
|
||||||
|
@ -38,6 +40,43 @@ export class PermissionsService {
|
||||||
private noteConfig: NoteConfig,
|
private noteConfig: NoteConfig,
|
||||||
private eventEmitter: EventEmitter2<NoteEventMap>,
|
private eventEmitter: EventEmitter2<NoteEventMap>,
|
||||||
) {}
|
) {}
|
||||||
|
/**
|
||||||
|
* Checks if the given {@link User} is has the in {@link desiredPermission} specified permission on {@link Note}.
|
||||||
|
*
|
||||||
|
* @async
|
||||||
|
* @param {Permission} desiredPermission - permission level to check for
|
||||||
|
* @param {User} user - The user whose permission should be checked. Value is null if guest access should be checked
|
||||||
|
* @param {Note} note - The note for which the permission should be checked
|
||||||
|
* @return if the user has the specified permission on the note
|
||||||
|
*/
|
||||||
|
public async checkPermissionOnNote(
|
||||||
|
desiredPermission: Permission,
|
||||||
|
user: User | null,
|
||||||
|
note: Note,
|
||||||
|
): Promise<boolean> {
|
||||||
|
switch (desiredPermission) {
|
||||||
|
case Permission.READ:
|
||||||
|
return await this.mayRead(user, note);
|
||||||
|
case Permission.WRITE:
|
||||||
|
return await this.mayWrite(user, note);
|
||||||
|
case Permission.OWNER:
|
||||||
|
return await this.isOwner(user, note);
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
public async checkMediaDeletePermission(
|
||||||
|
user: User,
|
||||||
|
mediaUpload: MediaUpload,
|
||||||
|
): Promise<boolean> {
|
||||||
|
const mediaUploadNote = await mediaUpload.note;
|
||||||
|
const mediaUploadOwner = await mediaUpload.user;
|
||||||
|
|
||||||
|
const owner =
|
||||||
|
!!mediaUploadNote && (await this.isOwner(user, mediaUploadNote));
|
||||||
|
|
||||||
|
return mediaUploadOwner?.id === user.id || owner;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Checks if the given {@link User} is allowed to read the given {@link Note}.
|
* Checks if the given {@link User} is allowed to read the given {@link Note}.
|
||||||
|
|
Loading…
Reference in a new issue