|
1 | 1 | module ForestLiana
|
2 | 2 | class PermissionsChecker
|
3 |
| - @@permissions_per_rendering = Hash.new |
| 3 | + @@permissions_cached = Hash.new |
| 4 | + @@scopes_cached = Hash.new |
| 5 | + @@roles_acl_activated = false |
| 6 | + # TODO: handle cache scopes per rendering |
4 | 7 | @@expiration_in_seconds = (ENV['FOREST_PERMISSIONS_EXPIRATION_IN_SECONDS'] || 3600).to_i
|
5 | 8 |
|
6 |
| - def initialize(resource, permission_name, rendering_id, smart_action_parameters = nil, collection_list_parameters = nil) |
| 9 | + def initialize(resource, permission_name, rendering_id, user_id:, smart_action_request_info: nil, collection_list_parameters: nil) |
| 10 | + @user_id = user_id |
7 | 11 | @collection_name = ForestLiana.name_for(resource)
|
8 | 12 | @permission_name = permission_name
|
9 | 13 | @rendering_id = rendering_id
|
10 |
| - @smart_action_parameters = smart_action_parameters |
| 14 | + @smart_action_request_info = smart_action_request_info |
11 | 15 | @collection_list_parameters = collection_list_parameters
|
12 | 16 | end
|
13 | 17 |
|
14 | 18 | def is_authorized?
|
15 |
| - (is_permission_expired? || !is_allowed?) ? retrieve_permissions_and_check_allowed : true |
16 |
| - end |
17 |
| - |
18 |
| - private |
| 19 | + # User is still authorized if he already was and the permission has not expire |
| 20 | + # if !have_permissions_expired && is_allowed |
| 21 | + return true unless have_permissions_expired? || !is_allowed |
19 | 22 |
|
20 |
| - def get_permissions |
21 |
| - @@permissions_per_rendering && |
22 |
| - @@permissions_per_rendering[@rendering_id] && |
23 |
| - @@permissions_per_rendering[@rendering_id]['data'] |
| 23 | + fetch_permissions |
| 24 | + is_allowed |
24 | 25 | end
|
25 | 26 |
|
26 |
| - def get_last_retrieve |
27 |
| - @@permissions_per_rendering && |
28 |
| - @@permissions_per_rendering[@rendering_id] && |
29 |
| - @@permissions_per_rendering[@rendering_id]['last_retrieve'] |
30 |
| - end |
| 27 | + private |
31 | 28 |
|
32 |
| - def smart_action_allowed?(smart_actions_permissions) |
33 |
| - if !@smart_action_parameters|| |
34 |
| - !@smart_action_parameters[:user_id] || |
35 |
| - !@smart_action_parameters[:action_id] || |
36 |
| - !smart_actions_permissions || |
37 |
| - !smart_actions_permissions[@smart_action_parameters[:action_id]] |
38 |
| - return false |
| 29 | + def fetch_permissions |
| 30 | + permissions = ForestLiana::PermissionsGetter::get_permissions_for_rendering(@rendering_id) |
| 31 | + @@roles_acl_activated = permissions['meta']['rolesACLActivated'] |
| 32 | + permissions['last_fetch'] = Time.now |
| 33 | + if @@roles_acl_activated |
| 34 | + @@permissions_cached = permissions |
| 35 | + else |
| 36 | + permissions['data'] = ForestLiana::PermissionsFormatter.convert_to_new_format(permissions['data'], @rendering_id) |
| 37 | + @@permissions_cached[@rendering_id] = permissions |
39 | 38 | end
|
40 |
| - |
41 |
| - @user_id = @smart_action_parameters[:user_id] |
42 |
| - @action_id = @smart_action_parameters[:action_id] |
43 |
| - @smart_action_permissions = smart_actions_permissions[@action_id] |
44 |
| - @allowed = @smart_action_permissions['allowed'] |
45 |
| - @users = @smart_action_permissions['users'] |
46 |
| - |
47 |
| - return @allowed && (@users.nil?|| @users.include?(@user_id.to_i)); |
| 39 | + add_scopes_to_cache(permissions) |
48 | 40 | end
|
49 | 41 |
|
50 |
| - def collection_list_allowed?(scope_permissions) |
51 |
| - return ForestLiana::ScopeValidator.new( |
52 |
| - scope_permissions['filter'], |
53 |
| - scope_permissions['dynamicScopesValues']['users'] |
54 |
| - ).is_scope_in_request?(@collection_list_parameters) |
| 42 | + def add_scopes_to_cache(permissions) |
| 43 | + permissions['data']['renderings'].keys.each { |rendering_id| |
| 44 | + @@scopes_cached[rendering_id] = permissions['data']['renderings'][rendering_id] |
| 45 | + @@scopes_cached[rendering_id]['last_fetch'] = Time.now |
| 46 | + } if permissions['data']['renderings'] |
55 | 47 | end
|
56 | 48 |
|
57 |
| - def is_allowed? |
58 |
| - permissions = get_permissions |
| 49 | + def is_allowed |
| 50 | + permissions = get_permissions_content |
| 51 | + |
59 | 52 | if permissions && permissions[@collection_name] &&
|
60 | 53 | permissions[@collection_name]['collection']
|
61 | 54 | if @permission_name === 'actions'
|
62 | 55 | return smart_action_allowed?(permissions[@collection_name]['actions'])
|
63 |
| - # NOTICE: Permissions[@collection_name]['scope'] will either contains conditions filter and |
64 |
| - # dynamic user values definition, or null for collection that does not use scopes |
65 |
| - elsif @permission_name === 'list' and permissions[@collection_name]['scope'] |
66 |
| - return collection_list_allowed?(permissions[@collection_name]['scope']) |
67 | 56 | else
|
68 |
| - return permissions[@collection_name]['collection'][@permission_name] |
| 57 | + if @permission_name === 'browseEnabled' |
| 58 | + refresh_scope_cache if scope_cache_expired? |
| 59 | + scope_permissions = get_scope_in_permissions |
| 60 | + if scope_permissions |
| 61 | + # NOTICE: current_scope will either contains conditions filter and |
| 62 | + # dynamic user values definition, or null for collection that does not use scopes |
| 63 | + return false unless are_scopes_valid?(scope_permissions) |
| 64 | + end |
| 65 | + end |
| 66 | + return is_user_allowed(permissions[@collection_name]['collection'][@permission_name]) |
69 | 67 | end
|
70 | 68 | else
|
71 | 69 | false
|
72 | 70 | end
|
73 | 71 | end
|
74 | 72 |
|
75 |
| - def retrieve_permissions |
76 |
| - @@permissions_per_rendering[@rendering_id] = Hash.new |
77 |
| - permissions = ForestLiana::PermissionsGetter.new(@rendering_id).perform() |
78 |
| - @@permissions_per_rendering[@rendering_id]['data'] = permissions |
79 |
| - @@permissions_per_rendering[@rendering_id]['last_retrieve'] = Time.now |
| 73 | + def get_scope_in_permissions |
| 74 | + @@scopes_cached[@rendering_id] && |
| 75 | + @@scopes_cached[@rendering_id][@collection_name] && |
| 76 | + @@scopes_cached[@rendering_id][@collection_name]['scope'] |
| 77 | + end |
| 78 | + |
| 79 | + def scope_cache_expired? |
| 80 | + return true unless @@scopes_cached[@rendering_id] && @@scopes_cached[@rendering_id]['last_fetch'] |
| 81 | + |
| 82 | + elapsed_seconds = date_difference_in_seconds(Time.now, @@scopes_cached[@rendering_id]['last_fetch']) |
| 83 | + elapsed_seconds >= @@expiration_in_seconds |
| 84 | + end |
| 85 | + |
| 86 | + # This will happen only on rolesACLActivated (as scope cache will always be up to date on disabled) |
| 87 | + def refresh_scope_cache |
| 88 | + permissions = ForestLiana::PermissionsGetter::get_permissions_for_rendering(@rendering_id, rendering_specific_only: true) |
| 89 | + add_scopes_to_cache(permissions) |
| 90 | + end |
| 91 | + |
| 92 | + # When acl disabled permissions are stored and retrieved by rendering |
| 93 | + def get_permissions |
| 94 | + @@roles_acl_activated ? @@permissions_cached : @@permissions_cached[@rendering_id] |
| 95 | + end |
| 96 | + |
| 97 | + def get_permissions_content |
| 98 | + permissions = get_permissions |
| 99 | + permissions && permissions['data'] && permissions['data']['collections'] |
| 100 | + end |
| 101 | + |
| 102 | + def get_last_fetch |
| 103 | + permissions = get_permissions |
| 104 | + permissions && permissions['last_fetch'] |
| 105 | + end |
| 106 | + |
| 107 | + def get_smart_action_permissions(smart_actions_permissions) |
| 108 | + endpoint = @smart_action_request_info[:endpoint] |
| 109 | + http_method = @smart_action_request_info[:http_method] |
| 110 | + |
| 111 | + return nil unless endpoint && http_method |
| 112 | + |
| 113 | + schema_smart_action = ForestLiana::Utils::BetaSchemaUtils.find_action_from_endpoint(@collection_name, endpoint, http_method) |
| 114 | + |
| 115 | + schema_smart_action && |
| 116 | + schema_smart_action.name && |
| 117 | + smart_actions_permissions && |
| 118 | + smart_actions_permissions[schema_smart_action.name] |
| 119 | + end |
| 120 | + |
| 121 | + def is_user_allowed(permission_value) |
| 122 | + return false if permission_value.nil? |
| 123 | + return permission_value if permission_value.in? [true, false] |
| 124 | + permission_value.include?(@user_id.to_i) |
| 125 | + end |
| 126 | + |
| 127 | + def smart_action_allowed?(smart_actions_permissions) |
| 128 | + smart_action_permissions = get_smart_action_permissions(smart_actions_permissions) |
| 129 | + |
| 130 | + return false unless smart_action_permissions |
| 131 | + |
| 132 | + is_user_allowed(smart_action_permissions['triggerEnabled']) |
| 133 | + end |
| 134 | + |
| 135 | + def are_scopes_valid?(scope_permissions) |
| 136 | + return ForestLiana::ScopeValidator.new( |
| 137 | + scope_permissions['filter'], |
| 138 | + scope_permissions['dynamicScopesValues']['users'] |
| 139 | + ).is_scope_in_request?(@collection_list_parameters) |
80 | 140 | end
|
81 | 141 |
|
82 | 142 | def date_difference_in_seconds(date1, date2)
|
83 | 143 | (date1 - date2).to_i
|
84 | 144 | end
|
85 | 145 |
|
86 |
| - def is_permission_expired? |
87 |
| - last_retrieve = get_last_retrieve |
88 |
| - |
89 |
| - return true if last_retrieve.nil? |
| 146 | + def have_permissions_expired? |
| 147 | + last_fetch = get_last_fetch |
| 148 | + return true unless last_fetch |
90 | 149 |
|
91 |
| - elapsed_seconds = date_difference_in_seconds(Time.now, last_retrieve) |
| 150 | + elapsed_seconds = date_difference_in_seconds(Time.now, last_fetch) |
92 | 151 | elapsed_seconds >= @@expiration_in_seconds
|
93 | 152 | end
|
94 | 153 |
|
95 |
| - def retrieve_permissions_and_check_allowed |
96 |
| - retrieve_permissions |
97 |
| - is_allowed? |
| 154 | + # Used only for testing purpose |
| 155 | + def self.empty_cache |
| 156 | + @@permissions_cached = Hash.new |
| 157 | + @@scopes_cached = Hash.new |
| 158 | + @@roles_acl_activated = false |
| 159 | + @@expiration_in_seconds = (ENV['FOREST_PERMISSIONS_EXPIRATION_IN_SECONDS'] || 3600).to_i |
98 | 160 | end
|
99 | 161 | end
|
100 | 162 | end
|
0 commit comments