import * as permissions from '../types/permissions'; import User, { IProjectUser, IUser } from '../types/user'; import { IAccessInfo, IAccessStore, IRole, IRoleWithPermissions, IRoleWithProject, IUserPermission, IUserRole, } from '../types/stores/access-store'; import { Logger } from '../logger'; import { IAccountStore, IUnleashStores } from '../types/stores'; import { IAvailablePermissions, ICustomRole, IPermission, IRoleData, IUserWithRole, RoleName, RoleType, } from '../types/model'; import { IRoleStore } from 'lib/types/stores/role-store'; import NameExistsError from '../error/name-exists-error'; import { IEnvironmentStore } from 'lib/types/stores/environment-store'; import RoleInUseError from '../error/role-in-use-error'; import { roleSchema } from '../schema/role-schema'; import { ALL_ENVS, ALL_PROJECTS, CUSTOM_ROLE_TYPE } from '../util/constants'; import { DEFAULT_PROJECT } from '../types/project'; import InvalidOperationError from '../error/invalid-operation-error'; import BadDataError from '../error/bad-data-error'; import { IGroupModelWithProjectRole } from '../types/group'; import { GroupService } from './group-service'; const { ADMIN } = permissions; const PROJECT_ADMIN = [ permissions.UPDATE_PROJECT, permissions.DELETE_PROJECT, permissions.CREATE_FEATURE, permissions.UPDATE_FEATURE, permissions.DELETE_FEATURE, ]; interface IRoleCreation { name: string; description: string; permissions?: IPermission[]; } export interface IRoleValidation { name: string; description?: string; permissions?: Pick[]; } interface IRoleUpdate { id: number; name: string; description: string; permissions?: IPermission[]; } const isProjectPermission = (permission) => PROJECT_ADMIN.includes(permission); export class AccessService { private store: IAccessStore; private accountStore: IAccountStore; private roleStore: IRoleStore; private groupService: GroupService; private environmentStore: IEnvironmentStore; private logger: Logger; constructor( { accessStore, accountStore, roleStore, environmentStore, }: Pick< IUnleashStores, 'accessStore' | 'accountStore' | 'roleStore' | 'environmentStore' >, { getLogger }: { getLogger: Function }, groupService: GroupService, ) { this.store = accessStore; this.accountStore = accountStore; this.roleStore = roleStore; this.groupService = groupService; this.environmentStore = environmentStore; this.logger = getLogger('/services/access-service.ts'); } /** * Used to check if a user has access to the requested resource * * @param user * @param permission * @param projectId */ async hasPermission( user: Pick, permission: string, projectId?: string, environment?: string, ): Promise { this.logger.info( `Checking permission=${permission}, userId=${user.id}, projectId=${projectId}, environment=${environment}`, ); try { const userP = await this.getPermissionsForUser(user); return userP .filter( (p) => !p.project || p.project === projectId || p.project === ALL_PROJECTS, ) .filter( (p) => !p.environment || p.environment === environment || p.environment === ALL_ENVS, ) .some( (p) => p.permission === permission || p.permission === ADMIN, ); } catch (e) { this.logger.error( `Error checking permission=${permission}, userId=${user.id} projectId=${projectId}`, e, ); return Promise.resolve(false); } } async getPermissionsForUser( user: Pick, ): Promise { if (user.isAPI) { return user.permissions?.map((p) => ({ permission: p, })); } return this.store.getPermissionsForUser(user.id); } async getPermissions(): Promise { const bindablePermissions = await this.store.getAvailablePermissions(); const environments = await this.environmentStore.getAll(); const projectPermissions = bindablePermissions.filter((x) => { return x.type === 'project'; }); const environmentPermissions = bindablePermissions.filter((perm) => { return perm.type === 'environment'; }); const allEnvironmentPermissions = environments.map((env) => { return { name: env.name, permissions: environmentPermissions.map((permission) => { return { environment: env.name, ...permission }; }), }; }); return { project: projectPermissions, environments: allEnvironmentPermissions, }; } async addUserToRole( userId: number, roleId: number, projectId: string, ): Promise { return this.store.addUserToRole(userId, roleId, projectId); } async addGroupToRole( groupId: number, roleId: number, createdBy: string, projectId: string, ): Promise { return this.store.addGroupToRole(groupId, roleId, createdBy, projectId); } async addAccessToProject( users: IAccessInfo[], groups: IAccessInfo[], projectId: string, roleId: number, createdBy: string, ): Promise { return this.store.addAccessToProject( users, groups, projectId, roleId, createdBy, ); } async getRoleByName(roleName: string): Promise { return this.roleStore.getRoleByName(roleName); } async setUserRootRole( userId: number, role: number | RoleName, ): Promise { const newRootRole = await this.resolveRootRole(role); if (newRootRole) { try { await this.store.removeRolesOfTypeForUser( userId, RoleType.ROOT, ); await this.store.addUserToRole( userId, newRootRole.id, DEFAULT_PROJECT, ); } catch (error) { throw new Error( `Could not add role=${newRootRole.name} to userId=${userId}`, ); } } else { throw new BadDataError(`Could not find rootRole=${role}`); } } async getUserRootRoles(userId: number): Promise { const userRoles = await this.store.getRolesForUserId(userId); return userRoles.filter((r) => r.type === RoleType.ROOT); } async removeUserFromRole( userId: number, roleId: number, projectId: string, ): Promise { return this.store.removeUserFromRole(userId, roleId, projectId); } async removeGroupFromRole( groupId: number, roleId: number, projectId: string, ): Promise { return this.store.removeGroupFromRole(groupId, roleId, projectId); } async updateUserProjectRole( userId: number, roleId: number, projectId: string, ): Promise { return this.store.updateUserProjectRole(userId, roleId, projectId); } async updateGroupProjectRole( userId: number, roleId: number, projectId: string, ): Promise { return this.store.updateGroupProjectRole(userId, roleId, projectId); } //This actually only exists for testing purposes async addPermissionToRole( roleId: number, permission: string, environment?: string, ): Promise { if (isProjectPermission(permission) && !environment) { throw new Error( `ProjectId cannot be empty for permission=${permission}`, ); } return this.store.addPermissionsToRole( roleId, [permission], environment, ); } //This actually only exists for testing purposes async removePermissionFromRole( roleId: number, permission: string, environment?: string, ): Promise { if (isProjectPermission(permission) && !environment) { throw new Error( `ProjectId cannot be empty for permission=${permission}`, ); } return this.store.removePermissionFromRole( roleId, permission, environment, ); } async getRoles(): Promise { return this.roleStore.getRoles(); } async getRole(id: number): Promise { const role = await this.store.get(id); const rolePermissions = await this.store.getPermissionsForRole(role.id); return { ...role, permissions: rolePermissions, }; } async getRoleData(roleId: number): Promise { const [role, rolePerms, users] = await Promise.all([ this.store.get(roleId), this.store.getPermissionsForRole(roleId), this.getUsersForRole(roleId), ]); return { role, permissions: rolePerms, users }; } async getProjectRoles(): Promise { return this.roleStore.getProjectRoles(); } async getRolesForProject(projectId: string): Promise { return this.roleStore.getRolesForProject(projectId); } async getRolesForUser(userId: number): Promise { return this.store.getRolesForUserId(userId); } async wipeUserPermissions(userId: number): Promise { return Promise.all([ this.store.unlinkUserRoles(userId), this.store.unlinkUserGroups(userId), this.store.clearUserPersonalAccessTokens(userId), this.store.clearPublicSignupUserTokens(userId), ]); } async getUsersForRole(roleId: number): Promise { const userIdList = await this.store.getUserIdsForRole(roleId); if (userIdList.length > 0) { return this.accountStore.getAllWithId(userIdList); } return []; } async getProjectUsersForRole( roleId: number, projectId?: string, ): Promise { const userRoleList = await this.store.getProjectUsersForRole( roleId, projectId, ); if (userRoleList.length > 0) { const userIdList = userRoleList.map((u) => u.userId); const users = await this.accountStore.getAllWithId(userIdList); return users.map((user) => { const role = userRoleList.find((r) => r.userId == user.id)!; return { ...user, addedAt: role.addedAt!, }; }); } return []; } async getProjectRoleAccess( projectId: string, ): Promise<[IRole[], IUserWithRole[], IGroupModelWithProjectRole[]]> { const roles = await this.roleStore.getProjectRoles(); const users = await Promise.all( roles.map(async (role) => { const projectUsers = await this.getProjectUsersForRole( role.id, projectId, ); return projectUsers.map((u) => ({ ...u, roleId: role.id })); }), ); const groups = await this.groupService.getProjectGroups(projectId); return [roles, users.flat(), groups]; } async createDefaultProjectRoles( owner: IUser, projectId: string, ): Promise { if (!projectId) { throw new Error('ProjectId cannot be empty'); } const ownerRole = await this.roleStore.getRoleByName(RoleName.OWNER); // TODO: remove this when all users is guaranteed to have a unique id. if (owner.id) { this.logger.info( `Making ${owner.id} admin of ${projectId} via roleId=${ownerRole.id}`, ); await this.store.addUserToRole(owner.id, ownerRole.id, projectId); } } async removeDefaultProjectRoles( owner: User, projectId: string, ): Promise { this.logger.info(`Removing project roles for ${projectId}`); return this.roleStore.removeRolesForProject(projectId); } async getRootRoleForAllUsers(): Promise { return this.roleStore.getRootRoleForAllUsers(); } async getRootRoles(): Promise { return this.roleStore.getRootRoles(); } public async resolveRootRole( rootRole: number | RoleName, ): Promise { const rootRoles = await this.getRootRoles(); let role: IRole | undefined; if (typeof rootRole === 'number') { role = rootRoles.find((r) => r.id === rootRole); } else { role = rootRoles.find((r) => r.name === rootRole); } return role; } async getRootRole(roleName: RoleName): Promise { const roles = await this.roleStore.getRootRoles(); return roles.find((r) => r.name === roleName); } async getAllRoles(): Promise { return this.roleStore.getAll(); } async createRole(role: IRoleCreation): Promise { const baseRole = { ...(await this.validateRole(role)), roleType: CUSTOM_ROLE_TYPE, }; const rolePermissions = role.permissions; const newRole = await this.roleStore.create(baseRole); if (rolePermissions) { await this.store.addEnvironmentPermissionsToRole( newRole.id, rolePermissions, ); } return newRole; } async updateRole(role: IRoleUpdate): Promise { await this.validateRole(role, role.id); const baseRole = { id: role.id, name: role.name, description: role.description, roleType: CUSTOM_ROLE_TYPE, }; const rolePermissions = role.permissions; const newRole = await this.roleStore.update(baseRole); if (rolePermissions) { await this.store.wipePermissionsFromRole(newRole.id); await this.store.addEnvironmentPermissionsToRole( newRole.id, rolePermissions, ); } return newRole; } async deleteRole(id: number): Promise { await this.validateRoleIsNotBuiltIn(id); const roleUsers = await this.getUsersForRole(id); if (roleUsers.length > 0) { throw new RoleInUseError( 'Role is in use by more than one user. You cannot delete a role that is in use without first removing the role from the users.', ); } return this.roleStore.delete(id); } async validateRoleIsUnique( roleName: string, existingId?: number, ): Promise { const exists = await this.roleStore.nameInUse(roleName, existingId); if (exists) { throw new NameExistsError( `There already exists a role with the name ${roleName}`, ); } return Promise.resolve(); } async validateRoleIsNotBuiltIn(roleId: number): Promise { const role = await this.store.get(roleId); if (role.type !== CUSTOM_ROLE_TYPE) { throw new InvalidOperationError( 'You cannot change built in roles.', ); } } async validateRole( role: IRoleValidation, existingId?: number, ): Promise { const cleanedRole = await roleSchema.validateAsync(role); if (existingId) { await this.validateRoleIsNotBuiltIn(existingId); } await this.validateRoleIsUnique(role.name, existingId); return cleanedRole; } async isChangeRequestsEnabled( project: string, environment: string, ): Promise { return this.store.isChangeRequestsEnabled(project, environment); } }