Skip to content

Commit

Permalink
Merge pull request #14853 from Budibase/fix/role-validation
Browse files Browse the repository at this point in the history
Role validation - allow permissionId to be optional
  • Loading branch information
mike12345567 authored Oct 23, 2024
2 parents ad475be + 8ebb02e commit 9d05f32
Show file tree
Hide file tree
Showing 15 changed files with 104 additions and 60 deletions.
14 changes: 5 additions & 9 deletions packages/backend-core/src/security/permissions.ts
Original file line number Diff line number Diff line change
@@ -1,4 +1,8 @@
import { PermissionLevel, PermissionType } from "@budibase/types"
import {
PermissionLevel,
PermissionType,
BuiltinPermissionID,
} from "@budibase/types"
import flatten from "lodash/flatten"
import cloneDeep from "lodash/fp/cloneDeep"

Expand Down Expand Up @@ -57,14 +61,6 @@ export function getAllowedLevels(userPermLevel: PermissionLevel): string[] {
}
}

export enum BuiltinPermissionID {
PUBLIC = "public",
READ_ONLY = "read_only",
WRITE = "write",
ADMIN = "admin",
POWER = "power",
}

export const BUILTIN_PERMISSIONS: {
[key in keyof typeof BuiltinPermissionID]: {
_id: (typeof BuiltinPermissionID)[key]
Expand Down
7 changes: 4 additions & 3 deletions packages/backend-core/src/security/roles.ts
Original file line number Diff line number Diff line change
@@ -1,5 +1,4 @@
import semver from "semver"
import { BuiltinPermissionID, PermissionLevel } from "./permissions"
import {
prefixRoleID,
getRoleParams,
Expand All @@ -14,6 +13,8 @@ import {
RoleUIMetadata,
Database,
App,
BuiltinPermissionID,
PermissionLevel,
} from "@budibase/types"
import cloneDeep from "lodash/fp/cloneDeep"
import { RoleColor, helpers } from "@budibase/shared-core"
Expand Down Expand Up @@ -50,7 +51,7 @@ export class Role implements RoleDoc {
_id: string
_rev?: string
name: string
permissionId: string
permissionId: BuiltinPermissionID
inherits?: string | string[]
version?: string
permissions: Record<string, PermissionLevel[]> = {}
Expand All @@ -59,7 +60,7 @@ export class Role implements RoleDoc {
constructor(
id: string,
name: string,
permissionId: string,
permissionId: BuiltinPermissionID,
uiMetadata?: RoleUIMetadata
) {
this._id = id
Expand Down
7 changes: 4 additions & 3 deletions packages/backend-core/src/security/tests/permissions.spec.ts
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
import cloneDeep from "lodash/cloneDeep"
import * as permissions from "../permissions"
import { BUILTIN_ROLE_IDS } from "../roles"
import { BuiltinPermissionID } from "@budibase/types"

describe("levelToNumber", () => {
it("should return 0 for EXECUTE", () => {
Expand Down Expand Up @@ -77,7 +78,7 @@ describe("doesHaveBasePermission", () => {
const rolesHierarchy = [
{
roleId: BUILTIN_ROLE_IDS.ADMIN,
permissionId: permissions.BuiltinPermissionID.ADMIN,
permissionId: BuiltinPermissionID.ADMIN,
},
]
expect(
Expand All @@ -91,7 +92,7 @@ describe("doesHaveBasePermission", () => {
const rolesHierarchy = [
{
roleId: BUILTIN_ROLE_IDS.PUBLIC,
permissionId: permissions.BuiltinPermissionID.PUBLIC,
permissionId: BuiltinPermissionID.PUBLIC,
},
]
expect(
Expand Down Expand Up @@ -129,7 +130,7 @@ describe("getBuiltinPermissions", () => {
describe("getBuiltinPermissionByID", () => {
it("returns correct permission object for valid ID", () => {
const expectedPermission = {
_id: permissions.BuiltinPermissionID.PUBLIC,
_id: BuiltinPermissionID.PUBLIC,
name: "Public",
permissions: [
new permissions.Permission(
Expand Down
10 changes: 8 additions & 2 deletions packages/server/src/api/controllers/role.ts
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ import {
UserCtx,
UserMetadata,
DocumentType,
PermissionLevel,
BuiltinPermissionID,
} from "@budibase/types"
import { RoleColor, sdk as sharedSdk, helpers } from "@budibase/shared-core"
import sdk from "../../sdk"
Expand Down Expand Up @@ -134,7 +134,13 @@ export async function save(ctx: UserCtx<SaveRoleRequest, SaveRoleResponse>) {
}
// assume write permission level for newly created roles
if (isCreate && !permissionId) {
permissionId = PermissionLevel.WRITE
permissionId = BuiltinPermissionID.WRITE
} else if (!permissionId && dbRole?.permissionId) {
permissionId = dbRole.permissionId
}

if (!permissionId) {
ctx.throw(400, "Role requires permissionId to be specified.")
}

const role = new roles.Role(_id, name, permissionId, {
Expand Down
6 changes: 3 additions & 3 deletions packages/server/src/api/routes/tests/application.spec.ts
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ import * as setup from "./utilities"
import { AppStatus } from "../../../db/utils"
import { events, utils, context, features } from "@budibase/backend-core"
import env from "../../../environment"
import { type App } from "@budibase/types"
import { type App, BuiltinPermissionID } from "@budibase/types"
import tk from "timekeeper"
import * as uuid from "uuid"
import { structures } from "@budibase/backend-core/tests"
Expand Down Expand Up @@ -80,7 +80,7 @@ describe("/applications", () => {
const role = await config.api.roles.save({
name: "Test",
inherits: "PUBLIC",
permissionId: "read_only",
permissionId: BuiltinPermissionID.READ_ONLY,
version: "name",
})

Expand Down Expand Up @@ -112,7 +112,7 @@ describe("/applications", () => {
const role = await config.api.roles.save({
name: roleName,
inherits: "PUBLIC",
permissionId: "read_only",
permissionId: BuiltinPermissionID.READ_ONLY,
version: "name",
})

Expand Down
15 changes: 11 additions & 4 deletions packages/server/src/api/routes/tests/permissions.spec.ts
Original file line number Diff line number Diff line change
@@ -1,5 +1,12 @@
import { roles } from "@budibase/backend-core"
import { Document, PermissionLevel, Role, Row, Table } from "@budibase/types"
import {
BuiltinPermissionID,
Document,
PermissionLevel,
Role,
Row,
Table,
} from "@budibase/types"
import * as setup from "./utilities"
import { generator, mocks } from "@budibase/backend-core/tests"

Expand Down Expand Up @@ -304,15 +311,15 @@ describe("/permission", () => {
role1 = await config.api.roles.save(
{
name: "test_1",
permissionId: PermissionLevel.WRITE,
permissionId: BuiltinPermissionID.WRITE,
inherits: BUILTIN_ROLE_IDS.BASIC,
},
{ status: 200 }
)
role2 = await config.api.roles.save(
{
name: "test_2",
permissionId: PermissionLevel.WRITE,
permissionId: BuiltinPermissionID.WRITE,
inherits: BUILTIN_ROLE_IDS.BASIC,
},
{ status: 200 }
Expand Down Expand Up @@ -345,7 +352,7 @@ describe("/permission", () => {
it("should be able to fetch two tables, with different roles, using multi-inheritance", async () => {
const role3 = await config.api.roles.save({
name: "role3",
permissionId: PermissionLevel.WRITE,
permissionId: BuiltinPermissionID.WRITE,
inherits: [role1._id!, role2._id!],
})

Expand Down
58 changes: 39 additions & 19 deletions packages/server/src/api/routes/tests/role.spec.ts
Original file line number Diff line number Diff line change
@@ -1,15 +1,9 @@
import {
roles,
events,
permissions,
db as dbCore,
} from "@budibase/backend-core"
import { roles, events, db as dbCore } from "@budibase/backend-core"
import * as setup from "./utilities"
import { PermissionLevel } from "@budibase/types"
import { PermissionLevel, BuiltinPermissionID } from "@budibase/types"

const { basicRole } = setup.structures
const { BUILTIN_ROLE_IDS } = roles
const { BuiltinPermissionID } = permissions

const LOOP_ERROR = "Role inheritance contains a loop, this is not supported"

Expand Down Expand Up @@ -58,6 +52,19 @@ describe("/roles", () => {
})
expect(res.inherits).toEqual([BUILTIN_ROLE_IDS.BASIC])
})

it("save role without permissionId", async () => {
const res = await config.api.roles.save(
{
...basicRole(),
permissionId: undefined,
},
{
status: 200,
}
)
expect(res.permissionId).toEqual(PermissionLevel.WRITE)
})
})

describe("update", () => {
Expand Down Expand Up @@ -149,15 +156,15 @@ describe("/roles", () => {
_id: id1,
name: id1,
permissions: {},
permissionId: "write",
permissionId: BuiltinPermissionID.WRITE,
version: "name",
inherits: ["POWER"],
})
await config.api.roles.save({
_id: id2,
permissions: {},
name: id2,
permissionId: "write",
permissionId: BuiltinPermissionID.WRITE,
version: "name",
inherits: [id1],
})
Expand All @@ -176,10 +183,25 @@ describe("/roles", () => {
inherits: [BUILTIN_ROLE_IDS.ADMIN],
})
// remove the roles so that it will default back to DB roles, then save again
delete res.inherits
const updatedRes = await config.api.roles.save(res)
const updatedRes = await config.api.roles.save({
...res,
inherits: undefined,
})
expect(updatedRes.inherits).toEqual([BUILTIN_ROLE_IDS.ADMIN])
})

it("handle updating a role, without its permissionId", async () => {
const res = await config.api.roles.save({
...basicRole(),
permissionId: BuiltinPermissionID.READ_ONLY,
})
// permission ID can be removed during update
const updatedRes = await config.api.roles.save({
...res,
permissionId: undefined,
})
expect(updatedRes.permissionId).toEqual(BuiltinPermissionID.READ_ONLY)
})
})

describe("fetch", () => {
Expand Down Expand Up @@ -210,9 +232,7 @@ describe("/roles", () => {
const customRoleFetched = res.find(r => r._id === customRole.name)
expect(customRoleFetched).toBeDefined()
expect(customRoleFetched!.inherits).toEqual(BUILTIN_ROLE_IDS.BASIC)
expect(customRoleFetched!.permissionId).toEqual(
BuiltinPermissionID.READ_ONLY
)
expect(customRoleFetched!.permissionId).toEqual(BuiltinPermissionID.WRITE)
})

it("should be able to get the role with a permission added", async () => {
Expand Down Expand Up @@ -316,7 +336,7 @@ describe("/roles", () => {
await config.api.roles.save({
name: customRoleName,
inherits: roles.BUILTIN_ROLE_IDS.BASIC,
permissionId: permissions.BuiltinPermissionID.READ_ONLY,
permissionId: BuiltinPermissionID.READ_ONLY,
version: "name",
})
await config.withHeaders(
Expand Down Expand Up @@ -356,19 +376,19 @@ describe("/roles", () => {
const { _id: roleId1 } = await config.api.roles.save({
name: role1,
inherits: roles.BUILTIN_ROLE_IDS.BASIC,
permissionId: permissions.BuiltinPermissionID.WRITE,
permissionId: BuiltinPermissionID.WRITE,
version: "name",
})
const { _id: roleId2 } = await config.api.roles.save({
name: role2,
inherits: roles.BUILTIN_ROLE_IDS.POWER,
permissionId: permissions.BuiltinPermissionID.POWER,
permissionId: BuiltinPermissionID.POWER,
version: "name",
})
await config.api.roles.save({
name: role3,
inherits: [roleId1!, roleId2!],
permissionId: permissions.BuiltinPermissionID.READ_ONLY,
permissionId: BuiltinPermissionID.READ_ONLY,
version: "name",
})
const headers = await config.roleHeaders({
Expand Down
8 changes: 4 additions & 4 deletions packages/server/src/api/routes/tests/screen.spec.ts
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
import { checkBuilderEndpoint } from "./utilities/TestFunctions"
import * as setup from "./utilities"
import { events, roles } from "@budibase/backend-core"
import { Screen, PermissionLevel, Role } from "@budibase/types"
import { Screen, Role, BuiltinPermissionID } from "@budibase/types"

const { basicScreen } = setup.structures

Expand Down Expand Up @@ -40,17 +40,17 @@ describe("/screens", () => {
role1 = await config.api.roles.save({
name: "role1",
inherits: roles.BUILTIN_ROLE_IDS.BASIC,
permissionId: PermissionLevel.WRITE,
permissionId: BuiltinPermissionID.WRITE,
})
role2 = await config.api.roles.save({
name: "role2",
inherits: roles.BUILTIN_ROLE_IDS.BASIC,
permissionId: PermissionLevel.WRITE,
permissionId: BuiltinPermissionID.WRITE,
})
multiRole = await config.api.roles.save({
name: "multiRole",
inherits: [role1._id!, role2._id!],
permissionId: PermissionLevel.WRITE,
permissionId: BuiltinPermissionID.WRITE,
})
screen1 = await config.api.screen.save(
{
Expand Down
5 changes: 3 additions & 2 deletions packages/server/src/api/routes/utils/validators.ts
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ import {
SearchFilters,
Table,
WebhookActionType,
BuiltinPermissionID,
} from "@budibase/types"
import Joi, { CustomValidator } from "joi"
import { ValidSnippetNameRegex, helpers } from "@budibase/shared-core"
Expand Down Expand Up @@ -214,8 +215,8 @@ export function roleValidator() {
}).optional(),
// this is the base permission ID (for now a built in)
permissionId: Joi.string()
.valid(...Object.values(permissions.BuiltinPermissionID))
.required(),
.valid(...Object.values(BuiltinPermissionID))
.optional(),
permissions: Joi.object()
.pattern(
/.*/,
Expand Down
5 changes: 3 additions & 2 deletions packages/server/src/tests/utilities/structures.ts
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
import { permissions, roles, utils } from "@budibase/backend-core"
import { roles, utils } from "@budibase/backend-core"
import { createHomeScreen } from "../../constants/screens"
import { EMPTY_LAYOUT } from "../../constants/layouts"
import { cloneDeep } from "lodash/fp"
Expand Down Expand Up @@ -33,6 +33,7 @@ import {
TableSourceType,
Webhook,
WebhookActionType,
BuiltinPermissionID,
} from "@budibase/types"
import { LoopInput } from "../../definitions/automations"
import { merge } from "lodash"
Expand Down Expand Up @@ -515,7 +516,7 @@ export function basicRole(): Role {
return {
name: `NewRole_${utils.newid()}`,
inherits: roles.BUILTIN_ROLE_IDS.BASIC,
permissionId: permissions.BuiltinPermissionID.READ_ONLY,
permissionId: BuiltinPermissionID.WRITE,
permissions: {},
version: "name",
}
Expand Down
4 changes: 2 additions & 2 deletions packages/shared-core/src/helpers/tests/roles.spec.ts
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
import { checkForRoleInheritanceLoops } from "../roles"
import { Role } from "@budibase/types"
import { BuiltinPermissionID, Role } from "@budibase/types"

/**
* This unit test exists as this utility will be used in the frontend and backend, confirmation
Expand All @@ -19,7 +19,7 @@ function role(id: string, inherits: string | string[]): TestRole {
_id: id,
inherits: inherits,
name: "ROLE",
permissionId: "PERMISSION",
permissionId: BuiltinPermissionID.WRITE,
permissions: {}, // not needed for this test
}
allRoles.push(role)
Expand Down
Loading

0 comments on commit 9d05f32

Please sign in to comment.