0
Fork 0
mirror of https://github.com/TryGhost/Ghost.git synced 2025-02-17 23:44:39 -05:00
ghost/core/server/services/permissions/providers.js
Hannah Wolfe 42fc272433 Added members permission system
refs https://github.com/TryGhost/Team/issues/1664

- the new member comments API needs members to have permissions to edit and delete their own posts
- added members as a provider, and then wired up permissible logic at the model level
2022-07-12 10:24:02 +02:00

92 lines
3.3 KiB
JavaScript

const _ = require('lodash');
const Promise = require('bluebird');
const models = require('../../models');
const errors = require('@tryghost/errors');
const tpl = require('@tryghost/tpl');
const messages = {
userNotFound: 'User not found',
apiKeyNotFound: 'API Key not found',
memberNotFound: 'Member not found'
};
module.exports = {
user: function (id) {
return models.User.findOne({id: id}, {withRelated: ['permissions', 'roles', 'roles.permissions']})
.then(function (foundUser) {
// CASE: {context: {user: id}} where the id is not in our database
if (!foundUser) {
return Promise.reject(new errors.NotFoundError({
message: tpl(messages.userNotFound)
}));
}
if (foundUser.get('status') !== 'active') {
return Promise.reject(new errors.UnauthorizedError());
}
const seenPerms = {};
const rolePerms = _.map(foundUser.related('roles').models, function (role) {
return role.related('permissions').models;
});
const allPerms = [];
const user = foundUser.toJSON();
rolePerms.push(foundUser.related('permissions').models);
_.each(rolePerms, function (rolePermGroup) {
_.each(rolePermGroup, function (perm) {
const key = perm.get('action_type') + '-' + perm.get('object_type') + '-' + perm.get('object_id');
// Only add perms once
if (seenPerms[key]) {
return;
}
allPerms.push(perm);
seenPerms[key] = true;
});
});
// @TODO fix this!
// Permissions is an array of models
// Roles is a JSON array
return {permissions: allPerms, roles: user.roles};
});
},
apiKey(id) {
return models.ApiKey.findOne({id}, {withRelated: ['role', 'role.permissions']})
.then((foundApiKey) => {
if (!foundApiKey) {
throw new errors.NotFoundError({
message: tpl(messages.apiKeyNotFound)
});
}
// api keys have a belongs_to relationship to a role and no individual permissions
// so there's no need for permission deduplication
const permissions = foundApiKey.related('role').related('permissions').models;
const roles = [foundApiKey.toJSON().role];
return {permissions, roles};
});
},
async member(id) {
const foundMember = await models.Member.findOne({id});
if (!foundMember) {
throw new errors.NotFoundError({
message: tpl(messages.memberNotFound)
});
}
// @TODO: figure out how we want to associate members with permissions
// Dirty code to load all comment permissions except moderation for members
const permissions = await models.Permission.findAll({filter: 'object_type:comment+action_type:-moderate'});
return {permissions: permissions.models};
}
};