Skip to content

Commit

Permalink
feat: Added findByIdAccess endpoint to Proposal and Sample services
Browse files Browse the repository at this point in the history
  • Loading branch information
Junjiequan committed Jul 22, 2024
1 parent 24351da commit c29a1e1
Show file tree
Hide file tree
Showing 2 changed files with 104 additions and 22 deletions.
48 changes: 44 additions & 4 deletions src/proposals/proposals.controller.ts
Original file line number Diff line number Diff line change
Expand Up @@ -181,7 +181,7 @@ export class ProposalsController {
);

if (!canDoAction) {
throw new ForbiddenException("Unauthorized access");
throw new ForbiddenException("Unauthorized to this proposal");
}
}
return proposal;
Expand Down Expand Up @@ -516,8 +516,8 @@ export class ProposalsController {
return this.proposalsService.fullfacet(parsedFilters);
}

// GET /proposals/:id
@UseGuards(AuthenticatedPoliciesGuard)
// GET /proposals/:pid
@UseGuards(PoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.ProposalsRead, ProposalClass),
)
Expand All @@ -532,7 +532,7 @@ export class ProposalsController {
type: String,
})
@ApiResponse({
status: 200,
status: HttpStatus.OK,
type: ProposalClass,
isArray: false,
description: "Return proposal with pid specified",
Expand All @@ -546,9 +546,49 @@ export class ProposalsController {
proposalId,
Action.ProposalsRead,
);

return proposal;
}

// GET /proposals/:pid/access
@UseGuards(PoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.ProposalsRead, ProposalClass),
)
@Get("/:pid/access")
@ApiOperation({
summary: "Check user access to a specific proposal.",
description:
"Returns a boolean indicating whether the user has access to the proposal with the specified ID.",
})
@ApiParam({
name: "pid",
description: "ID of the proposal to check access for",
type: String,
})
@ApiResponse({
status: HttpStatus.OK,
type: Boolean,
description:
"Returns true if the user has access to the specified proposal, otherwise false.",
})
async findByIdAccess(
@Req() request: Request,
@Param("pid") proposalId: string,
): Promise<{ canAccess: boolean }> {
const proposal = await this.proposalsService.findOne({
proposalId,
});
if (!proposal) return { canAccess: false };

const canAccess = await this.permissionChecker(
Action.ProposalsRead,
proposal,
request,
);
return { canAccess: canAccess };
}

// PATCH /proposals/:pid
@UseGuards(PoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
Expand Down
78 changes: 60 additions & 18 deletions src/samples/samples.controller.ts
Original file line number Diff line number Diff line change
Expand Up @@ -63,6 +63,7 @@ import { Request } from "express";
import { JWTUser } from "src/auth/interfaces/jwt-user.interface";
import { IDatasetFields } from "src/datasets/interfaces/dataset-filters.interface";
import { CreateSubAttachmentDto } from "src/attachments/dto/create-sub-attachment.dto";
import { AuthenticatedPoliciesGuard } from "src/casl/guards/auth-check.guard";

@ApiBearerAuth()
@ApiTags("samples")
Expand Down Expand Up @@ -165,9 +166,8 @@ export class SamplesController {

if (sample) {
const canDoAction = await this.permissionChecker(group, sample, request);

if (!canDoAction) {
throw new ForbiddenException("Unauthorized to update this sample");
throw new ForbiddenException("Unauthorized to this sample");
}
}

Expand Down Expand Up @@ -242,7 +242,7 @@ export class SamplesController {
return mergedFilters;
}
// POST /samples
@UseGuards(PoliciesGuard)
@UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.SampleCreate, SampleClass),
)
Expand Down Expand Up @@ -280,7 +280,7 @@ export class SamplesController {
}

// GET /samples
@UseGuards(PoliciesGuard)
@UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.SampleRead, SampleClass),
)
Expand Down Expand Up @@ -314,7 +314,7 @@ export class SamplesController {
}

// GET /samples/fullquery
@UseGuards(PoliciesGuard)
@UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.SampleRead, SampleClass),
)
Expand Down Expand Up @@ -391,7 +391,7 @@ export class SamplesController {
}

// GET /samples/metadataKeys
@UseGuards(PoliciesGuard)
@UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.SampleRead, SampleClass),
)
Expand Down Expand Up @@ -463,7 +463,7 @@ export class SamplesController {
}

// GET /samples/findOne
@UseGuards(PoliciesGuard)
@UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.SampleRead, SampleClass),
)
Expand Down Expand Up @@ -546,12 +546,54 @@ export class SamplesController {
@Req() request: Request,
@Param("id") id: string,
): Promise<SampleClass | null> {
await this.checkPermissionsForSample(request, id, Action.SampleRead);
return this.samplesService.findOne({ sampleId: id });
const sample = await this.checkPermissionsForSample(
request,
id,
Action.SampleRead,
);
return sample;
}

// PATCH /samples/:id
// GET /samples/:id/access
@UseGuards(PoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.SampleRead, SampleClass),
)
@Get("/:id/access")
@ApiOperation({
summary: "Check user access to a specific sample.",
description:
"Returns a boolean indicating whether the user has access to the sample with the specified ID.",
})
@ApiParam({
name: "pid",
description: "ID of the sample to check access for",
type: String,
})
@ApiResponse({
status: HttpStatus.OK,
type: Boolean,
description:
"Returns true if the user has access to the specified sample, otherwise false.",
})
async findByIdAccess(
@Req() request: Request,
@Param("id") id: string,
): Promise<{ canAccess: boolean }> {
const sample = await this.samplesService.findOne({
sampleId: id,
});
if (!sample) return { canAccess: false };
const canAccess = await this.permissionChecker(
Action.SampleRead,
sample,
request,
);
return { canAccess };
}

// PATCH /samples/:id
@UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.SampleUpdate, SampleClass),
)
Expand Down Expand Up @@ -618,7 +660,7 @@ export class SamplesController {
}

// POST /samples/:id/attachments
@UseGuards(PoliciesGuard)
@UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.SampleAttachmentDelete, SampleClass),
)
Expand Down Expand Up @@ -670,7 +712,7 @@ export class SamplesController {
}

// GET /samples/:id/attachments
@UseGuards(PoliciesGuard)
@UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.SampleAttachmentRead, SampleClass),
)
Expand Down Expand Up @@ -704,7 +746,7 @@ export class SamplesController {
}

// GET /samples/:id/attachments/:fk
@UseGuards(PoliciesGuard)
@UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.SampleAttachmentRead, SampleClass),
)
Expand Down Expand Up @@ -747,7 +789,7 @@ export class SamplesController {
}

// DELETE /samples/:id/attachments/:fk
@UseGuards(PoliciesGuard)
@UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.SampleAttachmentDelete, SampleClass),
)
Expand Down Expand Up @@ -789,7 +831,7 @@ export class SamplesController {
}

// POST /samples/:id/datasets
/* @UseGuards(PoliciesGuard)
/* @UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) => ability.can(Action.Create, Dataset))
@Post("/:id/datasets")
async createDataset(
Expand All @@ -802,7 +844,7 @@ export class SamplesController {
*/

// GET /samples/:id/datasets
@UseGuards(PoliciesGuard)
@UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) =>
ability.can(Action.SampleDatasetRead, SampleClass),
)
Expand Down Expand Up @@ -865,7 +907,7 @@ export class SamplesController {
}

// PATCH /samples/:id/datasets/:fk
/* @UseGuards(PoliciesGuard)
/* @UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) => ability.can(Action.Update, Dataset))
@Patch("/:id/datasets/:fk")
async findOneDatasetAndUpdate(
Expand All @@ -880,7 +922,7 @@ export class SamplesController {
} */

// DELETE /samples/:id/datasets/:fk
/* @UseGuards(PoliciesGuard)
/* @UseGuards(AuthenticatedPoliciesGuard)
@CheckPolicies((ability: AppAbility) => ability.can(Action.Delete, Dataset))
@Delete("/:id/datasets/:fk")
async findOneDatasetAndRemove(
Expand Down

0 comments on commit c29a1e1

Please sign in to comment.