@backstage-community/plugin-rbac 1.32.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +761 -0
- package/README.md +106 -0
- package/app-config.yaml +19 -0
- package/dist/api/LicensedUsersClient.esm.js +45 -0
- package/dist/api/LicensedUsersClient.esm.js.map +1 -0
- package/dist/api/RBACBackendClient.esm.js +337 -0
- package/dist/api/RBACBackendClient.esm.js.map +1 -0
- package/dist/components/Administration.esm.js +23 -0
- package/dist/components/Administration.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/AddNestedConditionButton.esm.js +23 -0
- package/dist/components/ConditionalAccess/AddNestedConditionButton.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/ComplexConditionRow.esm.js +149 -0
- package/dist/components/ConditionalAccess/ComplexConditionRow.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/ComplexConditionRowButtons.esm.js +62 -0
- package/dist/components/ConditionalAccess/ComplexConditionRowButtons.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/ConditionRule.esm.js +34 -0
- package/dist/components/ConditionalAccess/ConditionRule.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/ConditionalAccessSidebar.esm.js +93 -0
- package/dist/components/ConditionalAccess/ConditionalAccessSidebar.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/ConditionsForm.esm.js +204 -0
- package/dist/components/ConditionalAccess/ConditionsForm.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/ConditionsFormRow.esm.js +459 -0
- package/dist/components/ConditionalAccess/ConditionsFormRow.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/ConditionsFormRowFields.esm.js +209 -0
- package/dist/components/ConditionalAccess/ConditionsFormRowFields.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/CriteriaToggleButton.esm.js +33 -0
- package/dist/components/ConditionalAccess/CriteriaToggleButton.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/CustomArrayField.esm.js +47 -0
- package/dist/components/ConditionalAccess/CustomArrayField.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/RulesDropdownOption.esm.js +24 -0
- package/dist/components/ConditionalAccess/RulesDropdownOption.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/const.esm.js +21 -0
- package/dist/components/ConditionalAccess/const.esm.js.map +1 -0
- package/dist/components/ConditionalAccess/types.esm.js +8 -0
- package/dist/components/ConditionalAccess/types.esm.js.map +1 -0
- package/dist/components/CreateRole/AddMembersForm.esm.js +94 -0
- package/dist/components/CreateRole/AddMembersForm.esm.js.map +1 -0
- package/dist/components/CreateRole/AddedMembersTable.esm.js +31 -0
- package/dist/components/CreateRole/AddedMembersTable.esm.js.map +1 -0
- package/dist/components/CreateRole/AddedMembersTableColumn.esm.js +77 -0
- package/dist/components/CreateRole/AddedMembersTableColumn.esm.js.map +1 -0
- package/dist/components/CreateRole/CreateRolePage.esm.js +53 -0
- package/dist/components/CreateRole/CreateRolePage.esm.js.map +1 -0
- package/dist/components/CreateRole/EditRolePage.esm.js +65 -0
- package/dist/components/CreateRole/EditRolePage.esm.js.map +1 -0
- package/dist/components/CreateRole/MembersDropdownOption.esm.js +40 -0
- package/dist/components/CreateRole/MembersDropdownOption.esm.js.map +1 -0
- package/dist/components/CreateRole/PermissionPoliciesForm.esm.js +144 -0
- package/dist/components/CreateRole/PermissionPoliciesForm.esm.js.map +1 -0
- package/dist/components/CreateRole/PermissionPoliciesFormRow.esm.js +179 -0
- package/dist/components/CreateRole/PermissionPoliciesFormRow.esm.js.map +1 -0
- package/dist/components/CreateRole/PoliciesCheckboxGroup.esm.js +76 -0
- package/dist/components/CreateRole/PoliciesCheckboxGroup.esm.js.map +1 -0
- package/dist/components/CreateRole/ReviewStep.esm.js +50 -0
- package/dist/components/CreateRole/ReviewStep.esm.js.map +1 -0
- package/dist/components/CreateRole/ReviewStepTable.esm.js +29 -0
- package/dist/components/CreateRole/ReviewStepTable.esm.js.map +1 -0
- package/dist/components/CreateRole/RoleDetailsForm.esm.js +57 -0
- package/dist/components/CreateRole/RoleDetailsForm.esm.js.map +1 -0
- package/dist/components/CreateRole/RoleForm.esm.js +271 -0
- package/dist/components/CreateRole/RoleForm.esm.js.map +1 -0
- package/dist/components/CreateRole/SelectedPermissionPoliciesColumn.esm.js +34 -0
- package/dist/components/CreateRole/SelectedPermissionPoliciesColumn.esm.js.map +1 -0
- package/dist/components/CreateRole/const.esm.js +14 -0
- package/dist/components/CreateRole/const.esm.js.map +1 -0
- package/dist/components/DownloadUserStatistics.esm.js +51 -0
- package/dist/components/DownloadUserStatistics.esm.js.map +1 -0
- package/dist/components/EditRole.esm.js +30 -0
- package/dist/components/EditRole.esm.js.map +1 -0
- package/dist/components/RbacPage.esm.js +18 -0
- package/dist/components/RbacPage.esm.js.map +1 -0
- package/dist/components/RoleOverview/AboutCard.esm.js +89 -0
- package/dist/components/RoleOverview/AboutCard.esm.js.map +1 -0
- package/dist/components/RoleOverview/MembersCard.esm.js +87 -0
- package/dist/components/RoleOverview/MembersCard.esm.js.map +1 -0
- package/dist/components/RoleOverview/MembersListColumns.esm.js +48 -0
- package/dist/components/RoleOverview/MembersListColumns.esm.js.map +1 -0
- package/dist/components/RoleOverview/PermissionsCard.esm.js +99 -0
- package/dist/components/RoleOverview/PermissionsCard.esm.js.map +1 -0
- package/dist/components/RoleOverview/PermissionsListColumns.esm.js +43 -0
- package/dist/components/RoleOverview/PermissionsListColumns.esm.js.map +1 -0
- package/dist/components/RoleOverview/RoleOverviewPage.esm.js +49 -0
- package/dist/components/RoleOverview/RoleOverviewPage.esm.js.map +1 -0
- package/dist/components/RolesList/DeleteRole.esm.js +32 -0
- package/dist/components/RolesList/DeleteRole.esm.js.map +1 -0
- package/dist/components/RolesList/DeleteRoleDialog.esm.js +142 -0
- package/dist/components/RolesList/DeleteRoleDialog.esm.js.map +1 -0
- package/dist/components/RolesList/RolesList.esm.js +102 -0
- package/dist/components/RolesList/RolesList.esm.js.map +1 -0
- package/dist/components/RolesList/RolesListColumns.esm.js +76 -0
- package/dist/components/RolesList/RolesListColumns.esm.js.map +1 -0
- package/dist/components/RolesList/RolesListToolbar.esm.js +48 -0
- package/dist/components/RolesList/RolesListToolbar.esm.js.map +1 -0
- package/dist/components/Router.esm.js +57 -0
- package/dist/components/Router.esm.js.map +1 -0
- package/dist/components/SnackbarAlert.esm.js +23 -0
- package/dist/components/SnackbarAlert.esm.js.map +1 -0
- package/dist/components/ToastContext.esm.js +19 -0
- package/dist/components/ToastContext.esm.js.map +1 -0
- package/dist/components/index.esm.js +5 -0
- package/dist/components/index.esm.js.map +1 -0
- package/dist/hooks/useCheckIfLicensePluginEnabled.esm.js +20 -0
- package/dist/hooks/useCheckIfLicensePluginEnabled.esm.js.map +1 -0
- package/dist/hooks/useConditionRules.esm.js +64 -0
- package/dist/hooks/useConditionRules.esm.js.map +1 -0
- package/dist/hooks/useLocationToast.esm.js +15 -0
- package/dist/hooks/useLocationToast.esm.js.map +1 -0
- package/dist/hooks/useMembers.esm.js +92 -0
- package/dist/hooks/useMembers.esm.js.map +1 -0
- package/dist/hooks/usePermissionPolicies.esm.js +80 -0
- package/dist/hooks/usePermissionPolicies.esm.js.map +1 -0
- package/dist/hooks/useRole.esm.js +23 -0
- package/dist/hooks/useRole.esm.js.map +1 -0
- package/dist/hooks/useRoles.esm.js +169 -0
- package/dist/hooks/useRoles.esm.js.map +1 -0
- package/dist/hooks/useSelectedMembers.esm.js +39 -0
- package/dist/hooks/useSelectedMembers.esm.js.map +1 -0
- package/dist/index.d.ts +17 -0
- package/dist/index.esm.js +4 -0
- package/dist/index.esm.js.map +1 -0
- package/dist/plugin.esm.js +49 -0
- package/dist/plugin.esm.js.map +1 -0
- package/dist/routes.esm.js +23 -0
- package/dist/routes.esm.js.map +1 -0
- package/dist/utils/conditional-access-utils.esm.js +268 -0
- package/dist/utils/conditional-access-utils.esm.js.map +1 -0
- package/dist/utils/create-role-utils.esm.js +231 -0
- package/dist/utils/create-role-utils.esm.js.map +1 -0
- package/dist/utils/rbac-utils.esm.js +256 -0
- package/dist/utils/rbac-utils.esm.js.map +1 -0
- package/dist/utils/role-form-utils.esm.js +66 -0
- package/dist/utils/role-form-utils.esm.js.map +1 -0
- package/package.json +120 -0
|
@@ -0,0 +1,231 @@
|
|
|
1
|
+
import { getTitleCase } from '@janus-idp/shared-react';
|
|
2
|
+
import * as yup from 'yup';
|
|
3
|
+
import { isResourcedPolicy } from '@backstage-community/plugin-rbac-common';
|
|
4
|
+
import { criterias } from '../components/ConditionalAccess/const.esm.js';
|
|
5
|
+
|
|
6
|
+
const uniqBy = (arr, iteratee) => {
|
|
7
|
+
return arr.filter(
|
|
8
|
+
(x, i, self) => i === self.findIndex((y) => iteratee(x) === iteratee(y))
|
|
9
|
+
);
|
|
10
|
+
};
|
|
11
|
+
const getRoleData = (values) => {
|
|
12
|
+
return {
|
|
13
|
+
memberReferences: values.selectedMembers.map(
|
|
14
|
+
(mem) => mem.ref
|
|
15
|
+
),
|
|
16
|
+
name: `${values.kind}:${values.namespace}/${values.name}`,
|
|
17
|
+
metadata: {
|
|
18
|
+
description: values.description
|
|
19
|
+
}
|
|
20
|
+
};
|
|
21
|
+
};
|
|
22
|
+
const validationSchema = yup.object({
|
|
23
|
+
name: yup.string().required("Name is required"),
|
|
24
|
+
selectedMembers: yup.array().min(1, "No member selected"),
|
|
25
|
+
permissionPoliciesRows: yup.array().of(
|
|
26
|
+
yup.object().shape({
|
|
27
|
+
plugin: yup.string().required("Plugin is required"),
|
|
28
|
+
permission: yup.string().required("Permission is required")
|
|
29
|
+
})
|
|
30
|
+
)
|
|
31
|
+
});
|
|
32
|
+
const getMembersCount = (member) => {
|
|
33
|
+
return member.kind === "Group" ? member.relations?.reduce((acc, relation) => {
|
|
34
|
+
let temp = acc;
|
|
35
|
+
if (relation.type === "hasMember") {
|
|
36
|
+
temp++;
|
|
37
|
+
}
|
|
38
|
+
return temp;
|
|
39
|
+
}, 0) : void 0;
|
|
40
|
+
};
|
|
41
|
+
const getParentGroupsCount = (member) => {
|
|
42
|
+
return member.kind === "Group" ? member.relations?.reduce((acc, relation) => {
|
|
43
|
+
let temp = acc;
|
|
44
|
+
if (relation.type === "childOf") {
|
|
45
|
+
temp++;
|
|
46
|
+
}
|
|
47
|
+
return temp;
|
|
48
|
+
}, 0) : void 0;
|
|
49
|
+
};
|
|
50
|
+
const getChildGroupsCount = (member) => {
|
|
51
|
+
return member.kind === "Group" ? member.relations?.reduce((acc, relation) => {
|
|
52
|
+
let temp = acc;
|
|
53
|
+
if (relation.type === "parentOf") {
|
|
54
|
+
temp++;
|
|
55
|
+
}
|
|
56
|
+
return temp;
|
|
57
|
+
}, 0) : void 0;
|
|
58
|
+
};
|
|
59
|
+
const getPermissionPolicies = (policies) => {
|
|
60
|
+
return policies.reduce(
|
|
61
|
+
(ppsAcc, policy) => {
|
|
62
|
+
const permission = isResourcedPolicy(policy) ? policy.resourceType : policy.name;
|
|
63
|
+
return {
|
|
64
|
+
...ppsAcc,
|
|
65
|
+
[permission]: policies.reduce(
|
|
66
|
+
(policiesAcc, pol) => {
|
|
67
|
+
const perm = isResourcedPolicy(pol) ? pol.resourceType : pol.name;
|
|
68
|
+
if (permission === perm)
|
|
69
|
+
return {
|
|
70
|
+
policies: uniqBy(
|
|
71
|
+
[...policiesAcc.policies, getTitleCase(pol.policy)],
|
|
72
|
+
(val) => val
|
|
73
|
+
),
|
|
74
|
+
isResourced: isResourcedPolicy(pol)
|
|
75
|
+
};
|
|
76
|
+
return policiesAcc;
|
|
77
|
+
},
|
|
78
|
+
{ policies: [], isResourced: false }
|
|
79
|
+
)
|
|
80
|
+
};
|
|
81
|
+
},
|
|
82
|
+
{}
|
|
83
|
+
);
|
|
84
|
+
};
|
|
85
|
+
const getPluginsPermissionPoliciesData = (pluginsPermissionPolicies) => {
|
|
86
|
+
const plugins = pluginsPermissionPolicies.map(
|
|
87
|
+
(pluginPp) => pluginPp.pluginId
|
|
88
|
+
);
|
|
89
|
+
const pluginsPermissions = pluginsPermissionPolicies.reduce(
|
|
90
|
+
(acc, pp, index) => {
|
|
91
|
+
const permissions = pp.policies.reduce((plcAcc, plc) => {
|
|
92
|
+
const permission = isResourcedPolicy(plc) ? plc.resourceType : plc.name;
|
|
93
|
+
return [...plcAcc, permission];
|
|
94
|
+
}, []);
|
|
95
|
+
return {
|
|
96
|
+
...acc,
|
|
97
|
+
[plugins[index]]: {
|
|
98
|
+
permissions: uniqBy(permissions ?? [], (val) => val),
|
|
99
|
+
policies: {
|
|
100
|
+
...pp.policies ? getPermissionPolicies(pp.policies) : {}
|
|
101
|
+
}
|
|
102
|
+
}
|
|
103
|
+
};
|
|
104
|
+
},
|
|
105
|
+
{}
|
|
106
|
+
);
|
|
107
|
+
return { plugins, pluginsPermissions };
|
|
108
|
+
};
|
|
109
|
+
const getPermissionPoliciesData = (values) => {
|
|
110
|
+
const { kind, name, namespace, permissionPoliciesRows } = values;
|
|
111
|
+
return permissionPoliciesRows.reduce(
|
|
112
|
+
(acc, permissionPolicyRow) => {
|
|
113
|
+
const { permission, policies, conditions } = permissionPolicyRow;
|
|
114
|
+
const permissionPoliciesData = policies.reduce(
|
|
115
|
+
(pAcc, policy) => {
|
|
116
|
+
if (policy.effect === "allow" && !conditions) {
|
|
117
|
+
return [
|
|
118
|
+
...pAcc,
|
|
119
|
+
{
|
|
120
|
+
entityReference: `${kind}:${namespace}/${name}`,
|
|
121
|
+
permission: `${permission}`,
|
|
122
|
+
policy: policy.policy.toLocaleLowerCase("en-US"),
|
|
123
|
+
effect: "allow"
|
|
124
|
+
}
|
|
125
|
+
];
|
|
126
|
+
}
|
|
127
|
+
return pAcc;
|
|
128
|
+
},
|
|
129
|
+
[]
|
|
130
|
+
);
|
|
131
|
+
return [...acc, ...permissionPoliciesData];
|
|
132
|
+
},
|
|
133
|
+
[]
|
|
134
|
+
);
|
|
135
|
+
};
|
|
136
|
+
const getConditionalPermissionPoliciesData = (values) => {
|
|
137
|
+
const { kind, name, namespace, permissionPoliciesRows } = values;
|
|
138
|
+
return permissionPoliciesRows.reduce(
|
|
139
|
+
(acc, permissionPolicyRow) => {
|
|
140
|
+
const { permission, policies, isResourced, plugin, conditions } = permissionPolicyRow;
|
|
141
|
+
const permissionMapping = policies.reduce((pAcc, policy) => {
|
|
142
|
+
if (policy.effect === "allow") {
|
|
143
|
+
return [...pAcc, policy.policy.toLocaleLowerCase("en-US")];
|
|
144
|
+
}
|
|
145
|
+
return pAcc;
|
|
146
|
+
}, []);
|
|
147
|
+
return isResourced && conditions ? [
|
|
148
|
+
...acc,
|
|
149
|
+
{
|
|
150
|
+
result: "CONDITIONAL",
|
|
151
|
+
roleEntityRef: `${kind}:${namespace}/${name}`,
|
|
152
|
+
pluginId: `${plugin}`,
|
|
153
|
+
resourceType: `${permission}`,
|
|
154
|
+
permissionMapping,
|
|
155
|
+
conditions: Object.keys(conditions)[0] === criterias.condition ? { ...conditions.condition } : conditions
|
|
156
|
+
}
|
|
157
|
+
] : acc;
|
|
158
|
+
},
|
|
159
|
+
[]
|
|
160
|
+
);
|
|
161
|
+
};
|
|
162
|
+
const getUpdatedConditionalPolicies = (values, initialValues) => {
|
|
163
|
+
const initialConditionsWithId = initialValues.permissionPoliciesRows.filter(
|
|
164
|
+
(ppr) => ppr.id
|
|
165
|
+
);
|
|
166
|
+
const conditionsWithId = values.permissionPoliciesRows.filter((ppr) => ppr.id);
|
|
167
|
+
return conditionsWithId.length > 0 ? conditionsWithId.reduce(
|
|
168
|
+
(acc, condition) => {
|
|
169
|
+
const conditionExists = initialConditionsWithId.find(
|
|
170
|
+
(c) => c.id === condition.id
|
|
171
|
+
);
|
|
172
|
+
if (conditionExists && condition.id)
|
|
173
|
+
return [
|
|
174
|
+
...acc,
|
|
175
|
+
{
|
|
176
|
+
id: condition.id,
|
|
177
|
+
updateCondition: getConditionalPermissionPoliciesData({
|
|
178
|
+
...values,
|
|
179
|
+
permissionPoliciesRows: [condition]
|
|
180
|
+
})[0]
|
|
181
|
+
}
|
|
182
|
+
];
|
|
183
|
+
return acc;
|
|
184
|
+
},
|
|
185
|
+
[]
|
|
186
|
+
) : [];
|
|
187
|
+
};
|
|
188
|
+
const getNewConditionalPolicies = (values) => {
|
|
189
|
+
const newValues = { ...values };
|
|
190
|
+
const newPermissionPolicies = values.permissionPoliciesRows.filter(
|
|
191
|
+
(ppr) => !ppr.id
|
|
192
|
+
);
|
|
193
|
+
newValues.permissionPoliciesRows = newPermissionPolicies;
|
|
194
|
+
return getConditionalPermissionPoliciesData(newValues);
|
|
195
|
+
};
|
|
196
|
+
const getRemovedConditionalPoliciesIds = (values, initialValues) => {
|
|
197
|
+
const initialConditionsIds = initialValues.permissionPoliciesRows.map((ppr) => ppr.id).filter((id) => id);
|
|
198
|
+
const newConditionsIds = values.permissionPoliciesRows.map((ppr) => ppr.id).filter((id) => id);
|
|
199
|
+
return initialConditionsIds.length > 0 ? initialConditionsIds.reduce((acc, oldId) => {
|
|
200
|
+
const conditionExists = newConditionsIds.includes(oldId);
|
|
201
|
+
if (conditionExists) return acc;
|
|
202
|
+
return oldId ? [...acc, oldId] : acc;
|
|
203
|
+
}, []) : [];
|
|
204
|
+
};
|
|
205
|
+
const getPermissionsNumber = (values) => {
|
|
206
|
+
return getPermissionPoliciesData(values).length + getConditionalPermissionPoliciesData(values).length;
|
|
207
|
+
};
|
|
208
|
+
const getRulesNumber = (conditions) => {
|
|
209
|
+
if (!conditions) return 0;
|
|
210
|
+
let rulesNumber = 0;
|
|
211
|
+
if (conditions.allOf) {
|
|
212
|
+
rulesNumber += conditions.allOf.reduce((acc, condition) => {
|
|
213
|
+
return acc + getRulesNumber(condition);
|
|
214
|
+
}, 0);
|
|
215
|
+
}
|
|
216
|
+
if (conditions.anyOf) {
|
|
217
|
+
rulesNumber += conditions.anyOf.reduce((acc, condition) => {
|
|
218
|
+
return acc + getRulesNumber(condition);
|
|
219
|
+
}, 0);
|
|
220
|
+
}
|
|
221
|
+
if (conditions.not) {
|
|
222
|
+
rulesNumber += getRulesNumber(conditions.not);
|
|
223
|
+
}
|
|
224
|
+
if (conditions.condition || Object.keys(conditions).includes("rule")) {
|
|
225
|
+
rulesNumber += 1;
|
|
226
|
+
}
|
|
227
|
+
return rulesNumber;
|
|
228
|
+
};
|
|
229
|
+
|
|
230
|
+
export { getChildGroupsCount, getConditionalPermissionPoliciesData, getMembersCount, getNewConditionalPolicies, getParentGroupsCount, getPermissionPolicies, getPermissionPoliciesData, getPermissionsNumber, getPluginsPermissionPoliciesData, getRemovedConditionalPoliciesIds, getRoleData, getRulesNumber, getUpdatedConditionalPolicies, uniqBy, validationSchema };
|
|
231
|
+
//# sourceMappingURL=create-role-utils.esm.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"create-role-utils.esm.js","sources":["../../src/utils/create-role-utils.ts"],"sourcesContent":["/*\n * Copyright 2024 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport { getTitleCase } from '@janus-idp/shared-react';\nimport * as yup from 'yup';\n\nimport {\n isResourcedPolicy,\n PluginPermissionMetaData,\n PolicyDetails,\n ResourcedPolicy,\n Role,\n RoleBasedPolicy,\n} from '@backstage-community/plugin-rbac-common';\n\nimport { criterias } from '../components/ConditionalAccess/const';\nimport { ConditionsData } from '../components/ConditionalAccess/types';\nimport {\n PermissionPolicies,\n PluginsPermissionPoliciesData,\n PluginsPermissions,\n RoleFormValues,\n SelectedMember,\n} from '../components/CreateRole/types';\nimport {\n MemberEntity,\n PermissionsData,\n RoleBasedConditions,\n UpdatedConditionsData,\n} from '../types';\n\nexport const uniqBy = (arr: string[], iteratee: (arg: string) => any) => {\n return arr.filter(\n (x, i, self) => i === self.findIndex(y => iteratee(x) === iteratee(y)),\n );\n};\n\nexport const getRoleData = (values: RoleFormValues): Role => {\n return {\n memberReferences: values.selectedMembers.map(\n (mem: SelectedMember) => mem.ref,\n ),\n name: `${values.kind}:${values.namespace}/${values.name}`,\n metadata: {\n description: values.description,\n },\n };\n};\n\nexport const validationSchema = yup.object({\n name: yup.string().required('Name is required'),\n selectedMembers: yup.array().min(1, 'No member selected'),\n permissionPoliciesRows: yup.array().of(\n yup.object().shape({\n plugin: yup.string().required('Plugin is required'),\n permission: yup.string().required('Permission is required'),\n }),\n ),\n});\n\nexport const getMembersCount = (member: MemberEntity) => {\n return member.kind === 'Group'\n ? member.relations?.reduce((acc: any, relation: { type: string }) => {\n let temp = acc;\n if (relation.type === 'hasMember') {\n temp++;\n }\n return temp;\n }, 0)\n : undefined;\n};\n\nexport const getParentGroupsCount = (member: MemberEntity) => {\n return member.kind === 'Group'\n ? member.relations?.reduce((acc: any, relation: { type: string }) => {\n let temp = acc;\n if (relation.type === 'childOf') {\n temp++;\n }\n return temp;\n }, 0)\n : undefined;\n};\n\nexport const getChildGroupsCount = (member: MemberEntity) => {\n return member.kind === 'Group'\n ? member.relations?.reduce((acc: any, relation: { type: string }) => {\n let temp = acc;\n if (relation.type === 'parentOf') {\n temp++;\n }\n return temp;\n }, 0)\n : undefined;\n};\n\nexport const getPermissionPolicies = (\n policies: PolicyDetails[],\n): PermissionPolicies => {\n return policies.reduce(\n (ppsAcc: PermissionPolicies, policy: PolicyDetails) => {\n const permission = isResourcedPolicy(policy)\n ? (policy as ResourcedPolicy).resourceType\n : policy.name;\n return {\n ...ppsAcc,\n [permission]: policies.reduce(\n (policiesAcc: { policies: string[]; isResourced: boolean }, pol) => {\n const perm = isResourcedPolicy(pol)\n ? (pol as ResourcedPolicy).resourceType\n : pol.name;\n if (permission === perm)\n return {\n policies: uniqBy(\n [...policiesAcc.policies, getTitleCase(pol.policy as string)],\n val => val,\n ),\n isResourced: isResourcedPolicy(pol),\n };\n return policiesAcc;\n },\n { policies: [], isResourced: false },\n ),\n };\n },\n {},\n );\n};\n\nexport const getPluginsPermissionPoliciesData = (\n pluginsPermissionPolicies: PluginPermissionMetaData[],\n): PluginsPermissionPoliciesData => {\n const plugins: string[] = pluginsPermissionPolicies.map(\n pluginPp => pluginPp.pluginId,\n );\n const pluginsPermissions = pluginsPermissionPolicies.reduce(\n (acc: PluginsPermissions, pp, index) => {\n const permissions = pp.policies.reduce((plcAcc: string[], plc) => {\n const permission = isResourcedPolicy(plc)\n ? (plc as ResourcedPolicy).resourceType\n : plc.name;\n return [...plcAcc, permission];\n }, []);\n return {\n ...acc,\n [plugins[index]]: {\n permissions: uniqBy(permissions ?? [], val => val),\n policies: {\n ...(pp.policies ? getPermissionPolicies(pp.policies) : {}),\n },\n },\n };\n },\n {},\n );\n return { plugins, pluginsPermissions };\n};\n\nexport const getPermissionPoliciesData = (\n values: RoleFormValues,\n): RoleBasedPolicy[] => {\n const { kind, name, namespace, permissionPoliciesRows } = values;\n\n return permissionPoliciesRows.reduce(\n (acc: RoleBasedPolicy[], permissionPolicyRow) => {\n const { permission, policies, conditions } = permissionPolicyRow;\n const permissionPoliciesData = policies.reduce(\n (pAcc: RoleBasedPolicy[], policy) => {\n if (policy.effect === 'allow' && !conditions) {\n return [\n ...pAcc,\n {\n entityReference: `${kind}:${namespace}/${name}`,\n permission: `${permission}`,\n policy: policy.policy.toLocaleLowerCase('en-US'),\n effect: 'allow',\n },\n ];\n }\n return pAcc;\n },\n [],\n );\n return [...acc, ...permissionPoliciesData];\n },\n [],\n );\n};\n\nexport const getConditionalPermissionPoliciesData = (\n values: RoleFormValues,\n) => {\n const { kind, name, namespace, permissionPoliciesRows } = values;\n\n return permissionPoliciesRows.reduce(\n (acc: RoleBasedConditions[], permissionPolicyRow: PermissionsData) => {\n const { permission, policies, isResourced, plugin, conditions } =\n permissionPolicyRow;\n const permissionMapping = policies.reduce((pAcc: string[], policy) => {\n if (policy.effect === 'allow') {\n return [...pAcc, policy.policy.toLocaleLowerCase('en-US')];\n }\n return pAcc;\n }, []);\n return isResourced && conditions\n ? [\n ...acc,\n {\n result: 'CONDITIONAL',\n roleEntityRef: `${kind}:${namespace}/${name}`,\n pluginId: `${plugin}`,\n resourceType: `${permission}`,\n permissionMapping,\n conditions:\n Object.keys(conditions)[0] === criterias.condition\n ? { ...conditions.condition }\n : conditions,\n } as RoleBasedConditions,\n ]\n : acc;\n },\n [] as RoleBasedConditions[],\n );\n};\n\nexport const getUpdatedConditionalPolicies = (\n values: RoleFormValues,\n initialValues: RoleFormValues,\n): UpdatedConditionsData => {\n const initialConditionsWithId = initialValues.permissionPoliciesRows.filter(\n ppr => ppr.id,\n );\n\n const conditionsWithId = values.permissionPoliciesRows.filter(ppr => ppr.id);\n\n return conditionsWithId.length > 0\n ? conditionsWithId.reduce(\n (\n acc: { id: number; updateCondition: RoleBasedConditions }[],\n condition: PermissionsData,\n ) => {\n const conditionExists = initialConditionsWithId.find(\n c => c.id === condition.id,\n );\n\n if (conditionExists && condition.id)\n return [\n ...acc,\n {\n id: condition.id,\n updateCondition: getConditionalPermissionPoliciesData({\n ...values,\n permissionPoliciesRows: [condition],\n })[0],\n },\n ];\n return acc;\n },\n [],\n )\n : [];\n};\n\nexport const getNewConditionalPolicies = (values: RoleFormValues) => {\n const newValues = { ...values };\n const newPermissionPolicies = values.permissionPoliciesRows.filter(\n ppr => !ppr.id,\n );\n newValues.permissionPoliciesRows = newPermissionPolicies;\n return getConditionalPermissionPoliciesData(newValues);\n};\n\nexport const getRemovedConditionalPoliciesIds = (\n values: RoleFormValues,\n initialValues: RoleFormValues,\n) => {\n const initialConditionsIds = initialValues.permissionPoliciesRows\n .map(ppr => ppr.id)\n .filter(id => id);\n\n const newConditionsIds = values.permissionPoliciesRows\n .map(ppr => ppr.id)\n .filter(id => id);\n\n return initialConditionsIds.length > 0\n ? initialConditionsIds.reduce((acc: number[], oldId) => {\n const conditionExists = newConditionsIds.includes(oldId);\n if (conditionExists) return acc;\n return oldId ? [...acc, oldId] : acc;\n }, [])\n : [];\n};\n\nexport const getPermissionsNumber = (values: RoleFormValues) => {\n return (\n getPermissionPoliciesData(values).length +\n getConditionalPermissionPoliciesData(values).length\n );\n};\n\nexport const getConditionsNumber = (values: RoleFormValues) => {\n return getConditionalPermissionPoliciesData(values)?.length ?? 0;\n};\n\nexport const getRulesNumber = (conditions?: ConditionsData) => {\n if (!conditions) return 0;\n let rulesNumber = 0;\n\n if (conditions.allOf) {\n rulesNumber += conditions.allOf.reduce((acc, condition) => {\n return acc + getRulesNumber(condition as ConditionsData);\n }, 0);\n }\n\n if (conditions.anyOf) {\n rulesNumber += conditions.anyOf.reduce((acc, condition) => {\n return acc + getRulesNumber(condition as ConditionsData);\n }, 0);\n }\n\n if (conditions.not) {\n rulesNumber += getRulesNumber(conditions.not as ConditionsData);\n }\n\n if (conditions.condition || Object.keys(conditions).includes('rule')) {\n rulesNumber += 1;\n }\n\n return rulesNumber;\n};\n"],"names":[],"mappings":";;;;;AA2Ca,MAAA,MAAA,GAAS,CAAC,GAAA,EAAe,QAAmC,KAAA;AACvE,EAAA,OAAO,GAAI,CAAA,MAAA;AAAA,IACT,CAAC,CAAA,EAAG,CAAG,EAAA,IAAA,KAAS,CAAM,KAAA,IAAA,CAAK,SAAU,CAAA,CAAA,CAAA,KAAK,QAAS,CAAA,CAAC,CAAM,KAAA,QAAA,CAAS,CAAC,CAAC,CAAA;AAAA,GACvE,CAAA;AACF,EAAA;AAEa,MAAA,WAAA,GAAc,CAAC,MAAiC,KAAA;AAC3D,EAAO,OAAA;AAAA,IACL,gBAAA,EAAkB,OAAO,eAAgB,CAAA,GAAA;AAAA,MACvC,CAAC,QAAwB,GAAI,CAAA,GAAA;AAAA,KAC/B;AAAA,IACA,IAAA,EAAM,GAAG,MAAO,CAAA,IAAI,IAAI,MAAO,CAAA,SAAS,CAAI,CAAA,EAAA,MAAA,CAAO,IAAI,CAAA,CAAA;AAAA,IACvD,QAAU,EAAA;AAAA,MACR,aAAa,MAAO,CAAA,WAAA;AAAA,KACtB;AAAA,GACF,CAAA;AACF,EAAA;AAEa,MAAA,gBAAA,GAAmB,IAAI,MAAO,CAAA;AAAA,EACzC,IAAM,EAAA,GAAA,CAAI,MAAO,EAAA,CAAE,SAAS,kBAAkB,CAAA;AAAA,EAC9C,iBAAiB,GAAI,CAAA,KAAA,EAAQ,CAAA,GAAA,CAAI,GAAG,oBAAoB,CAAA;AAAA,EACxD,sBAAA,EAAwB,GAAI,CAAA,KAAA,EAAQ,CAAA,EAAA;AAAA,IAClC,GAAA,CAAI,MAAO,EAAA,CAAE,KAAM,CAAA;AAAA,MACjB,MAAQ,EAAA,GAAA,CAAI,MAAO,EAAA,CAAE,SAAS,oBAAoB,CAAA;AAAA,MAClD,UAAY,EAAA,GAAA,CAAI,MAAO,EAAA,CAAE,SAAS,wBAAwB,CAAA;AAAA,KAC3D,CAAA;AAAA,GACH;AACF,CAAC,EAAA;AAEY,MAAA,eAAA,GAAkB,CAAC,MAAyB,KAAA;AACvD,EAAO,OAAA,MAAA,CAAO,SAAS,OACnB,GAAA,MAAA,CAAO,WAAW,MAAO,CAAA,CAAC,KAAU,QAA+B,KAAA;AACjE,IAAA,IAAI,IAAO,GAAA,GAAA,CAAA;AACX,IAAI,IAAA,QAAA,CAAS,SAAS,WAAa,EAAA;AACjC,MAAA,IAAA,EAAA,CAAA;AAAA,KACF;AACA,IAAO,OAAA,IAAA,CAAA;AAAA,GACT,EAAG,CAAC,CACJ,GAAA,KAAA,CAAA,CAAA;AACN,EAAA;AAEa,MAAA,oBAAA,GAAuB,CAAC,MAAyB,KAAA;AAC5D,EAAO,OAAA,MAAA,CAAO,SAAS,OACnB,GAAA,MAAA,CAAO,WAAW,MAAO,CAAA,CAAC,KAAU,QAA+B,KAAA;AACjE,IAAA,IAAI,IAAO,GAAA,GAAA,CAAA;AACX,IAAI,IAAA,QAAA,CAAS,SAAS,SAAW,EAAA;AAC/B,MAAA,IAAA,EAAA,CAAA;AAAA,KACF;AACA,IAAO,OAAA,IAAA,CAAA;AAAA,GACT,EAAG,CAAC,CACJ,GAAA,KAAA,CAAA,CAAA;AACN,EAAA;AAEa,MAAA,mBAAA,GAAsB,CAAC,MAAyB,KAAA;AAC3D,EAAO,OAAA,MAAA,CAAO,SAAS,OACnB,GAAA,MAAA,CAAO,WAAW,MAAO,CAAA,CAAC,KAAU,QAA+B,KAAA;AACjE,IAAA,IAAI,IAAO,GAAA,GAAA,CAAA;AACX,IAAI,IAAA,QAAA,CAAS,SAAS,UAAY,EAAA;AAChC,MAAA,IAAA,EAAA,CAAA;AAAA,KACF;AACA,IAAO,OAAA,IAAA,CAAA;AAAA,GACT,EAAG,CAAC,CACJ,GAAA,KAAA,CAAA,CAAA;AACN,EAAA;AAEa,MAAA,qBAAA,GAAwB,CACnC,QACuB,KAAA;AACvB,EAAA,OAAO,QAAS,CAAA,MAAA;AAAA,IACd,CAAC,QAA4B,MAA0B,KAAA;AACrD,MAAA,MAAM,aAAa,iBAAkB,CAAA,MAAM,CACtC,GAAA,MAAA,CAA2B,eAC5B,MAAO,CAAA,IAAA,CAAA;AACX,MAAO,OAAA;AAAA,QACL,GAAG,MAAA;AAAA,QACH,CAAC,UAAU,GAAG,QAAS,CAAA,MAAA;AAAA,UACrB,CAAC,aAA2D,GAAQ,KAAA;AAClE,YAAA,MAAM,OAAO,iBAAkB,CAAA,GAAG,CAC7B,GAAA,GAAA,CAAwB,eACzB,GAAI,CAAA,IAAA,CAAA;AACR,YAAA,IAAI,UAAe,KAAA,IAAA;AACjB,cAAO,OAAA;AAAA,gBACL,QAAU,EAAA,MAAA;AAAA,kBACR,CAAC,GAAG,WAAA,CAAY,UAAU,YAAa,CAAA,GAAA,CAAI,MAAgB,CAAC,CAAA;AAAA,kBAC5D,CAAO,GAAA,KAAA,GAAA;AAAA,iBACT;AAAA,gBACA,WAAA,EAAa,kBAAkB,GAAG,CAAA;AAAA,eACpC,CAAA;AACF,YAAO,OAAA,WAAA,CAAA;AAAA,WACT;AAAA,UACA,EAAE,QAAA,EAAU,EAAC,EAAG,aAAa,KAAM,EAAA;AAAA,SACrC;AAAA,OACF,CAAA;AAAA,KACF;AAAA,IACA,EAAC;AAAA,GACH,CAAA;AACF,EAAA;AAEa,MAAA,gCAAA,GAAmC,CAC9C,yBACkC,KAAA;AAClC,EAAA,MAAM,UAAoB,yBAA0B,CAAA,GAAA;AAAA,IAClD,cAAY,QAAS,CAAA,QAAA;AAAA,GACvB,CAAA;AACA,EAAA,MAAM,qBAAqB,yBAA0B,CAAA,MAAA;AAAA,IACnD,CAAC,GAAyB,EAAA,EAAA,EAAI,KAAU,KAAA;AACtC,MAAA,MAAM,cAAc,EAAG,CAAA,QAAA,CAAS,MAAO,CAAA,CAAC,QAAkB,GAAQ,KAAA;AAChE,QAAA,MAAM,aAAa,iBAAkB,CAAA,GAAG,CACnC,GAAA,GAAA,CAAwB,eACzB,GAAI,CAAA,IAAA,CAAA;AACR,QAAO,OAAA,CAAC,GAAG,MAAA,EAAQ,UAAU,CAAA,CAAA;AAAA,OAC/B,EAAG,EAAE,CAAA,CAAA;AACL,MAAO,OAAA;AAAA,QACL,GAAG,GAAA;AAAA,QACH,CAAC,OAAA,CAAQ,KAAK,CAAC,GAAG;AAAA,UAChB,aAAa,MAAO,CAAA,WAAA,IAAe,EAAC,EAAG,SAAO,GAAG,CAAA;AAAA,UACjD,QAAU,EAAA;AAAA,YACR,GAAI,EAAG,CAAA,QAAA,GAAW,sBAAsB,EAAG,CAAA,QAAQ,IAAI,EAAC;AAAA,WAC1D;AAAA,SACF;AAAA,OACF,CAAA;AAAA,KACF;AAAA,IACA,EAAC;AAAA,GACH,CAAA;AACA,EAAO,OAAA,EAAE,SAAS,kBAAmB,EAAA,CAAA;AACvC,EAAA;AAEa,MAAA,yBAAA,GAA4B,CACvC,MACsB,KAAA;AACtB,EAAA,MAAM,EAAE,IAAA,EAAM,IAAM,EAAA,SAAA,EAAW,wBAA2B,GAAA,MAAA,CAAA;AAE1D,EAAA,OAAO,sBAAuB,CAAA,MAAA;AAAA,IAC5B,CAAC,KAAwB,mBAAwB,KAAA;AAC/C,MAAA,MAAM,EAAE,UAAA,EAAY,QAAU,EAAA,UAAA,EAAe,GAAA,mBAAA,CAAA;AAC7C,MAAA,MAAM,yBAAyB,QAAS,CAAA,MAAA;AAAA,QACtC,CAAC,MAAyB,MAAW,KAAA;AACnC,UAAA,IAAI,MAAO,CAAA,MAAA,KAAW,OAAW,IAAA,CAAC,UAAY,EAAA;AAC5C,YAAO,OAAA;AAAA,cACL,GAAG,IAAA;AAAA,cACH;AAAA,gBACE,iBAAiB,CAAG,EAAA,IAAI,CAAI,CAAA,EAAA,SAAS,IAAI,IAAI,CAAA,CAAA;AAAA,gBAC7C,UAAA,EAAY,GAAG,UAAU,CAAA,CAAA;AAAA,gBACzB,MAAQ,EAAA,MAAA,CAAO,MAAO,CAAA,iBAAA,CAAkB,OAAO,CAAA;AAAA,gBAC/C,MAAQ,EAAA,OAAA;AAAA,eACV;AAAA,aACF,CAAA;AAAA,WACF;AACA,UAAO,OAAA,IAAA,CAAA;AAAA,SACT;AAAA,QACA,EAAC;AAAA,OACH,CAAA;AACA,MAAA,OAAO,CAAC,GAAG,GAAK,EAAA,GAAG,sBAAsB,CAAA,CAAA;AAAA,KAC3C;AAAA,IACA,EAAC;AAAA,GACH,CAAA;AACF,EAAA;AAEa,MAAA,oCAAA,GAAuC,CAClD,MACG,KAAA;AACH,EAAA,MAAM,EAAE,IAAA,EAAM,IAAM,EAAA,SAAA,EAAW,wBAA2B,GAAA,MAAA,CAAA;AAE1D,EAAA,OAAO,sBAAuB,CAAA,MAAA;AAAA,IAC5B,CAAC,KAA4B,mBAAyC,KAAA;AACpE,MAAA,MAAM,EAAE,UAAY,EAAA,QAAA,EAAU,WAAa,EAAA,MAAA,EAAQ,YACjD,GAAA,mBAAA,CAAA;AACF,MAAA,MAAM,iBAAoB,GAAA,QAAA,CAAS,MAAO,CAAA,CAAC,MAAgB,MAAW,KAAA;AACpE,QAAI,IAAA,MAAA,CAAO,WAAW,OAAS,EAAA;AAC7B,UAAA,OAAO,CAAC,GAAG,IAAA,EAAM,OAAO,MAAO,CAAA,iBAAA,CAAkB,OAAO,CAAC,CAAA,CAAA;AAAA,SAC3D;AACA,QAAO,OAAA,IAAA,CAAA;AAAA,OACT,EAAG,EAAE,CAAA,CAAA;AACL,MAAA,OAAO,eAAe,UAClB,GAAA;AAAA,QACE,GAAG,GAAA;AAAA,QACH;AAAA,UACE,MAAQ,EAAA,aAAA;AAAA,UACR,eAAe,CAAG,EAAA,IAAI,CAAI,CAAA,EAAA,SAAS,IAAI,IAAI,CAAA,CAAA;AAAA,UAC3C,QAAA,EAAU,GAAG,MAAM,CAAA,CAAA;AAAA,UACnB,YAAA,EAAc,GAAG,UAAU,CAAA,CAAA;AAAA,UAC3B,iBAAA;AAAA,UACA,UACE,EAAA,MAAA,CAAO,IAAK,CAAA,UAAU,CAAE,CAAA,CAAC,CAAM,KAAA,SAAA,CAAU,SACrC,GAAA,EAAE,GAAG,UAAA,CAAW,WAChB,GAAA,UAAA;AAAA,SACR;AAAA,OAEF,GAAA,GAAA,CAAA;AAAA,KACN;AAAA,IACA,EAAC;AAAA,GACH,CAAA;AACF,EAAA;AAEa,MAAA,6BAAA,GAAgC,CAC3C,MAAA,EACA,aAC0B,KAAA;AAC1B,EAAM,MAAA,uBAAA,GAA0B,cAAc,sBAAuB,CAAA,MAAA;AAAA,IACnE,SAAO,GAAI,CAAA,EAAA;AAAA,GACb,CAAA;AAEA,EAAA,MAAM,mBAAmB,MAAO,CAAA,sBAAA,CAAuB,MAAO,CAAA,CAAA,GAAA,KAAO,IAAI,EAAE,CAAA,CAAA;AAE3E,EAAO,OAAA,gBAAA,CAAiB,MAAS,GAAA,CAAA,GAC7B,gBAAiB,CAAA,MAAA;AAAA,IACf,CACE,KACA,SACG,KAAA;AACH,MAAA,MAAM,kBAAkB,uBAAwB,CAAA,IAAA;AAAA,QAC9C,CAAA,CAAA,KAAK,CAAE,CAAA,EAAA,KAAO,SAAU,CAAA,EAAA;AAAA,OAC1B,CAAA;AAEA,MAAA,IAAI,mBAAmB,SAAU,CAAA,EAAA;AAC/B,QAAO,OAAA;AAAA,UACL,GAAG,GAAA;AAAA,UACH;AAAA,YACE,IAAI,SAAU,CAAA,EAAA;AAAA,YACd,iBAAiB,oCAAqC,CAAA;AAAA,cACpD,GAAG,MAAA;AAAA,cACH,sBAAA,EAAwB,CAAC,SAAS,CAAA;AAAA,aACnC,EAAE,CAAC,CAAA;AAAA,WACN;AAAA,SACF,CAAA;AACF,MAAO,OAAA,GAAA,CAAA;AAAA,KACT;AAAA,IACA,EAAC;AAAA,MAEH,EAAC,CAAA;AACP,EAAA;AAEa,MAAA,yBAAA,GAA4B,CAAC,MAA2B,KAAA;AACnE,EAAM,MAAA,SAAA,GAAY,EAAE,GAAG,MAAO,EAAA,CAAA;AAC9B,EAAM,MAAA,qBAAA,GAAwB,OAAO,sBAAuB,CAAA,MAAA;AAAA,IAC1D,CAAA,GAAA,KAAO,CAAC,GAAI,CAAA,EAAA;AAAA,GACd,CAAA;AACA,EAAA,SAAA,CAAU,sBAAyB,GAAA,qBAAA,CAAA;AACnC,EAAA,OAAO,qCAAqC,SAAS,CAAA,CAAA;AACvD,EAAA;AAEa,MAAA,gCAAA,GAAmC,CAC9C,MAAA,EACA,aACG,KAAA;AACH,EAAM,MAAA,oBAAA,GAAuB,aAAc,CAAA,sBAAA,CACxC,GAAI,CAAA,CAAA,GAAA,KAAO,IAAI,EAAE,CAAA,CACjB,MAAO,CAAA,CAAA,EAAA,KAAM,EAAE,CAAA,CAAA;AAElB,EAAM,MAAA,gBAAA,GAAmB,MAAO,CAAA,sBAAA,CAC7B,GAAI,CAAA,CAAA,GAAA,KAAO,IAAI,EAAE,CAAA,CACjB,MAAO,CAAA,CAAA,EAAA,KAAM,EAAE,CAAA,CAAA;AAElB,EAAA,OAAO,qBAAqB,MAAS,GAAA,CAAA,GACjC,qBAAqB,MAAO,CAAA,CAAC,KAAe,KAAU,KAAA;AACpD,IAAM,MAAA,eAAA,GAAkB,gBAAiB,CAAA,QAAA,CAAS,KAAK,CAAA,CAAA;AACvD,IAAA,IAAI,iBAAwB,OAAA,GAAA,CAAA;AAC5B,IAAA,OAAO,KAAQ,GAAA,CAAC,GAAG,GAAA,EAAK,KAAK,CAAI,GAAA,GAAA,CAAA;AAAA,GAChC,EAAA,EAAE,CAAA,GACL,EAAC,CAAA;AACP,EAAA;AAEa,MAAA,oBAAA,GAAuB,CAAC,MAA2B,KAAA;AAC9D,EAAA,OACE,0BAA0B,MAAM,CAAA,CAAE,MAClC,GAAA,oCAAA,CAAqC,MAAM,CAAE,CAAA,MAAA,CAAA;AAEjD,EAAA;AAMa,MAAA,cAAA,GAAiB,CAAC,UAAgC,KAAA;AAC7D,EAAI,IAAA,CAAC,YAAmB,OAAA,CAAA,CAAA;AACxB,EAAA,IAAI,WAAc,GAAA,CAAA,CAAA;AAElB,EAAA,IAAI,WAAW,KAAO,EAAA;AACpB,IAAA,WAAA,IAAe,UAAW,CAAA,KAAA,CAAM,MAAO,CAAA,CAAC,KAAK,SAAc,KAAA;AACzD,MAAO,OAAA,GAAA,GAAM,eAAe,SAA2B,CAAA,CAAA;AAAA,OACtD,CAAC,CAAA,CAAA;AAAA,GACN;AAEA,EAAA,IAAI,WAAW,KAAO,EAAA;AACpB,IAAA,WAAA,IAAe,UAAW,CAAA,KAAA,CAAM,MAAO,CAAA,CAAC,KAAK,SAAc,KAAA;AACzD,MAAO,OAAA,GAAA,GAAM,eAAe,SAA2B,CAAA,CAAA;AAAA,OACtD,CAAC,CAAA,CAAA;AAAA,GACN;AAEA,EAAA,IAAI,WAAW,GAAK,EAAA;AAClB,IAAe,WAAA,IAAA,cAAA,CAAe,WAAW,GAAqB,CAAA,CAAA;AAAA,GAChE;AAEA,EAAI,IAAA,UAAA,CAAW,aAAa,MAAO,CAAA,IAAA,CAAK,UAAU,CAAE,CAAA,QAAA,CAAS,MAAM,CAAG,EAAA;AACpE,IAAe,WAAA,IAAA,CAAA,CAAA;AAAA,GACjB;AAEA,EAAO,OAAA,WAAA,CAAA;AACT;;;;"}
|
|
@@ -0,0 +1,256 @@
|
|
|
1
|
+
import { parseEntityRef, isUserEntity, stringifyEntityRef } from '@backstage/catalog-model';
|
|
2
|
+
import { getTitleCase } from '@janus-idp/shared-react';
|
|
3
|
+
import { isResourcedPolicy } from '@backstage-community/plugin-rbac-common';
|
|
4
|
+
import { criterias } from '../components/ConditionalAccess/const.esm.js';
|
|
5
|
+
import { getMembersCount } from './create-role-utils.esm.js';
|
|
6
|
+
|
|
7
|
+
const getPermissionsArray = (role, policies) => {
|
|
8
|
+
if (!policies || policies?.length === 0 || !Array.isArray(policies)) {
|
|
9
|
+
return [];
|
|
10
|
+
}
|
|
11
|
+
return policies.filter(
|
|
12
|
+
(policy) => policy.entityReference === role && policy.effect !== "deny"
|
|
13
|
+
);
|
|
14
|
+
};
|
|
15
|
+
const getPermissions = (role, policies) => {
|
|
16
|
+
return getPermissionsArray(role, policies).length;
|
|
17
|
+
};
|
|
18
|
+
const getMembersString = (res) => {
|
|
19
|
+
let membersString = "";
|
|
20
|
+
if (res.users > 0) {
|
|
21
|
+
membersString = `${res.users} ${res.users > 1 ? "users" : "user"}`;
|
|
22
|
+
}
|
|
23
|
+
if (res.groups > 0) {
|
|
24
|
+
membersString = membersString.concat(
|
|
25
|
+
membersString.length > 0 ? ", " : "",
|
|
26
|
+
`${res.groups} ${res.groups > 1 ? "groups" : "group"}`
|
|
27
|
+
);
|
|
28
|
+
}
|
|
29
|
+
return membersString;
|
|
30
|
+
};
|
|
31
|
+
const getMembers = (members) => {
|
|
32
|
+
if (!members || members.length === 0) {
|
|
33
|
+
return "No members";
|
|
34
|
+
}
|
|
35
|
+
const res = members.reduce(
|
|
36
|
+
(acc, member) => {
|
|
37
|
+
if (typeof member === "object") {
|
|
38
|
+
if (member.type === "User" || member.type === "user") {
|
|
39
|
+
acc.users++;
|
|
40
|
+
} else {
|
|
41
|
+
acc.groups++;
|
|
42
|
+
}
|
|
43
|
+
} else {
|
|
44
|
+
const entity = parseEntityRef(member);
|
|
45
|
+
if (isUserEntity(entity)) {
|
|
46
|
+
acc.users++;
|
|
47
|
+
} else {
|
|
48
|
+
acc.groups++;
|
|
49
|
+
}
|
|
50
|
+
}
|
|
51
|
+
return acc;
|
|
52
|
+
},
|
|
53
|
+
{ users: 0, groups: 0 }
|
|
54
|
+
);
|
|
55
|
+
return getMembersString(res);
|
|
56
|
+
};
|
|
57
|
+
const getMembersFromGroup = (group) => {
|
|
58
|
+
const membersList = group.relations?.reduce((acc, relation) => {
|
|
59
|
+
let temp = acc;
|
|
60
|
+
if (relation.type === "hasMember") {
|
|
61
|
+
temp++;
|
|
62
|
+
}
|
|
63
|
+
return temp;
|
|
64
|
+
}, 0);
|
|
65
|
+
return membersList ?? 0;
|
|
66
|
+
};
|
|
67
|
+
const getPluginInfo = (permissions, permissionName) => permissions.reduce(
|
|
68
|
+
(acc, p) => {
|
|
69
|
+
const policy = p.policies.find((pol) => {
|
|
70
|
+
if (pol.name === permissionName) {
|
|
71
|
+
return true;
|
|
72
|
+
}
|
|
73
|
+
if (isResourcedPolicy(pol)) {
|
|
74
|
+
return pol.resourceType === permissionName;
|
|
75
|
+
}
|
|
76
|
+
return false;
|
|
77
|
+
});
|
|
78
|
+
if (policy) {
|
|
79
|
+
return {
|
|
80
|
+
pluginId: p.pluginId || "-",
|
|
81
|
+
isResourced: isResourcedPolicy(policy) || false
|
|
82
|
+
};
|
|
83
|
+
}
|
|
84
|
+
return acc;
|
|
85
|
+
},
|
|
86
|
+
{ pluginId: "-", isResourced: false }
|
|
87
|
+
);
|
|
88
|
+
const getPolicy = (str) => {
|
|
89
|
+
const arr = str.split(".");
|
|
90
|
+
return arr[arr.length - 1];
|
|
91
|
+
};
|
|
92
|
+
const getAllPolicies = (permission, allowedPolicies, policies) => {
|
|
93
|
+
const deniedPolicies = policies?.reduce((acc, p) => {
|
|
94
|
+
const perm = isResourcedPolicy(p) ? p.resourceType : p.name;
|
|
95
|
+
if (permission === perm && !allowedPolicies.find(
|
|
96
|
+
(allowedPolicy) => allowedPolicy.policy.toLocaleLowerCase("en-US") === p.policy?.toLocaleLowerCase("en-US")
|
|
97
|
+
)) {
|
|
98
|
+
acc.push({
|
|
99
|
+
policy: getTitleCase(p.policy) || "Use",
|
|
100
|
+
effect: "deny"
|
|
101
|
+
});
|
|
102
|
+
}
|
|
103
|
+
return acc;
|
|
104
|
+
}, []);
|
|
105
|
+
return [...allowedPolicies || [], ...deniedPolicies || []];
|
|
106
|
+
};
|
|
107
|
+
const getPermissionsData = (policies, permissionPolicies) => {
|
|
108
|
+
const data = policies.reduce(
|
|
109
|
+
(acc, policy) => {
|
|
110
|
+
if (policy?.effect === "allow") {
|
|
111
|
+
const policyStr = policy?.policy ?? getPolicy(policy.permission);
|
|
112
|
+
const policyTitleCase = getTitleCase(policyStr);
|
|
113
|
+
const permission = acc.find(
|
|
114
|
+
(plugin) => plugin.permission === policy.permission && !plugin.policies.has({
|
|
115
|
+
policy: policyTitleCase || "Use",
|
|
116
|
+
effect: "allow"
|
|
117
|
+
})
|
|
118
|
+
);
|
|
119
|
+
if (permission) {
|
|
120
|
+
permission.policyString?.add(
|
|
121
|
+
policyTitleCase ? `, ${policyTitleCase}` : ", Use"
|
|
122
|
+
);
|
|
123
|
+
permission.policies.add({
|
|
124
|
+
policy: policyTitleCase || "Use",
|
|
125
|
+
effect: policy.effect
|
|
126
|
+
});
|
|
127
|
+
} else {
|
|
128
|
+
const policyString = /* @__PURE__ */ new Set();
|
|
129
|
+
const policiesSet = /* @__PURE__ */ new Set();
|
|
130
|
+
acc.push({
|
|
131
|
+
permission: policy.permission ?? "-",
|
|
132
|
+
plugin: getPluginInfo(permissionPolicies, policy?.permission).pluginId,
|
|
133
|
+
policyString: policyString.add(policyTitleCase || "Use"),
|
|
134
|
+
policies: policiesSet.add({
|
|
135
|
+
policy: policyTitleCase || "Use",
|
|
136
|
+
effect: policy.effect
|
|
137
|
+
}),
|
|
138
|
+
isResourced: getPluginInfo(permissionPolicies, policy?.permission).isResourced
|
|
139
|
+
});
|
|
140
|
+
}
|
|
141
|
+
}
|
|
142
|
+
return acc;
|
|
143
|
+
},
|
|
144
|
+
[]
|
|
145
|
+
);
|
|
146
|
+
return data.map((p) => ({
|
|
147
|
+
...p,
|
|
148
|
+
...p.policyString ? { policyString: Array.from(p.policyString) } : {},
|
|
149
|
+
policies: getAllPolicies(
|
|
150
|
+
p.permission,
|
|
151
|
+
Array.from(p.policies),
|
|
152
|
+
permissionPolicies.find((pp) => pp.pluginId === p.plugin)?.policies
|
|
153
|
+
)
|
|
154
|
+
}));
|
|
155
|
+
};
|
|
156
|
+
const getConditionUpperCriteria = (conditions) => {
|
|
157
|
+
return Object.keys(conditions).find(
|
|
158
|
+
(key) => [criterias.allOf, criterias.anyOf, criterias.not].includes(
|
|
159
|
+
key
|
|
160
|
+
)
|
|
161
|
+
);
|
|
162
|
+
};
|
|
163
|
+
const getConditionsData = (conditions) => {
|
|
164
|
+
const upperCriteria = getConditionUpperCriteria(conditions) ?? criterias.condition;
|
|
165
|
+
switch (upperCriteria) {
|
|
166
|
+
case criterias.allOf: {
|
|
167
|
+
const allOfConditions = conditions.allOf;
|
|
168
|
+
allOfConditions.map((aoc) => {
|
|
169
|
+
if (getConditionUpperCriteria(aoc)) {
|
|
170
|
+
return getConditionsData(aoc);
|
|
171
|
+
}
|
|
172
|
+
return aoc;
|
|
173
|
+
});
|
|
174
|
+
return { allOf: allOfConditions };
|
|
175
|
+
}
|
|
176
|
+
case criterias.anyOf: {
|
|
177
|
+
const anyOfConditions = conditions.anyOf;
|
|
178
|
+
anyOfConditions.map((aoc) => {
|
|
179
|
+
if (getConditionUpperCriteria(aoc)) {
|
|
180
|
+
return getConditionsData(aoc);
|
|
181
|
+
}
|
|
182
|
+
return aoc;
|
|
183
|
+
});
|
|
184
|
+
return { anyOf: anyOfConditions };
|
|
185
|
+
}
|
|
186
|
+
case criterias.not: {
|
|
187
|
+
const notCondition = conditions.not;
|
|
188
|
+
const nestedCondition = getConditionUpperCriteria(notCondition) ? getConditionsData(notCondition) : notCondition;
|
|
189
|
+
return { not: nestedCondition };
|
|
190
|
+
}
|
|
191
|
+
default:
|
|
192
|
+
return { condition: conditions };
|
|
193
|
+
}
|
|
194
|
+
};
|
|
195
|
+
const getPoliciesData = (allowedPermissions, policies) => {
|
|
196
|
+
return policies.map((p) => ({
|
|
197
|
+
policy: p,
|
|
198
|
+
...allowedPermissions.includes(p.toLocaleLowerCase("en-US")) ? { effect: "allow" } : { effect: "deny" }
|
|
199
|
+
}));
|
|
200
|
+
};
|
|
201
|
+
const getConditionalPermissionsData = (conditionalPermissions, permissionPolicies) => {
|
|
202
|
+
return conditionalPermissions.reduce((acc, cp) => {
|
|
203
|
+
const conditions = getConditionsData(cp.conditions);
|
|
204
|
+
const allPolicies = permissionPolicies.pluginsPermissions?.[cp.pluginId]?.policies?.[cp.resourceType]?.policies ?? [];
|
|
205
|
+
const allowedPermissions = cp.permissionMapping.map(
|
|
206
|
+
(action) => action.toLocaleLowerCase("en-US")
|
|
207
|
+
);
|
|
208
|
+
const policyString = allowedPermissions.map((p) => p[0].toLocaleUpperCase("en-US") + p.slice(1)).join(", ");
|
|
209
|
+
return [
|
|
210
|
+
...acc,
|
|
211
|
+
...conditions ? [
|
|
212
|
+
{
|
|
213
|
+
plugin: cp.pluginId,
|
|
214
|
+
permission: cp.resourceType,
|
|
215
|
+
isResourced: true,
|
|
216
|
+
policies: getPoliciesData(allowedPermissions, allPolicies),
|
|
217
|
+
policyString,
|
|
218
|
+
conditions,
|
|
219
|
+
id: cp.id
|
|
220
|
+
}
|
|
221
|
+
] : []
|
|
222
|
+
];
|
|
223
|
+
}, []);
|
|
224
|
+
};
|
|
225
|
+
const getSelectedMember = (memberResource, ref) => {
|
|
226
|
+
if (memberResource) {
|
|
227
|
+
return {
|
|
228
|
+
id: memberResource.metadata.etag,
|
|
229
|
+
ref: stringifyEntityRef(memberResource),
|
|
230
|
+
label: memberResource.spec.profile?.displayName ?? memberResource.metadata.name,
|
|
231
|
+
etag: memberResource.metadata.etag,
|
|
232
|
+
type: memberResource.kind,
|
|
233
|
+
namespace: memberResource.metadata.namespace,
|
|
234
|
+
members: getMembersCount(memberResource)
|
|
235
|
+
};
|
|
236
|
+
} else if (ref) {
|
|
237
|
+
const { kind, namespace, name } = parseEntityRef(ref);
|
|
238
|
+
return {
|
|
239
|
+
id: `${kind}-${namespace}-${name}`,
|
|
240
|
+
ref,
|
|
241
|
+
label: name,
|
|
242
|
+
etag: `${kind}-${namespace}-${name}`,
|
|
243
|
+
type: kind,
|
|
244
|
+
namespace,
|
|
245
|
+
members: kind === "group" ? 0 : void 0
|
|
246
|
+
};
|
|
247
|
+
}
|
|
248
|
+
return {};
|
|
249
|
+
};
|
|
250
|
+
const isSamePermissionPolicy = (a, b) => a.entityReference === b.entityReference && a.permission === b.permission && a.policy === b.policy && a.effect === b.effect;
|
|
251
|
+
const onlyInLeft = (left, right, compareFunction) => left.filter(
|
|
252
|
+
(leftValue) => !right.some((rightValue) => compareFunction(leftValue, rightValue))
|
|
253
|
+
);
|
|
254
|
+
|
|
255
|
+
export { getConditionUpperCriteria, getConditionalPermissionsData, getConditionsData, getMembers, getMembersFromGroup, getMembersString, getPermissions, getPermissionsArray, getPermissionsData, getPluginInfo, getPoliciesData, getSelectedMember, isSamePermissionPolicy, onlyInLeft };
|
|
256
|
+
//# sourceMappingURL=rbac-utils.esm.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"rbac-utils.esm.js","sources":["../../src/utils/rbac-utils.ts"],"sourcesContent":["/*\n * Copyright 2024 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport {\n GroupEntity,\n isUserEntity,\n parseEntityRef,\n stringifyEntityRef,\n} from '@backstage/catalog-model';\nimport {\n AllOfCriteria,\n AnyOfCriteria,\n NotCriteria,\n PermissionCondition,\n PermissionCriteria,\n} from '@backstage/plugin-permission-common';\n\nimport { getTitleCase } from '@janus-idp/shared-react';\n\nimport {\n isResourcedPolicy,\n PermissionAction,\n PluginPermissionMetaData,\n PolicyDetails,\n RoleBasedPolicy,\n RoleConditionalPolicyDecision,\n} from '@backstage-community/plugin-rbac-common';\n\nimport { criterias } from '../components/ConditionalAccess/const';\nimport { ConditionsData } from '../components/ConditionalAccess/types';\nimport {\n PluginsPermissionPoliciesData,\n RowPolicy,\n SelectedMember,\n} from '../components/CreateRole/types';\nimport {\n MemberEntity,\n MembersData,\n PermissionsData,\n PermissionsDataSet,\n} from '../types';\nimport { getMembersCount } from './create-role-utils';\n\nexport const getPermissionsArray = (\n role: string,\n policies: RoleBasedPolicy[],\n): RoleBasedPolicy[] => {\n if (!policies || policies?.length === 0 || !Array.isArray(policies)) {\n return [];\n }\n return policies.filter(\n (policy: RoleBasedPolicy) =>\n policy.entityReference === role && policy.effect !== 'deny',\n );\n};\n\nexport const getPermissions = (\n role: string,\n policies: RoleBasedPolicy[],\n): number => {\n return getPermissionsArray(role, policies).length;\n};\n\nexport const getMembersString = (res: {\n users: number;\n groups: number;\n}): string => {\n let membersString = '';\n if (res.users > 0) {\n membersString = `${res.users} ${res.users > 1 ? 'users' : 'user'}`;\n }\n if (res.groups > 0) {\n membersString = membersString.concat(\n membersString.length > 0 ? ', ' : '',\n `${res.groups} ${res.groups > 1 ? 'groups' : 'group'}`,\n );\n }\n return membersString;\n};\n\nexport const getMembers = (\n members: (string | MembersData | SelectedMember)[],\n): string => {\n if (!members || members.length === 0) {\n return 'No members';\n }\n\n const res = members.reduce(\n (acc, member) => {\n if (typeof member === 'object') {\n if (member.type === 'User' || member.type === 'user') {\n acc.users++;\n } else {\n acc.groups++;\n }\n } else {\n const entity = parseEntityRef(member) as any;\n if (isUserEntity(entity)) {\n acc.users++;\n } else {\n acc.groups++;\n }\n }\n return acc;\n },\n { users: 0, groups: 0 },\n );\n\n return getMembersString(res);\n};\n\nexport const getMembersFromGroup = (group: GroupEntity): number => {\n const membersList = group.relations?.reduce((acc, relation) => {\n let temp = acc;\n if (relation.type === 'hasMember') {\n temp++;\n }\n return temp;\n }, 0);\n return membersList ?? 0;\n};\n\nexport const getPluginInfo = (\n permissions: PluginPermissionMetaData[],\n permissionName?: string,\n): { pluginId: string; isResourced: boolean } =>\n permissions.reduce(\n (\n acc: { pluginId: string; isResourced: boolean },\n p: PluginPermissionMetaData,\n ) => {\n const policy = p.policies.find(pol => {\n if (pol.name === permissionName) {\n return true;\n }\n if (isResourcedPolicy(pol)) {\n return pol.resourceType === permissionName;\n }\n return false;\n });\n if (policy) {\n return {\n pluginId: p.pluginId || '-',\n isResourced: isResourcedPolicy(policy) || false,\n };\n }\n return acc;\n },\n { pluginId: '-', isResourced: false },\n );\n\nconst getPolicy = (str: string) => {\n const arr = str.split('.');\n return arr[arr.length - 1];\n};\n\nconst getAllPolicies = (\n permission: string,\n allowedPolicies: RowPolicy[],\n policies: PolicyDetails[],\n) => {\n const deniedPolicies = policies?.reduce((acc, p) => {\n const perm = isResourcedPolicy(p) ? p.resourceType : p.name;\n if (\n permission === perm &&\n !allowedPolicies.find(\n allowedPolicy =>\n allowedPolicy.policy.toLocaleLowerCase('en-US') ===\n p.policy?.toLocaleLowerCase('en-US'),\n )\n ) {\n acc.push({\n policy: getTitleCase(p.policy) || 'Use',\n effect: 'deny',\n });\n }\n return acc;\n }, [] as RowPolicy[]);\n return [...(allowedPolicies || []), ...(deniedPolicies || [])];\n};\n\nexport const getPermissionsData = (\n policies: RoleBasedPolicy[],\n permissionPolicies: PluginPermissionMetaData[],\n): PermissionsData[] => {\n const data = policies.reduce(\n (acc: PermissionsDataSet[], policy: RoleBasedPolicy) => {\n if (policy?.effect === 'allow') {\n const policyStr =\n policy?.policy ?? getPolicy(policy.permission as string);\n const policyTitleCase = getTitleCase(policyStr);\n const permission = acc.find(\n plugin =>\n plugin.permission === policy.permission &&\n !plugin.policies.has({\n policy: policyTitleCase || 'Use',\n effect: 'allow',\n }),\n );\n if (permission) {\n permission.policyString?.add(\n policyTitleCase ? `, ${policyTitleCase}` : ', Use',\n );\n permission.policies.add({\n policy: policyTitleCase || 'Use',\n effect: policy.effect,\n });\n } else {\n const policyString = new Set<string>();\n const policiesSet = new Set<{ policy: string; effect: string }>();\n acc.push({\n permission: policy.permission ?? '-',\n plugin: getPluginInfo(permissionPolicies, policy?.permission)\n .pluginId,\n policyString: policyString.add(policyTitleCase || 'Use'),\n policies: policiesSet.add({\n policy: policyTitleCase || 'Use',\n effect: policy.effect,\n }),\n isResourced: getPluginInfo(permissionPolicies, policy?.permission)\n .isResourced,\n });\n }\n }\n return acc;\n },\n [],\n );\n return data.map((p: PermissionsDataSet) => ({\n ...p,\n ...(p.policyString ? { policyString: Array.from(p.policyString) } : {}),\n policies: getAllPolicies(\n p.permission,\n Array.from(p.policies),\n permissionPolicies.find(pp => pp.pluginId === p.plugin)\n ?.policies as PolicyDetails[],\n ),\n })) as PermissionsData[];\n};\n\nexport const getConditionUpperCriteria = (\n conditions: PermissionCriteria<PermissionCondition> | string,\n): string | undefined => {\n return Object.keys(conditions).find(key =>\n [criterias.allOf, criterias.anyOf, criterias.not].includes(\n key as keyof ConditionsData,\n ),\n );\n};\n\nexport const getConditionsData = (\n conditions: PermissionCriteria<PermissionCondition>,\n): ConditionsData | undefined => {\n const upperCriteria =\n getConditionUpperCriteria(conditions) ?? criterias.condition;\n\n switch (upperCriteria) {\n case criterias.allOf: {\n const allOfConditions = (conditions as AllOfCriteria<PermissionCondition>)\n .allOf;\n allOfConditions.map(aoc => {\n if (getConditionUpperCriteria(aoc)) {\n return getConditionsData(aoc);\n }\n return aoc;\n });\n return { allOf: allOfConditions as PermissionCondition[] };\n }\n case criterias.anyOf: {\n const anyOfConditions = (conditions as AnyOfCriteria<PermissionCondition>)\n .anyOf;\n anyOfConditions.map(aoc => {\n if (getConditionUpperCriteria(aoc)) {\n return getConditionsData(aoc);\n }\n return aoc;\n });\n return { anyOf: anyOfConditions as PermissionCondition[] };\n }\n case criterias.not: {\n const notCondition = (conditions as NotCriteria<PermissionCondition>).not;\n const nestedCondition = getConditionUpperCriteria(notCondition)\n ? getConditionsData(notCondition)\n : notCondition;\n return { not: nestedCondition as PermissionCondition };\n }\n default:\n return { condition: conditions as PermissionCondition };\n }\n};\n\nexport const getPoliciesData = (\n allowedPermissions: string[],\n policies: string[],\n): RowPolicy[] => {\n return policies.map(p => ({\n policy: p,\n ...(allowedPermissions.includes(p.toLocaleLowerCase('en-US'))\n ? { effect: 'allow' }\n : { effect: 'deny' }),\n }));\n};\n\nexport const getConditionalPermissionsData = (\n conditionalPermissions: RoleConditionalPolicyDecision<PermissionAction>[],\n permissionPolicies: PluginsPermissionPoliciesData,\n): PermissionsData[] => {\n return conditionalPermissions.reduce((acc: any, cp) => {\n const conditions = getConditionsData(cp.conditions);\n const allPolicies =\n permissionPolicies.pluginsPermissions?.[cp.pluginId]?.policies?.[\n cp.resourceType\n ]?.policies ?? [];\n const allowedPermissions = cp.permissionMapping.map(action =>\n action.toLocaleLowerCase('en-US'),\n );\n const policyString = allowedPermissions\n .map(p => p[0].toLocaleUpperCase('en-US') + p.slice(1))\n .join(', ');\n\n return [\n ...acc,\n ...(conditions\n ? [\n {\n plugin: cp.pluginId,\n permission: cp.resourceType,\n isResourced: true,\n policies: getPoliciesData(allowedPermissions, allPolicies),\n policyString,\n conditions,\n id: cp.id,\n },\n ]\n : []),\n ];\n }, []);\n};\n\nexport const getSelectedMember = (\n memberResource: MemberEntity | undefined,\n ref: string,\n): SelectedMember => {\n if (memberResource) {\n return {\n id: memberResource.metadata.etag as string,\n ref: stringifyEntityRef(memberResource),\n label:\n memberResource.spec.profile?.displayName ??\n memberResource.metadata.name,\n etag: memberResource.metadata.etag as string,\n type: memberResource.kind,\n namespace: memberResource.metadata.namespace as string,\n members: getMembersCount(memberResource),\n };\n } else if (ref) {\n const { kind, namespace, name } = parseEntityRef(ref);\n return {\n id: `${kind}-${namespace}-${name}`,\n ref,\n label: name,\n etag: `${kind}-${namespace}-${name}`,\n type: kind,\n namespace: namespace,\n members: kind === 'group' ? 0 : undefined,\n };\n }\n return {} as SelectedMember;\n};\n\nexport const isSamePermissionPolicy = (\n a: RoleBasedPolicy,\n b: RoleBasedPolicy,\n) =>\n a.entityReference === b.entityReference &&\n a.permission === b.permission &&\n a.policy === b.policy &&\n a.effect === b.effect;\n\nexport const onlyInLeft = (\n left: RoleBasedPolicy[],\n right: RoleBasedPolicy[],\n compareFunction: (a: RoleBasedPolicy, b: RoleBasedPolicy) => boolean,\n) =>\n left.filter(\n leftValue =>\n !right.some(rightValue => compareFunction(leftValue, rightValue)),\n );\n"],"names":[],"mappings":";;;;;;AAuDa,MAAA,mBAAA,GAAsB,CACjC,IAAA,EACA,QACsB,KAAA;AACtB,EAAI,IAAA,CAAC,YAAY,QAAU,EAAA,MAAA,KAAW,KAAK,CAAC,KAAA,CAAM,OAAQ,CAAA,QAAQ,CAAG,EAAA;AACnE,IAAA,OAAO,EAAC,CAAA;AAAA,GACV;AACA,EAAA,OAAO,QAAS,CAAA,MAAA;AAAA,IACd,CAAC,MACC,KAAA,MAAA,CAAO,eAAoB,KAAA,IAAA,IAAQ,OAAO,MAAW,KAAA,MAAA;AAAA,GACzD,CAAA;AACF,EAAA;AAEa,MAAA,cAAA,GAAiB,CAC5B,IAAA,EACA,QACW,KAAA;AACX,EAAO,OAAA,mBAAA,CAAoB,IAAM,EAAA,QAAQ,CAAE,CAAA,MAAA,CAAA;AAC7C,EAAA;AAEa,MAAA,gBAAA,GAAmB,CAAC,GAGnB,KAAA;AACZ,EAAA,IAAI,aAAgB,GAAA,EAAA,CAAA;AACpB,EAAI,IAAA,GAAA,CAAI,QAAQ,CAAG,EAAA;AACjB,IAAgB,aAAA,GAAA,CAAA,EAAG,IAAI,KAAK,CAAA,CAAA,EAAI,IAAI,KAAQ,GAAA,CAAA,GAAI,UAAU,MAAM,CAAA,CAAA,CAAA;AAAA,GAClE;AACA,EAAI,IAAA,GAAA,CAAI,SAAS,CAAG,EAAA;AAClB,IAAA,aAAA,GAAgB,aAAc,CAAA,MAAA;AAAA,MAC5B,aAAA,CAAc,MAAS,GAAA,CAAA,GAAI,IAAO,GAAA,EAAA;AAAA,MAClC,CAAA,EAAG,IAAI,MAAM,CAAA,CAAA,EAAI,IAAI,MAAS,GAAA,CAAA,GAAI,WAAW,OAAO,CAAA,CAAA;AAAA,KACtD,CAAA;AAAA,GACF;AACA,EAAO,OAAA,aAAA,CAAA;AACT,EAAA;AAEa,MAAA,UAAA,GAAa,CACxB,OACW,KAAA;AACX,EAAA,IAAI,CAAC,OAAA,IAAW,OAAQ,CAAA,MAAA,KAAW,CAAG,EAAA;AACpC,IAAO,OAAA,YAAA,CAAA;AAAA,GACT;AAEA,EAAA,MAAM,MAAM,OAAQ,CAAA,MAAA;AAAA,IAClB,CAAC,KAAK,MAAW,KAAA;AACf,MAAI,IAAA,OAAO,WAAW,QAAU,EAAA;AAC9B,QAAA,IAAI,MAAO,CAAA,IAAA,KAAS,MAAU,IAAA,MAAA,CAAO,SAAS,MAAQ,EAAA;AACpD,UAAI,GAAA,CAAA,KAAA,EAAA,CAAA;AAAA,SACC,MAAA;AACL,UAAI,GAAA,CAAA,MAAA,EAAA,CAAA;AAAA,SACN;AAAA,OACK,MAAA;AACL,QAAM,MAAA,MAAA,GAAS,eAAe,MAAM,CAAA,CAAA;AACpC,QAAI,IAAA,YAAA,CAAa,MAAM,CAAG,EAAA;AACxB,UAAI,GAAA,CAAA,KAAA,EAAA,CAAA;AAAA,SACC,MAAA;AACL,UAAI,GAAA,CAAA,MAAA,EAAA,CAAA;AAAA,SACN;AAAA,OACF;AACA,MAAO,OAAA,GAAA,CAAA;AAAA,KACT;AAAA,IACA,EAAE,KAAA,EAAO,CAAG,EAAA,MAAA,EAAQ,CAAE,EAAA;AAAA,GACxB,CAAA;AAEA,EAAA,OAAO,iBAAiB,GAAG,CAAA,CAAA;AAC7B,EAAA;AAEa,MAAA,mBAAA,GAAsB,CAAC,KAA+B,KAAA;AACjE,EAAA,MAAM,cAAc,KAAM,CAAA,SAAA,EAAW,MAAO,CAAA,CAAC,KAAK,QAAa,KAAA;AAC7D,IAAA,IAAI,IAAO,GAAA,GAAA,CAAA;AACX,IAAI,IAAA,QAAA,CAAS,SAAS,WAAa,EAAA;AACjC,MAAA,IAAA,EAAA,CAAA;AAAA,KACF;AACA,IAAO,OAAA,IAAA,CAAA;AAAA,KACN,CAAC,CAAA,CAAA;AACJ,EAAA,OAAO,WAAe,IAAA,CAAA,CAAA;AACxB,EAAA;AAEO,MAAM,aAAgB,GAAA,CAC3B,WACA,EAAA,cAAA,KAEA,WAAY,CAAA,MAAA;AAAA,EACV,CACE,KACA,CACG,KAAA;AACH,IAAA,MAAM,MAAS,GAAA,CAAA,CAAE,QAAS,CAAA,IAAA,CAAK,CAAO,GAAA,KAAA;AACpC,MAAI,IAAA,GAAA,CAAI,SAAS,cAAgB,EAAA;AAC/B,QAAO,OAAA,IAAA,CAAA;AAAA,OACT;AACA,MAAI,IAAA,iBAAA,CAAkB,GAAG,CAAG,EAAA;AAC1B,QAAA,OAAO,IAAI,YAAiB,KAAA,cAAA,CAAA;AAAA,OAC9B;AACA,MAAO,OAAA,KAAA,CAAA;AAAA,KACR,CAAA,CAAA;AACD,IAAA,IAAI,MAAQ,EAAA;AACV,MAAO,OAAA;AAAA,QACL,QAAA,EAAU,EAAE,QAAY,IAAA,GAAA;AAAA,QACxB,WAAA,EAAa,iBAAkB,CAAA,MAAM,CAAK,IAAA,KAAA;AAAA,OAC5C,CAAA;AAAA,KACF;AACA,IAAO,OAAA,GAAA,CAAA;AAAA,GACT;AAAA,EACA,EAAE,QAAA,EAAU,GAAK,EAAA,WAAA,EAAa,KAAM,EAAA;AACtC,EAAA;AAEF,MAAM,SAAA,GAAY,CAAC,GAAgB,KAAA;AACjC,EAAM,MAAA,GAAA,GAAM,GAAI,CAAA,KAAA,CAAM,GAAG,CAAA,CAAA;AACzB,EAAO,OAAA,GAAA,CAAI,GAAI,CAAA,MAAA,GAAS,CAAC,CAAA,CAAA;AAC3B,CAAA,CAAA;AAEA,MAAM,cAAiB,GAAA,CACrB,UACA,EAAA,eAAA,EACA,QACG,KAAA;AACH,EAAA,MAAM,cAAiB,GAAA,QAAA,EAAU,MAAO,CAAA,CAAC,KAAK,CAAM,KAAA;AAClD,IAAA,MAAM,OAAO,iBAAkB,CAAA,CAAC,CAAI,GAAA,CAAA,CAAE,eAAe,CAAE,CAAA,IAAA,CAAA;AACvD,IACE,IAAA,UAAA,KAAe,IACf,IAAA,CAAC,eAAgB,CAAA,IAAA;AAAA,MACf,CAAA,aAAA,KACE,cAAc,MAAO,CAAA,iBAAA,CAAkB,OAAO,CAC9C,KAAA,CAAA,CAAE,MAAQ,EAAA,iBAAA,CAAkB,OAAO,CAAA;AAAA,KAEvC,EAAA;AACA,MAAA,GAAA,CAAI,IAAK,CAAA;AAAA,QACP,MAAQ,EAAA,YAAA,CAAa,CAAE,CAAA,MAAM,CAAK,IAAA,KAAA;AAAA,QAClC,MAAQ,EAAA,MAAA;AAAA,OACT,CAAA,CAAA;AAAA,KACH;AACA,IAAO,OAAA,GAAA,CAAA;AAAA,GACT,EAAG,EAAiB,CAAA,CAAA;AACpB,EAAO,OAAA,CAAC,GAAI,eAAmB,IAAA,IAAK,GAAI,cAAA,IAAkB,EAAG,CAAA,CAAA;AAC/D,CAAA,CAAA;AAEa,MAAA,kBAAA,GAAqB,CAChC,QAAA,EACA,kBACsB,KAAA;AACtB,EAAA,MAAM,OAAO,QAAS,CAAA,MAAA;AAAA,IACpB,CAAC,KAA2B,MAA4B,KAAA;AACtD,MAAI,IAAA,MAAA,EAAQ,WAAW,OAAS,EAAA;AAC9B,QAAA,MAAM,SACJ,GAAA,MAAA,EAAQ,MAAU,IAAA,SAAA,CAAU,OAAO,UAAoB,CAAA,CAAA;AACzD,QAAM,MAAA,eAAA,GAAkB,aAAa,SAAS,CAAA,CAAA;AAC9C,QAAA,MAAM,aAAa,GAAI,CAAA,IAAA;AAAA,UACrB,CAAA,MAAA,KACE,OAAO,UAAe,KAAA,MAAA,CAAO,cAC7B,CAAC,MAAA,CAAO,SAAS,GAAI,CAAA;AAAA,YACnB,QAAQ,eAAmB,IAAA,KAAA;AAAA,YAC3B,MAAQ,EAAA,OAAA;AAAA,WACT,CAAA;AAAA,SACL,CAAA;AACA,QAAA,IAAI,UAAY,EAAA;AACd,UAAA,UAAA,CAAW,YAAc,EAAA,GAAA;AAAA,YACvB,eAAA,GAAkB,CAAK,EAAA,EAAA,eAAe,CAAK,CAAA,GAAA,OAAA;AAAA,WAC7C,CAAA;AACA,UAAA,UAAA,CAAW,SAAS,GAAI,CAAA;AAAA,YACtB,QAAQ,eAAmB,IAAA,KAAA;AAAA,YAC3B,QAAQ,MAAO,CAAA,MAAA;AAAA,WAChB,CAAA,CAAA;AAAA,SACI,MAAA;AACL,UAAM,MAAA,YAAA,uBAAmB,GAAY,EAAA,CAAA;AACrC,UAAM,MAAA,WAAA,uBAAkB,GAAwC,EAAA,CAAA;AAChE,UAAA,GAAA,CAAI,IAAK,CAAA;AAAA,YACP,UAAA,EAAY,OAAO,UAAc,IAAA,GAAA;AAAA,YACjC,MAAQ,EAAA,aAAA,CAAc,kBAAoB,EAAA,MAAA,EAAQ,UAAU,CACzD,CAAA,QAAA;AAAA,YACH,YAAc,EAAA,YAAA,CAAa,GAAI,CAAA,eAAA,IAAmB,KAAK,CAAA;AAAA,YACvD,QAAA,EAAU,YAAY,GAAI,CAAA;AAAA,cACxB,QAAQ,eAAmB,IAAA,KAAA;AAAA,cAC3B,QAAQ,MAAO,CAAA,MAAA;AAAA,aAChB,CAAA;AAAA,YACD,WAAa,EAAA,aAAA,CAAc,kBAAoB,EAAA,MAAA,EAAQ,UAAU,CAC9D,CAAA,WAAA;AAAA,WACJ,CAAA,CAAA;AAAA,SACH;AAAA,OACF;AACA,MAAO,OAAA,GAAA,CAAA;AAAA,KACT;AAAA,IACA,EAAC;AAAA,GACH,CAAA;AACA,EAAO,OAAA,IAAA,CAAK,GAAI,CAAA,CAAC,CAA2B,MAAA;AAAA,IAC1C,GAAG,CAAA;AAAA,IACH,GAAI,CAAE,CAAA,YAAA,GAAe,EAAE,YAAA,EAAc,KAAM,CAAA,IAAA,CAAK,CAAE,CAAA,YAAY,CAAE,EAAA,GAAI,EAAC;AAAA,IACrE,QAAU,EAAA,cAAA;AAAA,MACR,CAAE,CAAA,UAAA;AAAA,MACF,KAAA,CAAM,IAAK,CAAA,CAAA,CAAE,QAAQ,CAAA;AAAA,MACrB,mBAAmB,IAAK,CAAA,CAAA,EAAA,KAAM,GAAG,QAAa,KAAA,CAAA,CAAE,MAAM,CAClD,EAAA,QAAA;AAAA,KACN;AAAA,GACA,CAAA,CAAA,CAAA;AACJ,EAAA;AAEa,MAAA,yBAAA,GAA4B,CACvC,UACuB,KAAA;AACvB,EAAO,OAAA,MAAA,CAAO,IAAK,CAAA,UAAU,CAAE,CAAA,IAAA;AAAA,IAAK,CAAA,GAAA,KAClC,CAAC,SAAU,CAAA,KAAA,EAAO,UAAU,KAAO,EAAA,SAAA,CAAU,GAAG,CAAE,CAAA,QAAA;AAAA,MAChD,GAAA;AAAA,KACF;AAAA,GACF,CAAA;AACF,EAAA;AAEa,MAAA,iBAAA,GAAoB,CAC/B,UAC+B,KAAA;AAC/B,EAAA,MAAM,aACJ,GAAA,yBAAA,CAA0B,UAAU,CAAA,IAAK,SAAU,CAAA,SAAA,CAAA;AAErD,EAAA,QAAQ,aAAe;AAAA,IACrB,KAAK,UAAU,KAAO,EAAA;AACpB,MAAA,MAAM,kBAAmB,UACtB,CAAA,KAAA,CAAA;AACH,MAAA,eAAA,CAAgB,IAAI,CAAO,GAAA,KAAA;AACzB,QAAI,IAAA,yBAAA,CAA0B,GAAG,CAAG,EAAA;AAClC,UAAA,OAAO,kBAAkB,GAAG,CAAA,CAAA;AAAA,SAC9B;AACA,QAAO,OAAA,GAAA,CAAA;AAAA,OACR,CAAA,CAAA;AACD,MAAO,OAAA,EAAE,OAAO,eAAyC,EAAA,CAAA;AAAA,KAC3D;AAAA,IACA,KAAK,UAAU,KAAO,EAAA;AACpB,MAAA,MAAM,kBAAmB,UACtB,CAAA,KAAA,CAAA;AACH,MAAA,eAAA,CAAgB,IAAI,CAAO,GAAA,KAAA;AACzB,QAAI,IAAA,yBAAA,CAA0B,GAAG,CAAG,EAAA;AAClC,UAAA,OAAO,kBAAkB,GAAG,CAAA,CAAA;AAAA,SAC9B;AACA,QAAO,OAAA,GAAA,CAAA;AAAA,OACR,CAAA,CAAA;AACD,MAAO,OAAA,EAAE,OAAO,eAAyC,EAAA,CAAA;AAAA,KAC3D;AAAA,IACA,KAAK,UAAU,GAAK,EAAA;AAClB,MAAA,MAAM,eAAgB,UAAgD,CAAA,GAAA,CAAA;AACtE,MAAA,MAAM,kBAAkB,yBAA0B,CAAA,YAAY,CAC1D,GAAA,iBAAA,CAAkB,YAAY,CAC9B,GAAA,YAAA,CAAA;AACJ,MAAO,OAAA,EAAE,KAAK,eAAuC,EAAA,CAAA;AAAA,KACvD;AAAA,IACA;AACE,MAAO,OAAA,EAAE,WAAW,UAAkC,EAAA,CAAA;AAAA,GAC1D;AACF,EAAA;AAEa,MAAA,eAAA,GAAkB,CAC7B,kBAAA,EACA,QACgB,KAAA;AAChB,EAAO,OAAA,QAAA,CAAS,IAAI,CAAM,CAAA,MAAA;AAAA,IACxB,MAAQ,EAAA,CAAA;AAAA,IACR,GAAI,kBAAA,CAAmB,QAAS,CAAA,CAAA,CAAE,kBAAkB,OAAO,CAAC,CACxD,GAAA,EAAE,MAAQ,EAAA,OAAA,EACV,GAAA,EAAE,QAAQ,MAAO,EAAA;AAAA,GACrB,CAAA,CAAA,CAAA;AACJ,EAAA;AAEa,MAAA,6BAAA,GAAgC,CAC3C,sBAAA,EACA,kBACsB,KAAA;AACtB,EAAA,OAAO,sBAAuB,CAAA,MAAA,CAAO,CAAC,GAAA,EAAU,EAAO,KAAA;AACrD,IAAM,MAAA,UAAA,GAAa,iBAAkB,CAAA,EAAA,CAAG,UAAU,CAAA,CAAA;AAClD,IAAM,MAAA,WAAA,GACJ,kBAAmB,CAAA,kBAAA,GAAqB,EAAG,CAAA,QAAQ,CAAG,EAAA,QAAA,GACpD,EAAG,CAAA,YACL,CAAG,EAAA,QAAA,IAAY,EAAC,CAAA;AAClB,IAAM,MAAA,kBAAA,GAAqB,GAAG,iBAAkB,CAAA,GAAA;AAAA,MAAI,CAAA,MAAA,KAClD,MAAO,CAAA,iBAAA,CAAkB,OAAO,CAAA;AAAA,KAClC,CAAA;AACA,IAAA,MAAM,eAAe,kBAClB,CAAA,GAAA,CAAI,CAAK,CAAA,KAAA,CAAA,CAAE,CAAC,CAAE,CAAA,iBAAA,CAAkB,OAAO,CAAA,GAAI,EAAE,KAAM,CAAA,CAAC,CAAC,CAAA,CACrD,KAAK,IAAI,CAAA,CAAA;AAEZ,IAAO,OAAA;AAAA,MACL,GAAG,GAAA;AAAA,MACH,GAAI,UACA,GAAA;AAAA,QACE;AAAA,UACE,QAAQ,EAAG,CAAA,QAAA;AAAA,UACX,YAAY,EAAG,CAAA,YAAA;AAAA,UACf,WAAa,EAAA,IAAA;AAAA,UACb,QAAA,EAAU,eAAgB,CAAA,kBAAA,EAAoB,WAAW,CAAA;AAAA,UACzD,YAAA;AAAA,UACA,UAAA;AAAA,UACA,IAAI,EAAG,CAAA,EAAA;AAAA,SACT;AAAA,UAEF,EAAC;AAAA,KACP,CAAA;AAAA,GACF,EAAG,EAAE,CAAA,CAAA;AACP,EAAA;AAEa,MAAA,iBAAA,GAAoB,CAC/B,cAAA,EACA,GACmB,KAAA;AACnB,EAAA,IAAI,cAAgB,EAAA;AAClB,IAAO,OAAA;AAAA,MACL,EAAA,EAAI,eAAe,QAAS,CAAA,IAAA;AAAA,MAC5B,GAAA,EAAK,mBAAmB,cAAc,CAAA;AAAA,MACtC,OACE,cAAe,CAAA,IAAA,CAAK,OAAS,EAAA,WAAA,IAC7B,eAAe,QAAS,CAAA,IAAA;AAAA,MAC1B,IAAA,EAAM,eAAe,QAAS,CAAA,IAAA;AAAA,MAC9B,MAAM,cAAe,CAAA,IAAA;AAAA,MACrB,SAAA,EAAW,eAAe,QAAS,CAAA,SAAA;AAAA,MACnC,OAAA,EAAS,gBAAgB,cAAc,CAAA;AAAA,KACzC,CAAA;AAAA,aACS,GAAK,EAAA;AACd,IAAA,MAAM,EAAE,IAAM,EAAA,SAAA,EAAW,IAAK,EAAA,GAAI,eAAe,GAAG,CAAA,CAAA;AACpD,IAAO,OAAA;AAAA,MACL,IAAI,CAAG,EAAA,IAAI,CAAI,CAAA,EAAA,SAAS,IAAI,IAAI,CAAA,CAAA;AAAA,MAChC,GAAA;AAAA,MACA,KAAO,EAAA,IAAA;AAAA,MACP,MAAM,CAAG,EAAA,IAAI,CAAI,CAAA,EAAA,SAAS,IAAI,IAAI,CAAA,CAAA;AAAA,MAClC,IAAM,EAAA,IAAA;AAAA,MACN,SAAA;AAAA,MACA,OAAA,EAAS,IAAS,KAAA,OAAA,GAAU,CAAI,GAAA,KAAA,CAAA;AAAA,KAClC,CAAA;AAAA,GACF;AACA,EAAA,OAAO,EAAC,CAAA;AACV,EAAA;AAEO,MAAM,yBAAyB,CACpC,CAAA,EACA,MAEA,CAAE,CAAA,eAAA,KAAoB,EAAE,eACxB,IAAA,CAAA,CAAE,UAAe,KAAA,CAAA,CAAE,cACnB,CAAE,CAAA,MAAA,KAAW,EAAE,MACf,IAAA,CAAA,CAAE,WAAW,CAAE,CAAA,OAAA;AAEV,MAAM,UAAa,GAAA,CACxB,IACA,EAAA,KAAA,EACA,oBAEA,IAAK,CAAA,MAAA;AAAA,EACH,CAAA,SAAA,KACE,CAAC,KAAM,CAAA,IAAA,CAAK,gBAAc,eAAgB,CAAA,SAAA,EAAW,UAAU,CAAC,CAAA;AACpE;;;;"}
|
|
@@ -0,0 +1,66 @@
|
|
|
1
|
+
const createPermissions = async (newPermissions, rbacApi, errorMsgPrefix) => {
|
|
2
|
+
if (newPermissions.length > 0) {
|
|
3
|
+
const permissionsRes = await rbacApi.createPolicies(newPermissions);
|
|
4
|
+
if (permissionsRes.error) {
|
|
5
|
+
throw new Error(
|
|
6
|
+
`${errorMsgPrefix || "Unable to create the permission policies."} ${permissionsRes.error.message}`
|
|
7
|
+
);
|
|
8
|
+
}
|
|
9
|
+
}
|
|
10
|
+
};
|
|
11
|
+
const removePermissions = async (name, deletePermissions, rbacApi) => {
|
|
12
|
+
if (deletePermissions.length > 0) {
|
|
13
|
+
const permissionsRes = await rbacApi.deletePolicies(
|
|
14
|
+
name,
|
|
15
|
+
deletePermissions
|
|
16
|
+
);
|
|
17
|
+
if (permissionsRes.error) {
|
|
18
|
+
throw new Error(
|
|
19
|
+
`Unable to delete the permission policies. ${permissionsRes.error.message}`
|
|
20
|
+
);
|
|
21
|
+
}
|
|
22
|
+
}
|
|
23
|
+
};
|
|
24
|
+
const removeConditions = async (deleteConditions, rbacApi) => {
|
|
25
|
+
if (deleteConditions.length > 0) {
|
|
26
|
+
const promises = deleteConditions.map(
|
|
27
|
+
(cid) => rbacApi.deleteConditionalPolicies(cid)
|
|
28
|
+
);
|
|
29
|
+
const cppRes = await Promise.all(promises);
|
|
30
|
+
const cpErr = cppRes.map((r) => r.error?.message).filter((m) => m);
|
|
31
|
+
if (cpErr.length > 0) {
|
|
32
|
+
throw new Error(
|
|
33
|
+
`Unable to remove conditions from the role. ${cpErr.join("\n")}`
|
|
34
|
+
);
|
|
35
|
+
}
|
|
36
|
+
}
|
|
37
|
+
};
|
|
38
|
+
const modifyConditions = async (updateConditions, rbacApi) => {
|
|
39
|
+
if (updateConditions.length > 0) {
|
|
40
|
+
const promises = updateConditions.map(
|
|
41
|
+
({ id, updateCondition }) => rbacApi.updateConditionalPolicies(id, updateCondition)
|
|
42
|
+
);
|
|
43
|
+
const cppRes = await Promise.all(promises);
|
|
44
|
+
const cpErr = cppRes.map((r) => r.error?.message).filter((m) => m);
|
|
45
|
+
if (cpErr.length > 0) {
|
|
46
|
+
throw new Error(`Unable to update conditions. ${cpErr.join("\n")}`);
|
|
47
|
+
}
|
|
48
|
+
}
|
|
49
|
+
};
|
|
50
|
+
const createConditions = async (newConditions, rbacApi, errorMsgPrefix) => {
|
|
51
|
+
if (newConditions.length > 0) {
|
|
52
|
+
const promises = newConditions.map(
|
|
53
|
+
(cpp) => rbacApi.createConditionalPermission(cpp)
|
|
54
|
+
);
|
|
55
|
+
const cppRes = await Promise.all(promises);
|
|
56
|
+
const cpErr = cppRes.map((r) => r.error?.message).filter((m) => m);
|
|
57
|
+
if (cpErr.length > 0) {
|
|
58
|
+
throw new Error(
|
|
59
|
+
`${errorMsgPrefix || "Unable to add conditions to the role."} ${cpErr.join("\n")}`
|
|
60
|
+
);
|
|
61
|
+
}
|
|
62
|
+
}
|
|
63
|
+
};
|
|
64
|
+
|
|
65
|
+
export { createConditions, createPermissions, modifyConditions, removeConditions, removePermissions };
|
|
66
|
+
//# sourceMappingURL=role-form-utils.esm.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"role-form-utils.esm.js","sources":["../../src/utils/role-form-utils.ts"],"sourcesContent":["/*\n * Copyright 2024 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport { RoleBasedPolicy } from '@backstage-community/plugin-rbac-common';\n\nimport { RBACAPI } from '../api/RBACBackendClient';\nimport {\n RoleBasedConditions,\n RoleError,\n UpdatedConditionsData,\n} from '../types';\n\nexport const createPermissions = async (\n newPermissions: RoleBasedPolicy[],\n rbacApi: RBACAPI,\n errorMsgPrefix?: string,\n) => {\n if (newPermissions.length > 0) {\n const permissionsRes = await rbacApi.createPolicies(newPermissions);\n if ((permissionsRes as unknown as RoleError).error) {\n throw new Error(\n `${errorMsgPrefix || 'Unable to create the permission policies.'} ${\n (permissionsRes as unknown as RoleError).error.message\n }`,\n );\n }\n }\n};\n\nexport const removePermissions = async (\n name: string,\n deletePermissions: RoleBasedPolicy[],\n rbacApi: RBACAPI,\n) => {\n if (deletePermissions.length > 0) {\n const permissionsRes = await rbacApi.deletePolicies(\n name,\n deletePermissions,\n );\n if ((permissionsRes as unknown as RoleError).error) {\n throw new Error(\n `Unable to delete the permission policies. ${\n (permissionsRes as unknown as RoleError).error.message\n }`,\n );\n }\n }\n};\n\nexport const removeConditions = async (\n deleteConditions: number[],\n rbacApi: RBACAPI,\n) => {\n if (deleteConditions.length > 0) {\n const promises = deleteConditions.map(cid =>\n rbacApi.deleteConditionalPolicies(cid),\n );\n\n const cppRes: (Response | RoleError)[] = await Promise.all(promises);\n const cpErr = cppRes\n .map(r => (r as unknown as RoleError).error?.message)\n .filter(m => m);\n\n if (cpErr.length > 0) {\n throw new Error(\n `Unable to remove conditions from the role. ${cpErr.join('\\n')}`,\n );\n }\n }\n};\n\nexport const modifyConditions = async (\n updateConditions: UpdatedConditionsData,\n rbacApi: RBACAPI,\n) => {\n if (updateConditions.length > 0) {\n const promises = updateConditions.map(({ id, updateCondition }) =>\n rbacApi.updateConditionalPolicies(id, updateCondition),\n );\n\n const cppRes: (Response | RoleError)[] = await Promise.all(promises);\n const cpErr = cppRes\n .map(r => (r as unknown as RoleError).error?.message)\n .filter(m => m);\n\n if (cpErr.length > 0) {\n throw new Error(`Unable to update conditions. ${cpErr.join('\\n')}`);\n }\n }\n};\n\nexport const createConditions = async (\n newConditions: RoleBasedConditions[],\n rbacApi: RBACAPI,\n errorMsgPrefix?: string,\n) => {\n if (newConditions.length > 0) {\n const promises = newConditions.map(cpp =>\n rbacApi.createConditionalPermission(cpp),\n );\n\n const cppRes: (Response | RoleError)[] = await Promise.all(promises);\n const cpErr = cppRes\n .map(r => (r as unknown as RoleError).error?.message)\n .filter(m => m);\n\n if (cpErr.length > 0) {\n throw new Error(\n `${\n errorMsgPrefix || 'Unable to add conditions to the role.'\n } ${cpErr.join('\\n')}`,\n );\n }\n }\n};\n"],"names":[],"mappings":"AAwBO,MAAM,iBAAoB,GAAA,OAC/B,cACA,EAAA,OAAA,EACA,cACG,KAAA;AACH,EAAI,IAAA,cAAA,CAAe,SAAS,CAAG,EAAA;AAC7B,IAAA,MAAM,cAAiB,GAAA,MAAM,OAAQ,CAAA,cAAA,CAAe,cAAc,CAAA,CAAA;AAClE,IAAA,IAAK,eAAwC,KAAO,EAAA;AAClD,MAAA,MAAM,IAAI,KAAA;AAAA,QACR,GAAG,cAAkB,IAAA,2CAA2C,CAC7D,CAAA,EAAA,cAAA,CAAwC,MAAM,OACjD,CAAA,CAAA;AAAA,OACF,CAAA;AAAA,KACF;AAAA,GACF;AACF,EAAA;AAEO,MAAM,iBAAoB,GAAA,OAC/B,IACA,EAAA,iBAAA,EACA,OACG,KAAA;AACH,EAAI,IAAA,iBAAA,CAAkB,SAAS,CAAG,EAAA;AAChC,IAAM,MAAA,cAAA,GAAiB,MAAM,OAAQ,CAAA,cAAA;AAAA,MACnC,IAAA;AAAA,MACA,iBAAA;AAAA,KACF,CAAA;AACA,IAAA,IAAK,eAAwC,KAAO,EAAA;AAClD,MAAA,MAAM,IAAI,KAAA;AAAA,QACR,CAAA,0CAAA,EACG,cAAwC,CAAA,KAAA,CAAM,OACjD,CAAA,CAAA;AAAA,OACF,CAAA;AAAA,KACF;AAAA,GACF;AACF,EAAA;AAEa,MAAA,gBAAA,GAAmB,OAC9B,gBAAA,EACA,OACG,KAAA;AACH,EAAI,IAAA,gBAAA,CAAiB,SAAS,CAAG,EAAA;AAC/B,IAAA,MAAM,WAAW,gBAAiB,CAAA,GAAA;AAAA,MAAI,CAAA,GAAA,KACpC,OAAQ,CAAA,yBAAA,CAA0B,GAAG,CAAA;AAAA,KACvC,CAAA;AAEA,IAAA,MAAM,MAAmC,GAAA,MAAM,OAAQ,CAAA,GAAA,CAAI,QAAQ,CAAA,CAAA;AACnE,IAAM,MAAA,KAAA,GAAQ,MACX,CAAA,GAAA,CAAI,CAAM,CAAA,KAAA,CAAA,CAA2B,OAAO,OAAO,CAAA,CACnD,MAAO,CAAA,CAAA,CAAA,KAAK,CAAC,CAAA,CAAA;AAEhB,IAAI,IAAA,KAAA,CAAM,SAAS,CAAG,EAAA;AACpB,MAAA,MAAM,IAAI,KAAA;AAAA,QACR,CAA8C,2CAAA,EAAA,KAAA,CAAM,IAAK,CAAA,IAAI,CAAC,CAAA,CAAA;AAAA,OAChE,CAAA;AAAA,KACF;AAAA,GACF;AACF,EAAA;AAEa,MAAA,gBAAA,GAAmB,OAC9B,gBAAA,EACA,OACG,KAAA;AACH,EAAI,IAAA,gBAAA,CAAiB,SAAS,CAAG,EAAA;AAC/B,IAAA,MAAM,WAAW,gBAAiB,CAAA,GAAA;AAAA,MAAI,CAAC,EAAE,EAAI,EAAA,eAAA,OAC3C,OAAQ,CAAA,yBAAA,CAA0B,IAAI,eAAe,CAAA;AAAA,KACvD,CAAA;AAEA,IAAA,MAAM,MAAmC,GAAA,MAAM,OAAQ,CAAA,GAAA,CAAI,QAAQ,CAAA,CAAA;AACnE,IAAM,MAAA,KAAA,GAAQ,MACX,CAAA,GAAA,CAAI,CAAM,CAAA,KAAA,CAAA,CAA2B,OAAO,OAAO,CAAA,CACnD,MAAO,CAAA,CAAA,CAAA,KAAK,CAAC,CAAA,CAAA;AAEhB,IAAI,IAAA,KAAA,CAAM,SAAS,CAAG,EAAA;AACpB,MAAA,MAAM,IAAI,KAAM,CAAA,CAAA,6BAAA,EAAgC,MAAM,IAAK,CAAA,IAAI,CAAC,CAAE,CAAA,CAAA,CAAA;AAAA,KACpE;AAAA,GACF;AACF,EAAA;AAEO,MAAM,gBAAmB,GAAA,OAC9B,aACA,EAAA,OAAA,EACA,cACG,KAAA;AACH,EAAI,IAAA,aAAA,CAAc,SAAS,CAAG,EAAA;AAC5B,IAAA,MAAM,WAAW,aAAc,CAAA,GAAA;AAAA,MAAI,CAAA,GAAA,KACjC,OAAQ,CAAA,2BAAA,CAA4B,GAAG,CAAA;AAAA,KACzC,CAAA;AAEA,IAAA,MAAM,MAAmC,GAAA,MAAM,OAAQ,CAAA,GAAA,CAAI,QAAQ,CAAA,CAAA;AACnE,IAAM,MAAA,KAAA,GAAQ,MACX,CAAA,GAAA,CAAI,CAAM,CAAA,KAAA,CAAA,CAA2B,OAAO,OAAO,CAAA,CACnD,MAAO,CAAA,CAAA,CAAA,KAAK,CAAC,CAAA,CAAA;AAEhB,IAAI,IAAA,KAAA,CAAM,SAAS,CAAG,EAAA;AACpB,MAAA,MAAM,IAAI,KAAA;AAAA,QACR,GACE,cAAkB,IAAA,uCACpB,IAAI,KAAM,CAAA,IAAA,CAAK,IAAI,CAAC,CAAA,CAAA;AAAA,OACtB,CAAA;AAAA,KACF;AAAA,GACF;AACF;;;;"}
|