@backstage/plugin-permission-backend 0.0.0-nightly-202111222339
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +26 -0
- package/README.md +6 -0
- package/dist/index.cjs.js +115 -0
- package/dist/index.cjs.js.map +1 -0
- package/dist/index.d.ts +27 -0
- package/package.json +44 -0
package/CHANGELOG.md
ADDED
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
# @backstage/plugin-permission-backend
|
|
2
|
+
|
|
3
|
+
## 0.0.0-nightly-202111222339
|
|
4
|
+
|
|
5
|
+
### Patch Changes
|
|
6
|
+
|
|
7
|
+
- e7851efa9e: Rename and adjust permission policy return type to reduce nesting
|
|
8
|
+
- Updated dependencies
|
|
9
|
+
- @backstage/plugin-auth-backend@0.0.0-nightly-202111222339
|
|
10
|
+
- @backstage/plugin-permission-node@0.0.0-nightly-202111222339
|
|
11
|
+
- @backstage/backend-common@0.0.0-nightly-202111222339
|
|
12
|
+
- @backstage/plugin-permission-common@0.0.0-nightly-202111222339
|
|
13
|
+
|
|
14
|
+
## 0.1.0
|
|
15
|
+
|
|
16
|
+
### Minor Changes
|
|
17
|
+
|
|
18
|
+
- 7a8312f126: New package containing the backend for authorization and permissions. For more information, see the [authorization PRFC](https://github.com/backstage/backstage/pull/7761).
|
|
19
|
+
|
|
20
|
+
### Patch Changes
|
|
21
|
+
|
|
22
|
+
- Updated dependencies
|
|
23
|
+
- @backstage/plugin-auth-backend@0.4.9
|
|
24
|
+
- @backstage/plugin-permission-node@0.1.0
|
|
25
|
+
- @backstage/backend-common@0.9.11
|
|
26
|
+
- @backstage/plugin-permission-common@0.2.0
|
package/README.md
ADDED
|
@@ -0,0 +1,115 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, '__esModule', { value: true });
|
|
4
|
+
|
|
5
|
+
var zod = require('zod');
|
|
6
|
+
var express = require('express');
|
|
7
|
+
var Router = require('express-promise-router');
|
|
8
|
+
var backendCommon = require('@backstage/backend-common');
|
|
9
|
+
var pluginAuthBackend = require('@backstage/plugin-auth-backend');
|
|
10
|
+
var pluginPermissionCommon = require('@backstage/plugin-permission-common');
|
|
11
|
+
var fetch = require('node-fetch');
|
|
12
|
+
|
|
13
|
+
function _interopDefaultLegacy (e) { return e && typeof e === 'object' && 'default' in e ? e : { 'default': e }; }
|
|
14
|
+
|
|
15
|
+
var express__default = /*#__PURE__*/_interopDefaultLegacy(express);
|
|
16
|
+
var Router__default = /*#__PURE__*/_interopDefaultLegacy(Router);
|
|
17
|
+
var fetch__default = /*#__PURE__*/_interopDefaultLegacy(fetch);
|
|
18
|
+
|
|
19
|
+
const responseSchema = zod.z.object({
|
|
20
|
+
result: zod.z.literal(pluginPermissionCommon.AuthorizeResult.ALLOW).or(zod.z.literal(pluginPermissionCommon.AuthorizeResult.DENY))
|
|
21
|
+
});
|
|
22
|
+
class PermissionIntegrationClient {
|
|
23
|
+
constructor(options) {
|
|
24
|
+
this.discovery = options.discovery;
|
|
25
|
+
}
|
|
26
|
+
async applyConditions({
|
|
27
|
+
pluginId,
|
|
28
|
+
resourceRef,
|
|
29
|
+
resourceType,
|
|
30
|
+
conditions
|
|
31
|
+
}, authHeader) {
|
|
32
|
+
const endpoint = `${await this.discovery.getBaseUrl(pluginId)}/permissions/apply-conditions`;
|
|
33
|
+
const request = {
|
|
34
|
+
resourceRef,
|
|
35
|
+
resourceType,
|
|
36
|
+
conditions
|
|
37
|
+
};
|
|
38
|
+
const response = await fetch__default['default'](endpoint, {
|
|
39
|
+
method: "POST",
|
|
40
|
+
body: JSON.stringify(request),
|
|
41
|
+
headers: {
|
|
42
|
+
...authHeader ? {authorization: authHeader} : {},
|
|
43
|
+
"content-type": "application/json"
|
|
44
|
+
}
|
|
45
|
+
});
|
|
46
|
+
if (!response.ok) {
|
|
47
|
+
throw new Error(`Unexpected response from plugin upstream when applying conditions. Expected 200 but got ${response.status} - ${response.statusText}`);
|
|
48
|
+
}
|
|
49
|
+
return responseSchema.parse(await response.json());
|
|
50
|
+
}
|
|
51
|
+
}
|
|
52
|
+
|
|
53
|
+
const requestSchema = zod.z.array(zod.z.object({
|
|
54
|
+
id: zod.z.string(),
|
|
55
|
+
resourceRef: zod.z.string().optional(),
|
|
56
|
+
permission: zod.z.object({
|
|
57
|
+
name: zod.z.string(),
|
|
58
|
+
resourceType: zod.z.string().optional(),
|
|
59
|
+
attributes: zod.z.object({
|
|
60
|
+
action: zod.z.union([
|
|
61
|
+
zod.z.literal("create"),
|
|
62
|
+
zod.z.literal("read"),
|
|
63
|
+
zod.z.literal("update"),
|
|
64
|
+
zod.z.literal("delete")
|
|
65
|
+
]).optional()
|
|
66
|
+
})
|
|
67
|
+
})
|
|
68
|
+
}));
|
|
69
|
+
const handleRequest = async ({id, resourceRef, ...request}, user, policy, permissionIntegrationClient, authHeader) => {
|
|
70
|
+
const response = await policy.handle(request, user);
|
|
71
|
+
if (response.result === pluginPermissionCommon.AuthorizeResult.CONDITIONAL) {
|
|
72
|
+
if (request.permission.resourceType !== response.resourceType) {
|
|
73
|
+
throw new Error(`Invalid resource conditions returned from permission policy for permission ${request.permission.name}`);
|
|
74
|
+
}
|
|
75
|
+
if (resourceRef) {
|
|
76
|
+
return {
|
|
77
|
+
id,
|
|
78
|
+
...await permissionIntegrationClient.applyConditions({
|
|
79
|
+
resourceRef,
|
|
80
|
+
pluginId: response.pluginId,
|
|
81
|
+
resourceType: response.resourceType,
|
|
82
|
+
conditions: response.conditions
|
|
83
|
+
}, authHeader)
|
|
84
|
+
};
|
|
85
|
+
}
|
|
86
|
+
return {
|
|
87
|
+
id,
|
|
88
|
+
result: pluginPermissionCommon.AuthorizeResult.CONDITIONAL,
|
|
89
|
+
conditions: response.conditions
|
|
90
|
+
};
|
|
91
|
+
}
|
|
92
|
+
return {id, ...response};
|
|
93
|
+
};
|
|
94
|
+
async function createRouter(options) {
|
|
95
|
+
const {policy, discovery, identity} = options;
|
|
96
|
+
const permissionIntegrationClient = new PermissionIntegrationClient({
|
|
97
|
+
discovery
|
|
98
|
+
});
|
|
99
|
+
const router = Router__default['default']();
|
|
100
|
+
router.use(express__default['default'].json());
|
|
101
|
+
router.get("/health", (_, response) => {
|
|
102
|
+
response.send({status: "ok"});
|
|
103
|
+
});
|
|
104
|
+
router.post("/authorize", async (req, res) => {
|
|
105
|
+
const token = pluginAuthBackend.IdentityClient.getBearerToken(req.header("authorization"));
|
|
106
|
+
const user = token ? await identity.authenticate(token) : void 0;
|
|
107
|
+
const body = requestSchema.parse(req.body);
|
|
108
|
+
res.json(await Promise.all(body.map((request) => handleRequest(request, user, policy, permissionIntegrationClient, req.header("authorization")))));
|
|
109
|
+
});
|
|
110
|
+
router.use(backendCommon.errorHandler());
|
|
111
|
+
return router;
|
|
112
|
+
}
|
|
113
|
+
|
|
114
|
+
exports.createRouter = createRouter;
|
|
115
|
+
//# sourceMappingURL=index.cjs.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.cjs.js","sources":["../src/service/PermissionIntegrationClient.ts","../src/service/router.ts"],"sourcesContent":["/*\n * Copyright 2021 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport fetch from 'node-fetch';\nimport { z } from 'zod';\nimport { PluginEndpointDiscovery } from '@backstage/backend-common';\nimport {\n AuthorizeResult,\n PermissionCondition,\n PermissionCriteria,\n} from '@backstage/plugin-permission-common';\nimport {\n ApplyConditionsRequest,\n ApplyConditionsResponse,\n} from '@backstage/plugin-permission-node';\n\nconst responseSchema = z.object({\n result: z.literal(AuthorizeResult.ALLOW).or(z.literal(AuthorizeResult.DENY)),\n});\n\nexport class PermissionIntegrationClient {\n private readonly discovery: PluginEndpointDiscovery;\n\n constructor(options: { discovery: PluginEndpointDiscovery }) {\n this.discovery = options.discovery;\n }\n\n async applyConditions(\n {\n pluginId,\n resourceRef,\n resourceType,\n conditions,\n }: {\n resourceRef: string;\n pluginId: string;\n resourceType: string;\n conditions: PermissionCriteria<PermissionCondition>;\n },\n authHeader?: string,\n ): Promise<ApplyConditionsResponse> {\n const endpoint = `${await this.discovery.getBaseUrl(\n pluginId,\n )}/permissions/apply-conditions`;\n\n const request: ApplyConditionsRequest = {\n resourceRef,\n resourceType,\n conditions,\n };\n\n const response = await fetch(endpoint, {\n method: 'POST',\n body: JSON.stringify(request),\n headers: {\n ...(authHeader ? { authorization: authHeader } : {}),\n 'content-type': 'application/json',\n },\n });\n\n if (!response.ok) {\n throw new Error(\n `Unexpected response from plugin upstream when applying conditions. Expected 200 but got ${response.status} - ${response.statusText}`,\n );\n }\n\n return responseSchema.parse(await response.json());\n }\n}\n","/*\n * Copyright 2021 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport { z } from 'zod';\nimport express, { Request, Response } from 'express';\nimport Router from 'express-promise-router';\nimport { Logger } from 'winston';\nimport {\n errorHandler,\n PluginEndpointDiscovery,\n} from '@backstage/backend-common';\nimport {\n BackstageIdentity,\n IdentityClient,\n} from '@backstage/plugin-auth-backend';\nimport {\n AuthorizeResult,\n AuthorizeResponse,\n AuthorizeRequest,\n Identified,\n} from '@backstage/plugin-permission-common';\nimport { PermissionPolicy } from '@backstage/plugin-permission-node';\nimport { PermissionIntegrationClient } from './PermissionIntegrationClient';\n\nconst requestSchema: z.ZodSchema<Identified<AuthorizeRequest>[]> = z.array(\n z.object({\n id: z.string(),\n resourceRef: z.string().optional(),\n permission: z.object({\n name: z.string(),\n resourceType: z.string().optional(),\n attributes: z.object({\n action: z\n .union([\n z.literal('create'),\n z.literal('read'),\n z.literal('update'),\n z.literal('delete'),\n ])\n .optional(),\n }),\n }),\n }),\n);\n\n/**\n * Options required when constructing a new {@link express#Router} using\n * {@link createRouter}.\n *\n * @public\n */\nexport interface RouterOptions {\n logger: Logger;\n discovery: PluginEndpointDiscovery;\n policy: PermissionPolicy;\n identity: IdentityClient;\n}\n\nconst handleRequest = async (\n { id, resourceRef, ...request }: Identified<AuthorizeRequest>,\n user: BackstageIdentity | undefined,\n policy: PermissionPolicy,\n permissionIntegrationClient: PermissionIntegrationClient,\n authHeader?: string,\n): Promise<Identified<AuthorizeResponse>> => {\n const response = await policy.handle(request, user);\n\n if (response.result === AuthorizeResult.CONDITIONAL) {\n // Sanity check that any resource provided matches the one expected by the permission\n if (request.permission.resourceType !== response.resourceType) {\n throw new Error(\n `Invalid resource conditions returned from permission policy for permission ${request.permission.name}`,\n );\n }\n\n if (resourceRef) {\n return {\n id,\n ...(await permissionIntegrationClient.applyConditions(\n {\n resourceRef,\n pluginId: response.pluginId,\n resourceType: response.resourceType,\n conditions: response.conditions,\n },\n authHeader,\n )),\n };\n }\n\n return {\n id,\n result: AuthorizeResult.CONDITIONAL,\n conditions: response.conditions,\n };\n }\n\n return { id, ...response };\n};\n\n/**\n * Creates a new {@link express#Router} which provides the backend API\n * for the permission system.\n *\n * @public\n */\nexport async function createRouter(\n options: RouterOptions,\n): Promise<express.Router> {\n const { policy, discovery, identity } = options;\n\n const permissionIntegrationClient = new PermissionIntegrationClient({\n discovery,\n });\n\n const router = Router();\n router.use(express.json());\n\n router.get('/health', (_, response) => {\n response.send({ status: 'ok' });\n });\n\n router.post(\n '/authorize',\n async (\n req: Request<Identified<AuthorizeRequest>[]>,\n res: Response<Identified<AuthorizeResponse>[]>,\n ) => {\n const token = IdentityClient.getBearerToken(req.header('authorization'));\n const user = token ? await identity.authenticate(token) : undefined;\n\n const body = requestSchema.parse(req.body);\n\n res.json(\n await Promise.all(\n body.map(request =>\n handleRequest(\n request,\n user,\n policy,\n permissionIntegrationClient,\n req.header('authorization'),\n ),\n ),\n ),\n );\n },\n );\n\n router.use(errorHandler());\n return router;\n}\n"],"names":["z","AuthorizeResult","fetch","Router","express","IdentityClient","errorHandler"],"mappings":";;;;;;;;;;;;;;;;;;AA6BA,MAAM,iBAAiBA,MAAE,OAAO;AAAA,EAC9B,QAAQA,MAAE,QAAQC,uCAAgB,OAAO,GAAGD,MAAE,QAAQC,uCAAgB;AAAA;kCAG/B;AAAA,EAGvC,YAAY,SAAiD;AAC3D,SAAK,YAAY,QAAQ;AAAA;AAAA,QAGrB,gBACJ;AAAA,IACE;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,KAOF,YACkC;AAClC,UAAM,WAAW,GAAG,MAAM,KAAK,UAAU,WACvC;AAGF,UAAM,UAAkC;AAAA,MACtC;AAAA,MACA;AAAA,MACA;AAAA;AAGF,UAAM,WAAW,MAAMC,0BAAM,UAAU;AAAA,MACrC,QAAQ;AAAA,MACR,MAAM,KAAK,UAAU;AAAA,MACrB,SAAS;AAAA,WACH,aAAa,CAAE,eAAe,cAAe;AAAA,QACjD,gBAAgB;AAAA;AAAA;AAIpB,QAAI,CAAC,SAAS,IAAI;AAChB,YAAM,IAAI,MACR,2FAA2F,SAAS,YAAY,SAAS;AAAA;AAI7H,WAAO,eAAe,MAAM,MAAM,SAAS;AAAA;AAAA;;AC1C/C,MAAM,gBAA6DF,MAAE,MACnEA,MAAE,OAAO;AAAA,EACP,IAAIA,MAAE;AAAA,EACN,aAAaA,MAAE,SAAS;AAAA,EACxB,YAAYA,MAAE,OAAO;AAAA,IACnB,MAAMA,MAAE;AAAA,IACR,cAAcA,MAAE,SAAS;AAAA,IACzB,YAAYA,MAAE,OAAO;AAAA,MACnB,QAAQA,MACL,MAAM;AAAA,QACLA,MAAE,QAAQ;AAAA,QACVA,MAAE,QAAQ;AAAA,QACVA,MAAE,QAAQ;AAAA,QACVA,MAAE,QAAQ;AAAA,SAEX;AAAA;AAAA;AAAA;AAmBX,MAAM,gBAAgB,OACpB,CAAE,IAAI,gBAAgB,UACtB,MACA,QACA,6BACA,eAC2C;AAC3C,QAAM,WAAW,MAAM,OAAO,OAAO,SAAS;AAE9C,MAAI,SAAS,WAAWC,uCAAgB,aAAa;AAEnD,QAAI,QAAQ,WAAW,iBAAiB,SAAS,cAAc;AAC7D,YAAM,IAAI,MACR,8EAA8E,QAAQ,WAAW;AAAA;AAIrG,QAAI,aAAa;AACf,aAAO;AAAA,QACL;AAAA,WACI,MAAM,4BAA4B,gBACpC;AAAA,UACE;AAAA,UACA,UAAU,SAAS;AAAA,UACnB,cAAc,SAAS;AAAA,UACvB,YAAY,SAAS;AAAA,WAEvB;AAAA;AAAA;AAKN,WAAO;AAAA,MACL;AAAA,MACA,QAAQA,uCAAgB;AAAA,MACxB,YAAY,SAAS;AAAA;AAAA;AAIzB,SAAO,CAAE,OAAO;AAAA;4BAUhB,SACyB;AACzB,QAAM,CAAE,QAAQ,WAAW,YAAa;AAExC,QAAM,8BAA8B,IAAI,4BAA4B;AAAA,IAClE;AAAA;AAGF,QAAM,SAASE;AACf,SAAO,IAAIC,4BAAQ;AAEnB,SAAO,IAAI,WAAW,CAAC,GAAG,aAAa;AACrC,aAAS,KAAK,CAAE,QAAQ;AAAA;AAG1B,SAAO,KACL,cACA,OACE,KACA,QACG;AACH,UAAM,QAAQC,iCAAe,eAAe,IAAI,OAAO;AACvD,UAAM,OAAO,QAAQ,MAAM,SAAS,aAAa,SAAS;AAE1D,UAAM,OAAO,cAAc,MAAM,IAAI;AAErC,QAAI,KACF,MAAM,QAAQ,IACZ,KAAK,IAAI,aACP,cACE,SACA,MACA,QACA,6BACA,IAAI,OAAO;AAAA;AAQvB,SAAO,IAAIC;AACX,SAAO;AAAA;;;;"}
|
package/dist/index.d.ts
ADDED
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
import express from 'express';
|
|
2
|
+
import { Logger } from 'winston';
|
|
3
|
+
import { PluginEndpointDiscovery } from '@backstage/backend-common';
|
|
4
|
+
import { IdentityClient } from '@backstage/plugin-auth-backend';
|
|
5
|
+
import { PermissionPolicy } from '@backstage/plugin-permission-node';
|
|
6
|
+
|
|
7
|
+
/**
|
|
8
|
+
* Options required when constructing a new {@link express#Router} using
|
|
9
|
+
* {@link createRouter}.
|
|
10
|
+
*
|
|
11
|
+
* @public
|
|
12
|
+
*/
|
|
13
|
+
interface RouterOptions {
|
|
14
|
+
logger: Logger;
|
|
15
|
+
discovery: PluginEndpointDiscovery;
|
|
16
|
+
policy: PermissionPolicy;
|
|
17
|
+
identity: IdentityClient;
|
|
18
|
+
}
|
|
19
|
+
/**
|
|
20
|
+
* Creates a new {@link express#Router} which provides the backend API
|
|
21
|
+
* for the permission system.
|
|
22
|
+
*
|
|
23
|
+
* @public
|
|
24
|
+
*/
|
|
25
|
+
declare function createRouter(options: RouterOptions): Promise<express.Router>;
|
|
26
|
+
|
|
27
|
+
export { RouterOptions, createRouter };
|
package/package.json
ADDED
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "@backstage/plugin-permission-backend",
|
|
3
|
+
"version": "0.0.0-nightly-202111222339",
|
|
4
|
+
"main": "dist/index.cjs.js",
|
|
5
|
+
"types": "dist/index.d.ts",
|
|
6
|
+
"license": "Apache-2.0",
|
|
7
|
+
"publishConfig": {
|
|
8
|
+
"access": "public",
|
|
9
|
+
"main": "dist/index.cjs.js",
|
|
10
|
+
"types": "dist/index.d.ts"
|
|
11
|
+
},
|
|
12
|
+
"scripts": {
|
|
13
|
+
"start": "backstage-cli backend:dev",
|
|
14
|
+
"build": "backstage-cli backend:build",
|
|
15
|
+
"lint": "backstage-cli lint",
|
|
16
|
+
"test": "backstage-cli test",
|
|
17
|
+
"prepack": "backstage-cli prepack",
|
|
18
|
+
"postpack": "backstage-cli postpack",
|
|
19
|
+
"clean": "backstage-cli clean"
|
|
20
|
+
},
|
|
21
|
+
"dependencies": {
|
|
22
|
+
"@backstage/backend-common": "^0.0.0-nightly-202111222339",
|
|
23
|
+
"@backstage/config": "^0.1.11",
|
|
24
|
+
"@backstage/plugin-auth-backend": "^0.0.0-nightly-202111222339",
|
|
25
|
+
"@backstage/plugin-permission-common": "^0.0.0-nightly-202111222339",
|
|
26
|
+
"@backstage/plugin-permission-node": "^0.0.0-nightly-202111222339",
|
|
27
|
+
"@types/express": "*",
|
|
28
|
+
"express": "^4.17.1",
|
|
29
|
+
"express-promise-router": "^4.1.0",
|
|
30
|
+
"node-fetch": "^2.6.1",
|
|
31
|
+
"winston": "^3.2.1",
|
|
32
|
+
"yn": "^4.0.0",
|
|
33
|
+
"zod": "^3.11.6"
|
|
34
|
+
},
|
|
35
|
+
"devDependencies": {
|
|
36
|
+
"@backstage/cli": "^0.0.0-nightly-202111222339",
|
|
37
|
+
"@types/supertest": "^2.0.8",
|
|
38
|
+
"supertest": "^4.0.2",
|
|
39
|
+
"msw": "^0.35.0"
|
|
40
|
+
},
|
|
41
|
+
"files": [
|
|
42
|
+
"dist"
|
|
43
|
+
]
|
|
44
|
+
}
|