@backstage/plugin-permission-common 0.0.0-nightly-2021102122312

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md ADDED
@@ -0,0 +1,11 @@
1
+ # @backstage/plugin-permission-common
2
+
3
+ ## 0.0.0-nightly-2021102122312
4
+ ### Minor Changes
5
+
6
+ - 92439056fb: Accept configApi rather than enabled flag in PermissionClient constructor.
7
+
8
+ ### Patch Changes
9
+
10
+ - Updated dependencies
11
+ - @backstage/errors@0.0.0-nightly-2021102122312
package/README.md ADDED
@@ -0,0 +1,7 @@
1
+ # @backstage/plugin-permission-common
2
+
3
+ > NOTE: THIS PACKAGE IS EXPERIMENTAL, HERE BE DRAGONS
4
+
5
+ Isomorphic types and client for Backstage permissions and authorization. For
6
+ more information, see the [authorization
7
+ PRFC](https://github.com/backstage/backstage/pull/7761).
package/config.d.ts ADDED
@@ -0,0 +1,27 @@
1
+ /*
2
+ * Copyright 2021 The Backstage Authors
3
+ *
4
+ * Licensed under the Apache License, Version 2.0 (the "License");
5
+ * you may not use this file except in compliance with the License.
6
+ * You may obtain a copy of the License at
7
+ *
8
+ * http://www.apache.org/licenses/LICENSE-2.0
9
+ *
10
+ * Unless required by applicable law or agreed to in writing, software
11
+ * distributed under the License is distributed on an "AS IS" BASIS,
12
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ * See the License for the specific language governing permissions and
14
+ * limitations under the License.
15
+ */
16
+
17
+ export interface Config {
18
+ /** Configuration options for Backstage permissions and authorization */
19
+ permission?: {
20
+ /**
21
+ * Whether authorization is enabled in Backstage. Defaults to false, which means authorization
22
+ * requests will be automatically allowed without invoking the authorization policy.
23
+ * @visibility frontend
24
+ */
25
+ enabled?: boolean;
26
+ };
27
+ }
@@ -0,0 +1,119 @@
1
+ 'use strict';
2
+
3
+ Object.defineProperty(exports, '__esModule', { value: true });
4
+
5
+ var errors = require('@backstage/errors');
6
+ var fetch = require('cross-fetch');
7
+ var uuid = require('uuid');
8
+ var zod = require('zod');
9
+
10
+ function _interopDefaultLegacy (e) { return e && typeof e === 'object' && 'default' in e ? e : { 'default': e }; }
11
+
12
+ function _interopNamespace(e) {
13
+ if (e && e.__esModule) return e;
14
+ var n = Object.create(null);
15
+ if (e) {
16
+ Object.keys(e).forEach(function (k) {
17
+ if (k !== 'default') {
18
+ var d = Object.getOwnPropertyDescriptor(e, k);
19
+ Object.defineProperty(n, k, d.get ? d : {
20
+ enumerable: true,
21
+ get: function () {
22
+ return e[k];
23
+ }
24
+ });
25
+ }
26
+ });
27
+ }
28
+ n['default'] = e;
29
+ return Object.freeze(n);
30
+ }
31
+
32
+ var fetch__default = /*#__PURE__*/_interopDefaultLegacy(fetch);
33
+ var uuid__namespace = /*#__PURE__*/_interopNamespace(uuid);
34
+
35
+ exports.AuthorizeResult = void 0;
36
+ (function(AuthorizeResult2) {
37
+ AuthorizeResult2["DENY"] = "DENY";
38
+ AuthorizeResult2["ALLOW"] = "ALLOW";
39
+ AuthorizeResult2["CONDITIONAL"] = "CONDITIONAL";
40
+ })(exports.AuthorizeResult || (exports.AuthorizeResult = {}));
41
+
42
+ function isCreatePermission(permission) {
43
+ return permission.attributes.action === "create";
44
+ }
45
+ function isReadPermission(permission) {
46
+ return permission.attributes.action === "read";
47
+ }
48
+ function isUpdatePermission(permission) {
49
+ return permission.attributes.action === "update";
50
+ }
51
+ function isDeletePermission(permission) {
52
+ return permission.attributes.action === "delete";
53
+ }
54
+
55
+ const permissionCriteriaSchema = zod.z.lazy(() => zod.z.object({
56
+ rule: zod.z.string(),
57
+ params: zod.z.array(zod.z.unknown())
58
+ }).or(zod.z.object({anyOf: zod.z.array(permissionCriteriaSchema)})).or(zod.z.object({allOf: zod.z.array(permissionCriteriaSchema)})).or(zod.z.object({not: permissionCriteriaSchema})));
59
+ const responseSchema = zod.z.array(zod.z.object({
60
+ id: zod.z.string(),
61
+ result: zod.z.literal(exports.AuthorizeResult.ALLOW).or(zod.z.literal(exports.AuthorizeResult.DENY))
62
+ }).or(zod.z.object({
63
+ id: zod.z.string(),
64
+ result: zod.z.literal(exports.AuthorizeResult.CONDITIONAL),
65
+ conditions: permissionCriteriaSchema
66
+ })));
67
+ class PermissionClient {
68
+ constructor(options) {
69
+ var _a;
70
+ this.discoveryApi = options.discoveryApi;
71
+ this.enabled = (_a = options.configApi.getOptionalBoolean("permission.enabled")) != null ? _a : false;
72
+ }
73
+ async authorize(requests, options) {
74
+ if (!this.enabled) {
75
+ return requests.map((_) => ({result: exports.AuthorizeResult.ALLOW}));
76
+ }
77
+ const identifiedRequests = requests.map((request) => ({
78
+ id: uuid__namespace.v4(),
79
+ ...request
80
+ }));
81
+ const permissionApi = await this.discoveryApi.getBaseUrl("permission");
82
+ const response = await fetch__default['default'](`${permissionApi}/authorize`, {
83
+ method: "POST",
84
+ body: JSON.stringify(identifiedRequests),
85
+ headers: {
86
+ ...this.getAuthorizationHeader(options == null ? void 0 : options.token),
87
+ "content-type": "application/json"
88
+ }
89
+ });
90
+ if (!response.ok) {
91
+ throw await errors.ResponseError.fromResponse(response);
92
+ }
93
+ const identifiedResponses = await response.json();
94
+ this.assertValidResponses(identifiedRequests, identifiedResponses);
95
+ const responsesById = identifiedResponses.reduce((acc, r) => {
96
+ acc[r.id] = r;
97
+ return acc;
98
+ }, {});
99
+ return identifiedRequests.map((request) => responsesById[request.id]);
100
+ }
101
+ getAuthorizationHeader(token) {
102
+ return token ? {Authorization: `Bearer ${token}`} : {};
103
+ }
104
+ assertValidResponses(requests, json) {
105
+ const authorizedResponses = responseSchema.parse(json);
106
+ const responseIds = authorizedResponses.map((r) => r.id);
107
+ const hasAllRequestIds = requests.every((r) => responseIds.includes(r.id));
108
+ if (!hasAllRequestIds) {
109
+ throw new Error("Unexpected authorization response from permission-backend");
110
+ }
111
+ }
112
+ }
113
+
114
+ exports.PermissionClient = PermissionClient;
115
+ exports.isCreatePermission = isCreatePermission;
116
+ exports.isDeletePermission = isDeletePermission;
117
+ exports.isReadPermission = isReadPermission;
118
+ exports.isUpdatePermission = isUpdatePermission;
119
+ //# sourceMappingURL=index.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.cjs.js","sources":["../src/types/api.ts","../src/permissions/util.ts","../src/PermissionClient.ts"],"sourcesContent":["/*\n * Copyright 2021 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport { Permission } from './permission';\n\n/**\n * A request with a UUID identifier, so that batched responses can be matched up with the original\n * requests.\n * @public\n */\nexport type Identified<T> = T & { id: string };\n\n/**\n * The result of an authorization request.\n * @public\n */\nexport enum AuthorizeResult {\n /**\n * The authorization request is denied.\n */\n DENY = 'DENY',\n /**\n * The authorization request is allowed.\n */\n ALLOW = 'ALLOW',\n /**\n * The authorization request is allowed if the provided conditions are met.\n */\n CONDITIONAL = 'CONDITIONAL',\n}\n\n/**\n * An authorization request for {@link PermissionClient#authorize}.\n * @public\n */\nexport type AuthorizeRequest = {\n permission: Permission;\n resourceRef?: string;\n};\n\n/**\n * A condition returned with a CONDITIONAL authorization response.\n *\n * Conditions are a reference to a rule defined by a plugin, and parameters to apply the rule. For\n * example, a rule might be `isOwner` from the catalog-backend, and params may be a list of entity\n * claims from a identity token.\n * @public\n */\nexport type PermissionCondition<TParams extends unknown[] = unknown[]> = {\n rule: string;\n params: TParams;\n};\n\n/**\n * Composes several {@link PermissionCondition}s as criteria with a nested AND/OR structure.\n * @public\n */\nexport type PermissionCriteria<TQuery> =\n | { allOf: PermissionCriteria<TQuery>[] }\n | { anyOf: PermissionCriteria<TQuery>[] }\n | { not: PermissionCriteria<TQuery> }\n | TQuery;\n\n/**\n * An authorization response from {@link PermissionClient#authorize}.\n * @public\n */\nexport type AuthorizeResponse =\n | { result: AuthorizeResult.ALLOW | AuthorizeResult.DENY }\n | {\n result: AuthorizeResult.CONDITIONAL;\n conditions: PermissionCriteria<PermissionCondition>;\n };\n","/*\n * Copyright 2021 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport { Permission } from '../types';\n\n/**\n * Check if a given permission is related to a create action.\n * @public\n */\nexport function isCreatePermission(permission: Permission) {\n return permission.attributes.action === 'create';\n}\n\n/**\n * Check if a given permission is related to a read action.\n * @public\n */\nexport function isReadPermission(permission: Permission) {\n return permission.attributes.action === 'read';\n}\n\n/**\n * Check if a given permission is related to an update action.\n * @public\n */\nexport function isUpdatePermission(permission: Permission) {\n return permission.attributes.action === 'update';\n}\n\n/**\n * Check if a given permission is related to a delete action.\n * @public\n */\nexport function isDeletePermission(permission: Permission) {\n return permission.attributes.action === 'delete';\n}\n","/*\n * Copyright 2021 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport { Config } from '@backstage/config';\nimport { ResponseError } from '@backstage/errors';\nimport fetch from 'cross-fetch';\nimport * as uuid from 'uuid';\nimport { z } from 'zod';\nimport {\n AuthorizeResult,\n AuthorizeRequest,\n AuthorizeResponse,\n Identified,\n PermissionCriteria,\n PermissionCondition,\n} from './types/api';\nimport { DiscoveryApi } from './types/discovery';\n\nconst permissionCriteriaSchema: z.ZodSchema<\n PermissionCriteria<PermissionCondition>\n> = z.lazy(() =>\n z\n .object({\n rule: z.string(),\n params: z.array(z.unknown()),\n })\n .or(z.object({ anyOf: z.array(permissionCriteriaSchema) }))\n .or(z.object({ allOf: z.array(permissionCriteriaSchema) }))\n .or(z.object({ not: permissionCriteriaSchema })),\n);\n\nconst responseSchema = z.array(\n z\n .object({\n id: z.string(),\n result: z\n .literal(AuthorizeResult.ALLOW)\n .or(z.literal(AuthorizeResult.DENY)),\n })\n .or(\n z.object({\n id: z.string(),\n result: z.literal(AuthorizeResult.CONDITIONAL),\n conditions: permissionCriteriaSchema,\n }),\n ),\n);\n\n/**\n * Options for authorization requests; currently only an optional auth token.\n * @public\n */\nexport type AuthorizeRequestOptions = {\n token?: string;\n};\n\n/**\n * An isomorphic client for requesting authorization for Backstage permissions.\n * @public\n */\nexport class PermissionClient {\n private readonly enabled: boolean;\n private readonly discoveryApi: DiscoveryApi;\n\n constructor(options: { discoveryApi: DiscoveryApi; configApi: Config }) {\n this.discoveryApi = options.discoveryApi;\n this.enabled =\n options.configApi.getOptionalBoolean('permission.enabled') ?? false;\n }\n\n /**\n * Request authorization from the permission-backend for the given set of permissions.\n *\n * Authorization requests check that a given Backstage user can perform a protected operation,\n * potentially for a specific resource (such as a catalog entity). The Backstage identity token\n * should be included in the `options` if available.\n *\n * Permissions can be imported from plugins exposing them, such as `catalogEntityReadPermission`.\n *\n * The response will be either ALLOW or DENY when either the permission has no resourceType, or a\n * resourceRef is provided in the request. For permissions with a resourceType, CONDITIONAL may be\n * returned if no resourceRef is provided in the request. Conditional responses are intended only\n * for backends which have access to the data source for permissioned resources, so that filters\n * can be applied when loading collections of resources.\n * @public\n */\n async authorize(\n requests: AuthorizeRequest[],\n options?: AuthorizeRequestOptions,\n ): Promise<AuthorizeResponse[]> {\n // TODO(permissions): it would be great to provide some kind of typing guarantee that\n // conditional responses will only ever be returned for requests containing a resourceType\n // but no resourceRef. That way clients who aren't prepared to handle filtering according\n // to conditions can be guaranteed that they won't unexpectedly get a CONDITIONAL response.\n\n if (!this.enabled) {\n return requests.map(_ => ({ result: AuthorizeResult.ALLOW }));\n }\n\n const identifiedRequests: Identified<AuthorizeRequest>[] = requests.map(\n request => ({\n id: uuid.v4(),\n ...request,\n }),\n );\n\n const permissionApi = await this.discoveryApi.getBaseUrl('permission');\n const response = await fetch(`${permissionApi}/authorize`, {\n method: 'POST',\n body: JSON.stringify(identifiedRequests),\n headers: {\n ...this.getAuthorizationHeader(options?.token),\n 'content-type': 'application/json',\n },\n });\n if (!response.ok) {\n throw await ResponseError.fromResponse(response);\n }\n\n const identifiedResponses = await response.json();\n this.assertValidResponses(identifiedRequests, identifiedResponses);\n\n const responsesById = identifiedResponses.reduce((acc, r) => {\n acc[r.id] = r;\n return acc;\n }, {} as Record<string, Identified<AuthorizeResponse>>);\n\n return identifiedRequests.map(request => responsesById[request.id]);\n }\n\n private getAuthorizationHeader(token?: string): Record<string, string> {\n return token ? { Authorization: `Bearer ${token}` } : {};\n }\n\n private assertValidResponses(\n requests: Identified<AuthorizeRequest>[],\n json: any,\n ): asserts json is Identified<AuthorizeResponse>[] {\n const authorizedResponses = responseSchema.parse(json);\n const responseIds = authorizedResponses.map(r => r.id);\n const hasAllRequestIds = requests.every(r => responseIds.includes(r.id));\n if (!hasAllRequestIds) {\n throw new Error(\n 'Unexpected authorization response from permission-backend',\n );\n }\n }\n}\n"],"names":["AuthorizeResult","z","uuid","fetch","ResponseError"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AA6BYA;AAAL,UAAK,kBAAL;AAIL,6BAAO;AAIP,8BAAQ;AAIR,oCAAc;AAAA,GAZJA;;4BCPuB,YAAwB;AACzD,SAAO,WAAW,WAAW,WAAW;AAAA;0BAOT,YAAwB;AACvD,SAAO,WAAW,WAAW,WAAW;AAAA;4BAOP,YAAwB;AACzD,SAAO,WAAW,WAAW,WAAW;AAAA;4BAOP,YAAwB;AACzD,SAAO,WAAW,WAAW,WAAW;AAAA;;AChB1C,MAAM,2BAEFC,MAAE,KAAK,MACTA,MACG,OAAO;AAAA,EACN,MAAMA,MAAE;AAAA,EACR,QAAQA,MAAE,MAAMA,MAAE;AAAA,GAEnB,GAAGA,MAAE,OAAO,CAAE,OAAOA,MAAE,MAAM,6BAC7B,GAAGA,MAAE,OAAO,CAAE,OAAOA,MAAE,MAAM,6BAC7B,GAAGA,MAAE,OAAO,CAAE,KAAK;AAGxB,MAAM,iBAAiBA,MAAE,MACvBA,MACG,OAAO;AAAA,EACN,IAAIA,MAAE;AAAA,EACN,QAAQA,MACL,QAAQD,wBAAgB,OACxB,GAAGC,MAAE,QAAQD,wBAAgB;AAAA,GAEjC,GACCC,MAAE,OAAO;AAAA,EACP,IAAIA,MAAE;AAAA,EACN,QAAQA,MAAE,QAAQD,wBAAgB;AAAA,EAClC,YAAY;AAAA;uBAiBU;AAAA,EAI5B,YAAY,SAA4D;AA7E1E;AA8EI,SAAK,eAAe,QAAQ;AAC5B,SAAK,UACH,cAAQ,UAAU,mBAAmB,0BAArC,YAA8D;AAAA;AAAA,QAmB5D,UACJ,UACA,SAC8B;AAM9B,QAAI,CAAC,KAAK,SAAS;AACjB,aAAO,SAAS,IAAI,SAAQ,QAAQA,wBAAgB;AAAA;AAGtD,UAAM,qBAAqD,SAAS,IAClE;AAAY,MACV,IAAIE,gBAAK;AAAA,SACN;AAAA;AAIP,UAAM,gBAAgB,MAAM,KAAK,aAAa,WAAW;AACzD,UAAM,WAAW,MAAMC,0BAAM,GAAG,2BAA2B;AAAA,MACzD,QAAQ;AAAA,MACR,MAAM,KAAK,UAAU;AAAA,MACrB,SAAS;AAAA,WACJ,KAAK,uBAAuB,mCAAS;AAAA,QACxC,gBAAgB;AAAA;AAAA;AAGpB,QAAI,CAAC,SAAS,IAAI;AAChB,YAAM,MAAMC,qBAAc,aAAa;AAAA;AAGzC,UAAM,sBAAsB,MAAM,SAAS;AAC3C,SAAK,qBAAqB,oBAAoB;AAE9C,UAAM,gBAAgB,oBAAoB,OAAO,CAAC,KAAK,MAAM;AAC3D,UAAI,EAAE,MAAM;AACZ,aAAO;AAAA,OACN;AAEH,WAAO,mBAAmB,IAAI,aAAW,cAAc,QAAQ;AAAA;AAAA,EAGzD,uBAAuB,OAAwC;AACrE,WAAO,QAAQ,CAAE,eAAe,UAAU,WAAY;AAAA;AAAA,EAGhD,qBACN,UACA,MACiD;AACjD,UAAM,sBAAsB,eAAe,MAAM;AACjD,UAAM,cAAc,oBAAoB,IAAI,OAAK,EAAE;AACnD,UAAM,mBAAmB,SAAS,MAAM,OAAK,YAAY,SAAS,EAAE;AACpE,QAAI,CAAC,kBAAkB;AACrB,YAAM,IAAI,MACR;AAAA;AAAA;AAAA;;;;;;;;"}
@@ -0,0 +1,165 @@
1
+ import { Config } from '@backstage/config';
2
+
3
+ /**
4
+ * The attributes related to a given permission; these should be generic and widely applicable to
5
+ * all permissions in the system.
6
+ * @public
7
+ */
8
+ declare type PermissionAttributes = {
9
+ action?: 'create' | 'read' | 'update' | 'delete';
10
+ };
11
+ /**
12
+ * A permission that can be checked through authorization.
13
+ *
14
+ * Permissions are the "what" part of authorization, the action to be performed. This may be reading
15
+ * an entity from the catalog, executing a software template, or any other action a plugin author
16
+ * may wish to protect.
17
+ *
18
+ * To evaluate authorization, a permission is paired with a Backstage identity (the "who") and
19
+ * evaluated using an authorization policy.
20
+ * @public
21
+ */
22
+ declare type Permission = {
23
+ name: string;
24
+ attributes: PermissionAttributes;
25
+ resourceType?: string;
26
+ };
27
+
28
+ /**
29
+ * A request with a UUID identifier, so that batched responses can be matched up with the original
30
+ * requests.
31
+ * @public
32
+ */
33
+ declare type Identified<T> = T & {
34
+ id: string;
35
+ };
36
+ /**
37
+ * The result of an authorization request.
38
+ * @public
39
+ */
40
+ declare enum AuthorizeResult {
41
+ /**
42
+ * The authorization request is denied.
43
+ */
44
+ DENY = "DENY",
45
+ /**
46
+ * The authorization request is allowed.
47
+ */
48
+ ALLOW = "ALLOW",
49
+ /**
50
+ * The authorization request is allowed if the provided conditions are met.
51
+ */
52
+ CONDITIONAL = "CONDITIONAL"
53
+ }
54
+ /**
55
+ * An authorization request for {@link PermissionClient#authorize}.
56
+ * @public
57
+ */
58
+ declare type AuthorizeRequest = {
59
+ permission: Permission;
60
+ resourceRef?: string;
61
+ };
62
+ /**
63
+ * A condition returned with a CONDITIONAL authorization response.
64
+ *
65
+ * Conditions are a reference to a rule defined by a plugin, and parameters to apply the rule. For
66
+ * example, a rule might be `isOwner` from the catalog-backend, and params may be a list of entity
67
+ * claims from a identity token.
68
+ * @public
69
+ */
70
+ declare type PermissionCondition<TParams extends unknown[] = unknown[]> = {
71
+ rule: string;
72
+ params: TParams;
73
+ };
74
+ /**
75
+ * Composes several {@link PermissionCondition}s as criteria with a nested AND/OR structure.
76
+ * @public
77
+ */
78
+ declare type PermissionCriteria<TQuery> = {
79
+ allOf: PermissionCriteria<TQuery>[];
80
+ } | {
81
+ anyOf: PermissionCriteria<TQuery>[];
82
+ } | {
83
+ not: PermissionCriteria<TQuery>;
84
+ } | TQuery;
85
+ /**
86
+ * An authorization response from {@link PermissionClient#authorize}.
87
+ * @public
88
+ */
89
+ declare type AuthorizeResponse = {
90
+ result: AuthorizeResult.ALLOW | AuthorizeResult.DENY;
91
+ } | {
92
+ result: AuthorizeResult.CONDITIONAL;
93
+ conditions: PermissionCriteria<PermissionCondition>;
94
+ };
95
+
96
+ /**
97
+ * This is a copy of the core DiscoveryApi, to avoid importing core.
98
+ *
99
+ * @public
100
+ */
101
+ declare type DiscoveryApi = {
102
+ getBaseUrl(pluginId: string): Promise<string>;
103
+ };
104
+
105
+ /**
106
+ * Check if a given permission is related to a create action.
107
+ * @public
108
+ */
109
+ declare function isCreatePermission(permission: Permission): boolean;
110
+ /**
111
+ * Check if a given permission is related to a read action.
112
+ * @public
113
+ */
114
+ declare function isReadPermission(permission: Permission): boolean;
115
+ /**
116
+ * Check if a given permission is related to an update action.
117
+ * @public
118
+ */
119
+ declare function isUpdatePermission(permission: Permission): boolean;
120
+ /**
121
+ * Check if a given permission is related to a delete action.
122
+ * @public
123
+ */
124
+ declare function isDeletePermission(permission: Permission): boolean;
125
+
126
+ /**
127
+ * Options for authorization requests; currently only an optional auth token.
128
+ * @public
129
+ */
130
+ declare type AuthorizeRequestOptions = {
131
+ token?: string;
132
+ };
133
+ /**
134
+ * An isomorphic client for requesting authorization for Backstage permissions.
135
+ * @public
136
+ */
137
+ declare class PermissionClient {
138
+ private readonly enabled;
139
+ private readonly discoveryApi;
140
+ constructor(options: {
141
+ discoveryApi: DiscoveryApi;
142
+ configApi: Config;
143
+ });
144
+ /**
145
+ * Request authorization from the permission-backend for the given set of permissions.
146
+ *
147
+ * Authorization requests check that a given Backstage user can perform a protected operation,
148
+ * potentially for a specific resource (such as a catalog entity). The Backstage identity token
149
+ * should be included in the `options` if available.
150
+ *
151
+ * Permissions can be imported from plugins exposing them, such as `catalogEntityReadPermission`.
152
+ *
153
+ * The response will be either ALLOW or DENY when either the permission has no resourceType, or a
154
+ * resourceRef is provided in the request. For permissions with a resourceType, CONDITIONAL may be
155
+ * returned if no resourceRef is provided in the request. Conditional responses are intended only
156
+ * for backends which have access to the data source for permissioned resources, so that filters
157
+ * can be applied when loading collections of resources.
158
+ * @public
159
+ */
160
+ authorize(requests: AuthorizeRequest[], options?: AuthorizeRequestOptions): Promise<AuthorizeResponse[]>;
161
+ private getAuthorizationHeader;
162
+ private assertValidResponses;
163
+ }
164
+
165
+ export { AuthorizeRequest, AuthorizeRequestOptions, AuthorizeResponse, AuthorizeResult, DiscoveryApi, Identified, Permission, PermissionAttributes, PermissionClient, PermissionCondition, PermissionCriteria, isCreatePermission, isDeletePermission, isReadPermission, isUpdatePermission };
@@ -0,0 +1,86 @@
1
+ import { ResponseError } from '@backstage/errors';
2
+ import fetch from 'cross-fetch';
3
+ import * as uuid from 'uuid';
4
+ import { z } from 'zod';
5
+
6
+ var AuthorizeResult;
7
+ (function(AuthorizeResult2) {
8
+ AuthorizeResult2["DENY"] = "DENY";
9
+ AuthorizeResult2["ALLOW"] = "ALLOW";
10
+ AuthorizeResult2["CONDITIONAL"] = "CONDITIONAL";
11
+ })(AuthorizeResult || (AuthorizeResult = {}));
12
+
13
+ function isCreatePermission(permission) {
14
+ return permission.attributes.action === "create";
15
+ }
16
+ function isReadPermission(permission) {
17
+ return permission.attributes.action === "read";
18
+ }
19
+ function isUpdatePermission(permission) {
20
+ return permission.attributes.action === "update";
21
+ }
22
+ function isDeletePermission(permission) {
23
+ return permission.attributes.action === "delete";
24
+ }
25
+
26
+ const permissionCriteriaSchema = z.lazy(() => z.object({
27
+ rule: z.string(),
28
+ params: z.array(z.unknown())
29
+ }).or(z.object({anyOf: z.array(permissionCriteriaSchema)})).or(z.object({allOf: z.array(permissionCriteriaSchema)})).or(z.object({not: permissionCriteriaSchema})));
30
+ const responseSchema = z.array(z.object({
31
+ id: z.string(),
32
+ result: z.literal(AuthorizeResult.ALLOW).or(z.literal(AuthorizeResult.DENY))
33
+ }).or(z.object({
34
+ id: z.string(),
35
+ result: z.literal(AuthorizeResult.CONDITIONAL),
36
+ conditions: permissionCriteriaSchema
37
+ })));
38
+ class PermissionClient {
39
+ constructor(options) {
40
+ var _a;
41
+ this.discoveryApi = options.discoveryApi;
42
+ this.enabled = (_a = options.configApi.getOptionalBoolean("permission.enabled")) != null ? _a : false;
43
+ }
44
+ async authorize(requests, options) {
45
+ if (!this.enabled) {
46
+ return requests.map((_) => ({result: AuthorizeResult.ALLOW}));
47
+ }
48
+ const identifiedRequests = requests.map((request) => ({
49
+ id: uuid.v4(),
50
+ ...request
51
+ }));
52
+ const permissionApi = await this.discoveryApi.getBaseUrl("permission");
53
+ const response = await fetch(`${permissionApi}/authorize`, {
54
+ method: "POST",
55
+ body: JSON.stringify(identifiedRequests),
56
+ headers: {
57
+ ...this.getAuthorizationHeader(options == null ? void 0 : options.token),
58
+ "content-type": "application/json"
59
+ }
60
+ });
61
+ if (!response.ok) {
62
+ throw await ResponseError.fromResponse(response);
63
+ }
64
+ const identifiedResponses = await response.json();
65
+ this.assertValidResponses(identifiedRequests, identifiedResponses);
66
+ const responsesById = identifiedResponses.reduce((acc, r) => {
67
+ acc[r.id] = r;
68
+ return acc;
69
+ }, {});
70
+ return identifiedRequests.map((request) => responsesById[request.id]);
71
+ }
72
+ getAuthorizationHeader(token) {
73
+ return token ? {Authorization: `Bearer ${token}`} : {};
74
+ }
75
+ assertValidResponses(requests, json) {
76
+ const authorizedResponses = responseSchema.parse(json);
77
+ const responseIds = authorizedResponses.map((r) => r.id);
78
+ const hasAllRequestIds = requests.every((r) => responseIds.includes(r.id));
79
+ if (!hasAllRequestIds) {
80
+ throw new Error("Unexpected authorization response from permission-backend");
81
+ }
82
+ }
83
+ }
84
+
85
+ export { AuthorizeResult, PermissionClient, isCreatePermission, isDeletePermission, isReadPermission, isUpdatePermission };
86
+ //# sourceMappingURL=index.esm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.esm.js","sources":["../src/types/api.ts","../src/permissions/util.ts","../src/PermissionClient.ts"],"sourcesContent":["/*\n * Copyright 2021 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport { Permission } from './permission';\n\n/**\n * A request with a UUID identifier, so that batched responses can be matched up with the original\n * requests.\n * @public\n */\nexport type Identified<T> = T & { id: string };\n\n/**\n * The result of an authorization request.\n * @public\n */\nexport enum AuthorizeResult {\n /**\n * The authorization request is denied.\n */\n DENY = 'DENY',\n /**\n * The authorization request is allowed.\n */\n ALLOW = 'ALLOW',\n /**\n * The authorization request is allowed if the provided conditions are met.\n */\n CONDITIONAL = 'CONDITIONAL',\n}\n\n/**\n * An authorization request for {@link PermissionClient#authorize}.\n * @public\n */\nexport type AuthorizeRequest = {\n permission: Permission;\n resourceRef?: string;\n};\n\n/**\n * A condition returned with a CONDITIONAL authorization response.\n *\n * Conditions are a reference to a rule defined by a plugin, and parameters to apply the rule. For\n * example, a rule might be `isOwner` from the catalog-backend, and params may be a list of entity\n * claims from a identity token.\n * @public\n */\nexport type PermissionCondition<TParams extends unknown[] = unknown[]> = {\n rule: string;\n params: TParams;\n};\n\n/**\n * Composes several {@link PermissionCondition}s as criteria with a nested AND/OR structure.\n * @public\n */\nexport type PermissionCriteria<TQuery> =\n | { allOf: PermissionCriteria<TQuery>[] }\n | { anyOf: PermissionCriteria<TQuery>[] }\n | { not: PermissionCriteria<TQuery> }\n | TQuery;\n\n/**\n * An authorization response from {@link PermissionClient#authorize}.\n * @public\n */\nexport type AuthorizeResponse =\n | { result: AuthorizeResult.ALLOW | AuthorizeResult.DENY }\n | {\n result: AuthorizeResult.CONDITIONAL;\n conditions: PermissionCriteria<PermissionCondition>;\n };\n","/*\n * Copyright 2021 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport { Permission } from '../types';\n\n/**\n * Check if a given permission is related to a create action.\n * @public\n */\nexport function isCreatePermission(permission: Permission) {\n return permission.attributes.action === 'create';\n}\n\n/**\n * Check if a given permission is related to a read action.\n * @public\n */\nexport function isReadPermission(permission: Permission) {\n return permission.attributes.action === 'read';\n}\n\n/**\n * Check if a given permission is related to an update action.\n * @public\n */\nexport function isUpdatePermission(permission: Permission) {\n return permission.attributes.action === 'update';\n}\n\n/**\n * Check if a given permission is related to a delete action.\n * @public\n */\nexport function isDeletePermission(permission: Permission) {\n return permission.attributes.action === 'delete';\n}\n","/*\n * Copyright 2021 The Backstage Authors\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\n\nimport { Config } from '@backstage/config';\nimport { ResponseError } from '@backstage/errors';\nimport fetch from 'cross-fetch';\nimport * as uuid from 'uuid';\nimport { z } from 'zod';\nimport {\n AuthorizeResult,\n AuthorizeRequest,\n AuthorizeResponse,\n Identified,\n PermissionCriteria,\n PermissionCondition,\n} from './types/api';\nimport { DiscoveryApi } from './types/discovery';\n\nconst permissionCriteriaSchema: z.ZodSchema<\n PermissionCriteria<PermissionCondition>\n> = z.lazy(() =>\n z\n .object({\n rule: z.string(),\n params: z.array(z.unknown()),\n })\n .or(z.object({ anyOf: z.array(permissionCriteriaSchema) }))\n .or(z.object({ allOf: z.array(permissionCriteriaSchema) }))\n .or(z.object({ not: permissionCriteriaSchema })),\n);\n\nconst responseSchema = z.array(\n z\n .object({\n id: z.string(),\n result: z\n .literal(AuthorizeResult.ALLOW)\n .or(z.literal(AuthorizeResult.DENY)),\n })\n .or(\n z.object({\n id: z.string(),\n result: z.literal(AuthorizeResult.CONDITIONAL),\n conditions: permissionCriteriaSchema,\n }),\n ),\n);\n\n/**\n * Options for authorization requests; currently only an optional auth token.\n * @public\n */\nexport type AuthorizeRequestOptions = {\n token?: string;\n};\n\n/**\n * An isomorphic client for requesting authorization for Backstage permissions.\n * @public\n */\nexport class PermissionClient {\n private readonly enabled: boolean;\n private readonly discoveryApi: DiscoveryApi;\n\n constructor(options: { discoveryApi: DiscoveryApi; configApi: Config }) {\n this.discoveryApi = options.discoveryApi;\n this.enabled =\n options.configApi.getOptionalBoolean('permission.enabled') ?? false;\n }\n\n /**\n * Request authorization from the permission-backend for the given set of permissions.\n *\n * Authorization requests check that a given Backstage user can perform a protected operation,\n * potentially for a specific resource (such as a catalog entity). The Backstage identity token\n * should be included in the `options` if available.\n *\n * Permissions can be imported from plugins exposing them, such as `catalogEntityReadPermission`.\n *\n * The response will be either ALLOW or DENY when either the permission has no resourceType, or a\n * resourceRef is provided in the request. For permissions with a resourceType, CONDITIONAL may be\n * returned if no resourceRef is provided in the request. Conditional responses are intended only\n * for backends which have access to the data source for permissioned resources, so that filters\n * can be applied when loading collections of resources.\n * @public\n */\n async authorize(\n requests: AuthorizeRequest[],\n options?: AuthorizeRequestOptions,\n ): Promise<AuthorizeResponse[]> {\n // TODO(permissions): it would be great to provide some kind of typing guarantee that\n // conditional responses will only ever be returned for requests containing a resourceType\n // but no resourceRef. That way clients who aren't prepared to handle filtering according\n // to conditions can be guaranteed that they won't unexpectedly get a CONDITIONAL response.\n\n if (!this.enabled) {\n return requests.map(_ => ({ result: AuthorizeResult.ALLOW }));\n }\n\n const identifiedRequests: Identified<AuthorizeRequest>[] = requests.map(\n request => ({\n id: uuid.v4(),\n ...request,\n }),\n );\n\n const permissionApi = await this.discoveryApi.getBaseUrl('permission');\n const response = await fetch(`${permissionApi}/authorize`, {\n method: 'POST',\n body: JSON.stringify(identifiedRequests),\n headers: {\n ...this.getAuthorizationHeader(options?.token),\n 'content-type': 'application/json',\n },\n });\n if (!response.ok) {\n throw await ResponseError.fromResponse(response);\n }\n\n const identifiedResponses = await response.json();\n this.assertValidResponses(identifiedRequests, identifiedResponses);\n\n const responsesById = identifiedResponses.reduce((acc, r) => {\n acc[r.id] = r;\n return acc;\n }, {} as Record<string, Identified<AuthorizeResponse>>);\n\n return identifiedRequests.map(request => responsesById[request.id]);\n }\n\n private getAuthorizationHeader(token?: string): Record<string, string> {\n return token ? { Authorization: `Bearer ${token}` } : {};\n }\n\n private assertValidResponses(\n requests: Identified<AuthorizeRequest>[],\n json: any,\n ): asserts json is Identified<AuthorizeResponse>[] {\n const authorizedResponses = responseSchema.parse(json);\n const responseIds = authorizedResponses.map(r => r.id);\n const hasAllRequestIds = requests.every(r => responseIds.includes(r.id));\n if (!hasAllRequestIds) {\n throw new Error(\n 'Unexpected authorization response from permission-backend',\n );\n }\n }\n}\n"],"names":[],"mappings":";;;;;IA6BY;AAAL,UAAK,kBAAL;AAIL,6BAAO;AAIP,8BAAQ;AAIR,oCAAc;AAAA,GAZJ;;4BCPuB,YAAwB;AACzD,SAAO,WAAW,WAAW,WAAW;AAAA;0BAOT,YAAwB;AACvD,SAAO,WAAW,WAAW,WAAW;AAAA;4BAOP,YAAwB;AACzD,SAAO,WAAW,WAAW,WAAW;AAAA;4BAOP,YAAwB;AACzD,SAAO,WAAW,WAAW,WAAW;AAAA;;AChB1C,MAAM,2BAEF,EAAE,KAAK,MACT,EACG,OAAO;AAAA,EACN,MAAM,EAAE;AAAA,EACR,QAAQ,EAAE,MAAM,EAAE;AAAA,GAEnB,GAAG,EAAE,OAAO,CAAE,OAAO,EAAE,MAAM,6BAC7B,GAAG,EAAE,OAAO,CAAE,OAAO,EAAE,MAAM,6BAC7B,GAAG,EAAE,OAAO,CAAE,KAAK;AAGxB,MAAM,iBAAiB,EAAE,MACvB,EACG,OAAO;AAAA,EACN,IAAI,EAAE;AAAA,EACN,QAAQ,EACL,QAAQ,gBAAgB,OACxB,GAAG,EAAE,QAAQ,gBAAgB;AAAA,GAEjC,GACC,EAAE,OAAO;AAAA,EACP,IAAI,EAAE;AAAA,EACN,QAAQ,EAAE,QAAQ,gBAAgB;AAAA,EAClC,YAAY;AAAA;uBAiBU;AAAA,EAI5B,YAAY,SAA4D;AA7E1E;AA8EI,SAAK,eAAe,QAAQ;AAC5B,SAAK,UACH,cAAQ,UAAU,mBAAmB,0BAArC,YAA8D;AAAA;AAAA,QAmB5D,UACJ,UACA,SAC8B;AAM9B,QAAI,CAAC,KAAK,SAAS;AACjB,aAAO,SAAS,IAAI,SAAQ,QAAQ,gBAAgB;AAAA;AAGtD,UAAM,qBAAqD,SAAS,IAClE;AAAY,MACV,IAAI,KAAK;AAAA,SACN;AAAA;AAIP,UAAM,gBAAgB,MAAM,KAAK,aAAa,WAAW;AACzD,UAAM,WAAW,MAAM,MAAM,GAAG,2BAA2B;AAAA,MACzD,QAAQ;AAAA,MACR,MAAM,KAAK,UAAU;AAAA,MACrB,SAAS;AAAA,WACJ,KAAK,uBAAuB,mCAAS;AAAA,QACxC,gBAAgB;AAAA;AAAA;AAGpB,QAAI,CAAC,SAAS,IAAI;AAChB,YAAM,MAAM,cAAc,aAAa;AAAA;AAGzC,UAAM,sBAAsB,MAAM,SAAS;AAC3C,SAAK,qBAAqB,oBAAoB;AAE9C,UAAM,gBAAgB,oBAAoB,OAAO,CAAC,KAAK,MAAM;AAC3D,UAAI,EAAE,MAAM;AACZ,aAAO;AAAA,OACN;AAEH,WAAO,mBAAmB,IAAI,aAAW,cAAc,QAAQ;AAAA;AAAA,EAGzD,uBAAuB,OAAwC;AACrE,WAAO,QAAQ,CAAE,eAAe,UAAU,WAAY;AAAA;AAAA,EAGhD,qBACN,UACA,MACiD;AACjD,UAAM,sBAAsB,eAAe,MAAM;AACjD,UAAM,cAAc,oBAAoB,IAAI,OAAK,EAAE;AACnD,UAAM,mBAAmB,SAAS,MAAM,OAAK,YAAY,SAAS,EAAE;AACpE,QAAI,CAAC,kBAAkB;AACrB,YAAM,IAAI,MACR;AAAA;AAAA;AAAA;;;;"}
package/package.json ADDED
@@ -0,0 +1,53 @@
1
+ {
2
+ "name": "@backstage/plugin-permission-common",
3
+ "description": "Isomorphic types and client for Backstage permissions and authorization",
4
+ "version": "0.0.0-nightly-2021102122312",
5
+ "main": "dist/index.cjs.js",
6
+ "types": "dist/index.d.ts",
7
+ "publishConfig": {
8
+ "access": "public",
9
+ "main": "dist/index.cjs.js",
10
+ "module": "dist/index.esm.js",
11
+ "types": "dist/index.d.ts"
12
+ },
13
+ "homepage": "https://backstage.io",
14
+ "repository": {
15
+ "type": "git",
16
+ "url": "https://github.com/backstage/backstage",
17
+ "directory": "plugins/permission-common"
18
+ },
19
+ "keywords": [
20
+ "backstage",
21
+ "permissions"
22
+ ],
23
+ "license": "Apache-2.0",
24
+ "files": [
25
+ "dist",
26
+ "config.d.ts"
27
+ ],
28
+ "configSchema": "config.d.ts",
29
+ "scripts": {
30
+ "build": "backstage-cli build",
31
+ "lint": "backstage-cli lint",
32
+ "test": "backstage-cli test",
33
+ "prepack": "backstage-cli prepack",
34
+ "postpack": "backstage-cli postpack",
35
+ "clean": "backstage-cli clean"
36
+ },
37
+ "bugs": {
38
+ "url": "https://github.com/backstage/backstage/issues"
39
+ },
40
+ "dependencies": {
41
+ "@backstage/config": "^0.1.11",
42
+ "@backstage/errors": "^0.0.0-nightly-2021102122312",
43
+ "cross-fetch": "^3.0.6",
44
+ "uuid": "^8.0.0",
45
+ "zod": "^3.11.6"
46
+ },
47
+ "devDependencies": {
48
+ "@backstage/cli": "^0.0.0-nightly-2021102122312",
49
+ "@types/jest": "^26.0.7",
50
+ "msw": "^0.35.0"
51
+ },
52
+ "module": "dist/index.esm.js"
53
+ }