@mondaydotcomorg/monday-authorization 2.0.1-fix-moshesa-optional-ignite-params-and-backward-compatability.cd00ee6 → 2.0.1-fix-moshesa-optional-ignite-params-and-backward-compatability.cbb00db
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authorization-service.d.ts","sourceRoot":"","sources":["../src/authorization-service.ts"],"names":[],"mappings":"AAIA,OAAO,EAAS,kBAAkB,EAAE,MAAM,+BAA+B,CAAC;AAG1E,OAAO,EAAmB,YAAY,EAAE,kBAAkB,EAAE,MAAM,6BAA6B,CAAC;AAChG,OAAO,EAAE,MAAM,EAAE,mBAAmB,EAAE,mBAAmB,EAAE,QAAQ,EAAE,MAAM,iBAAiB,CAAC;AAE7F,OAAO,EACL,YAAY,EACZ,kBAAkB,EAClB,0BAA0B,EAC1B,YAAY,EACb,MAAM,kCAAkC,CAAC;
|
|
1
|
+
{"version":3,"file":"authorization-service.d.ts","sourceRoot":"","sources":["../src/authorization-service.ts"],"names":[],"mappings":"AAIA,OAAO,EAAS,kBAAkB,EAAE,MAAM,+BAA+B,CAAC;AAG1E,OAAO,EAAmB,YAAY,EAAE,kBAAkB,EAAE,MAAM,6BAA6B,CAAC;AAChG,OAAO,EAAE,MAAM,EAAE,mBAAmB,EAAE,mBAAmB,EAAE,QAAQ,EAAE,MAAM,iBAAiB,CAAC;AAE7F,OAAO,EACL,YAAY,EACZ,kBAAkB,EAClB,0BAA0B,EAC1B,YAAY,EACb,MAAM,kCAAkC,CAAC;AAS1C,MAAM,WAAW,iBAAiB;IAChC,YAAY,EAAE,OAAO,CAAC;IACtB,eAAe,CAAC,EAAE,MAAM,EAAE,CAAC;IAC3B,mBAAmB,CAAC,EAAE,mBAAmB,EAAE,CAAC;CAC7C;AAED,wBAAgB,sBAAsB,CAAC,wBAAwB,EAAE,kBAAkB,QAElF;AAeD,qBAAa,oBAAoB;IAC/B,MAAM,CAAC,WAAW,CAAC,MAAC;IACpB,MAAM,CAAC,sCAAsC,CAAC,EAAE,MAAM,CAAC;IACvD,MAAM,CAAC,YAAY,CAAC,EAAE,YAAY,CAAC;IAEnC;;;OAGG;WACU,YAAY,CACvB,SAAS,EAAE,MAAM,EACjB,MAAM,EAAE,MAAM,EACd,SAAS,EAAE,QAAQ,EAAE,EACrB,MAAM,EAAE,MAAM,GACb,OAAO,CAAC,iBAAiB,CAAC;WAEhB,YAAY,CACvB,SAAS,EAAE,MAAM,EACjB,MAAM,EAAE,MAAM,EACd,2BAA2B,EAAE,mBAAmB,EAAE,GACjD,OAAO,CAAC,iBAAiB,CAAC;IAY7B;;;OAGG;WACU,wBAAwB,CACnC,SAAS,EAAE,MAAM,EACjB,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,MAAM,EACnB,OAAO,GAAE;QAAE,eAAe,CAAC,EAAE,OAAO,CAAA;KAAO,GAC1C,OAAO,CAAC,OAAO,CAAC;mBAkBE,6BAA6B;IAclD,OAAO,CAAC,MAAM,CAAC,gBAAgB;WAIlB,gBAAgB,CAC3B,SAAS,EAAE,MAAM,EACjB,MAAM,EAAE,MAAM,EACd,MAAM,EAAE,MAAM,EACd,KAAK,EAAE,YAAY,GAClB,OAAO,CAAC,kBAAkB,CAAC;IAM9B;;;;;OAKG;mBACkB,+CAA+C;WAgDvD,wBAAwB,CACnC,SAAS,EAAE,MAAM,EACjB,MAAM,EAAE,MAAM,EACd,aAAa,EAAE,YAAY,EAAE,GAC5B,OAAO,CAAC,0BAA0B,EAAE,CAAC;mBAoFnB,oBAAoB;IAUzC;;;;;;OAMG;mBACkB,2CAA2C;mBAiE3C,oBAAoB;CAgG1C;AAED,wBAAgB,cAAc,CAC5B,MAAM,KAAA,EACN,sCAAsC,GAAE,MAAiD,QAY1F;AAED,wBAAsB,eAAe,CAAC,kBAAkB,CAAC,EAAE,kBAAkB,iBAO5E;AAED,wBAAgB,yBAAyB,CAAC,SAAS,EAAE,QAAQ,EAAE,EAAE,MAAM,EAAE,MAAM,GAAG,mBAAmB,CAepG"}
|
|
@@ -11,12 +11,32 @@ const igniteSdk = require('@mondaydotcomorg/ignite-sdk');
|
|
|
11
11
|
const prometheusService = require('./prometheus-service.js');
|
|
12
12
|
const authorizationInternalService = require('./authorization-internal-service.js');
|
|
13
13
|
const attributionsService = require('./attributions-service.js');
|
|
14
|
+
const contextProvider = require('@mondaydotcomorg/node-execution-context');
|
|
14
15
|
|
|
15
16
|
const _interopDefault = e => e && e.__esModule ? e : { default: e };
|
|
16
17
|
|
|
18
|
+
function _interopNamespace(e) {
|
|
19
|
+
if (e && e.__esModule) return e;
|
|
20
|
+
const n = Object.create(null, { [Symbol.toStringTag]: { value: 'Module' } });
|
|
21
|
+
if (e) {
|
|
22
|
+
for (const k in e) {
|
|
23
|
+
if (k !== 'default') {
|
|
24
|
+
const d = Object.getOwnPropertyDescriptor(e, k);
|
|
25
|
+
Object.defineProperty(n, k, d.get ? d : {
|
|
26
|
+
enumerable: true,
|
|
27
|
+
get: () => e[k]
|
|
28
|
+
});
|
|
29
|
+
}
|
|
30
|
+
}
|
|
31
|
+
}
|
|
32
|
+
n.default = e;
|
|
33
|
+
return n;
|
|
34
|
+
}
|
|
35
|
+
|
|
17
36
|
const snakeCase__default = /*#__PURE__*/_interopDefault(snakeCase);
|
|
18
37
|
const camelCase__default = /*#__PURE__*/_interopDefault(camelCase);
|
|
19
38
|
const mapKeys__default = /*#__PURE__*/_interopDefault(mapKeys);
|
|
39
|
+
const contextProvider__namespace = /*#__PURE__*/_interopNamespace(contextProvider);
|
|
20
40
|
|
|
21
41
|
const GRANTED_FEATURE_CACHE_EXPIRATION_SECONDS = 5 * 60;
|
|
22
42
|
const PLATFORM_AUTHORIZE_PATH = '/internal_ms/authorization/authorize';
|
|
@@ -116,6 +136,15 @@ class AuthorizationService {
|
|
|
116
136
|
return scopedActionsResponseObjects;
|
|
117
137
|
}
|
|
118
138
|
static async canActionInScopeMultiple(accountId, userId, scopedActions) {
|
|
139
|
+
try {
|
|
140
|
+
const context = contextProvider__namespace.getExecutionContext();
|
|
141
|
+
if (context) {
|
|
142
|
+
authorizationInternalService.logger.info({ tag: 'authorization-service', context }, 'Current execution context');
|
|
143
|
+
}
|
|
144
|
+
}
|
|
145
|
+
catch (error) {
|
|
146
|
+
authorizationInternalService.logger.warn({ tag: 'authorization-service', error }, 'Failed to get execution context');
|
|
147
|
+
}
|
|
119
148
|
const profile = tridentBackendApi.Api.isInitialized() ? attributionsService.getProfileFromTrident() : attributionsService.getProfileFromInitOption();
|
|
120
149
|
if (!profile ||
|
|
121
150
|
!this.igniteClient ||
|
|
@@ -310,10 +339,12 @@ function setRedisClient(client, grantedFeatureRedisExpirationInSeconds = GRANTED
|
|
|
310
339
|
}
|
|
311
340
|
}
|
|
312
341
|
async function setIgniteClient(igniteDependencies) {
|
|
313
|
-
|
|
314
|
-
|
|
315
|
-
|
|
316
|
-
|
|
342
|
+
if (tridentBackendApi.Api.isInitialized() && igniteDependencies && Object.keys(igniteDependencies).length > 0) {
|
|
343
|
+
AuthorizationService.igniteClient = await igniteSdk.getIgniteClient({
|
|
344
|
+
namespace: ['authorization-sdk'],
|
|
345
|
+
...igniteDependencies,
|
|
346
|
+
});
|
|
347
|
+
}
|
|
317
348
|
}
|
|
318
349
|
function createAuthorizationParams(resources, action) {
|
|
319
350
|
const params = {
|
|
@@ -332,10 +363,12 @@ function createAuthorizationParams(resources, action) {
|
|
|
332
363
|
return params;
|
|
333
364
|
}
|
|
334
365
|
function getAuthorizeUrl() {
|
|
335
|
-
|
|
366
|
+
const baseUrl = process.env.MONDAY_INTERNAL_URL;
|
|
367
|
+
return `${baseUrl}/internal_ms/authorization/authorize`;
|
|
336
368
|
}
|
|
337
369
|
function getCanActionsInScopesUrl() {
|
|
338
|
-
|
|
370
|
+
const baseUrl = process.env.MONDAY_INTERNAL_URL;
|
|
371
|
+
return `${baseUrl}/internal_ms/authorization/can_actions_in_scopes`;
|
|
339
372
|
}
|
|
340
373
|
|
|
341
374
|
exports.AuthorizationService = AuthorizationService;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authorization-service.d.ts","sourceRoot":"","sources":["../../src/authorization-service.ts"],"names":[],"mappings":"AAIA,OAAO,EAAS,kBAAkB,EAAE,MAAM,+BAA+B,CAAC;AAG1E,OAAO,EAAmB,YAAY,EAAE,kBAAkB,EAAE,MAAM,6BAA6B,CAAC;AAChG,OAAO,EAAE,MAAM,EAAE,mBAAmB,EAAE,mBAAmB,EAAE,QAAQ,EAAE,MAAM,iBAAiB,CAAC;AAE7F,OAAO,EACL,YAAY,EACZ,kBAAkB,EAClB,0BAA0B,EAC1B,YAAY,EACb,MAAM,kCAAkC,CAAC;
|
|
1
|
+
{"version":3,"file":"authorization-service.d.ts","sourceRoot":"","sources":["../../src/authorization-service.ts"],"names":[],"mappings":"AAIA,OAAO,EAAS,kBAAkB,EAAE,MAAM,+BAA+B,CAAC;AAG1E,OAAO,EAAmB,YAAY,EAAE,kBAAkB,EAAE,MAAM,6BAA6B,CAAC;AAChG,OAAO,EAAE,MAAM,EAAE,mBAAmB,EAAE,mBAAmB,EAAE,QAAQ,EAAE,MAAM,iBAAiB,CAAC;AAE7F,OAAO,EACL,YAAY,EACZ,kBAAkB,EAClB,0BAA0B,EAC1B,YAAY,EACb,MAAM,kCAAkC,CAAC;AAS1C,MAAM,WAAW,iBAAiB;IAChC,YAAY,EAAE,OAAO,CAAC;IACtB,eAAe,CAAC,EAAE,MAAM,EAAE,CAAC;IAC3B,mBAAmB,CAAC,EAAE,mBAAmB,EAAE,CAAC;CAC7C;AAED,wBAAgB,sBAAsB,CAAC,wBAAwB,EAAE,kBAAkB,QAElF;AAeD,qBAAa,oBAAoB;IAC/B,MAAM,CAAC,WAAW,CAAC,MAAC;IACpB,MAAM,CAAC,sCAAsC,CAAC,EAAE,MAAM,CAAC;IACvD,MAAM,CAAC,YAAY,CAAC,EAAE,YAAY,CAAC;IAEnC;;;OAGG;WACU,YAAY,CACvB,SAAS,EAAE,MAAM,EACjB,MAAM,EAAE,MAAM,EACd,SAAS,EAAE,QAAQ,EAAE,EACrB,MAAM,EAAE,MAAM,GACb,OAAO,CAAC,iBAAiB,CAAC;WAEhB,YAAY,CACvB,SAAS,EAAE,MAAM,EACjB,MAAM,EAAE,MAAM,EACd,2BAA2B,EAAE,mBAAmB,EAAE,GACjD,OAAO,CAAC,iBAAiB,CAAC;IAY7B;;;OAGG;WACU,wBAAwB,CACnC,SAAS,EAAE,MAAM,EACjB,MAAM,EAAE,MAAM,EACd,WAAW,EAAE,MAAM,EACnB,OAAO,GAAE;QAAE,eAAe,CAAC,EAAE,OAAO,CAAA;KAAO,GAC1C,OAAO,CAAC,OAAO,CAAC;mBAkBE,6BAA6B;IAclD,OAAO,CAAC,MAAM,CAAC,gBAAgB;WAIlB,gBAAgB,CAC3B,SAAS,EAAE,MAAM,EACjB,MAAM,EAAE,MAAM,EACd,MAAM,EAAE,MAAM,EACd,KAAK,EAAE,YAAY,GAClB,OAAO,CAAC,kBAAkB,CAAC;IAM9B;;;;;OAKG;mBACkB,+CAA+C;WAgDvD,wBAAwB,CACnC,SAAS,EAAE,MAAM,EACjB,MAAM,EAAE,MAAM,EACd,aAAa,EAAE,YAAY,EAAE,GAC5B,OAAO,CAAC,0BAA0B,EAAE,CAAC;mBAoFnB,oBAAoB;IAUzC;;;;;;OAMG;mBACkB,2CAA2C;mBAiE3C,oBAAoB;CAgG1C;AAED,wBAAgB,cAAc,CAC5B,MAAM,KAAA,EACN,sCAAsC,GAAE,MAAiD,QAY1F;AAED,wBAAsB,eAAe,CAAC,kBAAkB,CAAC,EAAE,kBAAkB,iBAO5E;AAED,wBAAgB,yBAAyB,CAAC,SAAS,EAAE,QAAQ,EAAE,EAAE,MAAM,EAAE,MAAM,GAAG,mBAAmB,CAepG"}
|
|
@@ -9,6 +9,7 @@ import { getIgniteClient } from '@mondaydotcomorg/ignite-sdk';
|
|
|
9
9
|
import { sendAuthorizationCheckResponseTimeMetric } from './prometheus-service.mjs';
|
|
10
10
|
import { AuthorizationInternalService, logger } from './authorization-internal-service.mjs';
|
|
11
11
|
import { getAttributionsFromApi, getProfileFromTrident, getProfileFromInitOption } from './attributions-service.mjs';
|
|
12
|
+
import * as contextProvider from '@mondaydotcomorg/node-execution-context';
|
|
12
13
|
|
|
13
14
|
const GRANTED_FEATURE_CACHE_EXPIRATION_SECONDS = 5 * 60;
|
|
14
15
|
const PLATFORM_AUTHORIZE_PATH = '/internal_ms/authorization/authorize';
|
|
@@ -108,6 +109,15 @@ class AuthorizationService {
|
|
|
108
109
|
return scopedActionsResponseObjects;
|
|
109
110
|
}
|
|
110
111
|
static async canActionInScopeMultiple(accountId, userId, scopedActions) {
|
|
112
|
+
try {
|
|
113
|
+
const context = contextProvider.getExecutionContext();
|
|
114
|
+
if (context) {
|
|
115
|
+
logger.info({ tag: 'authorization-service', context }, 'Current execution context');
|
|
116
|
+
}
|
|
117
|
+
}
|
|
118
|
+
catch (error) {
|
|
119
|
+
logger.warn({ tag: 'authorization-service', error }, 'Failed to get execution context');
|
|
120
|
+
}
|
|
111
121
|
const profile = Api.isInitialized() ? getProfileFromTrident() : getProfileFromInitOption();
|
|
112
122
|
if (!profile ||
|
|
113
123
|
!this.igniteClient ||
|
|
@@ -302,10 +312,12 @@ function setRedisClient(client, grantedFeatureRedisExpirationInSeconds = GRANTED
|
|
|
302
312
|
}
|
|
303
313
|
}
|
|
304
314
|
async function setIgniteClient(igniteDependencies) {
|
|
305
|
-
|
|
306
|
-
|
|
307
|
-
|
|
308
|
-
|
|
315
|
+
if (Api.isInitialized() && igniteDependencies && Object.keys(igniteDependencies).length > 0) {
|
|
316
|
+
AuthorizationService.igniteClient = await getIgniteClient({
|
|
317
|
+
namespace: ['authorization-sdk'],
|
|
318
|
+
...igniteDependencies,
|
|
319
|
+
});
|
|
320
|
+
}
|
|
309
321
|
}
|
|
310
322
|
function createAuthorizationParams(resources, action) {
|
|
311
323
|
const params = {
|
|
@@ -324,10 +336,12 @@ function createAuthorizationParams(resources, action) {
|
|
|
324
336
|
return params;
|
|
325
337
|
}
|
|
326
338
|
function getAuthorizeUrl() {
|
|
327
|
-
|
|
339
|
+
const baseUrl = process.env.MONDAY_INTERNAL_URL;
|
|
340
|
+
return `${baseUrl}/internal_ms/authorization/authorize`;
|
|
328
341
|
}
|
|
329
342
|
function getCanActionsInScopesUrl() {
|
|
330
|
-
|
|
343
|
+
const baseUrl = process.env.MONDAY_INTERNAL_URL;
|
|
344
|
+
return `${baseUrl}/internal_ms/authorization/can_actions_in_scopes`;
|
|
331
345
|
}
|
|
332
346
|
|
|
333
347
|
export { AuthorizationService, createAuthorizationParams, setIgniteClient, setRedisClient, setRequestFetchOptions };
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@mondaydotcomorg/monday-authorization",
|
|
3
|
-
"version": "2.0.1-fix-moshesa-optional-ignite-params-and-backward-compatability.
|
|
3
|
+
"version": "2.0.1-fix-moshesa-optional-ignite-params-and-backward-compatability.cbb00db",
|
|
4
4
|
"main": "dist/index.js",
|
|
5
5
|
"types": "dist/index.d.ts",
|
|
6
6
|
"license": "BSD-3-Clause",
|
|
@@ -25,6 +25,7 @@
|
|
|
25
25
|
"@mondaydotcomorg/monday-jwt": "^3.0.14",
|
|
26
26
|
"@mondaydotcomorg/monday-logger": "^4.0.11",
|
|
27
27
|
"@mondaydotcomorg/monday-sns": "^1.0.6",
|
|
28
|
+
"@mondaydotcomorg/node-execution-context": "^1.0.4",
|
|
28
29
|
"@mondaydotcomorg/trident-backend-api": "^0.24.3",
|
|
29
30
|
"lodash": "^4.17.21",
|
|
30
31
|
"node-fetch": "^2.6.7",
|