mirror of
https://github.com/zitadel/zitadel.git
synced 2025-12-07 07:16:54 +00:00
perf(query): org permission function for resources (#9677)
# Which Problems Are Solved Classic permission checks execute for every returned row on resource based search APIs. Complete background and problem definition can be found here: https://github.com/zitadel/zitadel/issues/9188 # How the Problems Are Solved - PermissionClause function now support dynamic query building, so it supports multiple cases. - PermissionClause is applied to all list resources which support org level permissions. - Wrap permission logic into wrapper functions so we keep the business logic clean. # Additional Changes - Handle org ID optimization in the query package, so it is reusable for all resources, instead of extracting the filter in the API. - Cleanup and test system user conversion in the authz package. (context middleware) - Fix: `core_integration_db_up` make recipe was missing the postgres service. # Additional Context - Related to https://github.com/zitadel/zitadel/issues/9190
This commit is contained in:
@@ -106,12 +106,26 @@ func idpLinksCheckPermission(ctx context.Context, links *IDPUserLinks, permissio
|
||||
)
|
||||
}
|
||||
|
||||
func idpLinksPermissionCheckV2(ctx context.Context, query sq.SelectBuilder, enabled bool, queries *IDPUserLinksSearchQuery) sq.SelectBuilder {
|
||||
if !enabled {
|
||||
return query
|
||||
}
|
||||
return query.Where(PermissionClause(
|
||||
ctx,
|
||||
IDPUserLinkResourceOwnerCol,
|
||||
domain.PermissionUserRead,
|
||||
SingleOrgPermissionOption(queries.Queries),
|
||||
OwnedRowsPermissionOption(IDPUserLinkUserIDCol),
|
||||
))
|
||||
}
|
||||
|
||||
func (q *Queries) IDPUserLinks(ctx context.Context, queries *IDPUserLinksSearchQuery, permissionCheck domain.PermissionCheck) (idps *IDPUserLinks, err error) {
|
||||
links, err := q.idpUserLinks(ctx, queries, false)
|
||||
permissionCheckV2 := PermissionV2(ctx, permissionCheck)
|
||||
links, err := q.idpUserLinks(ctx, queries, permissionCheckV2)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if permissionCheck != nil && len(links.Links) > 0 {
|
||||
if permissionCheck != nil && len(links.Links) > 0 && !permissionCheckV2 {
|
||||
// when userID for query is provided, only one check has to be done
|
||||
if queries.hasUserID() {
|
||||
if err := userCheckPermission(ctx, links.Links[0].ResourceOwner, links.Links[0].UserID, permissionCheck); err != nil {
|
||||
@@ -124,14 +138,15 @@ func (q *Queries) IDPUserLinks(ctx context.Context, queries *IDPUserLinksSearchQ
|
||||
return links, nil
|
||||
}
|
||||
|
||||
func (q *Queries) idpUserLinks(ctx context.Context, queries *IDPUserLinksSearchQuery, withOwnerRemoved bool) (idps *IDPUserLinks, err error) {
|
||||
func (q *Queries) idpUserLinks(ctx context.Context, queries *IDPUserLinksSearchQuery, permissionCheckV2 bool) (idps *IDPUserLinks, err error) {
|
||||
ctx, span := tracing.NewSpan(ctx)
|
||||
defer func() { span.EndWithError(err) }()
|
||||
|
||||
query, scan := prepareIDPUserLinksQuery()
|
||||
eq := sq.Eq{IDPUserLinkInstanceIDCol.identifier(): authz.GetInstance(ctx).InstanceID()}
|
||||
if !withOwnerRemoved {
|
||||
eq[IDPUserLinkOwnerRemovedCol.identifier()] = false
|
||||
query = idpLinksPermissionCheckV2(ctx, query, permissionCheckV2, queries)
|
||||
eq := sq.Eq{
|
||||
IDPUserLinkInstanceIDCol.identifier(): authz.GetInstance(ctx).InstanceID(),
|
||||
IDPUserLinkOwnerRemovedCol.identifier(): false,
|
||||
}
|
||||
stmt, args, err := queries.toQuery(query).Where(eq).ToSql()
|
||||
if err != nil {
|
||||
|
||||
@@ -93,6 +93,17 @@ func orgsCheckPermission(ctx context.Context, orgs *Orgs, permissionCheck domain
|
||||
)
|
||||
}
|
||||
|
||||
func orgsPermissionCheckV2(ctx context.Context, query sq.SelectBuilder, enabled bool) sq.SelectBuilder {
|
||||
if !enabled {
|
||||
return query
|
||||
}
|
||||
return query.Where(PermissionClause(
|
||||
ctx,
|
||||
OrgColumnID,
|
||||
domain_pkg.PermissionOrgRead,
|
||||
))
|
||||
}
|
||||
|
||||
type OrgSearchQueries struct {
|
||||
SearchRequest
|
||||
Queries []SearchQuery
|
||||
@@ -283,21 +294,23 @@ func (q *Queries) ExistsOrg(ctx context.Context, id, domain string) (verifiedID
|
||||
}
|
||||
|
||||
func (q *Queries) SearchOrgs(ctx context.Context, queries *OrgSearchQueries, permissionCheck domain_pkg.PermissionCheck) (*Orgs, error) {
|
||||
orgs, err := q.searchOrgs(ctx, queries)
|
||||
permissionCheckV2 := PermissionV2(ctx, permissionCheck)
|
||||
orgs, err := q.searchOrgs(ctx, queries, permissionCheckV2)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if permissionCheck != nil {
|
||||
if permissionCheck != nil && !permissionCheckV2 {
|
||||
orgsCheckPermission(ctx, orgs, permissionCheck)
|
||||
}
|
||||
return orgs, nil
|
||||
}
|
||||
|
||||
func (q *Queries) searchOrgs(ctx context.Context, queries *OrgSearchQueries) (orgs *Orgs, err error) {
|
||||
func (q *Queries) searchOrgs(ctx context.Context, queries *OrgSearchQueries, permissionCheckV2 bool) (orgs *Orgs, err error) {
|
||||
ctx, span := tracing.NewSpan(ctx)
|
||||
defer func() { span.EndWithError(err) }()
|
||||
|
||||
query, scan := prepareOrgsQuery()
|
||||
query = orgsPermissionCheckV2(ctx, query, permissionCheckV2)
|
||||
stmt, args, err := queries.toQuery(query).
|
||||
Where(sq.And{
|
||||
sq.Eq{
|
||||
|
||||
@@ -2,74 +2,109 @@ package query
|
||||
|
||||
import (
|
||||
"context"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
|
||||
sq "github.com/Masterminds/squirrel"
|
||||
"github.com/zitadel/logging"
|
||||
|
||||
"github.com/zitadel/zitadel/internal/api/authz"
|
||||
"github.com/zitadel/zitadel/internal/zerrors"
|
||||
"github.com/zitadel/zitadel/internal/database"
|
||||
domain_pkg "github.com/zitadel/zitadel/internal/domain"
|
||||
)
|
||||
|
||||
const (
|
||||
// eventstore.permitted_orgs(instanceid text, userid text, system_user_perms JSONB, perm text filter_orgs text)
|
||||
wherePermittedOrgsClause = "%s = ANY(eventstore.permitted_orgs(?, ?, ?, ?, ?))"
|
||||
wherePermittedOrgsOrCurrentUserClause = "(" + wherePermittedOrgsClause + " OR %s = ?" + ")"
|
||||
// eventstore.permitted_orgs(instanceid text, userid text, system_user_perms JSONB, perm text, filter_org text)
|
||||
wherePermittedOrgsExpr = "%s = ANY(eventstore.permitted_orgs(?, ?, ?, ?, ?))"
|
||||
)
|
||||
|
||||
// wherePermittedOrgs sets a `WHERE` clause to the query that filters the orgs
|
||||
// for which the authenticated user has the requested permission for.
|
||||
// The user ID is taken from the context.
|
||||
// The `orgIDColumn` specifies the table column to which this filter must be applied,
|
||||
// and is typically the `resource_owner` column in ZITADEL.
|
||||
// We use full identifiers in the query builder so this function should be
|
||||
// called with something like `UserResourceOwnerCol.identifier()` for example.
|
||||
// func wherePermittedOrgs(ctx context.Context, query sq.SelectBuilder, filterOrgIds, orgIDColumn, permission string) (sq.SelectBuilder, error) {
|
||||
// userID := authz.GetCtxData(ctx).UserID
|
||||
// logging.WithFields("permission_check_v2_flag", authz.GetFeatures(ctx).PermissionCheckV2, "org_id_column", orgIDColumn, "permission", permission, "user_id", userID).Debug("permitted orgs check used")
|
||||
|
||||
// systemUserPermissions := authz.GetSystemUserPermissions(ctx)
|
||||
// var systemUserPermissionsJson []byte
|
||||
// if systemUserPermissions != nil {
|
||||
// var err error
|
||||
// systemUserPermissionsJson, err = json.Marshal(systemUserPermissions)
|
||||
// if err != nil {
|
||||
// return query, err
|
||||
// }
|
||||
// }
|
||||
|
||||
// return query.Where(
|
||||
// fmt.Sprintf(wherePermittedOrgsClause, orgIDColumn),
|
||||
// authz.GetInstance(ctx).InstanceID(),
|
||||
// userID,
|
||||
// systemUserPermissionsJson,
|
||||
// permission,
|
||||
// filterOrgIds,
|
||||
// ), nil
|
||||
// }
|
||||
|
||||
func wherePermittedOrgsOrCurrentUser(ctx context.Context, query sq.SelectBuilder, filterOrgIds, orgIDColumn, userIdColum, permission string) (sq.SelectBuilder, error) {
|
||||
userID := authz.GetCtxData(ctx).UserID
|
||||
logging.WithFields("permission_check_v2_flag", authz.GetFeatures(ctx).PermissionCheckV2, "org_id_column", orgIDColumn, "user_id_colum", userIdColum, "permission", permission, "user_id", userID).Debug("permitted orgs check used")
|
||||
|
||||
systemUserPermissions := authz.GetSystemUserPermissions(ctx)
|
||||
var systemUserPermissionsJson []byte
|
||||
if systemUserPermissions != nil {
|
||||
var err error
|
||||
systemUserPermissionsJson, err = json.Marshal(systemUserPermissions)
|
||||
if err != nil {
|
||||
return query, zerrors.ThrowInternal(err, "AUTHZ-HS4us", "Errors.Internal")
|
||||
}
|
||||
}
|
||||
|
||||
return query.Where(
|
||||
fmt.Sprintf(wherePermittedOrgsOrCurrentUserClause, orgIDColumn, userIdColum),
|
||||
authz.GetInstance(ctx).InstanceID(),
|
||||
userID,
|
||||
systemUserPermissionsJson,
|
||||
permission,
|
||||
filterOrgIds,
|
||||
userID,
|
||||
), nil
|
||||
type permissionClauseBuilder struct {
|
||||
orgIDColumn Column
|
||||
instanceID string
|
||||
userID string
|
||||
systemPermissions []authz.SystemUserPermissions
|
||||
permission string
|
||||
orgID string
|
||||
connections []sq.Eq
|
||||
}
|
||||
|
||||
func (b *permissionClauseBuilder) appendConnection(column string, value any) {
|
||||
b.connections = append(b.connections, sq.Eq{column: value})
|
||||
}
|
||||
|
||||
func (b *permissionClauseBuilder) clauses() sq.Or {
|
||||
clauses := make(sq.Or, 1, len(b.connections)+1)
|
||||
clauses[0] = sq.Expr(
|
||||
fmt.Sprintf(wherePermittedOrgsExpr, b.orgIDColumn.identifier()),
|
||||
b.instanceID,
|
||||
b.userID,
|
||||
database.NewJSONArray(b.systemPermissions),
|
||||
b.permission,
|
||||
b.orgID,
|
||||
)
|
||||
for _, include := range b.connections {
|
||||
clauses = append(clauses, include)
|
||||
}
|
||||
return clauses
|
||||
}
|
||||
|
||||
type PermissionOption func(b *permissionClauseBuilder)
|
||||
|
||||
// OwnedRowsPermissionOption allows rows to be returned of which the current user is the owner.
|
||||
// Even if the user does not have an explicit permission for the organization.
|
||||
// For example an authenticated user can always see his own user account.
|
||||
func OwnedRowsPermissionOption(userIDColumn Column) PermissionOption {
|
||||
return func(b *permissionClauseBuilder) {
|
||||
b.appendConnection(userIDColumn.identifier(), b.userID)
|
||||
}
|
||||
}
|
||||
|
||||
// ConnectionPermissionOption allows returning of rows where the value is matched.
|
||||
// Even if the user does not have an explicit permission for the organization.
|
||||
func ConnectionPermissionOption(column Column, value any) PermissionOption {
|
||||
return func(b *permissionClauseBuilder) {
|
||||
b.appendConnection(column.identifier(), value)
|
||||
}
|
||||
}
|
||||
|
||||
// SingleOrgPermissionOption may be used to optimize the permitted orgs function by limiting the
|
||||
// returned organizations, to the one used in the requested filters.
|
||||
func SingleOrgPermissionOption(queries []SearchQuery) PermissionOption {
|
||||
return func(b *permissionClauseBuilder) {
|
||||
b.orgID = findTextEqualsQuery(b.orgIDColumn, queries)
|
||||
}
|
||||
}
|
||||
|
||||
// PermissionClause sets a `WHERE` clause to query,
|
||||
// which filters returned rows the current authenticated user has the requested permission to.
|
||||
//
|
||||
// Experimental: Work in progress. Currently only organization permissions are supported
|
||||
func PermissionClause(ctx context.Context, orgIDCol Column, permission string, options ...PermissionOption) sq.Or {
|
||||
ctxData := authz.GetCtxData(ctx)
|
||||
b := &permissionClauseBuilder{
|
||||
orgIDColumn: orgIDCol,
|
||||
instanceID: authz.GetInstance(ctx).InstanceID(),
|
||||
userID: ctxData.UserID,
|
||||
systemPermissions: ctxData.SystemUserPermissions,
|
||||
permission: permission,
|
||||
}
|
||||
for _, opt := range options {
|
||||
opt(b)
|
||||
}
|
||||
logging.WithFields(
|
||||
"org_id_column", b.orgIDColumn,
|
||||
"instance_id", b.instanceID,
|
||||
"user_id", b.userID,
|
||||
"system_user_permissions", b.systemPermissions,
|
||||
"permission", b.permission,
|
||||
"org_id", b.orgID,
|
||||
"overrides", b.connections,
|
||||
).Debug("permitted orgs check used")
|
||||
|
||||
return b.clauses()
|
||||
}
|
||||
|
||||
// PermissionV2 checks are enabled when the feature flag is set and the permission check function is not nil.
|
||||
// When the permission check function is nil, it indicates a v1 API and no resource based permission check is needed.
|
||||
func PermissionV2(ctx context.Context, cf domain_pkg.PermissionCheck) bool {
|
||||
return authz.GetFeatures(ctx).PermissionCheckV2 && cf != nil
|
||||
}
|
||||
|
||||
208
internal/query/permission_test.go
Normal file
208
internal/query/permission_test.go
Normal file
@@ -0,0 +1,208 @@
|
||||
package query
|
||||
|
||||
import (
|
||||
"context"
|
||||
"testing"
|
||||
|
||||
sq "github.com/Masterminds/squirrel"
|
||||
"github.com/stretchr/testify/assert"
|
||||
|
||||
"github.com/zitadel/zitadel/internal/api/authz"
|
||||
"github.com/zitadel/zitadel/internal/database"
|
||||
domain_pkg "github.com/zitadel/zitadel/internal/domain"
|
||||
"github.com/zitadel/zitadel/internal/feature"
|
||||
)
|
||||
|
||||
func TestPermissionClause(t *testing.T) {
|
||||
var permissions = []authz.SystemUserPermissions{
|
||||
{
|
||||
MemberType: authz.MemberTypeOrganization,
|
||||
AggregateID: "orgID",
|
||||
Permissions: []string{"permission1", "permission2"},
|
||||
},
|
||||
{
|
||||
MemberType: authz.MemberTypeIAM,
|
||||
Permissions: []string{"permission2", "permission3"},
|
||||
},
|
||||
}
|
||||
ctx := authz.WithInstanceID(context.Background(), "instanceID")
|
||||
ctx = authz.SetCtxData(ctx, authz.CtxData{
|
||||
UserID: "userID",
|
||||
SystemUserPermissions: permissions,
|
||||
})
|
||||
|
||||
type args struct {
|
||||
ctx context.Context
|
||||
orgIDCol Column
|
||||
permission string
|
||||
options []PermissionOption
|
||||
}
|
||||
tests := []struct {
|
||||
name string
|
||||
args args
|
||||
wantClause sq.Or
|
||||
}{
|
||||
{
|
||||
name: "no options",
|
||||
args: args{
|
||||
ctx: ctx,
|
||||
orgIDCol: UserResourceOwnerCol,
|
||||
permission: "permission1",
|
||||
},
|
||||
wantClause: sq.Or{
|
||||
sq.Expr(
|
||||
"projections.users14.resource_owner = ANY(eventstore.permitted_orgs(?, ?, ?, ?, ?))",
|
||||
"instanceID",
|
||||
"userID",
|
||||
database.NewJSONArray(permissions),
|
||||
"permission1",
|
||||
"",
|
||||
),
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "owned rows option",
|
||||
args: args{
|
||||
ctx: ctx,
|
||||
orgIDCol: UserResourceOwnerCol,
|
||||
permission: "permission1",
|
||||
options: []PermissionOption{
|
||||
OwnedRowsPermissionOption(UserIDCol),
|
||||
},
|
||||
},
|
||||
wantClause: sq.Or{
|
||||
sq.Expr(
|
||||
"projections.users14.resource_owner = ANY(eventstore.permitted_orgs(?, ?, ?, ?, ?))",
|
||||
"instanceID",
|
||||
"userID",
|
||||
database.NewJSONArray(permissions),
|
||||
"permission1",
|
||||
"",
|
||||
),
|
||||
sq.Eq{"projections.users14.id": "userID"},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "connection rows option",
|
||||
args: args{
|
||||
ctx: ctx,
|
||||
orgIDCol: UserResourceOwnerCol,
|
||||
permission: "permission1",
|
||||
options: []PermissionOption{
|
||||
OwnedRowsPermissionOption(UserIDCol),
|
||||
ConnectionPermissionOption(UserStateCol, "bar"),
|
||||
},
|
||||
},
|
||||
wantClause: sq.Or{
|
||||
sq.Expr(
|
||||
"projections.users14.resource_owner = ANY(eventstore.permitted_orgs(?, ?, ?, ?, ?))",
|
||||
"instanceID",
|
||||
"userID",
|
||||
database.NewJSONArray(permissions),
|
||||
"permission1",
|
||||
"",
|
||||
),
|
||||
sq.Eq{"projections.users14.id": "userID"},
|
||||
sq.Eq{"projections.users14.state": "bar"},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "single org option",
|
||||
args: args{
|
||||
ctx: ctx,
|
||||
orgIDCol: UserResourceOwnerCol,
|
||||
permission: "permission1",
|
||||
options: []PermissionOption{
|
||||
SingleOrgPermissionOption([]SearchQuery{
|
||||
mustSearchQuery(NewUserDisplayNameSearchQuery("zitadel", TextContains)),
|
||||
mustSearchQuery(NewUserResourceOwnerSearchQuery("orgID", TextEquals)),
|
||||
}),
|
||||
},
|
||||
},
|
||||
wantClause: sq.Or{
|
||||
sq.Expr(
|
||||
"projections.users14.resource_owner = ANY(eventstore.permitted_orgs(?, ?, ?, ?, ?))",
|
||||
"instanceID",
|
||||
"userID",
|
||||
database.NewJSONArray(permissions),
|
||||
"permission1",
|
||||
"orgID",
|
||||
),
|
||||
},
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
gotClause := PermissionClause(tt.args.ctx, tt.args.orgIDCol, tt.args.permission, tt.args.options...)
|
||||
assert.Equal(t, tt.wantClause, gotClause)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func mustSearchQuery(q SearchQuery, err error) SearchQuery {
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
return q
|
||||
}
|
||||
|
||||
func TestPermissionV2(t *testing.T) {
|
||||
type args struct {
|
||||
ctx context.Context
|
||||
cf domain_pkg.PermissionCheck
|
||||
}
|
||||
tests := []struct {
|
||||
name string
|
||||
args args
|
||||
want bool
|
||||
}{
|
||||
{
|
||||
name: "feature disabled, no permission check",
|
||||
args: args{
|
||||
ctx: context.Background(),
|
||||
cf: nil,
|
||||
},
|
||||
want: false,
|
||||
},
|
||||
{
|
||||
name: "feature enabled, no permission check",
|
||||
args: args{
|
||||
ctx: authz.WithFeatures(context.Background(), feature.Features{
|
||||
PermissionCheckV2: true,
|
||||
}),
|
||||
cf: nil,
|
||||
},
|
||||
want: false,
|
||||
},
|
||||
{
|
||||
name: "feature enabled, with permission check",
|
||||
args: args{
|
||||
ctx: authz.WithFeatures(context.Background(), feature.Features{
|
||||
PermissionCheckV2: true,
|
||||
}),
|
||||
cf: func(context.Context, string, string, string) error {
|
||||
return nil
|
||||
},
|
||||
},
|
||||
want: true,
|
||||
},
|
||||
{
|
||||
name: "feature disabled, with permission check",
|
||||
args: args{
|
||||
ctx: authz.WithFeatures(context.Background(), feature.Features{
|
||||
PermissionCheckV2: false,
|
||||
}),
|
||||
cf: func(context.Context, string, string, string) error {
|
||||
return nil
|
||||
},
|
||||
},
|
||||
want: false,
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
got := PermissionV2(tt.args.ctx, tt.args.cf)
|
||||
assert.Equal(t, tt.want, got)
|
||||
})
|
||||
}
|
||||
}
|
||||
@@ -148,3 +148,16 @@ func triggerBatch(ctx context.Context, handlers ...*handler.Handler) {
|
||||
|
||||
wg.Wait()
|
||||
}
|
||||
|
||||
func findTextEqualsQuery(column Column, queries []SearchQuery) string {
|
||||
for _, query := range queries {
|
||||
if query.Col() != column {
|
||||
continue
|
||||
}
|
||||
tq, ok := query.(*textQuery)
|
||||
if ok && tq.Compare == TextEquals {
|
||||
return tq.Text
|
||||
}
|
||||
}
|
||||
return ""
|
||||
}
|
||||
|
||||
@@ -113,6 +113,22 @@ func sessionCheckPermission(ctx context.Context, resourceOwner string, creator s
|
||||
return permissionCheck(ctx, domain.PermissionSessionRead, resourceOwner, "")
|
||||
}
|
||||
|
||||
func sessionsPermissionCheckV2(ctx context.Context, query sq.SelectBuilder, enabled bool) sq.SelectBuilder {
|
||||
if !enabled {
|
||||
return query
|
||||
}
|
||||
return query.Where(PermissionClause(
|
||||
ctx,
|
||||
SessionColumnResourceOwner,
|
||||
domain.PermissionSessionRead,
|
||||
// Allow if user is creator
|
||||
OwnedRowsPermissionOption(SessionColumnCreator),
|
||||
// Allow if session belongs to the user
|
||||
OwnedRowsPermissionOption(SessionColumnUserID),
|
||||
ConnectionPermissionOption(SessionColumnUserAgentFingerprintID, authz.GetCtxData(ctx).AgentID),
|
||||
))
|
||||
}
|
||||
|
||||
func (q *SessionsSearchQueries) toQuery(query sq.SelectBuilder) sq.SelectBuilder {
|
||||
query = q.SearchRequest.toQuery(query)
|
||||
for _, q := range q.Queries {
|
||||
@@ -282,21 +298,23 @@ func (q *Queries) sessionByID(ctx context.Context, shouldTriggerBulk bool, id st
|
||||
}
|
||||
|
||||
func (q *Queries) SearchSessions(ctx context.Context, queries *SessionsSearchQueries, permissionCheck domain.PermissionCheck) (*Sessions, error) {
|
||||
sessions, err := q.searchSessions(ctx, queries)
|
||||
permissionCheckV2 := PermissionV2(ctx, permissionCheck)
|
||||
sessions, err := q.searchSessions(ctx, queries, permissionCheckV2)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if permissionCheck != nil {
|
||||
if permissionCheck != nil && !permissionCheckV2 {
|
||||
sessionsCheckPermission(ctx, sessions, permissionCheck)
|
||||
}
|
||||
return sessions, nil
|
||||
}
|
||||
|
||||
func (q *Queries) searchSessions(ctx context.Context, queries *SessionsSearchQueries) (sessions *Sessions, err error) {
|
||||
func (q *Queries) searchSessions(ctx context.Context, queries *SessionsSearchQueries, permissionCheckV2 bool) (sessions *Sessions, err error) {
|
||||
ctx, span := tracing.NewSpan(ctx)
|
||||
defer func() { span.EndWithError(err) }()
|
||||
|
||||
query, scan := prepareSessionsQuery()
|
||||
query = sessionsPermissionCheckV2(ctx, query, permissionCheckV2)
|
||||
stmt, args, err := queries.toQuery(query).
|
||||
Where(sq.Eq{
|
||||
SessionColumnInstanceID.identifier(): authz.GetInstance(ctx).InstanceID(),
|
||||
|
||||
@@ -132,6 +132,19 @@ func usersCheckPermission(ctx context.Context, users *Users, permissionCheck dom
|
||||
)
|
||||
}
|
||||
|
||||
func userPermissionCheckV2(ctx context.Context, query sq.SelectBuilder, enabled bool, queries *UserSearchQueries) sq.SelectBuilder {
|
||||
if !enabled {
|
||||
return query
|
||||
}
|
||||
return query.Where(PermissionClause(
|
||||
ctx,
|
||||
UserResourceOwnerCol,
|
||||
domain.PermissionUserRead,
|
||||
SingleOrgPermissionOption(queries.Queries),
|
||||
OwnedRowsPermissionOption(UserIDCol),
|
||||
))
|
||||
}
|
||||
|
||||
type UserSearchQueries struct {
|
||||
SearchRequest
|
||||
Queries []SearchQuery
|
||||
@@ -606,8 +619,9 @@ func (q *Queries) CountUsers(ctx context.Context, queries *UserSearchQueries) (c
|
||||
return count, err
|
||||
}
|
||||
|
||||
func (q *Queries) SearchUsers(ctx context.Context, queries *UserSearchQueries, filterOrgIds string, permissionCheck domain.PermissionCheck) (*Users, error) {
|
||||
users, err := q.searchUsers(ctx, queries, filterOrgIds, permissionCheck != nil && authz.GetFeatures(ctx).PermissionCheckV2)
|
||||
func (q *Queries) SearchUsers(ctx context.Context, queries *UserSearchQueries, permissionCheck domain.PermissionCheck) (*Users, error) {
|
||||
permissionCheckV2 := PermissionV2(ctx, permissionCheck)
|
||||
users, err := q.searchUsers(ctx, queries, permissionCheckV2)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
@@ -617,22 +631,15 @@ func (q *Queries) SearchUsers(ctx context.Context, queries *UserSearchQueries, f
|
||||
return users, nil
|
||||
}
|
||||
|
||||
func (q *Queries) searchUsers(ctx context.Context, queries *UserSearchQueries, filterOrgIds string, permissionCheckV2 bool) (users *Users, err error) {
|
||||
func (q *Queries) searchUsers(ctx context.Context, queries *UserSearchQueries, permissionCheckV2 bool) (users *Users, err error) {
|
||||
ctx, span := tracing.NewSpan(ctx)
|
||||
defer func() { span.EndWithError(err) }()
|
||||
|
||||
query, scan := prepareUsersQuery()
|
||||
query = queries.toQuery(query).Where(sq.Eq{
|
||||
query = userPermissionCheckV2(ctx, query, permissionCheckV2, queries)
|
||||
stmt, args, err := queries.toQuery(query).Where(sq.Eq{
|
||||
UserInstanceIDCol.identifier(): authz.GetInstance(ctx).InstanceID(),
|
||||
})
|
||||
if permissionCheckV2 {
|
||||
query, err = wherePermittedOrgsOrCurrentUser(ctx, query, filterOrgIds, UserResourceOwnerCol.identifier(), UserIDCol.identifier(), domain.PermissionUserRead)
|
||||
if err != nil {
|
||||
return nil, zerrors.ThrowInternal(err, "AUTHZ-HS4us", "Errors.Internal")
|
||||
}
|
||||
}
|
||||
|
||||
stmt, args, err := query.ToSql()
|
||||
}).ToSql()
|
||||
if err != nil {
|
||||
return nil, zerrors.ThrowInternal(err, "QUERY-Dgbg2", "Errors.Query.SQLStatment")
|
||||
}
|
||||
|
||||
@@ -104,6 +104,18 @@ func authMethodsCheckPermission(ctx context.Context, methods *AuthMethods, permi
|
||||
)
|
||||
}
|
||||
|
||||
func userAuthMethodPermissionCheckV2(ctx context.Context, query sq.SelectBuilder, enabled bool) sq.SelectBuilder {
|
||||
if !enabled {
|
||||
return query
|
||||
}
|
||||
return query.Where(PermissionClause(
|
||||
ctx,
|
||||
UserAuthMethodColumnResourceOwner,
|
||||
domain.PermissionUserRead,
|
||||
OwnedRowsPermissionOption(UserIDCol),
|
||||
))
|
||||
}
|
||||
|
||||
type AuthMethod struct {
|
||||
UserID string
|
||||
CreationDate time.Time
|
||||
@@ -137,11 +149,12 @@ func (q *UserAuthMethodSearchQueries) hasUserID() bool {
|
||||
}
|
||||
|
||||
func (q *Queries) SearchUserAuthMethods(ctx context.Context, queries *UserAuthMethodSearchQueries, permissionCheck domain.PermissionCheck) (userAuthMethods *AuthMethods, err error) {
|
||||
methods, err := q.searchUserAuthMethods(ctx, queries)
|
||||
permissionCheckV2 := PermissionV2(ctx, permissionCheck)
|
||||
methods, err := q.searchUserAuthMethods(ctx, queries, permissionCheckV2)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if permissionCheck != nil && len(methods.AuthMethods) > 0 {
|
||||
if permissionCheck != nil && len(methods.AuthMethods) > 0 && !permissionCheckV2 {
|
||||
// when userID for query is provided, only one check has to be done
|
||||
if queries.hasUserID() {
|
||||
if err := userCheckPermission(ctx, methods.AuthMethods[0].ResourceOwner, methods.AuthMethods[0].UserID, permissionCheck); err != nil {
|
||||
@@ -154,11 +167,12 @@ func (q *Queries) SearchUserAuthMethods(ctx context.Context, queries *UserAuthMe
|
||||
return methods, nil
|
||||
}
|
||||
|
||||
func (q *Queries) searchUserAuthMethods(ctx context.Context, queries *UserAuthMethodSearchQueries) (userAuthMethods *AuthMethods, err error) {
|
||||
func (q *Queries) searchUserAuthMethods(ctx context.Context, queries *UserAuthMethodSearchQueries, permissionCheckV2 bool) (userAuthMethods *AuthMethods, err error) {
|
||||
ctx, span := tracing.NewSpan(ctx)
|
||||
defer func() { span.EndWithError(err) }()
|
||||
|
||||
query, scan := prepareUserAuthMethodsQuery()
|
||||
query = userAuthMethodPermissionCheckV2(ctx, query, permissionCheckV2)
|
||||
stmt, args, err := queries.toQuery(query).Where(sq.Eq{UserAuthMethodColumnInstanceID.identifier(): authz.GetInstance(ctx).InstanceID()}).ToSql()
|
||||
if err != nil {
|
||||
return nil, zerrors.ThrowInvalidArgument(err, "QUERY-j9NJd", "Errors.Query.InvalidRequest")
|
||||
|
||||
Reference in New Issue
Block a user