feat: Add initial scope checks via decorators (#7737)

This commit is contained in:
Val 2023-11-28 11:41:34 +00:00 committed by GitHub
parent 753cbc1e96
commit a37f1cb0ba
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
22 changed files with 233 additions and 89 deletions

View file

@ -6,7 +6,14 @@ export type Resource =
| 'credential' | 'credential'
| 'variable' | 'variable'
| 'sourceControl' | 'sourceControl'
| 'externalSecretsStore'; | 'externalSecretsProvider'
| 'externalSecret'
| 'eventBusEvent'
| 'eventBusDestination'
| 'orchestration'
| 'communityPackage'
| 'ldap'
| 'saml';
export type ResourceScope< export type ResourceScope<
R extends Resource, R extends Resource,
@ -17,14 +24,27 @@ export type WildcardScope = `${Resource}:*` | '*';
export type WorkflowScope = ResourceScope<'workflow', DefaultOperations | 'share'>; export type WorkflowScope = ResourceScope<'workflow', DefaultOperations | 'share'>;
export type TagScope = ResourceScope<'tag'>; export type TagScope = ResourceScope<'tag'>;
export type UserScope = ResourceScope<'user'>; export type UserScope = ResourceScope<'user', DefaultOperations | 'resetPassword'>;
export type CredentialScope = ResourceScope<'credential', DefaultOperations | 'share'>; export type CredentialScope = ResourceScope<'credential', DefaultOperations | 'share'>;
export type VariableScope = ResourceScope<'variable'>; export type VariableScope = ResourceScope<'variable'>;
export type SourceControlScope = ResourceScope<'sourceControl', 'pull' | 'push' | 'manage'>; export type SourceControlScope = ResourceScope<'sourceControl', 'pull' | 'push' | 'manage'>;
export type ExternalSecretStoreScope = ResourceScope< export type ExternalSecretProviderScope = ResourceScope<
'externalSecretsStore', 'externalSecretsProvider',
DefaultOperations | 'refresh' DefaultOperations | 'sync'
>; >;
export type ExternalSecretScope = ResourceScope<'externalSecret', 'list'>;
export type EventBusEventScope = ResourceScope<'eventBusEvent', DefaultOperations | 'query'>;
export type EventBusDestinationScope = ResourceScope<
'eventBusDestination',
DefaultOperations | 'test'
>;
export type OrchestrationScope = ResourceScope<'orchestration', 'read' | 'list'>;
export type CommunityPackageScope = ResourceScope<
'communityPackage',
'install' | 'uninstall' | 'update' | 'list'
>;
export type LdapScope = ResourceScope<'ldap', 'manage' | 'sync'>;
export type SamlScope = ResourceScope<'saml', 'manage'>;
export type Scope = export type Scope =
| WorkflowScope | WorkflowScope
@ -33,7 +53,14 @@ export type Scope =
| CredentialScope | CredentialScope
| VariableScope | VariableScope
| SourceControlScope | SourceControlScope
| ExternalSecretStoreScope; | ExternalSecretProviderScope
| ExternalSecretScope
| EventBusEventScope
| EventBusDestinationScope
| OrchestrationScope
| CommunityPackageScope
| LdapScope
| SamlScope;
export type ScopeLevel = 'global' | 'project' | 'resource'; export type ScopeLevel = 'global' | 'project' | 'resource';
export type GetScopeLevel<T extends ScopeLevel> = Record<T, Scope[]>; export type GetScopeLevel<T extends ScopeLevel> = Record<T, Scope[]>;

View file

@ -1,4 +1,4 @@
import { Authorized, Get, Post, RestController } from '@/decorators'; import { Authorized, Get, Post, RestController, RequireGlobalScope } from '@/decorators';
import { ExternalSecretsRequest } from '@/requests'; import { ExternalSecretsRequest } from '@/requests';
import { Response } from 'express'; import { Response } from 'express';
import { Service } from 'typedi'; import { Service } from 'typedi';
@ -7,17 +7,19 @@ import { ExternalSecretsProviderNotFoundError } from '@/errors/external-secrets-
import { NotFoundError } from '@/errors/response-errors/not-found.error'; import { NotFoundError } from '@/errors/response-errors/not-found.error';
@Service() @Service()
@Authorized(['global', 'owner']) @Authorized()
@RestController('/external-secrets') @RestController('/external-secrets')
export class ExternalSecretsController { export class ExternalSecretsController {
constructor(private readonly secretsService: ExternalSecretsService) {} constructor(private readonly secretsService: ExternalSecretsService) {}
@Get('/providers') @Get('/providers')
@RequireGlobalScope('externalSecretsProvider:list')
async getProviders() { async getProviders() {
return this.secretsService.getProviders(); return this.secretsService.getProviders();
} }
@Get('/providers/:provider') @Get('/providers/:provider')
@RequireGlobalScope('externalSecretsProvider:read')
async getProvider(req: ExternalSecretsRequest.GetProvider) { async getProvider(req: ExternalSecretsRequest.GetProvider) {
const providerName = req.params.provider; const providerName = req.params.provider;
try { try {
@ -31,6 +33,7 @@ export class ExternalSecretsController {
} }
@Post('/providers/:provider/test') @Post('/providers/:provider/test')
@RequireGlobalScope('externalSecretsProvider:read')
async testProviderSettings(req: ExternalSecretsRequest.TestProviderSettings, res: Response) { async testProviderSettings(req: ExternalSecretsRequest.TestProviderSettings, res: Response) {
const providerName = req.params.provider; const providerName = req.params.provider;
try { try {
@ -50,6 +53,7 @@ export class ExternalSecretsController {
} }
@Post('/providers/:provider') @Post('/providers/:provider')
@RequireGlobalScope('externalSecretsProvider:create')
async setProviderSettings(req: ExternalSecretsRequest.SetProviderSettings) { async setProviderSettings(req: ExternalSecretsRequest.SetProviderSettings) {
const providerName = req.params.provider; const providerName = req.params.provider;
try { try {
@ -64,6 +68,7 @@ export class ExternalSecretsController {
} }
@Post('/providers/:provider/connect') @Post('/providers/:provider/connect')
@RequireGlobalScope('externalSecretsProvider:update')
async setProviderConnected(req: ExternalSecretsRequest.SetProviderConnected) { async setProviderConnected(req: ExternalSecretsRequest.SetProviderConnected) {
const providerName = req.params.provider; const providerName = req.params.provider;
try { try {
@ -78,6 +83,7 @@ export class ExternalSecretsController {
} }
@Post('/providers/:provider/update') @Post('/providers/:provider/update')
@RequireGlobalScope('externalSecretsProvider:sync')
async updateProvider(req: ExternalSecretsRequest.UpdateProvider, res: Response) { async updateProvider(req: ExternalSecretsRequest.UpdateProvider, res: Response) {
const providerName = req.params.provider; const providerName = req.params.provider;
try { try {
@ -97,6 +103,7 @@ export class ExternalSecretsController {
} }
@Get('/secrets') @Get('/secrets')
@RequireGlobalScope('externalSecret:list')
getSecretNames() { getSecretNames() {
return this.secretsService.getAllSecrets(); return this.secretsService.getAllSecrets();
} }

View file

@ -288,6 +288,7 @@ export class Server extends AbstractServer {
Container.get(OrchestrationController), Container.get(OrchestrationController),
Container.get(WorkflowHistoryController), Container.get(WorkflowHistoryController),
Container.get(BinaryDataController), Container.get(BinaryDataController),
Container.get(VariablesController),
new InvitationController( new InvitationController(
config, config,
logger, logger,

View file

@ -6,7 +6,16 @@ import {
STARTER_TEMPLATE_NAME, STARTER_TEMPLATE_NAME,
UNKNOWN_FAILURE_REASON, UNKNOWN_FAILURE_REASON,
} from '@/constants'; } from '@/constants';
import { Authorized, Delete, Get, Middleware, Patch, Post, RestController } from '@/decorators'; import {
Authorized,
Delete,
Get,
Middleware,
Patch,
Post,
RestController,
RequireGlobalScope,
} from '@/decorators';
import { NodeRequest } from '@/requests'; import { NodeRequest } from '@/requests';
import type { InstalledPackages } from '@db/entities/InstalledPackages'; import type { InstalledPackages } from '@db/entities/InstalledPackages';
import type { CommunityPackages } from '@/Interfaces'; import type { CommunityPackages } from '@/Interfaces';
@ -34,7 +43,7 @@ export function isNpmError(error: unknown): error is { code: number; stdout: str
} }
@Service() @Service()
@Authorized(['global', 'owner']) @Authorized()
@RestController('/community-packages') @RestController('/community-packages')
export class CommunityPackagesController { export class CommunityPackagesController {
constructor( constructor(
@ -55,6 +64,7 @@ export class CommunityPackagesController {
} }
@Post('/') @Post('/')
@RequireGlobalScope('communityPackage:install')
async installPackage(req: NodeRequest.Post) { async installPackage(req: NodeRequest.Post) {
const { name } = req.body; const { name } = req.body;
@ -151,6 +161,7 @@ export class CommunityPackagesController {
} }
@Get('/') @Get('/')
@RequireGlobalScope('communityPackage:list')
async getInstalledPackages() { async getInstalledPackages() {
const installedPackages = await this.communityPackagesService.getAllInstalledPackages(); const installedPackages = await this.communityPackagesService.getAllInstalledPackages();
@ -185,6 +196,7 @@ export class CommunityPackagesController {
} }
@Delete('/') @Delete('/')
@RequireGlobalScope('communityPackage:uninstall')
async uninstallPackage(req: NodeRequest.Delete) { async uninstallPackage(req: NodeRequest.Delete) {
const { name } = req.query; const { name } = req.query;
@ -236,6 +248,7 @@ export class CommunityPackagesController {
} }
@Patch('/') @Patch('/')
@RequireGlobalScope('communityPackage:update')
async updatePackage(req: NodeRequest.Update) { async updatePackage(req: NodeRequest.Update) {
const { name } = req.body; const { name } = req.body;

View file

@ -1,6 +1,6 @@
import { In } from 'typeorm'; import { In } from 'typeorm';
import Container, { Service } from 'typedi'; import Container, { Service } from 'typedi';
import { Authorized, NoAuthRequired, Post, RestController } from '@/decorators'; import { Authorized, NoAuthRequired, Post, RequireGlobalScope, RestController } from '@/decorators';
import { issueCookie } from '@/auth/jwt'; import { issueCookie } from '@/auth/jwt';
import { RESPONSE_ERROR_MESSAGES } from '@/constants'; import { RESPONSE_ERROR_MESSAGES } from '@/constants';
import { Response } from 'express'; import { Response } from 'express';
@ -19,6 +19,7 @@ import { BadRequestError } from '@/errors/response-errors/bad-request.error';
import { UnauthorizedError } from '@/errors/response-errors/unauthorized.error'; import { UnauthorizedError } from '@/errors/response-errors/unauthorized.error';
@Service() @Service()
@Authorized()
@RestController('/invitations') @RestController('/invitations')
export class InvitationController { export class InvitationController {
constructor( constructor(
@ -34,8 +35,8 @@ export class InvitationController {
* Send email invite(s) to one or multiple users and create user shell(s). * Send email invite(s) to one or multiple users and create user shell(s).
*/ */
@Authorized(['global', 'owner'])
@Post('/') @Post('/')
@RequireGlobalScope('user:create')
async inviteUser(req: UserRequest.Invite) { async inviteUser(req: UserRequest.Invite) {
const isWithinUsersLimit = Container.get(License).isWithinUsersLimit(); const isWithinUsersLimit = Container.get(License).isWithinUsersLimit();

View file

@ -1,5 +1,5 @@
import pick from 'lodash/pick'; import pick from 'lodash/pick';
import { Authorized, Get, Post, Put, RestController } from '@/decorators'; import { Authorized, Get, Post, Put, RestController, RequireGlobalScope } from '@/decorators';
import { getLdapConfig, getLdapSynchronizations, updateLdapConfig } from '@/Ldap/helpers'; import { getLdapConfig, getLdapSynchronizations, updateLdapConfig } from '@/Ldap/helpers';
import { LdapService } from '@/Ldap/LdapService.ee'; import { LdapService } from '@/Ldap/LdapService.ee';
import { LdapSync } from '@/Ldap/LdapSync.ee'; import { LdapSync } from '@/Ldap/LdapSync.ee';
@ -8,7 +8,7 @@ import { NON_SENSIBLE_LDAP_CONFIG_PROPERTIES } from '@/Ldap/constants';
import { InternalHooks } from '@/InternalHooks'; import { InternalHooks } from '@/InternalHooks';
import { BadRequestError } from '@/errors/response-errors/bad-request.error'; import { BadRequestError } from '@/errors/response-errors/bad-request.error';
@Authorized(['global', 'owner']) @Authorized()
@RestController('/ldap') @RestController('/ldap')
export class LdapController { export class LdapController {
constructor( constructor(
@ -18,11 +18,13 @@ export class LdapController {
) {} ) {}
@Get('/config') @Get('/config')
@RequireGlobalScope('ldap:manage')
async getConfig() { async getConfig() {
return getLdapConfig(); return getLdapConfig();
} }
@Post('/test-connection') @Post('/test-connection')
@RequireGlobalScope('ldap:manage')
async testConnection() { async testConnection() {
try { try {
await this.ldapService.testConnection(); await this.ldapService.testConnection();
@ -32,6 +34,7 @@ export class LdapController {
} }
@Put('/config') @Put('/config')
@RequireGlobalScope('ldap:manage')
async updateConfig(req: LdapConfiguration.Update) { async updateConfig(req: LdapConfiguration.Update) {
try { try {
await updateLdapConfig(req.body); await updateLdapConfig(req.body);
@ -50,12 +53,14 @@ export class LdapController {
} }
@Get('/sync') @Get('/sync')
@RequireGlobalScope('ldap:sync')
async getLdapSync(req: LdapConfiguration.GetSync) { async getLdapSync(req: LdapConfiguration.GetSync) {
const { page = '0', perPage = '20' } = req.query; const { page = '0', perPage = '20' } = req.query;
return getLdapSynchronizations(parseInt(page, 10), parseInt(perPage, 10)); return getLdapSynchronizations(parseInt(page, 10), parseInt(perPage, 10));
} }
@Post('/sync') @Post('/sync')
@RequireGlobalScope('ldap:sync')
async syncLdap(req: LdapConfiguration.Sync) { async syncLdap(req: LdapConfiguration.Sync) {
try { try {
await this.ldapSync.run(req.body.type); await this.ldapSync.run(req.body.type);

View file

@ -1,10 +1,10 @@
import { Authorized, Post, RestController } from '@/decorators'; import { Authorized, Post, RestController, RequireGlobalScope } from '@/decorators';
import { OrchestrationRequest } from '@/requests'; import { OrchestrationRequest } from '@/requests';
import { Service } from 'typedi'; import { Service } from 'typedi';
import { SingleMainSetup } from '@/services/orchestration/main/SingleMainSetup'; import { SingleMainSetup } from '@/services/orchestration/main/SingleMainSetup';
import { License } from '../License'; import { License } from '../License';
@Authorized('any') @Authorized()
@RestController('/orchestration') @RestController('/orchestration')
@Service() @Service()
export class OrchestrationController { export class OrchestrationController {
@ -17,6 +17,7 @@ export class OrchestrationController {
* These endpoints do not return anything, they just trigger the messsage to * These endpoints do not return anything, they just trigger the messsage to
* the workers to respond on Redis with their status. * the workers to respond on Redis with their status.
*/ */
@RequireGlobalScope('orchestration:read')
@Post('/worker/status/:id') @Post('/worker/status/:id')
async getWorkersStatus(req: OrchestrationRequest.Get) { async getWorkersStatus(req: OrchestrationRequest.Get) {
if (!this.licenseService.isWorkerViewLicensed()) return; if (!this.licenseService.isWorkerViewLicensed()) return;
@ -24,12 +25,14 @@ export class OrchestrationController {
return this.singleMainSetup.getWorkerStatus(id); return this.singleMainSetup.getWorkerStatus(id);
} }
@RequireGlobalScope('orchestration:read')
@Post('/worker/status') @Post('/worker/status')
async getWorkersStatusAll() { async getWorkersStatusAll() {
if (!this.licenseService.isWorkerViewLicensed()) return; if (!this.licenseService.isWorkerViewLicensed()) return;
return this.singleMainSetup.getWorkerStatus(); return this.singleMainSetup.getWorkerStatus();
} }
@RequireGlobalScope('orchestration:list')
@Post('/worker/ids') @Post('/worker/ids')
async getWorkerIdsAll() { async getWorkerIdsAll() {
if (!this.licenseService.isWorkerViewLicensed()) return; if (!this.licenseService.isWorkerViewLicensed()) return;

View file

@ -1,6 +1,15 @@
import { Request, Response, NextFunction } from 'express'; import { Request, Response, NextFunction } from 'express';
import config from '@/config'; import config from '@/config';
import { Authorized, Delete, Get, Middleware, Patch, Post, RestController } from '@/decorators'; import {
Authorized,
Delete,
Get,
Middleware,
Patch,
Post,
RestController,
RequireGlobalScope,
} from '@/decorators';
import { TagService } from '@/services/tag.service'; import { TagService } from '@/services/tag.service';
import { TagsRequest } from '@/requests'; import { TagsRequest } from '@/requests';
import { Service } from 'typedi'; import { Service } from 'typedi';
@ -23,11 +32,13 @@ export class TagsController {
} }
@Get('/') @Get('/')
@RequireGlobalScope('tag:list')
async getAll(req: TagsRequest.GetAll) { async getAll(req: TagsRequest.GetAll) {
return this.tagService.getAll({ withUsageCount: req.query.withUsageCount === 'true' }); return this.tagService.getAll({ withUsageCount: req.query.withUsageCount === 'true' });
} }
@Post('/') @Post('/')
@RequireGlobalScope('tag:create')
async createTag(req: TagsRequest.Create) { async createTag(req: TagsRequest.Create) {
const tag = this.tagService.toEntity({ name: req.body.name }); const tag = this.tagService.toEntity({ name: req.body.name });
@ -35,14 +46,15 @@ export class TagsController {
} }
@Patch('/:id(\\w+)') @Patch('/:id(\\w+)')
@RequireGlobalScope('tag:update')
async updateTag(req: TagsRequest.Update) { async updateTag(req: TagsRequest.Update) {
const newTag = this.tagService.toEntity({ id: req.params.id, name: req.body.name.trim() }); const newTag = this.tagService.toEntity({ id: req.params.id, name: req.body.name.trim() });
return this.tagService.save(newTag, 'update'); return this.tagService.save(newTag, 'update');
} }
@Authorized(['global', 'owner'])
@Delete('/:id(\\w+)') @Delete('/:id(\\w+)')
@RequireGlobalScope('tag:delete')
async deleteTag(req: TagsRequest.Delete) { async deleteTag(req: TagsRequest.Delete) {
const { id } = req.params; const { id } = req.params;

View file

@ -3,7 +3,7 @@ import { In, Not } from 'typeorm';
import { User } from '@db/entities/User'; import { User } from '@db/entities/User';
import { SharedCredentials } from '@db/entities/SharedCredentials'; import { SharedCredentials } from '@db/entities/SharedCredentials';
import { SharedWorkflow } from '@db/entities/SharedWorkflow'; import { SharedWorkflow } from '@db/entities/SharedWorkflow';
import { Authorized, Delete, Get, RestController, Patch } from '@/decorators'; import { RequireGlobalScope, Authorized, Delete, Get, RestController, Patch } from '@/decorators';
import { ListQuery, UserRequest, UserSettingsUpdatePayload } from '@/requests'; import { ListQuery, UserRequest, UserSettingsUpdatePayload } from '@/requests';
import { ActiveWorkflowRunner } from '@/ActiveWorkflowRunner'; import { ActiveWorkflowRunner } from '@/ActiveWorkflowRunner';
import { IExternalHooksClass, IInternalHooksClass } from '@/Interfaces'; import { IExternalHooksClass, IInternalHooksClass } from '@/Interfaces';
@ -114,8 +114,8 @@ export class UsersController {
return publicUsers; return publicUsers;
} }
@Authorized('any')
@Get('/', { middlewares: listQueryMiddleware }) @Get('/', { middlewares: listQueryMiddleware })
@RequireGlobalScope('user:list')
async listUsers(req: ListQuery.Request) { async listUsers(req: ListQuery.Request) {
const { listQueryOptions } = req; const { listQueryOptions } = req;
@ -132,8 +132,8 @@ export class UsersController {
: publicUsers; : publicUsers;
} }
@Authorized(['global', 'owner'])
@Get('/:id/password-reset-link') @Get('/:id/password-reset-link')
@RequireGlobalScope('user:resetPassword')
async getUserPasswordResetLink(req: UserRequest.PasswordResetLink) { async getUserPasswordResetLink(req: UserRequest.PasswordResetLink) {
const user = await this.userService.findOneOrFail({ const user = await this.userService.findOneOrFail({
where: { id: req.params.id }, where: { id: req.params.id },
@ -146,8 +146,8 @@ export class UsersController {
return { link }; return { link };
} }
@Authorized(['global', 'owner'])
@Patch('/:id/settings') @Patch('/:id/settings')
@RequireGlobalScope('user:update')
async updateUserSettings(req: UserRequest.UserSettingsUpdate) { async updateUserSettings(req: UserRequest.UserSettingsUpdate) {
const payload = plainToInstance(UserSettingsUpdatePayload, req.body); const payload = plainToInstance(UserSettingsUpdatePayload, req.body);
@ -168,6 +168,7 @@ export class UsersController {
*/ */
@Authorized(['global', 'owner']) @Authorized(['global', 'owner'])
@Delete('/:id') @Delete('/:id')
@RequireGlobalScope('user:delete')
async deleteUser(req: UserRequest.Delete) { async deleteUser(req: UserRequest.Delete) {
const { id: idToDelete } = req.params; const { id: idToDelete } = req.params;

View file

@ -2,7 +2,6 @@ import type { BooleanLicenseFeature } from '@/Interfaces';
import type { LicenseMetadata } from './types'; import type { LicenseMetadata } from './types';
import { CONTROLLER_LICENSE_FEATURES } from './constants'; import { CONTROLLER_LICENSE_FEATURES } from './constants';
// eslint-disable-next-line @typescript-eslint/naming-convention
export const Licensed = (features: BooleanLicenseFeature | BooleanLicenseFeature[]) => { export const Licensed = (features: BooleanLicenseFeature | BooleanLicenseFeature[]) => {
// eslint-disable-next-line @typescript-eslint/ban-types // eslint-disable-next-line @typescript-eslint/ban-types
return (target: Function | object, handlerName?: string) => { return (target: Function | object, handlerName?: string) => {

View file

@ -0,0 +1,14 @@
import type { Scope } from '@n8n/permissions';
import type { ScopeMetadata } from './types';
import { CONTROLLER_REQUIRED_SCOPES } from './constants';
export const RequireGlobalScope = (scope: Scope | Scope[]) => {
// eslint-disable-next-line @typescript-eslint/ban-types
return (target: Function | object, handlerName?: string) => {
const controllerClass = handlerName ? target.constructor : target;
const scopes = (Reflect.getMetadata(CONTROLLER_REQUIRED_SCOPES, controllerClass) ??
[]) as ScopeMetadata;
scopes[handlerName ?? '*'] = Array.isArray(scope) ? scope : [scope];
Reflect.defineMetadata(CONTROLLER_REQUIRED_SCOPES, scopes, controllerClass);
};
};

View file

@ -3,3 +3,4 @@ export const CONTROLLER_BASE_PATH = 'CONTROLLER_BASE_PATH';
export const CONTROLLER_MIDDLEWARES = 'CONTROLLER_MIDDLEWARES'; export const CONTROLLER_MIDDLEWARES = 'CONTROLLER_MIDDLEWARES';
export const CONTROLLER_AUTH_ROLES = 'CONTROLLER_AUTH_ROLES'; export const CONTROLLER_AUTH_ROLES = 'CONTROLLER_AUTH_ROLES';
export const CONTROLLER_LICENSE_FEATURES = 'CONTROLLER_LICENSE_FEATURES'; export const CONTROLLER_LICENSE_FEATURES = 'CONTROLLER_LICENSE_FEATURES';
export const CONTROLLER_REQUIRED_SCOPES = 'CONTROLLER_REQUIRED_SCOPES';

View file

@ -4,3 +4,4 @@ export { Get, Post, Put, Patch, Delete } from './Route';
export { Middleware } from './Middleware'; export { Middleware } from './Middleware';
export { registerController } from './registerController'; export { registerController } from './registerController';
export { Licensed } from './Licensed'; export { Licensed } from './Licensed';
export { RequireGlobalScope } from './Scopes';

View file

@ -8,6 +8,7 @@ import {
CONTROLLER_BASE_PATH, CONTROLLER_BASE_PATH,
CONTROLLER_LICENSE_FEATURES, CONTROLLER_LICENSE_FEATURES,
CONTROLLER_MIDDLEWARES, CONTROLLER_MIDDLEWARES,
CONTROLLER_REQUIRED_SCOPES,
CONTROLLER_ROUTES, CONTROLLER_ROUTES,
} from './constants'; } from './constants';
import type { import type {
@ -17,10 +18,12 @@ import type {
LicenseMetadata, LicenseMetadata,
MiddlewareMetadata, MiddlewareMetadata,
RouteMetadata, RouteMetadata,
ScopeMetadata,
} from './types'; } from './types';
import type { BooleanLicenseFeature } from '@/Interfaces'; import type { BooleanLicenseFeature } from '@/Interfaces';
import Container from 'typedi'; import Container from 'typedi';
import { License } from '@/License'; import { License } from '@/License';
import type { Scope } from '@n8n/permissions';
export const createAuthMiddleware = export const createAuthMiddleware =
(authRole: AuthRole): RequestHandler => (authRole: AuthRole): RequestHandler =>
@ -55,6 +58,23 @@ export const createLicenseMiddleware =
return next(); return next();
}; };
export const createGlobalScopeMiddleware =
(scopes: Scope[]): RequestHandler =>
async ({ user }: AuthenticatedRequest, res, next) => {
if (scopes.length === 0) {
return next();
}
if (!user) return res.status(401).json({ status: 'error', message: 'Unauthorized' });
const hasScopes = await user.hasGlobalScope(scopes);
if (!hasScopes) {
return res.status(403).json({ status: 'error', message: 'Unauthorized' });
}
return next();
};
const authFreeRoutes: string[] = []; const authFreeRoutes: string[] = [];
export const canSkipAuth = (method: string, path: string): boolean => export const canSkipAuth = (method: string, path: string): boolean =>
@ -76,6 +96,10 @@ export const registerController = (app: Application, config: Config, cObj: objec
const licenseFeatures = Reflect.getMetadata(CONTROLLER_LICENSE_FEATURES, controllerClass) as const licenseFeatures = Reflect.getMetadata(CONTROLLER_LICENSE_FEATURES, controllerClass) as
| LicenseMetadata | LicenseMetadata
| undefined; | undefined;
const requiredScopes = Reflect.getMetadata(CONTROLLER_REQUIRED_SCOPES, controllerClass) as
| ScopeMetadata
| undefined;
if (routes.length > 0) { if (routes.length > 0) {
const router = Router({ mergeParams: true }); const router = Router({ mergeParams: true });
const restBasePath = config.getEnv('endpoints.rest'); const restBasePath = config.getEnv('endpoints.rest');
@ -89,13 +113,15 @@ export const registerController = (app: Application, config: Config, cObj: objec
routes.forEach( routes.forEach(
({ method, path, middlewares: routeMiddlewares, handlerName, usesTemplates }) => { ({ method, path, middlewares: routeMiddlewares, handlerName, usesTemplates }) => {
const authRole = authRoles && (authRoles[handlerName] ?? authRoles['*']); const authRole = authRoles?.[handlerName] ?? authRoles?.['*'];
const features = licenseFeatures && (licenseFeatures[handlerName] ?? licenseFeatures['*']); const features = licenseFeatures?.[handlerName] ?? licenseFeatures?.['*'];
const scopes = requiredScopes?.[handlerName] ?? requiredScopes?.['*'];
const handler = async (req: Request, res: Response) => controller[handlerName](req, res); const handler = async (req: Request, res: Response) => controller[handlerName](req, res);
router[method]( router[method](
path, path,
...(authRole ? [createAuthMiddleware(authRole)] : []), ...(authRole ? [createAuthMiddleware(authRole)] : []),
...(features ? [createLicenseMiddleware(features)] : []), ...(features ? [createLicenseMiddleware(features)] : []),
...(scopes ? [createGlobalScopeMiddleware(scopes)] : []),
...controllerMiddlewares, ...controllerMiddlewares,
...routeMiddlewares, ...routeMiddlewares,
usesTemplates ? handler : send(handler), usesTemplates ? handler : send(handler),

View file

@ -1,6 +1,7 @@
import type { Request, Response, RequestHandler } from 'express'; import type { Request, Response, RequestHandler } from 'express';
import type { RoleNames, RoleScopes } from '@db/entities/Role'; import type { RoleNames, RoleScopes } from '@db/entities/Role';
import type { BooleanLicenseFeature } from '@/Interfaces'; import type { BooleanLicenseFeature } from '@/Interfaces';
import type { Scope } from '@n8n/permissions';
export type Method = 'get' | 'post' | 'put' | 'patch' | 'delete'; export type Method = 'get' | 'post' | 'put' | 'patch' | 'delete';
@ -9,6 +10,8 @@ export type AuthRoleMetadata = Record<string, AuthRole>;
export type LicenseMetadata = Record<string, BooleanLicenseFeature[]>; export type LicenseMetadata = Record<string, BooleanLicenseFeature[]>;
export type ScopeMetadata = Record<string, Scope[]>;
export interface MiddlewareMetadata { export interface MiddlewareMetadata {
handlerName: string; handlerName: string;
} }

View file

@ -1,7 +1,7 @@
import { Container, Service } from 'typedi'; import { Container, Service } from 'typedi';
import type { PullResult } from 'simple-git'; import type { PullResult } from 'simple-git';
import express from 'express'; import express from 'express';
import { Authorized, Get, Post, Patch, RestController } from '@/decorators'; import { Authorized, Get, Post, Patch, RestController, RequireGlobalScope } from '@/decorators';
import { import {
sourceControlLicensedMiddleware, sourceControlLicensedMiddleware,
sourceControlLicensedAndEnabledMiddleware, sourceControlLicensedAndEnabledMiddleware,
@ -19,6 +19,7 @@ import { SourceControlGetStatus } from './types/sourceControlGetStatus';
import { BadRequestError } from '@/errors/response-errors/bad-request.error'; import { BadRequestError } from '@/errors/response-errors/bad-request.error';
@Service() @Service()
@Authorized()
@RestController(`/${SOURCE_CONTROL_API_ROOT}`) @RestController(`/${SOURCE_CONTROL_API_ROOT}`)
export class SourceControlController { export class SourceControlController {
constructor( constructor(
@ -33,8 +34,8 @@ export class SourceControlController {
return this.sourceControlPreferencesService.getPreferences(); return this.sourceControlPreferencesService.getPreferences();
} }
@Authorized(['global', 'owner'])
@Post('/preferences', { middlewares: [sourceControlLicensedMiddleware] }) @Post('/preferences', { middlewares: [sourceControlLicensedMiddleware] })
@RequireGlobalScope('sourceControl:manage')
async setPreferences(req: SourceControlRequest.UpdatePreferences) { async setPreferences(req: SourceControlRequest.UpdatePreferences) {
if ( if (
req.body.branchReadOnly === undefined && req.body.branchReadOnly === undefined &&
@ -97,8 +98,8 @@ export class SourceControlController {
} }
} }
@Authorized(['global', 'owner'])
@Patch('/preferences', { middlewares: [sourceControlLicensedMiddleware] }) @Patch('/preferences', { middlewares: [sourceControlLicensedMiddleware] })
@RequireGlobalScope('sourceControl:manage')
async updatePreferences(req: SourceControlRequest.UpdatePreferences) { async updatePreferences(req: SourceControlRequest.UpdatePreferences) {
try { try {
const sanitizedPreferences: Partial<SourceControlPreferences> = { const sanitizedPreferences: Partial<SourceControlPreferences> = {
@ -141,8 +142,8 @@ export class SourceControlController {
} }
} }
@Authorized(['global', 'owner'])
@Post('/disconnect', { middlewares: [sourceControlLicensedMiddleware] }) @Post('/disconnect', { middlewares: [sourceControlLicensedMiddleware] })
@RequireGlobalScope('sourceControl:manage')
async disconnect(req: SourceControlRequest.Disconnect) { async disconnect(req: SourceControlRequest.Disconnect) {
try { try {
return await this.sourceControlService.disconnect(req.body); return await this.sourceControlService.disconnect(req.body);
@ -161,8 +162,8 @@ export class SourceControlController {
} }
} }
@Authorized(['global', 'owner'])
@Post('/push-workfolder', { middlewares: [sourceControlLicensedAndEnabledMiddleware] }) @Post('/push-workfolder', { middlewares: [sourceControlLicensedAndEnabledMiddleware] })
@RequireGlobalScope('sourceControl:push')
async pushWorkfolder( async pushWorkfolder(
req: SourceControlRequest.PushWorkFolder, req: SourceControlRequest.PushWorkFolder,
res: express.Response, res: express.Response,
@ -183,8 +184,8 @@ export class SourceControlController {
} }
} }
@Authorized(['global', 'owner'])
@Post('/pull-workfolder', { middlewares: [sourceControlLicensedAndEnabledMiddleware] }) @Post('/pull-workfolder', { middlewares: [sourceControlLicensedAndEnabledMiddleware] })
@RequireGlobalScope('sourceControl:pull')
async pullWorkfolder( async pullWorkfolder(
req: SourceControlRequest.PullWorkFolder, req: SourceControlRequest.PullWorkFolder,
res: express.Response, res: express.Response,
@ -202,8 +203,8 @@ export class SourceControlController {
} }
} }
@Authorized(['global', 'owner'])
@Get('/reset-workfolder', { middlewares: [sourceControlLicensedAndEnabledMiddleware] }) @Get('/reset-workfolder', { middlewares: [sourceControlLicensedAndEnabledMiddleware] })
@RequireGlobalScope('sourceControl:manage')
async resetWorkfolder(): Promise<ImportResult | undefined> { async resetWorkfolder(): Promise<ImportResult | undefined> {
try { try {
return await this.sourceControlService.resetWorkfolder(); return await this.sourceControlService.resetWorkfolder();
@ -235,8 +236,8 @@ export class SourceControlController {
} }
} }
@Authorized(['global', 'owner'])
@Post('/generate-key-pair', { middlewares: [sourceControlLicensedMiddleware] }) @Post('/generate-key-pair', { middlewares: [sourceControlLicensedMiddleware] })
@RequireGlobalScope('sourceControl:manage')
async generateKeyPair( async generateKeyPair(
req: SourceControlRequest.GenerateKeyPair, req: SourceControlRequest.GenerateKeyPair,
): Promise<SourceControlPreferences> { ): Promise<SourceControlPreferences> {

View file

@ -1,10 +1,17 @@
import { Container, Service } from 'typedi'; import { Service } from 'typedi';
import { VariablesRequest } from '@/requests'; import { VariablesRequest } from '@/requests';
import { Authorized, Delete, Get, Licensed, Patch, Post, RestController } from '@/decorators'; import {
Authorized,
Delete,
Get,
Licensed,
Patch,
Post,
RequireGlobalScope,
RestController,
} from '@/decorators';
import { VariablesService } from './variables.service.ee'; import { VariablesService } from './variables.service.ee';
import { Logger } from '@/Logger';
import { UnauthorizedError } from '@/errors/response-errors/unauthorized.error';
import { BadRequestError } from '@/errors/response-errors/bad-request.error'; import { BadRequestError } from '@/errors/response-errors/bad-request.error';
import { NotFoundError } from '@/errors/response-errors/not-found.error'; import { NotFoundError } from '@/errors/response-errors/not-found.error';
import { VariableValidationError } from '@/errors/variable-validation.error'; import { VariableValidationError } from '@/errors/variable-validation.error';
@ -14,29 +21,22 @@ import { VariableCountLimitReachedError } from '@/errors/variable-count-limit-re
@Authorized() @Authorized()
@RestController('/variables') @RestController('/variables')
export class VariablesController { export class VariablesController {
constructor( constructor(private variablesService: VariablesService) {}
private variablesService: VariablesService,
private logger: Logger,
) {}
@Get('/') @Get('/')
@RequireGlobalScope('variable:list')
async getVariables() { async getVariables() {
return Container.get(VariablesService).getAllCached(); return this.variablesService.getAllCached();
} }
@Post('/') @Post('/')
@Licensed('feat:variables') @Licensed('feat:variables')
@RequireGlobalScope('variable:create')
async createVariable(req: VariablesRequest.Create) { async createVariable(req: VariablesRequest.Create) {
if (req.user.globalRole.name !== 'owner') {
this.logger.info('Attempt to update a variable blocked due to lack of permissions', {
userId: req.user.id,
});
throw new UnauthorizedError('Unauthorized');
}
const variable = req.body; const variable = req.body;
delete variable.id; delete variable.id;
try { try {
return await Container.get(VariablesService).create(variable); return await this.variablesService.create(variable);
} catch (error) { } catch (error) {
if (error instanceof VariableCountLimitReachedError) { if (error instanceof VariableCountLimitReachedError) {
throw new BadRequestError(error.message); throw new BadRequestError(error.message);
@ -48,9 +48,10 @@ export class VariablesController {
} }
@Get('/:id') @Get('/:id')
@RequireGlobalScope('variable:read')
async getVariable(req: VariablesRequest.Get) { async getVariable(req: VariablesRequest.Get) {
const id = req.params.id; const id = req.params.id;
const variable = await Container.get(VariablesService).getCached(id); const variable = await this.variablesService.getCached(id);
if (variable === null) { if (variable === null) {
throw new NotFoundError(`Variable with id ${req.params.id} not found`); throw new NotFoundError(`Variable with id ${req.params.id} not found`);
} }
@ -59,19 +60,13 @@ export class VariablesController {
@Patch('/:id') @Patch('/:id')
@Licensed('feat:variables') @Licensed('feat:variables')
@RequireGlobalScope('variable:update')
async updateVariable(req: VariablesRequest.Update) { async updateVariable(req: VariablesRequest.Update) {
const id = req.params.id; const id = req.params.id;
if (req.user.globalRole.name !== 'owner') {
this.logger.info('Attempt to update a variable blocked due to lack of permissions', {
id,
userId: req.user.id,
});
throw new UnauthorizedError('Unauthorized');
}
const variable = req.body; const variable = req.body;
delete variable.id; delete variable.id;
try { try {
return await Container.get(VariablesService).update(id, variable); return await this.variablesService.update(id, variable);
} catch (error) { } catch (error) {
if (error instanceof VariableCountLimitReachedError) { if (error instanceof VariableCountLimitReachedError) {
throw new BadRequestError(error.message); throw new BadRequestError(error.message);
@ -82,16 +77,10 @@ export class VariablesController {
} }
} }
@Delete('/:id') @Delete('/:id(\\w+)')
@RequireGlobalScope('variable:delete')
async deleteVariable(req: VariablesRequest.Delete) { async deleteVariable(req: VariablesRequest.Delete) {
const id = req.params.id; const id = req.params.id;
if (req.user.globalRole.name !== 'owner') {
this.logger.info('Attempt to delete a variable blocked due to lack of permissions', {
id,
userId: req.user.id,
});
throw new UnauthorizedError('Unauthorized');
}
await this.variablesService.delete(id); await this.variablesService.delete(id);
return true; return true;

View file

@ -14,7 +14,7 @@ import type {
MessageEventBusDestinationOptions, MessageEventBusDestinationOptions,
} from 'n8n-workflow'; } from 'n8n-workflow';
import { MessageEventBusDestinationTypeNames } from 'n8n-workflow'; import { MessageEventBusDestinationTypeNames } from 'n8n-workflow';
import { RestController, Get, Post, Delete, Authorized } from '@/decorators'; import { RestController, Get, Post, Delete, Authorized, RequireGlobalScope } from '@/decorators';
import type { MessageEventBusDestination } from './MessageEventBusDestination/MessageEventBusDestination.ee'; import type { MessageEventBusDestination } from './MessageEventBusDestination/MessageEventBusDestination.ee';
import type { DeleteResult } from 'typeorm'; import type { DeleteResult } from 'typeorm';
import { AuthenticatedRequest } from '@/requests'; import { AuthenticatedRequest } from '@/requests';
@ -59,6 +59,7 @@ export class EventBusControllerEE {
// ---------------------------------------- // ----------------------------------------
@Get('/destination', { middlewares: [logStreamingLicensedMiddleware] }) @Get('/destination', { middlewares: [logStreamingLicensedMiddleware] })
@RequireGlobalScope('eventBusDestination:list')
async getDestination(req: express.Request): Promise<MessageEventBusDestinationOptions[]> { async getDestination(req: express.Request): Promise<MessageEventBusDestinationOptions[]> {
if (isWithIdString(req.query)) { if (isWithIdString(req.query)) {
return eventBus.findDestination(req.query.id); return eventBus.findDestination(req.query.id);
@ -67,8 +68,8 @@ export class EventBusControllerEE {
} }
} }
@Authorized(['global', 'owner'])
@Post('/destination', { middlewares: [logStreamingLicensedMiddleware] }) @Post('/destination', { middlewares: [logStreamingLicensedMiddleware] })
@RequireGlobalScope('eventBusDestination:create')
async postDestination(req: AuthenticatedRequest): Promise<any> { async postDestination(req: AuthenticatedRequest): Promise<any> {
let result: MessageEventBusDestination | undefined; let result: MessageEventBusDestination | undefined;
if (isMessageEventBusDestinationOptions(req.body)) { if (isMessageEventBusDestinationOptions(req.body)) {
@ -112,6 +113,7 @@ export class EventBusControllerEE {
} }
@Get('/testmessage', { middlewares: [logStreamingLicensedMiddleware] }) @Get('/testmessage', { middlewares: [logStreamingLicensedMiddleware] })
@RequireGlobalScope('eventBusDestination:test')
async sendTestMessage(req: express.Request): Promise<boolean> { async sendTestMessage(req: express.Request): Promise<boolean> {
if (isWithIdString(req.query)) { if (isWithIdString(req.query)) {
return eventBus.testDestination(req.query.id); return eventBus.testDestination(req.query.id);
@ -119,8 +121,8 @@ export class EventBusControllerEE {
return false; return false;
} }
@Authorized(['global', 'owner'])
@Delete('/destination', { middlewares: [logStreamingLicensedMiddleware] }) @Delete('/destination', { middlewares: [logStreamingLicensedMiddleware] })
@RequireGlobalScope('eventBusDestination:delete')
async deleteDestination(req: AuthenticatedRequest): Promise<DeleteResult | undefined> { async deleteDestination(req: AuthenticatedRequest): Promise<DeleteResult | undefined> {
if (isWithIdString(req.query)) { if (isWithIdString(req.query)) {
return eventBus.removeDestination(req.query.id); return eventBus.removeDestination(req.query.id);

View file

@ -14,7 +14,7 @@ import { EventMessageTypeNames } from 'n8n-workflow';
import type { EventMessageNodeOptions } from './EventMessageClasses/EventMessageNode'; import type { EventMessageNodeOptions } from './EventMessageClasses/EventMessageNode';
import { EventMessageNode } from './EventMessageClasses/EventMessageNode'; import { EventMessageNode } from './EventMessageClasses/EventMessageNode';
import { recoverExecutionDataFromEventLogMessages } from './MessageEventBus/recoverEvents'; import { recoverExecutionDataFromEventLogMessages } from './MessageEventBus/recoverEvents';
import { RestController, Get, Post, Authorized } from '@/decorators'; import { RestController, Get, Post, Authorized, RequireGlobalScope } from '@/decorators';
import { BadRequestError } from '@/errors/response-errors/bad-request.error'; import { BadRequestError } from '@/errors/response-errors/bad-request.error';
// ---------------------------------------- // ----------------------------------------
@ -37,8 +37,8 @@ export class EventBusController {
// ---------------------------------------- // ----------------------------------------
// Events // Events
// ---------------------------------------- // ----------------------------------------
@Authorized(['global', 'owner'])
@Get('/event') @Get('/event')
@RequireGlobalScope('eventBusEvent:query')
async getEvents( async getEvents(
req: express.Request, req: express.Request,
): Promise<EventMessageTypes[] | Record<string, EventMessageTypes[]>> { ): Promise<EventMessageTypes[] | Record<string, EventMessageTypes[]>> {
@ -60,12 +60,14 @@ export class EventBusController {
} }
@Get('/failed') @Get('/failed')
@RequireGlobalScope('eventBusEvent:list')
async getFailedEvents(req: express.Request): Promise<FailedEventSummary[]> { async getFailedEvents(req: express.Request): Promise<FailedEventSummary[]> {
const amount = parseInt(req.query?.amount as string) ?? 5; const amount = parseInt(req.query?.amount as string) ?? 5;
return eventBus.getEventsFailed(amount); return eventBus.getEventsFailed(amount);
} }
@Get('/execution/:id') @Get('/execution/:id')
@RequireGlobalScope('eventBusEvent:read')
async getEventForExecutionId(req: express.Request): Promise<EventMessageTypes[] | undefined> { async getEventForExecutionId(req: express.Request): Promise<EventMessageTypes[] | undefined> {
if (req.params?.id) { if (req.params?.id) {
let logHistory; let logHistory;
@ -78,6 +80,7 @@ export class EventBusController {
} }
@Get('/execution-recover/:id') @Get('/execution-recover/:id')
@RequireGlobalScope('eventBusEvent:read')
async getRecoveryForExecutionId(req: express.Request): Promise<IRunExecutionData | undefined> { async getRecoveryForExecutionId(req: express.Request): Promise<IRunExecutionData | undefined> {
const { id } = req.params; const { id } = req.params;
if (req.params?.id) { if (req.params?.id) {
@ -91,8 +94,8 @@ export class EventBusController {
return; return;
} }
@Authorized(['global', 'owner'])
@Post('/event') @Post('/event')
@RequireGlobalScope('eventBusEvent:create')
async postEvent(req: express.Request): Promise<EventMessageTypes | undefined> { async postEvent(req: express.Request): Promise<EventMessageTypes | undefined> {
let msg: EventMessageTypes | undefined; let msg: EventMessageTypes | undefined;
if (isEventMessageOptions(req.body)) { if (isEventMessageOptions(req.body)) {

View file

@ -7,11 +7,17 @@ export const ownerPermissions: Scope[] = [
'workflow:delete', 'workflow:delete',
'workflow:list', 'workflow:list',
'workflow:share', 'workflow:share',
'tag:create',
'tag:read',
'tag:update',
'tag:delete',
'tag:list',
'user:create', 'user:create',
'user:read', 'user:read',
'user:update', 'user:update',
'user:delete', 'user:delete',
'user:list', 'user:list',
'user:resetPassword',
'credential:create', 'credential:create',
'credential:read', 'credential:read',
'credential:update', 'credential:update',
@ -26,17 +32,35 @@ export const ownerPermissions: Scope[] = [
'sourceControl:pull', 'sourceControl:pull',
'sourceControl:push', 'sourceControl:push',
'sourceControl:manage', 'sourceControl:manage',
'externalSecretsStore:create', 'externalSecretsProvider:create',
'externalSecretsStore:read', 'externalSecretsProvider:read',
'externalSecretsStore:update', 'externalSecretsProvider:update',
'externalSecretsStore:delete', 'externalSecretsProvider:delete',
'externalSecretsStore:list', 'externalSecretsProvider:list',
'externalSecretsStore:refresh', 'externalSecretsProvider:sync',
'tag:create', 'externalSecret:list',
'tag:read', 'orchestration:read',
'tag:update', 'orchestration:list',
'tag:delete', 'communityPackage:install',
'tag:list', 'communityPackage:uninstall',
'communityPackage:update',
'communityPackage:list',
'ldap:manage',
'ldap:sync',
'saml:manage',
'eventBusEvent:create',
'eventBusEvent:read',
'eventBusEvent:update',
'eventBusEvent:delete',
'eventBusEvent:list',
'eventBusEvent:query',
'eventBusEvent:create',
'eventBusDestination:create',
'eventBusDestination:read',
'eventBusDestination:update',
'eventBusDestination:delete',
'eventBusDestination:list',
'eventBusDestination:test',
]; ];
export const adminPermissions: Scope[] = ownerPermissions.concat(); export const adminPermissions: Scope[] = ownerPermissions.concat();
export const memberPermissions: Scope[] = [ export const memberPermissions: Scope[] = [
@ -47,4 +71,8 @@ export const memberPermissions: Scope[] = [
'tag:read', 'tag:read',
'tag:update', 'tag:update',
'tag:list', 'tag:list',
'eventBusEvent:list',
'eventBusEvent:read',
'eventBusDestination:list',
'eventBusDestination:test',
]; ];

View file

@ -1,7 +1,14 @@
import express from 'express'; import express from 'express';
import { Container, Service } from 'typedi'; import { Container, Service } from 'typedi';
import { getInstanceBaseUrl } from '@/UserManagement/UserManagementHelper'; import { getInstanceBaseUrl } from '@/UserManagement/UserManagementHelper';
import { Authorized, Get, NoAuthRequired, Post, RestController } from '@/decorators'; import {
Authorized,
Get,
NoAuthRequired,
Post,
RestController,
RequireGlobalScope,
} from '@/decorators';
import { SamlUrls } from '../constants'; import { SamlUrls } from '../constants';
import { import {
samlLicensedAndEnabledMiddleware, samlLicensedAndEnabledMiddleware,
@ -30,6 +37,7 @@ import { BadRequestError } from '@/errors/response-errors/bad-request.error';
import { AuthError } from '@/errors/response-errors/auth.error'; import { AuthError } from '@/errors/response-errors/auth.error';
@Service() @Service()
@Authorized()
@RestController('/sso/saml') @RestController('/sso/saml')
export class SamlController { export class SamlController {
constructor(private samlService: SamlService) {} constructor(private samlService: SamlService) {}
@ -61,8 +69,8 @@ export class SamlController {
* POST /sso/saml/config * POST /sso/saml/config
* Set SAML config * Set SAML config
*/ */
@Authorized(['global', 'owner'])
@Post(SamlUrls.config, { middlewares: [samlLicensedMiddleware] }) @Post(SamlUrls.config, { middlewares: [samlLicensedMiddleware] })
@RequireGlobalScope('saml:manage')
async configPost(req: SamlConfiguration.Update) { async configPost(req: SamlConfiguration.Update) {
const validationResult = await validate(req.body); const validationResult = await validate(req.body);
if (validationResult.length === 0) { if (validationResult.length === 0) {
@ -80,8 +88,8 @@ export class SamlController {
* POST /sso/saml/config/toggle * POST /sso/saml/config/toggle
* Set SAML config * Set SAML config
*/ */
@Authorized(['global', 'owner'])
@Post(SamlUrls.configToggleEnabled, { middlewares: [samlLicensedMiddleware] }) @Post(SamlUrls.configToggleEnabled, { middlewares: [samlLicensedMiddleware] })
@RequireGlobalScope('saml:manage')
async toggleEnabledPost(req: SamlConfiguration.Toggle, res: express.Response) { async toggleEnabledPost(req: SamlConfiguration.Toggle, res: express.Response) {
if (req.body.loginEnabled === undefined) { if (req.body.loginEnabled === undefined) {
throw new BadRequestError('Body should contain a boolean "loginEnabled" property'); throw new BadRequestError('Body should contain a boolean "loginEnabled" property');
@ -196,8 +204,8 @@ export class SamlController {
* Test SAML config * Test SAML config
* This endpoint is available if SAML is licensed and the requestor is an instance owner * This endpoint is available if SAML is licensed and the requestor is an instance owner
*/ */
@Authorized(['global', 'owner'])
@Get(SamlUrls.configTest, { middlewares: [samlLicensedMiddleware] }) @Get(SamlUrls.configTest, { middlewares: [samlLicensedMiddleware] })
@RequireGlobalScope('saml:manage')
async configTestGet(req: AuthenticatedRequest, res: express.Response) { async configTestGet(req: AuthenticatedRequest, res: express.Response) {
return this.handleInitSSO(res, getServiceProviderConfigTestReturnUrl()); return this.handleInitSSO(res, getServiceProviderConfigTestReturnUrl());
} }

View file

@ -109,8 +109,7 @@ EEWorkflowController.get(
} }
const userSharing = workflow.shared?.find((shared) => shared.user.id === req.user.id); const userSharing = workflow.shared?.find((shared) => shared.user.id === req.user.id);
if (!userSharing && !(await req.user.hasGlobalScope('workflow:read'))) {
if (!userSharing && req.user.globalRole.name !== 'owner') {
throw new UnauthorizedError( throw new UnauthorizedError(
'You do not have permission to access this workflow. Ask the owner to share it with you', 'You do not have permission to access this workflow. Ask the owner to share it with you',
); );