mirror of
https://github.com/n8n-io/n8n.git
synced 2025-03-05 20:50:17 -08:00
feat: Add initial scope checks via decorators (#7737)
This commit is contained in:
parent
753cbc1e96
commit
a37f1cb0ba
|
@ -6,7 +6,14 @@ export type Resource =
|
||||||
| 'credential'
|
| 'credential'
|
||||||
| 'variable'
|
| 'variable'
|
||||||
| 'sourceControl'
|
| 'sourceControl'
|
||||||
| 'externalSecretsStore';
|
| 'externalSecretsProvider'
|
||||||
|
| 'externalSecret'
|
||||||
|
| 'eventBusEvent'
|
||||||
|
| 'eventBusDestination'
|
||||||
|
| 'orchestration'
|
||||||
|
| 'communityPackage'
|
||||||
|
| 'ldap'
|
||||||
|
| 'saml';
|
||||||
|
|
||||||
export type ResourceScope<
|
export type ResourceScope<
|
||||||
R extends Resource,
|
R extends Resource,
|
||||||
|
@ -17,14 +24,27 @@ export type WildcardScope = `${Resource}:*` | '*';
|
||||||
|
|
||||||
export type WorkflowScope = ResourceScope<'workflow', DefaultOperations | 'share'>;
|
export type WorkflowScope = ResourceScope<'workflow', DefaultOperations | 'share'>;
|
||||||
export type TagScope = ResourceScope<'tag'>;
|
export type TagScope = ResourceScope<'tag'>;
|
||||||
export type UserScope = ResourceScope<'user'>;
|
export type UserScope = ResourceScope<'user', DefaultOperations | 'resetPassword'>;
|
||||||
export type CredentialScope = ResourceScope<'credential', DefaultOperations | 'share'>;
|
export type CredentialScope = ResourceScope<'credential', DefaultOperations | 'share'>;
|
||||||
export type VariableScope = ResourceScope<'variable'>;
|
export type VariableScope = ResourceScope<'variable'>;
|
||||||
export type SourceControlScope = ResourceScope<'sourceControl', 'pull' | 'push' | 'manage'>;
|
export type SourceControlScope = ResourceScope<'sourceControl', 'pull' | 'push' | 'manage'>;
|
||||||
export type ExternalSecretStoreScope = ResourceScope<
|
export type ExternalSecretProviderScope = ResourceScope<
|
||||||
'externalSecretsStore',
|
'externalSecretsProvider',
|
||||||
DefaultOperations | 'refresh'
|
DefaultOperations | 'sync'
|
||||||
>;
|
>;
|
||||||
|
export type ExternalSecretScope = ResourceScope<'externalSecret', 'list'>;
|
||||||
|
export type EventBusEventScope = ResourceScope<'eventBusEvent', DefaultOperations | 'query'>;
|
||||||
|
export type EventBusDestinationScope = ResourceScope<
|
||||||
|
'eventBusDestination',
|
||||||
|
DefaultOperations | 'test'
|
||||||
|
>;
|
||||||
|
export type OrchestrationScope = ResourceScope<'orchestration', 'read' | 'list'>;
|
||||||
|
export type CommunityPackageScope = ResourceScope<
|
||||||
|
'communityPackage',
|
||||||
|
'install' | 'uninstall' | 'update' | 'list'
|
||||||
|
>;
|
||||||
|
export type LdapScope = ResourceScope<'ldap', 'manage' | 'sync'>;
|
||||||
|
export type SamlScope = ResourceScope<'saml', 'manage'>;
|
||||||
|
|
||||||
export type Scope =
|
export type Scope =
|
||||||
| WorkflowScope
|
| WorkflowScope
|
||||||
|
@ -33,7 +53,14 @@ export type Scope =
|
||||||
| CredentialScope
|
| CredentialScope
|
||||||
| VariableScope
|
| VariableScope
|
||||||
| SourceControlScope
|
| SourceControlScope
|
||||||
| ExternalSecretStoreScope;
|
| ExternalSecretProviderScope
|
||||||
|
| ExternalSecretScope
|
||||||
|
| EventBusEventScope
|
||||||
|
| EventBusDestinationScope
|
||||||
|
| OrchestrationScope
|
||||||
|
| CommunityPackageScope
|
||||||
|
| LdapScope
|
||||||
|
| SamlScope;
|
||||||
|
|
||||||
export type ScopeLevel = 'global' | 'project' | 'resource';
|
export type ScopeLevel = 'global' | 'project' | 'resource';
|
||||||
export type GetScopeLevel<T extends ScopeLevel> = Record<T, Scope[]>;
|
export type GetScopeLevel<T extends ScopeLevel> = Record<T, Scope[]>;
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
import { Authorized, Get, Post, RestController } from '@/decorators';
|
import { Authorized, Get, Post, RestController, RequireGlobalScope } from '@/decorators';
|
||||||
import { ExternalSecretsRequest } from '@/requests';
|
import { ExternalSecretsRequest } from '@/requests';
|
||||||
import { Response } from 'express';
|
import { Response } from 'express';
|
||||||
import { Service } from 'typedi';
|
import { Service } from 'typedi';
|
||||||
|
@ -7,17 +7,19 @@ import { ExternalSecretsProviderNotFoundError } from '@/errors/external-secrets-
|
||||||
import { NotFoundError } from '@/errors/response-errors/not-found.error';
|
import { NotFoundError } from '@/errors/response-errors/not-found.error';
|
||||||
|
|
||||||
@Service()
|
@Service()
|
||||||
@Authorized(['global', 'owner'])
|
@Authorized()
|
||||||
@RestController('/external-secrets')
|
@RestController('/external-secrets')
|
||||||
export class ExternalSecretsController {
|
export class ExternalSecretsController {
|
||||||
constructor(private readonly secretsService: ExternalSecretsService) {}
|
constructor(private readonly secretsService: ExternalSecretsService) {}
|
||||||
|
|
||||||
@Get('/providers')
|
@Get('/providers')
|
||||||
|
@RequireGlobalScope('externalSecretsProvider:list')
|
||||||
async getProviders() {
|
async getProviders() {
|
||||||
return this.secretsService.getProviders();
|
return this.secretsService.getProviders();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Get('/providers/:provider')
|
@Get('/providers/:provider')
|
||||||
|
@RequireGlobalScope('externalSecretsProvider:read')
|
||||||
async getProvider(req: ExternalSecretsRequest.GetProvider) {
|
async getProvider(req: ExternalSecretsRequest.GetProvider) {
|
||||||
const providerName = req.params.provider;
|
const providerName = req.params.provider;
|
||||||
try {
|
try {
|
||||||
|
@ -31,6 +33,7 @@ export class ExternalSecretsController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post('/providers/:provider/test')
|
@Post('/providers/:provider/test')
|
||||||
|
@RequireGlobalScope('externalSecretsProvider:read')
|
||||||
async testProviderSettings(req: ExternalSecretsRequest.TestProviderSettings, res: Response) {
|
async testProviderSettings(req: ExternalSecretsRequest.TestProviderSettings, res: Response) {
|
||||||
const providerName = req.params.provider;
|
const providerName = req.params.provider;
|
||||||
try {
|
try {
|
||||||
|
@ -50,6 +53,7 @@ export class ExternalSecretsController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post('/providers/:provider')
|
@Post('/providers/:provider')
|
||||||
|
@RequireGlobalScope('externalSecretsProvider:create')
|
||||||
async setProviderSettings(req: ExternalSecretsRequest.SetProviderSettings) {
|
async setProviderSettings(req: ExternalSecretsRequest.SetProviderSettings) {
|
||||||
const providerName = req.params.provider;
|
const providerName = req.params.provider;
|
||||||
try {
|
try {
|
||||||
|
@ -64,6 +68,7 @@ export class ExternalSecretsController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post('/providers/:provider/connect')
|
@Post('/providers/:provider/connect')
|
||||||
|
@RequireGlobalScope('externalSecretsProvider:update')
|
||||||
async setProviderConnected(req: ExternalSecretsRequest.SetProviderConnected) {
|
async setProviderConnected(req: ExternalSecretsRequest.SetProviderConnected) {
|
||||||
const providerName = req.params.provider;
|
const providerName = req.params.provider;
|
||||||
try {
|
try {
|
||||||
|
@ -78,6 +83,7 @@ export class ExternalSecretsController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post('/providers/:provider/update')
|
@Post('/providers/:provider/update')
|
||||||
|
@RequireGlobalScope('externalSecretsProvider:sync')
|
||||||
async updateProvider(req: ExternalSecretsRequest.UpdateProvider, res: Response) {
|
async updateProvider(req: ExternalSecretsRequest.UpdateProvider, res: Response) {
|
||||||
const providerName = req.params.provider;
|
const providerName = req.params.provider;
|
||||||
try {
|
try {
|
||||||
|
@ -97,6 +103,7 @@ export class ExternalSecretsController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Get('/secrets')
|
@Get('/secrets')
|
||||||
|
@RequireGlobalScope('externalSecret:list')
|
||||||
getSecretNames() {
|
getSecretNames() {
|
||||||
return this.secretsService.getAllSecrets();
|
return this.secretsService.getAllSecrets();
|
||||||
}
|
}
|
||||||
|
|
|
@ -288,6 +288,7 @@ export class Server extends AbstractServer {
|
||||||
Container.get(OrchestrationController),
|
Container.get(OrchestrationController),
|
||||||
Container.get(WorkflowHistoryController),
|
Container.get(WorkflowHistoryController),
|
||||||
Container.get(BinaryDataController),
|
Container.get(BinaryDataController),
|
||||||
|
Container.get(VariablesController),
|
||||||
new InvitationController(
|
new InvitationController(
|
||||||
config,
|
config,
|
||||||
logger,
|
logger,
|
||||||
|
|
|
@ -6,7 +6,16 @@ import {
|
||||||
STARTER_TEMPLATE_NAME,
|
STARTER_TEMPLATE_NAME,
|
||||||
UNKNOWN_FAILURE_REASON,
|
UNKNOWN_FAILURE_REASON,
|
||||||
} from '@/constants';
|
} from '@/constants';
|
||||||
import { Authorized, Delete, Get, Middleware, Patch, Post, RestController } from '@/decorators';
|
import {
|
||||||
|
Authorized,
|
||||||
|
Delete,
|
||||||
|
Get,
|
||||||
|
Middleware,
|
||||||
|
Patch,
|
||||||
|
Post,
|
||||||
|
RestController,
|
||||||
|
RequireGlobalScope,
|
||||||
|
} from '@/decorators';
|
||||||
import { NodeRequest } from '@/requests';
|
import { NodeRequest } from '@/requests';
|
||||||
import type { InstalledPackages } from '@db/entities/InstalledPackages';
|
import type { InstalledPackages } from '@db/entities/InstalledPackages';
|
||||||
import type { CommunityPackages } from '@/Interfaces';
|
import type { CommunityPackages } from '@/Interfaces';
|
||||||
|
@ -34,7 +43,7 @@ export function isNpmError(error: unknown): error is { code: number; stdout: str
|
||||||
}
|
}
|
||||||
|
|
||||||
@Service()
|
@Service()
|
||||||
@Authorized(['global', 'owner'])
|
@Authorized()
|
||||||
@RestController('/community-packages')
|
@RestController('/community-packages')
|
||||||
export class CommunityPackagesController {
|
export class CommunityPackagesController {
|
||||||
constructor(
|
constructor(
|
||||||
|
@ -55,6 +64,7 @@ export class CommunityPackagesController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post('/')
|
@Post('/')
|
||||||
|
@RequireGlobalScope('communityPackage:install')
|
||||||
async installPackage(req: NodeRequest.Post) {
|
async installPackage(req: NodeRequest.Post) {
|
||||||
const { name } = req.body;
|
const { name } = req.body;
|
||||||
|
|
||||||
|
@ -151,6 +161,7 @@ export class CommunityPackagesController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Get('/')
|
@Get('/')
|
||||||
|
@RequireGlobalScope('communityPackage:list')
|
||||||
async getInstalledPackages() {
|
async getInstalledPackages() {
|
||||||
const installedPackages = await this.communityPackagesService.getAllInstalledPackages();
|
const installedPackages = await this.communityPackagesService.getAllInstalledPackages();
|
||||||
|
|
||||||
|
@ -185,6 +196,7 @@ export class CommunityPackagesController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Delete('/')
|
@Delete('/')
|
||||||
|
@RequireGlobalScope('communityPackage:uninstall')
|
||||||
async uninstallPackage(req: NodeRequest.Delete) {
|
async uninstallPackage(req: NodeRequest.Delete) {
|
||||||
const { name } = req.query;
|
const { name } = req.query;
|
||||||
|
|
||||||
|
@ -236,6 +248,7 @@ export class CommunityPackagesController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Patch('/')
|
@Patch('/')
|
||||||
|
@RequireGlobalScope('communityPackage:update')
|
||||||
async updatePackage(req: NodeRequest.Update) {
|
async updatePackage(req: NodeRequest.Update) {
|
||||||
const { name } = req.body;
|
const { name } = req.body;
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
import { In } from 'typeorm';
|
import { In } from 'typeorm';
|
||||||
import Container, { Service } from 'typedi';
|
import Container, { Service } from 'typedi';
|
||||||
import { Authorized, NoAuthRequired, Post, RestController } from '@/decorators';
|
import { Authorized, NoAuthRequired, Post, RequireGlobalScope, RestController } from '@/decorators';
|
||||||
import { issueCookie } from '@/auth/jwt';
|
import { issueCookie } from '@/auth/jwt';
|
||||||
import { RESPONSE_ERROR_MESSAGES } from '@/constants';
|
import { RESPONSE_ERROR_MESSAGES } from '@/constants';
|
||||||
import { Response } from 'express';
|
import { Response } from 'express';
|
||||||
|
@ -19,6 +19,7 @@ import { BadRequestError } from '@/errors/response-errors/bad-request.error';
|
||||||
import { UnauthorizedError } from '@/errors/response-errors/unauthorized.error';
|
import { UnauthorizedError } from '@/errors/response-errors/unauthorized.error';
|
||||||
|
|
||||||
@Service()
|
@Service()
|
||||||
|
@Authorized()
|
||||||
@RestController('/invitations')
|
@RestController('/invitations')
|
||||||
export class InvitationController {
|
export class InvitationController {
|
||||||
constructor(
|
constructor(
|
||||||
|
@ -34,8 +35,8 @@ export class InvitationController {
|
||||||
* Send email invite(s) to one or multiple users and create user shell(s).
|
* Send email invite(s) to one or multiple users and create user shell(s).
|
||||||
*/
|
*/
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Post('/')
|
@Post('/')
|
||||||
|
@RequireGlobalScope('user:create')
|
||||||
async inviteUser(req: UserRequest.Invite) {
|
async inviteUser(req: UserRequest.Invite) {
|
||||||
const isWithinUsersLimit = Container.get(License).isWithinUsersLimit();
|
const isWithinUsersLimit = Container.get(License).isWithinUsersLimit();
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
import pick from 'lodash/pick';
|
import pick from 'lodash/pick';
|
||||||
import { Authorized, Get, Post, Put, RestController } from '@/decorators';
|
import { Authorized, Get, Post, Put, RestController, RequireGlobalScope } from '@/decorators';
|
||||||
import { getLdapConfig, getLdapSynchronizations, updateLdapConfig } from '@/Ldap/helpers';
|
import { getLdapConfig, getLdapSynchronizations, updateLdapConfig } from '@/Ldap/helpers';
|
||||||
import { LdapService } from '@/Ldap/LdapService.ee';
|
import { LdapService } from '@/Ldap/LdapService.ee';
|
||||||
import { LdapSync } from '@/Ldap/LdapSync.ee';
|
import { LdapSync } from '@/Ldap/LdapSync.ee';
|
||||||
|
@ -8,7 +8,7 @@ import { NON_SENSIBLE_LDAP_CONFIG_PROPERTIES } from '@/Ldap/constants';
|
||||||
import { InternalHooks } from '@/InternalHooks';
|
import { InternalHooks } from '@/InternalHooks';
|
||||||
import { BadRequestError } from '@/errors/response-errors/bad-request.error';
|
import { BadRequestError } from '@/errors/response-errors/bad-request.error';
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
@Authorized()
|
||||||
@RestController('/ldap')
|
@RestController('/ldap')
|
||||||
export class LdapController {
|
export class LdapController {
|
||||||
constructor(
|
constructor(
|
||||||
|
@ -18,11 +18,13 @@ export class LdapController {
|
||||||
) {}
|
) {}
|
||||||
|
|
||||||
@Get('/config')
|
@Get('/config')
|
||||||
|
@RequireGlobalScope('ldap:manage')
|
||||||
async getConfig() {
|
async getConfig() {
|
||||||
return getLdapConfig();
|
return getLdapConfig();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post('/test-connection')
|
@Post('/test-connection')
|
||||||
|
@RequireGlobalScope('ldap:manage')
|
||||||
async testConnection() {
|
async testConnection() {
|
||||||
try {
|
try {
|
||||||
await this.ldapService.testConnection();
|
await this.ldapService.testConnection();
|
||||||
|
@ -32,6 +34,7 @@ export class LdapController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Put('/config')
|
@Put('/config')
|
||||||
|
@RequireGlobalScope('ldap:manage')
|
||||||
async updateConfig(req: LdapConfiguration.Update) {
|
async updateConfig(req: LdapConfiguration.Update) {
|
||||||
try {
|
try {
|
||||||
await updateLdapConfig(req.body);
|
await updateLdapConfig(req.body);
|
||||||
|
@ -50,12 +53,14 @@ export class LdapController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Get('/sync')
|
@Get('/sync')
|
||||||
|
@RequireGlobalScope('ldap:sync')
|
||||||
async getLdapSync(req: LdapConfiguration.GetSync) {
|
async getLdapSync(req: LdapConfiguration.GetSync) {
|
||||||
const { page = '0', perPage = '20' } = req.query;
|
const { page = '0', perPage = '20' } = req.query;
|
||||||
return getLdapSynchronizations(parseInt(page, 10), parseInt(perPage, 10));
|
return getLdapSynchronizations(parseInt(page, 10), parseInt(perPage, 10));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post('/sync')
|
@Post('/sync')
|
||||||
|
@RequireGlobalScope('ldap:sync')
|
||||||
async syncLdap(req: LdapConfiguration.Sync) {
|
async syncLdap(req: LdapConfiguration.Sync) {
|
||||||
try {
|
try {
|
||||||
await this.ldapSync.run(req.body.type);
|
await this.ldapSync.run(req.body.type);
|
||||||
|
|
|
@ -1,10 +1,10 @@
|
||||||
import { Authorized, Post, RestController } from '@/decorators';
|
import { Authorized, Post, RestController, RequireGlobalScope } from '@/decorators';
|
||||||
import { OrchestrationRequest } from '@/requests';
|
import { OrchestrationRequest } from '@/requests';
|
||||||
import { Service } from 'typedi';
|
import { Service } from 'typedi';
|
||||||
import { SingleMainSetup } from '@/services/orchestration/main/SingleMainSetup';
|
import { SingleMainSetup } from '@/services/orchestration/main/SingleMainSetup';
|
||||||
import { License } from '../License';
|
import { License } from '../License';
|
||||||
|
|
||||||
@Authorized('any')
|
@Authorized()
|
||||||
@RestController('/orchestration')
|
@RestController('/orchestration')
|
||||||
@Service()
|
@Service()
|
||||||
export class OrchestrationController {
|
export class OrchestrationController {
|
||||||
|
@ -17,6 +17,7 @@ export class OrchestrationController {
|
||||||
* These endpoints do not return anything, they just trigger the messsage to
|
* These endpoints do not return anything, they just trigger the messsage to
|
||||||
* the workers to respond on Redis with their status.
|
* the workers to respond on Redis with their status.
|
||||||
*/
|
*/
|
||||||
|
@RequireGlobalScope('orchestration:read')
|
||||||
@Post('/worker/status/:id')
|
@Post('/worker/status/:id')
|
||||||
async getWorkersStatus(req: OrchestrationRequest.Get) {
|
async getWorkersStatus(req: OrchestrationRequest.Get) {
|
||||||
if (!this.licenseService.isWorkerViewLicensed()) return;
|
if (!this.licenseService.isWorkerViewLicensed()) return;
|
||||||
|
@ -24,12 +25,14 @@ export class OrchestrationController {
|
||||||
return this.singleMainSetup.getWorkerStatus(id);
|
return this.singleMainSetup.getWorkerStatus(id);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@RequireGlobalScope('orchestration:read')
|
||||||
@Post('/worker/status')
|
@Post('/worker/status')
|
||||||
async getWorkersStatusAll() {
|
async getWorkersStatusAll() {
|
||||||
if (!this.licenseService.isWorkerViewLicensed()) return;
|
if (!this.licenseService.isWorkerViewLicensed()) return;
|
||||||
return this.singleMainSetup.getWorkerStatus();
|
return this.singleMainSetup.getWorkerStatus();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@RequireGlobalScope('orchestration:list')
|
||||||
@Post('/worker/ids')
|
@Post('/worker/ids')
|
||||||
async getWorkerIdsAll() {
|
async getWorkerIdsAll() {
|
||||||
if (!this.licenseService.isWorkerViewLicensed()) return;
|
if (!this.licenseService.isWorkerViewLicensed()) return;
|
||||||
|
|
|
@ -1,6 +1,15 @@
|
||||||
import { Request, Response, NextFunction } from 'express';
|
import { Request, Response, NextFunction } from 'express';
|
||||||
import config from '@/config';
|
import config from '@/config';
|
||||||
import { Authorized, Delete, Get, Middleware, Patch, Post, RestController } from '@/decorators';
|
import {
|
||||||
|
Authorized,
|
||||||
|
Delete,
|
||||||
|
Get,
|
||||||
|
Middleware,
|
||||||
|
Patch,
|
||||||
|
Post,
|
||||||
|
RestController,
|
||||||
|
RequireGlobalScope,
|
||||||
|
} from '@/decorators';
|
||||||
import { TagService } from '@/services/tag.service';
|
import { TagService } from '@/services/tag.service';
|
||||||
import { TagsRequest } from '@/requests';
|
import { TagsRequest } from '@/requests';
|
||||||
import { Service } from 'typedi';
|
import { Service } from 'typedi';
|
||||||
|
@ -23,11 +32,13 @@ export class TagsController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Get('/')
|
@Get('/')
|
||||||
|
@RequireGlobalScope('tag:list')
|
||||||
async getAll(req: TagsRequest.GetAll) {
|
async getAll(req: TagsRequest.GetAll) {
|
||||||
return this.tagService.getAll({ withUsageCount: req.query.withUsageCount === 'true' });
|
return this.tagService.getAll({ withUsageCount: req.query.withUsageCount === 'true' });
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post('/')
|
@Post('/')
|
||||||
|
@RequireGlobalScope('tag:create')
|
||||||
async createTag(req: TagsRequest.Create) {
|
async createTag(req: TagsRequest.Create) {
|
||||||
const tag = this.tagService.toEntity({ name: req.body.name });
|
const tag = this.tagService.toEntity({ name: req.body.name });
|
||||||
|
|
||||||
|
@ -35,14 +46,15 @@ export class TagsController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Patch('/:id(\\w+)')
|
@Patch('/:id(\\w+)')
|
||||||
|
@RequireGlobalScope('tag:update')
|
||||||
async updateTag(req: TagsRequest.Update) {
|
async updateTag(req: TagsRequest.Update) {
|
||||||
const newTag = this.tagService.toEntity({ id: req.params.id, name: req.body.name.trim() });
|
const newTag = this.tagService.toEntity({ id: req.params.id, name: req.body.name.trim() });
|
||||||
|
|
||||||
return this.tagService.save(newTag, 'update');
|
return this.tagService.save(newTag, 'update');
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Delete('/:id(\\w+)')
|
@Delete('/:id(\\w+)')
|
||||||
|
@RequireGlobalScope('tag:delete')
|
||||||
async deleteTag(req: TagsRequest.Delete) {
|
async deleteTag(req: TagsRequest.Delete) {
|
||||||
const { id } = req.params;
|
const { id } = req.params;
|
||||||
|
|
||||||
|
|
|
@ -3,7 +3,7 @@ import { In, Not } from 'typeorm';
|
||||||
import { User } from '@db/entities/User';
|
import { User } from '@db/entities/User';
|
||||||
import { SharedCredentials } from '@db/entities/SharedCredentials';
|
import { SharedCredentials } from '@db/entities/SharedCredentials';
|
||||||
import { SharedWorkflow } from '@db/entities/SharedWorkflow';
|
import { SharedWorkflow } from '@db/entities/SharedWorkflow';
|
||||||
import { Authorized, Delete, Get, RestController, Patch } from '@/decorators';
|
import { RequireGlobalScope, Authorized, Delete, Get, RestController, Patch } from '@/decorators';
|
||||||
import { ListQuery, UserRequest, UserSettingsUpdatePayload } from '@/requests';
|
import { ListQuery, UserRequest, UserSettingsUpdatePayload } from '@/requests';
|
||||||
import { ActiveWorkflowRunner } from '@/ActiveWorkflowRunner';
|
import { ActiveWorkflowRunner } from '@/ActiveWorkflowRunner';
|
||||||
import { IExternalHooksClass, IInternalHooksClass } from '@/Interfaces';
|
import { IExternalHooksClass, IInternalHooksClass } from '@/Interfaces';
|
||||||
|
@ -114,8 +114,8 @@ export class UsersController {
|
||||||
return publicUsers;
|
return publicUsers;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized('any')
|
|
||||||
@Get('/', { middlewares: listQueryMiddleware })
|
@Get('/', { middlewares: listQueryMiddleware })
|
||||||
|
@RequireGlobalScope('user:list')
|
||||||
async listUsers(req: ListQuery.Request) {
|
async listUsers(req: ListQuery.Request) {
|
||||||
const { listQueryOptions } = req;
|
const { listQueryOptions } = req;
|
||||||
|
|
||||||
|
@ -132,8 +132,8 @@ export class UsersController {
|
||||||
: publicUsers;
|
: publicUsers;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Get('/:id/password-reset-link')
|
@Get('/:id/password-reset-link')
|
||||||
|
@RequireGlobalScope('user:resetPassword')
|
||||||
async getUserPasswordResetLink(req: UserRequest.PasswordResetLink) {
|
async getUserPasswordResetLink(req: UserRequest.PasswordResetLink) {
|
||||||
const user = await this.userService.findOneOrFail({
|
const user = await this.userService.findOneOrFail({
|
||||||
where: { id: req.params.id },
|
where: { id: req.params.id },
|
||||||
|
@ -146,8 +146,8 @@ export class UsersController {
|
||||||
return { link };
|
return { link };
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Patch('/:id/settings')
|
@Patch('/:id/settings')
|
||||||
|
@RequireGlobalScope('user:update')
|
||||||
async updateUserSettings(req: UserRequest.UserSettingsUpdate) {
|
async updateUserSettings(req: UserRequest.UserSettingsUpdate) {
|
||||||
const payload = plainToInstance(UserSettingsUpdatePayload, req.body);
|
const payload = plainToInstance(UserSettingsUpdatePayload, req.body);
|
||||||
|
|
||||||
|
@ -168,6 +168,7 @@ export class UsersController {
|
||||||
*/
|
*/
|
||||||
@Authorized(['global', 'owner'])
|
@Authorized(['global', 'owner'])
|
||||||
@Delete('/:id')
|
@Delete('/:id')
|
||||||
|
@RequireGlobalScope('user:delete')
|
||||||
async deleteUser(req: UserRequest.Delete) {
|
async deleteUser(req: UserRequest.Delete) {
|
||||||
const { id: idToDelete } = req.params;
|
const { id: idToDelete } = req.params;
|
||||||
|
|
||||||
|
|
|
@ -2,7 +2,6 @@ import type { BooleanLicenseFeature } from '@/Interfaces';
|
||||||
import type { LicenseMetadata } from './types';
|
import type { LicenseMetadata } from './types';
|
||||||
import { CONTROLLER_LICENSE_FEATURES } from './constants';
|
import { CONTROLLER_LICENSE_FEATURES } from './constants';
|
||||||
|
|
||||||
// eslint-disable-next-line @typescript-eslint/naming-convention
|
|
||||||
export const Licensed = (features: BooleanLicenseFeature | BooleanLicenseFeature[]) => {
|
export const Licensed = (features: BooleanLicenseFeature | BooleanLicenseFeature[]) => {
|
||||||
// eslint-disable-next-line @typescript-eslint/ban-types
|
// eslint-disable-next-line @typescript-eslint/ban-types
|
||||||
return (target: Function | object, handlerName?: string) => {
|
return (target: Function | object, handlerName?: string) => {
|
||||||
|
|
14
packages/cli/src/decorators/Scopes.ts
Normal file
14
packages/cli/src/decorators/Scopes.ts
Normal file
|
@ -0,0 +1,14 @@
|
||||||
|
import type { Scope } from '@n8n/permissions';
|
||||||
|
import type { ScopeMetadata } from './types';
|
||||||
|
import { CONTROLLER_REQUIRED_SCOPES } from './constants';
|
||||||
|
|
||||||
|
export const RequireGlobalScope = (scope: Scope | Scope[]) => {
|
||||||
|
// eslint-disable-next-line @typescript-eslint/ban-types
|
||||||
|
return (target: Function | object, handlerName?: string) => {
|
||||||
|
const controllerClass = handlerName ? target.constructor : target;
|
||||||
|
const scopes = (Reflect.getMetadata(CONTROLLER_REQUIRED_SCOPES, controllerClass) ??
|
||||||
|
[]) as ScopeMetadata;
|
||||||
|
scopes[handlerName ?? '*'] = Array.isArray(scope) ? scope : [scope];
|
||||||
|
Reflect.defineMetadata(CONTROLLER_REQUIRED_SCOPES, scopes, controllerClass);
|
||||||
|
};
|
||||||
|
};
|
|
@ -3,3 +3,4 @@ export const CONTROLLER_BASE_PATH = 'CONTROLLER_BASE_PATH';
|
||||||
export const CONTROLLER_MIDDLEWARES = 'CONTROLLER_MIDDLEWARES';
|
export const CONTROLLER_MIDDLEWARES = 'CONTROLLER_MIDDLEWARES';
|
||||||
export const CONTROLLER_AUTH_ROLES = 'CONTROLLER_AUTH_ROLES';
|
export const CONTROLLER_AUTH_ROLES = 'CONTROLLER_AUTH_ROLES';
|
||||||
export const CONTROLLER_LICENSE_FEATURES = 'CONTROLLER_LICENSE_FEATURES';
|
export const CONTROLLER_LICENSE_FEATURES = 'CONTROLLER_LICENSE_FEATURES';
|
||||||
|
export const CONTROLLER_REQUIRED_SCOPES = 'CONTROLLER_REQUIRED_SCOPES';
|
||||||
|
|
|
@ -4,3 +4,4 @@ export { Get, Post, Put, Patch, Delete } from './Route';
|
||||||
export { Middleware } from './Middleware';
|
export { Middleware } from './Middleware';
|
||||||
export { registerController } from './registerController';
|
export { registerController } from './registerController';
|
||||||
export { Licensed } from './Licensed';
|
export { Licensed } from './Licensed';
|
||||||
|
export { RequireGlobalScope } from './Scopes';
|
||||||
|
|
|
@ -8,6 +8,7 @@ import {
|
||||||
CONTROLLER_BASE_PATH,
|
CONTROLLER_BASE_PATH,
|
||||||
CONTROLLER_LICENSE_FEATURES,
|
CONTROLLER_LICENSE_FEATURES,
|
||||||
CONTROLLER_MIDDLEWARES,
|
CONTROLLER_MIDDLEWARES,
|
||||||
|
CONTROLLER_REQUIRED_SCOPES,
|
||||||
CONTROLLER_ROUTES,
|
CONTROLLER_ROUTES,
|
||||||
} from './constants';
|
} from './constants';
|
||||||
import type {
|
import type {
|
||||||
|
@ -17,10 +18,12 @@ import type {
|
||||||
LicenseMetadata,
|
LicenseMetadata,
|
||||||
MiddlewareMetadata,
|
MiddlewareMetadata,
|
||||||
RouteMetadata,
|
RouteMetadata,
|
||||||
|
ScopeMetadata,
|
||||||
} from './types';
|
} from './types';
|
||||||
import type { BooleanLicenseFeature } from '@/Interfaces';
|
import type { BooleanLicenseFeature } from '@/Interfaces';
|
||||||
import Container from 'typedi';
|
import Container from 'typedi';
|
||||||
import { License } from '@/License';
|
import { License } from '@/License';
|
||||||
|
import type { Scope } from '@n8n/permissions';
|
||||||
|
|
||||||
export const createAuthMiddleware =
|
export const createAuthMiddleware =
|
||||||
(authRole: AuthRole): RequestHandler =>
|
(authRole: AuthRole): RequestHandler =>
|
||||||
|
@ -55,6 +58,23 @@ export const createLicenseMiddleware =
|
||||||
return next();
|
return next();
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const createGlobalScopeMiddleware =
|
||||||
|
(scopes: Scope[]): RequestHandler =>
|
||||||
|
async ({ user }: AuthenticatedRequest, res, next) => {
|
||||||
|
if (scopes.length === 0) {
|
||||||
|
return next();
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!user) return res.status(401).json({ status: 'error', message: 'Unauthorized' });
|
||||||
|
|
||||||
|
const hasScopes = await user.hasGlobalScope(scopes);
|
||||||
|
if (!hasScopes) {
|
||||||
|
return res.status(403).json({ status: 'error', message: 'Unauthorized' });
|
||||||
|
}
|
||||||
|
|
||||||
|
return next();
|
||||||
|
};
|
||||||
|
|
||||||
const authFreeRoutes: string[] = [];
|
const authFreeRoutes: string[] = [];
|
||||||
|
|
||||||
export const canSkipAuth = (method: string, path: string): boolean =>
|
export const canSkipAuth = (method: string, path: string): boolean =>
|
||||||
|
@ -76,6 +96,10 @@ export const registerController = (app: Application, config: Config, cObj: objec
|
||||||
const licenseFeatures = Reflect.getMetadata(CONTROLLER_LICENSE_FEATURES, controllerClass) as
|
const licenseFeatures = Reflect.getMetadata(CONTROLLER_LICENSE_FEATURES, controllerClass) as
|
||||||
| LicenseMetadata
|
| LicenseMetadata
|
||||||
| undefined;
|
| undefined;
|
||||||
|
const requiredScopes = Reflect.getMetadata(CONTROLLER_REQUIRED_SCOPES, controllerClass) as
|
||||||
|
| ScopeMetadata
|
||||||
|
| undefined;
|
||||||
|
|
||||||
if (routes.length > 0) {
|
if (routes.length > 0) {
|
||||||
const router = Router({ mergeParams: true });
|
const router = Router({ mergeParams: true });
|
||||||
const restBasePath = config.getEnv('endpoints.rest');
|
const restBasePath = config.getEnv('endpoints.rest');
|
||||||
|
@ -89,13 +113,15 @@ export const registerController = (app: Application, config: Config, cObj: objec
|
||||||
|
|
||||||
routes.forEach(
|
routes.forEach(
|
||||||
({ method, path, middlewares: routeMiddlewares, handlerName, usesTemplates }) => {
|
({ method, path, middlewares: routeMiddlewares, handlerName, usesTemplates }) => {
|
||||||
const authRole = authRoles && (authRoles[handlerName] ?? authRoles['*']);
|
const authRole = authRoles?.[handlerName] ?? authRoles?.['*'];
|
||||||
const features = licenseFeatures && (licenseFeatures[handlerName] ?? licenseFeatures['*']);
|
const features = licenseFeatures?.[handlerName] ?? licenseFeatures?.['*'];
|
||||||
|
const scopes = requiredScopes?.[handlerName] ?? requiredScopes?.['*'];
|
||||||
const handler = async (req: Request, res: Response) => controller[handlerName](req, res);
|
const handler = async (req: Request, res: Response) => controller[handlerName](req, res);
|
||||||
router[method](
|
router[method](
|
||||||
path,
|
path,
|
||||||
...(authRole ? [createAuthMiddleware(authRole)] : []),
|
...(authRole ? [createAuthMiddleware(authRole)] : []),
|
||||||
...(features ? [createLicenseMiddleware(features)] : []),
|
...(features ? [createLicenseMiddleware(features)] : []),
|
||||||
|
...(scopes ? [createGlobalScopeMiddleware(scopes)] : []),
|
||||||
...controllerMiddlewares,
|
...controllerMiddlewares,
|
||||||
...routeMiddlewares,
|
...routeMiddlewares,
|
||||||
usesTemplates ? handler : send(handler),
|
usesTemplates ? handler : send(handler),
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
import type { Request, Response, RequestHandler } from 'express';
|
import type { Request, Response, RequestHandler } from 'express';
|
||||||
import type { RoleNames, RoleScopes } from '@db/entities/Role';
|
import type { RoleNames, RoleScopes } from '@db/entities/Role';
|
||||||
import type { BooleanLicenseFeature } from '@/Interfaces';
|
import type { BooleanLicenseFeature } from '@/Interfaces';
|
||||||
|
import type { Scope } from '@n8n/permissions';
|
||||||
|
|
||||||
export type Method = 'get' | 'post' | 'put' | 'patch' | 'delete';
|
export type Method = 'get' | 'post' | 'put' | 'patch' | 'delete';
|
||||||
|
|
||||||
|
@ -9,6 +10,8 @@ export type AuthRoleMetadata = Record<string, AuthRole>;
|
||||||
|
|
||||||
export type LicenseMetadata = Record<string, BooleanLicenseFeature[]>;
|
export type LicenseMetadata = Record<string, BooleanLicenseFeature[]>;
|
||||||
|
|
||||||
|
export type ScopeMetadata = Record<string, Scope[]>;
|
||||||
|
|
||||||
export interface MiddlewareMetadata {
|
export interface MiddlewareMetadata {
|
||||||
handlerName: string;
|
handlerName: string;
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
import { Container, Service } from 'typedi';
|
import { Container, Service } from 'typedi';
|
||||||
import type { PullResult } from 'simple-git';
|
import type { PullResult } from 'simple-git';
|
||||||
import express from 'express';
|
import express from 'express';
|
||||||
import { Authorized, Get, Post, Patch, RestController } from '@/decorators';
|
import { Authorized, Get, Post, Patch, RestController, RequireGlobalScope } from '@/decorators';
|
||||||
import {
|
import {
|
||||||
sourceControlLicensedMiddleware,
|
sourceControlLicensedMiddleware,
|
||||||
sourceControlLicensedAndEnabledMiddleware,
|
sourceControlLicensedAndEnabledMiddleware,
|
||||||
|
@ -19,6 +19,7 @@ import { SourceControlGetStatus } from './types/sourceControlGetStatus';
|
||||||
import { BadRequestError } from '@/errors/response-errors/bad-request.error';
|
import { BadRequestError } from '@/errors/response-errors/bad-request.error';
|
||||||
|
|
||||||
@Service()
|
@Service()
|
||||||
|
@Authorized()
|
||||||
@RestController(`/${SOURCE_CONTROL_API_ROOT}`)
|
@RestController(`/${SOURCE_CONTROL_API_ROOT}`)
|
||||||
export class SourceControlController {
|
export class SourceControlController {
|
||||||
constructor(
|
constructor(
|
||||||
|
@ -33,8 +34,8 @@ export class SourceControlController {
|
||||||
return this.sourceControlPreferencesService.getPreferences();
|
return this.sourceControlPreferencesService.getPreferences();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Post('/preferences', { middlewares: [sourceControlLicensedMiddleware] })
|
@Post('/preferences', { middlewares: [sourceControlLicensedMiddleware] })
|
||||||
|
@RequireGlobalScope('sourceControl:manage')
|
||||||
async setPreferences(req: SourceControlRequest.UpdatePreferences) {
|
async setPreferences(req: SourceControlRequest.UpdatePreferences) {
|
||||||
if (
|
if (
|
||||||
req.body.branchReadOnly === undefined &&
|
req.body.branchReadOnly === undefined &&
|
||||||
|
@ -97,8 +98,8 @@ export class SourceControlController {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Patch('/preferences', { middlewares: [sourceControlLicensedMiddleware] })
|
@Patch('/preferences', { middlewares: [sourceControlLicensedMiddleware] })
|
||||||
|
@RequireGlobalScope('sourceControl:manage')
|
||||||
async updatePreferences(req: SourceControlRequest.UpdatePreferences) {
|
async updatePreferences(req: SourceControlRequest.UpdatePreferences) {
|
||||||
try {
|
try {
|
||||||
const sanitizedPreferences: Partial<SourceControlPreferences> = {
|
const sanitizedPreferences: Partial<SourceControlPreferences> = {
|
||||||
|
@ -141,8 +142,8 @@ export class SourceControlController {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Post('/disconnect', { middlewares: [sourceControlLicensedMiddleware] })
|
@Post('/disconnect', { middlewares: [sourceControlLicensedMiddleware] })
|
||||||
|
@RequireGlobalScope('sourceControl:manage')
|
||||||
async disconnect(req: SourceControlRequest.Disconnect) {
|
async disconnect(req: SourceControlRequest.Disconnect) {
|
||||||
try {
|
try {
|
||||||
return await this.sourceControlService.disconnect(req.body);
|
return await this.sourceControlService.disconnect(req.body);
|
||||||
|
@ -161,8 +162,8 @@ export class SourceControlController {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Post('/push-workfolder', { middlewares: [sourceControlLicensedAndEnabledMiddleware] })
|
@Post('/push-workfolder', { middlewares: [sourceControlLicensedAndEnabledMiddleware] })
|
||||||
|
@RequireGlobalScope('sourceControl:push')
|
||||||
async pushWorkfolder(
|
async pushWorkfolder(
|
||||||
req: SourceControlRequest.PushWorkFolder,
|
req: SourceControlRequest.PushWorkFolder,
|
||||||
res: express.Response,
|
res: express.Response,
|
||||||
|
@ -183,8 +184,8 @@ export class SourceControlController {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Post('/pull-workfolder', { middlewares: [sourceControlLicensedAndEnabledMiddleware] })
|
@Post('/pull-workfolder', { middlewares: [sourceControlLicensedAndEnabledMiddleware] })
|
||||||
|
@RequireGlobalScope('sourceControl:pull')
|
||||||
async pullWorkfolder(
|
async pullWorkfolder(
|
||||||
req: SourceControlRequest.PullWorkFolder,
|
req: SourceControlRequest.PullWorkFolder,
|
||||||
res: express.Response,
|
res: express.Response,
|
||||||
|
@ -202,8 +203,8 @@ export class SourceControlController {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Get('/reset-workfolder', { middlewares: [sourceControlLicensedAndEnabledMiddleware] })
|
@Get('/reset-workfolder', { middlewares: [sourceControlLicensedAndEnabledMiddleware] })
|
||||||
|
@RequireGlobalScope('sourceControl:manage')
|
||||||
async resetWorkfolder(): Promise<ImportResult | undefined> {
|
async resetWorkfolder(): Promise<ImportResult | undefined> {
|
||||||
try {
|
try {
|
||||||
return await this.sourceControlService.resetWorkfolder();
|
return await this.sourceControlService.resetWorkfolder();
|
||||||
|
@ -235,8 +236,8 @@ export class SourceControlController {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Post('/generate-key-pair', { middlewares: [sourceControlLicensedMiddleware] })
|
@Post('/generate-key-pair', { middlewares: [sourceControlLicensedMiddleware] })
|
||||||
|
@RequireGlobalScope('sourceControl:manage')
|
||||||
async generateKeyPair(
|
async generateKeyPair(
|
||||||
req: SourceControlRequest.GenerateKeyPair,
|
req: SourceControlRequest.GenerateKeyPair,
|
||||||
): Promise<SourceControlPreferences> {
|
): Promise<SourceControlPreferences> {
|
||||||
|
|
|
@ -1,10 +1,17 @@
|
||||||
import { Container, Service } from 'typedi';
|
import { Service } from 'typedi';
|
||||||
|
|
||||||
import { VariablesRequest } from '@/requests';
|
import { VariablesRequest } from '@/requests';
|
||||||
import { Authorized, Delete, Get, Licensed, Patch, Post, RestController } from '@/decorators';
|
import {
|
||||||
|
Authorized,
|
||||||
|
Delete,
|
||||||
|
Get,
|
||||||
|
Licensed,
|
||||||
|
Patch,
|
||||||
|
Post,
|
||||||
|
RequireGlobalScope,
|
||||||
|
RestController,
|
||||||
|
} from '@/decorators';
|
||||||
import { VariablesService } from './variables.service.ee';
|
import { VariablesService } from './variables.service.ee';
|
||||||
import { Logger } from '@/Logger';
|
|
||||||
import { UnauthorizedError } from '@/errors/response-errors/unauthorized.error';
|
|
||||||
import { BadRequestError } from '@/errors/response-errors/bad-request.error';
|
import { BadRequestError } from '@/errors/response-errors/bad-request.error';
|
||||||
import { NotFoundError } from '@/errors/response-errors/not-found.error';
|
import { NotFoundError } from '@/errors/response-errors/not-found.error';
|
||||||
import { VariableValidationError } from '@/errors/variable-validation.error';
|
import { VariableValidationError } from '@/errors/variable-validation.error';
|
||||||
|
@ -14,29 +21,22 @@ import { VariableCountLimitReachedError } from '@/errors/variable-count-limit-re
|
||||||
@Authorized()
|
@Authorized()
|
||||||
@RestController('/variables')
|
@RestController('/variables')
|
||||||
export class VariablesController {
|
export class VariablesController {
|
||||||
constructor(
|
constructor(private variablesService: VariablesService) {}
|
||||||
private variablesService: VariablesService,
|
|
||||||
private logger: Logger,
|
|
||||||
) {}
|
|
||||||
|
|
||||||
@Get('/')
|
@Get('/')
|
||||||
|
@RequireGlobalScope('variable:list')
|
||||||
async getVariables() {
|
async getVariables() {
|
||||||
return Container.get(VariablesService).getAllCached();
|
return this.variablesService.getAllCached();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post('/')
|
@Post('/')
|
||||||
@Licensed('feat:variables')
|
@Licensed('feat:variables')
|
||||||
|
@RequireGlobalScope('variable:create')
|
||||||
async createVariable(req: VariablesRequest.Create) {
|
async createVariable(req: VariablesRequest.Create) {
|
||||||
if (req.user.globalRole.name !== 'owner') {
|
|
||||||
this.logger.info('Attempt to update a variable blocked due to lack of permissions', {
|
|
||||||
userId: req.user.id,
|
|
||||||
});
|
|
||||||
throw new UnauthorizedError('Unauthorized');
|
|
||||||
}
|
|
||||||
const variable = req.body;
|
const variable = req.body;
|
||||||
delete variable.id;
|
delete variable.id;
|
||||||
try {
|
try {
|
||||||
return await Container.get(VariablesService).create(variable);
|
return await this.variablesService.create(variable);
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
if (error instanceof VariableCountLimitReachedError) {
|
if (error instanceof VariableCountLimitReachedError) {
|
||||||
throw new BadRequestError(error.message);
|
throw new BadRequestError(error.message);
|
||||||
|
@ -48,9 +48,10 @@ export class VariablesController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Get('/:id')
|
@Get('/:id')
|
||||||
|
@RequireGlobalScope('variable:read')
|
||||||
async getVariable(req: VariablesRequest.Get) {
|
async getVariable(req: VariablesRequest.Get) {
|
||||||
const id = req.params.id;
|
const id = req.params.id;
|
||||||
const variable = await Container.get(VariablesService).getCached(id);
|
const variable = await this.variablesService.getCached(id);
|
||||||
if (variable === null) {
|
if (variable === null) {
|
||||||
throw new NotFoundError(`Variable with id ${req.params.id} not found`);
|
throw new NotFoundError(`Variable with id ${req.params.id} not found`);
|
||||||
}
|
}
|
||||||
|
@ -59,19 +60,13 @@ export class VariablesController {
|
||||||
|
|
||||||
@Patch('/:id')
|
@Patch('/:id')
|
||||||
@Licensed('feat:variables')
|
@Licensed('feat:variables')
|
||||||
|
@RequireGlobalScope('variable:update')
|
||||||
async updateVariable(req: VariablesRequest.Update) {
|
async updateVariable(req: VariablesRequest.Update) {
|
||||||
const id = req.params.id;
|
const id = req.params.id;
|
||||||
if (req.user.globalRole.name !== 'owner') {
|
|
||||||
this.logger.info('Attempt to update a variable blocked due to lack of permissions', {
|
|
||||||
id,
|
|
||||||
userId: req.user.id,
|
|
||||||
});
|
|
||||||
throw new UnauthorizedError('Unauthorized');
|
|
||||||
}
|
|
||||||
const variable = req.body;
|
const variable = req.body;
|
||||||
delete variable.id;
|
delete variable.id;
|
||||||
try {
|
try {
|
||||||
return await Container.get(VariablesService).update(id, variable);
|
return await this.variablesService.update(id, variable);
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
if (error instanceof VariableCountLimitReachedError) {
|
if (error instanceof VariableCountLimitReachedError) {
|
||||||
throw new BadRequestError(error.message);
|
throw new BadRequestError(error.message);
|
||||||
|
@ -82,16 +77,10 @@ export class VariablesController {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Delete('/:id')
|
@Delete('/:id(\\w+)')
|
||||||
|
@RequireGlobalScope('variable:delete')
|
||||||
async deleteVariable(req: VariablesRequest.Delete) {
|
async deleteVariable(req: VariablesRequest.Delete) {
|
||||||
const id = req.params.id;
|
const id = req.params.id;
|
||||||
if (req.user.globalRole.name !== 'owner') {
|
|
||||||
this.logger.info('Attempt to delete a variable blocked due to lack of permissions', {
|
|
||||||
id,
|
|
||||||
userId: req.user.id,
|
|
||||||
});
|
|
||||||
throw new UnauthorizedError('Unauthorized');
|
|
||||||
}
|
|
||||||
await this.variablesService.delete(id);
|
await this.variablesService.delete(id);
|
||||||
|
|
||||||
return true;
|
return true;
|
||||||
|
|
|
@ -14,7 +14,7 @@ import type {
|
||||||
MessageEventBusDestinationOptions,
|
MessageEventBusDestinationOptions,
|
||||||
} from 'n8n-workflow';
|
} from 'n8n-workflow';
|
||||||
import { MessageEventBusDestinationTypeNames } from 'n8n-workflow';
|
import { MessageEventBusDestinationTypeNames } from 'n8n-workflow';
|
||||||
import { RestController, Get, Post, Delete, Authorized } from '@/decorators';
|
import { RestController, Get, Post, Delete, Authorized, RequireGlobalScope } from '@/decorators';
|
||||||
import type { MessageEventBusDestination } from './MessageEventBusDestination/MessageEventBusDestination.ee';
|
import type { MessageEventBusDestination } from './MessageEventBusDestination/MessageEventBusDestination.ee';
|
||||||
import type { DeleteResult } from 'typeorm';
|
import type { DeleteResult } from 'typeorm';
|
||||||
import { AuthenticatedRequest } from '@/requests';
|
import { AuthenticatedRequest } from '@/requests';
|
||||||
|
@ -59,6 +59,7 @@ export class EventBusControllerEE {
|
||||||
// ----------------------------------------
|
// ----------------------------------------
|
||||||
|
|
||||||
@Get('/destination', { middlewares: [logStreamingLicensedMiddleware] })
|
@Get('/destination', { middlewares: [logStreamingLicensedMiddleware] })
|
||||||
|
@RequireGlobalScope('eventBusDestination:list')
|
||||||
async getDestination(req: express.Request): Promise<MessageEventBusDestinationOptions[]> {
|
async getDestination(req: express.Request): Promise<MessageEventBusDestinationOptions[]> {
|
||||||
if (isWithIdString(req.query)) {
|
if (isWithIdString(req.query)) {
|
||||||
return eventBus.findDestination(req.query.id);
|
return eventBus.findDestination(req.query.id);
|
||||||
|
@ -67,8 +68,8 @@ export class EventBusControllerEE {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Post('/destination', { middlewares: [logStreamingLicensedMiddleware] })
|
@Post('/destination', { middlewares: [logStreamingLicensedMiddleware] })
|
||||||
|
@RequireGlobalScope('eventBusDestination:create')
|
||||||
async postDestination(req: AuthenticatedRequest): Promise<any> {
|
async postDestination(req: AuthenticatedRequest): Promise<any> {
|
||||||
let result: MessageEventBusDestination | undefined;
|
let result: MessageEventBusDestination | undefined;
|
||||||
if (isMessageEventBusDestinationOptions(req.body)) {
|
if (isMessageEventBusDestinationOptions(req.body)) {
|
||||||
|
@ -112,6 +113,7 @@ export class EventBusControllerEE {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Get('/testmessage', { middlewares: [logStreamingLicensedMiddleware] })
|
@Get('/testmessage', { middlewares: [logStreamingLicensedMiddleware] })
|
||||||
|
@RequireGlobalScope('eventBusDestination:test')
|
||||||
async sendTestMessage(req: express.Request): Promise<boolean> {
|
async sendTestMessage(req: express.Request): Promise<boolean> {
|
||||||
if (isWithIdString(req.query)) {
|
if (isWithIdString(req.query)) {
|
||||||
return eventBus.testDestination(req.query.id);
|
return eventBus.testDestination(req.query.id);
|
||||||
|
@ -119,8 +121,8 @@ export class EventBusControllerEE {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Delete('/destination', { middlewares: [logStreamingLicensedMiddleware] })
|
@Delete('/destination', { middlewares: [logStreamingLicensedMiddleware] })
|
||||||
|
@RequireGlobalScope('eventBusDestination:delete')
|
||||||
async deleteDestination(req: AuthenticatedRequest): Promise<DeleteResult | undefined> {
|
async deleteDestination(req: AuthenticatedRequest): Promise<DeleteResult | undefined> {
|
||||||
if (isWithIdString(req.query)) {
|
if (isWithIdString(req.query)) {
|
||||||
return eventBus.removeDestination(req.query.id);
|
return eventBus.removeDestination(req.query.id);
|
||||||
|
|
|
@ -14,7 +14,7 @@ import { EventMessageTypeNames } from 'n8n-workflow';
|
||||||
import type { EventMessageNodeOptions } from './EventMessageClasses/EventMessageNode';
|
import type { EventMessageNodeOptions } from './EventMessageClasses/EventMessageNode';
|
||||||
import { EventMessageNode } from './EventMessageClasses/EventMessageNode';
|
import { EventMessageNode } from './EventMessageClasses/EventMessageNode';
|
||||||
import { recoverExecutionDataFromEventLogMessages } from './MessageEventBus/recoverEvents';
|
import { recoverExecutionDataFromEventLogMessages } from './MessageEventBus/recoverEvents';
|
||||||
import { RestController, Get, Post, Authorized } from '@/decorators';
|
import { RestController, Get, Post, Authorized, RequireGlobalScope } from '@/decorators';
|
||||||
import { BadRequestError } from '@/errors/response-errors/bad-request.error';
|
import { BadRequestError } from '@/errors/response-errors/bad-request.error';
|
||||||
|
|
||||||
// ----------------------------------------
|
// ----------------------------------------
|
||||||
|
@ -37,8 +37,8 @@ export class EventBusController {
|
||||||
// ----------------------------------------
|
// ----------------------------------------
|
||||||
// Events
|
// Events
|
||||||
// ----------------------------------------
|
// ----------------------------------------
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Get('/event')
|
@Get('/event')
|
||||||
|
@RequireGlobalScope('eventBusEvent:query')
|
||||||
async getEvents(
|
async getEvents(
|
||||||
req: express.Request,
|
req: express.Request,
|
||||||
): Promise<EventMessageTypes[] | Record<string, EventMessageTypes[]>> {
|
): Promise<EventMessageTypes[] | Record<string, EventMessageTypes[]>> {
|
||||||
|
@ -60,12 +60,14 @@ export class EventBusController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Get('/failed')
|
@Get('/failed')
|
||||||
|
@RequireGlobalScope('eventBusEvent:list')
|
||||||
async getFailedEvents(req: express.Request): Promise<FailedEventSummary[]> {
|
async getFailedEvents(req: express.Request): Promise<FailedEventSummary[]> {
|
||||||
const amount = parseInt(req.query?.amount as string) ?? 5;
|
const amount = parseInt(req.query?.amount as string) ?? 5;
|
||||||
return eventBus.getEventsFailed(amount);
|
return eventBus.getEventsFailed(amount);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Get('/execution/:id')
|
@Get('/execution/:id')
|
||||||
|
@RequireGlobalScope('eventBusEvent:read')
|
||||||
async getEventForExecutionId(req: express.Request): Promise<EventMessageTypes[] | undefined> {
|
async getEventForExecutionId(req: express.Request): Promise<EventMessageTypes[] | undefined> {
|
||||||
if (req.params?.id) {
|
if (req.params?.id) {
|
||||||
let logHistory;
|
let logHistory;
|
||||||
|
@ -78,6 +80,7 @@ export class EventBusController {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Get('/execution-recover/:id')
|
@Get('/execution-recover/:id')
|
||||||
|
@RequireGlobalScope('eventBusEvent:read')
|
||||||
async getRecoveryForExecutionId(req: express.Request): Promise<IRunExecutionData | undefined> {
|
async getRecoveryForExecutionId(req: express.Request): Promise<IRunExecutionData | undefined> {
|
||||||
const { id } = req.params;
|
const { id } = req.params;
|
||||||
if (req.params?.id) {
|
if (req.params?.id) {
|
||||||
|
@ -91,8 +94,8 @@ export class EventBusController {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Post('/event')
|
@Post('/event')
|
||||||
|
@RequireGlobalScope('eventBusEvent:create')
|
||||||
async postEvent(req: express.Request): Promise<EventMessageTypes | undefined> {
|
async postEvent(req: express.Request): Promise<EventMessageTypes | undefined> {
|
||||||
let msg: EventMessageTypes | undefined;
|
let msg: EventMessageTypes | undefined;
|
||||||
if (isEventMessageOptions(req.body)) {
|
if (isEventMessageOptions(req.body)) {
|
||||||
|
|
|
@ -7,11 +7,17 @@ export const ownerPermissions: Scope[] = [
|
||||||
'workflow:delete',
|
'workflow:delete',
|
||||||
'workflow:list',
|
'workflow:list',
|
||||||
'workflow:share',
|
'workflow:share',
|
||||||
|
'tag:create',
|
||||||
|
'tag:read',
|
||||||
|
'tag:update',
|
||||||
|
'tag:delete',
|
||||||
|
'tag:list',
|
||||||
'user:create',
|
'user:create',
|
||||||
'user:read',
|
'user:read',
|
||||||
'user:update',
|
'user:update',
|
||||||
'user:delete',
|
'user:delete',
|
||||||
'user:list',
|
'user:list',
|
||||||
|
'user:resetPassword',
|
||||||
'credential:create',
|
'credential:create',
|
||||||
'credential:read',
|
'credential:read',
|
||||||
'credential:update',
|
'credential:update',
|
||||||
|
@ -26,17 +32,35 @@ export const ownerPermissions: Scope[] = [
|
||||||
'sourceControl:pull',
|
'sourceControl:pull',
|
||||||
'sourceControl:push',
|
'sourceControl:push',
|
||||||
'sourceControl:manage',
|
'sourceControl:manage',
|
||||||
'externalSecretsStore:create',
|
'externalSecretsProvider:create',
|
||||||
'externalSecretsStore:read',
|
'externalSecretsProvider:read',
|
||||||
'externalSecretsStore:update',
|
'externalSecretsProvider:update',
|
||||||
'externalSecretsStore:delete',
|
'externalSecretsProvider:delete',
|
||||||
'externalSecretsStore:list',
|
'externalSecretsProvider:list',
|
||||||
'externalSecretsStore:refresh',
|
'externalSecretsProvider:sync',
|
||||||
'tag:create',
|
'externalSecret:list',
|
||||||
'tag:read',
|
'orchestration:read',
|
||||||
'tag:update',
|
'orchestration:list',
|
||||||
'tag:delete',
|
'communityPackage:install',
|
||||||
'tag:list',
|
'communityPackage:uninstall',
|
||||||
|
'communityPackage:update',
|
||||||
|
'communityPackage:list',
|
||||||
|
'ldap:manage',
|
||||||
|
'ldap:sync',
|
||||||
|
'saml:manage',
|
||||||
|
'eventBusEvent:create',
|
||||||
|
'eventBusEvent:read',
|
||||||
|
'eventBusEvent:update',
|
||||||
|
'eventBusEvent:delete',
|
||||||
|
'eventBusEvent:list',
|
||||||
|
'eventBusEvent:query',
|
||||||
|
'eventBusEvent:create',
|
||||||
|
'eventBusDestination:create',
|
||||||
|
'eventBusDestination:read',
|
||||||
|
'eventBusDestination:update',
|
||||||
|
'eventBusDestination:delete',
|
||||||
|
'eventBusDestination:list',
|
||||||
|
'eventBusDestination:test',
|
||||||
];
|
];
|
||||||
export const adminPermissions: Scope[] = ownerPermissions.concat();
|
export const adminPermissions: Scope[] = ownerPermissions.concat();
|
||||||
export const memberPermissions: Scope[] = [
|
export const memberPermissions: Scope[] = [
|
||||||
|
@ -47,4 +71,8 @@ export const memberPermissions: Scope[] = [
|
||||||
'tag:read',
|
'tag:read',
|
||||||
'tag:update',
|
'tag:update',
|
||||||
'tag:list',
|
'tag:list',
|
||||||
|
'eventBusEvent:list',
|
||||||
|
'eventBusEvent:read',
|
||||||
|
'eventBusDestination:list',
|
||||||
|
'eventBusDestination:test',
|
||||||
];
|
];
|
||||||
|
|
|
@ -1,7 +1,14 @@
|
||||||
import express from 'express';
|
import express from 'express';
|
||||||
import { Container, Service } from 'typedi';
|
import { Container, Service } from 'typedi';
|
||||||
import { getInstanceBaseUrl } from '@/UserManagement/UserManagementHelper';
|
import { getInstanceBaseUrl } from '@/UserManagement/UserManagementHelper';
|
||||||
import { Authorized, Get, NoAuthRequired, Post, RestController } from '@/decorators';
|
import {
|
||||||
|
Authorized,
|
||||||
|
Get,
|
||||||
|
NoAuthRequired,
|
||||||
|
Post,
|
||||||
|
RestController,
|
||||||
|
RequireGlobalScope,
|
||||||
|
} from '@/decorators';
|
||||||
import { SamlUrls } from '../constants';
|
import { SamlUrls } from '../constants';
|
||||||
import {
|
import {
|
||||||
samlLicensedAndEnabledMiddleware,
|
samlLicensedAndEnabledMiddleware,
|
||||||
|
@ -30,6 +37,7 @@ import { BadRequestError } from '@/errors/response-errors/bad-request.error';
|
||||||
import { AuthError } from '@/errors/response-errors/auth.error';
|
import { AuthError } from '@/errors/response-errors/auth.error';
|
||||||
|
|
||||||
@Service()
|
@Service()
|
||||||
|
@Authorized()
|
||||||
@RestController('/sso/saml')
|
@RestController('/sso/saml')
|
||||||
export class SamlController {
|
export class SamlController {
|
||||||
constructor(private samlService: SamlService) {}
|
constructor(private samlService: SamlService) {}
|
||||||
|
@ -61,8 +69,8 @@ export class SamlController {
|
||||||
* POST /sso/saml/config
|
* POST /sso/saml/config
|
||||||
* Set SAML config
|
* Set SAML config
|
||||||
*/
|
*/
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Post(SamlUrls.config, { middlewares: [samlLicensedMiddleware] })
|
@Post(SamlUrls.config, { middlewares: [samlLicensedMiddleware] })
|
||||||
|
@RequireGlobalScope('saml:manage')
|
||||||
async configPost(req: SamlConfiguration.Update) {
|
async configPost(req: SamlConfiguration.Update) {
|
||||||
const validationResult = await validate(req.body);
|
const validationResult = await validate(req.body);
|
||||||
if (validationResult.length === 0) {
|
if (validationResult.length === 0) {
|
||||||
|
@ -80,8 +88,8 @@ export class SamlController {
|
||||||
* POST /sso/saml/config/toggle
|
* POST /sso/saml/config/toggle
|
||||||
* Set SAML config
|
* Set SAML config
|
||||||
*/
|
*/
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Post(SamlUrls.configToggleEnabled, { middlewares: [samlLicensedMiddleware] })
|
@Post(SamlUrls.configToggleEnabled, { middlewares: [samlLicensedMiddleware] })
|
||||||
|
@RequireGlobalScope('saml:manage')
|
||||||
async toggleEnabledPost(req: SamlConfiguration.Toggle, res: express.Response) {
|
async toggleEnabledPost(req: SamlConfiguration.Toggle, res: express.Response) {
|
||||||
if (req.body.loginEnabled === undefined) {
|
if (req.body.loginEnabled === undefined) {
|
||||||
throw new BadRequestError('Body should contain a boolean "loginEnabled" property');
|
throw new BadRequestError('Body should contain a boolean "loginEnabled" property');
|
||||||
|
@ -196,8 +204,8 @@ export class SamlController {
|
||||||
* Test SAML config
|
* Test SAML config
|
||||||
* This endpoint is available if SAML is licensed and the requestor is an instance owner
|
* This endpoint is available if SAML is licensed and the requestor is an instance owner
|
||||||
*/
|
*/
|
||||||
@Authorized(['global', 'owner'])
|
|
||||||
@Get(SamlUrls.configTest, { middlewares: [samlLicensedMiddleware] })
|
@Get(SamlUrls.configTest, { middlewares: [samlLicensedMiddleware] })
|
||||||
|
@RequireGlobalScope('saml:manage')
|
||||||
async configTestGet(req: AuthenticatedRequest, res: express.Response) {
|
async configTestGet(req: AuthenticatedRequest, res: express.Response) {
|
||||||
return this.handleInitSSO(res, getServiceProviderConfigTestReturnUrl());
|
return this.handleInitSSO(res, getServiceProviderConfigTestReturnUrl());
|
||||||
}
|
}
|
||||||
|
|
|
@ -109,8 +109,7 @@ EEWorkflowController.get(
|
||||||
}
|
}
|
||||||
|
|
||||||
const userSharing = workflow.shared?.find((shared) => shared.user.id === req.user.id);
|
const userSharing = workflow.shared?.find((shared) => shared.user.id === req.user.id);
|
||||||
|
if (!userSharing && !(await req.user.hasGlobalScope('workflow:read'))) {
|
||||||
if (!userSharing && req.user.globalRole.name !== 'owner') {
|
|
||||||
throw new UnauthorizedError(
|
throw new UnauthorizedError(
|
||||||
'You do not have permission to access this workflow. Ask the owner to share it with you',
|
'You do not have permission to access this workflow. Ask the owner to share it with you',
|
||||||
);
|
);
|
||||||
|
|
Loading…
Reference in a new issue