feat: Implement permission catalog API endpoint
This commit is contained in:
@@ -0,0 +1,6 @@
|
|||||||
|
import { renderObject } from '../../../../../helpers/renderer.js';
|
||||||
|
import permissionCatalog from '../../../../../helpers/permission-catalog.ee.js';
|
||||||
|
|
||||||
|
export default async (request, response) => {
|
||||||
|
renderObject(response, permissionCatalog);
|
||||||
|
};
|
@@ -0,0 +1,32 @@
|
|||||||
|
import { vi, describe, it, expect, beforeEach } from 'vitest';
|
||||||
|
import request from 'supertest';
|
||||||
|
import app from '../../../../../app.js';
|
||||||
|
import createAuthTokenByUserId from '../../../../../helpers/create-auth-token-by-user-id.js';
|
||||||
|
import { createRole } from '../../../../../../test/factories/role.js';
|
||||||
|
import { createUser } from '../../../../../../test/factories/user.js';
|
||||||
|
import getPermissionsCatalogMock from '../../../../../../test/mocks/rest/api/v1/admin/permissions/get-permissions-catalog.ee.js';
|
||||||
|
import * as license from '../../../../../helpers/license.ee.js';
|
||||||
|
|
||||||
|
describe('GET /api/v1/admin/permissions/catalog', () => {
|
||||||
|
let role, currentUser, token;
|
||||||
|
|
||||||
|
beforeEach(async () => {
|
||||||
|
role = await createRole({ key: 'admin' });
|
||||||
|
currentUser = await createUser({ roleId: role.id });
|
||||||
|
|
||||||
|
token = createAuthTokenByUserId(currentUser.id);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return roles', async () => {
|
||||||
|
vi.spyOn(license, 'hasValidLicense').mockResolvedValue(true);
|
||||||
|
|
||||||
|
const response = await request(app)
|
||||||
|
.get('/api/v1/admin/permissions/catalog')
|
||||||
|
.set('Authorization', token)
|
||||||
|
.expect(200);
|
||||||
|
|
||||||
|
const expectedPayload = await getPermissionsCatalogMock();
|
||||||
|
|
||||||
|
expect(response.body).toEqual(expectedPayload);
|
||||||
|
});
|
||||||
|
});
|
17
packages/backend/src/routes/api/v1/admin/permissions.ee.js
Normal file
17
packages/backend/src/routes/api/v1/admin/permissions.ee.js
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
import { Router } from 'express';
|
||||||
|
import { authenticateUser } from '../../../../helpers/authentication.js';
|
||||||
|
import { authorizeAdmin } from '../../../../helpers/authorization.js';
|
||||||
|
import { checkIsEnterprise } from '../../../../helpers/check-is-enterprise.js';
|
||||||
|
import getPermissionsCatalogAction from '../../../../controllers/api/v1/admin/permissions/get-permissions-catalog.ee.js';
|
||||||
|
|
||||||
|
const router = Router();
|
||||||
|
|
||||||
|
router.get(
|
||||||
|
'/catalog',
|
||||||
|
authenticateUser,
|
||||||
|
authorizeAdmin,
|
||||||
|
checkIsEnterprise,
|
||||||
|
getPermissionsCatalogAction
|
||||||
|
);
|
||||||
|
|
||||||
|
export default router;
|
@@ -7,6 +7,7 @@ import automatischRouter from './api/v1/automatisch.js';
|
|||||||
import usersRouter from './api/v1/users.js';
|
import usersRouter from './api/v1/users.js';
|
||||||
import samlAuthProvidersRouter from './api/v1/admin/saml-auth-providers.ee.js';
|
import samlAuthProvidersRouter from './api/v1/admin/saml-auth-providers.ee.js';
|
||||||
import rolesRouter from './api/v1/admin/roles.ee.js';
|
import rolesRouter from './api/v1/admin/roles.ee.js';
|
||||||
|
import permissionsRouter from './api/v1/admin/permissions.ee.js';
|
||||||
|
|
||||||
const router = Router();
|
const router = Router();
|
||||||
|
|
||||||
@@ -18,5 +19,6 @@ router.use('/api/v1/automatisch', automatischRouter);
|
|||||||
router.use('/api/v1/users', usersRouter);
|
router.use('/api/v1/users', usersRouter);
|
||||||
router.use('/api/v1/admin/saml-auth-providers', samlAuthProvidersRouter);
|
router.use('/api/v1/admin/saml-auth-providers', samlAuthProvidersRouter);
|
||||||
router.use('/api/v1/admin/roles', rolesRouter);
|
router.use('/api/v1/admin/roles', rolesRouter);
|
||||||
|
router.use('/api/v1/admin/permissions', permissionsRouter);
|
||||||
|
|
||||||
export default router;
|
export default router;
|
||||||
|
@@ -1,4 +1,4 @@
|
|||||||
import permissionSerializer from './permission';
|
import permissionSerializer from './permission.js';
|
||||||
|
|
||||||
const roleSerializer = (role) => {
|
const roleSerializer = (role) => {
|
||||||
let roleData = {
|
let roleData = {
|
||||||
|
@@ -0,0 +1,64 @@
|
|||||||
|
const getPermissionsCatalogMock = async () => {
|
||||||
|
const data = {
|
||||||
|
actions: [
|
||||||
|
{
|
||||||
|
key: 'create',
|
||||||
|
label: 'Create',
|
||||||
|
subjects: ['Connection', 'Flow'],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
key: 'read',
|
||||||
|
label: 'Read',
|
||||||
|
subjects: ['Connection', 'Execution', 'Flow'],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
key: 'update',
|
||||||
|
label: 'Update',
|
||||||
|
subjects: ['Connection', 'Flow'],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
key: 'delete',
|
||||||
|
label: 'Delete',
|
||||||
|
subjects: ['Connection', 'Flow'],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
key: 'publish',
|
||||||
|
label: 'Publish',
|
||||||
|
subjects: ['Flow'],
|
||||||
|
},
|
||||||
|
],
|
||||||
|
conditions: [
|
||||||
|
{
|
||||||
|
key: 'isCreator',
|
||||||
|
label: 'Is creator',
|
||||||
|
},
|
||||||
|
],
|
||||||
|
subjects: [
|
||||||
|
{
|
||||||
|
key: 'Connection',
|
||||||
|
label: 'Connection',
|
||||||
|
},
|
||||||
|
{
|
||||||
|
key: 'Flow',
|
||||||
|
label: 'Flow',
|
||||||
|
},
|
||||||
|
{
|
||||||
|
key: 'Execution',
|
||||||
|
label: 'Execution',
|
||||||
|
},
|
||||||
|
],
|
||||||
|
};
|
||||||
|
|
||||||
|
return {
|
||||||
|
data: data,
|
||||||
|
meta: {
|
||||||
|
count: 1,
|
||||||
|
currentPage: null,
|
||||||
|
isArray: false,
|
||||||
|
totalPages: null,
|
||||||
|
type: 'Object',
|
||||||
|
},
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
export default getPermissionsCatalogMock;
|
Reference in New Issue
Block a user