-
Notifications
You must be signed in to change notification settings - Fork 169
feat: Implement querying openedx-authz for publish permissions #2685
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
feat: Implement querying openedx-authz for publish permissions #2685
Conversation
|
Thanks for the pull request, @rodmgwgu! This repository is currently maintained by Once you've gone through the following steps feel free to tag them in a comment and let them know that your changes are ready for engineering review. 🔘 Get product approvalIf you haven't already, check this list to see if your contribution needs to go through the product review process.
🔘 Provide contextTo help your reviewers and other members of the community understand the purpose and larger context of your changes, feel free to add as much of the following information to the PR description as you can:
🔘 Get a green buildIf one or more checks are failing, continue working on your changes until this is no longer the case and your build turns green. Where can I find more information?If you'd like to get more details on all aspects of the review process for open source pull requests (OSPRs), check out the following resources: When can I expect my changes to be merged?Our goal is to get community contributions seen and reviewed as efficiently as possible. However, the amount of time that it takes to review and merge a PR can vary significantly based on factors such as:
💡 As a result it may take up to several weeks or months to complete a review and merge your PR. |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #2685 +/- ##
==========================================
+ Coverage 94.85% 94.86% +0.01%
==========================================
Files 1232 1237 +5
Lines 27899 27964 +65
Branches 6316 6152 -164
==========================================
+ Hits 26464 26529 +65
- Misses 1364 1377 +13
+ Partials 71 58 -13 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
MaferMazu
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @rodmgwgu, I tested in a Ulmo env, and it works as expected! ✨
The code looks good to me, but I would prefer someone with more frontend skills to help with a review as well.
src/authz/data/apiHooks.ts
Outdated
| import { validateUserPermissions } from './api'; | ||
|
|
||
| const adminConsoleQueryKeys = { | ||
| all: [appId] as const, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am not sure if the appId value follows the same pattern used for query keys, i have see mostly camelCase values.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
changed, thanks!
| const permissions = LIBRARY_PERMISSIONS.map(action => ({ action, scope: libraryId })); | ||
|
|
||
| const { isLoading: isLoadingUserPermissions, data: userPermissions } = useValidateUserPermissions(permissions); | ||
| const canPublish = userPermissions ? userPermissions[0]?.allowed : false; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Something we could improve is being explicit about the action we are requesting instead of using userPermissions[0].
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
According to the ADR, the API guarantees that the order of the response will match the requested permissions, that's why I'm not trying to match it explicitly.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I didn't know about the order 🤔
The suggestion was more about readability and clarity regarding the permission I am requesting, and I still think it is important. Since that index depends on the order of the elements in LIBRARY_PERMISSIONS, if that list grows, I don't think it will be clear enough to use only the indexes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1. Also, hard-coding 0 here means that this code would become wrong if someone else changed the order of the LIBRARY_PERMISSIONS constant. Which could definitely happen, and then there would be a security hole.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am thinking about this issue: openedx/openedx-authz#144. I haven't refined it yet, but I would probably need to add more params to the request to see other permissions.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would suggest an API like this (no change to the REST API or the internal arrays, just implement some helper logic in the hook to support this):
const possiblePermissions = {
canPublish: CONTENT_LIBRARY_PERMISSIONS.PUBLISH_LIBRARY_CONTENT,
];
const {
isLoading: isLoadingUserPermissions,
data: userPermissions,
} = useScopedUserPermissions(possiblePermissions, { scope: libraryId });
// API is useScopedUserPermissions(actions object, extra fields to mix in);
const canPublish = userPermissions?.canPublish;
// or
const canPublish = userPermissions?.canPublish.allowed; // (this is more verbose, and requiring these creates security bugs whenever users forget to include `.allowed`, but if you know there will likely be other fields besides .allowed in the future, it's better to be more verbose now)a501e16 to
f7c566f
Compare
Sounds good. I think it would be great to have this in frontend-base.
Your approach seems fine, but we shouldn't have tests that break just because another axios call/mock was introduced. Were there many such cases? Usually axios mocks only mock one specific endpoint, and the asserts should be made on that same endpoint-specific mock. |
| * if (data[0].allowed) { ... } | ||
| * | ||
| */ | ||
| export const useValidateUserPermissions = ( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is minor/optional feedback about the name of this hook:
To me, "validate user permissions" sounds like an action, like it would throw an exception if the user doesn't have some permissions. But this is just fetching some data, not making an action.
I think "useScopedPermissions" or just "useUserPermissions" or something like that would better reflect that this is just getting the user permissions, but you still have to validate/check that they're allowed or not yourself.
| const LIBRARY_PERMISSIONS = [ | ||
| CONTENT_LIBRARY_PERMISSIONS.PUBLISH_LIBRARY_CONTENT, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LIBRARY_PERMISSIONS and CONTENT_LIBRARY_PERMISSIONS are basically the same name, so it's not very clear how they are different.
| const permissions = LIBRARY_PERMISSIONS.map(action => ({ action, scope: libraryId })); | ||
|
|
||
| const { isLoading: isLoadingUserPermissions, data: userPermissions } = useValidateUserPermissions(permissions); | ||
| const canPublish = userPermissions ? userPermissions[0]?.allowed : false; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would suggest an API like this (no change to the REST API or the internal arrays, just implement some helper logic in the hook to support this):
const possiblePermissions = {
canPublish: CONTENT_LIBRARY_PERMISSIONS.PUBLISH_LIBRARY_CONTENT,
];
const {
isLoading: isLoadingUserPermissions,
data: userPermissions,
} = useScopedUserPermissions(possiblePermissions, { scope: libraryId });
// API is useScopedUserPermissions(actions object, extra fields to mix in);
const canPublish = userPermissions?.canPublish;
// or
const canPublish = userPermissions?.canPublish.allowed; // (this is more verbose, and requiring these creates security bugs whenever users forget to include `.allowed`, but if you know there will likely be other fields besides .allowed in the future, it's better to be more verbose now)

Description
Related bug: openedx/openedx-authz#139
Adds validating publish permissions based on the new openedx-authz model.
Hook implementation mostly copied from frontend-app-admin-console
Context:
The new openedx-authz authorization model adds the possibility to have fine-grained permissions for different roles in the system. Currently, the MVP involves implementing these new roles over the Content Libraries only.
The new roles are:
The specific permissions for these roles can be found here.
The enforcement mechanism for MFEs as implemented in this PR is described here.
This change mainly concerns the new "Library Contributor" role, which should have permission to edit library content, but not to publish it. This was not taken into account on the previous permission model, because before, anyone with write permissions could publish. This change makes it possible to disable the Publish button for "Library Contributors" by using the new enforcement mechanism.
Screenshots:
Before changes, as a "Library Contributor" user, the Publish button was shown, but the action failed due to lack of permissions:
After changes, the Publish button is hidden:
Supporting information
Project: RBAC AuthZ
Related bug: openedx/openedx-authz#139
The enforcement mechanism for MFEs as implemented in this PR is described here.
Testing instructions
tutor dev do createuser nonstaff [email protected]Other information
I implemented the validateUserPermissions hook and it's related code as an independent module in src/authz, with the idea of externalizing it as a library in the near future, perhaps as a part of frontend-base?
Because of that, I'm not using the helpers in
src/testUtils.tsxon the hook tests.Concern: I'm mocking the validateUserPermissions API call (used by the validateUserPermissions hook) on the initializeMocks util, so it doesn't interfere with several tests that are checking against axios mocks without validating the request url. I'm not sure if this is the best practice or if there is a better way?
Best Practices Checklist
We're trying to move away from some deprecated patterns in this codebase. Please
check if your PR meets these recommendations before asking for a review:
.ts,.tsx).propTypesanddefaultPropsin any new or modified code.src/testUtils.tsx(specificallyinitializeMocks)apiHooks.tsin this repo for examples.messages.tsfiles have adescriptionfor translators to use.../in import paths. To import from parent folders, use@src, e.g.import { initializeMocks } from '@src/testUtils';instead offrom '../../../../testUtils'