diff --git a/packages/component-invite/config/authsome-helpers.js b/packages/component-invite/config/authsome-helpers.js new file mode 100644 index 0000000000000000000000000000000000000000..5b6633a6150b55db19f733b1ef65351640ae6ccb --- /dev/null +++ b/packages/component-invite/config/authsome-helpers.js @@ -0,0 +1,28 @@ +const omit = require('lodash/omit') +const config = require('config') +const get = require('lodash/get') + +const statuses = config.get('statuses') + +const publicStatusesPermissions = ['author', 'reviewer'] + +module.exports = { + parseReviewerAuthors: (coll, matchingCollPerm) => { + if (['reviewer'].includes(matchingCollPerm.permission)) { + coll.authors = coll.authors.map(a => omit(a, ['email'])) + } + }, + setPublicStatuses: (coll, matchingCollPerm) => { + const status = get(coll, 'status') || 'draft' + coll.visibleStatus = statuses[status].public + if (!publicStatusesPermissions.includes(matchingCollPerm.permission)) { + coll.visibleStatus = statuses[coll.status].private + } + }, + filterRefusedInvitations: (coll, user) => { + const matchingInv = coll.invitations.find(inv => inv.userId === user.id) + if (matchingInv === undefined) return null + if (matchingInv.hasAnswer === true && !matchingInv.isAccepted) return null + return coll + }, +} diff --git a/packages/component-invite/config/authsome-mode.js b/packages/component-invite/config/authsome-mode.js new file mode 100644 index 0000000000000000000000000000000000000000..3d3f15f68fc572760b30c203169dd71f40b1e43a --- /dev/null +++ b/packages/component-invite/config/authsome-mode.js @@ -0,0 +1,224 @@ +const get = require('lodash/get') +const pickBy = require('lodash/pickBy') +const omit = require('lodash/omit') +const helpers = require('./authsome-helpers') + +async function teamPermissions(user, operation, object, context) { + const permissions = ['handlingEditor', 'author', 'reviewer'] + const teams = await Promise.all( + user.teams.map(async teamId => { + const team = await context.models.Team.find(teamId) + if (permissions.includes(team.teamType.permissions)) { + return team + } + return null + }), + ) + + const collectionsPermissions = teams.filter(Boolean).map(team => ({ + id: team.object.id, + permission: team.teamType.permissions, + })) + + if (collectionsPermissions.length > 0) { + return { + filter: filterParam => { + if (!filterParam.length) return filterParam + + const collections = filterParam + .map(coll => { + const matchingCollPerm = collectionsPermissions.find( + collPerm => coll.id === collPerm.id, + ) + if (matchingCollPerm === undefined) { + return null + } + helpers.setPublicStatuses(coll, matchingCollPerm) + helpers.parseReviewerAuthors(coll, matchingCollPerm) + if ( + ['reviewer', 'handlingEditor'].includes( + matchingCollPerm.permission, + ) + ) { + return helpers.filterRefusedInvitations(coll, user) + } + return coll + }) + .filter(Boolean) + return collections + }, + } + } + + return {} +} + +function unauthenticatedUser(operation, object) { + // Public/unauthenticated users can GET /collections, filtered by 'published' + if (operation === 'GET' && object && object.path === '/collections') { + return { + filter: collections => + collections.filter(collection => collection.published), + } + } + + // Public/unauthenticated users can GET /collections/:id/fragments, filtered by 'published' + if ( + operation === 'GET' && + object && + object.path === '/collections/:id/fragments' + ) { + return { + filter: fragments => fragments.filter(fragment => fragment.published), + } + } + + // and filtered individual collection's properties: id, title, source, content, owners + if (operation === 'GET' && object && object.type === 'collection') { + if (object.published) { + return { + filter: collection => + pickBy(collection, (_, key) => + ['id', 'title', 'owners'].includes(key), + ), + } + } + } + + if (operation === 'GET' && object && object.type === 'fragment') { + if (object.published) { + return { + filter: fragment => + pickBy(fragment, (_, key) => + ['id', 'title', 'source', 'presentation', 'owners'].includes(key), + ), + } + } + } + + return false +} + +async function authenticatedUser(user, operation, object, context) { + // Allow the authenticated user to POST a collection (but not with a 'filtered' property) + if (operation === 'POST' && object.path === '/collections') { + return { + filter: collection => omit(collection, 'filtered'), + } + } + + // Allow the authenticated user to GET collections they own + if (operation === 'GET' && object === '/collections/') { + return { + filter: collection => collection.owners.includes(user.id), + } + } + + // Allow owners of a collection to GET its teams, e.g. + // GET /api/collections/1/teams + if (operation === 'GET' && get(object, 'path') === '/teams') { + const collectionId = get(object, 'params.collectionId') + if (collectionId) { + const collection = await context.models.Collection.find(collectionId) + if (collection.owners.includes(user.id)) { + return true + } + } + } + + if ( + operation === 'GET' && + get(object, 'type') === 'team' && + get(object, 'object.type') === 'collection' + ) { + const collection = await context.models.Collection.find( + get(object, 'object.id'), + ) + if (collection.owners.includes(user.id)) { + return true + } + } + + // Advanced example + // Allow authenticated users to create a team based around a collection + // if they are one of the owners of this collection + if (['POST', 'PATCH'].includes(operation) && get(object, 'type') === 'team') { + if (get(object, 'object.type') === 'collection') { + const collection = await context.models.Collection.find( + get(object, 'object.id'), + ) + if (collection.owners.includes(user.id)) { + return true + } + } + } + + // only allow the HE to create an invitation + if (operation === 'POST' && get(object, 'type') === 'collection') { + const collection = await context.models.Collection.find(get(object, 'id')) + if (collection.handlingEditor.id === user.id) { + return true + } + return false + } + + if (user.teams.length !== 0) { + const permissions = await teamPermissions(user, operation, object, context) + + if (permissions) { + return permissions + } + } + + if (get(object, 'type') === 'fragment') { + const fragment = object + + if (fragment.owners.includes(user.id)) { + return true + } + } + + if (get(object, 'type') === 'collection') { + if (['GET', 'DELETE'].includes(operation)) { + return true + } + + // Only allow filtered updating (mirroring filtered creation) for non-admin users) + if (operation === 'PATCH') { + return { + filter: collection => omit(collection, 'filtered'), + } + } + } + + // A user can GET, DELETE and PATCH itself + if (get(object, 'type') === 'user' && get(object, 'id') === user.id) { + if (['GET', 'DELETE', 'PATCH'].includes(operation)) { + return true + } + } + // If no individual permissions exist (above), fallback to unauthenticated + // user's permission + return unauthenticatedUser(operation, object) +} + +const authsomeMode = async (userId, operation, object, context) => { + if (!userId) { + return unauthenticatedUser(operation, object) + } + + // It's up to us to retrieve the relevant models for our + // authorization/authsome mode, e.g. + const user = await context.models.User.find(userId) + + // Admins and editor in chiefs can do anything + if (user && (user.admin === true || user.editorInChief === true)) return true + + if (user) { + return authenticatedUser(user, operation, object, context) + } + + return false +} + +module.exports = authsomeMode diff --git a/packages/component-invite/config/default.js b/packages/component-invite/config/default.js index 27fee757472f0eb6c28960974e260631de59a933..7afbb2f22c26d8ae4d9f314989bc4a02189360f7 100644 --- a/packages/component-invite/config/default.js +++ b/packages/component-invite/config/default.js @@ -1,4 +1,17 @@ +const path = require('path') + module.exports = { + authsome: { + mode: path.resolve(__dirname, 'authsome-mode.js'), + teams: { + handlingEditor: { + name: 'Handling Editors', + }, + reviewer: { + name: 'Reviewer', + }, + }, + }, mailer: { from: 'test@example.com', }, diff --git a/packages/component-invite/config/test.js b/packages/component-invite/config/test.js index b9d4165e677621eae6c9660f532d4332bb90d326..0eb54780a931f66f1b611d9a4d51552908ece2c3 100644 --- a/packages/component-invite/config/test.js +++ b/packages/component-invite/config/test.js @@ -1,4 +1,17 @@ +const path = require('path') + module.exports = { + authsome: { + mode: path.resolve(__dirname, 'authsome-mode.js'), + teams: { + handlingEditor: { + name: 'Handling Editors', + }, + reviewer: { + name: 'Reviewer', + }, + }, + }, mailer: { from: 'test@example.com', }, diff --git a/packages/component-invite/src/helpers/authsome.js b/packages/component-invite/src/helpers/authsome.js index 7ae32a08c8916d1388051a88a7fae7bef78a746d..212cee2a3ea23a424b1f77dde2f7dd4cf888b2a0 100644 --- a/packages/component-invite/src/helpers/authsome.js +++ b/packages/component-invite/src/helpers/authsome.js @@ -3,6 +3,27 @@ const Authsome = require('authsome') const mode = require(config.get('authsome.mode')) -const authsome = new Authsome({ ...config.authsome, mode }, {}) +const getAuthsome = models => + new Authsome( + { ...config.authsome, mode }, + { + // restrict methods passed to mode since these have to be shimmed on client + // any changes here should be reflected in the `withAuthsome` component of `pubsweet-client` + models: { + Collection: { + find: id => models.Collection.find(id), + }, + Fragment: { + find: id => models.Fragment.find(id), + }, + User: { + find: id => models.User.find(id), + }, + Team: { + find: id => models.Team.find(id), + }, + }, + }, + ) -module.exports = authsome +module.exports = { getAuthsome } diff --git a/packages/component-invite/src/routes/collectionsInvitations/post.js b/packages/component-invite/src/routes/collectionsInvitations/post.js index 73a588a3be1b40554dd9d6d9bebc11a042e6ff16..3775cd1105c77359de6202fff7716a47e12c11f2 100644 --- a/packages/component-invite/src/routes/collectionsInvitations/post.js +++ b/packages/component-invite/src/routes/collectionsInvitations/post.js @@ -7,6 +7,7 @@ const config = require('config') const mailService = require('pubsweet-component-mail-service') const userHelper = require('../../helpers/User') const invitationHelper = require('../../helpers/Invitation') +const authsomeHelper = require('../../helpers/authsome') const configRoles = config.get('roles') @@ -25,6 +26,8 @@ module.exports = models => async (req, res) => { return } const reqUser = await models.User.find(req.user) + const authsome = authsomeHelper.getAuthsome(models) + if (email === reqUser.email && !reqUser.admin) { logger.error(`${reqUser.email} tried to invite his own email`) return res.status(400).json({ error: 'Cannot invite yourself' }) @@ -41,6 +44,11 @@ module.exports = models => async (req, res) => { }) } + const canPost = await authsome.can(req.user, 'POST', collection) + if (!canPost) + return res.status(403).json({ + error: 'Unauthorized.', + }) const baseUrl = `${req.protocol}://${req.get('host')}` const params = { baseUrl, diff --git a/packages/component-invite/src/tests/collectionsInvitations/post.test.js b/packages/component-invite/src/tests/collectionsInvitations/post.test.js index f15832969d072bcb9715572b352229b503d8e059..ec7524458eec88eeed58cb2523243bfaf33acbf3 100644 --- a/packages/component-invite/src/tests/collectionsInvitations/post.test.js +++ b/packages/component-invite/src/tests/collectionsInvitations/post.test.js @@ -156,4 +156,20 @@ describe('Post collections invitations route handler', () => { `User has already replied to a previous invitation.`, ) }) + it('should return an error when the user does not have invitation rights', async () => { + const { author } = testFixtures.users + const { collection } = testFixtures.collections + + const req = httpMocks.createRequest({ + body, + }) + req.user = author.id + req.params.collectionId = collection.id + const res = httpMocks.createResponse() + await require(postPath)(models)(req, res) + + expect(res.statusCode).toBe(403) + const data = JSON.parse(res._getData()) + expect(data.error).toEqual('Unauthorized.') + }) }) diff --git a/packages/xpub-faraday/config/authsome-mode.js b/packages/xpub-faraday/config/authsome-mode.js index ac3198fe9a0a7f7ad6101fd96e3325ad5422a78f..3d3f15f68fc572760b30c203169dd71f40b1e43a 100644 --- a/packages/xpub-faraday/config/authsome-mode.js +++ b/packages/xpub-faraday/config/authsome-mode.js @@ -153,6 +153,15 @@ async function authenticatedUser(user, operation, object, context) { } } + // only allow the HE to create an invitation + if (operation === 'POST' && get(object, 'type') === 'collection') { + const collection = await context.models.Collection.find(get(object, 'id')) + if (collection.handlingEditor.id === user.id) { + return true + } + return false + } + if (user.teams.length !== 0) { const permissions = await teamPermissions(user, operation, object, context)