-
Notifications
You must be signed in to change notification settings - Fork 169
feat: Implement querying openedx-authz for publish permissions #2685
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
feat: Implement querying openedx-authz for publish permissions #2685
Conversation
|
Thanks for the pull request, @rodmgwgu! This repository is currently maintained by Once you've gone through the following steps feel free to tag them in a comment and let them know that your changes are ready for engineering review. 🔘 Get product approvalIf you haven't already, check this list to see if your contribution needs to go through the product review process.
🔘 Provide contextTo help your reviewers and other members of the community understand the purpose and larger context of your changes, feel free to add as much of the following information to the PR description as you can:
🔘 Get a green buildIf one or more checks are failing, continue working on your changes until this is no longer the case and your build turns green. Where can I find more information?If you'd like to get more details on all aspects of the review process for open source pull requests (OSPRs), check out the following resources: When can I expect my changes to be merged?Our goal is to get community contributions seen and reviewed as efficiently as possible. However, the amount of time that it takes to review and merge a PR can vary significantly based on factors such as:
💡 As a result it may take up to several weeks or months to complete a review and merge your PR. |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #2685 +/- ##
=======================================
Coverage 94.85% 94.86%
=======================================
Files 1232 1236 +4
Lines 27899 27925 +26
Branches 6316 6324 +8
=======================================
+ Hits 26464 26490 +26
Misses 1364 1364
Partials 71 71 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
MaferMazu
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @rodmgwgu, I tested in a Ulmo env, and it works as expected! ✨
The code looks good to me, but I would prefer someone with more frontend skills to help with a review as well.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Normally the file for the react query hooks on this repo is called apiHooks.ts. Could you rename it to keep consistency?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done, thanks!
| import { validateUserPermissions } from './api'; | ||
|
|
||
| const adminConsoleQueryKeys = { | ||
| all: [appId] as const, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am not sure if the appId value follows the same pattern used for query keys, i have see mostly camelCase values.
| const permissions = LIBRARY_PERMISSIONS.map(action => ({ action, scope: libraryId })); | ||
|
|
||
| const { isLoading: isLoadingUserPermissions, data: userPermissions } = useValidateUserPermissions(permissions); | ||
| const canPublish = userPermissions ? userPermissions[0]?.allowed : false; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Something we could improve is being explicit about the action we are requesting instead of using userPermissions[0].
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
According to the ADR, the API guarantees that the order of the response will match the requested permissions, that's why I'm not trying to match it explicitly.
a501e16 to
f7c566f
Compare


Description
Related bug: openedx/openedx-authz#139
Adds validating publish permissions based on the new openedx-authz model.
Hook implementation mostly copied from frontend-app-admin-console
Context:
The new openedx-authz authorization model adds the possibility to have fine-grained permissions for different roles in the system. Currently, the MVP involves implementing these new roles over the Content Libraries only.
The new roles are:
The specific permissions for these roles can be found here.
The enforcement mechanism for MFEs as implemented in this PR is described here.
This change mainly concerns the new "Library Contributor" role, which should have permission to edit library content, but not to publish it. This was not taken into account on the previous permission model, because before, anyone with write permissions could publish. This change makes it possible to disable the Publish button for "Library Contributors" by using the new enforcement mechanism.
Screenshots:
Before changes, as a "Library Contributor" user, the Publish button was shown, but the action failed due to lack of permissions:
After changes, the Publish button is hidden:
Supporting information
Project: RBAC AuthZ
Related bug: openedx/openedx-authz#139
The enforcement mechanism for MFEs as implemented in this PR is described here.
Testing instructions
tutor dev do createuser nonstaff [email protected]Other information
I implemented the validateUserPermissions hook and it's related code as an independent module in src/authz, with the idea of externalizing it as a library in the near future, perhaps as a part of frontend-base?
Because of that, I'm not using the helpers in
src/testUtils.tsxon the hook tests.Concern: I'm mocking the validateUserPermissions API call (used by the validateUserPermissions hook) on the initializeMocks util, so it doesn't interfere with several tests that are checking against axios mocks without validating the request url. I'm not sure if this is the best practice or if there is a better way?
Best Practices Checklist
We're trying to move away from some deprecated patterns in this codebase. Please
check if your PR meets these recommendations before asking for a review:
.ts,.tsx).propTypesanddefaultPropsin any new or modified code.src/testUtils.tsx(specificallyinitializeMocks)apiHooks.tsin this repo for examples.messages.tsfiles have adescriptionfor translators to use.../in import paths. To import from parent folders, use@src, e.g.import { initializeMocks } from '@src/testUtils';instead offrom '../../../../testUtils'