Comments (11)
Another idea is add another flag to authorize: allow_undefined or something like this, which allow to skip context argument
authorize :attributes, allow_nil: true, allow_undefined: true
But i like your idea with rule arguments more.
from action_policy.
@somenugget Would you like to propose a PR?)
@palkan yep) will do it soon
from action_policy.
queries also start require attributes even if i made it nullable
Yep, that's a correct behaviour.
User input (attributes) should not affect authorization and could not be a part of authorization context.
What's is your use-case? What do you have in your edit?
rule?
from action_policy.
Some fields in my mutation can be edited only by users with certain roles. In policy i check if those fields changed and users have correct roles
from action_policy.
Some fields in my mutation can be edited only by users with certain roles
That sounds very similar to strong parameters. So, I suggest using filtering instead. Something like:
# mutation
def resolve(id:, attributes:)
record = Record.find(id)
# check that user has a right to perform this action
authorize! record, to: :do_something?
# make sure that user pass correct params
filtered_attributes = authorized_scope(attributes, type: :gql_input, with: RecordPolicy)
# do something with filtered_attributes
end
# policy
class RecordPolicy < ApplicationPolicy
scope_for :gql_input do |input|
# remove fields depending on the role/permissions
end
end
Another idea is to make it possible to authorize: true
input field:
class Attributes < GraphQL::Schema::InputObject
field :a, String, authorize: true
end
from action_policy.
If I filter mutation attributes, it will be unclear for api user why passed attributes not saving. I want to provide detailed reason of failure with "Failure Reasons" feature.
Authorising input fields is good idea but in some cases i anyway need to check attribute value if only some of values available for user
from action_policy.
Got it.
Then it seems that we need to think about adding support for rules arguments:
def rule?(args:)
# do smth
end
Not sure about the authorize!
API:
# allowing to pass arrays in `to:` ?
authorize! record, to: [:rule?, args: arguments]
# additional keyword argument ?
authorize! record, to: :rule?, with_args: {args: arguments}
from action_policy.
Another idea is add another flag to authorize: allow_undefined or something like this, which allow to skip context argument
authorize :attributes, allow_nil: true, allow_undefined: true
But i like your idea with rule arguments more.
Sounds like a good-first-issue
🙂
from action_policy.
Btw, I'm using this workaround
# frozen_string_literal: true
class ApplicationPolicy < ActionPolicy::Base
def initialize(*args, **params)
# allow to skip explicit passing {promotable: nil} if `authorize :promotable, allow_nil: true`
allowed_nil_params = self.class.authorization_targets.each_with_object({}) do |(target, options), nil_params|
nil_params[target] = nil if options[:allow_nil]
end
super(*args, **allowed_nil_params.merge(params))
end
end
from action_policy.
Sounds like a good-first-issue
Yeah)
We can add the following API in addition to the existing allow_nil: true
:
authorize :smith, optional: true
@somenugget Would you like to propose a PR?)
from action_policy.
Closed in favour of palkan/action_policy-graphql#24
from action_policy.
Related Issues (20)
- Add option to disable authorization context memoization HOT 12
- Add ability to authorize nil records if :with option is provided HOT 2
- NoMethodError: undefined method `params_filter' for MyPolicy:Class in tests HOT 1
- Authorizing fields based on params_filter HOT 1
- Unknown policy scope type :active_record_relation HOT 3
- Policy-generator not working with Ruby 3.2 HOT 1
- uninitialized constant ActionController::Parameters HOT 4
- I18n does not seem to work with I18n Active Record HOT 1
- How Do I Test Resource-less Authorize? HOT 1
- Add --parent option to policy generator HOT 2
- Update a documentation about #be_an_alias_of matcher HOT 2
- Documentation Contrast HOT 3
- Can't alias `create?` to `manage?` HOT 1
- Cannot use `controller_authorize_current_user` with `ActionPolicy::Base` HOT 1
- Rspec fails with v0.6.6 when `eager_load` is set to `true` HOT 13
- 0.6.7 breaks wrap_parameters HOT 3
- Policy lookup for authorized_scope returns default policy instead of using implicit authorization target HOT 3
- Add `with_context` qualifier to `have_authorized_scope` matcher. HOT 1
- Allow using callable objects as scopes HOT 1
- Migrate pretty print to Prism
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from action_policy.