mirror of
https://github.com/ent/ent.git
synced 2026-05-24 09:31:56 +03:00
entc/gen/privacy: adding OnMutationOperation helper (#464)
Signed-off-by: Alex Snast <alexsn@fb.com>
This commit is contained in:
@@ -54,11 +54,11 @@ func DecisionContext(parent context.Context, decision error) context.Context {
|
||||
}
|
||||
|
||||
func decisionFromContext(ctx context.Context) (error, bool) {
|
||||
err, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(err, Allow) {
|
||||
err = nil
|
||||
decision, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(decision, Allow) {
|
||||
decision = nil
|
||||
}
|
||||
return err, ok
|
||||
return decision, ok
|
||||
}
|
||||
|
||||
type (
|
||||
@@ -74,16 +74,16 @@ type (
|
||||
|
||||
// EvalQuery evaluates a query against a query policy.
|
||||
func (policy QueryPolicy) EvalQuery(ctx context.Context, q ent.Query) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalQuery(ctx, q); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalQuery(ctx, q); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -111,16 +111,16 @@ type (
|
||||
|
||||
// EvalMutation evaluates a mutation against a mutation policy.
|
||||
func (policy MutationPolicy) EvalMutation(ctx context.Context, m ent.Mutation) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalMutation(ctx, m); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalMutation(ctx, m); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -159,29 +159,44 @@ type QueryMutationRule interface {
|
||||
|
||||
// AlwaysAllowRule returns a rule that returns an allow decision.
|
||||
func AlwaysAllowRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Allow}
|
||||
return fixedDecision{Allow}
|
||||
}
|
||||
|
||||
// AlwaysDenyRule returns a rule that returns a deny decision.
|
||||
func AlwaysDenyRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Deny}
|
||||
return fixedDecision{Deny}
|
||||
}
|
||||
|
||||
type fixedDecisionRule struct{ err error }
|
||||
type fixedDecision struct {
|
||||
decision error
|
||||
}
|
||||
|
||||
func (f fixedDecisionRule) EvalQuery(context.Context, ent.Query) error { return f.err }
|
||||
func (f fixedDecisionRule) EvalMutation(context.Context, ent.Mutation) error { return f.err }
|
||||
func (f fixedDecision) EvalQuery(context.Context, ent.Query) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
func (f fixedDecision) EvalMutation(context.Context, ent.Mutation) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// OnMutationOperation evaluates the given rule only on a given mutation operation.
|
||||
func OnMutationOperation(rule MutationRule, op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(ctx context.Context, m ent.Mutation) error {
|
||||
if m.Op().Is(op) {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
return rule.EvalMutation(ctx, m)
|
||||
}
|
||||
return Skip
|
||||
})
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
rule := MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
})
|
||||
return OnMutationOperation(rule, op)
|
||||
}
|
||||
|
||||
// The CityQueryRuleFunc type is an adapter to allow the use of ordinary
|
||||
// functions as a query rule.
|
||||
type CityQueryRuleFunc func(context.Context, *ent.CityQuery) error
|
||||
|
||||
@@ -54,11 +54,11 @@ func DecisionContext(parent context.Context, decision error) context.Context {
|
||||
}
|
||||
|
||||
func decisionFromContext(ctx context.Context) (error, bool) {
|
||||
err, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(err, Allow) {
|
||||
err = nil
|
||||
decision, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(decision, Allow) {
|
||||
decision = nil
|
||||
}
|
||||
return err, ok
|
||||
return decision, ok
|
||||
}
|
||||
|
||||
type (
|
||||
@@ -74,16 +74,16 @@ type (
|
||||
|
||||
// EvalQuery evaluates a query against a query policy.
|
||||
func (policy QueryPolicy) EvalQuery(ctx context.Context, q ent.Query) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalQuery(ctx, q); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalQuery(ctx, q); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -111,16 +111,16 @@ type (
|
||||
|
||||
// EvalMutation evaluates a mutation against a mutation policy.
|
||||
func (policy MutationPolicy) EvalMutation(ctx context.Context, m ent.Mutation) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalMutation(ctx, m); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalMutation(ctx, m); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -159,29 +159,44 @@ type QueryMutationRule interface {
|
||||
|
||||
// AlwaysAllowRule returns a rule that returns an allow decision.
|
||||
func AlwaysAllowRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Allow}
|
||||
return fixedDecision{Allow}
|
||||
}
|
||||
|
||||
// AlwaysDenyRule returns a rule that returns a deny decision.
|
||||
func AlwaysDenyRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Deny}
|
||||
return fixedDecision{Deny}
|
||||
}
|
||||
|
||||
type fixedDecisionRule struct{ err error }
|
||||
type fixedDecision struct {
|
||||
decision error
|
||||
}
|
||||
|
||||
func (f fixedDecisionRule) EvalQuery(context.Context, ent.Query) error { return f.err }
|
||||
func (f fixedDecisionRule) EvalMutation(context.Context, ent.Mutation) error { return f.err }
|
||||
func (f fixedDecision) EvalQuery(context.Context, ent.Query) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
func (f fixedDecision) EvalMutation(context.Context, ent.Mutation) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// OnMutationOperation evaluates the given rule only on a given mutation operation.
|
||||
func OnMutationOperation(rule MutationRule, op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(ctx context.Context, m ent.Mutation) error {
|
||||
if m.Op().Is(op) {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
return rule.EvalMutation(ctx, m)
|
||||
}
|
||||
return Skip
|
||||
})
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
rule := MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
})
|
||||
return OnMutationOperation(rule, op)
|
||||
}
|
||||
|
||||
// The UserQueryRuleFunc type is an adapter to allow the use of ordinary
|
||||
// functions as a query rule.
|
||||
type UserQueryRuleFunc func(context.Context, *ent.UserQuery) error
|
||||
|
||||
@@ -54,11 +54,11 @@ func DecisionContext(parent context.Context, decision error) context.Context {
|
||||
}
|
||||
|
||||
func decisionFromContext(ctx context.Context) (error, bool) {
|
||||
err, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(err, Allow) {
|
||||
err = nil
|
||||
decision, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(decision, Allow) {
|
||||
decision = nil
|
||||
}
|
||||
return err, ok
|
||||
return decision, ok
|
||||
}
|
||||
|
||||
type (
|
||||
@@ -74,16 +74,16 @@ type (
|
||||
|
||||
// EvalQuery evaluates a query against a query policy.
|
||||
func (policy QueryPolicy) EvalQuery(ctx context.Context, q ent.Query) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalQuery(ctx, q); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalQuery(ctx, q); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -111,16 +111,16 @@ type (
|
||||
|
||||
// EvalMutation evaluates a mutation against a mutation policy.
|
||||
func (policy MutationPolicy) EvalMutation(ctx context.Context, m ent.Mutation) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalMutation(ctx, m); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalMutation(ctx, m); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -159,29 +159,44 @@ type QueryMutationRule interface {
|
||||
|
||||
// AlwaysAllowRule returns a rule that returns an allow decision.
|
||||
func AlwaysAllowRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Allow}
|
||||
return fixedDecision{Allow}
|
||||
}
|
||||
|
||||
// AlwaysDenyRule returns a rule that returns a deny decision.
|
||||
func AlwaysDenyRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Deny}
|
||||
return fixedDecision{Deny}
|
||||
}
|
||||
|
||||
type fixedDecisionRule struct{ err error }
|
||||
type fixedDecision struct {
|
||||
decision error
|
||||
}
|
||||
|
||||
func (f fixedDecisionRule) EvalQuery(context.Context, ent.Query) error { return f.err }
|
||||
func (f fixedDecisionRule) EvalMutation(context.Context, ent.Mutation) error { return f.err }
|
||||
func (f fixedDecision) EvalQuery(context.Context, ent.Query) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
func (f fixedDecision) EvalMutation(context.Context, ent.Mutation) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// OnMutationOperation evaluates the given rule only on a given mutation operation.
|
||||
func OnMutationOperation(rule MutationRule, op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(ctx context.Context, m ent.Mutation) error {
|
||||
if m.Op().Is(op) {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
return rule.EvalMutation(ctx, m)
|
||||
}
|
||||
return Skip
|
||||
})
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
rule := MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
})
|
||||
return OnMutationOperation(rule, op)
|
||||
}
|
||||
|
||||
// The GroupQueryRuleFunc type is an adapter to allow the use of ordinary
|
||||
// functions as a query rule.
|
||||
type GroupQueryRuleFunc func(context.Context, *ent.GroupQuery) error
|
||||
|
||||
@@ -54,11 +54,11 @@ func DecisionContext(parent context.Context, decision error) context.Context {
|
||||
}
|
||||
|
||||
func decisionFromContext(ctx context.Context) (error, bool) {
|
||||
err, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(err, Allow) {
|
||||
err = nil
|
||||
decision, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(decision, Allow) {
|
||||
decision = nil
|
||||
}
|
||||
return err, ok
|
||||
return decision, ok
|
||||
}
|
||||
|
||||
type (
|
||||
@@ -74,16 +74,16 @@ type (
|
||||
|
||||
// EvalQuery evaluates a query against a query policy.
|
||||
func (policy QueryPolicy) EvalQuery(ctx context.Context, q ent.Query) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalQuery(ctx, q); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalQuery(ctx, q); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -111,16 +111,16 @@ type (
|
||||
|
||||
// EvalMutation evaluates a mutation against a mutation policy.
|
||||
func (policy MutationPolicy) EvalMutation(ctx context.Context, m ent.Mutation) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalMutation(ctx, m); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalMutation(ctx, m); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -159,29 +159,44 @@ type QueryMutationRule interface {
|
||||
|
||||
// AlwaysAllowRule returns a rule that returns an allow decision.
|
||||
func AlwaysAllowRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Allow}
|
||||
return fixedDecision{Allow}
|
||||
}
|
||||
|
||||
// AlwaysDenyRule returns a rule that returns a deny decision.
|
||||
func AlwaysDenyRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Deny}
|
||||
return fixedDecision{Deny}
|
||||
}
|
||||
|
||||
type fixedDecisionRule struct{ err error }
|
||||
type fixedDecision struct {
|
||||
decision error
|
||||
}
|
||||
|
||||
func (f fixedDecisionRule) EvalQuery(context.Context, ent.Query) error { return f.err }
|
||||
func (f fixedDecisionRule) EvalMutation(context.Context, ent.Mutation) error { return f.err }
|
||||
func (f fixedDecision) EvalQuery(context.Context, ent.Query) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
func (f fixedDecision) EvalMutation(context.Context, ent.Mutation) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// OnMutationOperation evaluates the given rule only on a given mutation operation.
|
||||
func OnMutationOperation(rule MutationRule, op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(ctx context.Context, m ent.Mutation) error {
|
||||
if m.Op().Is(op) {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
return rule.EvalMutation(ctx, m)
|
||||
}
|
||||
return Skip
|
||||
})
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
rule := MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
})
|
||||
return OnMutationOperation(rule, op)
|
||||
}
|
||||
|
||||
// The UserQueryRuleFunc type is an adapter to allow the use of ordinary
|
||||
// functions as a query rule.
|
||||
type UserQueryRuleFunc func(context.Context, *ent.UserQuery) error
|
||||
|
||||
@@ -54,11 +54,11 @@ func DecisionContext(parent context.Context, decision error) context.Context {
|
||||
}
|
||||
|
||||
func decisionFromContext(ctx context.Context) (error, bool) {
|
||||
err, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(err, Allow) {
|
||||
err = nil
|
||||
decision, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(decision, Allow) {
|
||||
decision = nil
|
||||
}
|
||||
return err, ok
|
||||
return decision, ok
|
||||
}
|
||||
|
||||
type (
|
||||
@@ -74,16 +74,16 @@ type (
|
||||
|
||||
// EvalQuery evaluates a query against a query policy.
|
||||
func (policy QueryPolicy) EvalQuery(ctx context.Context, q ent.Query) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalQuery(ctx, q); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalQuery(ctx, q); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -111,16 +111,16 @@ type (
|
||||
|
||||
// EvalMutation evaluates a mutation against a mutation policy.
|
||||
func (policy MutationPolicy) EvalMutation(ctx context.Context, m ent.Mutation) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalMutation(ctx, m); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalMutation(ctx, m); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -159,29 +159,44 @@ type QueryMutationRule interface {
|
||||
|
||||
// AlwaysAllowRule returns a rule that returns an allow decision.
|
||||
func AlwaysAllowRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Allow}
|
||||
return fixedDecision{Allow}
|
||||
}
|
||||
|
||||
// AlwaysDenyRule returns a rule that returns a deny decision.
|
||||
func AlwaysDenyRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Deny}
|
||||
return fixedDecision{Deny}
|
||||
}
|
||||
|
||||
type fixedDecisionRule struct{ err error }
|
||||
type fixedDecision struct {
|
||||
decision error
|
||||
}
|
||||
|
||||
func (f fixedDecisionRule) EvalQuery(context.Context, ent.Query) error { return f.err }
|
||||
func (f fixedDecisionRule) EvalMutation(context.Context, ent.Mutation) error { return f.err }
|
||||
func (f fixedDecision) EvalQuery(context.Context, ent.Query) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
func (f fixedDecision) EvalMutation(context.Context, ent.Mutation) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// OnMutationOperation evaluates the given rule only on a given mutation operation.
|
||||
func OnMutationOperation(rule MutationRule, op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(ctx context.Context, m ent.Mutation) error {
|
||||
if m.Op().Is(op) {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
return rule.EvalMutation(ctx, m)
|
||||
}
|
||||
return Skip
|
||||
})
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
rule := MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
})
|
||||
return OnMutationOperation(rule, op)
|
||||
}
|
||||
|
||||
// The UserQueryRuleFunc type is an adapter to allow the use of ordinary
|
||||
// functions as a query rule.
|
||||
type UserQueryRuleFunc func(context.Context, *ent.UserQuery) error
|
||||
|
||||
@@ -54,11 +54,11 @@ func DecisionContext(parent context.Context, decision error) context.Context {
|
||||
}
|
||||
|
||||
func decisionFromContext(ctx context.Context) (error, bool) {
|
||||
err, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(err, Allow) {
|
||||
err = nil
|
||||
decision, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(decision, Allow) {
|
||||
decision = nil
|
||||
}
|
||||
return err, ok
|
||||
return decision, ok
|
||||
}
|
||||
|
||||
type (
|
||||
@@ -74,16 +74,16 @@ type (
|
||||
|
||||
// EvalQuery evaluates a query against a query policy.
|
||||
func (policy QueryPolicy) EvalQuery(ctx context.Context, q ent.Query) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalQuery(ctx, q); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalQuery(ctx, q); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -111,16 +111,16 @@ type (
|
||||
|
||||
// EvalMutation evaluates a mutation against a mutation policy.
|
||||
func (policy MutationPolicy) EvalMutation(ctx context.Context, m ent.Mutation) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalMutation(ctx, m); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalMutation(ctx, m); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -159,29 +159,44 @@ type QueryMutationRule interface {
|
||||
|
||||
// AlwaysAllowRule returns a rule that returns an allow decision.
|
||||
func AlwaysAllowRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Allow}
|
||||
return fixedDecision{Allow}
|
||||
}
|
||||
|
||||
// AlwaysDenyRule returns a rule that returns a deny decision.
|
||||
func AlwaysDenyRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Deny}
|
||||
return fixedDecision{Deny}
|
||||
}
|
||||
|
||||
type fixedDecisionRule struct{ err error }
|
||||
type fixedDecision struct {
|
||||
decision error
|
||||
}
|
||||
|
||||
func (f fixedDecisionRule) EvalQuery(context.Context, ent.Query) error { return f.err }
|
||||
func (f fixedDecisionRule) EvalMutation(context.Context, ent.Mutation) error { return f.err }
|
||||
func (f fixedDecision) EvalQuery(context.Context, ent.Query) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
func (f fixedDecision) EvalMutation(context.Context, ent.Mutation) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// OnMutationOperation evaluates the given rule only on a given mutation operation.
|
||||
func OnMutationOperation(rule MutationRule, op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(ctx context.Context, m ent.Mutation) error {
|
||||
if m.Op().Is(op) {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
return rule.EvalMutation(ctx, m)
|
||||
}
|
||||
return Skip
|
||||
})
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
rule := MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
})
|
||||
return OnMutationOperation(rule, op)
|
||||
}
|
||||
|
||||
// The PetQueryRuleFunc type is an adapter to allow the use of ordinary
|
||||
// functions as a query rule.
|
||||
type PetQueryRuleFunc func(context.Context, *ent.PetQuery) error
|
||||
|
||||
@@ -54,11 +54,11 @@ func DecisionContext(parent context.Context, decision error) context.Context {
|
||||
}
|
||||
|
||||
func decisionFromContext(ctx context.Context) (error, bool) {
|
||||
err, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(err, Allow) {
|
||||
err = nil
|
||||
decision, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(decision, Allow) {
|
||||
decision = nil
|
||||
}
|
||||
return err, ok
|
||||
return decision, ok
|
||||
}
|
||||
|
||||
type (
|
||||
@@ -74,16 +74,16 @@ type (
|
||||
|
||||
// EvalQuery evaluates a query against a query policy.
|
||||
func (policy QueryPolicy) EvalQuery(ctx context.Context, q ent.Query) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalQuery(ctx, q); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalQuery(ctx, q); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -111,16 +111,16 @@ type (
|
||||
|
||||
// EvalMutation evaluates a mutation against a mutation policy.
|
||||
func (policy MutationPolicy) EvalMutation(ctx context.Context, m ent.Mutation) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalMutation(ctx, m); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalMutation(ctx, m); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -159,29 +159,44 @@ type QueryMutationRule interface {
|
||||
|
||||
// AlwaysAllowRule returns a rule that returns an allow decision.
|
||||
func AlwaysAllowRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Allow}
|
||||
return fixedDecision{Allow}
|
||||
}
|
||||
|
||||
// AlwaysDenyRule returns a rule that returns a deny decision.
|
||||
func AlwaysDenyRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Deny}
|
||||
return fixedDecision{Deny}
|
||||
}
|
||||
|
||||
type fixedDecisionRule struct{ err error }
|
||||
type fixedDecision struct {
|
||||
decision error
|
||||
}
|
||||
|
||||
func (f fixedDecisionRule) EvalQuery(context.Context, ent.Query) error { return f.err }
|
||||
func (f fixedDecisionRule) EvalMutation(context.Context, ent.Mutation) error { return f.err }
|
||||
func (f fixedDecision) EvalQuery(context.Context, ent.Query) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
func (f fixedDecision) EvalMutation(context.Context, ent.Mutation) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// OnMutationOperation evaluates the given rule only on a given mutation operation.
|
||||
func OnMutationOperation(rule MutationRule, op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(ctx context.Context, m ent.Mutation) error {
|
||||
if m.Op().Is(op) {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
return rule.EvalMutation(ctx, m)
|
||||
}
|
||||
return Skip
|
||||
})
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
rule := MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
})
|
||||
return OnMutationOperation(rule, op)
|
||||
}
|
||||
|
||||
// The NodeQueryRuleFunc type is an adapter to allow the use of ordinary
|
||||
// functions as a query rule.
|
||||
type NodeQueryRuleFunc func(context.Context, *ent.NodeQuery) error
|
||||
|
||||
@@ -54,11 +54,11 @@ func DecisionContext(parent context.Context, decision error) context.Context {
|
||||
}
|
||||
|
||||
func decisionFromContext(ctx context.Context) (error, bool) {
|
||||
err, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(err, Allow) {
|
||||
err = nil
|
||||
decision, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(decision, Allow) {
|
||||
decision = nil
|
||||
}
|
||||
return err, ok
|
||||
return decision, ok
|
||||
}
|
||||
|
||||
type (
|
||||
@@ -74,16 +74,16 @@ type (
|
||||
|
||||
// EvalQuery evaluates a query against a query policy.
|
||||
func (policy QueryPolicy) EvalQuery(ctx context.Context, q ent.Query) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalQuery(ctx, q); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalQuery(ctx, q); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -111,16 +111,16 @@ type (
|
||||
|
||||
// EvalMutation evaluates a mutation against a mutation policy.
|
||||
func (policy MutationPolicy) EvalMutation(ctx context.Context, m ent.Mutation) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalMutation(ctx, m); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalMutation(ctx, m); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -159,29 +159,44 @@ type QueryMutationRule interface {
|
||||
|
||||
// AlwaysAllowRule returns a rule that returns an allow decision.
|
||||
func AlwaysAllowRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Allow}
|
||||
return fixedDecision{Allow}
|
||||
}
|
||||
|
||||
// AlwaysDenyRule returns a rule that returns a deny decision.
|
||||
func AlwaysDenyRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Deny}
|
||||
return fixedDecision{Deny}
|
||||
}
|
||||
|
||||
type fixedDecisionRule struct{ err error }
|
||||
type fixedDecision struct {
|
||||
decision error
|
||||
}
|
||||
|
||||
func (f fixedDecisionRule) EvalQuery(context.Context, ent.Query) error { return f.err }
|
||||
func (f fixedDecisionRule) EvalMutation(context.Context, ent.Mutation) error { return f.err }
|
||||
func (f fixedDecision) EvalQuery(context.Context, ent.Query) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
func (f fixedDecision) EvalMutation(context.Context, ent.Mutation) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// OnMutationOperation evaluates the given rule only on a given mutation operation.
|
||||
func OnMutationOperation(rule MutationRule, op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(ctx context.Context, m ent.Mutation) error {
|
||||
if m.Op().Is(op) {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
return rule.EvalMutation(ctx, m)
|
||||
}
|
||||
return Skip
|
||||
})
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
rule := MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
})
|
||||
return OnMutationOperation(rule, op)
|
||||
}
|
||||
|
||||
// The CardQueryRuleFunc type is an adapter to allow the use of ordinary
|
||||
// functions as a query rule.
|
||||
type CardQueryRuleFunc func(context.Context, *ent.CardQuery) error
|
||||
|
||||
@@ -54,11 +54,11 @@ func DecisionContext(parent context.Context, decision error) context.Context {
|
||||
}
|
||||
|
||||
func decisionFromContext(ctx context.Context) (error, bool) {
|
||||
err, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(err, Allow) {
|
||||
err = nil
|
||||
decision, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(decision, Allow) {
|
||||
decision = nil
|
||||
}
|
||||
return err, ok
|
||||
return decision, ok
|
||||
}
|
||||
|
||||
type (
|
||||
@@ -74,16 +74,16 @@ type (
|
||||
|
||||
// EvalQuery evaluates a query against a query policy.
|
||||
func (policy QueryPolicy) EvalQuery(ctx context.Context, q ent.Query) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalQuery(ctx, q); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalQuery(ctx, q); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -111,16 +111,16 @@ type (
|
||||
|
||||
// EvalMutation evaluates a mutation against a mutation policy.
|
||||
func (policy MutationPolicy) EvalMutation(ctx context.Context, m ent.Mutation) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalMutation(ctx, m); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalMutation(ctx, m); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -159,29 +159,44 @@ type QueryMutationRule interface {
|
||||
|
||||
// AlwaysAllowRule returns a rule that returns an allow decision.
|
||||
func AlwaysAllowRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Allow}
|
||||
return fixedDecision{Allow}
|
||||
}
|
||||
|
||||
// AlwaysDenyRule returns a rule that returns a deny decision.
|
||||
func AlwaysDenyRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Deny}
|
||||
return fixedDecision{Deny}
|
||||
}
|
||||
|
||||
type fixedDecisionRule struct{ err error }
|
||||
type fixedDecision struct {
|
||||
decision error
|
||||
}
|
||||
|
||||
func (f fixedDecisionRule) EvalQuery(context.Context, ent.Query) error { return f.err }
|
||||
func (f fixedDecisionRule) EvalMutation(context.Context, ent.Mutation) error { return f.err }
|
||||
func (f fixedDecision) EvalQuery(context.Context, ent.Query) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
func (f fixedDecision) EvalMutation(context.Context, ent.Mutation) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// OnMutationOperation evaluates the given rule only on a given mutation operation.
|
||||
func OnMutationOperation(rule MutationRule, op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(ctx context.Context, m ent.Mutation) error {
|
||||
if m.Op().Is(op) {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
return rule.EvalMutation(ctx, m)
|
||||
}
|
||||
return Skip
|
||||
})
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
rule := MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
})
|
||||
return OnMutationOperation(rule, op)
|
||||
}
|
||||
|
||||
// The UserQueryRuleFunc type is an adapter to allow the use of ordinary
|
||||
// functions as a query rule.
|
||||
type UserQueryRuleFunc func(context.Context, *ent.UserQuery) error
|
||||
|
||||
@@ -54,11 +54,11 @@ func DecisionContext(parent context.Context, decision error) context.Context {
|
||||
}
|
||||
|
||||
func decisionFromContext(ctx context.Context) (error, bool) {
|
||||
err, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(err, Allow) {
|
||||
err = nil
|
||||
decision, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(decision, Allow) {
|
||||
decision = nil
|
||||
}
|
||||
return err, ok
|
||||
return decision, ok
|
||||
}
|
||||
|
||||
type (
|
||||
@@ -74,16 +74,16 @@ type (
|
||||
|
||||
// EvalQuery evaluates a query against a query policy.
|
||||
func (policy QueryPolicy) EvalQuery(ctx context.Context, q ent.Query) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalQuery(ctx, q); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalQuery(ctx, q); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -111,16 +111,16 @@ type (
|
||||
|
||||
// EvalMutation evaluates a mutation against a mutation policy.
|
||||
func (policy MutationPolicy) EvalMutation(ctx context.Context, m ent.Mutation) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalMutation(ctx, m); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalMutation(ctx, m); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -159,29 +159,44 @@ type QueryMutationRule interface {
|
||||
|
||||
// AlwaysAllowRule returns a rule that returns an allow decision.
|
||||
func AlwaysAllowRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Allow}
|
||||
return fixedDecision{Allow}
|
||||
}
|
||||
|
||||
// AlwaysDenyRule returns a rule that returns a deny decision.
|
||||
func AlwaysDenyRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Deny}
|
||||
return fixedDecision{Deny}
|
||||
}
|
||||
|
||||
type fixedDecisionRule struct{ err error }
|
||||
type fixedDecision struct {
|
||||
decision error
|
||||
}
|
||||
|
||||
func (f fixedDecisionRule) EvalQuery(context.Context, ent.Query) error { return f.err }
|
||||
func (f fixedDecisionRule) EvalMutation(context.Context, ent.Mutation) error { return f.err }
|
||||
func (f fixedDecision) EvalQuery(context.Context, ent.Query) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
func (f fixedDecision) EvalMutation(context.Context, ent.Mutation) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// OnMutationOperation evaluates the given rule only on a given mutation operation.
|
||||
func OnMutationOperation(rule MutationRule, op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(ctx context.Context, m ent.Mutation) error {
|
||||
if m.Op().Is(op) {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
return rule.EvalMutation(ctx, m)
|
||||
}
|
||||
return Skip
|
||||
})
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
rule := MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
})
|
||||
return OnMutationOperation(rule, op)
|
||||
}
|
||||
|
||||
// The NodeQueryRuleFunc type is an adapter to allow the use of ordinary
|
||||
// functions as a query rule.
|
||||
type NodeQueryRuleFunc func(context.Context, *ent.NodeQuery) error
|
||||
|
||||
@@ -54,11 +54,11 @@ func DecisionContext(parent context.Context, decision error) context.Context {
|
||||
}
|
||||
|
||||
func decisionFromContext(ctx context.Context) (error, bool) {
|
||||
err, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(err, Allow) {
|
||||
err = nil
|
||||
decision, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(decision, Allow) {
|
||||
decision = nil
|
||||
}
|
||||
return err, ok
|
||||
return decision, ok
|
||||
}
|
||||
|
||||
type (
|
||||
@@ -74,16 +74,16 @@ type (
|
||||
|
||||
// EvalQuery evaluates a query against a query policy.
|
||||
func (policy QueryPolicy) EvalQuery(ctx context.Context, q ent.Query) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalQuery(ctx, q); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalQuery(ctx, q); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -111,16 +111,16 @@ type (
|
||||
|
||||
// EvalMutation evaluates a mutation against a mutation policy.
|
||||
func (policy MutationPolicy) EvalMutation(ctx context.Context, m ent.Mutation) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalMutation(ctx, m); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalMutation(ctx, m); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -159,29 +159,44 @@ type QueryMutationRule interface {
|
||||
|
||||
// AlwaysAllowRule returns a rule that returns an allow decision.
|
||||
func AlwaysAllowRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Allow}
|
||||
return fixedDecision{Allow}
|
||||
}
|
||||
|
||||
// AlwaysDenyRule returns a rule that returns a deny decision.
|
||||
func AlwaysDenyRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Deny}
|
||||
return fixedDecision{Deny}
|
||||
}
|
||||
|
||||
type fixedDecisionRule struct{ err error }
|
||||
type fixedDecision struct {
|
||||
decision error
|
||||
}
|
||||
|
||||
func (f fixedDecisionRule) EvalQuery(context.Context, ent.Query) error { return f.err }
|
||||
func (f fixedDecisionRule) EvalMutation(context.Context, ent.Mutation) error { return f.err }
|
||||
func (f fixedDecision) EvalQuery(context.Context, ent.Query) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
func (f fixedDecision) EvalMutation(context.Context, ent.Mutation) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// OnMutationOperation evaluates the given rule only on a given mutation operation.
|
||||
func OnMutationOperation(rule MutationRule, op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(ctx context.Context, m ent.Mutation) error {
|
||||
if m.Op().Is(op) {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
return rule.EvalMutation(ctx, m)
|
||||
}
|
||||
return Skip
|
||||
})
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
rule := MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
})
|
||||
return OnMutationOperation(rule, op)
|
||||
}
|
||||
|
||||
// The CarQueryRuleFunc type is an adapter to allow the use of ordinary
|
||||
// functions as a query rule.
|
||||
type CarQueryRuleFunc func(context.Context, *ent.CarQuery) error
|
||||
|
||||
@@ -54,11 +54,11 @@ func DecisionContext(parent context.Context, decision error) context.Context {
|
||||
}
|
||||
|
||||
func decisionFromContext(ctx context.Context) (error, bool) {
|
||||
err, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(err, Allow) {
|
||||
err = nil
|
||||
decision, ok := ctx.Value(decisionCtxKey{}).(error)
|
||||
if ok && errors.Is(decision, Allow) {
|
||||
decision = nil
|
||||
}
|
||||
return err, ok
|
||||
return decision, ok
|
||||
}
|
||||
|
||||
type (
|
||||
@@ -74,16 +74,16 @@ type (
|
||||
|
||||
// EvalQuery evaluates a query against a query policy.
|
||||
func (policy QueryPolicy) EvalQuery(ctx context.Context, q ent.Query) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalQuery(ctx, q); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalQuery(ctx, q); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -111,16 +111,16 @@ type (
|
||||
|
||||
// EvalMutation evaluates a mutation against a mutation policy.
|
||||
func (policy MutationPolicy) EvalMutation(ctx context.Context, m ent.Mutation) error {
|
||||
if err, ok := decisionFromContext(ctx); ok {
|
||||
return err
|
||||
if decision, ok := decisionFromContext(ctx); ok {
|
||||
return decision
|
||||
}
|
||||
for _, rule := range policy {
|
||||
switch err := rule.EvalMutation(ctx, m); {
|
||||
case err == nil || errors.Is(err, Skip):
|
||||
case errors.Is(err, Allow):
|
||||
switch decision := rule.EvalMutation(ctx, m); {
|
||||
case decision == nil || errors.Is(decision, Skip):
|
||||
case errors.Is(decision, Allow):
|
||||
return nil
|
||||
default:
|
||||
return err
|
||||
return decision
|
||||
}
|
||||
}
|
||||
return nil
|
||||
@@ -159,29 +159,44 @@ type QueryMutationRule interface {
|
||||
|
||||
// AlwaysAllowRule returns a rule that returns an allow decision.
|
||||
func AlwaysAllowRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Allow}
|
||||
return fixedDecision{Allow}
|
||||
}
|
||||
|
||||
// AlwaysDenyRule returns a rule that returns a deny decision.
|
||||
func AlwaysDenyRule() QueryMutationRule {
|
||||
return fixedDecisionRule{Deny}
|
||||
return fixedDecision{Deny}
|
||||
}
|
||||
|
||||
type fixedDecisionRule struct{ err error }
|
||||
type fixedDecision struct {
|
||||
decision error
|
||||
}
|
||||
|
||||
func (f fixedDecisionRule) EvalQuery(context.Context, ent.Query) error { return f.err }
|
||||
func (f fixedDecisionRule) EvalMutation(context.Context, ent.Mutation) error { return f.err }
|
||||
func (f fixedDecision) EvalQuery(context.Context, ent.Query) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
func (f fixedDecision) EvalMutation(context.Context, ent.Mutation) error {
|
||||
return f.decision
|
||||
}
|
||||
|
||||
// OnMutationOperation evaluates the given rule only on a given mutation operation.
|
||||
func OnMutationOperation(rule MutationRule, op ent.Op) MutationRule {
|
||||
return MutationRuleFunc(func(ctx context.Context, m ent.Mutation) error {
|
||||
if m.Op().Is(op) {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
return rule.EvalMutation(ctx, m)
|
||||
}
|
||||
return Skip
|
||||
})
|
||||
}
|
||||
|
||||
// DenyMutationOperationRule returns a rule denying specified mutation operation.
|
||||
func DenyMutationOperationRule(op ent.Op) MutationRule {
|
||||
rule := MutationRuleFunc(func(_ context.Context, m ent.Mutation) error {
|
||||
return Denyf("ent/privacy: operation %s is not allowed", m.Op())
|
||||
})
|
||||
return OnMutationOperation(rule, op)
|
||||
}
|
||||
|
||||
// The GroupQueryRuleFunc type is an adapter to allow the use of ordinary
|
||||
// functions as a query rule.
|
||||
type GroupQueryRuleFunc func(context.Context, *ent.GroupQuery) error
|
||||
|
||||
Reference in New Issue
Block a user