-
Notifications
You must be signed in to change notification settings - Fork 170
feat: Implement querying openedx-authz for publish permissions #2685
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
feat: Implement querying openedx-authz for publish permissions #2685
Conversation
|
Thanks for the pull request, @rodmgwgu! This repository is currently maintained by Once you've gone through the following steps feel free to tag them in a comment and let them know that your changes are ready for engineering review. 🔘 Get product approvalIf you haven't already, check this list to see if your contribution needs to go through the product review process.
🔘 Provide contextTo help your reviewers and other members of the community understand the purpose and larger context of your changes, feel free to add as much of the following information to the PR description as you can:
🔘 Get a green buildIf one or more checks are failing, continue working on your changes until this is no longer the case and your build turns green. Where can I find more information?If you'd like to get more details on all aspects of the review process for open source pull requests (OSPRs), check out the following resources: When can I expect my changes to be merged?Our goal is to get community contributions seen and reviewed as efficiently as possible. However, the amount of time that it takes to review and merge a PR can vary significantly based on factors such as:
💡 As a result it may take up to several weeks or months to complete a review and merge your PR. |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #2685 +/- ##
==========================================
+ Coverage 94.85% 94.87% +0.01%
==========================================
Files 1232 1237 +5
Lines 27899 27973 +74
Branches 6316 6155 -161
==========================================
+ Hits 26464 26538 +74
- Misses 1364 1377 +13
+ Partials 71 58 -13 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
MaferMazu
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @rodmgwgu, I tested in a Ulmo env, and it works as expected! ✨
The code looks good to me, but I would prefer someone with more frontend skills to help with a review as well.
| const permissions = LIBRARY_PERMISSIONS.map(action => ({ action, scope: libraryId })); | ||
|
|
||
| const { isLoading: isLoadingUserPermissions, data: userPermissions } = useValidateUserPermissions(permissions); | ||
| const canPublish = userPermissions ? userPermissions[0]?.allowed : false; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Something we could improve is being explicit about the action we are requesting instead of using userPermissions[0].
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
According to the ADR, the API guarantees that the order of the response will match the requested permissions, that's why I'm not trying to match it explicitly.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I didn't know about the order 🤔
The suggestion was more about readability and clarity regarding the permission I am requesting, and I still think it is important. Since that index depends on the order of the elements in LIBRARY_PERMISSIONS, if that list grows, I don't think it will be clear enough to use only the indexes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1. Also, hard-coding 0 here means that this code would become wrong if someone else changed the order of the LIBRARY_PERMISSIONS constant. Which could definitely happen, and then there would be a security hole.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am thinking about this issue: openedx/openedx-authz#144. I haven't refined it yet, but I would probably need to add more params to the request to see other permissions.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would suggest an API like this (no change to the REST API or the internal arrays, just implement some helper logic in the hook to support this):
const possiblePermissions = {
canPublish: CONTENT_LIBRARY_PERMISSIONS.PUBLISH_LIBRARY_CONTENT,
];
const {
isLoading: isLoadingUserPermissions,
data: userPermissions,
} = useScopedUserPermissions(possiblePermissions, { scope: libraryId });
// API is useScopedUserPermissions(actions object, extra fields to mix in);
const canPublish = userPermissions?.canPublish;
// or
const canPublish = userPermissions?.canPublish.allowed; // (this is more verbose, and requiring these creates security bugs whenever users forget to include `.allowed`, but if you know there will likely be other fields besides .allowed in the future, it's better to be more verbose now)There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the suggestions, I changed it to the following format:
// Assign an arbitrary key to each permission request to retrieve results later:
const { isLoading, data } = useUserPermissions({
canRead: {
action: "content_libraries.view_library",
scope: "lib:OpenedX:CSPROB"
}
});
// Retrieve the boolean result using the specified key:
if (data?.canRead) { ... }This way the permissions query is easier to read and understand, and using results is simpler and less error prone.
What do you think about this approach? @bradenmacdonald @MaferMazu
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @rodmgwgu, I think it's more verbose/secure in that way.
a501e16 to
f7c566f
Compare
Sounds good. I think it would be great to have this in frontend-base.
Your approach seems fine, but we shouldn't have tests that break just because another axios call/mock was introduced. Were there many such cases? Usually axios mocks only mock one specific endpoint, and the asserts should be made on that same endpoint-specific mock. |
src/authz/data/apiHooks.ts
Outdated
| * if (data[0].allowed) { ... } | ||
| * | ||
| */ | ||
| export const useValidateUserPermissions = ( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is minor/optional feedback about the name of this hook:
To me, "validate user permissions" sounds like an action, like it would throw an exception if the user doesn't have some permissions. But this is just fetching some data, not making an action.
I think "useScopedPermissions" or just "useUserPermissions" or something like that would better reflect that this is just getting the user permissions, but you still have to validate/check that they're allowed or not yourself.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks, changed it to useUserPermissions
| const permissions = LIBRARY_PERMISSIONS.map(action => ({ action, scope: libraryId })); | ||
|
|
||
| const { isLoading: isLoadingUserPermissions, data: userPermissions } = useValidateUserPermissions(permissions); | ||
| const canPublish = userPermissions ? userPermissions[0]?.allowed : false; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would suggest an API like this (no change to the REST API or the internal arrays, just implement some helper logic in the hook to support this):
const possiblePermissions = {
canPublish: CONTENT_LIBRARY_PERMISSIONS.PUBLISH_LIBRARY_CONTENT,
];
const {
isLoading: isLoadingUserPermissions,
data: userPermissions,
} = useScopedUserPermissions(possiblePermissions, { scope: libraryId });
// API is useScopedUserPermissions(actions object, extra fields to mix in);
const canPublish = userPermissions?.canPublish;
// or
const canPublish = userPermissions?.canPublish.allowed; // (this is more verbose, and requiring these creates security bugs whenever users forget to include `.allowed`, but if you know there will likely be other fields besides .allowed in the future, it's better to be more verbose now)
@bradenmacdonald About the tests that break, I'm seeing about 34 test files that potentially have the issue, basically they do calls like: expect(axiosMock.history.post.length).toBe(1);
expect(axiosMock.history.post[0].data).toBe(...);Now, because the useUserPermissions hook is calling an extra endpoint, axiosMock.history.post.length becomes 2, and axiosMock.history.post[0] may be different than what we are expecting. I started fixing those tests by waiting for a specific history item with a specific url, but after seeing the amount of files affected I think that should be fixed separately. An example here: https://github.com/WGU-Open-edX/frontend-app-authoring/blob/master/src/library-authoring/components/ComponentCard.test.tsx#L86 |
makes sense, yep. Would you mind opening an issue about it with the examples you provided? |
Sure, here is the issue: #2723 Thanks! |
|
Thanks for addressing the comments @rodmgwgu. @bradenmacdonald, could you please help review this again? |
I am not able to test this. The instructions are perhaps missing some setup details? I have the latest In addition, the admin console MFE is not running at http://localhost:2025/admin-console/ ("connection refused"). Shouldn't it be running by default with the latest version of tutor and tutor-mfe? |
This can happen if the authz policies are not loaded, or the library existed before and the migrations were not run. The authz policies are loaded with There is also a migration in the openedx-authz module that fills any preexisting permissions in the new system, however for admin users it should always be true anyways.
This should be running by default, at least in my local setup it is. |
I ran
OK, I figured it out - my version of |
@bradenmacdonald I just tried clearing and rebuilding my local enviroment to try to reproduce the issue, but it's working correctly for me. Here are the steps I followed:
|
|
@rodmgwgu I suspect the problem is with existing devstacks, not new ones. I tried creating a new library and a new admin user, but I'm still seeing the same issue - no publish button and a 403 error when I try to access the "Library Team" page. I tried with both my existing superuser and the new admin user.
How can I check if the migration worked? Is there a page in the django admin that shows the permissions models?
Here's the output of running |
Yes, it should work automatically when you init the env.
You could check the Casbin rules in the Django admin. Example: https://ulmo.demo.edly.io/admin/casbin_adapter/casbinrule/ (credentials: https://docs.google.com/spreadsheets/d/1-gEXI4IiAn5mdROGDMxNcFHAaZCRu3mxVLNDmTdJFI8/edit?gid=1326754537#gid=1326754537) In that you can verify all the policies are loaded (41 policies at least). To check specific permissions, you could use: https://ulmo.demo.edly.io/api-docs/#/authz/authz_v1_permissions_validate_me_create (using your local domain), and for example: [
{
"action": "content_libraries.view_library_team",
"scope": "lib:BradenX:LC1"
}
]And regarding this, the staff and superusers will always return true. |
|
@bradenmacdonald, based on your logs, the policy load is working. But I notice they're using an old version (e.g., the permission doesn't have the content_libraries prefix). So I think the problem you are having is that you had installed an old version of openedx-authz. Can you install the latest version that is in edx-platform (0.20.0)? It will be: |



Description
Related bug: openedx/openedx-authz#139
Adds validating publish permissions based on the new openedx-authz model.
Hook implementation mostly copied from frontend-app-admin-console
Context:
The new openedx-authz authorization model adds the possibility to have fine-grained permissions for different roles in the system. Currently, the MVP involves implementing these new roles over the Content Libraries only.
The new roles are:
The specific permissions for these roles can be found here.
The enforcement mechanism for MFEs as implemented in this PR is described here.
This change mainly concerns the new "Library Contributor" role, which should have permission to edit library content, but not to publish it. This was not taken into account on the previous permission model, because before, anyone with write permissions could publish. This change makes it possible to disable the Publish button for "Library Contributors" by using the new enforcement mechanism.
Screenshots:
Before changes, as a "Library Contributor" user, the Publish button was shown, but the action failed due to lack of permissions:
After changes, the Publish button is hidden:
Supporting information
Project: RBAC AuthZ
Related bug: openedx/openedx-authz#139
The enforcement mechanism for MFEs as implemented in this PR is described here.
Testing instructions
tutor dev do createuser nonstaff nonstaff@example.comOther information
I implemented the validateUserPermissions hook and it's related code as an independent module in src/authz, with the idea of externalizing it as a library in the near future, perhaps as a part of frontend-base?
Because of that, I'm not using the helpers in
src/testUtils.tsxon the hook tests.Concern: I'm mocking the validateUserPermissions API call (used by the validateUserPermissions hook) on the initializeMocks util, so it doesn't interfere with several tests that are checking against axios mocks without validating the request url. I'm not sure if this is the best practice or if there is a better way?
Best Practices Checklist
We're trying to move away from some deprecated patterns in this codebase. Please
check if your PR meets these recommendations before asking for a review:
.ts,.tsx).propTypesanddefaultPropsin any new or modified code.src/testUtils.tsx(specificallyinitializeMocks)apiHooks.tsin this repo for examples.messages.tsfiles have adescriptionfor translators to use.../in import paths. To import from parent folders, use@src, e.g.import { initializeMocks } from '@src/testUtils';instead offrom '../../../../testUtils'