summaryrefslogtreecommitdiffstats
path: root/src/app/guards/has-permissions.guard.ts
blob: cc0467355f479d2324e0cb5e05dbba1b7a374c2b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
/*
 * Copyright (c) 2022. Deutsche Telekom AG
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 *
 * SPDX-License-Identifier: Apache-2.0
 */


import { Inject, Injectable } from '@angular/core';
import { ActivatedRouteSnapshot, CanActivate, Router, UrlTree } from '@angular/router';
import { Observable } from 'rxjs';
import { HttpClient } from '@angular/common/http';
import { ACL_CONFIG, AclConfig } from '../modules/auth/injection-tokens';
import { AuthService } from '../services/auth.service';
import { TranslateService } from '@ngx-translate/core';
import { map } from 'rxjs/operators';

@Injectable({
  providedIn: 'root',
})
export class HasPermissionsGuard implements CanActivate {
  constructor(
    private readonly authService: AuthService,
    private readonly httpClient: HttpClient,
    private readonly router: Router,
    private readonly translateService: TranslateService,
    @Inject(ACL_CONFIG) readonly acl: AclConfig,
  ) {}

  canActivate(
    next: ActivatedRouteSnapshot,
  ): Observable<boolean | UrlTree> | Promise<boolean | UrlTree> | boolean | UrlTree {
    return this.authService.loadCachedUserProfile().pipe(
      map(userProfile => {
        // filter out the keys (the onap_ roles) that the user does not have
        const intersectionOfRoles = Object.keys(this.acl).filter(role => userProfile?.roles.includes(role));
        return this.hasPermissions(next.data.permission, intersectionOfRoles);
      }));
  }

  /**
   * Check if a user has a given permission.
   * @param permission the permission, as defined in the acl.json
   * @param roles the roles that the user possesses
   * @returns true if the user has the needed permission
   */
  private hasPermissions(permission: string, roles: string[]) {
    for (const role of roles) {
      if (this.acl[role].includes(permission)) {
        return true;
      }
    }
    this.router.navigate(['/statusPage'], {
      state: {
        header: this.translateService.instant('common.noPermissions.noPermissions'),
        message: this.translateService.instant('common.noPermissions.support'),
      },
    });
    return false;
  }
}