mirror of
https://github.com/bitechdev/ResolveSpec.git
synced 2026-03-07 05:58:55 +00:00
- Implement BeforeUpdate and BeforeDelete hooks to enforce CanUpdate and CanDelete rules. - Introduce new security context for websocketspec to manage security hooks. - Enhance error handling in delete operations to provide clearer feedback.
98 lines
2.7 KiB
Go
98 lines
2.7 KiB
Go
package resolvespec
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/bitechdev/ResolveSpec/pkg/common"
|
|
"github.com/bitechdev/ResolveSpec/pkg/logger"
|
|
"github.com/bitechdev/ResolveSpec/pkg/security"
|
|
)
|
|
|
|
// RegisterSecurityHooks registers all security-related hooks with the handler
|
|
func RegisterSecurityHooks(handler *Handler, securityList *security.SecurityList) {
|
|
// Hook 1: BeforeRead - Load security rules
|
|
handler.Hooks().Register(BeforeRead, func(hookCtx *HookContext) error {
|
|
secCtx := newSecurityContext(hookCtx)
|
|
return security.LoadSecurityRules(secCtx, securityList)
|
|
})
|
|
|
|
// Hook 2: BeforeScan - Apply row-level security filters
|
|
handler.Hooks().Register(BeforeScan, func(hookCtx *HookContext) error {
|
|
secCtx := newSecurityContext(hookCtx)
|
|
return security.ApplyRowSecurity(secCtx, securityList)
|
|
})
|
|
|
|
// Hook 3: AfterRead - Apply column-level security (masking)
|
|
handler.Hooks().Register(AfterRead, func(hookCtx *HookContext) error {
|
|
secCtx := newSecurityContext(hookCtx)
|
|
return security.ApplyColumnSecurity(secCtx, securityList)
|
|
})
|
|
|
|
// Hook 4 (Optional): Audit logging
|
|
handler.Hooks().Register(AfterRead, func(hookCtx *HookContext) error {
|
|
secCtx := newSecurityContext(hookCtx)
|
|
return security.LogDataAccess(secCtx)
|
|
})
|
|
|
|
// Hook 5: BeforeUpdate - enforce CanUpdate rule from context/registry
|
|
handler.Hooks().Register(BeforeUpdate, func(hookCtx *HookContext) error {
|
|
secCtx := newSecurityContext(hookCtx)
|
|
return security.CheckModelUpdateAllowed(secCtx)
|
|
})
|
|
|
|
// Hook 6: BeforeDelete - enforce CanDelete rule from context/registry
|
|
handler.Hooks().Register(BeforeDelete, func(hookCtx *HookContext) error {
|
|
secCtx := newSecurityContext(hookCtx)
|
|
return security.CheckModelDeleteAllowed(secCtx)
|
|
})
|
|
|
|
logger.Info("Security hooks registered for resolvespec handler")
|
|
}
|
|
|
|
// securityContext adapts resolvespec.HookContext to security.SecurityContext interface
|
|
type securityContext struct {
|
|
ctx *HookContext
|
|
}
|
|
|
|
func newSecurityContext(ctx *HookContext) security.SecurityContext {
|
|
return &securityContext{ctx: ctx}
|
|
}
|
|
|
|
func (s *securityContext) GetContext() context.Context {
|
|
return s.ctx.Context
|
|
}
|
|
|
|
func (s *securityContext) GetUserID() (int, bool) {
|
|
return security.GetUserID(s.ctx.Context)
|
|
}
|
|
|
|
func (s *securityContext) GetSchema() string {
|
|
return s.ctx.Schema
|
|
}
|
|
|
|
func (s *securityContext) GetEntity() string {
|
|
return s.ctx.Entity
|
|
}
|
|
|
|
func (s *securityContext) GetModel() interface{} {
|
|
return s.ctx.Model
|
|
}
|
|
|
|
func (s *securityContext) GetQuery() interface{} {
|
|
return s.ctx.Query
|
|
}
|
|
|
|
func (s *securityContext) SetQuery(query interface{}) {
|
|
if q, ok := query.(common.SelectQuery); ok {
|
|
s.ctx.Query = q
|
|
}
|
|
}
|
|
|
|
func (s *securityContext) GetResult() interface{} {
|
|
return s.ctx.Result
|
|
}
|
|
|
|
func (s *securityContext) SetResult(result interface{}) {
|
|
s.ctx.Result = result
|
|
}
|