1
0
Fork 0
mirror of https://github.com/varvet/pundit.git synced 2022-11-09 12:30:11 -05:00
varvet--pundit/lib/pundit.rb

142 lines
3.4 KiB
Ruby
Raw Normal View History

2012-11-04 04:20:45 -05:00
require "pundit/version"
2012-11-19 04:57:17 -05:00
require "pundit/policy_finder"
2012-11-19 07:02:42 -05:00
require "active_support/concern"
require "active_support/core_ext/string/inflections"
require "active_support/core_ext/object/blank"
require "active_support/core_ext/module/introspection"
2014-04-23 00:02:03 -04:00
require "active_support/dependencies/autoload"
2012-11-04 04:20:45 -05:00
module Pundit
class NotAuthorizedError < StandardError
attr_reader :query, :record, :policy
def initialize(options = {})
@query = options[:query]
@record = options[:record]
@policy = options[:policy]
message = options.fetch(:message) { "not allowed to #{query} this #{record.inspect}" }
super(message)
end
end
class AuthorizationNotPerformedError < StandardError; end
class PolicyScopingNotPerformedError < AuthorizationNotPerformedError; end
2012-11-19 04:57:17 -05:00
class NotDefinedError < StandardError; end
extend ActiveSupport::Concern
class << self
def authorize(user, record, query)
policy = policy!(user, record)
unless policy.public_send(query)
raise NotAuthorizedError.new(query: query, record: record, policy: policy)
end
true
end
2014-08-22 05:19:36 -04:00
def policy_scope(user, scope)
policy_scope = PolicyFinder.new(scope).scope
2013-11-05 12:26:38 -05:00
policy_scope.new(user, scope).resolve if policy_scope
2012-11-19 04:57:17 -05:00
end
2014-08-22 05:19:36 -04:00
def policy_scope!(user, scope)
PolicyFinder.new(scope).scope!.new(user, scope).resolve
2012-11-19 04:57:17 -05:00
end
2014-08-22 05:19:36 -04:00
def policy(user, record)
policy = PolicyFinder.new(record).policy
2013-11-05 12:26:38 -05:00
policy.new(user, record) if policy
2012-11-19 04:57:17 -05:00
end
2014-08-22 05:19:36 -04:00
def policy!(user, record)
PolicyFinder.new(record).policy!.new(user, record)
2012-11-19 04:57:17 -05:00
end
end
module Helper
def policy_scope(scope)
pundit_policy_scope(scope)
end
end
2012-11-19 04:57:17 -05:00
included do
helper Helper if respond_to?(:helper)
2012-11-19 04:57:17 -05:00
if respond_to?(:helper_method)
helper_method :policy
helper_method :pundit_policy_scope
helper_method :pundit_user
2012-11-19 04:57:17 -05:00
end
if respond_to?(:hide_action)
2014-03-09 15:01:53 -04:00
hide_action :policy
2014-08-22 07:25:50 -04:00
hide_action :policy_scope
hide_action :policies
hide_action :policy_scopes
hide_action :authorize
hide_action :verify_authorized
hide_action :verify_policy_scoped
hide_action :permitted_attributes
hide_action :pundit_user
end
2012-11-19 04:57:17 -05:00
end
def verify_authorized
raise AuthorizationNotPerformedError unless @_pundit_policy_authorized
2012-11-19 04:57:17 -05:00
end
def verify_policy_scoped
raise PolicyScopingNotPerformedError unless @_pundit_policy_scoped
end
2012-11-19 04:57:17 -05:00
def authorize(record, query=nil)
query ||= params[:action].to_s + "?"
@_pundit_policy_authorized = true
policy = policy(record)
unless policy.public_send(query)
raise NotAuthorizedError.new(query: query, record: record, policy: policy)
2012-11-19 04:57:17 -05:00
end
2012-11-19 07:02:42 -05:00
true
2012-11-19 04:57:17 -05:00
end
def skip_authorization
@_pundit_policy_authorized = true
end
2012-11-19 04:57:17 -05:00
def policy_scope(scope)
@_pundit_policy_scoped = true
pundit_policy_scope(scope)
2012-11-19 04:57:17 -05:00
end
def policy(record)
policies[record] ||= Pundit.policy!(pundit_user, record)
end
def permitted_attributes(record)
name = record.class.to_s.demodulize.underscore
params.require(name).permit(policy(record).permitted_attributes)
end
def policies
@_pundit_policies ||= {}
end
def policy_scopes
@_pundit_policy_scopes ||= {}
2013-07-12 23:42:34 -04:00
end
def pundit_user
current_user
2012-11-19 04:57:17 -05:00
end
private
def pundit_policy_scope(scope)
policy_scopes[scope] ||= Pundit.policy_scope!(pundit_user, scope)
end
2012-11-04 04:20:45 -05:00
end