228 lines
7.3 KiB
Markdown
228 lines
7.3 KiB
Markdown
---
|
|
stage: none
|
|
group: unassigned
|
|
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
|
|
---
|
|
|
|
# GraphQL Authorization
|
|
|
|
Authorizations can be applied in these places:
|
|
|
|
- Types:
|
|
- Objects (all classes descending from `::Types::BaseObject`)
|
|
- Enums (all classes descending from `::Types::BaseEnum`)
|
|
- Resolvers:
|
|
- Field resolvers (all classes descending from `::Types::BaseResolver`)
|
|
- Mutations (all classes descending from `::Types::BaseMutation`)
|
|
- Fields (all fields declared using the `field` DSL method)
|
|
|
|
Authorizations cannot be specified for abstract types (interfaces and
|
|
unions). Abstract types delegate to their member types.
|
|
Basic built in scalars (such as integers) do not have authorizations.
|
|
|
|
Our authorization system uses the same [`DeclarativePolicy`](../policies.md)
|
|
system as throughout the rest of the application.
|
|
|
|
- For single values (such as `Query.project`), if the currently authenticated
|
|
user fails the authorization, the field resolves to `null`.
|
|
- For collections (such as `Project.issues`), the collection is filtered to
|
|
exclude the objects that the user's authorization checks failed against. This
|
|
process of filtering (also known as _redaction_) happens after pagination, so
|
|
some pages may be smaller than the requested page size, due to redacted
|
|
objects being removed.
|
|
|
|
Also see [authorizing resources in a mutation](../api_graphql_styleguide.md#authorizing-resources).
|
|
|
|
NOTE:
|
|
The best practice is to load only what the currently authenticated user is allowed to
|
|
view with our existing finders first, without relying on authorization
|
|
to filter the records. This minimizes database queries and unnecessary
|
|
authorization checks of the loaded records. It also avoids situations,
|
|
such as short pages, which can expose the presence of confidential resources.
|
|
|
|
See [`authorization_spec.rb`](https://gitlab.com/gitlab-org/gitlab/-/blob/master/spec/graphql/features/authorization_spec.rb)
|
|
for examples of all the authorization schemes discussed here.
|
|
|
|
<!--
|
|
NOTE: if you change this heading (or the location to this file), make sure to update
|
|
the referenced link in rubocop/cop/graphql/authorize_types.rb
|
|
-->
|
|
|
|
## Type authorization
|
|
|
|
Authorize a type by passing an ability to the `authorize` method. All
|
|
fields with the same type is authorized by checking that the
|
|
currently authenticated user has the required ability.
|
|
|
|
For example, the following authorization ensures that the currently
|
|
authenticated user can only see projects that they have the
|
|
`read_project` ability for (so long as the project is returned in a
|
|
field that uses `Types::ProjectType`):
|
|
|
|
```ruby
|
|
module Types
|
|
class ProjectType < BaseObject
|
|
authorize :read_project
|
|
end
|
|
end
|
|
```
|
|
|
|
You can also authorize against multiple abilities, in which case all of
|
|
the ability checks must pass.
|
|
|
|
For example, the following authorization ensures that the currently
|
|
authenticated user must have `read_project` and `another_ability`
|
|
abilities to see a project:
|
|
|
|
```ruby
|
|
module Types
|
|
class ProjectType < BaseObject
|
|
authorize [:read_project, :another_ability]
|
|
end
|
|
end
|
|
```
|
|
|
|
## Resolver authorization
|
|
|
|
Resolvers can have their own authorizations, which can be applied either to the
|
|
parent object or to the resolved values.
|
|
|
|
An example of a resolver that authorizes against the parent is
|
|
`Resolvers::BoardListsResolver`, which requires that the parent
|
|
satisfy `:read_list` before it runs.
|
|
|
|
An example which authorizes against the resolved resource is
|
|
`Resolvers::Ci::ConfigResolver`, which requires that the resolved value satisfy
|
|
`:read_pipeline`.
|
|
|
|
To authorize against the parent, the resolver must _opt in_ (because this
|
|
was not the default value initially), by declaring this with `authorizes_object!`:
|
|
|
|
```ruby
|
|
module Resolvers
|
|
class MyResolver < BaseResolver
|
|
authorizes_object!
|
|
|
|
authorize :some_permission
|
|
end
|
|
end
|
|
```
|
|
|
|
To authorize against the resolved value, the resolver must apply the
|
|
authorization at some point, typically by using `#authorized_find!(**args)`:
|
|
|
|
```ruby
|
|
module Resolvers
|
|
class MyResolver < BaseResolver
|
|
authorize :some_permission
|
|
|
|
def resolve(**args)
|
|
authorized_find!(**args) # calls find_object
|
|
end
|
|
|
|
def find_object(id:)
|
|
MyThing.find(id)
|
|
end
|
|
end
|
|
end
|
|
```
|
|
|
|
Of the two approaches, authorizing the object is more efficient, because it
|
|
helps avoid unnecessary queries.
|
|
|
|
## Field authorization
|
|
|
|
Fields can be authorized with the `authorize` option.
|
|
|
|
Fields authorization is checked against the current object, and
|
|
authorization happens _before_ resolution, which means that
|
|
fields do not have access to the resolved resource. If you need to
|
|
apply an authorization check to a field, you probably want to add
|
|
authorization to the resolver, or ideally to the type.
|
|
|
|
For example, the following authorization ensures that the
|
|
authenticated user must have administrator level access to the project
|
|
to view the `secretName` field:
|
|
|
|
```ruby
|
|
module Types
|
|
class ProjectType < BaseObject
|
|
field :secret_name, ::GraphQL::Types::String, null: true, authorize: :owner_access
|
|
end
|
|
end
|
|
```
|
|
|
|
In this example, we use field authorization (such as
|
|
`Ability.allowed?(current_user, :read_transactions, bank_account)`) to avoid
|
|
a more expensive query:
|
|
|
|
```ruby
|
|
module Types
|
|
class BankAccountType < BaseObject
|
|
field :transactions, ::Types::TransactionType.connection_type, null: true,
|
|
authorize: :read_transactions
|
|
end
|
|
end
|
|
```
|
|
|
|
Field authorization is recommended for:
|
|
|
|
- Scalar fields (strings, booleans, or numbers) that should have different levels
|
|
of access controls to other fields.
|
|
- Object and collection fields where an access check can be applied to the
|
|
parent to save the field resolution, and avoid individual policy checks
|
|
on each resolved object.
|
|
|
|
Field authorization does not replace object level checks, unless the object
|
|
precisely matches the access level of the parent project. For example, issues
|
|
can be confidential, independent of the access level of the parent. Therefore,
|
|
we should not use field authorization for `Project.issue`.
|
|
|
|
You can also authorize fields against multiple abilities. Pass the abilities
|
|
as an array instead of as a single value:
|
|
|
|
```ruby
|
|
module Types
|
|
class MyType < BaseObject
|
|
field :hidden_field, ::GraphQL::Types::Int,
|
|
null: true,
|
|
authorize: [:owner_access, :another_ability]
|
|
end
|
|
end
|
|
```
|
|
|
|
The field authorization on `MyType.hiddenField` implies the following tests:
|
|
|
|
```ruby
|
|
Ability.allowed?(current_user, :owner_access, object_of_my_type) &&
|
|
Ability.allowed?(current_user, :another_ability, object_of_my_type)
|
|
```
|
|
|
|
## Type and Field authorizations together
|
|
|
|
Authorizations are cumulative. In other words, the currently authenticated
|
|
user may need to pass authorization requirements on both a field and a field's
|
|
type.
|
|
|
|
In the following simplified example the currently authenticated user
|
|
needs both `first_permission` on the user and `second_permission` on the
|
|
issue to see the author of the issue.
|
|
|
|
```ruby
|
|
class UserType
|
|
authorize :first_permission
|
|
end
|
|
```
|
|
|
|
```ruby
|
|
class IssueType
|
|
field :author, UserType, authorize: :second_permission
|
|
end
|
|
```
|
|
|
|
The combination of the object authorization on `UserType` and the field authorization on `IssueType.author` implies the following tests:
|
|
|
|
```ruby
|
|
Ability.allowed?(current_user, :second_permission, issue) &&
|
|
Ability.allowed?(current_user, :first_permission, issue.author)
|
|
```
|