add rbac basics

This commit is contained in:
Roland Schneider 2025-10-28 11:04:35 +01:00
parent a676398ac4
commit 7bf514b2aa
17 changed files with 293 additions and 34 deletions

View File

@ -6,6 +6,8 @@ import { ConfigModule, ConfigService } from '@nestjs/config';
import { UserModule } from './user/user.module'; import { UserModule } from './user/user.module';
import { AuthModule } from './auth/auth.module'; import { AuthModule } from './auth/auth.module';
import { User } from './entity/user'; import { User } from './entity/user';
import { UserGroup } from './entity/user-group';
import { UserRole } from './entity/user-role';
const moduleTypeOrm = TypeOrmModule.forRootAsync({ const moduleTypeOrm = TypeOrmModule.forRootAsync({
imports: [ConfigModule], imports: [ConfigModule],
@ -18,20 +20,15 @@ const moduleTypeOrm = TypeOrmModule.forRootAsync({
username: configService.get<string>('DATABASE_USER'), username: configService.get<string>('DATABASE_USER'),
password: configService.get<string>('DATABASE_PASS'), password: configService.get<string>('DATABASE_PASS'),
database: configService.get<string>('DATABASE_NAME'), database: configService.get<string>('DATABASE_NAME'),
entities: [User], entities: [User, UserGroup, UserRole],
logging: true,
// synchronize: true, // synchronize: true,
}; };
}, },
}); });
@Module({ @Module({
imports: [ imports: [ConfigModule.forRoot(), moduleTypeOrm, UserModule, AuthModule],
ConfigModule.forRoot(),
moduleTypeOrm,
UserModule,
AuthModule,
],
controllers: [AppController], controllers: [AppController],
providers: [AppService], providers: [AppService],
}) })

View File

@ -1,21 +1,13 @@
import { Controller, Post, Body, UnauthorizedException } from '@nestjs/common'; import { Controller, Post, Body, ValidationPipe } from '@nestjs/common';
import { AuthService } from './auth.service'; import { AuthService } from './auth.service';
import { User } from '../entity/user'; import { LoginRequestDto } from './dto/login-request.dto';
@Controller('auth') @Controller('auth')
export class AuthController { export class AuthController {
constructor(private authService: AuthService) {} constructor(private authService: AuthService) {}
@Post('login') @Post('login')
async login(@Body() body: { username: string; password: string }) { async login(@Body(new ValidationPipe()) body: LoginRequestDto) {
console.info('login', body); return await this.authService.login(body);
const user: User | null = await this.authService.validateUser(
body.username,
body.password,
);
if (!user) {
throw new UnauthorizedException();
}
return this.authService.login(user);
} }
} }

View File

@ -1,8 +1,9 @@
import { Injectable } from '@nestjs/common'; import { Injectable, UnauthorizedException } from '@nestjs/common';
import { UserService } from '../user/user.service'; import { UserService } from '../user/user.service';
import { JwtService } from '@nestjs/jwt'; import { JwtService } from '@nestjs/jwt';
import * as bcrypt from 'bcrypt'; import * as bcrypt from 'bcrypt';
import { User } from '../entity/user'; import { User } from '../entity/user';
import { LoginRequest, LoginResponse } from '../types';
@Injectable() @Injectable()
export class AuthService { export class AuthService {
@ -12,15 +13,38 @@ export class AuthService {
) {} ) {}
async validateUser(username: string, pass: string): Promise<User | null> { async validateUser(username: string, pass: string): Promise<User | null> {
const user = await this.userService.findByUsername(username); const user = await this.userService.findByUsername(username, {
groups: {
roles: true,
},
});
if (user && (await bcrypt.compare(pass, user.password))) { if (user && (await bcrypt.compare(pass, user.password))) {
return user; return user;
} }
return null; return null;
} }
login(user: { username: string; id: string | number }) { async login(loginData: LoginRequest): Promise<LoginResponse> {
const payload = { username: user.username, sub: user.id }; const user: User | null = await this.validateUser(
loginData.username,
loginData.password,
);
if (!user) {
throw new UnauthorizedException();
}
const roles: Set<string> = new Set<string>();
for (const group of user.groups ?? []) {
for (const role of group.roles ?? []) {
roles.add(role.name);
}
}
const payload = {
username: user.username,
sub: user.id,
roles: Array.from(roles),
};
return { return {
access_token: this.jwtService.sign(payload), access_token: this.jwtService.sign(payload),
}; };

View File

@ -0,0 +1,9 @@
import { IsString } from 'class-validator';
export class LoginRequestDto {
@IsString()
username: string;
@IsString()
password: string;
}

View File

@ -2,10 +2,11 @@ import { Injectable } from '@nestjs/common';
import { PassportStrategy } from '@nestjs/passport'; import { PassportStrategy } from '@nestjs/passport';
import { ExtractJwt, Strategy } from 'passport-jwt'; import { ExtractJwt, Strategy } from 'passport-jwt';
import { ConfigService } from '@nestjs/config'; import { ConfigService } from '@nestjs/config';
import { Role } from './role.enum';
@Injectable() @Injectable()
export class JwtStrategy extends PassportStrategy(Strategy) { export class JwtStrategy extends PassportStrategy(Strategy) {
constructor(private configService: ConfigService) { constructor(configService: ConfigService) {
super({ super({
jwtFromRequest: ExtractJwt.fromAuthHeaderAsBearerToken(), jwtFromRequest: ExtractJwt.fromAuthHeaderAsBearerToken(),
ignoreExpiration: false, ignoreExpiration: false,
@ -13,7 +14,11 @@ export class JwtStrategy extends PassportStrategy(Strategy) {
}); });
} }
validate(payload: { sub: string; username: string }) { validate(payload: { sub: string; username: string; roles: Role[] }) {
return { userId: payload.sub, username: payload.username }; return {
userId: payload.sub,
username: payload.username,
roles: payload.roles,
};
} }
} }

4
src/auth/role.enum.ts Normal file
View File

@ -0,0 +1,4 @@
export enum Role {
User = 'user',
Admin = 'admin',
}

View File

@ -0,0 +1,5 @@
import { SetMetadata } from '@nestjs/common';
import { Role } from './role.enum';
export const ROLES_KEY = 'roles';
export const Roles = (...roles: Role[]) => SetMetadata(ROLES_KEY, roles);

21
src/auth/roles.guard.ts Normal file
View File

@ -0,0 +1,21 @@
import { Injectable, CanActivate, ExecutionContext } from '@nestjs/common';
import { Reflector } from '@nestjs/core';
import { Role } from './role.enum';
import { ROLES_KEY } from './roles.decorator';
@Injectable()
export class RolesGuard implements CanActivate {
constructor(private reflector: Reflector) {}
canActivate(context: ExecutionContext): boolean {
const requiredRoles = this.reflector.getAllAndOverride<Role[]>(ROLES_KEY, [
context.getHandler(),
context.getClass(),
]);
if (!requiredRoles) {
return true;
}
const { user } = context.switchToHttp().getRequest();
return requiredRoles.some((role) => user.roles?.includes(role));
}
}

View File

@ -3,6 +3,8 @@ import { DataSource } from 'typeorm';
import { User } from './entity/user'; import { User } from './entity/user';
import * as dotenv from 'dotenv'; import * as dotenv from 'dotenv';
import { UserGroup } from './entity/user-group';
import { UserRole } from './entity/user-role';
dotenv.config(); dotenv.config();
@ -15,7 +17,7 @@ export const AppDataSource = new DataSource({
database: process.env.DATABASE_NAME, database: process.env.DATABASE_NAME,
synchronize: false, synchronize: false,
logging: false, logging: false,
entities: [User], entities: [User, UserGroup, UserRole],
migrations: [ migrations: [
'src/migration/**/*.ts' 'src/migration/**/*.ts'
], ],

21
src/entity/user-group.ts Normal file
View File

@ -0,0 +1,21 @@
import {
Entity,
PrimaryGeneratedColumn,
Column,
ManyToMany,
JoinTable,
} from 'typeorm';
import { UserRole } from './user-role';
@Entity()
export class UserGroup {
@PrimaryGeneratedColumn()
id: number;
@Column({ unique: true })
name: string;
@ManyToMany(() => UserRole)
@JoinTable()
roles: UserRole[];
}

10
src/entity/user-role.ts Normal file
View File

@ -0,0 +1,10 @@
import { Entity, PrimaryGeneratedColumn, Column } from 'typeorm';
@Entity()
export class UserRole {
@PrimaryGeneratedColumn()
id: number;
@Column({ unique: true })
name: string;
}

View File

@ -1,4 +1,11 @@
import { Entity, Column, PrimaryGeneratedColumn } from "typeorm" import {
Entity,
Column,
PrimaryGeneratedColumn,
ManyToMany,
JoinTable,
} from 'typeorm';
import { UserGroup } from './user-group';
@Entity() @Entity()
export class User { export class User {
@ -13,4 +20,8 @@ export class User {
@Column() @Column()
password: string; password: string;
@ManyToMany(() => UserGroup)
@JoinTable()
groups: UserGroup[];
} }

View File

@ -0,0 +1,75 @@
import { MigrationInterface, QueryRunner } from 'typeorm';
export class AddRbac1761597406101 implements MigrationInterface {
name = 'AddRbac1761597406101';
public async up(queryRunner: QueryRunner): Promise<void> {
await queryRunner.query(
`CREATE TABLE "user_role" ("id" SERIAL NOT NULL, "name" character varying NOT NULL, CONSTRAINT "UQ_31f96f2013b7ac833d7682bf021" UNIQUE ("name"), CONSTRAINT "PK_fb2e442d14add3cefbdf33c4561" PRIMARY KEY ("id"))`,
);
await queryRunner.query(
`CREATE TABLE "user_group" ("id" SERIAL NOT NULL, "name" character varying NOT NULL, CONSTRAINT "UQ_11b85d8d72220e3ca816d3e907a" UNIQUE ("name"), CONSTRAINT "PK_3c29fba6fe013ec8724378ce7c9" PRIMARY KEY ("id"))`,
);
await queryRunner.query(
`CREATE TABLE "user_group_roles_user_role" ("userGroupId" integer NOT NULL, "userRoleId" integer NOT NULL, CONSTRAINT "PK_ebde92504ad1d97331b6b64a6df" PRIMARY KEY ("userGroupId", "userRoleId"))`,
);
await queryRunner.query(
`CREATE INDEX "IDX_411df6d2b8a7e01aacc3c8a6ea" ON "user_group_roles_user_role" ("userGroupId") `,
);
await queryRunner.query(
`CREATE INDEX "IDX_9172c01a353d2db376e54ee91b" ON "user_group_roles_user_role" ("userRoleId") `,
);
await queryRunner.query(
`CREATE TABLE "user_groups_user_group" ("userId" integer NOT NULL, "userGroupId" integer NOT NULL, CONSTRAINT "PK_a4c39cf055515d3478562577ce4" PRIMARY KEY ("userId", "userGroupId"))`,
);
await queryRunner.query(
`CREATE INDEX "IDX_372e638c75644389a7832a604e" ON "user_groups_user_group" ("userId") `,
);
await queryRunner.query(
`CREATE INDEX "IDX_235ca434168087abe1c665fd37" ON "user_groups_user_group" ("userGroupId") `,
);
await queryRunner.query(
`ALTER TABLE "user_group_roles_user_role" ADD CONSTRAINT "FK_411df6d2b8a7e01aacc3c8a6eae" FOREIGN KEY ("userGroupId") REFERENCES "user_group"("id") ON DELETE CASCADE ON UPDATE CASCADE`,
);
await queryRunner.query(
`ALTER TABLE "user_group_roles_user_role" ADD CONSTRAINT "FK_9172c01a353d2db376e54ee91bb" FOREIGN KEY ("userRoleId") REFERENCES "user_role"("id") ON DELETE CASCADE ON UPDATE CASCADE`,
);
await queryRunner.query(
`ALTER TABLE "user_groups_user_group" ADD CONSTRAINT "FK_372e638c75644389a7832a604ed" FOREIGN KEY ("userId") REFERENCES "user"("id") ON DELETE CASCADE ON UPDATE CASCADE`,
);
await queryRunner.query(
`ALTER TABLE "user_groups_user_group" ADD CONSTRAINT "FK_235ca434168087abe1c665fd375" FOREIGN KEY ("userGroupId") REFERENCES "user_group"("id") ON DELETE CASCADE ON UPDATE CASCADE`,
);
}
public async down(queryRunner: QueryRunner): Promise<void> {
await queryRunner.query(
`ALTER TABLE "user_groups_user_group" DROP CONSTRAINT "FK_235ca434168087abe1c665fd375"`,
);
await queryRunner.query(
`ALTER TABLE "user_groups_user_group" DROP CONSTRAINT "FK_372e638c75644389a7832a604ed"`,
);
await queryRunner.query(
`ALTER TABLE "user_group_roles_user_role" DROP CONSTRAINT "FK_9172c01a353d2db376e54ee91bb"`,
);
await queryRunner.query(
`ALTER TABLE "user_group_roles_user_role" DROP CONSTRAINT "FK_411df6d2b8a7e01aacc3c8a6eae"`,
);
await queryRunner.query(
`DROP INDEX "public"."IDX_235ca434168087abe1c665fd37"`,
);
await queryRunner.query(
`DROP INDEX "public"."IDX_372e638c75644389a7832a604e"`,
);
await queryRunner.query(`DROP TABLE "user_groups_user_group"`);
await queryRunner.query(
`DROP INDEX "public"."IDX_9172c01a353d2db376e54ee91b"`,
);
await queryRunner.query(
`DROP INDEX "public"."IDX_411df6d2b8a7e01aacc3c8a6ea"`,
);
await queryRunner.query(`DROP TABLE "user_group_roles_user_role"`);
await queryRunner.query(`DROP TABLE "user_group"`);
await queryRunner.query(`DROP TABLE "user_role"`);
}
}

View File

@ -0,0 +1,63 @@
import { MigrationInterface, QueryRunner } from 'typeorm';
export class AddRbacToAdmin1761597689677 implements MigrationInterface {
public async up(queryRunner: QueryRunner): Promise<void> {
const idRoleAdmin = await this.doInsert(queryRunner, 'user_role', {
name: 'admin',
});
console.info('idRoleAdmin', idRoleAdmin);
const idRoleUserManagement = await this.doInsert(queryRunner, 'user_role', {
name: 'user_manager',
});
console.info('idRoleUserManagement', idRoleUserManagement);
const idGroupAdmin = await this.doInsert(queryRunner, 'user_group', {
name: 'admin',
});
console.info('idGroupAdmin', idGroupAdmin);
await this.doInsert(queryRunner, 'user_group_roles_user_role', {
userGroupId: idGroupAdmin,
userRoleId: idRoleAdmin,
});
await this.doInsert(queryRunner, 'user_group_roles_user_role', {
userGroupId: idGroupAdmin,
userRoleId: idRoleUserManagement,
});
const users: object[] = (await queryRunner.query(
`SELECT * FROM "user" WHERE "username" = $1`,
['admin'],
)) as object[];
let userId: number | undefined = undefined;
if (users?.length > 0) {
const user = users[0] as { id: number };
userId = user.id;
}
await this.doInsert(queryRunner, 'user_groups_user_group', {
userGroupId: idGroupAdmin,
userId: userId,
});
}
public async down(_queryRunner: QueryRunner): Promise<void> {
// await queryRunner.query(
}
private async doInsert(
queryRunner: QueryRunner,
table: string,
values: Record<string, any>,
): Promise<string> {
console.info("inserting values",values);
const insertResult = await queryRunner.manager
.createQueryBuilder()
.insert()
.into(table)
.values(values)
.execute();
return insertResult.raw[0]?.id as string;
}
}

11
src/types.ts Normal file
View File

@ -0,0 +1,11 @@
export interface LoginRequest{
username: string;
password: string;
}
export interface LoginResponse{
access_token: string;
}

View File

@ -14,9 +14,13 @@ import { CreateUserDto } from './dto/create-user.dto';
import { UpdateUserDto } from './dto/update-user.dto'; import { UpdateUserDto } from './dto/update-user.dto';
import { User } from '../entity/user'; import { User } from '../entity/user';
import { JwtAuthGuard } from '../auth/jwt-auth.guard'; import { JwtAuthGuard } from '../auth/jwt-auth.guard';
import { Roles } from '../auth/roles.decorator';
import { Role } from '../auth/role.enum';
import { RolesGuard } from '../auth/roles.guard';
@Controller('users') @Controller('users')
@UseGuards(JwtAuthGuard) @UseGuards(JwtAuthGuard, RolesGuard)
@Roles(Role.Admin)
export class UserController { export class UserController {
constructor(private readonly userService: UserService) {} constructor(private readonly userService: UserService) {}
@ -45,6 +49,7 @@ export class UserController {
return this.userService.update(+id, updateUserDto); return this.userService.update(+id, updateUserDto);
} }
@Roles(Role.Admin)
@Delete(':id') @Delete(':id')
remove(@Param('id') id: string): Promise<void> { remove(@Param('id') id: string): Promise<void> {
return this.userService.remove(+id); return this.userService.remove(+id);

View File

@ -3,6 +3,7 @@ import { InjectRepository } from '@nestjs/typeorm';
import { Repository } from 'typeorm'; import { Repository } from 'typeorm';
import { User } from '../entity/user'; import { User } from '../entity/user';
import * as bcrypt from 'bcrypt'; import * as bcrypt from 'bcrypt';
import { FindOptionsRelations } from 'typeorm/find-options/FindOptionsRelations';
@Injectable() @Injectable()
export class UserService { export class UserService {
@ -19,8 +20,11 @@ export class UserService {
return this.usersRepository.findOneBy({ id }); return this.usersRepository.findOneBy({ id });
} }
findByUsername(username: string): Promise<User | null> { findByUsername(
return this.usersRepository.findOne({ where: { username } }); username: string,
relations: FindOptionsRelations<User>,
): Promise<User | null> {
return this.usersRepository.findOne({ where: { username }, relations });
} }
async create(user: Partial<User>): Promise<User> { async create(user: Partial<User>): Promise<User> {