about summary refs log tree commit diff
path: root/gn_auth/auth/authorisation/data
diff options
context:
space:
mode:
Diffstat (limited to 'gn_auth/auth/authorisation/data')
-rw-r--r--gn_auth/auth/authorisation/data/views.py50
1 files changed, 50 insertions, 0 deletions
diff --git a/gn_auth/auth/authorisation/data/views.py b/gn_auth/auth/authorisation/data/views.py
index 05257a7..e5c8fd6 100644
--- a/gn_auth/auth/authorisation/data/views.py
+++ b/gn_auth/auth/authorisation/data/views.py
@@ -334,3 +334,53 @@ def link_phenotype() -> Response:
 
         return jsonify(with_db_connection(
             partial(__link__, **__values__(request.json))))
+
+
+@data.route("/metadata/authorisation", methods=["POST"])
+@require_json
+def metadata_resources() -> Response:
+    """Retrieve the authorisation level for given metadata resources"""
+    db_uri, privileges = app.config["AUTH_DB"], {}
+    user = User(uuid.uuid4(), "anon@ymous.user", "Anonymous User")
+    with db.connection(db_uri) as auth_conn:
+        with require_oauth.acquire("profile group resource") as token:
+            resources = attach_resources_data(
+                auth_conn, user_resources(auth_conn, token.user)
+            )
+            roles = user_resource_roles(
+                auth_conn, token.user
+            )
+            privileges = {
+                    resource_id: tuple(
+                        privilege.privilege_id
+                        for role in roles[resource_id]
+                        for privilege in role.privileges)
+                    for resource_id, is_authorised
+                    in authorised_for(
+                        auth_conn, token.user,
+                        ("group:resource:view-resource",),
+                        tuple(
+                            resource.resource_id for resource
+                            in resources
+                        )
+                    ).items()
+                    if is_authorised
+                } | {
+                    resource.resource_id: ("system:resource:public-read",)
+                    for resource in resources if resource.public
+                }
+            resource_map = {
+                resource.resource_category.resource_category_key.lower():
+                resource.resource_id
+                for resource in resources
+                for item in resource.resource_data
+            }
+            return jsonify(
+                {
+                    "user": user._asdict(),
+                    "resource_id": resource_map.get(
+                        request.json.get("name")  #type: ignore[union-attr]
+                    ),
+                    "privileges": privileges,
+                }
+            )