feat(auth): restrict system role config reads to admins

This commit is contained in:
2026-03-30 09:46:32 +02:00
parent 98502e6cf8
commit a25635ee66
2 changed files with 85 additions and 2 deletions
@@ -0,0 +1,83 @@
import { SystemRole } from "@capakraken/shared";
import { describe, expect, it, vi } from "vitest";
import { systemRoleConfigRouter } from "../router/system-role-config.js";
import { createCallerFactory } from "../trpc.js";
const createCaller = createCallerFactory(systemRoleConfigRouter);
function createAdminCaller(db: Record<string, unknown>) {
return createCaller({
session: {
user: { email: "admin@example.com", name: "Admin", image: null },
expires: "2099-01-01T00:00:00.000Z",
},
db: db as never,
dbUser: {
id: "admin_1",
systemRole: SystemRole.ADMIN,
permissionOverrides: null,
},
});
}
function createProtectedCaller(db: Record<string, unknown>) {
return createCaller({
session: {
user: { email: "user@example.com", name: "User", image: null },
expires: "2099-01-01T00:00:00.000Z",
},
db: db as never,
dbUser: {
id: "user_1",
systemRole: SystemRole.USER,
permissionOverrides: null,
},
});
}
describe("system role config router authorization", () => {
it("requires admin access for listing role configs", async () => {
const caller = createProtectedCaller({});
await expect(caller.list()).rejects.toThrow(
expect.objectContaining({
code: "FORBIDDEN",
message: "Admin role required",
}),
);
});
it("allows admins to list role configs", async () => {
const db = {
systemRoleConfig: {
findMany: vi.fn().mockResolvedValue([
{
role: SystemRole.ADMIN,
label: "Admin",
description: "System administrator",
color: "#000000",
sortOrder: 0,
defaultPermissions: [],
},
]),
},
};
const caller = createAdminCaller(db);
const result = await caller.list();
expect(db.systemRoleConfig.findMany).toHaveBeenCalledWith({
orderBy: { sortOrder: "asc" },
});
expect(result).toEqual([
{
role: SystemRole.ADMIN,
label: "Admin",
description: "System administrator",
color: "#000000",
sortOrder: 0,
defaultPermissions: [],
},
]);
});
});
@@ -1,10 +1,10 @@
import { z } from "zod";
import { adminProcedure, createTRPCRouter, invalidateRoleDefaultsCache, protectedProcedure } from "../trpc.js";
import { adminProcedure, createTRPCRouter, invalidateRoleDefaultsCache } from "../trpc.js";
import { createAuditEntry } from "../lib/audit.js";
export const systemRoleConfigRouter = createTRPCRouter({
/** List all role configs (sorted by sortOrder) */
list: protectedProcedure.query(async ({ ctx }) => {
list: adminProcedure.query(async ({ ctx }) => {
return ctx.db.systemRoleConfig.findMany({
orderBy: { sortOrder: "asc" },
});