2018-12-05 23:21:45 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
module FinderMethods
|
2018-12-05 23:21:45 +05:30
|
|
|
# rubocop: disable CodeReuse/ActiveRecord
|
2018-03-27 19:54:05 +05:30
|
|
|
def find_by!(*args)
|
|
|
|
raise_not_found_unless_authorized execute.find_by!(*args)
|
|
|
|
end
|
2018-12-05 23:21:45 +05:30
|
|
|
# rubocop: enable CodeReuse/ActiveRecord
|
2018-03-27 19:54:05 +05:30
|
|
|
|
2018-12-05 23:21:45 +05:30
|
|
|
# rubocop: disable CodeReuse/ActiveRecord
|
2018-03-27 19:54:05 +05:30
|
|
|
def find_by(*args)
|
|
|
|
if_authorized execute.find_by(*args)
|
|
|
|
end
|
2018-12-05 23:21:45 +05:30
|
|
|
# rubocop: enable CodeReuse/ActiveRecord
|
2018-03-27 19:54:05 +05:30
|
|
|
|
|
|
|
def find(*args)
|
|
|
|
raise_not_found_unless_authorized model.find(*args)
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
def raise_not_found_unless_authorized(result)
|
|
|
|
result = if_authorized(result)
|
|
|
|
|
|
|
|
raise ActiveRecord::RecordNotFound.new("Couldn't find #{model}") unless result
|
|
|
|
|
|
|
|
result
|
|
|
|
end
|
|
|
|
|
|
|
|
def if_authorized(result)
|
|
|
|
# Return the result if the finder does not perform authorization checks.
|
|
|
|
# this is currently the case in the `MilestoneFinder`
|
|
|
|
return result unless respond_to?(:current_user)
|
|
|
|
|
|
|
|
if can_read_object?(result)
|
|
|
|
result
|
|
|
|
else
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def can_read_object?(object)
|
|
|
|
# When there's no policy, we'll allow the read, this is for example the case
|
|
|
|
# for Todos
|
|
|
|
return true unless DeclarativePolicy.has_policy?(object)
|
|
|
|
|
|
|
|
model_name = object&.model_name || model.model_name
|
|
|
|
|
|
|
|
Ability.allowed?(current_user, :"read_#{model_name.singular}", object)
|
|
|
|
end
|
|
|
|
|
|
|
|
# This fetches the model from the `ActiveRecord::Relation` but does not
|
|
|
|
# actually execute the query.
|
|
|
|
def model
|
|
|
|
execute.model
|
|
|
|
end
|
|
|
|
end
|