sendou.ink/app/modules/permissions/guards.server.ts
Kalle 9e0f36d90c Refactor requireRole/requirePermission to resolve user internally
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-24 20:02:37 +02:00

40 lines
1.2 KiB
TypeScript

import { requireUser } from "~/features/auth/core/user.server";
import type { EntityWithPermissions, Role } from "~/modules/permissions/types";
import { isAdmin } from "./utils";
/**
* Checks if a user has the required global role.
*
* @throws {Response} - Throws a 403 Forbidden response if the user does not have the required role.
*/
export function requireRole(role: Role) {
const user = requireUser();
if (!user.roles.includes(role)) {
throw new Response("Forbidden", { status: 403 });
}
}
/**
* Checks if a user has the required permission to perform an action on a given entity.
*
* @throws {Response} - Throws a 403 Forbidden response if the user does not have the required permission.
*/
export function requirePermission<
T extends EntityWithPermissions,
K extends keyof T["permissions"],
>(obj: T, permission: K) {
const user = requireUser();
// admin can do anything in production but not in development for better testing
if (process.env.NODE_ENV === "production" && isAdmin(user)) {
return;
}
const permissions = obj.permissions as Record<K, number[]>;
if (permissions[permission].includes(user.id)) {
return;
}
throw new Response("Forbidden", { status: 403 });
}