@@ -285,13 +285,10 @@ export const secretApprovalRequestServiceFactory = ({
285
285
) {
286
286
throw new ForbiddenRequestError ( { message : "User has insufficient privileges" } ) ;
287
287
}
288
- const getHasSecretReadAccess = (
289
- shouldCheckSecretPermission : boolean | null | undefined ,
290
- environment : string ,
291
- tags : { slug : string } [ ] ,
292
- secretPath ?: string
293
- ) => {
294
- if ( shouldCheckSecretPermission ) {
288
+ const getHasSecretReadAccess = ( environment : string , tags : { slug : string } [ ] , secretPath ?: string ) => {
289
+ const isReviewer = policy . approvers . some ( ( { userId } ) => userId === actorId ) ;
290
+
291
+ if ( ! isReviewer ) {
295
292
const canRead = hasSecretReadValueOrDescribePermission ( permission , ProjectPermissionSecretActions . ReadValue , {
296
293
environment,
297
294
secretPath : secretPath || "/" ,
@@ -322,18 +319,8 @@ export const secretApprovalRequestServiceFactory = ({
322
319
version : el . version ,
323
320
secretMetadata : el . secretMetadata as ResourceMetadataDTO ,
324
321
isRotatedSecret : el . secret ?. isRotatedSecret ?? false ,
325
- secretValueHidden : ! getHasSecretReadAccess (
326
- secretApprovalRequest . policy . shouldCheckSecretPermission ,
327
- secretApprovalRequest . environment ,
328
- el . tags ,
329
- secretPath ?. [ 0 ] ?. path
330
- ) ,
331
- secretValue : ! getHasSecretReadAccess (
332
- secretApprovalRequest . policy . shouldCheckSecretPermission ,
333
- secretApprovalRequest . environment ,
334
- el . tags ,
335
- secretPath ?. [ 0 ] ?. path
336
- )
322
+ secretValueHidden : ! getHasSecretReadAccess ( secretApprovalRequest . environment , el . tags , secretPath ?. [ 0 ] ?. path ) ,
323
+ secretValue : ! getHasSecretReadAccess ( secretApprovalRequest . environment , el . tags , secretPath ?. [ 0 ] ?. path )
337
324
? INFISICAL_SECRET_VALUE_HIDDEN_MASK
338
325
: el . secret && el . secret . isRotatedSecret
339
326
? undefined
@@ -354,17 +341,11 @@ export const secretApprovalRequestServiceFactory = ({
354
341
id : el . secret . id ,
355
342
version : el . secret . version ,
356
343
secretValueHidden : ! getHasSecretReadAccess (
357
- secretApprovalRequest . policy . shouldCheckSecretPermission ,
358
344
secretApprovalRequest . environment ,
359
345
el . tags ,
360
346
secretPath ?. [ 0 ] ?. path
361
347
) ,
362
- secretValue : ! getHasSecretReadAccess (
363
- secretApprovalRequest . policy . shouldCheckSecretPermission ,
364
- secretApprovalRequest . environment ,
365
- el . tags ,
366
- secretPath ?. [ 0 ] ?. path
367
- )
348
+ secretValue : ! getHasSecretReadAccess ( secretApprovalRequest . environment , el . tags , secretPath ?. [ 0 ] ?. path )
368
349
? INFISICAL_SECRET_VALUE_HIDDEN_MASK
369
350
: el . secret . encryptedValue
370
351
? secretManagerDecryptor ( { cipherTextBlob : el . secret . encryptedValue } ) . toString ( )
@@ -380,17 +361,11 @@ export const secretApprovalRequestServiceFactory = ({
380
361
id : el . secretVersion . id ,
381
362
version : el . secretVersion . version ,
382
363
secretValueHidden : ! getHasSecretReadAccess (
383
- secretApprovalRequest . policy . shouldCheckSecretPermission ,
384
364
secretApprovalRequest . environment ,
385
365
el . tags ,
386
366
secretPath ?. [ 0 ] ?. path
387
367
) ,
388
- secretValue : ! getHasSecretReadAccess (
389
- secretApprovalRequest . policy . shouldCheckSecretPermission ,
390
- secretApprovalRequest . environment ,
391
- el . tags ,
392
- secretPath ?. [ 0 ] ?. path
393
- )
368
+ secretValue : ! getHasSecretReadAccess ( secretApprovalRequest . environment , el . tags , secretPath ?. [ 0 ] ?. path )
394
369
? INFISICAL_SECRET_VALUE_HIDDEN_MASK
395
370
: el . secretVersion . encryptedValue
396
371
? secretManagerDecryptor ( { cipherTextBlob : el . secretVersion . encryptedValue } ) . toString ( )
@@ -409,12 +384,7 @@ export const secretApprovalRequestServiceFactory = ({
409
384
const encryptedSecrets = await secretApprovalRequestSecretDAL . findByRequestId ( secretApprovalRequest . id ) ;
410
385
secrets = encryptedSecrets . map ( ( el ) => ( {
411
386
...el ,
412
- secretValueHidden : ! getHasSecretReadAccess (
413
- secretApprovalRequest . policy . shouldCheckSecretPermission ,
414
- secretApprovalRequest . environment ,
415
- el . tags ,
416
- secretPath ?. [ 0 ] ?. path
417
- ) ,
387
+ secretValueHidden : ! getHasSecretReadAccess ( secretApprovalRequest . environment , el . tags , secretPath ?. [ 0 ] ?. path ) ,
418
388
...decryptSecretWithBot ( el , botKey ) ,
419
389
secret : el . secret
420
390
? {
0 commit comments