Commit 8e9eee0a authored by Stan Hu's avatar Stan Hu

Merge branch...

Merge branch 'ee-1159-allow-permission-check-bypass-in-approve-access-request-service-ee' into 'master'

Don't pass a current user to Member#add_user in LDAP group sync

See the individual commits for explanation of the changes.

This is part of the fix for gitlab-org/gitlab-ee#1159.

CE backport for the change in `Members::ApproveAccessRequestService` is at gitlab-org/gitlab-ce!7168.
/cc @stanhu

See merge request !830
parents 6081c371 8e748bdb
...@@ -111,7 +111,7 @@ class Member < ActiveRecord::Base ...@@ -111,7 +111,7 @@ class Member < ActiveRecord::Base
current_user, current_user,
id: member.id, id: member.id,
access_level: access_level access_level: access_level
).execute ).execute(force: ldap)
else else
member.save member.save
end end
......
...@@ -4,17 +4,25 @@ module Members ...@@ -4,17 +4,25 @@ module Members
attr_accessor :source attr_accessor :source
# source - The source object that respond to `#requesters` (i.g. project or group)
# current_user - The user that performs the access request approval
# params - A hash of parameters
# :user_id - User ID used to retrieve the access requester
# :id - Member ID used to retrieve the access requester
# :access_level - Optional access level set when the request is accepted
def initialize(source, current_user, params = {}) def initialize(source, current_user, params = {})
@source = source @source = source
@current_user = current_user @current_user = current_user
@params = params @params = params.slice(:user_id, :id, :access_level)
end end
def execute # opts - A hash of options
# :force - Bypass permission check: current_user can be nil in that case
def execute(opts = {})
condition = params[:user_id] ? { user_id: params[:user_id] } : { id: params[:id] } condition = params[:user_id] ? { user_id: params[:user_id] } : { id: params[:id] }
access_requester = source.requesters.find_by!(condition) access_requester = source.requesters.find_by!(condition)
raise Gitlab::Access::AccessDeniedError unless can_update_access_requester?(access_requester) raise Gitlab::Access::AccessDeniedError unless can_update_access_requester?(access_requester, opts)
access_requester.access_level = params[:access_level] if params[:access_level] access_requester.access_level = params[:access_level] if params[:access_level]
access_requester.accept_request access_requester.accept_request
...@@ -24,8 +32,11 @@ module Members ...@@ -24,8 +32,11 @@ module Members
private private
def can_update_access_requester?(access_requester) def can_update_access_requester?(access_requester, opts = {})
access_requester && can?(current_user, action_member_permission(:update, access_requester), access_requester) access_requester && (
opts[:force] ||
can?(current_user, action_member_permission(:update, access_requester), access_requester)
)
end end
end end
end end
...@@ -99,13 +99,6 @@ module EE ...@@ -99,13 +99,6 @@ module EE
def update_existing_group_membership(group, access_levels) def update_existing_group_membership(group, access_levels)
logger.debug { "Updating existing membership for '#{group.name}' group" } logger.debug { "Updating existing membership for '#{group.name}' group" }
# Access requesters must be approved by a group owner so we take the
# first group owner and pass it as `current_user` to `#add_or_update_user_membership`.
# For users that are not access requesters, it doesn't matter if
# `current_user` is `nil` because the permissions to update users are
# not enforced in `Member.add_user`!
added_by = group.members.owners.first.try(:user)
select_and_preload_group_members(group).each do |member| select_and_preload_group_members(group).each do |member|
user = member.user user = member.user
identity = user.identities.select(:id, :extern_uid) identity = user.identities.select(:id, :extern_uid)
...@@ -147,8 +140,7 @@ module EE ...@@ -147,8 +140,7 @@ module EE
add_or_update_user_membership( add_or_update_user_membership(
user, user,
group, group,
desired_access, desired_access
current_user: added_by
) )
elsif group.last_owner?(user) elsif group.last_owner?(user)
warn_cannot_remove_last_owner(user, group) warn_cannot_remove_last_owner(user, group)
...@@ -161,13 +153,6 @@ module EE ...@@ -161,13 +153,6 @@ module EE
def add_new_members(group, access_levels) def add_new_members(group, access_levels)
logger.debug { "Adding new members to '#{group.name}' group" } logger.debug { "Adding new members to '#{group.name}' group" }
# Access requesters must be approved by a group owner so we take the
# first group owner and pass it as `current_user` to `#add_or_update_user_membership`.
# For users that are not access requesters, it doesn't matter if
# `current_user` is `nil` because the permissions to update users are
# not enforced in `Member.add_user`!
added_by = group.members.owners.first.try(:user)
access_levels.each do |member_dn, access_level| access_levels.each do |member_dn, access_level|
user = ::Gitlab::LDAP::User.find_by_uid_and_provider(member_dn, provider) user = ::Gitlab::LDAP::User.find_by_uid_and_provider(member_dn, provider)
...@@ -175,8 +160,7 @@ module EE ...@@ -175,8 +160,7 @@ module EE
add_or_update_user_membership( add_or_update_user_membership(
user, user,
group, group,
access_level, access_level
current_user: added_by
) )
else else
logger.debug do logger.debug do
......
...@@ -4,10 +4,13 @@ describe EE::Gitlab::LDAP::Sync::Group, lib: true do ...@@ -4,10 +4,13 @@ describe EE::Gitlab::LDAP::Sync::Group, lib: true do
include LdapHelpers include LdapHelpers
let(:adapter) { ldap_adapter } let(:adapter) { ldap_adapter }
let(:sync_group) { described_class.new(group, proxy(adapter)) }
let(:user) { create(:user) } let(:user) { create(:user) }
before do before do
# We need to actually activate the LDAP config otherwise `Group#ldap_synced?`
# will always be false!
allow(Gitlab.config.ldap).to receive_messages(enabled: true)
create(:identity, user: user, extern_uid: user_dn(user.username)) create(:identity, user: user, extern_uid: user_dn(user.username))
stub_ldap_config(active_directory: false) stub_ldap_config(active_directory: false)
...@@ -113,6 +116,9 @@ describe EE::Gitlab::LDAP::Sync::Group, lib: true do ...@@ -113,6 +116,9 @@ describe EE::Gitlab::LDAP::Sync::Group, lib: true do
describe '#update_permissions' do describe '#update_permissions' do
before do before do
# Safe-check because some permissions are removed when `Group#ldap_synced?`
# is true (e.g. in `GroupPolicy`).
expect(group).to be_ldap_synced
group.start_ldap_sync group.start_ldap_sync
end end
after do after do
...@@ -124,6 +130,7 @@ describe EE::Gitlab::LDAP::Sync::Group, lib: true do ...@@ -124,6 +130,7 @@ describe EE::Gitlab::LDAP::Sync::Group, lib: true do
cn: 'ldap_group1', cn: 'ldap_group1',
group_access: ::Gitlab::Access::DEVELOPER) group_access: ::Gitlab::Access::DEVELOPER)
end end
let(:sync_group) { described_class.new(group, proxy(adapter)) }
context 'with all functionality against one LDAP group type' do context 'with all functionality against one LDAP group type' do
context 'with basic add/update actions' do context 'with basic add/update actions' do
......
...@@ -5,36 +5,37 @@ describe Members::ApproveAccessRequestService, services: true do ...@@ -5,36 +5,37 @@ describe Members::ApproveAccessRequestService, services: true do
let(:access_requester) { create(:user) } let(:access_requester) { create(:user) }
let(:project) { create(:project, :public) } let(:project) { create(:project, :public) }
let(:group) { create(:group, :public) } let(:group) { create(:group, :public) }
let(:opts) { {} }
shared_examples 'a service raising ActiveRecord::RecordNotFound' do shared_examples 'a service raising ActiveRecord::RecordNotFound' do
it 'raises ActiveRecord::RecordNotFound' do it 'raises ActiveRecord::RecordNotFound' do
expect { described_class.new(source, user, params).execute }.to raise_error(ActiveRecord::RecordNotFound) expect { described_class.new(source, user, params).execute(opts) }.to raise_error(ActiveRecord::RecordNotFound)
end end
end end
shared_examples 'a service raising Gitlab::Access::AccessDeniedError' do shared_examples 'a service raising Gitlab::Access::AccessDeniedError' do
it 'raises Gitlab::Access::AccessDeniedError' do it 'raises Gitlab::Access::AccessDeniedError' do
expect { described_class.new(source, user, params).execute }.to raise_error(Gitlab::Access::AccessDeniedError) expect { described_class.new(source, user, params).execute(opts) }.to raise_error(Gitlab::Access::AccessDeniedError)
end end
end end
shared_examples 'a service approving an access request' do shared_examples 'a service approving an access request' do
it 'succeeds' do it 'succeeds' do
expect { described_class.new(source, user, params).execute }.to change { source.requesters.count }.by(-1) expect { described_class.new(source, user, params).execute(opts) }.to change { source.requesters.count }.by(-1)
end end
it 'returns a <Source>Member' do it 'returns a <Source>Member' do
member = described_class.new(source, user, params).execute member = described_class.new(source, user, params).execute(opts)
expect(member).to be_a "#{source.class}Member".constantize expect(member).to be_a "#{source.class}Member".constantize
expect(member.requested_at).to be_nil expect(member.requested_at).to be_nil
end end
context 'with a custom access level' do context 'with a custom access level' do
let(:params) { { user_id: access_requester.id, access_level: Gitlab::Access::MASTER } } let(:params2) { params.merge(user_id: access_requester.id, access_level: Gitlab::Access::MASTER) }
it 'returns a ProjectMember with the custom access level' do it 'returns a ProjectMember with the custom access level' do
member = described_class.new(source, user, params).execute member = described_class.new(source, user, params2).execute(opts)
expect(member.access_level).to eq Gitlab::Access::MASTER expect(member.access_level).to eq Gitlab::Access::MASTER
end end
...@@ -60,6 +61,56 @@ describe Members::ApproveAccessRequestService, services: true do ...@@ -60,6 +61,56 @@ describe Members::ApproveAccessRequestService, services: true do
end end
let(:params) { { user_id: access_requester.id } } let(:params) { { user_id: access_requester.id } }
context 'when current user is nil' do
let(:user) { nil }
context 'and :force option is not given' do
it_behaves_like 'a service raising Gitlab::Access::AccessDeniedError' do
let(:source) { project }
end
it_behaves_like 'a service raising Gitlab::Access::AccessDeniedError' do
let(:source) { group }
end
end
context 'and :force option is false' do
let(:opts) { { force: false } }
it_behaves_like 'a service raising Gitlab::Access::AccessDeniedError' do
let(:source) { project }
end
it_behaves_like 'a service raising Gitlab::Access::AccessDeniedError' do
let(:source) { group }
end
end
context 'and :force option is true' do
let(:opts) { { force: true } }
it_behaves_like 'a service approving an access request' do
let(:source) { project }
end
it_behaves_like 'a service approving an access request' do
let(:source) { group }
end
end
context 'and :force param is true' do
let(:params) { { user_id: access_requester.id, force: true } }
it_behaves_like 'a service raising Gitlab::Access::AccessDeniedError' do
let(:source) { project }
end
it_behaves_like 'a service raising Gitlab::Access::AccessDeniedError' do
let(:source) { group }
end
end
end
context 'when current user cannot approve access request to the project' do context 'when current user cannot approve access request to the project' do
it_behaves_like 'a service raising Gitlab::Access::AccessDeniedError' do it_behaves_like 'a service raising Gitlab::Access::AccessDeniedError' do
let(:source) { project } let(:source) { project }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment