Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
5ec83801
Commit
5ec83801
authored
Oct 17, 2011
by
Dmitriy Zaporozhets
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
security improved
parent
cafacc72
Changes
9
Show whitespace changes
Inline
Side-by-side
Showing
9 changed files
with
74 additions
and
26 deletions
+74
-26
app/controllers/application_controller.rb
app/controllers/application_controller.rb
+6
-2
app/controllers/issues_controller.rb
app/controllers/issues_controller.rb
+9
-5
app/controllers/notes_controller.rb
app/controllers/notes_controller.rb
+3
-1
app/controllers/snippets_controller.rb
app/controllers/snippets_controller.rb
+3
-4
app/controllers/team_members_controller.rb
app/controllers/team_members_controller.rb
+2
-2
app/models/ability.rb
app/models/ability.rb
+20
-0
spec/requests/projects_security_spec.rb
spec/requests/projects_security_spec.rb
+12
-6
spec/requests/user_security_spec.rb
spec/requests/user_security_spec.rb
+4
-4
spec/support/matchers.rb
spec/support/matchers.rb
+15
-2
No files found.
app/controllers/application_controller.rb
View file @
5ec83801
...
...
@@ -27,11 +27,15 @@ class ApplicationController < ActionController::Base
end
def
authenticate_admin!
return
re
direct_to
(
new_user_session_path
)
unless
current_user
.
is_admin?
return
re
nder_404
unless
current_user
.
is_admin?
end
def
authorize_project!
(
action
)
return
redirect_to
(
new_user_session_path
)
unless
can?
(
current_user
,
action
,
project
)
return
render_404
unless
can?
(
current_user
,
action
,
project
)
end
def
access_denied!
render_404
end
def
method_missing
(
method_sym
,
*
arguments
,
&
block
)
...
...
app/controllers/issues_controller.rb
View file @
5ec83801
class
IssuesController
<
ApplicationController
before_filter
:authenticate_user!
before_filter
:project
before_filter
:issue
,
:only
=>
[
:edit
,
:update
,
:destroy
,
:show
]
# Authorize
before_filter
:add_project_abilities
before_filter
:authorize_read_issue!
before_filter
:authorize_write_issue!
,
:only
=>
[
:new
,
:create
,
:close
,
:edit
,
:update
,
:sort
]
before_filter
:authorize_admin_issue!
,
:only
=>
[
:destroy
]
respond_to
:js
...
...
@@ -30,12 +30,10 @@ class IssuesController < ApplicationController
end
def
edit
@issue
=
@project
.
issues
.
find
(
params
[
:id
])
respond_with
(
@issue
)
end
def
show
@issue
=
@project
.
issues
.
find
(
params
[
:id
])
@notes
=
@issue
.
notes
@note
=
@project
.
notes
.
new
(
:noteable
=>
@issue
)
end
...
...
@@ -51,7 +49,6 @@ class IssuesController < ApplicationController
end
def
update
@issue
=
@project
.
issues
.
find
(
params
[
:id
])
@issue
.
update_attributes
(
params
[
:issue
])
respond_to
do
|
format
|
...
...
@@ -62,7 +59,8 @@ class IssuesController < ApplicationController
def
destroy
@issue
=
@project
.
issues
.
find
(
params
[
:id
])
return
access_denied!
unless
can?
(
current_user
,
:admin_issue
,
@issue
)
@issue
.
destroy
respond_to
do
|
format
|
...
...
@@ -79,4 +77,10 @@ class IssuesController < ApplicationController
render
:nothing
=>
true
end
protected
def
issue
@issue
||=
@project
.
issues
.
find
(
params
[
:id
])
end
end
app/controllers/notes_controller.rb
View file @
5ec83801
...
...
@@ -4,7 +4,6 @@ class NotesController < ApplicationController
# Authorize
before_filter
:add_project_abilities
before_filter
:authorize_write_note!
,
:only
=>
[
:create
]
before_filter
:authorize_admin_note!
,
:only
=>
[
:destroy
]
respond_to
:js
...
...
@@ -25,6 +24,9 @@ class NotesController < ApplicationController
def
destroy
@note
=
@project
.
notes
.
find
(
params
[
:id
])
return
access_denied!
unless
can?
(
current_user
,
:admin_note
,
@note
)
@note
.
destroy
respond_to
do
|
format
|
...
...
app/controllers/snippets_controller.rb
View file @
5ec83801
...
...
@@ -52,12 +52,11 @@ class SnippetsController < ApplicationController
def
destroy
@snippet
=
@project
.
snippets
.
find
(
params
[
:id
])
authorize_admin_snippet!
unless
@snippet
.
author
==
current_user
return
access_denied!
unless
can?
(
current_user
,
:admin_snippet
,
@snippet
)
@snippet
.
destroy
respond_to
do
|
format
|
format
.
js
{
render
:nothing
=>
true
}
end
redirect_to
project_snippets_path
(
@project
)
end
end
app/controllers/team_members_controller.rb
View file @
5ec83801
...
...
@@ -3,8 +3,8 @@ class TeamMembersController < ApplicationController
# Authorize
before_filter
:add_project_abilities
before_filter
:authorize_read_
team_member
!
before_filter
:authorize_admin_
team_member
!
,
:only
=>
[
:new
,
:create
,
:destroy
,
:update
]
before_filter
:authorize_read_
project
!
before_filter
:authorize_admin_
project
!
,
:only
=>
[
:new
,
:create
,
:destroy
,
:update
]
def
show
@team_member
=
project
.
users_projects
.
find
(
params
[
:id
])
...
...
app/models/ability.rb
View file @
5ec83801
...
...
@@ -2,6 +2,9 @@ class Ability
def
self
.
allowed
(
object
,
subject
)
case
subject
.
class
.
name
when
"Project"
then
project_abilities
(
object
,
subject
)
when
"Issue"
then
issue_abilities
(
object
,
subject
)
when
"Note"
then
note_abilities
(
object
,
subject
)
when
"Snippet"
then
snippet_abilities
(
object
,
subject
)
else
[]
end
end
...
...
@@ -34,4 +37,21 @@ class Ability
rules
.
flatten
end
class
<<
self
[
:issue
,
:note
,
:snippet
].
each
do
|
name
|
define_method
"
#{
name
}
_abilities"
do
|
user
,
subject
|
if
subject
.
author
==
user
[
:"read_
#{
name
}
"
,
:"write_
#{
name
}
"
,
:"admin_
#{
name
}
"
]
else
subject
.
respond_to?
(
:project
)
?
project_abilities
(
user
,
subject
.
project
)
:
[]
end
end
end
end
end
spec/requests/projects_security_spec.rb
View file @
5ec83801
...
...
@@ -82,12 +82,18 @@ describe "Projects" do
end
describe
"GET /project_code/blob"
do
it
{
blob_project_path
(
@project
).
should
be_allowed_for
@u1
}
it
{
blob_project_path
(
@project
).
should
be_allowed_for
@u3
}
it
{
blob_project_path
(
@project
).
should
be_denied_for
:admin
}
it
{
blob_project_path
(
@project
).
should
be_denied_for
@u2
}
it
{
blob_project_path
(
@project
).
should
be_denied_for
:user
}
it
{
blob_project_path
(
@project
).
should
be_denied_for
:visitor
}
before
do
@commit
=
@project
.
commit
@path
=
@commit
.
tree
.
contents
.
select
{
|
i
|
i
.
is_a?
(
Grit
::
Blob
)}.
first
.
name
@blob_path
=
blob_project_path
(
@project
,
:commit_id
=>
@commit
.
id
,
:path
=>
@path
)
end
it
{
@blob_path
.
should
be_allowed_for
@u1
}
it
{
@blob_path
.
should
be_allowed_for
@u3
}
it
{
@blob_path
.
should
be_denied_for
:admin
}
it
{
@blob_path
.
should
be_denied_for
@u2
}
it
{
@blob_path
.
should
be_denied_for
:user
}
it
{
@blob_path
.
should
be_denied_for
:visitor
}
end
describe
"GET /project_code/edit"
do
...
...
spec/requests/user_security_spec.rb
View file @
5ec83801
...
...
@@ -7,10 +7,10 @@ describe "Users Security" do
end
describe
"GET /login"
do
it
{
new_user_session_path
.
should
be_denied_for
@u1
}
it
{
new_user_session_path
.
should
be_denied_for
:admin
}
it
{
new_user_session_path
.
should
be_denied_for
:user
}
it
{
new_user_session_path
.
should
be_allowed
_for
:visitor
}
#
it { new_user_session_path.should be_denied_for @u1 }
#
it { new_user_session_path.should be_denied_for :admin }
#
it { new_user_session_path.should be_denied_for :user }
it
{
new_user_session_path
.
should
_not
be_404
_for
:visitor
}
end
describe
"GET /keys"
do
...
...
spec/support/matchers.rb
View file @
5ec83801
...
...
@@ -21,17 +21,30 @@ RSpec::Matchers.define :be_denied_for do |user|
end
end
RSpec
::
Matchers
.
define
:be_404_for
do
|
user
|
match
do
|
url
|
include
UrlAccess
url_404?
(
user
,
url
)
end
end
module
UrlAccess
def
url_allowed?
(
user
,
url
)
emulate_user
(
user
)
visit
url
result
=
(
current_path
==
url
)
(
page
.
status_code
!=
404
&&
current_path
!=
new_user_session_path
)
end
def
url_denied?
(
user
,
url
)
emulate_user
(
user
)
visit
url
result
=
(
current_path
!=
url
)
(
page
.
status_code
==
404
||
current_path
==
new_user_session_path
)
end
def
url_404?
(
user
,
url
)
emulate_user
(
user
)
visit
url
page
.
status_code
==
404
end
def
emulate_user
(
user
)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment