Commit d29ea1fa authored by drew cimino's avatar drew cimino

admin_group authorization for Groups::RunnersController

- Use authorize_admin_group! instead of authorize_admin_pipeline!
- Added role-based permission specs for Groups::RunnersController
parent 03bf3271
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
class Groups::RunnersController < Groups::ApplicationController class Groups::RunnersController < Groups::ApplicationController
# Proper policies should be implemented per # Proper policies should be implemented per
# https://gitlab.com/gitlab-org/gitlab-ce/issues/45894 # https://gitlab.com/gitlab-org/gitlab-ce/issues/45894
before_action :authorize_admin_pipeline! before_action :authorize_admin_group!
before_action :runner, only: [:edit, :update, :destroy, :pause, :resume, :show] before_action :runner, only: [:edit, :update, :destroy, :pause, :resume, :show]
...@@ -50,10 +50,6 @@ class Groups::RunnersController < Groups::ApplicationController ...@@ -50,10 +50,6 @@ class Groups::RunnersController < Groups::ApplicationController
@runner ||= @group.runners.find(params[:id]) @runner ||= @group.runners.find(params[:id])
end end
def authorize_admin_pipeline!
return render_404 unless can?(current_user, :admin_pipeline, group)
end
def runner_params def runner_params
params.require(:runner).permit(Ci::Runner::FORM_EDITABLE) params.require(:runner).permit(Ci::Runner::FORM_EDITABLE)
end end
......
---
title: Use admin_group authorization in Groups::RunnersController
merge_request:
author:
type: security
...@@ -6,36 +6,109 @@ describe Groups::RunnersController do ...@@ -6,36 +6,109 @@ describe Groups::RunnersController do
let(:user) { create(:user) } let(:user) { create(:user) }
let(:group) { create(:group) } let(:group) { create(:group) }
let(:runner) { create(:ci_runner, :group, groups: [group]) } let(:runner) { create(:ci_runner, :group, groups: [group]) }
let(:params) { { group_id: group, id: runner } }
let(:params) do before do
{ sign_in(user)
group_id: group,
id: runner
}
end end
describe '#show' do
context 'when user is owner' do
before do
group.add_owner(user)
end
it 'renders show with 200 status code' do
get :show, params: { group_id: group, id: runner }
expect(response).to have_gitlab_http_status(200)
expect(response).to render_template(:show)
end
end
context 'when user is not owner' do
before do before do
sign_in(user)
group.add_maintainer(user) group.add_maintainer(user)
end end
it 'renders a 404' do
get :show, params: { group_id: group, id: runner }
expect(response).to have_gitlab_http_status(404)
end
end
end
describe '#edit' do
context 'when user is owner' do
before do
group.add_owner(user)
end
it 'renders show with 200 status code' do
get :edit, params: { group_id: group, id: runner }
expect(response).to have_gitlab_http_status(200)
expect(response).to render_template(:edit)
end
end
context 'when user is not owner' do
before do
group.add_maintainer(user)
end
it 'renders a 404' do
get :edit, params: { group_id: group, id: runner }
expect(response).to have_gitlab_http_status(404)
end
end
end
describe '#update' do describe '#update' do
it 'updates the runner and ticks the queue' do context 'when user is an owner' do
before do
group.add_owner(user)
end
it 'updates the runner, ticks the queue, and redirects' do
new_desc = runner.description.swapcase new_desc = runner.description.swapcase
expect do expect do
post :update, params: params.merge(runner: { description: new_desc } ) post :update, params: params.merge(runner: { description: new_desc } )
end.to change { runner.ensure_runner_queue_value } end.to change { runner.ensure_runner_queue_value }
runner.reload
expect(response).to have_gitlab_http_status(302) expect(response).to have_gitlab_http_status(302)
expect(runner.description).to eq(new_desc) expect(runner.reload.description).to eq(new_desc)
end
end
context 'when user is not an owner' do
before do
group.add_maintainer(user)
end
it 'rejects the update and responds 404' do
old_desc = runner.description
expect do
post :update, params: params.merge(runner: { description: old_desc.swapcase } )
end.not_to change { runner.ensure_runner_queue_value }
expect(response).to have_gitlab_http_status(404)
expect(runner.reload.description).to eq(old_desc)
end
end end
end end
describe '#destroy' do describe '#destroy' do
it 'destroys the runner' do context 'when user is an owner' do
before do
group.add_owner(user)
end
it 'destroys the runner and redirects' do
delete :destroy, params: params delete :destroy, params: params
expect(response).to have_gitlab_http_status(302) expect(response).to have_gitlab_http_status(302)
...@@ -43,33 +116,89 @@ describe Groups::RunnersController do ...@@ -43,33 +116,89 @@ describe Groups::RunnersController do
end end
end end
context 'when user is not an owner' do
before do
group.add_maintainer(user)
end
it 'responds 404 and does not destroy the runner' do
delete :destroy, params: params
expect(response).to have_gitlab_http_status(404)
expect(Ci::Runner.find_by(id: runner.id)).to be_present
end
end
end
describe '#resume' do describe '#resume' do
it 'marks the runner as active and ticks the queue' do context 'when user is an owner' do
before do
group.add_owner(user)
end
it 'marks the runner as active, ticks the queue, and redirects' do
runner.update(active: false) runner.update(active: false)
expect do expect do
post :resume, params: params post :resume, params: params
end.to change { runner.ensure_runner_queue_value } end.to change { runner.ensure_runner_queue_value }
runner.reload
expect(response).to have_gitlab_http_status(302) expect(response).to have_gitlab_http_status(302)
expect(runner.active).to eq(true) expect(runner.reload.active).to eq(true)
end
end
context 'when user is not an owner' do
before do
group.add_maintainer(user)
end
it 'responds 404 and does not activate the runner' do
runner.update(active: false)
expect do
post :resume, params: params
end.not_to change { runner.ensure_runner_queue_value }
expect(response).to have_gitlab_http_status(404)
expect(runner.reload.active).to eq(false)
end
end end
end end
describe '#pause' do describe '#pause' do
it 'marks the runner as inactive and ticks the queue' do context 'when user is an owner' do
before do
group.add_owner(user)
end
it 'marks the runner as inactive, ticks the queue, and redirects' do
runner.update(active: true) runner.update(active: true)
expect do expect do
post :pause, params: params post :pause, params: params
end.to change { runner.ensure_runner_queue_value } end.to change { runner.ensure_runner_queue_value }
runner.reload
expect(response).to have_gitlab_http_status(302) expect(response).to have_gitlab_http_status(302)
expect(runner.active).to eq(false) expect(runner.reload.active).to eq(false)
end
end
context 'when user is not an owner' do
before do
group.add_maintainer(user)
end
it 'responds 404 and does not update the runner or queue' do
runner.update(active: true)
expect do
post :pause, params: params
end.not_to change { runner.ensure_runner_queue_value }
expect(response).to have_gitlab_http_status(404)
expect(runner.reload.active).to eq(true)
end
end end
end end
end end
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment