Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
e93f379a
Commit
e93f379a
authored
Apr 02, 2018
by
Douwe Maan
Committed by
Bob Van Landuyt
Apr 10, 2018
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Update policies to make archived projects completely read-only
parent
0a384b40
Changes
5
Show whitespace changes
Inline
Side-by-side
Showing
5 changed files
with
131 additions
and
46 deletions
+131
-46
app/policies/ci/build_policy.rb
app/policies/ci/build_policy.rb
+2
-2
app/policies/ci/pipeline_schedule_policy.rb
app/policies/ci/pipeline_schedule_policy.rb
+4
-10
app/policies/note_policy.rb
app/policies/note_policy.rb
+1
-2
app/policies/project_policy.rb
app/policies/project_policy.rb
+59
-30
spec/policies/project_policy_spec.rb
spec/policies/project_policy_spec.rb
+65
-2
No files found.
app/policies/ci/build_policy.rb
View file @
e93f379a
...
@@ -11,7 +11,7 @@ module Ci
...
@@ -11,7 +11,7 @@ module Ci
end
end
condition
(
:owner_of_job
)
do
condition
(
:owner_of_job
)
do
can?
(
:developer_access
)
&&
@subject
.
triggered_by?
(
@user
)
@subject
.
triggered_by?
(
@user
)
end
end
rule
{
protected_ref
}.
policy
do
rule
{
protected_ref
}.
policy
do
...
@@ -19,6 +19,6 @@ module Ci
...
@@ -19,6 +19,6 @@ module Ci
prevent
:erase_build
prevent
:erase_build
end
end
rule
{
can?
(
:
master_access
)
|
owner_of_job
}.
enable
:erase_build
rule
{
can?
(
:
admin_build
)
|
(
can?
(
:update_build
)
&
owner_of_job
)
}.
enable
:erase_build
end
end
end
end
app/policies/ci/pipeline_schedule_policy.rb
View file @
e93f379a
...
@@ -7,23 +7,17 @@ module Ci
...
@@ -7,23 +7,17 @@ module Ci
end
end
condition
(
:owner_of_schedule
)
do
condition
(
:owner_of_schedule
)
do
can?
(
:developer_access
)
&&
pipeline_schedule
.
owned_by?
(
@user
)
pipeline_schedule
.
owned_by?
(
@user
)
end
end
condition
(
:non_owner_of_schedule
)
do
rule
{
can?
(
:create_pipeline
)
}.
enable
:play_pipeline_schedule
!
pipeline_schedule
.
owned_by?
(
@user
)
end
rule
{
can?
(
:developer_access
)
}.
policy
do
enable
:play_pipeline_schedule
end
rule
{
can?
(
:
master_access
)
|
owner_of_schedule
}.
policy
do
rule
{
can?
(
:
admin_pipeline
)
|
(
can?
(
:update_build
)
&
owner_of_schedule
)
}.
policy
do
enable
:update_pipeline_schedule
enable
:update_pipeline_schedule
enable
:admin_pipeline_schedule
enable
:admin_pipeline_schedule
end
end
rule
{
can?
(
:
master_access
)
&
non_
owner_of_schedule
}.
policy
do
rule
{
can?
(
:
admin_pipeline_schedule
)
&
~
owner_of_schedule
}.
policy
do
enable
:take_ownership_pipeline_schedule
enable
:take_ownership_pipeline_schedule
end
end
...
...
app/policies/note_policy.rb
View file @
e93f379a
...
@@ -3,7 +3,6 @@ class NotePolicy < BasePolicy
...
@@ -3,7 +3,6 @@ class NotePolicy < BasePolicy
delegate
{
@subject
.
noteable
if
@subject
.
noteable
.
lockable?
}
delegate
{
@subject
.
noteable
if
@subject
.
noteable
.
lockable?
}
condition
(
:is_author
)
{
@user
&&
@subject
.
author
==
@user
}
condition
(
:is_author
)
{
@user
&&
@subject
.
author
==
@user
}
condition
(
:for_merge_request
,
scope: :subject
)
{
@subject
.
for_merge_request?
}
condition
(
:is_noteable_author
)
{
@user
&&
@subject
.
noteable
.
author_id
==
@user
.
id
}
condition
(
:is_noteable_author
)
{
@user
&&
@subject
.
noteable
.
author_id
==
@user
.
id
}
condition
(
:editable
,
scope: :subject
)
{
@subject
.
editable?
}
condition
(
:editable
,
scope: :subject
)
{
@subject
.
editable?
}
...
@@ -16,7 +15,7 @@ class NotePolicy < BasePolicy
...
@@ -16,7 +15,7 @@ class NotePolicy < BasePolicy
enable
:resolve_note
enable
:resolve_note
end
end
rule
{
for_merge_request
&
is_noteable_author
}.
policy
do
rule
{
is_noteable_author
}.
policy
do
enable
:resolve_note
enable
:resolve_note
end
end
end
end
app/policies/project_policy.rb
View file @
e93f379a
class
ProjectPolicy
<
BasePolicy
class
ProjectPolicy
<
BasePolicy
prepend
EE
::
ProjectPolicy
prepend
EE
::
ProjectPolicy
def
self
.
create_read_update_admin
(
name
)
READONLY_FEATURES_WHEN_ARCHIVED
=
%i[
issue
list
merge_request
label
milestone
project_snippet
wiki
note
pipeline
pipeline_schedule
build
trigger
environment
deployment
commit_status
container_image
pages
cluster
]
.
freeze
def
self
.
create_read_update_admin_destroy
(
name
)
[
[
:"create_
#{
name
}
"
,
:"read_
#{
name
}
"
,
:"read_
#{
name
}
"
,
*
create_update_admin_destroy
(
name
)
]
end
def
self
.
create_update_admin_destroy
(
name
)
[
:"create_
#{
name
}
"
,
:"update_
#{
name
}
"
,
:"update_
#{
name
}
"
,
:"admin_
#{
name
}
"
:"admin_
#{
name
}
"
,
:"destroy_
#{
name
}
"
]
]
end
end
...
@@ -17,7 +45,7 @@ class ProjectPolicy < BasePolicy
...
@@ -17,7 +45,7 @@ class ProjectPolicy < BasePolicy
end
end
desc
"Project has public builds enabled"
desc
"Project has public builds enabled"
condition
(
:public_builds
,
scope: :subject
)
{
project
.
public_builds?
}
condition
(
:public_builds
,
scope: :subject
,
score:
0
)
{
project
.
public_builds?
}
# For guest access we use #team_member? so we can use
# For guest access we use #team_member? so we can use
# project.members, which gets cached in subject scope.
# project.members, which gets cached in subject scope.
...
@@ -37,7 +65,7 @@ class ProjectPolicy < BasePolicy
...
@@ -37,7 +65,7 @@ class ProjectPolicy < BasePolicy
condition
(
:master
)
{
team_access_level
>=
Gitlab
::
Access
::
MASTER
}
condition
(
:master
)
{
team_access_level
>=
Gitlab
::
Access
::
MASTER
}
desc
"Project is public"
desc
"Project is public"
condition
(
:public_project
,
scope: :subject
)
{
project
.
public?
}
condition
(
:public_project
,
scope: :subject
,
score:
0
)
{
project
.
public?
}
desc
"Project is visible to internal users"
desc
"Project is visible to internal users"
condition
(
:internal_access
)
do
condition
(
:internal_access
)
do
...
@@ -48,7 +76,7 @@ class ProjectPolicy < BasePolicy
...
@@ -48,7 +76,7 @@ class ProjectPolicy < BasePolicy
condition
(
:group_member
,
scope: :subject
)
{
project_group_member?
}
condition
(
:group_member
,
scope: :subject
)
{
project_group_member?
}
desc
"Project is archived"
desc
"Project is archived"
condition
(
:archived
,
scope: :subject
)
{
project
.
archived?
}
condition
(
:archived
,
scope: :subject
,
score:
0
)
{
project
.
archived?
}
condition
(
:default_issues_tracker
,
scope: :subject
)
{
project
.
default_issues_tracker?
}
condition
(
:default_issues_tracker
,
scope: :subject
)
{
project
.
default_issues_tracker?
}
...
@@ -58,10 +86,10 @@ class ProjectPolicy < BasePolicy
...
@@ -58,10 +86,10 @@ class ProjectPolicy < BasePolicy
end
end
desc
"Project has an external wiki"
desc
"Project has an external wiki"
condition
(
:has_external_wiki
,
scope: :subject
)
{
project
.
has_external_wiki?
}
condition
(
:has_external_wiki
,
scope: :subject
,
score:
0
)
{
project
.
has_external_wiki?
}
desc
"Project has request access enabled"
desc
"Project has request access enabled"
condition
(
:request_access_enabled
,
scope: :subject
)
{
project
.
request_access_enabled
}
condition
(
:request_access_enabled
,
scope: :subject
,
score:
0
)
{
project
.
request_access_enabled
}
desc
"Has merge requests allowing pushes to user"
desc
"Has merge requests allowing pushes to user"
condition
(
:has_merge_requests_allowing_pushes
,
scope: :subject
)
do
condition
(
:has_merge_requests_allowing_pushes
,
scope: :subject
)
do
...
@@ -233,37 +261,45 @@ class ProjectPolicy < BasePolicy
...
@@ -233,37 +261,45 @@ class ProjectPolicy < BasePolicy
end
end
rule
{
archived
}.
policy
do
rule
{
archived
}.
policy
do
prevent
:create_merge_request
prevent
:push_to_delete_protected_branch
prevent
:push_code
prevent
:push_code
prevent
:update_merge_request
prevent
:push_to_delete_protected_branch
prevent
:admin_merge_request
prevent
:request_access
prevent
:upload_file
prevent
:resolve_note
READONLY_FEATURES_WHEN_ARCHIVED
.
each
do
|
feature
|
prevent
(
*
create_update_admin_destroy
(
feature
))
end
end
rule
{
issues_disabled
}.
policy
do
prevent
(
*
create_read_update_admin_destroy
(
:issue
))
end
end
rule
{
merge_requests_disabled
|
repository_disabled
}.
policy
do
rule
{
merge_requests_disabled
|
repository_disabled
}.
policy
do
prevent
(
*
create_read_update_admin
(
:merge_request
))
prevent
(
*
create_read_update_admin
_destroy
(
:merge_request
))
end
end
rule
{
issues_disabled
&
merge_requests_disabled
}.
policy
do
rule
{
issues_disabled
&
merge_requests_disabled
}.
policy
do
prevent
(
*
create_read_update_admin
(
:label
))
prevent
(
*
create_read_update_admin
_destroy
(
:label
))
prevent
(
*
create_read_update_admin
(
:milestone
))
prevent
(
*
create_read_update_admin
_destroy
(
:milestone
))
end
end
rule
{
snippets_disabled
}.
policy
do
rule
{
snippets_disabled
}.
policy
do
prevent
(
*
create_read_update_admin
(
:project_snippet
))
prevent
(
*
create_read_update_admin
_destroy
(
:project_snippet
))
end
end
rule
{
wiki_disabled
&
~
has_external_wiki
}.
policy
do
rule
{
wiki_disabled
&
~
has_external_wiki
}.
policy
do
prevent
(
*
create_read_update_admin
(
:wiki
))
prevent
(
*
create_read_update_admin
_destroy
(
:wiki
))
prevent
(
:download_wiki_code
)
prevent
(
:download_wiki_code
)
end
end
rule
{
builds_disabled
|
repository_disabled
}.
policy
do
rule
{
builds_disabled
|
repository_disabled
}.
policy
do
prevent
(
*
create_
read_update_admin
(
:build
))
prevent
(
*
create_
update_admin_destroy
(
:pipeline
))
prevent
(
*
(
create_read_update_admin
(
:pipeline
)
-
[
:read_pipeline
]
))
prevent
(
*
create_read_update_admin_destroy
(
:build
))
prevent
(
*
create_read_update_admin
(
:pipeline_schedule
))
prevent
(
*
create_read_update_admin
_destroy
(
:pipeline_schedule
))
prevent
(
*
create_read_update_admin
(
:environment
))
prevent
(
*
create_read_update_admin
_destroy
(
:environment
))
prevent
(
*
create_read_update_admin
(
:deployment
))
prevent
(
*
create_read_update_admin
_destroy
(
:deployment
))
end
end
rule
{
repository_disabled
}.
policy
do
rule
{
repository_disabled
}.
policy
do
...
@@ -274,7 +310,7 @@ class ProjectPolicy < BasePolicy
...
@@ -274,7 +310,7 @@ class ProjectPolicy < BasePolicy
end
end
rule
{
container_registry_disabled
}.
policy
do
rule
{
container_registry_disabled
}.
policy
do
prevent
(
*
create_read_update_admin
(
:container_image
))
prevent
(
*
create_read_update_admin
_destroy
(
:container_image
))
end
end
rule
{
anonymous
&
~
public_project
}.
prevent_all
rule
{
anonymous
&
~
public_project
}.
prevent_all
...
@@ -316,13 +352,6 @@ class ProjectPolicy < BasePolicy
...
@@ -316,13 +352,6 @@ class ProjectPolicy < BasePolicy
enable
:read_pipeline_schedule
enable
:read_pipeline_schedule
end
end
rule
{
issues_disabled
}.
policy
do
prevent
:create_issue
prevent
:update_issue
prevent
:admin_issue
prevent
:read_issue
end
# These rules are included to allow maintainers of projects to push to certain
# These rules are included to allow maintainers of projects to push to certain
# to run pipelines for the branches they have access to.
# to run pipelines for the branches they have access to.
rule
{
can?
(
:public_access
)
&
has_merge_requests_allowing_pushes
}.
policy
do
rule
{
can?
(
:public_access
)
&
has_merge_requests_allowing_pushes
}.
policy
do
...
...
spec/policies/project_policy_spec.rb
View file @
e93f379a
...
@@ -136,6 +136,42 @@ describe ProjectPolicy do
...
@@ -136,6 +136,42 @@ describe ProjectPolicy do
end
end
end
end
shared_examples
'archived project policies'
do
let
(
:feature_write_abilities
)
do
described_class
::
READONLY_FEATURES_WHEN_ARCHIVED
.
flat_map
do
|
feature
|
described_class
.
create_update_admin_destroy
(
feature
)
end
end
let
(
:other_write_abilities
)
do
%i[
push_to_delete_protected_branch
push_code
request_access
upload_file
resolve_note
]
end
context
'when the project is archived'
do
before
do
project
.
archived
=
true
end
it
'disables write actions on all relevant project features'
do
expect_disallowed
(
*
feature_write_abilities
)
end
it
'disables some other important write actions'
do
expect_disallowed
(
*
other_write_abilities
)
end
it
'does not disable other other abilities'
do
expect_allowed
(
*
(
regular_abilities
-
feature_write_abilities
-
other_write_abilities
))
end
end
end
shared_examples
'project policies as anonymous'
do
shared_examples
'project policies as anonymous'
do
context
'abilities for public projects'
do
context
'abilities for public projects'
do
context
'when a project has pending invites'
do
context
'when a project has pending invites'
do
...
@@ -154,6 +190,10 @@ describe ProjectPolicy do
...
@@ -154,6 +190,10 @@ describe ProjectPolicy do
expect_allowed
(
*
anonymous_permissions
)
expect_allowed
(
*
anonymous_permissions
)
expect_disallowed
(
*
user_permissions
)
expect_disallowed
(
*
user_permissions
)
end
end
it_behaves_like
'archived project policies'
do
let
(
:regular_abilities
)
{
anonymous_permissions
}
end
end
end
end
end
...
@@ -184,6 +224,10 @@ describe ProjectPolicy do
...
@@ -184,6 +224,10 @@ describe ProjectPolicy do
expect_disallowed
(
*
owner_permissions
)
expect_disallowed
(
*
owner_permissions
)
end
end
it_behaves_like
'archived project policies'
do
let
(
:regular_abilities
)
{
guest_permissions
}
end
context
'public builds enabled'
do
context
'public builds enabled'
do
it
do
it
do
expect_allowed
(
*
guest_permissions
)
expect_allowed
(
*
guest_permissions
)
...
@@ -224,12 +268,15 @@ describe ProjectPolicy do
...
@@ -224,12 +268,15 @@ describe ProjectPolicy do
it
do
it
do
expect_allowed
(
*
guest_permissions
)
expect_allowed
(
*
guest_permissions
)
expect_allowed
(
*
reporter_permissions
)
expect_allowed
(
*
reporter_permissions
)
expect_allowed
(
*
reporter_permissions
)
expect_allowed
(
*
team_member_reporter_permissions
)
expect_allowed
(
*
team_member_reporter_permissions
)
expect_disallowed
(
*
developer_permissions
)
expect_disallowed
(
*
developer_permissions
)
expect_disallowed
(
*
master_permissions
)
expect_disallowed
(
*
master_permissions
)
expect_disallowed
(
*
owner_permissions
)
expect_disallowed
(
*
owner_permissions
)
end
end
it_behaves_like
'archived project policies'
do
let
(
:regular_abilities
)
{
reporter_permissions
}
end
end
end
end
end
...
@@ -246,6 +293,10 @@ describe ProjectPolicy do
...
@@ -246,6 +293,10 @@ describe ProjectPolicy do
expect_disallowed
(
*
master_permissions
)
expect_disallowed
(
*
master_permissions
)
expect_disallowed
(
*
owner_permissions
)
expect_disallowed
(
*
owner_permissions
)
end
end
it_behaves_like
'archived project policies'
do
let
(
:regular_abilities
)
{
developer_permissions
}
end
end
end
end
end
...
@@ -263,6 +314,10 @@ describe ProjectPolicy do
...
@@ -263,6 +314,10 @@ describe ProjectPolicy do
expect_allowed
(
*
master_permissions
)
expect_allowed
(
*
master_permissions
)
expect_disallowed
(
*
owner_permissions
)
expect_disallowed
(
*
owner_permissions
)
end
end
it_behaves_like
'archived project policies'
do
let
(
:regular_abilities
)
{
master_permissions
}
end
end
end
end
end
...
@@ -280,6 +335,10 @@ describe ProjectPolicy do
...
@@ -280,6 +335,10 @@ describe ProjectPolicy do
expect_allowed
(
*
master_permissions
)
expect_allowed
(
*
master_permissions
)
expect_allowed
(
*
owner_permissions
)
expect_allowed
(
*
owner_permissions
)
end
end
it_behaves_like
'archived project policies'
do
let
(
:regular_abilities
)
{
owner_permissions
}
end
end
end
end
end
...
@@ -297,6 +356,10 @@ describe ProjectPolicy do
...
@@ -297,6 +356,10 @@ describe ProjectPolicy do
expect_allowed
(
*
master_permissions
)
expect_allowed
(
*
master_permissions
)
expect_allowed
(
*
owner_permissions
)
expect_allowed
(
*
owner_permissions
)
end
end
it_behaves_like
'archived project policies'
do
let
(
:regular_abilities
)
{
owner_permissions
}
end
end
end
end
end
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment