mirror of
https://github.com/ansible/awx.git
synced 2026-03-23 20:05:03 -02:30
fix RBAC bugs with notification attachment
Allow notification_admin_role users to attach NTs from that organization Require either read_role or auditor_role to the object which the NT is being attached to
This commit is contained in:
@@ -460,6 +460,42 @@ class BaseAccess(object):
|
|||||||
return False
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
class NotificationAttachMixin(BaseAccess):
|
||||||
|
'''For models that can have notifications attached
|
||||||
|
|
||||||
|
I can attach a notification template when
|
||||||
|
- I have notification_admin_role to organization of the NT
|
||||||
|
- I can read the object I am attaching it to
|
||||||
|
|
||||||
|
I can unattach when those same critiera are met
|
||||||
|
'''
|
||||||
|
notification_attach_roles = None
|
||||||
|
|
||||||
|
def _can_attach(self, notification_template, resource_obj):
|
||||||
|
if not NotificationTemplateAccess(self.user).can_change(notification_template, {}):
|
||||||
|
return False
|
||||||
|
if self.notification_attach_roles is None:
|
||||||
|
return self.can_read(resource_obj)
|
||||||
|
return any(self.user in getattr(resource_obj, role) for role in self.notification_attach_roles)
|
||||||
|
|
||||||
|
@check_superuser
|
||||||
|
def can_attach(self, obj, sub_obj, relationship, data, skip_sub_obj_read_check=False):
|
||||||
|
if isinstance(sub_obj, NotificationTemplate):
|
||||||
|
# reverse obj and sub_obj
|
||||||
|
return self._can_attach(notification_template=sub_obj, resource_obj=obj)
|
||||||
|
return super(NotificationAttachMixin, self).can_attach(
|
||||||
|
obj, sub_obj, relationship, data, skip_sub_obj_read_check=skip_sub_obj_read_check)
|
||||||
|
|
||||||
|
@check_superuser
|
||||||
|
def can_unattach(self, obj, sub_obj, relationship, data=None):
|
||||||
|
if isinstance(sub_obj, NotificationTemplate):
|
||||||
|
# due to this special case, we use symmetrical logic with attach permission
|
||||||
|
return self._can_attach(notification_template=sub_obj, resource_obj=obj)
|
||||||
|
return super(NotificationAttachMixin, self).can_unattach(
|
||||||
|
obj, sub_obj, relationship, relationship, data=data
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
class InstanceAccess(BaseAccess):
|
class InstanceAccess(BaseAccess):
|
||||||
|
|
||||||
model = Instance
|
model = Instance
|
||||||
@@ -715,7 +751,7 @@ class OAuth2TokenAccess(BaseAccess):
|
|||||||
return True
|
return True
|
||||||
|
|
||||||
|
|
||||||
class OrganizationAccess(BaseAccess):
|
class OrganizationAccess(NotificationAttachMixin, BaseAccess):
|
||||||
'''
|
'''
|
||||||
I can see organizations when:
|
I can see organizations when:
|
||||||
- I am a superuser.
|
- I am a superuser.
|
||||||
@@ -729,6 +765,8 @@ class OrganizationAccess(BaseAccess):
|
|||||||
|
|
||||||
model = Organization
|
model = Organization
|
||||||
prefetch_related = ('created_by', 'modified_by',)
|
prefetch_related = ('created_by', 'modified_by',)
|
||||||
|
# organization admin_role is not a parent of organization auditor_role
|
||||||
|
notification_attach_roles = ['admin_role', 'auditor_role']
|
||||||
|
|
||||||
def filtered_queryset(self):
|
def filtered_queryset(self):
|
||||||
return self.model.accessible_objects(self.user, 'read_role')
|
return self.model.accessible_objects(self.user, 'read_role')
|
||||||
@@ -966,7 +1004,7 @@ class GroupAccess(BaseAccess):
|
|||||||
return False
|
return False
|
||||||
|
|
||||||
|
|
||||||
class InventorySourceAccess(BaseAccess):
|
class InventorySourceAccess(NotificationAttachMixin, BaseAccess):
|
||||||
'''
|
'''
|
||||||
I can see inventory sources whenever I can see their inventory.
|
I can see inventory sources whenever I can see their inventory.
|
||||||
I can change inventory sources whenever I can change their inventory.
|
I can change inventory sources whenever I can change their inventory.
|
||||||
@@ -1282,7 +1320,7 @@ class TeamAccess(BaseAccess):
|
|||||||
*args, **kwargs)
|
*args, **kwargs)
|
||||||
|
|
||||||
|
|
||||||
class ProjectAccess(BaseAccess):
|
class ProjectAccess(NotificationAttachMixin, BaseAccess):
|
||||||
'''
|
'''
|
||||||
I can see projects when:
|
I can see projects when:
|
||||||
- I am a superuser.
|
- I am a superuser.
|
||||||
@@ -1301,6 +1339,7 @@ class ProjectAccess(BaseAccess):
|
|||||||
|
|
||||||
model = Project
|
model = Project
|
||||||
select_related = ('modified_by', 'credential', 'current_job', 'last_job',)
|
select_related = ('modified_by', 'credential', 'current_job', 'last_job',)
|
||||||
|
notification_attach_roles = ['admin_role']
|
||||||
|
|
||||||
def filtered_queryset(self):
|
def filtered_queryset(self):
|
||||||
return self.model.accessible_objects(self.user, 'read_role')
|
return self.model.accessible_objects(self.user, 'read_role')
|
||||||
@@ -1363,7 +1402,7 @@ class ProjectUpdateAccess(BaseAccess):
|
|||||||
return obj and self.user in obj.project.admin_role
|
return obj and self.user in obj.project.admin_role
|
||||||
|
|
||||||
|
|
||||||
class JobTemplateAccess(BaseAccess):
|
class JobTemplateAccess(NotificationAttachMixin, BaseAccess):
|
||||||
'''
|
'''
|
||||||
I can see job templates when:
|
I can see job templates when:
|
||||||
- I have read role for the job template.
|
- I have read role for the job template.
|
||||||
@@ -1514,8 +1553,6 @@ class JobTemplateAccess(BaseAccess):
|
|||||||
|
|
||||||
@check_superuser
|
@check_superuser
|
||||||
def can_attach(self, obj, sub_obj, relationship, data, skip_sub_obj_read_check=False):
|
def can_attach(self, obj, sub_obj, relationship, data, skip_sub_obj_read_check=False):
|
||||||
if isinstance(sub_obj, NotificationTemplate):
|
|
||||||
return self.check_related('organization', Organization, {}, obj=sub_obj, mandatory=True)
|
|
||||||
if relationship == "instance_groups":
|
if relationship == "instance_groups":
|
||||||
if not obj.project.organization:
|
if not obj.project.organization:
|
||||||
return False
|
return False
|
||||||
@@ -1913,7 +1950,7 @@ class WorkflowJobNodeAccess(BaseAccess):
|
|||||||
|
|
||||||
|
|
||||||
# TODO: notification attachments?
|
# TODO: notification attachments?
|
||||||
class WorkflowJobTemplateAccess(BaseAccess):
|
class WorkflowJobTemplateAccess(NotificationAttachMixin, BaseAccess):
|
||||||
'''
|
'''
|
||||||
I can only see/manage Workflow Job Templates if I'm a super user
|
I can only see/manage Workflow Job Templates if I'm a super user
|
||||||
'''
|
'''
|
||||||
|
|||||||
@@ -1,5 +1,6 @@
|
|||||||
import pytest
|
import pytest
|
||||||
|
|
||||||
|
from awx.main.models import Organization, Project
|
||||||
from awx.main.access import (
|
from awx.main.access import (
|
||||||
NotificationTemplateAccess,
|
NotificationTemplateAccess,
|
||||||
NotificationAccess,
|
NotificationAccess,
|
||||||
@@ -137,6 +138,106 @@ def test_system_auditor_JT_attach(system_auditor, job_template, notification_tem
|
|||||||
{'id': notification_template.id})
|
{'id': notification_template.id})
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.django_db
|
||||||
|
@pytest.mark.parametrize("org_role,expect", [
|
||||||
|
('admin_role', True),
|
||||||
|
('notification_admin_role', True),
|
||||||
|
('workflow_admin_role', False),
|
||||||
|
('auditor_role', False),
|
||||||
|
('member_role', False)
|
||||||
|
])
|
||||||
|
def test_org_role_JT_attach(rando, job_template, project, workflow_job_template, inventory_source,
|
||||||
|
notification_template, org_role, expect):
|
||||||
|
nt_organization = Organization.objects.create(name='organization just for the notification template')
|
||||||
|
notification_template.organization = nt_organization
|
||||||
|
notification_template.save()
|
||||||
|
getattr(notification_template.organization, org_role).members.add(rando)
|
||||||
|
kwargs = dict(
|
||||||
|
sub_obj=notification_template,
|
||||||
|
relationship='notification_templates_success',
|
||||||
|
data={'id': notification_template.id}
|
||||||
|
)
|
||||||
|
permissions = {}
|
||||||
|
expected_permissions = {}
|
||||||
|
organization = Organization.objects.create(name='objective organization')
|
||||||
|
|
||||||
|
for resource in (organization, job_template, project, workflow_job_template, inventory_source):
|
||||||
|
permission_resource = resource
|
||||||
|
if resource == inventory_source:
|
||||||
|
permission_resource = inventory_source.inventory
|
||||||
|
getattr(permission_resource, 'admin_role').members.add(rando)
|
||||||
|
model_name = resource.__class__.__name__
|
||||||
|
permissions[model_name] = rando.can_access(resource.__class__, 'attach', resource, **kwargs)
|
||||||
|
expected_permissions[model_name] = expect
|
||||||
|
|
||||||
|
assert permissions == expected_permissions
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.django_db
|
||||||
|
def test_organization_NT_attach_permission(rando, notification_template):
|
||||||
|
notification_template.organization.notification_admin_role.members.add(rando)
|
||||||
|
target_organization = Organization.objects.create(name='objective organization')
|
||||||
|
target_organization.workflow_admin_role.members.add(rando)
|
||||||
|
assert not rando.can_access(Organization, 'attach', obj=target_organization, sub_obj=notification_template,
|
||||||
|
relationship='notification_templates_success', data={})
|
||||||
|
target_organization.auditor_role.members.add(rando)
|
||||||
|
assert rando.can_access(Organization, 'attach', obj=target_organization, sub_obj=notification_template,
|
||||||
|
relationship='notification_templates_success', data={})
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.django_db
|
||||||
|
def test_project_NT_attach_permission(rando, notification_template):
|
||||||
|
notification_template.organization.notification_admin_role.members.add(rando)
|
||||||
|
project = Project.objects.create(
|
||||||
|
name='objective project',
|
||||||
|
organization=Organization.objects.create(name='foo')
|
||||||
|
)
|
||||||
|
project.update_role.members.add(rando)
|
||||||
|
assert not rando.can_access(Project, 'attach', obj=project, sub_obj=notification_template,
|
||||||
|
relationship='notification_templates_success', data={})
|
||||||
|
project.admin_role.members.add(rando)
|
||||||
|
assert rando.can_access(Project, 'attach', obj=project, sub_obj=notification_template,
|
||||||
|
relationship='notification_templates_success', data={})
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.django_db
|
||||||
|
@pytest.mark.parametrize("res_role,expect", [
|
||||||
|
('read_role', True),
|
||||||
|
(None, False)
|
||||||
|
])
|
||||||
|
def test_object_role_JT_attach(rando, job_template, workflow_job_template, inventory_source,
|
||||||
|
notification_template, res_role, expect):
|
||||||
|
nt_organization = Organization.objects.create(name='organization just for the notification template')
|
||||||
|
nt_organization.notification_admin_role.members.add(rando)
|
||||||
|
notification_template.organization = nt_organization
|
||||||
|
notification_template.save()
|
||||||
|
kwargs = dict(
|
||||||
|
sub_obj=notification_template,
|
||||||
|
relationship='notification_templates_success',
|
||||||
|
data={'id': notification_template.id}
|
||||||
|
)
|
||||||
|
permissions = {}
|
||||||
|
expected_permissions = {}
|
||||||
|
|
||||||
|
for resource in (job_template, workflow_job_template, inventory_source):
|
||||||
|
permission_resource = resource
|
||||||
|
if resource == inventory_source:
|
||||||
|
permission_resource = inventory_source.inventory
|
||||||
|
model_name = resource.__class__.__name__
|
||||||
|
if res_role is None or hasattr(permission_resource, res_role):
|
||||||
|
if res_role is not None:
|
||||||
|
getattr(permission_resource, res_role).members.add(rando)
|
||||||
|
permissions[model_name] = rando.can_access(
|
||||||
|
resource.__class__, 'attach', resource, **kwargs
|
||||||
|
)
|
||||||
|
expected_permissions[model_name] = expect
|
||||||
|
else:
|
||||||
|
permissions[model_name] = None
|
||||||
|
expected_permissions[model_name] = None
|
||||||
|
|
||||||
|
assert permissions == expected_permissions
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.django_db
|
@pytest.mark.django_db
|
||||||
def test_notification_access_org_admin(notification, org_admin):
|
def test_notification_access_org_admin(notification, org_admin):
|
||||||
access = NotificationAccess(org_admin)
|
access = NotificationAccess(org_admin)
|
||||||
|
|||||||
Reference in New Issue
Block a user