X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/4f552c0187f8c31d94ff74485c57ef7f9888597e..c3d4b399c57e711f0cd87c2178f873a688323967:/services/api/app/models/link.rb diff --git a/services/api/app/models/link.rb b/services/api/app/models/link.rb index 8e17ce697e..6321145045 100644 --- a/services/api/app/models/link.rb +++ b/services/api/app/models/link.rb @@ -1,5 +1,5 @@ class Link < ArvadosModel - include AssignUuid + include HasUuid include KindAndEtag include CommonApiTemplate serialize :properties, Hash @@ -8,17 +8,17 @@ class Link < ArvadosModel after_update :maybe_invalidate_permissions_cache after_create :maybe_invalidate_permissions_cache after_destroy :maybe_invalidate_permissions_cache - - attr_accessor :head - attr_accessor :tail + attr_accessor :head_kind, :tail_kind + validate :name_link_has_valid_name + validate :name_link_owner_is_tail api_accessible :user, extend: :common do |t| t.add :tail_uuid t.add :link_class t.add :name t.add :head_uuid - t.add :head, :if => :head - t.add :tail, :if => :tail + t.add :head_kind + t.add :tail_kind t.add :properties end @@ -27,6 +27,18 @@ class Link < ArvadosModel super end + def head_kind + if k = ArvadosModel::resource_class_for_uuid(head_uuid) + k.kind + end + end + + def tail_kind + if k = ArvadosModel::resource_class_for_uuid(tail_uuid) + k.kind + end + end + protected def permission_to_attach_to_objects @@ -39,22 +51,9 @@ class Link < ArvadosModel # Administrators can grant permissions return true if current_user.is_admin - # All users can grant permissions on objects they own - head_obj = self.class. - kind_class(self.head_uuid). - where('uuid=?',head_uuid). - first - if head_obj - return true if head_obj.owner_uuid == current_user.uuid - end - - # Users with "can_grant" permission on an object can grant - # permissions on that object - has_grant_permission = self.class. - where('link_class=? AND name=? AND tail_uuid=? AND head_uuid=?', - 'permission', 'can_grant', current_user.uuid, self.head_uuid). - count > 0 - return true if has_grant_permission + # All users can grant permissions on objects they own or can manage + head_obj = ArvadosModel.find_by_uuid(head_uuid) + return true if current_user.can?(manage: head_obj) # Default = deny. false @@ -71,4 +70,49 @@ class Link < ArvadosModel User.invalidate_permissions_cache end end + + def name_link_has_valid_name + if link_class == 'name' + unless name.is_a? String and !name.empty? + errors.add('name', 'must be a non-empty string') + end + else + true + end + end + + def name_link_owner_is_tail + if link_class == 'name' + self.owner_uuid = tail_uuid + ensure_owner_uuid_is_permitted + end + end + + # A user is permitted to create, update or modify a permission link + # if and only if they have "manage" permission on the destination + # object. + # All other links are treated as regular ArvadosModel objects. + # + def ensure_owner_uuid_is_permitted + if link_class == 'permission' + ob = ArvadosModel.find_by_uuid(head_uuid) + raise PermissionDeniedError unless current_user.can?(manage: ob) + # All permission links should be owned by the system user. + self.owner_uuid = system_user_uuid + return true + else + super + end + end + + # A user can give all other users permissions on folders. + def skip_uuid_read_permission_check + skipped_attrs = super + if link_class == "permission" and + (ArvadosModel.resource_class_for_uuid(head_uuid) == Group) and + (ArvadosModel.resource_class_for_uuid(tail_uuid) == User) + skipped_attrs << "tail_uuid" + end + skipped_attrs + end end