X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/975b1912434cdd158abcf2d8b882d90c57c4299e..9fd9565ea0411b43943076add49d5bca2da8e379:/services/api/app/models/link.rb diff --git a/services/api/app/models/link.rb b/services/api/app/models/link.rb index 575f32c585..d9b8f6f09b 100644 --- a/services/api/app/models/link.rb +++ b/services/api/app/models/link.rb @@ -5,13 +5,11 @@ class Link < ArvadosModel serialize :properties, Hash before_create :permission_to_attach_to_objects before_update :permission_to_attach_to_objects - before_save :permission_link_ownership, if: "link_class == 'permission'" after_update :maybe_invalidate_permissions_cache after_create :maybe_invalidate_permissions_cache after_destroy :maybe_invalidate_permissions_cache attr_accessor :head_kind, :tail_kind - validate :name_link_has_valid_name - validate :name_link_owner_is_tail + validate :name_links_are_obsolete api_accessible :user, extend: :common do |t| t.add :tail_uuid @@ -53,15 +51,8 @@ class Link < ArvadosModel return true if current_user.is_admin # All users can grant permissions on objects they own or can manage - return true if current_user.can_manage? head_uuid - - # Users with "can_grant" permission on an object can grant - # permissions on that object - has_grant_permission = self.class. - where('link_class=? AND name=? AND tail_uuid=? AND head_uuid=?', - 'permission', 'can_grant', current_user.uuid, self.head_uuid). - count > 0 - return true if has_grant_permission + head_obj = ArvadosModel.find_by_uuid(head_uuid) + return true if current_user.can?(manage: head_obj) # Default = deny. false @@ -79,26 +70,31 @@ class Link < ArvadosModel end end - def name_link_has_valid_name + def name_links_are_obsolete if link_class == 'name' - unless name.is_a? String and !name.empty? - errors.add('name', 'must be a non-empty string') - end + errors.add('name', 'Name links are obsolete') + false else true end end - def name_link_owner_is_tail - if link_class == 'name' - self.owner_uuid = tail_uuid - ensure_owner_uuid_is_permitted + # A user is permitted to create, update or modify a permission link + # if and only if they have "manage" permission on the object + # indicated by the permission link's head_uuid. + # + # All other links are treated as regular ArvadosModel objects. + # + def ensure_owner_uuid_is_permitted + if link_class == 'permission' + ob = ArvadosModel.find_by_uuid(head_uuid) + raise PermissionDeniedError unless current_user.can?(manage: ob) + # All permission links should be owned by the system user. + self.owner_uuid = system_user_uuid + return true + else + super end end - # permission_link_ownership: ensure that permission links are - # owned by root. - def permission_link_ownership - self.owner_uuid = system_user_uuid - end end