X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/fc5742654641a10e765ed81d25ca44cb47976d02..f737eafb0f51879f5f27dbb23b19dd050709e05c:/services/api/app/models/group.rb diff --git a/services/api/app/models/group.rb b/services/api/app/models/group.rb index 485205f1eb..870e0d0c45 100644 --- a/services/api/app/models/group.rb +++ b/services/api/app/models/group.rb @@ -17,6 +17,7 @@ class Group < ArvadosModel attribute :properties, :jsonbHash, default: {} validate :ensure_filesystem_compatible_name + validate :check_group_class before_create :assign_name after_create :after_ownership_change after_create :update_trash @@ -24,6 +25,8 @@ class Group < ArvadosModel before_update :before_ownership_change after_update :after_ownership_change + after_create :add_role_manage_link + after_update :update_trash before_destroy :clear_permissions_and_trash @@ -39,13 +42,22 @@ class Group < ArvadosModel end def ensure_filesystem_compatible_name - # project groups need filesystem-compatible names, but others + # project and filter groups need filesystem-compatible names, but others # don't. - super if group_class == 'project' + super if group_class == 'project' || group_class == 'filter' + end + + def check_group_class + if group_class != 'project' && group_class != 'role' && group_class != 'filter' + errors.add :group_class, "value must be one of 'project', 'role' or 'filter', was '#{group_class}'" + end + if group_class_changed? && !group_class_was.nil? + errors.add :group_class, "cannot be modified after record is created" + end end def update_trash - if trash_at_changed? or owner_uuid_changed? + if saved_change_to_trash_at? or saved_change_to_owner_uuid? # The group was added or removed from the trash. # # Strategy: @@ -80,13 +92,13 @@ on conflict (group_uuid) do update set trash_at=EXCLUDED.trash_at; def before_ownership_change if owner_uuid_changed? and !self.owner_uuid_was.nil? MaterializedPermission.where(user_uuid: owner_uuid_was, target_uuid: uuid).delete_all - update_permissions self.owner_uuid_was, self.uuid, 0 + update_permissions self.owner_uuid_was, self.uuid, REVOKE_PERM end end def after_ownership_change - if owner_uuid_changed? - update_permissions self.owner_uuid, self.uuid, 3 + if saved_change_to_owner_uuid? + update_permissions self.owner_uuid, self.uuid, CAN_MANAGE_PERM end end @@ -104,4 +116,33 @@ delete from trashed_groups where group_uuid=$1 end true end + + def ensure_owner_uuid_is_permitted + if group_class == "role" + @requested_manager_uuid = nil + if new_record? + @requested_manager_uuid = owner_uuid + self.owner_uuid = system_user_uuid + return true + end + if self.owner_uuid != system_user_uuid + raise "Owner uuid for role must be system user" + end + raise PermissionDeniedError unless current_user.can?(manage: uuid) + true + else + super + end + end + + def add_role_manage_link + if group_class == "role" && @requested_manager_uuid + act_as_system_user do + Link.create!(tail_uuid: @requested_manager_uuid, + head_uuid: self.uuid, + link_class: "permission", + name: "can_manage") + end + end + end end