forest_liana 9.3.12 → 9.3.13
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/app/controllers/forest_liana/application_controller.rb +2 -1
- data/app/services/forest_liana/ability/exceptions/unknown_collection.rb +16 -0
- data/app/services/forest_liana/ability/permission.rb +16 -6
- data/lib/forest_liana/version.rb +1 -1
- data/spec/dummy/app/controllers/forest/islands_controller.rb +4 -0
- data/spec/dummy/config/routes.rb +1 -0
- data/spec/dummy/lib/forest_liana/collections/island.rb +2 -0
- data/spec/requests/actions_controller_spec.rb +106 -4
- data/spec/services/forest_liana/ability/permission_spec.rb +31 -2
- metadata +3 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 71e166bf8607e91299070c9f6158460e2e997488bbc7162bc09e0c7882f0e5fa
|
4
|
+
data.tar.gz: 6bf47b9c89e0ac3bf20e13b03a72f36a958e8689831f4be4ebe41af505ae960f
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: bccaf2fb14aa6dcba206670cc13ec7356bcd342ccc4a1b89ab05f726f46e484ecf7a44fc3c0f58bf0fc8d784f3bf168b1a1d0fa9ce94224b422329668ab7967c
|
7
|
+
data.tar.gz: f79f05328165367a3f401896a221e1e45b5f2175417cd51e1704cca69c288c1429ad23cc257621d9f099350e328e3f0d4ebd5801782e491ab7ac43e42df6596a
|
@@ -6,7 +6,8 @@ module ForestLiana
|
|
6
6
|
rescue_from ForestLiana::Ability::Exceptions::AccessDenied, with: :render_error
|
7
7
|
rescue_from ForestLiana::Errors::HTTP403Error, with: :render_error
|
8
8
|
rescue_from ForestLiana::Errors::HTTP422Error, with: :render_error
|
9
|
-
rescue_from ForestLiana::
|
9
|
+
rescue_from ForestLiana::Ability::Exceptions::ActionConditionError, with: :render_error
|
10
|
+
rescue_from ForestLiana::Ability::Exceptions::UnknownCollection, with: :render_error
|
10
11
|
|
11
12
|
def self.papertrail?
|
12
13
|
Object.const_get('PaperTrail::Version').is_a?(Class) rescue false
|
@@ -0,0 +1,16 @@
|
|
1
|
+
module ForestLiana
|
2
|
+
module Ability
|
3
|
+
module Exceptions
|
4
|
+
class UnknownCollection < ForestLiana::Errors::ExpectedError
|
5
|
+
def initialize(collection_name)
|
6
|
+
super(
|
7
|
+
409,
|
8
|
+
:conflict,
|
9
|
+
"The collection #{collection_name} doesn't exist",
|
10
|
+
'collection not found'
|
11
|
+
)
|
12
|
+
end
|
13
|
+
end
|
14
|
+
end
|
15
|
+
end
|
16
|
+
end
|
@@ -25,8 +25,10 @@ module ForestLiana
|
|
25
25
|
end
|
26
26
|
|
27
27
|
is_allowed
|
28
|
+
rescue ForestLiana::Errors::ExpectedError => exception
|
29
|
+
raise exception
|
28
30
|
rescue
|
29
|
-
raise ForestLiana::
|
31
|
+
raise ForestLiana::Ability::Exceptions::UnknownCollection.new(collection_name)
|
30
32
|
end
|
31
33
|
end
|
32
34
|
|
@@ -35,13 +37,16 @@ module ForestLiana
|
|
35
37
|
|
36
38
|
user_data = get_user_data(user['id'])
|
37
39
|
collections_data = get_collections_permissions_data
|
40
|
+
collection_name = ForestLiana.name_for(collection)
|
38
41
|
begin
|
39
|
-
action = find_action_from_endpoint(
|
42
|
+
action = find_action_from_endpoint(collection_name, endpoint, http_method).name
|
40
43
|
|
41
|
-
smart_action_approval = SmartActionChecker.new(parameters, collection, collections_data[
|
44
|
+
smart_action_approval = SmartActionChecker.new(parameters, collection, collections_data[collection_name][:actions][action], user_data)
|
42
45
|
smart_action_approval.can_execute?
|
46
|
+
rescue ForestLiana::Errors::ExpectedError => exception
|
47
|
+
raise exception
|
43
48
|
rescue
|
44
|
-
raise ForestLiana::
|
49
|
+
raise ForestLiana::Ability::Exceptions::UnknownCollection.new(collection_name)
|
45
50
|
end
|
46
51
|
end
|
47
52
|
|
@@ -66,7 +71,7 @@ module ForestLiana
|
|
66
71
|
|
67
72
|
private
|
68
73
|
|
69
|
-
def get_user_data(user_id)
|
74
|
+
def get_user_data(user_id, force_fetch = true)
|
70
75
|
cache = Rails.cache.fetch('forest.users', expires_in: TTL) do
|
71
76
|
users = {}
|
72
77
|
get_permissions('/liana/v4/permissions/users').each do |user|
|
@@ -76,7 +81,12 @@ module ForestLiana
|
|
76
81
|
users
|
77
82
|
end
|
78
83
|
|
79
|
-
cache
|
84
|
+
if !cache.key?(user_id.to_s) && force_fetch
|
85
|
+
Rails.cache.delete('forest.users')
|
86
|
+
get_user_data(user_id, false)
|
87
|
+
else
|
88
|
+
cache[user_id.to_s]
|
89
|
+
end
|
80
90
|
end
|
81
91
|
|
82
92
|
def get_collections_permissions_data(force_fetch = false)
|
data/lib/forest_liana/version.rb
CHANGED
data/spec/dummy/config/routes.rb
CHANGED
@@ -1,6 +1,7 @@
|
|
1
1
|
Rails.application.routes.draw do
|
2
2
|
namespace :forest do
|
3
3
|
post '/actions/test' => 'islands#test'
|
4
|
+
post '/actions/unknown_action' => 'islands#unknown_action'
|
4
5
|
get '/Owner/count' , to: 'owners#count'
|
5
6
|
get '/Owner/:id/relationships/trees/count' , to: 'owner_trees#count'
|
6
7
|
end
|
@@ -261,10 +261,6 @@ describe 'Requesting Actions routes', :type => :request do
|
|
261
261
|
end
|
262
262
|
|
263
263
|
describe 'calling the action' do
|
264
|
-
before(:each) do
|
265
|
-
allow_any_instance_of(ForestLiana::Ability).to receive(:forest_authorize!) { true }
|
266
|
-
end
|
267
|
-
|
268
264
|
let(:all_records) { false }
|
269
265
|
let(:params) {
|
270
266
|
{
|
@@ -283,13 +279,119 @@ describe 'Requesting Actions routes', :type => :request do
|
|
283
279
|
|
284
280
|
describe 'without scopes' do
|
285
281
|
it 'should respond 200 and perform the action' do
|
282
|
+
allow_any_instance_of(ForestLiana::Ability).to receive(:forest_authorize!) { true }
|
286
283
|
post '/forest/actions/test', params: JSON.dump(params), headers: headers
|
287
284
|
expect(response.status).to eq(200)
|
288
285
|
expect(JSON.parse(response.body)).to eq({'success' => 'You are OK.'})
|
289
286
|
end
|
287
|
+
|
288
|
+
let(:params) {
|
289
|
+
{
|
290
|
+
data: {
|
291
|
+
attributes: {
|
292
|
+
collection_name: 'Island',
|
293
|
+
ids: ['1'],
|
294
|
+
all_records: all_records,
|
295
|
+
smart_action_id: 'Island-Test'
|
296
|
+
},
|
297
|
+
type: 'custom-action-requests'
|
298
|
+
},
|
299
|
+
timezone: 'Europe/Paris'
|
300
|
+
}
|
301
|
+
}
|
302
|
+
|
303
|
+
describe 'with invalid conditions' do
|
304
|
+
it 'should respond a 409' do
|
305
|
+
Rails.cache.write('forest.has_permission', true)
|
306
|
+
Rails.cache.write('forest.users', {'38' => { 'id' => 38, 'roleId' => 1, 'rendering_id' => '13' }})
|
307
|
+
Rails.cache.write(
|
308
|
+
'forest.collections',
|
309
|
+
{
|
310
|
+
'Island' => {
|
311
|
+
:actions =>
|
312
|
+
{
|
313
|
+
'test' => { 'triggerEnabled' => [1],
|
314
|
+
'triggerConditions' => [],
|
315
|
+
'approvalRequired' => [1],
|
316
|
+
'approvalRequiredConditions' =>
|
317
|
+
[
|
318
|
+
{ 'filter' =>
|
319
|
+
{ 'field' => 'id',
|
320
|
+
'value' => 2,
|
321
|
+
'source' => 'data',
|
322
|
+
'operator' => 'foo-greater-than'
|
323
|
+
},
|
324
|
+
'roleId' => 1
|
325
|
+
}
|
326
|
+
],
|
327
|
+
}
|
328
|
+
}
|
329
|
+
}
|
330
|
+
}
|
331
|
+
)
|
332
|
+
|
333
|
+
post '/forest/actions/test', params: JSON.dump(params), headers: headers
|
334
|
+
|
335
|
+
expect(response.status).to eq(409)
|
336
|
+
expect(JSON.parse(response.body)).to eq(
|
337
|
+
{
|
338
|
+
"errors" => [
|
339
|
+
{
|
340
|
+
"status" => 409,
|
341
|
+
"detail" => "The conditions to trigger this action cannot be verified. Please contact an administrator.",
|
342
|
+
"name" => "InvalidActionConditionError"
|
343
|
+
}
|
344
|
+
]
|
345
|
+
}
|
346
|
+
)
|
347
|
+
end
|
348
|
+
end
|
349
|
+
|
350
|
+
describe 'with unknown action' do
|
351
|
+
it 'should respond a 409' do
|
352
|
+
Rails.cache.write('forest.has_permission', true)
|
353
|
+
Rails.cache.write('forest.users', {'38' => { 'id' => 38, 'roleId' => 1, 'rendering_id' => '13' }})
|
354
|
+
Rails.cache.write(
|
355
|
+
'forest.collections',
|
356
|
+
{
|
357
|
+
'Island' => {
|
358
|
+
:actions =>
|
359
|
+
{
|
360
|
+
'test' => { 'triggerEnabled' => [1],
|
361
|
+
'triggerConditions' => [],
|
362
|
+
'approvalRequired' => [1],
|
363
|
+
'approvalRequiredConditions' =>
|
364
|
+
[
|
365
|
+
{ 'filter' =>
|
366
|
+
{ 'field' => 'id',
|
367
|
+
'value' => 2,
|
368
|
+
'source' => 'data',
|
369
|
+
'operator' => 'foo-greater-than'
|
370
|
+
},
|
371
|
+
'roleId' => 1
|
372
|
+
}
|
373
|
+
],
|
374
|
+
}
|
375
|
+
}
|
376
|
+
}
|
377
|
+
}
|
378
|
+
)
|
379
|
+
|
380
|
+
post '/forest/actions/unknown_action', params: JSON.dump(params), headers: headers
|
381
|
+
|
382
|
+
expect(response.status).to eq(409)
|
383
|
+
expect(JSON.parse(response.body)).to eq(
|
384
|
+
{"errors"=> [{"detail" => "The collection Island doesn't exist", "name" => "collection not found", "status" => 409}]}
|
385
|
+
)
|
386
|
+
end
|
387
|
+
end
|
290
388
|
end
|
291
389
|
|
292
390
|
describe 'with scopes' do
|
391
|
+
before(:each) do
|
392
|
+
allow_any_instance_of(ForestLiana::Ability).to receive(:forest_authorize!) { true }
|
393
|
+
end
|
394
|
+
|
293
395
|
describe 'when record is in scope' do
|
294
396
|
let(:scope_filters) {
|
295
397
|
{
|
@@ -81,7 +81,11 @@ module ForestLiana
|
|
81
81
|
|
82
82
|
|
83
83
|
it 'should throw an exception when the collection doesn\'t exist' do
|
84
|
-
|
84
|
+
allow_any_instance_of(ForestLiana::Ability::Fetch)
|
85
|
+
.to receive(:get_permissions)
|
86
|
+
.and_return({ "collections" => {} })
|
87
|
+
expect {dummy_class.is_crud_authorized?('browse', user, String)}
|
88
|
+
.to raise_error(ForestLiana::Ability::Exceptions::UnknownCollection, 'The collection String doesn\'t exist')
|
85
89
|
end
|
86
90
|
|
87
91
|
it 'should re-fetch the permission once when user permission is not allowed' do
|
@@ -211,6 +215,30 @@ module ForestLiana
|
|
211
215
|
expect(dummy_class.is_crud_authorized?('browse', user, Island)).to equal true
|
212
216
|
end
|
213
217
|
|
218
|
+
it 'should re-fetch the users list once when user doesn\'t exist' do
|
219
|
+
Rails.cache.write('forest.users', {'2' => { 'id' => 2, 'roleId' => 1, 'rendering_id' => '1' }})
|
220
|
+
# Rails.cache.write('forest.users', {'1' => user})
|
221
|
+
Rails.cache.write(
|
222
|
+
'forest.collections',
|
223
|
+
'Island' => {
|
224
|
+
'browse' => [1],
|
225
|
+
'read' => [1],
|
226
|
+
'edit' => [1],
|
227
|
+
'add' => [1],
|
228
|
+
'delete' => [1],
|
229
|
+
'export' => [1],
|
230
|
+
}
|
231
|
+
)
|
232
|
+
|
233
|
+
allow_any_instance_of(ForestLiana::Ability::Fetch)
|
234
|
+
.to receive(:get_permissions)
|
235
|
+
.and_return(
|
236
|
+
[user]
|
237
|
+
)
|
238
|
+
|
239
|
+
expect(dummy_class.is_crud_authorized?('browse', user, Island)).to equal true
|
240
|
+
end
|
241
|
+
|
214
242
|
it 'should return false when user permission is not allowed' do
|
215
243
|
Rails.cache.delete('forest.users')
|
216
244
|
|
@@ -372,7 +400,8 @@ module ForestLiana
|
|
372
400
|
end
|
373
401
|
|
374
402
|
it 'should throw an exception when the collection doesn\'t exist' do
|
375
|
-
expect {dummy_class.is_smart_action_authorized?(user, String, parameters, '/forest/actions/my_action', 'POST')}
|
403
|
+
expect {dummy_class.is_smart_action_authorized?(user, String, parameters, '/forest/actions/my_action', 'POST')}
|
404
|
+
.to raise_error(ForestLiana::Ability::Exceptions::UnknownCollection, 'The collection String doesn\'t exist')
|
376
405
|
end
|
377
406
|
end
|
378
407
|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: forest_liana
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 9.3.
|
4
|
+
version: 9.3.13
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Sandro Munda
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-07-
|
11
|
+
date: 2024-07-19 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: rails
|
@@ -263,6 +263,7 @@ files:
|
|
263
263
|
- app/services/forest_liana/ability/exceptions/action_condition_error.rb
|
264
264
|
- app/services/forest_liana/ability/exceptions/require_approval.rb
|
265
265
|
- app/services/forest_liana/ability/exceptions/trigger_forbidden.rb
|
266
|
+
- app/services/forest_liana/ability/exceptions/unknown_collection.rb
|
266
267
|
- app/services/forest_liana/ability/fetch.rb
|
267
268
|
- app/services/forest_liana/ability/permission.rb
|
268
269
|
- app/services/forest_liana/ability/permission/request_permission.rb
|