Add possibility to protect the modification of a permission

This commit is contained in:
Josué Tille 2019-12-22 15:45:20 +01:00
parent e5eed1fa17
commit 0e3293a47e
No known key found for this signature in database
GPG key ID: 716A6C99B04194EF
2 changed files with 22 additions and 14 deletions

View file

@ -480,7 +480,7 @@
"permission_update_failed": "Could not update permission '{permission}' : {error}", "permission_update_failed": "Could not update permission '{permission}' : {error}",
"permission_updated": "Permission '{permission:s}' updated", "permission_updated": "Permission '{permission:s}' updated",
"permission_update_nothing_to_do": "No permissions to update", "permission_update_nothing_to_do": "No permissions to update",
"permission_require_account": "Permission {permission} only makes sense for users having an account, and therefore cannot be enabled for visitors.", "permission_protected": "Permission {permission} protected. You can't modify the visitors group to access to this permission.",
"port_already_closed": "Port {port:d} is already closed for {ip_version:s} connections", "port_already_closed": "Port {port:d} is already closed for {ip_version:s} connections",
"port_already_opened": "Port {port:d} is already opened for {ip_version:s} connections", "port_already_opened": "Port {port:d} is already opened for {ip_version:s} connections",
"regenconf_file_backed_up": "Configuration file '{conf}' backed up to '{backup}'", "regenconf_file_backed_up": "Configuration file '{conf}' backed up to '{backup}'",

View file

@ -56,7 +56,7 @@ def user_permission_list(short=False, full=False, ignore_system_perms=False):
ldap = _get_ldap_interface() ldap = _get_ldap_interface()
permissions_infos = ldap.search('ou=permission,dc=yunohost,dc=org', permissions_infos = ldap.search('ou=permission,dc=yunohost,dc=org',
'(objectclass=permissionYnh)', '(objectclass=permissionYnh)',
["cn", 'groupPermission', 'inheritPermission', 'URL']) ["cn", 'groupPermission', 'inheritPermission', 'URL', 'isProtected'])
# Parse / organize information to be outputed # Parse / organize information to be outputed
@ -74,15 +74,15 @@ def user_permission_list(short=False, full=False, ignore_system_perms=False):
if full: if full:
permissions[name]["corresponding_users"] = [_ldap_path_extract(p, "uid") for p in infos.get('inheritPermission', [])] permissions[name]["corresponding_users"] = [_ldap_path_extract(p, "uid") for p in infos.get('inheritPermission', [])]
permissions[name]["url"] = infos.get("URL", [None])[0] permissions[name]["url"] = infos.get("URL", [None])[0]
permissions[name]["protected"] = False if infos.get("isProtected", [False])[0] == "FALSE" else True
if short: if short:
permissions = permissions.keys() permissions = permissions.keys()
return {'permissions': permissions} return {'permissions': permissions}
@is_unit_operation() @is_unit_operation()
def user_permission_update(operation_logger, permission, add=None, remove=None, sync_perm=True): def user_permission_update(operation_logger, permission, add=None, remove=None, is_protected=None, sync_perm=True):
""" """
Allow or Disallow a user or group to a permission for a specific application Allow or Disallow a user or group to a permission for a specific application
@ -90,6 +90,7 @@ def user_permission_update(operation_logger, permission, add=None, remove=None,
permission -- Name of the permission (e.g. mail or or wordpress or wordpress.editors) permission -- Name of the permission (e.g. mail or or wordpress or wordpress.editors)
add -- List of groups or usernames to add to this permission add -- List of groups or usernames to add to this permission
remove -- List of groups or usernames to remove from to this permission remove -- List of groups or usernames to remove from to this permission
is_protected -- (optional) Define if the permission can be added/removed to the visitor group
""" """
from yunohost.user import user_group_list from yunohost.user import user_group_list
@ -97,13 +98,15 @@ def user_permission_update(operation_logger, permission, add=None, remove=None,
if "." not in permission: if "." not in permission:
permission = permission + ".main" permission = permission + ".main"
# Refuse to add "visitors" to mail, xmpp ... they require an account to make sense. existing_permission = user_permission_list(full=True)["permissions"].get(permission, None)
if add and "visitors" in add and permission.split(".")[0] in SYSTEM_PERMS:
raise YunohostError('permission_require_account', permission=permission) # Refuse to add "visitors" to protected permission
if (add and "visitors" in add and existing_permission["protected"]) or \
(remove and "visitors" in remove and existing_permission["protected"]):
raise YunohostError('permission_protected', permission=permission)
# Fetch currently allowed groups for this permission # Fetch currently allowed groups for this permission
existing_permission = user_permission_list(full=True)["permissions"].get(permission, None)
if existing_permission is None: if existing_permission is None:
raise YunohostError('permission_not_found', permission=permission) raise YunohostError('permission_not_found', permission=permission)
@ -165,7 +168,7 @@ def user_permission_update(operation_logger, permission, add=None, remove=None,
operation_logger.start() operation_logger.start()
new_permission = _update_ldap_group_permission(permission=permission, allowed=new_allowed_groups, sync_perm=sync_perm) new_permission = _update_ldap_group_permission(permission=permission, allowed=new_allowed_groups, is_protected=is_protected, sync_perm=sync_perm)
logger.debug(m18n.n('permission_updated', permission=permission)) logger.debug(m18n.n('permission_updated', permission=permission))
@ -216,7 +219,7 @@ def user_permission_reset(operation_logger, permission, sync_perm=True):
@is_unit_operation() @is_unit_operation()
def permission_create(operation_logger, permission, url=None, allowed=None, sync_perm=True): def permission_create(operation_logger, permission, url=None, allowed=None, is_protected=False, sync_perm=True):
""" """
Create a new permission for a specific application Create a new permission for a specific application
@ -224,6 +227,7 @@ def permission_create(operation_logger, permission, url=None, allowed=None, sync
permission -- Name of the permission (e.g. mail or nextcloud or wordpress.editors) permission -- Name of the permission (e.g. mail or nextcloud or wordpress.editors)
url -- (optional) URL for which access will be allowed/forbidden url -- (optional) URL for which access will be allowed/forbidden
allowed -- (optional) A list of group/user to allow for the permission allowed -- (optional) A list of group/user to allow for the permission
is_protected -- (optional) Define if the permission can be added/removed to the visitor group
If provided, 'url' is assumed to be relative to the app domain/path if they If provided, 'url' is assumed to be relative to the app domain/path if they
start with '/'. For example: start with '/'. For example:
@ -261,7 +265,7 @@ def permission_create(operation_logger, permission, url=None, allowed=None, sync
attr_dict = { attr_dict = {
'objectClass': ['top', 'permissionYnh', 'posixGroup'], 'objectClass': ['top', 'permissionYnh', 'posixGroup'],
'cn': str(permission), 'cn': str(permission),
'gidNumber': gid, 'gidNumber': gid
} }
if url: if url:
@ -287,7 +291,7 @@ def permission_create(operation_logger, permission, url=None, allowed=None, sync
except Exception as e: except Exception as e:
raise YunohostError('permission_creation_failed', permission=permission, error=e) raise YunohostError('permission_creation_failed', permission=permission, error=e)
new_permission = _update_ldap_group_permission(permission=permission, allowed=allowed, sync_perm=sync_perm) new_permission = _update_ldap_group_permission(permission=permission, allowed=allowed, is_protected=is_protected, sync_perm=sync_perm)
logger.debug(m18n.n('permission_created', permission=permission)) logger.debug(m18n.n('permission_created', permission=permission))
return new_permission return new_permission
@ -425,7 +429,7 @@ def permission_sync_to_user():
os.system('nscd --invalidate=group') os.system('nscd --invalidate=group')
def _update_ldap_group_permission(permission, allowed, sync_perm=True): def _update_ldap_group_permission(permission, allowed, is_protected=None, sync_perm=True):
""" """
Internal function that will rewrite user permission Internal function that will rewrite user permission
@ -453,9 +457,13 @@ def _update_ldap_group_permission(permission, allowed, sync_perm=True):
allowed = [allowed] if not isinstance(allowed, list) else allowed allowed = [allowed] if not isinstance(allowed, list) else allowed
if is_protected is None:
is_protected = existing_permission["protected"]
try: try:
ldap.update('cn=%s,ou=permission' % permission, ldap.update('cn=%s,ou=permission' % permission,
{'groupPermission': ['cn=' + g + ',ou=groups,dc=yunohost,dc=org' for g in allowed]}) {'groupPermission': ['cn=' + g + ',ou=groups,dc=yunohost,dc=org' for g in allowed],
'isProtected': "TRUE" if is_protected else "FALSE"})
except Exception as e: except Exception as e:
raise YunohostError('permission_update_failed', permission=permission, error=e) raise YunohostError('permission_update_failed', permission=permission, error=e)