mirror of
https://github.com/grafana/grafana.git
synced 2024-11-21 16:38:03 -06:00
RBAC: Add an additional check on UserID before fetching the permissions (#53002)
* RBAC: add an additional check before fetching permissions * Nit. * Readd removed test * change message
This commit is contained in:
parent
2054414d37
commit
00ff61cb9e
@ -60,8 +60,13 @@ func (s *AccessControlStore) GetUserPermissions(ctx context.Context, query acces
|
||||
}
|
||||
|
||||
func userRolesFilter(orgID, userID int64, roles []string) (string, []interface{}) {
|
||||
q := `
|
||||
WHERE role.id IN (
|
||||
params := []interface{}{}
|
||||
q := `WHERE role.id IN (`
|
||||
|
||||
// This is an additional security. We should never have permissions granted to userID 0.
|
||||
// Only allow real users to get user/team permissions (anonymous/apikeys)
|
||||
if userID > 0 {
|
||||
q += `
|
||||
SELECT ur.role_id
|
||||
FROM user_role AS ur
|
||||
WHERE ur.user_id = ?
|
||||
@ -69,15 +74,18 @@ func userRolesFilter(orgID, userID int64, roles []string) (string, []interface{}
|
||||
UNION
|
||||
SELECT tr.role_id FROM team_role as tr
|
||||
INNER JOIN team_member as tm ON tm.team_id = tr.team_id
|
||||
WHERE tm.user_id = ? AND tr.org_id = ?
|
||||
`
|
||||
params := []interface{}{userID, orgID, globalOrgID, userID, orgID}
|
||||
WHERE tm.user_id = ? AND tr.org_id = ?`
|
||||
params = []interface{}{userID, orgID, globalOrgID, userID, orgID}
|
||||
}
|
||||
|
||||
if len(roles) != 0 {
|
||||
if userID > 0 {
|
||||
q += `
|
||||
UNION`
|
||||
}
|
||||
q += `
|
||||
UNION
|
||||
SELECT br.role_id FROM builtin_role AS br
|
||||
WHERE role IN (? ` + strings.Repeat(", ?", len(roles)-1) + `)
|
||||
WHERE br.role IN (? ` + strings.Repeat(", ?", len(roles)-1) + `)
|
||||
`
|
||||
for _, role := range roles {
|
||||
params = append(params, role)
|
||||
|
@ -16,6 +16,7 @@ import (
|
||||
|
||||
type getUserPermissionsTestCase struct {
|
||||
desc string
|
||||
anonymousUser bool
|
||||
orgID int64
|
||||
role string
|
||||
userPermissions []string
|
||||
@ -74,6 +75,16 @@ func TestAccessControlStore_GetUserPermissions(t *testing.T) {
|
||||
expected: 0,
|
||||
actions: []string{},
|
||||
},
|
||||
{
|
||||
desc: "should only get br permissions for anonymous user",
|
||||
anonymousUser: true,
|
||||
orgID: 1,
|
||||
role: "Admin",
|
||||
userPermissions: []string{"1", "2", "10"},
|
||||
teamPermissions: []string{"100", "2"},
|
||||
builtinPermissions: []string{"5", "6"},
|
||||
expected: 2,
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.desc, func(t *testing.T) {
|
||||
@ -118,9 +129,13 @@ func TestAccessControlStore_GetUserPermissions(t *testing.T) {
|
||||
}
|
||||
}
|
||||
|
||||
userID := user.ID
|
||||
if tt.anonymousUser {
|
||||
userID = 0
|
||||
}
|
||||
permissions, err := store.GetUserPermissions(context.Background(), accesscontrol.GetUserPermissionsQuery{
|
||||
OrgID: tt.orgID,
|
||||
UserID: user.ID,
|
||||
UserID: userID,
|
||||
Roles: roles,
|
||||
Actions: tt.actions,
|
||||
})
|
||||
|
Loading…
Reference in New Issue
Block a user