mirror of
https://github.com/overleaf/overleaf.git
synced 2024-11-21 20:47:08 -05:00
Merge pull request #13694 from overleaf/revert-13584-bg-managed-users-block-delete-own-account
Revert "block account deletion by managed users" GitOrigin-RevId: ece8024b2fac16066abd36af9a9670ba483b3628
This commit is contained in:
parent
48947f5e8a
commit
a68518dd35
8 changed files with 9 additions and 84 deletions
|
@ -1,38 +1,7 @@
|
||||||
const { ForbiddenError } = require('../Errors/Errors')
|
const { ForbiddenError } = require('../Errors/Errors')
|
||||||
const { hasPermission, getUserCapabilities } = require('./PermissionsManager')
|
const { hasPermission } = require('./PermissionsManager')
|
||||||
const ManagedUsersHandler = require('../Subscription/ManagedUsersHandler')
|
const ManagedUsersHandler = require('../Subscription/ManagedUsersHandler')
|
||||||
|
|
||||||
/**
|
|
||||||
* Function that returns middleware to add an `assertPermission` function to the request object to check if the user has a specific capability.
|
|
||||||
* @returns {Function} The middleware function that adds the `assertPermission` function to the request object.
|
|
||||||
*/
|
|
||||||
function useCapabilities() {
|
|
||||||
return async function (req, res, next) {
|
|
||||||
if (!req.user) {
|
|
||||||
return next()
|
|
||||||
}
|
|
||||||
try {
|
|
||||||
// get the group policy applying to the user
|
|
||||||
const groupPolicy =
|
|
||||||
await ManagedUsersHandler.promises.getGroupPolicyForUser(req.user)
|
|
||||||
// if there is no group policy, the user is not managed
|
|
||||||
if (!groupPolicy) {
|
|
||||||
return next()
|
|
||||||
}
|
|
||||||
const capabilitySet = getUserCapabilities(groupPolicy)
|
|
||||||
req.assertPermission = capability => {
|
|
||||||
if (!capabilitySet.has(capability)) {
|
|
||||||
throw new ForbiddenError(
|
|
||||||
`user does not have permission for ${capability}`
|
|
||||||
)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
next()
|
|
||||||
} catch (error) {
|
|
||||||
next(error)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
/**
|
/**
|
||||||
* Function that returns middleware to check if the user has permission to access a resource.
|
* Function that returns middleware to check if the user has permission to access a resource.
|
||||||
* @param {[string]} requiredCapabilities - the capabilities required to access the resource.
|
* @param {[string]} requiredCapabilities - the capabilities required to access the resource.
|
||||||
|
@ -76,5 +45,4 @@ function requirePermission(...requiredCapabilities) {
|
||||||
|
|
||||||
module.exports = {
|
module.exports = {
|
||||||
requirePermission,
|
requirePermission,
|
||||||
useCapabilities,
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -26,7 +26,7 @@
|
||||||
*
|
*
|
||||||
* Validator: a function that takes a user and returns a boolean indicating
|
* Validator: a function that takes a user and returns a boolean indicating
|
||||||
* whether the user satisfies the policy or not. For example, a validator for
|
* whether the user satisfies the policy or not. For example, a validator for
|
||||||
* the `userCannotHaveSecondaryEmail` policy would check whether the user has
|
* the `userCannotAddSecondaryEmail` policy would check whether the user has
|
||||||
* more than one email address.
|
* more than one email address.
|
||||||
*
|
*
|
||||||
* Group Policies: a collection of policies with a setting indicating whether
|
* Group Policies: a collection of policies with a setting indicating whether
|
||||||
|
@ -37,7 +37,7 @@
|
||||||
*
|
*
|
||||||
* {
|
* {
|
||||||
* "userCannotDeleteOwnAccount": true, // enforced
|
* "userCannotDeleteOwnAccount": true, // enforced
|
||||||
* "userCannotHaveSecondaryEmail": false // not enforced
|
* "userCannotAddSecondaryEmail": false // not enforced
|
||||||
* }
|
* }
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
|
|
@ -13,12 +13,6 @@ registerCapability('delete-own-account', { default: true })
|
||||||
// Register the capability for a user to add a secondary email to their account.
|
// Register the capability for a user to add a secondary email to their account.
|
||||||
registerCapability('add-secondary-email', { default: true })
|
registerCapability('add-secondary-email', { default: true })
|
||||||
|
|
||||||
// Register the capability for a user to add an affiliation to their account.
|
|
||||||
registerCapability('add-affiliation', { default: true })
|
|
||||||
|
|
||||||
// Register the capability for a user to endorse an email address.
|
|
||||||
registerCapability('endorse-email', { default: true })
|
|
||||||
|
|
||||||
// Register the capability for a user to sign in with Google to their account
|
// Register the capability for a user to sign in with Google to their account
|
||||||
registerCapability('link-google-sso', { default: true })
|
registerCapability('link-google-sso', { default: true })
|
||||||
|
|
||||||
|
@ -26,14 +20,11 @@ registerCapability('link-google-sso', { default: true })
|
||||||
registerCapability('link-other-third-party-sso', { default: true })
|
registerCapability('link-other-third-party-sso', { default: true })
|
||||||
|
|
||||||
// Register the capability for a user to leave a managed group subscription.
|
// Register the capability for a user to leave a managed group subscription.
|
||||||
registerCapability('leave-group-subscription', { default: true })
|
registerCapability('leave-managing-group-subscription', { default: true })
|
||||||
|
|
||||||
// Register the capability for a user to start a subscription.
|
// Register the capability for a user to start a subscription.
|
||||||
registerCapability('start-subscription', { default: true })
|
registerCapability('start-subscription', { default: true })
|
||||||
|
|
||||||
// Register the capability for a user to join a subscription.
|
|
||||||
registerCapability('join-subscription', { default: true })
|
|
||||||
|
|
||||||
// Register a policy to prevent a user deleting their own account.
|
// Register a policy to prevent a user deleting their own account.
|
||||||
registerPolicy('userCannotDeleteOwnAccount', {
|
registerPolicy('userCannotDeleteOwnAccount', {
|
||||||
'delete-own-account': false,
|
'delete-own-account': false,
|
||||||
|
@ -41,11 +32,9 @@ registerPolicy('userCannotDeleteOwnAccount', {
|
||||||
|
|
||||||
// Register a policy to prevent a user having secondary email addresses on their account.
|
// Register a policy to prevent a user having secondary email addresses on their account.
|
||||||
registerPolicy(
|
registerPolicy(
|
||||||
'userCannotHaveSecondaryEmail',
|
'userCannotAddSecondaryEmail',
|
||||||
{
|
{
|
||||||
'add-secondary-email': false,
|
'add-secondary-email': false,
|
||||||
'add-affiliation': false,
|
|
||||||
'endorse-email': false,
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
validator: async user => {
|
validator: async user => {
|
||||||
|
@ -57,7 +46,7 @@ registerPolicy(
|
||||||
|
|
||||||
// Register a policy to prevent a user leaving the group subscription they are managed by.
|
// Register a policy to prevent a user leaving the group subscription they are managed by.
|
||||||
registerPolicy('userCannotLeaveManagingGroupSubscription', {
|
registerPolicy('userCannotLeaveManagingGroupSubscription', {
|
||||||
'leave-group-subscription': false,
|
'leave-managing-group-subscription': false,
|
||||||
})
|
})
|
||||||
|
|
||||||
// Register a policy to prevent a user having third-party SSO linked to their account.
|
// Register a policy to prevent a user having third-party SSO linked to their account.
|
||||||
|
@ -89,7 +78,7 @@ registerPolicy(
|
||||||
// Register a policy to prevent a user having an active personal subscription.
|
// Register a policy to prevent a user having an active personal subscription.
|
||||||
registerPolicy(
|
registerPolicy(
|
||||||
'userCannotHaveSubscription',
|
'userCannotHaveSubscription',
|
||||||
{ 'start-subscription': false, 'join-subscription': false },
|
{ 'start-subscription': false },
|
||||||
{
|
{
|
||||||
validator: async user => {
|
validator: async user => {
|
||||||
return !(await SubscriptionLocator.promises.getUserIndividualSubscription(
|
return !(await SubscriptionLocator.promises.getUserIndividualSubscription(
|
||||||
|
@ -112,7 +101,7 @@ registerPolicy(
|
||||||
function getDefaultPolicy() {
|
function getDefaultPolicy() {
|
||||||
return {
|
return {
|
||||||
userCannotDeleteOwnAccount: true,
|
userCannotDeleteOwnAccount: true,
|
||||||
userCannotHaveSecondaryEmail: true,
|
userCannotAddSecondaryEmail: true,
|
||||||
userCannotHaveSubscription: true,
|
userCannotHaveSubscription: true,
|
||||||
userCannotLeaveManagingGroupSubscription: true,
|
userCannotLeaveManagingGroupSubscription: true,
|
||||||
userCannotHaveGoogleSSO: false, // we want to allow google SSO by default
|
userCannotHaveGoogleSSO: false, // we want to allow google SSO by default
|
||||||
|
|
|
@ -1,5 +1,4 @@
|
||||||
const AuthenticationController = require('../Authentication/AuthenticationController')
|
const AuthenticationController = require('../Authentication/AuthenticationController')
|
||||||
const PermissionsController = require('../Authorization/PermissionsController')
|
|
||||||
const SubscriptionController = require('./SubscriptionController')
|
const SubscriptionController = require('./SubscriptionController')
|
||||||
const SubscriptionGroupController = require('./SubscriptionGroupController')
|
const SubscriptionGroupController = require('./SubscriptionGroupController')
|
||||||
const TeamInvitesController = require('./TeamInvitesController')
|
const TeamInvitesController = require('./TeamInvitesController')
|
||||||
|
@ -59,7 +58,6 @@ module.exports = {
|
||||||
webRouter.delete(
|
webRouter.delete(
|
||||||
'/subscription/group/user',
|
'/subscription/group/user',
|
||||||
AuthenticationController.requireLogin(),
|
AuthenticationController.requireLogin(),
|
||||||
PermissionsController.requirePermission('leave-group-subscription'),
|
|
||||||
SubscriptionGroupController.removeSelfFromGroup
|
SubscriptionGroupController.removeSelfFromGroup
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -72,7 +70,6 @@ module.exports = {
|
||||||
'/subscription/invites/:token/',
|
'/subscription/invites/:token/',
|
||||||
AuthenticationController.requireLogin(),
|
AuthenticationController.requireLogin(),
|
||||||
RateLimiterMiddleware.rateLimit(teamInviteRateLimiter),
|
RateLimiterMiddleware.rateLimit(teamInviteRateLimiter),
|
||||||
PermissionsController.requirePermission('join-subscription'),
|
|
||||||
TeamInvitesController.acceptInvite
|
TeamInvitesController.acceptInvite
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -90,7 +87,6 @@ module.exports = {
|
||||||
webRouter.post(
|
webRouter.post(
|
||||||
'/user/subscription/create',
|
'/user/subscription/create',
|
||||||
AuthenticationController.requireLogin(),
|
AuthenticationController.requireLogin(),
|
||||||
PermissionsController.requirePermission('start-subscription'),
|
|
||||||
SubscriptionController.createSubscription
|
SubscriptionController.createSubscription
|
||||||
)
|
)
|
||||||
webRouter.post(
|
webRouter.post(
|
||||||
|
|
|
@ -194,11 +194,6 @@ async function ensureAffiliationMiddleware(req, res, next) {
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
return new Errors.UserNotFoundError({ info: { userId } })
|
return new Errors.UserNotFoundError({ info: { userId } })
|
||||||
}
|
}
|
||||||
try {
|
|
||||||
req.assertPermission('add-affiliation')
|
|
||||||
} catch (error) {
|
|
||||||
return next(error)
|
|
||||||
}
|
|
||||||
try {
|
try {
|
||||||
await ensureAffiliation(user)
|
await ensureAffiliation(user)
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
|
|
|
@ -8,7 +8,7 @@ const GroupPolicySchema = new Schema(
|
||||||
userCannotDeleteOwnAccount: Boolean,
|
userCannotDeleteOwnAccount: Boolean,
|
||||||
|
|
||||||
// User can't add a secondary email address, or affiliation
|
// User can't add a secondary email address, or affiliation
|
||||||
userCannotHaveSecondaryEmail: Boolean,
|
userCannotAddSecondaryEmail: Boolean,
|
||||||
|
|
||||||
// User can't have an active (currently auto-renewing) personal subscription, nor can they start one
|
// User can't have an active (currently auto-renewing) personal subscription, nor can they start one
|
||||||
userCannotHaveSubscription: Boolean,
|
userCannotHaveSubscription: Boolean,
|
||||||
|
|
|
@ -12,7 +12,6 @@ const UploadsRouter = require('./Features/Uploads/UploadsRouter')
|
||||||
const metrics = require('@overleaf/metrics')
|
const metrics = require('@overleaf/metrics')
|
||||||
const ReferalController = require('./Features/Referal/ReferalController')
|
const ReferalController = require('./Features/Referal/ReferalController')
|
||||||
const AuthenticationController = require('./Features/Authentication/AuthenticationController')
|
const AuthenticationController = require('./Features/Authentication/AuthenticationController')
|
||||||
const PermissionsController = require('./Features/Authorization/PermissionsController')
|
|
||||||
const SessionManager = require('./Features/Authentication/SessionManager')
|
const SessionManager = require('./Features/Authentication/SessionManager')
|
||||||
const TagsController = require('./Features/Tags/TagsController')
|
const TagsController = require('./Features/Tags/TagsController')
|
||||||
const NotificationsController = require('./Features/Notifications/NotificationsController')
|
const NotificationsController = require('./Features/Notifications/NotificationsController')
|
||||||
|
@ -301,7 +300,6 @@ function initialize(webRouter, privateApiRouter, publicApiRouter) {
|
||||||
webRouter.get(
|
webRouter.get(
|
||||||
'/user/emails',
|
'/user/emails',
|
||||||
AuthenticationController.requireLogin(),
|
AuthenticationController.requireLogin(),
|
||||||
PermissionsController.useCapabilities(),
|
|
||||||
UserController.promises.ensureAffiliationMiddleware,
|
UserController.promises.ensureAffiliationMiddleware,
|
||||||
UserEmailsController.list
|
UserEmailsController.list
|
||||||
)
|
)
|
||||||
|
@ -334,7 +332,6 @@ function initialize(webRouter, privateApiRouter, publicApiRouter) {
|
||||||
webRouter.post(
|
webRouter.post(
|
||||||
'/user/emails',
|
'/user/emails',
|
||||||
AuthenticationController.requireLogin(),
|
AuthenticationController.requireLogin(),
|
||||||
PermissionsController.requirePermission('add-secondary-email'),
|
|
||||||
RateLimiterMiddleware.rateLimit(rateLimiters.addEmail),
|
RateLimiterMiddleware.rateLimit(rateLimiters.addEmail),
|
||||||
CaptchaMiddleware.validateCaptcha('addEmail'),
|
CaptchaMiddleware.validateCaptcha('addEmail'),
|
||||||
UserEmailsController.add
|
UserEmailsController.add
|
||||||
|
@ -353,7 +350,6 @@ function initialize(webRouter, privateApiRouter, publicApiRouter) {
|
||||||
webRouter.post(
|
webRouter.post(
|
||||||
'/user/emails/endorse',
|
'/user/emails/endorse',
|
||||||
AuthenticationController.requireLogin(),
|
AuthenticationController.requireLogin(),
|
||||||
PermissionsController.requirePermission('endorse-email'),
|
|
||||||
RateLimiterMiddleware.rateLimit(rateLimiters.endorseEmail),
|
RateLimiterMiddleware.rateLimit(rateLimiters.endorseEmail),
|
||||||
UserEmailsController.endorse
|
UserEmailsController.endorse
|
||||||
)
|
)
|
||||||
|
@ -399,7 +395,6 @@ function initialize(webRouter, privateApiRouter, publicApiRouter) {
|
||||||
'/user/delete',
|
'/user/delete',
|
||||||
RateLimiterMiddleware.rateLimit(rateLimiters.deleteUser),
|
RateLimiterMiddleware.rateLimit(rateLimiters.deleteUser),
|
||||||
AuthenticationController.requireLogin(),
|
AuthenticationController.requireLogin(),
|
||||||
PermissionsController.requirePermission('delete-own-account'),
|
|
||||||
UserController.tryDeleteUser
|
UserController.tryDeleteUser
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
|
@ -928,18 +928,12 @@ describe('UserController', function () {
|
||||||
]
|
]
|
||||||
this.Features.hasFeature.withArgs('affiliations').returns(true)
|
this.Features.hasFeature.withArgs('affiliations').returns(true)
|
||||||
this.req.query.ensureAffiliation = true
|
this.req.query.ensureAffiliation = true
|
||||||
this.req.assertPermission = sinon.stub()
|
|
||||||
await this.UserController.promises.ensureAffiliationMiddleware(
|
await this.UserController.promises.ensureAffiliationMiddleware(
|
||||||
this.req,
|
this.req,
|
||||||
this.res,
|
this.res,
|
||||||
this.next
|
this.next
|
||||||
)
|
)
|
||||||
})
|
})
|
||||||
it('should check the user has permission', function () {
|
|
||||||
expect(this.req.assertPermission).to.have.been.calledWith(
|
|
||||||
'add-affiliation'
|
|
||||||
)
|
|
||||||
})
|
|
||||||
it('should unflag the emails but not confirm', function () {
|
it('should unflag the emails but not confirm', function () {
|
||||||
expect(
|
expect(
|
||||||
this.UserUpdater.promises.addAffiliationForNewUser
|
this.UserUpdater.promises.addAffiliationForNewUser
|
||||||
|
@ -966,18 +960,12 @@ describe('UserController', function () {
|
||||||
]
|
]
|
||||||
this.Features.hasFeature.withArgs('affiliations').returns(true)
|
this.Features.hasFeature.withArgs('affiliations').returns(true)
|
||||||
this.req.query.ensureAffiliation = true
|
this.req.query.ensureAffiliation = true
|
||||||
this.req.assertPermission = sinon.stub()
|
|
||||||
await this.UserController.promises.ensureAffiliationMiddleware(
|
await this.UserController.promises.ensureAffiliationMiddleware(
|
||||||
this.req,
|
this.req,
|
||||||
this.res,
|
this.res,
|
||||||
this.next
|
this.next
|
||||||
)
|
)
|
||||||
})
|
})
|
||||||
it('should check the user has permission', function () {
|
|
||||||
expect(this.req.assertPermission).to.have.been.calledWith(
|
|
||||||
'add-affiliation'
|
|
||||||
)
|
|
||||||
})
|
|
||||||
it('should add affiliation to v1, unflag and confirm on v2', function () {
|
it('should add affiliation to v1, unflag and confirm on v2', function () {
|
||||||
expect(this.UserUpdater.promises.addAffiliationForNewUser).to.have.not
|
expect(this.UserUpdater.promises.addAffiliationForNewUser).to.have.not
|
||||||
.been.called
|
.been.called
|
||||||
|
@ -1004,18 +992,12 @@ describe('UserController', function () {
|
||||||
]
|
]
|
||||||
this.Features.hasFeature.withArgs('affiliations').returns(true)
|
this.Features.hasFeature.withArgs('affiliations').returns(true)
|
||||||
this.req.query.ensureAffiliation = true
|
this.req.query.ensureAffiliation = true
|
||||||
this.req.assertPermission = sinon.stub()
|
|
||||||
await this.UserController.promises.ensureAffiliationMiddleware(
|
await this.UserController.promises.ensureAffiliationMiddleware(
|
||||||
this.req,
|
this.req,
|
||||||
this.res,
|
this.res,
|
||||||
this.next
|
this.next
|
||||||
)
|
)
|
||||||
})
|
})
|
||||||
it('should check the user has permission', function () {
|
|
||||||
expect(this.req.assertPermission).to.have.been.calledWith(
|
|
||||||
'add-affiliation'
|
|
||||||
)
|
|
||||||
})
|
|
||||||
it('should return the error', function () {
|
it('should return the error', function () {
|
||||||
expect(this.next).to.be.calledWith(sinon.match.instanceOf(Error))
|
expect(this.next).to.be.calledWith(sinon.match.instanceOf(Error))
|
||||||
})
|
})
|
||||||
|
|
Loading…
Reference in a new issue