separate ability and capability
These are asking fundamentally different questions; Abilities are asking the application if the user has a role that allows the user to take a certain action Capabilities are asking if the user has granted the application to perform a certain type of action CanCanCan makes no distinction, however, so the `granted_capabilities` method is provided as a point that can be checked in rescue methods, so that one can _attempt_ to continue to provide the more informative error messages around permission refusals
This commit is contained in:
parent
4d20a2c96a
commit
91fc65a2e3
5 changed files with 81 additions and 61 deletions
|
@ -471,7 +471,11 @@ class ApplicationController < ActionController::Base
|
||||||
end
|
end
|
||||||
|
|
||||||
def current_ability
|
def current_ability
|
||||||
Ability.new(current_user, current_token)
|
Ability.new(current_user).merge(granted_capabily)
|
||||||
|
end
|
||||||
|
|
||||||
|
def granted_capabily
|
||||||
|
Capability.new(current_user, current_token)
|
||||||
end
|
end
|
||||||
|
|
||||||
def deny_access(exception)
|
def deny_access(exception)
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
class Ability
|
class Ability
|
||||||
include CanCan::Ability
|
include CanCan::Ability
|
||||||
|
|
||||||
def initialize(user, token)
|
def initialize(user)
|
||||||
can :index, :site
|
can :index, :site
|
||||||
can [:permalink, :edit, :help, :fixthemap, :offline, :export, :about, :preview, :copyright, :key, :id, :welcome], :site
|
can [:permalink, :edit, :help, :fixthemap, :offline, :export, :about, :preview, :copyright, :key, :id, :welcome], :site
|
||||||
|
|
||||||
|
@ -17,9 +17,6 @@ class Ability
|
||||||
|
|
||||||
can [:create, :edit, :comment, :subscribe, :unsubscribe], DiaryEntry
|
can [:create, :edit, :comment, :subscribe, :unsubscribe], DiaryEntry
|
||||||
|
|
||||||
can [:read, :read_one], UserPreference if has_capability?(token, :allow_read_prefs)
|
|
||||||
can [:update, :update_one, :delete_one], UserPreference if has_capability?(token, :allow_write_prefs)
|
|
||||||
|
|
||||||
if user.administrator?
|
if user.administrator?
|
||||||
can [:hide, :hidecomment], [DiaryEntry, DiaryComment]
|
can [:hide, :hidecomment], [DiaryEntry, DiaryComment]
|
||||||
end
|
end
|
||||||
|
@ -51,10 +48,4 @@ class Ability
|
||||||
# See the wiki for details:
|
# See the wiki for details:
|
||||||
# https://github.com/CanCanCommunity/cancancan/wiki/Defining-Abilities
|
# https://github.com/CanCanCommunity/cancancan/wiki/Defining-Abilities
|
||||||
end
|
end
|
||||||
|
|
||||||
# If a user provides no tokens, they've authenticated via a non-oauth method
|
|
||||||
# and permission to access to all capabilities is assumed.
|
|
||||||
def has_capability?(token, cap)
|
|
||||||
token.nil? || token.read_attribute(cap)
|
|
||||||
end
|
|
||||||
end
|
end
|
||||||
|
|
19
app/models/capability.rb
Normal file
19
app/models/capability.rb
Normal file
|
@ -0,0 +1,19 @@
|
||||||
|
# frozen_string_literal: true
|
||||||
|
|
||||||
|
class Capability
|
||||||
|
include CanCan::Ability
|
||||||
|
|
||||||
|
def initialize(user, token)
|
||||||
|
if user
|
||||||
|
can [:read, :read_one], UserPreference if has_capability?(token, :allow_read_prefs)
|
||||||
|
can [:update, :update_one, :delete_one], UserPreference if has_capability?(token, :allow_write_prefs)
|
||||||
|
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
# If a user provides no tokens, they've authenticated via a non-oauth method
|
||||||
|
# and permission to access to all capabilities is assumed.
|
||||||
|
def has_capability?(token, cap)
|
||||||
|
token.nil? || token.read_attribute(cap)
|
||||||
|
end
|
||||||
|
end
|
|
@ -3,21 +3,12 @@
|
||||||
require "test_helper"
|
require "test_helper"
|
||||||
|
|
||||||
class AbilityTest < ActiveSupport::TestCase
|
class AbilityTest < ActiveSupport::TestCase
|
||||||
|
|
||||||
def tokens(*toks)
|
|
||||||
AccessToken.new do |token|
|
|
||||||
toks.each do |t|
|
|
||||||
token.public_send("#{t}=", true)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
||||||
class GuestAbilityTest < AbilityTest
|
class GuestAbilityTest < AbilityTest
|
||||||
|
|
||||||
test "geocoder permission for a guest" do
|
test "geocoder permission for a guest" do
|
||||||
ability = Ability.new nil, tokens
|
ability = Ability.new nil
|
||||||
|
|
||||||
[:search, :search_latlon, :search_ca_postcode, :search_osm_nominatim,
|
[:search, :search_latlon, :search_ca_postcode, :search_osm_nominatim,
|
||||||
:search_geonames, :search_osm_nominatim_reverse, :search_geonames_reverse].each do |action|
|
:search_geonames, :search_osm_nominatim_reverse, :search_geonames_reverse].each do |action|
|
||||||
|
@ -26,7 +17,7 @@ class GuestAbilityTest < AbilityTest
|
||||||
end
|
end
|
||||||
|
|
||||||
test "diary permissions for a guest" do
|
test "diary permissions for a guest" do
|
||||||
ability = Ability.new nil, tokens
|
ability = Ability.new nil
|
||||||
[:list, :rss, :view, :comments].each do |action|
|
[:list, :rss, :view, :comments].each do |action|
|
||||||
assert ability.can?(action, DiaryEntry), "should be able to #{action} DiaryEntries"
|
assert ability.can?(action, DiaryEntry), "should be able to #{action} DiaryEntries"
|
||||||
end
|
end
|
||||||
|
@ -42,7 +33,7 @@ end
|
||||||
class UserAbilityTest < AbilityTest
|
class UserAbilityTest < AbilityTest
|
||||||
|
|
||||||
test "Diary permissions" do
|
test "Diary permissions" do
|
||||||
ability = Ability.new create(:user), tokens
|
ability = Ability.new create(:user)
|
||||||
|
|
||||||
[:list, :rss, :view, :comments, :create, :edit, :comment, :subscribe, :unsubscribe].each do |action|
|
[:list, :rss, :view, :comments, :create, :edit, :comment, :subscribe, :unsubscribe].each do |action|
|
||||||
assert ability.can?(action, DiaryEntry), "should be able to #{action} DiaryEntries"
|
assert ability.can?(action, DiaryEntry), "should be able to #{action} DiaryEntries"
|
||||||
|
@ -53,48 +44,12 @@ class UserAbilityTest < AbilityTest
|
||||||
assert ability.cannot?(action, DiaryComment), "should be able to #{action} DiaryEntries"
|
assert ability.cannot?(action, DiaryComment), "should be able to #{action} DiaryEntries"
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
test "user preferences" do
|
|
||||||
user = create(:user)
|
|
||||||
|
|
||||||
# a user with no tokens
|
|
||||||
ability = Ability.new create(:user), nil
|
|
||||||
[:read, :read_one, :update, :update_one, :delete_one].each do |act|
|
|
||||||
assert ability.can? act, UserPreference
|
|
||||||
end
|
|
||||||
|
|
||||||
# A user with empty tokens
|
|
||||||
ability = Ability.new create(:user), tokens
|
|
||||||
|
|
||||||
[:read, :read_one, :update, :update_one, :delete_one].each do |act|
|
|
||||||
assert ability.cannot? act, UserPreference
|
|
||||||
end
|
|
||||||
|
|
||||||
ability = Ability.new user, tokens(:allow_read_prefs)
|
|
||||||
|
|
||||||
[:update, :update_one, :delete_one].each do |act|
|
|
||||||
assert ability.cannot? act, UserPreference
|
|
||||||
end
|
|
||||||
|
|
||||||
[:read, :read_one].each do |act|
|
|
||||||
assert ability.can? act, UserPreference
|
|
||||||
end
|
|
||||||
|
|
||||||
ability = Ability.new user, tokens(:allow_write_prefs)
|
|
||||||
[:read, :read_one].each do |act|
|
|
||||||
assert ability.cannot? act, UserPreference
|
|
||||||
end
|
|
||||||
|
|
||||||
[:update, :update_one, :delete_one].each do |act|
|
|
||||||
assert ability.can? act, UserPreference
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
end
|
||||||
|
|
||||||
class AdministratorAbilityTest < AbilityTest
|
class AdministratorAbilityTest < AbilityTest
|
||||||
|
|
||||||
test "Diary for an administrator" do
|
test "Diary for an administrator" do
|
||||||
ability = Ability.new create(:administrator_user), tokens
|
ability = Ability.new create(:administrator_user)
|
||||||
[:list, :rss, :view, :comments, :create, :edit, :comment, :subscribe, :unsubscribe, :hide, :hidecomment].each do |action|
|
[:list, :rss, :view, :comments, :create, :edit, :comment, :subscribe, :unsubscribe, :hide, :hidecomment].each do |action|
|
||||||
assert ability.can?(action, DiaryEntry), "should be able to #{action} DiaryEntries"
|
assert ability.can?(action, DiaryEntry), "should be able to #{action} DiaryEntries"
|
||||||
end
|
end
|
||||||
|
@ -105,7 +60,7 @@ class AdministratorAbilityTest < AbilityTest
|
||||||
end
|
end
|
||||||
|
|
||||||
test "administrator does not auto-grant user preferences" do
|
test "administrator does not auto-grant user preferences" do
|
||||||
ability = Ability.new create(:administrator_user), tokens
|
ability = Ability.new create(:administrator_user)
|
||||||
|
|
||||||
[:read, :read_one, :update, :update_one, :delete_one].each do |act|
|
[:read, :read_one, :update, :update_one, :delete_one].each do |act|
|
||||||
assert ability.cannot? act, UserPreference
|
assert ability.cannot? act, UserPreference
|
||||||
|
|
51
test/models/capability_test.rb
Normal file
51
test/models/capability_test.rb
Normal file
|
@ -0,0 +1,51 @@
|
||||||
|
# frozen_string_literal: true
|
||||||
|
|
||||||
|
require "test_helper"
|
||||||
|
|
||||||
|
class CapabilityTest < ActiveSupport::TestCase
|
||||||
|
def tokens(*toks)
|
||||||
|
AccessToken.new do |token|
|
||||||
|
toks.each do |t|
|
||||||
|
token.public_send("#{t}=", true)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
class UserCapabilityTest < CapabilityTest
|
||||||
|
test "user preferences" do
|
||||||
|
user = create(:user)
|
||||||
|
|
||||||
|
# a user with no tokens
|
||||||
|
capability = Capability.new create(:user), nil
|
||||||
|
[:read, :read_one, :update, :update_one, :delete_one].each do |act|
|
||||||
|
assert capability.can? act, UserPreference
|
||||||
|
end
|
||||||
|
|
||||||
|
# A user with empty tokens
|
||||||
|
capability = Capability.new create(:user), tokens
|
||||||
|
|
||||||
|
[:read, :read_one, :update, :update_one, :delete_one].each do |act|
|
||||||
|
assert capability.cannot? act, UserPreference
|
||||||
|
end
|
||||||
|
|
||||||
|
capability = Capability.new user, tokens(:allow_read_prefs)
|
||||||
|
|
||||||
|
[:update, :update_one, :delete_one].each do |act|
|
||||||
|
assert capability.cannot? act, UserPreference
|
||||||
|
end
|
||||||
|
|
||||||
|
[:read, :read_one].each do |act|
|
||||||
|
assert capability.can? act, UserPreference
|
||||||
|
end
|
||||||
|
|
||||||
|
capability = Capability.new user, tokens(:allow_write_prefs)
|
||||||
|
[:read, :read_one].each do |act|
|
||||||
|
assert capability.cannot? act, UserPreference
|
||||||
|
end
|
||||||
|
|
||||||
|
[:update, :update_one, :delete_one].each do |act|
|
||||||
|
assert capability.can? act, UserPreference
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
Loading…
Add table
Add a link
Reference in a new issue