kanbanworkflowstimelinescrumrubyroadmapproject-planningproject-managementopenprojectangularissue-trackerifcgantt-chartganttbug-trackerboardsbcf
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
516 lines
15 KiB
516 lines
15 KiB
#-- encoding: UTF-8
|
|
#-- copyright
|
|
# OpenProject is a project management system.
|
|
# Copyright (C) 2012-2015 the OpenProject Foundation (OPF)
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License version 3.
|
|
#
|
|
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
|
|
# Copyright (C) 2006-2013 Jean-Philippe Lang
|
|
# Copyright (C) 2010-2013 the ChiliProject Team
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
#
|
|
# See doc/COPYRIGHT.rdoc for more details.
|
|
#++
|
|
|
|
class PermittedParams
|
|
# This class intends to provide a method for all params hashes coming from the
|
|
# client and that are used for mass assignment.
|
|
#
|
|
# As such, please make it a deliberate decision to whitelist attributes.
|
|
#
|
|
# This implementation depends on the strong_parameters gem. For further
|
|
# information see here: https://github.com/rails/strong_parameters
|
|
#
|
|
#
|
|
# A method should look like the following:
|
|
#
|
|
# def name_of_the_params_key_referenced
|
|
# params.require(:name_of_the_params_key_referenced).permit(list_of_whitelisted_params)
|
|
# end
|
|
#
|
|
#
|
|
# A controller could use a permitted_params method like this
|
|
#
|
|
# model_instance.attributes = permitted_params.name_of_the_params_key_referenced
|
|
#
|
|
# instead of doing something like this which will not work anymore once the
|
|
# model is protected:
|
|
#
|
|
# model_instance.attributes = params[:name_of_the_params_key_referenced]
|
|
#
|
|
#
|
|
# A model will need the following module included in order to be protected by
|
|
# strong_params
|
|
#
|
|
# include ActiveModel::ForbiddenAttributesProtection
|
|
attr_reader :params, :current_user
|
|
|
|
def initialize(params, current_user)
|
|
@params = params
|
|
@current_user = current_user
|
|
end
|
|
|
|
def self.permit(key, *params)
|
|
raise(ArgumentError, "no permitted params are configured for #{key}") unless permitted_attributes.has_key?(key)
|
|
|
|
permitted_attributes[key].concat(params)
|
|
end
|
|
|
|
def auth_source
|
|
params.require(:auth_source).permit(*self.class.permitted_attributes[:auth_source])
|
|
end
|
|
|
|
def board
|
|
params.require(:board).permit(*self.class.permitted_attributes[:board])
|
|
end
|
|
|
|
def board?
|
|
params[:board] ? board : nil
|
|
end
|
|
|
|
def board_move
|
|
params.require(:board).permit(*self.class.permitted_attributes[:move_to])
|
|
end
|
|
|
|
def color
|
|
params.require(:color).permit(*self.class.permitted_attributes[:color])
|
|
end
|
|
|
|
def color_move
|
|
params.require(:color).permit(*self.class.permitted_attributes[:move_to])
|
|
end
|
|
|
|
def custom_field
|
|
params.require(:custom_field).permit(*self.class.permitted_attributes[:custom_field])
|
|
end
|
|
|
|
def custom_field_type
|
|
params.require(:type)
|
|
end
|
|
|
|
def enumeration_type
|
|
params.require(:type)
|
|
end
|
|
|
|
def enumeration
|
|
permitted_params = params.require(:enumeration).permit(*self.class.permitted_attributes[:enumeration])
|
|
|
|
permitted_params.merge!(custom_field_values(:enumeration))
|
|
|
|
permitted_params
|
|
end
|
|
|
|
def group
|
|
params.require(:group).permit(*self.class.permitted_attributes[:group])
|
|
end
|
|
|
|
def group_membership
|
|
params.permit(*self.class.permitted_attributes[:group_membership])
|
|
end
|
|
|
|
def new_work_package(args = {})
|
|
permitted = permitted_attributes(:new_work_package, args)
|
|
|
|
permitted_params = params.require(:work_package).permit(*permitted)
|
|
|
|
permitted_params.merge!(custom_field_values(:work_package))
|
|
|
|
permitted_params
|
|
end
|
|
|
|
def member
|
|
params.require(:member).permit(*self.class.permitted_attributes[:member])
|
|
end
|
|
|
|
def planning_element_type
|
|
params.require(:planning_element_type).permit(*self.class.permitted_attributes[:planning_element_type])
|
|
end
|
|
|
|
def planning_element_type_move
|
|
params.require(:planning_element_type).permit(*self.class.permitted_attributes[:move_to])
|
|
end
|
|
|
|
def planning_element(args = {})
|
|
permitted = permitted_attributes(:planning_element, args)
|
|
|
|
permitted_params = params.require(:planning_element).permit(*permitted)
|
|
|
|
permitted_params.merge!(custom_field_values(:planning_element))
|
|
|
|
permitted_params
|
|
end
|
|
|
|
def project_type
|
|
params.require(:project_type).permit(*self.class.permitted_attributes[:project_type])
|
|
end
|
|
|
|
def project_type_move
|
|
params.require(:project_type).permit(*self.class.permitted_attributes[:move_to])
|
|
end
|
|
|
|
def query
|
|
# there is a weird bug in strong_parameters gem which makes the permit call
|
|
# on the sort_criteria pattern return the sort_criteria-hash contents AND
|
|
# the sort_criteria hash itself (again with content) in the same hash.
|
|
# Here we try to circumvent this
|
|
p = params.require(:query).permit(*self.class.permitted_attributes[:query])
|
|
p[:sort_criteria] = params.require(:query).permit(sort_criteria: { '0' => [], '1' => [], '2' => [] })
|
|
p[:sort_criteria].delete :sort_criteria
|
|
p
|
|
end
|
|
|
|
def role
|
|
params.require(:role).permit(*self.class.permitted_attributes[:role])
|
|
end
|
|
|
|
def role?
|
|
params[:role] ? role : nil
|
|
end
|
|
|
|
def status
|
|
params.require(:status).permit(*self.class.permitted_attributes[:status])
|
|
end
|
|
|
|
alias :update_work_package :new_work_package
|
|
|
|
def user
|
|
permitted_params = params.require(:user).permit(*self.class.permitted_attributes[:user])
|
|
permitted_params.merge!(custom_field_values(:user))
|
|
|
|
permitted_params
|
|
end
|
|
|
|
def user_register_via_omniauth
|
|
permitted_params = params.require(:user) \
|
|
.permit(:login, :firstname, :lastname, :mail, :language)
|
|
permitted_params.merge!(custom_field_values(:user))
|
|
|
|
permitted_params
|
|
end
|
|
|
|
def user_update_as_admin(external_authentication, change_password_allowed)
|
|
# Found group_ids in safe_attributes and added them here as I
|
|
# didn't know the consequences of removing these.
|
|
# They were not allowed on create.
|
|
user_create_as_admin(external_authentication, change_password_allowed, [group_ids: []])
|
|
end
|
|
|
|
def user_create_as_admin(external_authentication, change_password_allowed, additional_params = [])
|
|
if current_user.admin?
|
|
additional_params << :auth_source_id unless external_authentication
|
|
additional_params << :force_password_change if change_password_allowed
|
|
|
|
allowed_params = self.class.permitted_attributes[:user] + \
|
|
additional_params + \
|
|
[:admin, :login]
|
|
|
|
permitted_params = params.require(:user).permit(*allowed_params)
|
|
permitted_params.merge!(custom_field_values(:user))
|
|
|
|
permitted_params
|
|
else
|
|
params.require(:user).permit
|
|
end
|
|
end
|
|
|
|
def type
|
|
params.require(:type).permit(*self.class.permitted_attributes[:type])
|
|
end
|
|
|
|
def type_move
|
|
params.require(:type).permit(*self.class.permitted_attributes[:move_to])
|
|
end
|
|
|
|
def work_package
|
|
params.require(:work_package).permit(:subject,
|
|
:description,
|
|
:start_date,
|
|
:due_date,
|
|
:note,
|
|
:planning_element_type_id,
|
|
:planning_element_status_comment,
|
|
:planning_element_status_id,
|
|
:parent_id,
|
|
:responsible_id,
|
|
:lock_version)
|
|
end
|
|
|
|
def wiki_page_rename
|
|
permitted = permitted_attributes(:wiki_page)
|
|
|
|
params.require(:page).permit(*permitted)
|
|
end
|
|
|
|
def wiki_page
|
|
permitted = permitted_attributes(:wiki_page)
|
|
|
|
permitted_params = params.require(:content).require(:page).permit(*permitted)
|
|
|
|
permitted_params
|
|
end
|
|
|
|
def wiki_content
|
|
params.require(:content).permit(*self.class.permitted_attributes[:wiki_content])
|
|
end
|
|
|
|
protected
|
|
|
|
def custom_field_values(key)
|
|
# a hash of arbitrary values is not supported by strong params
|
|
# thus we do it by hand
|
|
values = params.require(key)[:custom_field_values] || {}
|
|
|
|
# only permit values following the schema
|
|
# 'id as string' => 'value as string'
|
|
values.reject! do |k, v| k.to_i < 1 || !v.is_a?(String) end
|
|
|
|
values.empty? ?
|
|
{} :
|
|
{ 'custom_field_values' => values }
|
|
end
|
|
|
|
def permitted_attributes(key, additions = {})
|
|
merged_args = { params: params, current_user: current_user }.merge(additions)
|
|
|
|
self.class.permitted_attributes[key].map { |permission|
|
|
if permission.respond_to?(:call)
|
|
permission.call(merged_args)
|
|
else
|
|
permission
|
|
end
|
|
}.compact
|
|
end
|
|
|
|
def self.permitted_attributes
|
|
@whitelisted_params ||= {
|
|
auth_source: [
|
|
:name,
|
|
:host,
|
|
:port,
|
|
:tls,
|
|
:account,
|
|
:account_password,
|
|
:base_dn,
|
|
:onthefly_register,
|
|
:attr_login,
|
|
:attr_firstname,
|
|
:attr_lastname,
|
|
:attr_mail],
|
|
board: [
|
|
:name,
|
|
:description],
|
|
color: [
|
|
:name,
|
|
:hexcode,
|
|
:move_to],
|
|
custom_field: [
|
|
:editable,
|
|
:field_format,
|
|
:is_filter,
|
|
:is_for_all,
|
|
:is_required,
|
|
:max_length,
|
|
:min_length,
|
|
:move_to,
|
|
:name,
|
|
:possible_values,
|
|
:regexp,
|
|
:searchable,
|
|
:visible,
|
|
translations_attributes: [
|
|
:_destroy,
|
|
:default_value,
|
|
:id,
|
|
:locale,
|
|
:name,
|
|
:possible_values],
|
|
type_ids: []],
|
|
enumeration: [
|
|
:active,
|
|
:is_default,
|
|
:move_to,
|
|
:name,
|
|
:reassign_to_id],
|
|
group: [
|
|
:lastname],
|
|
group_membership: [
|
|
:membership_id,
|
|
membership: [
|
|
:project_id,
|
|
role_ids: []]],
|
|
member: [
|
|
role_ids: []],
|
|
new_work_package: [
|
|
# attributes common with :planning_element below
|
|
:assigned_to_id,
|
|
{ attachments: [:file, :description] },
|
|
:category_id,
|
|
:description,
|
|
:done_ratio,
|
|
:due_date,
|
|
:estimated_hours,
|
|
:fixed_version_id,
|
|
:parent_id,
|
|
:priority_id,
|
|
:responsible_id,
|
|
:start_date,
|
|
:status_id,
|
|
:type_id,
|
|
:subject,
|
|
Proc.new do |args|
|
|
# avoid costly allowed_to? if the param is not there at all
|
|
if args[:params]['work_package'] &&
|
|
args[:params]['work_package'].has_key?('watcher_user_ids') &&
|
|
args[:current_user].allowed_to?(:add_work_package_watchers, args[:project])
|
|
|
|
{ watcher_user_ids: [] }
|
|
end
|
|
end,
|
|
Proc.new do |args|
|
|
# avoid costly allowed_to? if the param is not there at all
|
|
if args[:params]['work_package'] &&
|
|
args[:params]['work_package'].has_key?('time_entry') &&
|
|
args[:current_user].allowed_to?(:log_time, args[:project])
|
|
|
|
{ time_entry: [:hours, :activity_id, :comments] }
|
|
end
|
|
end,
|
|
# attributes unique to :new_work_package
|
|
:journal_notes,
|
|
:lock_version],
|
|
planning_element: [
|
|
# attributes common with :new_work_package above
|
|
:assigned_to_id,
|
|
{ attachments: [:file, :description] },
|
|
:category_id,
|
|
:description,
|
|
:done_ratio,
|
|
:due_date,
|
|
:estimated_hours,
|
|
:fixed_version_id,
|
|
:parent_id,
|
|
:priority_id,
|
|
:responsible_id,
|
|
:start_date,
|
|
:status_id,
|
|
:type_id,
|
|
:subject,
|
|
Proc.new do |args|
|
|
# avoid costly allowed_to? if the param is not there at all
|
|
if args[:params]['planning_element'] &&
|
|
args[:params]['planning_element'].has_key?('watcher_user_ids') &&
|
|
args[:current_user].allowed_to?(:add_work_package_watchers, args[:project])
|
|
|
|
{ watcher_user_ids: [] }
|
|
end
|
|
end,
|
|
Proc.new do |args|
|
|
# avoid costly allowed_to? if the param is not there at all
|
|
if args[:params]['planning_element'] &&
|
|
args[:params]['planning_element'].has_key?('time_entry') &&
|
|
args[:current_user].allowed_to?(:log_time, args[:project])
|
|
|
|
{ time_entry: [:hours, :activity_id, :comments] }
|
|
end
|
|
end,
|
|
# attributes unique to planning_element
|
|
:note,
|
|
:planning_element_status_comment,
|
|
custom_fields: [ # json
|
|
:id,
|
|
:value,
|
|
custom_field: [ # xml
|
|
:id,
|
|
:value]]],
|
|
planning_element_type: [
|
|
:name,
|
|
:in_aggregation,
|
|
:is_milestone,
|
|
:is_default,
|
|
:color_id],
|
|
project_type: [
|
|
:name,
|
|
:allows_association,
|
|
type_ids: [],
|
|
reported_project_status_ids: []],
|
|
query: [
|
|
:name,
|
|
:display_sums,
|
|
:is_public,
|
|
:group_by],
|
|
role: [
|
|
:name,
|
|
:assignable,
|
|
:move_to,
|
|
permissions: []],
|
|
status: [
|
|
:name,
|
|
:default_done_ratio,
|
|
:is_closed,
|
|
:is_default,
|
|
:move_to],
|
|
type: [
|
|
:name,
|
|
:is_in_roadmap,
|
|
:in_aggregation,
|
|
:is_milestone,
|
|
:is_default,
|
|
:color_id,
|
|
project_ids: [],
|
|
custom_field_ids: []],
|
|
user: [
|
|
:firstname,
|
|
:lastname,
|
|
:mail,
|
|
:mail_notification,
|
|
:language,
|
|
:custom_fields],
|
|
wiki_page: [
|
|
:title,
|
|
:parent_id,
|
|
:redirect_existing_links],
|
|
wiki_content: [
|
|
:comments,
|
|
:text,
|
|
:lock_version],
|
|
move_to: [:move_to]
|
|
}
|
|
end
|
|
|
|
private
|
|
|
|
## Add attributes as permitted attributes (only to be used by the plugins plugin)
|
|
#
|
|
# attributes should be given as a Hash in the form
|
|
# {:key => [:param1, :param2]}
|
|
def self.add_permitted_attributes(attributes)
|
|
# Make sure the permitted attributes are cached in @whitelisted_params
|
|
permitted_attributes
|
|
|
|
# Check no unsupported parameters are attempted to be whitelisted (they're ignored)
|
|
unknown_keys = (attributes.keys - @whitelisted_params.keys)
|
|
if unknown_keys.size > 0
|
|
Rails.logger.warn(
|
|
"Attempt to whitelist attributes for unknown keys: #{unknown_keys}, ignoring them.")
|
|
end
|
|
|
|
attributes.each_pair do |key, attrs|
|
|
@whitelisted_params[key] += attrs unless unknown_keys.include?(key)
|
|
end
|
|
end
|
|
end
|
|
|