Homec4science

Lock policy queries to their applications

Authored by epriestley <git@epriestley.com> on Oct 22 2013, 02:20.

Description

Lock policy queries to their applications

Summary:
While we mostly have reasonable effective object accessibility when you lock a user out of an application, it's primarily enforced at the controller level. Users can still, e.g., load the handles of objects they can't actually see. Instead, lock the queries to the applications so that you can, e.g., never load a revision if you don't have access to Differential.

This has several parts:

  • For PolicyAware queries, provide an application class name method.
  • If the query specifies a class name and the user doesn't have permission to use it, fail the entire query unconditionally.
  • For handles, simplify query construction and count all the PHIDs as "restricted" so we get a UI full of "restricted" instead of "unknown" handles.

Test Plan:

  • Added a unit test to verify I got all the class names right.
  • Browsed around, logged in/out as a normal user with public policies on and off.
  • Browsed around, logged in/out as a restricted user with public policies on and off. With restrictions, saw all traces of restricted apps removed or restricted.

Reviewers: btrahan

Reviewed By: btrahan

CC: aran

Differential Revision: https://secure.phabricator.com/D7367

Details

Committed
epriestley <git@epriestley.com>Oct 22 2013, 02:20
Pushed
aubortJan 31 2017, 17:16
Parents
rPH32dd8af9e5d5: Reduce surface area of DifferentialComment API
Branches
Unknown
Tags
Unknown

Event Timeline

epriestley <git@epriestley.com> committed rPH2a5c987c714d: Lock policy queries to their applications (authored by epriestley <git@epriestley.com>).Oct 22 2013, 02:20