Weird check for reserved IPs in mreg/api/permissions.py.
terjekv opened this issue · 2 comments
In mreg/api/permissions.py we have the following construct:
def has_destroy_permission(self, request, view, validated_serializer):
import mreg.api.v1.views
if user_is_superuser(request.user):
return True
obj = view.get_object()
if isinstance(view, mreg.api.v1.views.HostDetail):
pass
elif hasattr(obj, 'host'):
obj = obj.host
else:
raise exceptions.PermissionDenied(f"Unhandled view: {view}")
if _deny_superuser_only_names(name=obj.name, view=view, request=request):
return False
if hasattr(obj, 'ipaddress'):
if _deny_reserved_ipaddress(obj.ipaddress, request):
return False
if user_is_adminuser(request.user):
return True
return self.has_obj_perm(request.user, obj)
Note particularly the branch if hasattr(obj, 'ipaddress'). This is weird. First off, we check if the view is HostDetail (thus, obj
is a Host), and if not we set the object to be obj.host
. Ie, obj
will always be a Host. But, Hosts do not have an ipaddress field. What they do have is a related_name, ip_addresses
from the Ipaddress model: https://github.com/unioslo/mreg/blob/master/mreg/models.py#L398
This leads me to wonder what the logic is supposed to be here. Are we supposed to deny deletion of the object if the host is using any addresses that are reserved? If so, we want:
if hasattr(obj, 'ipaddresses'):
for ip in obj.ipaddresses:
if _deny_reserved_ipaddress(ip.ipaddress, request):
return False
And we could then test this as such in api/v1/tests/tests_permission.py
in the class class NetGroupRegexPermissionTestCaseAsAdmin(NetGroupRegexPermissionTestCase)
. Testing in TestIsGrantedNetGroupRegexPermission
will give us a 204 due to the overall access given to superusers in the has_destroy_permission
itself.
# Superusers get to zap hosts, so this is for admins and down only.
def test_403_from_reserved_ip(self):
network = Network.objects.create(network='172.16.0.0/30', reserved=3, description='Tiny network')
host = Host.objects.create(name='testhost')
ip_address = Ipaddress.objects.create(ipaddress='172.16.0.1', host=host)
self.assertTrue(is_reserved_ip(ip_address.ipaddress))
self.assert_get(f'/hosts/{host.name}')
self.assert_delete_and_403(f'/hosts/{host.name}')
network.delete()
host.delete()
ip_address.delete()
Can someone explain this to me? :)
git blame
shows a lot of different commits contributing to this code. I suspect each addition might not have taken into consideration the purpose of the whole thing.
We can only guess, but I think you're right: I think the code was supposed to deny deletion of the object if the host is using any addresses that are reserved (except to members of the NETWORK_ADMIN_GROUP, see _deny_reserved_ipaddress
).
I would write the test first, verify that it fails, and then modify the code until all tests pass.
Can someone explain this to me? :)
The API permissions works on serialized objects, not pure model objects. As HostSerializer is a quite fat one, the ipaddresses are available.
mreg/mreg/api/v1/serializers.py
Line 193 in 8952b79