Skip to content
Snippets Groups Projects
Commit 049b34ed authored by Allen Gilliland's avatar Allen Gilliland
Browse files

create a new api endpoint for /session/properties for accessing publicly...

create a new api endpoint for /session/properties for accessing publicly accessible app properties instead of trying to get them via /settings which has the problem of not being available to non-authentic users.  this fixes https://app.asana.com/0/37641057717421/37653988022906
parent 4c0fd545
No related branches found
No related tags found
No related merge requests found
......@@ -73,7 +73,7 @@ CorvusServices.factory('AppState', ['$rootScope', '$q', '$location', '$timeout',
refreshSiteSettings: function() {
var settingsRefresh = Settings.list(function(result) {
var settingsRefresh = Session.properties(function(result) {
var settings = _.indexBy(result, 'key');
......@@ -782,23 +782,18 @@ CoreServices.factory('Session', ['$resource', '$cookies', function($resource, $c
delete: {
method: 'DELETE'
},
properties: {
url: '/api/session/properties',
method: 'GET',
isArray: true
},
forgot_password: {
url: '/api/session/forgot_password',
method: 'POST',
headers: {
'X-CSRFToken': function() {
return $cookies.csrftoken;
}
}
method: 'POST'
},
reset_password: {
url: '/api/session/reset_password',
method: 'POST',
headers: {
'X-CSRFToken': function() {
return $cookies.csrftoken;
}
}
method: 'POST'
}
});
}]);
......@@ -854,7 +849,7 @@ CoreServices.factory('Settings', ['$resource', function($resource) {
list: {
url: '/api/setting',
method: 'GET',
isArray: true
isArray: true,
},
// POST endpoint handles create + update in this case
......
(ns metabase.api.session
"/api/session endpoints"
(:require [clojure.tools.logging :as log]
[compojure.core :refer [defroutes POST DELETE]]
[compojure.core :refer [defroutes GET POST DELETE]]
[hiccup.core :refer [html]]
[korma.core :as korma]
[metabase.api.common :refer :all]
[metabase.db :refer :all]
[metabase.email.messages :as email]
(metabase.models [user :refer [User set-user-password]]
[session :refer [Session]])
[session :refer [Session]]
[setting :as setting])
[metabase.util.password :as pass]))
......@@ -71,4 +72,11 @@
(set-user-password (:id user) password)
{:success true}))
(defendpoint GET "/properties"
"Get all global properties and their values. These are the specific `Settings` which are meant to be public."
[]
(filter #(= (:key %) :site-name) (setting/all-with-descriptions)))
(define-routes)
......@@ -7,10 +7,8 @@
(defendpoint GET "/"
"Get all `Settings` and their values. Superusers get all settings, normal users get public settings only."
[]
(if (:is_superuser @*current-user*)
(setting/all-with-descriptions)
;; TODO - we could make this a little more dynamic
(filter #(= (:key %) :site-name) (setting/all-with-descriptions))))
(check-superuser)
(setting/all-with-descriptions))
(defendpoint GET "/:key"
"Fetch a single `Setting`. You must be a superuser to do this."
......
......@@ -112,3 +112,13 @@
(upd User (user->id :rasta) :reset_token token :reset_triggered 0)
(client :post 400 "session/reset_password" {:token token
:password "whateverUP12!!"})))
;; GET /session/properties
;; Check that a non-superuser can't read settings
(expect
[{:value nil
:key "site-name"
:description "The name used for this instance of Metabase."
:default "Metabase"}]
((user->client :rasta) :get 200 "session/properties"))
......@@ -26,13 +26,9 @@
(do (set-settings nil "FANCY")
(fetch-all-settings)))
;; Check that a non-superuser can't read settings
(expect
[{:value nil
:key "site-name"
:description "The name used for this instance of Metabase."
:default "Metabase"}]
((user->client :rasta) :get 200 "setting"))
;; Check that non-superusers are denied access
(expect "You don't have permissions to do that."
((user->client :rasta) :get 403 "setting"))
;; ## GET /api/setting/:key
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment