Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
M
Metabase
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Iterations
Wiki
Requirements
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Test cases
Artifacts
Deploy
Releases
Package registry
Container registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Engineering Digital Service
Metabase
Commits
2ca53087
Commit
2ca53087
authored
8 years ago
by
Cam Saül
Browse files
Options
Downloads
Patches
Plain Diff
Add tests for POST /api/card/:id/query/csv
parent
ce3f6c7c
Branches
Branches containing commit
Tags
Tags containing commit
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
src/metabase/models/permissions.clj
+1
-0
1 addition, 0 deletions
src/metabase/models/permissions.clj
test/metabase/api/card_test.clj
+39
-7
39 additions, 7 deletions
test/metabase/api/card_test.clj
with
40 additions
and
7 deletions
src/metabase/models/permissions.clj
+
1
−
0
View file @
2ca53087
...
...
@@ -292,6 +292,7 @@
;;; ---------------------------------------- Helper Fns ----------------------------------------
;; TODO - why does this take a PATH when everything else takes PATH-COMPONENTS or IDs?
(
defn
delete-related-permissions!
"Delete all permissions for GROUP-OR-ID for ancestors or descendant objects of object with PATH.
You can optionally include OTHER-CONDITIONS, which are anded into the filter clause, to further restrict what is deleted."
...
...
This diff is collapsed.
Click to expand it.
test/metabase/api/card_test.clj
+
39
−
7
View file @
2ca53087
...
...
@@ -33,7 +33,7 @@
Card
[{
card-2-id
:id
}
{
:database_id
db-id
}]]
(
let
[
card-returned?
(
fn
[
database-id
card-id
]
(
contains?
(
set
(
for
[
card
((
user->client
:rasta
)
:get
200
"card"
,
:f
:database,
:model_id
database-id
)]
(
:
id
card
)))
(
u/get-
id
card
)))
card-id
))]
[(
card-returned?
(
id
)
card-1-id
)
(
card-returned?
db-id
card-1-id
)
...
...
@@ -60,7 +60,7 @@
Card
[{
card-2-id
:id
}
{
:table_id
table-2-id
}]]
(
let
[
card-returned?
(
fn
[
table-id
card-id
]
(
contains?
(
set
(
for
[
card
((
user->client
:rasta
)
:get
200
"card"
,
:f
:table,
:model_id
table-id
)]
(
:
id
card
)))
(
u/get-
id
card
)))
card-id
))]
[(
card-returned?
table-1-id
card-1-id
)
(
card-returned?
table-2-id
card-1-id
)
...
...
@@ -188,7 +188,7 @@
:query_type
"query"
:archived
false
:labels
[]})
((
user->client
:rasta
)
:get
200
(
str
"card/"
(
:
id
card
))))
((
user->client
:rasta
)
:get
200
(
str
"card/"
(
u/get-
id
card
))))
;; Check that a user without permissions isn't allowed to fetch the card
(
expect-with-temp
[
Database
[{
database-id
:id
}]
...
...
@@ -201,7 +201,7 @@
;; revoke permissions for default group to this database
(
perms/delete-related-permissions!
(
perms-group/all-users
)
(
perms/object-path
database-id
))
;; now a non-admin user shouldn't be able to fetch this card
((
user->client
:rasta
)
:get
403
(
str
"card/"
(
:
id
card
)))))
((
user->client
:rasta
)
:get
403
(
str
"card/"
(
u/get-
id
card
)))))
;; ## PUT /api/card/:id
...
...
@@ -252,13 +252,13 @@
;; Helper Functions
(
defn-
fave?
[
card
]
((
user->client
:rasta
)
:get
200
(
format
"card/%d/favorite"
(
:
id
card
))))
((
user->client
:rasta
)
:get
200
(
format
"card/%d/favorite"
(
u/get-
id
card
))))
(
defn-
fave!
[
card
]
((
user->client
:rasta
)
:post
200
(
format
"card/%d/favorite"
(
:
id
card
))))
((
user->client
:rasta
)
:post
200
(
format
"card/%d/favorite"
(
u/get-
id
card
))))
(
defn-
unfave!
[
card
]
((
user->client
:rasta
)
:delete
204
(
format
"card/%d/favorite"
(
:
id
card
))))
((
user->client
:rasta
)
:delete
204
(
format
"card/%d/favorite"
(
u/get-
id
card
))))
;; ## GET /api/card/:id/favorite
;; Can we see if a Card is a favorite ?
...
...
@@ -308,3 +308,35 @@
[(
get-labels
)
; (1)
(
update-labels
[
label-1-id
label-2-id
])
; (2)
(
update-labels
[])]))
; (3)
;;; POST /api/:card-id/query/csv
(
defn-
do-with-temp-native-card
{
:style/indent
0
}
[
f
]
(
with-temp*
[
Database
[{
database-id
:id
}
{
:details
(
:details
(
Database
(
id
)))
,
:engine
:h2
}]
Table
[{
table-id
:id
}
{
:db_id
database-id,
:name
"CATEGORIES"
}]
Card
[
card
{
:dataset_query
{
:database
database-id
:type
:native
:native
{
:query
"SELECT COUNT(*) FROM CATEGORIES;"
}
:query
{
:source-table
table-id,
:aggregation
{
:aggregation-type
:count
}}}}]]
;; delete all permissions for this DB
(
perms/delete-related-permissions!
(
perms-group/all-users
)
(
perms/object-path
database-id
))
(
f
database-id
card
)))
;; can someone with native query *read* permissions see a CSV card? (Issue #3648)
(
expect
(
str
"COUNT(*)\n"
"75\n"
)
(
do-with-temp-native-card
(
fn
[
database-id
card
]
;; insert new permissions for native read access
(
perms/grant-native-read-permissions!
(
perms-group/all-users
)
database-id
)
;; now run the query
((
user->client
:rasta
)
:post
200
(
format
"card/%d/query/csv"
(
u/get-id
card
))))))
;; does someone without *read* permissions get DENIED?
(
expect
"You don't have permissions to do that."
(
do-with-temp-native-card
(
fn
[
database-id
card
]
((
user->client
:rasta
)
:post
403
(
format
"card/%d/query/csv"
(
u/get-id
card
))))))
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment