Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions api/src/org/labkey/api/audit/query/DefaultAuditTypeTable.java
Original file line number Diff line number Diff line change
Expand Up @@ -119,6 +119,11 @@ protected void initColumns()
@Override
protected SimpleFilter.FilterClause getContainerFilterClause(ContainerFilter filter, FieldKey fieldKey)
{
// TODO: Setting a contextual role on the container filter clause should not be necessary; the user passed
// (separately) to the ContainerFilter should have the appropriate permission. However, some app actions
// (GetTransactionRowIdsAction, maybe GetLocationHistoryAction, etc.) have been relying on this behavior. Clean
// this up soon, but not for 26.3. Note that this is the only code path that passes contextual roles into
// createFilterClause(), so we could eliminate that option during clean up.
User user = (null == getUserSchema()) ? null : getUserSchema().getUser();
Set<Role> roles = SecurityManager.canSeeAuditLog(user) ? RoleManager.roleSet(CanSeeAuditLogRole.class) : null;
return filter.createFilterClause(getSchema(), fieldKey, CanSeeAuditLogPermission.class, roles);
Expand Down
4 changes: 2 additions & 2 deletions api/src/org/labkey/api/data/ContainerFilter.java
Original file line number Diff line number Diff line change
Expand Up @@ -169,9 +169,9 @@ public SimpleFilter.FilterClause createFilterClause(DbSchema schema, FieldKey co
}

/** Create a FilterClause that restricts based on the containers that meet the filter and user that meets the permission*/
public SimpleFilter.FilterClause createFilterClause(DbSchema schema, FieldKey containerFilterColumn, Class<? extends Permission> permission, Set<Role> roles)
public SimpleFilter.FilterClause createFilterClause(DbSchema schema, FieldKey containerFilterColumn, Class<? extends Permission> permission, Set<Role> contextualRoles)
{
return new ContainerClause(schema, containerFilterColumn, this, permission, roles);
return new ContainerClause(schema, containerFilterColumn, this, permission, contextualRoles);
}


Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
package org.labkey.api.security.roles;

import org.labkey.api.audit.permissions.CanSeeAuditLogPermission;

/**
* See {@link CanSeeAuditLogRole} for the site role version
*/
public class CanSeeAuditLogFolderRole extends AbstractRole
{
protected CanSeeAuditLogFolderRole()
{
super("See Audit Log Events", "Allows non-administrators to view audit log events. " + CanSeeAuditLogRole.FINAL_WARNING_LINE,
CanSeeAuditLogPermission.class
);
}
}
11 changes: 10 additions & 1 deletion api/src/org/labkey/api/security/roles/CanSeeAuditLogRole.java
Original file line number Diff line number Diff line change
Expand Up @@ -18,11 +18,20 @@
import org.labkey.api.audit.permissions.CanSeeAuditLogPermission;
import org.labkey.api.security.permissions.SeeUserDetailsPermission;

/**
* See {@link CanSeeAuditLogFolderRole}, the project/folder version of this role
*/
public class CanSeeAuditLogRole extends AbstractRootContainerRole
{
static final String FINAL_WARNING_LINE = "This role should be used with caution since the audit log may " +
"contain sensitive or protected information. For example, dataset or list imports where detailed logging " +
"was turned on.";

public CanSeeAuditLogRole()
{
super("See Audit Log Events", "Allows non-administrators to view audit log events",
super("See Audit Log Events", "Allows non-administrators to view audit log events in the " +
"root, every project, and every folder on this site. This level of visibility is not generally recommended. " +
"For more granular control, assign this role at the folder level instead. " + FINAL_WARNING_LINE,
CanSeeAuditLogPermission.class,
SeeUserDetailsPermission.class
);
Expand Down
1 change: 1 addition & 0 deletions api/src/org/labkey/api/security/roles/RoleManager.java
Original file line number Diff line number Diff line change
Expand Up @@ -134,6 +134,7 @@ private int getPermLevel(Role r)
registerRole(new SubmitterRole());
registerRole(new NoPermissionsRole());
registerRole(new OwnerRole());
registerRole(new CanSeeAuditLogFolderRole());
}

public static void addAdminRoleListener(AdminRoleListener listener)
Expand Down
7 changes: 4 additions & 3 deletions audit/src/org/labkey/audit/AuditController.java
Original file line number Diff line number Diff line change
Expand Up @@ -383,11 +383,12 @@ public void validateForm(AuditTransactionForm form, Errors errors)
public Object execute(AuditTransactionForm form, BindException errors)
{
List<Long> rowIds;
ContainerFilter cf = ContainerFilter.getContainerFilterByName(form.getContainerFilter(), getContainer(), getUser());
User elevatedUser = ElevatedUser.ensureCanSeeAuditLogRole(getContainer(), getUser());
ContainerFilter cf = ContainerFilter.getContainerFilterByName(form.getContainerFilter(), getContainer(), elevatedUser);
if (form.isSampleType())
rowIds = AuditLogImpl.get().getTransactionSampleIds(form.getTransactionAuditId(), ElevatedUser.ensureCanSeeAuditLogRole(getContainer(), getUser()), getContainer(), cf);
rowIds = AuditLogImpl.get().getTransactionSampleIds(form.getTransactionAuditId(), elevatedUser, getContainer(), cf);
else
rowIds = AuditLogImpl.get().getTransactionSourceIds(form.getTransactionAuditId(), ElevatedUser.ensureCanSeeAuditLogRole(getContainer(), getUser()), getContainer(), cf);
rowIds = AuditLogImpl.get().getTransactionSourceIds(form.getTransactionAuditId(), elevatedUser, getContainer(), cf);

ApiSimpleResponse response = new ApiSimpleResponse();
response.put("success", true);
Expand Down