mirror of
https://github.com/mealie-recipes/mealie.git
synced 2025-08-05 05:25:26 +02:00
fix: allow admin users to delete other household recipes (#5767)
Co-authored-by: Michael Genson <71845777+michael-genson@users.noreply.github.com>
This commit is contained in:
parent
bd0aed06ce
commit
5f522b5324
6 changed files with 128 additions and 12 deletions
|
@ -12,7 +12,12 @@
|
||||||
@confirm="deleteRecipe()"
|
@confirm="deleteRecipe()"
|
||||||
>
|
>
|
||||||
<v-card-text>
|
<v-card-text>
|
||||||
{{ $t("recipe.delete-confirmation") }}
|
<template v-if="isAdminAndNotOwner">
|
||||||
|
{{ $t("recipe.admin-delete-confirmation") }}
|
||||||
|
</template>
|
||||||
|
<template v-else>
|
||||||
|
{{ $t("recipe.delete-confirmation") }}
|
||||||
|
</template>
|
||||||
</v-card-text>
|
</v-card-text>
|
||||||
</BaseDialog>
|
</BaseDialog>
|
||||||
<BaseDialog
|
<BaseDialog
|
||||||
|
@ -359,16 +364,6 @@ export default defineNuxtComponent({
|
||||||
},
|
},
|
||||||
};
|
};
|
||||||
|
|
||||||
// Get Default Menu Items Specified in Props
|
|
||||||
for (const [key, value] of Object.entries(props.useItems)) {
|
|
||||||
if (value) {
|
|
||||||
const item = defaultItems[key];
|
|
||||||
if (item && (item.isPublic || isOwnGroup.value)) {
|
|
||||||
state.menuItems.push(item);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Add leading and Appending Items
|
// Add leading and Appending Items
|
||||||
state.menuItems = [...state.menuItems, ...props.leadingItems, ...props.appendItems];
|
state.menuItems = [...state.menuItems, ...props.leadingItems, ...props.appendItems];
|
||||||
|
|
||||||
|
@ -382,6 +377,30 @@ export default defineNuxtComponent({
|
||||||
const recipeRefWithScale = computed(() =>
|
const recipeRefWithScale = computed(() =>
|
||||||
recipeRef.value ? { scale: props.recipeScale, ...recipeRef.value } : undefined,
|
recipeRef.value ? { scale: props.recipeScale, ...recipeRef.value } : undefined,
|
||||||
);
|
);
|
||||||
|
const isAdminAndNotOwner = computed(() => {
|
||||||
|
return (
|
||||||
|
$auth.user.value?.admin
|
||||||
|
&& $auth.user.value?.id !== recipeRef.value?.userId
|
||||||
|
);
|
||||||
|
});
|
||||||
|
const canDelete = computed(() => {
|
||||||
|
const user = $auth.user.value;
|
||||||
|
const recipe = recipeRef.value;
|
||||||
|
return user && recipe && (user.admin || user.id === recipe.userId);
|
||||||
|
});
|
||||||
|
|
||||||
|
// Get Default Menu Items Specified in Props
|
||||||
|
for (const [key, value] of Object.entries(props.useItems)) {
|
||||||
|
if (!value) continue;
|
||||||
|
|
||||||
|
// Skip delete if not allowed
|
||||||
|
if (key === "delete" && !canDelete.value) continue;
|
||||||
|
|
||||||
|
const item = defaultItems[key];
|
||||||
|
if (item && (item.isPublic || isOwnGroup.value)) {
|
||||||
|
state.menuItems.push(item);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
async function getShoppingLists() {
|
async function getShoppingLists() {
|
||||||
const { data } = await api.shopping.lists.getAll(1, -1, { orderBy: "name", orderDirection: "asc" });
|
const { data } = await api.shopping.lists.getAll(1, -1, { orderBy: "name", orderDirection: "asc" });
|
||||||
|
@ -521,6 +540,8 @@ export default defineNuxtComponent({
|
||||||
icon,
|
icon,
|
||||||
planTypeOptions,
|
planTypeOptions,
|
||||||
firstDayOfWeek,
|
firstDayOfWeek,
|
||||||
|
isAdminAndNotOwner,
|
||||||
|
canDelete,
|
||||||
};
|
};
|
||||||
},
|
},
|
||||||
});
|
});
|
||||||
|
|
|
@ -472,6 +472,7 @@
|
||||||
"comment": "Comment",
|
"comment": "Comment",
|
||||||
"comments": "Comments",
|
"comments": "Comments",
|
||||||
"delete-confirmation": "Are you sure you want to delete this recipe?",
|
"delete-confirmation": "Are you sure you want to delete this recipe?",
|
||||||
|
"admin-delete-confirmation": "You're about to delete a recipe that isn't yours using admin permissions. Are you sure?",
|
||||||
"delete-recipe": "Delete Recipe",
|
"delete-recipe": "Delete Recipe",
|
||||||
"description": "Description",
|
"description": "Description",
|
||||||
"disable-amount": "Disable Ingredient Amounts",
|
"disable-amount": "Disable Ingredient Amounts",
|
||||||
|
|
|
@ -64,6 +64,12 @@ class RecipeService(RecipeServiceBase):
|
||||||
raise exceptions.NoEntryFound("Recipe not found.")
|
raise exceptions.NoEntryFound("Recipe not found.")
|
||||||
return recipe
|
return recipe
|
||||||
|
|
||||||
|
def can_delete(self, recipe: Recipe) -> bool:
|
||||||
|
if self.user.admin:
|
||||||
|
return True
|
||||||
|
else:
|
||||||
|
return self.can_update(recipe)
|
||||||
|
|
||||||
def can_update(self, recipe: Recipe) -> bool:
|
def can_update(self, recipe: Recipe) -> bool:
|
||||||
if recipe.settings is None:
|
if recipe.settings is None:
|
||||||
raise exceptions.UnexpectedNone("Recipe Settings is None")
|
raise exceptions.UnexpectedNone("Recipe Settings is None")
|
||||||
|
@ -423,7 +429,7 @@ class RecipeService(RecipeServiceBase):
|
||||||
def delete_one(self, slug_or_id: str | UUID) -> Recipe:
|
def delete_one(self, slug_or_id: str | UUID) -> Recipe:
|
||||||
recipe = self.get_one(slug_or_id)
|
recipe = self.get_one(slug_or_id)
|
||||||
|
|
||||||
if not self.can_update(recipe):
|
if not self.can_delete(recipe):
|
||||||
raise exceptions.PermissionDenied("You do not have permission to delete this recipe.")
|
raise exceptions.PermissionDenied("You do not have permission to delete this recipe.")
|
||||||
|
|
||||||
data = self.group_recipes.delete(recipe.id, "id")
|
data = self.group_recipes.delete(recipe.id, "id")
|
||||||
|
|
7
tests/fixtures/fixture_users.py
vendored
7
tests/fixtures/fixture_users.py
vendored
|
@ -226,6 +226,13 @@ def unique_user(session: Session, api_client: TestClient):
|
||||||
yield from _unique_user(session, api_client)
|
yield from _unique_user(session, api_client)
|
||||||
|
|
||||||
|
|
||||||
|
@fixture(scope="module")
|
||||||
|
def unique_admin(session: Session, api_client: TestClient, unique_user: utils.TestUser):
|
||||||
|
admin_user = next(_unique_user(session, api_client))
|
||||||
|
admin_user.repos.users.patch(admin_user.user_id, {"admin": True, "group_id": unique_user.group_id})
|
||||||
|
yield admin_user
|
||||||
|
|
||||||
|
|
||||||
@fixture(scope="module")
|
@fixture(scope="module")
|
||||||
def user_tuple(session: Session, admin_token, api_client: TestClient) -> Generator[list[utils.TestUser], None, None]:
|
def user_tuple(session: Session, admin_token, api_client: TestClient) -> Generator[list[utils.TestUser], None, None]:
|
||||||
group_name = utils.random_string()
|
group_name = utils.random_string()
|
||||||
|
|
|
@ -215,6 +215,42 @@ def test_delete_recipes_from_other_households(
|
||||||
assert response.status_code == 404
|
assert response.status_code == 404
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.parametrize("is_private_household", [True, False])
|
||||||
|
@pytest.mark.parametrize("household_lock_recipe_edits", [True, False])
|
||||||
|
def test_admin_delete_recipes_from_other_households(
|
||||||
|
api_client: TestClient,
|
||||||
|
unique_admin: TestUser,
|
||||||
|
h2_user: TestUser,
|
||||||
|
is_private_household: bool,
|
||||||
|
household_lock_recipe_edits: bool,
|
||||||
|
):
|
||||||
|
household = h2_user.repos.households.get_one(h2_user.household_id)
|
||||||
|
assert household and household.preferences
|
||||||
|
household.preferences.private_household = is_private_household
|
||||||
|
household.preferences.lock_recipe_edits_from_other_households = household_lock_recipe_edits
|
||||||
|
h2_user.repos.household_preferences.update(household.id, household.preferences)
|
||||||
|
|
||||||
|
response = api_client.post(api_routes.recipes, json={"name": random_string()}, headers=h2_user.token)
|
||||||
|
assert response.status_code == 201
|
||||||
|
h2_recipe = h2_user.repos.recipes.get_one(response.json())
|
||||||
|
assert h2_recipe and h2_recipe.id
|
||||||
|
h2_recipe_id = str(h2_recipe.id)
|
||||||
|
|
||||||
|
response = api_client.get(api_routes.recipes_slug(h2_recipe_id), headers=unique_admin.token)
|
||||||
|
assert response.status_code == 200
|
||||||
|
recipe_json = response.json()
|
||||||
|
assert recipe_json["id"] == h2_recipe_id
|
||||||
|
|
||||||
|
# Admin users should always be able to delete recipes from other households
|
||||||
|
# regardless of household_lock_recipe_edits setting
|
||||||
|
response = api_client.delete(api_routes.recipes_slug(recipe_json["slug"]), headers=unique_admin.token)
|
||||||
|
assert response.status_code == 200
|
||||||
|
|
||||||
|
# confirm the recipe was deleted
|
||||||
|
response = api_client.get(api_routes.recipes_slug(h2_recipe_id), headers=unique_admin.token)
|
||||||
|
assert response.status_code == 404
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("is_private_household", [True, False])
|
@pytest.mark.parametrize("is_private_household", [True, False])
|
||||||
@pytest.mark.parametrize("household_lock_recipe_edits", [True, False])
|
@pytest.mark.parametrize("household_lock_recipe_edits", [True, False])
|
||||||
def test_user_can_update_last_made_on_other_household(
|
def test_user_can_update_last_made_on_other_household(
|
||||||
|
|
|
@ -1,7 +1,11 @@
|
||||||
from datetime import UTC, datetime
|
from datetime import UTC, datetime
|
||||||
|
from uuid import UUID
|
||||||
|
|
||||||
from fastapi.testclient import TestClient
|
from fastapi.testclient import TestClient
|
||||||
|
|
||||||
|
from mealie.repos.repository_factory import AllRepositories
|
||||||
|
from mealie.schema.recipe.recipe import Recipe
|
||||||
|
from mealie.schema.recipe.recipe_settings import RecipeSettings
|
||||||
from tests.utils import api_routes
|
from tests.utils import api_routes
|
||||||
from tests.utils.factories import random_string
|
from tests.utils.factories import random_string
|
||||||
from tests.utils.fixture_schemas import TestUser
|
from tests.utils.fixture_schemas import TestUser
|
||||||
|
@ -135,3 +139,44 @@ def test_other_user_cant_lock_recipe(api_client: TestClient, user_tuple: list[Te
|
||||||
recipe["settings"]["locked"] = True
|
recipe["settings"]["locked"] = True
|
||||||
response = api_client.put(api_routes.recipes + f"/{recipe_name}", json=recipe, headers=usr_2.token)
|
response = api_client.put(api_routes.recipes + f"/{recipe_name}", json=recipe, headers=usr_2.token)
|
||||||
assert response.status_code == 403
|
assert response.status_code == 403
|
||||||
|
|
||||||
|
|
||||||
|
def test_other_user_cant_delete_recipe(api_client: TestClient, user_tuple: list[TestUser]):
|
||||||
|
slug = random_string(10)
|
||||||
|
unique_user, other_user = user_tuple
|
||||||
|
|
||||||
|
unique_user.repos.recipes.create(
|
||||||
|
Recipe(
|
||||||
|
user_id=unique_user.user_id,
|
||||||
|
group_id=unique_user.group_id,
|
||||||
|
name=slug,
|
||||||
|
settings=RecipeSettings(locked=True),
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
response = api_client.delete(api_routes.recipes_slug(slug), headers=other_user.token)
|
||||||
|
assert response.status_code == 403
|
||||||
|
|
||||||
|
|
||||||
|
def test_admin_can_delete_locked_recipe_owned_by_another_user(
|
||||||
|
api_client: TestClient, unfiltered_database: AllRepositories, unique_user: TestUser, admin_user: TestUser
|
||||||
|
):
|
||||||
|
slug = random_string(10)
|
||||||
|
unique_user.repos.recipes.create(
|
||||||
|
Recipe(
|
||||||
|
user_id=unique_user.user_id,
|
||||||
|
group_id=unique_user.group_id,
|
||||||
|
name=slug,
|
||||||
|
settings=RecipeSettings(locked=True),
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
# Make sure admin belongs to same group/household as user
|
||||||
|
admin_data = unfiltered_database.users.get_one(admin_user.user_id)
|
||||||
|
assert admin_data
|
||||||
|
admin_data.group_id = UUID(unique_user.group_id)
|
||||||
|
admin_data.household_id = UUID(unique_user.household_id)
|
||||||
|
unfiltered_database.users.update(admin_user.user_id, admin_data)
|
||||||
|
|
||||||
|
response = api_client.delete(api_routes.recipes_slug(slug), headers=admin_user.token)
|
||||||
|
assert response.status_code == 200
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue