Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Next Next commit
feat: remove user from groups on org membership delete
Groups inherently provide authz access to certain resources. If a
user is removed from an organization, they should be removed
from all their groups in said organization.
  • Loading branch information
Emyrk committed Sep 18, 2024
commit e63fb182429d8538e1647d30c08c511087e7f656
12 changes: 11 additions & 1 deletion coderd/database/dbmem/dbmem.go
Original file line number Diff line number Diff line change
Expand Up @@ -1944,7 +1944,7 @@ func (q *FakeQuerier) DeleteOrganization(_ context.Context, id uuid.UUID) error
return sql.ErrNoRows
}

func (q *FakeQuerier) DeleteOrganizationMember(_ context.Context, arg database.DeleteOrganizationMemberParams) error {
func (q *FakeQuerier) DeleteOrganizationMember(ctx context.Context, arg database.DeleteOrganizationMemberParams) error {
err := validateDatabaseType(arg)
if err != nil {
return err
Expand All @@ -1959,6 +1959,16 @@ func (q *FakeQuerier) DeleteOrganizationMember(_ context.Context, arg database.D
if len(deleted) == 0 {
return sql.ErrNoRows
}

// Delete group member trigger
q.groupMembers = slices.DeleteFunc(q.groupMembers, func(member database.GroupMemberTable) bool {
if member.UserID != arg.UserID {
return false
}
g, _ := q.getGroupByIDNoLock(ctx, member.GroupID)
return g.OrganizationID == arg.OrganizationID
})

return nil
}

Expand Down
21 changes: 21 additions & 0 deletions coderd/database/dump.sql

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
DROP TRIGGER IF EXISTS trigger_delete_group_members_on_org_member_delete ON organization_members;
DROP FUNCTION IF EXISTS delete_group_members_on_org_member_delete;
23 changes: 23 additions & 0 deletions coderd/database/migrations/000251_group_member_trigger.up.sql
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
CREATE FUNCTION delete_group_members_on_org_member_delete() RETURNS TRIGGER
LANGUAGE plpgsql
AS $$
DECLARE
BEGIN
-- Remove the user from all groups associated with the same
-- organization as the organization_member being deleted.
DELETE FROM group_members
WHERE
user_id = OLD.user_id
AND group_id IN (
SELECT id
FROM groups
WHERE organization_id = OLD.organization_id
);
RETURN OLD;
END;
$$;

CREATE TRIGGER trigger_delete_group_members_on_org_member_delete
BEFORE DELETE ON organization_members
FOR EACH ROW
EXECUTE PROCEDURE delete_group_members_on_org_member_delete();
42 changes: 42 additions & 0 deletions enterprise/members_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ func TestEnterpriseMembers(t *testing.T) {
LicenseOptions: &coderdenttest.LicenseOptions{
Features: license.Features{
codersdk.FeatureMultipleOrganizations: 1,
codersdk.FeatureTemplateRBAC: 1,
},
},
})
Expand All @@ -39,6 +40,21 @@ func TestEnterpriseMembers(t *testing.T) {
_, user := coderdtest.CreateAnotherUser(t, owner, secondOrg.ID)

ctx := testutil.Context(t, testutil.WaitMedium)

// Groups exist to ensure a user removed from the org loses their
// group access.
g1, err := orgAdminClient.CreateGroup(ctx, secondOrg.ID, codersdk.CreateGroupRequest{
Name: "foo",
DisplayName: "Foo",
})
require.NoError(t, err)

g2, err := orgAdminClient.CreateGroup(ctx, secondOrg.ID, codersdk.CreateGroupRequest{
Name: "bar",
DisplayName: "Bar",
})
require.NoError(t, err)

// Verify the org of 3 members
members, err := orgAdminClient.OrganizationMembers(ctx, secondOrg.ID)
require.NoError(t, err)
Expand All @@ -47,6 +63,25 @@ func TestEnterpriseMembers(t *testing.T) {
[]uuid.UUID{first.UserID, user.ID, orgAdmin.ID},
db2sdk.List(members, onlyIDs))

// Add the member to some groups
_, err = orgAdminClient.PatchGroup(ctx, g1.ID, codersdk.PatchGroupRequest{
AddUsers: []string{user.ID.String()},
})
require.NoError(t, err)

_, err = orgAdminClient.PatchGroup(ctx, g2.ID, codersdk.PatchGroupRequest{
AddUsers: []string{user.ID.String()},
})
require.NoError(t, err)

// Verify group membership
userGroups, err := orgAdminClient.Groups(ctx, codersdk.GroupArguments{
HasMember: user.ID.String(),
})
require.NoError(t, err)
// Everyone group + 2 groups
require.Len(t, userGroups, 3)

// Delete a member
err = orgAdminClient.DeleteOrganizationMember(ctx, secondOrg.ID, user.Username)
require.NoError(t, err)
Expand All @@ -57,6 +92,13 @@ func TestEnterpriseMembers(t *testing.T) {
require.ElementsMatch(t,
[]uuid.UUID{first.UserID, orgAdmin.ID},
db2sdk.List(members, onlyIDs))

// User should now belong to 0 groups
userGroups, err = orgAdminClient.Groups(ctx, codersdk.GroupArguments{
HasMember: user.ID.String(),
})
require.NoError(t, err)
require.Len(t, userGroups, 0)
})

t.Run("PostUser", func(t *testing.T) {
Expand Down