fix vulnerabilities
CI / scan_ruby (push) Successful in 23s
CI / scan_js (push) Failing after 10s
CI / lint (push) Failing after 19s
CI / test (push) Failing after 16s
CI / system-test (push) Failing after 15s

This commit is contained in:
2026-01-26 21:38:17 +01:00
parent 35f10c4bda
commit a69be52b72
6 changed files with 54 additions and 17 deletions
@@ -44,6 +44,12 @@ class Admin::InvitationsController < Admin::BaseController
private
def invitation_params
params.require(:user).permit(:email, :name, :role, :primary_language)
permitted = params.require(:user).permit(:email, :name, :primary_language)
if params[:user][:role].present? && User.roles.key?(params[:user][:role])
permitted[:role] = params[:user][:role]
end
permitted
end
end
+16 -3
View File
@@ -3,14 +3,20 @@ class Admin::UsersController < Admin::BaseController
def index
@users = User.order(created_at: :desc)
@users = @users.where(role: params[:role]) if params[:role].present?
@users = @users.where("email LIKE ?", "%#{params[:q]}%") if params[:q].present?
.by_role(params[:role])
.search_email(params[:q])
end
def edit
end
def update
# Prevent users from modifying their own role
if @user == current_user && user_params[:role].present?
redirect_to admin_users_path, alert: "You cannot modify your own role."
return
end
if @user.update(user_params)
redirect_to admin_users_path, notice: "User updated successfully."
else
@@ -40,6 +46,13 @@ class Admin::UsersController < Admin::BaseController
end
def user_params
params.require(:user).permit(:name, :email, :role, :primary_language)
permitted = params.require(:user).permit(:name, :email, :primary_language)
# Only allow role if it's a valid role enum value
if params[:user][:role].present? && User.roles.key?(params[:user][:role])
permitted[:role] = params[:user][:role]
end
permitted
end
end