1 # Copyright (C) The Arvados Authors. All rights reserved.
3 # SPDX-License-Identifier: AGPL-3.0
6 require 'fix_roles_projects'
8 class GroupTest < ActiveSupport::TestCase
11 test "cannot set owner_uuid to object with existing ownership cycle" do
12 set_user_from_auth :active_trustedclient
14 # First make sure we have lots of permission on the bad group by
15 # renaming it to "{current name} is mine all mine"
16 g = groups(:bad_group_has_ownership_cycle_b)
17 g.name += " is mine all mine"
18 assert g.save, "active user should be able to modify group #{g.uuid}"
20 # Use the group as the owner of a new object
22 create(owner_uuid: groups(:bad_group_has_ownership_cycle_b).uuid)
23 assert s.valid?, "ownership should pass validation #{s.errors.messages}"
24 assert_equal false, s.save, "should not save object with #{g.uuid} as owner"
26 # Use the group as the new owner of an existing object
27 s = collections(:collection_owned_by_active)
28 s.owner_uuid = groups(:bad_group_has_ownership_cycle_b).uuid
29 assert s.valid?, "ownership should pass validation"
30 assert_equal false, s.save, "should not save object with #{g.uuid} as owner"
33 test "cannot create a new ownership cycle" do
34 set_user_from_auth :active_trustedclient
36 g_foo = Group.create!(name: "foo", group_class: "project")
37 g_bar = Group.create!(name: "bar", group_class: "project")
39 g_foo.owner_uuid = g_bar.uuid
40 assert g_foo.save, lambda { g_foo.errors.messages }
41 g_bar.owner_uuid = g_foo.uuid
42 assert g_bar.valid?, "ownership cycle should not prevent validation"
43 assert_equal false, g_bar.save, "should not create an ownership loop"
44 assert g_bar.errors.messages[:owner_uuid].join(" ").match(/ownership cycle/)
47 test "cannot create a single-object ownership cycle" do
48 set_user_from_auth :active_trustedclient
50 g_foo = Group.create!(name: "foo", group_class: "project")
53 # Ensure I have permission to manage this group even when its owner changes
54 perm_link = Link.create!(tail_uuid: users(:active).uuid,
55 head_uuid: g_foo.uuid,
56 link_class: 'permission',
60 g_foo.owner_uuid = g_foo.uuid
61 assert_equal false, g_foo.save, "should not create an ownership loop"
62 assert g_foo.errors.messages[:owner_uuid].join(" ").match(/ownership cycle/)
65 test "cannot create a group that is not a 'role' or 'project' or 'filter'" do
66 set_user_from_auth :active_trustedclient
68 assert_raises(ActiveRecord::RecordInvalid) do
69 Group.create!(name: "foo")
72 assert_raises(ActiveRecord::RecordInvalid) do
73 Group.create!(name: "foo", group_class: "")
76 assert_raises(ActiveRecord::RecordInvalid) do
77 Group.create!(name: "foo", group_class: "bogus")
81 test "cannot change group_class on an already created group" do
82 set_user_from_auth :active_trustedclient
83 g = Group.create!(name: "foo", group_class: "role")
84 assert_raises(ActiveRecord::RecordInvalid) do
85 g.update!(group_class: "project")
89 test "role cannot own things" do
90 set_user_from_auth :active_trustedclient
91 role = Group.create!(name: "foo", group_class: "role")
92 assert_raises(ArvadosModel::PermissionDeniedError) do
93 Collection.create!(name: "bzzz123", owner_uuid: role.uuid)
96 c = Collection.create!(name: "bzzz124")
97 assert_raises(ArvadosModel::PermissionDeniedError) do
98 c.update!(owner_uuid: role.uuid)
102 test "trash group hides contents" do
103 set_user_from_auth :active_trustedclient
105 g_foo = Group.create!(name: "foo", group_class: "project")
106 col = Collection.create!(owner_uuid: g_foo.uuid)
108 assert Collection.readable_by(users(:active)).where(uuid: col.uuid).any?
109 g_foo.update! is_trashed: true
110 assert Collection.readable_by(users(:active)).where(uuid: col.uuid).empty?
111 assert Collection.readable_by(users(:active), {:include_trash => true}).where(uuid: col.uuid).any?
112 g_foo.update! is_trashed: false
113 assert Collection.readable_by(users(:active)).where(uuid: col.uuid).any?
116 test "trash group" do
117 set_user_from_auth :active_trustedclient
119 g_foo = Group.create!(name: "foo", group_class: "project")
120 g_bar = Group.create!(name: "bar", owner_uuid: g_foo.uuid, group_class: "project")
121 g_baz = Group.create!(name: "baz", owner_uuid: g_bar.uuid, group_class: "project")
123 assert Group.readable_by(users(:active)).where(uuid: g_foo.uuid).any?
124 assert Group.readable_by(users(:active)).where(uuid: g_bar.uuid).any?
125 assert Group.readable_by(users(:active)).where(uuid: g_baz.uuid).any?
126 g_foo.update! is_trashed: true
127 assert Group.readable_by(users(:active)).where(uuid: g_foo.uuid).empty?
128 assert Group.readable_by(users(:active)).where(uuid: g_bar.uuid).empty?
129 assert Group.readable_by(users(:active)).where(uuid: g_baz.uuid).empty?
131 assert Group.readable_by(users(:active), {:include_trash => true}).where(uuid: g_foo.uuid).any?
132 assert Group.readable_by(users(:active), {:include_trash => true}).where(uuid: g_bar.uuid).any?
133 assert Group.readable_by(users(:active), {:include_trash => true}).where(uuid: g_baz.uuid).any?
137 test "trash subgroup" do
138 set_user_from_auth :active_trustedclient
140 g_foo = Group.create!(name: "foo", group_class: "project")
141 g_bar = Group.create!(name: "bar", owner_uuid: g_foo.uuid, group_class: "project")
142 g_baz = Group.create!(name: "baz", owner_uuid: g_bar.uuid, group_class: "project")
144 assert Group.readable_by(users(:active)).where(uuid: g_foo.uuid).any?
145 assert Group.readable_by(users(:active)).where(uuid: g_bar.uuid).any?
146 assert Group.readable_by(users(:active)).where(uuid: g_baz.uuid).any?
147 g_bar.update! is_trashed: true
149 assert Group.readable_by(users(:active)).where(uuid: g_foo.uuid).any?
150 assert Group.readable_by(users(:active)).where(uuid: g_bar.uuid).empty?
151 assert Group.readable_by(users(:active)).where(uuid: g_baz.uuid).empty?
153 assert Group.readable_by(users(:active), {:include_trash => true}).where(uuid: g_bar.uuid).any?
154 assert Group.readable_by(users(:active), {:include_trash => true}).where(uuid: g_baz.uuid).any?
157 test "trash subsubgroup" do
158 set_user_from_auth :active_trustedclient
160 g_foo = Group.create!(name: "foo", group_class: "project")
161 g_bar = Group.create!(name: "bar", owner_uuid: g_foo.uuid, group_class: "project")
162 g_baz = Group.create!(name: "baz", owner_uuid: g_bar.uuid, group_class: "project")
164 assert Group.readable_by(users(:active)).where(uuid: g_foo.uuid).any?
165 assert Group.readable_by(users(:active)).where(uuid: g_bar.uuid).any?
166 assert Group.readable_by(users(:active)).where(uuid: g_baz.uuid).any?
167 g_baz.update! is_trashed: true
168 assert Group.readable_by(users(:active)).where(uuid: g_foo.uuid).any?
169 assert Group.readable_by(users(:active)).where(uuid: g_bar.uuid).any?
170 assert Group.readable_by(users(:active)).where(uuid: g_baz.uuid).empty?
171 assert Group.readable_by(users(:active), {:include_trash => true}).where(uuid: g_baz.uuid).any?
175 test "trash group propagates to subgroups" do
176 set_user_from_auth :active_trustedclient
178 g_foo = groups(:trashed_project)
179 g_bar = groups(:trashed_subproject)
180 g_baz = groups(:trashed_subproject3)
181 col = collections(:collection_in_trashed_subproject)
183 assert Group.readable_by(users(:active)).where(uuid: g_foo.uuid).empty?
184 assert Group.readable_by(users(:active)).where(uuid: g_bar.uuid).empty?
185 assert Group.readable_by(users(:active)).where(uuid: g_baz.uuid).empty?
186 assert Collection.readable_by(users(:active)).where(uuid: col.uuid).empty?
188 set_user_from_auth :admin
189 assert Group.readable_by(users(:active)).where(uuid: g_foo.uuid).empty?
190 assert Group.readable_by(users(:active)).where(uuid: g_bar.uuid).empty?
191 assert Group.readable_by(users(:active)).where(uuid: g_baz.uuid).empty?
192 assert Collection.readable_by(users(:active)).where(uuid: col.uuid).empty?
194 set_user_from_auth :active_trustedclient
195 g_foo.update! is_trashed: false
196 assert Group.readable_by(users(:active)).where(uuid: g_foo.uuid).any?
197 assert Group.readable_by(users(:active)).where(uuid: g_bar.uuid).any?
198 assert Collection.readable_by(users(:active)).where(uuid: col.uuid).any?
200 # this one should still be trashed.
201 assert Group.readable_by(users(:active)).where(uuid: g_baz.uuid).empty?
203 g_baz.update! is_trashed: false
204 assert Group.readable_by(users(:active)).where(uuid: g_baz.uuid).any?
207 test "trashed does not propagate across permission links" do
208 set_user_from_auth :admin
210 g_foo = Group.create!(name: "foo", group_class: "role")
211 u_bar = User.create!(first_name: "bar")
213 assert Group.readable_by(users(:admin)).where(uuid: g_foo.uuid).any?
214 assert User.readable_by(users(:admin)).where(uuid: u_bar.uuid).any?
215 g_foo.update! is_trashed: true
217 assert Group.readable_by(users(:admin)).where(uuid: g_foo.uuid).empty?
218 assert User.readable_by(users(:admin)).where(uuid: u_bar.uuid).any?
220 g_foo.update! is_trashed: false
221 ln = Link.create!(tail_uuid: g_foo.uuid,
222 head_uuid: u_bar.uuid,
223 link_class: "permission",
225 g_foo.update! is_trashed: true
227 assert Group.readable_by(users(:admin)).where(uuid: g_foo.uuid).empty?
228 assert User.readable_by(users(:admin)).where(uuid: u_bar.uuid).any?
231 test "project names must be displayable in a filesystem" do
232 set_user_from_auth :active
233 ["", "{SOLIDUS}"].each do |subst|
234 Rails.configuration.Collections.ForwardSlashNameSubstitution = subst
235 proj = Group.create group_class: "project"
236 role = Group.create group_class: "role"
237 filt = Group.create group_class: "filter", properties: {"filters":[]}
244 ["foo/bar", subst != ""],
245 ["../..", subst != ""],
247 ].each do |name, valid|
249 assert_equal true, role.valid?
251 assert_equal valid, proj.valid?, "project: #{name.inspect} should be #{valid ? "valid" : "invalid"}"
253 assert_equal valid, filt.valid?, "filter: #{name.inspect} should be #{valid ? "valid" : "invalid"}"
258 def insert_group uuid, owner_uuid, name, group_class
259 q = ActiveRecord::Base.connection.exec_query %{
260 insert into groups (uuid, owner_uuid, name, group_class, created_at, updated_at, modified_at)
261 values ('#{uuid}', '#{owner_uuid}',
262 '#{name}', #{if group_class then "'"+group_class+"'" else 'NULL' end},
263 statement_timestamp(), statement_timestamp(), statement_timestamp())
268 test "migration to fix roles and projects" do
269 g1 = insert_group Group.generate_uuid, system_user_uuid, 'group with no class', nil
270 g2 = insert_group Group.generate_uuid, users(:active).uuid, 'role owned by a user', 'role'
272 g3 = insert_group Group.generate_uuid, system_user_uuid, 'role that owns a project', 'role'
273 g4 = insert_group Group.generate_uuid, g3, 'the project', 'project'
275 g5 = insert_group Group.generate_uuid, users(:active).uuid, 'a project with an outgoing permission link', 'project'
277 g6 = insert_group Group.generate_uuid, system_user_uuid, 'name collision', 'role'
278 g7 = insert_group Group.generate_uuid, users(:active).uuid, 'name collision', 'role'
280 g8 = insert_group Group.generate_uuid, users(:active).uuid, 'trashed with no class', nil
281 g8obj = Group.find_by_uuid(g8)
282 g8obj.trash_at = db_current_time
283 g8obj.delete_at = db_current_time
284 act_as_system_user do
285 g8obj.save!(validate: false)
290 act_as_system_user do
291 l1 = Link.create!(link_class: 'permission', name: 'can_manage', tail_uuid: g3, head_uuid: g4)
292 q = ActiveRecord::Base.connection.exec_query %{
293 update links set tail_uuid='#{g5}' where uuid='#{l1.uuid}'
298 assert_equal nil, Group.find_by_uuid(g1).group_class
299 assert_equal nil, Group.find_by_uuid(g8).group_class
300 assert_equal users(:active).uuid, Group.find_by_uuid(g2).owner_uuid
301 assert_equal g3, Group.find_by_uuid(g4).owner_uuid
302 assert !Link.where(tail_uuid: users(:active).uuid, head_uuid: g2, link_class: "permission", name: "can_manage").any?
303 assert !Link.where(tail_uuid: g3, head_uuid: g4, link_class: "permission", name: "can_manage").any?
304 assert Link.where(link_class: 'permission', name: 'can_manage', tail_uuid: g5, head_uuid: g4).any?
308 assert_equal 'role', Group.find_by_uuid(g1).group_class
309 assert_equal 'role', Group.find_by_uuid(g8).group_class
310 assert_equal system_user_uuid, Group.find_by_uuid(g2).owner_uuid
311 assert_equal system_user_uuid, Group.find_by_uuid(g4).owner_uuid
312 assert Link.where(tail_uuid: users(:active).uuid, head_uuid: g2, link_class: "permission", name: "can_manage").any?
313 assert Link.where(tail_uuid: g3, head_uuid: g4, link_class: "permission", name: "can_manage").any?
314 assert !Link.where(link_class: 'permission', name: 'can_manage', tail_uuid: g5, head_uuid: g4).any?
317 test "freeze project" do
318 act_as_user users(:active) do
319 Rails.configuration.API.UnfreezeProjectRequiresAdmin = false
322 command: ["echo", "foo"],
323 container_image: links(:docker_image_collection_tag).name,
326 mounts: {"/out" => {"kind" => "tmp", "capacity" => 1000000}},
328 runtime_constraints: {"vcpus" => 1, "ram" => 2},
332 parent = Group.create!(group_class: 'project', name: 'freeze-test-parent', owner_uuid: users(:active).uuid)
333 proj = Group.create!(group_class: 'project', name: 'freeze-test', owner_uuid: parent.uuid)
334 proj_inner = Group.create!(group_class: 'project', name: 'freeze-test-inner', owner_uuid: proj.uuid)
335 coll = Collection.create!(name: 'freeze-test-collection', manifest_text: '', owner_uuid: proj_inner.uuid)
337 # Cannot set frozen_by_uuid to a different user
339 proj.update!(frozen_by_uuid: users(:spectator).uuid)
343 # Cannot set frozen_by_uuid without can_manage permission
344 act_as_system_user do
345 Link.create!(link_class: 'permission', name: 'can_write', tail_uuid: users(:spectator).uuid, head_uuid: proj.uuid)
347 act_as_user users(:spectator) do
348 # First confirm we have write permission
349 assert Collection.create(name: 'bar', owner_uuid: proj.uuid)
350 assert_raises(ArvadosModel::PermissionDeniedError) do
351 proj.update!(frozen_by_uuid: users(:spectator).uuid)
356 # Cannot set frozen_by_uuid without description (if so configured)
357 Rails.configuration.API.FreezeProjectRequiresDescription = true
358 err = assert_raises do
359 proj.update!(frozen_by_uuid: users(:active).uuid)
361 assert_match /can only be set if description is non-empty/, err.inspect
363 err = assert_raises do
364 proj.update!(frozen_by_uuid: users(:active).uuid, description: '')
366 assert_match /can only be set if description is non-empty/, err.inspect
369 # Cannot set frozen_by_uuid without properties (if so configured)
370 Rails.configuration.API.FreezeProjectRequiresProperties['frobity'] = true
371 err = assert_raises do
373 frozen_by_uuid: users(:active).uuid,
374 description: 'ready to freeze')
376 assert_match /can only be set if properties\[frobity\] value is non-empty/, err.inspect
379 # Cannot set frozen_by_uuid while project or its parent is
381 [parent, proj].each do |trashed|
382 trashed.update!(trash_at: db_current_time)
383 err = assert_raises do
385 frozen_by_uuid: users(:active).uuid,
386 description: 'ready to freeze',
387 properties: {'frobity' => 'bar baz'})
389 assert_match /cannot be set on a trashed project/, err.inspect
391 trashed.update!(trash_at: nil)
394 # Can set frozen_by_uuid if all conditions are met
396 frozen_by_uuid: users(:active).uuid,
397 description: 'ready to freeze',
398 properties: {'frobity' => 'bar baz'})
399 assert ok, proj.errors.messages.inspect
401 [:active, :admin].each do |u|
402 act_as_user users(u) do
403 # Once project is frozen, cannot create new items inside it or
405 [proj, proj_inner].each do |frozen|
407 collections(:collection_owned_by_active).update!(owner_uuid: frozen.uuid)
410 Collection.create!(owner_uuid: frozen.uuid, name: 'inside-frozen-project')
413 Group.create!(owner_uuid: frozen.uuid, group_class: 'project', name: 'inside-frozen-project')
415 cr = ContainerRequest.new(test_cr_attrs.merge(owner_uuid: frozen.uuid))
416 assert_raises ArvadosModel::PermissionDeniedError do
419 assert_match /frozen/, cr.errors.inspect
420 # Check the frozen-parent condition is the only reason save failed.
421 cr.owner_uuid = users(u).uuid
426 # Once project is frozen, cannot change name/contents, move,
427 # trash, or delete the project or anything beneath it
428 [proj, proj_inner, coll].each do |frozen|
429 assert_raises(StandardError, "should reject rename of #{frozen.uuid} (#{frozen.name}) with parent #{frozen.owner_uuid}") do
430 frozen.update!(name: 'foo2')
434 if frozen.is_a?(Collection)
435 assert_raises(StandardError, "should reject manifest change of #{frozen.uuid}") do
436 frozen.update!(manifest_text: ". d41d8cd98f00b204e9800998ecf8427e+0 0:0:foo\n")
439 assert_raises(StandardError, "should reject moving a project into #{frozen.uuid}") do
440 groups(:private).update!(owner_uuid: frozen.uuid)
445 assert_raises(StandardError, "should reject moving #{frozen.uuid} to a different parent project") do
446 frozen.update!(owner_uuid: groups(:private).uuid)
449 assert_raises(StandardError, "should reject setting trash_at of #{frozen.uuid}") do
450 frozen.update!(trash_at: db_current_time)
453 assert_raises(StandardError, "should reject setting delete_at of #{frozen.uuid}") do
454 frozen.update!(delete_at: db_current_time)
457 assert_raises(StandardError, "should reject delete of #{frozen.uuid}") do
462 assert_equal [], frozen.writable_by
468 # User with write permission (but not manage) cannot unfreeze
469 act_as_user users(:spectator) do
470 # First confirm we have write permission on the parent project
471 assert Collection.create(name: 'bar', owner_uuid: parent.uuid)
472 assert_raises(ArvadosModel::PermissionDeniedError) do
473 proj.update!(frozen_by_uuid: nil)
478 # User with manage permission can unfreeze, then create items
479 # inside it and its children
480 assert proj.update(frozen_by_uuid: nil)
481 assert Collection.create!(owner_uuid: proj.uuid, name: 'inside-unfrozen-project')
482 assert Collection.create!(owner_uuid: proj_inner.uuid, name: 'inside-inner-unfrozen-project')
484 # Re-freeze, and reconfigure so only admins can unfreeze.
485 assert proj.update(frozen_by_uuid: users(:active).uuid)
486 Rails.configuration.API.UnfreezeProjectRequiresAdmin = true
488 # Owner cannot unfreeze, because not admin.
489 err = assert_raises do
490 proj.update!(frozen_by_uuid: nil)
492 assert_match /can only be changed by an admin user, once set/, err.inspect
495 # Cannot trash or delete a frozen project's ancestor
496 assert_raises(StandardError, "should not be able to set trash_at on parent of frozen project") do
497 parent.update!(trash_at: db_current_time)
500 assert_raises(StandardError, "should not be able to set delete_at on parent of frozen project") do
501 parent.update!(delete_at: db_current_time)
504 assert_nil parent.frozen_by_uuid
506 act_as_user users(:admin) do
507 # Even admin cannot change frozen_by_uuid to someone else's UUID.
508 err = assert_raises do
509 proj.update!(frozen_by_uuid: users(:project_viewer).uuid)
511 assert_match /can only be set to the current user's UUID/, err.inspect
514 # Admin can unfreeze.
515 assert proj.update(frozen_by_uuid: nil), proj.errors.messages
518 # Cannot freeze a project if it contains container requests in
519 # Committed state (this would cause operations on the relevant
520 # Containers to fail when syncing container request state)
521 creq_uncommitted = ContainerRequest.create!(test_cr_attrs.merge(owner_uuid: proj_inner.uuid))
522 creq_committed = ContainerRequest.create!(test_cr_attrs.merge(owner_uuid: proj_inner.uuid, state: 'Committed'))
523 err = assert_raises do
524 proj.update!(frozen_by_uuid: users(:active).uuid)
526 assert_match /container request zzzzz-xvhdp-.* with state = Committed/, err.inspect
529 # Can freeze once all container requests are in Uncommitted or
531 creq_committed.update!(state: ContainerRequest::Final)
532 assert proj.update(frozen_by_uuid: users(:active).uuid)
537 [false, :admin, true],
538 [false, :active, false],
539 [true, :admin, true],
540 [true, :active, true],
541 [true, :inactive, false],
542 ].each do |conf, user, allowed|
543 test "config.Users.CanCreateRoleGroups conf=#{conf}, user=#{user}" do
544 Rails.configuration.Users.CanCreateRoleGroups = conf
545 act_as_user users(user) do
547 Group.create!(name: 'admin-created', group_class: 'role')
549 assert_raises(ArvadosModel::PermissionDeniedError) do
550 Group.create!(name: 'user-created', group_class: 'role')