18005: Exposes the bug by simulating a keep-balance run a making a new version.
[arvados.git] / services / api / test / unit / link_test.rb
1 # Copyright (C) The Arvados Authors. All rights reserved.
2 #
3 # SPDX-License-Identifier: AGPL-3.0
4
5 require 'test_helper'
6
7 class LinkTest < ActiveSupport::TestCase
8   fixtures :all
9
10   setup do
11     set_user_from_auth :admin_trustedclient
12   end
13
14   test "cannot delete an object referenced by unwritable links" do
15     ob = act_as_user users(:active) do
16       Specimen.create
17     end
18     link = act_as_user users(:admin) do
19       Link.create(tail_uuid: users(:active).uuid,
20                   head_uuid: ob.uuid,
21                   link_class: 'test',
22                   name: 'test')
23     end
24     assert_equal users(:admin).uuid, link.owner_uuid
25     assert_raises(ArvadosModel::PermissionDeniedError,
26                   "should not delete #{ob.uuid} with link #{link.uuid}") do
27       act_as_user users(:active) do
28         ob.destroy
29       end
30     end
31     act_as_user users(:admin) do
32       ob.destroy
33     end
34     assert_empty Link.where(uuid: link.uuid)
35   end
36
37   def new_active_link_valid?(link_attrs)
38     set_user_from_auth :active
39     begin
40       Link.
41         create({link_class: "permission",
42                  name: "can_read",
43                  head_uuid: groups(:aproject).uuid,
44                }.merge(link_attrs)).
45         valid?
46     rescue ArvadosModel::PermissionDeniedError
47       false
48     end
49   end
50
51   test "non-admin project owner can make it public" do
52     assert(new_active_link_valid?(tail_uuid: groups(:anonymous_group).uuid),
53            "non-admin project owner can't make their project public")
54   end
55
56   test "link granting permission to nonexistent user is invalid" do
57     refute new_active_link_valid?(tail_uuid:
58                                   users(:active).uuid.sub(/-\w+$/, "-#{'z' * 15}"))
59   end
60
61   test "link granting permission to remote user is valid" do
62     refute new_active_link_valid?(tail_uuid:
63                                   users(:active).uuid.sub(/^\w+-/, "foooo-"))
64     Rails.configuration.RemoteClusters = Rails.configuration.RemoteClusters.merge({foooo: ActiveSupport::InheritableOptions.new({Host: "bar.com"})})
65     assert new_active_link_valid?(tail_uuid:
66                                   users(:active).uuid.sub(/^\w+-/, "foooo-"))
67   end
68
69   test "link granting non-project permission to unreadable user is invalid" do
70     refute new_active_link_valid?(tail_uuid: users(:admin).uuid,
71                                   head_uuid: collections(:bar_file).uuid)
72   end
73
74   test "user can't add a Collection to a Project without permission" do
75     refute new_active_link_valid?(link_class: "name",
76                                   name: "Permission denied test name",
77                                   tail_uuid: collections(:bar_file).uuid)
78   end
79
80   test "user can't add a User to a Project" do
81     # Users *can* give other users permissions to projects.
82     # This test helps ensure that that exception is specific to permissions.
83     refute new_active_link_valid?(link_class: "name",
84                                   name: "Permission denied test name",
85                                   tail_uuid: users(:admin).uuid)
86   end
87
88   test "link granting project permissions to unreadable user is invalid" do
89     refute new_active_link_valid?(tail_uuid: users(:admin).uuid)
90   end
91
92   test "permission link can't exist on past collection versions" do
93     refute new_active_link_valid?(tail_uuid: groups(:public).uuid,
94                                   head_uuid: collections(:w_a_z_file_version_1).uuid)
95   end
96 end