X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/2627f837f2564de2708947dda87f1b4985580adb..f170c5a75f22a6db11ca93eed5b0dfc9c65c4270:/services/api/test/unit/group_test.rb diff --git a/services/api/test/unit/group_test.rb b/services/api/test/unit/group_test.rb index 631e0137c1..017916f48b 100644 --- a/services/api/test/unit/group_test.rb +++ b/services/api/test/unit/group_test.rb @@ -3,8 +3,10 @@ # SPDX-License-Identifier: AGPL-3.0 require 'test_helper' +require 'fix_roles_projects' class GroupTest < ActiveSupport::TestCase + include DbCurrentTime test "cannot set owner_uuid to object with existing ownership cycle" do set_user_from_auth :active_trustedclient @@ -60,7 +62,7 @@ class GroupTest < ActiveSupport::TestCase assert g_foo.errors.messages[:owner_uuid].join(" ").match(/ownership cycle/) end - test "cannot create a group that is not a 'role' or 'project'" do + test "cannot create a group that is not a 'role' or 'project' or 'filter'" do set_user_from_auth :active_trustedclient assert_raises(ActiveRecord::RecordInvalid) do @@ -276,6 +278,7 @@ class GroupTest < ActiveSupport::TestCase Rails.configuration.Collections.ForwardSlashNameSubstitution = subst proj = Group.create group_class: "project" role = Group.create group_class: "role" + filt = Group.create group_class: "filter", properties: {"filters":[]} [[nil, true], ["", true], [".", false], @@ -289,8 +292,69 @@ class GroupTest < ActiveSupport::TestCase role.name = name assert_equal true, role.valid? proj.name = name - assert_equal valid, proj.valid?, "#{name.inspect} should be #{valid ? "valid" : "invalid"}" + assert_equal valid, proj.valid?, "project: #{name.inspect} should be #{valid ? "valid" : "invalid"}" + filt.name = name + assert_equal valid, filt.valid?, "filter: #{name.inspect} should be #{valid ? "valid" : "invalid"}" end end end + + def insert_group uuid, owner_uuid, name, group_class + q = ActiveRecord::Base.connection.exec_query %{ +insert into groups (uuid, owner_uuid, name, group_class, created_at, updated_at) + values ('#{uuid}', '#{owner_uuid}', + '#{name}', #{if group_class then "'"+group_class+"'" else 'NULL' end}, + statement_timestamp(), statement_timestamp()) +} + uuid + end + + test "migration to fix roles and projects" do + g1 = insert_group Group.generate_uuid, system_user_uuid, 'group with no class', nil + g2 = insert_group Group.generate_uuid, users(:active).uuid, 'role owned by a user', 'role' + + g3 = insert_group Group.generate_uuid, system_user_uuid, 'role that owns a project', 'role' + g4 = insert_group Group.generate_uuid, g3, 'the project', 'project' + + g5 = insert_group Group.generate_uuid, users(:active).uuid, 'a project with an outgoing permission link', 'project' + + g6 = insert_group Group.generate_uuid, system_user_uuid, 'name collision', 'role' + g7 = insert_group Group.generate_uuid, users(:active).uuid, 'name collision', 'role' + + g8 = insert_group Group.generate_uuid, users(:active).uuid, 'trashed with no class', nil + g8obj = Group.find_by_uuid(g8) + g8obj.trash_at = db_current_time + g8obj.delete_at = db_current_time + act_as_system_user do + g8obj.save!(validate: false) + end + + refresh_permissions + + act_as_system_user do + l1 = Link.create!(link_class: 'permission', name: 'can_manage', tail_uuid: g3, head_uuid: g4) + q = ActiveRecord::Base.connection.exec_query %{ +update links set tail_uuid='#{g5}' where uuid='#{l1.uuid}' +} + refresh_permissions + end + + assert_equal nil, Group.find_by_uuid(g1).group_class + assert_equal nil, Group.find_by_uuid(g8).group_class + assert_equal users(:active).uuid, Group.find_by_uuid(g2).owner_uuid + assert_equal g3, Group.find_by_uuid(g4).owner_uuid + assert !Link.where(tail_uuid: users(:active).uuid, head_uuid: g2, link_class: "permission", name: "can_manage").any? + assert !Link.where(tail_uuid: g3, head_uuid: g4, link_class: "permission", name: "can_manage").any? + assert Link.where(link_class: 'permission', name: 'can_manage', tail_uuid: g5, head_uuid: g4).any? + + fix_roles_projects + + assert_equal 'role', Group.find_by_uuid(g1).group_class + assert_equal 'role', Group.find_by_uuid(g8).group_class + assert_equal system_user_uuid, Group.find_by_uuid(g2).owner_uuid + assert_equal system_user_uuid, Group.find_by_uuid(g4).owner_uuid + assert Link.where(tail_uuid: users(:active).uuid, head_uuid: g2, link_class: "permission", name: "can_manage").any? + assert Link.where(tail_uuid: g3, head_uuid: g4, link_class: "permission", name: "can_manage").any? + assert !Link.where(link_class: 'permission', name: 'can_manage', tail_uuid: g5, head_uuid: g4).any? + end end