X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/2833e72b9373d50b232d248b04e8154fbdc220ff..61cd57499905e8e8cca07c774d1bf8c6bfa069a7:/services/api/test/unit/permission_test.rb diff --git a/services/api/test/unit/permission_test.rb b/services/api/test/unit/permission_test.rb index 748c7907a2..c1b8943773 100644 --- a/services/api/test/unit/permission_test.rb +++ b/services/api/test/unit/permission_test.rb @@ -63,6 +63,60 @@ class PermissionTest < ActiveSupport::TestCase assert ob.writable_by.include?(users(:active).uuid), "user does not have write permission" end + test "writable_by reports requesting user's own uuid for a writable project" do + invited_to_write = users(:project_viewer) + group = groups(:asubproject) + + # project_view can read, but cannot see write or see writers list + set_user_from_auth :project_viewer + assert_equal([group.owner_uuid], + group.writable_by, + "writers list should just have owner_uuid") + + # allow project_viewer to write for the remainder of the test + set_user_from_auth :admin + Link.create!(tail_uuid: invited_to_write.uuid, + head_uuid: group.uuid, + link_class: 'permission', + name: 'can_write') + group.permissions.reload + + # project_viewer should see self in writers list (but not all writers) + set_user_from_auth :project_viewer + assert_not_nil(group.writable_by, + "can write but cannot see writers list") + assert_includes(group.writable_by, invited_to_write.uuid, + "self missing from writers list") + assert_includes(group.writable_by, group.owner_uuid, + "project owner missing from writers list") + refute_includes(group.writable_by, users(:active).uuid, + "saw :active user in writers list") + + # active user should see full writers list + set_user_from_auth :active + assert_includes(group.writable_by, invited_to_write.uuid, + "permission just added, but missing from writers list") + + # allow project_viewer to manage for the remainder of the test + set_user_from_auth :admin + Link.create!(tail_uuid: invited_to_write.uuid, + head_uuid: group.uuid, + link_class: 'permission', + name: 'can_manage') + # invite another writer we can test for + Link.create!(tail_uuid: users(:spectator).uuid, + head_uuid: group.uuid, + link_class: 'permission', + name: 'can_write') + group.permissions.reload + + set_user_from_auth :project_viewer + assert_not_nil(group.writable_by, + "can manage but cannot see writers list") + assert_includes(group.writable_by, users(:spectator).uuid, + ":spectator missing from writers list") + end + test "user owns group, group can_manage object's group, user can add permissions" do set_user_from_auth :admin @@ -131,4 +185,173 @@ class PermissionTest < ActiveSupport::TestCase perm_link.save end end + + test "manager user gets permission to minions' articles via can_manage link" do + manager = create :active_user, first_name: "Manage", last_name: "Er" + minion = create :active_user, first_name: "Min", last_name: "Ion" + minions_specimen = act_as_user minion do + Specimen.create! + end + # Manager creates a group. (Make sure it doesn't magically give + # anyone any additional permissions.) + g = nil + act_as_user manager do + g = create :group, name: "NoBigSecret Lab" + assert_empty(User.readable_by(manager).where(uuid: minion.uuid), + "saw a user I shouldn't see") + assert_raises(ArvadosModel::PermissionDeniedError, + ActiveRecord::RecordInvalid, + "gave can_read permission to a user I shouldn't see") do + create(:permission_link, + name: 'can_read', tail_uuid: minion.uuid, head_uuid: g.uuid) + end + %w(can_manage can_write can_read).each do |perm_type| + assert_raises(ArvadosModel::PermissionDeniedError, + ActiveRecord::RecordInvalid, + "escalated privileges") do + create(:permission_link, + name: perm_type, tail_uuid: g.uuid, head_uuid: minion.uuid) + end + end + assert_empty(User.readable_by(manager).where(uuid: minion.uuid), + "manager saw minion too soon") + assert_empty(User.readable_by(minion).where(uuid: manager.uuid), + "minion saw manager too soon") + assert_empty(Group.readable_by(minion).where(uuid: g.uuid), + "minion saw manager's new NoBigSecret Lab group too soon") + + # Manager declares everybody on the system should be able to see + # the NoBigSecret Lab group. + create(:permission_link, + name: 'can_read', + tail_uuid: 'zzzzz-j7d0g-fffffffffffffff', + head_uuid: g.uuid) + # ...but nobody has joined the group yet. Manager still can't see + # minion. + assert_empty(User.readable_by(manager).where(uuid: minion.uuid), + "manager saw minion too soon") + end + + act_as_user minion do + # Minion can see the group. + assert_not_empty(Group.readable_by(minion).where(uuid: g.uuid), + "minion could not see the NoBigSecret Lab group") + # Minion joins the group. + create(:permission_link, + name: 'can_read', + tail_uuid: g.uuid, + head_uuid: minion.uuid) + end + + act_as_user manager do + # Now, manager can see minion. + assert_not_empty(User.readable_by(manager).where(uuid: minion.uuid), + "manager could not see minion") + # But cannot obtain further privileges this way. + assert_raises(ArvadosModel::PermissionDeniedError, + "escalated privileges") do + create(:permission_link, + name: 'can_manage', tail_uuid: manager.uuid, head_uuid: minion.uuid) + end + assert_empty(Specimen + .readable_by(manager) + .where(uuid: minions_specimen.uuid), + "manager saw the minion's private stuff") + assert_raises(ArvadosModel::PermissionDeniedError, + "manager could update minion's private stuff") do + minions_specimen.update_attributes(properties: {'x' => 'y'}) + end + end + + act_as_system_user do + # Root can give Manager more privileges over Minion. + create(:permission_link, + name: 'can_manage', tail_uuid: g.uuid, head_uuid: minion.uuid) + end + + act_as_user manager do + # Now, manager can read and write Minion's stuff. + assert_not_empty(Specimen + .readable_by(manager) + .where(uuid: minions_specimen.uuid), + "manager could not find minion's specimen by uuid") + assert_equal(true, + minions_specimen.update_attributes(properties: {'x' => 'y'}), + "manager could not update minion's specimen object") + end + end + + test "users with bidirectional read permission in group can see each other, but cannot see each other's private articles" do + a = create :active_user, first_name: "A" + b = create :active_user, first_name: "B" + other = create :active_user, first_name: "OTHER" + act_as_system_user do + g = create :group + [a,b].each do |u| + create(:permission_link, + name: 'can_read', tail_uuid: u.uuid, head_uuid: g.uuid) + create(:permission_link, + name: 'can_read', head_uuid: u.uuid, tail_uuid: g.uuid) + end + end + a_specimen = act_as_user a do + Specimen.create! + end + assert_not_empty(Specimen.readable_by(a).where(uuid: a_specimen.uuid), + "A cannot read own Specimen, following test probably useless.") + assert_empty(Specimen.readable_by(b).where(uuid: a_specimen.uuid), + "B can read A's Specimen") + [a,b].each do |u| + assert_empty(User.readable_by(u).where(uuid: other.uuid), + "#{u.first_name} can see OTHER in the user list") + assert_empty(User.readable_by(other).where(uuid: u.uuid), + "OTHER can see #{u.first_name} in the user list") + act_as_user u do + assert_raises ArvadosModel::PermissionDeniedError, "wrote without perm" do + other.update_attributes!(prefs: {'pwned' => true}) + end + assert_equal(true, u.update_attributes!(prefs: {'thisisme' => true}), + "#{u.first_name} can't update its own prefs") + end + act_as_user other do + assert_raises(ArvadosModel::PermissionDeniedError, + "OTHER wrote #{u.first_name} without perm") do + u.update_attributes!(prefs: {'pwned' => true}) + end + assert_equal(true, other.update_attributes!(prefs: {'thisisme' => true}), + "OTHER can't update its own prefs") + end + end + end + + test "cannot create with owner = unwritable user" do + set_user_from_auth :rominiadmin + assert_raises ArvadosModel::PermissionDeniedError, "created with owner = unwritable user" do + Specimen.create!(owner_uuid: users(:active).uuid) + end + end + + test "cannot change owner to unwritable user" do + set_user_from_auth :rominiadmin + ob = Specimen.create! + assert_raises ArvadosModel::PermissionDeniedError, "changed owner to unwritable user" do + ob.update_attributes!(owner_uuid: users(:active).uuid) + end + end + + test "cannot create with owner = unwritable group" do + set_user_from_auth :rominiadmin + assert_raises ArvadosModel::PermissionDeniedError, "created with owner = unwritable group" do + Specimen.create!(owner_uuid: groups(:aproject).uuid) + end + end + + test "cannot change owner to unwritable group" do + set_user_from_auth :rominiadmin + ob = Specimen.create! + assert_raises ArvadosModel::PermissionDeniedError, "changed owner to unwritable group" do + ob.update_attributes!(owner_uuid: groups(:aproject).uuid) + end + end + end