X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/32e3f6eb604d3692f10f16220a78e07c056be00e..48fce933fec998722e669d7d33a62f3c0a10b05e:/services/api/test/functional/arvados/v1/api_client_authorizations_controller_test.rb diff --git a/services/api/test/functional/arvados/v1/api_client_authorizations_controller_test.rb b/services/api/test/functional/arvados/v1/api_client_authorizations_controller_test.rb index 5da9145a81..9f0f555d55 100644 --- a/services/api/test/functional/arvados/v1/api_client_authorizations_controller_test.rb +++ b/services/api/test/functional/arvados/v1/api_client_authorizations_controller_test.rb @@ -38,9 +38,11 @@ class Arvados::V1::ApiClientAuthorizationsControllerTest < ActionController::Tes assert_response 403 end - def assert_found_tokens(auth, search_params, *expected_tokens) + def assert_found_tokens(auth, search_params, expected) authorize_with auth - expected_tokens.map! { |name| api_client_authorizations(name).api_token } + expected_tokens = expected.map do |name| + api_client_authorizations(name).api_token + end get :index, search_params assert_response :success got_tokens = JSON.parse(@response.body)['items'] @@ -52,62 +54,118 @@ class Arvados::V1::ApiClientAuthorizationsControllerTest < ActionController::Tes # Three-tuples with auth to use, scopes to find, and expected tokens. # Make two tests for each tuple, one searching with where and the other # with filter. - [[:admin_trustedclient, [], :admin_noscope], - [:active_trustedclient, ["GET /arvados/v1/users"], :active_userlist], + [[:admin_trustedclient, [], [:admin_noscope]], + [:active_trustedclient, ["GET /arvados/v1/users"], [:active_userlist]], [:active_trustedclient, ["POST /arvados/v1/api_client_authorizations", "GET /arvados/v1/api_client_authorizations"], - :active_apitokens], - ].each do |auth, scopes, *expected| + [:active_apitokens]], + ].each do |auth, scopes, expected| test "#{auth.to_s} can find auths where scopes=#{scopes.inspect}" do - assert_found_tokens(auth, {where: {scopes: scopes}}, *expected) + assert_found_tokens(auth, {where: {scopes: scopes}}, expected) end test "#{auth.to_s} can find auths filtered with scopes=#{scopes.inspect}" do - assert_found_tokens(auth, {filters: [['scopes', '=', scopes]]}, *expected) + assert_found_tokens(auth, {filters: [['scopes', '=', scopes]]}, expected) + end + + test "#{auth.to_s} offset works with filter scopes=#{scopes.inspect}" do + assert_found_tokens(auth, { + offset: expected.length, + filters: [['scopes', '=', scopes]] + }, []) end end - [ - [:admin, :admin, 200], - [:admin, :active, 403], - [:admin, :admin_vm, 403], # this belongs to the user of current session, but we can't get it by uuid - [:admin_trustedclient, :active, 200], - ].each do |user, token, status| - test "as user #{user} get #{token} token and expect #{status}" do + [# anyone can look up the token they're currently using + [:admin, :admin, 200, 200, 1], + [:active, :active, 200, 200, 1], + # cannot look up other tokens (even for same user) if not trustedclient + [:admin, :active, 403, 403], + [:admin, :admin_vm, 403, 403], + [:active, :admin, 403, 403], + # cannot look up other tokens for other users, regardless of trustedclient + [:admin_trustedclient, :active, 404, 200, 0], + [:active_trustedclient, :admin, 404, 200, 0], + ].each do |user, token, expect_get_response, expect_list_response, expect_list_items| + test "using '#{user}', get '#{token}' by uuid" do authorize_with user - get :show, {id: api_client_authorizations(token).uuid} - assert_response status + get :show, { + id: api_client_authorizations(token).uuid, + } + assert_response expect_get_response + end + + test "using '#{user}', update '#{token}' by uuid" do + authorize_with user + put :update, { + id: api_client_authorizations(token).uuid, + api_client_authorization: {}, + } + assert_response expect_get_response end - end - [ - [:admin, :admin, 200], - [:admin, :active, 403], - [:admin, :admin_vm, 403], # this belongs to the user of current session, but we can't list it by uuid - [:admin_trustedclient, :active, 200], - ].each do |user, token, status| - test "as user #{user} list #{token} token using uuid and expect #{status}" do + test "using '#{user}', delete '#{token}' by uuid" do + authorize_with user + post :destroy, { + id: api_client_authorizations(token).uuid, + } + assert_response expect_get_response + end + + test "using '#{user}', list '#{token}' by uuid" do authorize_with user get :index, { - filters: [['uuid','=',api_client_authorizations(token).uuid]] + filters: [['uuid','=',api_client_authorizations(token).uuid]], } - assert_response status + assert_response expect_list_response + if expect_list_items + assert_equal assigns(:objects).length, expect_list_items + assert_equal json_response['items_available'], expect_list_items + end + end + + if expect_list_items + test "using '#{user}', list '#{token}' by uuid with offset" do + authorize_with user + get :index, { + filters: [['uuid','=',api_client_authorizations(token).uuid]], + offset: expect_list_items, + } + assert_response expect_list_response + assert_equal json_response['items_available'], expect_list_items + assert_equal json_response['items'].length, 0 + end end - end - [ - [:admin, :admin, 200], - [:admin, :active, 403], - [:admin, :admin_vm, 200], # this belongs to the user of current session, and can be listed by token - [:admin_trustedclient, :active, 200], - ].each do |user, token, status| - test "as user #{user} list #{token} token using token and expect #{status}" do + test "using '#{user}', list '#{token}' by token" do authorize_with user get :index, { - filters: [['api_token','=',api_client_authorizations(token).api_token]] + filters: [['api_token','=',api_client_authorizations(token).api_token]], } - assert_response status + assert_response expect_list_response + if expect_list_items + assert_equal assigns(:objects).length, expect_list_items + assert_equal json_response['items_available'], expect_list_items + end end end + + test "scoped token cannot change its own scopes" do + authorize_with :admin_vm + put :update, { + id: api_client_authorizations(:admin_vm).uuid, + api_client_authorization: {scopes: ['all']}, + } + assert_response 403 + end + + test "token cannot change its own uuid" do + authorize_with :admin + put :update, { + id: api_client_authorizations(:admin).uuid, + api_client_authorization: {uuid: 'zzzzz-gj3su-zzzzzzzzzzzzzzz'}, + } + assert_response 403 + end end