X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/6f70a514652050bde05301a4715be8769f213ac6..02f24a0c4a01a7ab46645c21630b9f48065b4b96:/services/api/app/models/link.rb diff --git a/services/api/app/models/link.rb b/services/api/app/models/link.rb index 3de536ef07..dc961667b0 100644 --- a/services/api/app/models/link.rb +++ b/services/api/app/models/link.rb @@ -1,3 +1,7 @@ +# Copyright (C) The Arvados Authors. All rights reserved. +# +# SPDX-License-Identifier: AGPL-3.0 + class Link < ArvadosModel include HasUuid include KindAndEtag @@ -8,9 +12,7 @@ class Link < ArvadosModel after_update :maybe_invalidate_permissions_cache after_create :maybe_invalidate_permissions_cache after_destroy :maybe_invalidate_permissions_cache - attr_accessor :head_kind, :tail_kind - validate :name_link_has_valid_name - validate :name_link_owner_is_tail + validate :name_links_are_obsolete api_accessible :user, extend: :common do |t| t.add :tail_uuid @@ -22,11 +24,6 @@ class Link < ArvadosModel t.add :properties end - def properties - @properties ||= Hash.new - super - end - def head_kind if k = ArvadosModel::resource_class_for_uuid(head_uuid) k.kind @@ -52,7 +49,7 @@ class Link < ArvadosModel return true if current_user.is_admin # All users can grant permissions on objects they own or can manage - head_obj = ArvadosModel.lookup_by_uuid(head_uuid) + head_obj = ArvadosModel.find_by_uuid(head_uuid) return true if current_user.can?(manage: head_obj) # Default = deny. @@ -67,35 +64,28 @@ class Link < ArvadosModel # permissions for head_uuid and tail_uuid, and invalidate the # cache for only those users. (This would require a browseable # cache.) - User.invalidate_permissions_cache + User.invalidate_permissions_cache db_current_time.to_i end end - def name_link_has_valid_name + def name_links_are_obsolete if link_class == 'name' - unless name.is_a? String and !name.empty? - errors.add('name', 'must be a non-empty string') - end + errors.add('name', 'Name links are obsolete') + false else true end end - def name_link_owner_is_tail - if link_class == 'name' - self.owner_uuid = tail_uuid - ensure_owner_uuid_is_permitted - end - end - # A user is permitted to create, update or modify a permission link - # if and only if they have "manage" permission on the destination - # object. + # if and only if they have "manage" permission on the object + # indicated by the permission link's head_uuid. + # # All other links are treated as regular ArvadosModel objects. # def ensure_owner_uuid_is_permitted if link_class == 'permission' - ob = ArvadosModel.lookup_by_uuid(head_uuid) + ob = ArvadosModel.find_by_uuid(head_uuid) raise PermissionDeniedError unless current_user.can?(manage: ob) # All permission links should be owned by the system user. self.owner_uuid = system_user_uuid @@ -104,4 +94,5 @@ class Link < ArvadosModel super end end + end