X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/7e8f99556391cc81c014b517a9fa6efed8fe8113..06cf38c24519fa21556686545c768429b5af50dc:/services/api/test/functional/arvados/v1/api_client_authorizations_controller_test.rb diff --git a/services/api/test/functional/arvados/v1/api_client_authorizations_controller_test.rb b/services/api/test/functional/arvados/v1/api_client_authorizations_controller_test.rb index 8877719b5b..192e6b956d 100644 --- a/services/api/test/functional/arvados/v1/api_client_authorizations_controller_test.rb +++ b/services/api/test/functional/arvados/v1/api_client_authorizations_controller_test.rb @@ -23,6 +23,7 @@ class Arvados::V1::ApiClientAuthorizationsControllerTest < ActionController::Tes authorize_with :admin_trustedclient post :create_system_auth, scopes: '["test"]' assert_response :success + assert_not_nil JSON.parse(@response.body)['uuid'] end test "prohibit create system auth with token from non-trusted client" do @@ -66,4 +67,81 @@ class Arvados::V1::ApiClientAuthorizationsControllerTest < ActionController::Tes assert_found_tokens(auth, {filters: [['scopes', '=', scopes]]}, *expected) end end + + [# anyone can look up the token they're currently using + [:admin, :admin, 200, 200, 1], + [:active, :active, 200, 200, 1], + # cannot look up other tokens (even for same user) if not trustedclient + [:admin, :active, 403, 403], + [:admin, :admin_vm, 403, 403], + [:active, :admin, 403, 403], + # cannot look up other tokens for other users, regardless of trustedclient + [:admin_trustedclient, :active, 404, 200, 0], + [:active_trustedclient, :admin, 404, 200, 0], + ].each do |user, token, expect_get_response, expect_list_response, expect_list_items| + test "using '#{user}', get '#{token}' by uuid" do + authorize_with user + get :show, { + id: api_client_authorizations(token).uuid, + } + assert_response expect_get_response + end + + test "using '#{user}', update '#{token}' by uuid" do + authorize_with user + put :update, { + id: api_client_authorizations(token).uuid, + api_client_authorization: {}, + } + assert_response expect_get_response + end + + test "using '#{user}', delete '#{token}' by uuid" do + authorize_with user + post :destroy, { + id: api_client_authorizations(token).uuid, + } + assert_response expect_get_response + end + + test "using '#{user}', list '#{token}' by uuid" do + authorize_with user + get :index, { + filters: [['uuid','=',api_client_authorizations(token).uuid]], + } + assert_response expect_list_response + if expect_list_items + assert_equal assigns(:objects).length, expect_list_items + end + end + + test "using '#{user}', list '#{token}' by token" do + authorize_with user + get :index, { + filters: [['api_token','=',api_client_authorizations(token).api_token]], + } + assert_response expect_list_response + if expect_list_items + assert_equal assigns(:objects).length, expect_list_items + end + end + end + + test "scoped token cannot change its own scopes" do + authorize_with :admin_vm + put :update, { + id: api_client_authorizations(:admin_vm).uuid, + api_client_authorization: {scopes: ['all']}, + } + assert_response 403 + end + + test "token cannot change its own uuid" do + authorize_with :admin + put :update, { + id: api_client_authorizations(:admin).uuid, + api_client_authorization: {uuid: 'zzzzz-gj3su-zzzzzzzzzzzzzzz'}, + } + assert_response 403 + end end