X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/8a265d208908cd8fbfa808add745c3e842557dc0..6d2128ae15825ef03472897e09710b176e3cc1d9:/services/api/test/functional/arvados/v1/users_controller_test.rb diff --git a/services/api/test/functional/arvados/v1/users_controller_test.rb b/services/api/test/functional/arvados/v1/users_controller_test.rb index 55677cd58c..e1ebbb21f7 100644 --- a/services/api/test/functional/arvados/v1/users_controller_test.rb +++ b/services/api/test/functional/arvados/v1/users_controller_test.rb @@ -1,6 +1,7 @@ require 'test_helper' class Arvados::V1::UsersControllerTest < ActionController::TestCase + include CurrentApiClient setup do @all_links_at_start = Link.all @@ -12,7 +13,7 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase get :current assert_response :success me = JSON.parse(@response.body) - post :activate, uuid: me['uuid'] + post :activate, id: me['uuid'] assert_response :success assert_not_nil assigns(:object) me = JSON.parse(@response.body) @@ -20,12 +21,37 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase end test "refuse to activate a user before signing UA" do + act_as_system_user do + required_uuids = Link.where("owner_uuid = ? and link_class = ? and name = ? and tail_uuid = ? and head_uuid like ?", + system_user_uuid, + 'signature', + 'require', + system_user_uuid, + Collection.uuid_like_pattern). + collect(&:head_uuid) + + assert required_uuids.length > 0 + + signed_uuids = Link.where(owner_uuid: system_user_uuid, + link_class: 'signature', + name: 'click', + tail_uuid: users(:inactive).uuid, + head_uuid: required_uuids). + collect(&:head_uuid) + + assert_equal 0, signed_uuids.length + end + authorize_with :inactive + get :current assert_response :success me = JSON.parse(@response.body) - post :activate, uuid: me['uuid'] + assert_equal false, me['is_active'] + + post :activate, id: me['uuid'] assert_response 403 + get :current assert_response :success me = JSON.parse(@response.body) @@ -37,12 +63,18 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase get :current assert_response :success me = JSON.parse(@response.body) - post :activate, uuid: me['uuid'] + post :activate, id: me['uuid'] assert_response :success me = JSON.parse(@response.body) assert_equal true, me['is_active'] end + test "respond 401 if given token exists but user record is missing" do + authorize_with :valid_token_deleted_user + get :current, {format: :json} + assert_response 401 + end + test "create new user with user as input" do authorize_with :admin post :create, user: { @@ -66,7 +98,7 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase repo_name: repo_name, openid_prefix: 'https://www.google.com/accounts/o8/id', user: { - uuid: "this_is_agreeable", + uuid: 'zzzzz-tpzed-abcdefghijklmno', first_name: "in_create_test_first_name", last_name: "test_last_name", email: "foo@example.com" @@ -76,14 +108,15 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase response_items = JSON.parse(@response.body)['items'] created = find_obj_in_resp response_items, 'User', nil + assert_equal 'in_create_test_first_name', created['first_name'] assert_not_nil created['uuid'], 'expected non-null uuid for the new user' - assert_equal 'this_is_agreeable', created['uuid'] + assert_equal 'zzzzz-tpzed-abcdefghijklmno', created['uuid'] assert_not_nil created['email'], 'expected non-nil email' - assert_nil created['identity_url'], 'expected no identity_url' + assert_nil created['identity_url'], 'expected no identity_url' # arvados#user, repo link and link add user to 'All users' group - verify_num_links @all_links_at_start, 3 + verify_num_links @all_links_at_start, 4 verify_link response_items, 'arvados#user', true, 'permission', 'can_login', created['uuid'], created['email'], 'arvados#user', false, 'User' @@ -97,13 +130,15 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase verify_link response_items, 'arvados#virtualMachine', false, 'permission', 'can_login', nil, created['uuid'], 'arvados#virtualMachine', false, 'VirtualMachine' + verify_system_group_permission_link_for created['uuid'] + # invoke setup again with the same data post :setup, { repo_name: repo_name, vm_uuid: @vm_uuid, openid_prefix: 'https://www.google.com/accounts/o8/id', user: { - uuid: "this_is_agreeable", + uuid: 'zzzzz-tpzed-abcdefghijklmno', first_name: "in_create_test_first_name", last_name: "test_last_name", email: "foo@example.com" @@ -115,12 +150,12 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase created = find_obj_in_resp response_items, 'User', nil assert_equal 'in_create_test_first_name', created['first_name'] assert_not_nil created['uuid'], 'expected non-null uuid for the new user' - assert_equal 'this_is_agreeable', created['uuid'] + assert_equal 'zzzzz-tpzed-abcdefghijklmno', created['uuid'] assert_not_nil created['email'], 'expected non-nil email' assert_nil created['identity_url'], 'expected no identity_url' # arvados#user, repo link and link add user to 'All users' group - verify_num_links @all_links_at_start, 4 + verify_num_links @all_links_at_start, 5 verify_link response_items, 'arvados#repository', true, 'permission', 'can_write', repo_name, created['uuid'], 'arvados#repository', true, 'Repository' @@ -130,6 +165,8 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase verify_link response_items, 'arvados#virtualMachine', true, 'permission', 'can_login', @vm_uuid, created['uuid'], 'arvados#virtualMachine', false, 'VirtualMachine' + + verify_system_group_permission_link_for created['uuid'] end test "setup user with bogus uuid and expect error" do @@ -198,7 +235,7 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase get :current assert_response :success inactive_user = JSON.parse(@response.body) - + authorize_with :admin post :setup, { @@ -214,7 +251,7 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase assert_not_nil resp_obj['uuid'], 'expected uuid for the new user' assert_equal inactive_user['uuid'], resp_obj['uuid'] - assert_equal inactive_user['email'], resp_obj['email'], + assert_equal inactive_user['email'], resp_obj['email'], 'expecting inactive user email' # expect repo and vm links @@ -230,7 +267,7 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase get :current assert_response :success inactive_user = JSON.parse(@response.body) - + authorize_with :admin post :setup, { @@ -245,7 +282,7 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase assert_not_nil resp_obj['uuid'], 'expected uuid for the new user' assert_equal inactive_user['uuid'], resp_obj['uuid'] - assert_equal inactive_user['email'], resp_obj['email'], + assert_equal inactive_user['email'], resp_obj['email'], 'expecting inactive user email' end @@ -254,7 +291,7 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase get :current assert_response :success inactive_user = JSON.parse(@response.body) - + authorize_with :admin post :setup, { @@ -269,7 +306,7 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase assert_not_nil resp_obj['uuid'], 'expected uuid for the new user' assert_equal inactive_user['uuid'], resp_obj['uuid'] - assert_equal inactive_user['email'], resp_obj['email'], + assert_equal inactive_user['email'], resp_obj['email'], 'expecting inactive user email' end @@ -288,8 +325,8 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase assert_not_nil response_object['uuid'], 'expected uuid for the new user' assert_equal response_object['email'], 'foo@example.com', 'expected given email' - # three extra links; login link, group link and repo link - verify_num_links @all_links_at_start, 3 + # four extra links; system_group, login, group and repo perms + verify_num_links @all_links_at_start, 4 end test "setup user with fake vm and expect error" do @@ -305,7 +342,7 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase response_body = JSON.parse(@response.body) response_errors = response_body['errors'] assert_not_nil response_errors, 'Expected error in response' - assert (response_errors.first.include? "No vm found for no_such_vm"), + assert (response_errors.first.include? "No vm found for no_such_vm"), 'Expected RuntimeError: No vm found for no_such_vm' end @@ -325,8 +362,8 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase assert_not_nil response_object['uuid'], 'expected uuid for the new user' assert_equal response_object['email'], 'foo@example.com', 'expected given email' - # three extra links; login link, group link and repo link - verify_num_links @all_links_at_start, 4 + # five extra links; system_group, login, group, vm, repo + verify_num_links @all_links_at_start, 5 end test "setup user with valid email, no vm and repo as input" do @@ -337,14 +374,14 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase openid_prefix: 'https://www.google.com/accounts/o8/id' } - assert_response :success + assert_response :success response_items = JSON.parse(@response.body)['items'] response_object = find_obj_in_resp response_items, 'User', nil assert_not_nil response_object['uuid'], 'expected uuid for new user' assert_equal response_object['email'], 'foo@example.com', 'expected given email' - # two extra links; login link and group link - verify_num_links @all_links_at_start, 2 + # three extra links; system_group, login, and group + verify_num_links @all_links_at_start, 3 end test "setup user with email, first name, repo name and vm uuid" do @@ -365,11 +402,11 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase response_object = find_obj_in_resp response_items, 'User', nil assert_not_nil response_object['uuid'], 'expected uuid for new user' assert_equal response_object['email'], 'foo@example.com', 'expected given email' - assert_equal 'test_first_name', response_object['first_name'], + assert_equal 'test_first_name', response_object['first_name'], 'expecting first name' - # four extra links; login link, group link, repo link and vm link - verify_num_links @all_links_at_start, 4 + # five extra links; system_group, login, group, repo and vm + verify_num_links @all_links_at_start, 5 end test "setup user twice with email and check two different objects created" do @@ -388,7 +425,8 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase response_object = find_obj_in_resp response_items, 'User', nil assert_not_nil response_object['uuid'], 'expected uuid for new user' assert_equal response_object['email'], 'foo@example.com', 'expected given email' - verify_num_links @all_links_at_start, 3 # openid, group, and repo. no vm + # system_group, openid, group, and repo. No vm link. + verify_num_links @all_links_at_start, 4 # create again post :setup, { @@ -399,12 +437,15 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase assert_response :success response_items = JSON.parse(@response.body)['items'] response_object2 = find_obj_in_resp response_items, 'User', nil - assert_not_equal response_object['uuid'], response_object2['uuid'], + assert_not_equal response_object['uuid'], response_object2['uuid'], 'expected same uuid as first create operation' assert_equal response_object['email'], 'foo@example.com', 'expected given email' - # extra login link only - verify_num_links @all_links_at_start, 4 + # +1 extra can_read 'all users' group link + # +1 extra system_group can_manage link pointing to the new User + # +1 extra can_login permission link + # no repo link, no vm link + verify_num_links @all_links_at_start, 7 end test "setup user with openid prefix" do @@ -428,11 +469,11 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase assert_equal 'in_create_test_first_name', created['first_name'] assert_not_nil created['uuid'], 'expected uuid for new user' assert_not_nil created['email'], 'expected non-nil email' - assert_nil created['identity_url'], 'expected no identity_url' + assert_nil created['identity_url'], 'expected no identity_url' # verify links - # 3 new links: arvados#user, repo, and 'All users' group. - verify_num_links @all_links_at_start, 3 + # four new links: system_group, arvados#user, repo, and 'All users' group. + verify_num_links @all_links_at_start, 4 verify_link response_items, 'arvados#user', true, 'permission', 'can_login', created['uuid'], created['email'], 'arvados#user', false, 'User' @@ -488,10 +529,11 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase assert_equal 'in_create_test_first_name', created['first_name'] assert_not_nil created['uuid'], 'expected uuid for new user' assert_not_nil created['email'], 'expected non-nil email' - assert_nil created['identity_url'], 'expected no identity_url' + assert_nil created['identity_url'], 'expected no identity_url' - # expect 4 new links: arvados#user, repo, vm and 'All users' group link - verify_num_links @all_links_at_start, 4 + # five new links: system_group, arvados#user, repo, vm and 'All + # users' group link + verify_num_links @all_links_at_start, 5 verify_link response_items, 'arvados#user', true, 'permission', 'can_login', created['uuid'], created['email'], 'arvados#user', false, 'User' @@ -502,7 +544,7 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase verify_link response_items, 'arvados#group', true, 'permission', 'can_read', 'All users', created['uuid'], 'arvados#group', true, 'Group' - verify_link response_items, 'arvados#virtualMachine', true, 'permission', 'can_login', + verify_link response_items, 'arvados#virtualMachine', true, 'permission', 'can_login', @vm_uuid, created['uuid'], 'arvados#virtualMachine', false, 'VirtualMachine' end @@ -516,7 +558,7 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase response_body = JSON.parse(@response.body) response_errors = response_body['errors'] assert_not_nil response_errors, 'Expected error in response' - assert (response_errors.first.include? 'PermissionDenied'), + assert (response_errors.first.include? 'PermissionDenied'), 'Expected PermissionDeniedError' end @@ -530,9 +572,8 @@ class Arvados::V1::UsersControllerTest < ActionController::TestCase response_body = JSON.parse(@response.body) response_errors = response_body['errors'] -puts "\n*********response_errors = #{response_errors.inspect}" assert_not_nil response_errors, 'Expected error in response' - assert (response_errors.first.include? 'Forbidden'), + assert (response_errors.first.include? 'Forbidden'), 'Expected Forbidden error' end @@ -554,8 +595,8 @@ puts "\n*********response_errors = #{response_errors.inspect}" assert_not_nil created['email'], 'expected non-nil email' assert_equal created['email'], 'foo@example.com', 'expected input email' - # verify links; 2 new links: arvados#user, and 'All users' group. - verify_num_links @all_links_at_start, 2 + # three new links: system_group, arvados#user, and 'All users' group. + verify_num_links @all_links_at_start, 3 verify_link response_items, 'arvados#user', true, 'permission', 'can_login', created['uuid'], created['email'], 'arvados#user', false, 'User' @@ -638,8 +679,8 @@ puts "\n*********response_errors = #{response_errors.inspect}" assert_not_nil created['uuid'], 'expected uuid for the new user' assert_equal created['email'], 'foo@example.com', 'expected given email' - # 4 extra links: login, group, repo and vm - verify_num_links @all_links_at_start, 4 + # five extra links: system_group, login, group, repo and vm + verify_num_links @all_links_at_start, 5 verify_link response_items, 'arvados#user', true, 'permission', 'can_login', created['uuid'], created['email'], 'arvados#user', false, 'User' @@ -653,17 +694,17 @@ puts "\n*********response_errors = #{response_errors.inspect}" verify_link response_items, 'arvados#virtualMachine', true, 'permission', 'can_login', @vm_uuid, created['uuid'], 'arvados#virtualMachine', false, 'VirtualMachine' - verify_link_existence created['uuid'], created['email'], true, true, true, false + verify_link_existence created['uuid'], created['email'], true, true, true, true, false # now unsetup this user - post :unsetup, uuid: created['uuid'] + post :unsetup, id: created['uuid'] assert_response :success created2 = JSON.parse(@response.body) assert_not_nil created2['uuid'], 'expected uuid for the newly created user' assert_equal created['uuid'], created2['uuid'], 'expected uuid not found' - - verify_link_existence created['uuid'], created['email'], false, false, false, false + + verify_link_existence created['uuid'], created['email'], false, false, false, false, false end test "unsetup active user" do @@ -673,28 +714,82 @@ puts "\n*********response_errors = #{response_errors.inspect}" active_user = JSON.parse(@response.body) assert_not_nil active_user['uuid'], 'expected uuid for the active user' assert active_user['is_active'], 'expected is_active for active user' + assert active_user['is_invited'], 'expected is_invited for active user' verify_link_existence active_user['uuid'], active_user['email'], - false, false, false, true + false, false, false, true, true authorize_with :admin # now unsetup this user - post :unsetup, uuid: active_user['uuid'] + post :unsetup, id: active_user['uuid'] assert_response :success response_user = JSON.parse(@response.body) assert_not_nil response_user['uuid'], 'expected uuid for the upsetup user' assert_equal active_user['uuid'], response_user['uuid'], 'expected uuid not found' assert !response_user['is_active'], 'expected user to be inactive' + assert !response_user['is_invited'], 'expected user to be uninvited' verify_link_existence response_user['uuid'], response_user['email'], - false, false, false, false + false, false, false, false, false + end + + test "setup user with send notification param false and verify no email" do + authorize_with :admin + + post :setup, { + openid_prefix: 'http://www.example.com/account', + send_notification_email: 'false', + user: { + email: "foo@example.com" + } + } + + assert_response :success + response_items = JSON.parse(@response.body)['items'] + created = find_obj_in_resp response_items, 'User', nil + assert_not_nil created['uuid'], 'expected uuid for the new user' + assert_equal created['email'], 'foo@example.com', 'expected given email' + + setup_email = ActionMailer::Base.deliveries.last + assert_nil setup_email, 'expected no setup email' + end + + test "setup user with send notification param true and verify email" do + authorize_with :admin + + post :setup, { + openid_prefix: 'http://www.example.com/account', + send_notification_email: 'true', + user: { + email: "foo@example.com" + } + } + + assert_response :success + response_items = JSON.parse(@response.body)['items'] + created = find_obj_in_resp response_items, 'User', nil + assert_not_nil created['uuid'], 'expected uuid for the new user' + assert_equal created['email'], 'foo@example.com', 'expected given email' + + setup_email = ActionMailer::Base.deliveries.last + assert_not_nil setup_email, 'Expected email after setup' + + assert_equal Rails.configuration.user_notifier_email_from, setup_email.from[0] + assert_equal 'foo@example.com', setup_email.to[0] + assert_equal 'Welcome to Curoverse', setup_email.subject + assert (setup_email.body.to_s.include? 'Your Arvados account has been set up'), + 'Expected Your Arvados account has been set up in email body' + assert (setup_email.body.to_s.include? 'foo@example.com'), + 'Expected user email in email body' + assert (setup_email.body.to_s.include? Rails.configuration.workbench_address), + 'Expected workbench url in email body' end def verify_num_links (original_links, expected_additional_links) links_now = Link.all - assert_equal original_links.size+expected_additional_links, Link.all.size, + assert_equal expected_additional_links, Link.all.size-original_links.size, "Expected #{expected_additional_links.inspect} more links" end @@ -706,12 +801,12 @@ puts "\n*********response_errors = #{response_errors.inspect}" end if object_type == 'User' - if !x['head_kind'] + if ArvadosModel::resource_class_for_uuid(x['uuid']) == User return_obj = x break end else # looking for a link - if x['head_kind'] == head_kind + if x['head_uuid'] and ArvadosModel::resource_class_for_uuid(x['head_uuid']).kind == head_kind return_obj = x break end @@ -725,7 +820,7 @@ puts "\n*********response_errors = #{response_errors.inspect}" link = find_obj_in_resp response_items, 'Link', link_object_name - if !expect_link + if !expect_link assert_nil link, "Expected no link for #{link_object_name}" return end @@ -737,29 +832,28 @@ puts "\n*********response_errors = #{response_errors.inspect}" assert [] != object, "expected #{class_name} with name #{head_uuid}" head_uuid = object.first[:uuid] end - assert_equal link['link_class'], link_class, + assert_equal link_class, link['link_class'], "did not find expected link_class for #{link_object_name}" - - assert_equal link['name'], link_name, + + assert_equal link_name, link['name'], "did not find expected link_name for #{link_object_name}" - - assert_equal link['tail_uuid'], tail_uuid, + + assert_equal tail_uuid, link['tail_uuid'], "did not find expected tail_uuid for #{link_object_name}" - - assert_equal link['head_kind'], head_kind, + + assert_equal head_kind, link['head_kind'], "did not find expected head_kind for #{link_object_name}" - - assert_equal link['head_uuid'], head_uuid, + + assert_equal head_uuid, link['head_uuid'], "did not find expected head_uuid for #{link_object_name}" end def verify_link_existence uuid, email, expect_oid_login_perms, - expect_repo_perms, expect_vm_perms, expect_signatures + expect_repo_perms, expect_vm_perms, expect_group_perms, expect_signatures # verify that all links are deleted for the user oid_login_perms = Link.where(tail_uuid: email, - head_kind: 'arvados#user', link_class: 'permission', - name: 'can_login') + name: 'can_login').where("head_uuid like ?", User.uuid_like_pattern) if expect_oid_login_perms assert oid_login_perms.any?, "expected oid_login_perms" else @@ -767,9 +861,8 @@ puts "\n*********response_errors = #{response_errors.inspect}" end repo_perms = Link.where(tail_uuid: uuid, - head_kind: 'arvados#repository', link_class: 'permission', - name: 'can_write') + name: 'can_write').where("head_uuid like ?", Repository.uuid_like_pattern) if expect_repo_perms assert repo_perms.any?, "expected repo_perms" else @@ -777,24 +870,118 @@ puts "\n*********response_errors = #{response_errors.inspect}" end vm_login_perms = Link.where(tail_uuid: uuid, - head_kind: 'arvados#virtualMachine', link_class: 'permission', - name: 'can_login') + name: 'can_login').where("head_uuid like ?", VirtualMachine.uuid_like_pattern) if expect_vm_perms assert vm_login_perms.any?, "expected vm_login_perms" else assert !vm_login_perms.any?, "expected all vm_login_perms deleted" end + group = Group.where(name: 'All users').select do |g| + g[:uuid].match /-f+$/ + end.first + group_read_perms = Link.where(tail_uuid: uuid, + head_uuid: group[:uuid], + link_class: 'permission', + name: 'can_read') + if expect_group_perms + assert group_read_perms.any?, "expected all users group read perms" + else + assert !group_read_perms.any?, "expected all users group perm deleted" + end + signed_uuids = Link.where(link_class: 'signature', - tail_kind: 'arvados#user', tail_uuid: uuid) - + if expect_signatures - assert signed_uuids.any?, "expected singnatures" + assert signed_uuids.any?, "expected signatures" else - assert !signed_uuids.any?, "expected all singnatures deleted" + assert !signed_uuids.any?, "expected all signatures deleted" end end + + def verify_system_group_permission_link_for user_uuid + assert_equal 1, Link.where(link_class: 'permission', + name: 'can_manage', + tail_uuid: system_group_uuid, + head_uuid: user_uuid).count + end + + test 'get user-owned objects' do + authorize_with :active + get :owned_items, { + id: users(:active).uuid, + limit: 500, + format: :json, + } + assert_response :success + assert_operator 2, :<=, json_response['items_available'] + assert_operator 2, :<=, json_response['items'].count + kinds = json_response['items'].collect { |i| i['kind'] }.uniq + expect_kinds = %w'arvados#group arvados#specimen arvados#pipelineTemplate arvados#job' + assert_equal expect_kinds, (expect_kinds & kinds) + end + + [false, true].each do |inc_ind| + test "get all pages of user-owned #{'and -linked ' if inc_ind}objects" do + authorize_with :active + limit = 5 + offset = 0 + items_available = nil + uuid_received = {} + owner_received = {} + while true + # Behaving badly here, using the same controller multiple + # times within a test. + @json_response = nil + get :owned_items, { + id: users(:active).uuid, + include_linked: inc_ind, + limit: limit, + offset: offset, + format: :json, + } + assert_response :success + assert_operator(0, :<, json_response['items'].count, + "items_available=#{items_available} but received 0 "\ + "items with offset=#{offset}") + items_available ||= json_response['items_available'] + assert_equal(items_available, json_response['items_available'], + "items_available changed between page #{offset/limit} "\ + "and page #{1+offset/limit}") + json_response['items'].each do |item| + uuid = item['uuid'] + assert_equal(nil, uuid_received[uuid], + "Received '#{uuid}' again on page #{1+offset/limit}") + uuid_received[uuid] = true + owner_received[item['owner_uuid']] = true + offset += 1 + if not inc_ind + assert_equal users(:active).uuid, item['owner_uuid'] + end + end + break if offset >= items_available + end + if inc_ind + assert_operator 0, :<, (json_response.keys - [users(:active).uuid]).count, + "Set include_linked=true but did not receive any non-owned items" + end + end + end + + %w(offset limit).each do |arg| + ['foo', '', '1234five', '0x10', '-8'].each do |val| + test "Raise error on bogus #{arg} parameter #{val.inspect}" do + authorize_with :active + get :owned_items, { + :id => users(:active).uuid, + :format => :json, + arg => val, + } + assert_response 422 + end + end + end end