X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/b96d5caa0056472fe67b82bd5305448d85c7d0cd..685db28b50225cde7dbb03aa2275f7a165d888a3:/services/api/test/unit/group_test.rb diff --git a/services/api/test/unit/group_test.rb b/services/api/test/unit/group_test.rb index 3d1fda927f..10932e116d 100644 --- a/services/api/test/unit/group_test.rb +++ b/services/api/test/unit/group_test.rb @@ -6,6 +6,7 @@ require 'test_helper' require 'fix_roles_projects' class GroupTest < ActiveSupport::TestCase + include DbCurrentTime test "cannot set owner_uuid to object with existing ownership cycle" do set_user_from_auth :active_trustedclient @@ -61,7 +62,7 @@ class GroupTest < ActiveSupport::TestCase assert g_foo.errors.messages[:owner_uuid].join(" ").match(/ownership cycle/) end - test "cannot create a group that is not a 'role' or 'project'" do + test "cannot create a group that is not a 'role' or 'project' or 'filter'" do set_user_from_auth :active_trustedclient assert_raises(ActiveRecord::RecordInvalid) do @@ -227,56 +228,13 @@ class GroupTest < ActiveSupport::TestCase assert User.readable_by(users(:admin)).where(uuid: u_bar.uuid).any? end - test "move projects to trash in SweepTrashedObjects" do - p = groups(:trashed_on_next_sweep) - assert_empty Group.where('uuid=? and is_trashed=true', p.uuid) - SweepTrashedObjects.sweep_now - assert_not_empty Group.where('uuid=? and is_trashed=true', p.uuid) - end - - test "delete projects and their contents in SweepTrashedObjects" do - g_foo = groups(:trashed_project) - g_bar = groups(:trashed_subproject) - g_baz = groups(:trashed_subproject3) - col = collections(:collection_in_trashed_subproject) - job = jobs(:job_in_trashed_project) - cr = container_requests(:cr_in_trashed_project) - # Save how many objects were before the sweep - user_nr_was = User.all.length - coll_nr_was = Collection.all.length - group_nr_was = Group.where('group_class<>?', 'project').length - project_nr_was = Group.where(group_class: 'project').length - cr_nr_was = ContainerRequest.all.length - job_nr_was = Job.all.length - assert_not_empty Group.where(uuid: g_foo.uuid) - assert_not_empty Group.where(uuid: g_bar.uuid) - assert_not_empty Group.where(uuid: g_baz.uuid) - assert_not_empty Collection.where(uuid: col.uuid) - assert_not_empty Job.where(uuid: job.uuid) - assert_not_empty ContainerRequest.where(uuid: cr.uuid) - SweepTrashedObjects.sweep_now - assert_empty Group.where(uuid: g_foo.uuid) - assert_empty Group.where(uuid: g_bar.uuid) - assert_empty Group.where(uuid: g_baz.uuid) - assert_empty Collection.where(uuid: col.uuid) - assert_empty Job.where(uuid: job.uuid) - assert_empty ContainerRequest.where(uuid: cr.uuid) - # No unwanted deletions should have happened - assert_equal user_nr_was, User.all.length - assert_equal coll_nr_was-2, # collection_in_trashed_subproject - Collection.all.length # & deleted_on_next_sweep collections - assert_equal group_nr_was, Group.where('group_class<>?', 'project').length - assert_equal project_nr_was-3, Group.where(group_class: 'project').length - assert_equal cr_nr_was-1, ContainerRequest.all.length - assert_equal job_nr_was-1, Job.all.length - end - test "project names must be displayable in a filesystem" do set_user_from_auth :active ["", "{SOLIDUS}"].each do |subst| Rails.configuration.Collections.ForwardSlashNameSubstitution = subst proj = Group.create group_class: "project" role = Group.create group_class: "role" + filt = Group.create group_class: "filter", properties: {"filters":[]} [[nil, true], ["", true], [".", false], @@ -290,7 +248,9 @@ class GroupTest < ActiveSupport::TestCase role.name = name assert_equal true, role.valid? proj.name = name - assert_equal valid, proj.valid?, "#{name.inspect} should be #{valid ? "valid" : "invalid"}" + assert_equal valid, proj.valid?, "project: #{name.inspect} should be #{valid ? "valid" : "invalid"}" + filt.name = name + assert_equal valid, filt.valid?, "filter: #{name.inspect} should be #{valid ? "valid" : "invalid"}" end end end @@ -317,6 +277,14 @@ insert into groups (uuid, owner_uuid, name, group_class, created_at, updated_at) g6 = insert_group Group.generate_uuid, system_user_uuid, 'name collision', 'role' g7 = insert_group Group.generate_uuid, users(:active).uuid, 'name collision', 'role' + g8 = insert_group Group.generate_uuid, users(:active).uuid, 'trashed with no class', nil + g8obj = Group.find_by_uuid(g8) + g8obj.trash_at = db_current_time + g8obj.delete_at = db_current_time + act_as_system_user do + g8obj.save!(validate: false) + end + refresh_permissions act_as_system_user do @@ -328,6 +296,7 @@ update links set tail_uuid='#{g5}' where uuid='#{l1.uuid}' end assert_equal nil, Group.find_by_uuid(g1).group_class + assert_equal nil, Group.find_by_uuid(g8).group_class assert_equal users(:active).uuid, Group.find_by_uuid(g2).owner_uuid assert_equal g3, Group.find_by_uuid(g4).owner_uuid assert !Link.where(tail_uuid: users(:active).uuid, head_uuid: g2, link_class: "permission", name: "can_manage").any? @@ -337,6 +306,7 @@ update links set tail_uuid='#{g5}' where uuid='#{l1.uuid}' fix_roles_projects assert_equal 'role', Group.find_by_uuid(g1).group_class + assert_equal 'role', Group.find_by_uuid(g8).group_class assert_equal system_user_uuid, Group.find_by_uuid(g2).owner_uuid assert_equal system_user_uuid, Group.find_by_uuid(g4).owner_uuid assert Link.where(tail_uuid: users(:active).uuid, head_uuid: g2, link_class: "permission", name: "can_manage").any?