X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/e3a4fe6e461ec3ffde76e973ada7abae52faf050..862a1fd23f072b7107595755996fc2ec1c62162b:/apps/workbench/test/functional/projects_controller_test.rb diff --git a/apps/workbench/test/functional/projects_controller_test.rb b/apps/workbench/test/functional/projects_controller_test.rb index a991cedd63..39c32ac4ac 100644 --- a/apps/workbench/test/functional/projects_controller_test.rb +++ b/apps/workbench/test/functional/projects_controller_test.rb @@ -28,4 +28,63 @@ class ProjectsControllerTest < ActionController::TestCase end end end + + test "sharing a project with a user and group" do + uuid_list = [api_fixture("groups")["future_project_viewing_group"]["uuid"], + api_fixture("users")["future_project_user"]["uuid"]] + post(:share_with, { + id: api_fixture("groups")["asubproject"]["uuid"], + uuids: uuid_list, + format: "json"}, + session_for(:active)) + assert_response :success + json_response = Oj.load(@response.body) + assert_equal(uuid_list, json_response["success"]) + end + + test "user with project read permission can't add permissions" do + share_uuid = api_fixture("users")["spectator"]["uuid"] + post(:share_with, { + id: api_fixture("groups")["aproject"]["uuid"], + uuids: [share_uuid], + format: "json"}, + session_for(:project_viewer)) + assert_response 422 + json_response = Oj.load(@response.body) + assert(json_response["errors"].andand. + any? { |msg| msg.start_with?("#{share_uuid}: ") }, + "JSON response missing properly formatted sharing error") + end + + def user_can_manage(user_sym, group_key) + get(:show, {id: api_fixture("groups")[group_key]["uuid"]}, + session_for(user_sym)) + is_manager = assigns(:user_is_manager) + assert_not_nil(is_manager, "user_is_manager flag not set") + if not is_manager + assert_empty(assigns(:share_links), + "non-manager has share links set") + end + is_manager + end + + test "admin can_manage aproject" do + assert user_can_manage(:admin, "aproject") + end + + test "owner can_manage aproject" do + assert user_can_manage(:active, "aproject") + end + + test "owner can_manage asubproject" do + assert user_can_manage(:active, "asubproject") + end + + test "viewer can't manage aproject" do + refute user_can_manage(:project_viewer, "aproject") + end + + test "viewer can't manage asubproject" do + refute user_can_manage(:project_viewer, "asubproject") + end end