X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/ea6f25f0dde5c750eacea29662c19149c7800134..e8d1a643cdbc3a5f4c0e5c745da58d9f7e1248d8:/sdk/python/tests/fed-migrate/check.py diff --git a/sdk/python/tests/fed-migrate/check.py b/sdk/python/tests/fed-migrate/check.py index a2c0096165..e31ac05418 100644 --- a/sdk/python/tests/fed-migrate/check.py +++ b/sdk/python/tests/fed-migrate/check.py @@ -1,4 +1,9 @@ +# Copyright (C) The Arvados Authors. All rights reserved. +# +# SPDX-License-Identifier: Apache-2.0 + import arvados +import arvados.errors import json import sys @@ -21,7 +26,7 @@ def check_A(users): for i in range(1, 10): found = False for u in users["items"]: - if u["username"] == ("case%d" % i) and u["email"] == ("case%d@test" % i): + if u["username"] == ("case%d" % i) and u["email"] == ("case%d@test" % i) and u["first_name"] == ("Case%d" % i) and u["last_name"] == "Testuser": found = True by_username[u["username"]] = u["uuid"] assert found @@ -60,6 +65,7 @@ for i in range(2, 9): found = False for u in users["items"]: if (u["username"] == ("case%d" % i) and u["email"] == ("case%d@test" % i) and + u["first_name"] == ("Case%d" % i) and u["last_name"] == "Testuser" and u["uuid"] == by_username[u["username"]] and u["is_active"] is True): found = True assert found, "Not found case%i" % i @@ -67,6 +73,7 @@ for i in range(2, 9): found = False for u in users["items"]: if (u["username"] == "case9" and u["email"] == "case9@test" and + u["first_name"] == "Case9" and u["last_name"] == "Testuser" and u["uuid"] == by_username[u["username"]] and u["is_active"] is False): found = True assert found @@ -87,6 +94,7 @@ for i in (2, 4, 6, 7, 8): found = False for u in users["items"]: if (u["username"] == ("case%d" % i) and u["email"] == ("case%d@test" % i) and + u["first_name"] == ("Case%d" % i) and u["last_name"] == "Testuser" and u["uuid"] == by_username[u["username"]] and u["is_active"] is True): found = True assert found @@ -97,6 +105,7 @@ for i in (3, 5, 9): found = False for u in users["items"]: if (u["username"] == ("case%d" % i) and u["email"] == ("case%d@test" % i) and + u["first_name"] == ("Case%d" % i) and u["last_name"] == "Testuser" and u["uuid"] == by_username[u["username"]] and u["is_active"] is True): found = True assert not found @@ -105,4 +114,64 @@ for i in (3, 5, 9): users = apiC.users().list().execute() check_A(users) + +#### +# bug 16683 tests + +# Check that this query returns empty, instead of returning a 500 or +# 502 error. +# Yes, we're asking for a group from the users endpoint. This is not a +# mistake, this is something workbench does to populate the sharing +# dialog. +clusterID_B = apiB.configs().get().execute()["ClusterID"] +i = apiB.users().list(filters=[["uuid", "in", ["%s-j7d0g-fffffffffffffff" % clusterID_B]]], count="none").execute() +assert len(i["items"]) == 0 + +# Check that we can create a project and give a remote user access to it + +tok3 = apiA.api_client_authorizations().create(body={"api_client_authorization": {"owner_uuid": by_username["case3"]}}).execute() +tok4 = apiA.api_client_authorizations().create(body={"api_client_authorization": {"owner_uuid": by_username["case4"]}}).execute() + +v2_token3 = "v2/%s/%s" % (tok3["uuid"], tok3["api_token"]) +v2_token4 = "v2/%s/%s" % (tok4["uuid"], tok4["api_token"]) + +apiB_3 = arvados.api(host=j["arvados_api_hosts"][1], token=v2_token3, insecure=True) +apiB_4 = arvados.api(host=j["arvados_api_hosts"][1], token=v2_token4, insecure=True) + +assert apiB_3.users().current().execute()["uuid"] == by_username["case3"] +assert apiB_4.users().current().execute()["uuid"] == by_username["case4"] + +newproject = apiB_3.groups().create(body={"group_class": "project", + "name":"fed test project"}, + ensure_unique_name=True).execute() + +try: + # Expect to fail + apiB_4.groups().get(uuid=newproject["uuid"]).execute() +except arvados.errors.ApiError as e: + if e.resp['status'] == '404': + pass + else: + raise + +l = apiB_3.links().create(body={"link_class": "permission", + "name":"can_read", + "tail_uuid": by_username["case4"], + "head_uuid": newproject["uuid"]}).execute() + +# Expect to succeed +apiB_4.groups().get(uuid=newproject["uuid"]).execute() + +# remove permission +apiB_3.links().delete(uuid=l["uuid"]).execute() + +try: + # Expect to fail again + apiB_4.groups().get(uuid=newproject["uuid"]).execute() +except arvados.errors.ApiError as e: + if e.resp['status'] == '404': + pass + else: + raise + print("Passed checks")