|
|
@ -27,7 +27,7 @@ func TestRepoPermissionPublicNonOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// plain user
|
|
|
|
// plain user
|
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
|
|
|
perm, err := GetUserRepoPermission(repo, user) |
|
|
|
perm, err := GetUserRepoPermission(db.DefaultContext, repo, user) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -36,7 +36,7 @@ func TestRepoPermissionPublicNonOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// change to collaborator
|
|
|
|
// change to collaborator
|
|
|
|
assert.NoError(t, AddCollaborator(repo, user)) |
|
|
|
assert.NoError(t, AddCollaborator(repo, user)) |
|
|
|
perm, err = GetUserRepoPermission(repo, user) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, user) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -45,7 +45,7 @@ func TestRepoPermissionPublicNonOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// collaborator
|
|
|
|
// collaborator
|
|
|
|
collaborator := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 4}).(*user_model.User) |
|
|
|
collaborator := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 4}).(*user_model.User) |
|
|
|
perm, err = GetUserRepoPermission(repo, collaborator) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, collaborator) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -54,7 +54,7 @@ func TestRepoPermissionPublicNonOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// owner
|
|
|
|
// owner
|
|
|
|
owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5}).(*user_model.User) |
|
|
|
owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5}).(*user_model.User) |
|
|
|
perm, err = GetUserRepoPermission(repo, owner) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, owner) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -63,7 +63,7 @@ func TestRepoPermissionPublicNonOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// admin
|
|
|
|
// admin
|
|
|
|
admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}).(*user_model.User) |
|
|
|
admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}).(*user_model.User) |
|
|
|
perm, err = GetUserRepoPermission(repo, admin) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, admin) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -80,7 +80,7 @@ func TestRepoPermissionPrivateNonOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// plain user
|
|
|
|
// plain user
|
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 4}).(*user_model.User) |
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 4}).(*user_model.User) |
|
|
|
perm, err := GetUserRepoPermission(repo, user) |
|
|
|
perm, err := GetUserRepoPermission(db.DefaultContext, repo, user) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.False(t, perm.CanRead(unit.Type)) |
|
|
|
assert.False(t, perm.CanRead(unit.Type)) |
|
|
@ -89,7 +89,7 @@ func TestRepoPermissionPrivateNonOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// change to collaborator to default write access
|
|
|
|
// change to collaborator to default write access
|
|
|
|
assert.NoError(t, AddCollaborator(repo, user)) |
|
|
|
assert.NoError(t, AddCollaborator(repo, user)) |
|
|
|
perm, err = GetUserRepoPermission(repo, user) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, user) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -97,7 +97,7 @@ func TestRepoPermissionPrivateNonOrgRepo(t *testing.T) { |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
assert.NoError(t, ChangeCollaborationAccessMode(repo, user.ID, perm_model.AccessModeRead)) |
|
|
|
assert.NoError(t, ChangeCollaborationAccessMode(repo, user.ID, perm_model.AccessModeRead)) |
|
|
|
perm, err = GetUserRepoPermission(repo, user) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, user) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -106,7 +106,7 @@ func TestRepoPermissionPrivateNonOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// owner
|
|
|
|
// owner
|
|
|
|
owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
|
|
|
owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
|
|
|
perm, err = GetUserRepoPermission(repo, owner) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, owner) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -115,7 +115,7 @@ func TestRepoPermissionPrivateNonOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// admin
|
|
|
|
// admin
|
|
|
|
admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}).(*user_model.User) |
|
|
|
admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}).(*user_model.User) |
|
|
|
perm, err = GetUserRepoPermission(repo, admin) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, admin) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -132,7 +132,7 @@ func TestRepoPermissionPublicOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// plain user
|
|
|
|
// plain user
|
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5}).(*user_model.User) |
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5}).(*user_model.User) |
|
|
|
perm, err := GetUserRepoPermission(repo, user) |
|
|
|
perm, err := GetUserRepoPermission(db.DefaultContext, repo, user) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -141,7 +141,7 @@ func TestRepoPermissionPublicOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// change to collaborator to default write access
|
|
|
|
// change to collaborator to default write access
|
|
|
|
assert.NoError(t, AddCollaborator(repo, user)) |
|
|
|
assert.NoError(t, AddCollaborator(repo, user)) |
|
|
|
perm, err = GetUserRepoPermission(repo, user) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, user) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -149,7 +149,7 @@ func TestRepoPermissionPublicOrgRepo(t *testing.T) { |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
assert.NoError(t, ChangeCollaborationAccessMode(repo, user.ID, perm_model.AccessModeRead)) |
|
|
|
assert.NoError(t, ChangeCollaborationAccessMode(repo, user.ID, perm_model.AccessModeRead)) |
|
|
|
perm, err = GetUserRepoPermission(repo, user) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, user) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -158,7 +158,7 @@ func TestRepoPermissionPublicOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// org member team owner
|
|
|
|
// org member team owner
|
|
|
|
owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
|
|
|
owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
|
|
|
perm, err = GetUserRepoPermission(repo, owner) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, owner) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -167,7 +167,7 @@ func TestRepoPermissionPublicOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// org member team tester
|
|
|
|
// org member team tester
|
|
|
|
member := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 15}).(*user_model.User) |
|
|
|
member := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 15}).(*user_model.User) |
|
|
|
perm, err = GetUserRepoPermission(repo, member) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, member) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -177,7 +177,7 @@ func TestRepoPermissionPublicOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// admin
|
|
|
|
// admin
|
|
|
|
admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}).(*user_model.User) |
|
|
|
admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}).(*user_model.User) |
|
|
|
perm, err = GetUserRepoPermission(repo, admin) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, admin) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -194,7 +194,7 @@ func TestRepoPermissionPrivateOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// plain user
|
|
|
|
// plain user
|
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5}).(*user_model.User) |
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5}).(*user_model.User) |
|
|
|
perm, err := GetUserRepoPermission(repo, user) |
|
|
|
perm, err := GetUserRepoPermission(db.DefaultContext, repo, user) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.False(t, perm.CanRead(unit.Type)) |
|
|
|
assert.False(t, perm.CanRead(unit.Type)) |
|
|
@ -203,7 +203,7 @@ func TestRepoPermissionPrivateOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// change to collaborator to default write access
|
|
|
|
// change to collaborator to default write access
|
|
|
|
assert.NoError(t, AddCollaborator(repo, user)) |
|
|
|
assert.NoError(t, AddCollaborator(repo, user)) |
|
|
|
perm, err = GetUserRepoPermission(repo, user) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, user) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -211,7 +211,7 @@ func TestRepoPermissionPrivateOrgRepo(t *testing.T) { |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
assert.NoError(t, ChangeCollaborationAccessMode(repo, user.ID, perm_model.AccessModeRead)) |
|
|
|
assert.NoError(t, ChangeCollaborationAccessMode(repo, user.ID, perm_model.AccessModeRead)) |
|
|
|
perm, err = GetUserRepoPermission(repo, user) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, user) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -220,7 +220,7 @@ func TestRepoPermissionPrivateOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// org member team owner
|
|
|
|
// org member team owner
|
|
|
|
owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 15}).(*user_model.User) |
|
|
|
owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 15}).(*user_model.User) |
|
|
|
perm, err = GetUserRepoPermission(repo, owner) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, owner) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -231,7 +231,7 @@ func TestRepoPermissionPrivateOrgRepo(t *testing.T) { |
|
|
|
team := unittest.AssertExistsAndLoadBean(t, &organization.Team{ID: 5}).(*organization.Team) |
|
|
|
team := unittest.AssertExistsAndLoadBean(t, &organization.Team{ID: 5}).(*organization.Team) |
|
|
|
err = organization.UpdateTeamUnits(team, nil) |
|
|
|
err = organization.UpdateTeamUnits(team, nil) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
perm, err = GetUserRepoPermission(repo, owner) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, owner) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
@ -240,7 +240,7 @@ func TestRepoPermissionPrivateOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// org member team tester
|
|
|
|
// org member team tester
|
|
|
|
tester := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
|
|
|
tester := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
|
|
|
perm, err = GetUserRepoPermission(repo, tester) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, tester) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.True(t, perm.CanWrite(unit.TypeIssues)) |
|
|
|
assert.True(t, perm.CanWrite(unit.TypeIssues)) |
|
|
|
assert.False(t, perm.CanWrite(unit.TypeCode)) |
|
|
|
assert.False(t, perm.CanWrite(unit.TypeCode)) |
|
|
@ -248,7 +248,7 @@ func TestRepoPermissionPrivateOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// org member team reviewer
|
|
|
|
// org member team reviewer
|
|
|
|
reviewer := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 20}).(*user_model.User) |
|
|
|
reviewer := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 20}).(*user_model.User) |
|
|
|
perm, err = GetUserRepoPermission(repo, reviewer) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, reviewer) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.False(t, perm.CanRead(unit.TypeIssues)) |
|
|
|
assert.False(t, perm.CanRead(unit.TypeIssues)) |
|
|
|
assert.False(t, perm.CanWrite(unit.TypeCode)) |
|
|
|
assert.False(t, perm.CanWrite(unit.TypeCode)) |
|
|
@ -256,7 +256,7 @@ func TestRepoPermissionPrivateOrgRepo(t *testing.T) { |
|
|
|
|
|
|
|
|
|
|
|
// admin
|
|
|
|
// admin
|
|
|
|
admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}).(*user_model.User) |
|
|
|
admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}).(*user_model.User) |
|
|
|
perm, err = GetUserRepoPermission(repo, admin) |
|
|
|
perm, err = GetUserRepoPermission(db.DefaultContext, repo, admin) |
|
|
|
assert.NoError(t, err) |
|
|
|
assert.NoError(t, err) |
|
|
|
for _, unit := range repo.Units { |
|
|
|
for _, unit := range repo.Units { |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|
assert.True(t, perm.CanRead(unit.Type)) |
|
|
|