[API] Add endpount to get user org permissions (#17232)
* Add endpoint * Add swagger response + generate swagger * Stop execution if user / org is not found * Add tests Co-authored-by: 6543 <6543@obermui.de>tokarchuk/v1.17
parent
7b8723158e
commit
d0a681fbc3
@ -0,0 +1,149 @@ |
|||||||
|
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a MIT-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package integrations |
||||||
|
|
||||||
|
import ( |
||||||
|
"fmt" |
||||||
|
"net/http" |
||||||
|
"testing" |
||||||
|
|
||||||
|
api "code.gitea.io/gitea/modules/structs" |
||||||
|
"github.com/stretchr/testify/assert" |
||||||
|
) |
||||||
|
|
||||||
|
type apiUserOrgPermTestCase struct { |
||||||
|
LoginUser string |
||||||
|
User string |
||||||
|
Organization string |
||||||
|
ExpectedOrganizationPermissions api.OrganizationPermissions |
||||||
|
} |
||||||
|
|
||||||
|
func TestTokenNeeded(t *testing.T) { |
||||||
|
defer prepareTestEnv(t)() |
||||||
|
|
||||||
|
session := emptyTestSession(t) |
||||||
|
req := NewRequest(t, "GET", "/api/v1/users/user1/orgs/user6/permissions") |
||||||
|
session.MakeRequest(t, req, http.StatusUnauthorized) |
||||||
|
} |
||||||
|
|
||||||
|
func sampleTest(t *testing.T, auoptc apiUserOrgPermTestCase) { |
||||||
|
defer prepareTestEnv(t)() |
||||||
|
|
||||||
|
session := loginUser(t, auoptc.LoginUser) |
||||||
|
token := getTokenForLoggedInUser(t, session) |
||||||
|
|
||||||
|
req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/users/%s/orgs/%s/permissions?token=%s", auoptc.User, auoptc.Organization, token)) |
||||||
|
resp := session.MakeRequest(t, req, http.StatusOK) |
||||||
|
|
||||||
|
var apiOP api.OrganizationPermissions |
||||||
|
DecodeJSON(t, resp, &apiOP) |
||||||
|
assert.Equal(t, auoptc.ExpectedOrganizationPermissions.IsOwner, apiOP.IsOwner) |
||||||
|
assert.Equal(t, auoptc.ExpectedOrganizationPermissions.IsAdmin, apiOP.IsAdmin) |
||||||
|
assert.Equal(t, auoptc.ExpectedOrganizationPermissions.CanWrite, apiOP.CanWrite) |
||||||
|
assert.Equal(t, auoptc.ExpectedOrganizationPermissions.CanRead, apiOP.CanRead) |
||||||
|
assert.Equal(t, auoptc.ExpectedOrganizationPermissions.CanCreateRepository, apiOP.CanCreateRepository) |
||||||
|
} |
||||||
|
|
||||||
|
func TestWithOwnerUser(t *testing.T) { |
||||||
|
sampleTest(t, apiUserOrgPermTestCase{ |
||||||
|
LoginUser: "user2", |
||||||
|
User: "user2", |
||||||
|
Organization: "user3", |
||||||
|
ExpectedOrganizationPermissions: api.OrganizationPermissions{ |
||||||
|
IsOwner: true, |
||||||
|
IsAdmin: true, |
||||||
|
CanWrite: true, |
||||||
|
CanRead: true, |
||||||
|
CanCreateRepository: true, |
||||||
|
}, |
||||||
|
}) |
||||||
|
} |
||||||
|
|
||||||
|
func TestCanWriteUser(t *testing.T) { |
||||||
|
sampleTest(t, apiUserOrgPermTestCase{ |
||||||
|
LoginUser: "user4", |
||||||
|
User: "user4", |
||||||
|
Organization: "user3", |
||||||
|
ExpectedOrganizationPermissions: api.OrganizationPermissions{ |
||||||
|
IsOwner: false, |
||||||
|
IsAdmin: false, |
||||||
|
CanWrite: true, |
||||||
|
CanRead: true, |
||||||
|
CanCreateRepository: false, |
||||||
|
}, |
||||||
|
}) |
||||||
|
} |
||||||
|
|
||||||
|
func TestAdminUser(t *testing.T) { |
||||||
|
sampleTest(t, apiUserOrgPermTestCase{ |
||||||
|
LoginUser: "user1", |
||||||
|
User: "user28", |
||||||
|
Organization: "user3", |
||||||
|
ExpectedOrganizationPermissions: api.OrganizationPermissions{ |
||||||
|
IsOwner: false, |
||||||
|
IsAdmin: true, |
||||||
|
CanWrite: true, |
||||||
|
CanRead: true, |
||||||
|
CanCreateRepository: true, |
||||||
|
}, |
||||||
|
}) |
||||||
|
} |
||||||
|
|
||||||
|
func TestAdminCanNotCreateRepo(t *testing.T) { |
||||||
|
sampleTest(t, apiUserOrgPermTestCase{ |
||||||
|
LoginUser: "user1", |
||||||
|
User: "user28", |
||||||
|
Organization: "user6", |
||||||
|
ExpectedOrganizationPermissions: api.OrganizationPermissions{ |
||||||
|
IsOwner: false, |
||||||
|
IsAdmin: true, |
||||||
|
CanWrite: true, |
||||||
|
CanRead: true, |
||||||
|
CanCreateRepository: false, |
||||||
|
}, |
||||||
|
}) |
||||||
|
} |
||||||
|
|
||||||
|
func TestCanReadUser(t *testing.T) { |
||||||
|
sampleTest(t, apiUserOrgPermTestCase{ |
||||||
|
LoginUser: "user1", |
||||||
|
User: "user24", |
||||||
|
Organization: "org25", |
||||||
|
ExpectedOrganizationPermissions: api.OrganizationPermissions{ |
||||||
|
IsOwner: false, |
||||||
|
IsAdmin: false, |
||||||
|
CanWrite: false, |
||||||
|
CanRead: true, |
||||||
|
CanCreateRepository: false, |
||||||
|
}, |
||||||
|
}) |
||||||
|
} |
||||||
|
|
||||||
|
func TestUnknowUser(t *testing.T) { |
||||||
|
defer prepareTestEnv(t)() |
||||||
|
|
||||||
|
session := loginUser(t, "user1") |
||||||
|
token := getTokenForLoggedInUser(t, session) |
||||||
|
|
||||||
|
req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/users/unknow/orgs/org25/permissions?token=%s", token)) |
||||||
|
resp := session.MakeRequest(t, req, http.StatusNotFound) |
||||||
|
|
||||||
|
var apiError api.APIError |
||||||
|
DecodeJSON(t, resp, &apiError) |
||||||
|
assert.Equal(t, "GetUserByName", apiError.Message) |
||||||
|
} |
||||||
|
|
||||||
|
func TestUnknowOrganization(t *testing.T) { |
||||||
|
defer prepareTestEnv(t)() |
||||||
|
|
||||||
|
session := loginUser(t, "user1") |
||||||
|
token := getTokenForLoggedInUser(t, session) |
||||||
|
|
||||||
|
req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/users/user1/orgs/unknow/permissions?token=%s", token)) |
||||||
|
resp := session.MakeRequest(t, req, http.StatusNotFound) |
||||||
|
var apiError api.APIError |
||||||
|
DecodeJSON(t, resp, &apiError) |
||||||
|
assert.Equal(t, "GetUserByName", apiError.Message) |
||||||
|
} |
Loading…
Reference in new issue