mirror of https://github.com/go-gitea/gitea
[API] Add endpount to get user org permissions (#17232)
* Add endpoint * Add swagger response + generate swagger * Stop execution if user / org is not found * Add tests Co-authored-by: 6543 <6543@obermui.de>pull/16770/head^2
parent
7b8723158e
commit
d0a681fbc3
@ -0,0 +1,149 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package integrations |
||||
|
||||
import ( |
||||
"fmt" |
||||
"net/http" |
||||
"testing" |
||||
|
||||
api "code.gitea.io/gitea/modules/structs" |
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
type apiUserOrgPermTestCase struct { |
||||
LoginUser string |
||||
User string |
||||
Organization string |
||||
ExpectedOrganizationPermissions api.OrganizationPermissions |
||||
} |
||||
|
||||
func TestTokenNeeded(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
|
||||
session := emptyTestSession(t) |
||||
req := NewRequest(t, "GET", "/api/v1/users/user1/orgs/user6/permissions") |
||||
session.MakeRequest(t, req, http.StatusUnauthorized) |
||||
} |
||||
|
||||
func sampleTest(t *testing.T, auoptc apiUserOrgPermTestCase) { |
||||
defer prepareTestEnv(t)() |
||||
|
||||
session := loginUser(t, auoptc.LoginUser) |
||||
token := getTokenForLoggedInUser(t, session) |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/users/%s/orgs/%s/permissions?token=%s", auoptc.User, auoptc.Organization, token)) |
||||
resp := session.MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var apiOP api.OrganizationPermissions |
||||
DecodeJSON(t, resp, &apiOP) |
||||
assert.Equal(t, auoptc.ExpectedOrganizationPermissions.IsOwner, apiOP.IsOwner) |
||||
assert.Equal(t, auoptc.ExpectedOrganizationPermissions.IsAdmin, apiOP.IsAdmin) |
||||
assert.Equal(t, auoptc.ExpectedOrganizationPermissions.CanWrite, apiOP.CanWrite) |
||||
assert.Equal(t, auoptc.ExpectedOrganizationPermissions.CanRead, apiOP.CanRead) |
||||
assert.Equal(t, auoptc.ExpectedOrganizationPermissions.CanCreateRepository, apiOP.CanCreateRepository) |
||||
} |
||||
|
||||
func TestWithOwnerUser(t *testing.T) { |
||||
sampleTest(t, apiUserOrgPermTestCase{ |
||||
LoginUser: "user2", |
||||
User: "user2", |
||||
Organization: "user3", |
||||
ExpectedOrganizationPermissions: api.OrganizationPermissions{ |
||||
IsOwner: true, |
||||
IsAdmin: true, |
||||
CanWrite: true, |
||||
CanRead: true, |
||||
CanCreateRepository: true, |
||||
}, |
||||
}) |
||||
} |
||||
|
||||
func TestCanWriteUser(t *testing.T) { |
||||
sampleTest(t, apiUserOrgPermTestCase{ |
||||
LoginUser: "user4", |
||||
User: "user4", |
||||
Organization: "user3", |
||||
ExpectedOrganizationPermissions: api.OrganizationPermissions{ |
||||
IsOwner: false, |
||||
IsAdmin: false, |
||||
CanWrite: true, |
||||
CanRead: true, |
||||
CanCreateRepository: false, |
||||
}, |
||||
}) |
||||
} |
||||
|
||||
func TestAdminUser(t *testing.T) { |
||||
sampleTest(t, apiUserOrgPermTestCase{ |
||||
LoginUser: "user1", |
||||
User: "user28", |
||||
Organization: "user3", |
||||
ExpectedOrganizationPermissions: api.OrganizationPermissions{ |
||||
IsOwner: false, |
||||
IsAdmin: true, |
||||
CanWrite: true, |
||||
CanRead: true, |
||||
CanCreateRepository: true, |
||||
}, |
||||
}) |
||||
} |
||||
|
||||
func TestAdminCanNotCreateRepo(t *testing.T) { |
||||
sampleTest(t, apiUserOrgPermTestCase{ |
||||
LoginUser: "user1", |
||||
User: "user28", |
||||
Organization: "user6", |
||||
ExpectedOrganizationPermissions: api.OrganizationPermissions{ |
||||
IsOwner: false, |
||||
IsAdmin: true, |
||||
CanWrite: true, |
||||
CanRead: true, |
||||
CanCreateRepository: false, |
||||
}, |
||||
}) |
||||
} |
||||
|
||||
func TestCanReadUser(t *testing.T) { |
||||
sampleTest(t, apiUserOrgPermTestCase{ |
||||
LoginUser: "user1", |
||||
User: "user24", |
||||
Organization: "org25", |
||||
ExpectedOrganizationPermissions: api.OrganizationPermissions{ |
||||
IsOwner: false, |
||||
IsAdmin: false, |
||||
CanWrite: false, |
||||
CanRead: true, |
||||
CanCreateRepository: false, |
||||
}, |
||||
}) |
||||
} |
||||
|
||||
func TestUnknowUser(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
|
||||
session := loginUser(t, "user1") |
||||
token := getTokenForLoggedInUser(t, session) |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/users/unknow/orgs/org25/permissions?token=%s", token)) |
||||
resp := session.MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
var apiError api.APIError |
||||
DecodeJSON(t, resp, &apiError) |
||||
assert.Equal(t, "GetUserByName", apiError.Message) |
||||
} |
||||
|
||||
func TestUnknowOrganization(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
|
||||
session := loginUser(t, "user1") |
||||
token := getTokenForLoggedInUser(t, session) |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/users/user1/orgs/unknow/permissions?token=%s", token)) |
||||
resp := session.MakeRequest(t, req, http.StatusNotFound) |
||||
var apiError api.APIError |
||||
DecodeJSON(t, resp, &apiError) |
||||
assert.Equal(t, "GetUserByName", apiError.Message) |
||||
} |
Loading…
Reference in new issue