github.com/mad-app/mattermost-server@v5.11.1+incompatible/api4/role_test.go (about) 1 // Copyright (c) 2018-present Mattermost, Inc. All Rights Reserved. 2 // See License.txt for license information. 3 4 package api4 5 6 import ( 7 "strings" 8 "testing" 9 10 "github.com/stretchr/testify/assert" 11 12 "github.com/mattermost/mattermost-server/model" 13 ) 14 15 func TestGetRole(t *testing.T) { 16 th := Setup().InitBasic() 17 defer th.TearDown() 18 19 role := &model.Role{ 20 Name: model.NewId(), 21 DisplayName: model.NewId(), 22 Description: model.NewId(), 23 Permissions: []string{"manage_system", "create_public_channel"}, 24 SchemeManaged: true, 25 } 26 27 res1 := <-th.App.Srv.Store.Role().Save(role) 28 assert.Nil(t, res1.Err) 29 role = res1.Data.(*model.Role) 30 defer th.App.Srv.Store.Job().Delete(role.Id) 31 32 received, resp := th.Client.GetRole(role.Id) 33 CheckNoError(t, resp) 34 35 assert.Equal(t, received.Id, role.Id) 36 assert.Equal(t, received.Name, role.Name) 37 assert.Equal(t, received.DisplayName, role.DisplayName) 38 assert.Equal(t, received.Description, role.Description) 39 assert.EqualValues(t, received.Permissions, role.Permissions) 40 assert.Equal(t, received.SchemeManaged, role.SchemeManaged) 41 42 _, resp = th.SystemAdminClient.GetRole("1234") 43 CheckBadRequestStatus(t, resp) 44 45 _, resp = th.SystemAdminClient.GetRole(model.NewId()) 46 CheckNotFoundStatus(t, resp) 47 } 48 49 func TestGetRoleByName(t *testing.T) { 50 th := Setup().InitBasic() 51 defer th.TearDown() 52 53 role := &model.Role{ 54 Name: model.NewId(), 55 DisplayName: model.NewId(), 56 Description: model.NewId(), 57 Permissions: []string{"manage_system", "create_public_channel"}, 58 SchemeManaged: true, 59 } 60 61 res1 := <-th.App.Srv.Store.Role().Save(role) 62 assert.Nil(t, res1.Err) 63 role = res1.Data.(*model.Role) 64 defer th.App.Srv.Store.Job().Delete(role.Id) 65 66 received, resp := th.Client.GetRoleByName(role.Name) 67 CheckNoError(t, resp) 68 69 assert.Equal(t, received.Id, role.Id) 70 assert.Equal(t, received.Name, role.Name) 71 assert.Equal(t, received.DisplayName, role.DisplayName) 72 assert.Equal(t, received.Description, role.Description) 73 assert.EqualValues(t, received.Permissions, role.Permissions) 74 assert.Equal(t, received.SchemeManaged, role.SchemeManaged) 75 76 _, resp = th.SystemAdminClient.GetRoleByName(strings.Repeat("abcdefghij", 10)) 77 CheckBadRequestStatus(t, resp) 78 79 _, resp = th.SystemAdminClient.GetRoleByName(model.NewId()) 80 CheckNotFoundStatus(t, resp) 81 } 82 83 func TestGetRolesByNames(t *testing.T) { 84 th := Setup().InitBasic() 85 defer th.TearDown() 86 87 role1 := &model.Role{ 88 Name: model.NewId(), 89 DisplayName: model.NewId(), 90 Description: model.NewId(), 91 Permissions: []string{"manage_system", "create_public_channel"}, 92 SchemeManaged: true, 93 } 94 role2 := &model.Role{ 95 Name: model.NewId(), 96 DisplayName: model.NewId(), 97 Description: model.NewId(), 98 Permissions: []string{"manage_system", "delete_private_channel"}, 99 SchemeManaged: true, 100 } 101 role3 := &model.Role{ 102 Name: model.NewId(), 103 DisplayName: model.NewId(), 104 Description: model.NewId(), 105 Permissions: []string{"manage_system", "manage_public_channel_properties"}, 106 SchemeManaged: true, 107 } 108 109 res1 := <-th.App.Srv.Store.Role().Save(role1) 110 assert.Nil(t, res1.Err) 111 role1 = res1.Data.(*model.Role) 112 defer th.App.Srv.Store.Job().Delete(role1.Id) 113 114 res2 := <-th.App.Srv.Store.Role().Save(role2) 115 assert.Nil(t, res2.Err) 116 role2 = res2.Data.(*model.Role) 117 defer th.App.Srv.Store.Job().Delete(role2.Id) 118 119 res3 := <-th.App.Srv.Store.Role().Save(role3) 120 assert.Nil(t, res3.Err) 121 role3 = res3.Data.(*model.Role) 122 defer th.App.Srv.Store.Job().Delete(role3.Id) 123 124 // Check all three roles can be found. 125 received, resp := th.Client.GetRolesByNames([]string{role1.Name, role2.Name, role3.Name}) 126 CheckNoError(t, resp) 127 128 assert.Contains(t, received, role1) 129 assert.Contains(t, received, role2) 130 assert.Contains(t, received, role3) 131 132 // Check a list of non-existent roles. 133 _, resp = th.Client.GetRolesByNames([]string{model.NewId(), model.NewId()}) 134 CheckNoError(t, resp) 135 136 // Empty list should error. 137 _, resp = th.SystemAdminClient.GetRolesByNames([]string{}) 138 CheckBadRequestStatus(t, resp) 139 140 // Invalid role name should error. 141 _, resp = th.Client.GetRolesByNames([]string{model.NewId(), model.NewId(), "!!!!!!"}) 142 CheckBadRequestStatus(t, resp) 143 144 // Empty/whitespace rolenames should be ignored. 145 _, resp = th.Client.GetRolesByNames([]string{model.NewId(), model.NewId(), "", " "}) 146 CheckNoError(t, resp) 147 } 148 149 func TestPatchRole(t *testing.T) { 150 th := Setup().InitBasic() 151 defer th.TearDown() 152 153 role := &model.Role{ 154 Name: model.NewId(), 155 DisplayName: model.NewId(), 156 Description: model.NewId(), 157 Permissions: []string{"manage_system", "create_public_channel", "manage_slash_commands"}, 158 SchemeManaged: true, 159 } 160 161 res1 := <-th.App.Srv.Store.Role().Save(role) 162 assert.Nil(t, res1.Err) 163 role = res1.Data.(*model.Role) 164 defer th.App.Srv.Store.Job().Delete(role.Id) 165 166 patch := &model.RolePatch{ 167 Permissions: &[]string{"manage_system", "create_public_channel", "manage_incoming_webhooks", "manage_outgoing_webhooks"}, 168 } 169 170 received, resp := th.SystemAdminClient.PatchRole(role.Id, patch) 171 CheckNoError(t, resp) 172 173 assert.Equal(t, received.Id, role.Id) 174 assert.Equal(t, received.Name, role.Name) 175 assert.Equal(t, received.DisplayName, role.DisplayName) 176 assert.Equal(t, received.Description, role.Description) 177 assert.EqualValues(t, received.Permissions, []string{"manage_system", "create_public_channel", "manage_incoming_webhooks", "manage_outgoing_webhooks"}) 178 assert.Equal(t, received.SchemeManaged, role.SchemeManaged) 179 180 // Check a no-op patch succeeds. 181 _, resp = th.SystemAdminClient.PatchRole(role.Id, patch) 182 CheckNoError(t, resp) 183 184 _, resp = th.SystemAdminClient.PatchRole("junk", patch) 185 CheckBadRequestStatus(t, resp) 186 187 _, resp = th.Client.PatchRole(model.NewId(), patch) 188 CheckNotFoundStatus(t, resp) 189 190 _, resp = th.Client.PatchRole(role.Id, patch) 191 CheckForbiddenStatus(t, resp) 192 193 // Check a change that the license would not allow. 194 patch = &model.RolePatch{ 195 Permissions: &[]string{"manage_system", "manage_incoming_webhooks", "manage_outgoing_webhooks"}, 196 } 197 198 _, resp = th.SystemAdminClient.PatchRole(role.Id, patch) 199 CheckNotImplementedStatus(t, resp) 200 201 // Add a license. 202 th.App.SetLicense(model.NewTestLicense()) 203 204 // Try again, should succeed 205 received, resp = th.SystemAdminClient.PatchRole(role.Id, patch) 206 CheckNoError(t, resp) 207 208 assert.Equal(t, received.Id, role.Id) 209 assert.Equal(t, received.Name, role.Name) 210 assert.Equal(t, received.DisplayName, role.DisplayName) 211 assert.Equal(t, received.Description, role.Description) 212 assert.EqualValues(t, received.Permissions, []string{"manage_system", "manage_incoming_webhooks", "manage_outgoing_webhooks"}) 213 assert.Equal(t, received.SchemeManaged, role.SchemeManaged) 214 }