mirror of
https://github.com/scm-manager/scm-manager.git
synced 2025-11-07 22:15:45 +01:00
140 lines
5.7 KiB
Java
140 lines
5.7 KiB
Java
|
|
/*
|
||
|
|
* Copyright (c) 2010, Sebastian Sdorra
|
||
|
|
* All rights reserved.
|
||
|
|
*
|
||
|
|
* Redistribution and use in source and binary forms, with or without
|
||
|
|
* modification, are permitted provided that the following conditions are met:
|
||
|
|
*
|
||
|
|
* 1. Redistributions of source code must retain the above copyright notice,
|
||
|
|
* this list of conditions and the following disclaimer.
|
||
|
|
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
||
|
|
* this list of conditions and the following disclaimer in the documentation
|
||
|
|
* and/or other materials provided with the distribution.
|
||
|
|
* 3. Neither the name of SCM-Manager; nor the names of its
|
||
|
|
* contributors may be used to endorse or promote products derived from this
|
||
|
|
* software without specific prior written permission.
|
||
|
|
*
|
||
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
||
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
||
|
|
* DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
|
||
|
|
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
||
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
|
||
|
|
* ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
||
|
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||
|
|
*
|
||
|
|
* http://bitbucket.org/sdorra/scm-manager
|
||
|
|
*/
|
||
|
|
|
||
|
|
|
||
|
|
package sonia.scm.it;
|
||
|
|
|
||
|
|
import org.apache.http.HttpStatus;
|
||
|
|
import org.junit.Before;
|
||
|
|
import org.junit.Rule;
|
||
|
|
import org.junit.Test;
|
||
|
|
import org.junit.rules.TemporaryFolder;
|
||
|
|
import org.junit.runner.RunWith;
|
||
|
|
import org.junit.runners.Parameterized;
|
||
|
|
import org.junit.runners.Parameterized.Parameters;
|
||
|
|
import sonia.scm.repository.PermissionType;
|
||
|
|
import sonia.scm.repository.client.api.RepositoryClient;
|
||
|
|
|
||
|
|
import java.io.IOException;
|
||
|
|
import java.util.Collection;
|
||
|
|
import java.util.List;
|
||
|
|
import java.util.Objects;
|
||
|
|
|
||
|
|
import static org.junit.Assert.*;
|
||
|
|
import static sonia.scm.it.ScmTypes.availableScmTypes;
|
||
|
|
|
||
|
|
@RunWith(Parameterized.class)
|
||
|
|
public class PermissionsITCase {
|
||
|
|
|
||
|
|
public static final String USER_READ = "user_read";
|
||
|
|
public static final String USER_PASS = "pass";
|
||
|
|
private static final String USER_WRITE = "user_write";
|
||
|
|
private static final String USER_OWNER = "user_owner";
|
||
|
|
|
||
|
|
@Rule
|
||
|
|
public TemporaryFolder temporaryFolder = new TemporaryFolder();
|
||
|
|
|
||
|
|
private final String repositoryType;
|
||
|
|
private int createdPermissions;
|
||
|
|
|
||
|
|
|
||
|
|
public PermissionsITCase(String repositoryType) {
|
||
|
|
this.repositoryType = repositoryType;
|
||
|
|
}
|
||
|
|
|
||
|
|
@Parameters(name = "{0}")
|
||
|
|
public static Collection<String> createParameters() {
|
||
|
|
return availableScmTypes();
|
||
|
|
}
|
||
|
|
|
||
|
|
@Before
|
||
|
|
public void prepareEnvironment() {
|
||
|
|
TestData.createDefault();
|
||
|
|
TestData.createUser(USER_READ, USER_PASS);
|
||
|
|
TestData.createUserPermission(USER_READ, PermissionType.READ, repositoryType);
|
||
|
|
TestData.createUser(USER_WRITE, USER_PASS);
|
||
|
|
TestData.createUserPermission(USER_WRITE, PermissionType.WRITE, repositoryType);
|
||
|
|
TestData.createUser(USER_OWNER, USER_PASS);
|
||
|
|
TestData.createUserPermission(USER_OWNER, PermissionType.OWNER, repositoryType);
|
||
|
|
createdPermissions = 3;
|
||
|
|
}
|
||
|
|
|
||
|
|
@Test
|
||
|
|
public void everyUserShouldSeePermissions() {
|
||
|
|
List<Object> userPermissions = TestData.getUserPermissions(USER_READ, USER_PASS, repositoryType);
|
||
|
|
assertEquals(userPermissions.size(), createdPermissions);
|
||
|
|
userPermissions = TestData.getUserPermissions(USER_WRITE, USER_PASS, repositoryType);
|
||
|
|
assertEquals(userPermissions.size(), createdPermissions);
|
||
|
|
userPermissions = TestData.getUserPermissions(USER_OWNER, USER_PASS, repositoryType);
|
||
|
|
assertEquals(userPermissions.size(), createdPermissions);
|
||
|
|
}
|
||
|
|
|
||
|
|
@Test
|
||
|
|
public void everyUserShouldCloneRepository() throws IOException {
|
||
|
|
RepositoryClient client = RepositoryUtil.createRepositoryClient(repositoryType, temporaryFolder.newFolder(), USER_READ, USER_PASS);
|
||
|
|
assertEquals(1, Objects.requireNonNull(client.getWorkingCopy().list()).length);
|
||
|
|
client = RepositoryUtil.createRepositoryClient(repositoryType, temporaryFolder.newFolder(), USER_WRITE, USER_PASS);
|
||
|
|
assertEquals(1, Objects.requireNonNull(client.getWorkingCopy().list()).length);
|
||
|
|
client = RepositoryUtil.createRepositoryClient(repositoryType, temporaryFolder.newFolder(), USER_OWNER, USER_PASS);
|
||
|
|
assertEquals(1, Objects.requireNonNull(client.getWorkingCopy().list()).length);
|
||
|
|
}
|
||
|
|
|
||
|
|
@Test
|
||
|
|
public void userWithREADPermissionShouldBeNotAuthorizedToCommit() throws IOException {
|
||
|
|
assertFalse(RepositoryUtil.canUserCommit(USER_READ, USER_PASS, repositoryType, temporaryFolder));
|
||
|
|
}
|
||
|
|
|
||
|
|
@Test
|
||
|
|
public void userWithOwnerPermissionShouldBeAuthorizedToCommit() throws IOException {
|
||
|
|
assertTrue(RepositoryUtil.canUserCommit(USER_OWNER, USER_PASS, repositoryType, temporaryFolder));
|
||
|
|
}
|
||
|
|
|
||
|
|
@Test
|
||
|
|
public void userWithWritePermissionShouldBeAuthorizedToCommit() throws IOException {
|
||
|
|
assertTrue(RepositoryUtil.canUserCommit(USER_WRITE, USER_PASS, repositoryType, temporaryFolder));
|
||
|
|
}
|
||
|
|
|
||
|
|
@Test
|
||
|
|
public void userWithWOwnerPermissionShouldBeAuthorizedToDeleteRepository(){
|
||
|
|
RepositoryUtil.assertDeleteRepositoryOperation(USER_OWNER, HttpStatus.SC_NO_CONTENT, HttpStatus.SC_NOT_FOUND, USER_PASS, repositoryType);
|
||
|
|
}
|
||
|
|
|
||
|
|
@Test
|
||
|
|
public void userWithWReadPermissionShouldNotBeAuthorizedToDeleteRepository(){
|
||
|
|
RepositoryUtil.assertDeleteRepositoryOperation(USER_READ, HttpStatus.SC_FORBIDDEN, HttpStatus.SC_OK, USER_PASS, repositoryType);
|
||
|
|
}
|
||
|
|
|
||
|
|
@Test
|
||
|
|
public void userWithWWritePermissionShouldNotBeAuthorizedToDeleteRepository(){
|
||
|
|
RepositoryUtil.assertDeleteRepositoryOperation(USER_WRITE, HttpStatus.SC_FORBIDDEN, HttpStatus.SC_OK, USER_PASS, repositoryType);
|
||
|
|
}
|
||
|
|
|
||
|
|
}
|