You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

api_team_test.go 13KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302
  1. // Copyright 2017 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package integration
  4. import (
  5. "fmt"
  6. "net/http"
  7. "sort"
  8. "testing"
  9. auth_model "code.gitea.io/gitea/models/auth"
  10. "code.gitea.io/gitea/models/db"
  11. "code.gitea.io/gitea/models/organization"
  12. "code.gitea.io/gitea/models/perm"
  13. "code.gitea.io/gitea/models/repo"
  14. "code.gitea.io/gitea/models/unit"
  15. "code.gitea.io/gitea/models/unittest"
  16. user_model "code.gitea.io/gitea/models/user"
  17. api "code.gitea.io/gitea/modules/structs"
  18. "code.gitea.io/gitea/services/convert"
  19. "code.gitea.io/gitea/tests"
  20. "github.com/stretchr/testify/assert"
  21. )
  22. func TestAPITeam(t *testing.T) {
  23. defer tests.PrepareTestEnv(t)()
  24. teamUser := unittest.AssertExistsAndLoadBean(t, &organization.TeamUser{ID: 1})
  25. team := unittest.AssertExistsAndLoadBean(t, &organization.Team{ID: teamUser.TeamID})
  26. org := unittest.AssertExistsAndLoadBean(t, &organization.Organization{ID: teamUser.OrgID})
  27. user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: teamUser.UID})
  28. session := loginUser(t, user.Name)
  29. token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadOrganization)
  30. req := NewRequestf(t, "GET", "/api/v1/teams/%d?token="+token, teamUser.TeamID)
  31. resp := MakeRequest(t, req, http.StatusOK)
  32. var apiTeam api.Team
  33. DecodeJSON(t, resp, &apiTeam)
  34. assert.EqualValues(t, team.ID, apiTeam.ID)
  35. assert.Equal(t, team.Name, apiTeam.Name)
  36. assert.EqualValues(t, convert.ToOrganization(db.DefaultContext, org), apiTeam.Organization)
  37. // non team member user will not access the teams details
  38. teamUser2 := unittest.AssertExistsAndLoadBean(t, &organization.TeamUser{ID: 3})
  39. user2 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: teamUser2.UID})
  40. session = loginUser(t, user2.Name)
  41. token = getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadOrganization)
  42. req = NewRequestf(t, "GET", "/api/v1/teams/%d?token="+token, teamUser.TeamID)
  43. _ = MakeRequest(t, req, http.StatusForbidden)
  44. req = NewRequestf(t, "GET", "/api/v1/teams/%d", teamUser.TeamID)
  45. _ = MakeRequest(t, req, http.StatusUnauthorized)
  46. // Get an admin user able to create, update and delete teams.
  47. user = unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1})
  48. session = loginUser(t, user.Name)
  49. token = getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteOrganization)
  50. org = unittest.AssertExistsAndLoadBean(t, &organization.Organization{ID: 6})
  51. // Create team.
  52. teamToCreate := &api.CreateTeamOption{
  53. Name: "team1",
  54. Description: "team one",
  55. IncludesAllRepositories: true,
  56. Permission: "write",
  57. Units: []string{"repo.code", "repo.issues"},
  58. }
  59. req = NewRequestWithJSON(t, "POST", fmt.Sprintf("/api/v1/orgs/%s/teams?token=%s", org.Name, token), teamToCreate)
  60. resp = MakeRequest(t, req, http.StatusCreated)
  61. apiTeam = api.Team{}
  62. DecodeJSON(t, resp, &apiTeam)
  63. checkTeamResponse(t, "CreateTeam1", &apiTeam, teamToCreate.Name, teamToCreate.Description, teamToCreate.IncludesAllRepositories,
  64. teamToCreate.Permission, teamToCreate.Units, nil)
  65. checkTeamBean(t, apiTeam.ID, teamToCreate.Name, teamToCreate.Description, teamToCreate.IncludesAllRepositories,
  66. teamToCreate.Permission, teamToCreate.Units, nil)
  67. teamID := apiTeam.ID
  68. // Edit team.
  69. editDescription := "team 1"
  70. editFalse := false
  71. teamToEdit := &api.EditTeamOption{
  72. Name: "teamone",
  73. Description: &editDescription,
  74. Permission: "admin",
  75. IncludesAllRepositories: &editFalse,
  76. Units: []string{"repo.code", "repo.pulls", "repo.releases"},
  77. }
  78. req = NewRequestWithJSON(t, "PATCH", fmt.Sprintf("/api/v1/teams/%d?token=%s", teamID, token), teamToEdit)
  79. resp = MakeRequest(t, req, http.StatusOK)
  80. apiTeam = api.Team{}
  81. DecodeJSON(t, resp, &apiTeam)
  82. checkTeamResponse(t, "EditTeam1", &apiTeam, teamToEdit.Name, *teamToEdit.Description, *teamToEdit.IncludesAllRepositories,
  83. teamToEdit.Permission, unit.AllUnitKeyNames(), nil)
  84. checkTeamBean(t, apiTeam.ID, teamToEdit.Name, *teamToEdit.Description, *teamToEdit.IncludesAllRepositories,
  85. teamToEdit.Permission, unit.AllUnitKeyNames(), nil)
  86. // Edit team Description only
  87. editDescription = "first team"
  88. teamToEditDesc := api.EditTeamOption{Description: &editDescription}
  89. req = NewRequestWithJSON(t, "PATCH", fmt.Sprintf("/api/v1/teams/%d?token=%s", teamID, token), teamToEditDesc)
  90. resp = MakeRequest(t, req, http.StatusOK)
  91. apiTeam = api.Team{}
  92. DecodeJSON(t, resp, &apiTeam)
  93. checkTeamResponse(t, "EditTeam1_DescOnly", &apiTeam, teamToEdit.Name, *teamToEditDesc.Description, *teamToEdit.IncludesAllRepositories,
  94. teamToEdit.Permission, unit.AllUnitKeyNames(), nil)
  95. checkTeamBean(t, apiTeam.ID, teamToEdit.Name, *teamToEditDesc.Description, *teamToEdit.IncludesAllRepositories,
  96. teamToEdit.Permission, unit.AllUnitKeyNames(), nil)
  97. // Read team.
  98. teamRead := unittest.AssertExistsAndLoadBean(t, &organization.Team{ID: teamID})
  99. assert.NoError(t, teamRead.LoadUnits(db.DefaultContext))
  100. req = NewRequestf(t, "GET", "/api/v1/teams/%d?token="+token, teamID)
  101. resp = MakeRequest(t, req, http.StatusOK)
  102. apiTeam = api.Team{}
  103. DecodeJSON(t, resp, &apiTeam)
  104. checkTeamResponse(t, "ReadTeam1", &apiTeam, teamRead.Name, *teamToEditDesc.Description, teamRead.IncludesAllRepositories,
  105. teamRead.AccessMode.String(), teamRead.GetUnitNames(), teamRead.GetUnitsMap())
  106. // Delete team.
  107. req = NewRequestf(t, "DELETE", "/api/v1/teams/%d?token="+token, teamID)
  108. MakeRequest(t, req, http.StatusNoContent)
  109. unittest.AssertNotExistsBean(t, &organization.Team{ID: teamID})
  110. // create team again via UnitsMap
  111. // Create team.
  112. teamToCreate = &api.CreateTeamOption{
  113. Name: "team2",
  114. Description: "team two",
  115. IncludesAllRepositories: true,
  116. Permission: "write",
  117. UnitsMap: map[string]string{"repo.code": "read", "repo.issues": "write", "repo.wiki": "none"},
  118. }
  119. req = NewRequestWithJSON(t, "POST", fmt.Sprintf("/api/v1/orgs/%s/teams?token=%s", org.Name, token), teamToCreate)
  120. resp = MakeRequest(t, req, http.StatusCreated)
  121. apiTeam = api.Team{}
  122. DecodeJSON(t, resp, &apiTeam)
  123. checkTeamResponse(t, "CreateTeam2", &apiTeam, teamToCreate.Name, teamToCreate.Description, teamToCreate.IncludesAllRepositories,
  124. "read", nil, teamToCreate.UnitsMap)
  125. checkTeamBean(t, apiTeam.ID, teamToCreate.Name, teamToCreate.Description, teamToCreate.IncludesAllRepositories,
  126. "read", nil, teamToCreate.UnitsMap)
  127. teamID = apiTeam.ID
  128. // Edit team.
  129. editDescription = "team 1"
  130. editFalse = false
  131. teamToEdit = &api.EditTeamOption{
  132. Name: "teamtwo",
  133. Description: &editDescription,
  134. Permission: "write",
  135. IncludesAllRepositories: &editFalse,
  136. UnitsMap: map[string]string{"repo.code": "read", "repo.pulls": "read", "repo.releases": "write"},
  137. }
  138. req = NewRequestWithJSON(t, "PATCH", fmt.Sprintf("/api/v1/teams/%d?token=%s", teamID, token), teamToEdit)
  139. resp = MakeRequest(t, req, http.StatusOK)
  140. apiTeam = api.Team{}
  141. DecodeJSON(t, resp, &apiTeam)
  142. checkTeamResponse(t, "EditTeam2", &apiTeam, teamToEdit.Name, *teamToEdit.Description, *teamToEdit.IncludesAllRepositories,
  143. "read", nil, teamToEdit.UnitsMap)
  144. checkTeamBean(t, apiTeam.ID, teamToEdit.Name, *teamToEdit.Description, *teamToEdit.IncludesAllRepositories,
  145. "read", nil, teamToEdit.UnitsMap)
  146. // Edit team Description only
  147. editDescription = "second team"
  148. teamToEditDesc = api.EditTeamOption{Description: &editDescription}
  149. req = NewRequestWithJSON(t, "PATCH", fmt.Sprintf("/api/v1/teams/%d?token=%s", teamID, token), teamToEditDesc)
  150. resp = MakeRequest(t, req, http.StatusOK)
  151. apiTeam = api.Team{}
  152. DecodeJSON(t, resp, &apiTeam)
  153. checkTeamResponse(t, "EditTeam2_DescOnly", &apiTeam, teamToEdit.Name, *teamToEditDesc.Description, *teamToEdit.IncludesAllRepositories,
  154. "read", nil, teamToEdit.UnitsMap)
  155. checkTeamBean(t, apiTeam.ID, teamToEdit.Name, *teamToEditDesc.Description, *teamToEdit.IncludesAllRepositories,
  156. "read", nil, teamToEdit.UnitsMap)
  157. // Read team.
  158. teamRead = unittest.AssertExistsAndLoadBean(t, &organization.Team{ID: teamID})
  159. req = NewRequestf(t, "GET", "/api/v1/teams/%d?token="+token, teamID)
  160. resp = MakeRequest(t, req, http.StatusOK)
  161. apiTeam = api.Team{}
  162. DecodeJSON(t, resp, &apiTeam)
  163. assert.NoError(t, teamRead.LoadUnits(db.DefaultContext))
  164. checkTeamResponse(t, "ReadTeam2", &apiTeam, teamRead.Name, *teamToEditDesc.Description, teamRead.IncludesAllRepositories,
  165. teamRead.AccessMode.String(), teamRead.GetUnitNames(), teamRead.GetUnitsMap())
  166. // Delete team.
  167. req = NewRequestf(t, "DELETE", "/api/v1/teams/%d?token="+token, teamID)
  168. MakeRequest(t, req, http.StatusNoContent)
  169. unittest.AssertNotExistsBean(t, &organization.Team{ID: teamID})
  170. // Create admin team
  171. teamToCreate = &api.CreateTeamOption{
  172. Name: "teamadmin",
  173. Description: "team admin",
  174. IncludesAllRepositories: true,
  175. Permission: "admin",
  176. }
  177. req = NewRequestWithJSON(t, "POST", fmt.Sprintf("/api/v1/orgs/%s/teams?token=%s", org.Name, token), teamToCreate)
  178. resp = MakeRequest(t, req, http.StatusCreated)
  179. apiTeam = api.Team{}
  180. DecodeJSON(t, resp, &apiTeam)
  181. for _, ut := range unit.AllRepoUnitTypes {
  182. up := perm.AccessModeAdmin
  183. if ut == unit.TypeExternalTracker || ut == unit.TypeExternalWiki {
  184. up = perm.AccessModeRead
  185. }
  186. unittest.AssertExistsAndLoadBean(t, &organization.TeamUnit{
  187. OrgID: org.ID,
  188. TeamID: apiTeam.ID,
  189. Type: ut,
  190. AccessMode: up,
  191. })
  192. }
  193. teamID = apiTeam.ID
  194. // Delete team.
  195. req = NewRequestf(t, "DELETE", "/api/v1/teams/%d?token="+token, teamID)
  196. MakeRequest(t, req, http.StatusNoContent)
  197. unittest.AssertNotExistsBean(t, &organization.Team{ID: teamID})
  198. }
  199. func checkTeamResponse(t *testing.T, testName string, apiTeam *api.Team, name, description string, includesAllRepositories bool, permission string, units []string, unitsMap map[string]string) {
  200. t.Run(testName, func(t *testing.T) {
  201. assert.Equal(t, name, apiTeam.Name, "name")
  202. assert.Equal(t, description, apiTeam.Description, "description")
  203. assert.Equal(t, includesAllRepositories, apiTeam.IncludesAllRepositories, "includesAllRepositories")
  204. assert.Equal(t, permission, apiTeam.Permission, "permission")
  205. if units != nil {
  206. sort.StringSlice(units).Sort()
  207. sort.StringSlice(apiTeam.Units).Sort()
  208. assert.EqualValues(t, units, apiTeam.Units, "units")
  209. }
  210. if unitsMap != nil {
  211. assert.EqualValues(t, unitsMap, apiTeam.UnitsMap, "unitsMap")
  212. }
  213. })
  214. }
  215. func checkTeamBean(t *testing.T, id int64, name, description string, includesAllRepositories bool, permission string, units []string, unitsMap map[string]string) {
  216. team := unittest.AssertExistsAndLoadBean(t, &organization.Team{ID: id})
  217. assert.NoError(t, team.LoadUnits(db.DefaultContext), "LoadUnits")
  218. apiTeam, err := convert.ToTeam(db.DefaultContext, team)
  219. assert.NoError(t, err)
  220. checkTeamResponse(t, fmt.Sprintf("checkTeamBean/%s_%s", name, description), apiTeam, name, description, includesAllRepositories, permission, units, unitsMap)
  221. }
  222. type TeamSearchResults struct {
  223. OK bool `json:"ok"`
  224. Data []*api.Team `json:"data"`
  225. }
  226. func TestAPITeamSearch(t *testing.T) {
  227. defer tests.PrepareTestEnv(t)()
  228. user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
  229. org := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 17})
  230. var results TeamSearchResults
  231. token := getUserToken(t, user.Name, auth_model.AccessTokenScopeReadOrganization)
  232. req := NewRequestf(t, "GET", "/api/v1/orgs/%s/teams/search?q=%s&token=%s", org.Name, "_team", token)
  233. resp := MakeRequest(t, req, http.StatusOK)
  234. DecodeJSON(t, resp, &results)
  235. assert.NotEmpty(t, results.Data)
  236. assert.Len(t, results.Data, 1)
  237. assert.Equal(t, "test_team", results.Data[0].Name)
  238. // no access if not organization member
  239. user5 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5})
  240. token5 := getUserToken(t, user5.Name, auth_model.AccessTokenScopeReadOrganization)
  241. req = NewRequestf(t, "GET", "/api/v1/orgs/%s/teams/search?q=%s&token=%s", org.Name, "team", token5)
  242. MakeRequest(t, req, http.StatusForbidden)
  243. }
  244. func TestAPIGetTeamRepo(t *testing.T) {
  245. defer tests.PrepareTestEnv(t)()
  246. user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 15})
  247. teamRepo := unittest.AssertExistsAndLoadBean(t, &repo.Repository{ID: 24})
  248. team := unittest.AssertExistsAndLoadBean(t, &organization.Team{ID: 5})
  249. var results api.Repository
  250. token := getUserToken(t, user.Name, auth_model.AccessTokenScopeReadOrganization)
  251. req := NewRequestf(t, "GET", "/api/v1/teams/%d/repos/%s/?token=%s", team.ID, teamRepo.FullName(), token)
  252. resp := MakeRequest(t, req, http.StatusOK)
  253. DecodeJSON(t, resp, &results)
  254. assert.Equal(t, "big_test_private_4", teamRepo.Name)
  255. // no access if not organization member
  256. user5 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5})
  257. token5 := getUserToken(t, user5.Name, auth_model.AccessTokenScopeReadOrganization)
  258. req = NewRequestf(t, "GET", "/api/v1/teams/%d/repos/%s/?token=%s", team.ID, teamRepo.FullName(), token5)
  259. MakeRequest(t, req, http.StatusNotFound)
  260. }