You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

api_team_test.go 6.9KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166
  1. // Copyright 2017 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package integrations
  5. import (
  6. "fmt"
  7. "net/http"
  8. "sort"
  9. "testing"
  10. "code.gitea.io/gitea/models"
  11. "code.gitea.io/gitea/models/unittest"
  12. user_model "code.gitea.io/gitea/models/user"
  13. "code.gitea.io/gitea/modules/convert"
  14. api "code.gitea.io/gitea/modules/structs"
  15. "github.com/stretchr/testify/assert"
  16. )
  17. func TestAPITeam(t *testing.T) {
  18. defer prepareTestEnv(t)()
  19. teamUser := unittest.AssertExistsAndLoadBean(t, &models.TeamUser{}).(*models.TeamUser)
  20. team := unittest.AssertExistsAndLoadBean(t, &models.Team{ID: teamUser.TeamID}).(*models.Team)
  21. user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: teamUser.UID}).(*user_model.User)
  22. session := loginUser(t, user.Name)
  23. token := getTokenForLoggedInUser(t, session)
  24. req := NewRequestf(t, "GET", "/api/v1/teams/%d?token="+token, teamUser.TeamID)
  25. resp := session.MakeRequest(t, req, http.StatusOK)
  26. var apiTeam api.Team
  27. DecodeJSON(t, resp, &apiTeam)
  28. assert.EqualValues(t, team.ID, apiTeam.ID)
  29. assert.Equal(t, team.Name, apiTeam.Name)
  30. // non team member user will not access the teams details
  31. teamUser2 := unittest.AssertExistsAndLoadBean(t, &models.TeamUser{ID: 3}).(*models.TeamUser)
  32. user2 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: teamUser2.UID}).(*user_model.User)
  33. session = loginUser(t, user2.Name)
  34. token = getTokenForLoggedInUser(t, session)
  35. req = NewRequestf(t, "GET", "/api/v1/teams/%d?token="+token, teamUser.TeamID)
  36. _ = session.MakeRequest(t, req, http.StatusForbidden)
  37. req = NewRequestf(t, "GET", "/api/v1/teams/%d", teamUser.TeamID)
  38. _ = session.MakeRequest(t, req, http.StatusUnauthorized)
  39. // Get an admin user able to create, update and delete teams.
  40. user = unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}).(*user_model.User)
  41. session = loginUser(t, user.Name)
  42. token = getTokenForLoggedInUser(t, session)
  43. org := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 6}).(*user_model.User)
  44. // Create team.
  45. teamToCreate := &api.CreateTeamOption{
  46. Name: "team1",
  47. Description: "team one",
  48. IncludesAllRepositories: true,
  49. Permission: "write",
  50. Units: []string{"repo.code", "repo.issues"},
  51. }
  52. req = NewRequestWithJSON(t, "POST", fmt.Sprintf("/api/v1/orgs/%s/teams?token=%s", org.Name, token), teamToCreate)
  53. resp = session.MakeRequest(t, req, http.StatusCreated)
  54. DecodeJSON(t, resp, &apiTeam)
  55. checkTeamResponse(t, &apiTeam, teamToCreate.Name, teamToCreate.Description, teamToCreate.IncludesAllRepositories,
  56. teamToCreate.Permission, teamToCreate.Units)
  57. checkTeamBean(t, apiTeam.ID, teamToCreate.Name, teamToCreate.Description, teamToCreate.IncludesAllRepositories,
  58. teamToCreate.Permission, teamToCreate.Units)
  59. teamID := apiTeam.ID
  60. // Edit team.
  61. editDescription := "team 1"
  62. editFalse := false
  63. teamToEdit := &api.EditTeamOption{
  64. Name: "teamone",
  65. Description: &editDescription,
  66. Permission: "admin",
  67. IncludesAllRepositories: &editFalse,
  68. Units: []string{"repo.code", "repo.pulls", "repo.releases"},
  69. }
  70. req = NewRequestWithJSON(t, "PATCH", fmt.Sprintf("/api/v1/teams/%d?token=%s", teamID, token), teamToEdit)
  71. resp = session.MakeRequest(t, req, http.StatusOK)
  72. DecodeJSON(t, resp, &apiTeam)
  73. checkTeamResponse(t, &apiTeam, teamToEdit.Name, *teamToEdit.Description, *teamToEdit.IncludesAllRepositories,
  74. teamToEdit.Permission, teamToEdit.Units)
  75. checkTeamBean(t, apiTeam.ID, teamToEdit.Name, *teamToEdit.Description, *teamToEdit.IncludesAllRepositories,
  76. teamToEdit.Permission, teamToEdit.Units)
  77. // Edit team Description only
  78. editDescription = "first team"
  79. teamToEditDesc := api.EditTeamOption{Description: &editDescription}
  80. req = NewRequestWithJSON(t, "PATCH", fmt.Sprintf("/api/v1/teams/%d?token=%s", teamID, token), teamToEditDesc)
  81. resp = session.MakeRequest(t, req, http.StatusOK)
  82. DecodeJSON(t, resp, &apiTeam)
  83. checkTeamResponse(t, &apiTeam, teamToEdit.Name, *teamToEditDesc.Description, *teamToEdit.IncludesAllRepositories,
  84. teamToEdit.Permission, teamToEdit.Units)
  85. checkTeamBean(t, apiTeam.ID, teamToEdit.Name, *teamToEditDesc.Description, *teamToEdit.IncludesAllRepositories,
  86. teamToEdit.Permission, teamToEdit.Units)
  87. // Read team.
  88. teamRead := unittest.AssertExistsAndLoadBean(t, &models.Team{ID: teamID}).(*models.Team)
  89. req = NewRequestf(t, "GET", "/api/v1/teams/%d?token="+token, teamID)
  90. resp = session.MakeRequest(t, req, http.StatusOK)
  91. DecodeJSON(t, resp, &apiTeam)
  92. checkTeamResponse(t, &apiTeam, teamRead.Name, *teamToEditDesc.Description, teamRead.IncludesAllRepositories,
  93. teamRead.Authorize.String(), teamRead.GetUnitNames())
  94. // Delete team.
  95. req = NewRequestf(t, "DELETE", "/api/v1/teams/%d?token="+token, teamID)
  96. session.MakeRequest(t, req, http.StatusNoContent)
  97. unittest.AssertNotExistsBean(t, &models.Team{ID: teamID})
  98. }
  99. func checkTeamResponse(t *testing.T, apiTeam *api.Team, name, description string, includesAllRepositories bool, permission string, units []string) {
  100. assert.Equal(t, name, apiTeam.Name, "name")
  101. assert.Equal(t, description, apiTeam.Description, "description")
  102. assert.Equal(t, includesAllRepositories, apiTeam.IncludesAllRepositories, "includesAllRepositories")
  103. assert.Equal(t, permission, apiTeam.Permission, "permission")
  104. sort.StringSlice(units).Sort()
  105. sort.StringSlice(apiTeam.Units).Sort()
  106. assert.EqualValues(t, units, apiTeam.Units, "units")
  107. }
  108. func checkTeamBean(t *testing.T, id int64, name, description string, includesAllRepositories bool, permission string, units []string) {
  109. team := unittest.AssertExistsAndLoadBean(t, &models.Team{ID: id}).(*models.Team)
  110. assert.NoError(t, team.GetUnits(), "GetUnits")
  111. checkTeamResponse(t, convert.ToTeam(team), name, description, includesAllRepositories, permission, units)
  112. }
  113. type TeamSearchResults struct {
  114. OK bool `json:"ok"`
  115. Data []*api.Team `json:"data"`
  116. }
  117. func TestAPITeamSearch(t *testing.T) {
  118. defer prepareTestEnv(t)()
  119. user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User)
  120. org := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 3}).(*user_model.User)
  121. var results TeamSearchResults
  122. session := loginUser(t, user.Name)
  123. csrf := GetCSRF(t, session, "/"+org.Name)
  124. req := NewRequestf(t, "GET", "/api/v1/orgs/%s/teams/search?q=%s", org.Name, "_team")
  125. req.Header.Add("X-Csrf-Token", csrf)
  126. resp := session.MakeRequest(t, req, http.StatusOK)
  127. DecodeJSON(t, resp, &results)
  128. assert.NotEmpty(t, results.Data)
  129. assert.Len(t, results.Data, 1)
  130. assert.Equal(t, "test_team", results.Data[0].Name)
  131. // no access if not organization member
  132. user5 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5}).(*user_model.User)
  133. session = loginUser(t, user5.Name)
  134. csrf = GetCSRF(t, session, "/"+org.Name)
  135. req = NewRequestf(t, "GET", "/api/v1/orgs/%s/teams/search?q=%s", org.Name, "team")
  136. req.Header.Add("X-Csrf-Token", csrf)
  137. session.MakeRequest(t, req, http.StatusForbidden)
  138. }