You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

DeleteActionTest.java 9.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287
  1. /*
  2. * SonarQube
  3. * Copyright (C) 2009-2020 SonarSource SA
  4. * mailto:info AT sonarsource DOT com
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 3 of the License, or (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public License
  17. * along with this program; if not, write to the Free Software Foundation,
  18. * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  19. */
  20. package org.sonar.server.usergroups.ws;
  21. import org.junit.Rule;
  22. import org.junit.Test;
  23. import org.junit.rules.ExpectedException;
  24. import org.sonar.api.impl.utils.AlwaysIncreasingSystem2;
  25. import org.sonar.api.server.ws.Change;
  26. import org.sonar.api.server.ws.WebService.Action;
  27. import org.sonar.api.web.UserRole;
  28. import org.sonar.db.DbTester;
  29. import org.sonar.db.component.ComponentDbTester;
  30. import org.sonar.db.component.ComponentDto;
  31. import org.sonar.db.component.ComponentTesting;
  32. import org.sonar.db.permission.template.PermissionTemplateDto;
  33. import org.sonar.db.permission.template.PermissionTemplateTesting;
  34. import org.sonar.db.qualityprofile.QProfileDto;
  35. import org.sonar.db.user.GroupDto;
  36. import org.sonar.db.user.UserDto;
  37. import org.sonar.server.exceptions.NotFoundException;
  38. import org.sonar.server.organization.TestDefaultOrganizationProvider;
  39. import org.sonar.server.tester.UserSessionRule;
  40. import org.sonar.server.usergroups.DefaultGroupFinder;
  41. import org.sonar.server.ws.TestRequest;
  42. import org.sonar.server.ws.TestResponse;
  43. import org.sonar.server.ws.WsActionTester;
  44. import static org.assertj.core.api.Assertions.assertThat;
  45. import static org.assertj.core.api.Assertions.tuple;
  46. import static org.sonar.core.permission.GlobalPermissions.SYSTEM_ADMIN;
  47. import static org.sonar.db.permission.OrganizationPermission.ADMINISTER;
  48. import static org.sonar.server.usergroups.ws.GroupWsSupport.PARAM_GROUP_ID;
  49. import static org.sonar.server.usergroups.ws.GroupWsSupport.PARAM_GROUP_NAME;
  50. public class DeleteActionTest {
  51. @Rule
  52. public UserSessionRule userSession = UserSessionRule.standalone();
  53. @Rule
  54. public ExpectedException expectedException = ExpectedException.none();
  55. @Rule
  56. public DbTester db = DbTester.create(new AlwaysIncreasingSystem2());
  57. private ComponentDbTester componentTester = new ComponentDbTester(db);
  58. private TestDefaultOrganizationProvider defaultOrganizationProvider = TestDefaultOrganizationProvider.from(db);
  59. private WsActionTester ws = new WsActionTester(new DeleteAction(db.getDbClient(), userSession, newGroupWsSupport()));
  60. @Test
  61. public void verify_definition() {
  62. Action wsDef = ws.getDef();
  63. assertThat(wsDef.isInternal()).isEqualTo(false);
  64. assertThat(wsDef.since()).isEqualTo("5.2");
  65. assertThat(wsDef.isPost()).isEqualTo(true);
  66. assertThat(wsDef.changelog()).extracting(Change::getVersion, Change::getDescription).containsOnly(
  67. tuple("8.4", "Parameter 'id' is deprecated. Format changes from integer to string. Use 'name' instead."));
  68. }
  69. @Test
  70. public void response_has_no_content() {
  71. addAdmin();
  72. insertDefaultGroup();
  73. GroupDto group = db.users().insertGroup();
  74. loginAsAdmin();
  75. TestResponse response = newRequest()
  76. .setParam("id", group.getUuid())
  77. .execute();
  78. assertThat(response.getStatus()).isEqualTo(204);
  79. }
  80. @Test
  81. public void delete_by_id() {
  82. addAdmin();
  83. insertDefaultGroup();
  84. GroupDto group = db.users().insertGroup();
  85. loginAsAdmin();
  86. newRequest()
  87. .setParam("id", group.getUuid())
  88. .execute();
  89. assertThat(db.users().selectGroupByUuid(group.getUuid())).isNull();
  90. }
  91. @Test
  92. public void delete_by_name() {
  93. addAdmin();
  94. insertDefaultGroup();
  95. GroupDto group = db.users().insertGroup();
  96. loginAsAdmin();
  97. newRequest()
  98. .setParam(PARAM_GROUP_NAME, group.getName())
  99. .execute();
  100. assertThat(db.users().selectGroupByUuid(group.getUuid())).isNull();
  101. }
  102. @Test
  103. public void delete_members() {
  104. addAdmin();
  105. insertDefaultGroup();
  106. GroupDto group = db.users().insertGroup();
  107. UserDto user = db.users().insertUser();
  108. db.users().insertMember(group, user);
  109. loginAsAdmin();
  110. newRequest()
  111. .setParam("id", group.getUuid())
  112. .execute();
  113. assertThat(db.countRowsOfTable("groups_users")).isEqualTo(0);
  114. }
  115. @Test
  116. public void delete_permissions() {
  117. addAdmin();
  118. insertDefaultGroup();
  119. GroupDto group = db.users().insertGroup();
  120. ComponentDto project = componentTester.insertComponent(ComponentTesting.newPrivateProjectDto(db.getDefaultOrganization()));
  121. db.users().insertProjectPermissionOnGroup(group, UserRole.ADMIN, project);
  122. loginAsAdmin();
  123. newRequest()
  124. .setParam("id", group.getUuid())
  125. .execute();
  126. assertThat(db.countRowsOfTable("group_roles")).isEqualTo(0);
  127. }
  128. @Test
  129. public void delete_group_from_permission_templates() {
  130. addAdmin();
  131. insertDefaultGroup();
  132. GroupDto group = db.users().insertGroup();
  133. PermissionTemplateDto template = db.getDbClient().permissionTemplateDao().insert(db.getSession(),
  134. PermissionTemplateTesting.newPermissionTemplateDto());
  135. db.getDbClient().permissionTemplateDao().insertGroupPermission(db.getSession(), template.getUuid(), group.getUuid(), "perm");
  136. db.commit();
  137. loginAsAdmin();
  138. assertThat(db.countRowsOfTable("perm_templates_groups")).isEqualTo(1);
  139. newRequest()
  140. .setParam("id", group.getUuid())
  141. .execute();
  142. assertThat(db.countRowsOfTable("perm_templates_groups")).isEqualTo(0);
  143. }
  144. @Test
  145. public void delete_qprofile_permissions() {
  146. addAdmin();
  147. insertDefaultGroup();
  148. GroupDto group = db.users().insertGroup();
  149. QProfileDto profile = db.qualityProfiles().insert();
  150. db.qualityProfiles().addGroupPermission(profile, group);
  151. loginAsAdmin();
  152. newRequest()
  153. .setParam("id", group.getUuid())
  154. .execute();
  155. assertThat(db.countRowsOfTable("qprofile_edit_groups")).isZero();
  156. }
  157. @Test
  158. public void fail_if_id_does_not_exist() {
  159. addAdmin();
  160. loginAsAdmin();
  161. int groupId = 123;
  162. expectedException.expect(NotFoundException.class);
  163. expectedException.expectMessage("No group with id '" + groupId + "'");
  164. newRequest()
  165. .setParam("id", String.valueOf(groupId))
  166. .execute();
  167. }
  168. @Test
  169. public void fail_to_delete_default_group() {
  170. loginAsAdmin();
  171. GroupDto defaultGroup = db.users().insertDefaultGroup("default");
  172. expectedException.expect(IllegalArgumentException.class);
  173. expectedException.expectMessage("Default group 'default' cannot be used to perform this action");
  174. newRequest()
  175. .setParam("id", defaultGroup.getUuid())
  176. .execute();
  177. }
  178. @Test
  179. public void cannot_delete_last_system_admin_group() {
  180. insertDefaultGroup();
  181. GroupDto group = db.users().insertGroup();
  182. db.users().insertPermissionOnGroup(group, SYSTEM_ADMIN);
  183. loginAsAdmin();
  184. expectedException.expect(IllegalArgumentException.class);
  185. expectedException.expectMessage("The last system admin group cannot be deleted");
  186. newRequest()
  187. .setParam(PARAM_GROUP_NAME, group.getName())
  188. .execute();
  189. }
  190. @Test
  191. public void delete_admin_group_fails_if_no_admin_users_left() {
  192. // admin users are part of the group to be deleted
  193. db.users().insertDefaultGroup();
  194. GroupDto adminGroup = db.users().insertGroup("admins");
  195. db.users().insertPermissionOnGroup(adminGroup, SYSTEM_ADMIN);
  196. UserDto bigBoss = db.users().insertUser();
  197. db.users().insertMember(adminGroup, bigBoss);
  198. loginAsAdmin();
  199. expectedException.expect(IllegalArgumentException.class);
  200. expectedException.expectMessage("The last system admin group cannot be deleted");
  201. executeDeleteGroupRequest(adminGroup);
  202. }
  203. @Test
  204. public void delete_admin_group_succeeds_if_other_groups_have_administrators() {
  205. db.users().insertDefaultGroup();
  206. GroupDto adminGroup1 = db.users().insertGroup("admins");
  207. db.users().insertPermissionOnGroup(adminGroup1, SYSTEM_ADMIN);
  208. GroupDto adminGroup2 = db.users().insertGroup("admins");
  209. db.users().insertPermissionOnGroup(adminGroup2, SYSTEM_ADMIN);
  210. UserDto bigBoss = db.users().insertUser();
  211. db.users().insertMember(adminGroup2, bigBoss);
  212. loginAsAdmin();
  213. executeDeleteGroupRequest(adminGroup1);
  214. assertThat(db.users().selectGroupPermissions(adminGroup2, null)).hasSize(1);
  215. }
  216. private void executeDeleteGroupRequest(GroupDto adminGroup1) {
  217. newRequest()
  218. .setParam(PARAM_GROUP_ID, adminGroup1.getUuid())
  219. .execute();
  220. }
  221. private void addAdmin() {
  222. UserDto admin = db.users().insertUser();
  223. db.users().insertPermissionOnUser(admin, SYSTEM_ADMIN);
  224. }
  225. private void loginAsAdmin() {
  226. userSession.logIn().addPermission(ADMINISTER);
  227. }
  228. private void insertDefaultGroup() {
  229. db.users().insertDefaultGroup();
  230. }
  231. private TestRequest newRequest() {
  232. return ws.newRequest();
  233. }
  234. private GroupWsSupport newGroupWsSupport() {
  235. return new GroupWsSupport(db.getDbClient(), new DefaultGroupFinder(db.getDbClient(), defaultOrganizationProvider));
  236. }
  237. }