You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

SetPatActionIT.java 10KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270
  1. /*
  2. * SonarQube
  3. * Copyright (C) 2009-2023 SonarSource SA
  4. * mailto:info AT sonarsource DOT com
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 3 of the License, or (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public License
  17. * along with this program; if not, write to the Free Software Foundation,
  18. * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  19. */
  20. package org.sonar.server.almintegration.ws;
  21. import java.util.Optional;
  22. import org.junit.Rule;
  23. import org.junit.Test;
  24. import org.sonar.api.server.ws.WebService;
  25. import org.sonar.db.DbTester;
  26. import org.sonar.db.alm.pat.AlmPatDto;
  27. import org.sonar.db.alm.setting.ALM;
  28. import org.sonar.db.alm.setting.AlmSettingDto;
  29. import org.sonar.db.user.UserDto;
  30. import org.sonar.server.exceptions.ForbiddenException;
  31. import org.sonar.server.exceptions.NotFoundException;
  32. import org.sonar.server.exceptions.UnauthorizedException;
  33. import org.sonar.server.tester.UserSessionRule;
  34. import org.sonar.server.ws.TestRequest;
  35. import org.sonar.server.ws.WsActionTester;
  36. import static org.assertj.core.api.Assertions.assertThat;
  37. import static org.assertj.core.api.Assertions.assertThatNoException;
  38. import static org.assertj.core.api.Assertions.assertThatThrownBy;
  39. import static org.assertj.core.api.Assertions.tuple;
  40. import static org.sonar.db.permission.GlobalPermission.PROVISION_PROJECTS;
  41. public class SetPatActionIT {
  42. @Rule
  43. public UserSessionRule userSession = UserSessionRule.standalone();
  44. @Rule
  45. public DbTester db = DbTester.create();
  46. public ImportHelper importHelper = new ImportHelper(db.getDbClient(), userSession);
  47. private final WsActionTester ws = new WsActionTester(new SetPatAction(db.getDbClient(), userSession, importHelper));
  48. @Test
  49. public void set_new_azuredevops_pat() {
  50. UserDto user = db.users().insertUser();
  51. AlmSettingDto almSetting = db.almSettings().insertAzureAlmSetting();
  52. userSession.logIn(user).addPermission(PROVISION_PROJECTS);
  53. ws.newRequest()
  54. .setParam("almSetting", almSetting.getKey())
  55. .setParam("pat", "12345678987654321")
  56. .execute();
  57. Optional<AlmPatDto> actualAlmPat = db.getDbClient().almPatDao().selectByUserAndAlmSetting(db.getSession(), user.getUuid(), almSetting);
  58. assertThat(actualAlmPat).isPresent();
  59. assertThat(actualAlmPat.get().getPersonalAccessToken()).isEqualTo("12345678987654321");
  60. assertThat(actualAlmPat.get().getUserUuid()).isEqualTo(user.getUuid());
  61. assertThat(actualAlmPat.get().getAlmSettingUuid()).isEqualTo(almSetting.getUuid());
  62. }
  63. @Test
  64. public void set_new_bitbucketserver_pat() {
  65. UserDto user = db.users().insertUser();
  66. AlmSettingDto almSetting = db.almSettings().insertBitbucketAlmSetting();
  67. userSession.logIn(user).addPermission(PROVISION_PROJECTS);
  68. ws.newRequest()
  69. .setParam("almSetting", almSetting.getKey())
  70. .setParam("pat", "12345678987654321")
  71. .execute();
  72. Optional<AlmPatDto> actualAlmPat = db.getDbClient().almPatDao().selectByUserAndAlmSetting(db.getSession(), user.getUuid(), almSetting);
  73. assertThat(actualAlmPat).isPresent();
  74. assertThat(actualAlmPat.get().getPersonalAccessToken()).isEqualTo("12345678987654321");
  75. assertThat(actualAlmPat.get().getUserUuid()).isEqualTo(user.getUuid());
  76. assertThat(actualAlmPat.get().getAlmSettingUuid()).isEqualTo(almSetting.getUuid());
  77. }
  78. @Test
  79. public void set_new_bitbucketcloud_pat() {
  80. UserDto user = db.users().insertUser();
  81. AlmSettingDto almSetting = db.almSettings().insertBitbucketCloudAlmSetting();
  82. userSession.logIn(user).addPermission(PROVISION_PROJECTS);
  83. String pat = "12345678987654321";
  84. String username = "test-user";
  85. ws.newRequest()
  86. .setParam("almSetting", almSetting.getKey())
  87. .setParam("pat", pat)
  88. .setParam("username", username)
  89. .execute();
  90. Optional<AlmPatDto> actualAlmPat = db.getDbClient().almPatDao().selectByUserAndAlmSetting(db.getSession(), user.getUuid(), almSetting);
  91. assertThat(actualAlmPat).isPresent();
  92. assertThat(actualAlmPat.get().getPersonalAccessToken()).isEqualTo(CredentialsEncoderHelper.encodeCredentials(ALM.BITBUCKET_CLOUD, pat, username));
  93. assertThat(actualAlmPat.get().getUserUuid()).isEqualTo(user.getUuid());
  94. assertThat(actualAlmPat.get().getAlmSettingUuid()).isEqualTo(almSetting.getUuid());
  95. }
  96. @Test
  97. public void set_new_gitlab_pat() {
  98. UserDto user = db.users().insertUser();
  99. AlmSettingDto almSetting = db.almSettings().insertGitlabAlmSetting();
  100. userSession.logIn(user).addPermission(PROVISION_PROJECTS);
  101. ws.newRequest()
  102. .setParam("almSetting", almSetting.getKey())
  103. .setParam("pat", "12345678987654321")
  104. .execute();
  105. Optional<AlmPatDto> actualAlmPat = db.getDbClient().almPatDao().selectByUserAndAlmSetting(db.getSession(), user.getUuid(), almSetting);
  106. assertThat(actualAlmPat).isPresent();
  107. assertThat(actualAlmPat.get().getPersonalAccessToken()).isEqualTo("12345678987654321");
  108. assertThat(actualAlmPat.get().getUserUuid()).isEqualTo(user.getUuid());
  109. assertThat(actualAlmPat.get().getAlmSettingUuid()).isEqualTo(almSetting.getUuid());
  110. }
  111. @Test
  112. public void set_existing_pat() {
  113. UserDto user = db.users().insertUser();
  114. AlmSettingDto almSetting = db.almSettings().insertBitbucketAlmSetting();
  115. userSession.logIn(user).addPermission(PROVISION_PROJECTS);
  116. db.almPats().insert(p -> p.setUserUuid(user.getUuid()), p -> p.setAlmSettingUuid(almSetting.getUuid()));
  117. ws.newRequest()
  118. .setParam("almSetting", almSetting.getKey())
  119. .setParam("pat", "newtoken")
  120. .execute();
  121. Optional<AlmPatDto> actualAlmPat = db.getDbClient().almPatDao().selectByUserAndAlmSetting(db.getSession(), user.getUuid(), almSetting);
  122. assertThat(actualAlmPat).isPresent();
  123. assertThat(actualAlmPat.get().getPersonalAccessToken()).isEqualTo("newtoken");
  124. assertThat(actualAlmPat.get().getUserUuid()).isEqualTo(user.getUuid());
  125. assertThat(actualAlmPat.get().getAlmSettingUuid()).isEqualTo(almSetting.getUuid());
  126. }
  127. @Test
  128. public void fail_when_bitbucketcloud_without_username() {
  129. UserDto user = db.users().insertUser();
  130. AlmSettingDto almSetting = db.almSettings().insertBitbucketCloudAlmSetting();
  131. userSession.logIn(user).addPermission(PROVISION_PROJECTS);
  132. assertThatThrownBy(() -> {
  133. ws.newRequest()
  134. .setParam("almSetting", almSetting.getKey())
  135. .setParam("pat", "12345678987654321")
  136. .execute();
  137. })
  138. .isInstanceOf(IllegalArgumentException.class)
  139. .hasMessage("Username cannot be null for Bitbucket Cloud");
  140. }
  141. @Test
  142. public void set_new_github_pat() {
  143. UserDto user = db.users().insertUser();
  144. AlmSettingDto almSetting = db.almSettings().insertGitHubAlmSetting();
  145. userSession.logIn(user).addPermission(PROVISION_PROJECTS);
  146. ws.newRequest()
  147. .setParam("almSetting", almSetting.getKey())
  148. .setParam("pat", "12345678987654321")
  149. .execute();
  150. Optional<AlmPatDto> actualAlmPat = db.getDbClient().almPatDao().selectByUserAndAlmSetting(db.getSession(), user.getUuid(), almSetting);
  151. assertThat(actualAlmPat).isPresent();
  152. assertThat(actualAlmPat.get().getPersonalAccessToken()).isEqualTo("12345678987654321");
  153. assertThat(actualAlmPat.get().getUserUuid()).isEqualTo(user.getUuid());
  154. assertThat(actualAlmPat.get().getAlmSettingUuid()).isEqualTo(almSetting.getUuid());
  155. }
  156. @Test
  157. public void fail_when_not_logged_in() {
  158. assertThatThrownBy(() -> ws.newRequest().execute())
  159. .isInstanceOf(UnauthorizedException.class);
  160. }
  161. @Test
  162. public void fail_when_no_creation_project_permission() {
  163. UserDto user = db.users().insertUser();
  164. userSession.logIn(user);
  165. assertThatThrownBy(() -> ws.newRequest().execute())
  166. .isInstanceOf(ForbiddenException.class)
  167. .hasMessage("Insufficient privileges");
  168. }
  169. @Test
  170. public void setPat_whenAlmSettingKeyDoesNotExist_shouldThrow() {
  171. UserDto user = db.users().insertUser();
  172. userSession.logIn(user).addPermission(PROVISION_PROJECTS);
  173. TestRequest request = ws.newRequest()
  174. .setParam("almSetting", "unknown")
  175. .setParam("pat", "12345678987654321");
  176. assertThatThrownBy(request::execute)
  177. .isInstanceOf(NotFoundException.class)
  178. .hasMessage("DevOps Platform configuration 'unknown' not found.");
  179. }
  180. @Test
  181. public void setPat_whenNoAlmSettingKeyAndNoConfig_shouldThrow() {
  182. UserDto user = db.users().insertUser();
  183. userSession.logIn(user).addPermission(PROVISION_PROJECTS);
  184. TestRequest request = ws.newRequest()
  185. .setParam("pat", "12345678987654321");
  186. assertThatThrownBy(request::execute)
  187. .isInstanceOf(NotFoundException.class)
  188. .hasMessage("There is no configuration for DevOps Platform. Please add one.");
  189. }
  190. @Test
  191. public void setPat_whenNoAlmSettingKeyAndMultipleConfigs_shouldThrow() {
  192. UserDto user = db.users().insertUser();
  193. userSession.logIn(user).addPermission(PROVISION_PROJECTS);
  194. db.almSettings().insertAzureAlmSetting();
  195. db.almSettings().insertGitHubAlmSetting();
  196. TestRequest request = ws.newRequest()
  197. .setParam("pat", "12345678987654321");
  198. assertThatThrownBy(request::execute)
  199. .isInstanceOf(IllegalArgumentException.class)
  200. .hasMessage("Parameter almSetting is required as there are multiple DevOps Platform configurations.");
  201. }
  202. @Test
  203. public void setPat_whenNoAlmSettingKeyAndOnlyOneConfig_shouldImport() {
  204. UserDto user = db.users().insertUser();
  205. userSession.logIn(user).addPermission(PROVISION_PROJECTS);
  206. db.almSettings().insertAzureAlmSetting();
  207. TestRequest request = ws.newRequest()
  208. .setParam("pat", "12345678987654321");
  209. assertThatNoException().isThrownBy(request::execute);
  210. }
  211. @Test
  212. public void definition() {
  213. WebService.Action def = ws.getDef();
  214. assertThat(def.since()).isEqualTo("8.2");
  215. assertThat(def.isPost()).isTrue();
  216. assertThat(def.params())
  217. .extracting(WebService.Param::key, WebService.Param::isRequired)
  218. .containsExactlyInAnyOrder(
  219. tuple("almSetting", false),
  220. tuple("pat", true),
  221. tuple("username", false));
  222. }
  223. }