You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

DeleteTemplateActionTest.java 15KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400
  1. /*
  2. * SonarQube
  3. * Copyright (C) 2009-2020 SonarSource SA
  4. * mailto:info AT sonarsource DOT com
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 3 of the License, or (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public License
  17. * along with this program; if not, write to the Free Software Foundation,
  18. * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  19. */
  20. package org.sonar.server.permission.ws.template;
  21. import java.util.Arrays;
  22. import javax.annotation.Nullable;
  23. import org.junit.Before;
  24. import org.junit.Rule;
  25. import org.junit.Test;
  26. import org.junit.rules.ExpectedException;
  27. import org.sonar.api.impl.utils.AlwaysIncreasingSystem2;
  28. import org.sonar.api.resources.Qualifiers;
  29. import org.sonar.api.web.UserRole;
  30. import org.sonar.db.DbClient;
  31. import org.sonar.db.DbTester;
  32. import org.sonar.db.component.ResourceTypesRule;
  33. import org.sonar.db.permission.template.PermissionTemplateDto;
  34. import org.sonar.db.permission.template.PermissionTemplateTesting;
  35. import org.sonar.db.user.GroupDto;
  36. import org.sonar.db.user.GroupTesting;
  37. import org.sonar.db.user.UserDto;
  38. import org.sonar.db.user.UserTesting;
  39. import org.sonar.server.component.ComponentFinder;
  40. import org.sonar.server.exceptions.BadRequestException;
  41. import org.sonar.server.exceptions.ForbiddenException;
  42. import org.sonar.server.exceptions.NotFoundException;
  43. import org.sonar.server.exceptions.UnauthorizedException;
  44. import org.sonar.server.organization.DefaultOrganizationProvider;
  45. import org.sonar.server.organization.TestDefaultOrganizationProvider;
  46. import org.sonar.server.permission.DefaultTemplatesResolver;
  47. import org.sonar.server.permission.DefaultTemplatesResolverImpl;
  48. import org.sonar.server.permission.ws.PermissionWsSupport;
  49. import org.sonar.server.tester.UserSessionRule;
  50. import org.sonar.server.usergroups.DefaultGroupFinder;
  51. import org.sonar.server.usergroups.ws.GroupWsSupport;
  52. import org.sonar.server.ws.TestRequest;
  53. import org.sonar.server.ws.TestResponse;
  54. import org.sonar.server.ws.WsActionTester;
  55. import static org.assertj.core.api.Assertions.assertThat;
  56. import static org.sonar.db.permission.OrganizationPermission.ADMINISTER;
  57. import static org.sonarqube.ws.client.permission.PermissionsWsParameters.PARAM_TEMPLATE_ID;
  58. import static org.sonarqube.ws.client.permission.PermissionsWsParameters.PARAM_TEMPLATE_NAME;
  59. public class DeleteTemplateActionTest {
  60. @Rule
  61. public DbTester db = DbTester.create(new AlwaysIncreasingSystem2());
  62. @Rule
  63. public ExpectedException expectedException = ExpectedException.none();
  64. private UserSessionRule userSession = UserSessionRule.standalone();
  65. private DbClient dbClient = db.getDbClient();
  66. private final ResourceTypesRule resourceTypes = new ResourceTypesRule().setRootQualifiers(Qualifiers.PROJECT);
  67. private final ResourceTypesRule resourceTypesWithViews = new ResourceTypesRule().setRootQualifiers(Qualifiers.PROJECT, Qualifiers.VIEW);
  68. private DefaultTemplatesResolver defaultTemplatesResolver = new DefaultTemplatesResolverImpl(resourceTypes);
  69. private DefaultTemplatesResolver defaultTemplatesResolverWithViews = new DefaultTemplatesResolverImpl(resourceTypesWithViews);
  70. private WsActionTester underTestWithoutViews;
  71. private WsActionTester underTestWithViews;
  72. @Before
  73. public void setUp() {
  74. DefaultOrganizationProvider defaultOrganizationProvider = TestDefaultOrganizationProvider.from(db);
  75. GroupWsSupport groupWsSupport = new GroupWsSupport(dbClient, new DefaultGroupFinder(db.getDbClient()));
  76. this.underTestWithoutViews = new WsActionTester(new DeleteTemplateAction(dbClient, userSession,
  77. new PermissionWsSupport(dbClient, new ComponentFinder(dbClient, resourceTypes), groupWsSupport), defaultTemplatesResolver, defaultOrganizationProvider));
  78. this.underTestWithViews = new WsActionTester(new DeleteTemplateAction(dbClient, userSession,
  79. new PermissionWsSupport(dbClient, new ComponentFinder(dbClient, resourceTypes), groupWsSupport), defaultTemplatesResolverWithViews, defaultOrganizationProvider));
  80. }
  81. @Test
  82. public void delete_template_in_db() throws Exception {
  83. runOnAllUnderTests((underTest) -> {
  84. PermissionTemplateDto template = insertTemplateAndAssociatedPermissions();
  85. db.organizations().setDefaultTemplates(
  86. db.permissionTemplates().insertTemplate(),
  87. null, db.permissionTemplates().insertTemplate()
  88. );
  89. loginAsAdmin();
  90. TestResponse result = newRequestByUuid(underTest, template.getUuid());
  91. assertThat(result.getInput()).isEmpty();
  92. assertTemplateDoesNotExist(template);
  93. });
  94. }
  95. @Test
  96. public void delete_template_by_name_case_insensitive() throws Exception {
  97. runOnAllUnderTests((underTest) -> {
  98. db.organizations().setDefaultTemplates(
  99. db.permissionTemplates().insertTemplate(),
  100. db.permissionTemplates().insertTemplate(), db.permissionTemplates().insertTemplate()
  101. );
  102. PermissionTemplateDto template = insertTemplateAndAssociatedPermissions();
  103. loginAsAdmin();
  104. newRequestByName(underTest, template);
  105. assertTemplateDoesNotExist(template);
  106. });
  107. }
  108. @Test
  109. public void fail_if_uuid_is_not_known_without_views() {
  110. userSession.logIn();
  111. expectedException.expect(NotFoundException.class);
  112. newRequestByUuid(underTestWithoutViews, "unknown-template-uuid");
  113. }
  114. @Test
  115. public void fail_if_uuid_is_not_known_with_views() {
  116. userSession.logIn();
  117. expectedException.expect(NotFoundException.class);
  118. newRequestByUuid(underTestWithViews, "unknown-template-uuid");
  119. }
  120. @Test
  121. public void fail_to_delete_by_uuid_if_template_is_default_template_for_project_without_views() {
  122. fail_to_delete_by_uuid_if_template_is_default_template_for_project(this.underTestWithoutViews);
  123. }
  124. @Test
  125. public void fail_to_delete_by_uuid_if_template_is_default_template_for_project_with_views() {
  126. fail_to_delete_by_uuid_if_template_is_default_template_for_project(this.underTestWithViews);
  127. }
  128. private void fail_to_delete_by_uuid_if_template_is_default_template_for_project(WsActionTester underTest) {
  129. PermissionTemplateDto projectTemplate = insertTemplateAndAssociatedPermissions();
  130. db.organizations().setDefaultTemplates(projectTemplate,
  131. null, db.permissionTemplates().insertTemplate());
  132. loginAsAdmin();
  133. expectedException.expect(BadRequestException.class);
  134. expectedException.expectMessage("It is not possible to delete the default permission template for projects");
  135. newRequestByUuid(underTest, projectTemplate.getUuid());
  136. }
  137. @Test
  138. public void fail_to_delete_by_name_if_template_is_default_template_for_project_without_views() {
  139. fail_to_delete_by_name_if_template_is_default_template_for_project(this.underTestWithoutViews);
  140. }
  141. @Test
  142. public void fail_to_delete_by_name_if_template_is_default_template_for_project_with_views() {
  143. fail_to_delete_by_name_if_template_is_default_template_for_project(this.underTestWithViews);
  144. }
  145. private void fail_to_delete_by_name_if_template_is_default_template_for_project(WsActionTester underTest) {
  146. PermissionTemplateDto projectTemplate = insertTemplateAndAssociatedPermissions();
  147. db.organizations().setDefaultTemplates(projectTemplate, null, db.permissionTemplates().insertTemplate());
  148. loginAsAdmin();
  149. expectedException.expect(BadRequestException.class);
  150. expectedException.expectMessage("It is not possible to delete the default permission template for projects");
  151. newRequestByName(underTest, projectTemplate.getName());
  152. }
  153. @Test
  154. public void fail_to_delete_by_uuid_if_template_is_default_template_for_portfolios_with_views() {
  155. PermissionTemplateDto template = insertTemplateAndAssociatedPermissions();
  156. db.organizations().setDefaultTemplates(db.permissionTemplates().insertTemplate(), null, template);
  157. loginAsAdmin();
  158. expectedException.expect(BadRequestException.class);
  159. expectedException.expectMessage("It is not possible to delete the default permission template for portfolios");
  160. newRequestByUuid(this.underTestWithViews, template.getUuid());
  161. }
  162. @Test
  163. public void fail_to_delete_by_uuid_if_template_is_default_template_for_applications_with_views() {
  164. PermissionTemplateDto template = insertTemplateAndAssociatedPermissions();
  165. db.organizations().setDefaultTemplates(db.permissionTemplates().insertTemplate(), template, null);
  166. loginAsAdmin();
  167. expectedException.expect(BadRequestException.class);
  168. expectedException.expectMessage("It is not possible to delete the default permission template for applications");
  169. newRequestByUuid(this.underTestWithViews, template.getUuid());
  170. }
  171. @Test
  172. public void default_template_for_views_can_be_deleted_by_uuid_if_views_is_not_installed_and_default_template_for_views_is_reset() {
  173. PermissionTemplateDto projectTemplate = db.permissionTemplates().insertTemplate();
  174. PermissionTemplateDto viewTemplate = insertTemplateAndAssociatedPermissions();
  175. db.organizations().setDefaultTemplates(projectTemplate, null, viewTemplate);
  176. loginAsAdmin();
  177. newRequestByUuid(this.underTestWithoutViews, viewTemplate.getUuid());
  178. assertTemplateDoesNotExist(viewTemplate);
  179. assertThat(db.getDbClient().organizationDao().getDefaultTemplates(db.getSession(), db.getDefaultOrganization().getUuid())
  180. .get().getApplicationsUuid())
  181. .isNull();
  182. }
  183. @Test
  184. public void fail_to_delete_by_uuid_if_not_logged_in_without_views() {
  185. expectedException.expect(UnauthorizedException.class);
  186. newRequestByUuid(underTestWithoutViews, "uuid");
  187. }
  188. @Test
  189. public void fail_to_delete_by_uuid_if_not_logged_in_with_views() {
  190. expectedException.expect(UnauthorizedException.class);
  191. newRequestByUuid(underTestWithViews, "uuid");
  192. }
  193. @Test
  194. public void fail_to_delete_by_name_if_not_logged_in_without_views() {
  195. expectedException.expect(UnauthorizedException.class);
  196. newRequestByName(underTestWithoutViews, "name");
  197. }
  198. @Test
  199. public void fail_to_delete_by_name_if_not_logged_in_with_views() {
  200. expectedException.expect(UnauthorizedException.class);
  201. newRequestByName(underTestWithViews, "name");
  202. }
  203. @Test
  204. public void fail_to_delete_by_uuid_if_not_admin_without_views() {
  205. PermissionTemplateDto template = insertTemplateAndAssociatedPermissions();
  206. userSession.logIn();
  207. expectedException.expect(ForbiddenException.class);
  208. newRequestByUuid(underTestWithoutViews, template.getUuid());
  209. }
  210. @Test
  211. public void fail_to_delete_by_uuid_if_not_admin_with_views() {
  212. PermissionTemplateDto template = insertTemplateAndAssociatedPermissions();
  213. userSession.logIn();
  214. expectedException.expect(ForbiddenException.class);
  215. newRequestByUuid(underTestWithViews, template.getUuid());
  216. }
  217. @Test
  218. public void fail_to_delete_by_name_if_not_admin_without_views() {
  219. PermissionTemplateDto template = db.permissionTemplates().insertTemplate();
  220. userSession.logIn();
  221. expectedException.expect(ForbiddenException.class);
  222. newRequestByName(underTestWithoutViews, template.getName());
  223. }
  224. @Test
  225. public void fail_to_delete_by_name_if_not_admin_with_views() {
  226. PermissionTemplateDto template = db.permissionTemplates().insertTemplate(PermissionTemplateTesting.newPermissionTemplateDto()
  227. .setName("the name"));
  228. userSession.logIn();
  229. expectedException.expect(ForbiddenException.class);
  230. newRequestByName(underTestWithViews, template);
  231. }
  232. @Test
  233. public void fail_if_neither_uuid_nor_name_is_provided_without_views() {
  234. userSession.logIn();
  235. expectedException.expect(BadRequestException.class);
  236. newRequestByUuid(underTestWithoutViews, null);
  237. }
  238. @Test
  239. public void fail_if_neither_uuid_nor_name_is_provided_with_views() {
  240. userSession.logIn();
  241. expectedException.expect(BadRequestException.class);
  242. newRequestByUuid(underTestWithViews, null);
  243. }
  244. @Test
  245. public void fail_if_both_uuid_and_name_are_provided_without_views() {
  246. userSession.logIn();
  247. expectedException.expect(BadRequestException.class);
  248. underTestWithoutViews.newRequest().setMethod("POST")
  249. .setParam(PARAM_TEMPLATE_ID, "uuid")
  250. .setParam(PARAM_TEMPLATE_NAME, "name")
  251. .execute();
  252. }
  253. @Test
  254. public void fail_if_both_uuid_and_name_are_provided_with_views() {
  255. userSession.logIn();
  256. expectedException.expect(BadRequestException.class);
  257. underTestWithViews.newRequest().setMethod("POST")
  258. .setParam(PARAM_TEMPLATE_ID, "uuid")
  259. .setParam(PARAM_TEMPLATE_NAME, "name")
  260. .execute();
  261. }
  262. // @Test
  263. // public void delete_perm_tpl_characteristic_when_delete_template() throws Exception {
  264. // db.getDbClient().permissionTemplateCharacteristicDao().insert(db.getSession(), new PermissionTemplateCharacteristicDto()
  265. // .setPermission(UserRole.USER)
  266. // .setTemplateId(template.getId())
  267. // .setWithProjectCreator(true)
  268. // .setCreatedAt(new Date().getTime())
  269. // .setUpdatedAt(new Date().getTime()));
  270. // db.commit();
  271. //
  272. // newRequest(template.getUuid());
  273. //
  274. // assertThat(db.getDbClient().permissionTemplateCharacteristicDao().selectByTemplateIds(db.getSession(),
  275. // asList(template.getId()))).isEmpty();
  276. // }
  277. private UserSessionRule loginAsAdmin() {
  278. return userSession.logIn().addPermission(ADMINISTER);
  279. }
  280. private void runOnAllUnderTests(ConsumerWithException<WsActionTester> consumer) throws Exception {
  281. for (WsActionTester underTest : Arrays.asList(underTestWithoutViews, underTestWithViews)) {
  282. consumer.accept(underTest);
  283. }
  284. }
  285. private interface ConsumerWithException<T> {
  286. void accept(T e) throws Exception;
  287. }
  288. private PermissionTemplateDto insertTemplateAndAssociatedPermissions() {
  289. PermissionTemplateDto dto = db.permissionTemplates().insertTemplate();
  290. UserDto user = db.getDbClient().userDao().insert(db.getSession(), UserTesting.newUserDto().setActive(true));
  291. GroupDto group = db.getDbClient().groupDao().insert(db.getSession(), GroupTesting.newGroupDto());
  292. db.getDbClient().permissionTemplateDao().insertUserPermission(db.getSession(), dto.getUuid(), user.getUuid(), UserRole.ADMIN);
  293. db.getDbClient().permissionTemplateDao().insertGroupPermission(db.getSession(), dto.getUuid(), group.getUuid(), UserRole.CODEVIEWER);
  294. db.commit();
  295. return dto;
  296. }
  297. private TestResponse newRequestByUuid(WsActionTester actionTester, @Nullable String id) {
  298. TestRequest request = actionTester.newRequest().setMethod("POST");
  299. if (id != null) {
  300. request.setParam(PARAM_TEMPLATE_ID, id);
  301. }
  302. return request.execute();
  303. }
  304. private TestResponse newRequestByName(WsActionTester actionTester, @Nullable PermissionTemplateDto permissionTemplateDto) {
  305. return newRequestByName(
  306. actionTester,
  307. permissionTemplateDto == null ? null : permissionTemplateDto.getName());
  308. }
  309. private TestResponse newRequestByName(WsActionTester actionTester, @Nullable String name) {
  310. TestRequest request = actionTester.newRequest().setMethod("POST");
  311. if (name != null) {
  312. request.setParam(PARAM_TEMPLATE_NAME, name);
  313. }
  314. return request.execute();
  315. }
  316. private void assertTemplateDoesNotExist(PermissionTemplateDto template) {
  317. assertThat(db.getDbClient().permissionTemplateDao().selectByUuid(db.getSession(), template.getUuid())).isNull();
  318. }
  319. }