You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

AddUserActionTest.java 7.9KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256
  1. /*
  2. * SonarQube
  3. * Copyright (C) 2009-2020 SonarSource SA
  4. * mailto:info AT sonarsource DOT com
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 3 of the License, or (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public License
  17. * along with this program; if not, write to the Free Software Foundation,
  18. * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  19. */
  20. package org.sonar.server.usergroups.ws;
  21. import org.junit.Rule;
  22. import org.junit.Test;
  23. import org.junit.rules.ExpectedException;
  24. import org.sonar.api.impl.utils.AlwaysIncreasingSystem2;
  25. import org.sonar.api.server.ws.Change;
  26. import org.sonar.api.server.ws.WebService.Action;
  27. import org.sonar.db.DbTester;
  28. import org.sonar.db.user.GroupDto;
  29. import org.sonar.db.user.UserDto;
  30. import org.sonar.server.exceptions.NotFoundException;
  31. import org.sonar.server.exceptions.UnauthorizedException;
  32. import org.sonar.server.tester.UserSessionRule;
  33. import org.sonar.server.usergroups.DefaultGroupFinder;
  34. import org.sonar.server.ws.TestRequest;
  35. import org.sonar.server.ws.TestResponse;
  36. import org.sonar.server.ws.WsActionTester;
  37. import static java.net.HttpURLConnection.HTTP_NO_CONTENT;
  38. import static org.assertj.core.api.Assertions.assertThat;
  39. import static org.assertj.core.api.Assertions.tuple;
  40. import static org.sonar.db.permission.OrganizationPermission.ADMINISTER;
  41. import static org.sonar.server.usergroups.ws.GroupWsSupport.PARAM_GROUP_NAME;
  42. import static org.sonar.server.usergroups.ws.GroupWsSupport.PARAM_LOGIN;
  43. public class AddUserActionTest {
  44. @Rule
  45. public DbTester db = DbTester.create(new AlwaysIncreasingSystem2());
  46. @Rule
  47. public UserSessionRule userSession = UserSessionRule.standalone();
  48. @Rule
  49. public ExpectedException expectedException = ExpectedException.none();
  50. private final WsActionTester ws = new WsActionTester(new AddUserAction(db.getDbClient(), userSession, newGroupWsSupport()));
  51. @Test
  52. public void verify_definition() {
  53. Action wsDef = ws.getDef();
  54. assertThat(wsDef.isInternal()).isFalse();
  55. assertThat(wsDef.since()).isEqualTo("5.2");
  56. assertThat(wsDef.isPost()).isTrue();
  57. assertThat(wsDef.changelog()).extracting(Change::getVersion, Change::getDescription).containsOnly(
  58. tuple("8.4", "Parameter 'id' is deprecated. Format changes from integer to string. Use 'name' instead."));
  59. }
  60. @Test
  61. public void add_user_to_group_referenced_by_its_id() {
  62. insertDefaultGroup();
  63. GroupDto group = db.users().insertGroup();
  64. UserDto user = db.users().insertUser();
  65. loginAsAdmin();
  66. newRequest()
  67. .setParam("id", group.getUuid())
  68. .setParam("login", user.getLogin())
  69. .execute();
  70. assertThat(db.users().selectGroupUuidsOfUser(user)).containsOnly(group.getUuid());
  71. }
  72. @Test
  73. public void add_user_to_group_referenced_by_its_name() {
  74. insertDefaultGroup();
  75. GroupDto group = db.users().insertGroup();
  76. UserDto user = db.users().insertUser();
  77. loginAsAdmin();
  78. newRequest()
  79. .setParam(PARAM_GROUP_NAME, group.getName())
  80. .setParam(PARAM_LOGIN, user.getLogin())
  81. .execute();
  82. assertThat(db.users().selectGroupUuidsOfUser(user)).containsOnly(group.getUuid());
  83. }
  84. @Test
  85. public void add_user_to_another_group() {
  86. insertDefaultGroup();
  87. GroupDto admins = db.users().insertGroup("admins");
  88. GroupDto users = db.users().insertGroup("users");
  89. UserDto user = db.users().insertUser("my-admin");
  90. db.users().insertMember(users, user);
  91. loginAsAdmin();
  92. newRequest()
  93. .setParam("id", admins.getUuid())
  94. .setParam("login", user.getLogin())
  95. .execute();
  96. assertThat(db.users().selectGroupUuidsOfUser(user)).containsOnly(admins.getUuid(), users.getUuid());
  97. }
  98. @Test
  99. public void do_not_fail_if_user_is_already_member_of_group() {
  100. insertDefaultGroup();
  101. GroupDto users = db.users().insertGroup();
  102. UserDto user = db.users().insertUser();
  103. db.users().insertMember(users, user);
  104. loginAsAdmin();
  105. newRequest()
  106. .setParam("id", users.getUuid())
  107. .setParam("login", user.getLogin())
  108. .execute();
  109. // do not insert duplicated row
  110. assertThat(db.users().selectGroupUuidsOfUser(user)).hasSize(1).containsOnly(users.getUuid());
  111. }
  112. @Test
  113. public void group_has_multiple_members() {
  114. insertDefaultGroup();
  115. GroupDto users = db.users().insertGroup();
  116. UserDto user1 = db.users().insertUser();
  117. UserDto user2 = db.users().insertUser();
  118. db.users().insertMember(users, user1);
  119. loginAsAdmin();
  120. newRequest()
  121. .setParam("id", users.getUuid())
  122. .setParam("login", user2.getLogin())
  123. .execute();
  124. assertThat(db.users().selectGroupUuidsOfUser(user1)).containsOnly(users.getUuid());
  125. assertThat(db.users().selectGroupUuidsOfUser(user2)).containsOnly(users.getUuid());
  126. }
  127. @Test
  128. public void response_status_is_no_content() {
  129. db.users().insertDefaultGroup();
  130. GroupDto group = db.users().insertGroup();
  131. UserDto user = db.users().insertUser();
  132. loginAsAdmin();
  133. TestResponse response = newRequest()
  134. .setParam("id", group.getUuid())
  135. .setParam("login", user.getLogin())
  136. .execute();
  137. assertThat(response.getStatus()).isEqualTo(HTTP_NO_CONTENT);
  138. }
  139. @Test
  140. public void fail_if_group_does_not_exist() {
  141. UserDto user = db.users().insertUser();
  142. loginAsAdmin();
  143. expectedException.expect(NotFoundException.class);
  144. expectedException.expectMessage("No group with id '42'");
  145. newRequest()
  146. .setParam("id", "42")
  147. .setParam("login", user.getLogin())
  148. .execute();
  149. }
  150. @Test
  151. public void fail_if_user_does_not_exist() {
  152. GroupDto group = db.users().insertGroup("admins");
  153. loginAsAdmin();
  154. expectedException.expect(NotFoundException.class);
  155. expectedException.expectMessage("Could not find a user with login 'my-admin'");
  156. newRequest()
  157. .setParam("id", group.getUuid())
  158. .setParam("login", "my-admin")
  159. .execute();
  160. }
  161. @Test
  162. public void fail_if_not_administrator() {
  163. GroupDto group = db.users().insertGroup();
  164. UserDto user = db.users().insertUser();
  165. expectedException.expect(UnauthorizedException.class);
  166. executeRequest(group, user);
  167. }
  168. @Test
  169. public void fail_to_add_user_to_default_group() {
  170. UserDto user = db.users().insertUser();
  171. GroupDto defaultGroup = db.users().insertDefaultGroup();
  172. loginAsAdmin();
  173. expectedException.expect(IllegalArgumentException.class);
  174. expectedException.expectMessage("Default group 'sonar-users' cannot be used to perform this action");
  175. newRequest()
  176. .setParam("id", defaultGroup.getUuid())
  177. .setParam(PARAM_LOGIN, user.getLogin())
  178. .execute();
  179. }
  180. @Test
  181. public void fail_when_no_default_group() {
  182. GroupDto group = db.users().insertGroup();
  183. UserDto user = db.users().insertUser();
  184. loginAsAdmin();
  185. expectedException.expect(IllegalStateException.class);
  186. expectedException.expectMessage("Default group cannot be found");
  187. newRequest()
  188. .setParam(PARAM_LOGIN, user.getLogin())
  189. .setParam(PARAM_GROUP_NAME, group.getName())
  190. .execute();
  191. }
  192. private void executeRequest(GroupDto groupDto, UserDto userDto) {
  193. newRequest()
  194. .setParam("id", groupDto.getUuid())
  195. .setParam("login", userDto.getLogin())
  196. .execute();
  197. }
  198. private TestRequest newRequest() {
  199. return ws.newRequest();
  200. }
  201. private void loginAsAdmin() {
  202. userSession.logIn().addPermission(ADMINISTER);
  203. }
  204. private void insertDefaultGroup() {
  205. db.users().insertDefaultGroup();
  206. }
  207. private GroupWsSupport newGroupWsSupport() {
  208. return new GroupWsSupport(db.getDbClient(), new DefaultGroupFinder(db.getDbClient()));
  209. }
  210. }