You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

DeleteActionTest.java 9.0KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285
  1. /*
  2. * SonarQube
  3. * Copyright (C) 2009-2020 SonarSource SA
  4. * mailto:info AT sonarsource DOT com
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 3 of the License, or (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public License
  17. * along with this program; if not, write to the Free Software Foundation,
  18. * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  19. */
  20. package org.sonar.server.usergroups.ws;
  21. import org.junit.Rule;
  22. import org.junit.Test;
  23. import org.junit.rules.ExpectedException;
  24. import org.sonar.api.impl.utils.AlwaysIncreasingSystem2;
  25. import org.sonar.api.server.ws.Change;
  26. import org.sonar.api.server.ws.WebService.Action;
  27. import org.sonar.api.web.UserRole;
  28. import org.sonar.db.DbTester;
  29. import org.sonar.db.component.ComponentDbTester;
  30. import org.sonar.db.component.ComponentDto;
  31. import org.sonar.db.component.ComponentTesting;
  32. import org.sonar.db.permission.template.PermissionTemplateDto;
  33. import org.sonar.db.permission.template.PermissionTemplateTesting;
  34. import org.sonar.db.qualityprofile.QProfileDto;
  35. import org.sonar.db.user.GroupDto;
  36. import org.sonar.db.user.UserDto;
  37. import org.sonar.server.exceptions.NotFoundException;
  38. import org.sonar.server.tester.UserSessionRule;
  39. import org.sonar.server.usergroups.DefaultGroupFinder;
  40. import org.sonar.server.ws.TestRequest;
  41. import org.sonar.server.ws.TestResponse;
  42. import org.sonar.server.ws.WsActionTester;
  43. import static org.assertj.core.api.Assertions.assertThat;
  44. import static org.assertj.core.api.Assertions.tuple;
  45. import static org.sonar.core.permission.GlobalPermissions.SYSTEM_ADMIN;
  46. import static org.sonar.db.permission.OrganizationPermission.ADMINISTER;
  47. import static org.sonar.server.usergroups.ws.GroupWsSupport.PARAM_GROUP_ID;
  48. import static org.sonar.server.usergroups.ws.GroupWsSupport.PARAM_GROUP_NAME;
  49. public class DeleteActionTest {
  50. @Rule
  51. public UserSessionRule userSession = UserSessionRule.standalone();
  52. @Rule
  53. public ExpectedException expectedException = ExpectedException.none();
  54. @Rule
  55. public DbTester db = DbTester.create(new AlwaysIncreasingSystem2());
  56. private final ComponentDbTester componentTester = new ComponentDbTester(db);
  57. private final WsActionTester ws = new WsActionTester(new DeleteAction(db.getDbClient(), userSession, newGroupWsSupport()));
  58. @Test
  59. public void verify_definition() {
  60. Action wsDef = ws.getDef();
  61. assertThat(wsDef.isInternal()).isFalse();
  62. assertThat(wsDef.since()).isEqualTo("5.2");
  63. assertThat(wsDef.isPost()).isTrue();
  64. assertThat(wsDef.changelog()).extracting(Change::getVersion, Change::getDescription).containsOnly(
  65. tuple("8.4", "Parameter 'id' is deprecated. Format changes from integer to string. Use 'name' instead."));
  66. }
  67. @Test
  68. public void response_has_no_content() {
  69. addAdmin();
  70. insertDefaultGroup();
  71. GroupDto group = db.users().insertGroup();
  72. loginAsAdmin();
  73. TestResponse response = newRequest()
  74. .setParam("id", group.getUuid())
  75. .execute();
  76. assertThat(response.getStatus()).isEqualTo(204);
  77. }
  78. @Test
  79. public void delete_by_id() {
  80. addAdmin();
  81. insertDefaultGroup();
  82. GroupDto group = db.users().insertGroup();
  83. loginAsAdmin();
  84. newRequest()
  85. .setParam("id", group.getUuid())
  86. .execute();
  87. assertThat(db.users().selectGroupByUuid(group.getUuid())).isNull();
  88. }
  89. @Test
  90. public void delete_by_name() {
  91. addAdmin();
  92. insertDefaultGroup();
  93. GroupDto group = db.users().insertGroup();
  94. loginAsAdmin();
  95. newRequest()
  96. .setParam(PARAM_GROUP_NAME, group.getName())
  97. .execute();
  98. assertThat(db.users().selectGroupByUuid(group.getUuid())).isNull();
  99. }
  100. @Test
  101. public void delete_members() {
  102. addAdmin();
  103. insertDefaultGroup();
  104. GroupDto group = db.users().insertGroup();
  105. UserDto user = db.users().insertUser();
  106. db.users().insertMember(group, user);
  107. loginAsAdmin();
  108. newRequest()
  109. .setParam("id", group.getUuid())
  110. .execute();
  111. assertThat(db.countRowsOfTable("groups_users")).isZero();
  112. }
  113. @Test
  114. public void delete_permissions() {
  115. addAdmin();
  116. insertDefaultGroup();
  117. GroupDto group = db.users().insertGroup();
  118. ComponentDto project = componentTester.insertComponent(ComponentTesting.newPrivateProjectDto(db.getDefaultOrganization()));
  119. db.users().insertProjectPermissionOnGroup(group, UserRole.ADMIN, project);
  120. loginAsAdmin();
  121. newRequest()
  122. .setParam("id", group.getUuid())
  123. .execute();
  124. assertThat(db.countRowsOfTable("group_roles")).isZero();
  125. }
  126. @Test
  127. public void delete_group_from_permission_templates() {
  128. addAdmin();
  129. insertDefaultGroup();
  130. GroupDto group = db.users().insertGroup();
  131. PermissionTemplateDto template = db.getDbClient().permissionTemplateDao().insert(db.getSession(),
  132. PermissionTemplateTesting.newPermissionTemplateDto());
  133. db.getDbClient().permissionTemplateDao().insertGroupPermission(db.getSession(), template.getUuid(), group.getUuid(), "perm");
  134. db.commit();
  135. loginAsAdmin();
  136. assertThat(db.countRowsOfTable("perm_templates_groups")).isEqualTo(1);
  137. newRequest()
  138. .setParam("id", group.getUuid())
  139. .execute();
  140. assertThat(db.countRowsOfTable("perm_templates_groups")).isZero();
  141. }
  142. @Test
  143. public void delete_qprofile_permissions() {
  144. addAdmin();
  145. insertDefaultGroup();
  146. GroupDto group = db.users().insertGroup();
  147. QProfileDto profile = db.qualityProfiles().insert();
  148. db.qualityProfiles().addGroupPermission(profile, group);
  149. loginAsAdmin();
  150. newRequest()
  151. .setParam("id", group.getUuid())
  152. .execute();
  153. assertThat(db.countRowsOfTable("qprofile_edit_groups")).isZero();
  154. }
  155. @Test
  156. public void fail_if_id_does_not_exist() {
  157. addAdmin();
  158. loginAsAdmin();
  159. int groupId = 123;
  160. expectedException.expect(NotFoundException.class);
  161. expectedException.expectMessage("No group with id '" + groupId + "'");
  162. newRequest()
  163. .setParam("id", String.valueOf(groupId))
  164. .execute();
  165. }
  166. @Test
  167. public void fail_to_delete_default_group() {
  168. loginAsAdmin();
  169. GroupDto defaultGroup = db.users().insertDefaultGroup();
  170. expectedException.expect(IllegalArgumentException.class);
  171. expectedException.expectMessage("Default group 'sonar-users' cannot be used to perform this action");
  172. newRequest()
  173. .setParam("id", defaultGroup.getUuid())
  174. .execute();
  175. }
  176. @Test
  177. public void cannot_delete_last_system_admin_group() {
  178. insertDefaultGroup();
  179. GroupDto group = db.users().insertGroup();
  180. db.users().insertPermissionOnGroup(group, SYSTEM_ADMIN);
  181. loginAsAdmin();
  182. expectedException.expect(IllegalArgumentException.class);
  183. expectedException.expectMessage("The last system admin group cannot be deleted");
  184. newRequest()
  185. .setParam(PARAM_GROUP_NAME, group.getName())
  186. .execute();
  187. }
  188. @Test
  189. public void delete_admin_group_fails_if_no_admin_users_left() {
  190. // admin users are part of the group to be deleted
  191. db.users().insertDefaultGroup();
  192. GroupDto adminGroup = db.users().insertGroup("admins");
  193. db.users().insertPermissionOnGroup(adminGroup, SYSTEM_ADMIN);
  194. UserDto bigBoss = db.users().insertUser();
  195. db.users().insertMember(adminGroup, bigBoss);
  196. loginAsAdmin();
  197. expectedException.expect(IllegalArgumentException.class);
  198. expectedException.expectMessage("The last system admin group cannot be deleted");
  199. executeDeleteGroupRequest(adminGroup);
  200. }
  201. @Test
  202. public void delete_admin_group_succeeds_if_other_groups_have_administrators() {
  203. db.users().insertDefaultGroup();
  204. GroupDto adminGroup1 = db.users().insertGroup("admins");
  205. db.users().insertPermissionOnGroup(adminGroup1, SYSTEM_ADMIN);
  206. GroupDto adminGroup2 = db.users().insertGroup("admins2");
  207. db.users().insertPermissionOnGroup(adminGroup2, SYSTEM_ADMIN);
  208. UserDto bigBoss = db.users().insertUser();
  209. db.users().insertMember(adminGroup2, bigBoss);
  210. loginAsAdmin();
  211. executeDeleteGroupRequest(adminGroup1);
  212. assertThat(db.users().selectGroupPermissions(adminGroup2, null)).hasSize(1);
  213. }
  214. private void executeDeleteGroupRequest(GroupDto adminGroup1) {
  215. newRequest()
  216. .setParam(PARAM_GROUP_ID, adminGroup1.getUuid())
  217. .execute();
  218. }
  219. private void addAdmin() {
  220. UserDto admin = db.users().insertUser();
  221. db.users().insertPermissionOnUser(admin, SYSTEM_ADMIN);
  222. }
  223. private void loginAsAdmin() {
  224. userSession.logIn().addPermission(ADMINISTER);
  225. }
  226. private void insertDefaultGroup() {
  227. db.users().insertDefaultGroup();
  228. }
  229. private TestRequest newRequest() {
  230. return ws.newRequest();
  231. }
  232. private GroupWsSupport newGroupWsSupport() {
  233. return new GroupWsSupport(db.getDbClient(), new DefaultGroupFinder(db.getDbClient()));
  234. }
  235. }