You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

TemplateGroupsActionTest.java 16KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378
  1. /*
  2. * SonarQube
  3. * Copyright (C) 2009-2019 SonarSource SA
  4. * mailto:info AT sonarsource DOT com
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 3 of the License, or (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public License
  17. * along with this program; if not, write to the Free Software Foundation,
  18. * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  19. */
  20. package org.sonar.server.permission.ws.template;
  21. import javax.annotation.Nullable;
  22. import org.junit.Test;
  23. import org.sonar.api.resources.Qualifiers;
  24. import org.sonar.api.resources.ResourceTypes;
  25. import org.sonar.core.permission.GlobalPermissions;
  26. import org.sonar.db.component.ResourceTypesRule;
  27. import org.sonar.db.organization.OrganizationDto;
  28. import org.sonar.db.permission.template.PermissionTemplateDto;
  29. import org.sonar.db.permission.template.PermissionTemplateGroupDto;
  30. import org.sonar.db.user.GroupDto;
  31. import org.sonar.server.exceptions.BadRequestException;
  32. import org.sonar.server.exceptions.ForbiddenException;
  33. import org.sonar.server.exceptions.NotFoundException;
  34. import org.sonar.server.exceptions.UnauthorizedException;
  35. import org.sonar.server.permission.PermissionService;
  36. import org.sonar.server.permission.PermissionServiceImpl;
  37. import org.sonar.server.permission.ws.BasePermissionWsTest;
  38. import org.sonar.server.permission.ws.RequestValidator;
  39. import org.sonar.server.permission.ws.WsParameters;
  40. import org.sonarqube.ws.Permissions.WsGroupsResponse;
  41. import static org.assertj.core.api.Assertions.assertThat;
  42. import static org.sonar.api.server.ws.WebService.Param.PAGE;
  43. import static org.sonar.api.server.ws.WebService.Param.PAGE_SIZE;
  44. import static org.sonar.api.server.ws.WebService.Param.TEXT_QUERY;
  45. import static org.sonar.api.web.UserRole.ADMIN;
  46. import static org.sonar.api.web.UserRole.CODEVIEWER;
  47. import static org.sonar.api.web.UserRole.ISSUE_ADMIN;
  48. import static org.sonar.api.web.UserRole.USER;
  49. import static org.sonar.db.permission.template.PermissionTemplateTesting.newPermissionTemplateGroupDto;
  50. import static org.sonar.db.user.GroupTesting.newGroupDto;
  51. import static org.sonar.test.JsonAssert.assertJson;
  52. import static org.sonarqube.ws.MediaTypes.PROTOBUF;
  53. import static org.sonarqube.ws.client.permission.PermissionsWsParameters.PARAM_PERMISSION;
  54. import static org.sonarqube.ws.client.permission.PermissionsWsParameters.PARAM_TEMPLATE_ID;
  55. import static org.sonarqube.ws.client.permission.PermissionsWsParameters.PARAM_TEMPLATE_NAME;
  56. public class TemplateGroupsActionTest extends BasePermissionWsTest<TemplateGroupsAction> {
  57. private ResourceTypes resourceTypes = new ResourceTypesRule().setRootQualifiers(Qualifiers.PROJECT);
  58. private PermissionService permissionService = new PermissionServiceImpl(resourceTypes);
  59. private WsParameters wsParameters = new WsParameters(permissionService);
  60. private RequestValidator requestValidator = new RequestValidator(permissionService);
  61. @Override
  62. protected TemplateGroupsAction buildWsAction() {
  63. return new TemplateGroupsAction(db.getDbClient(), userSession, newPermissionWsSupport(), wsParameters, requestValidator);
  64. }
  65. @Test
  66. public void template_groups_of_json_example() {
  67. GroupDto adminGroup = insertGroupOnDefaultOrganization("sonar-administrators", "System administrators");
  68. GroupDto userGroup = insertGroupOnDefaultOrganization("sonar-users", "Any new users created will automatically join this group");
  69. PermissionTemplateDto template = addTemplateToDefaultOrganization();
  70. addGroupToTemplate(newPermissionTemplateGroup(ISSUE_ADMIN, template.getId(), adminGroup.getId()));
  71. addGroupToTemplate(newPermissionTemplateGroup(ISSUE_ADMIN, template.getId(), userGroup.getId()));
  72. // Anyone group
  73. addGroupToTemplate(newPermissionTemplateGroup(USER, template.getId(), null));
  74. addGroupToTemplate(newPermissionTemplateGroup(ISSUE_ADMIN, template.getId(), null));
  75. commit();
  76. loginAsAdmin(db.getDefaultOrganization());
  77. String response = newRequest()
  78. .setParam(PARAM_PERMISSION, ISSUE_ADMIN)
  79. .setParam(PARAM_TEMPLATE_ID, template.getUuid())
  80. .execute()
  81. .getInput();
  82. assertJson(response)
  83. .ignoreFields("id")
  84. .withStrictArrayOrder()
  85. .isSimilarTo(getClass().getResource("template_groups-example.json"));
  86. }
  87. @Test
  88. public void do_not_fail_when_group_name_exists_in_multiple_organizations() {
  89. PermissionTemplateDto template = addTemplateToDefaultOrganization();
  90. String groupName = "group-name";
  91. GroupDto group1 = db.users().insertGroup(db.getDefaultOrganization(), groupName);
  92. addGroupToTemplate(newPermissionTemplateGroup(CODEVIEWER, template.getId(), group1.getId()));
  93. addGroupToTemplate(newPermissionTemplateGroup(ADMIN, template.getId(), group1.getId()));
  94. OrganizationDto otherOrganization = db.organizations().insert();
  95. db.users().insertGroup(otherOrganization, groupName);
  96. loginAsAdmin(db.getDefaultOrganization());
  97. newRequest()
  98. .setMediaType(PROTOBUF)
  99. .setParam(PARAM_TEMPLATE_ID, template.getUuid())
  100. .setParam(TEXT_QUERY, "-nam")
  101. .execute();
  102. }
  103. @Test
  104. public void return_all_permissions_of_matching_groups() {
  105. PermissionTemplateDto template = addTemplateToDefaultOrganization();
  106. GroupDto group1 = db.users().insertGroup(db.getDefaultOrganization(), "group-1-name");
  107. addGroupToTemplate(newPermissionTemplateGroup(CODEVIEWER, template.getId(), group1.getId()));
  108. addGroupToTemplate(newPermissionTemplateGroup(ADMIN, template.getId(), group1.getId()));
  109. GroupDto group2 = db.users().insertGroup(db.getDefaultOrganization(), "group-2-name");
  110. addGroupToTemplate(newPermissionTemplateGroup(USER, template.getId(), group2.getId()));
  111. addGroupToTemplate(newPermissionTemplateGroup(ADMIN, template.getId(), group2.getId()));
  112. GroupDto group3 = db.users().insertGroup(db.getDefaultOrganization(), "group-3-name");
  113. // Anyone
  114. addGroupToTemplate(newPermissionTemplateGroup(USER, template.getId(), null));
  115. addGroupToTemplate(newPermissionTemplateGroup(ISSUE_ADMIN, template.getId(), null));
  116. PermissionTemplateDto anotherTemplate = addTemplateToDefaultOrganization();
  117. addGroupToTemplate(newPermissionTemplateGroup(ADMIN, anotherTemplate.getId(), group3.getId()));
  118. commit();
  119. loginAsAdmin(db.getDefaultOrganization());
  120. WsGroupsResponse response = newRequest()
  121. .setParam(PARAM_TEMPLATE_ID, template.getUuid())
  122. .executeProtobuf(WsGroupsResponse.class);
  123. assertThat(response.getGroupsList()).extracting("name").containsExactly("Anyone", "group-1-name", "group-2-name", "group-3-name");
  124. assertThat(response.getGroups(0).getPermissionsList()).containsOnly("user", "issueadmin");
  125. assertThat(response.getGroups(1).getPermissionsList()).containsOnly("codeviewer", "admin");
  126. assertThat(response.getGroups(2).getPermissionsList()).containsOnly("user", "admin");
  127. }
  128. @Test
  129. public void search_by_permission() {
  130. PermissionTemplateDto template = addTemplateToDefaultOrganization();
  131. GroupDto group1 = db.users().insertGroup(db.getDefaultOrganization(), "group-1-name");
  132. addGroupToTemplate(newPermissionTemplateGroup(USER, template.getId(), group1.getId()));
  133. addGroupToTemplate(newPermissionTemplateGroup(CODEVIEWER, template.getId(), group1.getId()));
  134. GroupDto group2 = db.users().insertGroup(db.getDefaultOrganization(), "group-2-name");
  135. addGroupToTemplate(newPermissionTemplateGroup(ADMIN, template.getId(), group2.getId()));
  136. GroupDto group3 = db.users().insertGroup(db.getDefaultOrganization(), "group-3-name");
  137. // Anyone
  138. addGroupToTemplate(newPermissionTemplateGroup(USER, template.getId(), null));
  139. PermissionTemplateDto anotherTemplate = addTemplateToDefaultOrganization();
  140. addGroupToTemplate(newPermissionTemplateGroup(ADMIN, anotherTemplate.getId(), group3.getId()));
  141. commit();
  142. loginAsAdmin(db.getDefaultOrganization());
  143. WsGroupsResponse response = newRequest()
  144. .setParam(PARAM_PERMISSION, USER)
  145. .setParam(PARAM_TEMPLATE_ID, template.getUuid())
  146. .executeProtobuf(WsGroupsResponse.class);
  147. assertThat(response.getGroupsList()).extracting("name").containsExactly("Anyone", "group-1-name");
  148. assertThat(response.getGroups(0).getPermissionsList()).containsOnly("user");
  149. assertThat(response.getGroups(1).getPermissionsList()).containsOnly("user", "codeviewer");
  150. }
  151. @Test
  152. public void search_by_template_name() {
  153. OrganizationDto defaultOrg = db.getDefaultOrganization();
  154. GroupDto group1 = db.users().insertGroup(defaultOrg, "group-1-name");
  155. GroupDto group2 = db.users().insertGroup(defaultOrg, "group-2-name");
  156. GroupDto group3 = db.users().insertGroup(defaultOrg, "group-3-name");
  157. PermissionTemplateDto template = addTemplateToDefaultOrganization();
  158. addGroupToTemplate(newPermissionTemplateGroup(USER, template.getId(), group1.getId()));
  159. addGroupToTemplate(newPermissionTemplateGroup(ADMIN, template.getId(), group2.getId()));
  160. addGroupToTemplate(newPermissionTemplateGroup(USER, template.getId(), null));
  161. PermissionTemplateDto anotherTemplate = addTemplateToDefaultOrganization();
  162. addGroupToTemplate(newPermissionTemplateGroup(USER, anotherTemplate.getId(), group1.getId()));
  163. commit();
  164. loginAsAdmin(db.getDefaultOrganization());
  165. WsGroupsResponse response = newRequest()
  166. .setParam(PARAM_TEMPLATE_NAME, template.getName())
  167. .executeProtobuf(WsGroupsResponse.class);
  168. assertThat(response.getGroupsList()).extracting("name").containsExactly("Anyone", "group-1-name", "group-2-name", "group-3-name");
  169. }
  170. @Test
  171. public void search_with_pagination() {
  172. OrganizationDto defaultOrg = db.getDefaultOrganization();
  173. PermissionTemplateDto template = addTemplateToDefaultOrganization();
  174. GroupDto group1 = db.users().insertGroup(defaultOrg, "group-1-name");
  175. addGroupToTemplate(newPermissionTemplateGroup(USER, template.getId(), group1.getId()));
  176. GroupDto group2 = db.users().insertGroup(defaultOrg, "group-2-name");
  177. addGroupToTemplate(newPermissionTemplateGroup(USER, template.getId(), group2.getId()));
  178. commit();
  179. loginAsAdmin(db.getDefaultOrganization());
  180. WsGroupsResponse response = newRequest()
  181. .setParam(PARAM_PERMISSION, USER)
  182. .setParam(PARAM_TEMPLATE_NAME, template.getName())
  183. .setParam(PAGE, "2")
  184. .setParam(PAGE_SIZE, "1")
  185. .executeProtobuf(WsGroupsResponse.class);
  186. assertThat(response.getGroupsList()).extracting("name").containsExactly("group-2-name");
  187. }
  188. @Test
  189. public void search_with_text_query() {
  190. OrganizationDto defaultOrg = db.getDefaultOrganization();
  191. PermissionTemplateDto template = addTemplateToDefaultOrganization();
  192. GroupDto group1 = db.users().insertGroup(defaultOrg, "group-1-name");
  193. addGroupToTemplate(newPermissionTemplateGroup(USER, template.getId(), group1.getId()));
  194. GroupDto group2 = db.users().insertGroup(defaultOrg, "group-2-name");
  195. GroupDto group3 = db.users().insertGroup(defaultOrg, "group-3");
  196. commit();
  197. loginAsAdmin(db.getDefaultOrganization());
  198. WsGroupsResponse response = newRequest()
  199. .setParam(PARAM_TEMPLATE_NAME, template.getName())
  200. .setParam(TEXT_QUERY, "-nam")
  201. .executeProtobuf(WsGroupsResponse.class);
  202. assertThat(response.getGroupsList()).extracting("name").containsExactly("group-1-name", "group-2-name");
  203. }
  204. @Test
  205. public void search_with_text_query_return_all_groups_even_when_no_permission_set() {
  206. OrganizationDto defaultOrg = db.getDefaultOrganization();
  207. PermissionTemplateDto template = addTemplateToDefaultOrganization();
  208. db.users().insertGroup(defaultOrg, "group-1-name");
  209. db.users().insertGroup(defaultOrg, "group-2-name");
  210. db.users().insertGroup(defaultOrg, "group-3-name");
  211. commit();
  212. loginAsAdmin(db.getDefaultOrganization());
  213. WsGroupsResponse response = newRequest()
  214. .setParam(PARAM_TEMPLATE_ID, template.getUuid())
  215. .setParam(TEXT_QUERY, "-name")
  216. .executeProtobuf(WsGroupsResponse.class);
  217. assertThat(response.getGroupsList()).extracting("name").containsExactly("group-1-name", "group-2-name", "group-3-name");
  218. assertThat(response.getGroups(0).getPermissionsList()).isEmpty();
  219. assertThat(response.getGroups(1).getPermissionsList()).isEmpty();
  220. assertThat(response.getGroups(2).getPermissionsList()).isEmpty();
  221. }
  222. @Test
  223. public void search_with_text_query_return_anyone_group_even_when_no_permission_set() {
  224. PermissionTemplateDto template = addTemplateToDefaultOrganization();
  225. GroupDto group = db.users().insertGroup(db.getDefaultOrganization(), "group");
  226. addGroupToTemplate(newPermissionTemplateGroup(USER, template.getId(), group.getId()));
  227. commit();
  228. loginAsAdmin(db.getDefaultOrganization());
  229. WsGroupsResponse response = newRequest()
  230. .setParam(PARAM_TEMPLATE_ID, template.getUuid())
  231. .setParam(TEXT_QUERY, "nyo")
  232. .executeProtobuf(WsGroupsResponse.class);
  233. assertThat(response.getGroupsList()).extracting("name").containsExactly("Anyone");
  234. assertThat(response.getGroups(0).getPermissionsList()).isEmpty();
  235. }
  236. @Test
  237. public void fail_if_not_logged_in() {
  238. PermissionTemplateDto template1 = addTemplateToDefaultOrganization();
  239. userSession.anonymous();
  240. expectedException.expect(UnauthorizedException.class);
  241. newRequest()
  242. .setParam(PARAM_PERMISSION, USER)
  243. .setParam(PARAM_TEMPLATE_ID, template1.getUuid())
  244. .execute();
  245. }
  246. @Test
  247. public void fail_if_insufficient_privileges() {
  248. PermissionTemplateDto template1 = addTemplateToDefaultOrganization();
  249. userSession.logIn();
  250. expectedException.expect(ForbiddenException.class);
  251. newRequest()
  252. .setParam(PARAM_PERMISSION, USER)
  253. .setParam(PARAM_TEMPLATE_ID, template1.getUuid())
  254. .execute();
  255. }
  256. @Test
  257. public void fail_if_template_uuid_and_name_provided() {
  258. PermissionTemplateDto template1 = addTemplateToDefaultOrganization();
  259. loginAsAdmin(db.getDefaultOrganization());
  260. expectedException.expect(BadRequestException.class);
  261. newRequest()
  262. .setParam(PARAM_PERMISSION, USER)
  263. .setParam(PARAM_TEMPLATE_ID, template1.getUuid())
  264. .setParam(PARAM_TEMPLATE_NAME, template1.getName())
  265. .execute();
  266. }
  267. @Test
  268. public void fail_if_template_uuid_nor_name_provided() {
  269. loginAsAdmin(db.getDefaultOrganization());
  270. expectedException.expect(BadRequestException.class);
  271. newRequest()
  272. .setParam(PARAM_PERMISSION, USER)
  273. .execute();
  274. }
  275. @Test
  276. public void fail_if_template_is_not_found() {
  277. loginAsAdmin(db.getDefaultOrganization());
  278. expectedException.expect(NotFoundException.class);
  279. newRequest()
  280. .setParam(PARAM_PERMISSION, USER)
  281. .setParam(PARAM_TEMPLATE_ID, "unknown-uuid")
  282. .execute();
  283. }
  284. @Test
  285. public void fail_if_not_a_project_permission() {
  286. loginAsAdmin(db.getDefaultOrganization());
  287. PermissionTemplateDto template1 = addTemplateToDefaultOrganization();
  288. expectedException.expect(IllegalArgumentException.class);
  289. newRequest()
  290. .setParam(PARAM_PERMISSION, GlobalPermissions.QUALITY_GATE_ADMIN)
  291. .setParam(PARAM_TEMPLATE_ID, template1.getUuid())
  292. .execute();
  293. }
  294. private GroupDto insertGroupOnDefaultOrganization(String name, String description) {
  295. return db.users().insertGroup(newGroupDto().setName(name).setDescription(description).setOrganizationUuid(db.getDefaultOrganization().getUuid()));
  296. }
  297. private void addGroupToTemplate(PermissionTemplateGroupDto permissionTemplateGroup) {
  298. db.getDbClient().permissionTemplateDao().insertGroupPermission(db.getSession(), permissionTemplateGroup);
  299. }
  300. private static PermissionTemplateGroupDto newPermissionTemplateGroup(String permission, long templateId, @Nullable Integer groupId) {
  301. return newPermissionTemplateGroupDto()
  302. .setPermission(permission)
  303. .setTemplateId(templateId)
  304. .setGroupId(groupId);
  305. }
  306. private void commit() {
  307. db.commit();
  308. }
  309. }