aboutsummaryrefslogtreecommitdiffstats
path: root/sonar-db/src/test
diff options
context:
space:
mode:
authorSimon Brandhof <simon.brandhof@sonarsource.com>2016-10-21 15:25:28 +0200
committerSimon Brandhof <simon.brandhof@sonarsource.com>2016-10-21 15:58:40 +0200
commitaeb761544c6514a02121693e7312997db65b9f34 (patch)
treecd4b45c1b6e28d6968737b7827ab557b585a7310 /sonar-db/src/test
parentf34266f025c3f862c5f1bdf58a0983545334c4ae (diff)
downloadsonarqube-aeb761544c6514a02121693e7312997db65b9f34.tar.gz
sonarqube-aeb761544c6514a02121693e7312997db65b9f34.zip
SONAR-8134 fix isolation of organizations when dropping global permissions
on user
Diffstat (limited to 'sonar-db/src/test')
-rw-r--r--sonar-db/src/test/java/org/sonar/db/permission/AuthorizationDaoTest.java56
1 files changed, 48 insertions, 8 deletions
diff --git a/sonar-db/src/test/java/org/sonar/db/permission/AuthorizationDaoTest.java b/sonar-db/src/test/java/org/sonar/db/permission/AuthorizationDaoTest.java
index 6a62f5dc517..e1592e31365 100644
--- a/sonar-db/src/test/java/org/sonar/db/permission/AuthorizationDaoTest.java
+++ b/sonar-db/src/test/java/org/sonar/db/permission/AuthorizationDaoTest.java
@@ -173,7 +173,7 @@ public class AuthorizationDaoTest {
}
@Test
- public void countRemainingUserIdsWithGlobalPermissionIfExcludeGroup() {
+ public void countUsersWithGlobalPermissionExcludingGroup() {
// users with global permission "perm1" :
// - "u1" and "u2" through group "g1"
// - "u1" and "u3" through group "g2"
@@ -202,27 +202,67 @@ public class AuthorizationDaoTest {
GroupDto group3 = db.users().insertGroup(org, "g2");
db.users().insertPermissionOnGroup(group3, "perm1");
- db.users().insertPermissionOnUser(user4, "perm1");
- db.users().insertPermissionOnUser(user4, "perm2");
-
+ db.users().insertPermissionOnUser(org, user4, "perm1");
+ db.users().insertPermissionOnUser(org, user4, "perm2");
db.users().insertPermissionOnAnyone(org, "perm1");
+ // other organizations are ignored
+ OrganizationDto org2 = db.organizations().insert();
+ db.users().insertPermissionOnUser(org2, user1, "perm1");
+
// excluding group "g1" -> remain u1, u3 and u4
- assertThat(underTest.countRemainingUserIdsWithGlobalPermissionIfExcludeGroup(db.getSession(),
+ assertThat(underTest.countUsersWithGlobalPermissionExcludingGroup(db.getSession(),
org.getUuid(), "perm1", group1.getId())).isEqualTo(3);
// excluding group "g2" -> remain u1, u2 and u4
- assertThat(underTest.countRemainingUserIdsWithGlobalPermissionIfExcludeGroup(db.getSession(),
+ assertThat(underTest.countUsersWithGlobalPermissionExcludingGroup(db.getSession(),
org.getUuid(), "perm1", group2.getId())).isEqualTo(3);
// excluding group "g3" -> remain u1, u2, u3 and u4
- assertThat(underTest.countRemainingUserIdsWithGlobalPermissionIfExcludeGroup(db.getSession(),
+ assertThat(underTest.countUsersWithGlobalPermissionExcludingGroup(db.getSession(),
org.getUuid(), "perm1", group3.getId())).isEqualTo(4);
// nobody has the permission
- assertThat(underTest.countRemainingUserIdsWithGlobalPermissionIfExcludeGroup(db.getSession(),
+ assertThat(underTest.countUsersWithGlobalPermissionExcludingGroup(db.getSession(),
org.getUuid(), "missingPermission", group1.getId())).isEqualTo(0);
+ }
+
+ @Test
+ public void countUsersWithGlobalPermissionExcludingUser() {
+ // group g1 has the permission p1 and has members user1 and user2
+ // user3 has the permission
+ UserDto user1 = db.users().insertUser();
+ UserDto user2 = db.users().insertUser();
+ UserDto user3 = db.users().insertUser();
+ OrganizationDto org = db.organizations().insert();
+ GroupDto group1 = db.users().insertGroup(org, "g1");
+ db.users().insertPermissionOnGroup(group1, "p1");
+ db.users().insertPermissionOnGroup(group1, "p2");
+ db.users().insertMember(group1, user1);
+ db.users().insertMember(group1, user2);
+ db.users().insertPermissionOnUser(org, user3, "p1");
+ db.users().insertPermissionOnAnyone(org, "p1");
+
+ // other organizations are ignored
+ OrganizationDto org2 = db.organizations().insert();
+ db.users().insertPermissionOnUser(org2, user1, "p1");
+
+ // excluding user1 -> remain user2 and user3
+ assertThat(underTest.countUsersWithGlobalPermissionExcludingUser(db.getSession(),
+ org.getUuid(), "p1", user1.getId())).isEqualTo(2);
+
+ // excluding user3 -> remain the members of group g1
+ assertThat(underTest.countUsersWithGlobalPermissionExcludingUser(db.getSession(),
+ org.getUuid(), "p1", user3.getId())).isEqualTo(2);
+
+ // excluding unknown user
+ assertThat(underTest.countUsersWithGlobalPermissionExcludingUser(db.getSession(),
+ org.getUuid(), "p1", -1)).isEqualTo(3);
+
+ // nobody has the permission
+ assertThat(underTest.countUsersWithGlobalPermissionExcludingUser(db.getSession(),
+ org.getUuid(), "missingPermission", group1.getId())).isEqualTo(0);
}
@Test