| 
									
										
										
										
											2017-04-10 07:24:16 +08:00
										 |  |  | package api | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							| 
									
										
										
										
											2022-01-26 22:48:41 +08:00
										 |  |  | 	"context" | 
					
						
							| 
									
										
										
										
											2022-01-24 18:52:35 +08:00
										 |  |  | 	"encoding/json" | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 	"fmt" | 
					
						
							|  |  |  | 	"net/http" | 
					
						
							|  |  |  | 	"strings" | 
					
						
							| 
									
										
										
										
											2017-04-10 07:24:16 +08:00
										 |  |  | 	"testing" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-05-06 23:44:22 +08:00
										 |  |  | 	"github.com/stretchr/testify/assert" | 
					
						
							|  |  |  | 	"github.com/stretchr/testify/require" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-19 21:02:15 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/infra/db" | 
					
						
							| 
									
										
										
										
											2023-01-18 23:01:25 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/infra/db/dbtest" | 
					
						
							| 
									
										
										
										
											2022-08-11 21:37:31 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/infra/log/logtest" | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/accesscontrol" | 
					
						
							| 
									
										
										
										
											2022-11-24 22:38:55 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/accesscontrol/acimpl" | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/services/accesscontrol/actest" | 
					
						
							| 
									
										
										
										
											2023-01-27 15:50:36 +08:00
										 |  |  | 	contextmodel "github.com/grafana/grafana/pkg/services/contexthandler/model" | 
					
						
							| 
									
										
										
										
											2022-08-10 17:56:48 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/org" | 
					
						
							| 
									
										
										
										
											2022-04-21 21:03:17 +08:00
										 |  |  | 	pref "github.com/grafana/grafana/pkg/services/preference" | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/services/preference/preftest" | 
					
						
							| 
									
										
										
										
											2023-01-11 21:20:09 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/team" | 
					
						
							| 
									
										
										
										
											2022-09-21 00:58:04 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/team/teamimpl" | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/services/team/teamtest" | 
					
						
							| 
									
										
										
										
											2022-08-10 17:56:48 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/services/user" | 
					
						
							| 
									
										
										
										
											2021-10-11 20:30:59 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/setting" | 
					
						
							|  |  |  | 	"github.com/grafana/grafana/pkg/web" | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	"github.com/grafana/grafana/pkg/web/webtest" | 
					
						
							| 
									
										
										
										
											2017-04-10 07:24:16 +08:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-11-13 16:52:38 +08:00
										 |  |  | func TestTeamAPIEndpoint(t *testing.T) { | 
					
						
							|  |  |  | 	t.Run("Given two teams", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-01-27 01:44:20 +08:00
										 |  |  | 		hs := setupSimpleHTTPServer(nil) | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | 		hs.Cfg.EditorsCanAdmin = true | 
					
						
							| 
									
										
										
										
											2022-10-19 21:02:15 +08:00
										 |  |  | 		store := db.InitTestDB(t) | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 		store.Cfg = hs.Cfg | 
					
						
							| 
									
										
										
										
											2022-09-23 01:16:21 +08:00
										 |  |  | 		hs.teamService = teamimpl.ProvideService(store, hs.Cfg) | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 		hs.SQLStore = store | 
					
						
							| 
									
										
										
										
											2023-01-18 23:01:25 +08:00
										 |  |  | 		mock := dbtest.NewFakeDB() | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 		loggedInUserScenarioWithRole(t, "When admin is calling GET on", "GET", "/api/teams/search", "/api/teams/search", | 
					
						
							| 
									
										
										
										
											2022-08-10 17:56:48 +08:00
										 |  |  | 			org.RoleAdmin, func(sc *scenarioContext) { | 
					
						
							| 
									
										
										
										
											2022-09-21 00:58:04 +08:00
										 |  |  | 				_, err := hs.teamService.CreateTeam("team1", "", 1) | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 				require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2022-09-21 00:58:04 +08:00
										 |  |  | 				_, err = hs.teamService.CreateTeam("team2", "", 1) | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				sc.handlerFunc = hs.SearchTeams | 
					
						
							|  |  |  | 				sc.fakeReqWithParams("GET", sc.url, map[string]string{}).exec() | 
					
						
							|  |  |  | 				require.Equal(t, http.StatusOK, sc.resp.Code) | 
					
						
							| 
									
										
										
										
											2023-01-11 21:20:09 +08:00
										 |  |  | 				var resp team.SearchTeamQueryResult | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 				err = json.Unmarshal(sc.resp.Body.Bytes(), &resp) | 
					
						
							|  |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				assert.EqualValues(t, 2, resp.TotalCount) | 
					
						
							|  |  |  | 				assert.Equal(t, 2, len(resp.Teams)) | 
					
						
							|  |  |  | 			}, mock) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		loggedInUserScenario(t, "When editor (with editors_can_admin) is calling GET on", "/api/teams/search", | 
					
						
							|  |  |  | 			"/api/teams/search", func(sc *scenarioContext) { | 
					
						
							| 
									
										
										
										
											2022-09-21 00:58:04 +08:00
										 |  |  | 				team1, err := hs.teamService.CreateTeam("team1", "", 1) | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 				require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2022-09-21 00:58:04 +08:00
										 |  |  | 				_, err = hs.teamService.CreateTeam("team2", "", 1) | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				// Adding the test user to the teams in order for him to list them
 | 
					
						
							| 
									
										
										
										
											2023-01-11 21:20:09 +08:00
										 |  |  | 				err = hs.teamService.AddTeamMember(testUserID, testOrgID, team1.ID, false, 0) | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				sc.handlerFunc = hs.SearchTeams | 
					
						
							|  |  |  | 				sc.fakeReqWithParams("GET", sc.url, map[string]string{}).exec() | 
					
						
							|  |  |  | 				require.Equal(t, http.StatusOK, sc.resp.Code) | 
					
						
							| 
									
										
										
										
											2023-01-11 21:20:09 +08:00
										 |  |  | 				var resp team.SearchTeamQueryResult | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 				err = json.Unmarshal(sc.resp.Body.Bytes(), &resp) | 
					
						
							|  |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				assert.EqualValues(t, 1, resp.TotalCount) | 
					
						
							|  |  |  | 				assert.Equal(t, 1, len(resp.Teams)) | 
					
						
							|  |  |  | 			}, mock) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		loggedInUserScenario(t, "When editor (with editors_can_admin) calling GET with pagination on", | 
					
						
							|  |  |  | 			"/api/teams/search", "/api/teams/search", func(sc *scenarioContext) { | 
					
						
							| 
									
										
										
										
											2022-09-21 00:58:04 +08:00
										 |  |  | 				team1, err := hs.teamService.CreateTeam("team1", "", 1) | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 				require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2022-09-21 00:58:04 +08:00
										 |  |  | 				team2, err := hs.teamService.CreateTeam("team2", "", 1) | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				// Adding the test user to the teams in order for him to list them
 | 
					
						
							| 
									
										
										
										
											2023-01-11 21:20:09 +08:00
										 |  |  | 				err = hs.teamService.AddTeamMember(testUserID, testOrgID, team1.ID, false, 0) | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 				require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2023-01-11 21:20:09 +08:00
										 |  |  | 				err = hs.teamService.AddTeamMember(testUserID, testOrgID, team2.ID, false, 0) | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				sc.handlerFunc = hs.SearchTeams | 
					
						
							|  |  |  | 				sc.fakeReqWithParams("GET", sc.url, map[string]string{"perpage": "10", "page": "2"}).exec() | 
					
						
							|  |  |  | 				require.Equal(t, http.StatusOK, sc.resp.Code) | 
					
						
							| 
									
										
										
										
											2023-01-11 21:20:09 +08:00
										 |  |  | 				var resp team.SearchTeamQueryResult | 
					
						
							| 
									
										
										
										
											2022-02-16 01:09:03 +08:00
										 |  |  | 				err = json.Unmarshal(sc.resp.Body.Bytes(), &resp) | 
					
						
							|  |  |  | 				require.NoError(t, err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 				assert.EqualValues(t, 2, resp.TotalCount) | 
					
						
							|  |  |  | 				assert.Equal(t, 0, len(resp.Teams)) | 
					
						
							|  |  |  | 			}, mock) | 
					
						
							| 
									
										
										
										
											2017-04-10 07:24:16 +08:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2019-08-08 16:27:47 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-11-13 16:52:38 +08:00
										 |  |  | 	t.Run("When creating team with API key", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-01-27 01:44:20 +08:00
										 |  |  | 		hs := setupSimpleHTTPServer(nil) | 
					
						
							| 
									
										
										
										
											2019-08-08 16:27:47 +08:00
										 |  |  | 		hs.Cfg.EditorsCanAdmin = true | 
					
						
							| 
									
										
										
										
											2023-01-18 23:01:25 +08:00
										 |  |  | 		hs.SQLStore = dbtest.NewFakeDB() | 
					
						
							| 
									
										
										
										
											2022-09-21 00:58:04 +08:00
										 |  |  | 		hs.teamService = &teamtest.FakeService{} | 
					
						
							| 
									
										
										
										
											2019-08-08 16:27:47 +08:00
										 |  |  | 		teamName := "team foo" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		addTeamMemberCalled := 0 | 
					
						
							| 
									
										
										
										
											2022-05-10 21:48:47 +08:00
										 |  |  | 		addOrUpdateTeamMember = func(ctx context.Context, resourcePermissionService accesscontrol.TeamPermissionsService, userID, orgID, teamID int64, | 
					
						
							| 
									
										
										
										
											2022-01-26 22:48:41 +08:00
										 |  |  | 			permission string) error { | 
					
						
							| 
									
										
										
										
											2021-03-17 23:06:10 +08:00
										 |  |  | 			addTeamMemberCalled++ | 
					
						
							| 
									
										
										
										
											2019-08-08 16:27:47 +08:00
										 |  |  | 			return nil | 
					
						
							| 
									
										
										
										
											2021-03-17 23:06:10 +08:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2019-08-08 16:27:47 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-03-17 23:06:10 +08:00
										 |  |  | 		req, err := http.NewRequest("POST", "/api/teams", nil) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2019-08-08 16:27:47 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 		t.Run("with no real signed in user", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-05-06 23:44:22 +08:00
										 |  |  | 			logger := &logtest.Fake{} | 
					
						
							| 
									
										
										
										
											2023-01-27 15:50:36 +08:00
										 |  |  | 			c := &contextmodel.ReqContext{ | 
					
						
							| 
									
										
										
										
											2021-10-11 20:30:59 +08:00
										 |  |  | 				Context:      &web.Context{Req: req}, | 
					
						
							| 
									
										
										
										
											2022-08-10 17:56:48 +08:00
										 |  |  | 				SignedInUser: &user.SignedInUser{}, | 
					
						
							| 
									
										
										
										
											2022-05-06 23:44:22 +08:00
										 |  |  | 				Logger:       logger, | 
					
						
							| 
									
										
										
										
											2019-08-08 16:27:47 +08:00
										 |  |  | 			} | 
					
						
							| 
									
										
										
										
											2022-08-10 17:56:48 +08:00
										 |  |  | 			c.OrgRole = org.RoleEditor | 
					
						
							| 
									
										
										
										
											2023-01-11 21:20:09 +08:00
										 |  |  | 			c.Req.Body = mockRequestBody(team.CreateTeamCommand{Name: teamName}) | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | 			c.Req.Header.Add("Content-Type", "application/json") | 
					
						
							| 
									
										
										
										
											2022-02-03 16:20:20 +08:00
										 |  |  | 			r := hs.CreateTeam(c) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			assert.Equal(t, 200, r.Status()) | 
					
						
							| 
									
										
										
										
											2022-05-06 23:44:22 +08:00
										 |  |  | 			assert.NotZero(t, logger.WarnLogs.Calls) | 
					
						
							|  |  |  | 			assert.Equal(t, "Could not add creator to team because is not a real user", logger.WarnLogs.Message) | 
					
						
							| 
									
										
										
										
											2019-08-08 16:27:47 +08:00
										 |  |  | 		}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		t.Run("with real signed in user", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-05-06 23:44:22 +08:00
										 |  |  | 			logger := &logtest.Fake{} | 
					
						
							| 
									
										
										
										
											2023-01-27 15:50:36 +08:00
										 |  |  | 			c := &contextmodel.ReqContext{ | 
					
						
							| 
									
										
										
										
											2021-10-11 20:30:59 +08:00
										 |  |  | 				Context:      &web.Context{Req: req}, | 
					
						
							| 
									
										
										
										
											2022-08-11 19:28:55 +08:00
										 |  |  | 				SignedInUser: &user.SignedInUser{UserID: 42}, | 
					
						
							| 
									
										
										
										
											2022-05-06 23:44:22 +08:00
										 |  |  | 				Logger:       logger, | 
					
						
							| 
									
										
										
										
											2019-08-08 16:27:47 +08:00
										 |  |  | 			} | 
					
						
							| 
									
										
										
										
											2022-08-10 17:56:48 +08:00
										 |  |  | 			c.OrgRole = org.RoleEditor | 
					
						
							| 
									
										
										
										
											2023-01-11 21:20:09 +08:00
										 |  |  | 			c.Req.Body = mockRequestBody(team.CreateTeamCommand{Name: teamName}) | 
					
						
							| 
									
										
										
										
											2022-02-09 20:44:38 +08:00
										 |  |  | 			c.Req.Header.Add("Content-Type", "application/json") | 
					
						
							| 
									
										
										
										
											2022-02-03 16:20:20 +08:00
										 |  |  | 			r := hs.CreateTeam(c) | 
					
						
							|  |  |  | 			assert.Equal(t, 200, r.Status()) | 
					
						
							| 
									
										
										
										
											2022-05-06 23:44:22 +08:00
										 |  |  | 			assert.Zero(t, logger.WarnLogs.Calls) | 
					
						
							| 
									
										
										
										
											2019-08-08 16:27:47 +08:00
										 |  |  | 		}) | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2017-04-10 07:24:16 +08:00
										 |  |  | } | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | const ( | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 	searchTeamsURL          = "/api/teams/search" | 
					
						
							| 
									
										
										
										
											2022-01-28 19:17:54 +08:00
										 |  |  | 	createTeamURL           = "/api/teams/" | 
					
						
							|  |  |  | 	detailTeamURL           = "/api/teams/%d" | 
					
						
							|  |  |  | 	detailTeamPreferenceURL = "/api/teams/%d/preferences" | 
					
						
							|  |  |  | 	teamCmd                 = `{"name": "MyTestTeam%d"}` | 
					
						
							|  |  |  | 	teamPreferenceCmd       = `{"theme": "dark"}` | 
					
						
							|  |  |  | 	teamPreferenceCmdLight  = `{"theme": "light"}` | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func TestTeamAPIEndpoint_CreateTeam_LegacyAccessControl(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.teamService = teamtest.NewFakeService() | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 	input := strings.NewReader(fmt.Sprintf(teamCmd, 1)) | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 	t.Run("Organisation admin can create a team", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		req := server.NewPostRequest(createTeamURL, input) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, &user.SignedInUser{OrgRole: org.RoleAdmin}) | 
					
						
							|  |  |  | 		res, err := server.SendJSON(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 	input = strings.NewReader(fmt.Sprintf(teamCmd, 2)) | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 	t.Run("Org editor and server admin cannot create a team", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		req := server.NewPostRequest(createTeamURL, input) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, &user.SignedInUser{OrgRole: org.RoleEditor, IsGrafanaAdmin: true}) | 
					
						
							|  |  |  | 		res, err := server.SendJSON(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func TestTeamAPIEndpoint_CreateTeam_LegacyAccessControl_EditorsCanAdmin(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		cfg := setting.NewCfg() | 
					
						
							|  |  |  | 		cfg.RBACEnabled = false | 
					
						
							|  |  |  | 		cfg.EditorsCanAdmin = true | 
					
						
							|  |  |  | 		hs.Cfg = cfg | 
					
						
							|  |  |  | 		hs.teamService = teamtest.NewFakeService() | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("Editors can create a team if editorsCanAdmin is set to true", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		input := strings.NewReader(fmt.Sprintf(teamCmd, 1)) | 
					
						
							|  |  |  | 		req := server.NewPostRequest(createTeamURL, input) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, &user.SignedInUser{OrgRole: org.RoleAdmin}) | 
					
						
							|  |  |  | 		res, err := server.SendJSON(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-04-21 20:31:02 +08:00
										 |  |  | func TestTeamAPIEndpoint_CreateTeam_RBAC(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.Cfg = setting.NewCfg() | 
					
						
							|  |  |  | 		hs.teamService = teamtest.NewFakeService() | 
					
						
							| 
									
										
										
										
											2022-11-24 22:38:55 +08:00
										 |  |  | 		hs.AccessControl = acimpl.ProvideAccessControl(setting.NewCfg()) | 
					
						
							|  |  |  | 		hs.accesscontrolService = actest.FakeService{} | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 	input := strings.NewReader(fmt.Sprintf(teamCmd, 1)) | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 	t.Run("Access control allows creating teams with the correct permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		req := server.NewPostRequest(createTeamURL, input) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, userWithPermissions(1, []accesscontrol.Permission{{Action: accesscontrol.ActionTeamsCreate}})) | 
					
						
							|  |  |  | 		res, err := server.SendJSON(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 	input = strings.NewReader(fmt.Sprintf(teamCmd, 2)) | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 	t.Run("Access control prevents creating teams with the incorrect permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		req := server.NewPostRequest(createTeamURL, input) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, userWithPermissions(1, []accesscontrol.Permission{})) | 
					
						
							|  |  |  | 		res, err := server.SendJSON(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-11 01:05:53 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-04-21 20:31:02 +08:00
										 |  |  | func TestTeamAPIEndpoint_SearchTeams_RBAC(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.Cfg = setting.NewCfg() | 
					
						
							|  |  |  | 		hs.teamService = teamtest.NewFakeService() | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	t.Run("Access control prevents searching for teams with the incorrect permissions", func(t *testing.T) { | 
					
						
							|  |  |  | 		req := server.NewGetRequest(searchTeamsURL) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, userWithPermissions(1, []accesscontrol.Permission{})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 		require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	t.Run("Access control allows searching for teams with the correct permissions", func(t *testing.T) { | 
					
						
							|  |  |  | 		req := server.NewGetRequest(searchTeamsURL) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, userWithPermissions(1, []accesscontrol.Permission{ | 
					
						
							|  |  |  | 			{Action: accesscontrol.ActionTeamsRead, Scope: accesscontrol.ScopeTeamsAll}, | 
					
						
							|  |  |  | 		})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 		require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-04-21 20:31:02 +08:00
										 |  |  | func TestTeamAPIEndpoint_GetTeamByID_RBAC(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.Cfg = setting.NewCfg() | 
					
						
							| 
									
										
										
										
											2023-01-11 21:20:09 +08:00
										 |  |  | 		hs.teamService = &teamtest.FakeService{ExpectedTeamDTO: &team.TeamDTO{}} | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	url := fmt.Sprintf(detailTeamURL, 1) | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	t.Run("Access control prevents getting a team when missing permissions", func(t *testing.T) { | 
					
						
							|  |  |  | 		req := server.NewGetRequest(url) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, userWithPermissions(1, []accesscontrol.Permission{})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("Access control allows getting a team with the correct permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		req := server.NewGetRequest(url) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, userWithPermissions(1, []accesscontrol.Permission{ | 
					
						
							|  |  |  | 			{Action: accesscontrol.ActionTeamsRead, Scope: "teams:id:1"}, | 
					
						
							|  |  |  | 		})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	t.Run("Access control allows getting a team with wildcard scope", func(t *testing.T) { | 
					
						
							|  |  |  | 		req := server.NewGetRequest(url) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, userWithPermissions(1, []accesscontrol.Permission{ | 
					
						
							|  |  |  | 			{Action: accesscontrol.ActionTeamsRead, Scope: "teams:id:*"}, | 
					
						
							|  |  |  | 		})) | 
					
						
							|  |  |  | 		res, err := server.Send(req) | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 		require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-02-09 23:17:31 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | // Given a team with a user, when the user is granted X permission,
 | 
					
						
							|  |  |  | // Then the endpoint should return 200 if the user has accesscontrol.ActionTeamsWrite with teams:id:1 scope
 | 
					
						
							|  |  |  | // else return 403
 | 
					
						
							| 
									
										
										
										
											2022-04-21 20:31:02 +08:00
										 |  |  | func TestTeamAPIEndpoint_UpdateTeam_RBAC(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.Cfg = setting.NewCfg() | 
					
						
							| 
									
										
										
										
											2023-01-11 21:20:09 +08:00
										 |  |  | 		hs.teamService = &teamtest.FakeService{ExpectedTeamDTO: &team.TeamDTO{}} | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	request := func(teamID int64, user *user.SignedInUser) (*http.Response, error) { | 
					
						
							|  |  |  | 		req := server.NewRequest(http.MethodPut, fmt.Sprintf(detailTeamURL, teamID), strings.NewReader(teamCmd)) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, user) | 
					
						
							|  |  |  | 		return server.SendJSON(req) | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	t.Run("Access control allows updating team with the correct permissions", func(t *testing.T) { | 
					
						
							|  |  |  | 		res, err := request(1, userWithPermissions(1, []accesscontrol.Permission{ | 
					
						
							|  |  |  | 			{Action: accesscontrol.ActionTeamsWrite, Scope: "teams:id:1"}, | 
					
						
							|  |  |  | 		})) | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 		require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	t.Run("Access control allows updating teams with the wildcard scope", func(t *testing.T) { | 
					
						
							|  |  |  | 		res, err := request(1, userWithPermissions(1, []accesscontrol.Permission{ | 
					
						
							|  |  |  | 			{Action: accesscontrol.ActionTeamsWrite, Scope: "teams:*"}, | 
					
						
							|  |  |  | 		})) | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 		require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	t.Run("Access control prevent updating a team with wrong scope", func(t *testing.T) { | 
					
						
							|  |  |  | 		res, err := request(1, userWithPermissions(1, []accesscontrol.Permission{ | 
					
						
							|  |  |  | 			{Action: accesscontrol.ActionTeamsWrite, Scope: "teams:id:2"}, | 
					
						
							|  |  |  | 		})) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Given a team with a user, when the user is granted X permission,
 | 
					
						
							|  |  |  | // Then the endpoint should return 200 if the user has accesscontrol.ActionTeamsDelete with teams:id:1 scope
 | 
					
						
							|  |  |  | // else return 403
 | 
					
						
							| 
									
										
										
										
											2022-04-21 20:31:02 +08:00
										 |  |  | func TestTeamAPIEndpoint_DeleteTeam_RBAC(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.Cfg = setting.NewCfg() | 
					
						
							| 
									
										
										
										
											2023-01-11 21:20:09 +08:00
										 |  |  | 		hs.teamService = &teamtest.FakeService{ExpectedTeamDTO: &team.TeamDTO{}} | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	request := func(teamID int64, user *user.SignedInUser) (*http.Response, error) { | 
					
						
							|  |  |  | 		req := server.NewRequest(http.MethodDelete, fmt.Sprintf(detailTeamURL, teamID), http.NoBody) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, user) | 
					
						
							|  |  |  | 		return server.Send(req) | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("Access control prevents deleting teams with the incorrect permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		res, err := request(1, userWithPermissions(1, []accesscontrol.Permission{ | 
					
						
							|  |  |  | 			{Action: accesscontrol.ActionTeamsDelete, Scope: "teams:id:2"}, | 
					
						
							|  |  |  | 		})) | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 		require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("Access control allows deleting teams with the correct permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		res, err := request(1, userWithPermissions(1, []accesscontrol.Permission{ | 
					
						
							|  |  |  | 			{Action: accesscontrol.ActionTeamsDelete, Scope: "teams:id:1"}, | 
					
						
							|  |  |  | 		})) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-27 23:16:44 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2022-01-28 19:17:54 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | // Given a team with a user, when the user is granted X permission,
 | 
					
						
							|  |  |  | // Then the endpoint should return 200 if the user has accesscontrol.ActionTeamsRead with teams:id:1 scope
 | 
					
						
							|  |  |  | // else return 403
 | 
					
						
							| 
									
										
										
										
											2022-04-21 20:31:02 +08:00
										 |  |  | func TestTeamAPIEndpoint_GetTeamPreferences_RBAC(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.Cfg = setting.NewCfg() | 
					
						
							|  |  |  | 		hs.preferenceService = &preftest.FakePreferenceService{ExpectedPreference: &pref.Preference{}} | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2022-01-28 19:17:54 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	request := func(teamID int64, user *user.SignedInUser) (*http.Response, error) { | 
					
						
							|  |  |  | 		req := server.NewGetRequest(fmt.Sprintf(detailTeamPreferenceURL, teamID)) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, user) | 
					
						
							|  |  |  | 		return server.Send(req) | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-01-28 19:17:54 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("Access control allows getting team preferences with the correct permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		res, err := request(1, userWithPermissions(1, []accesscontrol.Permission{ | 
					
						
							|  |  |  | 			{Action: accesscontrol.ActionTeamsRead, Scope: "teams:id:1"}, | 
					
						
							|  |  |  | 		})) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-28 19:17:54 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("Access control prevents getting team preferences with the incorrect permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		res, err := request(1, userWithPermissions(1, []accesscontrol.Permission{ | 
					
						
							|  |  |  | 			{Action: accesscontrol.ActionTeamsRead, Scope: "teams:id:2"}, | 
					
						
							|  |  |  | 		})) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-28 19:17:54 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Given a team with a user, when the user is granted X permission,
 | 
					
						
							|  |  |  | // Then the endpoint should return 200 if the user has accesscontrol.ActionTeamsWrite with teams:id:1 scope
 | 
					
						
							|  |  |  | // else return 403
 | 
					
						
							| 
									
										
										
										
											2022-04-21 20:31:02 +08:00
										 |  |  | func TestTeamAPIEndpoint_UpdateTeamPreferences_RBAC(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	server := SetupAPITestServer(t, func(hs *HTTPServer) { | 
					
						
							|  |  |  | 		hs.Cfg = setting.NewCfg() | 
					
						
							|  |  |  | 		hs.preferenceService = &preftest.FakePreferenceService{ExpectedPreference: &pref.Preference{}} | 
					
						
							|  |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2022-01-28 19:17:54 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 	request := func(teamID int64, user *user.SignedInUser) (*http.Response, error) { | 
					
						
							|  |  |  | 		req := server.NewRequest(http.MethodPut, fmt.Sprintf(detailTeamPreferenceURL, teamID), strings.NewReader(teamPreferenceCmd)) | 
					
						
							|  |  |  | 		req = webtest.RequestWithSignedInUser(req, user) | 
					
						
							|  |  |  | 		return server.SendJSON(req) | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-01-28 19:17:54 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("Access control allows updating team preferences with the correct permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		res, err := request(1, userWithPermissions(1, []accesscontrol.Permission{ | 
					
						
							|  |  |  | 			{Action: accesscontrol.ActionTeamsWrite, Scope: "teams:id:1"}, | 
					
						
							|  |  |  | 		})) | 
					
						
							| 
									
										
										
										
											2022-01-28 19:17:54 +08:00
										 |  |  | 		require.NoError(t, err) | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		assert.Equal(t, http.StatusOK, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-28 19:17:54 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	t.Run("Access control prevents updating team preferences with the incorrect permissions", func(t *testing.T) { | 
					
						
							| 
									
										
										
										
											2022-10-20 15:11:47 +08:00
										 |  |  | 		res, err := request(1, userWithPermissions(1, []accesscontrol.Permission{ | 
					
						
							|  |  |  | 			{Action: accesscontrol.ActionTeamsWrite, Scope: "teams:id:2"}, | 
					
						
							|  |  |  | 		})) | 
					
						
							|  |  |  | 		require.NoError(t, err) | 
					
						
							|  |  |  | 		assert.Equal(t, http.StatusForbidden, res.StatusCode) | 
					
						
							|  |  |  | 		require.NoError(t, res.Body.Close()) | 
					
						
							| 
									
										
										
										
											2022-01-28 19:17:54 +08:00
										 |  |  | 	}) | 
					
						
							|  |  |  | } |