perms_test.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package db
  5. import (
  6. "testing"
  7. "github.com/stretchr/testify/assert"
  8. )
  9. func Test_perms(t *testing.T) {
  10. if testing.Short() {
  11. t.Skip()
  12. }
  13. t.Parallel()
  14. db := &perms{
  15. DB: initTestDB(t, "perms", new(Access)),
  16. }
  17. for _, tc := range []struct {
  18. name string
  19. test func(*testing.T, *perms)
  20. }{
  21. {"AccessMode", test_perms_AccessMode},
  22. {"Authorize", test_perms_Authorize},
  23. {"SetRepoPerms", test_perms_SetRepoPerms},
  24. } {
  25. t.Run(tc.name, func(t *testing.T) {
  26. t.Cleanup(func() {
  27. err := deleteTables(db.DB, new(Access))
  28. if err != nil {
  29. t.Fatal(err)
  30. }
  31. })
  32. tc.test(t, db)
  33. })
  34. }
  35. }
  36. func test_perms_AccessMode(t *testing.T, db *perms) {
  37. // Set up permissions
  38. err := db.SetRepoPerms(1, map[int64]AccessMode{
  39. 2: AccessModeWrite,
  40. 3: AccessModeAdmin,
  41. })
  42. if err != nil {
  43. t.Fatal(err)
  44. }
  45. err = db.SetRepoPerms(2, map[int64]AccessMode{
  46. 1: AccessModeRead,
  47. })
  48. if err != nil {
  49. t.Fatal(err)
  50. }
  51. publicRepo := &Repository{
  52. ID: 1,
  53. OwnerID: 98,
  54. }
  55. privateRepo := &Repository{
  56. ID: 2,
  57. OwnerID: 99,
  58. IsPrivate: true,
  59. }
  60. tests := []struct {
  61. name string
  62. userID int64
  63. repo *Repository
  64. expAccessMode AccessMode
  65. }{
  66. {
  67. name: "nil repository",
  68. expAccessMode: AccessModeNone,
  69. },
  70. {
  71. name: "anonymous user has read access to public repository",
  72. repo: publicRepo,
  73. expAccessMode: AccessModeRead,
  74. },
  75. {
  76. name: "anonymous user has no access to private repository",
  77. repo: privateRepo,
  78. expAccessMode: AccessModeNone,
  79. },
  80. {
  81. name: "user is the owner",
  82. userID: 98,
  83. repo: publicRepo,
  84. expAccessMode: AccessModeOwner,
  85. },
  86. {
  87. name: "user 1 has read access to public repo",
  88. userID: 1,
  89. repo: publicRepo,
  90. expAccessMode: AccessModeRead,
  91. },
  92. {
  93. name: "user 2 has write access to public repo",
  94. userID: 2,
  95. repo: publicRepo,
  96. expAccessMode: AccessModeWrite,
  97. },
  98. {
  99. name: "user 3 has admin access to public repo",
  100. userID: 3,
  101. repo: publicRepo,
  102. expAccessMode: AccessModeAdmin,
  103. },
  104. {
  105. name: "user 1 has read access to private repo",
  106. userID: 1,
  107. repo: privateRepo,
  108. expAccessMode: AccessModeRead,
  109. },
  110. {
  111. name: "user 2 has no access to private repo",
  112. userID: 2,
  113. repo: privateRepo,
  114. expAccessMode: AccessModeNone,
  115. },
  116. {
  117. name: "user 3 has no access to private repo",
  118. userID: 3,
  119. repo: privateRepo,
  120. expAccessMode: AccessModeNone,
  121. },
  122. }
  123. for _, test := range tests {
  124. t.Run(test.name, func(t *testing.T) {
  125. mode := db.AccessMode(test.userID, test.repo)
  126. assert.Equal(t, test.expAccessMode, mode)
  127. })
  128. }
  129. }
  130. func test_perms_Authorize(t *testing.T, db *perms) {
  131. // Set up permissions
  132. err := db.SetRepoPerms(1, map[int64]AccessMode{
  133. 1: AccessModeRead,
  134. 2: AccessModeWrite,
  135. 3: AccessModeAdmin,
  136. })
  137. if err != nil {
  138. t.Fatal(err)
  139. }
  140. repo := &Repository{
  141. ID: 1,
  142. OwnerID: 98,
  143. }
  144. tests := []struct {
  145. name string
  146. userID int64
  147. desired AccessMode
  148. expAuthorized bool
  149. }{
  150. {
  151. name: "user 1 has read and wants read",
  152. userID: 1,
  153. desired: AccessModeRead,
  154. expAuthorized: true,
  155. },
  156. {
  157. name: "user 1 has read and wants write",
  158. userID: 1,
  159. desired: AccessModeWrite,
  160. expAuthorized: false,
  161. },
  162. {
  163. name: "user 2 has write and wants read",
  164. userID: 2,
  165. desired: AccessModeRead,
  166. expAuthorized: true,
  167. },
  168. {
  169. name: "user 2 has write and wants write",
  170. userID: 2,
  171. desired: AccessModeWrite,
  172. expAuthorized: true,
  173. },
  174. {
  175. name: "user 2 has write and wants admin",
  176. userID: 2,
  177. desired: AccessModeAdmin,
  178. expAuthorized: false,
  179. },
  180. {
  181. name: "user 3 has admin and wants read",
  182. userID: 3,
  183. desired: AccessModeRead,
  184. expAuthorized: true,
  185. },
  186. {
  187. name: "user 3 has admin and wants write",
  188. userID: 3,
  189. desired: AccessModeWrite,
  190. expAuthorized: true,
  191. },
  192. {
  193. name: "user 3 has admin and wants admin",
  194. userID: 3,
  195. desired: AccessModeAdmin,
  196. expAuthorized: true,
  197. },
  198. }
  199. for _, test := range tests {
  200. t.Run(test.name, func(t *testing.T) {
  201. authorized := db.Authorize(test.userID, repo, test.desired)
  202. assert.Equal(t, test.expAuthorized, authorized)
  203. })
  204. }
  205. }
  206. func test_perms_SetRepoPerms(t *testing.T, db *perms) {
  207. for _, update := range []struct {
  208. repoID int64
  209. accessMap map[int64]AccessMode
  210. }{
  211. {
  212. repoID: 1,
  213. accessMap: map[int64]AccessMode{
  214. 1: AccessModeWrite,
  215. 2: AccessModeWrite,
  216. 3: AccessModeAdmin,
  217. 4: AccessModeWrite,
  218. },
  219. },
  220. {
  221. repoID: 2,
  222. accessMap: map[int64]AccessMode{
  223. 1: AccessModeWrite,
  224. 2: AccessModeRead,
  225. 4: AccessModeWrite,
  226. 5: AccessModeWrite,
  227. },
  228. },
  229. {
  230. repoID: 1,
  231. accessMap: map[int64]AccessMode{
  232. 2: AccessModeWrite,
  233. 3: AccessModeAdmin,
  234. },
  235. },
  236. {
  237. repoID: 2,
  238. accessMap: map[int64]AccessMode{
  239. 1: AccessModeWrite,
  240. 2: AccessModeRead,
  241. 5: AccessModeWrite,
  242. },
  243. },
  244. } {
  245. err := db.SetRepoPerms(update.repoID, update.accessMap)
  246. if err != nil {
  247. t.Fatal(err)
  248. }
  249. }
  250. var accesses []*Access
  251. err := db.Order("user_id, repo_id").Find(&accesses).Error
  252. if err != nil {
  253. t.Fatal(err)
  254. }
  255. // Ignore ID fields
  256. for _, a := range accesses {
  257. a.ID = 0
  258. }
  259. expAccesses := []*Access{
  260. {UserID: 1, RepoID: 2, Mode: AccessModeWrite},
  261. {UserID: 2, RepoID: 1, Mode: AccessModeWrite},
  262. {UserID: 2, RepoID: 2, Mode: AccessModeRead},
  263. {UserID: 3, RepoID: 1, Mode: AccessModeAdmin},
  264. {UserID: 5, RepoID: 2, Mode: AccessModeWrite},
  265. }
  266. assert.Equal(t, expAccesses, accesses)
  267. }