2017-05-26 16:15:45 +03:00
// Copyright 2017 The Gitea Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
package integrations
import (
2019-04-28 02:32:33 +03:00
"fmt"
2017-05-26 16:15:45 +03:00
"net/http"
2019-04-28 02:32:33 +03:00
"sort"
2017-05-26 16:15:45 +03:00
"testing"
"code.gitea.io/gitea/models"
2019-11-10 07:41:51 +03:00
"code.gitea.io/gitea/modules/convert"
2019-05-11 13:21:34 +03:00
api "code.gitea.io/gitea/modules/structs"
2017-05-26 16:15:45 +03:00
"github.com/stretchr/testify/assert"
)
func TestAPITeam ( t * testing . T ) {
prepareTestEnv ( t )
2019-04-24 08:32:35 +03:00
2017-05-26 16:15:45 +03:00
teamUser := models . AssertExistsAndLoadBean ( t , & models . TeamUser { } ) . ( * models . TeamUser )
team := models . AssertExistsAndLoadBean ( t , & models . Team { ID : teamUser . TeamID } ) . ( * models . Team )
user := models . AssertExistsAndLoadBean ( t , & models . User { ID : teamUser . UID } ) . ( * models . User )
2017-06-17 07:49:45 +03:00
session := loginUser ( t , user . Name )
2018-09-10 19:15:52 +03:00
token := getTokenForLoggedInUser ( t , session )
req := NewRequestf ( t , "GET" , "/api/v1/teams/%d?token=" + token , teamUser . TeamID )
2017-07-07 22:36:47 +03:00
resp := session . MakeRequest ( t , req , http . StatusOK )
2017-05-26 16:15:45 +03:00
var apiTeam api . Team
2017-06-18 12:06:17 +03:00
DecodeJSON ( t , resp , & apiTeam )
2017-05-26 16:15:45 +03:00
assert . EqualValues ( t , team . ID , apiTeam . ID )
assert . Equal ( t , team . Name , apiTeam . Name )
2019-04-24 08:32:35 +03:00
// non team member user will not access the teams details
teamUser2 := models . AssertExistsAndLoadBean ( t , & models . TeamUser { ID : 3 } ) . ( * models . TeamUser )
user2 := models . AssertExistsAndLoadBean ( t , & models . User { ID : teamUser2 . UID } ) . ( * models . User )
session = loginUser ( t , user2 . Name )
token = getTokenForLoggedInUser ( t , session )
req = NewRequestf ( t , "GET" , "/api/v1/teams/%d?token=" + token , teamUser . TeamID )
2019-07-22 10:11:16 +03:00
_ = session . MakeRequest ( t , req , http . StatusForbidden )
2019-04-24 08:32:35 +03:00
req = NewRequestf ( t , "GET" , "/api/v1/teams/%d" , teamUser . TeamID )
2019-07-22 10:11:16 +03:00
_ = session . MakeRequest ( t , req , http . StatusUnauthorized )
2019-04-28 02:32:33 +03:00
// Get an admin user able to create, update and delete teams.
user = models . AssertExistsAndLoadBean ( t , & models . User { ID : 1 } ) . ( * models . User )
session = loginUser ( t , user . Name )
token = getTokenForLoggedInUser ( t , session )
org := models . AssertExistsAndLoadBean ( t , & models . User { ID : 6 } ) . ( * models . User )
// Create team.
teamToCreate := & api . CreateTeamOption {
2019-11-06 12:37:14 +03:00
Name : "team1" ,
Description : "team one" ,
IncludesAllRepositories : true ,
Permission : "write" ,
Units : [ ] string { "repo.code" , "repo.issues" } ,
2019-04-28 02:32:33 +03:00
}
req = NewRequestWithJSON ( t , "POST" , fmt . Sprintf ( "/api/v1/orgs/%s/teams?token=%s" , org . Name , token ) , teamToCreate )
resp = session . MakeRequest ( t , req , http . StatusCreated )
DecodeJSON ( t , resp , & apiTeam )
2019-11-06 12:37:14 +03:00
checkTeamResponse ( t , & apiTeam , teamToCreate . Name , teamToCreate . Description , teamToCreate . IncludesAllRepositories ,
teamToCreate . Permission , teamToCreate . Units )
checkTeamBean ( t , apiTeam . ID , teamToCreate . Name , teamToCreate . Description , teamToCreate . IncludesAllRepositories ,
teamToCreate . Permission , teamToCreate . Units )
2019-04-28 02:32:33 +03:00
teamID := apiTeam . ID
// Edit team.
teamToEdit := & api . EditTeamOption {
2019-11-06 12:37:14 +03:00
Name : "teamone" ,
Description : "team 1" ,
IncludesAllRepositories : false ,
Permission : "admin" ,
Units : [ ] string { "repo.code" , "repo.pulls" , "repo.releases" } ,
2019-04-28 02:32:33 +03:00
}
req = NewRequestWithJSON ( t , "PATCH" , fmt . Sprintf ( "/api/v1/teams/%d?token=%s" , teamID , token ) , teamToEdit )
resp = session . MakeRequest ( t , req , http . StatusOK )
DecodeJSON ( t , resp , & apiTeam )
2019-11-06 12:37:14 +03:00
checkTeamResponse ( t , & apiTeam , teamToEdit . Name , teamToEdit . Description , teamToEdit . IncludesAllRepositories ,
teamToEdit . Permission , teamToEdit . Units )
checkTeamBean ( t , apiTeam . ID , teamToEdit . Name , teamToEdit . Description , teamToEdit . IncludesAllRepositories ,
teamToEdit . Permission , teamToEdit . Units )
2019-04-28 02:32:33 +03:00
// Read team.
teamRead := models . AssertExistsAndLoadBean ( t , & models . Team { ID : teamID } ) . ( * models . Team )
req = NewRequestf ( t , "GET" , "/api/v1/teams/%d?token=" + token , teamID )
resp = session . MakeRequest ( t , req , http . StatusOK )
DecodeJSON ( t , resp , & apiTeam )
2019-11-06 12:37:14 +03:00
checkTeamResponse ( t , & apiTeam , teamRead . Name , teamRead . Description , teamRead . IncludesAllRepositories ,
teamRead . Authorize . String ( ) , teamRead . GetUnitNames ( ) )
2019-04-28 02:32:33 +03:00
// Delete team.
req = NewRequestf ( t , "DELETE" , "/api/v1/teams/%d?token=" + token , teamID )
session . MakeRequest ( t , req , http . StatusNoContent )
models . AssertNotExistsBean ( t , & models . Team { ID : teamID } )
}
2019-11-06 12:37:14 +03:00
func checkTeamResponse ( t * testing . T , apiTeam * api . Team , name , description string , includesAllRepositories bool , permission string , units [ ] string ) {
2019-04-28 02:32:33 +03:00
assert . Equal ( t , name , apiTeam . Name , "name" )
assert . Equal ( t , description , apiTeam . Description , "description" )
2019-11-06 12:37:14 +03:00
assert . Equal ( t , includesAllRepositories , apiTeam . IncludesAllRepositories , "includesAllRepositories" )
2019-04-28 02:32:33 +03:00
assert . Equal ( t , permission , apiTeam . Permission , "permission" )
sort . StringSlice ( units ) . Sort ( )
sort . StringSlice ( apiTeam . Units ) . Sort ( )
assert . EqualValues ( t , units , apiTeam . Units , "units" )
}
2019-11-06 12:37:14 +03:00
func checkTeamBean ( t * testing . T , id int64 , name , description string , includesAllRepositories bool , permission string , units [ ] string ) {
2019-04-28 02:32:33 +03:00
team := models . AssertExistsAndLoadBean ( t , & models . Team { ID : id } ) . ( * models . Team )
assert . NoError ( t , team . GetUnits ( ) , "GetUnits" )
2019-11-06 12:37:14 +03:00
checkTeamResponse ( t , convert . ToTeam ( team ) , name , description , includesAllRepositories , permission , units )
2017-05-26 16:15:45 +03:00
}
2019-10-01 08:32:28 +03:00
type TeamSearchResults struct {
OK bool ` json:"ok" `
Data [ ] * api . Team ` json:"data" `
}
func TestAPITeamSearch ( t * testing . T ) {
prepareTestEnv ( t )
user := models . AssertExistsAndLoadBean ( t , & models . User { ID : 2 } ) . ( * models . User )
org := models . AssertExistsAndLoadBean ( t , & models . User { ID : 3 } ) . ( * models . User )
var results TeamSearchResults
session := loginUser ( t , user . Name )
req := NewRequestf ( t , "GET" , "/api/v1/orgs/%s/teams/search?q=%s" , org . Name , "_team" )
resp := session . MakeRequest ( t , req , http . StatusOK )
DecodeJSON ( t , resp , & results )
assert . NotEmpty ( t , results . Data )
assert . Equal ( t , 1 , len ( results . Data ) )
assert . Equal ( t , "test_team" , results . Data [ 0 ] . Name )
// no access if not organization member
user5 := models . AssertExistsAndLoadBean ( t , & models . User { ID : 5 } ) . ( * models . User )
session = loginUser ( t , user5 . Name )
req = NewRequestf ( t , "GET" , "/api/v1/orgs/%s/teams/search?q=%s" , org . Name , "team" )
resp = session . MakeRequest ( t , req , http . StatusForbidden )
}