/* * Copyright (c) 2010 Lockheed Martin Corporation * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.eurekastreams.server.action.authorization; import java.io.Serializable; import java.util.ArrayList; import java.util.List; import org.eurekastreams.commons.actions.context.Principal; import org.eurekastreams.commons.actions.context.PrincipalActionContext; import org.eurekastreams.commons.exceptions.AuthorizationException; import org.eurekastreams.server.persistence.mappers.DomainMapper; import org.jmock.Expectations; import org.jmock.Mockery; import org.jmock.integration.junit4.JUnit4Mockery; import org.jmock.lib.legacy.ClassImposteriser; import org.junit.Test; /** * Test fixture for CurrentUserIsSystemAdministratorAuthorization. * */ public class CurrentUserIsSystemAdministratorAuthorizationTest { /** * Context for building mock objects. */ private final Mockery context = new JUnit4Mockery() { { setImposteriser(ClassImposteriser.INSTANCE); } }; /** * Mapper to get system administrators. */ private DomainMapper<Serializable, List<Long>> systemAdministratorMapper = context.mock(DomainMapper.class); /** * {@link PrincipalActionContext}. */ private PrincipalActionContext actionContext = context.mock(PrincipalActionContext.class); /** * {@link Principal}. */ private Principal principal = context.mock(Principal.class); /** * User id for tests. */ private Long userId = 6L; /** * System under test. */ private CurrentUserIsSystemAdministratorAuthorization sut = new CurrentUserIsSystemAdministratorAuthorization( systemAdministratorMapper); /** * Test. */ @Test public void authorizePass() { final List<Long> admins = new ArrayList<Long>(); admins.add(6L); context.checking(new Expectations() { { allowing(actionContext).getPrincipal(); will(returnValue(principal)); allowing(principal).getId(); will(returnValue(userId)); oneOf(systemAdministratorMapper).execute(null); will(returnValue(admins)); } }); sut.authorize(actionContext); context.assertIsSatisfied(); } /** * Test. */ @Test(expected = AuthorizationException.class) public void authorizeFail() { final List<Long> admins = new ArrayList<Long>(); admins.add(5L); context.checking(new Expectations() { { allowing(actionContext).getPrincipal(); will(returnValue(principal)); allowing(principal).getId(); will(returnValue(userId)); oneOf(systemAdministratorMapper).execute(null); will(returnValue(admins)); } }); sut.authorize(actionContext); context.assertIsSatisfied(); } }