/*************************GO-LICENSE-START*********************************
* Copyright 2014 ThoughtWorks, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*************************GO-LICENSE-END***********************************/
package com.thoughtworks.go.server.web;
import com.thoughtworks.go.config.CaseInsensitiveString;
import com.thoughtworks.go.server.service.SecurityService;
import com.thoughtworks.go.util.ClassMockery;
import org.jmock.Expectations;
import org.jmock.integration.junit4.JMock;
import org.junit.Before;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.springframework.mock.web.MockHttpServletRequest;
import org.springframework.mock.web.MockHttpServletResponse;
import static com.thoughtworks.go.server.domain.Username.ANONYMOUS;
import static org.hamcrest.Matchers.is;
import static org.junit.Assert.assertThat;
@RunWith(JMock.class)
public class AuthorizationInterceptorTest {
private ClassMockery context = new ClassMockery();
private AuthorizationInterceptor permissionInterceptor;
private SecurityService securityService;
private MockHttpServletRequest request;
private MockHttpServletResponse response;
@Before
public void setup() throws Exception {
securityService = context.mock(SecurityService.class);
permissionInterceptor = new AuthorizationInterceptor(securityService);
request = new MockHttpServletRequest();
response = new MockHttpServletResponse();
}
@Test
public void shouldCheckViewPermissionForGetRequestIfPipelineNamePresent() throws Exception {
request.setParameter("pipelineName", "cruise");
request.setMethod("get");
assumeUserHasViewPermission();
assertThat("shouldCheckViewPermissionIfPipelineNamePresent",
permissionInterceptor.preHandle(request, response, null),
is(true));
}
@Test
public void shouldNotCheckViewPermissionIfPipelineNameNotPresent() throws Exception {
assertThat("shouldCheckViewPermissionIfPipelineNamePresent",
permissionInterceptor.preHandle(request, response, null),
is(true));
}
@Test
public void shouldCheckOperatePermissionForPostRequest() throws Exception {
request.setParameter("pipelineName", "cruise");
request.setMethod("post");
assumeUserHasOperatePermissionForPipeline();
assertThat(permissionInterceptor.preHandle(request, response, null), is(true));
}
@Test
public void shouldCheckOperatePermissionForStageOperationRequest() throws Exception {
request.setParameter("pipelineName", "cruise");
request.setParameter("stageName", "dev");
request.setMethod("post");
assumeUserHasOperatePermissionForStage();
assertThat(permissionInterceptor.preHandle(request, response, null), is(true));
}
@Test
public void shouldCheckOperatePermissionForPutRequest() throws Exception {
request.setParameter("pipelineName", "cruise");
request.setMethod("put");
assumeUserHasOperatePermissionForPipeline();
assertThat(permissionInterceptor.preHandle(request, response, null), is(true));
}
@Test
public void shouldNotCheckOperatePermissionForEditingConfigurationRequest() throws Exception {
request.setParameter("pipelineName", "cruise");
request.setRequestURI("/admin/restful/configuration");
request.setMethod("post");
assertThat(permissionInterceptor.preHandle(request, response, null), is(true));
}
private void assumeUserHasViewPermission() {
context.checking(new Expectations() {
{
one(securityService).hasViewPermissionForPipeline(ANONYMOUS, "cruise");
will(returnValue(true));
}
});
}
private void assumeUserHasOperatePermissionForPipeline() {
context.checking(new Expectations() {
{
one(securityService).hasOperatePermissionForPipeline(ANONYMOUS.getUsername(), "cruise");
will(returnValue(true));
}
});
}
private void assumeUserHasOperatePermissionForStage() {
context.checking(new Expectations() {
{
one(securityService).hasOperatePermissionForStage("cruise", "dev", CaseInsensitiveString.str(ANONYMOUS.getUsername()));
will(returnValue(true));
}
});
}
private void assumeUserHasOperatePermissionForFirstStage() {
context.checking(new Expectations() {
{
one(securityService).hasOperatePermissionForFirstStage("cruise", CaseInsensitiveString.str(ANONYMOUS.getUsername()));
will(returnValue(true));
}
});
}
}