/* * Copyright 2016 Red Hat, Inc. and/or its affiliates. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.guvnor.common.services.project.client.security; import java.util.Arrays; import java.util.Collection; import java.util.List; import java.util.stream.Collectors; import com.google.gwtmockito.GwtMockitoTestRunner; import org.guvnor.common.services.project.model.Project; import org.guvnor.common.services.project.service.ProjectSearchService; import org.junit.Before; import org.junit.Test; import org.junit.runner.RunWith; import org.mockito.Mock; import org.mockito.Spy; import org.uberfire.mocks.CallerMock; import org.uberfire.security.authz.Permission; import org.uberfire.security.authz.PermissionManager; import org.uberfire.security.client.authz.tree.PermissionNode; import org.uberfire.security.client.authz.tree.PermissionTree; import org.uberfire.security.impl.authz.DefaultPermissionManager; import static org.junit.Assert.*; import static org.mockito.Mockito.*; @RunWith(GwtMockitoTestRunner.class) public class ProjectTreeProviderTest { @Mock ProjectSearchService searchService; @Mock PermissionTree permissionTree; @Mock Project project1; @Mock Project project2; PermissionManager permissionManager; ProjectTreeProvider treeProvider; PermissionNode rootNode; @Before public void setup() { permissionManager = new DefaultPermissionManager(); treeProvider = new ProjectTreeProvider(permissionManager, new CallerMock<>(searchService)); rootNode = treeProvider.buildRootNode(); rootNode.setPermissionTree(permissionTree); when(project1.getIdentifier()).thenReturn("p1"); when(project2.getIdentifier()).thenReturn("p2"); when(project1.getProjectName()).thenReturn("p1"); when(project2.getProjectName()).thenReturn("p2"); when(project1.getResourceType()).thenReturn(Project.RESOURCE_TYPE); when(project2.getResourceType()).thenReturn(Project.RESOURCE_TYPE); when(permissionTree.getChildrenResourceIds(any())).thenReturn(null); when(searchService.searchByName(anyString(), anyInt(), anyBoolean())).thenReturn(Arrays.asList(project1, project2)); } @Test public void testRootNode() { assertEquals(rootNode.getPermissionList().size(), 5); checkDependencies(rootNode); } @Test public void testChildrenNodes() { rootNode.expand(children -> { verify(searchService).searchByName(anyString(), anyInt(), anyBoolean()); for (PermissionNode child : children) { List<Permission> permissionList = child.getPermissionList(); assertEquals(permissionList.size(), 4); checkDependencies(child); List<String> permissionNames = permissionList.stream() .map(Permission::getName) .collect(Collectors.toList()); assertTrue(permissionNames.contains("project.read." + child.getNodeName())); assertTrue(permissionNames.contains("project.update." + child.getNodeName())); assertTrue(permissionNames.contains("project.delete." + child.getNodeName())); assertTrue(permissionNames.contains("project.build." + child.getNodeName())); } }); } protected void checkDependencies(PermissionNode permissionNode) { for (Permission permission : permissionNode.getPermissionList()) { Collection<Permission> dependencies = permissionNode.getDependencies(permission); if (permission.getName().startsWith("project.read")) { assertEquals(dependencies.size(), 3); } else { assertNull(dependencies); } } } }