/* * Copyright 2016 Red Hat, Inc. and/or its affiliates. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.guvnor.structure.repositories; import java.util.Arrays; import java.util.Collection; import java.util.List; import java.util.stream.Collectors; import com.google.gwtmockito.GwtMockitoTestRunner; import com.sun.corba.se.impl.activation.RepositoryImpl; import org.guvnor.structure.client.security.RepositoryTreeProvider; import org.guvnor.structure.organizationalunit.OrganizationalUnitSearchService; import org.guvnor.structure.repositories.impl.git.GitRepository; import org.junit.Before; import org.junit.Test; import org.junit.runner.RunWith; import org.mockito.Mock; import org.uberfire.mocks.CallerMock; import org.uberfire.security.authz.Permission; import org.uberfire.security.authz.PermissionManager; import org.uberfire.security.client.authz.tree.PermissionNode; import org.uberfire.security.client.authz.tree.PermissionTree; import org.uberfire.security.impl.authz.DefaultPermissionManager; import static org.junit.Assert.*; import static org.mockito.Mockito.*; @RunWith(GwtMockitoTestRunner.class) public class RepositoryTreeProviderTest { @Mock RepositorySearchService searchService; @Mock PermissionTree permissionTree; @Mock Repository repo1; @Mock Repository repo2; PermissionManager permissionManager; RepositoryTreeProvider treeProvider; PermissionNode rootNode; @Before public void setup() { permissionManager = new DefaultPermissionManager(); treeProvider = new RepositoryTreeProvider(permissionManager, new CallerMock<>(searchService)); rootNode = treeProvider.buildRootNode(); rootNode.setPermissionTree(permissionTree); when(repo1.getIdentifier()).thenReturn("r1"); when(repo2.getIdentifier()).thenReturn("r2"); when(repo1.getAlias()).thenReturn("r1"); when(repo2.getAlias()).thenReturn("r2"); when(repo1.getResourceType()).thenReturn(Repository.RESOURCE_TYPE); when(repo2.getResourceType()).thenReturn(Repository.RESOURCE_TYPE); when(permissionTree.getChildrenResourceIds(any())).thenReturn(null); when(searchService.searchByAlias(anyString(), anyInt(), anyBoolean())).thenReturn(Arrays.asList(repo1, repo2)); } @Test public void testRootNode() { assertEquals(rootNode.getPermissionList().size(), 4); checkDependencies(rootNode); } @Test public void testChildrenNodes() { rootNode.expand(children -> { verify(searchService).searchByAlias(anyString(), anyInt(), anyBoolean()); for (PermissionNode child : children) { List<Permission> permissionList = child.getPermissionList(); assertEquals(permissionList.size(), 3); checkDependencies(child); List<String> permissionNames = permissionList.stream() .map(Permission::getName) .collect(Collectors.toList()); assertTrue(permissionNames.contains("repository.read." + child.getNodeName())); assertTrue(permissionNames.contains("repository.update." + child.getNodeName())); assertTrue(permissionNames.contains("repository.delete." + child.getNodeName())); assertEquals(child.getPermissionList().size(), 3); checkDependencies(child); } }); } protected void checkDependencies(PermissionNode permissionNode) { for (Permission permission : permissionNode.getPermissionList()) { Collection<Permission> dependencies = permissionNode.getDependencies(permission); if (permission.getName().startsWith("repository.read")) { assertEquals(dependencies.size(), 2); } else { assertNull(dependencies); } } } }