|
|
# Copyright (C) 2010-2024 RhodeCode GmbH
|
|
|
#
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
# it under the terms of the GNU Affero General Public License, version 3
|
|
|
# (only), as published by the Free Software Foundation.
|
|
|
#
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
# GNU General Public License for more details.
|
|
|
#
|
|
|
# You should have received a copy of the GNU Affero General Public License
|
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
#
|
|
|
# This program is dual-licensed. If you wish to learn more about the
|
|
|
# RhodeCode Enterprise Edition, including its added features, Support services,
|
|
|
# and proprietary license terms, please see https://rhodecode.com/licenses/
|
|
|
|
|
|
import mock
|
|
|
import pytest
|
|
|
|
|
|
from rhodecode.model.user import UserModel
|
|
|
from rhodecode.model.repo_group import RepoGroupModel
|
|
|
from rhodecode.api.tests.utils import (
|
|
|
build_data, api_call, assert_error, assert_ok, crash)
|
|
|
|
|
|
|
|
|
@pytest.mark.usefixtures("testuser_api", "app")
|
|
|
class TestGrantUserGroupPermissionFromRepoGroup(object):
|
|
|
@pytest.mark.parametrize("name, perm, apply_to_children", [
|
|
|
('none', 'group.none', 'none'),
|
|
|
('read', 'group.read', 'none'),
|
|
|
('write', 'group.write', 'none'),
|
|
|
('admin', 'group.admin', 'none'),
|
|
|
|
|
|
('none', 'group.none', 'all'),
|
|
|
('read', 'group.read', 'all'),
|
|
|
('write', 'group.write', 'all'),
|
|
|
('admin', 'group.admin', 'all'),
|
|
|
|
|
|
('none', 'group.none', 'repos'),
|
|
|
('read', 'group.read', 'repos'),
|
|
|
('write', 'group.write', 'repos'),
|
|
|
('admin', 'group.admin', 'repos'),
|
|
|
|
|
|
('none', 'group.none', 'groups'),
|
|
|
('read', 'group.read', 'groups'),
|
|
|
('write', 'group.write', 'groups'),
|
|
|
('admin', 'group.admin', 'groups'),
|
|
|
])
|
|
|
def test_api_grant_user_group_permission_to_repo_group(
|
|
|
self, name, perm, apply_to_children, user_util):
|
|
|
user_group = user_util.create_user_group()
|
|
|
repo_group = user_util.create_repo_group()
|
|
|
user_util.create_repo(parent=repo_group)
|
|
|
|
|
|
id_, params = build_data(
|
|
|
self.apikey,
|
|
|
'grant_user_group_permission_to_repo_group',
|
|
|
repogroupid=repo_group.name,
|
|
|
usergroupid=user_group.users_group_name,
|
|
|
perm=perm,
|
|
|
apply_to_children=apply_to_children,)
|
|
|
response = api_call(self.app, params)
|
|
|
|
|
|
ret = {
|
|
|
'msg': (
|
|
|
'Granted perm: `%s` (recursive:%s) for user group: `%s`'
|
|
|
' in repo group: `%s`' % (
|
|
|
perm, apply_to_children, user_group.users_group_name,
|
|
|
repo_group.name
|
|
|
)
|
|
|
),
|
|
|
'success': True
|
|
|
}
|
|
|
expected = ret
|
|
|
try:
|
|
|
assert_ok(id_, expected, given=response.body)
|
|
|
finally:
|
|
|
RepoGroupModel().revoke_user_group_permission(
|
|
|
repo_group.group_id, user_group.users_group_id)
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
|
"name, perm, apply_to_children, grant_admin, access_ok", [
|
|
|
('none_fails', 'group.none', 'none', False, False),
|
|
|
('read_fails', 'group.read', 'none', False, False),
|
|
|
('write_fails', 'group.write', 'none', False, False),
|
|
|
('admin_fails', 'group.admin', 'none', False, False),
|
|
|
|
|
|
# with granted perms
|
|
|
('none_ok', 'group.none', 'none', True, True),
|
|
|
('read_ok', 'group.read', 'none', True, True),
|
|
|
('write_ok', 'group.write', 'none', True, True),
|
|
|
('admin_ok', 'group.admin', 'none', True, True),
|
|
|
]
|
|
|
)
|
|
|
def test_api_grant_user_group_permission_to_repo_group_by_regular_user(
|
|
|
self, name, perm, apply_to_children, grant_admin, access_ok,
|
|
|
user_util):
|
|
|
user = UserModel().get_by_username(self.TEST_USER_LOGIN)
|
|
|
user_group = user_util.create_user_group()
|
|
|
repo_group = user_util.create_repo_group()
|
|
|
if grant_admin:
|
|
|
user_util.grant_user_permission_to_repo_group(
|
|
|
repo_group, user, 'group.admin')
|
|
|
|
|
|
id_, params = build_data(
|
|
|
self.apikey_regular,
|
|
|
'grant_user_group_permission_to_repo_group',
|
|
|
repogroupid=repo_group.name,
|
|
|
usergroupid=user_group.users_group_name,
|
|
|
perm=perm,
|
|
|
apply_to_children=apply_to_children,)
|
|
|
response = api_call(self.app, params)
|
|
|
if access_ok:
|
|
|
ret = {
|
|
|
'msg': (
|
|
|
'Granted perm: `%s` (recursive:%s) for user group: `%s`'
|
|
|
' in repo group: `%s`' % (
|
|
|
perm, apply_to_children, user_group.users_group_name,
|
|
|
repo_group.name
|
|
|
)
|
|
|
),
|
|
|
'success': True
|
|
|
}
|
|
|
expected = ret
|
|
|
try:
|
|
|
assert_ok(id_, expected, given=response.body)
|
|
|
finally:
|
|
|
RepoGroupModel().revoke_user_group_permission(
|
|
|
repo_group.group_id, user_group.users_group_id)
|
|
|
else:
|
|
|
expected = 'repository group `%s` does not exist' % (repo_group.name,)
|
|
|
assert_error(id_, expected, given=response.body)
|
|
|
|
|
|
def test_api_grant_user_group_permission_to_repo_group_wrong_permission(
|
|
|
self, user_util):
|
|
|
user_group = user_util.create_user_group()
|
|
|
repo_group = user_util.create_repo_group()
|
|
|
perm = 'haha.no.permission'
|
|
|
id_, params = build_data(
|
|
|
self.apikey,
|
|
|
'grant_user_group_permission_to_repo_group',
|
|
|
repogroupid=repo_group.name,
|
|
|
usergroupid=user_group.users_group_name,
|
|
|
perm=perm)
|
|
|
response = api_call(self.app, params)
|
|
|
|
|
|
expected = 'permission `%s` does not exist. Permission should start with prefix: `group.`' % (perm,)
|
|
|
assert_error(id_, expected, given=response.body)
|
|
|
|
|
|
@mock.patch.object(RepoGroupModel, 'grant_user_group_permission', crash)
|
|
|
def test_api_grant_user_group_permission_exception_when_adding_2(
|
|
|
self, user_util):
|
|
|
user_group = user_util.create_user_group()
|
|
|
repo_group = user_util.create_repo_group()
|
|
|
perm = 'group.read'
|
|
|
id_, params = build_data(
|
|
|
self.apikey,
|
|
|
'grant_user_group_permission_to_repo_group',
|
|
|
repogroupid=repo_group.name,
|
|
|
usergroupid=user_group.users_group_name,
|
|
|
perm=perm)
|
|
|
response = api_call(self.app, params)
|
|
|
|
|
|
expected = (
|
|
|
'failed to edit permission for user group: `%s`'
|
|
|
' in repo group: `%s`' % (
|
|
|
user_group.users_group_name, repo_group.name)
|
|
|
)
|
|
|
assert_error(id_, expected, given=response.body)
|
|
|
|