| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306 | // Copyright 2020 The Gogs Authors. All rights reserved.// Use of this source code is governed by a MIT-style// license that can be found in the LICENSE file.package databaseimport (	"context"	"testing"	"github.com/stretchr/testify/assert"	"github.com/stretchr/testify/require")func TestPerms(t *testing.T) {	if testing.Short() {		t.Skip()	}	t.Parallel()	ctx := context.Background()	s := &PermissionsStore{		db: newTestDB(t, "PermissionsStore"),	}	for _, tc := range []struct {		name string		test func(t *testing.T, ctx context.Context, s *PermissionsStore)	}{		{"AccessMode", permsAccessMode},		{"Authorize", permsAuthorize},		{"SetRepoPerms", permsSetRepoPerms},	} {		t.Run(tc.name, func(t *testing.T) {			t.Cleanup(func() {				err := clearTables(t, s.db)				require.NoError(t, err)			})			tc.test(t, ctx, s)		})		if t.Failed() {			break		}	}}func permsAccessMode(t *testing.T, ctx context.Context, s *PermissionsStore) {	// Set up permissions	err := s.SetRepoPerms(ctx, 1,		map[int64]AccessMode{			2: AccessModeWrite,			3: AccessModeAdmin,		},	)	require.NoError(t, err)	err = s.SetRepoPerms(ctx, 2,		map[int64]AccessMode{			1: AccessModeRead,		},	)	require.NoError(t, err)	publicRepoID := int64(1)	publicRepoOpts := AccessModeOptions{		OwnerID: 98,	}	privateRepoID := int64(2)	privateRepoOpts := AccessModeOptions{		OwnerID: 99,		Private: true,	}	tests := []struct {		name           string		userID         int64		repoID         int64		opts           AccessModeOptions		wantAccessMode AccessMode	}{		{			name:           "nil repository",			wantAccessMode: AccessModeNone,		},		{			name:           "anonymous user has read access to public repository",			repoID:         publicRepoID,			opts:           publicRepoOpts,			wantAccessMode: AccessModeRead,		},		{			name:           "anonymous user has no access to private repository",			repoID:         privateRepoID,			opts:           privateRepoOpts,			wantAccessMode: AccessModeNone,		},		{			name:           "user is the owner",			userID:         98,			repoID:         publicRepoID,			opts:           publicRepoOpts,			wantAccessMode: AccessModeOwner,		},		{			name:           "user 1 has read access to public repo",			userID:         1,			repoID:         publicRepoID,			opts:           publicRepoOpts,			wantAccessMode: AccessModeRead,		},		{			name:           "user 2 has write access to public repo",			userID:         2,			repoID:         publicRepoID,			opts:           publicRepoOpts,			wantAccessMode: AccessModeWrite,		},		{			name:           "user 3 has admin access to public repo",			userID:         3,			repoID:         publicRepoID,			opts:           publicRepoOpts,			wantAccessMode: AccessModeAdmin,		},		{			name:           "user 1 has read access to private repo",			userID:         1,			repoID:         privateRepoID,			opts:           privateRepoOpts,			wantAccessMode: AccessModeRead,		},		{			name:           "user 2 has no access to private repo",			userID:         2,			repoID:         privateRepoID,			opts:           privateRepoOpts,			wantAccessMode: AccessModeNone,		},		{			name:           "user 3 has no access to private repo",			userID:         3,			repoID:         privateRepoID,			opts:           privateRepoOpts,			wantAccessMode: AccessModeNone,		},	}	for _, test := range tests {		t.Run(test.name, func(t *testing.T) {			mode := s.AccessMode(ctx, test.userID, test.repoID, test.opts)			assert.Equal(t, test.wantAccessMode, mode)		})	}}func permsAuthorize(t *testing.T, ctx context.Context, s *PermissionsStore) {	// Set up permissions	err := s.SetRepoPerms(ctx, 1,		map[int64]AccessMode{			1: AccessModeRead,			2: AccessModeWrite,			3: AccessModeAdmin,		},	)	require.NoError(t, err)	repo := &Repository{		ID:      1,		OwnerID: 98,	}	tests := []struct {		name           string		userID         int64		desired        AccessMode		wantAuthorized bool	}{		{			name:           "user 1 has read and wants read",			userID:         1,			desired:        AccessModeRead,			wantAuthorized: true,		},		{			name:           "user 1 has read and wants write",			userID:         1,			desired:        AccessModeWrite,			wantAuthorized: false,		},		{			name:           "user 2 has write and wants read",			userID:         2,			desired:        AccessModeRead,			wantAuthorized: true,		},		{			name:           "user 2 has write and wants write",			userID:         2,			desired:        AccessModeWrite,			wantAuthorized: true,		},		{			name:           "user 2 has write and wants admin",			userID:         2,			desired:        AccessModeAdmin,			wantAuthorized: false,		},		{			name:           "user 3 has admin and wants read",			userID:         3,			desired:        AccessModeRead,			wantAuthorized: true,		},		{			name:           "user 3 has admin and wants write",			userID:         3,			desired:        AccessModeWrite,			wantAuthorized: true,		},		{			name:           "user 3 has admin and wants admin",			userID:         3,			desired:        AccessModeAdmin,			wantAuthorized: true,		},	}	for _, test := range tests {		t.Run(test.name, func(t *testing.T) {			authorized := s.Authorize(ctx, test.userID, repo.ID, test.desired,				AccessModeOptions{					OwnerID: repo.OwnerID,					Private: repo.IsPrivate,				},			)			assert.Equal(t, test.wantAuthorized, authorized)		})	}}func permsSetRepoPerms(t *testing.T, ctx context.Context, s *PermissionsStore) {	for _, update := range []struct {		repoID    int64		accessMap map[int64]AccessMode	}{		{			repoID: 1,			accessMap: map[int64]AccessMode{				1: AccessModeWrite,				2: AccessModeWrite,				3: AccessModeAdmin,				4: AccessModeWrite,			},		},		{			repoID: 2,			accessMap: map[int64]AccessMode{				1: AccessModeWrite,				2: AccessModeRead,				4: AccessModeWrite,				5: AccessModeWrite,			},		},		{			repoID: 1,			accessMap: map[int64]AccessMode{				2: AccessModeWrite,				3: AccessModeAdmin,			},		},		{			repoID: 2,			accessMap: map[int64]AccessMode{				1: AccessModeWrite,				2: AccessModeRead,				5: AccessModeWrite,			},		},	} {		err := s.SetRepoPerms(ctx, update.repoID, update.accessMap)		if err != nil {			t.Fatal(err)		}	}	var accesses []*Access	err := s.db.Order("user_id, repo_id").Find(&accesses).Error	require.NoError(t, err)	// Ignore ID fields	for _, a := range accesses {		a.ID = 0	}	wantAccesses := []*Access{		{UserID: 1, RepoID: 2, Mode: AccessModeWrite},		{UserID: 2, RepoID: 1, Mode: AccessModeWrite},		{UserID: 2, RepoID: 2, Mode: AccessModeRead},		{UserID: 3, RepoID: 1, Mode: AccessModeAdmin},		{UserID: 5, RepoID: 2, Mode: AccessModeWrite},	}	assert.Equal(t, wantAccesses, accesses)}
 |