@Test public void hasPermissionToAddResourceRelationWhenUserHasResourceUpdatePermissionForApplicationServerResTypeAndResourceIsInstanceOfApplicationServerResType() { // given ResourceEntity as = resourceEntityBuilder.mockAppServerEntity("as", asResourceGroup, null, null); when(sessionContext.isCallerInRole(SERVER_ADMIN)).thenReturn(true); when(sessionContext.getCallerPrincipal()).thenReturn(principal); myRoles = new HashMap<>(); RestrictionEntity res = new RestrictionEntity(); res.setAction(Action.ALL); res.setResourceType(ResourceTypeEntityBuilder.APPLICATION_SERVER_TYPE); myRoles.put(SERVER_ADMIN, Arrays.asList(new RestrictionDTOBuilder().mockRestrictionDTO(Permission.RESOURCE, res))); permissionService.rolesWithRestrictions = myRoles; // when boolean canAdd= permissionService.hasPermissionToAddRelation(as, new ContextEntity()); // then Assert.assertTrue(canAdd); }
restriction.setResourceType(resourceType);
@Test public void hasNoPermissionToAddResourceRelationWhenUserUserHasResourceUpdatePermissionForApplicationServerResTypeAndResourceIsInstanceOfApplicationResType() { // given ResourceEntity app = resourceEntityBuilder.mockApplicationEntity("app", appResourceGroup, null); when(sessionContext.isCallerInRole(SERVER_ADMIN)).thenReturn(true); when(sessionContext.getCallerPrincipal()).thenReturn(principal); myRoles = new HashMap<>(); RestrictionEntity res = new RestrictionEntity(); res.setAction(Action.ALL); res.setResourceType(ResourceTypeEntityBuilder.APPLICATION_SERVER_TYPE); myRoles.put(SERVER_ADMIN, Arrays.asList(new RestrictionDTOBuilder().mockRestrictionDTO(Permission.RESOURCE, res))); permissionService.rolesWithRestrictions = myRoles; // when boolean canAdd = permissionService.hasPermissionToAddRelation(app, new ContextEntity()); // then Assert.assertFalse(canAdd); }
@Test public void shouldReturnFalseIfCallerHasDelegationPermissionButHisSimilarRestrictionIsRestrictedToAnExplicitResourceTypeAndTheOneHeWantsToDelegateIsNot() { // given ResourceTypeEntity resourceType = new ResourceTypeEntityBuilder().id(7).build(); when(sessionContext.isCallerInRole(CONFIG_ADMIN)).thenReturn(true); when(sessionContext.getCallerPrincipal()).thenReturn(principal); RestrictionEntity res = new RestrictionEntity(); res.setAction(Action.ALL); PermissionEntity perm = new PermissionEntity(); perm.setValue(Permission.PERMISSION_DELEGATION.name()); res.setPermission(perm); RestrictionEntity res2 = new RestrictionEntity(); res2.setResourceType(resourceType); res2.setAction(Action.ALL); res2.setContext(envC); PermissionEntity perm2 = new PermissionEntity(); perm2.setValue(Permission.RESOURCE_PROPERTY_DECRYPT.name()); res2.setPermission(perm2); myRoles = new HashMap<>(); permissionService.rolesWithRestrictions = myRoles; when(permissionRepository.getUserWithRestrictions(anyString())).thenReturn(Arrays.asList(res, res2)); // when boolean result = permissionService.hasPermissionToDelegatePermission(Permission.RESOURCE_PROPERTY_DECRYPT, null, null, null, Action.CREATE); // then Assert.assertFalse(result); }
@Test public void shouldReturnFalseIfCallerHasDelegationPermissionButHisSimilarRestrictionIsRestrictedToAnExplicitResourceTypeAndTheOneHeWantsToDelegateIsFromAnother() { // given ResourceTypeEntity resourceType = new ResourceTypeEntityBuilder().id(7).build(); ResourceGroupEntity resourceGroup = new ResourceGroupEntity(); resourceGroup.setId(23); resourceGroup.setResourceType(resourceType); ResourceTypeEntity anotherResourceType = new ResourceTypeEntityBuilder().id(9).build(); when(sessionContext.isCallerInRole(CONFIG_ADMIN)).thenReturn(true); when(sessionContext.getCallerPrincipal()).thenReturn(principal); RestrictionEntity res = new RestrictionEntity(); res.setAction(Action.ALL); PermissionEntity perm = new PermissionEntity(); perm.setValue(Permission.PERMISSION_DELEGATION.name()); res.setPermission(perm); RestrictionEntity res2 = new RestrictionEntity(); res2.setResourceType(anotherResourceType); res2.setAction(Action.ALL); PermissionEntity perm2 = new PermissionEntity(); perm2.setValue(Permission.RESOURCE_PROPERTY_DECRYPT.name()); res2.setPermission(perm2); myRoles = new HashMap<>(); permissionService.rolesWithRestrictions = myRoles; when(permissionRepository.getUserWithRestrictions(anyString())).thenReturn(Arrays.asList(res, res2)); // when boolean result = permissionService.hasPermissionToDelegatePermission(Permission.RESOURCE_PROPERTY_DECRYPT, resourceGroup, null, null, Action.CREATE); // then Assert.assertFalse(result); }
@Test public void shouldReturnFalseIfASimilarButMoreResourceTypeRestrictedUserRestrictionExists() { // given UserRestrictionEntity userRestrictionEntity = new UserRestrictionEntity(); userRestrictionEntity.setName("tester"); PermissionEntity permission = new PermissionEntity(); permission.setValue(Permission.RESOURCE.name()); ResourceTypeEntity resourceType = new ResourceTypeEntityBuilder().id(7).build(); RestrictionEntity existingRestriction = new RestrictionEntity(); existingRestriction.setUser(userRestrictionEntity); existingRestriction.setAction(Action.UPDATE); existingRestriction.setContext(envC); existingRestriction.setPermission(permission); existingRestriction.setResourceType(resourceType); RestrictionEntity newRestriction = new RestrictionEntity(); newRestriction.setUser(userRestrictionEntity); newRestriction.setAction(Action.UPDATE); newRestriction.setContext(envC); newRestriction.setPermission(permission); myRoles = new HashMap<>(); permissionService.rolesWithRestrictions = myRoles; when(permissionRepository.getUserWithRestrictions("tester")).thenReturn(Arrays.asList(existingRestriction)); // when boolean exists = permissionService.identicalOrMoreGeneralRestrictionExists(newRestriction); // then Assert.assertFalse(exists); }
@Test public void shouldReturnTrueIfASimilarButNotResourceTypeRestrictedUserRestrictionExists() { // given UserRestrictionEntity userRestrictionEntity = new UserRestrictionEntity(); userRestrictionEntity.setName("tester"); PermissionEntity permission = new PermissionEntity(); permission.setValue(Permission.RESOURCE.name()); ResourceTypeEntity resourceType = new ResourceTypeEntityBuilder().id(7).build(); RestrictionEntity existingRestriction = new RestrictionEntity(); existingRestriction.setUser(userRestrictionEntity); existingRestriction.setAction(Action.UPDATE); existingRestriction.setContext(envC); existingRestriction.setPermission(permission); RestrictionEntity newRestriction = new RestrictionEntity(); newRestriction.setUser(userRestrictionEntity); newRestriction.setAction(Action.UPDATE); newRestriction.setContext(envC); newRestriction.setPermission(permission); newRestriction.setResourceType(resourceType); myRoles = new HashMap<>(); permissionService.rolesWithRestrictions = myRoles; when(permissionRepository.getUserWithRestrictions("tester")).thenReturn(Arrays.asList(existingRestriction)); // when boolean exists = permissionService.identicalOrMoreGeneralRestrictionExists(newRestriction); // then Assert.assertTrue(exists); }