aboutsummaryrefslogtreecommitdiffstats
path: root/openecomp-be/backend/openecomp-sdc-item-permissions-manager/src/test/java/org/openecomp/sdc/itempermissions/dao/impl/ItemPermissionsManagerImplTest.java
blob: 439b8b6105980ececad1b9de982083358b8e22c0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
package org.openecomp.sdc.itempermissions.dao.impl;

import org.mockito.*;
import org.openecomp.sdc.common.errors.CoreException;
import org.openecomp.sdc.common.session.SessionContextProviderFactory;
import org.openecomp.sdc.itempermissions.PermissionsServices;
import org.openecomp.sdc.notification.dtos.Event;
import org.openecomp.sdc.notification.services.NotificationPropagationManager;
import org.openecomp.sdc.notification.services.SubscriptionService;
import org.openecomp.sdc.versioning.ItemManager;
import org.openecomp.sdc.versioning.types.Item;
import org.testng.annotations.BeforeMethod;
import org.testng.annotations.Test;

import java.util.*;
import java.util.stream.Collectors;
import java.util.stream.Stream;

import static org.mockito.Mockito.doReturn;
import static org.mockito.Mockito.verify;
import static org.openecomp.sdc.itempermissions.notifications.NotificationConstants.*;
import static org.openecomp.sdc.itempermissions.notifications.NotificationConstants.PERMISSION_CHANGED;
import static org.testng.Assert.assertEquals;
import static org.testng.Assert.assertTrue;

/**
 * Created by ayalaben on 7/6/2017
 */
public class ItemPermissionsManagerImplTest {

  private static final String ITEM1_ID = "1";
  private static final String PERMISSION = "Contributor";
  private static final String ACTION = "Change_Item_Permissions";
  private static final String USER = "user";
  private static final String AFFECTED_USER1 = "affected_user1";
  private static final String AFFECTED_USER2 = "affected_user2";
  private static final String AFFECTED_USER3 = "affected_user3";
  private static final String tenant = "dox";

  @Mock
  private PermissionsServices permissionsServicesMock;
  @Mock
  private ItemManager itemManagerMock;
  @Mock
  private SubscriptionService subscriptionServiceMock;
  @Mock
  private NotificationPropagationManager notifierMock;
  @Captor
  private ArgumentCaptor<Event> eventArgumentCaptor;

  @InjectMocks
  private ItemPermissionsManagerImpl permissionsManager;


  @BeforeMethod
  public void setUp() throws Exception {
    SessionContextProviderFactory.getInstance().createInterface().create(USER, tenant);
    MockitoAnnotations.initMocks(this);
  }

  @Test(expectedExceptions = CoreException.class, expectedExceptionsMessageRegExp = "Permissions " +
          "Error. The user does not have permission to perform this action.")
  public void testUpdateItemPermissionsWhenNotAllowed() {
    doReturn(false).when(permissionsServicesMock).isAllowed(ITEM1_ID, USER, ACTION);

    permissionsManager
            .updateItemPermissions(ITEM1_ID, PERMISSION, Collections.singleton(AFFECTED_USER1),
                    new HashSet<>());
  }

  @Test
  public void testUpdateItemPermissions() {
    doReturn(true).when(permissionsServicesMock).isAllowed(ITEM1_ID, USER, ACTION);
    Item item = new Item();
    item.setName("Item 1 Name");
    doReturn(item).when(itemManagerMock).get(ITEM1_ID);

    Set<String> addedUsersIds =
            Stream.of(AFFECTED_USER1, AFFECTED_USER2).collect(Collectors.toSet());
    Set<String> removedUsersIds = Collections.singleton(AFFECTED_USER3);
    permissionsManager
            .updateItemPermissions(ITEM1_ID, PERMISSION, addedUsersIds, removedUsersIds);

    verify(permissionsServicesMock)
            .updateItemPermissions(ITEM1_ID, PERMISSION, addedUsersIds, removedUsersIds);

    for (String addedUsersId : addedUsersIds) {
      verifyCallsToNotificationsFramework(addedUsersId, true);
    }
    for (String removedUsersId : removedUsersIds) {
      verifyCallsToNotificationsFramework(removedUsersId, false);
    }
  }

  private void verifyCallsToNotificationsFramework(String affectedUser, boolean permissionGranted) {
    verifyCallToSubscriptionService(affectedUser, permissionGranted);
    verifyDirectNotificationCallParameters(affectedUser, permissionGranted);
  }

  private void verifyDirectNotificationCallParameters(String affectedUser, boolean permissionGranted) {
    verify(notifierMock).directNotification(eventArgumentCaptor.capture(), Matchers.eq(affectedUser));
    Event event = eventArgumentCaptor.getValue();
    assertTrue(event.getEventType().equals(PERMISSION_CHANGED));
    Map<String, Object> attributes = event.getAttributes();
    assertEquals(attributes.get(PERMISSION_GRANTED), permissionGranted);
    assertEquals(attributes.get(ITEM_ID_PROP), ITEM1_ID);
    assertEquals(attributes.get(PERMISSION_ITEM), PERMISSION);
  }

  private void verifyCallToSubscriptionService(String affectedUser, boolean permissionGranted) {
    if (permissionGranted) {
      verify(subscriptionServiceMock).subscribe(affectedUser, ITEM1_ID);
    } else {
      verify(subscriptionServiceMock).unsubscribe(affectedUser, ITEM1_ID);
    }
  }


}