mirror of
https://github.com/GNS3/gns3-server.git
synced 2024-11-18 01:34:50 +02:00
169 lines
6.1 KiB
Python
169 lines
6.1 KiB
Python
#!/usr/bin/env python
|
|
#
|
|
# Copyright (C) 2021 GNS3 Technologies Inc.
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
import pytest
|
|
|
|
from fastapi import FastAPI, status
|
|
from httpx import AsyncClient
|
|
|
|
from sqlalchemy.ext.asyncio import AsyncSession
|
|
from gns3server.db.repositories.rbac import RbacRepository
|
|
|
|
pytestmark = pytest.mark.asyncio
|
|
|
|
|
|
class TestRolesRoutes:
|
|
|
|
async def test_create_role(self, app: FastAPI, client: AsyncClient) -> None:
|
|
|
|
new_role = {"name": "role1"}
|
|
response = await client.post(app.url_path_for("create_role"), json=new_role)
|
|
assert response.status_code == status.HTTP_201_CREATED
|
|
|
|
async def test_get_role(self, app: FastAPI, client: AsyncClient, db_session: AsyncSession) -> None:
|
|
|
|
rbac_repo = RbacRepository(db_session)
|
|
role_in_db = await rbac_repo.get_role_by_name("role1")
|
|
response = await client.get(app.url_path_for("get_role", role_id=role_in_db.role_id))
|
|
assert response.status_code == status.HTTP_200_OK
|
|
assert response.json()["role_id"] == str(role_in_db.role_id)
|
|
|
|
async def test_list_roles(self, app: FastAPI, client: AsyncClient) -> None:
|
|
|
|
response = await client.get(app.url_path_for("get_roles"))
|
|
assert response.status_code == status.HTTP_200_OK
|
|
assert len(response.json()) == 8 # 7 default roles + role1
|
|
|
|
async def test_update_role(self, app: FastAPI, client: AsyncClient, db_session: AsyncSession) -> None:
|
|
|
|
rbac_repo = RbacRepository(db_session)
|
|
role_in_db = await rbac_repo.get_role_by_name("role1")
|
|
|
|
update_role = {"name": "role42"}
|
|
response = await client.put(
|
|
app.url_path_for("update_role", role_id=role_in_db.role_id),
|
|
json=update_role
|
|
)
|
|
assert response.status_code == status.HTTP_200_OK
|
|
updated_role_in_db = await rbac_repo.get_role(role_in_db.role_id)
|
|
assert updated_role_in_db.name == "role42"
|
|
|
|
async def test_cannot_update_builtin_user_role(
|
|
self,
|
|
app: FastAPI,
|
|
client: AsyncClient,
|
|
db_session: AsyncSession
|
|
) -> None:
|
|
|
|
rbac_repo = RbacRepository(db_session)
|
|
role_in_db = await rbac_repo.get_role_by_name("User")
|
|
update_role = {"name": "Hackers"}
|
|
response = await client.put(
|
|
app.url_path_for("update_role", role_id=role_in_db.role_id),
|
|
json=update_role
|
|
)
|
|
assert response.status_code == status.HTTP_403_FORBIDDEN
|
|
|
|
async def test_delete_role(
|
|
self,
|
|
app: FastAPI,
|
|
client: AsyncClient,
|
|
db_session: AsyncSession
|
|
) -> None:
|
|
|
|
rbac_repo = RbacRepository(db_session)
|
|
role_in_db = await rbac_repo.get_role_by_name("role42")
|
|
response = await client.delete(app.url_path_for("delete_role", role_id=role_in_db.role_id))
|
|
assert response.status_code == status.HTTP_204_NO_CONTENT
|
|
|
|
async def test_cannot_delete_builtin_administrator_role(
|
|
self,
|
|
app: FastAPI,
|
|
client: AsyncClient,
|
|
db_session: AsyncSession
|
|
) -> None:
|
|
|
|
rbac_repo = RbacRepository(db_session)
|
|
role_in_db = await rbac_repo.get_role_by_name("Administrator")
|
|
response = await client.delete(app.url_path_for("delete_role", role_id=role_in_db.role_id))
|
|
assert response.status_code == status.HTTP_403_FORBIDDEN
|
|
|
|
|
|
class TestRolesPrivilegesRoutes:
|
|
|
|
async def test_add_privilege_to_role(
|
|
self,
|
|
app: FastAPI,
|
|
client: AsyncClient,
|
|
db_session: AsyncSession
|
|
) -> None:
|
|
|
|
rbac_repo = RbacRepository(db_session)
|
|
role_in_db = await rbac_repo.get_role_by_name("User")
|
|
privilege = await rbac_repo.get_privilege_by_name("Template.Allocate")
|
|
|
|
response = await client.put(
|
|
app.url_path_for(
|
|
"add_privilege_to_role",
|
|
role_id=role_in_db.role_id,
|
|
privilege_id=str(privilege.privilege_id)
|
|
)
|
|
)
|
|
assert response.status_code == status.HTTP_204_NO_CONTENT
|
|
privileges = await rbac_repo.get_role_privileges(role_in_db.role_id)
|
|
assert len(privileges) == 25 # 24 default privileges + 1 custom privilege
|
|
|
|
async def test_get_role_privileges(
|
|
self,
|
|
app: FastAPI,
|
|
client: AsyncClient,
|
|
db_session: AsyncSession
|
|
) -> None:
|
|
|
|
rbac_repo = RbacRepository(db_session)
|
|
role_in_db = await rbac_repo.get_role_by_name("User")
|
|
|
|
response = await client.get(
|
|
app.url_path_for(
|
|
"get_role_privileges",
|
|
role_id=role_in_db.role_id)
|
|
)
|
|
assert response.status_code == status.HTTP_200_OK
|
|
assert len(response.json()) == 25 # 24 default privileges + 1 custom privilege
|
|
|
|
async def test_remove_privilege_from_role(
|
|
self,
|
|
app: FastAPI,
|
|
client: AsyncClient,
|
|
db_session: AsyncSession
|
|
) -> None:
|
|
|
|
rbac_repo = RbacRepository(db_session)
|
|
role_in_db = await rbac_repo.get_role_by_name("User")
|
|
privilege = await rbac_repo.get_privilege_by_name("Template.Allocate")
|
|
|
|
response = await client.delete(
|
|
app.url_path_for(
|
|
"remove_privilege_from_role",
|
|
role_id=role_in_db.role_id,
|
|
privilege_id=str(privilege.privilege_id)
|
|
),
|
|
)
|
|
assert response.status_code == status.HTTP_204_NO_CONTENT
|
|
privileges = await rbac_repo.get_role_privileges(role_in_db.role_id)
|
|
assert len(privileges) == 24 # 24 default privileges
|