2022-05-03 21:10:19 +00:00
|
|
|
package coderd_test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net/http"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
|
|
|
|
"github.com/coder/coder/coderd/coderdtest"
|
|
|
|
"github.com/coder/coder/coderd/rbac"
|
|
|
|
"github.com/coder/coder/codersdk"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestListRoles(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
ctx := context.Background()
|
|
|
|
client := coderdtest.New(t, nil)
|
|
|
|
// Create admin, member, and org admin
|
|
|
|
admin := coderdtest.CreateFirstUser(t, client)
|
|
|
|
member := coderdtest.CreateAnotherUser(t, client, admin.OrganizationID)
|
|
|
|
|
|
|
|
orgAdmin := coderdtest.CreateAnotherUser(t, client, admin.OrganizationID)
|
|
|
|
orgAdminUser, err := orgAdmin.User(ctx, codersdk.Me)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// TODO: @emyrk switch this to the admin when getting non-personal users is
|
|
|
|
// supported. `client.UpdateOrganizationMemberRoles(...)`
|
|
|
|
_, err = orgAdmin.UpdateOrganizationMemberRoles(ctx, admin.OrganizationID, orgAdminUser.ID,
|
|
|
|
codersdk.UpdateRoles{
|
|
|
|
Roles: []string{rbac.RoleOrgMember(admin.OrganizationID), rbac.RoleOrgAdmin(admin.OrganizationID)},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
require.NoError(t, err, "update org member roles")
|
|
|
|
|
|
|
|
otherOrg, err := client.CreateOrganization(ctx, admin.UserID, codersdk.CreateOrganizationRequest{
|
|
|
|
Name: "other",
|
|
|
|
})
|
|
|
|
require.NoError(t, err, "create org")
|
|
|
|
|
|
|
|
const unauth = "unauthorized"
|
|
|
|
const notMember = "not a member of the organization"
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
Name string
|
|
|
|
Client *codersdk.Client
|
2022-05-06 19:18:00 +00:00
|
|
|
APICall func() ([]codersdk.Role, error)
|
|
|
|
ExpectedRoles []codersdk.Role
|
2022-05-03 21:10:19 +00:00
|
|
|
AuthorizedError string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
Name: "MemberListSite",
|
2022-05-06 19:18:00 +00:00
|
|
|
APICall: func() ([]codersdk.Role, error) {
|
2022-05-03 21:10:19 +00:00
|
|
|
x, err := member.ListSiteRoles(ctx)
|
|
|
|
return x, err
|
|
|
|
},
|
|
|
|
AuthorizedError: unauth,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "OrgMemberListOrg",
|
2022-05-06 19:18:00 +00:00
|
|
|
APICall: func() ([]codersdk.Role, error) {
|
2022-05-03 21:10:19 +00:00
|
|
|
return member.ListOrganizationRoles(ctx, admin.OrganizationID)
|
|
|
|
},
|
|
|
|
AuthorizedError: unauth,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "NonOrgMemberListOrg",
|
2022-05-06 19:18:00 +00:00
|
|
|
APICall: func() ([]codersdk.Role, error) {
|
2022-05-03 21:10:19 +00:00
|
|
|
return member.ListOrganizationRoles(ctx, otherOrg.ID)
|
|
|
|
},
|
|
|
|
AuthorizedError: notMember,
|
|
|
|
},
|
|
|
|
// Org admin
|
|
|
|
{
|
|
|
|
Name: "OrgAdminListSite",
|
2022-05-06 19:18:00 +00:00
|
|
|
APICall: func() ([]codersdk.Role, error) {
|
2022-05-03 21:10:19 +00:00
|
|
|
return orgAdmin.ListSiteRoles(ctx)
|
|
|
|
},
|
|
|
|
AuthorizedError: unauth,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "OrgAdminListOrg",
|
2022-05-06 19:18:00 +00:00
|
|
|
APICall: func() ([]codersdk.Role, error) {
|
2022-05-03 21:10:19 +00:00
|
|
|
return orgAdmin.ListOrganizationRoles(ctx, admin.OrganizationID)
|
|
|
|
},
|
2022-05-09 16:38:14 +00:00
|
|
|
ExpectedRoles: convertRoles(rbac.OrganizationRoles(admin.OrganizationID)),
|
2022-05-03 21:10:19 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "OrgAdminListOtherOrg",
|
2022-05-06 19:18:00 +00:00
|
|
|
APICall: func() ([]codersdk.Role, error) {
|
2022-05-03 21:10:19 +00:00
|
|
|
return orgAdmin.ListOrganizationRoles(ctx, otherOrg.ID)
|
|
|
|
},
|
|
|
|
AuthorizedError: notMember,
|
|
|
|
},
|
|
|
|
// Admin
|
|
|
|
{
|
|
|
|
Name: "AdminListSite",
|
2022-05-06 19:18:00 +00:00
|
|
|
APICall: func() ([]codersdk.Role, error) {
|
2022-05-03 21:10:19 +00:00
|
|
|
return client.ListSiteRoles(ctx)
|
|
|
|
},
|
2022-05-09 16:38:14 +00:00
|
|
|
ExpectedRoles: convertRoles(rbac.SiteRoles()),
|
2022-05-03 21:10:19 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "AdminListOrg",
|
2022-05-06 19:18:00 +00:00
|
|
|
APICall: func() ([]codersdk.Role, error) {
|
2022-05-03 21:10:19 +00:00
|
|
|
return client.ListOrganizationRoles(ctx, admin.OrganizationID)
|
|
|
|
},
|
2022-05-09 16:38:14 +00:00
|
|
|
ExpectedRoles: convertRoles(rbac.OrganizationRoles(admin.OrganizationID)),
|
2022-05-03 21:10:19 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, c := range testCases {
|
|
|
|
c := c
|
|
|
|
t.Run(c.Name, func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
roles, err := c.APICall()
|
|
|
|
if c.AuthorizedError != "" {
|
|
|
|
var apiErr *codersdk.Error
|
|
|
|
require.ErrorAs(t, err, &apiErr)
|
|
|
|
require.Equal(t, http.StatusUnauthorized, apiErr.StatusCode())
|
|
|
|
require.Contains(t, apiErr.Message, c.AuthorizedError)
|
|
|
|
} else {
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.ElementsMatch(t, c.ExpectedRoles, roles)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2022-05-09 16:38:14 +00:00
|
|
|
|
|
|
|
func convertRole(role rbac.Role) codersdk.Role {
|
|
|
|
return codersdk.Role{
|
|
|
|
DisplayName: role.DisplayName,
|
|
|
|
Name: role.Name,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func convertRoles(roles []rbac.Role) []codersdk.Role {
|
|
|
|
converted := make([]codersdk.Role, 0, len(roles))
|
|
|
|
for _, role := range roles {
|
|
|
|
converted = append(converted, convertRole(role))
|
|
|
|
}
|
|
|
|
return converted
|
|
|
|
}
|