mirror of https://github.com/Squidex/squidex.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
362 lines
12 KiB
362 lines
12 KiB
// ==========================================================================
|
|
// Squidex Headless CMS
|
|
// ==========================================================================
|
|
// Copyright (c) Squidex UG (haftungsbeschraenkt)
|
|
// All rights reserved. Licensed under the MIT license.
|
|
// ==========================================================================
|
|
|
|
using System.Security.Claims;
|
|
using FakeItEasy;
|
|
using FluentAssertions;
|
|
using Squidex.Domain.Apps.Core;
|
|
using Squidex.Domain.Apps.Entities.Search;
|
|
using Squidex.Domain.Apps.Entities.TestHelpers;
|
|
using Squidex.Infrastructure;
|
|
using Squidex.Shared;
|
|
using Squidex.Shared.Identity;
|
|
using Xunit;
|
|
|
|
namespace Squidex.Domain.Apps.Entities.Apps
|
|
{
|
|
public sealed class AppSettingsSearchSourceTests
|
|
{
|
|
private readonly IUrlGenerator urlGenerator = A.Fake<IUrlGenerator>();
|
|
private readonly NamedId<DomainId> appId = NamedId.Of(DomainId.NewGuid(), "my-app");
|
|
private readonly AppSettingsSearchSource sut;
|
|
|
|
public AppSettingsSearchSourceTests()
|
|
{
|
|
sut = new AppSettingsSearchSource(urlGenerator);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_return_empty_if_nothing_matching()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("xyz", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_return_dashboard_actual_if_matching_and_permission_given()
|
|
{
|
|
var permission = PermissionIds.ForApp(PermissionIds.AppUsage, appId.Name);
|
|
|
|
var ctx = ContextWithPermission(permission.Id);
|
|
|
|
A.CallTo(() => urlGenerator.DashboardUI(appId))
|
|
.Returns("dashboard-url");
|
|
|
|
var actual = await sut.SearchAsync("dashboard", ctx, default);
|
|
|
|
actual.Should().BeEquivalentTo(
|
|
new SearchResults()
|
|
.Add("Dashboard", SearchResultType.Dashboard, "dashboard-url"));
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_not_return_dashboard_actual_if_user_has_no_permission()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("assets", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_return_languages_actual_if_matching_and_permission_given()
|
|
{
|
|
var permission = PermissionIds.ForApp(PermissionIds.AppLanguagesRead, appId.Name);
|
|
|
|
var ctx = ContextWithPermission(permission.Id);
|
|
|
|
A.CallTo(() => urlGenerator.LanguagesUI(appId))
|
|
.Returns("languages-url");
|
|
|
|
var actual = await sut.SearchAsync("languages", ctx, default);
|
|
|
|
actual.Should().BeEquivalentTo(
|
|
new SearchResults()
|
|
.Add("Languages", SearchResultType.Setting, "languages-url"));
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_not_return_languages_actual_if_user_has_no_permission()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("assets", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_not_return_patterns_actual_if_user_has_no_permission()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("patterns", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_return_schemas_actual_if_matching_and_permission_given()
|
|
{
|
|
var permission = PermissionIds.ForApp(PermissionIds.AppSchemasRead, appId.Name);
|
|
|
|
var ctx = ContextWithPermission(permission.Id);
|
|
|
|
A.CallTo(() => urlGenerator.SchemasUI(appId))
|
|
.Returns("schemas-url");
|
|
|
|
var actual = await sut.SearchAsync("schemas", ctx, default);
|
|
|
|
actual.Should().BeEquivalentTo(
|
|
new SearchResults()
|
|
.Add("Schemas", SearchResultType.Schema, "schemas-url"));
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_not_return_schemas_actual_if_user_has_no_permission()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("schemas", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_return_assets_actual_if_matching_and_permission_given()
|
|
{
|
|
var permission = PermissionIds.ForApp(PermissionIds.AppAssetsRead, appId.Name);
|
|
|
|
var ctx = ContextWithPermission(permission.Id);
|
|
|
|
A.CallTo(() => urlGenerator.AssetsUI(appId, A<string?>._))
|
|
.Returns("assets-url");
|
|
|
|
var actual = await sut.SearchAsync("assets", ctx, default);
|
|
|
|
actual.Should().BeEquivalentTo(
|
|
new SearchResults()
|
|
.Add("Assets", SearchResultType.Asset, "assets-url"));
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_not_return_assets_actual_if_user_has_no_permission()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("assets", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_return_backups_actual_if_matching_and_permission_given()
|
|
{
|
|
var permission = PermissionIds.ForApp(PermissionIds.AppBackupsRead, appId.Name);
|
|
|
|
var ctx = ContextWithPermission(permission.Id);
|
|
|
|
A.CallTo(() => urlGenerator.BackupsUI(appId))
|
|
.Returns("backups-url");
|
|
|
|
var actual = await sut.SearchAsync("backups", ctx, default);
|
|
|
|
actual.Should().BeEquivalentTo(
|
|
new SearchResults()
|
|
.Add("Backups", SearchResultType.Setting, "backups-url"));
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_not_return_backups_actual_if_user_has_no_permission()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("backups", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_return_clients_actual_if_matching_and_permission_given()
|
|
{
|
|
var permission = PermissionIds.ForApp(PermissionIds.AppClientsRead, appId.Name);
|
|
|
|
var ctx = ContextWithPermission(permission.Id);
|
|
|
|
A.CallTo(() => urlGenerator.ClientsUI(appId))
|
|
.Returns("clients-url");
|
|
|
|
var actual = await sut.SearchAsync("clients", ctx, default);
|
|
|
|
actual.Should().BeEquivalentTo(
|
|
new SearchResults()
|
|
.Add("Clients", SearchResultType.Setting, "clients-url"));
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_not_return_clients_actual_if_user_has_no_permission()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("clients", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_return_contributors_actual_if_matching_and_permission_given()
|
|
{
|
|
var permission = PermissionIds.ForApp(PermissionIds.AppContributorsRead, appId.Name);
|
|
|
|
var ctx = ContextWithPermission(permission.Id);
|
|
|
|
A.CallTo(() => urlGenerator.ContributorsUI(appId))
|
|
.Returns("contributors-url");
|
|
|
|
var actual = await sut.SearchAsync("contributors", ctx, default);
|
|
|
|
actual.Should().BeEquivalentTo(
|
|
new SearchResults()
|
|
.Add("Contributors", SearchResultType.Setting, "contributors-url"));
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_not_contributors_clients_actual_if_user_has_no_permission()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("contributors", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_return_subscription_actual_if_matching_and_permission_given()
|
|
{
|
|
var permission = PermissionIds.ForApp(PermissionIds.AppPlansRead, appId.Name);
|
|
|
|
var ctx = ContextWithPermission(permission.Id);
|
|
|
|
A.CallTo(() => urlGenerator.PlansUI(appId))
|
|
.Returns("subscription-url");
|
|
|
|
var actual = await sut.SearchAsync("subscription", ctx, default);
|
|
|
|
actual.Should().BeEquivalentTo(
|
|
new SearchResults()
|
|
.Add("Subscription", SearchResultType.Setting, "subscription-url"));
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_not_subscription_clients_actual_if_user_has_no_permission()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("subscription", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_return_roles_actual_if_matching_and_permission_given()
|
|
{
|
|
var permission = PermissionIds.ForApp(PermissionIds.AppRolesRead, appId.Name);
|
|
|
|
var ctx = ContextWithPermission(permission.Id);
|
|
|
|
A.CallTo(() => urlGenerator.RolesUI(appId))
|
|
.Returns("roles-url");
|
|
|
|
var actual = await sut.SearchAsync("roles", ctx, default);
|
|
|
|
actual.Should().BeEquivalentTo(
|
|
new SearchResults()
|
|
.Add("Roles", SearchResultType.Setting, "roles-url"));
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_not_roles_clients_actual_if_user_has_no_permission()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("roles", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_return_rules_actual_if_matching_and_permission_given()
|
|
{
|
|
var permission = PermissionIds.ForApp(PermissionIds.AppRulesRead, appId.Name);
|
|
|
|
var ctx = ContextWithPermission(permission.Id);
|
|
|
|
A.CallTo(() => urlGenerator.RulesUI(appId))
|
|
.Returns("rules-url");
|
|
|
|
var actual = await sut.SearchAsync("rules", ctx, default);
|
|
|
|
actual.Should().BeEquivalentTo(
|
|
new SearchResults()
|
|
.Add("Rules", SearchResultType.Rule, "rules-url"));
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_not_return_rules_actual_if_user_has_no_permission()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("assets", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_return_workflows_actual_if_matching_and_permission_given()
|
|
{
|
|
var permission = PermissionIds.ForApp(PermissionIds.AppWorkflowsRead, appId.Name);
|
|
|
|
var ctx = ContextWithPermission(permission.Id);
|
|
|
|
A.CallTo(() => urlGenerator.WorkflowsUI(appId))
|
|
.Returns("workflows-url");
|
|
|
|
var actual = await sut.SearchAsync("workflows", ctx, default);
|
|
|
|
actual.Should().BeEquivalentTo(
|
|
new SearchResults()
|
|
.Add("Workflows", SearchResultType.Setting, "workflows-url"));
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Should_not_return_workflows_actual_if_user_has_no_permission()
|
|
{
|
|
var ctx = ContextWithPermission();
|
|
|
|
var actual = await sut.SearchAsync("workflows", ctx, default);
|
|
|
|
Assert.Empty(actual);
|
|
}
|
|
|
|
private Context ContextWithPermission(string? permission = null)
|
|
{
|
|
var claimsIdentity = new ClaimsIdentity();
|
|
var claimsPrincipal = new ClaimsPrincipal(claimsIdentity);
|
|
|
|
if (permission != null)
|
|
{
|
|
claimsIdentity.AddClaim(new Claim(SquidexClaimTypes.Permissions, permission));
|
|
}
|
|
|
|
return new Context(claimsPrincipal, Mocks.App(appId));
|
|
}
|
|
}
|
|
}
|
|
|