mirror of
https://github.com/Alfresco/alfresco-ng2-components.git
synced 2025-05-12 17:04:57 +00:00
* [ADF-5148] ContentService.hasPermissions() should check inherited permission * * fixed permission method
184 lines
8.6 KiB
TypeScript
184 lines
8.6 KiB
TypeScript
/*!
|
|
* @license
|
|
* Copyright 2019 Alfresco Software, Ltd.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
import { TestBed } from '@angular/core/testing';
|
|
import { ContentService } from './content.service';
|
|
import { AppConfigService } from '../app-config/app-config.service';
|
|
import { AuthenticationService } from './authentication.service';
|
|
import { StorageService } from './storage.service';
|
|
import { setupTestBed } from '../testing/setup-test-bed';
|
|
import { Node } from '@alfresco/js-api';
|
|
import { CoreTestingModule } from '../testing';
|
|
import { TranslateModule } from '@ngx-translate/core';
|
|
|
|
declare let jasmine: any;
|
|
|
|
describe('ContentService', () => {
|
|
|
|
let contentService: ContentService;
|
|
let authService: AuthenticationService;
|
|
let storage: StorageService;
|
|
let node: any;
|
|
|
|
const nodeId = 'fake-node-id';
|
|
|
|
setupTestBed({
|
|
imports: [
|
|
TranslateModule.forRoot(),
|
|
CoreTestingModule
|
|
]
|
|
});
|
|
|
|
beforeEach(() => {
|
|
authService = TestBed.inject(AuthenticationService);
|
|
contentService = TestBed.inject(ContentService);
|
|
storage = TestBed.inject(StorageService);
|
|
storage.clear();
|
|
|
|
node = {
|
|
entry: {
|
|
id: nodeId
|
|
}
|
|
};
|
|
|
|
jasmine.Ajax.install();
|
|
|
|
const appConfig: AppConfigService = TestBed.inject(AppConfigService);
|
|
appConfig.config = {
|
|
ecmHost: 'http://localhost:9876/ecm',
|
|
provider: 'ECM'
|
|
};
|
|
});
|
|
|
|
afterEach(() => {
|
|
jasmine.Ajax.uninstall();
|
|
});
|
|
|
|
it('should return a valid content URL', (done) => {
|
|
authService.login('fake-username', 'fake-password').subscribe(() => {
|
|
expect(contentService.getContentUrl(node)).toContain('/ecm/alfresco/api/' +
|
|
'-default-/public/alfresco/versions/1/nodes/fake-node-id/content?attachment=false&alf_ticket=fake-post-ticket');
|
|
done();
|
|
});
|
|
|
|
jasmine.Ajax.requests.mostRecent().respondWith({
|
|
'status': 201,
|
|
contentType: 'application/json',
|
|
responseText: JSON.stringify({ 'entry': { 'id': 'fake-post-ticket', 'userId': 'admin' } })
|
|
});
|
|
});
|
|
|
|
it('should return a valid thumbnail URL', (done) => {
|
|
authService.login('fake-username', 'fake-password').subscribe(() => {
|
|
expect(contentService.getDocumentThumbnailUrl(node))
|
|
.toContain('/ecm/alfresco/api/-default-/public/alfresco' +
|
|
'/versions/1/nodes/fake-node-id/renditions/doclib/content?attachment=false&alf_ticket=fake-post-ticket');
|
|
done();
|
|
});
|
|
|
|
jasmine.Ajax.requests.mostRecent().respondWith({
|
|
'status': 201,
|
|
contentType: 'application/json',
|
|
responseText: JSON.stringify({ 'entry': { 'id': 'fake-post-ticket', 'userId': 'admin' } })
|
|
});
|
|
});
|
|
|
|
describe('AllowableOperations', () => {
|
|
|
|
it('should hasAllowableOperations be false if allowableOperation is not present in the node', () => {
|
|
const permissionNode = new Node({});
|
|
expect(contentService.hasAllowableOperations(permissionNode, 'create')).toBeFalsy();
|
|
});
|
|
|
|
it('should hasAllowableOperations be true if allowableOperation is present and you have the permission for the request operation', () => {
|
|
const permissionNode = new Node({ allowableOperations: ['delete', 'update', 'create', 'updatePermissions'] });
|
|
|
|
expect(contentService.hasAllowableOperations(permissionNode, 'create')).toBeTruthy();
|
|
});
|
|
|
|
it('should hasAllowableOperations be false if allowableOperation is present but you don\'t have the permission for the request operation', () => {
|
|
const permissionNode = new Node({ allowableOperations: ['delete', 'update', 'updatePermissions'] });
|
|
expect(contentService.hasAllowableOperations(permissionNode, 'create')).toBeFalsy();
|
|
});
|
|
|
|
it('should hasAllowableOperations works in the opposite way with negate value', () => {
|
|
const permissionNode = new Node({ allowableOperations: ['delete', 'update', 'updatePermissions'] });
|
|
expect(contentService.hasAllowableOperations(permissionNode, '!create')).toBeTruthy();
|
|
});
|
|
|
|
it('should hasAllowableOperations return false if no permission parameter are passed', () => {
|
|
const permissionNode = new Node({ allowableOperations: ['delete', 'update', 'updatePermissions'] });
|
|
expect(contentService.hasAllowableOperations(permissionNode, null)).toBeFalsy();
|
|
});
|
|
|
|
it('should havePermission return true if permission parameter is copy', () => {
|
|
const permissionNode = null;
|
|
expect(contentService.hasAllowableOperations(permissionNode, 'copy')).toBeTruthy();
|
|
});
|
|
});
|
|
|
|
describe('Permissions', () => {
|
|
|
|
it('should havePermission be false if allowableOperation is not present in the node', () => {
|
|
const permissionNode = new Node({});
|
|
expect(contentService.hasPermissions(permissionNode, 'manager')).toBeFalsy();
|
|
});
|
|
|
|
it('should havePermission be true if permissions is present and you have the permission for the request operation', () => {
|
|
const permissionNode = new Node({ permissions: { locallySet: [{ name: 'manager', authorityId: 'user1' }, { name: 'collaborator', authorityId: 'user2' }, { name: 'consumer', authorityId: 'user3' }] } });
|
|
|
|
expect(contentService.hasPermissions(permissionNode, 'manager', 'user1')).toBeTruthy();
|
|
});
|
|
|
|
it('should havePermission be false if permissions is present but you don\'t have the permission for the request operation', () => {
|
|
const permissionNode = new Node({ permissions: { locallySet: [{ name: 'collaborator', authorityId: 'user1' }, { name: 'consumer', authorityId: 'user2' }] } });
|
|
expect(contentService.hasPermissions(permissionNode, 'manager', 'user1')).toBeFalsy();
|
|
});
|
|
|
|
it('should havePermission works in the opposite way with negate value', () => {
|
|
const permissionNode = new Node({ permissions: { locallySet: [{ name: 'collaborator', authorityId: 'user1' }, { name: 'consumer', authorityId: 'user2' }] } });
|
|
expect(contentService.hasPermissions(permissionNode, '!manager', 'user1')).toBeTruthy();
|
|
});
|
|
|
|
it('should havePermission return false if no permission parameter are passed', () => {
|
|
const permissionNode = new Node({ permissions: { locallySet: [{ name: 'collaborator', authorityId: 'user1' }, { name: 'consumer', authorityId: 'user2' }] } });
|
|
expect(contentService.hasPermissions(permissionNode, null, 'user1')).toBeFalsy();
|
|
});
|
|
|
|
it('should havePermission return true if the permissions is empty and the permission to check is Consumer', () => {
|
|
const permissionNode = new Node({ permissions: [] });
|
|
expect(contentService.hasPermissions(permissionNode, 'Consumer', 'user1')).toBeTruthy();
|
|
});
|
|
|
|
it('should havePermission return false if the permissions is empty and the permission to check is not Consumer', () => {
|
|
const permissionNode = new Node({ permissions: [] });
|
|
expect(contentService.hasPermissions(permissionNode, '!Consumer', 'user1')).toBeFalsy();
|
|
});
|
|
|
|
it('should havePermission be true if inherited permissions is present and you have the permission for the request operation', () => {
|
|
const permissionNode = new Node({ permissions: { inherited: [{ name: 'manager', authorityId: 'user1' }, { name: 'collaborator', authorityId: 'user2' } ] } });
|
|
expect(contentService.hasPermissions(permissionNode, 'manager', 'user1')).toBeTruthy();
|
|
});
|
|
|
|
it('should take current logged user id if userId undefined ', () => {
|
|
spyOn(authService, 'getEcmUsername').and.returnValue('user1');
|
|
const permissionNode = new Node({ permissions: { inherited: [{ name: 'manager', authorityId: 'user1' }, { name: 'collaborator', authorityId: 'user2' } ] } });
|
|
expect(contentService.hasPermissions(permissionNode, 'manager')).toBeTruthy();
|
|
});
|
|
});
|
|
});
|