| /** |
| * @license |
| * Copyright (C) 2017 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| import '../../../test/common-test-setup-karma.js'; |
| import './gr-permission.js'; |
| import {stubRestApi} from '../../../test/test-utils.js'; |
| |
| const basicFixture = fixtureFromElement('gr-permission'); |
| |
| suite('gr-permission tests', () => { |
| let element; |
| |
| setup(() => { |
| element = basicFixture.instantiate(); |
| stubRestApi('getSuggestedGroups').returns( |
| Promise.resolve({ |
| 'Administrators': { |
| id: '4c97682e6ce61b7247f3381b6f1789356666de7f', |
| }, |
| 'Anonymous Users': { |
| id: 'global%3AAnonymous-Users', |
| }, |
| })); |
| }); |
| |
| suite('unit tests', () => { |
| test('_sortPermission', () => { |
| const permission = { |
| id: 'submit', |
| value: { |
| rules: { |
| 'global:Project-Owners': { |
| action: 'ALLOW', |
| force: false, |
| }, |
| '4c97682e6ce6b7247f3381b6f1789356666de7f': { |
| action: 'ALLOW', |
| force: false, |
| }, |
| }, |
| }, |
| }; |
| |
| const expectedRules = [ |
| { |
| id: '4c97682e6ce6b7247f3381b6f1789356666de7f', |
| value: {action: 'ALLOW', force: false}, |
| }, |
| { |
| id: 'global:Project-Owners', |
| value: {action: 'ALLOW', force: false}, |
| }, |
| ]; |
| |
| element._sortPermission(permission); |
| assert.deepEqual(element._rules, expectedRules); |
| }); |
| |
| test('_computeLabel and _computeLabelValues', () => { |
| const labels = { |
| 'Code-Review': { |
| default_value: 0, |
| values: { |
| ' 0': 'No score', |
| '-1': 'I would prefer this is not merged as is', |
| '-2': 'This shall not be merged', |
| '+1': 'Looks good to me, but someone else must approve', |
| '+2': 'Looks good to me, approved', |
| }, |
| }, |
| }; |
| let permission = { |
| id: 'label-Code-Review', |
| value: { |
| label: 'Code-Review', |
| rules: { |
| 'global:Project-Owners': { |
| action: 'ALLOW', |
| force: false, |
| min: -2, |
| max: 2, |
| }, |
| '4c97682e6ce6b7247f3381b6f1789356666de7f': { |
| action: 'ALLOW', |
| force: false, |
| min: -2, |
| max: 2, |
| }, |
| }, |
| }, |
| }; |
| |
| const expectedLabelValues = [ |
| {value: -2, text: 'This shall not be merged'}, |
| {value: -1, text: 'I would prefer this is not merged as is'}, |
| {value: 0, text: 'No score'}, |
| {value: 1, text: 'Looks good to me, but someone else must approve'}, |
| {value: 2, text: 'Looks good to me, approved'}, |
| ]; |
| |
| const expectedLabel = { |
| name: 'Code-Review', |
| values: expectedLabelValues, |
| }; |
| |
| assert.deepEqual(element._computeLabelValues( |
| labels['Code-Review'].values), expectedLabelValues); |
| |
| assert.deepEqual(element._computeLabel(permission, labels), |
| expectedLabel); |
| |
| permission = { |
| id: 'label-reviewDB', |
| value: { |
| label: 'reviewDB', |
| rules: { |
| 'global:Project-Owners': { |
| action: 'ALLOW', |
| force: false, |
| }, |
| '4c97682e6ce6b7247f3381b6f1789356666de7f': { |
| action: 'ALLOW', |
| force: false, |
| }, |
| }, |
| }, |
| }; |
| |
| assert.isNotOk(element._computeLabel(permission, labels)); |
| }); |
| |
| test('_computeSectionClass', () => { |
| let deleted = true; |
| let editing = false; |
| assert.equal(element._computeSectionClass(editing, deleted), 'deleted'); |
| |
| deleted = false; |
| assert.equal(element._computeSectionClass(editing, deleted), ''); |
| |
| editing = true; |
| assert.equal(element._computeSectionClass(editing, deleted), 'editing'); |
| |
| deleted = true; |
| assert.equal(element._computeSectionClass(editing, deleted), |
| 'editing deleted'); |
| }); |
| |
| test('_computeGroupName', () => { |
| const groups = { |
| abc123: {name: 'test group'}, |
| bcd234: {}, |
| }; |
| assert.equal(element._computeGroupName(groups, 'abc123'), 'test group'); |
| assert.equal(element._computeGroupName(groups, 'bcd234'), 'bcd234'); |
| }); |
| |
| test('_computeGroupsWithRules', () => { |
| const rules = [ |
| { |
| id: '4c97682e6ce6b7247f3381b6f1789356666de7f', |
| value: {action: 'ALLOW', force: false}, |
| }, |
| { |
| id: 'global:Project-Owners', |
| value: {action: 'ALLOW', force: false}, |
| }, |
| ]; |
| const groupsWithRules = { |
| '4c97682e6ce6b7247f3381b6f1789356666de7f': true, |
| 'global:Project-Owners': true, |
| }; |
| assert.deepEqual(element._computeGroupsWithRules(rules), |
| groupsWithRules); |
| }); |
| |
| test('_getGroupSuggestions without existing rules', async () => { |
| element._groupsWithRules = {}; |
| |
| const groups = await element._getGroupSuggestions(); |
| assert.deepEqual(groups, [ |
| { |
| name: 'Administrators', |
| value: '4c97682e6ce61b7247f3381b6f1789356666de7f', |
| }, { |
| name: 'Anonymous Users', |
| value: 'global%3AAnonymous-Users', |
| }, |
| ]); |
| }); |
| |
| test('_getGroupSuggestions with existing rules filters them', async () => { |
| element._groupsWithRules = { |
| '4c97682e6ce61b7247f3381b6f1789356666de7f': true, |
| }; |
| |
| const groups = await element._getGroupSuggestions(); |
| assert.deepEqual(groups, [{ |
| name: 'Anonymous Users', |
| value: 'global%3AAnonymous-Users', |
| }]); |
| }); |
| |
| test('_handleRemovePermission', () => { |
| element.editing = true; |
| element.permission = {value: {rules: {}}}; |
| element._handleRemovePermission(); |
| assert.isTrue(element._deleted); |
| assert.isTrue(element.permission.value.deleted); |
| |
| element.editing = false; |
| assert.isFalse(element._deleted); |
| assert.isNotOk(element.permission.value.deleted); |
| }); |
| |
| test('_handleUndoRemove', () => { |
| element.permission = {value: {deleted: true, rules: {}}}; |
| element._handleUndoRemove(); |
| assert.isFalse(element._deleted); |
| assert.isNotOk(element.permission.value.deleted); |
| }); |
| |
| test('_computeHasRange', () => { |
| assert.isTrue(element._computeHasRange('Query Limit')); |
| |
| assert.isTrue(element._computeHasRange('Batch Changes Limit')); |
| |
| assert.isFalse(element._computeHasRange('test')); |
| }); |
| }); |
| |
| suite('interactions', () => { |
| setup(() => { |
| sinon.spy(element, '_computeLabel'); |
| element.name = 'Priority'; |
| element.section = 'refs/*'; |
| element.labels = { |
| 'Code-Review': { |
| values: { |
| ' 0': 'No score', |
| '-1': 'I would prefer this is not merged as is', |
| '-2': 'This shall not be merged', |
| '+1': 'Looks good to me, but someone else must approve', |
| '+2': 'Looks good to me, approved', |
| }, |
| default_value: 0, |
| }, |
| }; |
| element.permission = { |
| id: 'label-Code-Review', |
| value: { |
| label: 'Code-Review', |
| rules: { |
| 'global:Project-Owners': { |
| action: 'ALLOW', |
| force: false, |
| min: -2, |
| max: 2, |
| }, |
| '4c97682e6ce6b7247f3381b6f1789356666de7f': { |
| action: 'ALLOW', |
| force: false, |
| min: -2, |
| max: 2, |
| }, |
| }, |
| }, |
| }; |
| element._setupValues(); |
| flush(); |
| }); |
| |
| test('adding a rule', () => { |
| element.name = 'Priority'; |
| element.section = 'refs/*'; |
| element.groups = {}; |
| element.$.groupAutocomplete.text = 'ldap/tests te.st'; |
| const e = { |
| detail: { |
| value: 'ldap:CN=test+te.st', |
| }, |
| }; |
| element.editing = true; |
| assert.equal(element._rules.length, 2); |
| assert.equal(Object.keys(element._groupsWithRules).length, 2); |
| element._handleAddRuleItem(e); |
| flush(); |
| assert.deepEqual(element.groups, {'ldap:CN=test te.st': { |
| name: 'ldap/tests te.st'}}); |
| assert.equal(element._rules.length, 3); |
| assert.equal(Object.keys(element._groupsWithRules).length, 3); |
| assert.deepEqual(element.permission.value.rules['ldap:CN=test te.st'], |
| {action: 'ALLOW', min: -2, max: 2, added: true}); |
| assert.equal(element.$.groupAutocomplete.text, ''); |
| // New rule should be removed if cancel from editing. |
| element.editing = false; |
| assert.equal(element._rules.length, 2); |
| assert.equal(Object.keys(element.permission.value.rules).length, 2); |
| }); |
| |
| test('removing an added rule', () => { |
| element.name = 'Priority'; |
| element.section = 'refs/*'; |
| element.groups = {}; |
| element.$.groupAutocomplete.text = 'new group name'; |
| assert.equal(element._rules.length, 2); |
| element.shadowRoot |
| .querySelector('gr-rule-editor').dispatchEvent( |
| new CustomEvent('added-rule-removed', { |
| composed: true, bubbles: true, |
| })); |
| flush(); |
| assert.equal(element._rules.length, 1); |
| }); |
| |
| test('removing an added permission', () => { |
| const removeStub = sinon.stub(); |
| element.addEventListener('added-permission-removed', removeStub); |
| element.editing = true; |
| element.name = 'Priority'; |
| element.section = 'refs/*'; |
| element.permission.value.added = true; |
| MockInteractions.tap(element.$.removeBtn); |
| assert.isTrue(removeStub.called); |
| }); |
| |
| test('removing the permission', () => { |
| element.editing = true; |
| element.name = 'Priority'; |
| element.section = 'refs/*'; |
| |
| const removeStub = sinon.stub(); |
| element.addEventListener('added-permission-removed', removeStub); |
| |
| assert.isFalse(element.$.permission.classList.contains('deleted')); |
| assert.isFalse(element._deleted); |
| MockInteractions.tap(element.$.removeBtn); |
| assert.isTrue(element.$.permission.classList.contains('deleted')); |
| assert.isTrue(element._deleted); |
| MockInteractions.tap(element.$.undoRemoveBtn); |
| assert.isFalse(element.$.permission.classList.contains('deleted')); |
| assert.isFalse(element._deleted); |
| assert.isFalse(removeStub.called); |
| }); |
| |
| test('modify a permission', () => { |
| element.editing = true; |
| element.name = 'Priority'; |
| element.section = 'refs/*'; |
| |
| assert.isFalse(element._originalExclusiveValue); |
| assert.isNotOk(element.permission.value.modified); |
| MockInteractions.tap(element.shadowRoot |
| .querySelector('#exclusiveToggle')); |
| flush(); |
| assert.isTrue(element.permission.value.exclusive); |
| assert.isTrue(element.permission.value.modified); |
| assert.isFalse(element._originalExclusiveValue); |
| element.editing = false; |
| assert.isFalse(element.permission.value.exclusive); |
| }); |
| |
| test('_handleValueChange', () => { |
| const modifiedHandler = sinon.stub(); |
| element.permission = {value: {rules: {}}}; |
| element.addEventListener('access-modified', modifiedHandler); |
| assert.isNotOk(element.permission.value.modified); |
| element._handleValueChange(); |
| assert.isTrue(element.permission.value.modified); |
| assert.isTrue(modifiedHandler.called); |
| }); |
| |
| test('Exclusive hidden for owner permission', () => { |
| assert.equal(getComputedStyle(element.shadowRoot |
| .querySelector('#exclusiveToggle')).display, |
| 'flex'); |
| element.set(['permission', 'id'], 'owner'); |
| flush(); |
| assert.equal(getComputedStyle(element.shadowRoot |
| .querySelector('#exclusiveToggle')).display, |
| 'none'); |
| }); |
| |
| test('Exclusive hidden for any global permissions', () => { |
| assert.equal(getComputedStyle(element.shadowRoot |
| .querySelector('#exclusiveToggle')).display, |
| 'flex'); |
| element.section = 'GLOBAL_CAPABILITIES'; |
| flush(); |
| assert.equal(getComputedStyle(element.shadowRoot |
| .querySelector('#exclusiveToggle')).display, |
| 'none'); |
| }); |
| }); |
| }); |
| |