From bd412ddbf934c4252d795ab487bbdfc58fc0e98c Mon Sep 17 00:00:00 2001 From: Dan Brown Date: Wed, 12 Oct 2022 12:12:36 +0100 Subject: [PATCH] Updated test for perms. changes and fixed static issues --- app/Auth/Permissions/PermissionApplicator.php | 2 +- app/Auth/Permissions/PermissionFormData.php | 2 +- .../CopyShelfPermissionsCommandTest.php | 28 ++++++++++++------- tests/Entity/BookShelfTest.php | 12 +++++--- tests/Entity/EntitySearchTest.php | 21 +++++++------- tests/Helpers/EntityProvider.php | 6 +++- tests/Permissions/EntityPermissionsTest.php | 9 +++--- tests/Permissions/RolesTest.php | 8 +++--- 8 files changed, 51 insertions(+), 37 deletions(-) diff --git a/app/Auth/Permissions/PermissionApplicator.php b/app/Auth/Permissions/PermissionApplicator.php index 56d2092cb..af372cb74 100644 --- a/app/Auth/Permissions/PermissionApplicator.php +++ b/app/Auth/Permissions/PermissionApplicator.php @@ -83,7 +83,7 @@ class PermissionApplicator ->pluck($action, 'role_id'); // Continue up the chain if no applicable entity permission overrides. - if (empty($allowedByRoleId)) { + if ($allowedByRoleId->isEmpty()) { continue; } diff --git a/app/Auth/Permissions/PermissionFormData.php b/app/Auth/Permissions/PermissionFormData.php index 2e2af6854..8044a3c56 100644 --- a/app/Auth/Permissions/PermissionFormData.php +++ b/app/Auth/Permissions/PermissionFormData.php @@ -47,7 +47,7 @@ class PermissionFormData */ public function everyoneElseEntityPermission(): EntityPermission { - /** @var EntityPermission $permission */ + /** @var ?EntityPermission $permission */ $permission = $this->entity->permissions() ->where('role_id', '=', 0) ->first(); diff --git a/tests/Commands/CopyShelfPermissionsCommandTest.php b/tests/Commands/CopyShelfPermissionsCommandTest.php index 4ff4fb78b..cb9a845fd 100644 --- a/tests/Commands/CopyShelfPermissionsCommandTest.php +++ b/tests/Commands/CopyShelfPermissionsCommandTest.php @@ -19,7 +19,7 @@ class CopyShelfPermissionsCommandTest extends TestCase $shelf = $this->entities->shelf(); $child = $shelf->books()->first(); $editorRole = $this->getEditor()->roles()->first(); - $this->assertFalse(boolval($child->hasPermissions()), 'Child book should not be restricted by default'); + $this->assertFalse($child->hasPermissions(), 'Child book should not be restricted by default'); $this->assertTrue($child->permissions()->count() === 0, 'Child book should have no permissions by default'); $this->entities->setPermissions($shelf, ['view', 'update'], [$editorRole]); @@ -28,10 +28,14 @@ class CopyShelfPermissionsCommandTest extends TestCase ]); $child = $shelf->books()->first(); - $this->assertTrue(boolval($child->hasPermissions()), 'Child book should now be restricted'); - $this->assertTrue($child->permissions()->count() === 2, 'Child book should have copied permissions'); - $this->assertDatabaseHas('entity_permissions', ['restrictable_id' => $child->id, 'action' => 'view', 'role_id' => $editorRole->id]); - $this->assertDatabaseHas('entity_permissions', ['restrictable_id' => $child->id, 'action' => 'update', 'role_id' => $editorRole->id]); + $this->assertTrue($child->hasPermissions(), 'Child book should now be restricted'); + $this->assertEquals(2, $child->permissions()->count(), 'Child book should have copied permissions'); + $this->assertDatabaseHas('entity_permissions', [ + 'entity_type' => 'book', + 'entity_id' => $child->id, + 'role_id' => $editorRole->id, + 'view' => true, 'update' => true, 'create' => false, 'delete' => false, + ]); } public function test_copy_shelf_permissions_command_using_all() @@ -40,7 +44,7 @@ class CopyShelfPermissionsCommandTest extends TestCase Bookshelf::query()->where('id', '!=', $shelf->id)->delete(); $child = $shelf->books()->first(); $editorRole = $this->getEditor()->roles()->first(); - $this->assertFalse(boolval($child->hasPermissions()), 'Child book should not be restricted by default'); + $this->assertFalse($child->hasPermissions(), 'Child book should not be restricted by default'); $this->assertTrue($child->permissions()->count() === 0, 'Child book should have no permissions by default'); $this->entities->setPermissions($shelf, ['view', 'update'], [$editorRole]); @@ -48,9 +52,13 @@ class CopyShelfPermissionsCommandTest extends TestCase ->expectsQuestion('Permission settings for all shelves will be cascaded. Books assigned to multiple shelves will receive only the permissions of it\'s last processed shelf. Are you sure you want to proceed?', 'y'); $child = $shelf->books()->first(); - $this->assertTrue(boolval($child->hasPermissions()), 'Child book should now be restricted'); - $this->assertTrue($child->permissions()->count() === 2, 'Child book should have copied permissions'); - $this->assertDatabaseHas('entity_permissions', ['restrictable_id' => $child->id, 'action' => 'view', 'role_id' => $editorRole->id]); - $this->assertDatabaseHas('entity_permissions', ['restrictable_id' => $child->id, 'action' => 'update', 'role_id' => $editorRole->id]); + $this->assertTrue($child->hasPermissions(), 'Child book should now be restricted'); + $this->assertEquals(2, $child->permissions()->count(), 'Child book should have copied permissions'); + $this->assertDatabaseHas('entity_permissions', [ + 'entity_type' => 'book', + 'entity_id' => $child->id, + 'role_id' => $editorRole->id, + 'view' => true, 'update' => true, 'create' => false, 'delete' => false, + ]); } } diff --git a/tests/Entity/BookShelfTest.php b/tests/Entity/BookShelfTest.php index 6a0bb94d5..5d919f12b 100644 --- a/tests/Entity/BookShelfTest.php +++ b/tests/Entity/BookShelfTest.php @@ -295,7 +295,7 @@ class BookShelfTest extends TestCase $child = $shelf->books()->first(); $editorRole = $this->getEditor()->roles()->first(); - $this->assertFalse(boolval($child->hasPermissions()), 'Child book should not be restricted by default'); + $this->assertFalse($child->hasPermissions(), 'Child book should not be restricted by default'); $this->assertTrue($child->permissions()->count() === 0, 'Child book should have no permissions by default'); $this->entities->setPermissions($shelf, ['view', 'update'], [$editorRole]); @@ -303,10 +303,14 @@ class BookShelfTest extends TestCase $child = $shelf->books()->first(); $resp->assertRedirect($shelf->getUrl()); - $this->assertTrue(boolval($child->hasPermissions()), 'Child book should now be restricted'); + $this->assertTrue($child->hasPermissions(), 'Child book should now be restricted'); $this->assertTrue($child->permissions()->count() === 2, 'Child book should have copied permissions'); - $this->assertDatabaseHas('entity_permissions', ['restrictable_id' => $child->id, 'action' => 'view', 'role_id' => $editorRole->id]); - $this->assertDatabaseHas('entity_permissions', ['restrictable_id' => $child->id, 'action' => 'update', 'role_id' => $editorRole->id]); + $this->assertDatabaseHas('entity_permissions', [ + 'entity_type' => 'book', + 'entity_id' => $child->id, + 'role_id' => $editorRole->id, + 'view' => true, 'update' => true, 'create' => false, 'delete' => false, + ]); } public function test_permission_page_has_a_warning_about_no_cascading() diff --git a/tests/Entity/EntitySearchTest.php b/tests/Entity/EntitySearchTest.php index 21f5dfc03..51fac48b2 100644 --- a/tests/Entity/EntitySearchTest.php +++ b/tests/Entity/EntitySearchTest.php @@ -132,9 +132,8 @@ class EntitySearchTest extends TestCase public function test_search_filters() { $page = $this->entities->newPage(['name' => 'My new test quaffleachits', 'html' => 'this is about an orange donkey danzorbhsing']); - $this->asEditor(); - $editorId = $this->getEditor()->id; - $editorSlug = $this->getEditor()->slug; + $editor = $this->getEditor(); + $this->actingAs($editor); // Viewed filter searches $this->get('/search?term=' . urlencode('danzorbhsing {not_viewed_by_me}'))->assertSee($page->name); @@ -147,22 +146,22 @@ class EntitySearchTest extends TestCase $this->get('/search?term=' . urlencode('danzorbhsing {created_by:me}'))->assertDontSee($page->name); $this->get('/search?term=' . urlencode('danzorbhsing {updated_by:me}'))->assertDontSee($page->name); $this->get('/search?term=' . urlencode('danzorbhsing {owned_by:me}'))->assertDontSee($page->name); - $this->get('/search?term=' . urlencode('danzorbhsing {updated_by:' . $editorSlug . '}'))->assertDontSee($page->name); - $page->created_by = $editorId; + $this->get('/search?term=' . urlencode('danzorbhsing {updated_by:' . $editor->slug . '}'))->assertDontSee($page->name); + $page->created_by = $editor->id; $page->save(); $this->get('/search?term=' . urlencode('danzorbhsing {created_by:me}'))->assertSee($page->name); - $this->get('/search?term=' . urlencode('danzorbhsing {created_by: ' . $editorSlug . '}'))->assertSee($page->name); + $this->get('/search?term=' . urlencode('danzorbhsing {created_by: ' . $editor->slug . '}'))->assertSee($page->name); $this->get('/search?term=' . urlencode('danzorbhsing {updated_by:me}'))->assertDontSee($page->name); $this->get('/search?term=' . urlencode('danzorbhsing {owned_by:me}'))->assertDontSee($page->name); - $page->updated_by = $editorId; + $page->updated_by = $editor->id; $page->save(); $this->get('/search?term=' . urlencode('danzorbhsing {updated_by:me}'))->assertSee($page->name); - $this->get('/search?term=' . urlencode('danzorbhsing {updated_by:' . $editorSlug . '}'))->assertSee($page->name); + $this->get('/search?term=' . urlencode('danzorbhsing {updated_by:' . $editor->slug . '}'))->assertSee($page->name); $this->get('/search?term=' . urlencode('danzorbhsing {owned_by:me}'))->assertDontSee($page->name); - $page->owned_by = $editorId; + $page->owned_by = $editor->id; $page->save(); $this->get('/search?term=' . urlencode('danzorbhsing {owned_by:me}'))->assertSee($page->name); - $this->get('/search?term=' . urlencode('danzorbhsing {owned_by:' . $editorSlug . '}'))->assertSee($page->name); + $this->get('/search?term=' . urlencode('danzorbhsing {owned_by:' . $editor->slug . '}'))->assertSee($page->name); // Content filters $this->get('/search?term=' . urlencode('{in_name:danzorbhsing}'))->assertDontSee($page->name); @@ -172,7 +171,7 @@ class EntitySearchTest extends TestCase // Restricted filter $this->get('/search?term=' . urlencode('danzorbhsing {is_restricted}'))->assertDontSee($page->name); - $this->entities->setPermissions($page, [], []); + $this->entities->setPermissions($page, ['view'], [$editor->roles->first()]); $this->get('/search?term=' . urlencode('danzorbhsing {is_restricted}'))->assertSee($page->name); // Date filters diff --git a/tests/Helpers/EntityProvider.php b/tests/Helpers/EntityProvider.php index 4af6957a1..9e8cf0b73 100644 --- a/tests/Helpers/EntityProvider.php +++ b/tests/Helpers/EntityProvider.php @@ -206,7 +206,11 @@ class EntityProvider { $entity->permissions()->delete(); - $permissions = []; + $permissions = [ + // Set default permissions to not allow actions so that only the provided role permissions are at play. + ['role_id' => 0, 'view' => false, 'create' => false, 'update' => false, 'delete' => false], + ]; + foreach ($roles as $role) { $permission = ['role_id' => $role->id]; foreach (EntityPermission::PERMISSIONS as $possibleAction) { diff --git a/tests/Permissions/EntityPermissionsTest.php b/tests/Permissions/EntityPermissionsTest.php index e88909dba..6b99ba365 100644 --- a/tests/Permissions/EntityPermissionsTest.php +++ b/tests/Permissions/EntityPermissionsTest.php @@ -376,19 +376,18 @@ class EntityPermissionsTest extends TestCase ->assertSee($title); $this->put($modelInstance->getUrl('/permissions'), [ - 'restrictions' => [ + 'permissions' => [ $roleId => [ $permission => 'true', ], ], ]); - $this->assertDatabaseHas($modelInstance->getTable(), ['id' => $modelInstance->id, 'restricted' => true]); $this->assertDatabaseHas('entity_permissions', [ - 'restrictable_id' => $modelInstance->id, - 'restrictable_type' => $modelInstance->getMorphClass(), + 'entity_id' => $modelInstance->id, + 'entity_type' => $modelInstance->getMorphClass(), 'role_id' => $roleId, - 'action' => $permission, + $permission => true, ]); } diff --git a/tests/Permissions/RolesTest.php b/tests/Permissions/RolesTest.php index 6c2f4c0df..88d400259 100644 --- a/tests/Permissions/RolesTest.php +++ b/tests/Permissions/RolesTest.php @@ -173,16 +173,16 @@ class RolesTest extends TestCase $this->assertDatabaseHas('entity_permissions', [ 'role_id' => $roleA->id, - 'restrictable_id' => $page->id, - 'restrictable_type' => $page->getMorphClass(), + 'entity_id' => $page->id, + 'entity_type' => $page->getMorphClass(), ]); $this->asAdmin()->delete("/settings/roles/delete/$roleA->id"); $this->assertDatabaseMissing('entity_permissions', [ 'role_id' => $roleA->id, - 'restrictable_id' => $page->id, - 'restrictable_type' => $page->getMorphClass(), + 'entity_id' => $page->id, + 'entity_type' => $page->getMorphClass(), ]); }