diff options
author | George Goldberg <george@gberg.me> | 2018-06-05 12:41:03 +0100 |
---|---|---|
committer | Martin Kraft <mkraft@users.noreply.github.com> | 2018-06-05 07:41:03 -0400 |
commit | 0c4078b6b05b4b436c459c4f58faa5302ace8e12 (patch) | |
tree | 031c363a10b730afcb33b36023f925f8993ced02 /api4/team_test.go | |
parent | 2c75247c97d0277944975deb9595b5f82a80e91e (diff) | |
download | chat-0c4078b6b05b4b436c459c4f58faa5302ace8e12.tar.gz chat-0c4078b6b05b4b436c459c4f58faa5302ace8e12.tar.bz2 chat-0c4078b6b05b4b436c459c4f58faa5302ace8e12.zip |
MM-9730 & MM-9729: Missing Server PRs (#8908)
* MM-9730: API endpoint to update scheme-derived roles of TeamMembers.
* MM-9729: API to update scheme-derived roles of ChannelMembers.
Diffstat (limited to 'api4/team_test.go')
-rw-r--r-- | api4/team_test.go | 75 |
1 files changed, 75 insertions, 0 deletions
diff --git a/api4/team_test.go b/api4/team_test.go index 079ba37ec..48e3404eb 100644 --- a/api4/team_test.go +++ b/api4/team_test.go @@ -1712,6 +1712,81 @@ func TestUpdateTeamMemberRoles(t *testing.T) { CheckNoError(t, resp) } +func TestUpdateTeamMemberSchemeRoles(t *testing.T) { + th := Setup().InitBasic().InitSystemAdmin() + defer th.TearDown() + SystemAdminClient := th.SystemAdminClient + th.LoginBasic() + + s1 := &model.SchemeRoles{ + SchemeAdmin: false, + SchemeUser: false, + } + _, r1 := SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, th.BasicUser.Id, s1) + CheckNoError(t, r1) + + tm1, rtm1 := SystemAdminClient.GetTeamMember(th.BasicTeam.Id, th.BasicUser.Id, "") + CheckNoError(t, rtm1) + assert.Equal(t, false, tm1.SchemeUser) + assert.Equal(t, false, tm1.SchemeAdmin) + + s2 := &model.SchemeRoles{ + SchemeAdmin: false, + SchemeUser: true, + } + _, r2 := SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, th.BasicUser.Id, s2) + CheckNoError(t, r2) + + tm2, rtm2 := SystemAdminClient.GetTeamMember(th.BasicTeam.Id, th.BasicUser.Id, "") + CheckNoError(t, rtm2) + assert.Equal(t, true, tm2.SchemeUser) + assert.Equal(t, false, tm2.SchemeAdmin) + + s3 := &model.SchemeRoles{ + SchemeAdmin: true, + SchemeUser: false, + } + _, r3 := SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, th.BasicUser.Id, s3) + CheckNoError(t, r3) + + tm3, rtm3 := SystemAdminClient.GetTeamMember(th.BasicTeam.Id, th.BasicUser.Id, "") + CheckNoError(t, rtm3) + assert.Equal(t, false, tm3.SchemeUser) + assert.Equal(t, true, tm3.SchemeAdmin) + + s4 := &model.SchemeRoles{ + SchemeAdmin: true, + SchemeUser: true, + } + _, r4 := SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, th.BasicUser.Id, s4) + CheckNoError(t, r4) + + tm4, rtm4 := SystemAdminClient.GetTeamMember(th.BasicTeam.Id, th.BasicUser.Id, "") + CheckNoError(t, rtm4) + assert.Equal(t, true, tm4.SchemeUser) + assert.Equal(t, true, tm4.SchemeAdmin) + + _, resp := SystemAdminClient.UpdateTeamMemberSchemeRoles(model.NewId(), th.BasicUser.Id, s4) + CheckNotFoundStatus(t, resp) + + _, resp = SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, model.NewId(), s4) + CheckNotFoundStatus(t, resp) + + _, resp = SystemAdminClient.UpdateTeamMemberSchemeRoles("ASDF", th.BasicUser.Id, s4) + CheckBadRequestStatus(t, resp) + + _, resp = SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, "ASDF", s4) + CheckBadRequestStatus(t, resp) + + th.LoginBasic2() + _, resp = th.Client.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, th.BasicUser.Id, s4) + CheckForbiddenStatus(t, resp) + + SystemAdminClient.Logout() + _, resp = SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, th.SystemAdminUser.Id, s4) + CheckUnauthorizedStatus(t, resp) +} + func TestGetMyTeamsUnread(t *testing.T) { th := Setup().InitBasic().InitSystemAdmin() defer th.TearDown() |