Add collaboration feature
[sdc.git] / openecomp-be / backend / openecomp-sdc-item-permissions-manager / src / test / java / org / openecomp / sdc / itempermissions / dao / impl / ItemPermissionsManagerImplTest.java
1 package org.openecomp.sdc.itempermissions.dao.impl;
2
3 import org.mockito.InjectMocks;
4 import org.mockito.Mock;
5 import org.mockito.MockitoAnnotations;
6 import org.openecomp.sdc.common.errors.CoreException;
7 import org.openecomp.sdc.common.session.SessionContextProviderFactory;
8 import org.openecomp.sdc.itempermissions.PermissionsServices;
9 import org.openecomp.sdc.notification.services.NotificationPropagationManager;
10 import org.openecomp.sdc.notification.services.SubscriptionService;
11 import org.openecomp.sdc.versioning.ItemManager;
12 import org.openecomp.sdc.versioning.types.Item;
13 import org.testng.annotations.BeforeMethod;
14 import org.testng.annotations.Test;
15
16 import java.util.Collections;
17 import java.util.HashSet;
18 import java.util.Set;
19 import java.util.stream.Collectors;
20 import java.util.stream.Stream;
21
22 import static org.mockito.Mockito.doReturn;
23 import static org.mockito.Mockito.verify;
24
25 /**
26  * Created by ayalaben on 7/6/2017
27  */
28 public class ItemPermissionsManagerImplTest {
29
30   private static final String ITEM1_ID = "1";
31   private static final String PERMISSION = "Contributor";
32   private static final String ACTION = "Change_Item_Permissions";
33   private static final String USER = "user";
34   private static final String AFFECTED_USER1 = "affected_user1";
35   private static final String AFFECTED_USER2 = "affected_user2";
36   private static final String AFFECTED_USER3 = "affected_user3";
37
38   @Mock
39   private PermissionsServices permissionsServicesMock;
40   @Mock
41   private ItemManager itemManagerMock;
42   @Mock
43   private SubscriptionService subscriptionServiceMock;
44   @Mock
45   private NotificationPropagationManager notifierMock;
46   @InjectMocks
47   private ItemPermissionsManagerImpl permissionsManager;
48
49   @BeforeMethod
50   public void setUp() throws Exception {
51     SessionContextProviderFactory.getInstance().createInterface().create(USER);
52     MockitoAnnotations.initMocks(this);
53   }
54
55   @Test(expectedExceptions = CoreException.class, expectedExceptionsMessageRegExp = "Permissions " +
56       "Error. The user does not have permission to perform this action.")
57   public void testUpdateItemPermissionsWhenNotAllowed() {
58     doReturn(false).when(permissionsServicesMock).isAllowed(ITEM1_ID, USER, ACTION);
59
60     permissionsManager
61         .updateItemPermissions(ITEM1_ID, PERMISSION, Collections.singleton(AFFECTED_USER1),
62             new HashSet<>());
63   }
64
65   @Test
66   public void testUpdateItemPermissions() {
67     doReturn(true).when(permissionsServicesMock).isAllowed(ITEM1_ID, USER, ACTION);
68     Item item = new Item();
69     item.setName("Item 1 Name");
70     doReturn(item).when(itemManagerMock).get(ITEM1_ID);
71
72     Set<String> addedUsersIds =
73         Stream.of(AFFECTED_USER1, AFFECTED_USER2).collect(Collectors.toSet());
74     Set<String> removedUsersIds = Collections.singleton(AFFECTED_USER3);
75     permissionsManager
76         .updateItemPermissions(ITEM1_ID, PERMISSION, addedUsersIds, removedUsersIds);
77
78     verify(permissionsServicesMock)
79         .updateItemPermissions(ITEM1_ID, PERMISSION, addedUsersIds, removedUsersIds);
80     verify(subscriptionServiceMock).subscribe(AFFECTED_USER1, ITEM1_ID);
81     verify(subscriptionServiceMock).subscribe(AFFECTED_USER2, ITEM1_ID);
82     verify(subscriptionServiceMock).unsubscribe(AFFECTED_USER3, ITEM1_ID);
83
84     // TODO: 12/18/2017 verify notification
85   }
86 }