1 package org.openecomp.sdc.itempermissions.dao.impl;
3 import org.mockito.InjectMocks;
4 import org.mockito.Mock;
5 import org.mockito.MockitoAnnotations;
6 import org.openecomp.sdc.common.errors.CoreException;
7 import org.openecomp.sdc.common.session.SessionContextProviderFactory;
8 import org.openecomp.sdc.itempermissions.PermissionsServices;
9 import org.openecomp.sdc.notification.services.NotificationPropagationManager;
10 import org.openecomp.sdc.notification.services.SubscriptionService;
11 import org.openecomp.sdc.versioning.ItemManager;
12 import org.openecomp.sdc.versioning.types.Item;
13 import org.testng.annotations.BeforeMethod;
14 import org.testng.annotations.Test;
16 import java.util.Collections;
17 import java.util.HashSet;
19 import java.util.stream.Collectors;
20 import java.util.stream.Stream;
22 import static org.mockito.Mockito.doReturn;
23 import static org.mockito.Mockito.verify;
26 * Created by ayalaben on 7/6/2017
28 public class ItemPermissionsManagerImplTest {
30 private static final String ITEM1_ID = "1";
31 private static final String PERMISSION = "Contributor";
32 private static final String ACTION = "Change_Item_Permissions";
33 private static final String USER = "user";
34 private static final String AFFECTED_USER1 = "affected_user1";
35 private static final String AFFECTED_USER2 = "affected_user2";
36 private static final String AFFECTED_USER3 = "affected_user3";
39 private PermissionsServices permissionsServicesMock;
41 private ItemManager itemManagerMock;
43 private SubscriptionService subscriptionServiceMock;
45 private NotificationPropagationManager notifierMock;
47 private ItemPermissionsManagerImpl permissionsManager;
50 public void setUp() throws Exception {
51 SessionContextProviderFactory.getInstance().createInterface().create(USER);
52 MockitoAnnotations.initMocks(this);
55 @Test(expectedExceptions = CoreException.class, expectedExceptionsMessageRegExp = "Permissions " +
56 "Error. The user does not have permission to perform this action.")
57 public void testUpdateItemPermissionsWhenNotAllowed() {
58 doReturn(false).when(permissionsServicesMock).isAllowed(ITEM1_ID, USER, ACTION);
61 .updateItemPermissions(ITEM1_ID, PERMISSION, Collections.singleton(AFFECTED_USER1),
66 public void testUpdateItemPermissions() {
67 doReturn(true).when(permissionsServicesMock).isAllowed(ITEM1_ID, USER, ACTION);
68 Item item = new Item();
69 item.setName("Item 1 Name");
70 doReturn(item).when(itemManagerMock).get(ITEM1_ID);
72 Set<String> addedUsersIds =
73 Stream.of(AFFECTED_USER1, AFFECTED_USER2).collect(Collectors.toSet());
74 Set<String> removedUsersIds = Collections.singleton(AFFECTED_USER3);
76 .updateItemPermissions(ITEM1_ID, PERMISSION, addedUsersIds, removedUsersIds);
78 verify(permissionsServicesMock)
79 .updateItemPermissions(ITEM1_ID, PERMISSION, addedUsersIds, removedUsersIds);
80 verify(subscriptionServiceMock).subscribe(AFFECTED_USER1, ITEM1_ID);
81 verify(subscriptionServiceMock).subscribe(AFFECTED_USER2, ITEM1_ID);
82 verify(subscriptionServiceMock).unsubscribe(AFFECTED_USER3, ITEM1_ID);
84 // TODO: 12/18/2017 verify notification