summaryrefslogtreecommitdiffstats
path: root/api4/team_test.go
diff options
context:
space:
mode:
authorGeorge Goldberg <george@gberg.me>2018-06-05 12:41:03 +0100
committerMartin Kraft <mkraft@users.noreply.github.com>2018-06-05 07:41:03 -0400
commit0c4078b6b05b4b436c459c4f58faa5302ace8e12 (patch)
tree031c363a10b730afcb33b36023f925f8993ced02 /api4/team_test.go
parent2c75247c97d0277944975deb9595b5f82a80e91e (diff)
downloadchat-0c4078b6b05b4b436c459c4f58faa5302ace8e12.tar.gz
chat-0c4078b6b05b4b436c459c4f58faa5302ace8e12.tar.bz2
chat-0c4078b6b05b4b436c459c4f58faa5302ace8e12.zip
MM-9730 & MM-9729: Missing Server PRs (#8908)
* MM-9730: API endpoint to update scheme-derived roles of TeamMembers. * MM-9729: API to update scheme-derived roles of ChannelMembers.
Diffstat (limited to 'api4/team_test.go')
-rw-r--r--api4/team_test.go75
1 files changed, 75 insertions, 0 deletions
diff --git a/api4/team_test.go b/api4/team_test.go
index 079ba37ec..48e3404eb 100644
--- a/api4/team_test.go
+++ b/api4/team_test.go
@@ -1712,6 +1712,81 @@ func TestUpdateTeamMemberRoles(t *testing.T) {
CheckNoError(t, resp)
}
+func TestUpdateTeamMemberSchemeRoles(t *testing.T) {
+ th := Setup().InitBasic().InitSystemAdmin()
+ defer th.TearDown()
+ SystemAdminClient := th.SystemAdminClient
+ th.LoginBasic()
+
+ s1 := &model.SchemeRoles{
+ SchemeAdmin: false,
+ SchemeUser: false,
+ }
+ _, r1 := SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, th.BasicUser.Id, s1)
+ CheckNoError(t, r1)
+
+ tm1, rtm1 := SystemAdminClient.GetTeamMember(th.BasicTeam.Id, th.BasicUser.Id, "")
+ CheckNoError(t, rtm1)
+ assert.Equal(t, false, tm1.SchemeUser)
+ assert.Equal(t, false, tm1.SchemeAdmin)
+
+ s2 := &model.SchemeRoles{
+ SchemeAdmin: false,
+ SchemeUser: true,
+ }
+ _, r2 := SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, th.BasicUser.Id, s2)
+ CheckNoError(t, r2)
+
+ tm2, rtm2 := SystemAdminClient.GetTeamMember(th.BasicTeam.Id, th.BasicUser.Id, "")
+ CheckNoError(t, rtm2)
+ assert.Equal(t, true, tm2.SchemeUser)
+ assert.Equal(t, false, tm2.SchemeAdmin)
+
+ s3 := &model.SchemeRoles{
+ SchemeAdmin: true,
+ SchemeUser: false,
+ }
+ _, r3 := SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, th.BasicUser.Id, s3)
+ CheckNoError(t, r3)
+
+ tm3, rtm3 := SystemAdminClient.GetTeamMember(th.BasicTeam.Id, th.BasicUser.Id, "")
+ CheckNoError(t, rtm3)
+ assert.Equal(t, false, tm3.SchemeUser)
+ assert.Equal(t, true, tm3.SchemeAdmin)
+
+ s4 := &model.SchemeRoles{
+ SchemeAdmin: true,
+ SchemeUser: true,
+ }
+ _, r4 := SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, th.BasicUser.Id, s4)
+ CheckNoError(t, r4)
+
+ tm4, rtm4 := SystemAdminClient.GetTeamMember(th.BasicTeam.Id, th.BasicUser.Id, "")
+ CheckNoError(t, rtm4)
+ assert.Equal(t, true, tm4.SchemeUser)
+ assert.Equal(t, true, tm4.SchemeAdmin)
+
+ _, resp := SystemAdminClient.UpdateTeamMemberSchemeRoles(model.NewId(), th.BasicUser.Id, s4)
+ CheckNotFoundStatus(t, resp)
+
+ _, resp = SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, model.NewId(), s4)
+ CheckNotFoundStatus(t, resp)
+
+ _, resp = SystemAdminClient.UpdateTeamMemberSchemeRoles("ASDF", th.BasicUser.Id, s4)
+ CheckBadRequestStatus(t, resp)
+
+ _, resp = SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, "ASDF", s4)
+ CheckBadRequestStatus(t, resp)
+
+ th.LoginBasic2()
+ _, resp = th.Client.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, th.BasicUser.Id, s4)
+ CheckForbiddenStatus(t, resp)
+
+ SystemAdminClient.Logout()
+ _, resp = SystemAdminClient.UpdateTeamMemberSchemeRoles(th.BasicTeam.Id, th.SystemAdminUser.Id, s4)
+ CheckUnauthorizedStatus(t, resp)
+}
+
func TestGetMyTeamsUnread(t *testing.T) {
th := Setup().InitBasic().InitSystemAdmin()
defer th.TearDown()