summaryrefslogtreecommitdiffstats
path: root/app/command_channel_rename_test.go
diff options
context:
space:
mode:
authorGeorge Goldberg <george@gberg.me>2018-09-12 15:32:05 +0100
committerHarrison Healey <harrisonmhealey@gmail.com>2018-09-12 10:32:05 -0400
commit0a5f792d2d6ceaa6c9bdb3050acbc4050c0c02f5 (patch)
tree37bf6f899abffe926c7c42337a19d67050382e50 /app/command_channel_rename_test.go
parentfba0f8e8b2e869654b3970396ed6fb0647e8910f (diff)
downloadchat-0a5f792d2d6ceaa6c9bdb3050acbc4050c0c02f5.tar.gz
chat-0a5f792d2d6ceaa6c9bdb3050acbc4050c0c02f5.tar.bz2
chat-0a5f792d2d6ceaa6c9bdb3050acbc4050c0c02f5.zip
MM-11230: Make permissions checks in commands failsafe. (#9392)
Also add additional unit tests to make sure the permissions tests are completely solid.
Diffstat (limited to 'app/command_channel_rename_test.go')
-rw-r--r--app/command_channel_rename_test.go65
1 files changed, 64 insertions, 1 deletions
diff --git a/app/command_channel_rename_test.go b/app/command_channel_rename_test.go
index 9c86b18e0..d4cdeda51 100644
--- a/app/command_channel_rename_test.go
+++ b/app/command_channel_rename_test.go
@@ -1,10 +1,14 @@
+// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
+// See License.txt for license information.
+
package app
import (
"testing"
- "github.com/mattermost/mattermost-server/model"
"github.com/stretchr/testify/assert"
+
+ "github.com/mattermost/mattermost-server/model"
)
func TestRenameProviderDoCommand(t *testing.T) {
@@ -29,4 +33,63 @@ func TestRenameProviderDoCommand(t *testing.T) {
actual := rp.DoCommand(th.App, args, msg).Text
assert.Equal(t, expected, actual)
}
+
+ // Try a public channel *without* permission.
+ args = &model.CommandArgs{
+ T: func(s string, args ...interface{}) string { return s },
+ ChannelId: th.BasicChannel.Id,
+ Session: model.Session{UserId: th.BasicUser.Id, TeamMembers: []*model.TeamMember{{TeamId: th.BasicTeam.Id, Roles: ""}}},
+ }
+
+ actual := rp.DoCommand(th.App, args, "hello").Text
+ assert.Equal(t, "api.command_channel_rename.permission.app_error", actual)
+
+ // Try a private channel *with* permission.
+ privateChannel := th.CreatePrivateChannel(th.BasicTeam)
+
+ args = &model.CommandArgs{
+ T: func(s string, args ...interface{}) string { return s },
+ ChannelId: privateChannel.Id,
+ Session: model.Session{UserId: th.BasicUser.Id, TeamMembers: []*model.TeamMember{{TeamId: th.BasicTeam.Id, Roles: model.TEAM_USER_ROLE_ID}}},
+ }
+
+ actual = rp.DoCommand(th.App, args, "hello").Text
+ assert.Equal(t, "", actual)
+
+ // Try a private channel *without* permission.
+ args = &model.CommandArgs{
+ T: func(s string, args ...interface{}) string { return s },
+ ChannelId: privateChannel.Id,
+ Session: model.Session{UserId: th.BasicUser.Id, TeamMembers: []*model.TeamMember{{TeamId: th.BasicTeam.Id, Roles: ""}}},
+ }
+
+ actual = rp.DoCommand(th.App, args, "hello").Text
+ assert.Equal(t, "api.command_channel_rename.permission.app_error", actual)
+
+ // Try a group channel *with* being a member.
+ user1 := th.CreateUser()
+ user2 := th.CreateUser()
+
+ groupChannel := th.CreateGroupChannel(user1, user2)
+
+ args = &model.CommandArgs{
+ T: func(s string, args ...interface{}) string { return s },
+ ChannelId: groupChannel.Id,
+ Session: model.Session{UserId: th.BasicUser.Id, TeamMembers: []*model.TeamMember{{TeamId: th.BasicTeam.Id, Roles: ""}}},
+ }
+
+ actual = rp.DoCommand(th.App, args, "hello").Text
+ assert.Equal(t, "api.command_channel_rename.direct_group.app_error", actual)
+
+ // Try a direct channel *with* being a member.
+ directChannel := th.CreateDmChannel(user1)
+
+ args = &model.CommandArgs{
+ T: func(s string, args ...interface{}) string { return s },
+ ChannelId: directChannel.Id,
+ Session: model.Session{UserId: th.BasicUser.Id, TeamMembers: []*model.TeamMember{{TeamId: th.BasicTeam.Id, Roles: ""}}},
+ }
+
+ actual = rp.DoCommand(th.App, args, "hello").Text
+ assert.Equal(t, "api.command_channel_rename.direct_group.app_error", actual)
}