summaryrefslogtreecommitdiffstats
path: root/app/team_test.go
diff options
context:
space:
mode:
authorChris <ccbrown112@gmail.com>2017-11-21 13:08:32 -0600
committerChristopher Speller <crspeller@gmail.com>2017-11-21 11:08:32 -0800
commit816a30397da6ceff836d8723233dc5cdbda70871 (patch)
treed9075e04c6570296cea924b97088839f49d6ce9d /app/team_test.go
parent01e652ed481ed0ef0a8d8c021751655c1a58dd2a (diff)
downloadchat-816a30397da6ceff836d8723233dc5cdbda70871.tar.gz
chat-816a30397da6ceff836d8723233dc5cdbda70871.tar.bz2
chat-816a30397da6ceff836d8723233dc5cdbda70871.zip
Role refactor (#7867)
* role refactor * add missing file * fix web test
Diffstat (limited to 'app/team_test.go')
-rw-r--r--app/team_test.go50
1 files changed, 25 insertions, 25 deletions
diff --git a/app/team_test.go b/app/team_test.go
index 61ae03f74..10f33f50b 100644
--- a/app/team_test.go
+++ b/app/team_test.go
@@ -198,17 +198,17 @@ func TestSanitizeTeam(t *testing.T) {
t.Run("not a user of the team", func(t *testing.T) {
userId := model.NewId()
session := model.Session{
- Roles: model.ROLE_SYSTEM_USER.Id,
+ Roles: model.SYSTEM_USER_ROLE_ID,
TeamMembers: []*model.TeamMember{
{
UserId: userId,
TeamId: model.NewId(),
- Roles: model.ROLE_TEAM_USER.Id,
+ Roles: model.TEAM_USER_ROLE_ID,
},
},
}
- sanitized := SanitizeTeam(session, copyTeam())
+ sanitized := th.App.SanitizeTeam(session, copyTeam())
if sanitized.Email != "" && sanitized.AllowedDomains != "" {
t.Fatal("should've sanitized team")
}
@@ -217,17 +217,17 @@ func TestSanitizeTeam(t *testing.T) {
t.Run("user of the team", func(t *testing.T) {
userId := model.NewId()
session := model.Session{
- Roles: model.ROLE_SYSTEM_USER.Id,
+ Roles: model.SYSTEM_USER_ROLE_ID,
TeamMembers: []*model.TeamMember{
{
UserId: userId,
TeamId: team.Id,
- Roles: model.ROLE_TEAM_USER.Id,
+ Roles: model.TEAM_USER_ROLE_ID,
},
},
}
- sanitized := SanitizeTeam(session, copyTeam())
+ sanitized := th.App.SanitizeTeam(session, copyTeam())
if sanitized.Email != "" && sanitized.AllowedDomains != "" {
t.Fatal("should've sanitized team")
}
@@ -236,17 +236,17 @@ func TestSanitizeTeam(t *testing.T) {
t.Run("team admin", func(t *testing.T) {
userId := model.NewId()
session := model.Session{
- Roles: model.ROLE_SYSTEM_USER.Id,
+ Roles: model.SYSTEM_USER_ROLE_ID,
TeamMembers: []*model.TeamMember{
{
UserId: userId,
TeamId: team.Id,
- Roles: model.ROLE_TEAM_USER.Id + " " + model.ROLE_TEAM_ADMIN.Id,
+ Roles: model.TEAM_USER_ROLE_ID + " " + model.TEAM_ADMIN_ROLE_ID,
},
},
}
- sanitized := SanitizeTeam(session, copyTeam())
+ sanitized := th.App.SanitizeTeam(session, copyTeam())
if sanitized.Email == "" && sanitized.AllowedDomains == "" {
t.Fatal("shouldn't have sanitized team")
}
@@ -255,17 +255,17 @@ func TestSanitizeTeam(t *testing.T) {
t.Run("team admin of another team", func(t *testing.T) {
userId := model.NewId()
session := model.Session{
- Roles: model.ROLE_SYSTEM_USER.Id,
+ Roles: model.SYSTEM_USER_ROLE_ID,
TeamMembers: []*model.TeamMember{
{
UserId: userId,
TeamId: model.NewId(),
- Roles: model.ROLE_TEAM_USER.Id + " " + model.ROLE_TEAM_ADMIN.Id,
+ Roles: model.TEAM_USER_ROLE_ID + " " + model.TEAM_ADMIN_ROLE_ID,
},
},
}
- sanitized := SanitizeTeam(session, copyTeam())
+ sanitized := th.App.SanitizeTeam(session, copyTeam())
if sanitized.Email != "" && sanitized.AllowedDomains != "" {
t.Fatal("should've sanitized team")
}
@@ -274,17 +274,17 @@ func TestSanitizeTeam(t *testing.T) {
t.Run("system admin, not a user of team", func(t *testing.T) {
userId := model.NewId()
session := model.Session{
- Roles: model.ROLE_SYSTEM_USER.Id + " " + model.ROLE_SYSTEM_ADMIN.Id,
+ Roles: model.SYSTEM_USER_ROLE_ID + " " + model.SYSTEM_ADMIN_ROLE_ID,
TeamMembers: []*model.TeamMember{
{
UserId: userId,
TeamId: model.NewId(),
- Roles: model.ROLE_TEAM_USER.Id,
+ Roles: model.TEAM_USER_ROLE_ID,
},
},
}
- sanitized := SanitizeTeam(session, copyTeam())
+ sanitized := th.App.SanitizeTeam(session, copyTeam())
if sanitized.Email == "" && sanitized.AllowedDomains == "" {
t.Fatal("shouldn't have sanitized team")
}
@@ -293,17 +293,17 @@ func TestSanitizeTeam(t *testing.T) {
t.Run("system admin, user of team", func(t *testing.T) {
userId := model.NewId()
session := model.Session{
- Roles: model.ROLE_SYSTEM_USER.Id + " " + model.ROLE_SYSTEM_ADMIN.Id,
+ Roles: model.SYSTEM_USER_ROLE_ID + " " + model.SYSTEM_ADMIN_ROLE_ID,
TeamMembers: []*model.TeamMember{
{
UserId: userId,
TeamId: team.Id,
- Roles: model.ROLE_TEAM_USER.Id,
+ Roles: model.TEAM_USER_ROLE_ID,
},
},
}
- sanitized := SanitizeTeam(session, copyTeam())
+ sanitized := th.App.SanitizeTeam(session, copyTeam())
if sanitized.Email == "" && sanitized.AllowedDomains == "" {
t.Fatal("shouldn't have sanitized team")
}
@@ -330,22 +330,22 @@ func TestSanitizeTeams(t *testing.T) {
userId := model.NewId()
session := model.Session{
- Roles: model.ROLE_SYSTEM_USER.Id,
+ Roles: model.SYSTEM_USER_ROLE_ID,
TeamMembers: []*model.TeamMember{
{
UserId: userId,
TeamId: teams[0].Id,
- Roles: model.ROLE_TEAM_USER.Id,
+ Roles: model.TEAM_USER_ROLE_ID,
},
{
UserId: userId,
TeamId: teams[1].Id,
- Roles: model.ROLE_TEAM_USER.Id + " " + model.ROLE_TEAM_ADMIN.Id,
+ Roles: model.TEAM_USER_ROLE_ID + " " + model.TEAM_ADMIN_ROLE_ID,
},
},
}
- sanitized := SanitizeTeams(session, teams)
+ sanitized := th.App.SanitizeTeams(session, teams)
if sanitized[0].Email != "" && sanitized[0].AllowedDomains != "" {
t.Fatal("should've sanitized first team")
@@ -372,17 +372,17 @@ func TestSanitizeTeams(t *testing.T) {
userId := model.NewId()
session := model.Session{
- Roles: model.ROLE_SYSTEM_USER.Id + " " + model.ROLE_SYSTEM_ADMIN.Id,
+ Roles: model.SYSTEM_USER_ROLE_ID + " " + model.SYSTEM_ADMIN_ROLE_ID,
TeamMembers: []*model.TeamMember{
{
UserId: userId,
TeamId: teams[0].Id,
- Roles: model.ROLE_TEAM_USER.Id,
+ Roles: model.TEAM_USER_ROLE_ID,
},
},
}
- sanitized := SanitizeTeams(session, teams)
+ sanitized := th.App.SanitizeTeams(session, teams)
if sanitized[0].Email == "" && sanitized[0].AllowedDomains == "" {
t.Fatal("shouldn't have sanitized first team")