summaryrefslogtreecommitdiffstats
path: root/api4/channel_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'api4/channel_test.go')
-rw-r--r--api4/channel_test.go78
1 files changed, 77 insertions, 1 deletions
diff --git a/api4/channel_test.go b/api4/channel_test.go
index 2a1e78753..7b677f77f 100644
--- a/api4/channel_test.go
+++ b/api4/channel_test.go
@@ -1463,7 +1463,7 @@ func TestUpdateChannelRoles(t *testing.T) {
defer th.TearDown()
Client := th.Client
- const CHANNEL_ADMIN = "channel_admin channel_user"
+ const CHANNEL_ADMIN = "channel_user channel_admin"
const CHANNEL_MEMBER = "channel_user"
// User 1 creates a channel, making them channel admin by default.
@@ -1914,3 +1914,79 @@ func TestAutocompleteChannels(t *testing.T) {
}
}
}
+
+func TestUpdateChannelScheme(t *testing.T) {
+ th := Setup().InitBasic().InitSystemAdmin()
+ defer th.TearDown()
+
+ th.App.SetLicense(model.NewTestLicense(""))
+
+ th.App.SetPhase2PermissionsMigrationStatus(true)
+
+ team := &model.Team{
+ DisplayName: "Name",
+ Description: "Some description",
+ CompanyName: "Some company name",
+ AllowOpenInvite: false,
+ InviteId: "inviteid0",
+ Name: "z-z-" + model.NewId() + "a",
+ Email: "success+" + model.NewId() + "@simulator.amazonses.com",
+ Type: model.TEAM_OPEN,
+ }
+ team, _ = th.SystemAdminClient.CreateTeam(team)
+
+ channel := &model.Channel{
+ DisplayName: "Name",
+ Name: "z-z-" + model.NewId() + "a",
+ Type: model.CHANNEL_OPEN,
+ TeamId: team.Id,
+ }
+ channel, _ = th.SystemAdminClient.CreateChannel(channel)
+
+ channelScheme := &model.Scheme{
+ DisplayName: "DisplayName",
+ Name: model.NewId(),
+ Description: "Some description",
+ Scope: model.SCHEME_SCOPE_CHANNEL,
+ }
+ channelScheme, _ = th.SystemAdminClient.CreateScheme(channelScheme)
+ teamScheme := &model.Scheme{
+ DisplayName: "DisplayName",
+ Name: model.NewId(),
+ Description: "Some description",
+ Scope: model.SCHEME_SCOPE_TEAM,
+ }
+ teamScheme, _ = th.SystemAdminClient.CreateScheme(teamScheme)
+
+ // Test the setup/base case.
+ _, resp := th.SystemAdminClient.UpdateChannelScheme(channel.Id, channelScheme.Id)
+ CheckNoError(t, resp)
+
+ // Test various invalid channel and scheme id combinations.
+ _, resp = th.SystemAdminClient.UpdateChannelScheme(channel.Id, "x")
+ CheckBadRequestStatus(t, resp)
+ _, resp = th.SystemAdminClient.UpdateChannelScheme("x", channelScheme.Id)
+ CheckBadRequestStatus(t, resp)
+ _, resp = th.SystemAdminClient.UpdateChannelScheme("x", "x")
+ CheckBadRequestStatus(t, resp)
+
+ // Test that permissions are required.
+ _, resp = th.Client.UpdateChannelScheme(channel.Id, channelScheme.Id)
+ CheckForbiddenStatus(t, resp)
+
+ // Test that a license is requried.
+ th.App.SetLicense(nil)
+ _, resp = th.SystemAdminClient.UpdateChannelScheme(channel.Id, channelScheme.Id)
+ CheckNotImplementedStatus(t, resp)
+ th.App.SetLicense(model.NewTestLicense(""))
+
+ // Test an invalid scheme scope.
+ _, resp = th.SystemAdminClient.UpdateChannelScheme(channel.Id, teamScheme.Id)
+ fmt.Printf("resp: %+v\n", resp)
+ CheckBadRequestStatus(t, resp)
+
+ // Test that an unauthenticated user gets rejected.
+ th.SystemAdminClient.Logout()
+ _, resp = th.SystemAdminClient.UpdateChannelScheme(channel.Id, channelScheme.Id)
+ CheckUnauthorizedStatus(t, resp)
+}