mirror of
https://github.com/bitwarden/server.git
synced 2025-07-04 17:42:49 -05:00
[AC-1139] Reverted changes to CollectionServiceTests and OrganizationServiceTests
This commit is contained in:
@ -7,7 +7,6 @@ using Bit.Core.Repositories;
|
|||||||
using Bit.Core.Services;
|
using Bit.Core.Services;
|
||||||
using Bit.Core.Test.AutoFixture;
|
using Bit.Core.Test.AutoFixture;
|
||||||
using Bit.Core.Test.AutoFixture.OrganizationFixtures;
|
using Bit.Core.Test.AutoFixture.OrganizationFixtures;
|
||||||
using Bit.Core.Utilities;
|
|
||||||
using Bit.Test.Common.AutoFixture;
|
using Bit.Test.Common.AutoFixture;
|
||||||
using Bit.Test.Common.AutoFixture.Attributes;
|
using Bit.Test.Common.AutoFixture.Attributes;
|
||||||
using NSubstitute;
|
using NSubstitute;
|
||||||
@ -37,43 +36,6 @@ public class CollectionServiceTest
|
|||||||
Assert.True(collection.RevisionDate - utcNow < TimeSpan.FromSeconds(1));
|
Assert.True(collection.RevisionDate - utcNow < TimeSpan.FromSeconds(1));
|
||||||
}
|
}
|
||||||
|
|
||||||
[Theory, BitAutoData]
|
|
||||||
public async Task SaveAsync_DefaultIdWithUsers_WithOneEditAssignedCollectionsUser_WhileFCFlagDisabled_CreatesCollectionInTheRepository(
|
|
||||||
Collection collection, Organization organization,
|
|
||||||
[CollectionAccessSelectionCustomize] IEnumerable<CollectionAccessSelection> users,
|
|
||||||
SutProvider<CollectionService> sutProvider)
|
|
||||||
{
|
|
||||||
sutProvider.GetDependency<IFeatureService>()
|
|
||||||
.IsEnabled(FeatureFlagKeys.FlexibleCollections, Arg.Any<ICurrentContext>(), Arg.Any<bool>())
|
|
||||||
.Returns(false);
|
|
||||||
|
|
||||||
collection.Id = default;
|
|
||||||
collection.OrganizationId = organization.Id;
|
|
||||||
sutProvider.GetDependency<IOrganizationRepository>().GetByIdAsync(collection.OrganizationId).Returns(organization);
|
|
||||||
sutProvider.GetDependency<IOrganizationUserRepository>()
|
|
||||||
.GetManyByOrganizationAsync(collection.OrganizationId, Arg.Any<OrganizationUserType?>())
|
|
||||||
.Returns(new List<OrganizationUser>
|
|
||||||
{
|
|
||||||
users.Select(x => new OrganizationUser
|
|
||||||
{
|
|
||||||
Id = x.Id,
|
|
||||||
Type = OrganizationUserType.Custom,
|
|
||||||
Permissions = CoreHelpers.ClassToJsonData(new Permissions { EditAssignedCollections = true })
|
|
||||||
}).First()
|
|
||||||
});
|
|
||||||
var utcNow = DateTime.UtcNow;
|
|
||||||
|
|
||||||
await sutProvider.Sut.SaveAsync(collection, null, users);
|
|
||||||
|
|
||||||
await sutProvider.GetDependency<ICollectionRepository>().Received()
|
|
||||||
.CreateAsync(collection, Arg.Is<List<CollectionAccessSelection>>(l => l == null),
|
|
||||||
Arg.Is<List<CollectionAccessSelection>>(l => l.Count(i => i.Manage == true) == 1));
|
|
||||||
await sutProvider.GetDependency<IEventService>().Received()
|
|
||||||
.LogCollectionEventAsync(collection, EventType.Collection_Created);
|
|
||||||
Assert.True(collection.CreationDate - utcNow < TimeSpan.FromSeconds(1));
|
|
||||||
Assert.True(collection.RevisionDate - utcNow < TimeSpan.FromSeconds(1));
|
|
||||||
}
|
|
||||||
|
|
||||||
[Theory, BitAutoData]
|
[Theory, BitAutoData]
|
||||||
public async Task SaveAsync_DefaultIdWithGroupsAndUsers_CreateCollectionWithGroupsAndUsersInRepository(Collection collection,
|
public async Task SaveAsync_DefaultIdWithGroupsAndUsers_CreateCollectionWithGroupsAndUsersInRepository(Collection collection,
|
||||||
[CollectionAccessSelectionCustomize(true)] IEnumerable<CollectionAccessSelection> groups, IEnumerable<CollectionAccessSelection> users, Organization organization, SutProvider<CollectionService> sutProvider)
|
[CollectionAccessSelectionCustomize(true)] IEnumerable<CollectionAccessSelection> groups, IEnumerable<CollectionAccessSelection> users, Organization organization, SutProvider<CollectionService> sutProvider)
|
||||||
|
@ -21,7 +21,6 @@ using Bit.Core.OrganizationFeatures.OrganizationSubscriptions.Interface;
|
|||||||
using Bit.Core.Repositories;
|
using Bit.Core.Repositories;
|
||||||
using Bit.Core.Services;
|
using Bit.Core.Services;
|
||||||
using Bit.Core.Settings;
|
using Bit.Core.Settings;
|
||||||
using Bit.Core.Test.AutoFixture;
|
|
||||||
using Bit.Core.Test.AutoFixture.OrganizationFixtures;
|
using Bit.Core.Test.AutoFixture.OrganizationFixtures;
|
||||||
using Bit.Core.Test.AutoFixture.OrganizationUserFixtures;
|
using Bit.Core.Test.AutoFixture.OrganizationUserFixtures;
|
||||||
using Bit.Core.Test.AutoFixture.PolicyFixtures;
|
using Bit.Core.Test.AutoFixture.PolicyFixtures;
|
||||||
@ -825,53 +824,6 @@ public class OrganizationServiceTests
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
[Theory]
|
|
||||||
[OrganizationInviteCustomize(
|
|
||||||
InviteeUserType = OrganizationUserType.Custom,
|
|
||||||
InvitorUserType = OrganizationUserType.Owner
|
|
||||||
), BitAutoData]
|
|
||||||
public async Task InviteUser_WithEditAssignedCollectionsTrue_WhileFCFlagDisabled_SetsCollectionsManageTrue(Organization organization, (OrganizationUserInvite invite, string externalId) invite,
|
|
||||||
OrganizationUser invitor,
|
|
||||||
[OrganizationUser(OrganizationUserStatusType.Confirmed, OrganizationUserType.Owner)] OrganizationUser owner,
|
|
||||||
SutProvider<OrganizationService> sutProvider)
|
|
||||||
{
|
|
||||||
invite.invite.Permissions = new Permissions { EditAssignedCollections = true };
|
|
||||||
|
|
||||||
sutProvider.GetDependency<IFeatureService>()
|
|
||||||
.IsEnabled(FeatureFlagKeys.FlexibleCollections, Arg.Any<ICurrentContext>(), Arg.Any<bool>())
|
|
||||||
.Returns(false);
|
|
||||||
|
|
||||||
var organizationRepository = sutProvider.GetDependency<IOrganizationRepository>();
|
|
||||||
var organizationUserRepository = sutProvider.GetDependency<IOrganizationUserRepository>();
|
|
||||||
var currentContext = sutProvider.GetDependency<ICurrentContext>();
|
|
||||||
|
|
||||||
organizationRepository.GetByIdAsync(organization.Id).Returns(organization);
|
|
||||||
organizationUserRepository.GetManyByOrganizationAsync(organization.Id, OrganizationUserType.Owner)
|
|
||||||
.Returns(new[] { owner });
|
|
||||||
currentContext.ManageUsers(organization.Id).Returns(true);
|
|
||||||
currentContext.EditAssignedCollections(organization.Id).Returns(true);
|
|
||||||
currentContext.GetOrganization(organization.Id)
|
|
||||||
.Returns(new CurrentContextOrganization
|
|
||||||
{
|
|
||||||
Permissions = new Permissions
|
|
||||||
{
|
|
||||||
CreateNewCollections = true,
|
|
||||||
DeleteAnyCollection = true
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
await sutProvider.Sut.InviteUsersAsync(organization.Id, invitor.UserId, new[] { invite });
|
|
||||||
|
|
||||||
await sutProvider.GetDependency<IOrganizationUserRepository>()
|
|
||||||
.Received(invite.invite.Emails.Count())
|
|
||||||
.CreateAsync(Arg.Is<OrganizationUser>(ou =>
|
|
||||||
ou.OrganizationId == organization.Id &&
|
|
||||||
ou.Type == invite.invite.Type &&
|
|
||||||
invite.invite.Emails.Contains(ou.Email)),
|
|
||||||
Arg.Is<IEnumerable<CollectionAccessSelection>>(collections =>
|
|
||||||
collections.All(c => c.Manage)));
|
|
||||||
}
|
|
||||||
|
|
||||||
private void InviteUserHelper_ArrangeValidPermissions(Organization organization, OrganizationUser savingUser,
|
private void InviteUserHelper_ArrangeValidPermissions(Organization organization, OrganizationUser savingUser,
|
||||||
SutProvider<OrganizationService> sutProvider)
|
SutProvider<OrganizationService> sutProvider)
|
||||||
{
|
{
|
||||||
@ -933,42 +885,6 @@ public class OrganizationServiceTests
|
|||||||
await sutProvider.Sut.SaveUserAsync(newUserData, savingUser.UserId, collections, groups);
|
await sutProvider.Sut.SaveUserAsync(newUserData, savingUser.UserId, collections, groups);
|
||||||
}
|
}
|
||||||
|
|
||||||
[Theory, BitAutoData]
|
|
||||||
public async Task SaveUser_WithEditAssignedCollections_WhileFCFlagDisabled_SetsCollectionsManageTrue(
|
|
||||||
Organization organization,
|
|
||||||
OrganizationUser oldUserData,
|
|
||||||
OrganizationUser newUserData,
|
|
||||||
[CollectionAccessSelectionCustomize] IEnumerable<CollectionAccessSelection> collections,
|
|
||||||
IEnumerable<Guid> groups,
|
|
||||||
[OrganizationUser(type: OrganizationUserType.Owner)] OrganizationUser savingUser,
|
|
||||||
SutProvider<OrganizationService> sutProvider)
|
|
||||||
{
|
|
||||||
sutProvider.GetDependency<IFeatureService>()
|
|
||||||
.IsEnabled(FeatureFlagKeys.FlexibleCollections, Arg.Any<ICurrentContext>(), Arg.Any<bool>())
|
|
||||||
.Returns(false);
|
|
||||||
|
|
||||||
var organizationRepository = sutProvider.GetDependency<IOrganizationRepository>();
|
|
||||||
var organizationUserRepository = sutProvider.GetDependency<IOrganizationUserRepository>();
|
|
||||||
var currentContext = sutProvider.GetDependency<ICurrentContext>();
|
|
||||||
|
|
||||||
organizationRepository.GetByIdAsync(organization.Id).Returns(organization);
|
|
||||||
|
|
||||||
newUserData.Id = oldUserData.Id;
|
|
||||||
newUserData.UserId = oldUserData.UserId;
|
|
||||||
newUserData.OrganizationId = savingUser.OrganizationId = oldUserData.OrganizationId = organization.Id;
|
|
||||||
newUserData.Permissions = CoreHelpers.ClassToJsonData(new Permissions { EditAssignedCollections = true });
|
|
||||||
organizationUserRepository.GetByIdAsync(oldUserData.Id).Returns(oldUserData);
|
|
||||||
organizationUserRepository.GetManyByOrganizationAsync(savingUser.OrganizationId, OrganizationUserType.Owner)
|
|
||||||
.Returns(new List<OrganizationUser> { savingUser });
|
|
||||||
currentContext.OrganizationOwner(savingUser.OrganizationId).Returns(true);
|
|
||||||
|
|
||||||
await sutProvider.Sut.SaveUserAsync(newUserData, savingUser.UserId, collections, groups);
|
|
||||||
|
|
||||||
await sutProvider.GetDependency<IOrganizationUserRepository>().Received(1).ReplaceAsync(
|
|
||||||
Arg.Is<OrganizationUser>(ou => ou.Id == newUserData.Id),
|
|
||||||
Arg.Is<IEnumerable<CollectionAccessSelection>>(i => i.All(c => c.Manage)));
|
|
||||||
}
|
|
||||||
|
|
||||||
[Theory, BitAutoData]
|
[Theory, BitAutoData]
|
||||||
public async Task SaveUser_WithCustomType_WhenUseCustomPermissionsIsFalse_Throws(
|
public async Task SaveUser_WithCustomType_WhenUseCustomPermissionsIsFalse_Throws(
|
||||||
Organization organization,
|
Organization organization,
|
||||||
|
Reference in New Issue
Block a user