overleaf/services/real-time/test/unit/coffee/AuthorizationManagerTests.coffee

191 lines
6.4 KiB
CoffeeScript
Raw Normal View History

2014-11-12 10:54:55 -05:00
chai = require "chai"
chai.should()
expect = chai.expect
sinon = require("sinon")
SandboxedModule = require('sandboxed-module')
path = require "path"
modulePath = '../../../app/js/AuthorizationManager'
describe 'AuthorizationManager', ->
beforeEach ->
@client =
params: {}
get: (param, cb) ->
cb null, @params[param]
set: (param, value, cb) ->
@params[param] = value
cb()
del: (param, cb) ->
delete @params[param]
cb()
2014-11-12 10:54:55 -05:00
@AuthorizationManager = SandboxedModule.require modulePath, requires: {}
describe "assertClientCanViewProject", ->
it "should allow the readOnly privilegeLevel", (done) ->
@client.params.privilege_level = "readOnly"
@AuthorizationManager.assertClientCanViewProject @client, (error) ->
expect(error).to.be.null
done()
it "should allow the readAndWrite privilegeLevel", (done) ->
@client.params.privilege_level = "readAndWrite"
@AuthorizationManager.assertClientCanViewProject @client, (error) ->
expect(error).to.be.null
done()
it "should allow the owner privilegeLevel", (done) ->
@client.params.privilege_level = "owner"
@AuthorizationManager.assertClientCanViewProject @client, (error) ->
expect(error).to.be.null
done()
it "should return an error with any other privilegeLevel", (done) ->
@client.params.privilege_level = "unknown"
@AuthorizationManager.assertClientCanViewProject @client, (error) ->
error.message.should.equal "not authorized"
done()
describe "assertClientCanEditProject", ->
it "should not allow the readOnly privilegeLevel", (done) ->
@client.params.privilege_level = "readOnly"
@AuthorizationManager.assertClientCanEditProject @client, (error) ->
error.message.should.equal "not authorized"
done()
it "should allow the readAndWrite privilegeLevel", (done) ->
@client.params.privilege_level = "readAndWrite"
@AuthorizationManager.assertClientCanEditProject @client, (error) ->
expect(error).to.be.null
done()
it "should allow the owner privilegeLevel", (done) ->
@client.params.privilege_level = "owner"
@AuthorizationManager.assertClientCanEditProject @client, (error) ->
expect(error).to.be.null
done()
it "should return an error with any other privilegeLevel", (done) ->
@client.params.privilege_level = "unknown"
@AuthorizationManager.assertClientCanEditProject @client, (error) ->
2014-11-12 10:54:55 -05:00
error.message.should.equal "not authorized"
done()
# check doc access for project
describe "assertClientCanViewProjectAndDoc", ->
beforeEach () ->
@doc_id = "12345"
@callback = sinon.stub()
@client.params = {}
describe "when not authorised at the project level", ->
beforeEach () ->
@client.params.privilege_level = "unknown"
it "should not allow access", () ->
@AuthorizationManager.assertClientCanViewProjectAndDoc @client, @doc_id, @callback
@callback
.calledWith(new Error("not authorised"))
.should.equal true
describe "even when authorised at the doc level", ->
beforeEach (done) ->
@AuthorizationManager.addAccessToDoc @client, @doc_id, done
it "should not allow access", () ->
@AuthorizationManager.assertClientCanViewProjectAndDoc @client, @doc_id, @callback
@callback
.calledWith(new Error("not authorised"))
.should.equal true
describe "when authorised at the project level", ->
beforeEach () ->
@client.params.privilege_level = "readOnly"
describe "and not authorised at the document level", ->
it "should not allow access", () ->
@AuthorizationManager.assertClientCanViewProjectAndDoc @client, @doc_id, @callback
@callback
.calledWith(new Error("not authorised"))
.should.equal true
describe "and authorised at the document level", ->
beforeEach (done) ->
@AuthorizationManager.addAccessToDoc @client, @doc_id, done
it "should allow access", () ->
@AuthorizationManager.assertClientCanViewProjectAndDoc @client, @doc_id, @callback
@callback
.calledWith(null)
.should.equal true
describe "when document authorisation is added and then removed", ->
beforeEach (done) ->
@AuthorizationManager.addAccessToDoc @client, @doc_id, () =>
@AuthorizationManager.removeAccessToDoc @client, @doc_id, done
it "should deny access", () ->
@AuthorizationManager.assertClientCanViewProjectAndDoc @client, @doc_id, @callback
@callback
.calledWith(new Error("not authorised"))
.should.equal true
describe "assertClientCanEditProjectAndDoc", ->
beforeEach () ->
@doc_id = "12345"
@callback = sinon.stub()
@client.params = {}
describe "when not authorised at the project level", ->
beforeEach () ->
@client.params.privilege_level = "readOnly"
it "should not allow access", () ->
@AuthorizationManager.assertClientCanEditProjectAndDoc @client, @doc_id, @callback
@callback
.calledWith(new Error("not authorised"))
.should.equal true
describe "even when authorised at the doc level", ->
beforeEach (done) ->
@AuthorizationManager.addAccessToDoc @client, @doc_id, done
it "should not allow access", () ->
@AuthorizationManager.assertClientCanEditProjectAndDoc @client, @doc_id, @callback
@callback
.calledWith(new Error("not authorised"))
.should.equal true
describe "when authorised at the project level", ->
beforeEach () ->
@client.params.privilege_level = "readAndWrite"
describe "and not authorised at the document level", ->
it "should not allow access", () ->
@AuthorizationManager.assertClientCanEditProjectAndDoc @client, @doc_id, @callback
@callback
.calledWith(new Error("not authorised"))
.should.equal true
describe "and authorised at the document level", ->
beforeEach (done) ->
@AuthorizationManager.addAccessToDoc @client, @doc_id, done
it "should allow access", () ->
@AuthorizationManager.assertClientCanEditProjectAndDoc @client, @doc_id, @callback
@callback
.calledWith(null)
.should.equal true
describe "when document authorisation is added and then removed", ->
beforeEach (done) ->
@AuthorizationManager.addAccessToDoc @client, @doc_id, () =>
@AuthorizationManager.removeAccessToDoc @client, @doc_id, done
it "should deny access", () ->
@AuthorizationManager.assertClientCanEditProjectAndDoc @client, @doc_id, @callback
@callback
.calledWith(new Error("not authorised"))
.should.equal true