OpenProject is the leading open source project management software.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
openproject/spec/requests/api/v3/query_resource_spec.rb

350 lines
12 KiB

#-- copyright
# OpenProject is a project management system.
# Copyright (C) 2012-2014 the OpenProject Foundation (OPF)
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License version 3.
#
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
# Copyright (C) 2006-2013 Jean-Philippe Lang
# Copyright (C) 2010-2013 the ChiliProject Team
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
#
# See doc/COPYRIGHT.rdoc for more details.
#++
require 'spec_helper'
require 'rack/test'
describe 'API v3 Query resource', type: :request do
include Rack::Test::Methods
let(:project) { FactoryGirl.create(:project, identifier: 'test_project', is_public: false) }
let(:current_user) { FactoryGirl.create(:user) }
let(:manage_public_queries_role) { FactoryGirl.create(:role, permissions: [:manage_public_queries]) }
let(:save_queries_role) { FactoryGirl.create(:role, permissions: [:save_queries]) }
let(:role_without_query_permissions) { FactoryGirl.create(:role, permissions: [:view_work_packages]) }
let(:unauthorize_user) { FactoryGirl.create(:user) }
describe '#star' do
let(:star_path) { "/api/v3/queries/#{query.id}/star" }
let(:filters) do
query.filters.map { |f| { f.field.to_s => { 'operator' => f.operator, 'values' => f.values } } }
end
let(:expected_response) do
{
'_type' => 'Query',
'_links' => {
'self' => {
'href' => "/api/v3/queries/#{query.id}",
'title' => query.name
}
},
'id' => query.id,
'name' => query.name,
'projectId' => query.project_id,
'projectName' => query.project.name,
'userId' => query.user_id,
'userName' => query.user.try(:name),
'userLogin' => query.user.try(:login),
'userMail' => query.user.try(:mail),
'filters' => filters,
'isPublic' => query.is_public.to_s,
'columnNames' => query.column_names,
'sortCriteria' => query.sort_criteria,
'groupBy' => query.group_by,
'displaySums' => query.display_sums.to_s,
'isStarred' => 'true'
}
end
describe 'public queries' do
let(:query) { FactoryGirl.create(:public_query, project: project) }
context 'user with permission to manage public queries' do
before(:each) do
allow(User).to receive(:current).and_return current_user
member = FactoryGirl.build(:member, user: current_user, project: project)
member.role_ids = [manage_public_queries_role.id]
member.save!
end
context 'when starring an unstarred query' do
before(:each) { patch star_path }
it 'should respond with 200' do
expect(last_response.status).to eq(200)
end
it 'should return the query in HAL+JSON format' do
parsed_response = JSON.parse(last_response.body)
expect(parsed_response).to eq(expected_response)
end
it 'should return the query with "isStarred" property set to true' do
parsed_response = JSON.parse(last_response.body)
expect(parsed_response['isStarred']).to eq('true')
end
end
context 'when starring already starred query' do
before(:each) { patch star_path }
it 'should respond with 200' do
expect(last_response.status).to eq(200)
end
it 'should return the query in HAL+JSON format' do
parsed_response = JSON.parse(last_response.body)
expect(parsed_response).to eq(expected_response)
end
it 'should return the query with "isStarred" property set to true' do
parsed_response = JSON.parse(last_response.body)
expect(parsed_response['isStarred']).to eq('true')
end
end
context 'when trying to star nonexistent query' do
let(:star_path) { '/api/v3/queries/999/star' }
before(:each) { patch star_path }
it_behaves_like 'not found', 999, 'Query'
end
end
context 'user without permission to manage public queries' do
before(:each) do
allow(User).to receive(:current).and_return current_user
member = FactoryGirl.build(:member, user: current_user, project: project)
member.role_ids = [role_without_query_permissions.id]
member.save!
patch star_path
end
it_behaves_like 'unauthorized access'
end
end
describe 'private queries' do
context 'user with permission to save queries' do
let(:query) { FactoryGirl.create(:private_query, project: project, user: current_user) }
before(:each) do
allow(User).to receive(:current).and_return current_user
member = FactoryGirl.build(:member, user: current_user, project: project)
member.role_ids = [save_queries_role.id]
member.save!
patch star_path
end
context 'starring his own query' do
it 'should respond with 200' do
expect(last_response.status).to eq(200)
end
it 'should return the query in HAL+JSON format' do
parsed_response = JSON.parse(last_response.body)
expect(parsed_response).to eq(expected_response)
end
it 'should return the query with "isStarred" property set to true' do
parsed_response = JSON.parse(last_response.body)
expect(parsed_response['isStarred']).to eq('true')
end
end
context 'trying to star somebody else\'s query' do
let(:another_user) { FactoryGirl.create(:user) }
let(:query) { FactoryGirl.create(:private_query, project: project, user: another_user) }
it_behaves_like 'unauthorized access'
end
end
context 'user without permission to save queries' do
let(:query) { FactoryGirl.create(:private_query, project: project, user: current_user) }
before(:each) do
allow(User).to receive(:current).and_return current_user
member = FactoryGirl.build(:member, user: current_user, project: project)
member.role_ids = [role_without_query_permissions.id]
member.save!
patch star_path
end
it_behaves_like 'unauthorized access'
end
end
end
describe '#unstar' do
let(:unstar_path) { "/api/v3/queries/#{query.id}/unstar" }
let(:filters) do
query.filters.map { |f| { f.field.to_s => { 'operator' => f.operator, 'values' => f.values } } }
end
let(:expected_response) do
{
'_type' => 'Query',
'_links' => {
'self' => {
'href' => "/api/v3/queries/#{query.id}",
'title' => query.name
}
},
'id' => query.id,
'name' => query.name,
'projectId' => query.project_id,
'projectName' => query.project.name,
'userId' => query.user_id,
'userName' => query.user.try(:name),
'userLogin' => query.user.try(:login),
'userMail' => query.user.try(:mail),
'filters' => filters,
'isPublic' => query.is_public.to_s,
'columnNames' => query.column_names,
'sortCriteria' => query.sort_criteria,
'groupBy' => query.group_by,
'displaySums' => query.display_sums.to_s,
'isStarred' => 'true'
}
end
describe 'public queries' do
let(:query) { FactoryGirl.create(:public_query, project: project) }
context 'user with permission to manage public queries' do
before(:each) do
allow(User).to receive(:current).and_return current_user
member = FactoryGirl.build(:member, user: current_user, project: project)
member.role_ids = [manage_public_queries_role.id]
member.save!
end
context 'when unstarring a starred query' do
before(:each) do
FactoryGirl.create(:query_menu_item, query: query)
patch unstar_path
end
it 'should respond with 200' do
expect(last_response.status).to eq(200)
end
it 'should return the query in HAL+JSON format' do
parsed_response = JSON.parse(last_response.body)
expect(parsed_response).to eq(expected_response.tap { |r| r['isStarred'] = 'false' })
end
it 'should return the query with "isStarred" property set to false' do
parsed_response = JSON.parse(last_response.body)
expect(parsed_response['isStarred']).to eq('false')
end
end
context 'when unstarring an unstarred query' do
before(:each) { patch unstar_path }
it 'should respond with 200' do
expect(last_response.status).to eq(200)
end
it 'should return the query in HAL+JSON format' do
parsed_response = JSON.parse(last_response.body)
expect(parsed_response).to eq(expected_response.tap { |r| r['isStarred'] = 'false' })
end
it 'should return the query with "isStarred" property set to true' do
parsed_response = JSON.parse(last_response.body)
expect(parsed_response['isStarred']).to eq('false')
end
end
context 'when trying to unstar nonexistent query' do
let(:unstar_path) { '/api/v3/queries/999/unstar' }
before(:each) { patch unstar_path }
it_behaves_like 'not found', 999, 'Query'
end
end
context 'user without permission to manage public queries' do
before(:each) do
allow(User).to receive(:current).and_return current_user
member = FactoryGirl.build(:member, user: current_user, project: project)
member.role_ids = [role_without_query_permissions.id]
member.save!
patch unstar_path
end
it_behaves_like 'unauthorized access'
end
end
describe 'private queries' do
context 'user with permission to save queries' do
let(:query) { FactoryGirl.create(:private_query, project: project, user: current_user) }
before(:each) do
allow(User).to receive(:current).and_return current_user
member = FactoryGirl.build(:member, user: current_user, project: project)
member.role_ids = [save_queries_role.id]
member.save!
patch unstar_path
end
context 'unstarring his own query' do
it 'should respond with 200' do
expect(last_response.status).to eq(200)
end
it 'should return the query in HAL+JSON format' do
parsed_response = JSON.parse(last_response.body)
expect(parsed_response).to eq(expected_response.tap { |r| r['isStarred'] = 'false' })
end
it 'should return the query with "isStarred" property set to true' do
parsed_response = JSON.parse(last_response.body)
expect(parsed_response['isStarred']).to eq('false')
end
end
context 'trying to unstar somebody else\'s query' do
let(:another_user) { FactoryGirl.create(:user) }
let(:query) { FactoryGirl.create(:private_query, project: project, user: another_user) }
it_behaves_like 'unauthorized access'
end
end
context 'user without permission to save queries' do
let(:query) { FactoryGirl.create(:private_query, project: project, user: current_user) }
before(:each) do
allow(User).to receive(:current).and_return current_user
member = FactoryGirl.build(:member, user: current_user, project: project)
member.role_ids = [role_without_query_permissions.id]
member.save!
patch unstar_path
end
it_behaves_like 'unauthorized access'
end
end
end
end