0
0
mirror of https://github.com/PostHog/posthog.git synced 2024-11-28 18:26:15 +01:00
posthog/ee/api/test/test_role.py

133 lines
5.6 KiB
Python
Raw Normal View History

feat: role based permissions (#12657) * initial role and role memberships setup * create role when org is created and role memberships when user joins * wip for merge * fix api tests for role * nest roles under organization route and test fixes * remove pdb set trace * fix types * remove creating default roles and role memberships for orgs and users * add permission levels to orgs and roles * bulk create role memberships * leave role membership as individual api request, handle bulk creation on the frontend instead * feature flag role access wip and migrations * fix flag role access tests * linter * isort * temp type ignore * add access level to plugin tests * test remove test migration safe * test license import error fix * delete old? org license test * nvm we need these tests * type ignore * reset license plans after test * add organization resource access model and remove access level field from regular organizations * feat: permission return on feature flag (#12826) * suggested permission return * change naming * add changes * pass bool * fix plugin tests * organization resource access tests and fixes * update can edit return with new org resource access model from feature flag * fix tests * add permissions to feature flag for editing * more tests * remove unnecessary spacing * fix test * add context for feature flag serializer tests * add back workflow test step * add organization to feature flag role access * fix(spike): why are tests failing (#12858) * was it because invalid id is provided? * allow django to touch the db * a less unexpected way of allowing access to the DB * Revert "add organization to feature flag role access" This reverts commit ef18b0ec8b0bca0dede6a8614eb94f5879f442a7. * address feedback and include organization safety checks in tests * test error fix * test role dupe name per org * remove third access level option * fix migration for it * more tests * fix test * feat: role based permissions UI (#12776) * add api * starter * role and member creation + deletion * working with all deletes * add block * working roles * permissions tab on org settings * org default setting * types * flag role assignment * working per flag permission * working with admin block * types * use restricted area component * wrap flag resource access in different url * restore migrations manifest * update url endpoints * pay gate mini org role settings * remove view and custom edit and remove resource access creation on org creation * add feature flag * address feedback * fix backend tests * remove broken permissions setting on new feature flags * export logic props interface Co-authored-by: Li Yi Yu <li@posthog.com> * type fixes Co-authored-by: Eric Duong <eeoneric@gmail.com> Co-authored-by: Paul D'Ambra <paul@posthog.com>
2022-11-24 02:36:29 +01:00
from django.db import IntegrityError
from rest_framework import status
from ee.api.test.base import APILicensedTest
from ee.models.organization_resource_access import OrganizationResourceAccess
from ee.models.role import Role
from posthog.models.organization import Organization, OrganizationMembership
class TestRoleAPI(APILicensedTest):
def test_only_organization_admins_and_higher_can_create(self):
self.organization_membership.level = OrganizationMembership.Level.ADMIN
self.organization_membership.save()
admin_create_res = self.client.post(
"/api/organizations/@current/roles",
{
"name": "Product",
},
)
self.organization_membership.level = OrganizationMembership.Level.MEMBER
self.organization_membership.save()
member_create_res = self.client.post(
"/api/organizations/@current/roles",
{
"name": "Product 2",
},
)
self.assertEqual(admin_create_res.status_code, status.HTTP_201_CREATED)
self.assertEqual(Role.objects.all().count(), 1)
self.assertEqual(Role.objects.first().name, "Product") # type: ignore
self.assertEqual(member_create_res.status_code, status.HTTP_403_FORBIDDEN)
def test_only_organization_admins_and_higher_can_update(self):
existing_eng_role = Role.objects.create(
name="Engineering",
organization=self.organization,
created_by=self.user,
)
self.organization_membership.level = OrganizationMembership.Level.ADMIN
self.organization_membership.save()
admin_update_res = self.client.patch(
f"/api/organizations/@current/roles/{existing_eng_role.id}",
{"name": "on call support"},
)
self.organization_membership.level = OrganizationMembership.Level.MEMBER
self.organization_membership.save()
member_update_res = self.client.patch(
f"/api/organizations/@current/roles/{existing_eng_role.id}",
{"name": "member eng"},
)
self.assertEqual(admin_update_res.status_code, status.HTTP_200_OK)
self.assertEqual(member_update_res.status_code, status.HTTP_403_FORBIDDEN)
self.assertEqual(Role.objects.all().count(), 1)
self.assertEqual(Role.objects.first().name, "on call support") # type: ignore
def test_cannot_duplicate_role_name(self):
Role.objects.create(name="Marketing", organization=self.organization)
count = Role.objects.count()
self.organization_membership.level = OrganizationMembership.Level.ADMIN
self.organization_membership.save()
res = self.client.post(
"/api/organizations/@current/roles",
{
"name": "marketing",
},
)
self.assertEqual(res.status_code, status.HTTP_400_BAD_REQUEST)
self.assertEqual(
res.json(),
{
"type": "validation_error",
"code": "unique",
"detail": "There is already a role with this name.",
"attr": "name",
},
)
self.assertEqual(Role.objects.count(), count)
other_org = Organization.objects.create(name="other org")
Role.objects.create(name="Marketing", organization=other_org)
self.assertEqual(Role.objects.count(), 2)
self.assertEqual(Role.objects.filter(organization=other_org).exists(), True)
with self.assertRaises(IntegrityError):
Role.objects.create(name="Marketing", organization=self.organization)
def test_updating_feature_flags_access_level_for_a_role(self):
role = Role.objects.create(organization=self.organization, name="Engineering")
self.organization_membership.level = OrganizationMembership.Level.ADMIN
self.organization_membership.save()
self.assertEqual(self.organization_membership.level, OrganizationMembership.Level.ADMIN)
self.assertEqual(role.feature_flags_access_level, OrganizationResourceAccess.AccessLevel.CAN_ALWAYS_EDIT)
self.client.patch(
f"/api/organizations/@current/roles/{role.id}",
{"feature_flags_access_level": OrganizationResourceAccess.AccessLevel.CAN_ONLY_VIEW},
)
self.assertEqual(
Role.objects.first().feature_flags_access_level, OrganizationResourceAccess.AccessLevel.CAN_ONLY_VIEW # type: ignore
)
self.client.patch(
f"/api/organizations/@current/roles/{role.id}",
{"feature_flags_access_level": OrganizationResourceAccess.AccessLevel.CAN_ALWAYS_EDIT},
)
self.assertEqual(
Role.objects.first().feature_flags_access_level, # type: ignore
OrganizationResourceAccess.AccessLevel.CAN_ALWAYS_EDIT,
)
def test_returns_correct_results_by_organization(self):
self.organization_membership.level = OrganizationMembership.Level.ADMIN
self.organization_membership.save()
self.client.post(
"/api/organizations/@current/roles",
{
"name": "Product",
},
)
self.client.post(
"/api/organizations/@current/roles",
{
"name": "Customer Success",
},
)
other_org = Organization.objects.create(name="other org")
Role.objects.create(name="Product", organization=other_org)
self.assertEqual(Role.objects.count(), 3)
res = self.client.get("/api/organizations/@current/roles")
results = res.json()
self.assertEqual(results["count"], 2)
self.assertNotContains(res, str(other_org.id))