mirror of
https://github.com/PostHog/posthog.git
synced 2024-11-28 18:26:15 +01:00
862697ef83
* initial role and role memberships setup
* create role when org is created and role memberships when user joins
* wip for merge
* fix api tests for role
* nest roles under organization route and test fixes
* remove pdb set trace
* fix types
* remove creating default roles and role memberships for orgs and users
* add permission levels to orgs and roles
* bulk create role memberships
* leave role membership as individual api request, handle bulk creation on the frontend instead
* feature flag role access wip and migrations
* fix flag role access tests
* linter
* isort
* temp type ignore
* add access level to plugin tests
* test remove test migration safe
* test license import error fix
* delete old? org license test
* nvm we need these tests
* type ignore
* reset license plans after test
* add organization resource access model and remove access level field from regular organizations
* feat: permission return on feature flag (#12826)
* suggested permission return
* change naming
* add changes
* pass bool
* fix plugin tests
* organization resource access tests and fixes
* update can edit return with new org resource access model from feature flag
* fix tests
* add permissions to feature flag for editing
* more tests
* remove unnecessary spacing
* fix test
* add context for feature flag serializer tests
* add back workflow test step
* add organization to feature flag role access
* fix(spike): why are tests failing (#12858)
* was it because invalid id is provided?
* allow django to touch the db
* a less unexpected way of allowing access to the DB
* Revert "add organization to feature flag role access"
This reverts commit ef18b0ec8b
.
* address feedback and include organization safety checks in tests
* test error fix
* test role dupe name per org
* remove third access level option
* fix migration for it
* more tests
* fix test
* feat: role based permissions UI (#12776)
* add api
* starter
* role and member creation + deletion
* working with all deletes
* add block
* working roles
* permissions tab on org settings
* org default setting
* types
* flag role assignment
* working per flag permission
* working with admin block
* types
* use restricted area component
* wrap flag resource access in different url
* restore migrations manifest
* update url endpoints
* pay gate mini org role settings
* remove view and custom edit and remove resource access creation on org creation
* add feature flag
* address feedback
* fix backend tests
* remove broken permissions setting on new feature flags
* export logic props interface
Co-authored-by: Li Yi Yu <li@posthog.com>
* type fixes
Co-authored-by: Eric Duong <eeoneric@gmail.com>
Co-authored-by: Paul D'Ambra <paul@posthog.com>
133 lines
5.6 KiB
Python
133 lines
5.6 KiB
Python
from django.db import IntegrityError
|
|
from rest_framework import status
|
|
|
|
from ee.api.test.base import APILicensedTest
|
|
from ee.models.organization_resource_access import OrganizationResourceAccess
|
|
from ee.models.role import Role
|
|
from posthog.models.organization import Organization, OrganizationMembership
|
|
|
|
|
|
class TestRoleAPI(APILicensedTest):
|
|
def test_only_organization_admins_and_higher_can_create(self):
|
|
self.organization_membership.level = OrganizationMembership.Level.ADMIN
|
|
self.organization_membership.save()
|
|
admin_create_res = self.client.post(
|
|
"/api/organizations/@current/roles",
|
|
{
|
|
"name": "Product",
|
|
},
|
|
)
|
|
|
|
self.organization_membership.level = OrganizationMembership.Level.MEMBER
|
|
self.organization_membership.save()
|
|
member_create_res = self.client.post(
|
|
"/api/organizations/@current/roles",
|
|
{
|
|
"name": "Product 2",
|
|
},
|
|
)
|
|
self.assertEqual(admin_create_res.status_code, status.HTTP_201_CREATED)
|
|
self.assertEqual(Role.objects.all().count(), 1)
|
|
self.assertEqual(Role.objects.first().name, "Product") # type: ignore
|
|
self.assertEqual(member_create_res.status_code, status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_only_organization_admins_and_higher_can_update(self):
|
|
existing_eng_role = Role.objects.create(
|
|
name="Engineering",
|
|
organization=self.organization,
|
|
created_by=self.user,
|
|
)
|
|
self.organization_membership.level = OrganizationMembership.Level.ADMIN
|
|
self.organization_membership.save()
|
|
admin_update_res = self.client.patch(
|
|
f"/api/organizations/@current/roles/{existing_eng_role.id}",
|
|
{"name": "on call support"},
|
|
)
|
|
|
|
self.organization_membership.level = OrganizationMembership.Level.MEMBER
|
|
self.organization_membership.save()
|
|
member_update_res = self.client.patch(
|
|
f"/api/organizations/@current/roles/{existing_eng_role.id}",
|
|
{"name": "member eng"},
|
|
)
|
|
|
|
self.assertEqual(admin_update_res.status_code, status.HTTP_200_OK)
|
|
self.assertEqual(member_update_res.status_code, status.HTTP_403_FORBIDDEN)
|
|
self.assertEqual(Role.objects.all().count(), 1)
|
|
self.assertEqual(Role.objects.first().name, "on call support") # type: ignore
|
|
|
|
def test_cannot_duplicate_role_name(self):
|
|
Role.objects.create(name="Marketing", organization=self.organization)
|
|
count = Role.objects.count()
|
|
self.organization_membership.level = OrganizationMembership.Level.ADMIN
|
|
self.organization_membership.save()
|
|
res = self.client.post(
|
|
"/api/organizations/@current/roles",
|
|
{
|
|
"name": "marketing",
|
|
},
|
|
)
|
|
self.assertEqual(res.status_code, status.HTTP_400_BAD_REQUEST)
|
|
self.assertEqual(
|
|
res.json(),
|
|
{
|
|
"type": "validation_error",
|
|
"code": "unique",
|
|
"detail": "There is already a role with this name.",
|
|
"attr": "name",
|
|
},
|
|
)
|
|
self.assertEqual(Role.objects.count(), count)
|
|
other_org = Organization.objects.create(name="other org")
|
|
Role.objects.create(name="Marketing", organization=other_org)
|
|
self.assertEqual(Role.objects.count(), 2)
|
|
self.assertEqual(Role.objects.filter(organization=other_org).exists(), True)
|
|
with self.assertRaises(IntegrityError):
|
|
Role.objects.create(name="Marketing", organization=self.organization)
|
|
|
|
def test_updating_feature_flags_access_level_for_a_role(self):
|
|
role = Role.objects.create(organization=self.organization, name="Engineering")
|
|
self.organization_membership.level = OrganizationMembership.Level.ADMIN
|
|
self.organization_membership.save()
|
|
self.assertEqual(self.organization_membership.level, OrganizationMembership.Level.ADMIN)
|
|
self.assertEqual(role.feature_flags_access_level, OrganizationResourceAccess.AccessLevel.CAN_ALWAYS_EDIT)
|
|
self.client.patch(
|
|
f"/api/organizations/@current/roles/{role.id}",
|
|
{"feature_flags_access_level": OrganizationResourceAccess.AccessLevel.CAN_ONLY_VIEW},
|
|
)
|
|
self.assertEqual(
|
|
Role.objects.first().feature_flags_access_level, OrganizationResourceAccess.AccessLevel.CAN_ONLY_VIEW # type: ignore
|
|
)
|
|
self.client.patch(
|
|
f"/api/organizations/@current/roles/{role.id}",
|
|
{"feature_flags_access_level": OrganizationResourceAccess.AccessLevel.CAN_ALWAYS_EDIT},
|
|
)
|
|
self.assertEqual(
|
|
Role.objects.first().feature_flags_access_level, # type: ignore
|
|
OrganizationResourceAccess.AccessLevel.CAN_ALWAYS_EDIT,
|
|
)
|
|
|
|
def test_returns_correct_results_by_organization(self):
|
|
self.organization_membership.level = OrganizationMembership.Level.ADMIN
|
|
self.organization_membership.save()
|
|
|
|
self.client.post(
|
|
"/api/organizations/@current/roles",
|
|
{
|
|
"name": "Product",
|
|
},
|
|
)
|
|
self.client.post(
|
|
"/api/organizations/@current/roles",
|
|
{
|
|
"name": "Customer Success",
|
|
},
|
|
)
|
|
other_org = Organization.objects.create(name="other org")
|
|
Role.objects.create(name="Product", organization=other_org)
|
|
self.assertEqual(Role.objects.count(), 3)
|
|
res = self.client.get("/api/organizations/@current/roles")
|
|
results = res.json()
|
|
self.assertEqual(results["count"], 2)
|
|
self.assertNotContains(res, str(other_org.id))
|