Files
Umbraco-CMS/tests/Umbraco.Tests.UnitTests/Umbraco.Web.BackOffice/Authorization/TreeHandlerTests.cs

119 lines
4.3 KiB
C#
Raw Normal View History

// Copyright (c) Umbraco.
// See LICENSE for more details.
using System.Collections.Generic;
2020-12-02 19:50:56 +01:00
using System.Security.Claims;
using System.Threading.Tasks;
using Microsoft.AspNetCore.Authorization;
using Moq;
using NUnit.Framework;
using Umbraco.Cms.Core;
using Umbraco.Cms.Core.Models.Membership;
using Umbraco.Cms.Core.Security;
using Umbraco.Cms.Core.Services;
using Umbraco.Cms.Core.Trees;
using Umbraco.Cms.Tests.Common.Builders;
using Umbraco.Cms.Tests.Common.Builders.Extensions;
using Umbraco.Cms.Web.BackOffice.Authorization;
2020-12-02 19:50:56 +01:00
namespace Umbraco.Cms.Tests.UnitTests.Umbraco.Web.BackOffice.Authorization;
public class TreeHandlerTests
2020-12-02 19:50:56 +01:00
{
private const string Tree1Alias = "Tree1";
private const string Tree2Alias = "Tree2";
[Test]
public async Task Unauthorized_User_Is_Not_Authorized()
2020-12-02 19:50:56 +01:00
{
var authHandlerContext = CreateAuthorizationHandlerContext();
var sut = CreateHandler();
await sut.HandleAsync(authHandlerContext);
Assert.IsFalse(authHandlerContext.HasSucceeded);
2020-12-02 19:50:56 +01:00
}
[Test]
public async Task User_With_Access_To_Tree_Section_Is_Authorized()
{
var authHandlerContext = CreateAuthorizationHandlerContext();
var sut = CreateHandler(true, true);
await sut.HandleAsync(authHandlerContext);
Assert.IsTrue(authHandlerContext.HasSucceeded);
}
[Test]
public async Task User_Without_Access_To_Tree_Section_Is_Not_Authorized()
{
var authHandlerContext = CreateAuthorizationHandlerContext();
var sut = CreateHandler(true);
await sut.HandleAsync(authHandlerContext);
Assert.IsFalse(authHandlerContext.HasSucceeded);
}
private static AuthorizationHandlerContext CreateAuthorizationHandlerContext()
{
var requirement = new TreeRequirement(Tree1Alias, Tree2Alias);
var user = new ClaimsPrincipal(new ClaimsIdentity(new List<Claim>()));
var resource = new object();
return new AuthorizationHandlerContext(new List<IAuthorizationRequirement> { requirement }, user, resource);
}
private TreeHandler CreateHandler(bool userIsAuthorized = false, bool userCanAccessContentSection = false)
{
var mockTreeService = CreateMockTreeService();
var mockBackOfficeSecurityAccessor =
CreateMockBackOfficeSecurityAccessor(userIsAuthorized, userCanAccessContentSection);
return new TreeHandler(mockTreeService.Object, mockBackOfficeSecurityAccessor.Object);
}
private static Mock<ITreeService> CreateMockTreeService()
{
var mockTreeService = new Mock<ITreeService>();
mockTreeService
.Setup(x => x.GetByAlias(It.Is<string>(y => y == Tree1Alias)))
.Returns(CreateTree(Tree1Alias, Constants.Applications.Content));
mockTreeService
.Setup(x => x.GetByAlias(It.Is<string>(y => y == Tree2Alias)))
.Returns(CreateTree(Tree2Alias, Constants.Applications.Media));
return mockTreeService;
}
private static Tree CreateTree(string alias, string sectionAlias) =>
new TreeBuilder()
.WithAlias(alias)
.WithSectionAlias(sectionAlias)
.Build();
private static Mock<IBackOfficeSecurityAccessor> CreateMockBackOfficeSecurityAccessor(
bool userIsAuthorized,
bool userCanAccessContentSection)
{
var user = CreateUser();
var mockBackOfficeSecurity = new Mock<IBackOfficeSecurity>();
mockBackOfficeSecurity.SetupGet(x => x.CurrentUser).Returns(userIsAuthorized ? user : null);
mockBackOfficeSecurity
.Setup(x => x.UserHasSectionAccess(
Constants.Applications.Content,
It.Is<IUser>(y => y.Username == user.Username)))
.Returns(userCanAccessContentSection);
mockBackOfficeSecurity
.Setup(x => x.UserHasSectionAccess(
Constants.Applications.Media,
It.Is<IUser>(y => y.Username == user.Username)))
.Returns(false);
var mockBackOfficeSecurityAccessor = new Mock<IBackOfficeSecurityAccessor>();
mockBackOfficeSecurityAccessor.Setup(x => x.BackOfficeSecurity).Returns(mockBackOfficeSecurity.Object);
return mockBackOfficeSecurityAccessor;
}
private static User CreateUser() => new UserBuilder()
.Build();
2020-12-02 19:50:56 +01:00
}