forked from xanzy/go-gitlab
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmember_roles_test.go
124 lines (106 loc) · 3.66 KB
/
member_roles_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
package gitlab
import (
"net/http"
"testing"
"github.com/stretchr/testify/require"
)
func TestListMemberRoles(t *testing.T) {
mux, client := setup(t)
path := "/api/v4/groups/1/member_roles"
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
mustWriteHTTPResponse(t, w, "testdata/list_member_roles.json")
})
memberRoles, _, err := client.MemberRolesService.ListMemberRoles(1)
require.NoError(t, err)
want := []*MemberRole{
{
ID: 1,
Name: "GuestCodeReader",
Description: "A Guest user that can read code",
GroupID: 1,
BaseAccessLevel: 10, // Guest Base Level
ReadCode: true,
},
{
ID: 2,
Name: "GuestVulnerabilityReader",
Description: "A Guest user that can read vulnerabilities",
GroupID: 1,
BaseAccessLevel: 10, // Guest Base Level
ReadVulnerability: true,
},
}
require.Equal(t, want, memberRoles)
}
func TestCreateMemberRole(t *testing.T) {
mux, client := setup(t)
path := "/api/v4/groups/84/member_roles"
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPost)
mustWriteHTTPResponse(t, w, "testdata/create_member_role.json")
})
memberRole, _, err := client.MemberRolesService.CreateMemberRole(84, &CreateMemberRoleOptions{
Name: Ptr("Custom guest"),
BaseAccessLevel: Ptr(GuestPermissions),
Description: Ptr("a sample custom role"),
AdminCICDVariables: Ptr(false),
AdminComplianceFramework: Ptr(false),
AdminGroupMembers: Ptr(false),
AdminMergeRequest: Ptr(false),
AdminPushRules: Ptr(false),
AdminTerraformState: Ptr(false),
AdminVulnerability: Ptr(false),
AdminWebHook: Ptr(false),
ArchiveProject: Ptr(false),
ManageDeployTokens: Ptr(false),
ManageGroupAccesToken: Ptr(false),
ManageMergeRequestSettings: Ptr(false),
ManageProjectAccessToken: Ptr(false),
ManageSecurityPolicyLink: Ptr(false),
ReadCode: Ptr(true),
ReadRunners: Ptr(false),
ReadDependency: Ptr(false),
ReadVulnerability: Ptr(false),
RemoveGroup: Ptr(false),
RemoveProject: Ptr(false),
})
require.NoError(t, err)
want := &MemberRole{
ID: 3,
Name: "Custom guest",
Description: "a sample custom role",
BaseAccessLevel: GuestPermissions,
GroupID: 84,
AdminCICDVariables: false,
AdminComplianceFramework: false,
AdminGroupMembers: false,
AdminMergeRequests: false,
AdminPushRules: false,
AdminTerraformState: false,
AdminVulnerability: false,
AdminWebHook: false,
ArchiveProject: false,
ManageDeployTokens: false,
ManageGroupAccesToken: false,
ManageMergeRequestSettings: false,
ManageProjectAccessToken: false,
ManageSecurityPolicyLink: false,
ReadCode: true,
ReadRunners: false,
ReadDependency: false,
ReadVulnerability: false,
RemoveGroup: false,
RemoveProject: false,
}
require.Equal(t, want, memberRole)
}
func TestDeleteMemberRole(t *testing.T) {
mux, client := setup(t)
path := "/api/v4/groups/1/member_roles/2"
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodDelete)
})
_, err := client.MemberRolesService.DeleteMemberRole(1, 2)
require.NoError(t, err)
}