1
1
mirror of https://github.com/pterodactyl/panel.git synced 2024-11-22 17:12:30 +01:00

Add test coverage for creating a subuser

This commit is contained in:
Dane Everitt 2020-09-26 17:25:14 -07:00
parent cc6f98c0fd
commit 47697e07cf
No known key found for this signature in database
GPG Key ID: EEA66103B3D71F53

View File

@ -0,0 +1,166 @@
<?php
namespace Pterodactyl\Tests\Integration\Api\Client\Server\Schedule;
use Illuminate\Support\Str;
use Pterodactyl\Models\User;
use Illuminate\Http\Response;
use Pterodactyl\Models\Subuser;
use Pterodactyl\Models\Permission;
use Illuminate\Foundation\Testing\WithFaker;
use Pterodactyl\Tests\Integration\Api\Client\ClientApiIntegrationTestCase;
class CreateServerSubuserTest extends ClientApiIntegrationTestCase
{
use WithFaker;
/**
* Test that a subuser can be created for a server.
*
* @param array $permissions
* @dataProvider permissionsDataProvider
*/
public function testSubuserCanBeCreated($permissions)
{
[$user, $server] = $this->generateTestAccount($permissions);
$response = $this->actingAs($user)->postJson($this->link($server) . "/users", [
'email' => $email = $this->faker->email,
'permissions' => [
Permission::ACTION_USER_CREATE,
],
]);
$response->assertOk();
/** @var \Pterodactyl\Models\User $subuser */
$subuser = User::query()->where('email', $email)->firstOrFail();
$response->assertJsonPath('object', Subuser::RESOURCE_NAME);
$response->assertJsonPath('attributes.uuid', $subuser->uuid);
$response->assertJsonPath('attributes.permissions', [
Permission::ACTION_USER_CREATE,
Permission::ACTION_WEBSOCKET_CONNECT,
]);
$expected = $response->json('attributes');
unset($expected['permissions']);
$this->assertJsonTransformedWith($expected, $subuser);
}
/**
* Tests that an error is returned if a subuser attempts to create a new subuser and assign
* permissions that their account does not also possess.
*/
public function testErrorIsReturnedIfAssigningPermissionsNotAssignedToSelf()
{
[$user, $server] = $this->generateTestAccount([
Permission::ACTION_USER_CREATE,
Permission::ACTION_USER_READ,
Permission::ACTION_CONTROL_CONSOLE,
]);
$response = $this->actingAs($user)->postJson($this->link($server) . "/users", [
'email' => $email = $this->faker->email,
'permissions' => [
Permission::ACTION_USER_CREATE,
Permission::ACTION_USER_UPDATE, // This permission is not assigned to the subuser.
],
]);
$response->assertForbidden();
$response->assertJsonPath('errors.0.code', 'HttpForbiddenException');
$response->assertJsonPath('errors.0.detail', 'Cannot assign permissions to a subuser that your account does not actively possess.');
}
/**
* Throws some bad data at the API and ensures that a subuser cannot be created.
*/
public function testSubuserWithExcessivelyLongEmailCannotBeCreated()
{
[$user, $server] = $this->generateTestAccount();
$email = str_repeat(Str::random(20), 9) . '1@gmail.com'; // 191 is the hard limit for the column in MySQL.
$response = $this->actingAs($user)->postJson($this->link($server) . "/users", [
'email' => $email,
'permissions' => [
Permission::ACTION_USER_CREATE,
],
]);
$response->assertOk();
$response = $this->actingAs($user)->postJson($this->link($server) . "/users", [
'email' => $email . '.au',
'permissions' => [
Permission::ACTION_USER_CREATE,
],
]);
$response->assertStatus(Response::HTTP_UNPROCESSABLE_ENTITY);
$response->assertJsonPath('errors.0.detail', 'The email must be between 1 and 191 characters.');
$response->assertJsonPath('errors.0.meta.source_field', 'email');
}
/**
* Test that creating a subuser when there is already an account with that email runs
* as expected and does not create a new account.
*/
public function testCreatingSubuserWithSameEmailAsExistingUserWorks()
{
[$user, $server] = $this->generateTestAccount();
/** @var \Pterodactyl\Models\User $existing */
$existing = factory(User::class)->create(['email' => $this->faker->email]);
$response = $this->actingAs($user)->postJson($this->link($server) . "/users", [
'email' => $existing->email,
'permissions' => [
Permission::ACTION_USER_CREATE,
],
]);
$response->assertOk();
$response->assertJsonPath('object', Subuser::RESOURCE_NAME);
$response->assertJsonPath('attributes.uuid', $existing->uuid);
}
/**
* Test that an error is returned if the account associated with an email address is already
* associated with the server instance.
*/
public function testAddingSubuserThatAlreadyIsAssignedReturnsError()
{
[$user, $server] = $this->generateTestAccount();
$response = $this->actingAs($user)->postJson($this->link($server) . "/users", [
'email' => $email = $this->faker->email,
'permissions' => [
Permission::ACTION_USER_CREATE,
],
]);
$response->assertOk();
$response = $this->actingAs($user)->postJson($this->link($server) . "/users", [
'email' => $email,
'permissions' => [
Permission::ACTION_USER_CREATE,
],
]);
$response->assertStatus(Response::HTTP_BAD_REQUEST);
$response->assertJsonPath('errors.0.code', 'ServerSubuserExistsException');
$response->assertJsonPath('errors.0.detail', 'A user with that email address is already assigned as a subuser for this server.');
}
/**
* @return array
*/
public function permissionsDataProvider(): array
{
return [[[]], [[Permission::ACTION_USER_CREATE]]];
}
}