mattermost-community-enterp.../cmd/mmctl/commands/permissions_reset_e2e_test.go
Claude ec1f89217a Merge: Complete Mattermost Server with Community Enterprise
Full Mattermost server source with integrated Community Enterprise features.
Includes vendor directory for offline/air-gapped builds.

Structure:
- enterprise-impl/: Enterprise feature implementations
- enterprise-community/: Init files that register implementations
- enterprise/: Bridge imports (community_imports.go)
- vendor/: All dependencies for offline builds

Build (online):
  go build ./cmd/mattermost

Build (offline/air-gapped):
  go build -mod=vendor ./cmd/mattermost

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2025-12-17 23:59:07 +09:00

81 lines
2.7 KiB
Go

// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
// See LICENSE.txt for license information.
package commands
import (
"github.com/spf13/cobra"
"github.com/mattermost/mattermost/server/v8/cmd/mmctl/client"
"github.com/mattermost/mattermost/server/v8/cmd/mmctl/printer"
"github.com/mattermost/mattermost/server/public/model"
)
func (s *MmctlE2ETestSuite) TestResetPermissionsCmd() {
s.SetupEnterpriseTestHelper().InitBasic()
s.Run("Shouldn't let a non-system-admin reset a role's permissions", func() {
printer.Clean()
// update the role to have some non-default permissions
role, err := s.th.App.GetRoleByName(s.th.Context, model.SystemUserManagerRoleId)
s.Require().Nil(err)
defaultPermissions := role.Permissions
expectedPermissions := []string{model.PermissionUseGroupMentions.Id, model.PermissionUseChannelMentions.Id}
role.Permissions = expectedPermissions
role, err = s.th.App.UpdateRole(role)
s.Require().Nil(err)
// reset to defaults when we're done
defer func() {
role.Permissions = defaultPermissions
_, err = s.th.App.UpdateRole(role)
s.Require().Nil(err)
}()
// try to reset the permissions
err2 := resetPermissionsCmdF(s.th.Client, &cobra.Command{}, []string{model.SystemUserManagerRoleId})
s.Require().Error(err2)
s.Require().Len(printer.GetLines(), 0)
s.Require().Len(printer.GetErrorLines(), 0)
// ensure reset didn't happen
roleAfterResetAttempt, err := s.th.App.GetRoleByName(s.th.Context, model.SystemUserManagerRoleId)
s.Require().Nil(err)
s.Require().ElementsMatch(expectedPermissions, roleAfterResetAttempt.Permissions)
})
s.RunForSystemAdminAndLocal("Reset a role's permissions", func(c client.Client) {
printer.Clean()
// update the role to have some non-default permissions
role, err := s.th.App.GetRoleByName(s.th.Context, model.SystemUserManagerRoleId)
s.Require().Nil(err)
defaultPermissions := role.Permissions
expectedPermissions := []string{model.PermissionUseGroupMentions.Id, model.PermissionUseChannelMentions.Id}
role.Permissions = expectedPermissions
role, err = s.th.App.UpdateRole(role)
// reset to defaults when we're done
defer func() {
role.Permissions = defaultPermissions
_, err = s.th.App.UpdateRole(role)
s.Require().Nil(err)
}()
// try to reset the permissions
err2 := resetPermissionsCmdF(c, &cobra.Command{}, []string{model.SystemUserManagerRoleId})
s.Require().Nil(err2)
s.Require().Len(printer.GetLines(), 1)
s.Require().Len(printer.GetErrorLines(), 0)
// ensure reset was successful
roleAfterResetAttempt, err := s.th.App.GetRoleByName(s.th.Context, model.SystemUserManagerRoleId)
s.Require().Nil(err)
s.Require().ElementsMatch(defaultPermissions, roleAfterResetAttempt.Permissions)
})
}