mirror of
https://github.com/AuthMe/AuthMeReloaded.git
synced 2025-02-21 14:21:28 +01:00
Test initialization of permission handlers in PermissionManager
This commit is contained in:
parent
acaaf6fe41
commit
6f2c586441
@ -1,5 +1,6 @@
|
||||
package fr.xephi.authme.permission;
|
||||
|
||||
import com.google.common.annotations.VisibleForTesting;
|
||||
import fr.xephi.authme.ConsoleLogger;
|
||||
import fr.xephi.authme.initialization.Reloadable;
|
||||
import fr.xephi.authme.listener.JoiningPlayer;
|
||||
@ -41,8 +42,7 @@ public class PermissionsManager implements Reloadable {
|
||||
|
||||
private final Server server;
|
||||
private final PluginManager pluginManager;
|
||||
|
||||
private Settings settings;
|
||||
private final Settings settings;
|
||||
|
||||
/**
|
||||
* The permission handler that is currently in use.
|
||||
@ -76,7 +76,8 @@ public class PermissionsManager implements Reloadable {
|
||||
* Setup and hook into the permissions systems.
|
||||
*/
|
||||
@PostConstruct
|
||||
private void setup() {
|
||||
@VisibleForTesting
|
||||
void setup() {
|
||||
if (settings.getProperty(PluginSettings.FORCE_VAULT_HOOK)) {
|
||||
try {
|
||||
PermissionHandler handler = createPermissionHandler(PermissionsSystemType.VAULT);
|
||||
|
@ -36,8 +36,7 @@ public class LuckPermsHandler implements PermissionHandler {
|
||||
try {
|
||||
luckPermsApi = LuckPerms.getApi();
|
||||
} catch (IllegalStateException e) {
|
||||
e.printStackTrace();
|
||||
throw new PermissionHandlerException("Could not get api of LuckPerms");
|
||||
throw new PermissionHandlerException("Could not get api of LuckPerms", e);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -9,4 +9,8 @@ public class PermissionHandlerException extends Exception {
|
||||
public PermissionHandlerException(String message) {
|
||||
super(message);
|
||||
}
|
||||
|
||||
public PermissionHandlerException(String message, Throwable cause) {
|
||||
super(message, cause);
|
||||
}
|
||||
}
|
||||
|
@ -0,0 +1,191 @@
|
||||
package fr.xephi.authme.permission;
|
||||
|
||||
import com.google.common.collect.ImmutableMap;
|
||||
import fr.xephi.authme.ReflectionTestUtils;
|
||||
import fr.xephi.authme.TestHelper;
|
||||
import fr.xephi.authme.permission.handlers.BPermissionsHandler;
|
||||
import fr.xephi.authme.permission.handlers.LuckPermsHandler;
|
||||
import fr.xephi.authme.permission.handlers.PermissionHandler;
|
||||
import fr.xephi.authme.permission.handlers.PermissionsExHandler;
|
||||
import fr.xephi.authme.permission.handlers.VaultHandler;
|
||||
import fr.xephi.authme.permission.handlers.ZPermissionsHandler;
|
||||
import fr.xephi.authme.settings.Settings;
|
||||
import fr.xephi.authme.settings.properties.PluginSettings;
|
||||
import me.lucko.luckperms.LuckPerms;
|
||||
import me.lucko.luckperms.api.LuckPermsApi;
|
||||
import net.milkbowl.vault.permission.Permission;
|
||||
import org.bukkit.Bukkit;
|
||||
import org.bukkit.Server;
|
||||
import org.bukkit.plugin.Plugin;
|
||||
import org.bukkit.plugin.PluginManager;
|
||||
import org.bukkit.plugin.RegisteredServiceProvider;
|
||||
import org.bukkit.plugin.ServicesManager;
|
||||
import org.junit.AssumptionViolatedException;
|
||||
import org.junit.Before;
|
||||
import org.junit.BeforeClass;
|
||||
import org.junit.Test;
|
||||
import org.junit.runner.RunWith;
|
||||
import org.junit.runners.Parameterized;
|
||||
import org.tyrannyofheaven.bukkit.zPermissions.ZPermissionsService;
|
||||
|
||||
import java.util.Collection;
|
||||
import java.util.Map;
|
||||
import java.util.stream.Collectors;
|
||||
|
||||
import static com.google.common.collect.Sets.newHashSet;
|
||||
import static fr.xephi.authme.permission.PermissionsSystemType.B_PERMISSIONS;
|
||||
import static fr.xephi.authme.permission.PermissionsSystemType.LUCK_PERMS;
|
||||
import static fr.xephi.authme.permission.PermissionsSystemType.PERMISSIONS_EX;
|
||||
import static fr.xephi.authme.permission.PermissionsSystemType.VAULT;
|
||||
import static fr.xephi.authme.permission.PermissionsSystemType.Z_PERMISSIONS;
|
||||
import static org.hamcrest.Matchers.instanceOf;
|
||||
import static org.hamcrest.Matchers.nullValue;
|
||||
import static org.junit.Assert.assertThat;
|
||||
import static org.mockito.BDDMockito.given;
|
||||
import static org.mockito.Mockito.mock;
|
||||
import static org.mockito.Mockito.only;
|
||||
import static org.mockito.Mockito.verify;
|
||||
|
||||
/**
|
||||
* Tests the initialization of {@link PermissionHandler} in {@link PermissionsManager}.
|
||||
*/
|
||||
@RunWith(Parameterized.class)
|
||||
public class PermissionsManagerInitializationTest {
|
||||
|
||||
@Parameterized.Parameter(0)
|
||||
public PermissionsSystemType permissionsSystemType;
|
||||
@Parameterized.Parameter(1)
|
||||
public Class<?> expectedHandlerType;
|
||||
|
||||
private Settings settings = mock(Settings.class);
|
||||
private ServicesManager servicesManager = mock(ServicesManager.class);
|
||||
private Server server = mock(Server.class);
|
||||
private PluginManager pluginManager = mock(PluginManager.class);
|
||||
private PermissionsManager permissionsManager = new PermissionsManager(server, pluginManager, settings);
|
||||
|
||||
@BeforeClass
|
||||
public static void setUpLogger() {
|
||||
TestHelper.setRealLogger();
|
||||
}
|
||||
|
||||
@Before
|
||||
public void setUp() {
|
||||
ReflectionTestUtils.setField(Bukkit.class, null, "server", server);
|
||||
given(server.getServicesManager()).willReturn(servicesManager);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void shouldInitializeHandler() {
|
||||
// given
|
||||
setUpForPermissionSystemTest();
|
||||
given(settings.getProperty(PluginSettings.FORCE_VAULT_HOOK)).willReturn(false);
|
||||
Plugin plugin = mock(Plugin.class);
|
||||
given(plugin.isEnabled()).willReturn(true);
|
||||
given(pluginManager.getPlugin(permissionsSystemType.getPluginName())).willReturn(plugin);
|
||||
|
||||
// when
|
||||
permissionsManager.setup();
|
||||
|
||||
// then
|
||||
PermissionHandler handler = getHandlerFieldValue();
|
||||
assertThat(handler, instanceOf(expectedHandlerType));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void shouldInitializeToVaultIfSoConfigured() {
|
||||
// given
|
||||
setUpForVault();
|
||||
given(settings.getProperty(PluginSettings.FORCE_VAULT_HOOK)).willReturn(true);
|
||||
Plugin plugin = mock(Plugin.class);
|
||||
given(plugin.isEnabled()).willReturn(true);
|
||||
given(pluginManager.getPlugin(VAULT.getPluginName())).willReturn(plugin);
|
||||
|
||||
// when
|
||||
permissionsManager.setup();
|
||||
|
||||
// then
|
||||
PermissionHandler handler = getHandlerFieldValue();
|
||||
assertThat(handler, instanceOf(VaultHandler.class));
|
||||
verify(pluginManager, only()).getPlugin(VAULT.getPluginName());
|
||||
}
|
||||
|
||||
@Test
|
||||
public void shouldNotHookIntoDisabledPlugin() {
|
||||
// given
|
||||
given(settings.getProperty(PluginSettings.FORCE_VAULT_HOOK)).willReturn(false);
|
||||
Plugin plugin = mock(Plugin.class);
|
||||
given(plugin.isEnabled()).willReturn(false);
|
||||
given(pluginManager.getPlugin(permissionsSystemType.getPluginName())).willReturn(plugin);
|
||||
|
||||
// when
|
||||
permissionsManager.setup();
|
||||
|
||||
// then
|
||||
assertThat(getHandlerFieldValue(), nullValue());
|
||||
}
|
||||
|
||||
@Test
|
||||
public void shouldCatchInitializationException() {
|
||||
// given
|
||||
given(settings.getProperty(PluginSettings.FORCE_VAULT_HOOK)).willReturn(false);
|
||||
Plugin plugin = mock(Plugin.class);
|
||||
// Typically we'd expect a PermissionHandler exception further down the line but we can test it easily like this
|
||||
given(plugin.isEnabled()).willThrow(new IllegalStateException("Some exception occurred"));
|
||||
given(pluginManager.getPlugin(permissionsSystemType.getPluginName())).willReturn(plugin);
|
||||
|
||||
// when
|
||||
permissionsManager.setup();
|
||||
|
||||
// then
|
||||
assertThat(getHandlerFieldValue(), nullValue());
|
||||
}
|
||||
|
||||
@Parameterized.Parameters(name = "{0}")
|
||||
public static Collection<Object[]> createParameters() {
|
||||
Map<PermissionsSystemType, Class<?>> handlersByPermissionSystemType = ImmutableMap.of(
|
||||
LUCK_PERMS, LuckPermsHandler.class,
|
||||
PERMISSIONS_EX, PermissionsExHandler.class,
|
||||
B_PERMISSIONS, BPermissionsHandler.class,
|
||||
Z_PERMISSIONS, ZPermissionsHandler.class,
|
||||
VAULT, VaultHandler.class);
|
||||
|
||||
// Verify that all handlers are present -> reminder to add any new entry here as well
|
||||
if (!handlersByPermissionSystemType.keySet().equals(newHashSet(PermissionsSystemType.values()))) {
|
||||
throw new IllegalStateException("Test is not set up with all "
|
||||
+ PermissionsSystemType.class.getSimpleName() + " entries");
|
||||
}
|
||||
|
||||
// Wrap the above map in a Collection<Object[]> to satisfy JUnit
|
||||
return handlersByPermissionSystemType.entrySet().stream()
|
||||
.map(e -> new Object[]{ e.getKey(), e.getValue() })
|
||||
.collect(Collectors.toList());
|
||||
}
|
||||
|
||||
private void setUpForPermissionSystemTest() {
|
||||
if (permissionsSystemType == LUCK_PERMS) {
|
||||
LuckPermsApi api = mock(LuckPermsApi.class);
|
||||
ReflectionTestUtils.setField(LuckPerms.class, null, "instance", api);
|
||||
} else if (permissionsSystemType == PERMISSIONS_EX) {
|
||||
throw new AssumptionViolatedException(
|
||||
"PermissionsEx instance cannot be mocked because of missing dependencies -- skipping");
|
||||
} else if (permissionsSystemType == Z_PERMISSIONS) {
|
||||
ZPermissionsService zPermissionsService = mock(ZPermissionsService.class);
|
||||
given(servicesManager.load(ZPermissionsService.class)).willReturn(zPermissionsService);
|
||||
} else if (permissionsSystemType == VAULT) {
|
||||
setUpForVault();
|
||||
} else if (permissionsSystemType != B_PERMISSIONS) {
|
||||
throw new IllegalStateException("Unhandled permission systems type: " + permissionsSystemType);
|
||||
}
|
||||
}
|
||||
|
||||
private void setUpForVault() {
|
||||
RegisteredServiceProvider<Permission> registeredServiceProvider = mock(RegisteredServiceProvider.class);
|
||||
given(servicesManager.getRegistration(Permission.class)).willReturn(registeredServiceProvider);
|
||||
Permission permission = mock(Permission.class);
|
||||
given(registeredServiceProvider.getProvider()).willReturn(permission);
|
||||
}
|
||||
|
||||
private PermissionHandler getHandlerFieldValue() {
|
||||
return ReflectionTestUtils.getFieldValue(PermissionsManager.class, permissionsManager, "handler");
|
||||
}
|
||||
}
|
Loading…
Reference in New Issue
Block a user