Test initialization of permission handlers in PermissionManager

This commit is contained in:
ljacqu 2018-01-21 22:11:47 +01:00
parent acaaf6fe41
commit 6f2c586441
4 changed files with 200 additions and 5 deletions

View File

@ -1,5 +1,6 @@
package fr.xephi.authme.permission;
import com.google.common.annotations.VisibleForTesting;
import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.initialization.Reloadable;
import fr.xephi.authme.listener.JoiningPlayer;
@ -41,8 +42,7 @@ public class PermissionsManager implements Reloadable {
private final Server server;
private final PluginManager pluginManager;
private Settings settings;
private final Settings settings;
/**
* The permission handler that is currently in use.
@ -76,7 +76,8 @@ public class PermissionsManager implements Reloadable {
* Setup and hook into the permissions systems.
*/
@PostConstruct
private void setup() {
@VisibleForTesting
void setup() {
if (settings.getProperty(PluginSettings.FORCE_VAULT_HOOK)) {
try {
PermissionHandler handler = createPermissionHandler(PermissionsSystemType.VAULT);

View File

@ -36,8 +36,7 @@ public class LuckPermsHandler implements PermissionHandler {
try {
luckPermsApi = LuckPerms.getApi();
} catch (IllegalStateException e) {
e.printStackTrace();
throw new PermissionHandlerException("Could not get api of LuckPerms");
throw new PermissionHandlerException("Could not get api of LuckPerms", e);
}
}

View File

@ -9,4 +9,8 @@ public class PermissionHandlerException extends Exception {
public PermissionHandlerException(String message) {
super(message);
}
public PermissionHandlerException(String message, Throwable cause) {
super(message, cause);
}
}

View File

@ -0,0 +1,191 @@
package fr.xephi.authme.permission;
import com.google.common.collect.ImmutableMap;
import fr.xephi.authme.ReflectionTestUtils;
import fr.xephi.authme.TestHelper;
import fr.xephi.authme.permission.handlers.BPermissionsHandler;
import fr.xephi.authme.permission.handlers.LuckPermsHandler;
import fr.xephi.authme.permission.handlers.PermissionHandler;
import fr.xephi.authme.permission.handlers.PermissionsExHandler;
import fr.xephi.authme.permission.handlers.VaultHandler;
import fr.xephi.authme.permission.handlers.ZPermissionsHandler;
import fr.xephi.authme.settings.Settings;
import fr.xephi.authme.settings.properties.PluginSettings;
import me.lucko.luckperms.LuckPerms;
import me.lucko.luckperms.api.LuckPermsApi;
import net.milkbowl.vault.permission.Permission;
import org.bukkit.Bukkit;
import org.bukkit.Server;
import org.bukkit.plugin.Plugin;
import org.bukkit.plugin.PluginManager;
import org.bukkit.plugin.RegisteredServiceProvider;
import org.bukkit.plugin.ServicesManager;
import org.junit.AssumptionViolatedException;
import org.junit.Before;
import org.junit.BeforeClass;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.Parameterized;
import org.tyrannyofheaven.bukkit.zPermissions.ZPermissionsService;
import java.util.Collection;
import java.util.Map;
import java.util.stream.Collectors;
import static com.google.common.collect.Sets.newHashSet;
import static fr.xephi.authme.permission.PermissionsSystemType.B_PERMISSIONS;
import static fr.xephi.authme.permission.PermissionsSystemType.LUCK_PERMS;
import static fr.xephi.authme.permission.PermissionsSystemType.PERMISSIONS_EX;
import static fr.xephi.authme.permission.PermissionsSystemType.VAULT;
import static fr.xephi.authme.permission.PermissionsSystemType.Z_PERMISSIONS;
import static org.hamcrest.Matchers.instanceOf;
import static org.hamcrest.Matchers.nullValue;
import static org.junit.Assert.assertThat;
import static org.mockito.BDDMockito.given;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.only;
import static org.mockito.Mockito.verify;
/**
* Tests the initialization of {@link PermissionHandler} in {@link PermissionsManager}.
*/
@RunWith(Parameterized.class)
public class PermissionsManagerInitializationTest {
@Parameterized.Parameter(0)
public PermissionsSystemType permissionsSystemType;
@Parameterized.Parameter(1)
public Class<?> expectedHandlerType;
private Settings settings = mock(Settings.class);
private ServicesManager servicesManager = mock(ServicesManager.class);
private Server server = mock(Server.class);
private PluginManager pluginManager = mock(PluginManager.class);
private PermissionsManager permissionsManager = new PermissionsManager(server, pluginManager, settings);
@BeforeClass
public static void setUpLogger() {
TestHelper.setRealLogger();
}
@Before
public void setUp() {
ReflectionTestUtils.setField(Bukkit.class, null, "server", server);
given(server.getServicesManager()).willReturn(servicesManager);
}
@Test
public void shouldInitializeHandler() {
// given
setUpForPermissionSystemTest();
given(settings.getProperty(PluginSettings.FORCE_VAULT_HOOK)).willReturn(false);
Plugin plugin = mock(Plugin.class);
given(plugin.isEnabled()).willReturn(true);
given(pluginManager.getPlugin(permissionsSystemType.getPluginName())).willReturn(plugin);
// when
permissionsManager.setup();
// then
PermissionHandler handler = getHandlerFieldValue();
assertThat(handler, instanceOf(expectedHandlerType));
}
@Test
public void shouldInitializeToVaultIfSoConfigured() {
// given
setUpForVault();
given(settings.getProperty(PluginSettings.FORCE_VAULT_HOOK)).willReturn(true);
Plugin plugin = mock(Plugin.class);
given(plugin.isEnabled()).willReturn(true);
given(pluginManager.getPlugin(VAULT.getPluginName())).willReturn(plugin);
// when
permissionsManager.setup();
// then
PermissionHandler handler = getHandlerFieldValue();
assertThat(handler, instanceOf(VaultHandler.class));
verify(pluginManager, only()).getPlugin(VAULT.getPluginName());
}
@Test
public void shouldNotHookIntoDisabledPlugin() {
// given
given(settings.getProperty(PluginSettings.FORCE_VAULT_HOOK)).willReturn(false);
Plugin plugin = mock(Plugin.class);
given(plugin.isEnabled()).willReturn(false);
given(pluginManager.getPlugin(permissionsSystemType.getPluginName())).willReturn(plugin);
// when
permissionsManager.setup();
// then
assertThat(getHandlerFieldValue(), nullValue());
}
@Test
public void shouldCatchInitializationException() {
// given
given(settings.getProperty(PluginSettings.FORCE_VAULT_HOOK)).willReturn(false);
Plugin plugin = mock(Plugin.class);
// Typically we'd expect a PermissionHandler exception further down the line but we can test it easily like this
given(plugin.isEnabled()).willThrow(new IllegalStateException("Some exception occurred"));
given(pluginManager.getPlugin(permissionsSystemType.getPluginName())).willReturn(plugin);
// when
permissionsManager.setup();
// then
assertThat(getHandlerFieldValue(), nullValue());
}
@Parameterized.Parameters(name = "{0}")
public static Collection<Object[]> createParameters() {
Map<PermissionsSystemType, Class<?>> handlersByPermissionSystemType = ImmutableMap.of(
LUCK_PERMS, LuckPermsHandler.class,
PERMISSIONS_EX, PermissionsExHandler.class,
B_PERMISSIONS, BPermissionsHandler.class,
Z_PERMISSIONS, ZPermissionsHandler.class,
VAULT, VaultHandler.class);
// Verify that all handlers are present -> reminder to add any new entry here as well
if (!handlersByPermissionSystemType.keySet().equals(newHashSet(PermissionsSystemType.values()))) {
throw new IllegalStateException("Test is not set up with all "
+ PermissionsSystemType.class.getSimpleName() + " entries");
}
// Wrap the above map in a Collection<Object[]> to satisfy JUnit
return handlersByPermissionSystemType.entrySet().stream()
.map(e -> new Object[]{ e.getKey(), e.getValue() })
.collect(Collectors.toList());
}
private void setUpForPermissionSystemTest() {
if (permissionsSystemType == LUCK_PERMS) {
LuckPermsApi api = mock(LuckPermsApi.class);
ReflectionTestUtils.setField(LuckPerms.class, null, "instance", api);
} else if (permissionsSystemType == PERMISSIONS_EX) {
throw new AssumptionViolatedException(
"PermissionsEx instance cannot be mocked because of missing dependencies -- skipping");
} else if (permissionsSystemType == Z_PERMISSIONS) {
ZPermissionsService zPermissionsService = mock(ZPermissionsService.class);
given(servicesManager.load(ZPermissionsService.class)).willReturn(zPermissionsService);
} else if (permissionsSystemType == VAULT) {
setUpForVault();
} else if (permissionsSystemType != B_PERMISSIONS) {
throw new IllegalStateException("Unhandled permission systems type: " + permissionsSystemType);
}
}
private void setUpForVault() {
RegisteredServiceProvider<Permission> registeredServiceProvider = mock(RegisteredServiceProvider.class);
given(servicesManager.getRegistration(Permission.class)).willReturn(registeredServiceProvider);
Permission permission = mock(Permission.class);
given(registeredServiceProvider.getProvider()).willReturn(permission);
}
private PermissionHandler getHandlerFieldValue() {
return ReflectionTestUtils.getFieldValue(PermissionsManager.class, permissionsManager, "handler");
}
}