AccessServiceTest.php 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109
  1. <?php
  2. namespace Tests\Unit\Services;
  3. use App\Models\Permission;
  4. use App\Models\Role;
  5. use App\Models\User;
  6. use App\Services\Access\AccessService;
  7. use Database\Seeders\RbacSeeder;
  8. use Illuminate\Foundation\Testing\RefreshDatabase;
  9. use Tests\TestCase;
  10. class AccessServiceTest extends TestCase
  11. {
  12. use RefreshDatabase;
  13. public function test_rbac_seeder_backfills_user_role_id(): void
  14. {
  15. $user = User::factory()->create(['role' => Role::MANAGER]);
  16. $this->seed(RbacSeeder::class);
  17. $user->refresh();
  18. $this->assertNotNull($user->role_id);
  19. $this->assertSame(Role::MANAGER, $user->roleModel->slug);
  20. }
  21. public function test_direct_admin_has_all_permissions(): void
  22. {
  23. $admin = User::factory()->create(['role' => Role::ADMIN]);
  24. $this->seed(RbacSeeder::class);
  25. $admin->refresh();
  26. $this->assertTrue(app(AccessService::class)->can($admin, 'catalog.delete'));
  27. $this->assertTrue(app(AccessService::class)->can($admin, 'catalog.fields.product_price.update'));
  28. }
  29. public function test_manager_has_seeded_permissions_but_not_admin_only_permissions(): void
  30. {
  31. $manager = User::factory()->create(['role' => Role::MANAGER]);
  32. $this->seed(RbacSeeder::class);
  33. $manager->refresh();
  34. $this->assertTrue(app(AccessService::class)->can($manager, 'catalog.view'));
  35. $this->assertTrue(app(AccessService::class)->can($manager, 'catalog.fields.product_price.view'));
  36. $this->assertFalse(app(AccessService::class)->can($manager, 'catalog.update'));
  37. }
  38. public function test_role_deny_overrides_user_allow(): void
  39. {
  40. $this->seed(RbacSeeder::class);
  41. $permission = Permission::query()->where('slug', 'catalog.view')->firstOrFail();
  42. $role = Role::query()->create([
  43. 'slug' => 'deny_catalog',
  44. 'name' => 'Deny catalog',
  45. 'is_system' => false,
  46. 'is_active' => true,
  47. ]);
  48. $role->permissions()->sync([
  49. $permission->id => ['effect' => 'deny'],
  50. ]);
  51. $user = User::factory()->create(['role' => $role->slug, 'role_id' => $role->id]);
  52. $user->permissions()->sync([
  53. $permission->id => ['effect' => 'allow'],
  54. ]);
  55. app(AccessService::class)->bumpCacheVersion();
  56. $this->assertFalse(app(AccessService::class)->can($user, 'catalog.view'));
  57. }
  58. public function test_exact_route_permission_lookup_supports_dotted_route_names(): void
  59. {
  60. $this->assertSame(
  61. 'catalog.search',
  62. app(AccessService::class)->routePermission('product.search')
  63. );
  64. }
  65. public function test_user_deny_overrides_role_allow(): void
  66. {
  67. $manager = User::factory()->create(['role' => Role::MANAGER]);
  68. $this->seed(RbacSeeder::class);
  69. $manager->refresh();
  70. $permission = Permission::query()->where('slug', 'catalog.view')->firstOrFail();
  71. $manager->permissions()->syncWithoutDetaching([
  72. $permission->id => ['effect' => 'deny'],
  73. ]);
  74. app(AccessService::class)->bumpCacheVersion();
  75. $this->assertFalse(app(AccessService::class)->can($manager, 'catalog.view'));
  76. }
  77. public function test_assistant_head_has_materialized_admin_permissions_without_runtime_inheritance(): void
  78. {
  79. $assistantHead = User::factory()->create(['role' => Role::ASSISTANT_HEAD]);
  80. $this->seed(RbacSeeder::class);
  81. $assistantHead->refresh();
  82. $this->assertTrue($assistantHead->hasRole(Role::ADMIN));
  83. $this->assertTrue(app(AccessService::class)->can($assistantHead, 'maf_orders.delete'));
  84. }
  85. }