##// END OF EJS Templates
adjusted the padding of path and summary box between files and file details screens
adjusted the padding of path and summary box between files and file details screens

File last commit:

r3524:a87725c8 default
r3720:0c0b5c69 new-ui
Show More
test_admin_users_ssh_keys.py
176 lines | 6.7 KiB | text/x-python | PythonLexer
/ rhodecode / apps / admin / tests / test_admin_users_ssh_keys.py
users: added SSH key management for user admin pages
r1993 # -*- coding: utf-8 -*-
docs: updated copyrights to 2019
r3363 # Copyright (C) 2010-2019 RhodeCode GmbH
users: added SSH key management for user admin pages
r1993 #
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License, version 3
# (only), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
# This program is dual-licensed. If you wish to learn more about the
# RhodeCode Enterprise Edition, including its added features, Support services,
# and proprietary license terms, please see https://rhodecode.com/licenses/
import pytest
from rhodecode.model.db import User, UserSshKeys
from rhodecode.tests import TestController, assert_session_flash
from rhodecode.tests.fixture import Fixture
fixture = Fixture()
def route_path(name, params=None, **kwargs):
import urllib
from rhodecode.apps._base import ADMIN_PREFIX
base_url = {
'edit_user_ssh_keys':
ADMIN_PREFIX + '/users/{user_id}/edit/ssh_keys',
'edit_user_ssh_keys_generate_keypair':
ADMIN_PREFIX + '/users/{user_id}/edit/ssh_keys/generate',
'edit_user_ssh_keys_add':
ADMIN_PREFIX + '/users/{user_id}/edit/ssh_keys/new',
'edit_user_ssh_keys_delete':
ADMIN_PREFIX + '/users/{user_id}/edit/ssh_keys/delete',
}[name].format(**kwargs)
if params:
base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
return base_url
class TestAdminUsersSshKeysView(TestController):
INVALID_KEY = """\
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDk+77sjDzVeB6vevJsuZds1iNU5
LANOa5CU5G/9JYIA6RYsWWMO7mbsR82IUckdqOHmxSykfR1D1TdluyIpQLrwgH5kb
n8FkVI8zBMCKakxowvN67B0R7b1BT4PPzW2JlOXei/m9W12ZY484VTow6/B+kf2Q8
cP8tmCJmKWZma5Em7OTUhvjyQVNz3v7HfeY5Hq0Ci4ECJ59hepFDabJvtAXg9XrI6
jvdphZTc30I4fG8+hBHzpeFxUGvSGNtXPUbwaAY8j/oHYrTpMgkj6pUEFsiKfC5zP
qPFR5HyKTCHW0nFUJnZsbyFT5hMiF/hZkJc9A0ZbdSvJwCRQ/g3bmdL
your_email@example.com
"""
VALID_KEY = 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDk+77sjDzVeB6vev' \
'JsuZds1iNU5LANOa5CU5G/9JYIA6RYsWWMO7mbsR82IUckdqOHmxSy' \
'kfR1D1TdluyIpQLrwgH5kbn8FkVI8zBMCKakxowvN67B0R7b1BT4PP' \
'zW2JlOXei/m9W12ZY484VTow6/B+kf2Q8cP8tmCJmKWZma5Em7OTUh' \
'vjyQVNz3v7HfeY5Hq0Ci4ECJ59hepFDabJvtAXg9XrI6jvdphZTc30' \
'I4fG8+hBHzpeFxUGvSGNtXPUbwaAY8j/oHYrTpMgkj6pUEFsiKfC5zPq' \
'PFR5HyKTCHW0nFUJnZsbyFT5hMiF/hZkJc9A0ZbdSvJwCRQ/g3bmdL ' \
'your_email@example.com'
ssh: show fingerprint when adding already existing key....
r2594 FINGERPRINT = 'MD5:01:4f:ad:29:22:6e:01:37:c9:d2:52:26:52:b0:2d:93'
users: added SSH key management for user admin pages
r1993
def test_ssh_keys_default_user(self):
self.log_user()
user = User.get_default_user()
self.app.get(
route_path('edit_user_ssh_keys', user_id=user.user_id),
status=302)
def test_add_ssh_key_error(self, user_util):
self.log_user()
user = user_util.create_user()
user_id = user.user_id
key_data = self.INVALID_KEY
desc = 'MY SSH KEY'
response = self.app.post(
route_path('edit_user_ssh_keys_add', user_id=user_id),
{'description': desc, 'key_data': key_data,
'csrf_token': self.csrf_token})
assert_session_flash(response, 'An error occurred during ssh '
'key saving: Unable to decode the key')
def test_ssh_key_duplicate(self, user_util):
self.log_user()
user = user_util.create_user()
user_id = user.user_id
key_data = self.VALID_KEY
desc = 'MY SSH KEY'
response = self.app.post(
route_path('edit_user_ssh_keys_add', user_id=user_id),
{'description': desc, 'key_data': key_data,
'csrf_token': self.csrf_token})
assert_session_flash(response, 'Ssh Key successfully created')
response.follow() # flush session flash
# add the same key AGAIN
desc = 'MY SSH KEY'
response = self.app.post(
route_path('edit_user_ssh_keys_add', user_id=user_id),
{'description': desc, 'key_data': key_data,
'csrf_token': self.csrf_token})
ssh: show fingerprint when adding already existing key....
r2594
err = 'Such key with fingerprint `{}` already exists, ' \
'please use a different one'.format(self.FINGERPRINT)
users: added SSH key management for user admin pages
r1993 assert_session_flash(response, 'An error occurred during ssh key '
ssh: show fingerprint when adding already existing key....
r2594 'saving: {}'.format(err))
users: added SSH key management for user admin pages
r1993
def test_add_ssh_key(self, user_util):
self.log_user()
user = user_util.create_user()
user_id = user.user_id
key_data = self.VALID_KEY
desc = 'MY SSH KEY'
response = self.app.post(
route_path('edit_user_ssh_keys_add', user_id=user_id),
{'description': desc, 'key_data': key_data,
'csrf_token': self.csrf_token})
assert_session_flash(response, 'Ssh Key successfully created')
response = response.follow()
response.mustcontain(desc)
def test_delete_ssh_key(self, user_util):
self.log_user()
user = user_util.create_user()
user_id = user.user_id
key_data = self.VALID_KEY
desc = 'MY SSH KEY'
response = self.app.post(
route_path('edit_user_ssh_keys_add', user_id=user_id),
{'description': desc, 'key_data': key_data,
'csrf_token': self.csrf_token})
assert_session_flash(response, 'Ssh Key successfully created')
response = response.follow() # flush the Session flash
# now delete our key
keys = UserSshKeys.query().filter(UserSshKeys.user_id == user_id).all()
assert 1 == len(keys)
response = self.app.post(
route_path('edit_user_ssh_keys_delete', user_id=user_id),
{'del_ssh_key': keys[0].ssh_key_id,
'csrf_token': self.csrf_token})
assert_session_flash(response, 'Ssh key successfully deleted')
keys = UserSshKeys.query().filter(UserSshKeys.user_id == user_id).all()
assert 0 == len(keys)
def test_generate_keypair(self, user_util):
self.log_user()
user = user_util.create_user()
user_id = user.user_id
response = self.app.get(
route_path('edit_user_ssh_keys_generate_keypair', user_id=user_id))
response.mustcontain('Private key')
response.mustcontain('Public key')
tests: fixed SSH Key tests
r3524 response.mustcontain('-----BEGIN PRIVATE KEY-----')