Show More
The requested changes are too big and content was truncated. Show full diff
@@ -1,202 +1,202 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import pytest |
|
21 | import pytest | |
22 |
|
22 | |||
23 | from rhodecode.tests import assert_session_flash |
|
23 | from rhodecode.tests import assert_session_flash | |
24 | from rhodecode.tests.utils import AssertResponse |
|
24 | from rhodecode.tests.utils import AssertResponse | |
25 | from rhodecode.model.db import Session |
|
25 | from rhodecode.model.db import Session | |
26 | from rhodecode.model.settings import SettingsModel |
|
26 | from rhodecode.model.settings import SettingsModel | |
27 |
|
27 | |||
28 |
|
28 | |||
29 | def assert_auth_settings_updated(response): |
|
29 | def assert_auth_settings_updated(response): | |
30 | assert response.status_int == 302, 'Expected response HTTP Found 302' |
|
30 | assert response.status_int == 302, 'Expected response HTTP Found 302' | |
31 | assert_session_flash(response, 'Auth settings updated successfully') |
|
31 | assert_session_flash(response, 'Auth settings updated successfully') | |
32 |
|
32 | |||
33 |
|
33 | |||
34 | @pytest.mark.usefixtures("autologin_user", "app") |
|
34 | @pytest.mark.usefixtures("autologin_user", "app") | |
35 | class TestAuthSettingsView(object): |
|
35 | class TestAuthSettingsView(object): | |
36 |
|
36 | |||
37 | def _enable_plugins(self, plugins_list, csrf_token, override=None, |
|
37 | def _enable_plugins(self, plugins_list, csrf_token, override=None, | |
38 | verify_response=False): |
|
38 | verify_response=False): | |
39 | test_url = '/_admin/auth' |
|
39 | test_url = '/_admin/auth' | |
40 | params = { |
|
40 | params = { | |
41 | 'auth_plugins': plugins_list, |
|
41 | 'auth_plugins': plugins_list, | |
42 | 'csrf_token': csrf_token, |
|
42 | 'csrf_token': csrf_token, | |
43 | } |
|
43 | } | |
44 | if override: |
|
44 | if override: | |
45 | params.update(override) |
|
45 | params.update(override) | |
46 | _enabled_plugins = [] |
|
46 | _enabled_plugins = [] | |
47 | for plugin in plugins_list.split(','): |
|
47 | for plugin in plugins_list.split(','): | |
48 | plugin_name = plugin.partition('#')[-1] |
|
48 | plugin_name = plugin.partition('#')[-1] | |
49 | enabled_plugin = '%s_enabled' % plugin_name |
|
49 | enabled_plugin = '%s_enabled' % plugin_name | |
50 | cache_ttl = '%s_cache_ttl' % plugin_name |
|
50 | cache_ttl = '%s_cache_ttl' % plugin_name | |
51 |
|
51 | |||
52 | # default params that are needed for each plugin, |
|
52 | # default params that are needed for each plugin, | |
53 | # `enabled` and `cache_ttl` |
|
53 | # `enabled` and `cache_ttl` | |
54 | params.update({ |
|
54 | params.update({ | |
55 | enabled_plugin: True, |
|
55 | enabled_plugin: True, | |
56 | cache_ttl: 0 |
|
56 | cache_ttl: 0 | |
57 | }) |
|
57 | }) | |
58 | _enabled_plugins.append(enabled_plugin) |
|
58 | _enabled_plugins.append(enabled_plugin) | |
59 |
|
59 | |||
60 | # we need to clean any enabled plugin before, since they require |
|
60 | # we need to clean any enabled plugin before, since they require | |
61 | # form params to be present |
|
61 | # form params to be present | |
62 | db_plugin = SettingsModel().get_setting_by_name('auth_plugins') |
|
62 | db_plugin = SettingsModel().get_setting_by_name('auth_plugins') | |
63 | db_plugin.app_settings_value = \ |
|
63 | db_plugin.app_settings_value = \ | |
64 | 'egg:rhodecode-enterprise-ce#rhodecode' |
|
64 | 'egg:rhodecode-enterprise-ce#rhodecode' | |
65 | Session().add(db_plugin) |
|
65 | Session().add(db_plugin) | |
66 | Session().commit() |
|
66 | Session().commit() | |
67 | for _plugin in _enabled_plugins: |
|
67 | for _plugin in _enabled_plugins: | |
68 | db_plugin = SettingsModel().get_setting_by_name(_plugin) |
|
68 | db_plugin = SettingsModel().get_setting_by_name(_plugin) | |
69 | if db_plugin: |
|
69 | if db_plugin: | |
70 | Session().delete(db_plugin) |
|
70 | Session().delete(db_plugin) | |
71 | Session().commit() |
|
71 | Session().commit() | |
72 |
|
72 | |||
73 | response = self.app.post(url=test_url, params=params) |
|
73 | response = self.app.post(url=test_url, params=params) | |
74 |
|
74 | |||
75 | if verify_response: |
|
75 | if verify_response: | |
76 | assert_auth_settings_updated(response) |
|
76 | assert_auth_settings_updated(response) | |
77 | return params |
|
77 | return params | |
78 |
|
78 | |||
79 | def _post_ldap_settings(self, params, override=None, force=False): |
|
79 | def _post_ldap_settings(self, params, override=None, force=False): | |
80 |
|
80 | |||
81 | params.update({ |
|
81 | params.update({ | |
82 | 'filter': 'user', |
|
82 | 'filter': 'user', | |
83 | 'user_member_of': '', |
|
83 | 'user_member_of': '', | |
84 | 'user_search_base': '', |
|
84 | 'user_search_base': '', | |
85 | 'user_search_filter': 'test_filter', |
|
85 | 'user_search_filter': 'test_filter', | |
86 |
|
86 | |||
87 | 'host': 'dc.example.com', |
|
87 | 'host': 'dc.example.com', | |
88 | 'port': '999', |
|
88 | 'port': '999', | |
89 | 'timeout': 3600, |
|
89 | 'timeout': 3600, | |
90 | 'tls_kind': 'PLAIN', |
|
90 | 'tls_kind': 'PLAIN', | |
91 | 'tls_reqcert': 'NEVER', |
|
91 | 'tls_reqcert': 'NEVER', | |
92 | 'tls_cert_dir':'/etc/openldap/cacerts', |
|
92 | 'tls_cert_dir':'/etc/openldap/cacerts', | |
93 | 'dn_user': 'test_user', |
|
93 | 'dn_user': 'test_user', | |
94 | 'dn_pass': 'test_pass', |
|
94 | 'dn_pass': 'test_pass', | |
95 | 'base_dn': 'test_base_dn', |
|
95 | 'base_dn': 'test_base_dn', | |
96 | 'search_scope': 'BASE', |
|
96 | 'search_scope': 'BASE', | |
97 | 'attr_login': 'test_attr_login', |
|
97 | 'attr_login': 'test_attr_login', | |
98 | 'attr_firstname': 'ima', |
|
98 | 'attr_firstname': 'ima', | |
99 | 'attr_lastname': 'tester', |
|
99 | 'attr_lastname': 'tester', | |
100 | 'attr_email': 'test@example.com', |
|
100 | 'attr_email': 'test@example.com', | |
101 | 'cache_ttl': '0', |
|
101 | 'cache_ttl': '0', | |
102 | }) |
|
102 | }) | |
103 | if force: |
|
103 | if force: | |
104 | params = {} |
|
104 | params = {} | |
105 | params.update(override or {}) |
|
105 | params.update(override or {}) | |
106 |
|
106 | |||
107 | test_url = '/_admin/auth/ldap/' |
|
107 | test_url = '/_admin/auth/ldap/' | |
108 |
|
108 | |||
109 | response = self.app.post(url=test_url, params=params) |
|
109 | response = self.app.post(url=test_url, params=params) | |
110 | return response |
|
110 | return response | |
111 |
|
111 | |||
112 | def test_index(self): |
|
112 | def test_index(self): | |
113 | response = self.app.get('/_admin/auth') |
|
113 | response = self.app.get('/_admin/auth') | |
114 | response.mustcontain('Authentication Plugins') |
|
114 | response.mustcontain('Authentication Plugins') | |
115 |
|
115 | |||
116 | @pytest.mark.parametrize("disable_plugin, needs_import", [ |
|
116 | @pytest.mark.parametrize("disable_plugin, needs_import", [ | |
117 | ('egg:rhodecode-enterprise-ce#headers', None), |
|
117 | ('egg:rhodecode-enterprise-ce#headers', None), | |
118 | ('egg:rhodecode-enterprise-ce#crowd', None), |
|
118 | ('egg:rhodecode-enterprise-ce#crowd', None), | |
119 | ('egg:rhodecode-enterprise-ce#jasig_cas', None), |
|
119 | ('egg:rhodecode-enterprise-ce#jasig_cas', None), | |
120 | ('egg:rhodecode-enterprise-ce#ldap', None), |
|
120 | ('egg:rhodecode-enterprise-ce#ldap', None), | |
121 | ('egg:rhodecode-enterprise-ce#pam', "pam"), |
|
121 | ('egg:rhodecode-enterprise-ce#pam', "pam"), | |
122 | ]) |
|
122 | ]) | |
123 | def test_disable_plugin(self, csrf_token, disable_plugin, needs_import): |
|
123 | def test_disable_plugin(self, csrf_token, disable_plugin, needs_import): | |
124 | # TODO: johbo: "pam" is currently not available on darwin, |
|
124 | # TODO: johbo: "pam" is currently not available on darwin, | |
125 | # although the docs state that it should work on darwin. |
|
125 | # although the docs state that it should work on darwin. | |
126 | if needs_import: |
|
126 | if needs_import: | |
127 | pytest.importorskip(needs_import) |
|
127 | pytest.importorskip(needs_import) | |
128 |
|
128 | |||
129 | self._enable_plugins( |
|
129 | self._enable_plugins( | |
130 | 'egg:rhodecode-enterprise-ce#rhodecode,' + disable_plugin, |
|
130 | 'egg:rhodecode-enterprise-ce#rhodecode,' + disable_plugin, | |
131 | csrf_token, verify_response=True) |
|
131 | csrf_token, verify_response=True) | |
132 |
|
132 | |||
133 | self._enable_plugins( |
|
133 | self._enable_plugins( | |
134 | 'egg:rhodecode-enterprise-ce#rhodecode', csrf_token, |
|
134 | 'egg:rhodecode-enterprise-ce#rhodecode', csrf_token, | |
135 | verify_response=True) |
|
135 | verify_response=True) | |
136 |
|
136 | |||
137 | def test_ldap_save_settings(self, csrf_token): |
|
137 | def test_ldap_save_settings(self, csrf_token): | |
138 | params = self._enable_plugins( |
|
138 | params = self._enable_plugins( | |
139 | 'egg:rhodecode-enterprise-ce#rhodecode,' |
|
139 | 'egg:rhodecode-enterprise-ce#rhodecode,' | |
140 | 'egg:rhodecode-enterprise-ce#ldap', |
|
140 | 'egg:rhodecode-enterprise-ce#ldap', | |
141 | csrf_token) |
|
141 | csrf_token) | |
142 | response = self._post_ldap_settings(params) |
|
142 | response = self._post_ldap_settings(params) | |
143 | assert_auth_settings_updated(response) |
|
143 | assert_auth_settings_updated(response) | |
144 |
|
144 | |||
145 | new_settings = SettingsModel().get_auth_settings() |
|
145 | new_settings = SettingsModel().get_auth_settings() | |
146 | assert new_settings['auth_ldap_host'] == u'dc.example.com', \ |
|
146 | assert new_settings['auth_ldap_host'] == u'dc.example.com', \ | |
147 | 'fail db write compare' |
|
147 | 'fail db write compare' | |
148 |
|
148 | |||
149 | def test_ldap_error_form_wrong_port_number(self, csrf_token): |
|
149 | def test_ldap_error_form_wrong_port_number(self, csrf_token): | |
150 | params = self._enable_plugins( |
|
150 | params = self._enable_plugins( | |
151 | 'egg:rhodecode-enterprise-ce#rhodecode,' |
|
151 | 'egg:rhodecode-enterprise-ce#rhodecode,' | |
152 | 'egg:rhodecode-enterprise-ce#ldap', |
|
152 | 'egg:rhodecode-enterprise-ce#ldap', | |
153 | csrf_token) |
|
153 | csrf_token) | |
154 | invalid_port_value = 'invalid-port-number' |
|
154 | invalid_port_value = 'invalid-port-number' | |
155 | response = self._post_ldap_settings(params, override={ |
|
155 | response = self._post_ldap_settings(params, override={ | |
156 | 'port': invalid_port_value, |
|
156 | 'port': invalid_port_value, | |
157 | }) |
|
157 | }) | |
158 |
assertr = |
|
158 | assertr = response.assert_response() | |
159 | assertr.element_contains( |
|
159 | assertr.element_contains( | |
160 | '.form .field #port ~ .error-message', |
|
160 | '.form .field #port ~ .error-message', | |
161 | invalid_port_value) |
|
161 | invalid_port_value) | |
162 |
|
162 | |||
163 | def test_ldap_error_form(self, csrf_token): |
|
163 | def test_ldap_error_form(self, csrf_token): | |
164 | params = self._enable_plugins( |
|
164 | params = self._enable_plugins( | |
165 | 'egg:rhodecode-enterprise-ce#rhodecode,' |
|
165 | 'egg:rhodecode-enterprise-ce#rhodecode,' | |
166 | 'egg:rhodecode-enterprise-ce#ldap', |
|
166 | 'egg:rhodecode-enterprise-ce#ldap', | |
167 | csrf_token) |
|
167 | csrf_token) | |
168 | response = self._post_ldap_settings(params, override={ |
|
168 | response = self._post_ldap_settings(params, override={ | |
169 | 'attr_login': '', |
|
169 | 'attr_login': '', | |
170 | }) |
|
170 | }) | |
171 | response.mustcontain("""<span class="error-message">The LDAP Login""" |
|
171 | response.mustcontain("""<span class="error-message">The LDAP Login""" | |
172 | """ attribute of the CN must be specified""") |
|
172 | """ attribute of the CN must be specified""") | |
173 |
|
173 | |||
174 | def test_post_ldap_group_settings(self, csrf_token): |
|
174 | def test_post_ldap_group_settings(self, csrf_token): | |
175 | params = self._enable_plugins( |
|
175 | params = self._enable_plugins( | |
176 | 'egg:rhodecode-enterprise-ce#rhodecode,' |
|
176 | 'egg:rhodecode-enterprise-ce#rhodecode,' | |
177 | 'egg:rhodecode-enterprise-ce#ldap', |
|
177 | 'egg:rhodecode-enterprise-ce#ldap', | |
178 | csrf_token) |
|
178 | csrf_token) | |
179 |
|
179 | |||
180 | response = self._post_ldap_settings(params, override={ |
|
180 | response = self._post_ldap_settings(params, override={ | |
181 | 'host': 'dc-legacy.example.com', |
|
181 | 'host': 'dc-legacy.example.com', | |
182 | 'port': '999', |
|
182 | 'port': '999', | |
183 | 'tls_kind': 'PLAIN', |
|
183 | 'tls_kind': 'PLAIN', | |
184 | 'tls_reqcert': 'NEVER', |
|
184 | 'tls_reqcert': 'NEVER', | |
185 | 'dn_user': 'test_user', |
|
185 | 'dn_user': 'test_user', | |
186 | 'dn_pass': 'test_pass', |
|
186 | 'dn_pass': 'test_pass', | |
187 | 'base_dn': 'test_base_dn', |
|
187 | 'base_dn': 'test_base_dn', | |
188 | 'filter': 'test_filter', |
|
188 | 'filter': 'test_filter', | |
189 | 'search_scope': 'BASE', |
|
189 | 'search_scope': 'BASE', | |
190 | 'attr_login': 'test_attr_login', |
|
190 | 'attr_login': 'test_attr_login', | |
191 | 'attr_firstname': 'ima', |
|
191 | 'attr_firstname': 'ima', | |
192 | 'attr_lastname': 'tester', |
|
192 | 'attr_lastname': 'tester', | |
193 | 'attr_email': 'test@example.com', |
|
193 | 'attr_email': 'test@example.com', | |
194 | 'cache_ttl': '60', |
|
194 | 'cache_ttl': '60', | |
195 | 'csrf_token': csrf_token, |
|
195 | 'csrf_token': csrf_token, | |
196 | } |
|
196 | } | |
197 | ) |
|
197 | ) | |
198 | assert_auth_settings_updated(response) |
|
198 | assert_auth_settings_updated(response) | |
199 |
|
199 | |||
200 | new_settings = SettingsModel().get_auth_settings() |
|
200 | new_settings = SettingsModel().get_auth_settings() | |
201 | assert new_settings['auth_ldap_host'] == u'dc-legacy.example.com', \ |
|
201 | assert new_settings['auth_ldap_host'] == u'dc-legacy.example.com', \ | |
202 | 'fail db write compare' |
|
202 | 'fail db write compare' |
@@ -1,512 +1,512 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import urllib |
|
21 | import urllib | |
22 |
|
22 | |||
23 | import mock |
|
23 | import mock | |
24 | import pytest |
|
24 | import pytest | |
25 |
|
25 | |||
26 | from rhodecode.apps._base import ADMIN_PREFIX |
|
26 | from rhodecode.apps._base import ADMIN_PREFIX | |
27 | from rhodecode.lib import auth |
|
27 | from rhodecode.lib import auth | |
28 | from rhodecode.lib.utils2 import safe_str |
|
28 | from rhodecode.lib.utils2 import safe_str | |
29 | from rhodecode.lib import helpers as h |
|
29 | from rhodecode.lib import helpers as h | |
30 | from rhodecode.model.db import ( |
|
30 | from rhodecode.model.db import ( | |
31 | Repository, RepoGroup, UserRepoToPerm, User, Permission) |
|
31 | Repository, RepoGroup, UserRepoToPerm, User, Permission) | |
32 | from rhodecode.model.meta import Session |
|
32 | from rhodecode.model.meta import Session | |
33 | from rhodecode.model.repo import RepoModel |
|
33 | from rhodecode.model.repo import RepoModel | |
34 | from rhodecode.model.repo_group import RepoGroupModel |
|
34 | from rhodecode.model.repo_group import RepoGroupModel | |
35 | from rhodecode.model.user import UserModel |
|
35 | from rhodecode.model.user import UserModel | |
36 | from rhodecode.tests import ( |
|
36 | from rhodecode.tests import ( | |
37 | login_user_session, assert_session_flash, TEST_USER_ADMIN_LOGIN, |
|
37 | login_user_session, assert_session_flash, TEST_USER_ADMIN_LOGIN, | |
38 | TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) |
|
38 | TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) | |
39 | from rhodecode.tests.fixture import Fixture, error_function |
|
39 | from rhodecode.tests.fixture import Fixture, error_function | |
40 | from rhodecode.tests.utils import AssertResponse, repo_on_filesystem |
|
40 | from rhodecode.tests.utils import AssertResponse, repo_on_filesystem | |
41 |
|
41 | |||
42 | fixture = Fixture() |
|
42 | fixture = Fixture() | |
43 |
|
43 | |||
44 |
|
44 | |||
45 | def route_path(name, params=None, **kwargs): |
|
45 | def route_path(name, params=None, **kwargs): | |
46 | import urllib |
|
46 | import urllib | |
47 |
|
47 | |||
48 | base_url = { |
|
48 | base_url = { | |
49 | 'repos': ADMIN_PREFIX + '/repos', |
|
49 | 'repos': ADMIN_PREFIX + '/repos', | |
50 | 'repo_new': ADMIN_PREFIX + '/repos/new', |
|
50 | 'repo_new': ADMIN_PREFIX + '/repos/new', | |
51 | 'repo_create': ADMIN_PREFIX + '/repos/create', |
|
51 | 'repo_create': ADMIN_PREFIX + '/repos/create', | |
52 |
|
52 | |||
53 | 'repo_creating_check': '/{repo_name}/repo_creating_check', |
|
53 | 'repo_creating_check': '/{repo_name}/repo_creating_check', | |
54 | }[name].format(**kwargs) |
|
54 | }[name].format(**kwargs) | |
55 |
|
55 | |||
56 | if params: |
|
56 | if params: | |
57 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) |
|
57 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) | |
58 | return base_url |
|
58 | return base_url | |
59 |
|
59 | |||
60 |
|
60 | |||
61 | def _get_permission_for_user(user, repo): |
|
61 | def _get_permission_for_user(user, repo): | |
62 | perm = UserRepoToPerm.query()\ |
|
62 | perm = UserRepoToPerm.query()\ | |
63 | .filter(UserRepoToPerm.repository == |
|
63 | .filter(UserRepoToPerm.repository == | |
64 | Repository.get_by_repo_name(repo))\ |
|
64 | Repository.get_by_repo_name(repo))\ | |
65 | .filter(UserRepoToPerm.user == User.get_by_username(user))\ |
|
65 | .filter(UserRepoToPerm.user == User.get_by_username(user))\ | |
66 | .all() |
|
66 | .all() | |
67 | return perm |
|
67 | return perm | |
68 |
|
68 | |||
69 |
|
69 | |||
70 | @pytest.mark.usefixtures("app") |
|
70 | @pytest.mark.usefixtures("app") | |
71 | class TestAdminRepos(object): |
|
71 | class TestAdminRepos(object): | |
72 |
|
72 | |||
73 | def test_repo_list(self, autologin_user, user_util): |
|
73 | def test_repo_list(self, autologin_user, user_util): | |
74 | repo = user_util.create_repo() |
|
74 | repo = user_util.create_repo() | |
75 | repo_name = repo.repo_name |
|
75 | repo_name = repo.repo_name | |
76 | response = self.app.get( |
|
76 | response = self.app.get( | |
77 | route_path('repos'), status=200) |
|
77 | route_path('repos'), status=200) | |
78 |
|
78 | |||
79 | response.mustcontain(repo_name) |
|
79 | response.mustcontain(repo_name) | |
80 |
|
80 | |||
81 | def test_create_page_restricted_to_single_backend(self, autologin_user, backend): |
|
81 | def test_create_page_restricted_to_single_backend(self, autologin_user, backend): | |
82 | with mock.patch('rhodecode.BACKENDS', {'git': 'git'}): |
|
82 | with mock.patch('rhodecode.BACKENDS', {'git': 'git'}): | |
83 | response = self.app.get(route_path('repo_new'), status=200) |
|
83 | response = self.app.get(route_path('repo_new'), status=200) | |
84 |
assert_response = |
|
84 | assert_response = response.assert_response() | |
85 | element = assert_response.get_element('#repo_type') |
|
85 | element = assert_response.get_element('#repo_type') | |
86 | assert element.text_content() == '\ngit\n' |
|
86 | assert element.text_content() == '\ngit\n' | |
87 |
|
87 | |||
88 | def test_create_page_non_restricted_backends(self, autologin_user, backend): |
|
88 | def test_create_page_non_restricted_backends(self, autologin_user, backend): | |
89 | response = self.app.get(route_path('repo_new'), status=200) |
|
89 | response = self.app.get(route_path('repo_new'), status=200) | |
90 |
assert_response = |
|
90 | assert_response = response.assert_response() | |
91 | assert_response.element_contains('#repo_type', 'git') |
|
91 | assert_response.element_contains('#repo_type', 'git') | |
92 | assert_response.element_contains('#repo_type', 'svn') |
|
92 | assert_response.element_contains('#repo_type', 'svn') | |
93 | assert_response.element_contains('#repo_type', 'hg') |
|
93 | assert_response.element_contains('#repo_type', 'hg') | |
94 |
|
94 | |||
95 | @pytest.mark.parametrize( |
|
95 | @pytest.mark.parametrize( | |
96 | "suffix", [u'', u'xxa'], ids=['', 'non-ascii']) |
|
96 | "suffix", [u'', u'xxa'], ids=['', 'non-ascii']) | |
97 | def test_create(self, autologin_user, backend, suffix, csrf_token): |
|
97 | def test_create(self, autologin_user, backend, suffix, csrf_token): | |
98 | repo_name_unicode = backend.new_repo_name(suffix=suffix) |
|
98 | repo_name_unicode = backend.new_repo_name(suffix=suffix) | |
99 | repo_name = repo_name_unicode.encode('utf8') |
|
99 | repo_name = repo_name_unicode.encode('utf8') | |
100 | description_unicode = u'description for newly created repo' + suffix |
|
100 | description_unicode = u'description for newly created repo' + suffix | |
101 | description = description_unicode.encode('utf8') |
|
101 | description = description_unicode.encode('utf8') | |
102 | response = self.app.post( |
|
102 | response = self.app.post( | |
103 | route_path('repo_create'), |
|
103 | route_path('repo_create'), | |
104 | fixture._get_repo_create_params( |
|
104 | fixture._get_repo_create_params( | |
105 | repo_private=False, |
|
105 | repo_private=False, | |
106 | repo_name=repo_name, |
|
106 | repo_name=repo_name, | |
107 | repo_type=backend.alias, |
|
107 | repo_type=backend.alias, | |
108 | repo_description=description, |
|
108 | repo_description=description, | |
109 | csrf_token=csrf_token), |
|
109 | csrf_token=csrf_token), | |
110 | status=302) |
|
110 | status=302) | |
111 |
|
111 | |||
112 | self.assert_repository_is_created_correctly( |
|
112 | self.assert_repository_is_created_correctly( | |
113 | repo_name, description, backend) |
|
113 | repo_name, description, backend) | |
114 |
|
114 | |||
115 | def test_create_numeric_name(self, autologin_user, backend, csrf_token): |
|
115 | def test_create_numeric_name(self, autologin_user, backend, csrf_token): | |
116 | numeric_repo = '1234' |
|
116 | numeric_repo = '1234' | |
117 | repo_name = numeric_repo |
|
117 | repo_name = numeric_repo | |
118 | description = 'description for newly created repo' + numeric_repo |
|
118 | description = 'description for newly created repo' + numeric_repo | |
119 | self.app.post( |
|
119 | self.app.post( | |
120 | route_path('repo_create'), |
|
120 | route_path('repo_create'), | |
121 | fixture._get_repo_create_params( |
|
121 | fixture._get_repo_create_params( | |
122 | repo_private=False, |
|
122 | repo_private=False, | |
123 | repo_name=repo_name, |
|
123 | repo_name=repo_name, | |
124 | repo_type=backend.alias, |
|
124 | repo_type=backend.alias, | |
125 | repo_description=description, |
|
125 | repo_description=description, | |
126 | csrf_token=csrf_token)) |
|
126 | csrf_token=csrf_token)) | |
127 |
|
127 | |||
128 | self.assert_repository_is_created_correctly( |
|
128 | self.assert_repository_is_created_correctly( | |
129 | repo_name, description, backend) |
|
129 | repo_name, description, backend) | |
130 |
|
130 | |||
131 | @pytest.mark.parametrize("suffix", [u'', u'ąćę'], ids=['', 'non-ascii']) |
|
131 | @pytest.mark.parametrize("suffix", [u'', u'ąćę'], ids=['', 'non-ascii']) | |
132 | def test_create_in_group( |
|
132 | def test_create_in_group( | |
133 | self, autologin_user, backend, suffix, csrf_token): |
|
133 | self, autologin_user, backend, suffix, csrf_token): | |
134 | # create GROUP |
|
134 | # create GROUP | |
135 | group_name = 'sometest_%s' % backend.alias |
|
135 | group_name = 'sometest_%s' % backend.alias | |
136 | gr = RepoGroupModel().create(group_name=group_name, |
|
136 | gr = RepoGroupModel().create(group_name=group_name, | |
137 | group_description='test', |
|
137 | group_description='test', | |
138 | owner=TEST_USER_ADMIN_LOGIN) |
|
138 | owner=TEST_USER_ADMIN_LOGIN) | |
139 | Session().commit() |
|
139 | Session().commit() | |
140 |
|
140 | |||
141 | repo_name = u'ingroup' + suffix |
|
141 | repo_name = u'ingroup' + suffix | |
142 | repo_name_full = RepoGroup.url_sep().join( |
|
142 | repo_name_full = RepoGroup.url_sep().join( | |
143 | [group_name, repo_name]) |
|
143 | [group_name, repo_name]) | |
144 | description = u'description for newly created repo' |
|
144 | description = u'description for newly created repo' | |
145 | self.app.post( |
|
145 | self.app.post( | |
146 | route_path('repo_create'), |
|
146 | route_path('repo_create'), | |
147 | fixture._get_repo_create_params( |
|
147 | fixture._get_repo_create_params( | |
148 | repo_private=False, |
|
148 | repo_private=False, | |
149 | repo_name=safe_str(repo_name), |
|
149 | repo_name=safe_str(repo_name), | |
150 | repo_type=backend.alias, |
|
150 | repo_type=backend.alias, | |
151 | repo_description=description, |
|
151 | repo_description=description, | |
152 | repo_group=gr.group_id, |
|
152 | repo_group=gr.group_id, | |
153 | csrf_token=csrf_token)) |
|
153 | csrf_token=csrf_token)) | |
154 |
|
154 | |||
155 | # TODO: johbo: Cleanup work to fixture |
|
155 | # TODO: johbo: Cleanup work to fixture | |
156 | try: |
|
156 | try: | |
157 | self.assert_repository_is_created_correctly( |
|
157 | self.assert_repository_is_created_correctly( | |
158 | repo_name_full, description, backend) |
|
158 | repo_name_full, description, backend) | |
159 |
|
159 | |||
160 | new_repo = RepoModel().get_by_repo_name(repo_name_full) |
|
160 | new_repo = RepoModel().get_by_repo_name(repo_name_full) | |
161 | inherited_perms = UserRepoToPerm.query().filter( |
|
161 | inherited_perms = UserRepoToPerm.query().filter( | |
162 | UserRepoToPerm.repository_id == new_repo.repo_id).all() |
|
162 | UserRepoToPerm.repository_id == new_repo.repo_id).all() | |
163 | assert len(inherited_perms) == 1 |
|
163 | assert len(inherited_perms) == 1 | |
164 | finally: |
|
164 | finally: | |
165 | RepoModel().delete(repo_name_full) |
|
165 | RepoModel().delete(repo_name_full) | |
166 | RepoGroupModel().delete(group_name) |
|
166 | RepoGroupModel().delete(group_name) | |
167 | Session().commit() |
|
167 | Session().commit() | |
168 |
|
168 | |||
169 | def test_create_in_group_numeric_name( |
|
169 | def test_create_in_group_numeric_name( | |
170 | self, autologin_user, backend, csrf_token): |
|
170 | self, autologin_user, backend, csrf_token): | |
171 | # create GROUP |
|
171 | # create GROUP | |
172 | group_name = 'sometest_%s' % backend.alias |
|
172 | group_name = 'sometest_%s' % backend.alias | |
173 | gr = RepoGroupModel().create(group_name=group_name, |
|
173 | gr = RepoGroupModel().create(group_name=group_name, | |
174 | group_description='test', |
|
174 | group_description='test', | |
175 | owner=TEST_USER_ADMIN_LOGIN) |
|
175 | owner=TEST_USER_ADMIN_LOGIN) | |
176 | Session().commit() |
|
176 | Session().commit() | |
177 |
|
177 | |||
178 | repo_name = '12345' |
|
178 | repo_name = '12345' | |
179 | repo_name_full = RepoGroup.url_sep().join([group_name, repo_name]) |
|
179 | repo_name_full = RepoGroup.url_sep().join([group_name, repo_name]) | |
180 | description = 'description for newly created repo' |
|
180 | description = 'description for newly created repo' | |
181 | self.app.post( |
|
181 | self.app.post( | |
182 | route_path('repo_create'), |
|
182 | route_path('repo_create'), | |
183 | fixture._get_repo_create_params( |
|
183 | fixture._get_repo_create_params( | |
184 | repo_private=False, |
|
184 | repo_private=False, | |
185 | repo_name=repo_name, |
|
185 | repo_name=repo_name, | |
186 | repo_type=backend.alias, |
|
186 | repo_type=backend.alias, | |
187 | repo_description=description, |
|
187 | repo_description=description, | |
188 | repo_group=gr.group_id, |
|
188 | repo_group=gr.group_id, | |
189 | csrf_token=csrf_token)) |
|
189 | csrf_token=csrf_token)) | |
190 |
|
190 | |||
191 | # TODO: johbo: Cleanup work to fixture |
|
191 | # TODO: johbo: Cleanup work to fixture | |
192 | try: |
|
192 | try: | |
193 | self.assert_repository_is_created_correctly( |
|
193 | self.assert_repository_is_created_correctly( | |
194 | repo_name_full, description, backend) |
|
194 | repo_name_full, description, backend) | |
195 |
|
195 | |||
196 | new_repo = RepoModel().get_by_repo_name(repo_name_full) |
|
196 | new_repo = RepoModel().get_by_repo_name(repo_name_full) | |
197 | inherited_perms = UserRepoToPerm.query()\ |
|
197 | inherited_perms = UserRepoToPerm.query()\ | |
198 | .filter(UserRepoToPerm.repository_id == new_repo.repo_id).all() |
|
198 | .filter(UserRepoToPerm.repository_id == new_repo.repo_id).all() | |
199 | assert len(inherited_perms) == 1 |
|
199 | assert len(inherited_perms) == 1 | |
200 | finally: |
|
200 | finally: | |
201 | RepoModel().delete(repo_name_full) |
|
201 | RepoModel().delete(repo_name_full) | |
202 | RepoGroupModel().delete(group_name) |
|
202 | RepoGroupModel().delete(group_name) | |
203 | Session().commit() |
|
203 | Session().commit() | |
204 |
|
204 | |||
205 | def test_create_in_group_without_needed_permissions(self, backend): |
|
205 | def test_create_in_group_without_needed_permissions(self, backend): | |
206 | session = login_user_session( |
|
206 | session = login_user_session( | |
207 | self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) |
|
207 | self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) | |
208 | csrf_token = auth.get_csrf_token(session) |
|
208 | csrf_token = auth.get_csrf_token(session) | |
209 | # revoke |
|
209 | # revoke | |
210 | user_model = UserModel() |
|
210 | user_model = UserModel() | |
211 | # disable fork and create on default user |
|
211 | # disable fork and create on default user | |
212 | user_model.revoke_perm(User.DEFAULT_USER, 'hg.create.repository') |
|
212 | user_model.revoke_perm(User.DEFAULT_USER, 'hg.create.repository') | |
213 | user_model.grant_perm(User.DEFAULT_USER, 'hg.create.none') |
|
213 | user_model.grant_perm(User.DEFAULT_USER, 'hg.create.none') | |
214 | user_model.revoke_perm(User.DEFAULT_USER, 'hg.fork.repository') |
|
214 | user_model.revoke_perm(User.DEFAULT_USER, 'hg.fork.repository') | |
215 | user_model.grant_perm(User.DEFAULT_USER, 'hg.fork.none') |
|
215 | user_model.grant_perm(User.DEFAULT_USER, 'hg.fork.none') | |
216 |
|
216 | |||
217 | # disable on regular user |
|
217 | # disable on regular user | |
218 | user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.repository') |
|
218 | user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.repository') | |
219 | user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.none') |
|
219 | user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.none') | |
220 | user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.repository') |
|
220 | user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.repository') | |
221 | user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.none') |
|
221 | user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.none') | |
222 | Session().commit() |
|
222 | Session().commit() | |
223 |
|
223 | |||
224 | # create GROUP |
|
224 | # create GROUP | |
225 | group_name = 'reg_sometest_%s' % backend.alias |
|
225 | group_name = 'reg_sometest_%s' % backend.alias | |
226 | gr = RepoGroupModel().create(group_name=group_name, |
|
226 | gr = RepoGroupModel().create(group_name=group_name, | |
227 | group_description='test', |
|
227 | group_description='test', | |
228 | owner=TEST_USER_ADMIN_LOGIN) |
|
228 | owner=TEST_USER_ADMIN_LOGIN) | |
229 | Session().commit() |
|
229 | Session().commit() | |
230 | repo_group_id = gr.group_id |
|
230 | repo_group_id = gr.group_id | |
231 |
|
231 | |||
232 | group_name_allowed = 'reg_sometest_allowed_%s' % backend.alias |
|
232 | group_name_allowed = 'reg_sometest_allowed_%s' % backend.alias | |
233 | gr_allowed = RepoGroupModel().create( |
|
233 | gr_allowed = RepoGroupModel().create( | |
234 | group_name=group_name_allowed, |
|
234 | group_name=group_name_allowed, | |
235 | group_description='test', |
|
235 | group_description='test', | |
236 | owner=TEST_USER_REGULAR_LOGIN) |
|
236 | owner=TEST_USER_REGULAR_LOGIN) | |
237 | allowed_repo_group_id = gr_allowed.group_id |
|
237 | allowed_repo_group_id = gr_allowed.group_id | |
238 | Session().commit() |
|
238 | Session().commit() | |
239 |
|
239 | |||
240 | repo_name = 'ingroup' |
|
240 | repo_name = 'ingroup' | |
241 | description = 'description for newly created repo' |
|
241 | description = 'description for newly created repo' | |
242 | response = self.app.post( |
|
242 | response = self.app.post( | |
243 | route_path('repo_create'), |
|
243 | route_path('repo_create'), | |
244 | fixture._get_repo_create_params( |
|
244 | fixture._get_repo_create_params( | |
245 | repo_private=False, |
|
245 | repo_private=False, | |
246 | repo_name=repo_name, |
|
246 | repo_name=repo_name, | |
247 | repo_type=backend.alias, |
|
247 | repo_type=backend.alias, | |
248 | repo_description=description, |
|
248 | repo_description=description, | |
249 | repo_group=repo_group_id, |
|
249 | repo_group=repo_group_id, | |
250 | csrf_token=csrf_token)) |
|
250 | csrf_token=csrf_token)) | |
251 |
|
251 | |||
252 | response.mustcontain('Invalid value') |
|
252 | response.mustcontain('Invalid value') | |
253 |
|
253 | |||
254 | # user is allowed to create in this group |
|
254 | # user is allowed to create in this group | |
255 | repo_name = 'ingroup' |
|
255 | repo_name = 'ingroup' | |
256 | repo_name_full = RepoGroup.url_sep().join( |
|
256 | repo_name_full = RepoGroup.url_sep().join( | |
257 | [group_name_allowed, repo_name]) |
|
257 | [group_name_allowed, repo_name]) | |
258 | description = 'description for newly created repo' |
|
258 | description = 'description for newly created repo' | |
259 | response = self.app.post( |
|
259 | response = self.app.post( | |
260 | route_path('repo_create'), |
|
260 | route_path('repo_create'), | |
261 | fixture._get_repo_create_params( |
|
261 | fixture._get_repo_create_params( | |
262 | repo_private=False, |
|
262 | repo_private=False, | |
263 | repo_name=repo_name, |
|
263 | repo_name=repo_name, | |
264 | repo_type=backend.alias, |
|
264 | repo_type=backend.alias, | |
265 | repo_description=description, |
|
265 | repo_description=description, | |
266 | repo_group=allowed_repo_group_id, |
|
266 | repo_group=allowed_repo_group_id, | |
267 | csrf_token=csrf_token)) |
|
267 | csrf_token=csrf_token)) | |
268 |
|
268 | |||
269 | # TODO: johbo: Cleanup in pytest fixture |
|
269 | # TODO: johbo: Cleanup in pytest fixture | |
270 | try: |
|
270 | try: | |
271 | self.assert_repository_is_created_correctly( |
|
271 | self.assert_repository_is_created_correctly( | |
272 | repo_name_full, description, backend) |
|
272 | repo_name_full, description, backend) | |
273 |
|
273 | |||
274 | new_repo = RepoModel().get_by_repo_name(repo_name_full) |
|
274 | new_repo = RepoModel().get_by_repo_name(repo_name_full) | |
275 | inherited_perms = UserRepoToPerm.query().filter( |
|
275 | inherited_perms = UserRepoToPerm.query().filter( | |
276 | UserRepoToPerm.repository_id == new_repo.repo_id).all() |
|
276 | UserRepoToPerm.repository_id == new_repo.repo_id).all() | |
277 | assert len(inherited_perms) == 1 |
|
277 | assert len(inherited_perms) == 1 | |
278 |
|
278 | |||
279 | assert repo_on_filesystem(repo_name_full) |
|
279 | assert repo_on_filesystem(repo_name_full) | |
280 | finally: |
|
280 | finally: | |
281 | RepoModel().delete(repo_name_full) |
|
281 | RepoModel().delete(repo_name_full) | |
282 | RepoGroupModel().delete(group_name) |
|
282 | RepoGroupModel().delete(group_name) | |
283 | RepoGroupModel().delete(group_name_allowed) |
|
283 | RepoGroupModel().delete(group_name_allowed) | |
284 | Session().commit() |
|
284 | Session().commit() | |
285 |
|
285 | |||
286 | def test_create_in_group_inherit_permissions(self, autologin_user, backend, |
|
286 | def test_create_in_group_inherit_permissions(self, autologin_user, backend, | |
287 | csrf_token): |
|
287 | csrf_token): | |
288 | # create GROUP |
|
288 | # create GROUP | |
289 | group_name = 'sometest_%s' % backend.alias |
|
289 | group_name = 'sometest_%s' % backend.alias | |
290 | gr = RepoGroupModel().create(group_name=group_name, |
|
290 | gr = RepoGroupModel().create(group_name=group_name, | |
291 | group_description='test', |
|
291 | group_description='test', | |
292 | owner=TEST_USER_ADMIN_LOGIN) |
|
292 | owner=TEST_USER_ADMIN_LOGIN) | |
293 | perm = Permission.get_by_key('repository.write') |
|
293 | perm = Permission.get_by_key('repository.write') | |
294 | RepoGroupModel().grant_user_permission( |
|
294 | RepoGroupModel().grant_user_permission( | |
295 | gr, TEST_USER_REGULAR_LOGIN, perm) |
|
295 | gr, TEST_USER_REGULAR_LOGIN, perm) | |
296 |
|
296 | |||
297 | # add repo permissions |
|
297 | # add repo permissions | |
298 | Session().commit() |
|
298 | Session().commit() | |
299 | repo_group_id = gr.group_id |
|
299 | repo_group_id = gr.group_id | |
300 | repo_name = 'ingroup_inherited_%s' % backend.alias |
|
300 | repo_name = 'ingroup_inherited_%s' % backend.alias | |
301 | repo_name_full = RepoGroup.url_sep().join([group_name, repo_name]) |
|
301 | repo_name_full = RepoGroup.url_sep().join([group_name, repo_name]) | |
302 | description = 'description for newly created repo' |
|
302 | description = 'description for newly created repo' | |
303 | self.app.post( |
|
303 | self.app.post( | |
304 | route_path('repo_create'), |
|
304 | route_path('repo_create'), | |
305 | fixture._get_repo_create_params( |
|
305 | fixture._get_repo_create_params( | |
306 | repo_private=False, |
|
306 | repo_private=False, | |
307 | repo_name=repo_name, |
|
307 | repo_name=repo_name, | |
308 | repo_type=backend.alias, |
|
308 | repo_type=backend.alias, | |
309 | repo_description=description, |
|
309 | repo_description=description, | |
310 | repo_group=repo_group_id, |
|
310 | repo_group=repo_group_id, | |
311 | repo_copy_permissions=True, |
|
311 | repo_copy_permissions=True, | |
312 | csrf_token=csrf_token)) |
|
312 | csrf_token=csrf_token)) | |
313 |
|
313 | |||
314 | # TODO: johbo: Cleanup to pytest fixture |
|
314 | # TODO: johbo: Cleanup to pytest fixture | |
315 | try: |
|
315 | try: | |
316 | self.assert_repository_is_created_correctly( |
|
316 | self.assert_repository_is_created_correctly( | |
317 | repo_name_full, description, backend) |
|
317 | repo_name_full, description, backend) | |
318 | except Exception: |
|
318 | except Exception: | |
319 | RepoGroupModel().delete(group_name) |
|
319 | RepoGroupModel().delete(group_name) | |
320 | Session().commit() |
|
320 | Session().commit() | |
321 | raise |
|
321 | raise | |
322 |
|
322 | |||
323 | # check if inherited permissions are applied |
|
323 | # check if inherited permissions are applied | |
324 | new_repo = RepoModel().get_by_repo_name(repo_name_full) |
|
324 | new_repo = RepoModel().get_by_repo_name(repo_name_full) | |
325 | inherited_perms = UserRepoToPerm.query().filter( |
|
325 | inherited_perms = UserRepoToPerm.query().filter( | |
326 | UserRepoToPerm.repository_id == new_repo.repo_id).all() |
|
326 | UserRepoToPerm.repository_id == new_repo.repo_id).all() | |
327 | assert len(inherited_perms) == 2 |
|
327 | assert len(inherited_perms) == 2 | |
328 |
|
328 | |||
329 | assert TEST_USER_REGULAR_LOGIN in [ |
|
329 | assert TEST_USER_REGULAR_LOGIN in [ | |
330 | x.user.username for x in inherited_perms] |
|
330 | x.user.username for x in inherited_perms] | |
331 | assert 'repository.write' in [ |
|
331 | assert 'repository.write' in [ | |
332 | x.permission.permission_name for x in inherited_perms] |
|
332 | x.permission.permission_name for x in inherited_perms] | |
333 |
|
333 | |||
334 | RepoModel().delete(repo_name_full) |
|
334 | RepoModel().delete(repo_name_full) | |
335 | RepoGroupModel().delete(group_name) |
|
335 | RepoGroupModel().delete(group_name) | |
336 | Session().commit() |
|
336 | Session().commit() | |
337 |
|
337 | |||
338 | @pytest.mark.xfail_backends( |
|
338 | @pytest.mark.xfail_backends( | |
339 | "git", "hg", reason="Missing reposerver support") |
|
339 | "git", "hg", reason="Missing reposerver support") | |
340 | def test_create_with_clone_uri(self, autologin_user, backend, reposerver, |
|
340 | def test_create_with_clone_uri(self, autologin_user, backend, reposerver, | |
341 | csrf_token): |
|
341 | csrf_token): | |
342 | source_repo = backend.create_repo(number_of_commits=2) |
|
342 | source_repo = backend.create_repo(number_of_commits=2) | |
343 | source_repo_name = source_repo.repo_name |
|
343 | source_repo_name = source_repo.repo_name | |
344 | reposerver.serve(source_repo.scm_instance()) |
|
344 | reposerver.serve(source_repo.scm_instance()) | |
345 |
|
345 | |||
346 | repo_name = backend.new_repo_name() |
|
346 | repo_name = backend.new_repo_name() | |
347 | response = self.app.post( |
|
347 | response = self.app.post( | |
348 | route_path('repo_create'), |
|
348 | route_path('repo_create'), | |
349 | fixture._get_repo_create_params( |
|
349 | fixture._get_repo_create_params( | |
350 | repo_private=False, |
|
350 | repo_private=False, | |
351 | repo_name=repo_name, |
|
351 | repo_name=repo_name, | |
352 | repo_type=backend.alias, |
|
352 | repo_type=backend.alias, | |
353 | repo_description='', |
|
353 | repo_description='', | |
354 | clone_uri=reposerver.url, |
|
354 | clone_uri=reposerver.url, | |
355 | csrf_token=csrf_token), |
|
355 | csrf_token=csrf_token), | |
356 | status=302) |
|
356 | status=302) | |
357 |
|
357 | |||
358 | # Should be redirected to the creating page |
|
358 | # Should be redirected to the creating page | |
359 | response.mustcontain('repo_creating') |
|
359 | response.mustcontain('repo_creating') | |
360 |
|
360 | |||
361 | # Expecting that both repositories have same history |
|
361 | # Expecting that both repositories have same history | |
362 | source_repo = RepoModel().get_by_repo_name(source_repo_name) |
|
362 | source_repo = RepoModel().get_by_repo_name(source_repo_name) | |
363 | source_vcs = source_repo.scm_instance() |
|
363 | source_vcs = source_repo.scm_instance() | |
364 | repo = RepoModel().get_by_repo_name(repo_name) |
|
364 | repo = RepoModel().get_by_repo_name(repo_name) | |
365 | repo_vcs = repo.scm_instance() |
|
365 | repo_vcs = repo.scm_instance() | |
366 | assert source_vcs[0].message == repo_vcs[0].message |
|
366 | assert source_vcs[0].message == repo_vcs[0].message | |
367 | assert source_vcs.count() == repo_vcs.count() |
|
367 | assert source_vcs.count() == repo_vcs.count() | |
368 | assert source_vcs.commit_ids == repo_vcs.commit_ids |
|
368 | assert source_vcs.commit_ids == repo_vcs.commit_ids | |
369 |
|
369 | |||
370 | @pytest.mark.xfail_backends("svn", reason="Depends on import support") |
|
370 | @pytest.mark.xfail_backends("svn", reason="Depends on import support") | |
371 | def test_create_remote_repo_wrong_clone_uri(self, autologin_user, backend, |
|
371 | def test_create_remote_repo_wrong_clone_uri(self, autologin_user, backend, | |
372 | csrf_token): |
|
372 | csrf_token): | |
373 | repo_name = backend.new_repo_name() |
|
373 | repo_name = backend.new_repo_name() | |
374 | description = 'description for newly created repo' |
|
374 | description = 'description for newly created repo' | |
375 | response = self.app.post( |
|
375 | response = self.app.post( | |
376 | route_path('repo_create'), |
|
376 | route_path('repo_create'), | |
377 | fixture._get_repo_create_params( |
|
377 | fixture._get_repo_create_params( | |
378 | repo_private=False, |
|
378 | repo_private=False, | |
379 | repo_name=repo_name, |
|
379 | repo_name=repo_name, | |
380 | repo_type=backend.alias, |
|
380 | repo_type=backend.alias, | |
381 | repo_description=description, |
|
381 | repo_description=description, | |
382 | clone_uri='http://repo.invalid/repo', |
|
382 | clone_uri='http://repo.invalid/repo', | |
383 | csrf_token=csrf_token)) |
|
383 | csrf_token=csrf_token)) | |
384 | response.mustcontain('invalid clone url') |
|
384 | response.mustcontain('invalid clone url') | |
385 |
|
385 | |||
386 | @pytest.mark.xfail_backends("svn", reason="Depends on import support") |
|
386 | @pytest.mark.xfail_backends("svn", reason="Depends on import support") | |
387 | def test_create_remote_repo_wrong_clone_uri_hg_svn( |
|
387 | def test_create_remote_repo_wrong_clone_uri_hg_svn( | |
388 | self, autologin_user, backend, csrf_token): |
|
388 | self, autologin_user, backend, csrf_token): | |
389 | repo_name = backend.new_repo_name() |
|
389 | repo_name = backend.new_repo_name() | |
390 | description = 'description for newly created repo' |
|
390 | description = 'description for newly created repo' | |
391 | response = self.app.post( |
|
391 | response = self.app.post( | |
392 | route_path('repo_create'), |
|
392 | route_path('repo_create'), | |
393 | fixture._get_repo_create_params( |
|
393 | fixture._get_repo_create_params( | |
394 | repo_private=False, |
|
394 | repo_private=False, | |
395 | repo_name=repo_name, |
|
395 | repo_name=repo_name, | |
396 | repo_type=backend.alias, |
|
396 | repo_type=backend.alias, | |
397 | repo_description=description, |
|
397 | repo_description=description, | |
398 | clone_uri='svn+http://svn.invalid/repo', |
|
398 | clone_uri='svn+http://svn.invalid/repo', | |
399 | csrf_token=csrf_token)) |
|
399 | csrf_token=csrf_token)) | |
400 | response.mustcontain('invalid clone url') |
|
400 | response.mustcontain('invalid clone url') | |
401 |
|
401 | |||
402 | def test_create_with_git_suffix( |
|
402 | def test_create_with_git_suffix( | |
403 | self, autologin_user, backend, csrf_token): |
|
403 | self, autologin_user, backend, csrf_token): | |
404 | repo_name = backend.new_repo_name() + ".git" |
|
404 | repo_name = backend.new_repo_name() + ".git" | |
405 | description = 'description for newly created repo' |
|
405 | description = 'description for newly created repo' | |
406 | response = self.app.post( |
|
406 | response = self.app.post( | |
407 | route_path('repo_create'), |
|
407 | route_path('repo_create'), | |
408 | fixture._get_repo_create_params( |
|
408 | fixture._get_repo_create_params( | |
409 | repo_private=False, |
|
409 | repo_private=False, | |
410 | repo_name=repo_name, |
|
410 | repo_name=repo_name, | |
411 | repo_type=backend.alias, |
|
411 | repo_type=backend.alias, | |
412 | repo_description=description, |
|
412 | repo_description=description, | |
413 | csrf_token=csrf_token)) |
|
413 | csrf_token=csrf_token)) | |
414 | response.mustcontain('Repository name cannot end with .git') |
|
414 | response.mustcontain('Repository name cannot end with .git') | |
415 |
|
415 | |||
416 | def test_default_user_cannot_access_private_repo_in_a_group( |
|
416 | def test_default_user_cannot_access_private_repo_in_a_group( | |
417 | self, autologin_user, user_util, backend): |
|
417 | self, autologin_user, user_util, backend): | |
418 |
|
418 | |||
419 | group = user_util.create_repo_group() |
|
419 | group = user_util.create_repo_group() | |
420 |
|
420 | |||
421 | repo = backend.create_repo( |
|
421 | repo = backend.create_repo( | |
422 | repo_private=True, repo_group=group, repo_copy_permissions=True) |
|
422 | repo_private=True, repo_group=group, repo_copy_permissions=True) | |
423 |
|
423 | |||
424 | permissions = _get_permission_for_user( |
|
424 | permissions = _get_permission_for_user( | |
425 | user='default', repo=repo.repo_name) |
|
425 | user='default', repo=repo.repo_name) | |
426 | assert len(permissions) == 1 |
|
426 | assert len(permissions) == 1 | |
427 | assert permissions[0].permission.permission_name == 'repository.none' |
|
427 | assert permissions[0].permission.permission_name == 'repository.none' | |
428 | assert permissions[0].repository.private is True |
|
428 | assert permissions[0].repository.private is True | |
429 |
|
429 | |||
430 | def test_create_on_top_level_without_permissions(self, backend): |
|
430 | def test_create_on_top_level_without_permissions(self, backend): | |
431 | session = login_user_session( |
|
431 | session = login_user_session( | |
432 | self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) |
|
432 | self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) | |
433 | csrf_token = auth.get_csrf_token(session) |
|
433 | csrf_token = auth.get_csrf_token(session) | |
434 |
|
434 | |||
435 | # revoke |
|
435 | # revoke | |
436 | user_model = UserModel() |
|
436 | user_model = UserModel() | |
437 | # disable fork and create on default user |
|
437 | # disable fork and create on default user | |
438 | user_model.revoke_perm(User.DEFAULT_USER, 'hg.create.repository') |
|
438 | user_model.revoke_perm(User.DEFAULT_USER, 'hg.create.repository') | |
439 | user_model.grant_perm(User.DEFAULT_USER, 'hg.create.none') |
|
439 | user_model.grant_perm(User.DEFAULT_USER, 'hg.create.none') | |
440 | user_model.revoke_perm(User.DEFAULT_USER, 'hg.fork.repository') |
|
440 | user_model.revoke_perm(User.DEFAULT_USER, 'hg.fork.repository') | |
441 | user_model.grant_perm(User.DEFAULT_USER, 'hg.fork.none') |
|
441 | user_model.grant_perm(User.DEFAULT_USER, 'hg.fork.none') | |
442 |
|
442 | |||
443 | # disable on regular user |
|
443 | # disable on regular user | |
444 | user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.repository') |
|
444 | user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.repository') | |
445 | user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.none') |
|
445 | user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.none') | |
446 | user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.repository') |
|
446 | user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.repository') | |
447 | user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.none') |
|
447 | user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.none') | |
448 | Session().commit() |
|
448 | Session().commit() | |
449 |
|
449 | |||
450 | repo_name = backend.new_repo_name() |
|
450 | repo_name = backend.new_repo_name() | |
451 | description = 'description for newly created repo' |
|
451 | description = 'description for newly created repo' | |
452 | response = self.app.post( |
|
452 | response = self.app.post( | |
453 | route_path('repo_create'), |
|
453 | route_path('repo_create'), | |
454 | fixture._get_repo_create_params( |
|
454 | fixture._get_repo_create_params( | |
455 | repo_private=False, |
|
455 | repo_private=False, | |
456 | repo_name=repo_name, |
|
456 | repo_name=repo_name, | |
457 | repo_type=backend.alias, |
|
457 | repo_type=backend.alias, | |
458 | repo_description=description, |
|
458 | repo_description=description, | |
459 | csrf_token=csrf_token)) |
|
459 | csrf_token=csrf_token)) | |
460 |
|
460 | |||
461 | response.mustcontain( |
|
461 | response.mustcontain( | |
462 | u"You do not have the permission to store repositories in " |
|
462 | u"You do not have the permission to store repositories in " | |
463 | u"the root location.") |
|
463 | u"the root location.") | |
464 |
|
464 | |||
465 | @mock.patch.object(RepoModel, '_create_filesystem_repo', error_function) |
|
465 | @mock.patch.object(RepoModel, '_create_filesystem_repo', error_function) | |
466 | def test_create_repo_when_filesystem_op_fails( |
|
466 | def test_create_repo_when_filesystem_op_fails( | |
467 | self, autologin_user, backend, csrf_token): |
|
467 | self, autologin_user, backend, csrf_token): | |
468 | repo_name = backend.new_repo_name() |
|
468 | repo_name = backend.new_repo_name() | |
469 | description = 'description for newly created repo' |
|
469 | description = 'description for newly created repo' | |
470 |
|
470 | |||
471 | response = self.app.post( |
|
471 | response = self.app.post( | |
472 | route_path('repo_create'), |
|
472 | route_path('repo_create'), | |
473 | fixture._get_repo_create_params( |
|
473 | fixture._get_repo_create_params( | |
474 | repo_private=False, |
|
474 | repo_private=False, | |
475 | repo_name=repo_name, |
|
475 | repo_name=repo_name, | |
476 | repo_type=backend.alias, |
|
476 | repo_type=backend.alias, | |
477 | repo_description=description, |
|
477 | repo_description=description, | |
478 | csrf_token=csrf_token)) |
|
478 | csrf_token=csrf_token)) | |
479 |
|
479 | |||
480 | assert_session_flash( |
|
480 | assert_session_flash( | |
481 | response, 'Error creating repository %s' % repo_name) |
|
481 | response, 'Error creating repository %s' % repo_name) | |
482 | # repo must not be in db |
|
482 | # repo must not be in db | |
483 | assert backend.repo is None |
|
483 | assert backend.repo is None | |
484 | # repo must not be in filesystem ! |
|
484 | # repo must not be in filesystem ! | |
485 | assert not repo_on_filesystem(repo_name) |
|
485 | assert not repo_on_filesystem(repo_name) | |
486 |
|
486 | |||
487 | def assert_repository_is_created_correctly( |
|
487 | def assert_repository_is_created_correctly( | |
488 | self, repo_name, description, backend): |
|
488 | self, repo_name, description, backend): | |
489 | repo_name_utf8 = safe_str(repo_name) |
|
489 | repo_name_utf8 = safe_str(repo_name) | |
490 |
|
490 | |||
491 | # run the check page that triggers the flash message |
|
491 | # run the check page that triggers the flash message | |
492 | response = self.app.get( |
|
492 | response = self.app.get( | |
493 | route_path('repo_creating_check', repo_name=safe_str(repo_name))) |
|
493 | route_path('repo_creating_check', repo_name=safe_str(repo_name))) | |
494 | assert response.json == {u'result': True} |
|
494 | assert response.json == {u'result': True} | |
495 |
|
495 | |||
496 | flash_msg = u'Created repository <a href="/{}">{}</a>'.format( |
|
496 | flash_msg = u'Created repository <a href="/{}">{}</a>'.format( | |
497 | urllib.quote(repo_name_utf8), repo_name) |
|
497 | urllib.quote(repo_name_utf8), repo_name) | |
498 | assert_session_flash(response, flash_msg) |
|
498 | assert_session_flash(response, flash_msg) | |
499 |
|
499 | |||
500 | # test if the repo was created in the database |
|
500 | # test if the repo was created in the database | |
501 | new_repo = RepoModel().get_by_repo_name(repo_name) |
|
501 | new_repo = RepoModel().get_by_repo_name(repo_name) | |
502 |
|
502 | |||
503 | assert new_repo.repo_name == repo_name |
|
503 | assert new_repo.repo_name == repo_name | |
504 | assert new_repo.description == description |
|
504 | assert new_repo.description == description | |
505 |
|
505 | |||
506 | # test if the repository is visible in the list ? |
|
506 | # test if the repository is visible in the list ? | |
507 | response = self.app.get( |
|
507 | response = self.app.get( | |
508 | h.route_path('repo_summary', repo_name=safe_str(repo_name))) |
|
508 | h.route_path('repo_summary', repo_name=safe_str(repo_name))) | |
509 | response.mustcontain(repo_name) |
|
509 | response.mustcontain(repo_name) | |
510 | response.mustcontain(backend.alias) |
|
510 | response.mustcontain(backend.alias) | |
511 |
|
511 | |||
512 | assert repo_on_filesystem(repo_name) |
|
512 | assert repo_on_filesystem(repo_name) |
@@ -1,743 +1,743 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import mock |
|
21 | import mock | |
22 | import pytest |
|
22 | import pytest | |
23 |
|
23 | |||
24 | import rhodecode |
|
24 | import rhodecode | |
25 | from rhodecode.apps._base import ADMIN_PREFIX |
|
25 | from rhodecode.apps._base import ADMIN_PREFIX | |
26 | from rhodecode.lib.utils2 import md5 |
|
26 | from rhodecode.lib.utils2 import md5 | |
27 | from rhodecode.model.db import RhodeCodeUi |
|
27 | from rhodecode.model.db import RhodeCodeUi | |
28 | from rhodecode.model.meta import Session |
|
28 | from rhodecode.model.meta import Session | |
29 | from rhodecode.model.settings import SettingsModel, IssueTrackerSettingsModel |
|
29 | from rhodecode.model.settings import SettingsModel, IssueTrackerSettingsModel | |
30 | from rhodecode.tests import assert_session_flash |
|
30 | from rhodecode.tests import assert_session_flash | |
31 | from rhodecode.tests.utils import AssertResponse |
|
31 | from rhodecode.tests.utils import AssertResponse | |
32 |
|
32 | |||
33 |
|
33 | |||
34 | UPDATE_DATA_QUALNAME = 'rhodecode.model.update.UpdateModel.get_update_data' |
|
34 | UPDATE_DATA_QUALNAME = 'rhodecode.model.update.UpdateModel.get_update_data' | |
35 |
|
35 | |||
36 |
|
36 | |||
37 | def route_path(name, params=None, **kwargs): |
|
37 | def route_path(name, params=None, **kwargs): | |
38 | import urllib |
|
38 | import urllib | |
39 | from rhodecode.apps._base import ADMIN_PREFIX |
|
39 | from rhodecode.apps._base import ADMIN_PREFIX | |
40 |
|
40 | |||
41 | base_url = { |
|
41 | base_url = { | |
42 |
|
42 | |||
43 | 'admin_settings': |
|
43 | 'admin_settings': | |
44 | ADMIN_PREFIX +'/settings', |
|
44 | ADMIN_PREFIX +'/settings', | |
45 | 'admin_settings_update': |
|
45 | 'admin_settings_update': | |
46 | ADMIN_PREFIX + '/settings/update', |
|
46 | ADMIN_PREFIX + '/settings/update', | |
47 | 'admin_settings_global': |
|
47 | 'admin_settings_global': | |
48 | ADMIN_PREFIX + '/settings/global', |
|
48 | ADMIN_PREFIX + '/settings/global', | |
49 | 'admin_settings_global_update': |
|
49 | 'admin_settings_global_update': | |
50 | ADMIN_PREFIX + '/settings/global/update', |
|
50 | ADMIN_PREFIX + '/settings/global/update', | |
51 | 'admin_settings_vcs': |
|
51 | 'admin_settings_vcs': | |
52 | ADMIN_PREFIX + '/settings/vcs', |
|
52 | ADMIN_PREFIX + '/settings/vcs', | |
53 | 'admin_settings_vcs_update': |
|
53 | 'admin_settings_vcs_update': | |
54 | ADMIN_PREFIX + '/settings/vcs/update', |
|
54 | ADMIN_PREFIX + '/settings/vcs/update', | |
55 | 'admin_settings_vcs_svn_pattern_delete': |
|
55 | 'admin_settings_vcs_svn_pattern_delete': | |
56 | ADMIN_PREFIX + '/settings/vcs/svn_pattern_delete', |
|
56 | ADMIN_PREFIX + '/settings/vcs/svn_pattern_delete', | |
57 | 'admin_settings_mapping': |
|
57 | 'admin_settings_mapping': | |
58 | ADMIN_PREFIX + '/settings/mapping', |
|
58 | ADMIN_PREFIX + '/settings/mapping', | |
59 | 'admin_settings_mapping_update': |
|
59 | 'admin_settings_mapping_update': | |
60 | ADMIN_PREFIX + '/settings/mapping/update', |
|
60 | ADMIN_PREFIX + '/settings/mapping/update', | |
61 | 'admin_settings_visual': |
|
61 | 'admin_settings_visual': | |
62 | ADMIN_PREFIX + '/settings/visual', |
|
62 | ADMIN_PREFIX + '/settings/visual', | |
63 | 'admin_settings_visual_update': |
|
63 | 'admin_settings_visual_update': | |
64 | ADMIN_PREFIX + '/settings/visual/update', |
|
64 | ADMIN_PREFIX + '/settings/visual/update', | |
65 | 'admin_settings_issuetracker': |
|
65 | 'admin_settings_issuetracker': | |
66 | ADMIN_PREFIX + '/settings/issue-tracker', |
|
66 | ADMIN_PREFIX + '/settings/issue-tracker', | |
67 | 'admin_settings_issuetracker_update': |
|
67 | 'admin_settings_issuetracker_update': | |
68 | ADMIN_PREFIX + '/settings/issue-tracker/update', |
|
68 | ADMIN_PREFIX + '/settings/issue-tracker/update', | |
69 | 'admin_settings_issuetracker_test': |
|
69 | 'admin_settings_issuetracker_test': | |
70 | ADMIN_PREFIX + '/settings/issue-tracker/test', |
|
70 | ADMIN_PREFIX + '/settings/issue-tracker/test', | |
71 | 'admin_settings_issuetracker_delete': |
|
71 | 'admin_settings_issuetracker_delete': | |
72 | ADMIN_PREFIX + '/settings/issue-tracker/delete', |
|
72 | ADMIN_PREFIX + '/settings/issue-tracker/delete', | |
73 | 'admin_settings_email': |
|
73 | 'admin_settings_email': | |
74 | ADMIN_PREFIX + '/settings/email', |
|
74 | ADMIN_PREFIX + '/settings/email', | |
75 | 'admin_settings_email_update': |
|
75 | 'admin_settings_email_update': | |
76 | ADMIN_PREFIX + '/settings/email/update', |
|
76 | ADMIN_PREFIX + '/settings/email/update', | |
77 | 'admin_settings_hooks': |
|
77 | 'admin_settings_hooks': | |
78 | ADMIN_PREFIX + '/settings/hooks', |
|
78 | ADMIN_PREFIX + '/settings/hooks', | |
79 | 'admin_settings_hooks_update': |
|
79 | 'admin_settings_hooks_update': | |
80 | ADMIN_PREFIX + '/settings/hooks/update', |
|
80 | ADMIN_PREFIX + '/settings/hooks/update', | |
81 | 'admin_settings_hooks_delete': |
|
81 | 'admin_settings_hooks_delete': | |
82 | ADMIN_PREFIX + '/settings/hooks/delete', |
|
82 | ADMIN_PREFIX + '/settings/hooks/delete', | |
83 | 'admin_settings_search': |
|
83 | 'admin_settings_search': | |
84 | ADMIN_PREFIX + '/settings/search', |
|
84 | ADMIN_PREFIX + '/settings/search', | |
85 | 'admin_settings_labs': |
|
85 | 'admin_settings_labs': | |
86 | ADMIN_PREFIX + '/settings/labs', |
|
86 | ADMIN_PREFIX + '/settings/labs', | |
87 | 'admin_settings_labs_update': |
|
87 | 'admin_settings_labs_update': | |
88 | ADMIN_PREFIX + '/settings/labs/update', |
|
88 | ADMIN_PREFIX + '/settings/labs/update', | |
89 |
|
89 | |||
90 | 'admin_settings_sessions': |
|
90 | 'admin_settings_sessions': | |
91 | ADMIN_PREFIX + '/settings/sessions', |
|
91 | ADMIN_PREFIX + '/settings/sessions', | |
92 | 'admin_settings_sessions_cleanup': |
|
92 | 'admin_settings_sessions_cleanup': | |
93 | ADMIN_PREFIX + '/settings/sessions/cleanup', |
|
93 | ADMIN_PREFIX + '/settings/sessions/cleanup', | |
94 | 'admin_settings_system': |
|
94 | 'admin_settings_system': | |
95 | ADMIN_PREFIX + '/settings/system', |
|
95 | ADMIN_PREFIX + '/settings/system', | |
96 | 'admin_settings_system_update': |
|
96 | 'admin_settings_system_update': | |
97 | ADMIN_PREFIX + '/settings/system/updates', |
|
97 | ADMIN_PREFIX + '/settings/system/updates', | |
98 | 'admin_settings_open_source': |
|
98 | 'admin_settings_open_source': | |
99 | ADMIN_PREFIX + '/settings/open_source', |
|
99 | ADMIN_PREFIX + '/settings/open_source', | |
100 |
|
100 | |||
101 |
|
101 | |||
102 | }[name].format(**kwargs) |
|
102 | }[name].format(**kwargs) | |
103 |
|
103 | |||
104 | if params: |
|
104 | if params: | |
105 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) |
|
105 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) | |
106 | return base_url |
|
106 | return base_url | |
107 |
|
107 | |||
108 |
|
108 | |||
109 | @pytest.mark.usefixtures('autologin_user', 'app') |
|
109 | @pytest.mark.usefixtures('autologin_user', 'app') | |
110 | class TestAdminSettingsController(object): |
|
110 | class TestAdminSettingsController(object): | |
111 |
|
111 | |||
112 | @pytest.mark.parametrize('urlname', [ |
|
112 | @pytest.mark.parametrize('urlname', [ | |
113 | 'admin_settings_vcs', |
|
113 | 'admin_settings_vcs', | |
114 | 'admin_settings_mapping', |
|
114 | 'admin_settings_mapping', | |
115 | 'admin_settings_global', |
|
115 | 'admin_settings_global', | |
116 | 'admin_settings_visual', |
|
116 | 'admin_settings_visual', | |
117 | 'admin_settings_email', |
|
117 | 'admin_settings_email', | |
118 | 'admin_settings_hooks', |
|
118 | 'admin_settings_hooks', | |
119 | 'admin_settings_search', |
|
119 | 'admin_settings_search', | |
120 | ]) |
|
120 | ]) | |
121 | def test_simple_get(self, urlname): |
|
121 | def test_simple_get(self, urlname): | |
122 | self.app.get(route_path(urlname)) |
|
122 | self.app.get(route_path(urlname)) | |
123 |
|
123 | |||
124 | def test_create_custom_hook(self, csrf_token): |
|
124 | def test_create_custom_hook(self, csrf_token): | |
125 | response = self.app.post( |
|
125 | response = self.app.post( | |
126 | route_path('admin_settings_hooks_update'), |
|
126 | route_path('admin_settings_hooks_update'), | |
127 | params={ |
|
127 | params={ | |
128 | 'new_hook_ui_key': 'test_hooks_1', |
|
128 | 'new_hook_ui_key': 'test_hooks_1', | |
129 | 'new_hook_ui_value': 'cd /tmp', |
|
129 | 'new_hook_ui_value': 'cd /tmp', | |
130 | 'csrf_token': csrf_token}) |
|
130 | 'csrf_token': csrf_token}) | |
131 |
|
131 | |||
132 | response = response.follow() |
|
132 | response = response.follow() | |
133 | response.mustcontain('test_hooks_1') |
|
133 | response.mustcontain('test_hooks_1') | |
134 | response.mustcontain('cd /tmp') |
|
134 | response.mustcontain('cd /tmp') | |
135 |
|
135 | |||
136 | def test_create_custom_hook_delete(self, csrf_token): |
|
136 | def test_create_custom_hook_delete(self, csrf_token): | |
137 | response = self.app.post( |
|
137 | response = self.app.post( | |
138 | route_path('admin_settings_hooks_update'), |
|
138 | route_path('admin_settings_hooks_update'), | |
139 | params={ |
|
139 | params={ | |
140 | 'new_hook_ui_key': 'test_hooks_2', |
|
140 | 'new_hook_ui_key': 'test_hooks_2', | |
141 | 'new_hook_ui_value': 'cd /tmp2', |
|
141 | 'new_hook_ui_value': 'cd /tmp2', | |
142 | 'csrf_token': csrf_token}) |
|
142 | 'csrf_token': csrf_token}) | |
143 |
|
143 | |||
144 | response = response.follow() |
|
144 | response = response.follow() | |
145 | response.mustcontain('test_hooks_2') |
|
145 | response.mustcontain('test_hooks_2') | |
146 | response.mustcontain('cd /tmp2') |
|
146 | response.mustcontain('cd /tmp2') | |
147 |
|
147 | |||
148 | hook_id = SettingsModel().get_ui_by_key('test_hooks_2').ui_id |
|
148 | hook_id = SettingsModel().get_ui_by_key('test_hooks_2').ui_id | |
149 |
|
149 | |||
150 | # delete |
|
150 | # delete | |
151 | self.app.post( |
|
151 | self.app.post( | |
152 | route_path('admin_settings_hooks_delete'), |
|
152 | route_path('admin_settings_hooks_delete'), | |
153 | params={'hook_id': hook_id, 'csrf_token': csrf_token}) |
|
153 | params={'hook_id': hook_id, 'csrf_token': csrf_token}) | |
154 | response = self.app.get(route_path('admin_settings_hooks')) |
|
154 | response = self.app.get(route_path('admin_settings_hooks')) | |
155 | response.mustcontain(no=['test_hooks_2']) |
|
155 | response.mustcontain(no=['test_hooks_2']) | |
156 | response.mustcontain(no=['cd /tmp2']) |
|
156 | response.mustcontain(no=['cd /tmp2']) | |
157 |
|
157 | |||
158 |
|
158 | |||
159 | @pytest.mark.usefixtures('autologin_user', 'app') |
|
159 | @pytest.mark.usefixtures('autologin_user', 'app') | |
160 | class TestAdminSettingsGlobal(object): |
|
160 | class TestAdminSettingsGlobal(object): | |
161 |
|
161 | |||
162 | def test_pre_post_code_code_active(self, csrf_token): |
|
162 | def test_pre_post_code_code_active(self, csrf_token): | |
163 | pre_code = 'rc-pre-code-187652122' |
|
163 | pre_code = 'rc-pre-code-187652122' | |
164 | post_code = 'rc-postcode-98165231' |
|
164 | post_code = 'rc-postcode-98165231' | |
165 |
|
165 | |||
166 | response = self.post_and_verify_settings({ |
|
166 | response = self.post_and_verify_settings({ | |
167 | 'rhodecode_pre_code': pre_code, |
|
167 | 'rhodecode_pre_code': pre_code, | |
168 | 'rhodecode_post_code': post_code, |
|
168 | 'rhodecode_post_code': post_code, | |
169 | 'csrf_token': csrf_token, |
|
169 | 'csrf_token': csrf_token, | |
170 | }) |
|
170 | }) | |
171 |
|
171 | |||
172 | response = response.follow() |
|
172 | response = response.follow() | |
173 | response.mustcontain(pre_code, post_code) |
|
173 | response.mustcontain(pre_code, post_code) | |
174 |
|
174 | |||
175 | def test_pre_post_code_code_inactive(self, csrf_token): |
|
175 | def test_pre_post_code_code_inactive(self, csrf_token): | |
176 | pre_code = 'rc-pre-code-187652122' |
|
176 | pre_code = 'rc-pre-code-187652122' | |
177 | post_code = 'rc-postcode-98165231' |
|
177 | post_code = 'rc-postcode-98165231' | |
178 | response = self.post_and_verify_settings({ |
|
178 | response = self.post_and_verify_settings({ | |
179 | 'rhodecode_pre_code': '', |
|
179 | 'rhodecode_pre_code': '', | |
180 | 'rhodecode_post_code': '', |
|
180 | 'rhodecode_post_code': '', | |
181 | 'csrf_token': csrf_token, |
|
181 | 'csrf_token': csrf_token, | |
182 | }) |
|
182 | }) | |
183 |
|
183 | |||
184 | response = response.follow() |
|
184 | response = response.follow() | |
185 | response.mustcontain(no=[pre_code, post_code]) |
|
185 | response.mustcontain(no=[pre_code, post_code]) | |
186 |
|
186 | |||
187 | def test_captcha_activate(self, csrf_token): |
|
187 | def test_captcha_activate(self, csrf_token): | |
188 | self.post_and_verify_settings({ |
|
188 | self.post_and_verify_settings({ | |
189 | 'rhodecode_captcha_private_key': '1234567890', |
|
189 | 'rhodecode_captcha_private_key': '1234567890', | |
190 | 'rhodecode_captcha_public_key': '1234567890', |
|
190 | 'rhodecode_captcha_public_key': '1234567890', | |
191 | 'csrf_token': csrf_token, |
|
191 | 'csrf_token': csrf_token, | |
192 | }) |
|
192 | }) | |
193 |
|
193 | |||
194 | response = self.app.get(ADMIN_PREFIX + '/register') |
|
194 | response = self.app.get(ADMIN_PREFIX + '/register') | |
195 | response.mustcontain('captcha') |
|
195 | response.mustcontain('captcha') | |
196 |
|
196 | |||
197 | def test_captcha_deactivate(self, csrf_token): |
|
197 | def test_captcha_deactivate(self, csrf_token): | |
198 | self.post_and_verify_settings({ |
|
198 | self.post_and_verify_settings({ | |
199 | 'rhodecode_captcha_private_key': '', |
|
199 | 'rhodecode_captcha_private_key': '', | |
200 | 'rhodecode_captcha_public_key': '1234567890', |
|
200 | 'rhodecode_captcha_public_key': '1234567890', | |
201 | 'csrf_token': csrf_token, |
|
201 | 'csrf_token': csrf_token, | |
202 | }) |
|
202 | }) | |
203 |
|
203 | |||
204 | response = self.app.get(ADMIN_PREFIX + '/register') |
|
204 | response = self.app.get(ADMIN_PREFIX + '/register') | |
205 | response.mustcontain(no=['captcha']) |
|
205 | response.mustcontain(no=['captcha']) | |
206 |
|
206 | |||
207 | def test_title_change(self, csrf_token): |
|
207 | def test_title_change(self, csrf_token): | |
208 | old_title = 'RhodeCode' |
|
208 | old_title = 'RhodeCode' | |
209 |
|
209 | |||
210 | for new_title in ['Changed', 'Żółwik', old_title]: |
|
210 | for new_title in ['Changed', 'Żółwik', old_title]: | |
211 | response = self.post_and_verify_settings({ |
|
211 | response = self.post_and_verify_settings({ | |
212 | 'rhodecode_title': new_title, |
|
212 | 'rhodecode_title': new_title, | |
213 | 'csrf_token': csrf_token, |
|
213 | 'csrf_token': csrf_token, | |
214 | }) |
|
214 | }) | |
215 |
|
215 | |||
216 | response = response.follow() |
|
216 | response = response.follow() | |
217 | response.mustcontain(new_title) |
|
217 | response.mustcontain(new_title) | |
218 |
|
218 | |||
219 | def post_and_verify_settings(self, settings): |
|
219 | def post_and_verify_settings(self, settings): | |
220 | old_title = 'RhodeCode' |
|
220 | old_title = 'RhodeCode' | |
221 | old_realm = 'RhodeCode authentication' |
|
221 | old_realm = 'RhodeCode authentication' | |
222 | params = { |
|
222 | params = { | |
223 | 'rhodecode_title': old_title, |
|
223 | 'rhodecode_title': old_title, | |
224 | 'rhodecode_realm': old_realm, |
|
224 | 'rhodecode_realm': old_realm, | |
225 | 'rhodecode_pre_code': '', |
|
225 | 'rhodecode_pre_code': '', | |
226 | 'rhodecode_post_code': '', |
|
226 | 'rhodecode_post_code': '', | |
227 | 'rhodecode_captcha_private_key': '', |
|
227 | 'rhodecode_captcha_private_key': '', | |
228 | 'rhodecode_captcha_public_key': '', |
|
228 | 'rhodecode_captcha_public_key': '', | |
229 | 'rhodecode_create_personal_repo_group': False, |
|
229 | 'rhodecode_create_personal_repo_group': False, | |
230 | 'rhodecode_personal_repo_group_pattern': '${username}', |
|
230 | 'rhodecode_personal_repo_group_pattern': '${username}', | |
231 | } |
|
231 | } | |
232 | params.update(settings) |
|
232 | params.update(settings) | |
233 | response = self.app.post( |
|
233 | response = self.app.post( | |
234 | route_path('admin_settings_global_update'), params=params) |
|
234 | route_path('admin_settings_global_update'), params=params) | |
235 |
|
235 | |||
236 | assert_session_flash(response, 'Updated application settings') |
|
236 | assert_session_flash(response, 'Updated application settings') | |
237 | app_settings = SettingsModel().get_all_settings() |
|
237 | app_settings = SettingsModel().get_all_settings() | |
238 | del settings['csrf_token'] |
|
238 | del settings['csrf_token'] | |
239 | for key, value in settings.iteritems(): |
|
239 | for key, value in settings.iteritems(): | |
240 | assert app_settings[key] == value.decode('utf-8') |
|
240 | assert app_settings[key] == value.decode('utf-8') | |
241 |
|
241 | |||
242 | return response |
|
242 | return response | |
243 |
|
243 | |||
244 |
|
244 | |||
245 | @pytest.mark.usefixtures('autologin_user', 'app') |
|
245 | @pytest.mark.usefixtures('autologin_user', 'app') | |
246 | class TestAdminSettingsVcs(object): |
|
246 | class TestAdminSettingsVcs(object): | |
247 |
|
247 | |||
248 | def test_contains_svn_default_patterns(self): |
|
248 | def test_contains_svn_default_patterns(self): | |
249 | response = self.app.get(route_path('admin_settings_vcs')) |
|
249 | response = self.app.get(route_path('admin_settings_vcs')) | |
250 | expected_patterns = [ |
|
250 | expected_patterns = [ | |
251 | '/trunk', |
|
251 | '/trunk', | |
252 | '/branches/*', |
|
252 | '/branches/*', | |
253 | '/tags/*', |
|
253 | '/tags/*', | |
254 | ] |
|
254 | ] | |
255 | for pattern in expected_patterns: |
|
255 | for pattern in expected_patterns: | |
256 | response.mustcontain(pattern) |
|
256 | response.mustcontain(pattern) | |
257 |
|
257 | |||
258 | def test_add_new_svn_branch_and_tag_pattern( |
|
258 | def test_add_new_svn_branch_and_tag_pattern( | |
259 | self, backend_svn, form_defaults, disable_sql_cache, |
|
259 | self, backend_svn, form_defaults, disable_sql_cache, | |
260 | csrf_token): |
|
260 | csrf_token): | |
261 | form_defaults.update({ |
|
261 | form_defaults.update({ | |
262 | 'new_svn_branch': '/exp/branches/*', |
|
262 | 'new_svn_branch': '/exp/branches/*', | |
263 | 'new_svn_tag': '/important_tags/*', |
|
263 | 'new_svn_tag': '/important_tags/*', | |
264 | 'csrf_token': csrf_token, |
|
264 | 'csrf_token': csrf_token, | |
265 | }) |
|
265 | }) | |
266 |
|
266 | |||
267 | response = self.app.post( |
|
267 | response = self.app.post( | |
268 | route_path('admin_settings_vcs_update'), |
|
268 | route_path('admin_settings_vcs_update'), | |
269 | params=form_defaults, status=302) |
|
269 | params=form_defaults, status=302) | |
270 | response = response.follow() |
|
270 | response = response.follow() | |
271 |
|
271 | |||
272 | # Expect to find the new values on the page |
|
272 | # Expect to find the new values on the page | |
273 | response.mustcontain('/exp/branches/*') |
|
273 | response.mustcontain('/exp/branches/*') | |
274 | response.mustcontain('/important_tags/*') |
|
274 | response.mustcontain('/important_tags/*') | |
275 |
|
275 | |||
276 | # Expect that those patterns are used to match branches and tags now |
|
276 | # Expect that those patterns are used to match branches and tags now | |
277 | repo = backend_svn['svn-simple-layout'].scm_instance() |
|
277 | repo = backend_svn['svn-simple-layout'].scm_instance() | |
278 | assert 'exp/branches/exp-sphinx-docs' in repo.branches |
|
278 | assert 'exp/branches/exp-sphinx-docs' in repo.branches | |
279 | assert 'important_tags/v0.5' in repo.tags |
|
279 | assert 'important_tags/v0.5' in repo.tags | |
280 |
|
280 | |||
281 | def test_add_same_svn_value_twice_shows_an_error_message( |
|
281 | def test_add_same_svn_value_twice_shows_an_error_message( | |
282 | self, form_defaults, csrf_token, settings_util): |
|
282 | self, form_defaults, csrf_token, settings_util): | |
283 | settings_util.create_rhodecode_ui('vcs_svn_branch', '/test') |
|
283 | settings_util.create_rhodecode_ui('vcs_svn_branch', '/test') | |
284 | settings_util.create_rhodecode_ui('vcs_svn_tag', '/test') |
|
284 | settings_util.create_rhodecode_ui('vcs_svn_tag', '/test') | |
285 |
|
285 | |||
286 | response = self.app.post( |
|
286 | response = self.app.post( | |
287 | route_path('admin_settings_vcs_update'), |
|
287 | route_path('admin_settings_vcs_update'), | |
288 | params={ |
|
288 | params={ | |
289 | 'paths_root_path': form_defaults['paths_root_path'], |
|
289 | 'paths_root_path': form_defaults['paths_root_path'], | |
290 | 'new_svn_branch': '/test', |
|
290 | 'new_svn_branch': '/test', | |
291 | 'new_svn_tag': '/test', |
|
291 | 'new_svn_tag': '/test', | |
292 | 'csrf_token': csrf_token, |
|
292 | 'csrf_token': csrf_token, | |
293 | }, |
|
293 | }, | |
294 | status=200) |
|
294 | status=200) | |
295 |
|
295 | |||
296 | response.mustcontain("Pattern already exists") |
|
296 | response.mustcontain("Pattern already exists") | |
297 | response.mustcontain("Some form inputs contain invalid data.") |
|
297 | response.mustcontain("Some form inputs contain invalid data.") | |
298 |
|
298 | |||
299 | @pytest.mark.parametrize('section', [ |
|
299 | @pytest.mark.parametrize('section', [ | |
300 | 'vcs_svn_branch', |
|
300 | 'vcs_svn_branch', | |
301 | 'vcs_svn_tag', |
|
301 | 'vcs_svn_tag', | |
302 | ]) |
|
302 | ]) | |
303 | def test_delete_svn_patterns( |
|
303 | def test_delete_svn_patterns( | |
304 | self, section, csrf_token, settings_util): |
|
304 | self, section, csrf_token, settings_util): | |
305 | setting = settings_util.create_rhodecode_ui( |
|
305 | setting = settings_util.create_rhodecode_ui( | |
306 | section, '/test_delete', cleanup=False) |
|
306 | section, '/test_delete', cleanup=False) | |
307 |
|
307 | |||
308 | self.app.post( |
|
308 | self.app.post( | |
309 | route_path('admin_settings_vcs_svn_pattern_delete'), |
|
309 | route_path('admin_settings_vcs_svn_pattern_delete'), | |
310 | params={ |
|
310 | params={ | |
311 | 'delete_svn_pattern': setting.ui_id, |
|
311 | 'delete_svn_pattern': setting.ui_id, | |
312 | 'csrf_token': csrf_token}, |
|
312 | 'csrf_token': csrf_token}, | |
313 | headers={'X-REQUESTED-WITH': 'XMLHttpRequest'}) |
|
313 | headers={'X-REQUESTED-WITH': 'XMLHttpRequest'}) | |
314 |
|
314 | |||
315 | @pytest.mark.parametrize('section', [ |
|
315 | @pytest.mark.parametrize('section', [ | |
316 | 'vcs_svn_branch', |
|
316 | 'vcs_svn_branch', | |
317 | 'vcs_svn_tag', |
|
317 | 'vcs_svn_tag', | |
318 | ]) |
|
318 | ]) | |
319 | def test_delete_svn_patterns_raises_404_when_no_xhr( |
|
319 | def test_delete_svn_patterns_raises_404_when_no_xhr( | |
320 | self, section, csrf_token, settings_util): |
|
320 | self, section, csrf_token, settings_util): | |
321 | setting = settings_util.create_rhodecode_ui(section, '/test_delete') |
|
321 | setting = settings_util.create_rhodecode_ui(section, '/test_delete') | |
322 |
|
322 | |||
323 | self.app.post( |
|
323 | self.app.post( | |
324 | route_path('admin_settings_vcs_svn_pattern_delete'), |
|
324 | route_path('admin_settings_vcs_svn_pattern_delete'), | |
325 | params={ |
|
325 | params={ | |
326 | 'delete_svn_pattern': setting.ui_id, |
|
326 | 'delete_svn_pattern': setting.ui_id, | |
327 | 'csrf_token': csrf_token}, |
|
327 | 'csrf_token': csrf_token}, | |
328 | status=404) |
|
328 | status=404) | |
329 |
|
329 | |||
330 | def test_extensions_hgsubversion(self, form_defaults, csrf_token): |
|
330 | def test_extensions_hgsubversion(self, form_defaults, csrf_token): | |
331 | form_defaults.update({ |
|
331 | form_defaults.update({ | |
332 | 'csrf_token': csrf_token, |
|
332 | 'csrf_token': csrf_token, | |
333 | 'extensions_hgsubversion': 'True', |
|
333 | 'extensions_hgsubversion': 'True', | |
334 | }) |
|
334 | }) | |
335 | response = self.app.post( |
|
335 | response = self.app.post( | |
336 | route_path('admin_settings_vcs_update'), |
|
336 | route_path('admin_settings_vcs_update'), | |
337 | params=form_defaults, |
|
337 | params=form_defaults, | |
338 | status=302) |
|
338 | status=302) | |
339 |
|
339 | |||
340 | response = response.follow() |
|
340 | response = response.follow() | |
341 | extensions_input = ( |
|
341 | extensions_input = ( | |
342 | '<input id="extensions_hgsubversion" ' |
|
342 | '<input id="extensions_hgsubversion" ' | |
343 | 'name="extensions_hgsubversion" type="checkbox" ' |
|
343 | 'name="extensions_hgsubversion" type="checkbox" ' | |
344 | 'value="True" checked="checked" />') |
|
344 | 'value="True" checked="checked" />') | |
345 | response.mustcontain(extensions_input) |
|
345 | response.mustcontain(extensions_input) | |
346 |
|
346 | |||
347 | def test_extensions_hgevolve(self, form_defaults, csrf_token): |
|
347 | def test_extensions_hgevolve(self, form_defaults, csrf_token): | |
348 | form_defaults.update({ |
|
348 | form_defaults.update({ | |
349 | 'csrf_token': csrf_token, |
|
349 | 'csrf_token': csrf_token, | |
350 | 'extensions_evolve': 'True', |
|
350 | 'extensions_evolve': 'True', | |
351 | }) |
|
351 | }) | |
352 | response = self.app.post( |
|
352 | response = self.app.post( | |
353 | route_path('admin_settings_vcs_update'), |
|
353 | route_path('admin_settings_vcs_update'), | |
354 | params=form_defaults, |
|
354 | params=form_defaults, | |
355 | status=302) |
|
355 | status=302) | |
356 |
|
356 | |||
357 | response = response.follow() |
|
357 | response = response.follow() | |
358 | extensions_input = ( |
|
358 | extensions_input = ( | |
359 | '<input id="extensions_evolve" ' |
|
359 | '<input id="extensions_evolve" ' | |
360 | 'name="extensions_evolve" type="checkbox" ' |
|
360 | 'name="extensions_evolve" type="checkbox" ' | |
361 | 'value="True" checked="checked" />') |
|
361 | 'value="True" checked="checked" />') | |
362 | response.mustcontain(extensions_input) |
|
362 | response.mustcontain(extensions_input) | |
363 |
|
363 | |||
364 | def test_has_a_section_for_pull_request_settings(self): |
|
364 | def test_has_a_section_for_pull_request_settings(self): | |
365 | response = self.app.get(route_path('admin_settings_vcs')) |
|
365 | response = self.app.get(route_path('admin_settings_vcs')) | |
366 | response.mustcontain('Pull Request Settings') |
|
366 | response.mustcontain('Pull Request Settings') | |
367 |
|
367 | |||
368 | def test_has_an_input_for_invalidation_of_inline_comments(self): |
|
368 | def test_has_an_input_for_invalidation_of_inline_comments(self): | |
369 | response = self.app.get(route_path('admin_settings_vcs')) |
|
369 | response = self.app.get(route_path('admin_settings_vcs')) | |
370 |
assert_response = |
|
370 | assert_response = response.assert_response() | |
371 | assert_response.one_element_exists( |
|
371 | assert_response.one_element_exists( | |
372 | '[name=rhodecode_use_outdated_comments]') |
|
372 | '[name=rhodecode_use_outdated_comments]') | |
373 |
|
373 | |||
374 | @pytest.mark.parametrize('new_value', [True, False]) |
|
374 | @pytest.mark.parametrize('new_value', [True, False]) | |
375 | def test_allows_to_change_invalidation_of_inline_comments( |
|
375 | def test_allows_to_change_invalidation_of_inline_comments( | |
376 | self, form_defaults, csrf_token, new_value): |
|
376 | self, form_defaults, csrf_token, new_value): | |
377 | setting_key = 'use_outdated_comments' |
|
377 | setting_key = 'use_outdated_comments' | |
378 | setting = SettingsModel().create_or_update_setting( |
|
378 | setting = SettingsModel().create_or_update_setting( | |
379 | setting_key, not new_value, 'bool') |
|
379 | setting_key, not new_value, 'bool') | |
380 | Session().add(setting) |
|
380 | Session().add(setting) | |
381 | Session().commit() |
|
381 | Session().commit() | |
382 |
|
382 | |||
383 | form_defaults.update({ |
|
383 | form_defaults.update({ | |
384 | 'csrf_token': csrf_token, |
|
384 | 'csrf_token': csrf_token, | |
385 | 'rhodecode_use_outdated_comments': str(new_value), |
|
385 | 'rhodecode_use_outdated_comments': str(new_value), | |
386 | }) |
|
386 | }) | |
387 | response = self.app.post( |
|
387 | response = self.app.post( | |
388 | route_path('admin_settings_vcs_update'), |
|
388 | route_path('admin_settings_vcs_update'), | |
389 | params=form_defaults, |
|
389 | params=form_defaults, | |
390 | status=302) |
|
390 | status=302) | |
391 | response = response.follow() |
|
391 | response = response.follow() | |
392 | setting = SettingsModel().get_setting_by_name(setting_key) |
|
392 | setting = SettingsModel().get_setting_by_name(setting_key) | |
393 | assert setting.app_settings_value is new_value |
|
393 | assert setting.app_settings_value is new_value | |
394 |
|
394 | |||
395 | @pytest.mark.parametrize('new_value', [True, False]) |
|
395 | @pytest.mark.parametrize('new_value', [True, False]) | |
396 | def test_allows_to_change_hg_rebase_merge_strategy( |
|
396 | def test_allows_to_change_hg_rebase_merge_strategy( | |
397 | self, form_defaults, csrf_token, new_value): |
|
397 | self, form_defaults, csrf_token, new_value): | |
398 | setting_key = 'hg_use_rebase_for_merging' |
|
398 | setting_key = 'hg_use_rebase_for_merging' | |
399 |
|
399 | |||
400 | form_defaults.update({ |
|
400 | form_defaults.update({ | |
401 | 'csrf_token': csrf_token, |
|
401 | 'csrf_token': csrf_token, | |
402 | 'rhodecode_' + setting_key: str(new_value), |
|
402 | 'rhodecode_' + setting_key: str(new_value), | |
403 | }) |
|
403 | }) | |
404 |
|
404 | |||
405 | with mock.patch.dict( |
|
405 | with mock.patch.dict( | |
406 | rhodecode.CONFIG, {'labs_settings_active': 'true'}): |
|
406 | rhodecode.CONFIG, {'labs_settings_active': 'true'}): | |
407 | self.app.post( |
|
407 | self.app.post( | |
408 | route_path('admin_settings_vcs_update'), |
|
408 | route_path('admin_settings_vcs_update'), | |
409 | params=form_defaults, |
|
409 | params=form_defaults, | |
410 | status=302) |
|
410 | status=302) | |
411 |
|
411 | |||
412 | setting = SettingsModel().get_setting_by_name(setting_key) |
|
412 | setting = SettingsModel().get_setting_by_name(setting_key) | |
413 | assert setting.app_settings_value is new_value |
|
413 | assert setting.app_settings_value is new_value | |
414 |
|
414 | |||
415 | @pytest.fixture() |
|
415 | @pytest.fixture() | |
416 | def disable_sql_cache(self, request): |
|
416 | def disable_sql_cache(self, request): | |
417 | patcher = mock.patch( |
|
417 | patcher = mock.patch( | |
418 | 'rhodecode.lib.caching_query.FromCache.process_query') |
|
418 | 'rhodecode.lib.caching_query.FromCache.process_query') | |
419 | request.addfinalizer(patcher.stop) |
|
419 | request.addfinalizer(patcher.stop) | |
420 | patcher.start() |
|
420 | patcher.start() | |
421 |
|
421 | |||
422 | @pytest.fixture() |
|
422 | @pytest.fixture() | |
423 | def form_defaults(self): |
|
423 | def form_defaults(self): | |
424 | from rhodecode.apps.admin.views.settings import AdminSettingsView |
|
424 | from rhodecode.apps.admin.views.settings import AdminSettingsView | |
425 | return AdminSettingsView._form_defaults() |
|
425 | return AdminSettingsView._form_defaults() | |
426 |
|
426 | |||
427 | # TODO: johbo: What we really want is to checkpoint before a test run and |
|
427 | # TODO: johbo: What we really want is to checkpoint before a test run and | |
428 | # reset the session afterwards. |
|
428 | # reset the session afterwards. | |
429 | @pytest.fixture(scope='class', autouse=True) |
|
429 | @pytest.fixture(scope='class', autouse=True) | |
430 | def cleanup_settings(self, request, baseapp): |
|
430 | def cleanup_settings(self, request, baseapp): | |
431 | ui_id = RhodeCodeUi.ui_id |
|
431 | ui_id = RhodeCodeUi.ui_id | |
432 | original_ids = list( |
|
432 | original_ids = list( | |
433 | r.ui_id for r in RhodeCodeUi.query().values(ui_id)) |
|
433 | r.ui_id for r in RhodeCodeUi.query().values(ui_id)) | |
434 |
|
434 | |||
435 | @request.addfinalizer |
|
435 | @request.addfinalizer | |
436 | def cleanup(): |
|
436 | def cleanup(): | |
437 | RhodeCodeUi.query().filter( |
|
437 | RhodeCodeUi.query().filter( | |
438 | ui_id.notin_(original_ids)).delete(False) |
|
438 | ui_id.notin_(original_ids)).delete(False) | |
439 |
|
439 | |||
440 |
|
440 | |||
441 | @pytest.mark.usefixtures('autologin_user', 'app') |
|
441 | @pytest.mark.usefixtures('autologin_user', 'app') | |
442 | class TestLabsSettings(object): |
|
442 | class TestLabsSettings(object): | |
443 | def test_get_settings_page_disabled(self): |
|
443 | def test_get_settings_page_disabled(self): | |
444 | with mock.patch.dict( |
|
444 | with mock.patch.dict( | |
445 | rhodecode.CONFIG, {'labs_settings_active': 'false'}): |
|
445 | rhodecode.CONFIG, {'labs_settings_active': 'false'}): | |
446 |
|
446 | |||
447 | response = self.app.get( |
|
447 | response = self.app.get( | |
448 | route_path('admin_settings_labs'), status=302) |
|
448 | route_path('admin_settings_labs'), status=302) | |
449 |
|
449 | |||
450 | assert response.location.endswith(route_path('admin_settings')) |
|
450 | assert response.location.endswith(route_path('admin_settings')) | |
451 |
|
451 | |||
452 | def test_get_settings_page_enabled(self): |
|
452 | def test_get_settings_page_enabled(self): | |
453 | from rhodecode.apps.admin.views import settings |
|
453 | from rhodecode.apps.admin.views import settings | |
454 | lab_settings = [ |
|
454 | lab_settings = [ | |
455 | settings.LabSetting( |
|
455 | settings.LabSetting( | |
456 | key='rhodecode_bool', |
|
456 | key='rhodecode_bool', | |
457 | type='bool', |
|
457 | type='bool', | |
458 | group='bool group', |
|
458 | group='bool group', | |
459 | label='bool label', |
|
459 | label='bool label', | |
460 | help='bool help' |
|
460 | help='bool help' | |
461 | ), |
|
461 | ), | |
462 | settings.LabSetting( |
|
462 | settings.LabSetting( | |
463 | key='rhodecode_text', |
|
463 | key='rhodecode_text', | |
464 | type='unicode', |
|
464 | type='unicode', | |
465 | group='text group', |
|
465 | group='text group', | |
466 | label='text label', |
|
466 | label='text label', | |
467 | help='text help' |
|
467 | help='text help' | |
468 | ), |
|
468 | ), | |
469 | ] |
|
469 | ] | |
470 | with mock.patch.dict(rhodecode.CONFIG, |
|
470 | with mock.patch.dict(rhodecode.CONFIG, | |
471 | {'labs_settings_active': 'true'}): |
|
471 | {'labs_settings_active': 'true'}): | |
472 | with mock.patch.object(settings, '_LAB_SETTINGS', lab_settings): |
|
472 | with mock.patch.object(settings, '_LAB_SETTINGS', lab_settings): | |
473 | response = self.app.get(route_path('admin_settings_labs')) |
|
473 | response = self.app.get(route_path('admin_settings_labs')) | |
474 |
|
474 | |||
475 | assert '<label>bool group:</label>' in response |
|
475 | assert '<label>bool group:</label>' in response | |
476 | assert '<label for="rhodecode_bool">bool label</label>' in response |
|
476 | assert '<label for="rhodecode_bool">bool label</label>' in response | |
477 | assert '<p class="help-block">bool help</p>' in response |
|
477 | assert '<p class="help-block">bool help</p>' in response | |
478 | assert 'name="rhodecode_bool" type="checkbox"' in response |
|
478 | assert 'name="rhodecode_bool" type="checkbox"' in response | |
479 |
|
479 | |||
480 | assert '<label>text group:</label>' in response |
|
480 | assert '<label>text group:</label>' in response | |
481 | assert '<label for="rhodecode_text">text label</label>' in response |
|
481 | assert '<label for="rhodecode_text">text label</label>' in response | |
482 | assert '<p class="help-block">text help</p>' in response |
|
482 | assert '<p class="help-block">text help</p>' in response | |
483 | assert 'name="rhodecode_text" size="60" type="text"' in response |
|
483 | assert 'name="rhodecode_text" size="60" type="text"' in response | |
484 |
|
484 | |||
485 |
|
485 | |||
486 | @pytest.mark.usefixtures('app') |
|
486 | @pytest.mark.usefixtures('app') | |
487 | class TestOpenSourceLicenses(object): |
|
487 | class TestOpenSourceLicenses(object): | |
488 |
|
488 | |||
489 | def test_records_are_displayed(self, autologin_user): |
|
489 | def test_records_are_displayed(self, autologin_user): | |
490 | sample_licenses = [ |
|
490 | sample_licenses = [ | |
491 | { |
|
491 | { | |
492 | "license": [ |
|
492 | "license": [ | |
493 | { |
|
493 | { | |
494 | "fullName": "BSD 4-clause \"Original\" or \"Old\" License", |
|
494 | "fullName": "BSD 4-clause \"Original\" or \"Old\" License", | |
495 | "shortName": "bsdOriginal", |
|
495 | "shortName": "bsdOriginal", | |
496 | "spdxId": "BSD-4-Clause", |
|
496 | "spdxId": "BSD-4-Clause", | |
497 | "url": "http://spdx.org/licenses/BSD-4-Clause.html" |
|
497 | "url": "http://spdx.org/licenses/BSD-4-Clause.html" | |
498 | } |
|
498 | } | |
499 | ], |
|
499 | ], | |
500 | "name": "python2.7-coverage-3.7.1" |
|
500 | "name": "python2.7-coverage-3.7.1" | |
501 | }, |
|
501 | }, | |
502 | { |
|
502 | { | |
503 | "license": [ |
|
503 | "license": [ | |
504 | { |
|
504 | { | |
505 | "fullName": "MIT License", |
|
505 | "fullName": "MIT License", | |
506 | "shortName": "mit", |
|
506 | "shortName": "mit", | |
507 | "spdxId": "MIT", |
|
507 | "spdxId": "MIT", | |
508 | "url": "http://spdx.org/licenses/MIT.html" |
|
508 | "url": "http://spdx.org/licenses/MIT.html" | |
509 | } |
|
509 | } | |
510 | ], |
|
510 | ], | |
511 | "name": "python2.7-bootstrapped-pip-9.0.1" |
|
511 | "name": "python2.7-bootstrapped-pip-9.0.1" | |
512 | }, |
|
512 | }, | |
513 | ] |
|
513 | ] | |
514 | read_licenses_patch = mock.patch( |
|
514 | read_licenses_patch = mock.patch( | |
515 | 'rhodecode.apps.admin.views.open_source_licenses.read_opensource_licenses', |
|
515 | 'rhodecode.apps.admin.views.open_source_licenses.read_opensource_licenses', | |
516 | return_value=sample_licenses) |
|
516 | return_value=sample_licenses) | |
517 | with read_licenses_patch: |
|
517 | with read_licenses_patch: | |
518 | response = self.app.get( |
|
518 | response = self.app.get( | |
519 | route_path('admin_settings_open_source'), status=200) |
|
519 | route_path('admin_settings_open_source'), status=200) | |
520 |
|
520 | |||
521 |
assert_response = |
|
521 | assert_response = response.assert_response() | |
522 | assert_response.element_contains( |
|
522 | assert_response.element_contains( | |
523 | '.panel-heading', 'Licenses of Third Party Packages') |
|
523 | '.panel-heading', 'Licenses of Third Party Packages') | |
524 | for license_data in sample_licenses: |
|
524 | for license_data in sample_licenses: | |
525 | response.mustcontain(license_data["license"][0]["spdxId"]) |
|
525 | response.mustcontain(license_data["license"][0]["spdxId"]) | |
526 | assert_response.element_contains('.panel-body', license_data["name"]) |
|
526 | assert_response.element_contains('.panel-body', license_data["name"]) | |
527 |
|
527 | |||
528 | def test_records_can_be_read(self, autologin_user): |
|
528 | def test_records_can_be_read(self, autologin_user): | |
529 | response = self.app.get( |
|
529 | response = self.app.get( | |
530 | route_path('admin_settings_open_source'), status=200) |
|
530 | route_path('admin_settings_open_source'), status=200) | |
531 |
assert_response = |
|
531 | assert_response = response.assert_response() | |
532 | assert_response.element_contains( |
|
532 | assert_response.element_contains( | |
533 | '.panel-heading', 'Licenses of Third Party Packages') |
|
533 | '.panel-heading', 'Licenses of Third Party Packages') | |
534 |
|
534 | |||
535 | def test_forbidden_when_normal_user(self, autologin_regular_user): |
|
535 | def test_forbidden_when_normal_user(self, autologin_regular_user): | |
536 | self.app.get( |
|
536 | self.app.get( | |
537 | route_path('admin_settings_open_source'), status=404) |
|
537 | route_path('admin_settings_open_source'), status=404) | |
538 |
|
538 | |||
539 |
|
539 | |||
540 | @pytest.mark.usefixtures('app') |
|
540 | @pytest.mark.usefixtures('app') | |
541 | class TestUserSessions(object): |
|
541 | class TestUserSessions(object): | |
542 |
|
542 | |||
543 | def test_forbidden_when_normal_user(self, autologin_regular_user): |
|
543 | def test_forbidden_when_normal_user(self, autologin_regular_user): | |
544 | self.app.get(route_path('admin_settings_sessions'), status=404) |
|
544 | self.app.get(route_path('admin_settings_sessions'), status=404) | |
545 |
|
545 | |||
546 | def test_show_sessions_page(self, autologin_user): |
|
546 | def test_show_sessions_page(self, autologin_user): | |
547 | response = self.app.get(route_path('admin_settings_sessions'), status=200) |
|
547 | response = self.app.get(route_path('admin_settings_sessions'), status=200) | |
548 | response.mustcontain('file') |
|
548 | response.mustcontain('file') | |
549 |
|
549 | |||
550 | def test_cleanup_old_sessions(self, autologin_user, csrf_token): |
|
550 | def test_cleanup_old_sessions(self, autologin_user, csrf_token): | |
551 |
|
551 | |||
552 | post_data = { |
|
552 | post_data = { | |
553 | 'csrf_token': csrf_token, |
|
553 | 'csrf_token': csrf_token, | |
554 | 'expire_days': '60' |
|
554 | 'expire_days': '60' | |
555 | } |
|
555 | } | |
556 | response = self.app.post( |
|
556 | response = self.app.post( | |
557 | route_path('admin_settings_sessions_cleanup'), params=post_data, |
|
557 | route_path('admin_settings_sessions_cleanup'), params=post_data, | |
558 | status=302) |
|
558 | status=302) | |
559 | assert_session_flash(response, 'Cleaned up old sessions') |
|
559 | assert_session_flash(response, 'Cleaned up old sessions') | |
560 |
|
560 | |||
561 |
|
561 | |||
562 | @pytest.mark.usefixtures('app') |
|
562 | @pytest.mark.usefixtures('app') | |
563 | class TestAdminSystemInfo(object): |
|
563 | class TestAdminSystemInfo(object): | |
564 |
|
564 | |||
565 | def test_forbidden_when_normal_user(self, autologin_regular_user): |
|
565 | def test_forbidden_when_normal_user(self, autologin_regular_user): | |
566 | self.app.get(route_path('admin_settings_system'), status=404) |
|
566 | self.app.get(route_path('admin_settings_system'), status=404) | |
567 |
|
567 | |||
568 | def test_system_info_page(self, autologin_user): |
|
568 | def test_system_info_page(self, autologin_user): | |
569 | response = self.app.get(route_path('admin_settings_system')) |
|
569 | response = self.app.get(route_path('admin_settings_system')) | |
570 | response.mustcontain('RhodeCode Community Edition, version {}'.format( |
|
570 | response.mustcontain('RhodeCode Community Edition, version {}'.format( | |
571 | rhodecode.__version__)) |
|
571 | rhodecode.__version__)) | |
572 |
|
572 | |||
573 | def test_system_update_new_version(self, autologin_user): |
|
573 | def test_system_update_new_version(self, autologin_user): | |
574 | update_data = { |
|
574 | update_data = { | |
575 | 'versions': [ |
|
575 | 'versions': [ | |
576 | { |
|
576 | { | |
577 | 'version': '100.3.1415926535', |
|
577 | 'version': '100.3.1415926535', | |
578 | 'general': 'The latest version we are ever going to ship' |
|
578 | 'general': 'The latest version we are ever going to ship' | |
579 | }, |
|
579 | }, | |
580 | { |
|
580 | { | |
581 | 'version': '0.0.0', |
|
581 | 'version': '0.0.0', | |
582 | 'general': 'The first version we ever shipped' |
|
582 | 'general': 'The first version we ever shipped' | |
583 | } |
|
583 | } | |
584 | ] |
|
584 | ] | |
585 | } |
|
585 | } | |
586 | with mock.patch(UPDATE_DATA_QUALNAME, return_value=update_data): |
|
586 | with mock.patch(UPDATE_DATA_QUALNAME, return_value=update_data): | |
587 | response = self.app.get(route_path('admin_settings_system_update')) |
|
587 | response = self.app.get(route_path('admin_settings_system_update')) | |
588 | response.mustcontain('A <b>new version</b> is available') |
|
588 | response.mustcontain('A <b>new version</b> is available') | |
589 |
|
589 | |||
590 | def test_system_update_nothing_new(self, autologin_user): |
|
590 | def test_system_update_nothing_new(self, autologin_user): | |
591 | update_data = { |
|
591 | update_data = { | |
592 | 'versions': [ |
|
592 | 'versions': [ | |
593 | { |
|
593 | { | |
594 | 'version': '0.0.0', |
|
594 | 'version': '0.0.0', | |
595 | 'general': 'The first version we ever shipped' |
|
595 | 'general': 'The first version we ever shipped' | |
596 | } |
|
596 | } | |
597 | ] |
|
597 | ] | |
598 | } |
|
598 | } | |
599 | with mock.patch(UPDATE_DATA_QUALNAME, return_value=update_data): |
|
599 | with mock.patch(UPDATE_DATA_QUALNAME, return_value=update_data): | |
600 | response = self.app.get(route_path('admin_settings_system_update')) |
|
600 | response = self.app.get(route_path('admin_settings_system_update')) | |
601 | response.mustcontain( |
|
601 | response.mustcontain( | |
602 | 'This instance is already running the <b>latest</b> stable version') |
|
602 | 'This instance is already running the <b>latest</b> stable version') | |
603 |
|
603 | |||
604 | def test_system_update_bad_response(self, autologin_user): |
|
604 | def test_system_update_bad_response(self, autologin_user): | |
605 | with mock.patch(UPDATE_DATA_QUALNAME, side_effect=ValueError('foo')): |
|
605 | with mock.patch(UPDATE_DATA_QUALNAME, side_effect=ValueError('foo')): | |
606 | response = self.app.get(route_path('admin_settings_system_update')) |
|
606 | response = self.app.get(route_path('admin_settings_system_update')) | |
607 | response.mustcontain( |
|
607 | response.mustcontain( | |
608 | 'Bad data sent from update server') |
|
608 | 'Bad data sent from update server') | |
609 |
|
609 | |||
610 |
|
610 | |||
611 | @pytest.mark.usefixtures("app") |
|
611 | @pytest.mark.usefixtures("app") | |
612 | class TestAdminSettingsIssueTracker(object): |
|
612 | class TestAdminSettingsIssueTracker(object): | |
613 | RC_PREFIX = 'rhodecode_' |
|
613 | RC_PREFIX = 'rhodecode_' | |
614 | SHORT_PATTERN_KEY = 'issuetracker_pat_' |
|
614 | SHORT_PATTERN_KEY = 'issuetracker_pat_' | |
615 | PATTERN_KEY = RC_PREFIX + SHORT_PATTERN_KEY |
|
615 | PATTERN_KEY = RC_PREFIX + SHORT_PATTERN_KEY | |
616 |
|
616 | |||
617 | def test_issuetracker_index(self, autologin_user): |
|
617 | def test_issuetracker_index(self, autologin_user): | |
618 | response = self.app.get(route_path('admin_settings_issuetracker')) |
|
618 | response = self.app.get(route_path('admin_settings_issuetracker')) | |
619 | assert response.status_code == 200 |
|
619 | assert response.status_code == 200 | |
620 |
|
620 | |||
621 | def test_add_empty_issuetracker_pattern( |
|
621 | def test_add_empty_issuetracker_pattern( | |
622 | self, request, autologin_user, csrf_token): |
|
622 | self, request, autologin_user, csrf_token): | |
623 | post_url = route_path('admin_settings_issuetracker_update') |
|
623 | post_url = route_path('admin_settings_issuetracker_update') | |
624 | post_data = { |
|
624 | post_data = { | |
625 | 'csrf_token': csrf_token |
|
625 | 'csrf_token': csrf_token | |
626 | } |
|
626 | } | |
627 | self.app.post(post_url, post_data, status=302) |
|
627 | self.app.post(post_url, post_data, status=302) | |
628 |
|
628 | |||
629 | def test_add_issuetracker_pattern( |
|
629 | def test_add_issuetracker_pattern( | |
630 | self, request, autologin_user, csrf_token): |
|
630 | self, request, autologin_user, csrf_token): | |
631 | pattern = 'issuetracker_pat' |
|
631 | pattern = 'issuetracker_pat' | |
632 | another_pattern = pattern+'1' |
|
632 | another_pattern = pattern+'1' | |
633 | post_url = route_path('admin_settings_issuetracker_update') |
|
633 | post_url = route_path('admin_settings_issuetracker_update') | |
634 | post_data = { |
|
634 | post_data = { | |
635 | 'new_pattern_pattern_0': pattern, |
|
635 | 'new_pattern_pattern_0': pattern, | |
636 | 'new_pattern_url_0': 'http://url', |
|
636 | 'new_pattern_url_0': 'http://url', | |
637 | 'new_pattern_prefix_0': 'prefix', |
|
637 | 'new_pattern_prefix_0': 'prefix', | |
638 | 'new_pattern_description_0': 'description', |
|
638 | 'new_pattern_description_0': 'description', | |
639 | 'new_pattern_pattern_1': another_pattern, |
|
639 | 'new_pattern_pattern_1': another_pattern, | |
640 | 'new_pattern_url_1': 'https://url1', |
|
640 | 'new_pattern_url_1': 'https://url1', | |
641 | 'new_pattern_prefix_1': 'prefix1', |
|
641 | 'new_pattern_prefix_1': 'prefix1', | |
642 | 'new_pattern_description_1': 'description1', |
|
642 | 'new_pattern_description_1': 'description1', | |
643 | 'csrf_token': csrf_token |
|
643 | 'csrf_token': csrf_token | |
644 | } |
|
644 | } | |
645 | self.app.post(post_url, post_data, status=302) |
|
645 | self.app.post(post_url, post_data, status=302) | |
646 | settings = SettingsModel().get_all_settings() |
|
646 | settings = SettingsModel().get_all_settings() | |
647 | self.uid = md5(pattern) |
|
647 | self.uid = md5(pattern) | |
648 | assert settings[self.PATTERN_KEY+self.uid] == pattern |
|
648 | assert settings[self.PATTERN_KEY+self.uid] == pattern | |
649 | self.another_uid = md5(another_pattern) |
|
649 | self.another_uid = md5(another_pattern) | |
650 | assert settings[self.PATTERN_KEY+self.another_uid] == another_pattern |
|
650 | assert settings[self.PATTERN_KEY+self.another_uid] == another_pattern | |
651 |
|
651 | |||
652 | @request.addfinalizer |
|
652 | @request.addfinalizer | |
653 | def cleanup(): |
|
653 | def cleanup(): | |
654 | defaults = SettingsModel().get_all_settings() |
|
654 | defaults = SettingsModel().get_all_settings() | |
655 |
|
655 | |||
656 | entries = [name for name in defaults if ( |
|
656 | entries = [name for name in defaults if ( | |
657 | (self.uid in name) or (self.another_uid) in name)] |
|
657 | (self.uid in name) or (self.another_uid) in name)] | |
658 | start = len(self.RC_PREFIX) |
|
658 | start = len(self.RC_PREFIX) | |
659 | for del_key in entries: |
|
659 | for del_key in entries: | |
660 | # TODO: anderson: get_by_name needs name without prefix |
|
660 | # TODO: anderson: get_by_name needs name without prefix | |
661 | entry = SettingsModel().get_setting_by_name(del_key[start:]) |
|
661 | entry = SettingsModel().get_setting_by_name(del_key[start:]) | |
662 | Session().delete(entry) |
|
662 | Session().delete(entry) | |
663 |
|
663 | |||
664 | Session().commit() |
|
664 | Session().commit() | |
665 |
|
665 | |||
666 | def test_edit_issuetracker_pattern( |
|
666 | def test_edit_issuetracker_pattern( | |
667 | self, autologin_user, backend, csrf_token, request): |
|
667 | self, autologin_user, backend, csrf_token, request): | |
668 | old_pattern = 'issuetracker_pat' |
|
668 | old_pattern = 'issuetracker_pat' | |
669 | old_uid = md5(old_pattern) |
|
669 | old_uid = md5(old_pattern) | |
670 | pattern = 'issuetracker_pat_new' |
|
670 | pattern = 'issuetracker_pat_new' | |
671 | self.new_uid = md5(pattern) |
|
671 | self.new_uid = md5(pattern) | |
672 |
|
672 | |||
673 | SettingsModel().create_or_update_setting( |
|
673 | SettingsModel().create_or_update_setting( | |
674 | self.SHORT_PATTERN_KEY+old_uid, old_pattern, 'unicode') |
|
674 | self.SHORT_PATTERN_KEY+old_uid, old_pattern, 'unicode') | |
675 |
|
675 | |||
676 | post_url = route_path('admin_settings_issuetracker_update') |
|
676 | post_url = route_path('admin_settings_issuetracker_update') | |
677 | post_data = { |
|
677 | post_data = { | |
678 | 'new_pattern_pattern_0': pattern, |
|
678 | 'new_pattern_pattern_0': pattern, | |
679 | 'new_pattern_url_0': 'https://url', |
|
679 | 'new_pattern_url_0': 'https://url', | |
680 | 'new_pattern_prefix_0': 'prefix', |
|
680 | 'new_pattern_prefix_0': 'prefix', | |
681 | 'new_pattern_description_0': 'description', |
|
681 | 'new_pattern_description_0': 'description', | |
682 | 'uid': old_uid, |
|
682 | 'uid': old_uid, | |
683 | 'csrf_token': csrf_token |
|
683 | 'csrf_token': csrf_token | |
684 | } |
|
684 | } | |
685 | self.app.post(post_url, post_data, status=302) |
|
685 | self.app.post(post_url, post_data, status=302) | |
686 | settings = SettingsModel().get_all_settings() |
|
686 | settings = SettingsModel().get_all_settings() | |
687 | assert settings[self.PATTERN_KEY+self.new_uid] == pattern |
|
687 | assert settings[self.PATTERN_KEY+self.new_uid] == pattern | |
688 | assert self.PATTERN_KEY+old_uid not in settings |
|
688 | assert self.PATTERN_KEY+old_uid not in settings | |
689 |
|
689 | |||
690 | @request.addfinalizer |
|
690 | @request.addfinalizer | |
691 | def cleanup(): |
|
691 | def cleanup(): | |
692 | IssueTrackerSettingsModel().delete_entries(self.new_uid) |
|
692 | IssueTrackerSettingsModel().delete_entries(self.new_uid) | |
693 |
|
693 | |||
694 | def test_replace_issuetracker_pattern_description( |
|
694 | def test_replace_issuetracker_pattern_description( | |
695 | self, autologin_user, csrf_token, request, settings_util): |
|
695 | self, autologin_user, csrf_token, request, settings_util): | |
696 | prefix = 'issuetracker' |
|
696 | prefix = 'issuetracker' | |
697 | pattern = 'issuetracker_pat' |
|
697 | pattern = 'issuetracker_pat' | |
698 | self.uid = md5(pattern) |
|
698 | self.uid = md5(pattern) | |
699 | pattern_key = '_'.join([prefix, 'pat', self.uid]) |
|
699 | pattern_key = '_'.join([prefix, 'pat', self.uid]) | |
700 | rc_pattern_key = '_'.join(['rhodecode', pattern_key]) |
|
700 | rc_pattern_key = '_'.join(['rhodecode', pattern_key]) | |
701 | desc_key = '_'.join([prefix, 'desc', self.uid]) |
|
701 | desc_key = '_'.join([prefix, 'desc', self.uid]) | |
702 | rc_desc_key = '_'.join(['rhodecode', desc_key]) |
|
702 | rc_desc_key = '_'.join(['rhodecode', desc_key]) | |
703 | new_description = 'new_description' |
|
703 | new_description = 'new_description' | |
704 |
|
704 | |||
705 | settings_util.create_rhodecode_setting( |
|
705 | settings_util.create_rhodecode_setting( | |
706 | pattern_key, pattern, 'unicode', cleanup=False) |
|
706 | pattern_key, pattern, 'unicode', cleanup=False) | |
707 | settings_util.create_rhodecode_setting( |
|
707 | settings_util.create_rhodecode_setting( | |
708 | desc_key, 'old description', 'unicode', cleanup=False) |
|
708 | desc_key, 'old description', 'unicode', cleanup=False) | |
709 |
|
709 | |||
710 | post_url = route_path('admin_settings_issuetracker_update') |
|
710 | post_url = route_path('admin_settings_issuetracker_update') | |
711 | post_data = { |
|
711 | post_data = { | |
712 | 'new_pattern_pattern_0': pattern, |
|
712 | 'new_pattern_pattern_0': pattern, | |
713 | 'new_pattern_url_0': 'https://url', |
|
713 | 'new_pattern_url_0': 'https://url', | |
714 | 'new_pattern_prefix_0': 'prefix', |
|
714 | 'new_pattern_prefix_0': 'prefix', | |
715 | 'new_pattern_description_0': new_description, |
|
715 | 'new_pattern_description_0': new_description, | |
716 | 'uid': self.uid, |
|
716 | 'uid': self.uid, | |
717 | 'csrf_token': csrf_token |
|
717 | 'csrf_token': csrf_token | |
718 | } |
|
718 | } | |
719 | self.app.post(post_url, post_data, status=302) |
|
719 | self.app.post(post_url, post_data, status=302) | |
720 | settings = SettingsModel().get_all_settings() |
|
720 | settings = SettingsModel().get_all_settings() | |
721 | assert settings[rc_pattern_key] == pattern |
|
721 | assert settings[rc_pattern_key] == pattern | |
722 | assert settings[rc_desc_key] == new_description |
|
722 | assert settings[rc_desc_key] == new_description | |
723 |
|
723 | |||
724 | @request.addfinalizer |
|
724 | @request.addfinalizer | |
725 | def cleanup(): |
|
725 | def cleanup(): | |
726 | IssueTrackerSettingsModel().delete_entries(self.uid) |
|
726 | IssueTrackerSettingsModel().delete_entries(self.uid) | |
727 |
|
727 | |||
728 | def test_delete_issuetracker_pattern( |
|
728 | def test_delete_issuetracker_pattern( | |
729 | self, autologin_user, backend, csrf_token, settings_util): |
|
729 | self, autologin_user, backend, csrf_token, settings_util): | |
730 | pattern = 'issuetracker_pat' |
|
730 | pattern = 'issuetracker_pat' | |
731 | uid = md5(pattern) |
|
731 | uid = md5(pattern) | |
732 | settings_util.create_rhodecode_setting( |
|
732 | settings_util.create_rhodecode_setting( | |
733 | self.SHORT_PATTERN_KEY+uid, pattern, 'unicode', cleanup=False) |
|
733 | self.SHORT_PATTERN_KEY+uid, pattern, 'unicode', cleanup=False) | |
734 |
|
734 | |||
735 | post_url = route_path('admin_settings_issuetracker_delete') |
|
735 | post_url = route_path('admin_settings_issuetracker_delete') | |
736 | post_data = { |
|
736 | post_data = { | |
737 | '_method': 'delete', |
|
737 | '_method': 'delete', | |
738 | 'uid': uid, |
|
738 | 'uid': uid, | |
739 | 'csrf_token': csrf_token |
|
739 | 'csrf_token': csrf_token | |
740 | } |
|
740 | } | |
741 | self.app.post(post_url, post_data, status=302) |
|
741 | self.app.post(post_url, post_data, status=302) | |
742 | settings = SettingsModel().get_all_settings() |
|
742 | settings = SettingsModel().get_all_settings() | |
743 | assert 'rhodecode_%s%s' % (self.SHORT_PATTERN_KEY, uid) not in settings |
|
743 | assert 'rhodecode_%s%s' % (self.SHORT_PATTERN_KEY, uid) not in settings |
@@ -1,118 +1,118 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import pytest |
|
21 | import pytest | |
22 |
|
22 | |||
23 | from rhodecode.lib import helpers as h |
|
23 | from rhodecode.lib import helpers as h | |
24 | from rhodecode.tests import ( |
|
24 | from rhodecode.tests import ( | |
25 | TestController, clear_cache_regions, |
|
25 | TestController, clear_cache_regions, | |
26 | TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS) |
|
26 | TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS) | |
27 | from rhodecode.tests.fixture import Fixture |
|
27 | from rhodecode.tests.fixture import Fixture | |
28 | from rhodecode.tests.utils import AssertResponse |
|
28 | from rhodecode.tests.utils import AssertResponse | |
29 |
|
29 | |||
30 | fixture = Fixture() |
|
30 | fixture = Fixture() | |
31 |
|
31 | |||
32 |
|
32 | |||
33 | def route_path(name, params=None, **kwargs): |
|
33 | def route_path(name, params=None, **kwargs): | |
34 | import urllib |
|
34 | import urllib | |
35 | from rhodecode.apps._base import ADMIN_PREFIX |
|
35 | from rhodecode.apps._base import ADMIN_PREFIX | |
36 |
|
36 | |||
37 | base_url = { |
|
37 | base_url = { | |
38 | 'login': ADMIN_PREFIX + '/login', |
|
38 | 'login': ADMIN_PREFIX + '/login', | |
39 | 'logout': ADMIN_PREFIX + '/logout', |
|
39 | 'logout': ADMIN_PREFIX + '/logout', | |
40 | 'register': ADMIN_PREFIX + '/register', |
|
40 | 'register': ADMIN_PREFIX + '/register', | |
41 | 'reset_password': |
|
41 | 'reset_password': | |
42 | ADMIN_PREFIX + '/password_reset', |
|
42 | ADMIN_PREFIX + '/password_reset', | |
43 | 'reset_password_confirmation': |
|
43 | 'reset_password_confirmation': | |
44 | ADMIN_PREFIX + '/password_reset_confirmation', |
|
44 | ADMIN_PREFIX + '/password_reset_confirmation', | |
45 |
|
45 | |||
46 | 'admin_permissions_application': |
|
46 | 'admin_permissions_application': | |
47 | ADMIN_PREFIX + '/permissions/application', |
|
47 | ADMIN_PREFIX + '/permissions/application', | |
48 | 'admin_permissions_application_update': |
|
48 | 'admin_permissions_application_update': | |
49 | ADMIN_PREFIX + '/permissions/application/update', |
|
49 | ADMIN_PREFIX + '/permissions/application/update', | |
50 | }[name].format(**kwargs) |
|
50 | }[name].format(**kwargs) | |
51 |
|
51 | |||
52 | if params: |
|
52 | if params: | |
53 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) |
|
53 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) | |
54 | return base_url |
|
54 | return base_url | |
55 |
|
55 | |||
56 |
|
56 | |||
57 | class TestPasswordReset(TestController): |
|
57 | class TestPasswordReset(TestController): | |
58 |
|
58 | |||
59 | @pytest.mark.parametrize( |
|
59 | @pytest.mark.parametrize( | |
60 | 'pwd_reset_setting, show_link, show_reset', [ |
|
60 | 'pwd_reset_setting, show_link, show_reset', [ | |
61 | ('hg.password_reset.enabled', True, True), |
|
61 | ('hg.password_reset.enabled', True, True), | |
62 | ('hg.password_reset.hidden', False, True), |
|
62 | ('hg.password_reset.hidden', False, True), | |
63 | ('hg.password_reset.disabled', False, False), |
|
63 | ('hg.password_reset.disabled', False, False), | |
64 | ]) |
|
64 | ]) | |
65 | def test_password_reset_settings( |
|
65 | def test_password_reset_settings( | |
66 | self, pwd_reset_setting, show_link, show_reset): |
|
66 | self, pwd_reset_setting, show_link, show_reset): | |
67 | clear_cache_regions() |
|
67 | clear_cache_regions() | |
68 | self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS) |
|
68 | self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS) | |
69 | params = { |
|
69 | params = { | |
70 | 'csrf_token': self.csrf_token, |
|
70 | 'csrf_token': self.csrf_token, | |
71 | 'anonymous': 'True', |
|
71 | 'anonymous': 'True', | |
72 | 'default_register': 'hg.register.auto_activate', |
|
72 | 'default_register': 'hg.register.auto_activate', | |
73 | 'default_register_message': '', |
|
73 | 'default_register_message': '', | |
74 | 'default_password_reset': pwd_reset_setting, |
|
74 | 'default_password_reset': pwd_reset_setting, | |
75 | 'default_extern_activate': 'hg.extern_activate.auto', |
|
75 | 'default_extern_activate': 'hg.extern_activate.auto', | |
76 | } |
|
76 | } | |
77 | resp = self.app.post( |
|
77 | resp = self.app.post( | |
78 | route_path('admin_permissions_application_update'), params=params) |
|
78 | route_path('admin_permissions_application_update'), params=params) | |
79 | self.logout_user() |
|
79 | self.logout_user() | |
80 |
|
80 | |||
81 | login_page = self.app.get(route_path('login')) |
|
81 | login_page = self.app.get(route_path('login')) | |
82 | asr_login = AssertResponse(login_page) |
|
82 | asr_login = AssertResponse(login_page) | |
83 |
|
83 | |||
84 | if show_link: |
|
84 | if show_link: | |
85 | asr_login.one_element_exists('a.pwd_reset') |
|
85 | asr_login.one_element_exists('a.pwd_reset') | |
86 | else: |
|
86 | else: | |
87 | asr_login.no_element_exists('a.pwd_reset') |
|
87 | asr_login.no_element_exists('a.pwd_reset') | |
88 |
|
88 | |||
89 | response = self.app.get(route_path('reset_password')) |
|
89 | response = self.app.get(route_path('reset_password')) | |
90 |
|
90 | |||
91 |
assert_response = |
|
91 | assert_response = response.assert_response() | |
92 | if show_reset: |
|
92 | if show_reset: | |
93 | response.mustcontain('Send password reset email') |
|
93 | response.mustcontain('Send password reset email') | |
94 | assert_response.one_element_exists('#email') |
|
94 | assert_response.one_element_exists('#email') | |
95 | assert_response.one_element_exists('#send') |
|
95 | assert_response.one_element_exists('#send') | |
96 | else: |
|
96 | else: | |
97 | response.mustcontain('Password reset is disabled.') |
|
97 | response.mustcontain('Password reset is disabled.') | |
98 | assert_response.no_element_exists('#email') |
|
98 | assert_response.no_element_exists('#email') | |
99 | assert_response.no_element_exists('#send') |
|
99 | assert_response.no_element_exists('#send') | |
100 |
|
100 | |||
101 | def test_password_form_disabled(self): |
|
101 | def test_password_form_disabled(self): | |
102 | self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS) |
|
102 | self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS) | |
103 | params = { |
|
103 | params = { | |
104 | 'csrf_token': self.csrf_token, |
|
104 | 'csrf_token': self.csrf_token, | |
105 | 'anonymous': 'True', |
|
105 | 'anonymous': 'True', | |
106 | 'default_register': 'hg.register.auto_activate', |
|
106 | 'default_register': 'hg.register.auto_activate', | |
107 | 'default_register_message': '', |
|
107 | 'default_register_message': '', | |
108 | 'default_password_reset': 'hg.password_reset.disabled', |
|
108 | 'default_password_reset': 'hg.password_reset.disabled', | |
109 | 'default_extern_activate': 'hg.extern_activate.auto', |
|
109 | 'default_extern_activate': 'hg.extern_activate.auto', | |
110 | } |
|
110 | } | |
111 | self.app.post(route_path('admin_permissions_application_update'), params=params) |
|
111 | self.app.post(route_path('admin_permissions_application_update'), params=params) | |
112 | self.logout_user() |
|
112 | self.logout_user() | |
113 |
|
113 | |||
114 | response = self.app.post( |
|
114 | response = self.app.post( | |
115 | route_path('reset_password'), {'email': 'lisa@rhodecode.com',} |
|
115 | route_path('reset_password'), {'email': 'lisa@rhodecode.com',} | |
116 | ) |
|
116 | ) | |
117 | response = response.follow() |
|
117 | response = response.follow() | |
118 | response.mustcontain('Password reset is disabled.') |
|
118 | response.mustcontain('Password reset is disabled.') |
@@ -1,133 +1,133 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2016-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2016-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 |
|
21 | |||
22 | import mock |
|
22 | import mock | |
23 | import pytest |
|
23 | import pytest | |
24 |
|
24 | |||
25 | from rhodecode.apps._base import ADMIN_PREFIX |
|
25 | from rhodecode.apps._base import ADMIN_PREFIX | |
26 | from rhodecode.apps.login.views import LoginView, CaptchaData |
|
26 | from rhodecode.apps.login.views import LoginView, CaptchaData | |
27 | from rhodecode.model.settings import SettingsModel |
|
27 | from rhodecode.model.settings import SettingsModel | |
28 | from rhodecode.lib.utils2 import AttributeDict |
|
28 | from rhodecode.lib.utils2 import AttributeDict | |
29 | from rhodecode.tests.utils import AssertResponse |
|
29 | from rhodecode.tests.utils import AssertResponse | |
30 |
|
30 | |||
31 |
|
31 | |||
32 | class RhodeCodeSetting(object): |
|
32 | class RhodeCodeSetting(object): | |
33 | def __init__(self, name, value): |
|
33 | def __init__(self, name, value): | |
34 | self.name = name |
|
34 | self.name = name | |
35 | self.value = value |
|
35 | self.value = value | |
36 |
|
36 | |||
37 | def __enter__(self): |
|
37 | def __enter__(self): | |
38 | from rhodecode.model.settings import SettingsModel |
|
38 | from rhodecode.model.settings import SettingsModel | |
39 | model = SettingsModel() |
|
39 | model = SettingsModel() | |
40 | self.old_setting = model.get_setting_by_name(self.name) |
|
40 | self.old_setting = model.get_setting_by_name(self.name) | |
41 | model.create_or_update_setting(name=self.name, val=self.value) |
|
41 | model.create_or_update_setting(name=self.name, val=self.value) | |
42 | return self |
|
42 | return self | |
43 |
|
43 | |||
44 | def __exit__(self, exc_type, exc_val, exc_tb): |
|
44 | def __exit__(self, exc_type, exc_val, exc_tb): | |
45 | model = SettingsModel() |
|
45 | model = SettingsModel() | |
46 | if self.old_setting: |
|
46 | if self.old_setting: | |
47 | model.create_or_update_setting( |
|
47 | model.create_or_update_setting( | |
48 | name=self.name, val=self.old_setting.app_settings_value) |
|
48 | name=self.name, val=self.old_setting.app_settings_value) | |
49 | else: |
|
49 | else: | |
50 | model.create_or_update_setting(name=self.name) |
|
50 | model.create_or_update_setting(name=self.name) | |
51 |
|
51 | |||
52 |
|
52 | |||
53 | class TestRegisterCaptcha(object): |
|
53 | class TestRegisterCaptcha(object): | |
54 |
|
54 | |||
55 | @pytest.mark.parametrize('private_key, public_key, expected', [ |
|
55 | @pytest.mark.parametrize('private_key, public_key, expected', [ | |
56 | ('', '', CaptchaData(False, '', '')), |
|
56 | ('', '', CaptchaData(False, '', '')), | |
57 | ('', 'pubkey', CaptchaData(False, '', 'pubkey')), |
|
57 | ('', 'pubkey', CaptchaData(False, '', 'pubkey')), | |
58 | ('privkey', '', CaptchaData(True, 'privkey', '')), |
|
58 | ('privkey', '', CaptchaData(True, 'privkey', '')), | |
59 | ('privkey', 'pubkey', CaptchaData(True, 'privkey', 'pubkey')), |
|
59 | ('privkey', 'pubkey', CaptchaData(True, 'privkey', 'pubkey')), | |
60 | ]) |
|
60 | ]) | |
61 | def test_get_captcha_data(self, private_key, public_key, expected, |
|
61 | def test_get_captcha_data(self, private_key, public_key, expected, | |
62 | request_stub, user_util): |
|
62 | request_stub, user_util): | |
63 | request_stub.user = user_util.create_user().AuthUser() |
|
63 | request_stub.user = user_util.create_user().AuthUser() | |
64 | request_stub.matched_route = AttributeDict({'name': 'login'}) |
|
64 | request_stub.matched_route = AttributeDict({'name': 'login'}) | |
65 | login_view = LoginView(mock.Mock(), request_stub) |
|
65 | login_view = LoginView(mock.Mock(), request_stub) | |
66 |
|
66 | |||
67 | with RhodeCodeSetting('captcha_private_key', private_key): |
|
67 | with RhodeCodeSetting('captcha_private_key', private_key): | |
68 | with RhodeCodeSetting('captcha_public_key', public_key): |
|
68 | with RhodeCodeSetting('captcha_public_key', public_key): | |
69 | captcha = login_view._get_captcha_data() |
|
69 | captcha = login_view._get_captcha_data() | |
70 | assert captcha == expected |
|
70 | assert captcha == expected | |
71 |
|
71 | |||
72 | @pytest.mark.parametrize('active', [False, True]) |
|
72 | @pytest.mark.parametrize('active', [False, True]) | |
73 | @mock.patch.object(LoginView, '_get_captcha_data') |
|
73 | @mock.patch.object(LoginView, '_get_captcha_data') | |
74 | def test_private_key_does_not_leak_to_html( |
|
74 | def test_private_key_does_not_leak_to_html( | |
75 | self, m_get_captcha_data, active, app): |
|
75 | self, m_get_captcha_data, active, app): | |
76 | captcha = CaptchaData( |
|
76 | captcha = CaptchaData( | |
77 | active=active, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY') |
|
77 | active=active, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY') | |
78 | m_get_captcha_data.return_value = captcha |
|
78 | m_get_captcha_data.return_value = captcha | |
79 |
|
79 | |||
80 | response = app.get(ADMIN_PREFIX + '/register') |
|
80 | response = app.get(ADMIN_PREFIX + '/register') | |
81 | assert 'PRIVATE_KEY' not in response |
|
81 | assert 'PRIVATE_KEY' not in response | |
82 |
|
82 | |||
83 | @pytest.mark.parametrize('active', [False, True]) |
|
83 | @pytest.mark.parametrize('active', [False, True]) | |
84 | @mock.patch.object(LoginView, '_get_captcha_data') |
|
84 | @mock.patch.object(LoginView, '_get_captcha_data') | |
85 | def test_register_view_renders_captcha( |
|
85 | def test_register_view_renders_captcha( | |
86 | self, m_get_captcha_data, active, app): |
|
86 | self, m_get_captcha_data, active, app): | |
87 | captcha = CaptchaData( |
|
87 | captcha = CaptchaData( | |
88 | active=active, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY') |
|
88 | active=active, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY') | |
89 | m_get_captcha_data.return_value = captcha |
|
89 | m_get_captcha_data.return_value = captcha | |
90 |
|
90 | |||
91 | response = app.get(ADMIN_PREFIX + '/register') |
|
91 | response = app.get(ADMIN_PREFIX + '/register') | |
92 |
|
92 | |||
93 |
assertr = |
|
93 | assertr = response.assert_response() | |
94 | if active: |
|
94 | if active: | |
95 | assertr.one_element_exists('#recaptcha_field') |
|
95 | assertr.one_element_exists('#recaptcha_field') | |
96 | else: |
|
96 | else: | |
97 | assertr.no_element_exists('#recaptcha_field') |
|
97 | assertr.no_element_exists('#recaptcha_field') | |
98 |
|
98 | |||
99 | @pytest.mark.parametrize('valid', [False, True]) |
|
99 | @pytest.mark.parametrize('valid', [False, True]) | |
100 | @mock.patch.object(LoginView, 'validate_captcha') |
|
100 | @mock.patch.object(LoginView, 'validate_captcha') | |
101 | @mock.patch.object(LoginView, '_get_captcha_data') |
|
101 | @mock.patch.object(LoginView, '_get_captcha_data') | |
102 | def test_register_with_active_captcha( |
|
102 | def test_register_with_active_captcha( | |
103 | self, m_get_captcha_data, m_validate_captcha, valid, app, csrf_token): |
|
103 | self, m_get_captcha_data, m_validate_captcha, valid, app, csrf_token): | |
104 | captcha = CaptchaData( |
|
104 | captcha = CaptchaData( | |
105 | active=True, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY') |
|
105 | active=True, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY') | |
106 | m_get_captcha_data.return_value = captcha |
|
106 | m_get_captcha_data.return_value = captcha | |
107 | m_response = mock.Mock() |
|
107 | m_response = mock.Mock() | |
108 | m_response.is_valid = valid |
|
108 | m_response.is_valid = valid | |
109 | m_validate_captcha.return_value = valid, 'ok' |
|
109 | m_validate_captcha.return_value = valid, 'ok' | |
110 |
|
110 | |||
111 | params = { |
|
111 | params = { | |
112 | 'csrf_token': csrf_token, |
|
112 | 'csrf_token': csrf_token, | |
113 | 'email': 'pytest@example.com', |
|
113 | 'email': 'pytest@example.com', | |
114 | 'firstname': 'pytest-firstname', |
|
114 | 'firstname': 'pytest-firstname', | |
115 | 'lastname': 'pytest-lastname', |
|
115 | 'lastname': 'pytest-lastname', | |
116 | 'password': 'secret', |
|
116 | 'password': 'secret', | |
117 | 'password_confirmation': 'secret', |
|
117 | 'password_confirmation': 'secret', | |
118 | 'username': 'pytest', |
|
118 | 'username': 'pytest', | |
119 | } |
|
119 | } | |
120 | response = app.post(ADMIN_PREFIX + '/register', params=params) |
|
120 | response = app.post(ADMIN_PREFIX + '/register', params=params) | |
121 |
|
121 | |||
122 | if valid: |
|
122 | if valid: | |
123 | # If we provided a valid captcha input we expect a successful |
|
123 | # If we provided a valid captcha input we expect a successful | |
124 | # registration and redirect to the login page. |
|
124 | # registration and redirect to the login page. | |
125 | assert response.status_int == 302 |
|
125 | assert response.status_int == 302 | |
126 | assert 'location' in response.headers |
|
126 | assert 'location' in response.headers | |
127 | assert ADMIN_PREFIX + '/login' in response.headers['location'] |
|
127 | assert ADMIN_PREFIX + '/login' in response.headers['location'] | |
128 | else: |
|
128 | else: | |
129 | # If captche input is invalid we expect to stay on the registration |
|
129 | # If captche input is invalid we expect to stay on the registration | |
130 | # page with an error message displayed. |
|
130 | # page with an error message displayed. | |
131 |
assertr = |
|
131 | assertr = response.assert_response() | |
132 | assert response.status_int == 200 |
|
132 | assert response.status_int == 200 | |
133 | assertr.one_element_exists('#recaptcha_field ~ span.error-message') |
|
133 | assertr.one_element_exists('#recaptcha_field ~ span.error-message') |
@@ -1,137 +1,137 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import pytest |
|
21 | import pytest | |
22 | from rhodecode.model.auth_token import AuthTokenModel |
|
22 | from rhodecode.model.auth_token import AuthTokenModel | |
23 | from rhodecode.tests import TestController |
|
23 | from rhodecode.tests import TestController | |
24 |
|
24 | |||
25 |
|
25 | |||
26 | def route_path(name, params=None, **kwargs): |
|
26 | def route_path(name, params=None, **kwargs): | |
27 | import urllib |
|
27 | import urllib | |
28 |
|
28 | |||
29 | base_url = { |
|
29 | base_url = { | |
30 | 'rss_feed_home': '/{repo_name}/feed-rss', |
|
30 | 'rss_feed_home': '/{repo_name}/feed-rss', | |
31 | 'atom_feed_home': '/{repo_name}/feed-atom', |
|
31 | 'atom_feed_home': '/{repo_name}/feed-atom', | |
32 | 'rss_feed_home_old': '/{repo_name}/feed/rss', |
|
32 | 'rss_feed_home_old': '/{repo_name}/feed/rss', | |
33 | 'atom_feed_home_old': '/{repo_name}/feed/atom', |
|
33 | 'atom_feed_home_old': '/{repo_name}/feed/atom', | |
34 | }[name].format(**kwargs) |
|
34 | }[name].format(**kwargs) | |
35 |
|
35 | |||
36 | if params: |
|
36 | if params: | |
37 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) |
|
37 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) | |
38 | return base_url |
|
38 | return base_url | |
39 |
|
39 | |||
40 |
|
40 | |||
41 | class TestFeedView(TestController): |
|
41 | class TestFeedView(TestController): | |
42 |
|
42 | |||
43 | @pytest.mark.parametrize("feed_type,response_types,content_type",[ |
|
43 | @pytest.mark.parametrize("feed_type,response_types,content_type",[ | |
44 | ('rss', ['<rss version="2.0">'], |
|
44 | ('rss', ['<rss version="2.0">'], | |
45 | "application/rss+xml"), |
|
45 | "application/rss+xml"), | |
46 | ('atom', ['xmlns="http://www.w3.org/2005/Atom"', 'xml:lang="en-us"'], |
|
46 | ('atom', ['xmlns="http://www.w3.org/2005/Atom"', 'xml:lang="en-us"'], | |
47 | "application/atom+xml"), |
|
47 | "application/atom+xml"), | |
48 | ]) |
|
48 | ]) | |
49 | def test_feed(self, backend, feed_type, response_types, content_type): |
|
49 | def test_feed(self, backend, feed_type, response_types, content_type): | |
50 | self.log_user() |
|
50 | self.log_user() | |
51 | response = self.app.get( |
|
51 | response = self.app.get( | |
52 | route_path('{}_feed_home'.format(feed_type), |
|
52 | route_path('{}_feed_home'.format(feed_type), | |
53 | repo_name=backend.repo_name)) |
|
53 | repo_name=backend.repo_name)) | |
54 |
|
54 | |||
55 | for content in response_types: |
|
55 | for content in response_types: | |
56 | response.mustcontain(content) |
|
56 | response.mustcontain(content) | |
57 |
|
57 | |||
58 | assert response.content_type == content_type |
|
58 | assert response.content_type == content_type | |
59 |
|
59 | |||
60 | @pytest.mark.parametrize("feed_type, content_type", [ |
|
60 | @pytest.mark.parametrize("feed_type, content_type", [ | |
61 | ('rss', "application/rss+xml"), |
|
61 | ('rss', "application/rss+xml"), | |
62 | ('atom', "application/atom+xml") |
|
62 | ('atom', "application/atom+xml") | |
63 | ]) |
|
63 | ]) | |
64 | def test_feed_with_auth_token( |
|
64 | def test_feed_with_auth_token( | |
65 | self, backend, user_admin, feed_type, content_type): |
|
65 | self, backend, user_admin, feed_type, content_type): | |
66 | auth_token = user_admin.feed_token |
|
66 | auth_token = user_admin.feed_token | |
67 | assert auth_token != '' |
|
67 | assert auth_token != '' | |
68 |
|
68 | |||
69 | response = self.app.get( |
|
69 | response = self.app.get( | |
70 | route_path( |
|
70 | route_path( | |
71 | '{}_feed_home'.format(feed_type), |
|
71 | '{}_feed_home'.format(feed_type), | |
72 | repo_name=backend.repo_name, |
|
72 | repo_name=backend.repo_name, | |
73 | params=dict(auth_token=auth_token)), |
|
73 | params=dict(auth_token=auth_token)), | |
74 | status=200) |
|
74 | status=200) | |
75 |
|
75 | |||
76 | assert response.content_type == content_type |
|
76 | assert response.content_type == content_type | |
77 |
|
77 | |||
78 | @pytest.mark.parametrize("feed_type, content_type", [ |
|
78 | @pytest.mark.parametrize("feed_type, content_type", [ | |
79 | ('rss', "application/rss+xml"), |
|
79 | ('rss', "application/rss+xml"), | |
80 | ('atom', "application/atom+xml") |
|
80 | ('atom', "application/atom+xml") | |
81 | ]) |
|
81 | ]) | |
82 | def test_feed_with_auth_token_by_uid( |
|
82 | def test_feed_with_auth_token_by_uid( | |
83 | self, backend, user_admin, feed_type, content_type): |
|
83 | self, backend, user_admin, feed_type, content_type): | |
84 | auth_token = user_admin.feed_token |
|
84 | auth_token = user_admin.feed_token | |
85 | assert auth_token != '' |
|
85 | assert auth_token != '' | |
86 |
|
86 | |||
87 | response = self.app.get( |
|
87 | response = self.app.get( | |
88 | route_path( |
|
88 | route_path( | |
89 | '{}_feed_home'.format(feed_type), |
|
89 | '{}_feed_home'.format(feed_type), | |
90 | repo_name='_{}'.format(backend.repo.repo_id), |
|
90 | repo_name='_{}'.format(backend.repo.repo_id), | |
91 | params=dict(auth_token=auth_token)), |
|
91 | params=dict(auth_token=auth_token)), | |
92 | status=200) |
|
92 | status=200) | |
93 |
|
93 | |||
94 | assert response.content_type == content_type |
|
94 | assert response.content_type == content_type | |
95 |
|
95 | |||
96 | @pytest.mark.parametrize("feed_type, content_type", [ |
|
96 | @pytest.mark.parametrize("feed_type, content_type", [ | |
97 | ('rss', "application/rss+xml"), |
|
97 | ('rss', "application/rss+xml"), | |
98 | ('atom', "application/atom+xml") |
|
98 | ('atom', "application/atom+xml") | |
99 | ]) |
|
99 | ]) | |
100 | def test_feed_old_urls_with_auth_token( |
|
100 | def test_feed_old_urls_with_auth_token( | |
101 | self, backend, user_admin, feed_type, content_type): |
|
101 | self, backend, user_admin, feed_type, content_type): | |
102 | auth_token = user_admin.feed_token |
|
102 | auth_token = user_admin.feed_token | |
103 | assert auth_token != '' |
|
103 | assert auth_token != '' | |
104 |
|
104 | |||
105 | response = self.app.get( |
|
105 | response = self.app.get( | |
106 | route_path( |
|
106 | route_path( | |
107 | '{}_feed_home_old'.format(feed_type), |
|
107 | '{}_feed_home_old'.format(feed_type), | |
108 | repo_name=backend.repo_name, |
|
108 | repo_name=backend.repo_name, | |
109 | params=dict(auth_token=auth_token)), |
|
109 | params=dict(auth_token=auth_token)), | |
110 | status=200) |
|
110 | status=200) | |
111 |
|
111 | |||
112 | assert response.content_type == content_type |
|
112 | assert response.content_type == content_type | |
113 |
|
113 | |||
114 | @pytest.mark.parametrize("feed_type", ['rss', 'atom']) |
|
114 | @pytest.mark.parametrize("feed_type", ['rss', 'atom']) | |
115 | def test_feed_with_auth_token_of_wrong_type( |
|
115 | def test_feed_with_auth_token_of_wrong_type( | |
116 | self, backend, user_util, feed_type): |
|
116 | self, backend, user_util, feed_type): | |
117 | user = user_util.create_user() |
|
117 | user = user_util.create_user() | |
118 | auth_token = AuthTokenModel().create( |
|
118 | auth_token = AuthTokenModel().create( | |
119 | user.user_id, 'test-token', -1, AuthTokenModel.cls.ROLE_API) |
|
119 | user.user_id, u'test-token', -1, AuthTokenModel.cls.ROLE_API) | |
120 | auth_token = auth_token.api_key |
|
120 | auth_token = auth_token.api_key | |
121 |
|
121 | |||
122 | self.app.get( |
|
122 | self.app.get( | |
123 | route_path( |
|
123 | route_path( | |
124 | '{}_feed_home'.format(feed_type), |
|
124 | '{}_feed_home'.format(feed_type), | |
125 | repo_name=backend.repo_name, |
|
125 | repo_name=backend.repo_name, | |
126 | params=dict(auth_token=auth_token)), |
|
126 | params=dict(auth_token=auth_token)), | |
127 | status=302) |
|
127 | status=302) | |
128 |
|
128 | |||
129 | auth_token = AuthTokenModel().create( |
|
129 | auth_token = AuthTokenModel().create( | |
130 | user.user_id, 'test-token', -1, AuthTokenModel.cls.ROLE_FEED) |
|
130 | user.user_id, u'test-token', -1, AuthTokenModel.cls.ROLE_FEED) | |
131 | auth_token = auth_token.api_key |
|
131 | auth_token = auth_token.api_key | |
132 | self.app.get( |
|
132 | self.app.get( | |
133 | route_path( |
|
133 | route_path( | |
134 | '{}_feed_home'.format(feed_type), |
|
134 | '{}_feed_home'.format(feed_type), | |
135 | repo_name=backend.repo_name, |
|
135 | repo_name=backend.repo_name, | |
136 | params=dict(auth_token=auth_token)), |
|
136 | params=dict(auth_token=auth_token)), | |
137 | status=200) |
|
137 | status=200) |
@@ -1,524 +1,524 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import re |
|
21 | import re | |
22 |
|
22 | |||
23 | import mock |
|
23 | import mock | |
24 | import pytest |
|
24 | import pytest | |
25 |
|
25 | |||
26 | from rhodecode.apps.repository.views.repo_summary import RepoSummaryView |
|
26 | from rhodecode.apps.repository.views.repo_summary import RepoSummaryView | |
27 | from rhodecode.lib import helpers as h |
|
27 | from rhodecode.lib import helpers as h | |
28 | from rhodecode.lib.compat import OrderedDict |
|
28 | from rhodecode.lib.compat import OrderedDict | |
29 | from rhodecode.lib.utils2 import AttributeDict, safe_str |
|
29 | from rhodecode.lib.utils2 import AttributeDict, safe_str | |
30 | from rhodecode.lib.vcs.exceptions import RepositoryRequirementError |
|
30 | from rhodecode.lib.vcs.exceptions import RepositoryRequirementError | |
31 | from rhodecode.model.db import Repository |
|
31 | from rhodecode.model.db import Repository | |
32 | from rhodecode.model.meta import Session |
|
32 | from rhodecode.model.meta import Session | |
33 | from rhodecode.model.repo import RepoModel |
|
33 | from rhodecode.model.repo import RepoModel | |
34 | from rhodecode.model.scm import ScmModel |
|
34 | from rhodecode.model.scm import ScmModel | |
35 | from rhodecode.tests import assert_session_flash |
|
35 | from rhodecode.tests import assert_session_flash | |
36 | from rhodecode.tests.fixture import Fixture |
|
36 | from rhodecode.tests.fixture import Fixture | |
37 | from rhodecode.tests.utils import AssertResponse, repo_on_filesystem |
|
37 | from rhodecode.tests.utils import AssertResponse, repo_on_filesystem | |
38 |
|
38 | |||
39 |
|
39 | |||
40 | fixture = Fixture() |
|
40 | fixture = Fixture() | |
41 |
|
41 | |||
42 |
|
42 | |||
43 | def route_path(name, params=None, **kwargs): |
|
43 | def route_path(name, params=None, **kwargs): | |
44 | import urllib |
|
44 | import urllib | |
45 |
|
45 | |||
46 | base_url = { |
|
46 | base_url = { | |
47 | 'repo_summary': '/{repo_name}', |
|
47 | 'repo_summary': '/{repo_name}', | |
48 | 'repo_stats': '/{repo_name}/repo_stats/{commit_id}', |
|
48 | 'repo_stats': '/{repo_name}/repo_stats/{commit_id}', | |
49 | 'repo_refs_data': '/{repo_name}/refs-data', |
|
49 | 'repo_refs_data': '/{repo_name}/refs-data', | |
50 | 'repo_refs_changelog_data': '/{repo_name}/refs-data-changelog', |
|
50 | 'repo_refs_changelog_data': '/{repo_name}/refs-data-changelog', | |
51 | 'repo_creating_check': '/{repo_name}/repo_creating_check', |
|
51 | 'repo_creating_check': '/{repo_name}/repo_creating_check', | |
52 | }[name].format(**kwargs) |
|
52 | }[name].format(**kwargs) | |
53 |
|
53 | |||
54 | if params: |
|
54 | if params: | |
55 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) |
|
55 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) | |
56 | return base_url |
|
56 | return base_url | |
57 |
|
57 | |||
58 |
|
58 | |||
59 | def assert_clone_url(response, server, repo, disabled=False): |
|
59 | def assert_clone_url(response, server, repo, disabled=False): | |
60 |
|
60 | |||
61 | response.mustcontain( |
|
61 | response.mustcontain( | |
62 | '<input type="text" class="input-monospace clone_url_input" ' |
|
62 | '<input type="text" class="input-monospace clone_url_input" ' | |
63 | '{disabled}readonly="readonly" ' |
|
63 | '{disabled}readonly="readonly" ' | |
64 | 'value="http://test_admin@{server}/{repo}"/>'.format( |
|
64 | 'value="http://test_admin@{server}/{repo}"/>'.format( | |
65 | server=server, repo=repo, disabled='disabled ' if disabled else ' ') |
|
65 | server=server, repo=repo, disabled='disabled ' if disabled else ' ') | |
66 | ) |
|
66 | ) | |
67 |
|
67 | |||
68 |
|
68 | |||
69 | @pytest.mark.usefixtures('app') |
|
69 | @pytest.mark.usefixtures('app') | |
70 | class TestSummaryView(object): |
|
70 | class TestSummaryView(object): | |
71 | def test_index(self, autologin_user, backend, http_host_only_stub): |
|
71 | def test_index(self, autologin_user, backend, http_host_only_stub): | |
72 | repo_id = backend.repo.repo_id |
|
72 | repo_id = backend.repo.repo_id | |
73 | repo_name = backend.repo_name |
|
73 | repo_name = backend.repo_name | |
74 | with mock.patch('rhodecode.lib.helpers.is_svn_without_proxy', |
|
74 | with mock.patch('rhodecode.lib.helpers.is_svn_without_proxy', | |
75 | return_value=False): |
|
75 | return_value=False): | |
76 | response = self.app.get( |
|
76 | response = self.app.get( | |
77 | route_path('repo_summary', repo_name=repo_name)) |
|
77 | route_path('repo_summary', repo_name=repo_name)) | |
78 |
|
78 | |||
79 | # repo type |
|
79 | # repo type | |
80 | response.mustcontain( |
|
80 | response.mustcontain( | |
81 | '<i class="icon-%s">' % (backend.alias, ) |
|
81 | '<i class="icon-%s">' % (backend.alias, ) | |
82 | ) |
|
82 | ) | |
83 | # public/private |
|
83 | # public/private | |
84 | response.mustcontain( |
|
84 | response.mustcontain( | |
85 | """<i class="icon-unlock-alt">""" |
|
85 | """<i class="icon-unlock-alt">""" | |
86 | ) |
|
86 | ) | |
87 |
|
87 | |||
88 | # clone url... |
|
88 | # clone url... | |
89 | assert_clone_url(response, http_host_only_stub, repo_name) |
|
89 | assert_clone_url(response, http_host_only_stub, repo_name) | |
90 | assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id)) |
|
90 | assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id)) | |
91 |
|
91 | |||
92 | def test_index_svn_without_proxy( |
|
92 | def test_index_svn_without_proxy( | |
93 | self, autologin_user, backend_svn, http_host_only_stub): |
|
93 | self, autologin_user, backend_svn, http_host_only_stub): | |
94 | repo_id = backend_svn.repo.repo_id |
|
94 | repo_id = backend_svn.repo.repo_id | |
95 | repo_name = backend_svn.repo_name |
|
95 | repo_name = backend_svn.repo_name | |
96 | response = self.app.get(route_path('repo_summary', repo_name=repo_name)) |
|
96 | response = self.app.get(route_path('repo_summary', repo_name=repo_name)) | |
97 | # clone url... |
|
97 | # clone url... | |
98 |
|
98 | |||
99 | assert_clone_url(response, http_host_only_stub, repo_name, disabled=True) |
|
99 | assert_clone_url(response, http_host_only_stub, repo_name, disabled=True) | |
100 | assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id), disabled=True) |
|
100 | assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id), disabled=True) | |
101 |
|
101 | |||
102 | def test_index_with_trailing_slash( |
|
102 | def test_index_with_trailing_slash( | |
103 | self, autologin_user, backend, http_host_only_stub): |
|
103 | self, autologin_user, backend, http_host_only_stub): | |
104 |
|
104 | |||
105 | repo_id = backend.repo.repo_id |
|
105 | repo_id = backend.repo.repo_id | |
106 | repo_name = backend.repo_name |
|
106 | repo_name = backend.repo_name | |
107 | with mock.patch('rhodecode.lib.helpers.is_svn_without_proxy', |
|
107 | with mock.patch('rhodecode.lib.helpers.is_svn_without_proxy', | |
108 | return_value=False): |
|
108 | return_value=False): | |
109 | response = self.app.get( |
|
109 | response = self.app.get( | |
110 | route_path('repo_summary', repo_name=repo_name) + '/', |
|
110 | route_path('repo_summary', repo_name=repo_name) + '/', | |
111 | status=200) |
|
111 | status=200) | |
112 |
|
112 | |||
113 | # clone url... |
|
113 | # clone url... | |
114 | assert_clone_url(response, http_host_only_stub, repo_name) |
|
114 | assert_clone_url(response, http_host_only_stub, repo_name) | |
115 | assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id)) |
|
115 | assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id)) | |
116 |
|
116 | |||
117 | def test_index_by_id(self, autologin_user, backend): |
|
117 | def test_index_by_id(self, autologin_user, backend): | |
118 | repo_id = backend.repo.repo_id |
|
118 | repo_id = backend.repo.repo_id | |
119 | response = self.app.get( |
|
119 | response = self.app.get( | |
120 | route_path('repo_summary', repo_name='_%s' % (repo_id,))) |
|
120 | route_path('repo_summary', repo_name='_%s' % (repo_id,))) | |
121 |
|
121 | |||
122 | # repo type |
|
122 | # repo type | |
123 | response.mustcontain( |
|
123 | response.mustcontain( | |
124 | '<i class="icon-%s">' % (backend.alias, ) |
|
124 | '<i class="icon-%s">' % (backend.alias, ) | |
125 | ) |
|
125 | ) | |
126 | # public/private |
|
126 | # public/private | |
127 | response.mustcontain( |
|
127 | response.mustcontain( | |
128 | """<i class="icon-unlock-alt">""" |
|
128 | """<i class="icon-unlock-alt">""" | |
129 | ) |
|
129 | ) | |
130 |
|
130 | |||
131 | def test_index_by_repo_having_id_path_in_name_hg(self, autologin_user): |
|
131 | def test_index_by_repo_having_id_path_in_name_hg(self, autologin_user): | |
132 | fixture.create_repo(name='repo_1') |
|
132 | fixture.create_repo(name='repo_1') | |
133 | response = self.app.get(route_path('repo_summary', repo_name='repo_1')) |
|
133 | response = self.app.get(route_path('repo_summary', repo_name='repo_1')) | |
134 |
|
134 | |||
135 | try: |
|
135 | try: | |
136 | response.mustcontain("repo_1") |
|
136 | response.mustcontain("repo_1") | |
137 | finally: |
|
137 | finally: | |
138 | RepoModel().delete(Repository.get_by_repo_name('repo_1')) |
|
138 | RepoModel().delete(Repository.get_by_repo_name('repo_1')) | |
139 | Session().commit() |
|
139 | Session().commit() | |
140 |
|
140 | |||
141 | def test_index_with_anonymous_access_disabled( |
|
141 | def test_index_with_anonymous_access_disabled( | |
142 | self, backend, disable_anonymous_user): |
|
142 | self, backend, disable_anonymous_user): | |
143 | response = self.app.get( |
|
143 | response = self.app.get( | |
144 | route_path('repo_summary', repo_name=backend.repo_name), status=302) |
|
144 | route_path('repo_summary', repo_name=backend.repo_name), status=302) | |
145 | assert 'login' in response.location |
|
145 | assert 'login' in response.location | |
146 |
|
146 | |||
147 | def _enable_stats(self, repo): |
|
147 | def _enable_stats(self, repo): | |
148 | r = Repository.get_by_repo_name(repo) |
|
148 | r = Repository.get_by_repo_name(repo) | |
149 | r.enable_statistics = True |
|
149 | r.enable_statistics = True | |
150 | Session().add(r) |
|
150 | Session().add(r) | |
151 | Session().commit() |
|
151 | Session().commit() | |
152 |
|
152 | |||
153 | expected_trending = { |
|
153 | expected_trending = { | |
154 | 'hg': { |
|
154 | 'hg': { | |
155 | "py": {"count": 68, "desc": ["Python"]}, |
|
155 | "py": {"count": 68, "desc": ["Python"]}, | |
156 | "rst": {"count": 16, "desc": ["Rst"]}, |
|
156 | "rst": {"count": 16, "desc": ["Rst"]}, | |
157 | "css": {"count": 2, "desc": ["Css"]}, |
|
157 | "css": {"count": 2, "desc": ["Css"]}, | |
158 | "sh": {"count": 2, "desc": ["Bash"]}, |
|
158 | "sh": {"count": 2, "desc": ["Bash"]}, | |
159 | "bat": {"count": 1, "desc": ["Batch"]}, |
|
159 | "bat": {"count": 1, "desc": ["Batch"]}, | |
160 | "cfg": {"count": 1, "desc": ["Ini"]}, |
|
160 | "cfg": {"count": 1, "desc": ["Ini"]}, | |
161 | "html": {"count": 1, "desc": ["EvoqueHtml", "Html"]}, |
|
161 | "html": {"count": 1, "desc": ["EvoqueHtml", "Html"]}, | |
162 | "ini": {"count": 1, "desc": ["Ini"]}, |
|
162 | "ini": {"count": 1, "desc": ["Ini"]}, | |
163 | "js": {"count": 1, "desc": ["Javascript"]}, |
|
163 | "js": {"count": 1, "desc": ["Javascript"]}, | |
164 | "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]} |
|
164 | "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]} | |
165 | }, |
|
165 | }, | |
166 | 'git': { |
|
166 | 'git': { | |
167 | "py": {"count": 68, "desc": ["Python"]}, |
|
167 | "py": {"count": 68, "desc": ["Python"]}, | |
168 | "rst": {"count": 16, "desc": ["Rst"]}, |
|
168 | "rst": {"count": 16, "desc": ["Rst"]}, | |
169 | "css": {"count": 2, "desc": ["Css"]}, |
|
169 | "css": {"count": 2, "desc": ["Css"]}, | |
170 | "sh": {"count": 2, "desc": ["Bash"]}, |
|
170 | "sh": {"count": 2, "desc": ["Bash"]}, | |
171 | "bat": {"count": 1, "desc": ["Batch"]}, |
|
171 | "bat": {"count": 1, "desc": ["Batch"]}, | |
172 | "cfg": {"count": 1, "desc": ["Ini"]}, |
|
172 | "cfg": {"count": 1, "desc": ["Ini"]}, | |
173 | "html": {"count": 1, "desc": ["EvoqueHtml", "Html"]}, |
|
173 | "html": {"count": 1, "desc": ["EvoqueHtml", "Html"]}, | |
174 | "ini": {"count": 1, "desc": ["Ini"]}, |
|
174 | "ini": {"count": 1, "desc": ["Ini"]}, | |
175 | "js": {"count": 1, "desc": ["Javascript"]}, |
|
175 | "js": {"count": 1, "desc": ["Javascript"]}, | |
176 | "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]} |
|
176 | "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]} | |
177 | }, |
|
177 | }, | |
178 | 'svn': { |
|
178 | 'svn': { | |
179 | "py": {"count": 75, "desc": ["Python"]}, |
|
179 | "py": {"count": 75, "desc": ["Python"]}, | |
180 | "rst": {"count": 16, "desc": ["Rst"]}, |
|
180 | "rst": {"count": 16, "desc": ["Rst"]}, | |
181 | "html": {"count": 11, "desc": ["EvoqueHtml", "Html"]}, |
|
181 | "html": {"count": 11, "desc": ["EvoqueHtml", "Html"]}, | |
182 | "css": {"count": 2, "desc": ["Css"]}, |
|
182 | "css": {"count": 2, "desc": ["Css"]}, | |
183 | "bat": {"count": 1, "desc": ["Batch"]}, |
|
183 | "bat": {"count": 1, "desc": ["Batch"]}, | |
184 | "cfg": {"count": 1, "desc": ["Ini"]}, |
|
184 | "cfg": {"count": 1, "desc": ["Ini"]}, | |
185 | "ini": {"count": 1, "desc": ["Ini"]}, |
|
185 | "ini": {"count": 1, "desc": ["Ini"]}, | |
186 | "js": {"count": 1, "desc": ["Javascript"]}, |
|
186 | "js": {"count": 1, "desc": ["Javascript"]}, | |
187 | "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]}, |
|
187 | "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]}, | |
188 | "sh": {"count": 1, "desc": ["Bash"]} |
|
188 | "sh": {"count": 1, "desc": ["Bash"]} | |
189 | }, |
|
189 | }, | |
190 | } |
|
190 | } | |
191 |
|
191 | |||
192 | def test_repo_stats(self, autologin_user, backend, xhr_header): |
|
192 | def test_repo_stats(self, autologin_user, backend, xhr_header): | |
193 | response = self.app.get( |
|
193 | response = self.app.get( | |
194 | route_path( |
|
194 | route_path( | |
195 | 'repo_stats', repo_name=backend.repo_name, commit_id='tip'), |
|
195 | 'repo_stats', repo_name=backend.repo_name, commit_id='tip'), | |
196 | extra_environ=xhr_header, |
|
196 | extra_environ=xhr_header, | |
197 | status=200) |
|
197 | status=200) | |
198 | assert re.match(r'6[\d\.]+ KiB', response.json['size']) |
|
198 | assert re.match(r'6[\d\.]+ KiB', response.json['size']) | |
199 |
|
199 | |||
200 | def test_repo_stats_code_stats_enabled(self, autologin_user, backend, xhr_header): |
|
200 | def test_repo_stats_code_stats_enabled(self, autologin_user, backend, xhr_header): | |
201 | repo_name = backend.repo_name |
|
201 | repo_name = backend.repo_name | |
202 |
|
202 | |||
203 | # codes stats |
|
203 | # codes stats | |
204 | self._enable_stats(repo_name) |
|
204 | self._enable_stats(repo_name) | |
205 | ScmModel().mark_for_invalidation(repo_name) |
|
205 | ScmModel().mark_for_invalidation(repo_name) | |
206 |
|
206 | |||
207 | response = self.app.get( |
|
207 | response = self.app.get( | |
208 | route_path( |
|
208 | route_path( | |
209 | 'repo_stats', repo_name=backend.repo_name, commit_id='tip'), |
|
209 | 'repo_stats', repo_name=backend.repo_name, commit_id='tip'), | |
210 | extra_environ=xhr_header, |
|
210 | extra_environ=xhr_header, | |
211 | status=200) |
|
211 | status=200) | |
212 |
|
212 | |||
213 | expected_data = self.expected_trending[backend.alias] |
|
213 | expected_data = self.expected_trending[backend.alias] | |
214 | returned_stats = response.json['code_stats'] |
|
214 | returned_stats = response.json['code_stats'] | |
215 | for k, v in expected_data.items(): |
|
215 | for k, v in expected_data.items(): | |
216 | assert v == returned_stats[k] |
|
216 | assert v == returned_stats[k] | |
217 |
|
217 | |||
218 | def test_repo_refs_data(self, backend): |
|
218 | def test_repo_refs_data(self, backend): | |
219 | response = self.app.get( |
|
219 | response = self.app.get( | |
220 | route_path('repo_refs_data', repo_name=backend.repo_name), |
|
220 | route_path('repo_refs_data', repo_name=backend.repo_name), | |
221 | status=200) |
|
221 | status=200) | |
222 |
|
222 | |||
223 | # Ensure that there is the correct amount of items in the result |
|
223 | # Ensure that there is the correct amount of items in the result | |
224 | repo = backend.repo.scm_instance() |
|
224 | repo = backend.repo.scm_instance() | |
225 | data = response.json['results'] |
|
225 | data = response.json['results'] | |
226 | items = sum(len(section['children']) for section in data) |
|
226 | items = sum(len(section['children']) for section in data) | |
227 | repo_refs = len(repo.branches) + len(repo.tags) + len(repo.bookmarks) |
|
227 | repo_refs = len(repo.branches) + len(repo.tags) + len(repo.bookmarks) | |
228 | assert items == repo_refs |
|
228 | assert items == repo_refs | |
229 |
|
229 | |||
230 | def test_index_shows_missing_requirements_message( |
|
230 | def test_index_shows_missing_requirements_message( | |
231 | self, backend, autologin_user): |
|
231 | self, backend, autologin_user): | |
232 | repo_name = backend.repo_name |
|
232 | repo_name = backend.repo_name | |
233 | scm_patcher = mock.patch.object( |
|
233 | scm_patcher = mock.patch.object( | |
234 | Repository, 'scm_instance', side_effect=RepositoryRequirementError) |
|
234 | Repository, 'scm_instance', side_effect=RepositoryRequirementError) | |
235 |
|
235 | |||
236 | with scm_patcher: |
|
236 | with scm_patcher: | |
237 | response = self.app.get( |
|
237 | response = self.app.get( | |
238 | route_path('repo_summary', repo_name=repo_name)) |
|
238 | route_path('repo_summary', repo_name=repo_name)) | |
239 |
assert_response = |
|
239 | assert_response = response.assert_response() | |
240 | assert_response.element_contains( |
|
240 | assert_response.element_contains( | |
241 | '.main .alert-warning strong', 'Missing requirements') |
|
241 | '.main .alert-warning strong', 'Missing requirements') | |
242 | assert_response.element_contains( |
|
242 | assert_response.element_contains( | |
243 | '.main .alert-warning', |
|
243 | '.main .alert-warning', | |
244 | 'Commits cannot be displayed, because this repository ' |
|
244 | 'Commits cannot be displayed, because this repository ' | |
245 | 'uses one or more extensions, which was not enabled.') |
|
245 | 'uses one or more extensions, which was not enabled.') | |
246 |
|
246 | |||
247 | def test_missing_requirements_page_does_not_contains_switch_to( |
|
247 | def test_missing_requirements_page_does_not_contains_switch_to( | |
248 | self, autologin_user, backend): |
|
248 | self, autologin_user, backend): | |
249 | repo_name = backend.repo_name |
|
249 | repo_name = backend.repo_name | |
250 | scm_patcher = mock.patch.object( |
|
250 | scm_patcher = mock.patch.object( | |
251 | Repository, 'scm_instance', side_effect=RepositoryRequirementError) |
|
251 | Repository, 'scm_instance', side_effect=RepositoryRequirementError) | |
252 |
|
252 | |||
253 | with scm_patcher: |
|
253 | with scm_patcher: | |
254 | response = self.app.get(route_path('repo_summary', repo_name=repo_name)) |
|
254 | response = self.app.get(route_path('repo_summary', repo_name=repo_name)) | |
255 | response.mustcontain(no='Switch To') |
|
255 | response.mustcontain(no='Switch To') | |
256 |
|
256 | |||
257 |
|
257 | |||
258 | @pytest.mark.usefixtures('app') |
|
258 | @pytest.mark.usefixtures('app') | |
259 | class TestRepoLocation(object): |
|
259 | class TestRepoLocation(object): | |
260 |
|
260 | |||
261 | @pytest.mark.parametrize("suffix", [u'', u'ąęł'], ids=['', 'non-ascii']) |
|
261 | @pytest.mark.parametrize("suffix", [u'', u'ąęł'], ids=['', 'non-ascii']) | |
262 | def test_missing_filesystem_repo( |
|
262 | def test_missing_filesystem_repo( | |
263 | self, autologin_user, backend, suffix, csrf_token): |
|
263 | self, autologin_user, backend, suffix, csrf_token): | |
264 | repo = backend.create_repo(name_suffix=suffix) |
|
264 | repo = backend.create_repo(name_suffix=suffix) | |
265 | repo_name = repo.repo_name |
|
265 | repo_name = repo.repo_name | |
266 |
|
266 | |||
267 | # delete from file system |
|
267 | # delete from file system | |
268 | RepoModel()._delete_filesystem_repo(repo) |
|
268 | RepoModel()._delete_filesystem_repo(repo) | |
269 |
|
269 | |||
270 | # test if the repo is still in the database |
|
270 | # test if the repo is still in the database | |
271 | new_repo = RepoModel().get_by_repo_name(repo_name) |
|
271 | new_repo = RepoModel().get_by_repo_name(repo_name) | |
272 | assert new_repo.repo_name == repo_name |
|
272 | assert new_repo.repo_name == repo_name | |
273 |
|
273 | |||
274 | # check if repo is not in the filesystem |
|
274 | # check if repo is not in the filesystem | |
275 | assert not repo_on_filesystem(repo_name) |
|
275 | assert not repo_on_filesystem(repo_name) | |
276 |
|
276 | |||
277 | response = self.app.get( |
|
277 | response = self.app.get( | |
278 | route_path('repo_summary', repo_name=safe_str(repo_name)), status=302) |
|
278 | route_path('repo_summary', repo_name=safe_str(repo_name)), status=302) | |
279 |
|
279 | |||
280 | msg = 'The repository `%s` cannot be loaded in filesystem. ' \ |
|
280 | msg = 'The repository `%s` cannot be loaded in filesystem. ' \ | |
281 | 'Please check if it exist, or is not damaged.' % repo_name |
|
281 | 'Please check if it exist, or is not damaged.' % repo_name | |
282 | assert_session_flash(response, msg) |
|
282 | assert_session_flash(response, msg) | |
283 |
|
283 | |||
284 | @pytest.mark.parametrize("suffix", [u'', u'ąęł'], ids=['', 'non-ascii']) |
|
284 | @pytest.mark.parametrize("suffix", [u'', u'ąęł'], ids=['', 'non-ascii']) | |
285 | def test_missing_filesystem_repo_on_repo_check( |
|
285 | def test_missing_filesystem_repo_on_repo_check( | |
286 | self, autologin_user, backend, suffix, csrf_token): |
|
286 | self, autologin_user, backend, suffix, csrf_token): | |
287 | repo = backend.create_repo(name_suffix=suffix) |
|
287 | repo = backend.create_repo(name_suffix=suffix) | |
288 | repo_name = repo.repo_name |
|
288 | repo_name = repo.repo_name | |
289 |
|
289 | |||
290 | # delete from file system |
|
290 | # delete from file system | |
291 | RepoModel()._delete_filesystem_repo(repo) |
|
291 | RepoModel()._delete_filesystem_repo(repo) | |
292 |
|
292 | |||
293 | # test if the repo is still in the database |
|
293 | # test if the repo is still in the database | |
294 | new_repo = RepoModel().get_by_repo_name(repo_name) |
|
294 | new_repo = RepoModel().get_by_repo_name(repo_name) | |
295 | assert new_repo.repo_name == repo_name |
|
295 | assert new_repo.repo_name == repo_name | |
296 |
|
296 | |||
297 | # check if repo is not in the filesystem |
|
297 | # check if repo is not in the filesystem | |
298 | assert not repo_on_filesystem(repo_name) |
|
298 | assert not repo_on_filesystem(repo_name) | |
299 |
|
299 | |||
300 | # flush the session |
|
300 | # flush the session | |
301 | self.app.get( |
|
301 | self.app.get( | |
302 | route_path('repo_summary', repo_name=safe_str(repo_name)), |
|
302 | route_path('repo_summary', repo_name=safe_str(repo_name)), | |
303 | status=302) |
|
303 | status=302) | |
304 |
|
304 | |||
305 | response = self.app.get( |
|
305 | response = self.app.get( | |
306 | route_path('repo_creating_check', repo_name=safe_str(repo_name)), |
|
306 | route_path('repo_creating_check', repo_name=safe_str(repo_name)), | |
307 | status=200) |
|
307 | status=200) | |
308 | msg = 'The repository `%s` cannot be loaded in filesystem. ' \ |
|
308 | msg = 'The repository `%s` cannot be loaded in filesystem. ' \ | |
309 | 'Please check if it exist, or is not damaged.' % repo_name |
|
309 | 'Please check if it exist, or is not damaged.' % repo_name | |
310 | assert_session_flash(response, msg ) |
|
310 | assert_session_flash(response, msg ) | |
311 |
|
311 | |||
312 |
|
312 | |||
313 | @pytest.fixture() |
|
313 | @pytest.fixture() | |
314 | def summary_view(context_stub, request_stub, user_util): |
|
314 | def summary_view(context_stub, request_stub, user_util): | |
315 | """ |
|
315 | """ | |
316 | Bootstrap view to test the view functions |
|
316 | Bootstrap view to test the view functions | |
317 | """ |
|
317 | """ | |
318 | request_stub.matched_route = AttributeDict(name='test_view') |
|
318 | request_stub.matched_route = AttributeDict(name='test_view') | |
319 |
|
319 | |||
320 | request_stub.user = user_util.create_user().AuthUser() |
|
320 | request_stub.user = user_util.create_user().AuthUser() | |
321 | request_stub.db_repo = user_util.create_repo() |
|
321 | request_stub.db_repo = user_util.create_repo() | |
322 |
|
322 | |||
323 | view = RepoSummaryView(context=context_stub, request=request_stub) |
|
323 | view = RepoSummaryView(context=context_stub, request=request_stub) | |
324 | return view |
|
324 | return view | |
325 |
|
325 | |||
326 |
|
326 | |||
327 | @pytest.mark.usefixtures('app') |
|
327 | @pytest.mark.usefixtures('app') | |
328 | class TestCreateReferenceData(object): |
|
328 | class TestCreateReferenceData(object): | |
329 |
|
329 | |||
330 | @pytest.fixture() |
|
330 | @pytest.fixture() | |
331 | def example_refs(self): |
|
331 | def example_refs(self): | |
332 | section_1_refs = OrderedDict((('a', 'a_id'), ('b', 'b_id'))) |
|
332 | section_1_refs = OrderedDict((('a', 'a_id'), ('b', 'b_id'))) | |
333 | example_refs = [ |
|
333 | example_refs = [ | |
334 | ('section_1', section_1_refs, 't1'), |
|
334 | ('section_1', section_1_refs, 't1'), | |
335 | ('section_2', {'c': 'c_id'}, 't2'), |
|
335 | ('section_2', {'c': 'c_id'}, 't2'), | |
336 | ] |
|
336 | ] | |
337 | return example_refs |
|
337 | return example_refs | |
338 |
|
338 | |||
339 | def test_generates_refs_based_on_commit_ids(self, example_refs, summary_view): |
|
339 | def test_generates_refs_based_on_commit_ids(self, example_refs, summary_view): | |
340 | repo = mock.Mock() |
|
340 | repo = mock.Mock() | |
341 | repo.name = 'test-repo' |
|
341 | repo.name = 'test-repo' | |
342 | repo.alias = 'git' |
|
342 | repo.alias = 'git' | |
343 | full_repo_name = 'pytest-repo-group/' + repo.name |
|
343 | full_repo_name = 'pytest-repo-group/' + repo.name | |
344 |
|
344 | |||
345 | result = summary_view._create_reference_data( |
|
345 | result = summary_view._create_reference_data( | |
346 | repo, full_repo_name, example_refs) |
|
346 | repo, full_repo_name, example_refs) | |
347 |
|
347 | |||
348 | expected_files_url = '/{}/files/'.format(full_repo_name) |
|
348 | expected_files_url = '/{}/files/'.format(full_repo_name) | |
349 | expected_result = [ |
|
349 | expected_result = [ | |
350 | { |
|
350 | { | |
351 | 'children': [ |
|
351 | 'children': [ | |
352 | { |
|
352 | { | |
353 | 'id': 'a', 'idx': 0, 'raw_id': 'a_id', 'text': 'a', 'type': 't1', |
|
353 | 'id': 'a', 'idx': 0, 'raw_id': 'a_id', 'text': 'a', 'type': 't1', | |
354 | 'files_url': expected_files_url + 'a/?at=a', |
|
354 | 'files_url': expected_files_url + 'a/?at=a', | |
355 | }, |
|
355 | }, | |
356 | { |
|
356 | { | |
357 | 'id': 'b', 'idx': 0, 'raw_id': 'b_id', 'text': 'b', 'type': 't1', |
|
357 | 'id': 'b', 'idx': 0, 'raw_id': 'b_id', 'text': 'b', 'type': 't1', | |
358 | 'files_url': expected_files_url + 'b/?at=b', |
|
358 | 'files_url': expected_files_url + 'b/?at=b', | |
359 | } |
|
359 | } | |
360 | ], |
|
360 | ], | |
361 | 'text': 'section_1' |
|
361 | 'text': 'section_1' | |
362 | }, |
|
362 | }, | |
363 | { |
|
363 | { | |
364 | 'children': [ |
|
364 | 'children': [ | |
365 | { |
|
365 | { | |
366 | 'id': 'c', 'idx': 0, 'raw_id': 'c_id', 'text': 'c', 'type': 't2', |
|
366 | 'id': 'c', 'idx': 0, 'raw_id': 'c_id', 'text': 'c', 'type': 't2', | |
367 | 'files_url': expected_files_url + 'c/?at=c', |
|
367 | 'files_url': expected_files_url + 'c/?at=c', | |
368 | } |
|
368 | } | |
369 | ], |
|
369 | ], | |
370 | 'text': 'section_2' |
|
370 | 'text': 'section_2' | |
371 | }] |
|
371 | }] | |
372 | assert result == expected_result |
|
372 | assert result == expected_result | |
373 |
|
373 | |||
374 | def test_generates_refs_with_path_for_svn(self, example_refs, summary_view): |
|
374 | def test_generates_refs_with_path_for_svn(self, example_refs, summary_view): | |
375 | repo = mock.Mock() |
|
375 | repo = mock.Mock() | |
376 | repo.name = 'test-repo' |
|
376 | repo.name = 'test-repo' | |
377 | repo.alias = 'svn' |
|
377 | repo.alias = 'svn' | |
378 | full_repo_name = 'pytest-repo-group/' + repo.name |
|
378 | full_repo_name = 'pytest-repo-group/' + repo.name | |
379 |
|
379 | |||
380 | result = summary_view._create_reference_data( |
|
380 | result = summary_view._create_reference_data( | |
381 | repo, full_repo_name, example_refs) |
|
381 | repo, full_repo_name, example_refs) | |
382 |
|
382 | |||
383 | expected_files_url = '/{}/files/'.format(full_repo_name) |
|
383 | expected_files_url = '/{}/files/'.format(full_repo_name) | |
384 | expected_result = [ |
|
384 | expected_result = [ | |
385 | { |
|
385 | { | |
386 | 'children': [ |
|
386 | 'children': [ | |
387 | { |
|
387 | { | |
388 | 'id': 'a@a_id', 'idx': 0, 'raw_id': 'a_id', |
|
388 | 'id': 'a@a_id', 'idx': 0, 'raw_id': 'a_id', | |
389 | 'text': 'a', 'type': 't1', |
|
389 | 'text': 'a', 'type': 't1', | |
390 | 'files_url': expected_files_url + 'a_id/a?at=a', |
|
390 | 'files_url': expected_files_url + 'a_id/a?at=a', | |
391 | }, |
|
391 | }, | |
392 | { |
|
392 | { | |
393 | 'id': 'b@b_id', 'idx': 0, 'raw_id': 'b_id', |
|
393 | 'id': 'b@b_id', 'idx': 0, 'raw_id': 'b_id', | |
394 | 'text': 'b', 'type': 't1', |
|
394 | 'text': 'b', 'type': 't1', | |
395 | 'files_url': expected_files_url + 'b_id/b?at=b', |
|
395 | 'files_url': expected_files_url + 'b_id/b?at=b', | |
396 | } |
|
396 | } | |
397 | ], |
|
397 | ], | |
398 | 'text': 'section_1' |
|
398 | 'text': 'section_1' | |
399 | }, |
|
399 | }, | |
400 | { |
|
400 | { | |
401 | 'children': [ |
|
401 | 'children': [ | |
402 | { |
|
402 | { | |
403 | 'id': 'c@c_id', 'idx': 0, 'raw_id': 'c_id', |
|
403 | 'id': 'c@c_id', 'idx': 0, 'raw_id': 'c_id', | |
404 | 'text': 'c', 'type': 't2', |
|
404 | 'text': 'c', 'type': 't2', | |
405 | 'files_url': expected_files_url + 'c_id/c?at=c', |
|
405 | 'files_url': expected_files_url + 'c_id/c?at=c', | |
406 | } |
|
406 | } | |
407 | ], |
|
407 | ], | |
408 | 'text': 'section_2' |
|
408 | 'text': 'section_2' | |
409 | } |
|
409 | } | |
410 | ] |
|
410 | ] | |
411 | assert result == expected_result |
|
411 | assert result == expected_result | |
412 |
|
412 | |||
413 |
|
413 | |||
414 | class TestCreateFilesUrl(object): |
|
414 | class TestCreateFilesUrl(object): | |
415 |
|
415 | |||
416 | def test_creates_non_svn_url(self, app, summary_view): |
|
416 | def test_creates_non_svn_url(self, app, summary_view): | |
417 | repo = mock.Mock() |
|
417 | repo = mock.Mock() | |
418 | repo.name = 'abcde' |
|
418 | repo.name = 'abcde' | |
419 | full_repo_name = 'test-repo-group/' + repo.name |
|
419 | full_repo_name = 'test-repo-group/' + repo.name | |
420 | ref_name = 'branch1' |
|
420 | ref_name = 'branch1' | |
421 | raw_id = 'deadbeef0123456789' |
|
421 | raw_id = 'deadbeef0123456789' | |
422 | is_svn = False |
|
422 | is_svn = False | |
423 |
|
423 | |||
424 | with mock.patch('rhodecode.lib.helpers.route_path') as url_mock: |
|
424 | with mock.patch('rhodecode.lib.helpers.route_path') as url_mock: | |
425 | result = summary_view._create_files_url( |
|
425 | result = summary_view._create_files_url( | |
426 | repo, full_repo_name, ref_name, raw_id, is_svn) |
|
426 | repo, full_repo_name, ref_name, raw_id, is_svn) | |
427 | url_mock.assert_called_once_with( |
|
427 | url_mock.assert_called_once_with( | |
428 | 'repo_files', repo_name=full_repo_name, commit_id=ref_name, |
|
428 | 'repo_files', repo_name=full_repo_name, commit_id=ref_name, | |
429 | f_path='', _query=dict(at=ref_name)) |
|
429 | f_path='', _query=dict(at=ref_name)) | |
430 | assert result == url_mock.return_value |
|
430 | assert result == url_mock.return_value | |
431 |
|
431 | |||
432 | def test_creates_svn_url(self, app, summary_view): |
|
432 | def test_creates_svn_url(self, app, summary_view): | |
433 | repo = mock.Mock() |
|
433 | repo = mock.Mock() | |
434 | repo.name = 'abcde' |
|
434 | repo.name = 'abcde' | |
435 | full_repo_name = 'test-repo-group/' + repo.name |
|
435 | full_repo_name = 'test-repo-group/' + repo.name | |
436 | ref_name = 'branch1' |
|
436 | ref_name = 'branch1' | |
437 | raw_id = 'deadbeef0123456789' |
|
437 | raw_id = 'deadbeef0123456789' | |
438 | is_svn = True |
|
438 | is_svn = True | |
439 |
|
439 | |||
440 | with mock.patch('rhodecode.lib.helpers.route_path') as url_mock: |
|
440 | with mock.patch('rhodecode.lib.helpers.route_path') as url_mock: | |
441 | result = summary_view._create_files_url( |
|
441 | result = summary_view._create_files_url( | |
442 | repo, full_repo_name, ref_name, raw_id, is_svn) |
|
442 | repo, full_repo_name, ref_name, raw_id, is_svn) | |
443 | url_mock.assert_called_once_with( |
|
443 | url_mock.assert_called_once_with( | |
444 | 'repo_files', repo_name=full_repo_name, f_path=ref_name, |
|
444 | 'repo_files', repo_name=full_repo_name, f_path=ref_name, | |
445 | commit_id=raw_id, _query=dict(at=ref_name)) |
|
445 | commit_id=raw_id, _query=dict(at=ref_name)) | |
446 | assert result == url_mock.return_value |
|
446 | assert result == url_mock.return_value | |
447 |
|
447 | |||
448 | def test_name_has_slashes(self, app, summary_view): |
|
448 | def test_name_has_slashes(self, app, summary_view): | |
449 | repo = mock.Mock() |
|
449 | repo = mock.Mock() | |
450 | repo.name = 'abcde' |
|
450 | repo.name = 'abcde' | |
451 | full_repo_name = 'test-repo-group/' + repo.name |
|
451 | full_repo_name = 'test-repo-group/' + repo.name | |
452 | ref_name = 'branch1/branch2' |
|
452 | ref_name = 'branch1/branch2' | |
453 | raw_id = 'deadbeef0123456789' |
|
453 | raw_id = 'deadbeef0123456789' | |
454 | is_svn = False |
|
454 | is_svn = False | |
455 |
|
455 | |||
456 | with mock.patch('rhodecode.lib.helpers.route_path') as url_mock: |
|
456 | with mock.patch('rhodecode.lib.helpers.route_path') as url_mock: | |
457 | result = summary_view._create_files_url( |
|
457 | result = summary_view._create_files_url( | |
458 | repo, full_repo_name, ref_name, raw_id, is_svn) |
|
458 | repo, full_repo_name, ref_name, raw_id, is_svn) | |
459 | url_mock.assert_called_once_with( |
|
459 | url_mock.assert_called_once_with( | |
460 | 'repo_files', repo_name=full_repo_name, commit_id=raw_id, |
|
460 | 'repo_files', repo_name=full_repo_name, commit_id=raw_id, | |
461 | f_path='', _query=dict(at=ref_name)) |
|
461 | f_path='', _query=dict(at=ref_name)) | |
462 | assert result == url_mock.return_value |
|
462 | assert result == url_mock.return_value | |
463 |
|
463 | |||
464 |
|
464 | |||
465 | class TestReferenceItems(object): |
|
465 | class TestReferenceItems(object): | |
466 | repo = mock.Mock() |
|
466 | repo = mock.Mock() | |
467 | repo.name = 'pytest-repo' |
|
467 | repo.name = 'pytest-repo' | |
468 | repo_full_name = 'pytest-repo-group/' + repo.name |
|
468 | repo_full_name = 'pytest-repo-group/' + repo.name | |
469 | ref_type = 'branch' |
|
469 | ref_type = 'branch' | |
470 | fake_url = '/abcde/' |
|
470 | fake_url = '/abcde/' | |
471 |
|
471 | |||
472 | @staticmethod |
|
472 | @staticmethod | |
473 | def _format_function(name, id_): |
|
473 | def _format_function(name, id_): | |
474 | return 'format_function_{}_{}'.format(name, id_) |
|
474 | return 'format_function_{}_{}'.format(name, id_) | |
475 |
|
475 | |||
476 | def test_creates_required_amount_of_items(self, summary_view): |
|
476 | def test_creates_required_amount_of_items(self, summary_view): | |
477 | amount = 100 |
|
477 | amount = 100 | |
478 | refs = { |
|
478 | refs = { | |
479 | 'ref{}'.format(i): '{0:040d}'.format(i) |
|
479 | 'ref{}'.format(i): '{0:040d}'.format(i) | |
480 | for i in range(amount) |
|
480 | for i in range(amount) | |
481 | } |
|
481 | } | |
482 |
|
482 | |||
483 | url_patcher = mock.patch.object(summary_view, '_create_files_url') |
|
483 | url_patcher = mock.patch.object(summary_view, '_create_files_url') | |
484 | svn_patcher = mock.patch('rhodecode.lib.helpers.is_svn', |
|
484 | svn_patcher = mock.patch('rhodecode.lib.helpers.is_svn', | |
485 | return_value=False) |
|
485 | return_value=False) | |
486 |
|
486 | |||
487 | with url_patcher as url_mock, svn_patcher: |
|
487 | with url_patcher as url_mock, svn_patcher: | |
488 | result = summary_view._create_reference_items( |
|
488 | result = summary_view._create_reference_items( | |
489 | self.repo, self.repo_full_name, refs, self.ref_type, |
|
489 | self.repo, self.repo_full_name, refs, self.ref_type, | |
490 | self._format_function) |
|
490 | self._format_function) | |
491 | assert len(result) == amount |
|
491 | assert len(result) == amount | |
492 | assert url_mock.call_count == amount |
|
492 | assert url_mock.call_count == amount | |
493 |
|
493 | |||
494 | def test_single_item_details(self, summary_view): |
|
494 | def test_single_item_details(self, summary_view): | |
495 | ref_name = 'ref1' |
|
495 | ref_name = 'ref1' | |
496 | ref_id = 'deadbeef' |
|
496 | ref_id = 'deadbeef' | |
497 | refs = { |
|
497 | refs = { | |
498 | ref_name: ref_id |
|
498 | ref_name: ref_id | |
499 | } |
|
499 | } | |
500 |
|
500 | |||
501 | svn_patcher = mock.patch('rhodecode.lib.helpers.is_svn', |
|
501 | svn_patcher = mock.patch('rhodecode.lib.helpers.is_svn', | |
502 | return_value=False) |
|
502 | return_value=False) | |
503 |
|
503 | |||
504 | url_patcher = mock.patch.object( |
|
504 | url_patcher = mock.patch.object( | |
505 | summary_view, '_create_files_url', return_value=self.fake_url) |
|
505 | summary_view, '_create_files_url', return_value=self.fake_url) | |
506 |
|
506 | |||
507 | with url_patcher as url_mock, svn_patcher: |
|
507 | with url_patcher as url_mock, svn_patcher: | |
508 | result = summary_view._create_reference_items( |
|
508 | result = summary_view._create_reference_items( | |
509 | self.repo, self.repo_full_name, refs, self.ref_type, |
|
509 | self.repo, self.repo_full_name, refs, self.ref_type, | |
510 | self._format_function) |
|
510 | self._format_function) | |
511 |
|
511 | |||
512 | url_mock.assert_called_once_with( |
|
512 | url_mock.assert_called_once_with( | |
513 | self.repo, self.repo_full_name, ref_name, ref_id, False) |
|
513 | self.repo, self.repo_full_name, ref_name, ref_id, False) | |
514 | expected_result = [ |
|
514 | expected_result = [ | |
515 | { |
|
515 | { | |
516 | 'text': ref_name, |
|
516 | 'text': ref_name, | |
517 | 'id': self._format_function(ref_name, ref_id), |
|
517 | 'id': self._format_function(ref_name, ref_id), | |
518 | 'raw_id': ref_id, |
|
518 | 'raw_id': ref_id, | |
519 | 'idx': 0, |
|
519 | 'idx': 0, | |
520 | 'type': self.ref_type, |
|
520 | 'type': self.ref_type, | |
521 | 'files_url': self.fake_url |
|
521 | 'files_url': self.fake_url | |
522 | } |
|
522 | } | |
523 | ] |
|
523 | ] | |
524 | assert result == expected_result |
|
524 | assert result == expected_result |
@@ -1,685 +1,685 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import mock |
|
21 | import mock | |
22 | import pytest |
|
22 | import pytest | |
23 |
|
23 | |||
24 | from rhodecode.lib import auth |
|
24 | from rhodecode.lib import auth | |
25 | from rhodecode.lib.utils2 import str2bool |
|
25 | from rhodecode.lib.utils2 import str2bool | |
26 | from rhodecode.model.db import ( |
|
26 | from rhodecode.model.db import ( | |
27 | Repository, UserRepoToPerm, User) |
|
27 | Repository, UserRepoToPerm, User) | |
28 | from rhodecode.model.meta import Session |
|
28 | from rhodecode.model.meta import Session | |
29 | from rhodecode.model.settings import SettingsModel, VcsSettingsModel |
|
29 | from rhodecode.model.settings import SettingsModel, VcsSettingsModel | |
30 | from rhodecode.model.user import UserModel |
|
30 | from rhodecode.model.user import UserModel | |
31 | from rhodecode.tests import ( |
|
31 | from rhodecode.tests import ( | |
32 | login_user_session, logout_user_session, |
|
32 | login_user_session, logout_user_session, | |
33 | TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) |
|
33 | TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) | |
34 | from rhodecode.tests.fixture import Fixture |
|
34 | from rhodecode.tests.fixture import Fixture | |
35 | from rhodecode.tests.utils import AssertResponse |
|
35 | from rhodecode.tests.utils import AssertResponse | |
36 |
|
36 | |||
37 | fixture = Fixture() |
|
37 | fixture = Fixture() | |
38 |
|
38 | |||
39 |
|
39 | |||
40 | def route_path(name, params=None, **kwargs): |
|
40 | def route_path(name, params=None, **kwargs): | |
41 | import urllib |
|
41 | import urllib | |
42 |
|
42 | |||
43 | base_url = { |
|
43 | base_url = { | |
44 | 'repo_summary': '/{repo_name}', |
|
44 | 'repo_summary': '/{repo_name}', | |
45 | 'repo_creating_check': '/{repo_name}/repo_creating_check', |
|
45 | 'repo_creating_check': '/{repo_name}/repo_creating_check', | |
46 | 'edit_repo': '/{repo_name}/settings', |
|
46 | 'edit_repo': '/{repo_name}/settings', | |
47 | 'edit_repo_vcs': '/{repo_name}/settings/vcs', |
|
47 | 'edit_repo_vcs': '/{repo_name}/settings/vcs', | |
48 | 'edit_repo_vcs_update': '/{repo_name}/settings/vcs/update', |
|
48 | 'edit_repo_vcs_update': '/{repo_name}/settings/vcs/update', | |
49 | 'edit_repo_vcs_svn_pattern_delete': '/{repo_name}/settings/vcs/svn_pattern/delete' |
|
49 | 'edit_repo_vcs_svn_pattern_delete': '/{repo_name}/settings/vcs/svn_pattern/delete' | |
50 | }[name].format(**kwargs) |
|
50 | }[name].format(**kwargs) | |
51 |
|
51 | |||
52 | if params: |
|
52 | if params: | |
53 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) |
|
53 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) | |
54 | return base_url |
|
54 | return base_url | |
55 |
|
55 | |||
56 |
|
56 | |||
57 | @pytest.mark.usefixtures("app") |
|
57 | @pytest.mark.usefixtures("app") | |
58 | class TestVcsSettings(object): |
|
58 | class TestVcsSettings(object): | |
59 | FORM_DATA = { |
|
59 | FORM_DATA = { | |
60 | 'inherit_global_settings': False, |
|
60 | 'inherit_global_settings': False, | |
61 | 'hooks_changegroup_repo_size': False, |
|
61 | 'hooks_changegroup_repo_size': False, | |
62 | 'hooks_changegroup_push_logger': False, |
|
62 | 'hooks_changegroup_push_logger': False, | |
63 | 'hooks_outgoing_pull_logger': False, |
|
63 | 'hooks_outgoing_pull_logger': False, | |
64 | 'extensions_largefiles': False, |
|
64 | 'extensions_largefiles': False, | |
65 | 'extensions_evolve': False, |
|
65 | 'extensions_evolve': False, | |
66 | 'phases_publish': 'False', |
|
66 | 'phases_publish': 'False', | |
67 | 'rhodecode_pr_merge_enabled': False, |
|
67 | 'rhodecode_pr_merge_enabled': False, | |
68 | 'rhodecode_use_outdated_comments': False, |
|
68 | 'rhodecode_use_outdated_comments': False, | |
69 | 'new_svn_branch': '', |
|
69 | 'new_svn_branch': '', | |
70 | 'new_svn_tag': '' |
|
70 | 'new_svn_tag': '' | |
71 | } |
|
71 | } | |
72 |
|
72 | |||
73 | @pytest.mark.skip_backends('svn') |
|
73 | @pytest.mark.skip_backends('svn') | |
74 | def test_global_settings_initial_values(self, autologin_user, backend): |
|
74 | def test_global_settings_initial_values(self, autologin_user, backend): | |
75 | repo_name = backend.repo_name |
|
75 | repo_name = backend.repo_name | |
76 | response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name)) |
|
76 | response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name)) | |
77 |
|
77 | |||
78 | expected_settings = ( |
|
78 | expected_settings = ( | |
79 | 'rhodecode_use_outdated_comments', 'rhodecode_pr_merge_enabled', |
|
79 | 'rhodecode_use_outdated_comments', 'rhodecode_pr_merge_enabled', | |
80 | 'hooks_changegroup_repo_size', 'hooks_changegroup_push_logger', |
|
80 | 'hooks_changegroup_repo_size', 'hooks_changegroup_push_logger', | |
81 | 'hooks_outgoing_pull_logger' |
|
81 | 'hooks_outgoing_pull_logger' | |
82 | ) |
|
82 | ) | |
83 | for setting in expected_settings: |
|
83 | for setting in expected_settings: | |
84 | self.assert_repo_value_equals_global_value(response, setting) |
|
84 | self.assert_repo_value_equals_global_value(response, setting) | |
85 |
|
85 | |||
86 | def test_show_settings_requires_repo_admin_permission( |
|
86 | def test_show_settings_requires_repo_admin_permission( | |
87 | self, backend, user_util, settings_util): |
|
87 | self, backend, user_util, settings_util): | |
88 | repo = backend.create_repo() |
|
88 | repo = backend.create_repo() | |
89 | repo_name = repo.repo_name |
|
89 | repo_name = repo.repo_name | |
90 | user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN) |
|
90 | user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN) | |
91 | user_util.grant_user_permission_to_repo(repo, user, 'repository.admin') |
|
91 | user_util.grant_user_permission_to_repo(repo, user, 'repository.admin') | |
92 | login_user_session( |
|
92 | login_user_session( | |
93 | self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) |
|
93 | self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) | |
94 | self.app.get(route_path('edit_repo_vcs', repo_name=repo_name), status=200) |
|
94 | self.app.get(route_path('edit_repo_vcs', repo_name=repo_name), status=200) | |
95 |
|
95 | |||
96 | def test_inherit_global_settings_flag_is_true_by_default( |
|
96 | def test_inherit_global_settings_flag_is_true_by_default( | |
97 | self, autologin_user, backend): |
|
97 | self, autologin_user, backend): | |
98 | repo_name = backend.repo_name |
|
98 | repo_name = backend.repo_name | |
99 | response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name)) |
|
99 | response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name)) | |
100 |
|
100 | |||
101 |
assert_response = |
|
101 | assert_response = response.assert_response() | |
102 | element = assert_response.get_element('#inherit_global_settings') |
|
102 | element = assert_response.get_element('#inherit_global_settings') | |
103 | assert element.checked |
|
103 | assert element.checked | |
104 |
|
104 | |||
105 | @pytest.mark.parametrize('checked_value', [True, False]) |
|
105 | @pytest.mark.parametrize('checked_value', [True, False]) | |
106 | def test_inherit_global_settings_value( |
|
106 | def test_inherit_global_settings_value( | |
107 | self, autologin_user, backend, checked_value, settings_util): |
|
107 | self, autologin_user, backend, checked_value, settings_util): | |
108 | repo = backend.create_repo() |
|
108 | repo = backend.create_repo() | |
109 | repo_name = repo.repo_name |
|
109 | repo_name = repo.repo_name | |
110 | settings_util.create_repo_rhodecode_setting( |
|
110 | settings_util.create_repo_rhodecode_setting( | |
111 | repo, 'inherit_vcs_settings', checked_value, 'bool') |
|
111 | repo, 'inherit_vcs_settings', checked_value, 'bool') | |
112 | response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name)) |
|
112 | response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name)) | |
113 |
|
113 | |||
114 |
assert_response = |
|
114 | assert_response = response.assert_response() | |
115 | element = assert_response.get_element('#inherit_global_settings') |
|
115 | element = assert_response.get_element('#inherit_global_settings') | |
116 | assert element.checked == checked_value |
|
116 | assert element.checked == checked_value | |
117 |
|
117 | |||
118 | @pytest.mark.skip_backends('svn') |
|
118 | @pytest.mark.skip_backends('svn') | |
119 | def test_hooks_settings_are_created( |
|
119 | def test_hooks_settings_are_created( | |
120 | self, autologin_user, backend, csrf_token): |
|
120 | self, autologin_user, backend, csrf_token): | |
121 | repo_name = backend.repo_name |
|
121 | repo_name = backend.repo_name | |
122 | data = self.FORM_DATA.copy() |
|
122 | data = self.FORM_DATA.copy() | |
123 | data['csrf_token'] = csrf_token |
|
123 | data['csrf_token'] = csrf_token | |
124 | self.app.post( |
|
124 | self.app.post( | |
125 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
125 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
126 | settings = SettingsModel(repo=repo_name) |
|
126 | settings = SettingsModel(repo=repo_name) | |
127 | try: |
|
127 | try: | |
128 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
128 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: | |
129 | ui = settings.get_ui_by_section_and_key(section, key) |
|
129 | ui = settings.get_ui_by_section_and_key(section, key) | |
130 | assert ui.ui_active is False |
|
130 | assert ui.ui_active is False | |
131 | finally: |
|
131 | finally: | |
132 | self._cleanup_repo_settings(settings) |
|
132 | self._cleanup_repo_settings(settings) | |
133 |
|
133 | |||
134 | def test_hooks_settings_are_not_created_for_svn( |
|
134 | def test_hooks_settings_are_not_created_for_svn( | |
135 | self, autologin_user, backend_svn, csrf_token): |
|
135 | self, autologin_user, backend_svn, csrf_token): | |
136 | repo_name = backend_svn.repo_name |
|
136 | repo_name = backend_svn.repo_name | |
137 | data = self.FORM_DATA.copy() |
|
137 | data = self.FORM_DATA.copy() | |
138 | data['csrf_token'] = csrf_token |
|
138 | data['csrf_token'] = csrf_token | |
139 | self.app.post( |
|
139 | self.app.post( | |
140 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
140 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
141 | settings = SettingsModel(repo=repo_name) |
|
141 | settings = SettingsModel(repo=repo_name) | |
142 | try: |
|
142 | try: | |
143 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
143 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: | |
144 | ui = settings.get_ui_by_section_and_key(section, key) |
|
144 | ui = settings.get_ui_by_section_and_key(section, key) | |
145 | assert ui is None |
|
145 | assert ui is None | |
146 | finally: |
|
146 | finally: | |
147 | self._cleanup_repo_settings(settings) |
|
147 | self._cleanup_repo_settings(settings) | |
148 |
|
148 | |||
149 | @pytest.mark.skip_backends('svn') |
|
149 | @pytest.mark.skip_backends('svn') | |
150 | def test_hooks_settings_are_updated( |
|
150 | def test_hooks_settings_are_updated( | |
151 | self, autologin_user, backend, csrf_token): |
|
151 | self, autologin_user, backend, csrf_token): | |
152 | repo_name = backend.repo_name |
|
152 | repo_name = backend.repo_name | |
153 | settings = SettingsModel(repo=repo_name) |
|
153 | settings = SettingsModel(repo=repo_name) | |
154 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
154 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: | |
155 | settings.create_ui_section_value(section, '', key=key, active=True) |
|
155 | settings.create_ui_section_value(section, '', key=key, active=True) | |
156 |
|
156 | |||
157 | data = self.FORM_DATA.copy() |
|
157 | data = self.FORM_DATA.copy() | |
158 | data['csrf_token'] = csrf_token |
|
158 | data['csrf_token'] = csrf_token | |
159 | self.app.post( |
|
159 | self.app.post( | |
160 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
160 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
161 | try: |
|
161 | try: | |
162 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
162 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: | |
163 | ui = settings.get_ui_by_section_and_key(section, key) |
|
163 | ui = settings.get_ui_by_section_and_key(section, key) | |
164 | assert ui.ui_active is False |
|
164 | assert ui.ui_active is False | |
165 | finally: |
|
165 | finally: | |
166 | self._cleanup_repo_settings(settings) |
|
166 | self._cleanup_repo_settings(settings) | |
167 |
|
167 | |||
168 | def test_hooks_settings_are_not_updated_for_svn( |
|
168 | def test_hooks_settings_are_not_updated_for_svn( | |
169 | self, autologin_user, backend_svn, csrf_token): |
|
169 | self, autologin_user, backend_svn, csrf_token): | |
170 | repo_name = backend_svn.repo_name |
|
170 | repo_name = backend_svn.repo_name | |
171 | settings = SettingsModel(repo=repo_name) |
|
171 | settings = SettingsModel(repo=repo_name) | |
172 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
172 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: | |
173 | settings.create_ui_section_value(section, '', key=key, active=True) |
|
173 | settings.create_ui_section_value(section, '', key=key, active=True) | |
174 |
|
174 | |||
175 | data = self.FORM_DATA.copy() |
|
175 | data = self.FORM_DATA.copy() | |
176 | data['csrf_token'] = csrf_token |
|
176 | data['csrf_token'] = csrf_token | |
177 | self.app.post( |
|
177 | self.app.post( | |
178 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
178 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
179 | try: |
|
179 | try: | |
180 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
180 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: | |
181 | ui = settings.get_ui_by_section_and_key(section, key) |
|
181 | ui = settings.get_ui_by_section_and_key(section, key) | |
182 | assert ui.ui_active is True |
|
182 | assert ui.ui_active is True | |
183 | finally: |
|
183 | finally: | |
184 | self._cleanup_repo_settings(settings) |
|
184 | self._cleanup_repo_settings(settings) | |
185 |
|
185 | |||
186 | @pytest.mark.skip_backends('svn') |
|
186 | @pytest.mark.skip_backends('svn') | |
187 | def test_pr_settings_are_created( |
|
187 | def test_pr_settings_are_created( | |
188 | self, autologin_user, backend, csrf_token): |
|
188 | self, autologin_user, backend, csrf_token): | |
189 | repo_name = backend.repo_name |
|
189 | repo_name = backend.repo_name | |
190 | data = self.FORM_DATA.copy() |
|
190 | data = self.FORM_DATA.copy() | |
191 | data['csrf_token'] = csrf_token |
|
191 | data['csrf_token'] = csrf_token | |
192 | self.app.post( |
|
192 | self.app.post( | |
193 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
193 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
194 | settings = SettingsModel(repo=repo_name) |
|
194 | settings = SettingsModel(repo=repo_name) | |
195 | try: |
|
195 | try: | |
196 | for name in VcsSettingsModel.GENERAL_SETTINGS: |
|
196 | for name in VcsSettingsModel.GENERAL_SETTINGS: | |
197 | setting = settings.get_setting_by_name(name) |
|
197 | setting = settings.get_setting_by_name(name) | |
198 | assert setting.app_settings_value is False |
|
198 | assert setting.app_settings_value is False | |
199 | finally: |
|
199 | finally: | |
200 | self._cleanup_repo_settings(settings) |
|
200 | self._cleanup_repo_settings(settings) | |
201 |
|
201 | |||
202 | def test_pr_settings_are_not_created_for_svn( |
|
202 | def test_pr_settings_are_not_created_for_svn( | |
203 | self, autologin_user, backend_svn, csrf_token): |
|
203 | self, autologin_user, backend_svn, csrf_token): | |
204 | repo_name = backend_svn.repo_name |
|
204 | repo_name = backend_svn.repo_name | |
205 | data = self.FORM_DATA.copy() |
|
205 | data = self.FORM_DATA.copy() | |
206 | data['csrf_token'] = csrf_token |
|
206 | data['csrf_token'] = csrf_token | |
207 | self.app.post( |
|
207 | self.app.post( | |
208 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
208 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
209 | settings = SettingsModel(repo=repo_name) |
|
209 | settings = SettingsModel(repo=repo_name) | |
210 | try: |
|
210 | try: | |
211 | for name in VcsSettingsModel.GENERAL_SETTINGS: |
|
211 | for name in VcsSettingsModel.GENERAL_SETTINGS: | |
212 | setting = settings.get_setting_by_name(name) |
|
212 | setting = settings.get_setting_by_name(name) | |
213 | assert setting is None |
|
213 | assert setting is None | |
214 | finally: |
|
214 | finally: | |
215 | self._cleanup_repo_settings(settings) |
|
215 | self._cleanup_repo_settings(settings) | |
216 |
|
216 | |||
217 | def test_pr_settings_creation_requires_repo_admin_permission( |
|
217 | def test_pr_settings_creation_requires_repo_admin_permission( | |
218 | self, backend, user_util, settings_util, csrf_token): |
|
218 | self, backend, user_util, settings_util, csrf_token): | |
219 | repo = backend.create_repo() |
|
219 | repo = backend.create_repo() | |
220 | repo_name = repo.repo_name |
|
220 | repo_name = repo.repo_name | |
221 |
|
221 | |||
222 | logout_user_session(self.app, csrf_token) |
|
222 | logout_user_session(self.app, csrf_token) | |
223 | session = login_user_session( |
|
223 | session = login_user_session( | |
224 | self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) |
|
224 | self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) | |
225 | new_csrf_token = auth.get_csrf_token(session) |
|
225 | new_csrf_token = auth.get_csrf_token(session) | |
226 |
|
226 | |||
227 | user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN) |
|
227 | user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN) | |
228 | repo = Repository.get_by_repo_name(repo_name) |
|
228 | repo = Repository.get_by_repo_name(repo_name) | |
229 | user_util.grant_user_permission_to_repo(repo, user, 'repository.admin') |
|
229 | user_util.grant_user_permission_to_repo(repo, user, 'repository.admin') | |
230 | data = self.FORM_DATA.copy() |
|
230 | data = self.FORM_DATA.copy() | |
231 | data['csrf_token'] = new_csrf_token |
|
231 | data['csrf_token'] = new_csrf_token | |
232 | settings = SettingsModel(repo=repo_name) |
|
232 | settings = SettingsModel(repo=repo_name) | |
233 |
|
233 | |||
234 | try: |
|
234 | try: | |
235 | self.app.post( |
|
235 | self.app.post( | |
236 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, |
|
236 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, | |
237 | status=302) |
|
237 | status=302) | |
238 | finally: |
|
238 | finally: | |
239 | self._cleanup_repo_settings(settings) |
|
239 | self._cleanup_repo_settings(settings) | |
240 |
|
240 | |||
241 | @pytest.mark.skip_backends('svn') |
|
241 | @pytest.mark.skip_backends('svn') | |
242 | def test_pr_settings_are_updated( |
|
242 | def test_pr_settings_are_updated( | |
243 | self, autologin_user, backend, csrf_token): |
|
243 | self, autologin_user, backend, csrf_token): | |
244 | repo_name = backend.repo_name |
|
244 | repo_name = backend.repo_name | |
245 | settings = SettingsModel(repo=repo_name) |
|
245 | settings = SettingsModel(repo=repo_name) | |
246 | for name in VcsSettingsModel.GENERAL_SETTINGS: |
|
246 | for name in VcsSettingsModel.GENERAL_SETTINGS: | |
247 | settings.create_or_update_setting(name, True, 'bool') |
|
247 | settings.create_or_update_setting(name, True, 'bool') | |
248 |
|
248 | |||
249 | data = self.FORM_DATA.copy() |
|
249 | data = self.FORM_DATA.copy() | |
250 | data['csrf_token'] = csrf_token |
|
250 | data['csrf_token'] = csrf_token | |
251 | self.app.post( |
|
251 | self.app.post( | |
252 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
252 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
253 | try: |
|
253 | try: | |
254 | for name in VcsSettingsModel.GENERAL_SETTINGS: |
|
254 | for name in VcsSettingsModel.GENERAL_SETTINGS: | |
255 | setting = settings.get_setting_by_name(name) |
|
255 | setting = settings.get_setting_by_name(name) | |
256 | assert setting.app_settings_value is False |
|
256 | assert setting.app_settings_value is False | |
257 | finally: |
|
257 | finally: | |
258 | self._cleanup_repo_settings(settings) |
|
258 | self._cleanup_repo_settings(settings) | |
259 |
|
259 | |||
260 | def test_pr_settings_are_not_updated_for_svn( |
|
260 | def test_pr_settings_are_not_updated_for_svn( | |
261 | self, autologin_user, backend_svn, csrf_token): |
|
261 | self, autologin_user, backend_svn, csrf_token): | |
262 | repo_name = backend_svn.repo_name |
|
262 | repo_name = backend_svn.repo_name | |
263 | settings = SettingsModel(repo=repo_name) |
|
263 | settings = SettingsModel(repo=repo_name) | |
264 | for name in VcsSettingsModel.GENERAL_SETTINGS: |
|
264 | for name in VcsSettingsModel.GENERAL_SETTINGS: | |
265 | settings.create_or_update_setting(name, True, 'bool') |
|
265 | settings.create_or_update_setting(name, True, 'bool') | |
266 |
|
266 | |||
267 | data = self.FORM_DATA.copy() |
|
267 | data = self.FORM_DATA.copy() | |
268 | data['csrf_token'] = csrf_token |
|
268 | data['csrf_token'] = csrf_token | |
269 | self.app.post( |
|
269 | self.app.post( | |
270 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
270 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
271 | try: |
|
271 | try: | |
272 | for name in VcsSettingsModel.GENERAL_SETTINGS: |
|
272 | for name in VcsSettingsModel.GENERAL_SETTINGS: | |
273 | setting = settings.get_setting_by_name(name) |
|
273 | setting = settings.get_setting_by_name(name) | |
274 | assert setting.app_settings_value is True |
|
274 | assert setting.app_settings_value is True | |
275 | finally: |
|
275 | finally: | |
276 | self._cleanup_repo_settings(settings) |
|
276 | self._cleanup_repo_settings(settings) | |
277 |
|
277 | |||
278 | def test_svn_settings_are_created( |
|
278 | def test_svn_settings_are_created( | |
279 | self, autologin_user, backend_svn, csrf_token, settings_util): |
|
279 | self, autologin_user, backend_svn, csrf_token, settings_util): | |
280 | repo_name = backend_svn.repo_name |
|
280 | repo_name = backend_svn.repo_name | |
281 | data = self.FORM_DATA.copy() |
|
281 | data = self.FORM_DATA.copy() | |
282 | data['new_svn_tag'] = 'svn-tag' |
|
282 | data['new_svn_tag'] = 'svn-tag' | |
283 | data['new_svn_branch'] = 'svn-branch' |
|
283 | data['new_svn_branch'] = 'svn-branch' | |
284 | data['csrf_token'] = csrf_token |
|
284 | data['csrf_token'] = csrf_token | |
285 |
|
285 | |||
286 | # Create few global settings to make sure that uniqueness validators |
|
286 | # Create few global settings to make sure that uniqueness validators | |
287 | # are not triggered |
|
287 | # are not triggered | |
288 | settings_util.create_rhodecode_ui( |
|
288 | settings_util.create_rhodecode_ui( | |
289 | VcsSettingsModel.SVN_BRANCH_SECTION, 'svn-branch') |
|
289 | VcsSettingsModel.SVN_BRANCH_SECTION, 'svn-branch') | |
290 | settings_util.create_rhodecode_ui( |
|
290 | settings_util.create_rhodecode_ui( | |
291 | VcsSettingsModel.SVN_TAG_SECTION, 'svn-tag') |
|
291 | VcsSettingsModel.SVN_TAG_SECTION, 'svn-tag') | |
292 |
|
292 | |||
293 | self.app.post( |
|
293 | self.app.post( | |
294 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
294 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
295 | settings = SettingsModel(repo=repo_name) |
|
295 | settings = SettingsModel(repo=repo_name) | |
296 | try: |
|
296 | try: | |
297 | svn_branches = settings.get_ui_by_section( |
|
297 | svn_branches = settings.get_ui_by_section( | |
298 | VcsSettingsModel.SVN_BRANCH_SECTION) |
|
298 | VcsSettingsModel.SVN_BRANCH_SECTION) | |
299 | svn_branch_names = [b.ui_value for b in svn_branches] |
|
299 | svn_branch_names = [b.ui_value for b in svn_branches] | |
300 | svn_tags = settings.get_ui_by_section( |
|
300 | svn_tags = settings.get_ui_by_section( | |
301 | VcsSettingsModel.SVN_TAG_SECTION) |
|
301 | VcsSettingsModel.SVN_TAG_SECTION) | |
302 | svn_tag_names = [b.ui_value for b in svn_tags] |
|
302 | svn_tag_names = [b.ui_value for b in svn_tags] | |
303 | assert 'svn-branch' in svn_branch_names |
|
303 | assert 'svn-branch' in svn_branch_names | |
304 | assert 'svn-tag' in svn_tag_names |
|
304 | assert 'svn-tag' in svn_tag_names | |
305 | finally: |
|
305 | finally: | |
306 | self._cleanup_repo_settings(settings) |
|
306 | self._cleanup_repo_settings(settings) | |
307 |
|
307 | |||
308 | def test_svn_settings_are_unique( |
|
308 | def test_svn_settings_are_unique( | |
309 | self, autologin_user, backend_svn, csrf_token, settings_util): |
|
309 | self, autologin_user, backend_svn, csrf_token, settings_util): | |
310 | repo = backend_svn.repo |
|
310 | repo = backend_svn.repo | |
311 | repo_name = repo.repo_name |
|
311 | repo_name = repo.repo_name | |
312 | data = self.FORM_DATA.copy() |
|
312 | data = self.FORM_DATA.copy() | |
313 | data['new_svn_tag'] = 'test_tag' |
|
313 | data['new_svn_tag'] = 'test_tag' | |
314 | data['new_svn_branch'] = 'test_branch' |
|
314 | data['new_svn_branch'] = 'test_branch' | |
315 | data['csrf_token'] = csrf_token |
|
315 | data['csrf_token'] = csrf_token | |
316 | settings_util.create_repo_rhodecode_ui( |
|
316 | settings_util.create_repo_rhodecode_ui( | |
317 | repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch') |
|
317 | repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch') | |
318 | settings_util.create_repo_rhodecode_ui( |
|
318 | settings_util.create_repo_rhodecode_ui( | |
319 | repo, VcsSettingsModel.SVN_TAG_SECTION, 'test_tag') |
|
319 | repo, VcsSettingsModel.SVN_TAG_SECTION, 'test_tag') | |
320 |
|
320 | |||
321 | response = self.app.post( |
|
321 | response = self.app.post( | |
322 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=200) |
|
322 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=200) | |
323 | response.mustcontain('Pattern already exists') |
|
323 | response.mustcontain('Pattern already exists') | |
324 |
|
324 | |||
325 | def test_svn_settings_with_empty_values_are_not_created( |
|
325 | def test_svn_settings_with_empty_values_are_not_created( | |
326 | self, autologin_user, backend_svn, csrf_token): |
|
326 | self, autologin_user, backend_svn, csrf_token): | |
327 | repo_name = backend_svn.repo_name |
|
327 | repo_name = backend_svn.repo_name | |
328 | data = self.FORM_DATA.copy() |
|
328 | data = self.FORM_DATA.copy() | |
329 | data['csrf_token'] = csrf_token |
|
329 | data['csrf_token'] = csrf_token | |
330 | self.app.post( |
|
330 | self.app.post( | |
331 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
331 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
332 | settings = SettingsModel(repo=repo_name) |
|
332 | settings = SettingsModel(repo=repo_name) | |
333 | try: |
|
333 | try: | |
334 | svn_branches = settings.get_ui_by_section( |
|
334 | svn_branches = settings.get_ui_by_section( | |
335 | VcsSettingsModel.SVN_BRANCH_SECTION) |
|
335 | VcsSettingsModel.SVN_BRANCH_SECTION) | |
336 | svn_tags = settings.get_ui_by_section( |
|
336 | svn_tags = settings.get_ui_by_section( | |
337 | VcsSettingsModel.SVN_TAG_SECTION) |
|
337 | VcsSettingsModel.SVN_TAG_SECTION) | |
338 | assert len(svn_branches) == 0 |
|
338 | assert len(svn_branches) == 0 | |
339 | assert len(svn_tags) == 0 |
|
339 | assert len(svn_tags) == 0 | |
340 | finally: |
|
340 | finally: | |
341 | self._cleanup_repo_settings(settings) |
|
341 | self._cleanup_repo_settings(settings) | |
342 |
|
342 | |||
343 | def test_svn_settings_are_shown_for_svn_repository( |
|
343 | def test_svn_settings_are_shown_for_svn_repository( | |
344 | self, autologin_user, backend_svn, csrf_token): |
|
344 | self, autologin_user, backend_svn, csrf_token): | |
345 | repo_name = backend_svn.repo_name |
|
345 | repo_name = backend_svn.repo_name | |
346 | response = self.app.get( |
|
346 | response = self.app.get( | |
347 | route_path('edit_repo_vcs', repo_name=repo_name), status=200) |
|
347 | route_path('edit_repo_vcs', repo_name=repo_name), status=200) | |
348 | response.mustcontain('Subversion Settings') |
|
348 | response.mustcontain('Subversion Settings') | |
349 |
|
349 | |||
350 | @pytest.mark.skip_backends('svn') |
|
350 | @pytest.mark.skip_backends('svn') | |
351 | def test_svn_settings_are_not_created_for_not_svn_repository( |
|
351 | def test_svn_settings_are_not_created_for_not_svn_repository( | |
352 | self, autologin_user, backend, csrf_token): |
|
352 | self, autologin_user, backend, csrf_token): | |
353 | repo_name = backend.repo_name |
|
353 | repo_name = backend.repo_name | |
354 | data = self.FORM_DATA.copy() |
|
354 | data = self.FORM_DATA.copy() | |
355 | data['csrf_token'] = csrf_token |
|
355 | data['csrf_token'] = csrf_token | |
356 | self.app.post( |
|
356 | self.app.post( | |
357 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
357 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
358 | settings = SettingsModel(repo=repo_name) |
|
358 | settings = SettingsModel(repo=repo_name) | |
359 | try: |
|
359 | try: | |
360 | svn_branches = settings.get_ui_by_section( |
|
360 | svn_branches = settings.get_ui_by_section( | |
361 | VcsSettingsModel.SVN_BRANCH_SECTION) |
|
361 | VcsSettingsModel.SVN_BRANCH_SECTION) | |
362 | svn_tags = settings.get_ui_by_section( |
|
362 | svn_tags = settings.get_ui_by_section( | |
363 | VcsSettingsModel.SVN_TAG_SECTION) |
|
363 | VcsSettingsModel.SVN_TAG_SECTION) | |
364 | assert len(svn_branches) == 0 |
|
364 | assert len(svn_branches) == 0 | |
365 | assert len(svn_tags) == 0 |
|
365 | assert len(svn_tags) == 0 | |
366 | finally: |
|
366 | finally: | |
367 | self._cleanup_repo_settings(settings) |
|
367 | self._cleanup_repo_settings(settings) | |
368 |
|
368 | |||
369 | @pytest.mark.skip_backends('svn') |
|
369 | @pytest.mark.skip_backends('svn') | |
370 | def test_svn_settings_are_shown_only_for_svn_repository( |
|
370 | def test_svn_settings_are_shown_only_for_svn_repository( | |
371 | self, autologin_user, backend, csrf_token): |
|
371 | self, autologin_user, backend, csrf_token): | |
372 | repo_name = backend.repo_name |
|
372 | repo_name = backend.repo_name | |
373 | response = self.app.get( |
|
373 | response = self.app.get( | |
374 | route_path('edit_repo_vcs', repo_name=repo_name), status=200) |
|
374 | route_path('edit_repo_vcs', repo_name=repo_name), status=200) | |
375 | response.mustcontain(no='Subversion Settings') |
|
375 | response.mustcontain(no='Subversion Settings') | |
376 |
|
376 | |||
377 | def test_hg_settings_are_created( |
|
377 | def test_hg_settings_are_created( | |
378 | self, autologin_user, backend_hg, csrf_token): |
|
378 | self, autologin_user, backend_hg, csrf_token): | |
379 | repo_name = backend_hg.repo_name |
|
379 | repo_name = backend_hg.repo_name | |
380 | data = self.FORM_DATA.copy() |
|
380 | data = self.FORM_DATA.copy() | |
381 | data['new_svn_tag'] = 'svn-tag' |
|
381 | data['new_svn_tag'] = 'svn-tag' | |
382 | data['new_svn_branch'] = 'svn-branch' |
|
382 | data['new_svn_branch'] = 'svn-branch' | |
383 | data['csrf_token'] = csrf_token |
|
383 | data['csrf_token'] = csrf_token | |
384 | self.app.post( |
|
384 | self.app.post( | |
385 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
385 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
386 | settings = SettingsModel(repo=repo_name) |
|
386 | settings = SettingsModel(repo=repo_name) | |
387 | try: |
|
387 | try: | |
388 | largefiles_ui = settings.get_ui_by_section_and_key( |
|
388 | largefiles_ui = settings.get_ui_by_section_and_key( | |
389 | 'extensions', 'largefiles') |
|
389 | 'extensions', 'largefiles') | |
390 | assert largefiles_ui.ui_active is False |
|
390 | assert largefiles_ui.ui_active is False | |
391 | phases_ui = settings.get_ui_by_section_and_key( |
|
391 | phases_ui = settings.get_ui_by_section_and_key( | |
392 | 'phases', 'publish') |
|
392 | 'phases', 'publish') | |
393 | assert str2bool(phases_ui.ui_value) is False |
|
393 | assert str2bool(phases_ui.ui_value) is False | |
394 | finally: |
|
394 | finally: | |
395 | self._cleanup_repo_settings(settings) |
|
395 | self._cleanup_repo_settings(settings) | |
396 |
|
396 | |||
397 | def test_hg_settings_are_updated( |
|
397 | def test_hg_settings_are_updated( | |
398 | self, autologin_user, backend_hg, csrf_token): |
|
398 | self, autologin_user, backend_hg, csrf_token): | |
399 | repo_name = backend_hg.repo_name |
|
399 | repo_name = backend_hg.repo_name | |
400 | settings = SettingsModel(repo=repo_name) |
|
400 | settings = SettingsModel(repo=repo_name) | |
401 | settings.create_ui_section_value( |
|
401 | settings.create_ui_section_value( | |
402 | 'extensions', '', key='largefiles', active=True) |
|
402 | 'extensions', '', key='largefiles', active=True) | |
403 | settings.create_ui_section_value( |
|
403 | settings.create_ui_section_value( | |
404 | 'phases', '1', key='publish', active=True) |
|
404 | 'phases', '1', key='publish', active=True) | |
405 |
|
405 | |||
406 | data = self.FORM_DATA.copy() |
|
406 | data = self.FORM_DATA.copy() | |
407 | data['csrf_token'] = csrf_token |
|
407 | data['csrf_token'] = csrf_token | |
408 | self.app.post( |
|
408 | self.app.post( | |
409 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
409 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
410 | try: |
|
410 | try: | |
411 | largefiles_ui = settings.get_ui_by_section_and_key( |
|
411 | largefiles_ui = settings.get_ui_by_section_and_key( | |
412 | 'extensions', 'largefiles') |
|
412 | 'extensions', 'largefiles') | |
413 | assert largefiles_ui.ui_active is False |
|
413 | assert largefiles_ui.ui_active is False | |
414 | phases_ui = settings.get_ui_by_section_and_key( |
|
414 | phases_ui = settings.get_ui_by_section_and_key( | |
415 | 'phases', 'publish') |
|
415 | 'phases', 'publish') | |
416 | assert str2bool(phases_ui.ui_value) is False |
|
416 | assert str2bool(phases_ui.ui_value) is False | |
417 | finally: |
|
417 | finally: | |
418 | self._cleanup_repo_settings(settings) |
|
418 | self._cleanup_repo_settings(settings) | |
419 |
|
419 | |||
420 | def test_hg_settings_are_shown_for_hg_repository( |
|
420 | def test_hg_settings_are_shown_for_hg_repository( | |
421 | self, autologin_user, backend_hg, csrf_token): |
|
421 | self, autologin_user, backend_hg, csrf_token): | |
422 | repo_name = backend_hg.repo_name |
|
422 | repo_name = backend_hg.repo_name | |
423 | response = self.app.get( |
|
423 | response = self.app.get( | |
424 | route_path('edit_repo_vcs', repo_name=repo_name), status=200) |
|
424 | route_path('edit_repo_vcs', repo_name=repo_name), status=200) | |
425 | response.mustcontain('Mercurial Settings') |
|
425 | response.mustcontain('Mercurial Settings') | |
426 |
|
426 | |||
427 | @pytest.mark.skip_backends('hg') |
|
427 | @pytest.mark.skip_backends('hg') | |
428 | def test_hg_settings_are_created_only_for_hg_repository( |
|
428 | def test_hg_settings_are_created_only_for_hg_repository( | |
429 | self, autologin_user, backend, csrf_token): |
|
429 | self, autologin_user, backend, csrf_token): | |
430 | repo_name = backend.repo_name |
|
430 | repo_name = backend.repo_name | |
431 | data = self.FORM_DATA.copy() |
|
431 | data = self.FORM_DATA.copy() | |
432 | data['csrf_token'] = csrf_token |
|
432 | data['csrf_token'] = csrf_token | |
433 | self.app.post( |
|
433 | self.app.post( | |
434 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
434 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
435 | settings = SettingsModel(repo=repo_name) |
|
435 | settings = SettingsModel(repo=repo_name) | |
436 | try: |
|
436 | try: | |
437 | largefiles_ui = settings.get_ui_by_section_and_key( |
|
437 | largefiles_ui = settings.get_ui_by_section_and_key( | |
438 | 'extensions', 'largefiles') |
|
438 | 'extensions', 'largefiles') | |
439 | assert largefiles_ui is None |
|
439 | assert largefiles_ui is None | |
440 | phases_ui = settings.get_ui_by_section_and_key( |
|
440 | phases_ui = settings.get_ui_by_section_and_key( | |
441 | 'phases', 'publish') |
|
441 | 'phases', 'publish') | |
442 | assert phases_ui is None |
|
442 | assert phases_ui is None | |
443 | finally: |
|
443 | finally: | |
444 | self._cleanup_repo_settings(settings) |
|
444 | self._cleanup_repo_settings(settings) | |
445 |
|
445 | |||
446 | @pytest.mark.skip_backends('hg') |
|
446 | @pytest.mark.skip_backends('hg') | |
447 | def test_hg_settings_are_shown_only_for_hg_repository( |
|
447 | def test_hg_settings_are_shown_only_for_hg_repository( | |
448 | self, autologin_user, backend, csrf_token): |
|
448 | self, autologin_user, backend, csrf_token): | |
449 | repo_name = backend.repo_name |
|
449 | repo_name = backend.repo_name | |
450 | response = self.app.get( |
|
450 | response = self.app.get( | |
451 | route_path('edit_repo_vcs', repo_name=repo_name), status=200) |
|
451 | route_path('edit_repo_vcs', repo_name=repo_name), status=200) | |
452 | response.mustcontain(no='Mercurial Settings') |
|
452 | response.mustcontain(no='Mercurial Settings') | |
453 |
|
453 | |||
454 | @pytest.mark.skip_backends('hg') |
|
454 | @pytest.mark.skip_backends('hg') | |
455 | def test_hg_settings_are_updated_only_for_hg_repository( |
|
455 | def test_hg_settings_are_updated_only_for_hg_repository( | |
456 | self, autologin_user, backend, csrf_token): |
|
456 | self, autologin_user, backend, csrf_token): | |
457 | repo_name = backend.repo_name |
|
457 | repo_name = backend.repo_name | |
458 | settings = SettingsModel(repo=repo_name) |
|
458 | settings = SettingsModel(repo=repo_name) | |
459 | settings.create_ui_section_value( |
|
459 | settings.create_ui_section_value( | |
460 | 'extensions', '', key='largefiles', active=True) |
|
460 | 'extensions', '', key='largefiles', active=True) | |
461 | settings.create_ui_section_value( |
|
461 | settings.create_ui_section_value( | |
462 | 'phases', '1', key='publish', active=True) |
|
462 | 'phases', '1', key='publish', active=True) | |
463 |
|
463 | |||
464 | data = self.FORM_DATA.copy() |
|
464 | data = self.FORM_DATA.copy() | |
465 | data['csrf_token'] = csrf_token |
|
465 | data['csrf_token'] = csrf_token | |
466 | self.app.post( |
|
466 | self.app.post( | |
467 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
467 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
468 | try: |
|
468 | try: | |
469 | largefiles_ui = settings.get_ui_by_section_and_key( |
|
469 | largefiles_ui = settings.get_ui_by_section_and_key( | |
470 | 'extensions', 'largefiles') |
|
470 | 'extensions', 'largefiles') | |
471 | assert largefiles_ui.ui_active is True |
|
471 | assert largefiles_ui.ui_active is True | |
472 | phases_ui = settings.get_ui_by_section_and_key( |
|
472 | phases_ui = settings.get_ui_by_section_and_key( | |
473 | 'phases', 'publish') |
|
473 | 'phases', 'publish') | |
474 | assert phases_ui.ui_value == '1' |
|
474 | assert phases_ui.ui_value == '1' | |
475 | finally: |
|
475 | finally: | |
476 | self._cleanup_repo_settings(settings) |
|
476 | self._cleanup_repo_settings(settings) | |
477 |
|
477 | |||
478 | def test_per_repo_svn_settings_are_displayed( |
|
478 | def test_per_repo_svn_settings_are_displayed( | |
479 | self, autologin_user, backend_svn, settings_util): |
|
479 | self, autologin_user, backend_svn, settings_util): | |
480 | repo = backend_svn.create_repo() |
|
480 | repo = backend_svn.create_repo() | |
481 | repo_name = repo.repo_name |
|
481 | repo_name = repo.repo_name | |
482 | branches = [ |
|
482 | branches = [ | |
483 | settings_util.create_repo_rhodecode_ui( |
|
483 | settings_util.create_repo_rhodecode_ui( | |
484 | repo, VcsSettingsModel.SVN_BRANCH_SECTION, |
|
484 | repo, VcsSettingsModel.SVN_BRANCH_SECTION, | |
485 | 'branch_{}'.format(i)) |
|
485 | 'branch_{}'.format(i)) | |
486 | for i in range(10)] |
|
486 | for i in range(10)] | |
487 | tags = [ |
|
487 | tags = [ | |
488 | settings_util.create_repo_rhodecode_ui( |
|
488 | settings_util.create_repo_rhodecode_ui( | |
489 | repo, VcsSettingsModel.SVN_TAG_SECTION, 'tag_{}'.format(i)) |
|
489 | repo, VcsSettingsModel.SVN_TAG_SECTION, 'tag_{}'.format(i)) | |
490 | for i in range(10)] |
|
490 | for i in range(10)] | |
491 |
|
491 | |||
492 | response = self.app.get( |
|
492 | response = self.app.get( | |
493 | route_path('edit_repo_vcs', repo_name=repo_name), status=200) |
|
493 | route_path('edit_repo_vcs', repo_name=repo_name), status=200) | |
494 |
assert_response = |
|
494 | assert_response = response.assert_response() | |
495 | for branch in branches: |
|
495 | for branch in branches: | |
496 | css_selector = '[name=branch_value_{}]'.format(branch.ui_id) |
|
496 | css_selector = '[name=branch_value_{}]'.format(branch.ui_id) | |
497 | element = assert_response.get_element(css_selector) |
|
497 | element = assert_response.get_element(css_selector) | |
498 | assert element.value == branch.ui_value |
|
498 | assert element.value == branch.ui_value | |
499 | for tag in tags: |
|
499 | for tag in tags: | |
500 | css_selector = '[name=tag_ui_value_new_{}]'.format(tag.ui_id) |
|
500 | css_selector = '[name=tag_ui_value_new_{}]'.format(tag.ui_id) | |
501 | element = assert_response.get_element(css_selector) |
|
501 | element = assert_response.get_element(css_selector) | |
502 | assert element.value == tag.ui_value |
|
502 | assert element.value == tag.ui_value | |
503 |
|
503 | |||
504 | def test_per_repo_hg_and_pr_settings_are_not_displayed_for_svn( |
|
504 | def test_per_repo_hg_and_pr_settings_are_not_displayed_for_svn( | |
505 | self, autologin_user, backend_svn, settings_util): |
|
505 | self, autologin_user, backend_svn, settings_util): | |
506 | repo = backend_svn.create_repo() |
|
506 | repo = backend_svn.create_repo() | |
507 | repo_name = repo.repo_name |
|
507 | repo_name = repo.repo_name | |
508 | response = self.app.get( |
|
508 | response = self.app.get( | |
509 | route_path('edit_repo_vcs', repo_name=repo_name), status=200) |
|
509 | route_path('edit_repo_vcs', repo_name=repo_name), status=200) | |
510 | response.mustcontain(no='<label>Hooks:</label>') |
|
510 | response.mustcontain(no='<label>Hooks:</label>') | |
511 | response.mustcontain(no='<label>Pull Request Settings:</label>') |
|
511 | response.mustcontain(no='<label>Pull Request Settings:</label>') | |
512 |
|
512 | |||
513 | def test_inherit_global_settings_value_is_saved( |
|
513 | def test_inherit_global_settings_value_is_saved( | |
514 | self, autologin_user, backend, csrf_token): |
|
514 | self, autologin_user, backend, csrf_token): | |
515 | repo_name = backend.repo_name |
|
515 | repo_name = backend.repo_name | |
516 | data = self.FORM_DATA.copy() |
|
516 | data = self.FORM_DATA.copy() | |
517 | data['csrf_token'] = csrf_token |
|
517 | data['csrf_token'] = csrf_token | |
518 | data['inherit_global_settings'] = True |
|
518 | data['inherit_global_settings'] = True | |
519 | self.app.post( |
|
519 | self.app.post( | |
520 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
520 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
521 |
|
521 | |||
522 | settings = SettingsModel(repo=repo_name) |
|
522 | settings = SettingsModel(repo=repo_name) | |
523 | vcs_settings = VcsSettingsModel(repo=repo_name) |
|
523 | vcs_settings = VcsSettingsModel(repo=repo_name) | |
524 | try: |
|
524 | try: | |
525 | assert vcs_settings.inherit_global_settings is True |
|
525 | assert vcs_settings.inherit_global_settings is True | |
526 | finally: |
|
526 | finally: | |
527 | self._cleanup_repo_settings(settings) |
|
527 | self._cleanup_repo_settings(settings) | |
528 |
|
528 | |||
529 | def test_repo_cache_is_invalidated_when_settings_are_updated( |
|
529 | def test_repo_cache_is_invalidated_when_settings_are_updated( | |
530 | self, autologin_user, backend, csrf_token): |
|
530 | self, autologin_user, backend, csrf_token): | |
531 | repo_name = backend.repo_name |
|
531 | repo_name = backend.repo_name | |
532 | data = self.FORM_DATA.copy() |
|
532 | data = self.FORM_DATA.copy() | |
533 | data['csrf_token'] = csrf_token |
|
533 | data['csrf_token'] = csrf_token | |
534 | data['inherit_global_settings'] = True |
|
534 | data['inherit_global_settings'] = True | |
535 | settings = SettingsModel(repo=repo_name) |
|
535 | settings = SettingsModel(repo=repo_name) | |
536 |
|
536 | |||
537 | invalidation_patcher = mock.patch( |
|
537 | invalidation_patcher = mock.patch( | |
538 | 'rhodecode.model.scm.ScmModel.mark_for_invalidation') |
|
538 | 'rhodecode.model.scm.ScmModel.mark_for_invalidation') | |
539 | with invalidation_patcher as invalidation_mock: |
|
539 | with invalidation_patcher as invalidation_mock: | |
540 | self.app.post( |
|
540 | self.app.post( | |
541 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, |
|
541 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, | |
542 | status=302) |
|
542 | status=302) | |
543 | try: |
|
543 | try: | |
544 | invalidation_mock.assert_called_once_with(repo_name, delete=True) |
|
544 | invalidation_mock.assert_called_once_with(repo_name, delete=True) | |
545 | finally: |
|
545 | finally: | |
546 | self._cleanup_repo_settings(settings) |
|
546 | self._cleanup_repo_settings(settings) | |
547 |
|
547 | |||
548 | def test_other_settings_not_saved_inherit_global_settings_is_true( |
|
548 | def test_other_settings_not_saved_inherit_global_settings_is_true( | |
549 | self, autologin_user, backend, csrf_token): |
|
549 | self, autologin_user, backend, csrf_token): | |
550 | repo_name = backend.repo_name |
|
550 | repo_name = backend.repo_name | |
551 | data = self.FORM_DATA.copy() |
|
551 | data = self.FORM_DATA.copy() | |
552 | data['csrf_token'] = csrf_token |
|
552 | data['csrf_token'] = csrf_token | |
553 | data['inherit_global_settings'] = True |
|
553 | data['inherit_global_settings'] = True | |
554 | self.app.post( |
|
554 | self.app.post( | |
555 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) |
|
555 | route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302) | |
556 |
|
556 | |||
557 | settings = SettingsModel(repo=repo_name) |
|
557 | settings = SettingsModel(repo=repo_name) | |
558 | ui_settings = ( |
|
558 | ui_settings = ( | |
559 | VcsSettingsModel.HOOKS_SETTINGS + VcsSettingsModel.HG_SETTINGS) |
|
559 | VcsSettingsModel.HOOKS_SETTINGS + VcsSettingsModel.HG_SETTINGS) | |
560 |
|
560 | |||
561 | vcs_settings = [] |
|
561 | vcs_settings = [] | |
562 | try: |
|
562 | try: | |
563 | for section, key in ui_settings: |
|
563 | for section, key in ui_settings: | |
564 | ui = settings.get_ui_by_section_and_key(section, key) |
|
564 | ui = settings.get_ui_by_section_and_key(section, key) | |
565 | if ui: |
|
565 | if ui: | |
566 | vcs_settings.append(ui) |
|
566 | vcs_settings.append(ui) | |
567 | vcs_settings.extend(settings.get_ui_by_section( |
|
567 | vcs_settings.extend(settings.get_ui_by_section( | |
568 | VcsSettingsModel.SVN_BRANCH_SECTION)) |
|
568 | VcsSettingsModel.SVN_BRANCH_SECTION)) | |
569 | vcs_settings.extend(settings.get_ui_by_section( |
|
569 | vcs_settings.extend(settings.get_ui_by_section( | |
570 | VcsSettingsModel.SVN_TAG_SECTION)) |
|
570 | VcsSettingsModel.SVN_TAG_SECTION)) | |
571 | for name in VcsSettingsModel.GENERAL_SETTINGS: |
|
571 | for name in VcsSettingsModel.GENERAL_SETTINGS: | |
572 | setting = settings.get_setting_by_name(name) |
|
572 | setting = settings.get_setting_by_name(name) | |
573 | if setting: |
|
573 | if setting: | |
574 | vcs_settings.append(setting) |
|
574 | vcs_settings.append(setting) | |
575 | assert vcs_settings == [] |
|
575 | assert vcs_settings == [] | |
576 | finally: |
|
576 | finally: | |
577 | self._cleanup_repo_settings(settings) |
|
577 | self._cleanup_repo_settings(settings) | |
578 |
|
578 | |||
579 | def test_delete_svn_branch_and_tag_patterns( |
|
579 | def test_delete_svn_branch_and_tag_patterns( | |
580 | self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header): |
|
580 | self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header): | |
581 | repo = backend_svn.create_repo() |
|
581 | repo = backend_svn.create_repo() | |
582 | repo_name = repo.repo_name |
|
582 | repo_name = repo.repo_name | |
583 | branch = settings_util.create_repo_rhodecode_ui( |
|
583 | branch = settings_util.create_repo_rhodecode_ui( | |
584 | repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch', |
|
584 | repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch', | |
585 | cleanup=False) |
|
585 | cleanup=False) | |
586 | tag = settings_util.create_repo_rhodecode_ui( |
|
586 | tag = settings_util.create_repo_rhodecode_ui( | |
587 | repo, VcsSettingsModel.SVN_TAG_SECTION, 'test_tag', cleanup=False) |
|
587 | repo, VcsSettingsModel.SVN_TAG_SECTION, 'test_tag', cleanup=False) | |
588 | data = { |
|
588 | data = { | |
589 | 'csrf_token': csrf_token |
|
589 | 'csrf_token': csrf_token | |
590 | } |
|
590 | } | |
591 | for id_ in (branch.ui_id, tag.ui_id): |
|
591 | for id_ in (branch.ui_id, tag.ui_id): | |
592 | data['delete_svn_pattern'] = id_, |
|
592 | data['delete_svn_pattern'] = id_, | |
593 | self.app.post( |
|
593 | self.app.post( | |
594 | route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name), |
|
594 | route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name), | |
595 | data, extra_environ=xhr_header, status=200) |
|
595 | data, extra_environ=xhr_header, status=200) | |
596 | settings = VcsSettingsModel(repo=repo_name) |
|
596 | settings = VcsSettingsModel(repo=repo_name) | |
597 | assert settings.get_repo_svn_branch_patterns() == [] |
|
597 | assert settings.get_repo_svn_branch_patterns() == [] | |
598 |
|
598 | |||
599 | def test_delete_svn_branch_requires_repo_admin_permission( |
|
599 | def test_delete_svn_branch_requires_repo_admin_permission( | |
600 | self, backend_svn, user_util, settings_util, csrf_token, xhr_header): |
|
600 | self, backend_svn, user_util, settings_util, csrf_token, xhr_header): | |
601 | repo = backend_svn.create_repo() |
|
601 | repo = backend_svn.create_repo() | |
602 | repo_name = repo.repo_name |
|
602 | repo_name = repo.repo_name | |
603 |
|
603 | |||
604 | logout_user_session(self.app, csrf_token) |
|
604 | logout_user_session(self.app, csrf_token) | |
605 | session = login_user_session( |
|
605 | session = login_user_session( | |
606 | self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) |
|
606 | self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) | |
607 | csrf_token = auth.get_csrf_token(session) |
|
607 | csrf_token = auth.get_csrf_token(session) | |
608 |
|
608 | |||
609 | repo = Repository.get_by_repo_name(repo_name) |
|
609 | repo = Repository.get_by_repo_name(repo_name) | |
610 | user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN) |
|
610 | user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN) | |
611 | user_util.grant_user_permission_to_repo(repo, user, 'repository.admin') |
|
611 | user_util.grant_user_permission_to_repo(repo, user, 'repository.admin') | |
612 | branch = settings_util.create_repo_rhodecode_ui( |
|
612 | branch = settings_util.create_repo_rhodecode_ui( | |
613 | repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch', |
|
613 | repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch', | |
614 | cleanup=False) |
|
614 | cleanup=False) | |
615 | data = { |
|
615 | data = { | |
616 | 'csrf_token': csrf_token, |
|
616 | 'csrf_token': csrf_token, | |
617 | 'delete_svn_pattern': branch.ui_id |
|
617 | 'delete_svn_pattern': branch.ui_id | |
618 | } |
|
618 | } | |
619 | self.app.post( |
|
619 | self.app.post( | |
620 | route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name), |
|
620 | route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name), | |
621 | data, extra_environ=xhr_header, status=200) |
|
621 | data, extra_environ=xhr_header, status=200) | |
622 |
|
622 | |||
623 | def test_delete_svn_branch_raises_400_when_not_found( |
|
623 | def test_delete_svn_branch_raises_400_when_not_found( | |
624 | self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header): |
|
624 | self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header): | |
625 | repo_name = backend_svn.repo_name |
|
625 | repo_name = backend_svn.repo_name | |
626 | data = { |
|
626 | data = { | |
627 | 'delete_svn_pattern': 123, |
|
627 | 'delete_svn_pattern': 123, | |
628 | 'csrf_token': csrf_token |
|
628 | 'csrf_token': csrf_token | |
629 | } |
|
629 | } | |
630 | self.app.post( |
|
630 | self.app.post( | |
631 | route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name), |
|
631 | route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name), | |
632 | data, extra_environ=xhr_header, status=400) |
|
632 | data, extra_environ=xhr_header, status=400) | |
633 |
|
633 | |||
634 | def test_delete_svn_branch_raises_400_when_no_id_specified( |
|
634 | def test_delete_svn_branch_raises_400_when_no_id_specified( | |
635 | self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header): |
|
635 | self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header): | |
636 | repo_name = backend_svn.repo_name |
|
636 | repo_name = backend_svn.repo_name | |
637 | data = { |
|
637 | data = { | |
638 | 'csrf_token': csrf_token |
|
638 | 'csrf_token': csrf_token | |
639 | } |
|
639 | } | |
640 | self.app.post( |
|
640 | self.app.post( | |
641 | route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name), |
|
641 | route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name), | |
642 | data, extra_environ=xhr_header, status=400) |
|
642 | data, extra_environ=xhr_header, status=400) | |
643 |
|
643 | |||
644 | def _cleanup_repo_settings(self, settings_model): |
|
644 | def _cleanup_repo_settings(self, settings_model): | |
645 | cleanup = [] |
|
645 | cleanup = [] | |
646 | ui_settings = ( |
|
646 | ui_settings = ( | |
647 | VcsSettingsModel.HOOKS_SETTINGS + VcsSettingsModel.HG_SETTINGS) |
|
647 | VcsSettingsModel.HOOKS_SETTINGS + VcsSettingsModel.HG_SETTINGS) | |
648 |
|
648 | |||
649 | for section, key in ui_settings: |
|
649 | for section, key in ui_settings: | |
650 | ui = settings_model.get_ui_by_section_and_key(section, key) |
|
650 | ui = settings_model.get_ui_by_section_and_key(section, key) | |
651 | if ui: |
|
651 | if ui: | |
652 | cleanup.append(ui) |
|
652 | cleanup.append(ui) | |
653 |
|
653 | |||
654 | cleanup.extend(settings_model.get_ui_by_section( |
|
654 | cleanup.extend(settings_model.get_ui_by_section( | |
655 | VcsSettingsModel.INHERIT_SETTINGS)) |
|
655 | VcsSettingsModel.INHERIT_SETTINGS)) | |
656 | cleanup.extend(settings_model.get_ui_by_section( |
|
656 | cleanup.extend(settings_model.get_ui_by_section( | |
657 | VcsSettingsModel.SVN_BRANCH_SECTION)) |
|
657 | VcsSettingsModel.SVN_BRANCH_SECTION)) | |
658 | cleanup.extend(settings_model.get_ui_by_section( |
|
658 | cleanup.extend(settings_model.get_ui_by_section( | |
659 | VcsSettingsModel.SVN_TAG_SECTION)) |
|
659 | VcsSettingsModel.SVN_TAG_SECTION)) | |
660 |
|
660 | |||
661 | for name in VcsSettingsModel.GENERAL_SETTINGS: |
|
661 | for name in VcsSettingsModel.GENERAL_SETTINGS: | |
662 | setting = settings_model.get_setting_by_name(name) |
|
662 | setting = settings_model.get_setting_by_name(name) | |
663 | if setting: |
|
663 | if setting: | |
664 | cleanup.append(setting) |
|
664 | cleanup.append(setting) | |
665 |
|
665 | |||
666 | for object_ in cleanup: |
|
666 | for object_ in cleanup: | |
667 | Session().delete(object_) |
|
667 | Session().delete(object_) | |
668 | Session().commit() |
|
668 | Session().commit() | |
669 |
|
669 | |||
670 | def assert_repo_value_equals_global_value(self, response, setting): |
|
670 | def assert_repo_value_equals_global_value(self, response, setting): | |
671 |
assert_response = |
|
671 | assert_response = response.assert_response() | |
672 | global_css_selector = '[name={}_inherited]'.format(setting) |
|
672 | global_css_selector = '[name={}_inherited]'.format(setting) | |
673 | repo_css_selector = '[name={}]'.format(setting) |
|
673 | repo_css_selector = '[name={}]'.format(setting) | |
674 | repo_element = assert_response.get_element(repo_css_selector) |
|
674 | repo_element = assert_response.get_element(repo_css_selector) | |
675 | global_element = assert_response.get_element(global_css_selector) |
|
675 | global_element = assert_response.get_element(global_css_selector) | |
676 | assert repo_element.value == global_element.value |
|
676 | assert repo_element.value == global_element.value | |
677 |
|
677 | |||
678 |
|
678 | |||
679 | def _get_permission_for_user(user, repo): |
|
679 | def _get_permission_for_user(user, repo): | |
680 | perm = UserRepoToPerm.query()\ |
|
680 | perm = UserRepoToPerm.query()\ | |
681 | .filter(UserRepoToPerm.repository == |
|
681 | .filter(UserRepoToPerm.repository == | |
682 | Repository.get_by_repo_name(repo))\ |
|
682 | Repository.get_by_repo_name(repo))\ | |
683 | .filter(UserRepoToPerm.user == User.get_by_username(user))\ |
|
683 | .filter(UserRepoToPerm.user == User.get_by_username(user))\ | |
684 | .all() |
|
684 | .all() | |
685 | return perm |
|
685 | return perm |
@@ -1,104 +1,104 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import mock |
|
21 | import mock | |
22 | import pytest |
|
22 | import pytest | |
23 |
|
23 | |||
24 | import rhodecode |
|
24 | import rhodecode | |
25 | from rhodecode.model.db import Repository |
|
25 | from rhodecode.model.db import Repository | |
26 | from rhodecode.model.settings import SettingsModel |
|
26 | from rhodecode.model.settings import SettingsModel | |
27 | from rhodecode.tests.utils import AssertResponse |
|
27 | from rhodecode.tests.utils import AssertResponse | |
28 |
|
28 | |||
29 |
|
29 | |||
30 | def route_path(name, params=None, **kwargs): |
|
30 | def route_path(name, params=None, **kwargs): | |
31 | import urllib |
|
31 | import urllib | |
32 |
|
32 | |||
33 | base_url = { |
|
33 | base_url = { | |
34 | 'edit_repo': '/{repo_name}/settings', |
|
34 | 'edit_repo': '/{repo_name}/settings', | |
35 | 'edit_repo_vcs': '/{repo_name}/settings/vcs', |
|
35 | 'edit_repo_vcs': '/{repo_name}/settings/vcs', | |
36 | 'edit_repo_vcs_update': '/{repo_name}/settings/vcs/update', |
|
36 | 'edit_repo_vcs_update': '/{repo_name}/settings/vcs/update', | |
37 | }[name].format(**kwargs) |
|
37 | }[name].format(**kwargs) | |
38 |
|
38 | |||
39 | if params: |
|
39 | if params: | |
40 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) |
|
40 | base_url = '{}?{}'.format(base_url, urllib.urlencode(params)) | |
41 | return base_url |
|
41 | return base_url | |
42 |
|
42 | |||
43 |
|
43 | |||
44 | @pytest.mark.usefixtures('autologin_user', 'app') |
|
44 | @pytest.mark.usefixtures('autologin_user', 'app') | |
45 | class TestAdminRepoVcsSettings(object): |
|
45 | class TestAdminRepoVcsSettings(object): | |
46 |
|
46 | |||
47 | @pytest.mark.parametrize('setting_name, setting_backends', [ |
|
47 | @pytest.mark.parametrize('setting_name, setting_backends', [ | |
48 | ('hg_use_rebase_for_merging', ['hg']), |
|
48 | ('hg_use_rebase_for_merging', ['hg']), | |
49 | ]) |
|
49 | ]) | |
50 | def test_labs_settings_visible_if_enabled( |
|
50 | def test_labs_settings_visible_if_enabled( | |
51 | self, setting_name, setting_backends, backend): |
|
51 | self, setting_name, setting_backends, backend): | |
52 | if backend.alias not in setting_backends: |
|
52 | if backend.alias not in setting_backends: | |
53 | pytest.skip('Setting not available for backend {}'.format(backend)) |
|
53 | pytest.skip('Setting not available for backend {}'.format(backend)) | |
54 |
|
54 | |||
55 | vcs_settings_url = route_path( |
|
55 | vcs_settings_url = route_path( | |
56 | 'edit_repo_vcs', repo_name=backend.repo.repo_name) |
|
56 | 'edit_repo_vcs', repo_name=backend.repo.repo_name) | |
57 |
|
57 | |||
58 | with mock.patch.dict( |
|
58 | with mock.patch.dict( | |
59 | rhodecode.CONFIG, {'labs_settings_active': 'true'}): |
|
59 | rhodecode.CONFIG, {'labs_settings_active': 'true'}): | |
60 | response = self.app.get(vcs_settings_url) |
|
60 | response = self.app.get(vcs_settings_url) | |
61 |
|
61 | |||
62 |
assertr = |
|
62 | assertr = response.assert_response() | |
63 | assertr.one_element_exists('#rhodecode_{}'.format(setting_name)) |
|
63 | assertr.one_element_exists('#rhodecode_{}'.format(setting_name)) | |
64 |
|
64 | |||
65 | @pytest.mark.parametrize('setting_name, setting_backends', [ |
|
65 | @pytest.mark.parametrize('setting_name, setting_backends', [ | |
66 | ('hg_use_rebase_for_merging', ['hg']), |
|
66 | ('hg_use_rebase_for_merging', ['hg']), | |
67 | ]) |
|
67 | ]) | |
68 | def test_update_boolean_settings( |
|
68 | def test_update_boolean_settings( | |
69 | self, csrf_token, setting_name, setting_backends, backend): |
|
69 | self, csrf_token, setting_name, setting_backends, backend): | |
70 | if backend.alias not in setting_backends: |
|
70 | if backend.alias not in setting_backends: | |
71 | pytest.skip('Setting not available for backend {}'.format(backend)) |
|
71 | pytest.skip('Setting not available for backend {}'.format(backend)) | |
72 |
|
72 | |||
73 | repo = backend.create_repo() |
|
73 | repo = backend.create_repo() | |
74 | repo_name = repo.repo_name |
|
74 | repo_name = repo.repo_name | |
75 |
|
75 | |||
76 | settings_model = SettingsModel(repo=repo) |
|
76 | settings_model = SettingsModel(repo=repo) | |
77 | vcs_settings_url = route_path( |
|
77 | vcs_settings_url = route_path( | |
78 | 'edit_repo_vcs_update', repo_name=repo_name) |
|
78 | 'edit_repo_vcs_update', repo_name=repo_name) | |
79 |
|
79 | |||
80 | self.app.post( |
|
80 | self.app.post( | |
81 | vcs_settings_url, |
|
81 | vcs_settings_url, | |
82 | params={ |
|
82 | params={ | |
83 | 'inherit_global_settings': False, |
|
83 | 'inherit_global_settings': False, | |
84 | 'new_svn_branch': 'dummy-value-for-testing', |
|
84 | 'new_svn_branch': 'dummy-value-for-testing', | |
85 | 'new_svn_tag': 'dummy-value-for-testing', |
|
85 | 'new_svn_tag': 'dummy-value-for-testing', | |
86 | 'rhodecode_{}'.format(setting_name): 'true', |
|
86 | 'rhodecode_{}'.format(setting_name): 'true', | |
87 | 'csrf_token': csrf_token, |
|
87 | 'csrf_token': csrf_token, | |
88 | }) |
|
88 | }) | |
89 | settings_model = SettingsModel(repo=Repository.get_by_repo_name(repo_name)) |
|
89 | settings_model = SettingsModel(repo=Repository.get_by_repo_name(repo_name)) | |
90 | setting = settings_model.get_setting_by_name(setting_name) |
|
90 | setting = settings_model.get_setting_by_name(setting_name) | |
91 | assert setting.app_settings_value |
|
91 | assert setting.app_settings_value | |
92 |
|
92 | |||
93 | self.app.post( |
|
93 | self.app.post( | |
94 | vcs_settings_url, |
|
94 | vcs_settings_url, | |
95 | params={ |
|
95 | params={ | |
96 | 'inherit_global_settings': False, |
|
96 | 'inherit_global_settings': False, | |
97 | 'new_svn_branch': 'dummy-value-for-testing', |
|
97 | 'new_svn_branch': 'dummy-value-for-testing', | |
98 | 'new_svn_tag': 'dummy-value-for-testing', |
|
98 | 'new_svn_tag': 'dummy-value-for-testing', | |
99 | 'rhodecode_{}'.format(setting_name): 'false', |
|
99 | 'rhodecode_{}'.format(setting_name): 'false', | |
100 | 'csrf_token': csrf_token, |
|
100 | 'csrf_token': csrf_token, | |
101 | }) |
|
101 | }) | |
102 | settings_model = SettingsModel(repo=Repository.get_by_repo_name(repo_name)) |
|
102 | settings_model = SettingsModel(repo=Repository.get_by_repo_name(repo_name)) | |
103 | setting = settings_model.get_setting_by_name(setting_name) |
|
103 | setting = settings_model.get_setting_by_name(setting_name) | |
104 | assert not setting.app_settings_value |
|
104 | assert not setting.app_settings_value |
@@ -1,202 +1,202 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import os |
|
21 | import os | |
22 |
|
22 | |||
23 | import mock |
|
23 | import mock | |
24 | import pytest |
|
24 | import pytest | |
25 | from whoosh import query |
|
25 | from whoosh import query | |
26 |
|
26 | |||
27 | from rhodecode.tests import ( |
|
27 | from rhodecode.tests import ( | |
28 | TestController, HG_REPO, |
|
28 | TestController, HG_REPO, | |
29 | TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) |
|
29 | TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) | |
30 | from rhodecode.tests.utils import AssertResponse |
|
30 | from rhodecode.tests.utils import AssertResponse | |
31 |
|
31 | |||
32 |
|
32 | |||
33 | def route_path(name, **kwargs): |
|
33 | def route_path(name, **kwargs): | |
34 | from rhodecode.apps._base import ADMIN_PREFIX |
|
34 | from rhodecode.apps._base import ADMIN_PREFIX | |
35 | return { |
|
35 | return { | |
36 | 'search': |
|
36 | 'search': | |
37 | ADMIN_PREFIX + '/search', |
|
37 | ADMIN_PREFIX + '/search', | |
38 | 'search_repo': |
|
38 | 'search_repo': | |
39 | '/{repo_name}/search', |
|
39 | '/{repo_name}/search', | |
40 |
|
40 | |||
41 | }[name].format(**kwargs) |
|
41 | }[name].format(**kwargs) | |
42 |
|
42 | |||
43 |
|
43 | |||
44 | class TestSearchController(TestController): |
|
44 | class TestSearchController(TestController): | |
45 |
|
45 | |||
46 | def test_index(self): |
|
46 | def test_index(self): | |
47 | self.log_user() |
|
47 | self.log_user() | |
48 | response = self.app.get(route_path('search')) |
|
48 | response = self.app.get(route_path('search')) | |
49 |
assert_response = |
|
49 | assert_response = response.assert_response() | |
50 | assert_response.one_element_exists('input#q') |
|
50 | assert_response.one_element_exists('input#q') | |
51 |
|
51 | |||
52 | def test_search_files_empty_search(self): |
|
52 | def test_search_files_empty_search(self): | |
53 | if os.path.isdir(self.index_location): |
|
53 | if os.path.isdir(self.index_location): | |
54 | pytest.skip('skipped due to existing index') |
|
54 | pytest.skip('skipped due to existing index') | |
55 | else: |
|
55 | else: | |
56 | self.log_user() |
|
56 | self.log_user() | |
57 | response = self.app.get(route_path('search'), |
|
57 | response = self.app.get(route_path('search'), | |
58 | {'q': HG_REPO}) |
|
58 | {'q': HG_REPO}) | |
59 | response.mustcontain('There is no index to search in. ' |
|
59 | response.mustcontain('There is no index to search in. ' | |
60 | 'Please run whoosh indexer') |
|
60 | 'Please run whoosh indexer') | |
61 |
|
61 | |||
62 | def test_search_validation(self): |
|
62 | def test_search_validation(self): | |
63 | self.log_user() |
|
63 | self.log_user() | |
64 | response = self.app.get(route_path('search'), |
|
64 | response = self.app.get(route_path('search'), | |
65 | {'q': query, 'type': 'content', 'page_limit': 1000}) |
|
65 | {'q': query, 'type': 'content', 'page_limit': 1000}) | |
66 |
|
66 | |||
67 | response.mustcontain( |
|
67 | response.mustcontain( | |
68 | 'page_limit - 1000 is greater than maximum value 500') |
|
68 | 'page_limit - 1000 is greater than maximum value 500') | |
69 |
|
69 | |||
70 | @pytest.mark.parametrize("query, expected_hits, expected_paths", [ |
|
70 | @pytest.mark.parametrize("query, expected_hits, expected_paths", [ | |
71 | ('todo', 23, [ |
|
71 | ('todo', 23, [ | |
72 | 'vcs/backends/hg/inmemory.py', |
|
72 | 'vcs/backends/hg/inmemory.py', | |
73 | 'vcs/tests/test_git.py']), |
|
73 | 'vcs/tests/test_git.py']), | |
74 | ('extension:rst installation', 6, [ |
|
74 | ('extension:rst installation', 6, [ | |
75 | 'docs/index.rst', |
|
75 | 'docs/index.rst', | |
76 | 'docs/installation.rst']), |
|
76 | 'docs/installation.rst']), | |
77 | ('def repo', 87, [ |
|
77 | ('def repo', 87, [ | |
78 | 'vcs/tests/test_git.py', |
|
78 | 'vcs/tests/test_git.py', | |
79 | 'vcs/tests/test_changesets.py']), |
|
79 | 'vcs/tests/test_changesets.py']), | |
80 | ('repository:%s def test' % HG_REPO, 18, [ |
|
80 | ('repository:%s def test' % HG_REPO, 18, [ | |
81 | 'vcs/tests/test_git.py', |
|
81 | 'vcs/tests/test_git.py', | |
82 | 'vcs/tests/test_changesets.py']), |
|
82 | 'vcs/tests/test_changesets.py']), | |
83 | ('"def main"', 9, [ |
|
83 | ('"def main"', 9, [ | |
84 | 'vcs/__init__.py', |
|
84 | 'vcs/__init__.py', | |
85 | 'vcs/tests/__init__.py', |
|
85 | 'vcs/tests/__init__.py', | |
86 | 'vcs/utils/progressbar.py']), |
|
86 | 'vcs/utils/progressbar.py']), | |
87 | ('owner:test_admin', 358, [ |
|
87 | ('owner:test_admin', 358, [ | |
88 | 'vcs/tests/base.py', |
|
88 | 'vcs/tests/base.py', | |
89 | 'MANIFEST.in', |
|
89 | 'MANIFEST.in', | |
90 | 'vcs/utils/termcolors.py', |
|
90 | 'vcs/utils/termcolors.py', | |
91 | 'docs/theme/ADC/static/documentation.png']), |
|
91 | 'docs/theme/ADC/static/documentation.png']), | |
92 | ('owner:test_admin def main', 72, [ |
|
92 | ('owner:test_admin def main', 72, [ | |
93 | 'vcs/__init__.py', |
|
93 | 'vcs/__init__.py', | |
94 | 'vcs/tests/test_utils_filesize.py', |
|
94 | 'vcs/tests/test_utils_filesize.py', | |
95 | 'vcs/tests/test_cli.py']), |
|
95 | 'vcs/tests/test_cli.py']), | |
96 | ('owner:michał test', 0, []), |
|
96 | ('owner:michał test', 0, []), | |
97 | ]) |
|
97 | ]) | |
98 | def test_search_files(self, query, expected_hits, expected_paths): |
|
98 | def test_search_files(self, query, expected_hits, expected_paths): | |
99 | self.log_user() |
|
99 | self.log_user() | |
100 | response = self.app.get(route_path('search'), |
|
100 | response = self.app.get(route_path('search'), | |
101 | {'q': query, 'type': 'content', 'page_limit': 500}) |
|
101 | {'q': query, 'type': 'content', 'page_limit': 500}) | |
102 |
|
102 | |||
103 | response.mustcontain('%s results' % expected_hits) |
|
103 | response.mustcontain('%s results' % expected_hits) | |
104 | for path in expected_paths: |
|
104 | for path in expected_paths: | |
105 | response.mustcontain(path) |
|
105 | response.mustcontain(path) | |
106 |
|
106 | |||
107 | @pytest.mark.parametrize("query, expected_hits, expected_commits", [ |
|
107 | @pytest.mark.parametrize("query, expected_hits, expected_commits", [ | |
108 | ('bother to ask where to fetch repo during tests', 3, [ |
|
108 | ('bother to ask where to fetch repo during tests', 3, [ | |
109 | ('hg', 'a00c1b6f5d7a6ae678fd553a8b81d92367f7ecf1'), |
|
109 | ('hg', 'a00c1b6f5d7a6ae678fd553a8b81d92367f7ecf1'), | |
110 | ('git', 'c6eb379775c578a95dad8ddab53f963b80894850'), |
|
110 | ('git', 'c6eb379775c578a95dad8ddab53f963b80894850'), | |
111 | ('svn', '98')]), |
|
111 | ('svn', '98')]), | |
112 | ('michał', 0, []), |
|
112 | ('michał', 0, []), | |
113 | ('changed:tests/utils.py', 36, [ |
|
113 | ('changed:tests/utils.py', 36, [ | |
114 | ('hg', 'a00c1b6f5d7a6ae678fd553a8b81d92367f7ecf1')]), |
|
114 | ('hg', 'a00c1b6f5d7a6ae678fd553a8b81d92367f7ecf1')]), | |
115 | ('changed:vcs/utils/archivers.py', 11, [ |
|
115 | ('changed:vcs/utils/archivers.py', 11, [ | |
116 | ('hg', '25213a5fbb048dff8ba65d21e466a835536e5b70'), |
|
116 | ('hg', '25213a5fbb048dff8ba65d21e466a835536e5b70'), | |
117 | ('hg', '47aedd538bf616eedcb0e7d630ea476df0e159c7'), |
|
117 | ('hg', '47aedd538bf616eedcb0e7d630ea476df0e159c7'), | |
118 | ('hg', 'f5d23247fad4856a1dabd5838afade1e0eed24fb'), |
|
118 | ('hg', 'f5d23247fad4856a1dabd5838afade1e0eed24fb'), | |
119 | ('hg', '04ad456aefd6461aea24f90b63954b6b1ce07b3e'), |
|
119 | ('hg', '04ad456aefd6461aea24f90b63954b6b1ce07b3e'), | |
120 | ('git', 'c994f0de03b2a0aa848a04fc2c0d7e737dba31fc'), |
|
120 | ('git', 'c994f0de03b2a0aa848a04fc2c0d7e737dba31fc'), | |
121 | ('git', 'd1f898326327e20524fe22417c22d71064fe54a1'), |
|
121 | ('git', 'd1f898326327e20524fe22417c22d71064fe54a1'), | |
122 | ('git', 'fe568b4081755c12abf6ba673ba777fc02a415f3'), |
|
122 | ('git', 'fe568b4081755c12abf6ba673ba777fc02a415f3'), | |
123 | ('git', 'bafe786f0d8c2ff7da5c1dcfcfa577de0b5e92f1')]), |
|
123 | ('git', 'bafe786f0d8c2ff7da5c1dcfcfa577de0b5e92f1')]), | |
124 | ('added:README.rst', 3, [ |
|
124 | ('added:README.rst', 3, [ | |
125 | ('hg', '3803844fdbd3b711175fc3da9bdacfcd6d29a6fb'), |
|
125 | ('hg', '3803844fdbd3b711175fc3da9bdacfcd6d29a6fb'), | |
126 | ('git', 'ff7ca51e58c505fec0dd2491de52c622bb7a806b'), |
|
126 | ('git', 'ff7ca51e58c505fec0dd2491de52c622bb7a806b'), | |
127 | ('svn', '8')]), |
|
127 | ('svn', '8')]), | |
128 | ('changed:lazy.py', 15, [ |
|
128 | ('changed:lazy.py', 15, [ | |
129 | ('hg', 'eaa291c5e6ae6126a203059de9854ccf7b5baa12'), |
|
129 | ('hg', 'eaa291c5e6ae6126a203059de9854ccf7b5baa12'), | |
130 | ('git', '17438a11f72b93f56d0e08e7d1fa79a378578a82'), |
|
130 | ('git', '17438a11f72b93f56d0e08e7d1fa79a378578a82'), | |
131 | ('svn', '82'), |
|
131 | ('svn', '82'), | |
132 | ('svn', '262'), |
|
132 | ('svn', '262'), | |
133 | ('hg', 'f5d23247fad4856a1dabd5838afade1e0eed24fb'), |
|
133 | ('hg', 'f5d23247fad4856a1dabd5838afade1e0eed24fb'), | |
134 | ('git', '33fa3223355104431402a888fa77a4e9956feb3e') |
|
134 | ('git', '33fa3223355104431402a888fa77a4e9956feb3e') | |
135 | ]), |
|
135 | ]), | |
136 | ('author:marcin@python-blog.com ' |
|
136 | ('author:marcin@python-blog.com ' | |
137 | 'commit_id:b986218ba1c9b0d6a259fac9b050b1724ed8e545', 1, [ |
|
137 | 'commit_id:b986218ba1c9b0d6a259fac9b050b1724ed8e545', 1, [ | |
138 | ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]), |
|
138 | ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]), | |
139 | ('b986218ba1c9b0d6a259fac9b050b1724ed8e545', 1, [ |
|
139 | ('b986218ba1c9b0d6a259fac9b050b1724ed8e545', 1, [ | |
140 | ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]), |
|
140 | ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]), | |
141 | ('b986218b', 1, [ |
|
141 | ('b986218b', 1, [ | |
142 | ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]), |
|
142 | ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]), | |
143 | ]) |
|
143 | ]) | |
144 | def test_search_commit_messages( |
|
144 | def test_search_commit_messages( | |
145 | self, query, expected_hits, expected_commits, enabled_backends): |
|
145 | self, query, expected_hits, expected_commits, enabled_backends): | |
146 | self.log_user() |
|
146 | self.log_user() | |
147 | response = self.app.get(route_path('search'), |
|
147 | response = self.app.get(route_path('search'), | |
148 | {'q': query, 'type': 'commit', 'page_limit': 500}) |
|
148 | {'q': query, 'type': 'commit', 'page_limit': 500}) | |
149 |
|
149 | |||
150 | response.mustcontain('%s results' % expected_hits) |
|
150 | response.mustcontain('%s results' % expected_hits) | |
151 | for backend, commit_id in expected_commits: |
|
151 | for backend, commit_id in expected_commits: | |
152 | if backend in enabled_backends: |
|
152 | if backend in enabled_backends: | |
153 | response.mustcontain(commit_id) |
|
153 | response.mustcontain(commit_id) | |
154 |
|
154 | |||
155 | @pytest.mark.parametrize("query, expected_hits, expected_paths", [ |
|
155 | @pytest.mark.parametrize("query, expected_hits, expected_paths", [ | |
156 | ('readme.rst', 3, []), |
|
156 | ('readme.rst', 3, []), | |
157 | ('test*', 75, []), |
|
157 | ('test*', 75, []), | |
158 | ('*model*', 1, []), |
|
158 | ('*model*', 1, []), | |
159 | ('extension:rst', 48, []), |
|
159 | ('extension:rst', 48, []), | |
160 | ('extension:rst api', 24, []), |
|
160 | ('extension:rst api', 24, []), | |
161 | ]) |
|
161 | ]) | |
162 | def test_search_file_paths(self, query, expected_hits, expected_paths): |
|
162 | def test_search_file_paths(self, query, expected_hits, expected_paths): | |
163 | self.log_user() |
|
163 | self.log_user() | |
164 | response = self.app.get(route_path('search'), |
|
164 | response = self.app.get(route_path('search'), | |
165 | {'q': query, 'type': 'path', 'page_limit': 500}) |
|
165 | {'q': query, 'type': 'path', 'page_limit': 500}) | |
166 |
|
166 | |||
167 | response.mustcontain('%s results' % expected_hits) |
|
167 | response.mustcontain('%s results' % expected_hits) | |
168 | for path in expected_paths: |
|
168 | for path in expected_paths: | |
169 | response.mustcontain(path) |
|
169 | response.mustcontain(path) | |
170 |
|
170 | |||
171 | def test_search_commit_message_specific_repo(self, backend): |
|
171 | def test_search_commit_message_specific_repo(self, backend): | |
172 | self.log_user() |
|
172 | self.log_user() | |
173 | response = self.app.get( |
|
173 | response = self.app.get( | |
174 | route_path('search_repo',repo_name=backend.repo_name), |
|
174 | route_path('search_repo',repo_name=backend.repo_name), | |
175 | {'q': 'bother to ask where to fetch repo during tests', |
|
175 | {'q': 'bother to ask where to fetch repo during tests', | |
176 | 'type': 'commit'}) |
|
176 | 'type': 'commit'}) | |
177 |
|
177 | |||
178 | response.mustcontain('1 results') |
|
178 | response.mustcontain('1 results') | |
179 |
|
179 | |||
180 | def test_filters_are_not_applied_for_admin_user(self): |
|
180 | def test_filters_are_not_applied_for_admin_user(self): | |
181 | self.log_user() |
|
181 | self.log_user() | |
182 | with mock.patch('whoosh.searching.Searcher.search') as search_mock: |
|
182 | with mock.patch('whoosh.searching.Searcher.search') as search_mock: | |
183 | self.app.get(route_path('search'), |
|
183 | self.app.get(route_path('search'), | |
184 | {'q': 'test query', 'type': 'commit'}) |
|
184 | {'q': 'test query', 'type': 'commit'}) | |
185 | assert search_mock.call_count == 1 |
|
185 | assert search_mock.call_count == 1 | |
186 | _, kwargs = search_mock.call_args |
|
186 | _, kwargs = search_mock.call_args | |
187 | assert kwargs['filter'] is None |
|
187 | assert kwargs['filter'] is None | |
188 |
|
188 | |||
189 | def test_filters_are_applied_for_normal_user(self, enabled_backends): |
|
189 | def test_filters_are_applied_for_normal_user(self, enabled_backends): | |
190 | self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) |
|
190 | self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) | |
191 | with mock.patch('whoosh.searching.Searcher.search') as search_mock: |
|
191 | with mock.patch('whoosh.searching.Searcher.search') as search_mock: | |
192 | self.app.get(route_path('search'), |
|
192 | self.app.get(route_path('search'), | |
193 | {'q': 'test query', 'type': 'commit'}) |
|
193 | {'q': 'test query', 'type': 'commit'}) | |
194 | assert search_mock.call_count == 1 |
|
194 | assert search_mock.call_count == 1 | |
195 | _, kwargs = search_mock.call_args |
|
195 | _, kwargs = search_mock.call_args | |
196 | assert isinstance(kwargs['filter'], query.Or) |
|
196 | assert isinstance(kwargs['filter'], query.Or) | |
197 | expected_repositories = [ |
|
197 | expected_repositories = [ | |
198 | 'vcs_test_{}'.format(b) for b in enabled_backends] |
|
198 | 'vcs_test_{}'.format(b) for b in enabled_backends] | |
199 | queried_repositories = [ |
|
199 | queried_repositories = [ | |
200 | name for type_, name in kwargs['filter'].all_terms()] |
|
200 | name for type_, name in kwargs['filter'].all_terms()] | |
201 | for repository in expected_repositories: |
|
201 | for repository in expected_repositories: | |
202 | assert repository in queried_repositories |
|
202 | assert repository in queried_repositories |
@@ -1,75 +1,75 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import pytest |
|
21 | import pytest | |
22 |
|
22 | |||
23 | from rhodecode.model.db import User |
|
23 | from rhodecode.model.db import User | |
24 | from rhodecode.tests import ( |
|
24 | from rhodecode.tests import ( | |
25 | TestController, TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS, |
|
25 | TestController, TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS, | |
26 | TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) |
|
26 | TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) | |
27 | from rhodecode.tests.fixture import Fixture |
|
27 | from rhodecode.tests.fixture import Fixture | |
28 | from rhodecode.tests.utils import AssertResponse |
|
28 | from rhodecode.tests.utils import AssertResponse | |
29 |
|
29 | |||
30 | fixture = Fixture() |
|
30 | fixture = Fixture() | |
31 |
|
31 | |||
32 |
|
32 | |||
33 | def route_path(name, **kwargs): |
|
33 | def route_path(name, **kwargs): | |
34 | return '/_profiles/{username}'.format(**kwargs) |
|
34 | return '/_profiles/{username}'.format(**kwargs) | |
35 |
|
35 | |||
36 |
|
36 | |||
37 | class TestUsersController(TestController): |
|
37 | class TestUsersController(TestController): | |
38 |
|
38 | |||
39 | def test_user_profile(self, user_util): |
|
39 | def test_user_profile(self, user_util): | |
40 | edit_link_css = '.user-profile .panel-edit' |
|
40 | edit_link_css = '.user-profile .panel-edit' | |
41 | self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) |
|
41 | self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS) | |
42 | user = user_util.create_user( |
|
42 | user = user_util.create_user( | |
43 | 'test-my-user', password='qweqwe', email='testme@rhodecode.org') |
|
43 | 'test-my-user', password='qweqwe', email='testme@rhodecode.org') | |
44 | username = user.username |
|
44 | username = user.username | |
45 |
|
45 | |||
46 | response = self.app.get(route_path('user_profile', username=username)) |
|
46 | response = self.app.get(route_path('user_profile', username=username)) | |
47 | response.mustcontain('testme') |
|
47 | response.mustcontain('testme') | |
48 | response.mustcontain('testme@rhodecode.org') |
|
48 | response.mustcontain('testme@rhodecode.org') | |
49 |
assert_response = |
|
49 | assert_response = response.assert_response() | |
50 | assert_response.no_element_exists(edit_link_css) |
|
50 | assert_response.no_element_exists(edit_link_css) | |
51 |
|
51 | |||
52 | # edit should be available to superadmin users |
|
52 | # edit should be available to superadmin users | |
53 | self.logout_user() |
|
53 | self.logout_user() | |
54 | self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS) |
|
54 | self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS) | |
55 | response = self.app.get(route_path('user_profile', username=username)) |
|
55 | response = self.app.get(route_path('user_profile', username=username)) | |
56 |
assert_response = |
|
56 | assert_response = response.assert_response() | |
57 | assert_response.element_contains(edit_link_css, 'Edit') |
|
57 | assert_response.element_contains(edit_link_css, 'Edit') | |
58 |
|
58 | |||
59 | def test_user_profile_not_available(self, user_util): |
|
59 | def test_user_profile_not_available(self, user_util): | |
60 | user = user_util.create_user() |
|
60 | user = user_util.create_user() | |
61 | username = user.username |
|
61 | username = user.username | |
62 |
|
62 | |||
63 | # not logged in, redirect |
|
63 | # not logged in, redirect | |
64 | self.app.get(route_path('user_profile', username=username), status=302) |
|
64 | self.app.get(route_path('user_profile', username=username), status=302) | |
65 |
|
65 | |||
66 | self.log_user() |
|
66 | self.log_user() | |
67 | # after log-in show |
|
67 | # after log-in show | |
68 | self.app.get(route_path('user_profile', username=username), status=200) |
|
68 | self.app.get(route_path('user_profile', username=username), status=200) | |
69 |
|
69 | |||
70 | # default user, not allowed to show it |
|
70 | # default user, not allowed to show it | |
71 | self.app.get( |
|
71 | self.app.get( | |
72 | route_path('user_profile', username=User.DEFAULT_USER), status=404) |
|
72 | route_path('user_profile', username=User.DEFAULT_USER), status=404) | |
73 |
|
73 | |||
74 | # actual 404 |
|
74 | # actual 404 | |
75 | self.app.get(route_path('user_profile', username='unknown'), status=404) |
|
75 | self.app.get(route_path('user_profile', username='unknown'), status=404) |
1 | NO CONTENT: modified file |
|
NO CONTENT: modified file | ||
The requested commit or file is too big and content was truncated. Show full diff |
@@ -1,946 +1,945 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | """ |
|
21 | """ | |
22 | users model for RhodeCode |
|
22 | users model for RhodeCode | |
23 | """ |
|
23 | """ | |
24 |
|
24 | |||
25 | import logging |
|
25 | import logging | |
26 | import traceback |
|
26 | import traceback | |
27 | import datetime |
|
27 | import datetime | |
28 | import ipaddress |
|
28 | import ipaddress | |
29 |
|
29 | |||
30 | from pyramid.threadlocal import get_current_request |
|
30 | from pyramid.threadlocal import get_current_request | |
31 | from sqlalchemy.exc import DatabaseError |
|
31 | from sqlalchemy.exc import DatabaseError | |
32 |
|
32 | |||
33 | from rhodecode import events |
|
33 | from rhodecode import events | |
34 | from rhodecode.lib.user_log_filter import user_log_filter |
|
34 | from rhodecode.lib.user_log_filter import user_log_filter | |
35 | from rhodecode.lib.utils2 import ( |
|
35 | from rhodecode.lib.utils2 import ( | |
36 | safe_unicode, get_current_rhodecode_user, action_logger_generic, |
|
36 | safe_unicode, get_current_rhodecode_user, action_logger_generic, | |
37 | AttributeDict, str2bool) |
|
37 | AttributeDict, str2bool) | |
38 | from rhodecode.lib.exceptions import ( |
|
38 | from rhodecode.lib.exceptions import ( | |
39 | DefaultUserException, UserOwnsReposException, UserOwnsRepoGroupsException, |
|
39 | DefaultUserException, UserOwnsReposException, UserOwnsRepoGroupsException, | |
40 | UserOwnsUserGroupsException, NotAllowedToCreateUserError) |
|
40 | UserOwnsUserGroupsException, NotAllowedToCreateUserError) | |
41 | from rhodecode.lib.caching_query import FromCache |
|
41 | from rhodecode.lib.caching_query import FromCache | |
42 | from rhodecode.model import BaseModel |
|
42 | from rhodecode.model import BaseModel | |
43 | from rhodecode.model.auth_token import AuthTokenModel |
|
43 | from rhodecode.model.auth_token import AuthTokenModel | |
44 | from rhodecode.model.db import ( |
|
44 | from rhodecode.model.db import ( | |
45 | _hash_key, true, false, or_, joinedload, User, UserToPerm, |
|
45 | _hash_key, true, false, or_, joinedload, User, UserToPerm, | |
46 | UserEmailMap, UserIpMap, UserLog) |
|
46 | UserEmailMap, UserIpMap, UserLog) | |
47 | from rhodecode.model.meta import Session |
|
47 | from rhodecode.model.meta import Session | |
48 | from rhodecode.model.repo_group import RepoGroupModel |
|
48 | from rhodecode.model.repo_group import RepoGroupModel | |
49 |
|
49 | |||
50 |
|
50 | |||
51 | log = logging.getLogger(__name__) |
|
51 | log = logging.getLogger(__name__) | |
52 |
|
52 | |||
53 |
|
53 | |||
54 | class UserModel(BaseModel): |
|
54 | class UserModel(BaseModel): | |
55 | cls = User |
|
55 | cls = User | |
56 |
|
56 | |||
57 | def get(self, user_id, cache=False): |
|
57 | def get(self, user_id, cache=False): | |
58 | user = self.sa.query(User) |
|
58 | user = self.sa.query(User) | |
59 | if cache: |
|
59 | if cache: | |
60 | user = user.options( |
|
60 | user = user.options( | |
61 | FromCache("sql_cache_short", "get_user_%s" % user_id)) |
|
61 | FromCache("sql_cache_short", "get_user_%s" % user_id)) | |
62 | return user.get(user_id) |
|
62 | return user.get(user_id) | |
63 |
|
63 | |||
64 | def get_user(self, user): |
|
64 | def get_user(self, user): | |
65 | return self._get_user(user) |
|
65 | return self._get_user(user) | |
66 |
|
66 | |||
67 | def _serialize_user(self, user): |
|
67 | def _serialize_user(self, user): | |
68 | import rhodecode.lib.helpers as h |
|
68 | import rhodecode.lib.helpers as h | |
69 |
|
69 | |||
70 | return { |
|
70 | return { | |
71 | 'id': user.user_id, |
|
71 | 'id': user.user_id, | |
72 | 'first_name': user.first_name, |
|
72 | 'first_name': user.first_name, | |
73 | 'last_name': user.last_name, |
|
73 | 'last_name': user.last_name, | |
74 | 'username': user.username, |
|
74 | 'username': user.username, | |
75 | 'email': user.email, |
|
75 | 'email': user.email, | |
76 | 'icon_link': h.gravatar_url(user.email, 30), |
|
76 | 'icon_link': h.gravatar_url(user.email, 30), | |
77 | 'profile_link': h.link_to_user(user), |
|
77 | 'profile_link': h.link_to_user(user), | |
78 | 'value_display': h.escape(h.person(user)), |
|
78 | 'value_display': h.escape(h.person(user)), | |
79 | 'value': user.username, |
|
79 | 'value': user.username, | |
80 | 'value_type': 'user', |
|
80 | 'value_type': 'user', | |
81 | 'active': user.active, |
|
81 | 'active': user.active, | |
82 | } |
|
82 | } | |
83 |
|
83 | |||
84 | def get_users(self, name_contains=None, limit=20, only_active=True): |
|
84 | def get_users(self, name_contains=None, limit=20, only_active=True): | |
85 |
|
85 | |||
86 | query = self.sa.query(User) |
|
86 | query = self.sa.query(User) | |
87 | if only_active: |
|
87 | if only_active: | |
88 | query = query.filter(User.active == true()) |
|
88 | query = query.filter(User.active == true()) | |
89 |
|
89 | |||
90 | if name_contains: |
|
90 | if name_contains: | |
91 | ilike_expression = u'%{}%'.format(safe_unicode(name_contains)) |
|
91 | ilike_expression = u'%{}%'.format(safe_unicode(name_contains)) | |
92 | query = query.filter( |
|
92 | query = query.filter( | |
93 | or_( |
|
93 | or_( | |
94 | User.name.ilike(ilike_expression), |
|
94 | User.name.ilike(ilike_expression), | |
95 | User.lastname.ilike(ilike_expression), |
|
95 | User.lastname.ilike(ilike_expression), | |
96 | User.username.ilike(ilike_expression) |
|
96 | User.username.ilike(ilike_expression) | |
97 | ) |
|
97 | ) | |
98 | ) |
|
98 | ) | |
99 | query = query.limit(limit) |
|
99 | query = query.limit(limit) | |
100 | users = query.all() |
|
100 | users = query.all() | |
101 |
|
101 | |||
102 | _users = [ |
|
102 | _users = [ | |
103 | self._serialize_user(user) for user in users |
|
103 | self._serialize_user(user) for user in users | |
104 | ] |
|
104 | ] | |
105 | return _users |
|
105 | return _users | |
106 |
|
106 | |||
107 | def get_by_username(self, username, cache=False, case_insensitive=False): |
|
107 | def get_by_username(self, username, cache=False, case_insensitive=False): | |
108 |
|
108 | |||
109 | if case_insensitive: |
|
109 | if case_insensitive: | |
110 | user = self.sa.query(User).filter(User.username.ilike(username)) |
|
110 | user = self.sa.query(User).filter(User.username.ilike(username)) | |
111 | else: |
|
111 | else: | |
112 | user = self.sa.query(User)\ |
|
112 | user = self.sa.query(User)\ | |
113 | .filter(User.username == username) |
|
113 | .filter(User.username == username) | |
114 | if cache: |
|
114 | if cache: | |
115 | name_key = _hash_key(username) |
|
115 | name_key = _hash_key(username) | |
116 | user = user.options( |
|
116 | user = user.options( | |
117 | FromCache("sql_cache_short", "get_user_%s" % name_key)) |
|
117 | FromCache("sql_cache_short", "get_user_%s" % name_key)) | |
118 | return user.scalar() |
|
118 | return user.scalar() | |
119 |
|
119 | |||
120 | def get_by_email(self, email, cache=False, case_insensitive=False): |
|
120 | def get_by_email(self, email, cache=False, case_insensitive=False): | |
121 | return User.get_by_email(email, case_insensitive, cache) |
|
121 | return User.get_by_email(email, case_insensitive, cache) | |
122 |
|
122 | |||
123 | def get_by_auth_token(self, auth_token, cache=False): |
|
123 | def get_by_auth_token(self, auth_token, cache=False): | |
124 | return User.get_by_auth_token(auth_token, cache) |
|
124 | return User.get_by_auth_token(auth_token, cache) | |
125 |
|
125 | |||
126 | def get_active_user_count(self, cache=False): |
|
126 | def get_active_user_count(self, cache=False): | |
127 | qry = User.query().filter( |
|
127 | qry = User.query().filter( | |
128 | User.active == true()).filter( |
|
128 | User.active == true()).filter( | |
129 | User.username != User.DEFAULT_USER) |
|
129 | User.username != User.DEFAULT_USER) | |
130 | if cache: |
|
130 | if cache: | |
131 | qry = qry.options( |
|
131 | qry = qry.options( | |
132 | FromCache("sql_cache_short", "get_active_users")) |
|
132 | FromCache("sql_cache_short", "get_active_users")) | |
133 | return qry.count() |
|
133 | return qry.count() | |
134 |
|
134 | |||
135 | def create(self, form_data, cur_user=None): |
|
135 | def create(self, form_data, cur_user=None): | |
136 | if not cur_user: |
|
136 | if not cur_user: | |
137 | cur_user = getattr(get_current_rhodecode_user(), 'username', None) |
|
137 | cur_user = getattr(get_current_rhodecode_user(), 'username', None) | |
138 |
|
138 | |||
139 | user_data = { |
|
139 | user_data = { | |
140 | 'username': form_data['username'], |
|
140 | 'username': form_data['username'], | |
141 | 'password': form_data['password'], |
|
141 | 'password': form_data['password'], | |
142 | 'email': form_data['email'], |
|
142 | 'email': form_data['email'], | |
143 | 'firstname': form_data['firstname'], |
|
143 | 'firstname': form_data['firstname'], | |
144 | 'lastname': form_data['lastname'], |
|
144 | 'lastname': form_data['lastname'], | |
145 | 'active': form_data['active'], |
|
145 | 'active': form_data['active'], | |
146 | 'extern_type': form_data['extern_type'], |
|
146 | 'extern_type': form_data['extern_type'], | |
147 | 'extern_name': form_data['extern_name'], |
|
147 | 'extern_name': form_data['extern_name'], | |
148 | 'admin': False, |
|
148 | 'admin': False, | |
149 | 'cur_user': cur_user |
|
149 | 'cur_user': cur_user | |
150 | } |
|
150 | } | |
151 |
|
151 | |||
152 | if 'create_repo_group' in form_data: |
|
152 | if 'create_repo_group' in form_data: | |
153 | user_data['create_repo_group'] = str2bool( |
|
153 | user_data['create_repo_group'] = str2bool( | |
154 | form_data.get('create_repo_group')) |
|
154 | form_data.get('create_repo_group')) | |
155 |
|
155 | |||
156 | try: |
|
156 | try: | |
157 | if form_data.get('password_change'): |
|
157 | if form_data.get('password_change'): | |
158 | user_data['force_password_change'] = True |
|
158 | user_data['force_password_change'] = True | |
159 | return UserModel().create_or_update(**user_data) |
|
159 | return UserModel().create_or_update(**user_data) | |
160 | except Exception: |
|
160 | except Exception: | |
161 | log.error(traceback.format_exc()) |
|
161 | log.error(traceback.format_exc()) | |
162 | raise |
|
162 | raise | |
163 |
|
163 | |||
164 | def update_user(self, user, skip_attrs=None, **kwargs): |
|
164 | def update_user(self, user, skip_attrs=None, **kwargs): | |
165 | from rhodecode.lib.auth import get_crypt_password |
|
165 | from rhodecode.lib.auth import get_crypt_password | |
166 |
|
166 | |||
167 | user = self._get_user(user) |
|
167 | user = self._get_user(user) | |
168 | if user.username == User.DEFAULT_USER: |
|
168 | if user.username == User.DEFAULT_USER: | |
169 | raise DefaultUserException( |
|
169 | raise DefaultUserException( | |
170 | "You can't edit this user (`%(username)s`) since it's " |
|
170 | "You can't edit this user (`%(username)s`) since it's " | |
171 | "crucial for entire application" % { |
|
171 | "crucial for entire application" % { | |
172 | 'username': user.username}) |
|
172 | 'username': user.username}) | |
173 |
|
173 | |||
174 | # first store only defaults |
|
174 | # first store only defaults | |
175 | user_attrs = { |
|
175 | user_attrs = { | |
176 | 'updating_user_id': user.user_id, |
|
176 | 'updating_user_id': user.user_id, | |
177 | 'username': user.username, |
|
177 | 'username': user.username, | |
178 | 'password': user.password, |
|
178 | 'password': user.password, | |
179 | 'email': user.email, |
|
179 | 'email': user.email, | |
180 | 'firstname': user.name, |
|
180 | 'firstname': user.name, | |
181 | 'lastname': user.lastname, |
|
181 | 'lastname': user.lastname, | |
182 | 'active': user.active, |
|
182 | 'active': user.active, | |
183 | 'admin': user.admin, |
|
183 | 'admin': user.admin, | |
184 | 'extern_name': user.extern_name, |
|
184 | 'extern_name': user.extern_name, | |
185 | 'extern_type': user.extern_type, |
|
185 | 'extern_type': user.extern_type, | |
186 | 'language': user.user_data.get('language') |
|
186 | 'language': user.user_data.get('language') | |
187 | } |
|
187 | } | |
188 |
|
188 | |||
189 | # in case there's new_password, that comes from form, use it to |
|
189 | # in case there's new_password, that comes from form, use it to | |
190 | # store password |
|
190 | # store password | |
191 | if kwargs.get('new_password'): |
|
191 | if kwargs.get('new_password'): | |
192 | kwargs['password'] = kwargs['new_password'] |
|
192 | kwargs['password'] = kwargs['new_password'] | |
193 |
|
193 | |||
194 | # cleanups, my_account password change form |
|
194 | # cleanups, my_account password change form | |
195 | kwargs.pop('current_password', None) |
|
195 | kwargs.pop('current_password', None) | |
196 | kwargs.pop('new_password', None) |
|
196 | kwargs.pop('new_password', None) | |
197 |
|
197 | |||
198 | # cleanups, user edit password change form |
|
198 | # cleanups, user edit password change form | |
199 | kwargs.pop('password_confirmation', None) |
|
199 | kwargs.pop('password_confirmation', None) | |
200 | kwargs.pop('password_change', None) |
|
200 | kwargs.pop('password_change', None) | |
201 |
|
201 | |||
202 | # create repo group on user creation |
|
202 | # create repo group on user creation | |
203 | kwargs.pop('create_repo_group', None) |
|
203 | kwargs.pop('create_repo_group', None) | |
204 |
|
204 | |||
205 | # legacy forms send name, which is the firstname |
|
205 | # legacy forms send name, which is the firstname | |
206 | firstname = kwargs.pop('name', None) |
|
206 | firstname = kwargs.pop('name', None) | |
207 | if firstname: |
|
207 | if firstname: | |
208 | kwargs['firstname'] = firstname |
|
208 | kwargs['firstname'] = firstname | |
209 |
|
209 | |||
210 | for k, v in kwargs.items(): |
|
210 | for k, v in kwargs.items(): | |
211 | # skip if we don't want to update this |
|
211 | # skip if we don't want to update this | |
212 | if skip_attrs and k in skip_attrs: |
|
212 | if skip_attrs and k in skip_attrs: | |
213 | continue |
|
213 | continue | |
214 |
|
214 | |||
215 | user_attrs[k] = v |
|
215 | user_attrs[k] = v | |
216 |
|
216 | |||
217 | try: |
|
217 | try: | |
218 | return self.create_or_update(**user_attrs) |
|
218 | return self.create_or_update(**user_attrs) | |
219 | except Exception: |
|
219 | except Exception: | |
220 | log.error(traceback.format_exc()) |
|
220 | log.error(traceback.format_exc()) | |
221 | raise |
|
221 | raise | |
222 |
|
222 | |||
223 | def create_or_update( |
|
223 | def create_or_update( | |
224 | self, username, password, email, firstname='', lastname='', |
|
224 | self, username, password, email, firstname='', lastname='', | |
225 | active=True, admin=False, extern_type=None, extern_name=None, |
|
225 | active=True, admin=False, extern_type=None, extern_name=None, | |
226 | cur_user=None, plugin=None, force_password_change=False, |
|
226 | cur_user=None, plugin=None, force_password_change=False, | |
227 | allow_to_create_user=True, create_repo_group=None, |
|
227 | allow_to_create_user=True, create_repo_group=None, | |
228 | updating_user_id=None, language=None, strict_creation_check=True): |
|
228 | updating_user_id=None, language=None, strict_creation_check=True): | |
229 | """ |
|
229 | """ | |
230 | Creates a new instance if not found, or updates current one |
|
230 | Creates a new instance if not found, or updates current one | |
231 |
|
231 | |||
232 | :param username: |
|
232 | :param username: | |
233 | :param password: |
|
233 | :param password: | |
234 | :param email: |
|
234 | :param email: | |
235 | :param firstname: |
|
235 | :param firstname: | |
236 | :param lastname: |
|
236 | :param lastname: | |
237 | :param active: |
|
237 | :param active: | |
238 | :param admin: |
|
238 | :param admin: | |
239 | :param extern_type: |
|
239 | :param extern_type: | |
240 | :param extern_name: |
|
240 | :param extern_name: | |
241 | :param cur_user: |
|
241 | :param cur_user: | |
242 | :param plugin: optional plugin this method was called from |
|
242 | :param plugin: optional plugin this method was called from | |
243 | :param force_password_change: toggles new or existing user flag |
|
243 | :param force_password_change: toggles new or existing user flag | |
244 | for password change |
|
244 | for password change | |
245 | :param allow_to_create_user: Defines if the method can actually create |
|
245 | :param allow_to_create_user: Defines if the method can actually create | |
246 | new users |
|
246 | new users | |
247 | :param create_repo_group: Defines if the method should also |
|
247 | :param create_repo_group: Defines if the method should also | |
248 | create an repo group with user name, and owner |
|
248 | create an repo group with user name, and owner | |
249 | :param updating_user_id: if we set it up this is the user we want to |
|
249 | :param updating_user_id: if we set it up this is the user we want to | |
250 | update this allows to editing username. |
|
250 | update this allows to editing username. | |
251 | :param language: language of user from interface. |
|
251 | :param language: language of user from interface. | |
252 |
|
252 | |||
253 | :returns: new User object with injected `is_new_user` attribute. |
|
253 | :returns: new User object with injected `is_new_user` attribute. | |
254 | """ |
|
254 | """ | |
255 |
|
255 | |||
256 | if not cur_user: |
|
256 | if not cur_user: | |
257 | cur_user = getattr(get_current_rhodecode_user(), 'username', None) |
|
257 | cur_user = getattr(get_current_rhodecode_user(), 'username', None) | |
258 |
|
258 | |||
259 | from rhodecode.lib.auth import ( |
|
259 | from rhodecode.lib.auth import ( | |
260 | get_crypt_password, check_password, generate_auth_token) |
|
260 | get_crypt_password, check_password, generate_auth_token) | |
261 | from rhodecode.lib.hooks_base import ( |
|
261 | from rhodecode.lib.hooks_base import ( | |
262 | log_create_user, check_allowed_create_user) |
|
262 | log_create_user, check_allowed_create_user) | |
263 |
|
263 | |||
264 | def _password_change(new_user, password): |
|
264 | def _password_change(new_user, password): | |
265 | old_password = new_user.password or '' |
|
265 | old_password = new_user.password or '' | |
266 | # empty password |
|
266 | # empty password | |
267 | if not old_password: |
|
267 | if not old_password: | |
268 | return False |
|
268 | return False | |
269 |
|
269 | |||
270 | # password check is only needed for RhodeCode internal auth calls |
|
270 | # password check is only needed for RhodeCode internal auth calls | |
271 | # in case it's a plugin we don't care |
|
271 | # in case it's a plugin we don't care | |
272 | if not plugin: |
|
272 | if not plugin: | |
273 |
|
273 | |||
274 | # first check if we gave crypted password back, and if it |
|
274 | # first check if we gave crypted password back, and if it | |
275 | # matches it's not password change |
|
275 | # matches it's not password change | |
276 | if new_user.password == password: |
|
276 | if new_user.password == password: | |
277 | return False |
|
277 | return False | |
278 |
|
278 | |||
279 | password_match = check_password(password, old_password) |
|
279 | password_match = check_password(password, old_password) | |
280 | if not password_match: |
|
280 | if not password_match: | |
281 | return True |
|
281 | return True | |
282 |
|
282 | |||
283 | return False |
|
283 | return False | |
284 |
|
284 | |||
285 | # read settings on default personal repo group creation |
|
285 | # read settings on default personal repo group creation | |
286 | if create_repo_group is None: |
|
286 | if create_repo_group is None: | |
287 | default_create_repo_group = RepoGroupModel()\ |
|
287 | default_create_repo_group = RepoGroupModel()\ | |
288 | .get_default_create_personal_repo_group() |
|
288 | .get_default_create_personal_repo_group() | |
289 | create_repo_group = default_create_repo_group |
|
289 | create_repo_group = default_create_repo_group | |
290 |
|
290 | |||
291 | user_data = { |
|
291 | user_data = { | |
292 | 'username': username, |
|
292 | 'username': username, | |
293 | 'password': password, |
|
293 | 'password': password, | |
294 | 'email': email, |
|
294 | 'email': email, | |
295 | 'firstname': firstname, |
|
295 | 'firstname': firstname, | |
296 | 'lastname': lastname, |
|
296 | 'lastname': lastname, | |
297 | 'active': active, |
|
297 | 'active': active, | |
298 | 'admin': admin |
|
298 | 'admin': admin | |
299 | } |
|
299 | } | |
300 |
|
300 | |||
301 | if updating_user_id: |
|
301 | if updating_user_id: | |
302 | log.debug('Checking for existing account in RhodeCode ' |
|
302 | log.debug('Checking for existing account in RhodeCode ' | |
303 | 'database with user_id `%s` ', updating_user_id) |
|
303 | 'database with user_id `%s` ', updating_user_id) | |
304 | user = User.get(updating_user_id) |
|
304 | user = User.get(updating_user_id) | |
305 | else: |
|
305 | else: | |
306 | log.debug('Checking for existing account in RhodeCode ' |
|
306 | log.debug('Checking for existing account in RhodeCode ' | |
307 | 'database with username `%s` ', username) |
|
307 | 'database with username `%s` ', username) | |
308 | user = User.get_by_username(username, case_insensitive=True) |
|
308 | user = User.get_by_username(username, case_insensitive=True) | |
309 |
|
309 | |||
310 | if user is None: |
|
310 | if user is None: | |
311 | # we check internal flag if this method is actually allowed to |
|
311 | # we check internal flag if this method is actually allowed to | |
312 | # create new user |
|
312 | # create new user | |
313 | if not allow_to_create_user: |
|
313 | if not allow_to_create_user: | |
314 | msg = ('Method wants to create new user, but it is not ' |
|
314 | msg = ('Method wants to create new user, but it is not ' | |
315 | 'allowed to do so') |
|
315 | 'allowed to do so') | |
316 | log.warning(msg) |
|
316 | log.warning(msg) | |
317 | raise NotAllowedToCreateUserError(msg) |
|
317 | raise NotAllowedToCreateUserError(msg) | |
318 |
|
318 | |||
319 | log.debug('Creating new user %s', username) |
|
319 | log.debug('Creating new user %s', username) | |
320 |
|
320 | |||
321 | # only if we create user that is active |
|
321 | # only if we create user that is active | |
322 | new_active_user = active |
|
322 | new_active_user = active | |
323 | if new_active_user and strict_creation_check: |
|
323 | if new_active_user and strict_creation_check: | |
324 | # raises UserCreationError if it's not allowed for any reason to |
|
324 | # raises UserCreationError if it's not allowed for any reason to | |
325 | # create new active user, this also executes pre-create hooks |
|
325 | # create new active user, this also executes pre-create hooks | |
326 | check_allowed_create_user(user_data, cur_user, strict_check=True) |
|
326 | check_allowed_create_user(user_data, cur_user, strict_check=True) | |
327 | events.trigger(events.UserPreCreate(user_data)) |
|
327 | events.trigger(events.UserPreCreate(user_data)) | |
328 | new_user = User() |
|
328 | new_user = User() | |
329 | edit = False |
|
329 | edit = False | |
330 | else: |
|
330 | else: | |
331 | log.debug('updating user `%s`', username) |
|
331 | log.debug('updating user `%s`', username) | |
332 | events.trigger(events.UserPreUpdate(user, user_data)) |
|
332 | events.trigger(events.UserPreUpdate(user, user_data)) | |
333 | new_user = user |
|
333 | new_user = user | |
334 | edit = True |
|
334 | edit = True | |
335 |
|
335 | |||
336 | # we're not allowed to edit default user |
|
336 | # we're not allowed to edit default user | |
337 | if user.username == User.DEFAULT_USER: |
|
337 | if user.username == User.DEFAULT_USER: | |
338 | raise DefaultUserException( |
|
338 | raise DefaultUserException( | |
339 | "You can't edit this user (`%(username)s`) since it's " |
|
339 | "You can't edit this user (`%(username)s`) since it's " | |
340 | "crucial for entire application" |
|
340 | "crucial for entire application" | |
341 | % {'username': user.username}) |
|
341 | % {'username': user.username}) | |
342 |
|
342 | |||
343 | # inject special attribute that will tell us if User is new or old |
|
343 | # inject special attribute that will tell us if User is new or old | |
344 | new_user.is_new_user = not edit |
|
344 | new_user.is_new_user = not edit | |
345 | # for users that didn's specify auth type, we use RhodeCode built in |
|
345 | # for users that didn's specify auth type, we use RhodeCode built in | |
346 | from rhodecode.authentication.plugins import auth_rhodecode |
|
346 | from rhodecode.authentication.plugins import auth_rhodecode | |
347 | extern_name = extern_name or auth_rhodecode.RhodeCodeAuthPlugin.uid |
|
347 | extern_name = extern_name or auth_rhodecode.RhodeCodeAuthPlugin.uid | |
348 | extern_type = extern_type or auth_rhodecode.RhodeCodeAuthPlugin.uid |
|
348 | extern_type = extern_type or auth_rhodecode.RhodeCodeAuthPlugin.uid | |
349 |
|
349 | |||
350 | try: |
|
350 | try: | |
351 | new_user.username = username |
|
351 | new_user.username = username | |
352 | new_user.admin = admin |
|
352 | new_user.admin = admin | |
353 | new_user.email = email |
|
353 | new_user.email = email | |
354 | new_user.active = active |
|
354 | new_user.active = active | |
355 | new_user.extern_name = safe_unicode(extern_name) |
|
355 | new_user.extern_name = safe_unicode(extern_name) | |
356 | new_user.extern_type = safe_unicode(extern_type) |
|
356 | new_user.extern_type = safe_unicode(extern_type) | |
357 | new_user.name = firstname |
|
357 | new_user.name = firstname | |
358 | new_user.lastname = lastname |
|
358 | new_user.lastname = lastname | |
359 |
|
359 | |||
360 | # set password only if creating an user or password is changed |
|
360 | # set password only if creating an user or password is changed | |
361 | if not edit or _password_change(new_user, password): |
|
361 | if not edit or _password_change(new_user, password): | |
362 | reason = 'new password' if edit else 'new user' |
|
362 | reason = 'new password' if edit else 'new user' | |
363 | log.debug('Updating password reason=>%s', reason) |
|
363 | log.debug('Updating password reason=>%s', reason) | |
364 | new_user.password = get_crypt_password(password) if password else None |
|
364 | new_user.password = get_crypt_password(password) if password else None | |
365 |
|
365 | |||
366 | if force_password_change: |
|
366 | if force_password_change: | |
367 | new_user.update_userdata(force_password_change=True) |
|
367 | new_user.update_userdata(force_password_change=True) | |
368 | if language: |
|
368 | if language: | |
369 | new_user.update_userdata(language=language) |
|
369 | new_user.update_userdata(language=language) | |
370 | new_user.update_userdata(notification_status=True) |
|
370 | new_user.update_userdata(notification_status=True) | |
371 |
|
371 | |||
372 | self.sa.add(new_user) |
|
372 | self.sa.add(new_user) | |
373 |
|
373 | |||
374 | if not edit and create_repo_group: |
|
374 | if not edit and create_repo_group: | |
375 | RepoGroupModel().create_personal_repo_group( |
|
375 | RepoGroupModel().create_personal_repo_group( | |
376 | new_user, commit_early=False) |
|
376 | new_user, commit_early=False) | |
377 |
|
377 | |||
378 | if not edit: |
|
378 | if not edit: | |
379 | # add the RSS token |
|
379 | # add the RSS token | |
380 | self.add_auth_token( |
|
380 | self.add_auth_token( | |
381 | user=username, lifetime_minutes=-1, |
|
381 | user=username, lifetime_minutes=-1, | |
382 | role=self.auth_token_role.ROLE_FEED, |
|
382 | role=self.auth_token_role.ROLE_FEED, | |
383 | description=u'Generated feed token') |
|
383 | description=u'Generated feed token') | |
384 |
|
384 | |||
385 | kwargs = new_user.get_dict() |
|
385 | kwargs = new_user.get_dict() | |
386 | # backward compat, require api_keys present |
|
386 | # backward compat, require api_keys present | |
387 | kwargs['api_keys'] = kwargs['auth_tokens'] |
|
387 | kwargs['api_keys'] = kwargs['auth_tokens'] | |
388 | log_create_user(created_by=cur_user, **kwargs) |
|
388 | log_create_user(created_by=cur_user, **kwargs) | |
389 | events.trigger(events.UserPostCreate(user_data)) |
|
389 | events.trigger(events.UserPostCreate(user_data)) | |
390 | return new_user |
|
390 | return new_user | |
391 | except (DatabaseError,): |
|
391 | except (DatabaseError,): | |
392 | log.error(traceback.format_exc()) |
|
392 | log.error(traceback.format_exc()) | |
393 | raise |
|
393 | raise | |
394 |
|
394 | |||
395 | def create_registration(self, form_data, |
|
395 | def create_registration(self, form_data, | |
396 | extern_name='rhodecode', extern_type='rhodecode'): |
|
396 | extern_name='rhodecode', extern_type='rhodecode'): | |
397 | from rhodecode.model.notification import NotificationModel |
|
397 | from rhodecode.model.notification import NotificationModel | |
398 | from rhodecode.model.notification import EmailNotificationModel |
|
398 | from rhodecode.model.notification import EmailNotificationModel | |
399 |
|
399 | |||
400 | try: |
|
400 | try: | |
401 | form_data['admin'] = False |
|
401 | form_data['admin'] = False | |
402 | form_data['extern_name'] = extern_name |
|
402 | form_data['extern_name'] = extern_name | |
403 | form_data['extern_type'] = extern_type |
|
403 | form_data['extern_type'] = extern_type | |
404 | new_user = self.create(form_data) |
|
404 | new_user = self.create(form_data) | |
405 |
|
405 | |||
406 | self.sa.add(new_user) |
|
406 | self.sa.add(new_user) | |
407 | self.sa.flush() |
|
407 | self.sa.flush() | |
408 |
|
408 | |||
409 | user_data = new_user.get_dict() |
|
409 | user_data = new_user.get_dict() | |
410 | kwargs = { |
|
410 | kwargs = { | |
411 | # use SQLALCHEMY safe dump of user data |
|
411 | # use SQLALCHEMY safe dump of user data | |
412 | 'user': AttributeDict(user_data), |
|
412 | 'user': AttributeDict(user_data), | |
413 | 'date': datetime.datetime.now() |
|
413 | 'date': datetime.datetime.now() | |
414 | } |
|
414 | } | |
415 | notification_type = EmailNotificationModel.TYPE_REGISTRATION |
|
415 | notification_type = EmailNotificationModel.TYPE_REGISTRATION | |
416 | # pre-generate the subject for notification itself |
|
416 | # pre-generate the subject for notification itself | |
417 | (subject, |
|
417 | (subject, | |
418 | _h, _e, # we don't care about those |
|
418 | _h, _e, # we don't care about those | |
419 | body_plaintext) = EmailNotificationModel().render_email( |
|
419 | body_plaintext) = EmailNotificationModel().render_email( | |
420 | notification_type, **kwargs) |
|
420 | notification_type, **kwargs) | |
421 |
|
421 | |||
422 | # create notification objects, and emails |
|
422 | # create notification objects, and emails | |
423 | NotificationModel().create( |
|
423 | NotificationModel().create( | |
424 | created_by=new_user, |
|
424 | created_by=new_user, | |
425 | notification_subject=subject, |
|
425 | notification_subject=subject, | |
426 | notification_body=body_plaintext, |
|
426 | notification_body=body_plaintext, | |
427 | notification_type=notification_type, |
|
427 | notification_type=notification_type, | |
428 | recipients=None, # all admins |
|
428 | recipients=None, # all admins | |
429 | email_kwargs=kwargs, |
|
429 | email_kwargs=kwargs, | |
430 | ) |
|
430 | ) | |
431 |
|
431 | |||
432 | return new_user |
|
432 | return new_user | |
433 | except Exception: |
|
433 | except Exception: | |
434 | log.error(traceback.format_exc()) |
|
434 | log.error(traceback.format_exc()) | |
435 | raise |
|
435 | raise | |
436 |
|
436 | |||
437 | def _handle_user_repos(self, username, repositories, handle_mode=None): |
|
437 | def _handle_user_repos(self, username, repositories, handle_mode=None): | |
438 | _superadmin = self.cls.get_first_super_admin() |
|
438 | _superadmin = self.cls.get_first_super_admin() | |
439 | left_overs = True |
|
439 | left_overs = True | |
440 |
|
440 | |||
441 | from rhodecode.model.repo import RepoModel |
|
441 | from rhodecode.model.repo import RepoModel | |
442 |
|
442 | |||
443 | if handle_mode == 'detach': |
|
443 | if handle_mode == 'detach': | |
444 | for obj in repositories: |
|
444 | for obj in repositories: | |
445 | obj.user = _superadmin |
|
445 | obj.user = _superadmin | |
446 | # set description we know why we super admin now owns |
|
446 | # set description we know why we super admin now owns | |
447 | # additional repositories that were orphaned ! |
|
447 | # additional repositories that were orphaned ! | |
448 | obj.description += ' \n::detached repository from deleted user: %s' % (username,) |
|
448 | obj.description += ' \n::detached repository from deleted user: %s' % (username,) | |
449 | self.sa.add(obj) |
|
449 | self.sa.add(obj) | |
450 | left_overs = False |
|
450 | left_overs = False | |
451 | elif handle_mode == 'delete': |
|
451 | elif handle_mode == 'delete': | |
452 | for obj in repositories: |
|
452 | for obj in repositories: | |
453 | RepoModel().delete(obj, forks='detach') |
|
453 | RepoModel().delete(obj, forks='detach') | |
454 | left_overs = False |
|
454 | left_overs = False | |
455 |
|
455 | |||
456 | # if nothing is done we have left overs left |
|
456 | # if nothing is done we have left overs left | |
457 | return left_overs |
|
457 | return left_overs | |
458 |
|
458 | |||
459 | def _handle_user_repo_groups(self, username, repository_groups, |
|
459 | def _handle_user_repo_groups(self, username, repository_groups, | |
460 | handle_mode=None): |
|
460 | handle_mode=None): | |
461 | _superadmin = self.cls.get_first_super_admin() |
|
461 | _superadmin = self.cls.get_first_super_admin() | |
462 | left_overs = True |
|
462 | left_overs = True | |
463 |
|
463 | |||
464 | from rhodecode.model.repo_group import RepoGroupModel |
|
464 | from rhodecode.model.repo_group import RepoGroupModel | |
465 |
|
465 | |||
466 | if handle_mode == 'detach': |
|
466 | if handle_mode == 'detach': | |
467 | for r in repository_groups: |
|
467 | for r in repository_groups: | |
468 | r.user = _superadmin |
|
468 | r.user = _superadmin | |
469 | # set description we know why we super admin now owns |
|
469 | # set description we know why we super admin now owns | |
470 | # additional repositories that were orphaned ! |
|
470 | # additional repositories that were orphaned ! | |
471 | r.group_description += ' \n::detached repository group from deleted user: %s' % (username,) |
|
471 | r.group_description += ' \n::detached repository group from deleted user: %s' % (username,) | |
472 | r.personal = False |
|
472 | r.personal = False | |
473 | self.sa.add(r) |
|
473 | self.sa.add(r) | |
474 | left_overs = False |
|
474 | left_overs = False | |
475 | elif handle_mode == 'delete': |
|
475 | elif handle_mode == 'delete': | |
476 | for r in repository_groups: |
|
476 | for r in repository_groups: | |
477 | RepoGroupModel().delete(r) |
|
477 | RepoGroupModel().delete(r) | |
478 | left_overs = False |
|
478 | left_overs = False | |
479 |
|
479 | |||
480 | # if nothing is done we have left overs left |
|
480 | # if nothing is done we have left overs left | |
481 | return left_overs |
|
481 | return left_overs | |
482 |
|
482 | |||
483 | def _handle_user_user_groups(self, username, user_groups, handle_mode=None): |
|
483 | def _handle_user_user_groups(self, username, user_groups, handle_mode=None): | |
484 | _superadmin = self.cls.get_first_super_admin() |
|
484 | _superadmin = self.cls.get_first_super_admin() | |
485 | left_overs = True |
|
485 | left_overs = True | |
486 |
|
486 | |||
487 | from rhodecode.model.user_group import UserGroupModel |
|
487 | from rhodecode.model.user_group import UserGroupModel | |
488 |
|
488 | |||
489 | if handle_mode == 'detach': |
|
489 | if handle_mode == 'detach': | |
490 | for r in user_groups: |
|
490 | for r in user_groups: | |
491 | for user_user_group_to_perm in r.user_user_group_to_perm: |
|
491 | for user_user_group_to_perm in r.user_user_group_to_perm: | |
492 | if user_user_group_to_perm.user.username == username: |
|
492 | if user_user_group_to_perm.user.username == username: | |
493 | user_user_group_to_perm.user = _superadmin |
|
493 | user_user_group_to_perm.user = _superadmin | |
494 | r.user = _superadmin |
|
494 | r.user = _superadmin | |
495 | # set description we know why we super admin now owns |
|
495 | # set description we know why we super admin now owns | |
496 | # additional repositories that were orphaned ! |
|
496 | # additional repositories that were orphaned ! | |
497 | r.user_group_description += ' \n::detached user group from deleted user: %s' % (username,) |
|
497 | r.user_group_description += ' \n::detached user group from deleted user: %s' % (username,) | |
498 | self.sa.add(r) |
|
498 | self.sa.add(r) | |
499 | left_overs = False |
|
499 | left_overs = False | |
500 | elif handle_mode == 'delete': |
|
500 | elif handle_mode == 'delete': | |
501 | for r in user_groups: |
|
501 | for r in user_groups: | |
502 | UserGroupModel().delete(r) |
|
502 | UserGroupModel().delete(r) | |
503 | left_overs = False |
|
503 | left_overs = False | |
504 |
|
504 | |||
505 | # if nothing is done we have left overs left |
|
505 | # if nothing is done we have left overs left | |
506 | return left_overs |
|
506 | return left_overs | |
507 |
|
507 | |||
508 | def delete(self, user, cur_user=None, handle_repos=None, |
|
508 | def delete(self, user, cur_user=None, handle_repos=None, | |
509 | handle_repo_groups=None, handle_user_groups=None): |
|
509 | handle_repo_groups=None, handle_user_groups=None): | |
510 | from rhodecode.lib.hooks_base import log_delete_user |
|
510 | from rhodecode.lib.hooks_base import log_delete_user | |
511 |
|
511 | |||
512 | if not cur_user: |
|
512 | if not cur_user: | |
513 | cur_user = getattr( |
|
513 | cur_user = getattr(get_current_rhodecode_user(), 'username', None) | |
514 | get_current_rhodecode_user(), 'username', None) |
|
|||
515 | user = self._get_user(user) |
|
514 | user = self._get_user(user) | |
516 |
|
515 | |||
517 | try: |
|
516 | try: | |
518 | if user.username == User.DEFAULT_USER: |
|
517 | if user.username == User.DEFAULT_USER: | |
519 | raise DefaultUserException( |
|
518 | raise DefaultUserException( | |
520 | u"You can't remove this user since it's" |
|
519 | u"You can't remove this user since it's" | |
521 | u" crucial for entire application") |
|
520 | u" crucial for entire application") | |
522 |
|
521 | |||
523 | left_overs = self._handle_user_repos( |
|
522 | left_overs = self._handle_user_repos( | |
524 | user.username, user.repositories, handle_repos) |
|
523 | user.username, user.repositories, handle_repos) | |
525 | if left_overs and user.repositories: |
|
524 | if left_overs and user.repositories: | |
526 | repos = [x.repo_name for x in user.repositories] |
|
525 | repos = [x.repo_name for x in user.repositories] | |
527 | raise UserOwnsReposException( |
|
526 | raise UserOwnsReposException( | |
528 | u'user "%(username)s" still owns %(len_repos)s repositories and cannot be ' |
|
527 | u'user "%(username)s" still owns %(len_repos)s repositories and cannot be ' | |
529 | u'removed. Switch owners or remove those repositories:%(list_repos)s' |
|
528 | u'removed. Switch owners or remove those repositories:%(list_repos)s' | |
530 | % {'username': user.username, 'len_repos': len(repos), |
|
529 | % {'username': user.username, 'len_repos': len(repos), | |
531 | 'list_repos': ', '.join(repos)}) |
|
530 | 'list_repos': ', '.join(repos)}) | |
532 |
|
531 | |||
533 | left_overs = self._handle_user_repo_groups( |
|
532 | left_overs = self._handle_user_repo_groups( | |
534 | user.username, user.repository_groups, handle_repo_groups) |
|
533 | user.username, user.repository_groups, handle_repo_groups) | |
535 | if left_overs and user.repository_groups: |
|
534 | if left_overs and user.repository_groups: | |
536 | repo_groups = [x.group_name for x in user.repository_groups] |
|
535 | repo_groups = [x.group_name for x in user.repository_groups] | |
537 | raise UserOwnsRepoGroupsException( |
|
536 | raise UserOwnsRepoGroupsException( | |
538 | u'user "%(username)s" still owns %(len_repo_groups)s repository groups and cannot be ' |
|
537 | u'user "%(username)s" still owns %(len_repo_groups)s repository groups and cannot be ' | |
539 | u'removed. Switch owners or remove those repository groups:%(list_repo_groups)s' |
|
538 | u'removed. Switch owners or remove those repository groups:%(list_repo_groups)s' | |
540 | % {'username': user.username, 'len_repo_groups': len(repo_groups), |
|
539 | % {'username': user.username, 'len_repo_groups': len(repo_groups), | |
541 | 'list_repo_groups': ', '.join(repo_groups)}) |
|
540 | 'list_repo_groups': ', '.join(repo_groups)}) | |
542 |
|
541 | |||
543 | left_overs = self._handle_user_user_groups( |
|
542 | left_overs = self._handle_user_user_groups( | |
544 | user.username, user.user_groups, handle_user_groups) |
|
543 | user.username, user.user_groups, handle_user_groups) | |
545 | if left_overs and user.user_groups: |
|
544 | if left_overs and user.user_groups: | |
546 | user_groups = [x.users_group_name for x in user.user_groups] |
|
545 | user_groups = [x.users_group_name for x in user.user_groups] | |
547 | raise UserOwnsUserGroupsException( |
|
546 | raise UserOwnsUserGroupsException( | |
548 | u'user "%s" still owns %s user groups and cannot be ' |
|
547 | u'user "%s" still owns %s user groups and cannot be ' | |
549 | u'removed. Switch owners or remove those user groups:%s' |
|
548 | u'removed. Switch owners or remove those user groups:%s' | |
550 | % (user.username, len(user_groups), ', '.join(user_groups))) |
|
549 | % (user.username, len(user_groups), ', '.join(user_groups))) | |
551 |
|
550 | |||
552 | user_data = user.get_dict() # fetch user data before expire |
|
551 | user_data = user.get_dict() # fetch user data before expire | |
553 |
|
552 | |||
554 | # we might change the user data with detach/delete, make sure |
|
553 | # we might change the user data with detach/delete, make sure | |
555 | # the object is marked as expired before actually deleting ! |
|
554 | # the object is marked as expired before actually deleting ! | |
556 | self.sa.expire(user) |
|
555 | self.sa.expire(user) | |
557 | self.sa.delete(user) |
|
556 | self.sa.delete(user) | |
558 |
|
557 | |||
559 | log_delete_user(deleted_by=cur_user, **user_data) |
|
558 | log_delete_user(deleted_by=cur_user, **user_data) | |
560 | except Exception: |
|
559 | except Exception: | |
561 | log.error(traceback.format_exc()) |
|
560 | log.error(traceback.format_exc()) | |
562 | raise |
|
561 | raise | |
563 |
|
562 | |||
564 | def reset_password_link(self, data, pwd_reset_url): |
|
563 | def reset_password_link(self, data, pwd_reset_url): | |
565 | from rhodecode.lib.celerylib import tasks, run_task |
|
564 | from rhodecode.lib.celerylib import tasks, run_task | |
566 | from rhodecode.model.notification import EmailNotificationModel |
|
565 | from rhodecode.model.notification import EmailNotificationModel | |
567 | user_email = data['email'] |
|
566 | user_email = data['email'] | |
568 | try: |
|
567 | try: | |
569 | user = User.get_by_email(user_email) |
|
568 | user = User.get_by_email(user_email) | |
570 | if user: |
|
569 | if user: | |
571 | log.debug('password reset user found %s', user) |
|
570 | log.debug('password reset user found %s', user) | |
572 |
|
571 | |||
573 | email_kwargs = { |
|
572 | email_kwargs = { | |
574 | 'password_reset_url': pwd_reset_url, |
|
573 | 'password_reset_url': pwd_reset_url, | |
575 | 'user': user, |
|
574 | 'user': user, | |
576 | 'email': user_email, |
|
575 | 'email': user_email, | |
577 | 'date': datetime.datetime.now() |
|
576 | 'date': datetime.datetime.now() | |
578 | } |
|
577 | } | |
579 |
|
578 | |||
580 | (subject, headers, email_body, |
|
579 | (subject, headers, email_body, | |
581 | email_body_plaintext) = EmailNotificationModel().render_email( |
|
580 | email_body_plaintext) = EmailNotificationModel().render_email( | |
582 | EmailNotificationModel.TYPE_PASSWORD_RESET, **email_kwargs) |
|
581 | EmailNotificationModel.TYPE_PASSWORD_RESET, **email_kwargs) | |
583 |
|
582 | |||
584 | recipients = [user_email] |
|
583 | recipients = [user_email] | |
585 |
|
584 | |||
586 | action_logger_generic( |
|
585 | action_logger_generic( | |
587 | 'sending password reset email to user: {}'.format( |
|
586 | 'sending password reset email to user: {}'.format( | |
588 | user), namespace='security.password_reset') |
|
587 | user), namespace='security.password_reset') | |
589 |
|
588 | |||
590 | run_task(tasks.send_email, recipients, subject, |
|
589 | run_task(tasks.send_email, recipients, subject, | |
591 | email_body_plaintext, email_body) |
|
590 | email_body_plaintext, email_body) | |
592 |
|
591 | |||
593 | else: |
|
592 | else: | |
594 | log.debug("password reset email %s not found", user_email) |
|
593 | log.debug("password reset email %s not found", user_email) | |
595 | except Exception: |
|
594 | except Exception: | |
596 | log.error(traceback.format_exc()) |
|
595 | log.error(traceback.format_exc()) | |
597 | return False |
|
596 | return False | |
598 |
|
597 | |||
599 | return True |
|
598 | return True | |
600 |
|
599 | |||
601 | def reset_password(self, data): |
|
600 | def reset_password(self, data): | |
602 | from rhodecode.lib.celerylib import tasks, run_task |
|
601 | from rhodecode.lib.celerylib import tasks, run_task | |
603 | from rhodecode.model.notification import EmailNotificationModel |
|
602 | from rhodecode.model.notification import EmailNotificationModel | |
604 | from rhodecode.lib import auth |
|
603 | from rhodecode.lib import auth | |
605 | user_email = data['email'] |
|
604 | user_email = data['email'] | |
606 | pre_db = True |
|
605 | pre_db = True | |
607 | try: |
|
606 | try: | |
608 | user = User.get_by_email(user_email) |
|
607 | user = User.get_by_email(user_email) | |
609 | new_passwd = auth.PasswordGenerator().gen_password( |
|
608 | new_passwd = auth.PasswordGenerator().gen_password( | |
610 | 12, auth.PasswordGenerator.ALPHABETS_BIG_SMALL) |
|
609 | 12, auth.PasswordGenerator.ALPHABETS_BIG_SMALL) | |
611 | if user: |
|
610 | if user: | |
612 | user.password = auth.get_crypt_password(new_passwd) |
|
611 | user.password = auth.get_crypt_password(new_passwd) | |
613 | # also force this user to reset his password ! |
|
612 | # also force this user to reset his password ! | |
614 | user.update_userdata(force_password_change=True) |
|
613 | user.update_userdata(force_password_change=True) | |
615 |
|
614 | |||
616 | Session().add(user) |
|
615 | Session().add(user) | |
617 |
|
616 | |||
618 | # now delete the token in question |
|
617 | # now delete the token in question | |
619 | UserApiKeys = AuthTokenModel.cls |
|
618 | UserApiKeys = AuthTokenModel.cls | |
620 | UserApiKeys().query().filter( |
|
619 | UserApiKeys().query().filter( | |
621 | UserApiKeys.api_key == data['token']).delete() |
|
620 | UserApiKeys.api_key == data['token']).delete() | |
622 |
|
621 | |||
623 | Session().commit() |
|
622 | Session().commit() | |
624 | log.info('successfully reset password for `%s`', user_email) |
|
623 | log.info('successfully reset password for `%s`', user_email) | |
625 |
|
624 | |||
626 | if new_passwd is None: |
|
625 | if new_passwd is None: | |
627 | raise Exception('unable to generate new password') |
|
626 | raise Exception('unable to generate new password') | |
628 |
|
627 | |||
629 | pre_db = False |
|
628 | pre_db = False | |
630 |
|
629 | |||
631 | email_kwargs = { |
|
630 | email_kwargs = { | |
632 | 'new_password': new_passwd, |
|
631 | 'new_password': new_passwd, | |
633 | 'user': user, |
|
632 | 'user': user, | |
634 | 'email': user_email, |
|
633 | 'email': user_email, | |
635 | 'date': datetime.datetime.now() |
|
634 | 'date': datetime.datetime.now() | |
636 | } |
|
635 | } | |
637 |
|
636 | |||
638 | (subject, headers, email_body, |
|
637 | (subject, headers, email_body, | |
639 | email_body_plaintext) = EmailNotificationModel().render_email( |
|
638 | email_body_plaintext) = EmailNotificationModel().render_email( | |
640 | EmailNotificationModel.TYPE_PASSWORD_RESET_CONFIRMATION, |
|
639 | EmailNotificationModel.TYPE_PASSWORD_RESET_CONFIRMATION, | |
641 | **email_kwargs) |
|
640 | **email_kwargs) | |
642 |
|
641 | |||
643 | recipients = [user_email] |
|
642 | recipients = [user_email] | |
644 |
|
643 | |||
645 | action_logger_generic( |
|
644 | action_logger_generic( | |
646 | 'sent new password to user: {} with email: {}'.format( |
|
645 | 'sent new password to user: {} with email: {}'.format( | |
647 | user, user_email), namespace='security.password_reset') |
|
646 | user, user_email), namespace='security.password_reset') | |
648 |
|
647 | |||
649 | run_task(tasks.send_email, recipients, subject, |
|
648 | run_task(tasks.send_email, recipients, subject, | |
650 | email_body_plaintext, email_body) |
|
649 | email_body_plaintext, email_body) | |
651 |
|
650 | |||
652 | except Exception: |
|
651 | except Exception: | |
653 | log.error('Failed to update user password') |
|
652 | log.error('Failed to update user password') | |
654 | log.error(traceback.format_exc()) |
|
653 | log.error(traceback.format_exc()) | |
655 | if pre_db: |
|
654 | if pre_db: | |
656 | # we rollback only if local db stuff fails. If it goes into |
|
655 | # we rollback only if local db stuff fails. If it goes into | |
657 | # run_task, we're pass rollback state this wouldn't work then |
|
656 | # run_task, we're pass rollback state this wouldn't work then | |
658 | Session().rollback() |
|
657 | Session().rollback() | |
659 |
|
658 | |||
660 | return True |
|
659 | return True | |
661 |
|
660 | |||
662 | def fill_data(self, auth_user, user_id=None, api_key=None, username=None): |
|
661 | def fill_data(self, auth_user, user_id=None, api_key=None, username=None): | |
663 | """ |
|
662 | """ | |
664 | Fetches auth_user by user_id,or api_key if present. |
|
663 | Fetches auth_user by user_id,or api_key if present. | |
665 | Fills auth_user attributes with those taken from database. |
|
664 | Fills auth_user attributes with those taken from database. | |
666 | Additionally set's is_authenitated if lookup fails |
|
665 | Additionally set's is_authenitated if lookup fails | |
667 | present in database |
|
666 | present in database | |
668 |
|
667 | |||
669 | :param auth_user: instance of user to set attributes |
|
668 | :param auth_user: instance of user to set attributes | |
670 | :param user_id: user id to fetch by |
|
669 | :param user_id: user id to fetch by | |
671 | :param api_key: api key to fetch by |
|
670 | :param api_key: api key to fetch by | |
672 | :param username: username to fetch by |
|
671 | :param username: username to fetch by | |
673 | """ |
|
672 | """ | |
674 | def token_obfuscate(token): |
|
673 | def token_obfuscate(token): | |
675 | if token: |
|
674 | if token: | |
676 | return token[:4] + "****" |
|
675 | return token[:4] + "****" | |
677 |
|
676 | |||
678 | if user_id is None and api_key is None and username is None: |
|
677 | if user_id is None and api_key is None and username is None: | |
679 | raise Exception('You need to pass user_id, api_key or username') |
|
678 | raise Exception('You need to pass user_id, api_key or username') | |
680 |
|
679 | |||
681 | log.debug( |
|
680 | log.debug( | |
682 | 'AuthUser: fill data execution based on: ' |
|
681 | 'AuthUser: fill data execution based on: ' | |
683 | 'user_id:%s api_key:%s username:%s', user_id, api_key, username) |
|
682 | 'user_id:%s api_key:%s username:%s', user_id, api_key, username) | |
684 | try: |
|
683 | try: | |
685 | dbuser = None |
|
684 | dbuser = None | |
686 | if user_id: |
|
685 | if user_id: | |
687 | dbuser = self.get(user_id) |
|
686 | dbuser = self.get(user_id) | |
688 | elif api_key: |
|
687 | elif api_key: | |
689 | dbuser = self.get_by_auth_token(api_key) |
|
688 | dbuser = self.get_by_auth_token(api_key) | |
690 | elif username: |
|
689 | elif username: | |
691 | dbuser = self.get_by_username(username) |
|
690 | dbuser = self.get_by_username(username) | |
692 |
|
691 | |||
693 | if not dbuser: |
|
692 | if not dbuser: | |
694 | log.warning( |
|
693 | log.warning( | |
695 | 'Unable to lookup user by id:%s api_key:%s username:%s', |
|
694 | 'Unable to lookup user by id:%s api_key:%s username:%s', | |
696 | user_id, token_obfuscate(api_key), username) |
|
695 | user_id, token_obfuscate(api_key), username) | |
697 | return False |
|
696 | return False | |
698 | if not dbuser.active: |
|
697 | if not dbuser.active: | |
699 | log.debug('User `%s:%s` is inactive, skipping fill data', |
|
698 | log.debug('User `%s:%s` is inactive, skipping fill data', | |
700 | username, user_id) |
|
699 | username, user_id) | |
701 | return False |
|
700 | return False | |
702 |
|
701 | |||
703 | log.debug('AuthUser: filling found user:%s data', dbuser) |
|
702 | log.debug('AuthUser: filling found user:%s data', dbuser) | |
704 | user_data = dbuser.get_dict() |
|
703 | user_data = dbuser.get_dict() | |
705 |
|
704 | |||
706 | user_data.update({ |
|
705 | user_data.update({ | |
707 | # set explicit the safe escaped values |
|
706 | # set explicit the safe escaped values | |
708 | 'first_name': dbuser.first_name, |
|
707 | 'first_name': dbuser.first_name, | |
709 | 'last_name': dbuser.last_name, |
|
708 | 'last_name': dbuser.last_name, | |
710 | }) |
|
709 | }) | |
711 |
|
710 | |||
712 | for k, v in user_data.items(): |
|
711 | for k, v in user_data.items(): | |
713 | # properties of auth user we dont update |
|
712 | # properties of auth user we dont update | |
714 | if k not in ['auth_tokens', 'permissions']: |
|
713 | if k not in ['auth_tokens', 'permissions']: | |
715 | setattr(auth_user, k, v) |
|
714 | setattr(auth_user, k, v) | |
716 |
|
715 | |||
717 | except Exception: |
|
716 | except Exception: | |
718 | log.error(traceback.format_exc()) |
|
717 | log.error(traceback.format_exc()) | |
719 | auth_user.is_authenticated = False |
|
718 | auth_user.is_authenticated = False | |
720 | return False |
|
719 | return False | |
721 |
|
720 | |||
722 | return True |
|
721 | return True | |
723 |
|
722 | |||
724 | def has_perm(self, user, perm): |
|
723 | def has_perm(self, user, perm): | |
725 | perm = self._get_perm(perm) |
|
724 | perm = self._get_perm(perm) | |
726 | user = self._get_user(user) |
|
725 | user = self._get_user(user) | |
727 |
|
726 | |||
728 | return UserToPerm.query().filter(UserToPerm.user == user)\ |
|
727 | return UserToPerm.query().filter(UserToPerm.user == user)\ | |
729 | .filter(UserToPerm.permission == perm).scalar() is not None |
|
728 | .filter(UserToPerm.permission == perm).scalar() is not None | |
730 |
|
729 | |||
731 | def grant_perm(self, user, perm): |
|
730 | def grant_perm(self, user, perm): | |
732 | """ |
|
731 | """ | |
733 | Grant user global permissions |
|
732 | Grant user global permissions | |
734 |
|
733 | |||
735 | :param user: |
|
734 | :param user: | |
736 | :param perm: |
|
735 | :param perm: | |
737 | """ |
|
736 | """ | |
738 | user = self._get_user(user) |
|
737 | user = self._get_user(user) | |
739 | perm = self._get_perm(perm) |
|
738 | perm = self._get_perm(perm) | |
740 | # if this permission is already granted skip it |
|
739 | # if this permission is already granted skip it | |
741 | _perm = UserToPerm.query()\ |
|
740 | _perm = UserToPerm.query()\ | |
742 | .filter(UserToPerm.user == user)\ |
|
741 | .filter(UserToPerm.user == user)\ | |
743 | .filter(UserToPerm.permission == perm)\ |
|
742 | .filter(UserToPerm.permission == perm)\ | |
744 | .scalar() |
|
743 | .scalar() | |
745 | if _perm: |
|
744 | if _perm: | |
746 | return |
|
745 | return | |
747 | new = UserToPerm() |
|
746 | new = UserToPerm() | |
748 | new.user = user |
|
747 | new.user = user | |
749 | new.permission = perm |
|
748 | new.permission = perm | |
750 | self.sa.add(new) |
|
749 | self.sa.add(new) | |
751 | return new |
|
750 | return new | |
752 |
|
751 | |||
753 | def revoke_perm(self, user, perm): |
|
752 | def revoke_perm(self, user, perm): | |
754 | """ |
|
753 | """ | |
755 | Revoke users global permissions |
|
754 | Revoke users global permissions | |
756 |
|
755 | |||
757 | :param user: |
|
756 | :param user: | |
758 | :param perm: |
|
757 | :param perm: | |
759 | """ |
|
758 | """ | |
760 | user = self._get_user(user) |
|
759 | user = self._get_user(user) | |
761 | perm = self._get_perm(perm) |
|
760 | perm = self._get_perm(perm) | |
762 |
|
761 | |||
763 | obj = UserToPerm.query()\ |
|
762 | obj = UserToPerm.query()\ | |
764 | .filter(UserToPerm.user == user)\ |
|
763 | .filter(UserToPerm.user == user)\ | |
765 | .filter(UserToPerm.permission == perm)\ |
|
764 | .filter(UserToPerm.permission == perm)\ | |
766 | .scalar() |
|
765 | .scalar() | |
767 | if obj: |
|
766 | if obj: | |
768 | self.sa.delete(obj) |
|
767 | self.sa.delete(obj) | |
769 |
|
768 | |||
770 | def add_extra_email(self, user, email): |
|
769 | def add_extra_email(self, user, email): | |
771 | """ |
|
770 | """ | |
772 | Adds email address to UserEmailMap |
|
771 | Adds email address to UserEmailMap | |
773 |
|
772 | |||
774 | :param user: |
|
773 | :param user: | |
775 | :param email: |
|
774 | :param email: | |
776 | """ |
|
775 | """ | |
777 |
|
776 | |||
778 | user = self._get_user(user) |
|
777 | user = self._get_user(user) | |
779 |
|
778 | |||
780 | obj = UserEmailMap() |
|
779 | obj = UserEmailMap() | |
781 | obj.user = user |
|
780 | obj.user = user | |
782 | obj.email = email |
|
781 | obj.email = email | |
783 | self.sa.add(obj) |
|
782 | self.sa.add(obj) | |
784 | return obj |
|
783 | return obj | |
785 |
|
784 | |||
786 | def delete_extra_email(self, user, email_id): |
|
785 | def delete_extra_email(self, user, email_id): | |
787 | """ |
|
786 | """ | |
788 | Removes email address from UserEmailMap |
|
787 | Removes email address from UserEmailMap | |
789 |
|
788 | |||
790 | :param user: |
|
789 | :param user: | |
791 | :param email_id: |
|
790 | :param email_id: | |
792 | """ |
|
791 | """ | |
793 | user = self._get_user(user) |
|
792 | user = self._get_user(user) | |
794 | obj = UserEmailMap.query().get(email_id) |
|
793 | obj = UserEmailMap.query().get(email_id) | |
795 | if obj and obj.user_id == user.user_id: |
|
794 | if obj and obj.user_id == user.user_id: | |
796 | self.sa.delete(obj) |
|
795 | self.sa.delete(obj) | |
797 |
|
796 | |||
798 | def parse_ip_range(self, ip_range): |
|
797 | def parse_ip_range(self, ip_range): | |
799 | ip_list = [] |
|
798 | ip_list = [] | |
800 |
|
799 | |||
801 | def make_unique(value): |
|
800 | def make_unique(value): | |
802 | seen = [] |
|
801 | seen = [] | |
803 | return [c for c in value if not (c in seen or seen.append(c))] |
|
802 | return [c for c in value if not (c in seen or seen.append(c))] | |
804 |
|
803 | |||
805 | # firsts split by commas |
|
804 | # firsts split by commas | |
806 | for ip_range in ip_range.split(','): |
|
805 | for ip_range in ip_range.split(','): | |
807 | if not ip_range: |
|
806 | if not ip_range: | |
808 | continue |
|
807 | continue | |
809 | ip_range = ip_range.strip() |
|
808 | ip_range = ip_range.strip() | |
810 | if '-' in ip_range: |
|
809 | if '-' in ip_range: | |
811 | start_ip, end_ip = ip_range.split('-', 1) |
|
810 | start_ip, end_ip = ip_range.split('-', 1) | |
812 | start_ip = ipaddress.ip_address(safe_unicode(start_ip.strip())) |
|
811 | start_ip = ipaddress.ip_address(safe_unicode(start_ip.strip())) | |
813 | end_ip = ipaddress.ip_address(safe_unicode(end_ip.strip())) |
|
812 | end_ip = ipaddress.ip_address(safe_unicode(end_ip.strip())) | |
814 | parsed_ip_range = [] |
|
813 | parsed_ip_range = [] | |
815 |
|
814 | |||
816 | for index in xrange(int(start_ip), int(end_ip) + 1): |
|
815 | for index in xrange(int(start_ip), int(end_ip) + 1): | |
817 | new_ip = ipaddress.ip_address(index) |
|
816 | new_ip = ipaddress.ip_address(index) | |
818 | parsed_ip_range.append(str(new_ip)) |
|
817 | parsed_ip_range.append(str(new_ip)) | |
819 | ip_list.extend(parsed_ip_range) |
|
818 | ip_list.extend(parsed_ip_range) | |
820 | else: |
|
819 | else: | |
821 | ip_list.append(ip_range) |
|
820 | ip_list.append(ip_range) | |
822 |
|
821 | |||
823 | return make_unique(ip_list) |
|
822 | return make_unique(ip_list) | |
824 |
|
823 | |||
825 | def add_extra_ip(self, user, ip, description=None): |
|
824 | def add_extra_ip(self, user, ip, description=None): | |
826 | """ |
|
825 | """ | |
827 | Adds ip address to UserIpMap |
|
826 | Adds ip address to UserIpMap | |
828 |
|
827 | |||
829 | :param user: |
|
828 | :param user: | |
830 | :param ip: |
|
829 | :param ip: | |
831 | """ |
|
830 | """ | |
832 |
|
831 | |||
833 | user = self._get_user(user) |
|
832 | user = self._get_user(user) | |
834 | obj = UserIpMap() |
|
833 | obj = UserIpMap() | |
835 | obj.user = user |
|
834 | obj.user = user | |
836 | obj.ip_addr = ip |
|
835 | obj.ip_addr = ip | |
837 | obj.description = description |
|
836 | obj.description = description | |
838 | self.sa.add(obj) |
|
837 | self.sa.add(obj) | |
839 | return obj |
|
838 | return obj | |
840 |
|
839 | |||
841 | auth_token_role = AuthTokenModel.cls |
|
840 | auth_token_role = AuthTokenModel.cls | |
842 |
|
841 | |||
843 | def add_auth_token(self, user, lifetime_minutes, role, description=u'', |
|
842 | def add_auth_token(self, user, lifetime_minutes, role, description=u'', | |
844 | scope_callback=None): |
|
843 | scope_callback=None): | |
845 | """ |
|
844 | """ | |
846 | Add AuthToken for user. |
|
845 | Add AuthToken for user. | |
847 |
|
846 | |||
848 | :param user: username/user_id |
|
847 | :param user: username/user_id | |
849 | :param lifetime_minutes: in minutes the lifetime for token, -1 equals no limit |
|
848 | :param lifetime_minutes: in minutes the lifetime for token, -1 equals no limit | |
850 | :param role: one of AuthTokenModel.cls.ROLE_* |
|
849 | :param role: one of AuthTokenModel.cls.ROLE_* | |
851 | :param description: optional string description |
|
850 | :param description: optional string description | |
852 | """ |
|
851 | """ | |
853 |
|
852 | |||
854 | token = AuthTokenModel().create( |
|
853 | token = AuthTokenModel().create( | |
855 | user, description, lifetime_minutes, role) |
|
854 | user, description, lifetime_minutes, role) | |
856 | if scope_callback and callable(scope_callback): |
|
855 | if scope_callback and callable(scope_callback): | |
857 | # call the callback if we provide, used to attach scope for EE edition |
|
856 | # call the callback if we provide, used to attach scope for EE edition | |
858 | scope_callback(token) |
|
857 | scope_callback(token) | |
859 | return token |
|
858 | return token | |
860 |
|
859 | |||
861 | def delete_extra_ip(self, user, ip_id): |
|
860 | def delete_extra_ip(self, user, ip_id): | |
862 | """ |
|
861 | """ | |
863 | Removes ip address from UserIpMap |
|
862 | Removes ip address from UserIpMap | |
864 |
|
863 | |||
865 | :param user: |
|
864 | :param user: | |
866 | :param ip_id: |
|
865 | :param ip_id: | |
867 | """ |
|
866 | """ | |
868 | user = self._get_user(user) |
|
867 | user = self._get_user(user) | |
869 | obj = UserIpMap.query().get(ip_id) |
|
868 | obj = UserIpMap.query().get(ip_id) | |
870 | if obj and obj.user_id == user.user_id: |
|
869 | if obj and obj.user_id == user.user_id: | |
871 | self.sa.delete(obj) |
|
870 | self.sa.delete(obj) | |
872 |
|
871 | |||
873 | def get_accounts_in_creation_order(self, current_user=None): |
|
872 | def get_accounts_in_creation_order(self, current_user=None): | |
874 | """ |
|
873 | """ | |
875 | Get accounts in order of creation for deactivation for license limits |
|
874 | Get accounts in order of creation for deactivation for license limits | |
876 |
|
875 | |||
877 | pick currently logged in user, and append to the list in position 0 |
|
876 | pick currently logged in user, and append to the list in position 0 | |
878 | pick all super-admins in order of creation date and add it to the list |
|
877 | pick all super-admins in order of creation date and add it to the list | |
879 | pick all other accounts in order of creation and add it to the list. |
|
878 | pick all other accounts in order of creation and add it to the list. | |
880 |
|
879 | |||
881 | Based on that list, the last accounts can be disabled as they are |
|
880 | Based on that list, the last accounts can be disabled as they are | |
882 | created at the end and don't include any of the super admins as well |
|
881 | created at the end and don't include any of the super admins as well | |
883 | as the current user. |
|
882 | as the current user. | |
884 |
|
883 | |||
885 | :param current_user: optionally current user running this operation |
|
884 | :param current_user: optionally current user running this operation | |
886 | """ |
|
885 | """ | |
887 |
|
886 | |||
888 | if not current_user: |
|
887 | if not current_user: | |
889 | current_user = get_current_rhodecode_user() |
|
888 | current_user = get_current_rhodecode_user() | |
890 | active_super_admins = [ |
|
889 | active_super_admins = [ | |
891 | x.user_id for x in User.query() |
|
890 | x.user_id for x in User.query() | |
892 | .filter(User.user_id != current_user.user_id) |
|
891 | .filter(User.user_id != current_user.user_id) | |
893 | .filter(User.active == true()) |
|
892 | .filter(User.active == true()) | |
894 | .filter(User.admin == true()) |
|
893 | .filter(User.admin == true()) | |
895 | .order_by(User.created_on.asc())] |
|
894 | .order_by(User.created_on.asc())] | |
896 |
|
895 | |||
897 | active_regular_users = [ |
|
896 | active_regular_users = [ | |
898 | x.user_id for x in User.query() |
|
897 | x.user_id for x in User.query() | |
899 | .filter(User.user_id != current_user.user_id) |
|
898 | .filter(User.user_id != current_user.user_id) | |
900 | .filter(User.active == true()) |
|
899 | .filter(User.active == true()) | |
901 | .filter(User.admin == false()) |
|
900 | .filter(User.admin == false()) | |
902 | .order_by(User.created_on.asc())] |
|
901 | .order_by(User.created_on.asc())] | |
903 |
|
902 | |||
904 | list_of_accounts = [current_user.user_id] |
|
903 | list_of_accounts = [current_user.user_id] | |
905 | list_of_accounts += active_super_admins |
|
904 | list_of_accounts += active_super_admins | |
906 | list_of_accounts += active_regular_users |
|
905 | list_of_accounts += active_regular_users | |
907 |
|
906 | |||
908 | return list_of_accounts |
|
907 | return list_of_accounts | |
909 |
|
908 | |||
910 | def deactivate_last_users(self, expected_users, current_user=None): |
|
909 | def deactivate_last_users(self, expected_users, current_user=None): | |
911 | """ |
|
910 | """ | |
912 | Deactivate accounts that are over the license limits. |
|
911 | Deactivate accounts that are over the license limits. | |
913 | Algorithm of which accounts to disabled is based on the formula: |
|
912 | Algorithm of which accounts to disabled is based on the formula: | |
914 |
|
913 | |||
915 | Get current user, then super admins in creation order, then regular |
|
914 | Get current user, then super admins in creation order, then regular | |
916 | active users in creation order. |
|
915 | active users in creation order. | |
917 |
|
916 | |||
918 | Using that list we mark all accounts from the end of it as inactive. |
|
917 | Using that list we mark all accounts from the end of it as inactive. | |
919 | This way we block only latest created accounts. |
|
918 | This way we block only latest created accounts. | |
920 |
|
919 | |||
921 | :param expected_users: list of users in special order, we deactivate |
|
920 | :param expected_users: list of users in special order, we deactivate | |
922 | the end N amount of users from that list |
|
921 | the end N amount of users from that list | |
923 | """ |
|
922 | """ | |
924 |
|
923 | |||
925 | list_of_accounts = self.get_accounts_in_creation_order( |
|
924 | list_of_accounts = self.get_accounts_in_creation_order( | |
926 | current_user=current_user) |
|
925 | current_user=current_user) | |
927 |
|
926 | |||
928 | for acc_id in list_of_accounts[expected_users + 1:]: |
|
927 | for acc_id in list_of_accounts[expected_users + 1:]: | |
929 | user = User.get(acc_id) |
|
928 | user = User.get(acc_id) | |
930 | log.info('Deactivating account %s for license unlock', user) |
|
929 | log.info('Deactivating account %s for license unlock', user) | |
931 | user.active = False |
|
930 | user.active = False | |
932 | Session().add(user) |
|
931 | Session().add(user) | |
933 | Session().commit() |
|
932 | Session().commit() | |
934 |
|
933 | |||
935 | return |
|
934 | return | |
936 |
|
935 | |||
937 | def get_user_log(self, user, filter_term): |
|
936 | def get_user_log(self, user, filter_term): | |
938 | user_log = UserLog.query()\ |
|
937 | user_log = UserLog.query()\ | |
939 | .filter(or_(UserLog.user_id == user.user_id, |
|
938 | .filter(or_(UserLog.user_id == user.user_id, | |
940 | UserLog.username == user.username))\ |
|
939 | UserLog.username == user.username))\ | |
941 | .options(joinedload(UserLog.user))\ |
|
940 | .options(joinedload(UserLog.user))\ | |
942 | .options(joinedload(UserLog.repository))\ |
|
941 | .options(joinedload(UserLog.repository))\ | |
943 | .order_by(UserLog.action_date.desc()) |
|
942 | .order_by(UserLog.action_date.desc()) | |
944 |
|
943 | |||
945 | user_log = user_log_filter(user_log, filter_term) |
|
944 | user_log = user_log_filter(user_log, filter_term) | |
946 | return user_log |
|
945 | return user_log |
@@ -1,617 +1,632 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import os |
|
21 | import os | |
22 | from hashlib import sha1 |
|
22 | from hashlib import sha1 | |
23 |
|
23 | |||
24 | import pytest |
|
24 | import pytest | |
25 | from mock import patch |
|
25 | from mock import patch | |
26 |
|
26 | |||
27 | from rhodecode.lib import auth |
|
27 | from rhodecode.lib import auth | |
28 | from rhodecode.lib.utils2 import md5 |
|
28 | from rhodecode.lib.utils2 import md5 | |
29 | from rhodecode.model.auth_token import AuthTokenModel |
|
29 | from rhodecode.model.auth_token import AuthTokenModel | |
30 | from rhodecode.model.db import User |
|
30 | from rhodecode.model.db import Session, User | |
31 | from rhodecode.model.repo import RepoModel |
|
31 | from rhodecode.model.repo import RepoModel | |
32 | from rhodecode.model.user import UserModel |
|
32 | from rhodecode.model.user import UserModel | |
33 | from rhodecode.model.user_group import UserGroupModel |
|
33 | from rhodecode.model.user_group import UserGroupModel | |
34 |
|
34 | |||
35 |
|
35 | |||
36 | def test_perm_origin_dict(): |
|
36 | def test_perm_origin_dict(): | |
37 | pod = auth.PermOriginDict() |
|
37 | pod = auth.PermOriginDict() | |
38 | pod['thing'] = 'read', 'default' |
|
38 | pod['thing'] = 'read', 'default' | |
39 | assert pod['thing'] == 'read' |
|
39 | assert pod['thing'] == 'read' | |
40 |
|
40 | |||
41 | assert pod.perm_origin_stack == { |
|
41 | assert pod.perm_origin_stack == { | |
42 | 'thing': [('read', 'default')]} |
|
42 | 'thing': [('read', 'default')]} | |
43 |
|
43 | |||
44 | pod['thing'] = 'write', 'admin' |
|
44 | pod['thing'] = 'write', 'admin' | |
45 | assert pod['thing'] == 'write' |
|
45 | assert pod['thing'] == 'write' | |
46 |
|
46 | |||
47 | assert pod.perm_origin_stack == { |
|
47 | assert pod.perm_origin_stack == { | |
48 | 'thing': [('read', 'default'), ('write', 'admin')]} |
|
48 | 'thing': [('read', 'default'), ('write', 'admin')]} | |
49 |
|
49 | |||
50 | pod['other'] = 'write', 'default' |
|
50 | pod['other'] = 'write', 'default' | |
51 |
|
51 | |||
52 | assert pod.perm_origin_stack == { |
|
52 | assert pod.perm_origin_stack == { | |
53 | 'other': [('write', 'default')], |
|
53 | 'other': [('write', 'default')], | |
54 | 'thing': [('read', 'default'), ('write', 'admin')]} |
|
54 | 'thing': [('read', 'default'), ('write', 'admin')]} | |
55 |
|
55 | |||
56 | pod['other'] = 'none', 'override' |
|
56 | pod['other'] = 'none', 'override' | |
57 |
|
57 | |||
58 | assert pod.perm_origin_stack == { |
|
58 | assert pod.perm_origin_stack == { | |
59 | 'other': [('write', 'default'), ('none', 'override')], |
|
59 | 'other': [('write', 'default'), ('none', 'override')], | |
60 | 'thing': [('read', 'default'), ('write', 'admin')]} |
|
60 | 'thing': [('read', 'default'), ('write', 'admin')]} | |
61 |
|
61 | |||
62 | with pytest.raises(ValueError): |
|
62 | with pytest.raises(ValueError): | |
63 | pod['thing'] = 'read' |
|
63 | pod['thing'] = 'read' | |
64 |
|
64 | |||
65 |
|
65 | |||
66 | def test_cached_perms_data(user_regular, backend_random): |
|
66 | def test_cached_perms_data(user_regular, backend_random): | |
67 | permissions = get_permissions(user_regular) |
|
67 | permissions = get_permissions(user_regular) | |
68 | repo_name = backend_random.repo.repo_name |
|
68 | repo_name = backend_random.repo.repo_name | |
69 | expected_global_permissions = { |
|
69 | expected_global_permissions = { | |
70 | 'repository.read', 'group.read', 'usergroup.read'} |
|
70 | 'repository.read', 'group.read', 'usergroup.read'} | |
71 | assert expected_global_permissions.issubset(permissions['global']) |
|
71 | assert expected_global_permissions.issubset(permissions['global']) | |
72 | assert permissions['repositories'][repo_name] == 'repository.read' |
|
72 | assert permissions['repositories'][repo_name] == 'repository.read' | |
73 |
|
73 | |||
74 |
|
74 | |||
75 | def test_cached_perms_data_with_admin_user(user_regular, backend_random): |
|
75 | def test_cached_perms_data_with_admin_user(user_regular, backend_random): | |
76 | permissions = get_permissions(user_regular, user_is_admin=True) |
|
76 | permissions = get_permissions(user_regular, user_is_admin=True) | |
77 | repo_name = backend_random.repo.repo_name |
|
77 | repo_name = backend_random.repo.repo_name | |
78 | assert 'hg.admin' in permissions['global'] |
|
78 | assert 'hg.admin' in permissions['global'] | |
79 | assert permissions['repositories'][repo_name] == 'repository.admin' |
|
79 | assert permissions['repositories'][repo_name] == 'repository.admin' | |
80 |
|
80 | |||
81 |
|
81 | |||
82 | def test_cached_perms_data_with_admin_user_extended_calculation(user_regular, backend_random): |
|
82 | def test_cached_perms_data_with_admin_user_extended_calculation(user_regular, backend_random): | |
83 | permissions = get_permissions(user_regular, user_is_admin=True, |
|
83 | permissions = get_permissions(user_regular, user_is_admin=True, | |
84 | calculate_super_admin=True) |
|
84 | calculate_super_admin=True) | |
85 | repo_name = backend_random.repo.repo_name |
|
85 | repo_name = backend_random.repo.repo_name | |
86 | assert 'hg.admin' in permissions['global'] |
|
86 | assert 'hg.admin' in permissions['global'] | |
87 | assert permissions['repositories'][repo_name] == 'repository.admin' |
|
87 | assert permissions['repositories'][repo_name] == 'repository.admin' | |
88 |
|
88 | |||
89 |
|
89 | |||
90 | def test_cached_perms_data_user_group_global_permissions(user_util): |
|
90 | def test_cached_perms_data_user_group_global_permissions(user_util): | |
91 | user, user_group = user_util.create_user_with_group() |
|
91 | user, user_group = user_util.create_user_with_group() | |
92 | user_group.inherit_default_permissions = False |
|
92 | user_group.inherit_default_permissions = False | |
93 |
|
93 | |||
94 | granted_permission = 'repository.write' |
|
94 | granted_permission = 'repository.write' | |
95 | UserGroupModel().grant_perm(user_group, granted_permission) |
|
95 | UserGroupModel().grant_perm(user_group, granted_permission) | |
|
96 | Session().commit() | |||
96 |
|
97 | |||
97 | permissions = get_permissions(user) |
|
98 | permissions = get_permissions(user) | |
98 | assert granted_permission in permissions['global'] |
|
99 | assert granted_permission in permissions['global'] | |
99 |
|
100 | |||
100 |
|
101 | |||
101 | @pytest.mark.xfail(reason="Not implemented, see TODO note") |
|
102 | @pytest.mark.xfail(reason="Not implemented, see TODO note") | |
102 | def test_cached_perms_data_user_group_global_permissions_(user_util): |
|
103 | def test_cached_perms_data_user_group_global_permissions_(user_util): | |
103 | user, user_group = user_util.create_user_with_group() |
|
104 | user, user_group = user_util.create_user_with_group() | |
104 |
|
105 | |||
105 | granted_permission = 'repository.write' |
|
106 | granted_permission = 'repository.write' | |
106 | UserGroupModel().grant_perm(user_group, granted_permission) |
|
107 | UserGroupModel().grant_perm(user_group, granted_permission) | |
|
108 | Session().commit() | |||
107 |
|
109 | |||
108 | permissions = get_permissions(user) |
|
110 | permissions = get_permissions(user) | |
109 | assert granted_permission in permissions['global'] |
|
111 | assert granted_permission in permissions['global'] | |
110 |
|
112 | |||
111 |
|
113 | |||
112 | def test_cached_perms_data_user_global_permissions(user_util): |
|
114 | def test_cached_perms_data_user_global_permissions(user_util): | |
113 | user = user_util.create_user() |
|
115 | user = user_util.create_user() | |
114 | UserModel().grant_perm(user, 'repository.none') |
|
116 | UserModel().grant_perm(user, 'repository.none') | |
|
117 | Session().commit() | |||
115 |
|
118 | |||
116 | permissions = get_permissions(user, user_inherit_default_permissions=True) |
|
119 | permissions = get_permissions(user, user_inherit_default_permissions=True) | |
117 | assert 'repository.read' in permissions['global'] |
|
120 | assert 'repository.read' in permissions['global'] | |
118 |
|
121 | |||
119 |
|
122 | |||
120 | def test_cached_perms_data_repository_permissions_on_private_repository( |
|
123 | def test_cached_perms_data_repository_permissions_on_private_repository( | |
121 | backend_random, user_util): |
|
124 | backend_random, user_util): | |
122 | user, user_group = user_util.create_user_with_group() |
|
125 | user, user_group = user_util.create_user_with_group() | |
123 |
|
126 | |||
124 | repo = backend_random.create_repo() |
|
127 | repo = backend_random.create_repo() | |
125 | repo.private = True |
|
128 | repo.private = True | |
126 |
|
129 | |||
127 | granted_permission = 'repository.write' |
|
130 | granted_permission = 'repository.write' | |
128 | RepoModel().grant_user_group_permission( |
|
131 | RepoModel().grant_user_group_permission( | |
129 | repo, user_group.users_group_name, granted_permission) |
|
132 | repo, user_group.users_group_name, granted_permission) | |
|
133 | Session().commit() | |||
130 |
|
134 | |||
131 | permissions = get_permissions(user) |
|
135 | permissions = get_permissions(user) | |
132 | assert permissions['repositories'][repo.repo_name] == granted_permission |
|
136 | assert permissions['repositories'][repo.repo_name] == granted_permission | |
133 |
|
137 | |||
134 |
|
138 | |||
135 | def test_cached_perms_data_repository_permissions_for_owner( |
|
139 | def test_cached_perms_data_repository_permissions_for_owner( | |
136 | backend_random, user_util): |
|
140 | backend_random, user_util): | |
137 | user = user_util.create_user() |
|
141 | user = user_util.create_user() | |
138 |
|
142 | |||
139 | repo = backend_random.create_repo() |
|
143 | repo = backend_random.create_repo() | |
140 | repo.user_id = user.user_id |
|
144 | repo.user_id = user.user_id | |
141 |
|
145 | |||
142 | permissions = get_permissions(user) |
|
146 | permissions = get_permissions(user) | |
143 | assert permissions['repositories'][repo.repo_name] == 'repository.admin' |
|
147 | assert permissions['repositories'][repo.repo_name] == 'repository.admin' | |
144 |
|
148 | |||
145 | # TODO: johbo: Make cleanup in UserUtility smarter, then remove this hack |
|
149 | # TODO: johbo: Make cleanup in UserUtility smarter, then remove this hack | |
146 | repo.user_id = User.get_default_user().user_id |
|
150 | repo.user_id = User.get_default_user().user_id | |
147 |
|
151 | |||
148 |
|
152 | |||
149 | def test_cached_perms_data_repository_permissions_not_inheriting_defaults( |
|
153 | def test_cached_perms_data_repository_permissions_not_inheriting_defaults( | |
150 | backend_random, user_util): |
|
154 | backend_random, user_util): | |
151 | user = user_util.create_user() |
|
155 | user = user_util.create_user() | |
152 | repo = backend_random.create_repo() |
|
156 | repo = backend_random.create_repo() | |
153 |
|
157 | |||
154 | # Don't inherit default object permissions |
|
158 | # Don't inherit default object permissions | |
155 | UserModel().grant_perm(user, 'hg.inherit_default_perms.false') |
|
159 | UserModel().grant_perm(user, 'hg.inherit_default_perms.false') | |
|
160 | Session().commit() | |||
156 |
|
161 | |||
157 | permissions = get_permissions(user) |
|
162 | permissions = get_permissions(user) | |
158 | assert permissions['repositories'][repo.repo_name] == 'repository.none' |
|
163 | assert permissions['repositories'][repo.repo_name] == 'repository.none' | |
159 |
|
164 | |||
160 |
|
165 | |||
161 | def test_cached_perms_data_default_permissions_on_repository_group(user_util): |
|
166 | def test_cached_perms_data_default_permissions_on_repository_group(user_util): | |
162 | # Have a repository group with default permissions set |
|
167 | # Have a repository group with default permissions set | |
163 | repo_group = user_util.create_repo_group() |
|
168 | repo_group = user_util.create_repo_group() | |
164 | default_user = User.get_default_user() |
|
169 | default_user = User.get_default_user() | |
165 | user_util.grant_user_permission_to_repo_group( |
|
170 | user_util.grant_user_permission_to_repo_group( | |
166 | repo_group, default_user, 'repository.write') |
|
171 | repo_group, default_user, 'repository.write') | |
167 | user = user_util.create_user() |
|
172 | user = user_util.create_user() | |
168 |
|
173 | |||
169 | permissions = get_permissions(user) |
|
174 | permissions = get_permissions(user) | |
170 | assert permissions['repositories_groups'][repo_group.group_name] == \ |
|
175 | assert permissions['repositories_groups'][repo_group.group_name] == \ | |
171 | 'repository.write' |
|
176 | 'repository.write' | |
172 |
|
177 | |||
173 |
|
178 | |||
174 | def test_cached_perms_data_default_permissions_on_repository_group_owner( |
|
179 | def test_cached_perms_data_default_permissions_on_repository_group_owner( | |
175 | user_util): |
|
180 | user_util): | |
176 | # Have a repository group |
|
181 | # Have a repository group | |
177 | repo_group = user_util.create_repo_group() |
|
182 | repo_group = user_util.create_repo_group() | |
178 | default_user = User.get_default_user() |
|
183 | default_user = User.get_default_user() | |
179 |
|
184 | |||
180 | # Add a permission for the default user to hit the code path |
|
185 | # Add a permission for the default user to hit the code path | |
181 | user_util.grant_user_permission_to_repo_group( |
|
186 | user_util.grant_user_permission_to_repo_group( | |
182 | repo_group, default_user, 'repository.write') |
|
187 | repo_group, default_user, 'repository.write') | |
183 |
|
188 | |||
184 | # Have an owner of the group |
|
189 | # Have an owner of the group | |
185 | user = user_util.create_user() |
|
190 | user = user_util.create_user() | |
186 | repo_group.user_id = user.user_id |
|
191 | repo_group.user_id = user.user_id | |
187 |
|
192 | |||
188 | permissions = get_permissions(user) |
|
193 | permissions = get_permissions(user) | |
189 | assert permissions['repositories_groups'][repo_group.group_name] == \ |
|
194 | assert permissions['repositories_groups'][repo_group.group_name] == \ | |
190 | 'group.admin' |
|
195 | 'group.admin' | |
191 |
|
196 | |||
192 |
|
197 | |||
193 | def test_cached_perms_data_default_permissions_on_repository_group_no_inherit( |
|
198 | def test_cached_perms_data_default_permissions_on_repository_group_no_inherit( | |
194 | user_util): |
|
199 | user_util): | |
195 | # Have a repository group |
|
200 | # Have a repository group | |
196 | repo_group = user_util.create_repo_group() |
|
201 | repo_group = user_util.create_repo_group() | |
197 | default_user = User.get_default_user() |
|
202 | default_user = User.get_default_user() | |
198 |
|
203 | |||
199 | # Add a permission for the default user to hit the code path |
|
204 | # Add a permission for the default user to hit the code path | |
200 | user_util.grant_user_permission_to_repo_group( |
|
205 | user_util.grant_user_permission_to_repo_group( | |
201 | repo_group, default_user, 'repository.write') |
|
206 | repo_group, default_user, 'repository.write') | |
202 |
|
207 | |||
203 | # Don't inherit default object permissions |
|
208 | # Don't inherit default object permissions | |
204 | user = user_util.create_user() |
|
209 | user = user_util.create_user() | |
205 | UserModel().grant_perm(user, 'hg.inherit_default_perms.false') |
|
210 | UserModel().grant_perm(user, 'hg.inherit_default_perms.false') | |
|
211 | Session().commit() | |||
206 |
|
212 | |||
207 | permissions = get_permissions(user) |
|
213 | permissions = get_permissions(user) | |
208 | assert permissions['repositories_groups'][repo_group.group_name] == \ |
|
214 | assert permissions['repositories_groups'][repo_group.group_name] == \ | |
209 | 'group.none' |
|
215 | 'group.none' | |
210 |
|
216 | |||
211 |
|
217 | |||
212 | def test_cached_perms_data_repository_permissions_from_user_group( |
|
218 | def test_cached_perms_data_repository_permissions_from_user_group( | |
213 | user_util, backend_random): |
|
219 | user_util, backend_random): | |
214 | user, user_group = user_util.create_user_with_group() |
|
220 | user, user_group = user_util.create_user_with_group() | |
215 |
|
221 | |||
216 | # Needs a second user group to make sure that we select the right |
|
222 | # Needs a second user group to make sure that we select the right | |
217 | # permissions. |
|
223 | # permissions. | |
218 | user_group2 = user_util.create_user_group() |
|
224 | user_group2 = user_util.create_user_group() | |
219 | UserGroupModel().add_user_to_group(user_group2, user) |
|
225 | UserGroupModel().add_user_to_group(user_group2, user) | |
220 |
|
226 | |||
221 | repo = backend_random.create_repo() |
|
227 | repo = backend_random.create_repo() | |
222 |
|
228 | |||
223 | RepoModel().grant_user_group_permission( |
|
229 | RepoModel().grant_user_group_permission( | |
224 | repo, user_group.users_group_name, 'repository.read') |
|
230 | repo, user_group.users_group_name, 'repository.read') | |
225 | RepoModel().grant_user_group_permission( |
|
231 | RepoModel().grant_user_group_permission( | |
226 | repo, user_group2.users_group_name, 'repository.write') |
|
232 | repo, user_group2.users_group_name, 'repository.write') | |
|
233 | Session().commit() | |||
227 |
|
234 | |||
228 | permissions = get_permissions(user) |
|
235 | permissions = get_permissions(user) | |
229 | assert permissions['repositories'][repo.repo_name] == 'repository.write' |
|
236 | assert permissions['repositories'][repo.repo_name] == 'repository.write' | |
230 |
|
237 | |||
231 |
|
238 | |||
232 | def test_cached_perms_data_repository_permissions_from_user_group_owner( |
|
239 | def test_cached_perms_data_repository_permissions_from_user_group_owner( | |
233 | user_util, backend_random): |
|
240 | user_util, backend_random): | |
234 | user, user_group = user_util.create_user_with_group() |
|
241 | user, user_group = user_util.create_user_with_group() | |
235 |
|
242 | |||
236 | repo = backend_random.create_repo() |
|
243 | repo = backend_random.create_repo() | |
237 | repo.user_id = user.user_id |
|
244 | repo.user_id = user.user_id | |
238 |
|
245 | |||
239 | RepoModel().grant_user_group_permission( |
|
246 | RepoModel().grant_user_group_permission( | |
240 | repo, user_group.users_group_name, 'repository.write') |
|
247 | repo, user_group.users_group_name, 'repository.write') | |
|
248 | Session().commit() | |||
241 |
|
249 | |||
242 | permissions = get_permissions(user) |
|
250 | permissions = get_permissions(user) | |
243 | assert permissions['repositories'][repo.repo_name] == 'repository.admin' |
|
251 | assert permissions['repositories'][repo.repo_name] == 'repository.admin' | |
244 |
|
252 | |||
245 |
|
253 | |||
246 | def test_cached_perms_data_user_repository_permissions( |
|
254 | def test_cached_perms_data_user_repository_permissions( | |
247 | user_util, backend_random): |
|
255 | user_util, backend_random): | |
248 | user = user_util.create_user() |
|
256 | user = user_util.create_user() | |
249 | repo = backend_random.create_repo() |
|
257 | repo = backend_random.create_repo() | |
250 | granted_permission = 'repository.write' |
|
258 | granted_permission = 'repository.write' | |
251 | RepoModel().grant_user_permission(repo, user, granted_permission) |
|
259 | RepoModel().grant_user_permission(repo, user, granted_permission) | |
|
260 | Session().commit() | |||
252 |
|
261 | |||
253 | permissions = get_permissions(user) |
|
262 | permissions = get_permissions(user) | |
254 | assert permissions['repositories'][repo.repo_name] == granted_permission |
|
263 | assert permissions['repositories'][repo.repo_name] == granted_permission | |
255 |
|
264 | |||
256 |
|
265 | |||
257 | def test_cached_perms_data_user_repository_permissions_explicit( |
|
266 | def test_cached_perms_data_user_repository_permissions_explicit( | |
258 | user_util, backend_random): |
|
267 | user_util, backend_random): | |
259 | user = user_util.create_user() |
|
268 | user = user_util.create_user() | |
260 | repo = backend_random.create_repo() |
|
269 | repo = backend_random.create_repo() | |
261 | granted_permission = 'repository.none' |
|
270 | granted_permission = 'repository.none' | |
262 | RepoModel().grant_user_permission(repo, user, granted_permission) |
|
271 | RepoModel().grant_user_permission(repo, user, granted_permission) | |
|
272 | Session().commit() | |||
263 |
|
273 | |||
264 | permissions = get_permissions(user, explicit=True) |
|
274 | permissions = get_permissions(user, explicit=True) | |
265 | assert permissions['repositories'][repo.repo_name] == granted_permission |
|
275 | assert permissions['repositories'][repo.repo_name] == granted_permission | |
266 |
|
276 | |||
267 |
|
277 | |||
268 | def test_cached_perms_data_user_repository_permissions_owner( |
|
278 | def test_cached_perms_data_user_repository_permissions_owner( | |
269 | user_util, backend_random): |
|
279 | user_util, backend_random): | |
270 | user = user_util.create_user() |
|
280 | user = user_util.create_user() | |
271 | repo = backend_random.create_repo() |
|
281 | repo = backend_random.create_repo() | |
272 | repo.user_id = user.user_id |
|
282 | repo.user_id = user.user_id | |
273 | RepoModel().grant_user_permission(repo, user, 'repository.write') |
|
283 | RepoModel().grant_user_permission(repo, user, 'repository.write') | |
|
284 | Session().commit() | |||
274 |
|
285 | |||
275 | permissions = get_permissions(user) |
|
286 | permissions = get_permissions(user) | |
276 | assert permissions['repositories'][repo.repo_name] == 'repository.admin' |
|
287 | assert permissions['repositories'][repo.repo_name] == 'repository.admin' | |
277 |
|
288 | |||
278 |
|
289 | |||
279 | def test_cached_perms_data_repository_groups_permissions_inherited( |
|
290 | def test_cached_perms_data_repository_groups_permissions_inherited( | |
280 | user_util, backend_random): |
|
291 | user_util, backend_random): | |
281 | user, user_group = user_util.create_user_with_group() |
|
292 | user, user_group = user_util.create_user_with_group() | |
282 |
|
293 | |||
283 | # Needs a second group to hit the last condition |
|
294 | # Needs a second group to hit the last condition | |
284 | user_group2 = user_util.create_user_group() |
|
295 | user_group2 = user_util.create_user_group() | |
285 | UserGroupModel().add_user_to_group(user_group2, user) |
|
296 | UserGroupModel().add_user_to_group(user_group2, user) | |
286 |
|
297 | |||
287 | repo_group = user_util.create_repo_group() |
|
298 | repo_group = user_util.create_repo_group() | |
288 |
|
299 | |||
289 | user_util.grant_user_group_permission_to_repo_group( |
|
300 | user_util.grant_user_group_permission_to_repo_group( | |
290 | repo_group, user_group, 'group.read') |
|
301 | repo_group, user_group, 'group.read') | |
291 | user_util.grant_user_group_permission_to_repo_group( |
|
302 | user_util.grant_user_group_permission_to_repo_group( | |
292 | repo_group, user_group2, 'group.write') |
|
303 | repo_group, user_group2, 'group.write') | |
293 |
|
304 | |||
294 | permissions = get_permissions(user) |
|
305 | permissions = get_permissions(user) | |
295 | assert permissions['repositories_groups'][repo_group.group_name] == \ |
|
306 | assert permissions['repositories_groups'][repo_group.group_name] == \ | |
296 | 'group.write' |
|
307 | 'group.write' | |
297 |
|
308 | |||
298 |
|
309 | |||
299 | def test_cached_perms_data_repository_groups_permissions_inherited_owner( |
|
310 | def test_cached_perms_data_repository_groups_permissions_inherited_owner( | |
300 | user_util, backend_random): |
|
311 | user_util, backend_random): | |
301 | user, user_group = user_util.create_user_with_group() |
|
312 | user, user_group = user_util.create_user_with_group() | |
302 | repo_group = user_util.create_repo_group() |
|
313 | repo_group = user_util.create_repo_group() | |
303 | repo_group.user_id = user.user_id |
|
314 | repo_group.user_id = user.user_id | |
304 |
|
315 | |||
305 | granted_permission = 'group.write' |
|
316 | granted_permission = 'group.write' | |
306 | user_util.grant_user_group_permission_to_repo_group( |
|
317 | user_util.grant_user_group_permission_to_repo_group( | |
307 | repo_group, user_group, granted_permission) |
|
318 | repo_group, user_group, granted_permission) | |
308 |
|
319 | |||
309 | permissions = get_permissions(user) |
|
320 | permissions = get_permissions(user) | |
310 | assert permissions['repositories_groups'][repo_group.group_name] == \ |
|
321 | assert permissions['repositories_groups'][repo_group.group_name] == \ | |
311 | 'group.admin' |
|
322 | 'group.admin' | |
312 |
|
323 | |||
313 |
|
324 | |||
314 | def test_cached_perms_data_repository_groups_permissions( |
|
325 | def test_cached_perms_data_repository_groups_permissions( | |
315 | user_util, backend_random): |
|
326 | user_util, backend_random): | |
316 | user = user_util.create_user() |
|
327 | user = user_util.create_user() | |
317 |
|
328 | |||
318 | repo_group = user_util.create_repo_group() |
|
329 | repo_group = user_util.create_repo_group() | |
319 |
|
330 | |||
320 | granted_permission = 'group.write' |
|
331 | granted_permission = 'group.write' | |
321 | user_util.grant_user_permission_to_repo_group( |
|
332 | user_util.grant_user_permission_to_repo_group( | |
322 | repo_group, user, granted_permission) |
|
333 | repo_group, user, granted_permission) | |
323 |
|
334 | |||
324 | permissions = get_permissions(user) |
|
335 | permissions = get_permissions(user) | |
325 | assert permissions['repositories_groups'][repo_group.group_name] == \ |
|
336 | assert permissions['repositories_groups'][repo_group.group_name] == \ | |
326 | 'group.write' |
|
337 | 'group.write' | |
327 |
|
338 | |||
328 |
|
339 | |||
329 | def test_cached_perms_data_repository_groups_permissions_explicit( |
|
340 | def test_cached_perms_data_repository_groups_permissions_explicit( | |
330 | user_util, backend_random): |
|
341 | user_util, backend_random): | |
331 | user = user_util.create_user() |
|
342 | user = user_util.create_user() | |
332 |
|
343 | |||
333 | repo_group = user_util.create_repo_group() |
|
344 | repo_group = user_util.create_repo_group() | |
334 |
|
345 | |||
335 | granted_permission = 'group.none' |
|
346 | granted_permission = 'group.none' | |
336 | user_util.grant_user_permission_to_repo_group( |
|
347 | user_util.grant_user_permission_to_repo_group( | |
337 | repo_group, user, granted_permission) |
|
348 | repo_group, user, granted_permission) | |
338 |
|
349 | |||
339 | permissions = get_permissions(user, explicit=True) |
|
350 | permissions = get_permissions(user, explicit=True) | |
340 | assert permissions['repositories_groups'][repo_group.group_name] == \ |
|
351 | assert permissions['repositories_groups'][repo_group.group_name] == \ | |
341 | 'group.none' |
|
352 | 'group.none' | |
342 |
|
353 | |||
343 |
|
354 | |||
344 | def test_cached_perms_data_repository_groups_permissions_owner( |
|
355 | def test_cached_perms_data_repository_groups_permissions_owner( | |
345 | user_util, backend_random): |
|
356 | user_util, backend_random): | |
346 | user = user_util.create_user() |
|
357 | user = user_util.create_user() | |
347 |
|
358 | |||
348 | repo_group = user_util.create_repo_group() |
|
359 | repo_group = user_util.create_repo_group() | |
349 | repo_group.user_id = user.user_id |
|
360 | repo_group.user_id = user.user_id | |
350 |
|
361 | |||
351 | granted_permission = 'group.write' |
|
362 | granted_permission = 'group.write' | |
352 | user_util.grant_user_permission_to_repo_group( |
|
363 | user_util.grant_user_permission_to_repo_group( | |
353 | repo_group, user, granted_permission) |
|
364 | repo_group, user, granted_permission) | |
354 |
|
365 | |||
355 | permissions = get_permissions(user) |
|
366 | permissions = get_permissions(user) | |
356 | assert permissions['repositories_groups'][repo_group.group_name] == \ |
|
367 | assert permissions['repositories_groups'][repo_group.group_name] == \ | |
357 | 'group.admin' |
|
368 | 'group.admin' | |
358 |
|
369 | |||
359 |
|
370 | |||
360 | def test_cached_perms_data_user_group_permissions_inherited( |
|
371 | def test_cached_perms_data_user_group_permissions_inherited( | |
361 | user_util, backend_random): |
|
372 | user_util, backend_random): | |
362 | user, user_group = user_util.create_user_with_group() |
|
373 | user, user_group = user_util.create_user_with_group() | |
363 | user_group2 = user_util.create_user_group() |
|
374 | user_group2 = user_util.create_user_group() | |
364 | UserGroupModel().add_user_to_group(user_group2, user) |
|
375 | UserGroupModel().add_user_to_group(user_group2, user) | |
365 |
|
376 | |||
366 | target_user_group = user_util.create_user_group() |
|
377 | target_user_group = user_util.create_user_group() | |
367 |
|
378 | |||
368 | user_util.grant_user_group_permission_to_user_group( |
|
379 | user_util.grant_user_group_permission_to_user_group( | |
369 | target_user_group, user_group, 'usergroup.read') |
|
380 | target_user_group, user_group, 'usergroup.read') | |
370 | user_util.grant_user_group_permission_to_user_group( |
|
381 | user_util.grant_user_group_permission_to_user_group( | |
371 | target_user_group, user_group2, 'usergroup.write') |
|
382 | target_user_group, user_group2, 'usergroup.write') | |
372 |
|
383 | |||
373 | permissions = get_permissions(user) |
|
384 | permissions = get_permissions(user) | |
374 | assert permissions['user_groups'][target_user_group.users_group_name] == \ |
|
385 | assert permissions['user_groups'][target_user_group.users_group_name] == \ | |
375 | 'usergroup.write' |
|
386 | 'usergroup.write' | |
376 |
|
387 | |||
377 |
|
388 | |||
378 | def test_cached_perms_data_user_group_permissions( |
|
389 | def test_cached_perms_data_user_group_permissions( | |
379 | user_util, backend_random): |
|
390 | user_util, backend_random): | |
380 | user = user_util.create_user() |
|
391 | user = user_util.create_user() | |
381 | user_group = user_util.create_user_group() |
|
392 | user_group = user_util.create_user_group() | |
382 | UserGroupModel().grant_user_permission(user_group, user, 'usergroup.write') |
|
393 | UserGroupModel().grant_user_permission(user_group, user, 'usergroup.write') | |
|
394 | Session().commit() | |||
383 |
|
395 | |||
384 | permissions = get_permissions(user) |
|
396 | permissions = get_permissions(user) | |
385 | assert permissions['user_groups'][user_group.users_group_name] == \ |
|
397 | assert permissions['user_groups'][user_group.users_group_name] == \ | |
386 | 'usergroup.write' |
|
398 | 'usergroup.write' | |
387 |
|
399 | |||
388 |
|
400 | |||
389 | def test_cached_perms_data_user_group_permissions_explicit( |
|
401 | def test_cached_perms_data_user_group_permissions_explicit( | |
390 | user_util, backend_random): |
|
402 | user_util, backend_random): | |
391 | user = user_util.create_user() |
|
403 | user = user_util.create_user() | |
392 | user_group = user_util.create_user_group() |
|
404 | user_group = user_util.create_user_group() | |
393 | UserGroupModel().grant_user_permission(user_group, user, 'usergroup.none') |
|
405 | UserGroupModel().grant_user_permission(user_group, user, 'usergroup.none') | |
|
406 | Session().commit() | |||
394 |
|
407 | |||
395 | permissions = get_permissions(user, explicit=True) |
|
408 | permissions = get_permissions(user, explicit=True) | |
396 | assert permissions['user_groups'][user_group.users_group_name] == \ |
|
409 | assert permissions['user_groups'][user_group.users_group_name] == \ | |
397 | 'usergroup.none' |
|
410 | 'usergroup.none' | |
398 |
|
411 | |||
399 |
|
412 | |||
400 | def test_cached_perms_data_user_group_permissions_not_inheriting_defaults( |
|
413 | def test_cached_perms_data_user_group_permissions_not_inheriting_defaults( | |
401 | user_util, backend_random): |
|
414 | user_util, backend_random): | |
402 | user = user_util.create_user() |
|
415 | user = user_util.create_user() | |
403 | user_group = user_util.create_user_group() |
|
416 | user_group = user_util.create_user_group() | |
404 |
|
417 | |||
405 | # Don't inherit default object permissions |
|
418 | # Don't inherit default object permissions | |
406 | UserModel().grant_perm(user, 'hg.inherit_default_perms.false') |
|
419 | UserModel().grant_perm(user, 'hg.inherit_default_perms.false') | |
|
420 | Session().commit() | |||
407 |
|
421 | |||
408 | permissions = get_permissions(user) |
|
422 | permissions = get_permissions(user) | |
409 | assert permissions['user_groups'][user_group.users_group_name] == \ |
|
423 | assert permissions['user_groups'][user_group.users_group_name] == \ | |
410 | 'usergroup.none' |
|
424 | 'usergroup.none' | |
411 |
|
425 | |||
412 |
|
426 | |||
413 | def test_permission_calculator_admin_permissions( |
|
427 | def test_permission_calculator_admin_permissions( | |
414 | user_util, backend_random): |
|
428 | user_util, backend_random): | |
415 | user = user_util.create_user() |
|
429 | user = user_util.create_user() | |
416 | user_group = user_util.create_user_group() |
|
430 | user_group = user_util.create_user_group() | |
417 | repo = backend_random.repo |
|
431 | repo = backend_random.repo | |
418 | repo_group = user_util.create_repo_group() |
|
432 | repo_group = user_util.create_repo_group() | |
419 |
|
433 | |||
420 | calculator = auth.PermissionCalculator( |
|
434 | calculator = auth.PermissionCalculator( | |
421 | user.user_id, {}, False, False, True, 'higherwin') |
|
435 | user.user_id, {}, False, False, True, 'higherwin') | |
422 | permissions = calculator._calculate_admin_permissions() |
|
436 | permissions = calculator._calculate_admin_permissions() | |
423 |
|
437 | |||
424 | assert permissions['repositories_groups'][repo_group.group_name] == \ |
|
438 | assert permissions['repositories_groups'][repo_group.group_name] == \ | |
425 | 'group.admin' |
|
439 | 'group.admin' | |
426 | assert permissions['user_groups'][user_group.users_group_name] == \ |
|
440 | assert permissions['user_groups'][user_group.users_group_name] == \ | |
427 | 'usergroup.admin' |
|
441 | 'usergroup.admin' | |
428 | assert permissions['repositories'][repo.repo_name] == 'repository.admin' |
|
442 | assert permissions['repositories'][repo.repo_name] == 'repository.admin' | |
429 | assert 'hg.admin' in permissions['global'] |
|
443 | assert 'hg.admin' in permissions['global'] | |
430 |
|
444 | |||
431 |
|
445 | |||
432 | def test_permission_calculator_repository_permissions_robustness_from_group( |
|
446 | def test_permission_calculator_repository_permissions_robustness_from_group( | |
433 | user_util, backend_random): |
|
447 | user_util, backend_random): | |
434 | user, user_group = user_util.create_user_with_group() |
|
448 | user, user_group = user_util.create_user_with_group() | |
435 |
|
449 | |||
436 | RepoModel().grant_user_group_permission( |
|
450 | RepoModel().grant_user_group_permission( | |
437 | backend_random.repo, user_group.users_group_name, 'repository.write') |
|
451 | backend_random.repo, user_group.users_group_name, 'repository.write') | |
438 |
|
452 | |||
439 | calculator = auth.PermissionCalculator( |
|
453 | calculator = auth.PermissionCalculator( | |
440 | user.user_id, {}, False, False, False, 'higherwin') |
|
454 | user.user_id, {}, False, False, False, 'higherwin') | |
441 | calculator._calculate_repository_permissions() |
|
455 | calculator._calculate_repository_permissions() | |
442 |
|
456 | |||
443 |
|
457 | |||
444 | def test_permission_calculator_repository_permissions_robustness_from_user( |
|
458 | def test_permission_calculator_repository_permissions_robustness_from_user( | |
445 | user_util, backend_random): |
|
459 | user_util, backend_random): | |
446 | user = user_util.create_user() |
|
460 | user = user_util.create_user() | |
447 |
|
461 | |||
448 | RepoModel().grant_user_permission( |
|
462 | RepoModel().grant_user_permission( | |
449 | backend_random.repo, user, 'repository.write') |
|
463 | backend_random.repo, user, 'repository.write') | |
|
464 | Session().commit() | |||
450 |
|
465 | |||
451 | calculator = auth.PermissionCalculator( |
|
466 | calculator = auth.PermissionCalculator( | |
452 | user.user_id, {}, False, False, False, 'higherwin') |
|
467 | user.user_id, {}, False, False, False, 'higherwin') | |
453 | calculator._calculate_repository_permissions() |
|
468 | calculator._calculate_repository_permissions() | |
454 |
|
469 | |||
455 |
|
470 | |||
456 | def test_permission_calculator_repo_group_permissions_robustness_from_group( |
|
471 | def test_permission_calculator_repo_group_permissions_robustness_from_group( | |
457 | user_util, backend_random): |
|
472 | user_util, backend_random): | |
458 | user, user_group = user_util.create_user_with_group() |
|
473 | user, user_group = user_util.create_user_with_group() | |
459 | repo_group = user_util.create_repo_group() |
|
474 | repo_group = user_util.create_repo_group() | |
460 |
|
475 | |||
461 | user_util.grant_user_group_permission_to_repo_group( |
|
476 | user_util.grant_user_group_permission_to_repo_group( | |
462 | repo_group, user_group, 'group.write') |
|
477 | repo_group, user_group, 'group.write') | |
463 |
|
478 | |||
464 | calculator = auth.PermissionCalculator( |
|
479 | calculator = auth.PermissionCalculator( | |
465 | user.user_id, {}, False, False, False, 'higherwin') |
|
480 | user.user_id, {}, False, False, False, 'higherwin') | |
466 | calculator._calculate_repository_group_permissions() |
|
481 | calculator._calculate_repository_group_permissions() | |
467 |
|
482 | |||
468 |
|
483 | |||
469 | def test_permission_calculator_repo_group_permissions_robustness_from_user( |
|
484 | def test_permission_calculator_repo_group_permissions_robustness_from_user( | |
470 | user_util, backend_random): |
|
485 | user_util, backend_random): | |
471 | user = user_util.create_user() |
|
486 | user = user_util.create_user() | |
472 | repo_group = user_util.create_repo_group() |
|
487 | repo_group = user_util.create_repo_group() | |
473 |
|
488 | |||
474 | user_util.grant_user_permission_to_repo_group( |
|
489 | user_util.grant_user_permission_to_repo_group( | |
475 | repo_group, user, 'group.write') |
|
490 | repo_group, user, 'group.write') | |
476 |
|
491 | |||
477 | calculator = auth.PermissionCalculator( |
|
492 | calculator = auth.PermissionCalculator( | |
478 | user.user_id, {}, False, False, False, 'higherwin') |
|
493 | user.user_id, {}, False, False, False, 'higherwin') | |
479 | calculator._calculate_repository_group_permissions() |
|
494 | calculator._calculate_repository_group_permissions() | |
480 |
|
495 | |||
481 |
|
496 | |||
482 | def test_permission_calculator_user_group_permissions_robustness_from_group( |
|
497 | def test_permission_calculator_user_group_permissions_robustness_from_group( | |
483 | user_util, backend_random): |
|
498 | user_util, backend_random): | |
484 | user, user_group = user_util.create_user_with_group() |
|
499 | user, user_group = user_util.create_user_with_group() | |
485 | target_user_group = user_util.create_user_group() |
|
500 | target_user_group = user_util.create_user_group() | |
486 |
|
501 | |||
487 | user_util.grant_user_group_permission_to_user_group( |
|
502 | user_util.grant_user_group_permission_to_user_group( | |
488 | target_user_group, user_group, 'usergroup.write') |
|
503 | target_user_group, user_group, 'usergroup.write') | |
489 |
|
504 | |||
490 | calculator = auth.PermissionCalculator( |
|
505 | calculator = auth.PermissionCalculator( | |
491 | user.user_id, {}, False, False, False, 'higherwin') |
|
506 | user.user_id, {}, False, False, False, 'higherwin') | |
492 | calculator._calculate_user_group_permissions() |
|
507 | calculator._calculate_user_group_permissions() | |
493 |
|
508 | |||
494 |
|
509 | |||
495 | def test_permission_calculator_user_group_permissions_robustness_from_user( |
|
510 | def test_permission_calculator_user_group_permissions_robustness_from_user( | |
496 | user_util, backend_random): |
|
511 | user_util, backend_random): | |
497 | user = user_util.create_user() |
|
512 | user = user_util.create_user() | |
498 | target_user_group = user_util.create_user_group() |
|
513 | target_user_group = user_util.create_user_group() | |
499 |
|
514 | |||
500 | user_util.grant_user_permission_to_user_group( |
|
515 | user_util.grant_user_permission_to_user_group( | |
501 | target_user_group, user, 'usergroup.write') |
|
516 | target_user_group, user, 'usergroup.write') | |
502 |
|
517 | |||
503 | calculator = auth.PermissionCalculator( |
|
518 | calculator = auth.PermissionCalculator( | |
504 | user.user_id, {}, False, False, False, 'higherwin') |
|
519 | user.user_id, {}, False, False, False, 'higherwin') | |
505 | calculator._calculate_user_group_permissions() |
|
520 | calculator._calculate_user_group_permissions() | |
506 |
|
521 | |||
507 |
|
522 | |||
508 | @pytest.mark.parametrize("algo, new_permission, old_permission, expected", [ |
|
523 | @pytest.mark.parametrize("algo, new_permission, old_permission, expected", [ | |
509 | ('higherwin', 'repository.none', 'repository.none', 'repository.none'), |
|
524 | ('higherwin', 'repository.none', 'repository.none', 'repository.none'), | |
510 | ('higherwin', 'repository.read', 'repository.none', 'repository.read'), |
|
525 | ('higherwin', 'repository.read', 'repository.none', 'repository.read'), | |
511 | ('lowerwin', 'repository.write', 'repository.write', 'repository.write'), |
|
526 | ('lowerwin', 'repository.write', 'repository.write', 'repository.write'), | |
512 | ('lowerwin', 'repository.read', 'repository.write', 'repository.read'), |
|
527 | ('lowerwin', 'repository.read', 'repository.write', 'repository.read'), | |
513 | ]) |
|
528 | ]) | |
514 | def test_permission_calculator_choose_permission( |
|
529 | def test_permission_calculator_choose_permission( | |
515 | user_regular, algo, new_permission, old_permission, expected): |
|
530 | user_regular, algo, new_permission, old_permission, expected): | |
516 | calculator = auth.PermissionCalculator( |
|
531 | calculator = auth.PermissionCalculator( | |
517 | user_regular.user_id, {}, False, False, False, algo) |
|
532 | user_regular.user_id, {}, False, False, False, algo) | |
518 | result = calculator._choose_permission(new_permission, old_permission) |
|
533 | result = calculator._choose_permission(new_permission, old_permission) | |
519 | assert result == expected |
|
534 | assert result == expected | |
520 |
|
535 | |||
521 |
|
536 | |||
522 | def test_permission_calculator_choose_permission_raises_on_wrong_algo( |
|
537 | def test_permission_calculator_choose_permission_raises_on_wrong_algo( | |
523 | user_regular): |
|
538 | user_regular): | |
524 | calculator = auth.PermissionCalculator( |
|
539 | calculator = auth.PermissionCalculator( | |
525 | user_regular.user_id, {}, False, False, False, 'invalid') |
|
540 | user_regular.user_id, {}, False, False, False, 'invalid') | |
526 | result = calculator._choose_permission( |
|
541 | result = calculator._choose_permission( | |
527 | 'repository.read', 'repository.read') |
|
542 | 'repository.read', 'repository.read') | |
528 | # TODO: johbo: This documents the existing behavior. Think of an |
|
543 | # TODO: johbo: This documents the existing behavior. Think of an | |
529 | # improvement. |
|
544 | # improvement. | |
530 | assert result is None |
|
545 | assert result is None | |
531 |
|
546 | |||
532 |
|
547 | |||
533 | def test_auth_user_get_cookie_store_for_normal_user(user_util): |
|
548 | def test_auth_user_get_cookie_store_for_normal_user(user_util): | |
534 | user = user_util.create_user() |
|
549 | user = user_util.create_user() | |
535 | auth_user = auth.AuthUser(user_id=user.user_id) |
|
550 | auth_user = auth.AuthUser(user_id=user.user_id) | |
536 | expected_data = { |
|
551 | expected_data = { | |
537 | 'username': user.username, |
|
552 | 'username': user.username, | |
538 | 'user_id': user.user_id, |
|
553 | 'user_id': user.user_id, | |
539 | 'password': md5(user.password), |
|
554 | 'password': md5(user.password), | |
540 | 'is_authenticated': False |
|
555 | 'is_authenticated': False | |
541 | } |
|
556 | } | |
542 | assert auth_user.get_cookie_store() == expected_data |
|
557 | assert auth_user.get_cookie_store() == expected_data | |
543 |
|
558 | |||
544 |
|
559 | |||
545 | def test_auth_user_get_cookie_store_for_default_user(): |
|
560 | def test_auth_user_get_cookie_store_for_default_user(): | |
546 | default_user = User.get_default_user() |
|
561 | default_user = User.get_default_user() | |
547 | auth_user = auth.AuthUser() |
|
562 | auth_user = auth.AuthUser() | |
548 | expected_data = { |
|
563 | expected_data = { | |
549 | 'username': User.DEFAULT_USER, |
|
564 | 'username': User.DEFAULT_USER, | |
550 | 'user_id': default_user.user_id, |
|
565 | 'user_id': default_user.user_id, | |
551 | 'password': md5(default_user.password), |
|
566 | 'password': md5(default_user.password), | |
552 | 'is_authenticated': True |
|
567 | 'is_authenticated': True | |
553 | } |
|
568 | } | |
554 | assert auth_user.get_cookie_store() == expected_data |
|
569 | assert auth_user.get_cookie_store() == expected_data | |
555 |
|
570 | |||
556 |
|
571 | |||
557 | def get_permissions(user, **kwargs): |
|
572 | def get_permissions(user, **kwargs): | |
558 | """ |
|
573 | """ | |
559 | Utility filling in useful defaults into the call to `_cached_perms_data`. |
|
574 | Utility filling in useful defaults into the call to `_cached_perms_data`. | |
560 |
|
575 | |||
561 | Fill in `**kwargs` if specific values are needed for a test. |
|
576 | Fill in `**kwargs` if specific values are needed for a test. | |
562 | """ |
|
577 | """ | |
563 | call_args = { |
|
578 | call_args = { | |
564 | 'user_id': user.user_id, |
|
579 | 'user_id': user.user_id, | |
565 | 'scope': {}, |
|
580 | 'scope': {}, | |
566 | 'user_is_admin': False, |
|
581 | 'user_is_admin': False, | |
567 | 'user_inherit_default_permissions': False, |
|
582 | 'user_inherit_default_permissions': False, | |
568 | 'explicit': False, |
|
583 | 'explicit': False, | |
569 | 'algo': 'higherwin', |
|
584 | 'algo': 'higherwin', | |
570 | 'calculate_super_admin': False, |
|
585 | 'calculate_super_admin': False, | |
571 | } |
|
586 | } | |
572 | call_args.update(kwargs) |
|
587 | call_args.update(kwargs) | |
573 | permissions = auth._cached_perms_data(**call_args) |
|
588 | permissions = auth._cached_perms_data(**call_args) | |
574 | return permissions |
|
589 | return permissions | |
575 |
|
590 | |||
576 |
|
591 | |||
577 | class TestGenerateAuthToken(object): |
|
592 | class TestGenerateAuthToken(object): | |
578 | def test_salt_is_used_when_specified(self): |
|
593 | def test_salt_is_used_when_specified(self): | |
579 | salt = 'abcde' |
|
594 | salt = 'abcde' | |
580 | user_name = 'test_user' |
|
595 | user_name = 'test_user' | |
581 | result = auth.generate_auth_token(user_name, salt) |
|
596 | result = auth.generate_auth_token(user_name, salt) | |
582 | expected_result = sha1(user_name + salt).hexdigest() |
|
597 | expected_result = sha1(user_name + salt).hexdigest() | |
583 | assert result == expected_result |
|
598 | assert result == expected_result | |
584 |
|
599 | |||
585 | def test_salt_is_geneated_when_not_specified(self): |
|
600 | def test_salt_is_geneated_when_not_specified(self): | |
586 | user_name = 'test_user' |
|
601 | user_name = 'test_user' | |
587 | random_salt = os.urandom(16) |
|
602 | random_salt = os.urandom(16) | |
588 | with patch.object(auth, 'os') as os_mock: |
|
603 | with patch.object(auth, 'os') as os_mock: | |
589 | os_mock.urandom.return_value = random_salt |
|
604 | os_mock.urandom.return_value = random_salt | |
590 | result = auth.generate_auth_token(user_name) |
|
605 | result = auth.generate_auth_token(user_name) | |
591 | expected_result = sha1(user_name + random_salt).hexdigest() |
|
606 | expected_result = sha1(user_name + random_salt).hexdigest() | |
592 | assert result == expected_result |
|
607 | assert result == expected_result | |
593 |
|
608 | |||
594 |
|
609 | |||
595 | @pytest.mark.parametrize("test_token, test_roles, auth_result, expected_tokens", [ |
|
610 | @pytest.mark.parametrize("test_token, test_roles, auth_result, expected_tokens", [ | |
596 | ('', None, False, |
|
611 | ('', None, False, | |
597 | []), |
|
612 | []), | |
598 | ('wrongtoken', None, False, |
|
613 | ('wrongtoken', None, False, | |
599 | []), |
|
614 | []), | |
600 | ('abracadabra_vcs', [AuthTokenModel.cls.ROLE_API], False, |
|
615 | ('abracadabra_vcs', [AuthTokenModel.cls.ROLE_API], False, | |
601 | [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1)]), |
|
616 | [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1)]), | |
602 | ('abracadabra_api', [AuthTokenModel.cls.ROLE_API], True, |
|
617 | ('abracadabra_api', [AuthTokenModel.cls.ROLE_API], True, | |
603 | [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1)]), |
|
618 | [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1)]), | |
604 | ('abracadabra_api', [AuthTokenModel.cls.ROLE_API], True, |
|
619 | ('abracadabra_api', [AuthTokenModel.cls.ROLE_API], True, | |
605 | [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1), |
|
620 | [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1), | |
606 | ('abracadabra_http', AuthTokenModel.cls.ROLE_HTTP, -1)]), |
|
621 | ('abracadabra_http', AuthTokenModel.cls.ROLE_HTTP, -1)]), | |
607 | ]) |
|
622 | ]) | |
608 | def test_auth_by_token(test_token, test_roles, auth_result, expected_tokens, |
|
623 | def test_auth_by_token(test_token, test_roles, auth_result, expected_tokens, | |
609 | user_util): |
|
624 | user_util): | |
610 | user = user_util.create_user() |
|
625 | user = user_util.create_user() | |
611 | user_id = user.user_id |
|
626 | user_id = user.user_id | |
612 | for token, role, expires in expected_tokens: |
|
627 | for token, role, expires in expected_tokens: | |
613 | new_token = AuthTokenModel().create(user_id, 'test-token', expires, role) |
|
628 | new_token = AuthTokenModel().create(user_id, u'test-token', expires, role) | |
614 | new_token.api_key = token # inject known name for testing... |
|
629 | new_token.api_key = token # inject known name for testing... | |
615 |
|
630 | |||
616 | assert auth_result == user.authenticate_by_token( |
|
631 | assert auth_result == user.authenticate_by_token( | |
617 | test_token, roles=test_roles) |
|
632 | test_token, roles=test_roles) |
@@ -1,1080 +1,1143 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import mock |
|
21 | import mock | |
22 | import pytest |
|
22 | import pytest | |
23 |
|
23 | |||
24 | from rhodecode.lib.utils2 import str2bool |
|
24 | from rhodecode.lib.utils2 import str2bool | |
25 | from rhodecode.model.meta import Session |
|
25 | from rhodecode.model.meta import Session | |
26 | from rhodecode.model.settings import VcsSettingsModel, UiSetting |
|
26 | from rhodecode.model.settings import VcsSettingsModel, UiSetting | |
27 |
|
27 | |||
28 |
|
28 | |||
29 | HOOKS_FORM_DATA = { |
|
29 | HOOKS_FORM_DATA = { | |
30 | 'hooks_changegroup_repo_size': True, |
|
30 | 'hooks_changegroup_repo_size': True, | |
31 | 'hooks_changegroup_push_logger': True, |
|
31 | 'hooks_changegroup_push_logger': True, | |
32 | 'hooks_outgoing_pull_logger': True |
|
32 | 'hooks_outgoing_pull_logger': True | |
33 | } |
|
33 | } | |
34 |
|
34 | |||
35 | SVN_FORM_DATA = { |
|
35 | SVN_FORM_DATA = { | |
36 | 'new_svn_branch': 'test-branch', |
|
36 | 'new_svn_branch': 'test-branch', | |
37 | 'new_svn_tag': 'test-tag' |
|
37 | 'new_svn_tag': 'test-tag' | |
38 | } |
|
38 | } | |
39 |
|
39 | |||
40 | GENERAL_FORM_DATA = { |
|
40 | GENERAL_FORM_DATA = { | |
41 | 'rhodecode_pr_merge_enabled': True, |
|
41 | 'rhodecode_pr_merge_enabled': True, | |
42 | 'rhodecode_use_outdated_comments': True, |
|
42 | 'rhodecode_use_outdated_comments': True, | |
43 | 'rhodecode_hg_use_rebase_for_merging': True, |
|
43 | 'rhodecode_hg_use_rebase_for_merging': True, | |
44 | 'rhodecode_hg_close_branch_before_merging': True, |
|
44 | 'rhodecode_hg_close_branch_before_merging': True, | |
45 | 'rhodecode_git_use_rebase_for_merging': True, |
|
45 | 'rhodecode_git_use_rebase_for_merging': True, | |
46 | 'rhodecode_git_close_branch_before_merging': True, |
|
46 | 'rhodecode_git_close_branch_before_merging': True, | |
47 | 'rhodecode_diff_cache': True, |
|
47 | 'rhodecode_diff_cache': True, | |
48 | } |
|
48 | } | |
49 |
|
49 | |||
50 |
|
50 | |||
51 | class TestInheritGlobalSettingsProperty(object): |
|
51 | class TestInheritGlobalSettingsProperty(object): | |
52 | def test_get_raises_exception_when_repository_not_specified(self): |
|
52 | def test_get_raises_exception_when_repository_not_specified(self): | |
53 | model = VcsSettingsModel() |
|
53 | model = VcsSettingsModel() | |
54 | with pytest.raises(Exception) as exc_info: |
|
54 | with pytest.raises(Exception) as exc_info: | |
55 | model.inherit_global_settings |
|
55 | model.inherit_global_settings | |
56 | assert str(exc_info.value) == 'Repository is not specified' |
|
56 | assert str(exc_info.value) == 'Repository is not specified' | |
57 |
|
57 | |||
58 | def test_true_is_returned_when_value_is_not_found(self, repo_stub): |
|
58 | def test_true_is_returned_when_value_is_not_found(self, repo_stub): | |
59 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
59 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
60 | assert model.inherit_global_settings is True |
|
60 | assert model.inherit_global_settings is True | |
61 |
|
61 | |||
62 | def test_value_is_returned(self, repo_stub, settings_util): |
|
62 | def test_value_is_returned(self, repo_stub, settings_util): | |
63 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
63 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
64 | settings_util.create_repo_rhodecode_setting( |
|
64 | settings_util.create_repo_rhodecode_setting( | |
65 | repo_stub, VcsSettingsModel.INHERIT_SETTINGS, False, 'bool') |
|
65 | repo_stub, VcsSettingsModel.INHERIT_SETTINGS, False, 'bool') | |
66 | assert model.inherit_global_settings is False |
|
66 | assert model.inherit_global_settings is False | |
67 |
|
67 | |||
68 | def test_value_is_set(self, repo_stub): |
|
68 | def test_value_is_set(self, repo_stub): | |
69 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
69 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
70 | model.inherit_global_settings = False |
|
70 | model.inherit_global_settings = False | |
71 | setting = model.repo_settings.get_setting_by_name( |
|
71 | setting = model.repo_settings.get_setting_by_name( | |
72 | VcsSettingsModel.INHERIT_SETTINGS) |
|
72 | VcsSettingsModel.INHERIT_SETTINGS) | |
73 | try: |
|
73 | try: | |
74 | assert setting.app_settings_type == 'bool' |
|
74 | assert setting.app_settings_type == 'bool' | |
75 | assert setting.app_settings_value is False |
|
75 | assert setting.app_settings_value is False | |
76 | finally: |
|
76 | finally: | |
77 | Session().delete(setting) |
|
77 | Session().delete(setting) | |
78 | Session().commit() |
|
78 | Session().commit() | |
79 |
|
79 | |||
80 | def test_set_raises_exception_when_repository_not_specified(self): |
|
80 | def test_set_raises_exception_when_repository_not_specified(self): | |
81 | model = VcsSettingsModel() |
|
81 | model = VcsSettingsModel() | |
82 | with pytest.raises(Exception) as exc_info: |
|
82 | with pytest.raises(Exception) as exc_info: | |
83 | model.inherit_global_settings = False |
|
83 | model.inherit_global_settings = False | |
84 | assert str(exc_info.value) == 'Repository is not specified' |
|
84 | assert str(exc_info.value) == 'Repository is not specified' | |
85 |
|
85 | |||
86 |
|
86 | |||
87 | class TestVcsSettingsModel(object): |
|
87 | class TestVcsSettingsModel(object): | |
88 | def test_global_svn_branch_patterns(self): |
|
88 | def test_global_svn_branch_patterns(self): | |
89 | model = VcsSettingsModel() |
|
89 | model = VcsSettingsModel() | |
90 | expected_result = {'test': 'test'} |
|
90 | expected_result = {'test': 'test'} | |
91 | with mock.patch.object(model, 'global_settings') as settings_mock: |
|
91 | with mock.patch.object(model, 'global_settings') as settings_mock: | |
92 | get_settings = settings_mock.get_ui_by_section |
|
92 | get_settings = settings_mock.get_ui_by_section | |
93 | get_settings.return_value = expected_result |
|
93 | get_settings.return_value = expected_result | |
94 | settings_mock.return_value = expected_result |
|
94 | settings_mock.return_value = expected_result | |
95 | result = model.get_global_svn_branch_patterns() |
|
95 | result = model.get_global_svn_branch_patterns() | |
96 |
|
96 | |||
97 | get_settings.assert_called_once_with(model.SVN_BRANCH_SECTION) |
|
97 | get_settings.assert_called_once_with(model.SVN_BRANCH_SECTION) | |
98 | assert expected_result == result |
|
98 | assert expected_result == result | |
99 |
|
99 | |||
100 | def test_repo_svn_branch_patterns(self): |
|
100 | def test_repo_svn_branch_patterns(self): | |
101 | model = VcsSettingsModel() |
|
101 | model = VcsSettingsModel() | |
102 | expected_result = {'test': 'test'} |
|
102 | expected_result = {'test': 'test'} | |
103 | with mock.patch.object(model, 'repo_settings') as settings_mock: |
|
103 | with mock.patch.object(model, 'repo_settings') as settings_mock: | |
104 | get_settings = settings_mock.get_ui_by_section |
|
104 | get_settings = settings_mock.get_ui_by_section | |
105 | get_settings.return_value = expected_result |
|
105 | get_settings.return_value = expected_result | |
106 | settings_mock.return_value = expected_result |
|
106 | settings_mock.return_value = expected_result | |
107 | result = model.get_repo_svn_branch_patterns() |
|
107 | result = model.get_repo_svn_branch_patterns() | |
108 |
|
108 | |||
109 | get_settings.assert_called_once_with(model.SVN_BRANCH_SECTION) |
|
109 | get_settings.assert_called_once_with(model.SVN_BRANCH_SECTION) | |
110 | assert expected_result == result |
|
110 | assert expected_result == result | |
111 |
|
111 | |||
112 | def test_repo_svn_branch_patterns_raises_exception_when_repo_is_not_set( |
|
112 | def test_repo_svn_branch_patterns_raises_exception_when_repo_is_not_set( | |
113 | self): |
|
113 | self): | |
114 | model = VcsSettingsModel() |
|
114 | model = VcsSettingsModel() | |
115 | with pytest.raises(Exception) as exc_info: |
|
115 | with pytest.raises(Exception) as exc_info: | |
116 | model.get_repo_svn_branch_patterns() |
|
116 | model.get_repo_svn_branch_patterns() | |
117 | assert str(exc_info.value) == 'Repository is not specified' |
|
117 | assert str(exc_info.value) == 'Repository is not specified' | |
118 |
|
118 | |||
119 | def test_global_svn_tag_patterns(self): |
|
119 | def test_global_svn_tag_patterns(self): | |
120 | model = VcsSettingsModel() |
|
120 | model = VcsSettingsModel() | |
121 | expected_result = {'test': 'test'} |
|
121 | expected_result = {'test': 'test'} | |
122 | with mock.patch.object(model, 'global_settings') as settings_mock: |
|
122 | with mock.patch.object(model, 'global_settings') as settings_mock: | |
123 | get_settings = settings_mock.get_ui_by_section |
|
123 | get_settings = settings_mock.get_ui_by_section | |
124 | get_settings.return_value = expected_result |
|
124 | get_settings.return_value = expected_result | |
125 | settings_mock.return_value = expected_result |
|
125 | settings_mock.return_value = expected_result | |
126 | result = model.get_global_svn_tag_patterns() |
|
126 | result = model.get_global_svn_tag_patterns() | |
127 |
|
127 | |||
128 | get_settings.assert_called_once_with(model.SVN_TAG_SECTION) |
|
128 | get_settings.assert_called_once_with(model.SVN_TAG_SECTION) | |
129 | assert expected_result == result |
|
129 | assert expected_result == result | |
130 |
|
130 | |||
131 | def test_repo_svn_tag_patterns(self): |
|
131 | def test_repo_svn_tag_patterns(self): | |
132 | model = VcsSettingsModel() |
|
132 | model = VcsSettingsModel() | |
133 | expected_result = {'test': 'test'} |
|
133 | expected_result = {'test': 'test'} | |
134 | with mock.patch.object(model, 'repo_settings') as settings_mock: |
|
134 | with mock.patch.object(model, 'repo_settings') as settings_mock: | |
135 | get_settings = settings_mock.get_ui_by_section |
|
135 | get_settings = settings_mock.get_ui_by_section | |
136 | get_settings.return_value = expected_result |
|
136 | get_settings.return_value = expected_result | |
137 | settings_mock.return_value = expected_result |
|
137 | settings_mock.return_value = expected_result | |
138 | result = model.get_repo_svn_tag_patterns() |
|
138 | result = model.get_repo_svn_tag_patterns() | |
139 |
|
139 | |||
140 | get_settings.assert_called_once_with(model.SVN_TAG_SECTION) |
|
140 | get_settings.assert_called_once_with(model.SVN_TAG_SECTION) | |
141 | assert expected_result == result |
|
141 | assert expected_result == result | |
142 |
|
142 | |||
143 | def test_repo_svn_tag_patterns_raises_exception_when_repo_is_not_set(self): |
|
143 | def test_repo_svn_tag_patterns_raises_exception_when_repo_is_not_set(self): | |
144 | model = VcsSettingsModel() |
|
144 | model = VcsSettingsModel() | |
145 | with pytest.raises(Exception) as exc_info: |
|
145 | with pytest.raises(Exception) as exc_info: | |
146 | model.get_repo_svn_tag_patterns() |
|
146 | model.get_repo_svn_tag_patterns() | |
147 | assert str(exc_info.value) == 'Repository is not specified' |
|
147 | assert str(exc_info.value) == 'Repository is not specified' | |
148 |
|
148 | |||
149 | def test_get_global_settings(self): |
|
149 | def test_get_global_settings(self): | |
150 | expected_result = {'test': 'test'} |
|
150 | expected_result = {'test': 'test'} | |
151 | model = VcsSettingsModel() |
|
151 | model = VcsSettingsModel() | |
152 | with mock.patch.object(model, '_collect_all_settings') as collect_mock: |
|
152 | with mock.patch.object(model, '_collect_all_settings') as collect_mock: | |
153 | collect_mock.return_value = expected_result |
|
153 | collect_mock.return_value = expected_result | |
154 | result = model.get_global_settings() |
|
154 | result = model.get_global_settings() | |
155 |
|
155 | |||
156 | collect_mock.assert_called_once_with(global_=True) |
|
156 | collect_mock.assert_called_once_with(global_=True) | |
157 | assert result == expected_result |
|
157 | assert result == expected_result | |
158 |
|
158 | |||
159 | def test_get_repo_settings(self, repo_stub): |
|
159 | def test_get_repo_settings(self, repo_stub): | |
160 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
160 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
161 | expected_result = {'test': 'test'} |
|
161 | expected_result = {'test': 'test'} | |
162 | with mock.patch.object(model, '_collect_all_settings') as collect_mock: |
|
162 | with mock.patch.object(model, '_collect_all_settings') as collect_mock: | |
163 | collect_mock.return_value = expected_result |
|
163 | collect_mock.return_value = expected_result | |
164 | result = model.get_repo_settings() |
|
164 | result = model.get_repo_settings() | |
165 |
|
165 | |||
166 | collect_mock.assert_called_once_with(global_=False) |
|
166 | collect_mock.assert_called_once_with(global_=False) | |
167 | assert result == expected_result |
|
167 | assert result == expected_result | |
168 |
|
168 | |||
169 | @pytest.mark.parametrize('settings, global_', [ |
|
169 | @pytest.mark.parametrize('settings, global_', [ | |
170 | ('global_settings', True), |
|
170 | ('global_settings', True), | |
171 | ('repo_settings', False) |
|
171 | ('repo_settings', False) | |
172 | ]) |
|
172 | ]) | |
173 | def test_collect_all_settings(self, settings, global_): |
|
173 | def test_collect_all_settings(self, settings, global_): | |
174 | model = VcsSettingsModel() |
|
174 | model = VcsSettingsModel() | |
175 | result_mock = self._mock_result() |
|
175 | result_mock = self._mock_result() | |
176 |
|
176 | |||
177 | settings_patch = mock.patch.object(model, settings) |
|
177 | settings_patch = mock.patch.object(model, settings) | |
178 | with settings_patch as settings_mock: |
|
178 | with settings_patch as settings_mock: | |
179 | settings_mock.get_ui_by_section_and_key.return_value = result_mock |
|
179 | settings_mock.get_ui_by_section_and_key.return_value = result_mock | |
180 | settings_mock.get_setting_by_name.return_value = result_mock |
|
180 | settings_mock.get_setting_by_name.return_value = result_mock | |
181 | result = model._collect_all_settings(global_=global_) |
|
181 | result = model._collect_all_settings(global_=global_) | |
182 |
|
182 | |||
183 | ui_settings = model.HG_SETTINGS + model.GIT_SETTINGS + model.HOOKS_SETTINGS |
|
183 | ui_settings = model.HG_SETTINGS + model.GIT_SETTINGS + model.HOOKS_SETTINGS | |
184 | self._assert_get_settings_calls( |
|
184 | self._assert_get_settings_calls( | |
185 | settings_mock, ui_settings, model.GENERAL_SETTINGS) |
|
185 | settings_mock, ui_settings, model.GENERAL_SETTINGS) | |
186 | self._assert_collect_all_settings_result( |
|
186 | self._assert_collect_all_settings_result( | |
187 | ui_settings, model.GENERAL_SETTINGS, result) |
|
187 | ui_settings, model.GENERAL_SETTINGS, result) | |
188 |
|
188 | |||
189 | @pytest.mark.parametrize('settings, global_', [ |
|
189 | @pytest.mark.parametrize('settings, global_', [ | |
190 | ('global_settings', True), |
|
190 | ('global_settings', True), | |
191 | ('repo_settings', False) |
|
191 | ('repo_settings', False) | |
192 | ]) |
|
192 | ]) | |
193 | def test_collect_all_settings_without_empty_value(self, settings, global_): |
|
193 | def test_collect_all_settings_without_empty_value(self, settings, global_): | |
194 | model = VcsSettingsModel() |
|
194 | model = VcsSettingsModel() | |
195 |
|
195 | |||
196 | settings_patch = mock.patch.object(model, settings) |
|
196 | settings_patch = mock.patch.object(model, settings) | |
197 | with settings_patch as settings_mock: |
|
197 | with settings_patch as settings_mock: | |
198 | settings_mock.get_ui_by_section_and_key.return_value = None |
|
198 | settings_mock.get_ui_by_section_and_key.return_value = None | |
199 | settings_mock.get_setting_by_name.return_value = None |
|
199 | settings_mock.get_setting_by_name.return_value = None | |
200 | result = model._collect_all_settings(global_=global_) |
|
200 | result = model._collect_all_settings(global_=global_) | |
201 |
|
201 | |||
202 | assert result == {} |
|
202 | assert result == {} | |
203 |
|
203 | |||
204 | def _mock_result(self): |
|
204 | def _mock_result(self): | |
205 | result_mock = mock.Mock() |
|
205 | result_mock = mock.Mock() | |
206 | result_mock.ui_value = 'ui_value' |
|
206 | result_mock.ui_value = 'ui_value' | |
207 | result_mock.ui_active = True |
|
207 | result_mock.ui_active = True | |
208 | result_mock.app_settings_value = 'setting_value' |
|
208 | result_mock.app_settings_value = 'setting_value' | |
209 | return result_mock |
|
209 | return result_mock | |
210 |
|
210 | |||
211 | def _assert_get_settings_calls( |
|
211 | def _assert_get_settings_calls( | |
212 | self, settings_mock, ui_settings, general_settings): |
|
212 | self, settings_mock, ui_settings, general_settings): | |
213 | assert ( |
|
213 | assert ( | |
214 | settings_mock.get_ui_by_section_and_key.call_count == |
|
214 | settings_mock.get_ui_by_section_and_key.call_count == | |
215 | len(ui_settings)) |
|
215 | len(ui_settings)) | |
216 | assert ( |
|
216 | assert ( | |
217 | settings_mock.get_setting_by_name.call_count == |
|
217 | settings_mock.get_setting_by_name.call_count == | |
218 | len(general_settings)) |
|
218 | len(general_settings)) | |
219 |
|
219 | |||
220 | for section, key in ui_settings: |
|
220 | for section, key in ui_settings: | |
221 | expected_call = mock.call(section, key) |
|
221 | expected_call = mock.call(section, key) | |
222 | assert ( |
|
222 | assert ( | |
223 | expected_call in |
|
223 | expected_call in | |
224 | settings_mock.get_ui_by_section_and_key.call_args_list) |
|
224 | settings_mock.get_ui_by_section_and_key.call_args_list) | |
225 |
|
225 | |||
226 | for name in general_settings: |
|
226 | for name in general_settings: | |
227 | expected_call = mock.call(name) |
|
227 | expected_call = mock.call(name) | |
228 | assert ( |
|
228 | assert ( | |
229 | expected_call in |
|
229 | expected_call in | |
230 | settings_mock.get_setting_by_name.call_args_list) |
|
230 | settings_mock.get_setting_by_name.call_args_list) | |
231 |
|
231 | |||
232 | def _assert_collect_all_settings_result( |
|
232 | def _assert_collect_all_settings_result( | |
233 | self, ui_settings, general_settings, result): |
|
233 | self, ui_settings, general_settings, result): | |
234 | expected_result = {} |
|
234 | expected_result = {} | |
235 | for section, key in ui_settings: |
|
235 | for section, key in ui_settings: | |
236 | key = '{}_{}'.format(section, key.replace('.', '_')) |
|
236 | key = '{}_{}'.format(section, key.replace('.', '_')) | |
237 |
|
237 | |||
238 | if section in ('extensions', 'hooks'): |
|
238 | if section in ('extensions', 'hooks'): | |
239 | value = True |
|
239 | value = True | |
240 | elif key in ['vcs_git_lfs_enabled']: |
|
240 | elif key in ['vcs_git_lfs_enabled']: | |
241 | value = True |
|
241 | value = True | |
242 | else: |
|
242 | else: | |
243 | value = 'ui_value' |
|
243 | value = 'ui_value' | |
244 | expected_result[key] = value |
|
244 | expected_result[key] = value | |
245 |
|
245 | |||
246 | for name in general_settings: |
|
246 | for name in general_settings: | |
247 | key = 'rhodecode_' + name |
|
247 | key = 'rhodecode_' + name | |
248 | expected_result[key] = 'setting_value' |
|
248 | expected_result[key] = 'setting_value' | |
249 |
|
249 | |||
250 | assert expected_result == result |
|
250 | assert expected_result == result | |
251 |
|
251 | |||
252 |
|
252 | |||
253 | class TestCreateOrUpdateRepoHookSettings(object): |
|
253 | class TestCreateOrUpdateRepoHookSettings(object): | |
254 | def test_create_when_no_repo_object_found(self, repo_stub): |
|
254 | def test_create_when_no_repo_object_found(self, repo_stub): | |
255 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
255 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
256 |
|
256 | |||
257 | self._create_settings(model, HOOKS_FORM_DATA) |
|
257 | self._create_settings(model, HOOKS_FORM_DATA) | |
258 |
|
258 | |||
259 | cleanup = [] |
|
259 | cleanup = [] | |
260 | try: |
|
260 | try: | |
261 | for section, key in model.HOOKS_SETTINGS: |
|
261 | for section, key in model.HOOKS_SETTINGS: | |
262 | ui = model.repo_settings.get_ui_by_section_and_key( |
|
262 | ui = model.repo_settings.get_ui_by_section_and_key( | |
263 | section, key) |
|
263 | section, key) | |
264 | assert ui.ui_active is True |
|
264 | assert ui.ui_active is True | |
265 | cleanup.append(ui) |
|
265 | cleanup.append(ui) | |
266 | finally: |
|
266 | finally: | |
267 | for ui in cleanup: |
|
267 | for ui in cleanup: | |
268 | Session().delete(ui) |
|
268 | Session().delete(ui) | |
269 | Session().commit() |
|
269 | Session().commit() | |
270 |
|
270 | |||
271 | def test_create_raises_exception_when_data_incomplete(self, repo_stub): |
|
271 | def test_create_raises_exception_when_data_incomplete(self, repo_stub): | |
272 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
272 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
273 |
|
273 | |||
274 | deleted_key = 'hooks_changegroup_repo_size' |
|
274 | deleted_key = 'hooks_changegroup_repo_size' | |
275 | data = HOOKS_FORM_DATA.copy() |
|
275 | data = HOOKS_FORM_DATA.copy() | |
276 | data.pop(deleted_key) |
|
276 | data.pop(deleted_key) | |
277 |
|
277 | |||
278 | with pytest.raises(ValueError) as exc_info: |
|
278 | with pytest.raises(ValueError) as exc_info: | |
279 | model.create_or_update_repo_hook_settings(data) |
|
279 | model.create_or_update_repo_hook_settings(data) | |
|
280 | Session().commit() | |||
|
281 | ||||
280 | msg = 'The given data does not contain {} key'.format(deleted_key) |
|
282 | msg = 'The given data does not contain {} key'.format(deleted_key) | |
281 | assert str(exc_info.value) == msg |
|
283 | assert str(exc_info.value) == msg | |
282 |
|
284 | |||
283 | def test_update_when_repo_object_found(self, repo_stub, settings_util): |
|
285 | def test_update_when_repo_object_found(self, repo_stub, settings_util): | |
284 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
286 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
285 | for section, key in model.HOOKS_SETTINGS: |
|
287 | for section, key in model.HOOKS_SETTINGS: | |
286 | settings_util.create_repo_rhodecode_ui( |
|
288 | settings_util.create_repo_rhodecode_ui( | |
287 | repo_stub, section, None, key=key, active=False) |
|
289 | repo_stub, section, None, key=key, active=False) | |
288 | model.create_or_update_repo_hook_settings(HOOKS_FORM_DATA) |
|
290 | model.create_or_update_repo_hook_settings(HOOKS_FORM_DATA) | |
|
291 | Session().commit() | |||
|
292 | ||||
289 | for section, key in model.HOOKS_SETTINGS: |
|
293 | for section, key in model.HOOKS_SETTINGS: | |
290 | ui = model.repo_settings.get_ui_by_section_and_key(section, key) |
|
294 | ui = model.repo_settings.get_ui_by_section_and_key(section, key) | |
291 | assert ui.ui_active is True |
|
295 | assert ui.ui_active is True | |
292 |
|
296 | |||
293 | def _create_settings(self, model, data): |
|
297 | def _create_settings(self, model, data): | |
294 | global_patch = mock.patch.object(model, 'global_settings') |
|
298 | global_patch = mock.patch.object(model, 'global_settings') | |
295 | global_setting = mock.Mock() |
|
299 | global_setting = mock.Mock() | |
296 | global_setting.ui_value = 'Test value' |
|
300 | global_setting.ui_value = 'Test value' | |
297 | with global_patch as global_mock: |
|
301 | with global_patch as global_mock: | |
298 | global_mock.get_ui_by_section_and_key.return_value = global_setting |
|
302 | global_mock.get_ui_by_section_and_key.return_value = global_setting | |
299 | model.create_or_update_repo_hook_settings(HOOKS_FORM_DATA) |
|
303 | model.create_or_update_repo_hook_settings(HOOKS_FORM_DATA) | |
|
304 | Session().commit() | |||
300 |
|
305 | |||
301 |
|
306 | |||
302 | class TestUpdateGlobalHookSettings(object): |
|
307 | class TestUpdateGlobalHookSettings(object): | |
303 | def test_update_raises_exception_when_data_incomplete(self): |
|
308 | def test_update_raises_exception_when_data_incomplete(self): | |
304 | model = VcsSettingsModel() |
|
309 | model = VcsSettingsModel() | |
305 |
|
310 | |||
306 | deleted_key = 'hooks_changegroup_repo_size' |
|
311 | deleted_key = 'hooks_changegroup_repo_size' | |
307 | data = HOOKS_FORM_DATA.copy() |
|
312 | data = HOOKS_FORM_DATA.copy() | |
308 | data.pop(deleted_key) |
|
313 | data.pop(deleted_key) | |
309 |
|
314 | |||
310 | with pytest.raises(ValueError) as exc_info: |
|
315 | with pytest.raises(ValueError) as exc_info: | |
311 | model.update_global_hook_settings(data) |
|
316 | model.update_global_hook_settings(data) | |
|
317 | Session().commit() | |||
|
318 | ||||
312 | msg = 'The given data does not contain {} key'.format(deleted_key) |
|
319 | msg = 'The given data does not contain {} key'.format(deleted_key) | |
313 | assert str(exc_info.value) == msg |
|
320 | assert str(exc_info.value) == msg | |
314 |
|
321 | |||
315 | def test_update_global_hook_settings(self, settings_util): |
|
322 | def test_update_global_hook_settings(self, settings_util): | |
316 | model = VcsSettingsModel() |
|
323 | model = VcsSettingsModel() | |
317 | setting_mock = mock.MagicMock() |
|
324 | setting_mock = mock.MagicMock() | |
318 | setting_mock.ui_active = False |
|
325 | setting_mock.ui_active = False | |
319 | get_settings_patcher = mock.patch.object( |
|
326 | get_settings_patcher = mock.patch.object( | |
320 | model.global_settings, 'get_ui_by_section_and_key', |
|
327 | model.global_settings, 'get_ui_by_section_and_key', | |
321 | return_value=setting_mock) |
|
328 | return_value=setting_mock) | |
322 | session_patcher = mock.patch('rhodecode.model.settings.Session') |
|
329 | session_patcher = mock.patch('rhodecode.model.settings.Session') | |
323 | with get_settings_patcher as get_settings_mock, session_patcher: |
|
330 | with get_settings_patcher as get_settings_mock, session_patcher: | |
324 | model.update_global_hook_settings(HOOKS_FORM_DATA) |
|
331 | model.update_global_hook_settings(HOOKS_FORM_DATA) | |
|
332 | Session().commit() | |||
|
333 | ||||
325 | assert setting_mock.ui_active is True |
|
334 | assert setting_mock.ui_active is True | |
326 | assert get_settings_mock.call_count == 3 |
|
335 | assert get_settings_mock.call_count == 3 | |
327 |
|
336 | |||
328 |
|
337 | |||
329 | class TestCreateOrUpdateRepoGeneralSettings(object): |
|
338 | class TestCreateOrUpdateRepoGeneralSettings(object): | |
330 | def test_calls_create_or_update_general_settings(self, repo_stub): |
|
339 | def test_calls_create_or_update_general_settings(self, repo_stub): | |
331 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
340 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
332 | create_patch = mock.patch.object( |
|
341 | create_patch = mock.patch.object( | |
333 | model, '_create_or_update_general_settings') |
|
342 | model, '_create_or_update_general_settings') | |
334 | with create_patch as create_mock: |
|
343 | with create_patch as create_mock: | |
335 | model.create_or_update_repo_pr_settings(GENERAL_FORM_DATA) |
|
344 | model.create_or_update_repo_pr_settings(GENERAL_FORM_DATA) | |
|
345 | Session().commit() | |||
|
346 | ||||
336 | create_mock.assert_called_once_with( |
|
347 | create_mock.assert_called_once_with( | |
337 | model.repo_settings, GENERAL_FORM_DATA) |
|
348 | model.repo_settings, GENERAL_FORM_DATA) | |
338 |
|
349 | |||
339 | def test_raises_exception_when_repository_is_not_specified(self): |
|
350 | def test_raises_exception_when_repository_is_not_specified(self): | |
340 | model = VcsSettingsModel() |
|
351 | model = VcsSettingsModel() | |
341 | with pytest.raises(Exception) as exc_info: |
|
352 | with pytest.raises(Exception) as exc_info: | |
342 | model.create_or_update_repo_pr_settings(GENERAL_FORM_DATA) |
|
353 | model.create_or_update_repo_pr_settings(GENERAL_FORM_DATA) | |
343 | assert str(exc_info.value) == 'Repository is not specified' |
|
354 | assert str(exc_info.value) == 'Repository is not specified' | |
344 |
|
355 | |||
345 |
|
356 | |||
346 | class TestCreateOrUpdatGlobalGeneralSettings(object): |
|
357 | class TestCreateOrUpdatGlobalGeneralSettings(object): | |
347 | def test_calls_create_or_update_general_settings(self): |
|
358 | def test_calls_create_or_update_general_settings(self): | |
348 | model = VcsSettingsModel() |
|
359 | model = VcsSettingsModel() | |
349 | create_patch = mock.patch.object( |
|
360 | create_patch = mock.patch.object( | |
350 | model, '_create_or_update_general_settings') |
|
361 | model, '_create_or_update_general_settings') | |
351 | with create_patch as create_mock: |
|
362 | with create_patch as create_mock: | |
352 | model.create_or_update_global_pr_settings(GENERAL_FORM_DATA) |
|
363 | model.create_or_update_global_pr_settings(GENERAL_FORM_DATA) | |
353 | create_mock.assert_called_once_with( |
|
364 | create_mock.assert_called_once_with( | |
354 | model.global_settings, GENERAL_FORM_DATA) |
|
365 | model.global_settings, GENERAL_FORM_DATA) | |
355 |
|
366 | |||
356 |
|
367 | |||
357 | class TestCreateOrUpdateGeneralSettings(object): |
|
368 | class TestCreateOrUpdateGeneralSettings(object): | |
358 | def test_create_when_no_repo_settings_found(self, repo_stub): |
|
369 | def test_create_when_no_repo_settings_found(self, repo_stub): | |
359 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
370 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
360 | model._create_or_update_general_settings( |
|
371 | model._create_or_update_general_settings( | |
361 | model.repo_settings, GENERAL_FORM_DATA) |
|
372 | model.repo_settings, GENERAL_FORM_DATA) | |
362 |
|
373 | |||
363 | cleanup = [] |
|
374 | cleanup = [] | |
364 | try: |
|
375 | try: | |
365 | for name in model.GENERAL_SETTINGS: |
|
376 | for name in model.GENERAL_SETTINGS: | |
366 | setting = model.repo_settings.get_setting_by_name(name) |
|
377 | setting = model.repo_settings.get_setting_by_name(name) | |
367 | assert setting.app_settings_value is True |
|
378 | assert setting.app_settings_value is True | |
368 | cleanup.append(setting) |
|
379 | cleanup.append(setting) | |
369 | finally: |
|
380 | finally: | |
370 | for setting in cleanup: |
|
381 | for setting in cleanup: | |
371 | Session().delete(setting) |
|
382 | Session().delete(setting) | |
372 | Session().commit() |
|
383 | Session().commit() | |
373 |
|
384 | |||
374 | def test_create_raises_exception_when_data_incomplete(self, repo_stub): |
|
385 | def test_create_raises_exception_when_data_incomplete(self, repo_stub): | |
375 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
386 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
376 |
|
387 | |||
377 | deleted_key = 'rhodecode_pr_merge_enabled' |
|
388 | deleted_key = 'rhodecode_pr_merge_enabled' | |
378 | data = GENERAL_FORM_DATA.copy() |
|
389 | data = GENERAL_FORM_DATA.copy() | |
379 | data.pop(deleted_key) |
|
390 | data.pop(deleted_key) | |
380 |
|
391 | |||
381 | with pytest.raises(ValueError) as exc_info: |
|
392 | with pytest.raises(ValueError) as exc_info: | |
382 | model._create_or_update_general_settings(model.repo_settings, data) |
|
393 | model._create_or_update_general_settings(model.repo_settings, data) | |
|
394 | Session().commit() | |||
383 |
|
395 | |||
384 | msg = 'The given data does not contain {} key'.format(deleted_key) |
|
396 | msg = 'The given data does not contain {} key'.format(deleted_key) | |
385 | assert str(exc_info.value) == msg |
|
397 | assert str(exc_info.value) == msg | |
386 |
|
398 | |||
387 | def test_update_when_repo_setting_found(self, repo_stub, settings_util): |
|
399 | def test_update_when_repo_setting_found(self, repo_stub, settings_util): | |
388 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
400 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
389 | for name in model.GENERAL_SETTINGS: |
|
401 | for name in model.GENERAL_SETTINGS: | |
390 | settings_util.create_repo_rhodecode_setting( |
|
402 | settings_util.create_repo_rhodecode_setting( | |
391 | repo_stub, name, False, 'bool') |
|
403 | repo_stub, name, False, 'bool') | |
392 |
|
404 | |||
393 | model._create_or_update_general_settings( |
|
405 | model._create_or_update_general_settings( | |
394 | model.repo_settings, GENERAL_FORM_DATA) |
|
406 | model.repo_settings, GENERAL_FORM_DATA) | |
|
407 | Session().commit() | |||
395 |
|
408 | |||
396 | for name in model.GENERAL_SETTINGS: |
|
409 | for name in model.GENERAL_SETTINGS: | |
397 | setting = model.repo_settings.get_setting_by_name(name) |
|
410 | setting = model.repo_settings.get_setting_by_name(name) | |
398 | assert setting.app_settings_value is True |
|
411 | assert setting.app_settings_value is True | |
399 |
|
412 | |||
400 |
|
413 | |||
401 | class TestCreateRepoSvnSettings(object): |
|
414 | class TestCreateRepoSvnSettings(object): | |
402 | def test_calls_create_svn_settings(self, repo_stub): |
|
415 | def test_calls_create_svn_settings(self, repo_stub): | |
403 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
416 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
404 | with mock.patch.object(model, '_create_svn_settings') as create_mock: |
|
417 | with mock.patch.object(model, '_create_svn_settings') as create_mock: | |
405 | model.create_repo_svn_settings(SVN_FORM_DATA) |
|
418 | model.create_repo_svn_settings(SVN_FORM_DATA) | |
|
419 | Session().commit() | |||
|
420 | ||||
406 | create_mock.assert_called_once_with(model.repo_settings, SVN_FORM_DATA) |
|
421 | create_mock.assert_called_once_with(model.repo_settings, SVN_FORM_DATA) | |
407 |
|
422 | |||
408 | def test_raises_exception_when_repository_is_not_specified(self): |
|
423 | def test_raises_exception_when_repository_is_not_specified(self): | |
409 | model = VcsSettingsModel() |
|
424 | model = VcsSettingsModel() | |
410 | with pytest.raises(Exception) as exc_info: |
|
425 | with pytest.raises(Exception) as exc_info: | |
411 | model.create_repo_svn_settings(SVN_FORM_DATA) |
|
426 | model.create_repo_svn_settings(SVN_FORM_DATA) | |
|
427 | Session().commit() | |||
|
428 | ||||
412 | assert str(exc_info.value) == 'Repository is not specified' |
|
429 | assert str(exc_info.value) == 'Repository is not specified' | |
413 |
|
430 | |||
414 |
|
431 | |||
415 | class TestCreateSvnSettings(object): |
|
432 | class TestCreateSvnSettings(object): | |
416 | def test_create(self, repo_stub): |
|
433 | def test_create(self, repo_stub): | |
417 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
434 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
418 | model._create_svn_settings(model.repo_settings, SVN_FORM_DATA) |
|
435 | model._create_svn_settings(model.repo_settings, SVN_FORM_DATA) | |
419 | Session().commit() |
|
436 | Session().commit() | |
420 |
|
437 | |||
421 | branch_ui = model.repo_settings.get_ui_by_section( |
|
438 | branch_ui = model.repo_settings.get_ui_by_section( | |
422 | model.SVN_BRANCH_SECTION) |
|
439 | model.SVN_BRANCH_SECTION) | |
423 | tag_ui = model.repo_settings.get_ui_by_section( |
|
440 | tag_ui = model.repo_settings.get_ui_by_section( | |
424 | model.SVN_TAG_SECTION) |
|
441 | model.SVN_TAG_SECTION) | |
425 |
|
442 | |||
426 | try: |
|
443 | try: | |
427 | assert len(branch_ui) == 1 |
|
444 | assert len(branch_ui) == 1 | |
428 | assert len(tag_ui) == 1 |
|
445 | assert len(tag_ui) == 1 | |
429 | finally: |
|
446 | finally: | |
430 | Session().delete(branch_ui[0]) |
|
447 | Session().delete(branch_ui[0]) | |
431 | Session().delete(tag_ui[0]) |
|
448 | Session().delete(tag_ui[0]) | |
432 | Session().commit() |
|
449 | Session().commit() | |
433 |
|
450 | |||
434 | def test_create_tag(self, repo_stub): |
|
451 | def test_create_tag(self, repo_stub): | |
435 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
452 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
436 | data = SVN_FORM_DATA.copy() |
|
453 | data = SVN_FORM_DATA.copy() | |
437 | data.pop('new_svn_branch') |
|
454 | data.pop('new_svn_branch') | |
438 | model._create_svn_settings(model.repo_settings, data) |
|
455 | model._create_svn_settings(model.repo_settings, data) | |
439 | Session().commit() |
|
456 | Session().commit() | |
440 |
|
457 | |||
441 | branch_ui = model.repo_settings.get_ui_by_section( |
|
458 | branch_ui = model.repo_settings.get_ui_by_section( | |
442 | model.SVN_BRANCH_SECTION) |
|
459 | model.SVN_BRANCH_SECTION) | |
443 | tag_ui = model.repo_settings.get_ui_by_section( |
|
460 | tag_ui = model.repo_settings.get_ui_by_section( | |
444 | model.SVN_TAG_SECTION) |
|
461 | model.SVN_TAG_SECTION) | |
445 |
|
462 | |||
446 | try: |
|
463 | try: | |
447 | assert len(branch_ui) == 0 |
|
464 | assert len(branch_ui) == 0 | |
448 | assert len(tag_ui) == 1 |
|
465 | assert len(tag_ui) == 1 | |
449 | finally: |
|
466 | finally: | |
450 | Session().delete(tag_ui[0]) |
|
467 | Session().delete(tag_ui[0]) | |
451 | Session().commit() |
|
468 | Session().commit() | |
452 |
|
469 | |||
453 | def test_create_nothing_when_no_svn_settings_specified(self, repo_stub): |
|
470 | def test_create_nothing_when_no_svn_settings_specified(self, repo_stub): | |
454 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
471 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
455 | model._create_svn_settings(model.repo_settings, {}) |
|
472 | model._create_svn_settings(model.repo_settings, {}) | |
456 | Session().commit() |
|
473 | Session().commit() | |
457 |
|
474 | |||
458 | branch_ui = model.repo_settings.get_ui_by_section( |
|
475 | branch_ui = model.repo_settings.get_ui_by_section( | |
459 | model.SVN_BRANCH_SECTION) |
|
476 | model.SVN_BRANCH_SECTION) | |
460 | tag_ui = model.repo_settings.get_ui_by_section( |
|
477 | tag_ui = model.repo_settings.get_ui_by_section( | |
461 | model.SVN_TAG_SECTION) |
|
478 | model.SVN_TAG_SECTION) | |
462 |
|
479 | |||
463 | assert len(branch_ui) == 0 |
|
480 | assert len(branch_ui) == 0 | |
464 | assert len(tag_ui) == 0 |
|
481 | assert len(tag_ui) == 0 | |
465 |
|
482 | |||
466 | def test_create_nothing_when_empty_settings_specified(self, repo_stub): |
|
483 | def test_create_nothing_when_empty_settings_specified(self, repo_stub): | |
467 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
484 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
468 | data = { |
|
485 | data = { | |
469 | 'new_svn_branch': '', |
|
486 | 'new_svn_branch': '', | |
470 | 'new_svn_tag': '' |
|
487 | 'new_svn_tag': '' | |
471 | } |
|
488 | } | |
472 | model._create_svn_settings(model.repo_settings, data) |
|
489 | model._create_svn_settings(model.repo_settings, data) | |
473 | Session().commit() |
|
490 | Session().commit() | |
474 |
|
491 | |||
475 | branch_ui = model.repo_settings.get_ui_by_section( |
|
492 | branch_ui = model.repo_settings.get_ui_by_section( | |
476 | model.SVN_BRANCH_SECTION) |
|
493 | model.SVN_BRANCH_SECTION) | |
477 | tag_ui = model.repo_settings.get_ui_by_section( |
|
494 | tag_ui = model.repo_settings.get_ui_by_section( | |
478 | model.SVN_TAG_SECTION) |
|
495 | model.SVN_TAG_SECTION) | |
479 |
|
496 | |||
480 | assert len(branch_ui) == 0 |
|
497 | assert len(branch_ui) == 0 | |
481 | assert len(tag_ui) == 0 |
|
498 | assert len(tag_ui) == 0 | |
482 |
|
499 | |||
483 |
|
500 | |||
484 | class TestCreateOrUpdateUi(object): |
|
501 | class TestCreateOrUpdateUi(object): | |
485 | def test_create(self, repo_stub): |
|
502 | def test_create(self, repo_stub): | |
486 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
503 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
487 | model._create_or_update_ui( |
|
504 | model._create_or_update_ui( | |
488 | model.repo_settings, 'test-section', 'test-key', active=False, |
|
505 | model.repo_settings, 'test-section', 'test-key', active=False, | |
489 | value='False') |
|
506 | value='False') | |
490 | Session().commit() |
|
507 | Session().commit() | |
491 |
|
508 | |||
492 | created_ui = model.repo_settings.get_ui_by_section_and_key( |
|
509 | created_ui = model.repo_settings.get_ui_by_section_and_key( | |
493 | 'test-section', 'test-key') |
|
510 | 'test-section', 'test-key') | |
494 |
|
511 | |||
495 | try: |
|
512 | try: | |
496 | assert created_ui.ui_active is False |
|
513 | assert created_ui.ui_active is False | |
497 | assert str2bool(created_ui.ui_value) is False |
|
514 | assert str2bool(created_ui.ui_value) is False | |
498 | finally: |
|
515 | finally: | |
499 | Session().delete(created_ui) |
|
516 | Session().delete(created_ui) | |
500 | Session().commit() |
|
517 | Session().commit() | |
501 |
|
518 | |||
502 | def test_update(self, repo_stub, settings_util): |
|
519 | def test_update(self, repo_stub, settings_util): | |
503 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
520 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
504 | # care about only 3 first settings |
|
521 | # care about only 3 first settings | |
505 | largefiles, phases, evolve = model.HG_SETTINGS[:3] |
|
522 | largefiles, phases, evolve = model.HG_SETTINGS[:3] | |
506 |
|
523 | |||
507 | section = 'test-section' |
|
524 | section = 'test-section' | |
508 | key = 'test-key' |
|
525 | key = 'test-key' | |
509 | settings_util.create_repo_rhodecode_ui( |
|
526 | settings_util.create_repo_rhodecode_ui( | |
510 | repo_stub, section, 'True', key=key, active=True) |
|
527 | repo_stub, section, 'True', key=key, active=True) | |
511 |
|
528 | |||
512 | model._create_or_update_ui( |
|
529 | model._create_or_update_ui( | |
513 | model.repo_settings, section, key, active=False, value='False') |
|
530 | model.repo_settings, section, key, active=False, value='False') | |
514 | Session().commit() |
|
531 | Session().commit() | |
515 |
|
532 | |||
516 | created_ui = model.repo_settings.get_ui_by_section_and_key( |
|
533 | created_ui = model.repo_settings.get_ui_by_section_and_key( | |
517 | section, key) |
|
534 | section, key) | |
518 | assert created_ui.ui_active is False |
|
535 | assert created_ui.ui_active is False | |
519 | assert str2bool(created_ui.ui_value) is False |
|
536 | assert str2bool(created_ui.ui_value) is False | |
520 |
|
537 | |||
521 |
|
538 | |||
522 | class TestCreateOrUpdateRepoHgSettings(object): |
|
539 | class TestCreateOrUpdateRepoHgSettings(object): | |
523 | FORM_DATA = { |
|
540 | FORM_DATA = { | |
524 | 'extensions_largefiles': False, |
|
541 | 'extensions_largefiles': False, | |
525 | 'extensions_evolve': False, |
|
542 | 'extensions_evolve': False, | |
526 | 'phases_publish': False |
|
543 | 'phases_publish': False | |
527 | } |
|
544 | } | |
528 |
|
545 | |||
529 | def test_creates_repo_hg_settings_when_data_is_correct(self, repo_stub): |
|
546 | def test_creates_repo_hg_settings_when_data_is_correct(self, repo_stub): | |
530 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
547 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
531 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: |
|
548 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: | |
532 | model.create_or_update_repo_hg_settings(self.FORM_DATA) |
|
549 | model.create_or_update_repo_hg_settings(self.FORM_DATA) | |
533 | expected_calls = [ |
|
550 | expected_calls = [ | |
534 | mock.call(model.repo_settings, 'extensions', 'largefiles', active=False, value=''), |
|
551 | mock.call(model.repo_settings, 'extensions', 'largefiles', active=False, value=''), | |
535 | mock.call(model.repo_settings, 'extensions', 'evolve', active=False, value=''), |
|
552 | mock.call(model.repo_settings, 'extensions', 'evolve', active=False, value=''), | |
536 | mock.call(model.repo_settings, 'experimental', 'evolution', active=False, value=''), |
|
553 | mock.call(model.repo_settings, 'experimental', 'evolution', active=False, value=''), | |
537 | mock.call(model.repo_settings, 'experimental', 'evolution.exchange', active=False, value='no'), |
|
554 | mock.call(model.repo_settings, 'experimental', 'evolution.exchange', active=False, value='no'), | |
538 | mock.call(model.repo_settings, 'extensions', 'topic', active=False, value=''), |
|
555 | mock.call(model.repo_settings, 'extensions', 'topic', active=False, value=''), | |
539 | mock.call(model.repo_settings, 'phases', 'publish', value='False'), |
|
556 | mock.call(model.repo_settings, 'phases', 'publish', value='False'), | |
540 | ] |
|
557 | ] | |
541 | assert expected_calls == create_mock.call_args_list |
|
558 | assert expected_calls == create_mock.call_args_list | |
542 |
|
559 | |||
543 | @pytest.mark.parametrize('field_to_remove', FORM_DATA.keys()) |
|
560 | @pytest.mark.parametrize('field_to_remove', FORM_DATA.keys()) | |
544 | def test_key_is_not_found(self, repo_stub, field_to_remove): |
|
561 | def test_key_is_not_found(self, repo_stub, field_to_remove): | |
545 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
562 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
546 | data = self.FORM_DATA.copy() |
|
563 | data = self.FORM_DATA.copy() | |
547 | data.pop(field_to_remove) |
|
564 | data.pop(field_to_remove) | |
548 | with pytest.raises(ValueError) as exc_info: |
|
565 | with pytest.raises(ValueError) as exc_info: | |
549 | model.create_or_update_repo_hg_settings(data) |
|
566 | model.create_or_update_repo_hg_settings(data) | |
|
567 | Session().commit() | |||
|
568 | ||||
550 | expected_message = 'The given data does not contain {} key'.format( |
|
569 | expected_message = 'The given data does not contain {} key'.format( | |
551 | field_to_remove) |
|
570 | field_to_remove) | |
552 | assert str(exc_info.value) == expected_message |
|
571 | assert str(exc_info.value) == expected_message | |
553 |
|
572 | |||
554 | def test_create_raises_exception_when_repository_not_specified(self): |
|
573 | def test_create_raises_exception_when_repository_not_specified(self): | |
555 | model = VcsSettingsModel() |
|
574 | model = VcsSettingsModel() | |
556 | with pytest.raises(Exception) as exc_info: |
|
575 | with pytest.raises(Exception) as exc_info: | |
557 | model.create_or_update_repo_hg_settings(self.FORM_DATA) |
|
576 | model.create_or_update_repo_hg_settings(self.FORM_DATA) | |
|
577 | Session().commit() | |||
|
578 | ||||
558 | assert str(exc_info.value) == 'Repository is not specified' |
|
579 | assert str(exc_info.value) == 'Repository is not specified' | |
559 |
|
580 | |||
560 |
|
581 | |||
561 | class TestUpdateGlobalSslSetting(object): |
|
582 | class TestUpdateGlobalSslSetting(object): | |
562 | def test_updates_global_hg_settings(self): |
|
583 | def test_updates_global_hg_settings(self): | |
563 | model = VcsSettingsModel() |
|
584 | model = VcsSettingsModel() | |
564 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: |
|
585 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: | |
565 | model.update_global_ssl_setting('False') |
|
586 | model.update_global_ssl_setting('False') | |
|
587 | Session().commit() | |||
|
588 | ||||
566 | create_mock.assert_called_once_with( |
|
589 | create_mock.assert_called_once_with( | |
567 | model.global_settings, 'web', 'push_ssl', value='False') |
|
590 | model.global_settings, 'web', 'push_ssl', value='False') | |
568 |
|
591 | |||
569 |
|
592 | |||
570 | class TestUpdateGlobalPathSetting(object): |
|
593 | class TestUpdateGlobalPathSetting(object): | |
571 | def test_updates_global_path_settings(self): |
|
594 | def test_updates_global_path_settings(self): | |
572 | model = VcsSettingsModel() |
|
595 | model = VcsSettingsModel() | |
573 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: |
|
596 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: | |
574 | model.update_global_path_setting('False') |
|
597 | model.update_global_path_setting('False') | |
|
598 | Session().commit() | |||
|
599 | ||||
575 | create_mock.assert_called_once_with( |
|
600 | create_mock.assert_called_once_with( | |
576 | model.global_settings, 'paths', '/', value='False') |
|
601 | model.global_settings, 'paths', '/', value='False') | |
577 |
|
602 | |||
578 |
|
603 | |||
579 | class TestCreateOrUpdateGlobalHgSettings(object): |
|
604 | class TestCreateOrUpdateGlobalHgSettings(object): | |
580 | FORM_DATA = { |
|
605 | FORM_DATA = { | |
581 | 'extensions_largefiles': False, |
|
606 | 'extensions_largefiles': False, | |
582 | 'largefiles_usercache': '/example/largefiles-store', |
|
607 | 'largefiles_usercache': '/example/largefiles-store', | |
583 | 'phases_publish': False, |
|
608 | 'phases_publish': False, | |
584 | 'extensions_hgsubversion': False, |
|
609 | 'extensions_hgsubversion': False, | |
585 | 'extensions_evolve': False |
|
610 | 'extensions_evolve': False | |
586 | } |
|
611 | } | |
587 |
|
612 | |||
588 | def test_creates_repo_hg_settings_when_data_is_correct(self): |
|
613 | def test_creates_repo_hg_settings_when_data_is_correct(self): | |
589 | model = VcsSettingsModel() |
|
614 | model = VcsSettingsModel() | |
590 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: |
|
615 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: | |
591 | model.create_or_update_global_hg_settings(self.FORM_DATA) |
|
616 | model.create_or_update_global_hg_settings(self.FORM_DATA) | |
|
617 | Session().commit() | |||
|
618 | ||||
592 | expected_calls = [ |
|
619 | expected_calls = [ | |
593 | mock.call(model.global_settings, 'extensions', 'largefiles', active=False, value=''), |
|
620 | mock.call(model.global_settings, 'extensions', 'largefiles', active=False, value=''), | |
594 | mock.call(model.global_settings, 'largefiles', 'usercache', value='/example/largefiles-store'), |
|
621 | mock.call(model.global_settings, 'largefiles', 'usercache', value='/example/largefiles-store'), | |
595 | mock.call(model.global_settings, 'phases', 'publish', value='False'), |
|
622 | mock.call(model.global_settings, 'phases', 'publish', value='False'), | |
596 | mock.call(model.global_settings, 'extensions', 'hgsubversion', active=False), |
|
623 | mock.call(model.global_settings, 'extensions', 'hgsubversion', active=False), | |
597 | mock.call(model.global_settings, 'extensions', 'evolve', active=False, value=''), |
|
624 | mock.call(model.global_settings, 'extensions', 'evolve', active=False, value=''), | |
598 | mock.call(model.global_settings, 'experimental', 'evolution', active=False, value=''), |
|
625 | mock.call(model.global_settings, 'experimental', 'evolution', active=False, value=''), | |
599 | mock.call(model.global_settings, 'experimental', 'evolution.exchange', active=False, value='no'), |
|
626 | mock.call(model.global_settings, 'experimental', 'evolution.exchange', active=False, value='no'), | |
600 | mock.call(model.global_settings, 'extensions', 'topic', active=False, value=''), |
|
627 | mock.call(model.global_settings, 'extensions', 'topic', active=False, value=''), | |
601 | ] |
|
628 | ] | |
602 |
|
629 | |||
603 | assert expected_calls == create_mock.call_args_list |
|
630 | assert expected_calls == create_mock.call_args_list | |
604 |
|
631 | |||
605 | @pytest.mark.parametrize('field_to_remove', FORM_DATA.keys()) |
|
632 | @pytest.mark.parametrize('field_to_remove', FORM_DATA.keys()) | |
606 | def test_key_is_not_found(self, repo_stub, field_to_remove): |
|
633 | def test_key_is_not_found(self, repo_stub, field_to_remove): | |
607 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
634 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
608 | data = self.FORM_DATA.copy() |
|
635 | data = self.FORM_DATA.copy() | |
609 | data.pop(field_to_remove) |
|
636 | data.pop(field_to_remove) | |
610 | with pytest.raises(Exception) as exc_info: |
|
637 | with pytest.raises(Exception) as exc_info: | |
611 | model.create_or_update_global_hg_settings(data) |
|
638 | model.create_or_update_global_hg_settings(data) | |
|
639 | Session().commit() | |||
|
640 | ||||
612 | expected_message = 'The given data does not contain {} key'.format( |
|
641 | expected_message = 'The given data does not contain {} key'.format( | |
613 | field_to_remove) |
|
642 | field_to_remove) | |
614 | assert str(exc_info.value) == expected_message |
|
643 | assert str(exc_info.value) == expected_message | |
615 |
|
644 | |||
616 |
|
645 | |||
617 | class TestCreateOrUpdateGlobalGitSettings(object): |
|
646 | class TestCreateOrUpdateGlobalGitSettings(object): | |
618 | FORM_DATA = { |
|
647 | FORM_DATA = { | |
619 | 'vcs_git_lfs_enabled': False, |
|
648 | 'vcs_git_lfs_enabled': False, | |
620 | 'vcs_git_lfs_store_location': '/example/lfs-store', |
|
649 | 'vcs_git_lfs_store_location': '/example/lfs-store', | |
621 | } |
|
650 | } | |
622 |
|
651 | |||
623 | def test_creates_repo_hg_settings_when_data_is_correct(self): |
|
652 | def test_creates_repo_hg_settings_when_data_is_correct(self): | |
624 | model = VcsSettingsModel() |
|
653 | model = VcsSettingsModel() | |
625 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: |
|
654 | with mock.patch.object(model, '_create_or_update_ui') as create_mock: | |
626 | model.create_or_update_global_git_settings(self.FORM_DATA) |
|
655 | model.create_or_update_global_git_settings(self.FORM_DATA) | |
|
656 | Session().commit() | |||
|
657 | ||||
627 | expected_calls = [ |
|
658 | expected_calls = [ | |
628 | mock.call(model.global_settings, 'vcs_git_lfs', 'enabled', active=False, value=False), |
|
659 | mock.call(model.global_settings, 'vcs_git_lfs', 'enabled', active=False, value=False), | |
629 | mock.call(model.global_settings, 'vcs_git_lfs', 'store_location', value='/example/lfs-store'), |
|
660 | mock.call(model.global_settings, 'vcs_git_lfs', 'store_location', value='/example/lfs-store'), | |
630 | ] |
|
661 | ] | |
631 | assert expected_calls == create_mock.call_args_list |
|
662 | assert expected_calls == create_mock.call_args_list | |
632 |
|
663 | |||
633 |
|
664 | |||
634 | class TestDeleteRepoSvnPattern(object): |
|
665 | class TestDeleteRepoSvnPattern(object): | |
635 | def test_success_when_repo_is_set(self, backend_svn, settings_util): |
|
666 | def test_success_when_repo_is_set(self, backend_svn, settings_util): | |
636 | repo = backend_svn.create_repo() |
|
667 | repo = backend_svn.create_repo() | |
637 | repo_name = repo.repo_name |
|
668 | repo_name = repo.repo_name | |
638 |
|
669 | |||
639 | model = VcsSettingsModel(repo=repo_name) |
|
670 | model = VcsSettingsModel(repo=repo_name) | |
640 | entry = settings_util.create_repo_rhodecode_ui( |
|
671 | entry = settings_util.create_repo_rhodecode_ui( | |
641 | repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'svn-branch') |
|
672 | repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'svn-branch') | |
642 | Session().commit() |
|
673 | Session().commit() | |
643 |
|
674 | |||
644 | model.delete_repo_svn_pattern(entry.ui_id) |
|
675 | model.delete_repo_svn_pattern(entry.ui_id) | |
645 |
|
676 | |||
646 | def test_fail_when_delete_id_from_other_repo(self, backend_svn): |
|
677 | def test_fail_when_delete_id_from_other_repo(self, backend_svn): | |
647 | repo_name = backend_svn.repo_name |
|
678 | repo_name = backend_svn.repo_name | |
648 | model = VcsSettingsModel(repo=repo_name) |
|
679 | model = VcsSettingsModel(repo=repo_name) | |
649 | delete_ui_patch = mock.patch.object(model.repo_settings, 'delete_ui') |
|
680 | delete_ui_patch = mock.patch.object(model.repo_settings, 'delete_ui') | |
650 | with delete_ui_patch as delete_ui_mock: |
|
681 | with delete_ui_patch as delete_ui_mock: | |
651 | model.delete_repo_svn_pattern(123) |
|
682 | model.delete_repo_svn_pattern(123) | |
|
683 | Session().commit() | |||
|
684 | ||||
652 | delete_ui_mock.assert_called_once_with(-1) |
|
685 | delete_ui_mock.assert_called_once_with(-1) | |
653 |
|
686 | |||
654 | def test_raises_exception_when_repository_is_not_specified(self): |
|
687 | def test_raises_exception_when_repository_is_not_specified(self): | |
655 | model = VcsSettingsModel() |
|
688 | model = VcsSettingsModel() | |
656 | with pytest.raises(Exception) as exc_info: |
|
689 | with pytest.raises(Exception) as exc_info: | |
657 | model.delete_repo_svn_pattern(123) |
|
690 | model.delete_repo_svn_pattern(123) | |
658 | assert str(exc_info.value) == 'Repository is not specified' |
|
691 | assert str(exc_info.value) == 'Repository is not specified' | |
659 |
|
692 | |||
660 |
|
693 | |||
661 | class TestDeleteGlobalSvnPattern(object): |
|
694 | class TestDeleteGlobalSvnPattern(object): | |
662 | def test_delete_global_svn_pattern_calls_delete_ui(self): |
|
695 | def test_delete_global_svn_pattern_calls_delete_ui(self): | |
663 | model = VcsSettingsModel() |
|
696 | model = VcsSettingsModel() | |
664 | delete_ui_patch = mock.patch.object(model.global_settings, 'delete_ui') |
|
697 | delete_ui_patch = mock.patch.object(model.global_settings, 'delete_ui') | |
665 | with delete_ui_patch as delete_ui_mock: |
|
698 | with delete_ui_patch as delete_ui_mock: | |
666 | model.delete_global_svn_pattern(123) |
|
699 | model.delete_global_svn_pattern(123) | |
667 | delete_ui_mock.assert_called_once_with(123) |
|
700 | delete_ui_mock.assert_called_once_with(123) | |
668 |
|
701 | |||
669 |
|
702 | |||
670 | class TestFilterUiSettings(object): |
|
703 | class TestFilterUiSettings(object): | |
671 | def test_settings_are_filtered(self): |
|
704 | def test_settings_are_filtered(self): | |
672 | model = VcsSettingsModel() |
|
705 | model = VcsSettingsModel() | |
673 | repo_settings = [ |
|
706 | repo_settings = [ | |
674 | UiSetting('extensions', 'largefiles', '', True), |
|
707 | UiSetting('extensions', 'largefiles', '', True), | |
675 | UiSetting('phases', 'publish', 'True', True), |
|
708 | UiSetting('phases', 'publish', 'True', True), | |
676 | UiSetting('hooks', 'changegroup.repo_size', 'hook', True), |
|
709 | UiSetting('hooks', 'changegroup.repo_size', 'hook', True), | |
677 | UiSetting('hooks', 'changegroup.push_logger', 'hook', True), |
|
710 | UiSetting('hooks', 'changegroup.push_logger', 'hook', True), | |
678 | UiSetting('hooks', 'outgoing.pull_logger', 'hook', True), |
|
711 | UiSetting('hooks', 'outgoing.pull_logger', 'hook', True), | |
679 | UiSetting( |
|
712 | UiSetting( | |
680 | 'vcs_svn_branch', '84223c972204fa545ca1b22dac7bef5b68d7442d', |
|
713 | 'vcs_svn_branch', '84223c972204fa545ca1b22dac7bef5b68d7442d', | |
681 | 'test_branch', True), |
|
714 | 'test_branch', True), | |
682 | UiSetting( |
|
715 | UiSetting( | |
683 | 'vcs_svn_tag', '84229c972204fa545ca1b22dac7bef5b68d7442d', |
|
716 | 'vcs_svn_tag', '84229c972204fa545ca1b22dac7bef5b68d7442d', | |
684 | 'test_tag', True), |
|
717 | 'test_tag', True), | |
685 | ] |
|
718 | ] | |
686 | non_repo_settings = [ |
|
719 | non_repo_settings = [ | |
687 | UiSetting('largefiles', 'usercache', '/example/largefiles-store', True), |
|
720 | UiSetting('largefiles', 'usercache', '/example/largefiles-store', True), | |
688 | UiSetting('test', 'outgoing.pull_logger', 'hook', True), |
|
721 | UiSetting('test', 'outgoing.pull_logger', 'hook', True), | |
689 | UiSetting('hooks', 'test2', 'hook', True), |
|
722 | UiSetting('hooks', 'test2', 'hook', True), | |
690 | UiSetting( |
|
723 | UiSetting( | |
691 | 'vcs_svn_repo', '84229c972204fa545ca1b22dac7bef5b68d7442d', |
|
724 | 'vcs_svn_repo', '84229c972204fa545ca1b22dac7bef5b68d7442d', | |
692 | 'test_tag', True), |
|
725 | 'test_tag', True), | |
693 | ] |
|
726 | ] | |
694 | settings = repo_settings + non_repo_settings |
|
727 | settings = repo_settings + non_repo_settings | |
695 | filtered_settings = model._filter_ui_settings(settings) |
|
728 | filtered_settings = model._filter_ui_settings(settings) | |
696 | assert sorted(filtered_settings) == sorted(repo_settings) |
|
729 | assert sorted(filtered_settings) == sorted(repo_settings) | |
697 |
|
730 | |||
698 |
|
731 | |||
699 | class TestFilterGeneralSettings(object): |
|
732 | class TestFilterGeneralSettings(object): | |
700 | def test_settings_are_filtered(self): |
|
733 | def test_settings_are_filtered(self): | |
701 | model = VcsSettingsModel() |
|
734 | model = VcsSettingsModel() | |
702 | settings = { |
|
735 | settings = { | |
703 | 'rhodecode_abcde': 'value1', |
|
736 | 'rhodecode_abcde': 'value1', | |
704 | 'rhodecode_vwxyz': 'value2', |
|
737 | 'rhodecode_vwxyz': 'value2', | |
705 | } |
|
738 | } | |
706 | general_settings = { |
|
739 | general_settings = { | |
707 | 'rhodecode_{}'.format(key): 'value' |
|
740 | 'rhodecode_{}'.format(key): 'value' | |
708 | for key in VcsSettingsModel.GENERAL_SETTINGS |
|
741 | for key in VcsSettingsModel.GENERAL_SETTINGS | |
709 | } |
|
742 | } | |
710 | settings.update(general_settings) |
|
743 | settings.update(general_settings) | |
711 |
|
744 | |||
712 | filtered_settings = model._filter_general_settings(general_settings) |
|
745 | filtered_settings = model._filter_general_settings(general_settings) | |
713 | assert sorted(filtered_settings) == sorted(general_settings) |
|
746 | assert sorted(filtered_settings) == sorted(general_settings) | |
714 |
|
747 | |||
715 |
|
748 | |||
716 | class TestGetRepoUiSettings(object): |
|
749 | class TestGetRepoUiSettings(object): | |
717 | def test_global_uis_are_returned_when_no_repo_uis_found( |
|
750 | def test_global_uis_are_returned_when_no_repo_uis_found( | |
718 | self, repo_stub): |
|
751 | self, repo_stub): | |
719 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
752 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
720 | result = model.get_repo_ui_settings() |
|
753 | result = model.get_repo_ui_settings() | |
721 | svn_sections = ( |
|
754 | svn_sections = ( | |
722 | VcsSettingsModel.SVN_TAG_SECTION, |
|
755 | VcsSettingsModel.SVN_TAG_SECTION, | |
723 | VcsSettingsModel.SVN_BRANCH_SECTION) |
|
756 | VcsSettingsModel.SVN_BRANCH_SECTION) | |
724 | expected_result = [ |
|
757 | expected_result = [ | |
725 | s for s in model.global_settings.get_ui() |
|
758 | s for s in model.global_settings.get_ui() | |
726 | if s.section not in svn_sections] |
|
759 | if s.section not in svn_sections] | |
727 | assert sorted(result) == sorted(expected_result) |
|
760 | assert sorted(result) == sorted(expected_result) | |
728 |
|
761 | |||
729 | def test_repo_uis_are_overriding_global_uis( |
|
762 | def test_repo_uis_are_overriding_global_uis( | |
730 | self, repo_stub, settings_util): |
|
763 | self, repo_stub, settings_util): | |
731 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
764 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: | |
732 | settings_util.create_repo_rhodecode_ui( |
|
765 | settings_util.create_repo_rhodecode_ui( | |
733 | repo_stub, section, 'repo', key=key, active=False) |
|
766 | repo_stub, section, 'repo', key=key, active=False) | |
734 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
767 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
735 | result = model.get_repo_ui_settings() |
|
768 | result = model.get_repo_ui_settings() | |
736 | for setting in result: |
|
769 | for setting in result: | |
737 | locator = (setting.section, setting.key) |
|
770 | locator = (setting.section, setting.key) | |
738 | if locator in VcsSettingsModel.HOOKS_SETTINGS: |
|
771 | if locator in VcsSettingsModel.HOOKS_SETTINGS: | |
739 | assert setting.value == 'repo' |
|
772 | assert setting.value == 'repo' | |
740 |
|
773 | |||
741 | assert setting.active is False |
|
774 | assert setting.active is False | |
742 |
|
775 | |||
743 | def test_global_svn_patterns_are_not_in_list( |
|
776 | def test_global_svn_patterns_are_not_in_list( | |
744 | self, repo_stub, settings_util): |
|
777 | self, repo_stub, settings_util): | |
745 | svn_sections = ( |
|
778 | svn_sections = ( | |
746 | VcsSettingsModel.SVN_TAG_SECTION, |
|
779 | VcsSettingsModel.SVN_TAG_SECTION, | |
747 | VcsSettingsModel.SVN_BRANCH_SECTION) |
|
780 | VcsSettingsModel.SVN_BRANCH_SECTION) | |
748 | for section in svn_sections: |
|
781 | for section in svn_sections: | |
749 | settings_util.create_rhodecode_ui( |
|
782 | settings_util.create_rhodecode_ui( | |
750 | section, 'repo', key='deadbeef' + section, active=False) |
|
783 | section, 'repo', key='deadbeef' + section, active=False) | |
|
784 | Session().commit() | |||
|
785 | ||||
751 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
786 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
752 | result = model.get_repo_ui_settings() |
|
787 | result = model.get_repo_ui_settings() | |
753 | for setting in result: |
|
788 | for setting in result: | |
754 | assert setting.section not in svn_sections |
|
789 | assert setting.section not in svn_sections | |
755 |
|
790 | |||
756 | def test_repo_uis_filtered_by_section_are_returned( |
|
791 | def test_repo_uis_filtered_by_section_are_returned( | |
757 | self, repo_stub, settings_util): |
|
792 | self, repo_stub, settings_util): | |
758 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
793 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: | |
759 | settings_util.create_repo_rhodecode_ui( |
|
794 | settings_util.create_repo_rhodecode_ui( | |
760 | repo_stub, section, 'repo', key=key, active=False) |
|
795 | repo_stub, section, 'repo', key=key, active=False) | |
761 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
796 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
762 | section, key = VcsSettingsModel.HOOKS_SETTINGS[0] |
|
797 | section, key = VcsSettingsModel.HOOKS_SETTINGS[0] | |
763 | result = model.get_repo_ui_settings(section=section) |
|
798 | result = model.get_repo_ui_settings(section=section) | |
764 | for setting in result: |
|
799 | for setting in result: | |
765 | assert setting.section == section |
|
800 | assert setting.section == section | |
766 |
|
801 | |||
767 | def test_repo_uis_filtered_by_key_are_returned( |
|
802 | def test_repo_uis_filtered_by_key_are_returned( | |
768 | self, repo_stub, settings_util): |
|
803 | self, repo_stub, settings_util): | |
769 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
804 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: | |
770 | settings_util.create_repo_rhodecode_ui( |
|
805 | settings_util.create_repo_rhodecode_ui( | |
771 | repo_stub, section, 'repo', key=key, active=False) |
|
806 | repo_stub, section, 'repo', key=key, active=False) | |
772 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
807 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
773 | section, key = VcsSettingsModel.HOOKS_SETTINGS[0] |
|
808 | section, key = VcsSettingsModel.HOOKS_SETTINGS[0] | |
774 | result = model.get_repo_ui_settings(key=key) |
|
809 | result = model.get_repo_ui_settings(key=key) | |
775 | for setting in result: |
|
810 | for setting in result: | |
776 | assert setting.key == key |
|
811 | assert setting.key == key | |
777 |
|
812 | |||
778 | def test_raises_exception_when_repository_is_not_specified(self): |
|
813 | def test_raises_exception_when_repository_is_not_specified(self): | |
779 | model = VcsSettingsModel() |
|
814 | model = VcsSettingsModel() | |
780 | with pytest.raises(Exception) as exc_info: |
|
815 | with pytest.raises(Exception) as exc_info: | |
781 | model.get_repo_ui_settings() |
|
816 | model.get_repo_ui_settings() | |
782 | assert str(exc_info.value) == 'Repository is not specified' |
|
817 | assert str(exc_info.value) == 'Repository is not specified' | |
783 |
|
818 | |||
784 |
|
819 | |||
785 | class TestGetRepoGeneralSettings(object): |
|
820 | class TestGetRepoGeneralSettings(object): | |
786 | def test_global_settings_are_returned_when_no_repo_settings_found( |
|
821 | def test_global_settings_are_returned_when_no_repo_settings_found( | |
787 | self, repo_stub): |
|
822 | self, repo_stub): | |
788 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
823 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
789 | result = model.get_repo_general_settings() |
|
824 | result = model.get_repo_general_settings() | |
790 | expected_result = model.global_settings.get_all_settings() |
|
825 | expected_result = model.global_settings.get_all_settings() | |
791 | assert sorted(result) == sorted(expected_result) |
|
826 | assert sorted(result) == sorted(expected_result) | |
792 |
|
827 | |||
793 | def test_repo_uis_are_overriding_global_uis( |
|
828 | def test_repo_uis_are_overriding_global_uis( | |
794 | self, repo_stub, settings_util): |
|
829 | self, repo_stub, settings_util): | |
795 | for key in VcsSettingsModel.GENERAL_SETTINGS: |
|
830 | for key in VcsSettingsModel.GENERAL_SETTINGS: | |
796 | settings_util.create_repo_rhodecode_setting( |
|
831 | settings_util.create_repo_rhodecode_setting( | |
797 | repo_stub, key, 'abcde', type_='unicode') |
|
832 | repo_stub, key, 'abcde', type_='unicode') | |
|
833 | Session().commit() | |||
|
834 | ||||
798 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
835 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
799 | result = model.get_repo_ui_settings() |
|
836 | result = model.get_repo_ui_settings() | |
800 | for key in result: |
|
837 | for key in result: | |
801 | if key in VcsSettingsModel.GENERAL_SETTINGS: |
|
838 | if key in VcsSettingsModel.GENERAL_SETTINGS: | |
802 | assert result[key] == 'abcde' |
|
839 | assert result[key] == 'abcde' | |
803 |
|
840 | |||
804 | def test_raises_exception_when_repository_is_not_specified(self): |
|
841 | def test_raises_exception_when_repository_is_not_specified(self): | |
805 | model = VcsSettingsModel() |
|
842 | model = VcsSettingsModel() | |
806 | with pytest.raises(Exception) as exc_info: |
|
843 | with pytest.raises(Exception) as exc_info: | |
807 | model.get_repo_general_settings() |
|
844 | model.get_repo_general_settings() | |
808 | assert str(exc_info.value) == 'Repository is not specified' |
|
845 | assert str(exc_info.value) == 'Repository is not specified' | |
809 |
|
846 | |||
810 |
|
847 | |||
811 | class TestGetGlobalGeneralSettings(object): |
|
848 | class TestGetGlobalGeneralSettings(object): | |
812 | def test_global_settings_are_returned(self, repo_stub): |
|
849 | def test_global_settings_are_returned(self, repo_stub): | |
813 | model = VcsSettingsModel() |
|
850 | model = VcsSettingsModel() | |
814 | result = model.get_global_general_settings() |
|
851 | result = model.get_global_general_settings() | |
815 | expected_result = model.global_settings.get_all_settings() |
|
852 | expected_result = model.global_settings.get_all_settings() | |
816 | assert sorted(result) == sorted(expected_result) |
|
853 | assert sorted(result) == sorted(expected_result) | |
817 |
|
854 | |||
818 | def test_repo_uis_are_not_overriding_global_uis( |
|
855 | def test_repo_uis_are_not_overriding_global_uis( | |
819 | self, repo_stub, settings_util): |
|
856 | self, repo_stub, settings_util): | |
820 | for key in VcsSettingsModel.GENERAL_SETTINGS: |
|
857 | for key in VcsSettingsModel.GENERAL_SETTINGS: | |
821 | settings_util.create_repo_rhodecode_setting( |
|
858 | settings_util.create_repo_rhodecode_setting( | |
822 | repo_stub, key, 'abcde', type_='unicode') |
|
859 | repo_stub, key, 'abcde', type_='unicode') | |
|
860 | Session().commit() | |||
|
861 | ||||
823 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
862 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
824 | result = model.get_global_general_settings() |
|
863 | result = model.get_global_general_settings() | |
825 | expected_result = model.global_settings.get_all_settings() |
|
864 | expected_result = model.global_settings.get_all_settings() | |
826 | assert sorted(result) == sorted(expected_result) |
|
865 | assert sorted(result) == sorted(expected_result) | |
827 |
|
866 | |||
828 |
|
867 | |||
829 | class TestGetGlobalUiSettings(object): |
|
868 | class TestGetGlobalUiSettings(object): | |
830 | def test_global_uis_are_returned(self, repo_stub): |
|
869 | def test_global_uis_are_returned(self, repo_stub): | |
831 | model = VcsSettingsModel() |
|
870 | model = VcsSettingsModel() | |
832 | result = model.get_global_ui_settings() |
|
871 | result = model.get_global_ui_settings() | |
833 | expected_result = model.global_settings.get_ui() |
|
872 | expected_result = model.global_settings.get_ui() | |
834 | assert sorted(result) == sorted(expected_result) |
|
873 | assert sorted(result) == sorted(expected_result) | |
835 |
|
874 | |||
836 | def test_repo_uis_are_not_overriding_global_uis( |
|
875 | def test_repo_uis_are_not_overriding_global_uis( | |
837 | self, repo_stub, settings_util): |
|
876 | self, repo_stub, settings_util): | |
838 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
877 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: | |
839 | settings_util.create_repo_rhodecode_ui( |
|
878 | settings_util.create_repo_rhodecode_ui( | |
840 | repo_stub, section, 'repo', key=key, active=False) |
|
879 | repo_stub, section, 'repo', key=key, active=False) | |
|
880 | Session().commit() | |||
|
881 | ||||
841 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
882 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
842 | result = model.get_global_ui_settings() |
|
883 | result = model.get_global_ui_settings() | |
843 | expected_result = model.global_settings.get_ui() |
|
884 | expected_result = model.global_settings.get_ui() | |
844 | assert sorted(result) == sorted(expected_result) |
|
885 | assert sorted(result) == sorted(expected_result) | |
845 |
|
886 | |||
846 | def test_ui_settings_filtered_by_section( |
|
887 | def test_ui_settings_filtered_by_section( | |
847 | self, repo_stub, settings_util): |
|
888 | self, repo_stub, settings_util): | |
848 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
889 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
849 | section, key = VcsSettingsModel.HOOKS_SETTINGS[0] |
|
890 | section, key = VcsSettingsModel.HOOKS_SETTINGS[0] | |
850 | result = model.get_global_ui_settings(section=section) |
|
891 | result = model.get_global_ui_settings(section=section) | |
851 | expected_result = model.global_settings.get_ui(section=section) |
|
892 | expected_result = model.global_settings.get_ui(section=section) | |
852 | assert sorted(result) == sorted(expected_result) |
|
893 | assert sorted(result) == sorted(expected_result) | |
853 |
|
894 | |||
854 | def test_ui_settings_filtered_by_key( |
|
895 | def test_ui_settings_filtered_by_key( | |
855 | self, repo_stub, settings_util): |
|
896 | self, repo_stub, settings_util): | |
856 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
897 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
857 | section, key = VcsSettingsModel.HOOKS_SETTINGS[0] |
|
898 | section, key = VcsSettingsModel.HOOKS_SETTINGS[0] | |
858 | result = model.get_global_ui_settings(key=key) |
|
899 | result = model.get_global_ui_settings(key=key) | |
859 | expected_result = model.global_settings.get_ui(key=key) |
|
900 | expected_result = model.global_settings.get_ui(key=key) | |
860 | assert sorted(result) == sorted(expected_result) |
|
901 | assert sorted(result) == sorted(expected_result) | |
861 |
|
902 | |||
862 |
|
903 | |||
863 | class TestGetGeneralSettings(object): |
|
904 | class TestGetGeneralSettings(object): | |
864 | def test_global_settings_are_returned_when_inherited_is_true( |
|
905 | def test_global_settings_are_returned_when_inherited_is_true( | |
865 | self, repo_stub, settings_util): |
|
906 | self, repo_stub, settings_util): | |
866 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
907 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
867 | model.inherit_global_settings = True |
|
908 | model.inherit_global_settings = True | |
868 | for key in VcsSettingsModel.GENERAL_SETTINGS: |
|
909 | for key in VcsSettingsModel.GENERAL_SETTINGS: | |
869 | settings_util.create_repo_rhodecode_setting( |
|
910 | settings_util.create_repo_rhodecode_setting( | |
870 | repo_stub, key, 'abcde', type_='unicode') |
|
911 | repo_stub, key, 'abcde', type_='unicode') | |
|
912 | Session().commit() | |||
|
913 | ||||
871 | result = model.get_general_settings() |
|
914 | result = model.get_general_settings() | |
872 | expected_result = model.get_global_general_settings() |
|
915 | expected_result = model.get_global_general_settings() | |
873 | assert sorted(result) == sorted(expected_result) |
|
916 | assert sorted(result) == sorted(expected_result) | |
874 |
|
917 | |||
875 | def test_repo_settings_are_returned_when_inherited_is_false( |
|
918 | def test_repo_settings_are_returned_when_inherited_is_false( | |
876 | self, repo_stub, settings_util): |
|
919 | self, repo_stub, settings_util): | |
877 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
920 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
878 | model.inherit_global_settings = False |
|
921 | model.inherit_global_settings = False | |
879 | for key in VcsSettingsModel.GENERAL_SETTINGS: |
|
922 | for key in VcsSettingsModel.GENERAL_SETTINGS: | |
880 | settings_util.create_repo_rhodecode_setting( |
|
923 | settings_util.create_repo_rhodecode_setting( | |
881 | repo_stub, key, 'abcde', type_='unicode') |
|
924 | repo_stub, key, 'abcde', type_='unicode') | |
|
925 | Session().commit() | |||
|
926 | ||||
882 | result = model.get_general_settings() |
|
927 | result = model.get_general_settings() | |
883 | expected_result = model.get_repo_general_settings() |
|
928 | expected_result = model.get_repo_general_settings() | |
884 | assert sorted(result) == sorted(expected_result) |
|
929 | assert sorted(result) == sorted(expected_result) | |
885 |
|
930 | |||
886 | def test_global_settings_are_returned_when_no_repository_specified(self): |
|
931 | def test_global_settings_are_returned_when_no_repository_specified(self): | |
887 | model = VcsSettingsModel() |
|
932 | model = VcsSettingsModel() | |
888 | result = model.get_general_settings() |
|
933 | result = model.get_general_settings() | |
889 | expected_result = model.get_global_general_settings() |
|
934 | expected_result = model.get_global_general_settings() | |
890 | assert sorted(result) == sorted(expected_result) |
|
935 | assert sorted(result) == sorted(expected_result) | |
891 |
|
936 | |||
892 |
|
937 | |||
893 | class TestGetUiSettings(object): |
|
938 | class TestGetUiSettings(object): | |
894 | def test_global_settings_are_returned_when_inherited_is_true( |
|
939 | def test_global_settings_are_returned_when_inherited_is_true( | |
895 | self, repo_stub, settings_util): |
|
940 | self, repo_stub, settings_util): | |
896 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
941 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
897 | model.inherit_global_settings = True |
|
942 | model.inherit_global_settings = True | |
898 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
943 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: | |
899 | settings_util.create_repo_rhodecode_ui( |
|
944 | settings_util.create_repo_rhodecode_ui( | |
900 | repo_stub, section, 'repo', key=key, active=True) |
|
945 | repo_stub, section, 'repo', key=key, active=True) | |
|
946 | Session().commit() | |||
|
947 | ||||
901 | result = model.get_ui_settings() |
|
948 | result = model.get_ui_settings() | |
902 | expected_result = model.get_global_ui_settings() |
|
949 | expected_result = model.get_global_ui_settings() | |
903 | assert sorted(result) == sorted(expected_result) |
|
950 | assert sorted(result) == sorted(expected_result) | |
904 |
|
951 | |||
905 | def test_repo_settings_are_returned_when_inherited_is_false( |
|
952 | def test_repo_settings_are_returned_when_inherited_is_false( | |
906 | self, repo_stub, settings_util): |
|
953 | self, repo_stub, settings_util): | |
907 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
954 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
908 | model.inherit_global_settings = False |
|
955 | model.inherit_global_settings = False | |
909 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: |
|
956 | for section, key in VcsSettingsModel.HOOKS_SETTINGS: | |
910 | settings_util.create_repo_rhodecode_ui( |
|
957 | settings_util.create_repo_rhodecode_ui( | |
911 | repo_stub, section, 'repo', key=key, active=True) |
|
958 | repo_stub, section, 'repo', key=key, active=True) | |
|
959 | Session().commit() | |||
|
960 | ||||
912 | result = model.get_ui_settings() |
|
961 | result = model.get_ui_settings() | |
913 | expected_result = model.get_repo_ui_settings() |
|
962 | expected_result = model.get_repo_ui_settings() | |
914 | assert sorted(result) == sorted(expected_result) |
|
963 | assert sorted(result) == sorted(expected_result) | |
915 |
|
964 | |||
916 | def test_repo_settings_filtered_by_section_and_key(self, repo_stub): |
|
965 | def test_repo_settings_filtered_by_section_and_key(self, repo_stub): | |
917 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
966 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
918 | model.inherit_global_settings = False |
|
967 | model.inherit_global_settings = False | |
|
968 | ||||
919 | args = ('section', 'key') |
|
969 | args = ('section', 'key') | |
920 | with mock.patch.object(model, 'get_repo_ui_settings') as settings_mock: |
|
970 | with mock.patch.object(model, 'get_repo_ui_settings') as settings_mock: | |
921 | model.get_ui_settings(*args) |
|
971 | model.get_ui_settings(*args) | |
|
972 | Session().commit() | |||
|
973 | ||||
922 | settings_mock.assert_called_once_with(*args) |
|
974 | settings_mock.assert_called_once_with(*args) | |
923 |
|
975 | |||
924 | def test_global_settings_filtered_by_section_and_key(self): |
|
976 | def test_global_settings_filtered_by_section_and_key(self): | |
925 | model = VcsSettingsModel() |
|
977 | model = VcsSettingsModel() | |
926 | args = ('section', 'key') |
|
978 | args = ('section', 'key') | |
927 | with mock.patch.object(model, 'get_global_ui_settings') as ( |
|
979 | with mock.patch.object(model, 'get_global_ui_settings') as ( | |
928 | settings_mock): |
|
980 | settings_mock): | |
929 | model.get_ui_settings(*args) |
|
981 | model.get_ui_settings(*args) | |
930 | settings_mock.assert_called_once_with(*args) |
|
982 | settings_mock.assert_called_once_with(*args) | |
931 |
|
983 | |||
932 | def test_global_settings_are_returned_when_no_repository_specified(self): |
|
984 | def test_global_settings_are_returned_when_no_repository_specified(self): | |
933 | model = VcsSettingsModel() |
|
985 | model = VcsSettingsModel() | |
934 | result = model.get_ui_settings() |
|
986 | result = model.get_ui_settings() | |
935 | expected_result = model.get_global_ui_settings() |
|
987 | expected_result = model.get_global_ui_settings() | |
936 | assert sorted(result) == sorted(expected_result) |
|
988 | assert sorted(result) == sorted(expected_result) | |
937 |
|
989 | |||
938 |
|
990 | |||
939 | class TestGetSvnPatterns(object): |
|
991 | class TestGetSvnPatterns(object): | |
940 | def test_repo_settings_filtered_by_section_and_key(self, repo_stub): |
|
992 | def test_repo_settings_filtered_by_section_and_key(self, repo_stub): | |
941 | model = VcsSettingsModel(repo=repo_stub.repo_name) |
|
993 | model = VcsSettingsModel(repo=repo_stub.repo_name) | |
942 | args = ('section', ) |
|
994 | args = ('section', ) | |
943 | with mock.patch.object(model, 'get_repo_ui_settings') as settings_mock: |
|
995 | with mock.patch.object(model, 'get_repo_ui_settings') as settings_mock: | |
944 | model.get_svn_patterns(*args) |
|
996 | model.get_svn_patterns(*args) | |
|
997 | ||||
|
998 | Session().commit() | |||
945 | settings_mock.assert_called_once_with(*args) |
|
999 | settings_mock.assert_called_once_with(*args) | |
946 |
|
1000 | |||
947 | def test_global_settings_filtered_by_section_and_key(self): |
|
1001 | def test_global_settings_filtered_by_section_and_key(self): | |
948 | model = VcsSettingsModel() |
|
1002 | model = VcsSettingsModel() | |
949 | args = ('section', ) |
|
1003 | args = ('section', ) | |
950 | with mock.patch.object(model, 'get_global_ui_settings') as ( |
|
1004 | with mock.patch.object(model, 'get_global_ui_settings') as ( | |
951 | settings_mock): |
|
1005 | settings_mock): | |
952 | model.get_svn_patterns(*args) |
|
1006 | model.get_svn_patterns(*args) | |
953 | settings_mock.assert_called_once_with(*args) |
|
1007 | settings_mock.assert_called_once_with(*args) | |
954 |
|
1008 | |||
955 |
|
1009 | |||
956 | class TestGetReposLocation(object): |
|
1010 | class TestGetReposLocation(object): | |
957 | def test_returns_repos_location(self, repo_stub): |
|
1011 | def test_returns_repos_location(self, repo_stub): | |
958 | model = VcsSettingsModel() |
|
1012 | model = VcsSettingsModel() | |
959 |
|
1013 | |||
960 | result_mock = mock.Mock() |
|
1014 | result_mock = mock.Mock() | |
961 | result_mock.ui_value = '/tmp' |
|
1015 | result_mock.ui_value = '/tmp' | |
962 |
|
1016 | |||
963 | with mock.patch.object(model, 'global_settings') as settings_mock: |
|
1017 | with mock.patch.object(model, 'global_settings') as settings_mock: | |
964 | settings_mock.get_ui_by_key.return_value = result_mock |
|
1018 | settings_mock.get_ui_by_key.return_value = result_mock | |
965 | result = model.get_repos_location() |
|
1019 | result = model.get_repos_location() | |
966 |
|
1020 | |||
967 | settings_mock.get_ui_by_key.assert_called_once_with('/') |
|
1021 | settings_mock.get_ui_by_key.assert_called_once_with('/') | |
968 | assert result == '/tmp' |
|
1022 | assert result == '/tmp' | |
969 |
|
1023 | |||
970 |
|
1024 | |||
971 | class TestCreateOrUpdateRepoSettings(object): |
|
1025 | class TestCreateOrUpdateRepoSettings(object): | |
972 | FORM_DATA = { |
|
1026 | FORM_DATA = { | |
973 | 'inherit_global_settings': False, |
|
1027 | 'inherit_global_settings': False, | |
974 | 'hooks_changegroup_repo_size': False, |
|
1028 | 'hooks_changegroup_repo_size': False, | |
975 | 'hooks_changegroup_push_logger': False, |
|
1029 | 'hooks_changegroup_push_logger': False, | |
976 | 'hooks_outgoing_pull_logger': False, |
|
1030 | 'hooks_outgoing_pull_logger': False, | |
977 | 'extensions_largefiles': False, |
|
1031 | 'extensions_largefiles': False, | |
978 | 'extensions_evolve': False, |
|
1032 | 'extensions_evolve': False, | |
979 | 'largefiles_usercache': '/example/largefiles-store', |
|
1033 | 'largefiles_usercache': '/example/largefiles-store', | |
980 | 'vcs_git_lfs_enabled': False, |
|
1034 | 'vcs_git_lfs_enabled': False, | |
981 | 'vcs_git_lfs_store_location': '/', |
|
1035 | 'vcs_git_lfs_store_location': '/', | |
982 | 'phases_publish': 'False', |
|
1036 | 'phases_publish': 'False', | |
983 | 'rhodecode_pr_merge_enabled': False, |
|
1037 | 'rhodecode_pr_merge_enabled': False, | |
984 | 'rhodecode_use_outdated_comments': False, |
|
1038 | 'rhodecode_use_outdated_comments': False, | |
985 | 'new_svn_branch': '', |
|
1039 | 'new_svn_branch': '', | |
986 | 'new_svn_tag': '' |
|
1040 | 'new_svn_tag': '' | |
987 | } |
|
1041 | } | |
988 |
|
1042 | |||
989 | def test_get_raises_exception_when_repository_not_specified(self): |
|
1043 | def test_get_raises_exception_when_repository_not_specified(self): | |
990 | model = VcsSettingsModel() |
|
1044 | model = VcsSettingsModel() | |
991 | with pytest.raises(Exception) as exc_info: |
|
1045 | with pytest.raises(Exception) as exc_info: | |
992 | model.create_or_update_repo_settings(data=self.FORM_DATA) |
|
1046 | model.create_or_update_repo_settings(data=self.FORM_DATA) | |
|
1047 | Session().commit() | |||
|
1048 | ||||
993 | assert str(exc_info.value) == 'Repository is not specified' |
|
1049 | assert str(exc_info.value) == 'Repository is not specified' | |
994 |
|
1050 | |||
995 | def test_only_svn_settings_are_updated_when_type_is_svn(self, backend_svn): |
|
1051 | def test_only_svn_settings_are_updated_when_type_is_svn(self, backend_svn): | |
996 | repo = backend_svn.create_repo() |
|
1052 | repo = backend_svn.create_repo() | |
997 | model = VcsSettingsModel(repo=repo) |
|
1053 | model = VcsSettingsModel(repo=repo) | |
998 | with self._patch_model(model) as mocks: |
|
1054 | with self._patch_model(model) as mocks: | |
999 | model.create_or_update_repo_settings( |
|
1055 | model.create_or_update_repo_settings( | |
1000 | data=self.FORM_DATA, inherit_global_settings=False) |
|
1056 | data=self.FORM_DATA, inherit_global_settings=False) | |
|
1057 | Session().commit() | |||
|
1058 | ||||
1001 | mocks['create_repo_svn_settings'].assert_called_once_with( |
|
1059 | mocks['create_repo_svn_settings'].assert_called_once_with( | |
1002 | self.FORM_DATA) |
|
1060 | self.FORM_DATA) | |
1003 | non_called_methods = ( |
|
1061 | non_called_methods = ( | |
1004 | 'create_or_update_repo_hook_settings', |
|
1062 | 'create_or_update_repo_hook_settings', | |
1005 | 'create_or_update_repo_pr_settings', |
|
1063 | 'create_or_update_repo_pr_settings', | |
1006 | 'create_or_update_repo_hg_settings') |
|
1064 | 'create_or_update_repo_hg_settings') | |
1007 | for method in non_called_methods: |
|
1065 | for method in non_called_methods: | |
1008 | assert mocks[method].call_count == 0 |
|
1066 | assert mocks[method].call_count == 0 | |
1009 |
|
1067 | |||
1010 | def test_non_svn_settings_are_updated_when_type_is_hg(self, backend_hg): |
|
1068 | def test_non_svn_settings_are_updated_when_type_is_hg(self, backend_hg): | |
1011 | repo = backend_hg.create_repo() |
|
1069 | repo = backend_hg.create_repo() | |
1012 | model = VcsSettingsModel(repo=repo) |
|
1070 | model = VcsSettingsModel(repo=repo) | |
1013 | with self._patch_model(model) as mocks: |
|
1071 | with self._patch_model(model) as mocks: | |
1014 | model.create_or_update_repo_settings( |
|
1072 | model.create_or_update_repo_settings( | |
1015 | data=self.FORM_DATA, inherit_global_settings=False) |
|
1073 | data=self.FORM_DATA, inherit_global_settings=False) | |
|
1074 | Session().commit() | |||
1016 |
|
1075 | |||
1017 | assert mocks['create_repo_svn_settings'].call_count == 0 |
|
1076 | assert mocks['create_repo_svn_settings'].call_count == 0 | |
1018 | called_methods = ( |
|
1077 | called_methods = ( | |
1019 | 'create_or_update_repo_hook_settings', |
|
1078 | 'create_or_update_repo_hook_settings', | |
1020 | 'create_or_update_repo_pr_settings', |
|
1079 | 'create_or_update_repo_pr_settings', | |
1021 | 'create_or_update_repo_hg_settings') |
|
1080 | 'create_or_update_repo_hg_settings') | |
1022 | for method in called_methods: |
|
1081 | for method in called_methods: | |
1023 | mocks[method].assert_called_once_with(self.FORM_DATA) |
|
1082 | mocks[method].assert_called_once_with(self.FORM_DATA) | |
1024 |
|
1083 | |||
1025 | def test_non_svn_and_hg_settings_are_updated_when_type_is_git( |
|
1084 | def test_non_svn_and_hg_settings_are_updated_when_type_is_git( | |
1026 | self, backend_git): |
|
1085 | self, backend_git): | |
1027 | repo = backend_git.create_repo() |
|
1086 | repo = backend_git.create_repo() | |
1028 | model = VcsSettingsModel(repo=repo) |
|
1087 | model = VcsSettingsModel(repo=repo) | |
1029 | with self._patch_model(model) as mocks: |
|
1088 | with self._patch_model(model) as mocks: | |
1030 | model.create_or_update_repo_settings( |
|
1089 | model.create_or_update_repo_settings( | |
1031 | data=self.FORM_DATA, inherit_global_settings=False) |
|
1090 | data=self.FORM_DATA, inherit_global_settings=False) | |
1032 |
|
1091 | |||
1033 | assert mocks['create_repo_svn_settings'].call_count == 0 |
|
1092 | assert mocks['create_repo_svn_settings'].call_count == 0 | |
1034 | called_methods = ( |
|
1093 | called_methods = ( | |
1035 | 'create_or_update_repo_hook_settings', |
|
1094 | 'create_or_update_repo_hook_settings', | |
1036 | 'create_or_update_repo_pr_settings') |
|
1095 | 'create_or_update_repo_pr_settings') | |
1037 | non_called_methods = ( |
|
1096 | non_called_methods = ( | |
1038 | 'create_repo_svn_settings', |
|
1097 | 'create_repo_svn_settings', | |
1039 | 'create_or_update_repo_hg_settings' |
|
1098 | 'create_or_update_repo_hg_settings' | |
1040 | ) |
|
1099 | ) | |
1041 | for method in called_methods: |
|
1100 | for method in called_methods: | |
1042 | mocks[method].assert_called_once_with(self.FORM_DATA) |
|
1101 | mocks[method].assert_called_once_with(self.FORM_DATA) | |
1043 | for method in non_called_methods: |
|
1102 | for method in non_called_methods: | |
1044 | assert mocks[method].call_count == 0 |
|
1103 | assert mocks[method].call_count == 0 | |
1045 |
|
1104 | |||
1046 | def test_no_methods_are_called_when_settings_are_inherited( |
|
1105 | def test_no_methods_are_called_when_settings_are_inherited( | |
1047 | self, backend): |
|
1106 | self, backend): | |
1048 | repo = backend.create_repo() |
|
1107 | repo = backend.create_repo() | |
1049 | model = VcsSettingsModel(repo=repo) |
|
1108 | model = VcsSettingsModel(repo=repo) | |
1050 | with self._patch_model(model) as mocks: |
|
1109 | with self._patch_model(model) as mocks: | |
1051 | model.create_or_update_repo_settings( |
|
1110 | model.create_or_update_repo_settings( | |
1052 | data=self.FORM_DATA, inherit_global_settings=True) |
|
1111 | data=self.FORM_DATA, inherit_global_settings=True) | |
1053 | for method_name in mocks: |
|
1112 | for method_name in mocks: | |
1054 | assert mocks[method_name].call_count == 0 |
|
1113 | assert mocks[method_name].call_count == 0 | |
1055 |
|
1114 | |||
1056 | def test_cache_is_marked_for_invalidation(self, repo_stub): |
|
1115 | def test_cache_is_marked_for_invalidation(self, repo_stub): | |
1057 | model = VcsSettingsModel(repo=repo_stub) |
|
1116 | model = VcsSettingsModel(repo=repo_stub) | |
1058 | invalidation_patcher = mock.patch( |
|
1117 | invalidation_patcher = mock.patch( | |
1059 | 'rhodecode.model.scm.ScmModel.mark_for_invalidation') |
|
1118 | 'rhodecode.model.scm.ScmModel.mark_for_invalidation') | |
1060 | with invalidation_patcher as invalidation_mock: |
|
1119 | with invalidation_patcher as invalidation_mock: | |
1061 | model.create_or_update_repo_settings( |
|
1120 | model.create_or_update_repo_settings( | |
1062 | data=self.FORM_DATA, inherit_global_settings=True) |
|
1121 | data=self.FORM_DATA, inherit_global_settings=True) | |
|
1122 | Session().commit() | |||
|
1123 | ||||
1063 | invalidation_mock.assert_called_once_with( |
|
1124 | invalidation_mock.assert_called_once_with( | |
1064 | repo_stub.repo_name, delete=True) |
|
1125 | repo_stub.repo_name, delete=True) | |
1065 |
|
1126 | |||
1066 | def test_inherit_flag_is_saved(self, repo_stub): |
|
1127 | def test_inherit_flag_is_saved(self, repo_stub): | |
1067 | model = VcsSettingsModel(repo=repo_stub) |
|
1128 | model = VcsSettingsModel(repo=repo_stub) | |
1068 | model.inherit_global_settings = True |
|
1129 | model.inherit_global_settings = True | |
1069 | with self._patch_model(model): |
|
1130 | with self._patch_model(model): | |
1070 | model.create_or_update_repo_settings( |
|
1131 | model.create_or_update_repo_settings( | |
1071 | data=self.FORM_DATA, inherit_global_settings=False) |
|
1132 | data=self.FORM_DATA, inherit_global_settings=False) | |
|
1133 | Session().commit() | |||
|
1134 | ||||
1072 | assert model.inherit_global_settings is False |
|
1135 | assert model.inherit_global_settings is False | |
1073 |
|
1136 | |||
1074 | def _patch_model(self, model): |
|
1137 | def _patch_model(self, model): | |
1075 | return mock.patch.multiple( |
|
1138 | return mock.patch.multiple( | |
1076 | model, |
|
1139 | model, | |
1077 | create_repo_svn_settings=mock.DEFAULT, |
|
1140 | create_repo_svn_settings=mock.DEFAULT, | |
1078 | create_or_update_repo_hook_settings=mock.DEFAULT, |
|
1141 | create_or_update_repo_hook_settings=mock.DEFAULT, | |
1079 | create_or_update_repo_pr_settings=mock.DEFAULT, |
|
1142 | create_or_update_repo_pr_settings=mock.DEFAULT, | |
1080 | create_or_update_repo_hg_settings=mock.DEFAULT) |
|
1143 | create_or_update_repo_hg_settings=mock.DEFAULT) |
@@ -1,735 +1,744 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2019 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2019 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import pytest |
|
21 | import pytest | |
22 |
|
22 | |||
23 | from rhodecode.lib.auth import AuthUser |
|
23 | from rhodecode.lib.auth import AuthUser | |
24 | from rhodecode.model.db import ( |
|
24 | from rhodecode.model.db import ( | |
25 | RepoGroup, User, UserGroupRepoGroupToPerm, Permission, UserToPerm, |
|
25 | RepoGroup, User, UserGroupRepoGroupToPerm, Permission, UserToPerm, | |
26 | UserGroupToPerm) |
|
26 | UserGroupToPerm) | |
27 | from rhodecode.model.meta import Session |
|
27 | from rhodecode.model.meta import Session | |
28 | from rhodecode.model.permission import PermissionModel |
|
28 | from rhodecode.model.permission import PermissionModel | |
29 | from rhodecode.model.repo import RepoModel |
|
29 | from rhodecode.model.repo import RepoModel | |
30 | from rhodecode.model.repo_group import RepoGroupModel |
|
30 | from rhodecode.model.repo_group import RepoGroupModel | |
31 | from rhodecode.model.user import UserModel |
|
31 | from rhodecode.model.user import UserModel | |
32 | from rhodecode.model.user_group import UserGroupModel |
|
32 | from rhodecode.model.user_group import UserGroupModel | |
33 | from rhodecode.tests.fixture import Fixture |
|
33 | from rhodecode.tests.fixture import Fixture | |
34 |
|
34 | |||
35 |
|
35 | |||
36 | fixture = Fixture() |
|
36 | fixture = Fixture() | |
37 |
|
37 | |||
38 |
|
38 | |||
39 | @pytest.fixture() |
|
39 | @pytest.fixture() | |
40 | def repo_name(backend_hg): |
|
40 | def repo_name(backend_hg): | |
41 | return backend_hg.repo_name |
|
41 | return backend_hg.repo_name | |
42 |
|
42 | |||
43 |
|
43 | |||
44 | class TestPermissions(object): |
|
44 | class TestPermissions(object): | |
45 |
|
45 | |||
46 | @pytest.fixture(scope='class', autouse=True) |
|
46 | @pytest.fixture(scope='class', autouse=True) | |
47 | def default_permissions(self, request, baseapp): |
|
47 | def default_permissions(self, request, baseapp): | |
48 | # recreate default user to get a clean start |
|
48 | # recreate default user to get a clean start | |
49 | PermissionModel().create_default_user_permissions( |
|
49 | PermissionModel().create_default_user_permissions( | |
50 | user=User.DEFAULT_USER, force=True) |
|
50 | user=User.DEFAULT_USER, force=True) | |
51 | Session().commit() |
|
51 | Session().commit() | |
52 |
|
52 | |||
53 | @pytest.fixture(autouse=True) |
|
53 | @pytest.fixture(autouse=True) | |
54 | def prepare_users(self, request): |
|
54 | def prepare_users(self, request): | |
55 | # TODO: User creation is a duplicate of test_nofitications, check |
|
55 | # TODO: User creation is a duplicate of test_nofitications, check | |
56 | # if that can be unified |
|
56 | # if that can be unified | |
57 | self.u1 = UserModel().create_or_update( |
|
57 | self.u1 = UserModel().create_or_update( | |
58 | username=u'u1', password=u'qweqwe', |
|
58 | username=u'u1', password=u'qweqwe', | |
59 | email=u'u1@rhodecode.org', firstname=u'u1', lastname=u'u1' |
|
59 | email=u'u1@rhodecode.org', firstname=u'u1', lastname=u'u1' | |
60 | ) |
|
60 | ) | |
61 | self.u2 = UserModel().create_or_update( |
|
61 | self.u2 = UserModel().create_or_update( | |
62 | username=u'u2', password=u'qweqwe', |
|
62 | username=u'u2', password=u'qweqwe', | |
63 | email=u'u2@rhodecode.org', firstname=u'u2', lastname=u'u2' |
|
63 | email=u'u2@rhodecode.org', firstname=u'u2', lastname=u'u2' | |
64 | ) |
|
64 | ) | |
65 | self.u3 = UserModel().create_or_update( |
|
65 | self.u3 = UserModel().create_or_update( | |
66 | username=u'u3', password=u'qweqwe', |
|
66 | username=u'u3', password=u'qweqwe', | |
67 | email=u'u3@rhodecode.org', firstname=u'u3', lastname=u'u3' |
|
67 | email=u'u3@rhodecode.org', firstname=u'u3', lastname=u'u3' | |
68 | ) |
|
68 | ) | |
69 | self.anon = User.get_default_user() |
|
69 | self.anon = User.get_default_user() | |
70 | self.a1 = UserModel().create_or_update( |
|
70 | self.a1 = UserModel().create_or_update( | |
71 | username=u'a1', password=u'qweqwe', |
|
71 | username=u'a1', password=u'qweqwe', | |
72 | email=u'a1@rhodecode.org', firstname=u'a1', lastname=u'a1', |
|
72 | email=u'a1@rhodecode.org', firstname=u'a1', lastname=u'a1', | |
73 | admin=True |
|
73 | admin=True | |
74 | ) |
|
74 | ) | |
75 | Session().commit() |
|
75 | Session().commit() | |
76 |
|
76 | |||
77 | request.addfinalizer(self.cleanup) |
|
77 | request.addfinalizer(self.cleanup) | |
78 |
|
78 | |||
79 | def cleanup(self): |
|
79 | def cleanup(self): | |
80 | if hasattr(self, 'test_repo'): |
|
80 | if hasattr(self, 'test_repo'): | |
81 | RepoModel().delete(repo=self.test_repo) |
|
81 | RepoModel().delete(repo=self.test_repo) | |
|
82 | Session().commit() | |||
82 |
|
83 | |||
83 | if hasattr(self, 'g1'): |
|
84 | if hasattr(self, 'g1'): | |
84 | RepoGroupModel().delete(self.g1.group_id) |
|
85 | RepoGroupModel().delete(self.g1.group_id) | |
85 | if hasattr(self, 'g2'): |
|
86 | if hasattr(self, 'g2'): | |
86 | RepoGroupModel().delete(self.g2.group_id) |
|
87 | RepoGroupModel().delete(self.g2.group_id) | |
|
88 | Session().commit() | |||
87 |
|
89 | |||
88 | UserModel().delete(self.u1) |
|
90 | UserModel().delete(self.u1, handle_repos='delete', handle_repo_groups='delete') | |
89 | UserModel().delete(self.u2) |
|
91 | UserModel().delete(self.u2, handle_repos='delete', handle_repo_groups='delete') | |
90 | UserModel().delete(self.u3) |
|
92 | UserModel().delete(self.u3, handle_repos='delete', handle_repo_groups='delete') | |
91 | UserModel().delete(self.a1) |
|
93 | UserModel().delete(self.a1, handle_repos='delete', handle_repo_groups='delete') | |
|
94 | Session().commit() | |||
92 |
|
95 | |||
93 | if hasattr(self, 'ug1'): |
|
96 | if hasattr(self, 'ug1'): | |
94 | UserGroupModel().delete(self.ug1, force=True) |
|
97 | UserGroupModel().delete(self.ug1, force=True) | |
95 |
|
98 | Session().commit() | ||
96 | Session().commit() |
|
|||
97 |
|
99 | |||
98 | def test_default_perms_set(self, repo_name): |
|
100 | def test_default_perms_set(self, repo_name): | |
99 | assert repo_perms(self.u1)[repo_name] == 'repository.read' |
|
101 | assert repo_perms(self.u1)[repo_name] == 'repository.read' | |
100 | new_perm = 'repository.write' |
|
102 | new_perm = 'repository.write' | |
101 | RepoModel().grant_user_permission(repo=repo_name, user=self.u1, |
|
103 | RepoModel().grant_user_permission(repo=repo_name, user=self.u1, | |
102 | perm=new_perm) |
|
104 | perm=new_perm) | |
103 | Session().commit() |
|
105 | Session().commit() | |
104 | assert repo_perms(self.u1)[repo_name] == new_perm |
|
106 | assert repo_perms(self.u1)[repo_name] == new_perm | |
105 |
|
107 | |||
106 | def test_default_admin_perms_set(self, repo_name): |
|
108 | def test_default_admin_perms_set(self, repo_name): | |
107 | assert repo_perms(self.a1)[repo_name] == 'repository.admin' |
|
109 | assert repo_perms(self.a1)[repo_name] == 'repository.admin' | |
108 | RepoModel().grant_user_permission(repo=repo_name, user=self.a1, |
|
110 | RepoModel().grant_user_permission(repo=repo_name, user=self.a1, | |
109 | perm='repository.write') |
|
111 | perm='repository.write') | |
110 | Session().commit() |
|
112 | Session().commit() | |
111 | # cannot really downgrade admins permissions !? they still gets set as |
|
113 | # cannot really downgrade admins permissions !? they still gets set as | |
112 | # admin ! |
|
114 | # admin ! | |
113 | assert repo_perms(self.a1)[repo_name] == 'repository.admin' |
|
115 | assert repo_perms(self.a1)[repo_name] == 'repository.admin' | |
114 |
|
116 | |||
115 | def test_default_group_perms(self, repo_name): |
|
117 | def test_default_group_perms(self, repo_name): | |
116 | self.g1 = fixture.create_repo_group('test1', skip_if_exists=True) |
|
118 | self.g1 = fixture.create_repo_group('test1', skip_if_exists=True) | |
117 | self.g2 = fixture.create_repo_group('test2', skip_if_exists=True) |
|
119 | self.g2 = fixture.create_repo_group('test2', skip_if_exists=True) | |
118 |
|
120 | |||
119 | assert repo_perms(self.u1)[repo_name] == 'repository.read' |
|
121 | assert repo_perms(self.u1)[repo_name] == 'repository.read' | |
120 | assert group_perms(self.u1) == { |
|
122 | assert group_perms(self.u1) == { | |
121 | 'test1': 'group.read', 'test2': 'group.read'} |
|
123 | 'test1': 'group.read', 'test2': 'group.read'} | |
122 | assert global_perms(self.u1) == set( |
|
124 | assert global_perms(self.u1) == set( | |
123 | Permission.DEFAULT_USER_PERMISSIONS) |
|
125 | Permission.DEFAULT_USER_PERMISSIONS) | |
124 |
|
126 | |||
125 | def test_default_admin_group_perms(self, repo_name): |
|
127 | def test_default_admin_group_perms(self, repo_name): | |
126 | self.g1 = fixture.create_repo_group('test1', skip_if_exists=True) |
|
128 | self.g1 = fixture.create_repo_group('test1', skip_if_exists=True) | |
127 | self.g2 = fixture.create_repo_group('test2', skip_if_exists=True) |
|
129 | self.g2 = fixture.create_repo_group('test2', skip_if_exists=True) | |
128 |
|
130 | |||
129 | assert repo_perms(self.a1)[repo_name] == 'repository.admin' |
|
131 | assert repo_perms(self.a1)[repo_name] == 'repository.admin' | |
130 | assert group_perms(self.a1) == { |
|
132 | assert group_perms(self.a1) == { | |
131 | 'test1': 'group.admin', 'test2': 'group.admin'} |
|
133 | 'test1': 'group.admin', 'test2': 'group.admin'} | |
132 |
|
134 | |||
133 | def test_default_owner_repo_perms(self, backend, user_util, test_repo): |
|
135 | def test_default_owner_repo_perms(self, backend, user_util, test_repo): | |
134 | user = user_util.create_user() |
|
136 | user = user_util.create_user() | |
135 | repo = test_repo('minimal', backend.alias) |
|
137 | repo = test_repo('minimal', backend.alias) | |
136 | org_owner = repo.user |
|
138 | org_owner = repo.user | |
137 | assert repo_perms(user)[repo.repo_name] == 'repository.read' |
|
139 | assert repo_perms(user)[repo.repo_name] == 'repository.read' | |
138 |
|
140 | |||
139 | repo.user = user |
|
141 | repo.user = user | |
140 | assert repo_perms(user)[repo.repo_name] == 'repository.admin' |
|
142 | assert repo_perms(user)[repo.repo_name] == 'repository.admin' | |
141 | repo.user = org_owner |
|
143 | repo.user = org_owner | |
142 |
|
144 | |||
143 | def test_default_owner_branch_perms(self, user_util, test_user_group): |
|
145 | def test_default_owner_branch_perms(self, user_util, test_user_group): | |
144 | user = user_util.create_user() |
|
146 | user = user_util.create_user() | |
145 | assert branch_perms(user) == {} |
|
147 | assert branch_perms(user) == {} | |
146 |
|
148 | |||
147 | def test_default_owner_repo_group_perms(self, user_util, test_repo_group): |
|
149 | def test_default_owner_repo_group_perms(self, user_util, test_repo_group): | |
148 | user = user_util.create_user() |
|
150 | user = user_util.create_user() | |
149 | org_owner = test_repo_group.user |
|
151 | org_owner = test_repo_group.user | |
150 |
|
152 | |||
151 | assert group_perms(user)[test_repo_group.group_name] == 'group.read' |
|
153 | assert group_perms(user)[test_repo_group.group_name] == 'group.read' | |
152 |
|
154 | |||
153 | test_repo_group.user = user |
|
155 | test_repo_group.user = user | |
154 | assert group_perms(user)[test_repo_group.group_name] == 'group.admin' |
|
156 | assert group_perms(user)[test_repo_group.group_name] == 'group.admin' | |
155 | test_repo_group.user = org_owner |
|
157 | test_repo_group.user = org_owner | |
156 |
|
158 | |||
157 | def test_default_owner_user_group_perms(self, user_util, test_user_group): |
|
159 | def test_default_owner_user_group_perms(self, user_util, test_user_group): | |
158 | user = user_util.create_user() |
|
160 | user = user_util.create_user() | |
159 | org_owner = test_user_group.user |
|
161 | org_owner = test_user_group.user | |
160 |
|
162 | |||
161 | assert user_group_perms(user)[test_user_group.users_group_name] == 'usergroup.read' |
|
163 | assert user_group_perms(user)[test_user_group.users_group_name] == 'usergroup.read' | |
162 |
|
164 | |||
163 | test_user_group.user = user |
|
165 | test_user_group.user = user | |
164 | assert user_group_perms(user)[test_user_group.users_group_name] == 'usergroup.admin' |
|
166 | assert user_group_perms(user)[test_user_group.users_group_name] == 'usergroup.admin' | |
165 |
|
167 | |||
166 | test_user_group.user = org_owner |
|
168 | test_user_group.user = org_owner | |
167 |
|
169 | |||
168 | def test_propagated_permission_from_users_group_by_explicit_perms_exist( |
|
170 | def test_propagated_permission_from_users_group_by_explicit_perms_exist( | |
169 | self, repo_name): |
|
171 | self, repo_name): | |
170 | # make group |
|
172 | # make group | |
171 | self.ug1 = fixture.create_user_group('G1') |
|
173 | self.ug1 = fixture.create_user_group('G1') | |
172 | UserGroupModel().add_user_to_group(self.ug1, self.u1) |
|
174 | UserGroupModel().add_user_to_group(self.ug1, self.u1) | |
173 |
|
175 | |||
174 | # set permission to lower |
|
176 | # set permission to lower | |
175 | new_perm = 'repository.none' |
|
177 | new_perm = 'repository.none' | |
176 | RepoModel().grant_user_permission( |
|
178 | RepoModel().grant_user_permission( | |
177 | repo=repo_name, user=self.u1, perm=new_perm) |
|
179 | repo=repo_name, user=self.u1, perm=new_perm) | |
178 | Session().commit() |
|
180 | Session().commit() | |
179 | assert repo_perms(self.u1)[repo_name] == new_perm |
|
181 | assert repo_perms(self.u1)[repo_name] == new_perm | |
180 |
|
182 | |||
181 | # grant perm for group this should not override permission from user |
|
183 | # grant perm for group this should not override permission from user | |
182 | # since it has explicitly set |
|
184 | # since it has explicitly set | |
183 | new_perm_gr = 'repository.write' |
|
185 | new_perm_gr = 'repository.write' | |
184 | RepoModel().grant_user_group_permission( |
|
186 | RepoModel().grant_user_group_permission( | |
185 | repo=repo_name, group_name=self.ug1, perm=new_perm_gr) |
|
187 | repo=repo_name, group_name=self.ug1, perm=new_perm_gr) | |
|
188 | Session().commit() | |||
186 |
|
189 | |||
187 | assert repo_perms(self.u1)[repo_name] == new_perm |
|
190 | assert repo_perms(self.u1)[repo_name] == new_perm | |
188 | assert group_perms(self.u1) == {} |
|
191 | assert group_perms(self.u1) == {} | |
189 |
|
192 | |||
190 | def test_propagated_permission_from_users_group(self, repo_name): |
|
193 | def test_propagated_permission_from_users_group(self, repo_name): | |
191 | # make group |
|
194 | # make group | |
192 | self.ug1 = fixture.create_user_group('G1') |
|
195 | self.ug1 = fixture.create_user_group('G1') | |
193 | UserGroupModel().add_user_to_group(self.ug1, self.u3) |
|
196 | UserGroupModel().add_user_to_group(self.ug1, self.u3) | |
194 |
|
197 | |||
195 | # grant perm for group |
|
198 | # grant perm for group | |
196 | # this should override default permission from user |
|
199 | # this should override default permission from user | |
197 | new_perm_gr = 'repository.write' |
|
200 | new_perm_gr = 'repository.write' | |
198 | RepoModel().grant_user_group_permission( |
|
201 | RepoModel().grant_user_group_permission( | |
199 | repo=repo_name, group_name=self.ug1, perm=new_perm_gr) |
|
202 | repo=repo_name, group_name=self.ug1, perm=new_perm_gr) | |
|
203 | Session().commit() | |||
200 |
|
204 | |||
201 | assert repo_perms(self.u3)[repo_name] == new_perm_gr |
|
205 | assert repo_perms(self.u3)[repo_name] == new_perm_gr | |
202 | assert group_perms(self.u3) == {} |
|
206 | assert group_perms(self.u3) == {} | |
203 |
|
207 | |||
204 | def test_propagated_permission_from_users_group_lower_weight( |
|
208 | def test_propagated_permission_from_users_group_lower_weight( | |
205 | self, repo_name): |
|
209 | self, repo_name): | |
206 | # make group with user |
|
210 | # make group with user | |
207 | self.ug1 = fixture.create_user_group('G1') |
|
211 | self.ug1 = fixture.create_user_group('G1') | |
208 | UserGroupModel().add_user_to_group(self.ug1, self.u1) |
|
212 | UserGroupModel().add_user_to_group(self.ug1, self.u1) | |
209 |
|
213 | |||
210 | # set permission to lower |
|
214 | # set permission to lower | |
211 | new_perm_h = 'repository.write' |
|
215 | new_perm_h = 'repository.write' | |
212 | RepoModel().grant_user_permission( |
|
216 | RepoModel().grant_user_permission( | |
213 | repo=repo_name, user=self.u1, perm=new_perm_h) |
|
217 | repo=repo_name, user=self.u1, perm=new_perm_h) | |
214 | Session().commit() |
|
218 | Session().commit() | |
215 |
|
219 | |||
216 | assert repo_perms(self.u1)[repo_name] == new_perm_h |
|
220 | assert repo_perms(self.u1)[repo_name] == new_perm_h | |
217 |
|
221 | |||
218 | # grant perm for group this should NOT override permission from user |
|
222 | # grant perm for group this should NOT override permission from user | |
219 | # since it's lower than granted |
|
223 | # since it's lower than granted | |
220 | new_perm_l = 'repository.read' |
|
224 | new_perm_l = 'repository.read' | |
221 | RepoModel().grant_user_group_permission( |
|
225 | RepoModel().grant_user_group_permission( | |
222 | repo=repo_name, group_name=self.ug1, perm=new_perm_l) |
|
226 | repo=repo_name, group_name=self.ug1, perm=new_perm_l) | |
|
227 | Session().commit() | |||
223 |
|
228 | |||
224 | assert repo_perms(self.u1)[repo_name] == new_perm_h |
|
229 | assert repo_perms(self.u1)[repo_name] == new_perm_h | |
225 | assert group_perms(self.u1) == {} |
|
230 | assert group_perms(self.u1) == {} | |
226 |
|
231 | |||
227 | def test_repo_in_group_permissions(self): |
|
232 | def test_repo_in_group_permissions(self): | |
228 | self.g1 = fixture.create_repo_group('group1', skip_if_exists=True) |
|
233 | self.g1 = fixture.create_repo_group('group1', skip_if_exists=True) | |
229 | self.g2 = fixture.create_repo_group('group2', skip_if_exists=True) |
|
234 | self.g2 = fixture.create_repo_group('group2', skip_if_exists=True) | |
230 | # both perms should be read ! |
|
235 | # both perms should be read ! | |
231 | assert group_perms(self.u1) == \ |
|
236 | assert group_perms(self.u1) == \ | |
232 | {u'group1': u'group.read', u'group2': u'group.read'} |
|
237 | {u'group1': u'group.read', u'group2': u'group.read'} | |
233 |
|
238 | |||
234 | assert group_perms(self.anon) == \ |
|
239 | assert group_perms(self.anon) == \ | |
235 | {u'group1': u'group.read', u'group2': u'group.read'} |
|
240 | {u'group1': u'group.read', u'group2': u'group.read'} | |
236 |
|
241 | |||
237 | # Change perms to none for both groups |
|
242 | # Change perms to none for both groups | |
238 | RepoGroupModel().grant_user_permission( |
|
243 | RepoGroupModel().grant_user_permission( | |
239 | repo_group=self.g1, user=self.anon, perm='group.none') |
|
244 | repo_group=self.g1, user=self.anon, perm='group.none') | |
240 | RepoGroupModel().grant_user_permission( |
|
245 | RepoGroupModel().grant_user_permission( | |
241 | repo_group=self.g2, user=self.anon, perm='group.none') |
|
246 | repo_group=self.g2, user=self.anon, perm='group.none') | |
242 |
|
247 | |||
243 | assert group_perms(self.u1) == \ |
|
248 | assert group_perms(self.u1) == \ | |
244 | {u'group1': u'group.none', u'group2': u'group.none'} |
|
249 | {u'group1': u'group.none', u'group2': u'group.none'} | |
245 | assert group_perms(self.anon) == \ |
|
250 | assert group_perms(self.anon) == \ | |
246 | {u'group1': u'group.none', u'group2': u'group.none'} |
|
251 | {u'group1': u'group.none', u'group2': u'group.none'} | |
247 |
|
252 | |||
248 | # add repo to group |
|
253 | # add repo to group | |
249 | name = RepoGroup.url_sep().join([self.g1.group_name, 'test_perm']) |
|
254 | name = RepoGroup.url_sep().join([self.g1.group_name, 'test_perm']) | |
250 | self.test_repo = fixture.create_repo(name=name, |
|
255 | self.test_repo = fixture.create_repo(name=name, | |
251 | repo_type='hg', |
|
256 | repo_type='hg', | |
252 | repo_group=self.g1, |
|
257 | repo_group=self.g1, | |
253 | cur_user=self.u1,) |
|
258 | cur_user=self.u1,) | |
254 |
|
259 | |||
255 | assert group_perms(self.u1) == \ |
|
260 | assert group_perms(self.u1) == \ | |
256 | {u'group1': u'group.none', u'group2': u'group.none'} |
|
261 | {u'group1': u'group.none', u'group2': u'group.none'} | |
257 | assert group_perms(self.anon) == \ |
|
262 | assert group_perms(self.anon) == \ | |
258 | {u'group1': u'group.none', u'group2': u'group.none'} |
|
263 | {u'group1': u'group.none', u'group2': u'group.none'} | |
259 |
|
264 | |||
260 | # grant permission for u2 ! |
|
265 | # grant permission for u2 ! | |
261 | RepoGroupModel().grant_user_permission( |
|
266 | RepoGroupModel().grant_user_permission( | |
262 | repo_group=self.g1, user=self.u2, perm='group.read') |
|
267 | repo_group=self.g1, user=self.u2, perm='group.read') | |
263 | RepoGroupModel().grant_user_permission( |
|
268 | RepoGroupModel().grant_user_permission( | |
264 | repo_group=self.g2, user=self.u2, perm='group.read') |
|
269 | repo_group=self.g2, user=self.u2, perm='group.read') | |
265 | Session().commit() |
|
270 | Session().commit() | |
266 | assert self.u1 != self.u2 |
|
271 | assert self.u1 != self.u2 | |
267 |
|
272 | |||
268 | # u1 and anon should have not change perms while u2 should ! |
|
273 | # u1 and anon should have not change perms while u2 should ! | |
269 | assert group_perms(self.u1) == \ |
|
274 | assert group_perms(self.u1) == \ | |
270 | {u'group1': u'group.none', u'group2': u'group.none'} |
|
275 | {u'group1': u'group.none', u'group2': u'group.none'} | |
271 | assert group_perms(self.u2) == \ |
|
276 | assert group_perms(self.u2) == \ | |
272 | {u'group1': u'group.read', u'group2': u'group.read'} |
|
277 | {u'group1': u'group.read', u'group2': u'group.read'} | |
273 | assert group_perms(self.anon) == \ |
|
278 | assert group_perms(self.anon) == \ | |
274 | {u'group1': u'group.none', u'group2': u'group.none'} |
|
279 | {u'group1': u'group.none', u'group2': u'group.none'} | |
275 |
|
280 | |||
276 | def test_repo_group_user_as_user_group_member(self): |
|
281 | def test_repo_group_user_as_user_group_member(self): | |
277 | # create Group1 |
|
282 | # create Group1 | |
278 | self.g1 = fixture.create_repo_group('group1', skip_if_exists=True) |
|
283 | self.g1 = fixture.create_repo_group('group1', skip_if_exists=True) | |
279 | assert group_perms(self.anon) == {u'group1': u'group.read'} |
|
284 | assert group_perms(self.anon) == {u'group1': u'group.read'} | |
280 |
|
285 | |||
281 | # set default permission to none |
|
286 | # set default permission to none | |
282 | RepoGroupModel().grant_user_permission( |
|
287 | RepoGroupModel().grant_user_permission( | |
283 | repo_group=self.g1, user=self.anon, perm='group.none') |
|
288 | repo_group=self.g1, user=self.anon, perm='group.none') | |
|
289 | Session().commit() | |||
|
290 | ||||
284 | # make group |
|
291 | # make group | |
285 | self.ug1 = fixture.create_user_group('G1') |
|
292 | self.ug1 = fixture.create_user_group('G1') | |
286 | # add user to group |
|
293 | # add user to group | |
287 | UserGroupModel().add_user_to_group(self.ug1, self.u1) |
|
294 | UserGroupModel().add_user_to_group(self.ug1, self.u1) | |
288 | Session().commit() |
|
295 | Session().commit() | |
289 |
|
296 | |||
290 | # check if user is in the group |
|
297 | # check if user is in the group | |
291 | ug1 = UserGroupModel().get(self.ug1.users_group_id) |
|
298 | ug1 = UserGroupModel().get(self.ug1.users_group_id) | |
292 | members = [x.user_id for x in ug1.members] |
|
299 | members = [x.user_id for x in ug1.members] | |
293 | assert members == [self.u1.user_id] |
|
300 | assert members == [self.u1.user_id] | |
294 | # add some user to that group |
|
301 | # add some user to that group | |
295 |
|
302 | |||
296 | # check his permissions |
|
303 | # check his permissions | |
297 | assert group_perms(self.anon) == {u'group1': u'group.none'} |
|
304 | assert group_perms(self.anon) == {u'group1': u'group.none'} | |
298 | assert group_perms(self.u1) == {u'group1': u'group.none'} |
|
305 | assert group_perms(self.u1) == {u'group1': u'group.none'} | |
299 |
|
306 | |||
300 | # grant ug1 read permissions for |
|
307 | # grant ug1 read permissions for | |
301 | RepoGroupModel().grant_user_group_permission( |
|
308 | RepoGroupModel().grant_user_group_permission( | |
302 | repo_group=self.g1, group_name=self.ug1, perm='group.read') |
|
309 | repo_group=self.g1, group_name=self.ug1, perm='group.read') | |
303 | Session().commit() |
|
310 | Session().commit() | |
304 |
|
311 | |||
305 | # check if the |
|
312 | # check if the | |
306 | obj = Session().query(UserGroupRepoGroupToPerm)\ |
|
313 | obj = Session().query(UserGroupRepoGroupToPerm)\ | |
307 | .filter(UserGroupRepoGroupToPerm.group == self.g1)\ |
|
314 | .filter(UserGroupRepoGroupToPerm.group == self.g1)\ | |
308 | .filter(UserGroupRepoGroupToPerm.users_group == self.ug1)\ |
|
315 | .filter(UserGroupRepoGroupToPerm.users_group == self.ug1)\ | |
309 | .scalar() |
|
316 | .scalar() | |
310 | assert obj.permission.permission_name == 'group.read' |
|
317 | assert obj.permission.permission_name == 'group.read' | |
311 |
|
318 | |||
312 | assert group_perms(self.anon) == {u'group1': u'group.none'} |
|
319 | assert group_perms(self.anon) == {u'group1': u'group.none'} | |
313 | assert group_perms(self.u1) == {u'group1': u'group.read'} |
|
320 | assert group_perms(self.u1) == {u'group1': u'group.read'} | |
314 |
|
321 | |||
315 | def test_inherited_permissions_from_default_on_user_enabled(self): |
|
322 | def test_inherited_permissions_from_default_on_user_enabled(self): | |
316 | # enable fork and create on default user |
|
323 | # enable fork and create on default user | |
317 | _form_result = { |
|
324 | _form_result = { | |
318 | 'default_repo_create': 'hg.create.repository', |
|
325 | 'default_repo_create': 'hg.create.repository', | |
319 | 'default_fork_create': 'hg.fork.repository' |
|
326 | 'default_fork_create': 'hg.fork.repository' | |
320 | } |
|
327 | } | |
321 | PermissionModel().set_new_user_perms( |
|
328 | PermissionModel().set_new_user_perms( | |
322 | User.get_default_user(), _form_result) |
|
329 | User.get_default_user(), _form_result) | |
323 | Session().commit() |
|
330 | Session().commit() | |
324 |
|
331 | |||
325 | # make sure inherit flag is turned on |
|
332 | # make sure inherit flag is turned on | |
326 | self.u1.inherit_default_permissions = True |
|
333 | self.u1.inherit_default_permissions = True | |
327 | Session().commit() |
|
334 | Session().commit() | |
328 |
|
335 | |||
329 | # this user will have inherited permissions from default user |
|
336 | # this user will have inherited permissions from default user | |
330 | assert global_perms(self.u1) == default_perms() |
|
337 | assert global_perms(self.u1) == default_perms() | |
331 |
|
338 | |||
332 | def test_inherited_permissions_from_default_on_user_disabled(self): |
|
339 | def test_inherited_permissions_from_default_on_user_disabled(self): | |
333 | # disable fork and create on default user |
|
340 | # disable fork and create on default user | |
334 | _form_result = { |
|
341 | _form_result = { | |
335 | 'default_repo_create': 'hg.create.none', |
|
342 | 'default_repo_create': 'hg.create.none', | |
336 | 'default_fork_create': 'hg.fork.none' |
|
343 | 'default_fork_create': 'hg.fork.none' | |
337 | } |
|
344 | } | |
338 | PermissionModel().set_new_user_perms( |
|
345 | PermissionModel().set_new_user_perms( | |
339 | User.get_default_user(), _form_result) |
|
346 | User.get_default_user(), _form_result) | |
340 | Session().commit() |
|
347 | Session().commit() | |
341 |
|
348 | |||
342 | # make sure inherit flag is turned on |
|
349 | # make sure inherit flag is turned on | |
343 | self.u1.inherit_default_permissions = True |
|
350 | self.u1.inherit_default_permissions = True | |
344 | Session().commit() |
|
351 | Session().commit() | |
345 |
|
352 | |||
346 | # this user will have inherited permissions from default user |
|
353 | # this user will have inherited permissions from default user | |
347 | expected_perms = default_perms( |
|
354 | expected_perms = default_perms( | |
348 | added=['hg.create.none', 'hg.fork.none'], |
|
355 | added=['hg.create.none', 'hg.fork.none'], | |
349 | removed=['hg.create.repository', 'hg.fork.repository']) |
|
356 | removed=['hg.create.repository', 'hg.fork.repository']) | |
350 | assert global_perms(self.u1) == expected_perms |
|
357 | assert global_perms(self.u1) == expected_perms | |
351 |
|
358 | |||
352 | def test_non_inherited_permissions_from_default_on_user_enabled(self): |
|
359 | def test_non_inherited_permissions_from_default_on_user_enabled(self): | |
353 | user_model = UserModel() |
|
360 | user_model = UserModel() | |
354 | # enable fork and create on default user |
|
361 | # enable fork and create on default user | |
355 | usr = User.DEFAULT_USER |
|
362 | usr = User.DEFAULT_USER | |
356 | user_model.revoke_perm(usr, 'hg.create.none') |
|
363 | user_model.revoke_perm(usr, 'hg.create.none') | |
357 | user_model.grant_perm(usr, 'hg.create.repository') |
|
364 | user_model.grant_perm(usr, 'hg.create.repository') | |
358 | user_model.revoke_perm(usr, 'hg.fork.none') |
|
365 | user_model.revoke_perm(usr, 'hg.fork.none') | |
359 | user_model.grant_perm(usr, 'hg.fork.repository') |
|
366 | user_model.grant_perm(usr, 'hg.fork.repository') | |
360 |
|
367 | |||
361 | # disable global perms on specific user |
|
368 | # disable global perms on specific user | |
362 | user_model.revoke_perm(self.u1, 'hg.create.repository') |
|
369 | user_model.revoke_perm(self.u1, 'hg.create.repository') | |
363 | user_model.grant_perm(self.u1, 'hg.create.none') |
|
370 | user_model.grant_perm(self.u1, 'hg.create.none') | |
364 | user_model.revoke_perm(self.u1, 'hg.fork.repository') |
|
371 | user_model.revoke_perm(self.u1, 'hg.fork.repository') | |
365 | user_model.grant_perm(self.u1, 'hg.fork.none') |
|
372 | user_model.grant_perm(self.u1, 'hg.fork.none') | |
366 |
|
373 | |||
367 | # TODO(marcink): check branch permissions now ? |
|
374 | # TODO(marcink): check branch permissions now ? | |
368 |
|
375 | |||
369 | # make sure inherit flag is turned off |
|
376 | # make sure inherit flag is turned off | |
370 | self.u1.inherit_default_permissions = False |
|
377 | self.u1.inherit_default_permissions = False | |
371 | Session().commit() |
|
378 | Session().commit() | |
372 |
|
379 | |||
373 | # this user will have non inherited permissions from he's |
|
380 | # this user will have non inherited permissions from he's | |
374 | # explicitly set permissions |
|
381 | # explicitly set permissions | |
375 | assert global_perms(self.u1) == { |
|
382 | assert global_perms(self.u1) == { | |
376 | 'hg.create.none', |
|
383 | 'hg.create.none', | |
377 | 'hg.fork.none', |
|
384 | 'hg.fork.none', | |
378 | 'hg.register.manual_activate', |
|
385 | 'hg.register.manual_activate', | |
379 | 'hg.password_reset.enabled', |
|
386 | 'hg.password_reset.enabled', | |
380 | 'hg.extern_activate.auto', |
|
387 | 'hg.extern_activate.auto', | |
381 | 'repository.read', |
|
388 | 'repository.read', | |
382 | 'group.read', |
|
389 | 'group.read', | |
383 | 'usergroup.read', |
|
390 | 'usergroup.read', | |
384 | 'branch.push_force', |
|
391 | 'branch.push_force', | |
385 | } |
|
392 | } | |
386 |
|
393 | |||
387 | def test_non_inherited_permissions_from_default_on_user_disabled(self): |
|
394 | def test_non_inherited_permissions_from_default_on_user_disabled(self): | |
388 | user_model = UserModel() |
|
395 | user_model = UserModel() | |
389 | # disable fork and create on default user |
|
396 | # disable fork and create on default user | |
390 | usr = User.DEFAULT_USER |
|
397 | usr = User.DEFAULT_USER | |
391 | user_model.revoke_perm(usr, 'hg.create.repository') |
|
398 | user_model.revoke_perm(usr, 'hg.create.repository') | |
392 | user_model.grant_perm(usr, 'hg.create.none') |
|
399 | user_model.grant_perm(usr, 'hg.create.none') | |
393 | user_model.revoke_perm(usr, 'hg.fork.repository') |
|
400 | user_model.revoke_perm(usr, 'hg.fork.repository') | |
394 | user_model.grant_perm(usr, 'hg.fork.none') |
|
401 | user_model.grant_perm(usr, 'hg.fork.none') | |
395 |
|
402 | |||
396 | # enable global perms on specific user |
|
403 | # enable global perms on specific user | |
397 | user_model.revoke_perm(self.u1, 'hg.create.none') |
|
404 | user_model.revoke_perm(self.u1, 'hg.create.none') | |
398 | user_model.grant_perm(self.u1, 'hg.create.repository') |
|
405 | user_model.grant_perm(self.u1, 'hg.create.repository') | |
399 | user_model.revoke_perm(self.u1, 'hg.fork.none') |
|
406 | user_model.revoke_perm(self.u1, 'hg.fork.none') | |
400 | user_model.grant_perm(self.u1, 'hg.fork.repository') |
|
407 | user_model.grant_perm(self.u1, 'hg.fork.repository') | |
401 |
|
408 | |||
402 | # make sure inherit flag is turned off |
|
409 | # make sure inherit flag is turned off | |
403 | self.u1.inherit_default_permissions = False |
|
410 | self.u1.inherit_default_permissions = False | |
404 | Session().commit() |
|
411 | Session().commit() | |
405 |
|
412 | |||
406 | # TODO(marcink): check branch perms |
|
413 | # TODO(marcink): check branch perms | |
407 |
|
414 | |||
408 | # this user will have non inherited permissions from he's |
|
415 | # this user will have non inherited permissions from he's | |
409 | # explicitly set permissions |
|
416 | # explicitly set permissions | |
410 | assert global_perms(self.u1) == { |
|
417 | assert global_perms(self.u1) == { | |
411 | 'hg.create.repository', |
|
418 | 'hg.create.repository', | |
412 | 'hg.fork.repository', |
|
419 | 'hg.fork.repository', | |
413 | 'hg.register.manual_activate', |
|
420 | 'hg.register.manual_activate', | |
414 | 'hg.password_reset.enabled', |
|
421 | 'hg.password_reset.enabled', | |
415 | 'hg.extern_activate.auto', |
|
422 | 'hg.extern_activate.auto', | |
416 | 'repository.read', |
|
423 | 'repository.read', | |
417 | 'group.read', |
|
424 | 'group.read', | |
418 | 'usergroup.read', |
|
425 | 'usergroup.read', | |
419 | 'branch.push_force', |
|
426 | 'branch.push_force', | |
420 | } |
|
427 | } | |
421 |
|
428 | |||
422 | @pytest.mark.parametrize('perm, expected_perm', [ |
|
429 | @pytest.mark.parametrize('perm, expected_perm', [ | |
423 | ('hg.inherit_default_perms.false', 'repository.none', ), |
|
430 | ('hg.inherit_default_perms.false', 'repository.none', ), | |
424 | ('hg.inherit_default_perms.true', 'repository.read', ), |
|
431 | ('hg.inherit_default_perms.true', 'repository.read', ), | |
425 | ]) |
|
432 | ]) | |
426 | def test_inherited_permissions_on_objects(self, perm, expected_perm): |
|
433 | def test_inherited_permissions_on_objects(self, perm, expected_perm): | |
427 | _form_result = { |
|
434 | _form_result = { | |
428 | 'default_inherit_default_permissions': perm, |
|
435 | 'default_inherit_default_permissions': perm, | |
429 | } |
|
436 | } | |
430 | PermissionModel().set_new_user_perms( |
|
437 | PermissionModel().set_new_user_perms( | |
431 | User.get_default_user(), _form_result) |
|
438 | User.get_default_user(), _form_result) | |
432 | Session().commit() |
|
439 | Session().commit() | |
433 |
|
440 | |||
434 | # make sure inherit flag is turned on |
|
441 | # make sure inherit flag is turned on | |
435 | self.u1.inherit_default_permissions = True |
|
442 | self.u1.inherit_default_permissions = True | |
436 | Session().commit() |
|
443 | Session().commit() | |
437 |
|
444 | |||
438 | # TODO(marcink): check branch perms |
|
445 | # TODO(marcink): check branch perms | |
439 |
|
446 | |||
440 | # this user will have inherited permissions from default user |
|
447 | # this user will have inherited permissions from default user | |
441 | assert global_perms(self.u1) == { |
|
448 | assert global_perms(self.u1) == { | |
442 | 'hg.create.none', |
|
449 | 'hg.create.none', | |
443 | 'hg.fork.none', |
|
450 | 'hg.fork.none', | |
444 | 'hg.register.manual_activate', |
|
451 | 'hg.register.manual_activate', | |
445 | 'hg.password_reset.enabled', |
|
452 | 'hg.password_reset.enabled', | |
446 | 'hg.extern_activate.auto', |
|
453 | 'hg.extern_activate.auto', | |
447 | 'repository.read', |
|
454 | 'repository.read', | |
448 | 'group.read', |
|
455 | 'group.read', | |
449 | 'usergroup.read', |
|
456 | 'usergroup.read', | |
450 | 'branch.push_force', |
|
457 | 'branch.push_force', | |
451 | 'hg.create.write_on_repogroup.true', |
|
458 | 'hg.create.write_on_repogroup.true', | |
452 | 'hg.usergroup.create.false', |
|
459 | 'hg.usergroup.create.false', | |
453 | 'hg.repogroup.create.false', |
|
460 | 'hg.repogroup.create.false', | |
454 | perm |
|
461 | perm | |
455 | } |
|
462 | } | |
456 |
|
463 | |||
457 | assert set(repo_perms(self.u1).values()) == set([expected_perm]) |
|
464 | assert set(repo_perms(self.u1).values()) == set([expected_perm]) | |
458 |
|
465 | |||
459 | def test_repo_owner_permissions_not_overwritten_by_group(self): |
|
466 | def test_repo_owner_permissions_not_overwritten_by_group(self): | |
460 | # create repo as USER, |
|
467 | # create repo as USER, | |
461 | self.test_repo = fixture.create_repo(name='myownrepo', |
|
468 | self.test_repo = fixture.create_repo(name='myownrepo', | |
462 | repo_type='hg', |
|
469 | repo_type='hg', | |
463 | cur_user=self.u1) |
|
470 | cur_user=self.u1) | |
464 |
|
471 | |||
465 | # he has permissions of admin as owner |
|
472 | # he has permissions of admin as owner | |
466 | assert repo_perms(self.u1)['myownrepo'] == 'repository.admin' |
|
473 | assert repo_perms(self.u1)['myownrepo'] == 'repository.admin' | |
467 |
|
474 | |||
468 | # set his permission as user group, he should still be admin |
|
475 | # set his permission as user group, he should still be admin | |
469 | self.ug1 = fixture.create_user_group('G1') |
|
476 | self.ug1 = fixture.create_user_group('G1') | |
470 | UserGroupModel().add_user_to_group(self.ug1, self.u1) |
|
477 | UserGroupModel().add_user_to_group(self.ug1, self.u1) | |
471 | RepoModel().grant_user_group_permission( |
|
478 | RepoModel().grant_user_group_permission( | |
472 | self.test_repo, |
|
479 | self.test_repo, | |
473 | group_name=self.ug1, |
|
480 | group_name=self.ug1, | |
474 | perm='repository.none') |
|
481 | perm='repository.none') | |
475 | Session().commit() |
|
482 | Session().commit() | |
476 |
|
483 | |||
477 | assert repo_perms(self.u1)['myownrepo'] == 'repository.admin' |
|
484 | assert repo_perms(self.u1)['myownrepo'] == 'repository.admin' | |
478 |
|
485 | |||
479 | def test_repo_owner_permissions_not_overwritten_by_others(self): |
|
486 | def test_repo_owner_permissions_not_overwritten_by_others(self): | |
480 | # create repo as USER, |
|
487 | # create repo as USER, | |
481 | self.test_repo = fixture.create_repo(name='myownrepo', |
|
488 | self.test_repo = fixture.create_repo(name='myownrepo', | |
482 | repo_type='hg', |
|
489 | repo_type='hg', | |
483 | cur_user=self.u1) |
|
490 | cur_user=self.u1) | |
484 |
|
491 | |||
485 | # he has permissions of admin as owner |
|
492 | # he has permissions of admin as owner | |
486 | assert repo_perms(self.u1)['myownrepo'] == 'repository.admin' |
|
493 | assert repo_perms(self.u1)['myownrepo'] == 'repository.admin' | |
487 |
|
494 | |||
488 | # set his permission as user, he should still be admin |
|
495 | # set his permission as user, he should still be admin | |
489 | RepoModel().grant_user_permission( |
|
496 | RepoModel().grant_user_permission( | |
490 | self.test_repo, user=self.u1, perm='repository.none') |
|
497 | self.test_repo, user=self.u1, perm='repository.none') | |
491 | Session().commit() |
|
498 | Session().commit() | |
492 |
|
499 | |||
493 | assert repo_perms(self.u1)['myownrepo'] == 'repository.admin' |
|
500 | assert repo_perms(self.u1)['myownrepo'] == 'repository.admin' | |
494 |
|
501 | |||
495 | def test_repo_group_owner_permissions_not_overwritten_by_group(self): |
|
502 | def test_repo_group_owner_permissions_not_overwritten_by_group(self): | |
496 | # "u1" shall be owner without any special permission assigned |
|
503 | # "u1" shall be owner without any special permission assigned | |
497 | self.g1 = fixture.create_repo_group('test1') |
|
504 | self.g1 = fixture.create_repo_group('test1') | |
498 |
|
505 | |||
499 | # Make user group and grant a permission to user group |
|
506 | # Make user group and grant a permission to user group | |
500 | self.ug1 = fixture.create_user_group('G1') |
|
507 | self.ug1 = fixture.create_user_group('G1') | |
501 | UserGroupModel().add_user_to_group(self.ug1, self.u1) |
|
508 | UserGroupModel().add_user_to_group(self.ug1, self.u1) | |
502 | RepoGroupModel().grant_user_group_permission( |
|
509 | RepoGroupModel().grant_user_group_permission( | |
503 | repo_group=self.g1, group_name=self.ug1, perm='group.write') |
|
510 | repo_group=self.g1, group_name=self.ug1, perm='group.write') | |
|
511 | Session().commit() | |||
504 |
|
512 | |||
505 | # Verify that user does not get any special permission if he is not |
|
513 | # Verify that user does not get any special permission if he is not | |
506 | # owner |
|
514 | # owner | |
507 | assert group_perms(self.u1) == {'test1': 'group.write'} |
|
515 | assert group_perms(self.u1) == {'test1': 'group.write'} | |
508 |
|
516 | |||
509 | # Make him owner of the repo group |
|
517 | # Make him owner of the repo group | |
510 | self.g1.user = self.u1 |
|
518 | self.g1.user = self.u1 | |
511 | assert group_perms(self.u1) == {'test1': 'group.admin'} |
|
519 | assert group_perms(self.u1) == {'test1': 'group.admin'} | |
512 |
|
520 | |||
513 | def test_repo_group_owner_permissions_not_overwritten_by_others(self): |
|
521 | def test_repo_group_owner_permissions_not_overwritten_by_others(self): | |
514 | # "u1" shall be owner without any special permission assigned |
|
522 | # "u1" shall be owner without any special permission assigned | |
515 | self.g1 = fixture.create_repo_group('test1') |
|
523 | self.g1 = fixture.create_repo_group('test1') | |
516 | RepoGroupModel().grant_user_permission( |
|
524 | RepoGroupModel().grant_user_permission( | |
517 | repo_group=self.g1, user=self.u1, perm='group.write') |
|
525 | repo_group=self.g1, user=self.u1, perm='group.write') | |
|
526 | Session().commit() | |||
518 |
|
527 | |||
519 | # Verify that user does not get any special permission if he is not |
|
528 | # Verify that user does not get any special permission if he is not | |
520 | # owner |
|
529 | # owner | |
521 | assert group_perms(self.u1) == {'test1': 'group.write'} |
|
530 | assert group_perms(self.u1) == {'test1': 'group.write'} | |
522 |
|
531 | |||
523 | # Make him owner of the repo group |
|
532 | # Make him owner of the repo group | |
524 | self.g1.user = self.u1 |
|
533 | self.g1.user = self.u1 | |
525 | assert group_perms(self.u1) == {u'test1': 'group.admin'} |
|
534 | assert group_perms(self.u1) == {u'test1': 'group.admin'} | |
526 |
|
535 | |||
527 |
def |
|
536 | def assert_user_perm_equal( | |
528 | self, user, change_factor=0, compare_keys=None): |
|
537 | self, user, change_factor=0, compare_keys=None): | |
529 | perms = UserToPerm.query().filter(UserToPerm.user == user).all() |
|
538 | perms = UserToPerm.query().filter(UserToPerm.user == user).all() | |
530 | assert len(perms) == \ |
|
539 | assert len(perms) == \ | |
531 | len(Permission.DEFAULT_USER_PERMISSIONS) + change_factor |
|
540 | len(Permission.DEFAULT_USER_PERMISSIONS) + change_factor | |
532 | if compare_keys: |
|
541 | if compare_keys: | |
533 | assert set( |
|
542 | assert set( | |
534 | x.permissions.permission_name for x in perms) == compare_keys |
|
543 | x.permissions.permission_name for x in perms) == compare_keys | |
535 |
|
544 | |||
536 |
def |
|
545 | def assert_def_user_group_perm_equal( | |
537 | self, user_group, change_factor=0, compare_keys=None): |
|
546 | self, user_group, change_factor=0, compare_keys=None): | |
538 | perms = UserGroupToPerm.query().filter( |
|
547 | perms = UserGroupToPerm.query().filter( | |
539 | UserGroupToPerm.users_group == user_group).all() |
|
548 | UserGroupToPerm.users_group == user_group).all() | |
540 | assert len(perms) == \ |
|
549 | assert len(perms) == \ | |
541 | len(Permission.DEFAULT_USER_PERMISSIONS) + change_factor |
|
550 | len(Permission.DEFAULT_USER_PERMISSIONS) + change_factor | |
542 | if compare_keys: |
|
551 | if compare_keys: | |
543 | assert set( |
|
552 | assert set( | |
544 | x.permissions.permission_name for x in perms) == compare_keys |
|
553 | x.permissions.permission_name for x in perms) == compare_keys | |
545 |
|
554 | |||
546 | def test_set_default_permissions(self): |
|
555 | def test_set_default_permissions(self): | |
547 | PermissionModel().create_default_user_permissions(user=self.u1) |
|
556 | PermissionModel().create_default_user_permissions(user=self.u1) | |
548 |
self. |
|
557 | self.assert_user_perm_equal(user=self.u1) | |
549 |
|
558 | |||
550 | def test_set_default_permissions_after_one_is_missing(self): |
|
559 | def test_set_default_permissions_after_one_is_missing(self): | |
551 | PermissionModel().create_default_user_permissions(user=self.u1) |
|
560 | PermissionModel().create_default_user_permissions(user=self.u1) | |
552 |
self. |
|
561 | self.assert_user_perm_equal(user=self.u1) | |
553 | # now we delete one, it should be re-created after another call |
|
562 | # now we delete one, it should be re-created after another call | |
554 | perms = UserToPerm.query().filter(UserToPerm.user == self.u1).all() |
|
563 | perms = UserToPerm.query().filter(UserToPerm.user == self.u1).all() | |
555 | Session().delete(perms[0]) |
|
564 | Session().delete(perms[0]) | |
556 | Session().commit() |
|
565 | Session().commit() | |
557 |
|
566 | |||
558 |
self. |
|
567 | self.assert_user_perm_equal(user=self.u1, change_factor=-1) | |
559 |
|
568 | |||
560 | # create missing one ! |
|
569 | # create missing one ! | |
561 | PermissionModel().create_default_user_permissions(user=self.u1) |
|
570 | PermissionModel().create_default_user_permissions(user=self.u1) | |
562 |
self. |
|
571 | self.assert_user_perm_equal(user=self.u1) | |
563 |
|
572 | |||
564 | @pytest.mark.parametrize("perm, modify_to", [ |
|
573 | @pytest.mark.parametrize("perm, modify_to", [ | |
565 | ('repository.read', 'repository.none'), |
|
574 | ('repository.read', 'repository.none'), | |
566 | ('group.read', 'group.none'), |
|
575 | ('group.read', 'group.none'), | |
567 | ('usergroup.read', 'usergroup.none'), |
|
576 | ('usergroup.read', 'usergroup.none'), | |
568 | ('hg.create.repository', 'hg.create.none'), |
|
577 | ('hg.create.repository', 'hg.create.none'), | |
569 | ('hg.fork.repository', 'hg.fork.none'), |
|
578 | ('hg.fork.repository', 'hg.fork.none'), | |
570 | ('hg.register.manual_activate', 'hg.register.auto_activate',) |
|
579 | ('hg.register.manual_activate', 'hg.register.auto_activate',) | |
571 | ]) |
|
580 | ]) | |
572 | def test_set_default_permissions_after_modification(self, perm, modify_to): |
|
581 | def test_set_default_permissions_after_modification(self, perm, modify_to): | |
573 | PermissionModel().create_default_user_permissions(user=self.u1) |
|
582 | PermissionModel().create_default_user_permissions(user=self.u1) | |
574 |
self. |
|
583 | self.assert_user_perm_equal(user=self.u1) | |
575 |
|
584 | |||
576 | old = Permission.get_by_key(perm) |
|
585 | old = Permission.get_by_key(perm) | |
577 | new = Permission.get_by_key(modify_to) |
|
586 | new = Permission.get_by_key(modify_to) | |
578 | assert old is not None |
|
587 | assert old is not None | |
579 | assert new is not None |
|
588 | assert new is not None | |
580 |
|
589 | |||
581 | # now modify permissions |
|
590 | # now modify permissions | |
582 | p = UserToPerm.query().filter( |
|
591 | p = UserToPerm.query().filter( | |
583 | UserToPerm.user == self.u1).filter( |
|
592 | UserToPerm.user == self.u1).filter( | |
584 | UserToPerm.permission == old).one() |
|
593 | UserToPerm.permission == old).one() | |
585 | p.permission = new |
|
594 | p.permission = new | |
586 | Session().add(p) |
|
595 | Session().add(p) | |
587 | Session().commit() |
|
596 | Session().commit() | |
588 |
|
597 | |||
589 | PermissionModel().create_default_user_permissions(user=self.u1) |
|
598 | PermissionModel().create_default_user_permissions(user=self.u1) | |
590 |
self. |
|
599 | self.assert_user_perm_equal(user=self.u1) | |
591 |
|
600 | |||
592 | def test_clear_user_perms(self): |
|
601 | def test_clear_user_perms(self): | |
593 | PermissionModel().create_default_user_permissions(user=self.u1) |
|
602 | PermissionModel().create_default_user_permissions(user=self.u1) | |
594 |
self. |
|
603 | self.assert_user_perm_equal(user=self.u1) | |
595 |
|
604 | |||
596 | # now clear permissions |
|
605 | # now clear permissions | |
597 | cleared = PermissionModel()._clear_user_perms(self.u1.user_id) |
|
606 | cleared = PermissionModel()._clear_user_perms(self.u1.user_id) | |
598 |
self. |
|
607 | self.assert_user_perm_equal(user=self.u1, | |
599 |
|
|
608 | change_factor=len(cleared)*-1) | |
600 |
|
609 | |||
601 | def test_clear_user_group_perms(self): |
|
610 | def test_clear_user_group_perms(self): | |
602 | self.ug1 = fixture.create_user_group('G1') |
|
611 | self.ug1 = fixture.create_user_group('G1') | |
603 | PermissionModel().create_default_user_group_permissions( |
|
612 | PermissionModel().create_default_user_group_permissions( | |
604 | user_group=self.ug1) |
|
613 | user_group=self.ug1) | |
605 |
self. |
|
614 | self.assert_def_user_group_perm_equal(user_group=self.ug1) | |
606 |
|
615 | |||
607 | # now clear permissions |
|
616 | # now clear permissions | |
608 | cleared = PermissionModel()._clear_user_group_perms( |
|
617 | cleared = PermissionModel()._clear_user_group_perms( | |
609 | self.ug1.users_group_id) |
|
618 | self.ug1.users_group_id) | |
610 |
self. |
|
619 | self.assert_def_user_group_perm_equal(user_group=self.ug1, | |
611 | change_factor=len(cleared)*-1) |
|
620 | change_factor=len(cleared)*-1) | |
612 |
|
621 | |||
613 | @pytest.mark.parametrize("form_result", [ |
|
622 | @pytest.mark.parametrize("form_result", [ | |
614 | {}, |
|
623 | {}, | |
615 | {'default_repo_create': 'hg.create.repository'}, |
|
624 | {'default_repo_create': 'hg.create.repository'}, | |
616 | {'default_repo_create': 'hg.create.repository', |
|
625 | {'default_repo_create': 'hg.create.repository', | |
617 | 'default_repo_perm': 'repository.read'}, |
|
626 | 'default_repo_perm': 'repository.read'}, | |
618 | {'default_repo_create': 'hg.create.none', |
|
627 | {'default_repo_create': 'hg.create.none', | |
619 | 'default_repo_perm': 'repository.write', |
|
628 | 'default_repo_perm': 'repository.write', | |
620 | 'default_fork_create': 'hg.fork.none'}, |
|
629 | 'default_fork_create': 'hg.fork.none'}, | |
621 | ]) |
|
630 | ]) | |
622 | def test_set_new_user_permissions(self, form_result): |
|
631 | def test_set_new_user_permissions(self, form_result): | |
623 | _form_result = {} |
|
632 | _form_result = {} | |
624 | _form_result.update(form_result) |
|
633 | _form_result.update(form_result) | |
625 | PermissionModel().set_new_user_perms(self.u1, _form_result) |
|
634 | PermissionModel().set_new_user_perms(self.u1, _form_result) | |
626 | Session().commit() |
|
635 | Session().commit() | |
627 | change_factor = -1 * (len(Permission.DEFAULT_USER_PERMISSIONS) |
|
636 | change_factor = -1 * (len(Permission.DEFAULT_USER_PERMISSIONS) | |
628 | - len(form_result.keys())) |
|
637 | - len(form_result.keys())) | |
629 |
self. |
|
638 | self.assert_user_perm_equal( | |
630 | self.u1, change_factor=change_factor) |
|
639 | self.u1, change_factor=change_factor) | |
631 |
|
640 | |||
632 | @pytest.mark.parametrize("form_result", [ |
|
641 | @pytest.mark.parametrize("form_result", [ | |
633 | {}, |
|
642 | {}, | |
634 | {'default_repo_create': 'hg.create.repository'}, |
|
643 | {'default_repo_create': 'hg.create.repository'}, | |
635 | {'default_repo_create': 'hg.create.repository', |
|
644 | {'default_repo_create': 'hg.create.repository', | |
636 | 'default_repo_perm': 'repository.read'}, |
|
645 | 'default_repo_perm': 'repository.read'}, | |
637 | {'default_repo_create': 'hg.create.none', |
|
646 | {'default_repo_create': 'hg.create.none', | |
638 | 'default_repo_perm': 'repository.write', |
|
647 | 'default_repo_perm': 'repository.write', | |
639 | 'default_fork_create': 'hg.fork.none'}, |
|
648 | 'default_fork_create': 'hg.fork.none'}, | |
640 | ]) |
|
649 | ]) | |
641 | def test_set_new_user_group_permissions(self, form_result): |
|
650 | def test_set_new_user_group_permissions(self, form_result): | |
642 | _form_result = {} |
|
651 | _form_result = {} | |
643 | _form_result.update(form_result) |
|
652 | _form_result.update(form_result) | |
644 | self.ug1 = fixture.create_user_group('G1') |
|
653 | self.ug1 = fixture.create_user_group('G1') | |
645 | PermissionModel().set_new_user_group_perms(self.ug1, _form_result) |
|
654 | PermissionModel().set_new_user_group_perms(self.ug1, _form_result) | |
646 | Session().commit() |
|
655 | Session().commit() | |
647 | change_factor = -1 * (len(Permission.DEFAULT_USER_PERMISSIONS) |
|
656 | change_factor = -1 * (len(Permission.DEFAULT_USER_PERMISSIONS) | |
648 | - len(form_result.keys())) |
|
657 | - len(form_result.keys())) | |
649 |
self. |
|
658 | self.assert_def_user_group_perm_equal( | |
650 | self.ug1, change_factor=change_factor) |
|
659 | self.ug1, change_factor=change_factor) | |
651 |
|
660 | |||
652 | @pytest.mark.parametrize("group_active, expected_perm", [ |
|
661 | @pytest.mark.parametrize("group_active, expected_perm", [ | |
653 | (True, 'repository.admin'), |
|
662 | (True, 'repository.admin'), | |
654 | (False, 'repository.read'), |
|
663 | (False, 'repository.read'), | |
655 | ]) |
|
664 | ]) | |
656 | def test_get_default_repo_perms_from_user_group_with_active_group( |
|
665 | def test_get_default_repo_perms_from_user_group_with_active_group( | |
657 | self, backend, user_util, group_active, expected_perm): |
|
666 | self, backend, user_util, group_active, expected_perm): | |
658 | repo = backend.create_repo() |
|
667 | repo = backend.create_repo() | |
659 | user = user_util.create_user() |
|
668 | user = user_util.create_user() | |
660 | user_group = user_util.create_user_group( |
|
669 | user_group = user_util.create_user_group( | |
661 | members=[user], users_group_active=group_active) |
|
670 | members=[user], users_group_active=group_active) | |
662 |
|
671 | |||
663 | user_util.grant_user_group_permission_to_repo( |
|
672 | user_util.grant_user_group_permission_to_repo( | |
664 | repo, user_group, 'repository.admin') |
|
673 | repo, user_group, 'repository.admin') | |
665 | permissions = repo_perms(user) |
|
674 | permissions = repo_perms(user) | |
666 | repo_permission = permissions.get(repo.repo_name) |
|
675 | repo_permission = permissions.get(repo.repo_name) | |
667 | assert repo_permission == expected_perm |
|
676 | assert repo_permission == expected_perm | |
668 |
|
677 | |||
669 | @pytest.mark.parametrize("group_active, expected_perm", [ |
|
678 | @pytest.mark.parametrize("group_active, expected_perm", [ | |
670 | (True, 'group.admin'), |
|
679 | (True, 'group.admin'), | |
671 | (False, 'group.read') |
|
680 | (False, 'group.read') | |
672 | ]) |
|
681 | ]) | |
673 | def test_get_default_group_perms_from_user_group_with_active_group( |
|
682 | def test_get_default_group_perms_from_user_group_with_active_group( | |
674 | self, user_util, group_active, expected_perm): |
|
683 | self, user_util, group_active, expected_perm): | |
675 | user = user_util.create_user() |
|
684 | user = user_util.create_user() | |
676 | repo_group = user_util.create_repo_group() |
|
685 | repo_group = user_util.create_repo_group() | |
677 | user_group = user_util.create_user_group( |
|
686 | user_group = user_util.create_user_group( | |
678 | members=[user], users_group_active=group_active) |
|
687 | members=[user], users_group_active=group_active) | |
679 |
|
688 | |||
680 | user_util.grant_user_group_permission_to_repo_group( |
|
689 | user_util.grant_user_group_permission_to_repo_group( | |
681 | repo_group, user_group, 'group.admin') |
|
690 | repo_group, user_group, 'group.admin') | |
682 | permissions = group_perms(user) |
|
691 | permissions = group_perms(user) | |
683 | group_permission = permissions.get(repo_group.name) |
|
692 | group_permission = permissions.get(repo_group.name) | |
684 | assert group_permission == expected_perm |
|
693 | assert group_permission == expected_perm | |
685 |
|
694 | |||
686 | @pytest.mark.parametrize("group_active, expected_perm", [ |
|
695 | @pytest.mark.parametrize("group_active, expected_perm", [ | |
687 | (True, 'usergroup.admin'), |
|
696 | (True, 'usergroup.admin'), | |
688 | (False, 'usergroup.read') |
|
697 | (False, 'usergroup.read') | |
689 | ]) |
|
698 | ]) | |
690 | def test_get_default_user_group_perms_from_user_group_with_active_group( |
|
699 | def test_get_default_user_group_perms_from_user_group_with_active_group( | |
691 | self, user_util, group_active, expected_perm): |
|
700 | self, user_util, group_active, expected_perm): | |
692 | user = user_util.create_user() |
|
701 | user = user_util.create_user() | |
693 | user_group = user_util.create_user_group( |
|
702 | user_group = user_util.create_user_group( | |
694 | members=[user], users_group_active=group_active) |
|
703 | members=[user], users_group_active=group_active) | |
695 | target_user_group = user_util.create_user_group() |
|
704 | target_user_group = user_util.create_user_group() | |
696 |
|
705 | |||
697 | user_util.grant_user_group_permission_to_user_group( |
|
706 | user_util.grant_user_group_permission_to_user_group( | |
698 | target_user_group, user_group, 'usergroup.admin') |
|
707 | target_user_group, user_group, 'usergroup.admin') | |
699 | permissions = user_group_perms(user) |
|
708 | permissions = user_group_perms(user) | |
700 | group_permission = permissions.get(target_user_group.users_group_name) |
|
709 | group_permission = permissions.get(target_user_group.users_group_name) | |
701 | assert group_permission == expected_perm |
|
710 | assert group_permission == expected_perm | |
702 |
|
711 | |||
703 |
|
712 | |||
704 | def repo_perms(user): |
|
713 | def repo_perms(user): | |
705 | auth_user = AuthUser(user_id=user.user_id) |
|
714 | auth_user = AuthUser(user_id=user.user_id) | |
706 | return auth_user.permissions['repositories'] |
|
715 | return auth_user.permissions['repositories'] | |
707 |
|
716 | |||
708 |
|
717 | |||
709 | def branch_perms(user): |
|
718 | def branch_perms(user): | |
710 | auth_user = AuthUser(user_id=user.user_id) |
|
719 | auth_user = AuthUser(user_id=user.user_id) | |
711 | return auth_user.permissions['repository_branches'] |
|
720 | return auth_user.permissions['repository_branches'] | |
712 |
|
721 | |||
713 |
|
722 | |||
714 | def group_perms(user): |
|
723 | def group_perms(user): | |
715 | auth_user = AuthUser(user_id=user.user_id) |
|
724 | auth_user = AuthUser(user_id=user.user_id) | |
716 | return auth_user.permissions['repositories_groups'] |
|
725 | return auth_user.permissions['repositories_groups'] | |
717 |
|
726 | |||
718 |
|
727 | |||
719 | def user_group_perms(user): |
|
728 | def user_group_perms(user): | |
720 | auth_user = AuthUser(user_id=user.user_id) |
|
729 | auth_user = AuthUser(user_id=user.user_id) | |
721 | return auth_user.permissions['user_groups'] |
|
730 | return auth_user.permissions['user_groups'] | |
722 |
|
731 | |||
723 |
|
732 | |||
724 | def global_perms(user): |
|
733 | def global_perms(user): | |
725 | auth_user = AuthUser(user_id=user.user_id) |
|
734 | auth_user = AuthUser(user_id=user.user_id) | |
726 | return auth_user.permissions['global'] |
|
735 | return auth_user.permissions['global'] | |
727 |
|
736 | |||
728 |
|
737 | |||
729 | def default_perms(added=None, removed=None): |
|
738 | def default_perms(added=None, removed=None): | |
730 | expected_perms = set(Permission.DEFAULT_USER_PERMISSIONS) |
|
739 | expected_perms = set(Permission.DEFAULT_USER_PERMISSIONS) | |
731 | if removed: |
|
740 | if removed: | |
732 | expected_perms.difference_update(removed) |
|
741 | expected_perms.difference_update(removed) | |
733 | if added: |
|
742 | if added: | |
734 | expected_perms.update(added) |
|
743 | expected_perms.update(added) | |
735 | return expected_perms |
|
744 | return expected_perms |
1 | NO CONTENT: modified file |
|
NO CONTENT: modified file | ||
The requested commit or file is too big and content was truncated. Show full diff |
1 | NO CONTENT: modified file |
|
NO CONTENT: modified file | ||
The requested commit or file is too big and content was truncated. Show full diff |
General Comments 0
You need to be logged in to leave comments.
Login now