##// END OF EJS Templates
tests: stabilize tests for mysql/postgres.
marcink -
r3981:39e93a55 default
parent child Browse files
Show More

The requested changes are too big and content was truncated. Show full diff

@@ -1,202 +1,202 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import pytest
22 22
23 23 from rhodecode.tests import assert_session_flash
24 24 from rhodecode.tests.utils import AssertResponse
25 25 from rhodecode.model.db import Session
26 26 from rhodecode.model.settings import SettingsModel
27 27
28 28
29 29 def assert_auth_settings_updated(response):
30 30 assert response.status_int == 302, 'Expected response HTTP Found 302'
31 31 assert_session_flash(response, 'Auth settings updated successfully')
32 32
33 33
34 34 @pytest.mark.usefixtures("autologin_user", "app")
35 35 class TestAuthSettingsView(object):
36 36
37 37 def _enable_plugins(self, plugins_list, csrf_token, override=None,
38 38 verify_response=False):
39 39 test_url = '/_admin/auth'
40 40 params = {
41 41 'auth_plugins': plugins_list,
42 42 'csrf_token': csrf_token,
43 43 }
44 44 if override:
45 45 params.update(override)
46 46 _enabled_plugins = []
47 47 for plugin in plugins_list.split(','):
48 48 plugin_name = plugin.partition('#')[-1]
49 49 enabled_plugin = '%s_enabled' % plugin_name
50 50 cache_ttl = '%s_cache_ttl' % plugin_name
51 51
52 52 # default params that are needed for each plugin,
53 53 # `enabled` and `cache_ttl`
54 54 params.update({
55 55 enabled_plugin: True,
56 56 cache_ttl: 0
57 57 })
58 58 _enabled_plugins.append(enabled_plugin)
59 59
60 60 # we need to clean any enabled plugin before, since they require
61 61 # form params to be present
62 62 db_plugin = SettingsModel().get_setting_by_name('auth_plugins')
63 63 db_plugin.app_settings_value = \
64 64 'egg:rhodecode-enterprise-ce#rhodecode'
65 65 Session().add(db_plugin)
66 66 Session().commit()
67 67 for _plugin in _enabled_plugins:
68 68 db_plugin = SettingsModel().get_setting_by_name(_plugin)
69 69 if db_plugin:
70 70 Session().delete(db_plugin)
71 71 Session().commit()
72 72
73 73 response = self.app.post(url=test_url, params=params)
74 74
75 75 if verify_response:
76 76 assert_auth_settings_updated(response)
77 77 return params
78 78
79 79 def _post_ldap_settings(self, params, override=None, force=False):
80 80
81 81 params.update({
82 82 'filter': 'user',
83 83 'user_member_of': '',
84 84 'user_search_base': '',
85 85 'user_search_filter': 'test_filter',
86 86
87 87 'host': 'dc.example.com',
88 88 'port': '999',
89 89 'timeout': 3600,
90 90 'tls_kind': 'PLAIN',
91 91 'tls_reqcert': 'NEVER',
92 92 'tls_cert_dir':'/etc/openldap/cacerts',
93 93 'dn_user': 'test_user',
94 94 'dn_pass': 'test_pass',
95 95 'base_dn': 'test_base_dn',
96 96 'search_scope': 'BASE',
97 97 'attr_login': 'test_attr_login',
98 98 'attr_firstname': 'ima',
99 99 'attr_lastname': 'tester',
100 100 'attr_email': 'test@example.com',
101 101 'cache_ttl': '0',
102 102 })
103 103 if force:
104 104 params = {}
105 105 params.update(override or {})
106 106
107 107 test_url = '/_admin/auth/ldap/'
108 108
109 109 response = self.app.post(url=test_url, params=params)
110 110 return response
111 111
112 112 def test_index(self):
113 113 response = self.app.get('/_admin/auth')
114 114 response.mustcontain('Authentication Plugins')
115 115
116 116 @pytest.mark.parametrize("disable_plugin, needs_import", [
117 117 ('egg:rhodecode-enterprise-ce#headers', None),
118 118 ('egg:rhodecode-enterprise-ce#crowd', None),
119 119 ('egg:rhodecode-enterprise-ce#jasig_cas', None),
120 120 ('egg:rhodecode-enterprise-ce#ldap', None),
121 121 ('egg:rhodecode-enterprise-ce#pam', "pam"),
122 122 ])
123 123 def test_disable_plugin(self, csrf_token, disable_plugin, needs_import):
124 124 # TODO: johbo: "pam" is currently not available on darwin,
125 125 # although the docs state that it should work on darwin.
126 126 if needs_import:
127 127 pytest.importorskip(needs_import)
128 128
129 129 self._enable_plugins(
130 130 'egg:rhodecode-enterprise-ce#rhodecode,' + disable_plugin,
131 131 csrf_token, verify_response=True)
132 132
133 133 self._enable_plugins(
134 134 'egg:rhodecode-enterprise-ce#rhodecode', csrf_token,
135 135 verify_response=True)
136 136
137 137 def test_ldap_save_settings(self, csrf_token):
138 138 params = self._enable_plugins(
139 139 'egg:rhodecode-enterprise-ce#rhodecode,'
140 140 'egg:rhodecode-enterprise-ce#ldap',
141 141 csrf_token)
142 142 response = self._post_ldap_settings(params)
143 143 assert_auth_settings_updated(response)
144 144
145 145 new_settings = SettingsModel().get_auth_settings()
146 146 assert new_settings['auth_ldap_host'] == u'dc.example.com', \
147 147 'fail db write compare'
148 148
149 149 def test_ldap_error_form_wrong_port_number(self, csrf_token):
150 150 params = self._enable_plugins(
151 151 'egg:rhodecode-enterprise-ce#rhodecode,'
152 152 'egg:rhodecode-enterprise-ce#ldap',
153 153 csrf_token)
154 154 invalid_port_value = 'invalid-port-number'
155 155 response = self._post_ldap_settings(params, override={
156 156 'port': invalid_port_value,
157 157 })
158 assertr = AssertResponse(response)
158 assertr = response.assert_response()
159 159 assertr.element_contains(
160 160 '.form .field #port ~ .error-message',
161 161 invalid_port_value)
162 162
163 163 def test_ldap_error_form(self, csrf_token):
164 164 params = self._enable_plugins(
165 165 'egg:rhodecode-enterprise-ce#rhodecode,'
166 166 'egg:rhodecode-enterprise-ce#ldap',
167 167 csrf_token)
168 168 response = self._post_ldap_settings(params, override={
169 169 'attr_login': '',
170 170 })
171 171 response.mustcontain("""<span class="error-message">The LDAP Login"""
172 172 """ attribute of the CN must be specified""")
173 173
174 174 def test_post_ldap_group_settings(self, csrf_token):
175 175 params = self._enable_plugins(
176 176 'egg:rhodecode-enterprise-ce#rhodecode,'
177 177 'egg:rhodecode-enterprise-ce#ldap',
178 178 csrf_token)
179 179
180 180 response = self._post_ldap_settings(params, override={
181 181 'host': 'dc-legacy.example.com',
182 182 'port': '999',
183 183 'tls_kind': 'PLAIN',
184 184 'tls_reqcert': 'NEVER',
185 185 'dn_user': 'test_user',
186 186 'dn_pass': 'test_pass',
187 187 'base_dn': 'test_base_dn',
188 188 'filter': 'test_filter',
189 189 'search_scope': 'BASE',
190 190 'attr_login': 'test_attr_login',
191 191 'attr_firstname': 'ima',
192 192 'attr_lastname': 'tester',
193 193 'attr_email': 'test@example.com',
194 194 'cache_ttl': '60',
195 195 'csrf_token': csrf_token,
196 196 }
197 197 )
198 198 assert_auth_settings_updated(response)
199 199
200 200 new_settings = SettingsModel().get_auth_settings()
201 201 assert new_settings['auth_ldap_host'] == u'dc-legacy.example.com', \
202 202 'fail db write compare'
@@ -1,512 +1,512 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import urllib
22 22
23 23 import mock
24 24 import pytest
25 25
26 26 from rhodecode.apps._base import ADMIN_PREFIX
27 27 from rhodecode.lib import auth
28 28 from rhodecode.lib.utils2 import safe_str
29 29 from rhodecode.lib import helpers as h
30 30 from rhodecode.model.db import (
31 31 Repository, RepoGroup, UserRepoToPerm, User, Permission)
32 32 from rhodecode.model.meta import Session
33 33 from rhodecode.model.repo import RepoModel
34 34 from rhodecode.model.repo_group import RepoGroupModel
35 35 from rhodecode.model.user import UserModel
36 36 from rhodecode.tests import (
37 37 login_user_session, assert_session_flash, TEST_USER_ADMIN_LOGIN,
38 38 TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
39 39 from rhodecode.tests.fixture import Fixture, error_function
40 40 from rhodecode.tests.utils import AssertResponse, repo_on_filesystem
41 41
42 42 fixture = Fixture()
43 43
44 44
45 45 def route_path(name, params=None, **kwargs):
46 46 import urllib
47 47
48 48 base_url = {
49 49 'repos': ADMIN_PREFIX + '/repos',
50 50 'repo_new': ADMIN_PREFIX + '/repos/new',
51 51 'repo_create': ADMIN_PREFIX + '/repos/create',
52 52
53 53 'repo_creating_check': '/{repo_name}/repo_creating_check',
54 54 }[name].format(**kwargs)
55 55
56 56 if params:
57 57 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
58 58 return base_url
59 59
60 60
61 61 def _get_permission_for_user(user, repo):
62 62 perm = UserRepoToPerm.query()\
63 63 .filter(UserRepoToPerm.repository ==
64 64 Repository.get_by_repo_name(repo))\
65 65 .filter(UserRepoToPerm.user == User.get_by_username(user))\
66 66 .all()
67 67 return perm
68 68
69 69
70 70 @pytest.mark.usefixtures("app")
71 71 class TestAdminRepos(object):
72 72
73 73 def test_repo_list(self, autologin_user, user_util):
74 74 repo = user_util.create_repo()
75 75 repo_name = repo.repo_name
76 76 response = self.app.get(
77 77 route_path('repos'), status=200)
78 78
79 79 response.mustcontain(repo_name)
80 80
81 81 def test_create_page_restricted_to_single_backend(self, autologin_user, backend):
82 82 with mock.patch('rhodecode.BACKENDS', {'git': 'git'}):
83 83 response = self.app.get(route_path('repo_new'), status=200)
84 assert_response = AssertResponse(response)
84 assert_response = response.assert_response()
85 85 element = assert_response.get_element('#repo_type')
86 86 assert element.text_content() == '\ngit\n'
87 87
88 88 def test_create_page_non_restricted_backends(self, autologin_user, backend):
89 89 response = self.app.get(route_path('repo_new'), status=200)
90 assert_response = AssertResponse(response)
90 assert_response = response.assert_response()
91 91 assert_response.element_contains('#repo_type', 'git')
92 92 assert_response.element_contains('#repo_type', 'svn')
93 93 assert_response.element_contains('#repo_type', 'hg')
94 94
95 95 @pytest.mark.parametrize(
96 96 "suffix", [u'', u'xxa'], ids=['', 'non-ascii'])
97 97 def test_create(self, autologin_user, backend, suffix, csrf_token):
98 98 repo_name_unicode = backend.new_repo_name(suffix=suffix)
99 99 repo_name = repo_name_unicode.encode('utf8')
100 100 description_unicode = u'description for newly created repo' + suffix
101 101 description = description_unicode.encode('utf8')
102 102 response = self.app.post(
103 103 route_path('repo_create'),
104 104 fixture._get_repo_create_params(
105 105 repo_private=False,
106 106 repo_name=repo_name,
107 107 repo_type=backend.alias,
108 108 repo_description=description,
109 109 csrf_token=csrf_token),
110 110 status=302)
111 111
112 112 self.assert_repository_is_created_correctly(
113 113 repo_name, description, backend)
114 114
115 115 def test_create_numeric_name(self, autologin_user, backend, csrf_token):
116 116 numeric_repo = '1234'
117 117 repo_name = numeric_repo
118 118 description = 'description for newly created repo' + numeric_repo
119 119 self.app.post(
120 120 route_path('repo_create'),
121 121 fixture._get_repo_create_params(
122 122 repo_private=False,
123 123 repo_name=repo_name,
124 124 repo_type=backend.alias,
125 125 repo_description=description,
126 126 csrf_token=csrf_token))
127 127
128 128 self.assert_repository_is_created_correctly(
129 129 repo_name, description, backend)
130 130
131 131 @pytest.mark.parametrize("suffix", [u'', u'ąćę'], ids=['', 'non-ascii'])
132 132 def test_create_in_group(
133 133 self, autologin_user, backend, suffix, csrf_token):
134 134 # create GROUP
135 135 group_name = 'sometest_%s' % backend.alias
136 136 gr = RepoGroupModel().create(group_name=group_name,
137 137 group_description='test',
138 138 owner=TEST_USER_ADMIN_LOGIN)
139 139 Session().commit()
140 140
141 141 repo_name = u'ingroup' + suffix
142 142 repo_name_full = RepoGroup.url_sep().join(
143 143 [group_name, repo_name])
144 144 description = u'description for newly created repo'
145 145 self.app.post(
146 146 route_path('repo_create'),
147 147 fixture._get_repo_create_params(
148 148 repo_private=False,
149 149 repo_name=safe_str(repo_name),
150 150 repo_type=backend.alias,
151 151 repo_description=description,
152 152 repo_group=gr.group_id,
153 153 csrf_token=csrf_token))
154 154
155 155 # TODO: johbo: Cleanup work to fixture
156 156 try:
157 157 self.assert_repository_is_created_correctly(
158 158 repo_name_full, description, backend)
159 159
160 160 new_repo = RepoModel().get_by_repo_name(repo_name_full)
161 161 inherited_perms = UserRepoToPerm.query().filter(
162 162 UserRepoToPerm.repository_id == new_repo.repo_id).all()
163 163 assert len(inherited_perms) == 1
164 164 finally:
165 165 RepoModel().delete(repo_name_full)
166 166 RepoGroupModel().delete(group_name)
167 167 Session().commit()
168 168
169 169 def test_create_in_group_numeric_name(
170 170 self, autologin_user, backend, csrf_token):
171 171 # create GROUP
172 172 group_name = 'sometest_%s' % backend.alias
173 173 gr = RepoGroupModel().create(group_name=group_name,
174 174 group_description='test',
175 175 owner=TEST_USER_ADMIN_LOGIN)
176 176 Session().commit()
177 177
178 178 repo_name = '12345'
179 179 repo_name_full = RepoGroup.url_sep().join([group_name, repo_name])
180 180 description = 'description for newly created repo'
181 181 self.app.post(
182 182 route_path('repo_create'),
183 183 fixture._get_repo_create_params(
184 184 repo_private=False,
185 185 repo_name=repo_name,
186 186 repo_type=backend.alias,
187 187 repo_description=description,
188 188 repo_group=gr.group_id,
189 189 csrf_token=csrf_token))
190 190
191 191 # TODO: johbo: Cleanup work to fixture
192 192 try:
193 193 self.assert_repository_is_created_correctly(
194 194 repo_name_full, description, backend)
195 195
196 196 new_repo = RepoModel().get_by_repo_name(repo_name_full)
197 197 inherited_perms = UserRepoToPerm.query()\
198 198 .filter(UserRepoToPerm.repository_id == new_repo.repo_id).all()
199 199 assert len(inherited_perms) == 1
200 200 finally:
201 201 RepoModel().delete(repo_name_full)
202 202 RepoGroupModel().delete(group_name)
203 203 Session().commit()
204 204
205 205 def test_create_in_group_without_needed_permissions(self, backend):
206 206 session = login_user_session(
207 207 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
208 208 csrf_token = auth.get_csrf_token(session)
209 209 # revoke
210 210 user_model = UserModel()
211 211 # disable fork and create on default user
212 212 user_model.revoke_perm(User.DEFAULT_USER, 'hg.create.repository')
213 213 user_model.grant_perm(User.DEFAULT_USER, 'hg.create.none')
214 214 user_model.revoke_perm(User.DEFAULT_USER, 'hg.fork.repository')
215 215 user_model.grant_perm(User.DEFAULT_USER, 'hg.fork.none')
216 216
217 217 # disable on regular user
218 218 user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.repository')
219 219 user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.none')
220 220 user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.repository')
221 221 user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.none')
222 222 Session().commit()
223 223
224 224 # create GROUP
225 225 group_name = 'reg_sometest_%s' % backend.alias
226 226 gr = RepoGroupModel().create(group_name=group_name,
227 227 group_description='test',
228 228 owner=TEST_USER_ADMIN_LOGIN)
229 229 Session().commit()
230 230 repo_group_id = gr.group_id
231 231
232 232 group_name_allowed = 'reg_sometest_allowed_%s' % backend.alias
233 233 gr_allowed = RepoGroupModel().create(
234 234 group_name=group_name_allowed,
235 235 group_description='test',
236 236 owner=TEST_USER_REGULAR_LOGIN)
237 237 allowed_repo_group_id = gr_allowed.group_id
238 238 Session().commit()
239 239
240 240 repo_name = 'ingroup'
241 241 description = 'description for newly created repo'
242 242 response = self.app.post(
243 243 route_path('repo_create'),
244 244 fixture._get_repo_create_params(
245 245 repo_private=False,
246 246 repo_name=repo_name,
247 247 repo_type=backend.alias,
248 248 repo_description=description,
249 249 repo_group=repo_group_id,
250 250 csrf_token=csrf_token))
251 251
252 252 response.mustcontain('Invalid value')
253 253
254 254 # user is allowed to create in this group
255 255 repo_name = 'ingroup'
256 256 repo_name_full = RepoGroup.url_sep().join(
257 257 [group_name_allowed, repo_name])
258 258 description = 'description for newly created repo'
259 259 response = self.app.post(
260 260 route_path('repo_create'),
261 261 fixture._get_repo_create_params(
262 262 repo_private=False,
263 263 repo_name=repo_name,
264 264 repo_type=backend.alias,
265 265 repo_description=description,
266 266 repo_group=allowed_repo_group_id,
267 267 csrf_token=csrf_token))
268 268
269 269 # TODO: johbo: Cleanup in pytest fixture
270 270 try:
271 271 self.assert_repository_is_created_correctly(
272 272 repo_name_full, description, backend)
273 273
274 274 new_repo = RepoModel().get_by_repo_name(repo_name_full)
275 275 inherited_perms = UserRepoToPerm.query().filter(
276 276 UserRepoToPerm.repository_id == new_repo.repo_id).all()
277 277 assert len(inherited_perms) == 1
278 278
279 279 assert repo_on_filesystem(repo_name_full)
280 280 finally:
281 281 RepoModel().delete(repo_name_full)
282 282 RepoGroupModel().delete(group_name)
283 283 RepoGroupModel().delete(group_name_allowed)
284 284 Session().commit()
285 285
286 286 def test_create_in_group_inherit_permissions(self, autologin_user, backend,
287 287 csrf_token):
288 288 # create GROUP
289 289 group_name = 'sometest_%s' % backend.alias
290 290 gr = RepoGroupModel().create(group_name=group_name,
291 291 group_description='test',
292 292 owner=TEST_USER_ADMIN_LOGIN)
293 293 perm = Permission.get_by_key('repository.write')
294 294 RepoGroupModel().grant_user_permission(
295 295 gr, TEST_USER_REGULAR_LOGIN, perm)
296 296
297 297 # add repo permissions
298 298 Session().commit()
299 299 repo_group_id = gr.group_id
300 300 repo_name = 'ingroup_inherited_%s' % backend.alias
301 301 repo_name_full = RepoGroup.url_sep().join([group_name, repo_name])
302 302 description = 'description for newly created repo'
303 303 self.app.post(
304 304 route_path('repo_create'),
305 305 fixture._get_repo_create_params(
306 306 repo_private=False,
307 307 repo_name=repo_name,
308 308 repo_type=backend.alias,
309 309 repo_description=description,
310 310 repo_group=repo_group_id,
311 311 repo_copy_permissions=True,
312 312 csrf_token=csrf_token))
313 313
314 314 # TODO: johbo: Cleanup to pytest fixture
315 315 try:
316 316 self.assert_repository_is_created_correctly(
317 317 repo_name_full, description, backend)
318 318 except Exception:
319 319 RepoGroupModel().delete(group_name)
320 320 Session().commit()
321 321 raise
322 322
323 323 # check if inherited permissions are applied
324 324 new_repo = RepoModel().get_by_repo_name(repo_name_full)
325 325 inherited_perms = UserRepoToPerm.query().filter(
326 326 UserRepoToPerm.repository_id == new_repo.repo_id).all()
327 327 assert len(inherited_perms) == 2
328 328
329 329 assert TEST_USER_REGULAR_LOGIN in [
330 330 x.user.username for x in inherited_perms]
331 331 assert 'repository.write' in [
332 332 x.permission.permission_name for x in inherited_perms]
333 333
334 334 RepoModel().delete(repo_name_full)
335 335 RepoGroupModel().delete(group_name)
336 336 Session().commit()
337 337
338 338 @pytest.mark.xfail_backends(
339 339 "git", "hg", reason="Missing reposerver support")
340 340 def test_create_with_clone_uri(self, autologin_user, backend, reposerver,
341 341 csrf_token):
342 342 source_repo = backend.create_repo(number_of_commits=2)
343 343 source_repo_name = source_repo.repo_name
344 344 reposerver.serve(source_repo.scm_instance())
345 345
346 346 repo_name = backend.new_repo_name()
347 347 response = self.app.post(
348 348 route_path('repo_create'),
349 349 fixture._get_repo_create_params(
350 350 repo_private=False,
351 351 repo_name=repo_name,
352 352 repo_type=backend.alias,
353 353 repo_description='',
354 354 clone_uri=reposerver.url,
355 355 csrf_token=csrf_token),
356 356 status=302)
357 357
358 358 # Should be redirected to the creating page
359 359 response.mustcontain('repo_creating')
360 360
361 361 # Expecting that both repositories have same history
362 362 source_repo = RepoModel().get_by_repo_name(source_repo_name)
363 363 source_vcs = source_repo.scm_instance()
364 364 repo = RepoModel().get_by_repo_name(repo_name)
365 365 repo_vcs = repo.scm_instance()
366 366 assert source_vcs[0].message == repo_vcs[0].message
367 367 assert source_vcs.count() == repo_vcs.count()
368 368 assert source_vcs.commit_ids == repo_vcs.commit_ids
369 369
370 370 @pytest.mark.xfail_backends("svn", reason="Depends on import support")
371 371 def test_create_remote_repo_wrong_clone_uri(self, autologin_user, backend,
372 372 csrf_token):
373 373 repo_name = backend.new_repo_name()
374 374 description = 'description for newly created repo'
375 375 response = self.app.post(
376 376 route_path('repo_create'),
377 377 fixture._get_repo_create_params(
378 378 repo_private=False,
379 379 repo_name=repo_name,
380 380 repo_type=backend.alias,
381 381 repo_description=description,
382 382 clone_uri='http://repo.invalid/repo',
383 383 csrf_token=csrf_token))
384 384 response.mustcontain('invalid clone url')
385 385
386 386 @pytest.mark.xfail_backends("svn", reason="Depends on import support")
387 387 def test_create_remote_repo_wrong_clone_uri_hg_svn(
388 388 self, autologin_user, backend, csrf_token):
389 389 repo_name = backend.new_repo_name()
390 390 description = 'description for newly created repo'
391 391 response = self.app.post(
392 392 route_path('repo_create'),
393 393 fixture._get_repo_create_params(
394 394 repo_private=False,
395 395 repo_name=repo_name,
396 396 repo_type=backend.alias,
397 397 repo_description=description,
398 398 clone_uri='svn+http://svn.invalid/repo',
399 399 csrf_token=csrf_token))
400 400 response.mustcontain('invalid clone url')
401 401
402 402 def test_create_with_git_suffix(
403 403 self, autologin_user, backend, csrf_token):
404 404 repo_name = backend.new_repo_name() + ".git"
405 405 description = 'description for newly created repo'
406 406 response = self.app.post(
407 407 route_path('repo_create'),
408 408 fixture._get_repo_create_params(
409 409 repo_private=False,
410 410 repo_name=repo_name,
411 411 repo_type=backend.alias,
412 412 repo_description=description,
413 413 csrf_token=csrf_token))
414 414 response.mustcontain('Repository name cannot end with .git')
415 415
416 416 def test_default_user_cannot_access_private_repo_in_a_group(
417 417 self, autologin_user, user_util, backend):
418 418
419 419 group = user_util.create_repo_group()
420 420
421 421 repo = backend.create_repo(
422 422 repo_private=True, repo_group=group, repo_copy_permissions=True)
423 423
424 424 permissions = _get_permission_for_user(
425 425 user='default', repo=repo.repo_name)
426 426 assert len(permissions) == 1
427 427 assert permissions[0].permission.permission_name == 'repository.none'
428 428 assert permissions[0].repository.private is True
429 429
430 430 def test_create_on_top_level_without_permissions(self, backend):
431 431 session = login_user_session(
432 432 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
433 433 csrf_token = auth.get_csrf_token(session)
434 434
435 435 # revoke
436 436 user_model = UserModel()
437 437 # disable fork and create on default user
438 438 user_model.revoke_perm(User.DEFAULT_USER, 'hg.create.repository')
439 439 user_model.grant_perm(User.DEFAULT_USER, 'hg.create.none')
440 440 user_model.revoke_perm(User.DEFAULT_USER, 'hg.fork.repository')
441 441 user_model.grant_perm(User.DEFAULT_USER, 'hg.fork.none')
442 442
443 443 # disable on regular user
444 444 user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.repository')
445 445 user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.none')
446 446 user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.repository')
447 447 user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.none')
448 448 Session().commit()
449 449
450 450 repo_name = backend.new_repo_name()
451 451 description = 'description for newly created repo'
452 452 response = self.app.post(
453 453 route_path('repo_create'),
454 454 fixture._get_repo_create_params(
455 455 repo_private=False,
456 456 repo_name=repo_name,
457 457 repo_type=backend.alias,
458 458 repo_description=description,
459 459 csrf_token=csrf_token))
460 460
461 461 response.mustcontain(
462 462 u"You do not have the permission to store repositories in "
463 463 u"the root location.")
464 464
465 465 @mock.patch.object(RepoModel, '_create_filesystem_repo', error_function)
466 466 def test_create_repo_when_filesystem_op_fails(
467 467 self, autologin_user, backend, csrf_token):
468 468 repo_name = backend.new_repo_name()
469 469 description = 'description for newly created repo'
470 470
471 471 response = self.app.post(
472 472 route_path('repo_create'),
473 473 fixture._get_repo_create_params(
474 474 repo_private=False,
475 475 repo_name=repo_name,
476 476 repo_type=backend.alias,
477 477 repo_description=description,
478 478 csrf_token=csrf_token))
479 479
480 480 assert_session_flash(
481 481 response, 'Error creating repository %s' % repo_name)
482 482 # repo must not be in db
483 483 assert backend.repo is None
484 484 # repo must not be in filesystem !
485 485 assert not repo_on_filesystem(repo_name)
486 486
487 487 def assert_repository_is_created_correctly(
488 488 self, repo_name, description, backend):
489 489 repo_name_utf8 = safe_str(repo_name)
490 490
491 491 # run the check page that triggers the flash message
492 492 response = self.app.get(
493 493 route_path('repo_creating_check', repo_name=safe_str(repo_name)))
494 494 assert response.json == {u'result': True}
495 495
496 496 flash_msg = u'Created repository <a href="/{}">{}</a>'.format(
497 497 urllib.quote(repo_name_utf8), repo_name)
498 498 assert_session_flash(response, flash_msg)
499 499
500 500 # test if the repo was created in the database
501 501 new_repo = RepoModel().get_by_repo_name(repo_name)
502 502
503 503 assert new_repo.repo_name == repo_name
504 504 assert new_repo.description == description
505 505
506 506 # test if the repository is visible in the list ?
507 507 response = self.app.get(
508 508 h.route_path('repo_summary', repo_name=safe_str(repo_name)))
509 509 response.mustcontain(repo_name)
510 510 response.mustcontain(backend.alias)
511 511
512 512 assert repo_on_filesystem(repo_name)
@@ -1,743 +1,743 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import mock
22 22 import pytest
23 23
24 24 import rhodecode
25 25 from rhodecode.apps._base import ADMIN_PREFIX
26 26 from rhodecode.lib.utils2 import md5
27 27 from rhodecode.model.db import RhodeCodeUi
28 28 from rhodecode.model.meta import Session
29 29 from rhodecode.model.settings import SettingsModel, IssueTrackerSettingsModel
30 30 from rhodecode.tests import assert_session_flash
31 31 from rhodecode.tests.utils import AssertResponse
32 32
33 33
34 34 UPDATE_DATA_QUALNAME = 'rhodecode.model.update.UpdateModel.get_update_data'
35 35
36 36
37 37 def route_path(name, params=None, **kwargs):
38 38 import urllib
39 39 from rhodecode.apps._base import ADMIN_PREFIX
40 40
41 41 base_url = {
42 42
43 43 'admin_settings':
44 44 ADMIN_PREFIX +'/settings',
45 45 'admin_settings_update':
46 46 ADMIN_PREFIX + '/settings/update',
47 47 'admin_settings_global':
48 48 ADMIN_PREFIX + '/settings/global',
49 49 'admin_settings_global_update':
50 50 ADMIN_PREFIX + '/settings/global/update',
51 51 'admin_settings_vcs':
52 52 ADMIN_PREFIX + '/settings/vcs',
53 53 'admin_settings_vcs_update':
54 54 ADMIN_PREFIX + '/settings/vcs/update',
55 55 'admin_settings_vcs_svn_pattern_delete':
56 56 ADMIN_PREFIX + '/settings/vcs/svn_pattern_delete',
57 57 'admin_settings_mapping':
58 58 ADMIN_PREFIX + '/settings/mapping',
59 59 'admin_settings_mapping_update':
60 60 ADMIN_PREFIX + '/settings/mapping/update',
61 61 'admin_settings_visual':
62 62 ADMIN_PREFIX + '/settings/visual',
63 63 'admin_settings_visual_update':
64 64 ADMIN_PREFIX + '/settings/visual/update',
65 65 'admin_settings_issuetracker':
66 66 ADMIN_PREFIX + '/settings/issue-tracker',
67 67 'admin_settings_issuetracker_update':
68 68 ADMIN_PREFIX + '/settings/issue-tracker/update',
69 69 'admin_settings_issuetracker_test':
70 70 ADMIN_PREFIX + '/settings/issue-tracker/test',
71 71 'admin_settings_issuetracker_delete':
72 72 ADMIN_PREFIX + '/settings/issue-tracker/delete',
73 73 'admin_settings_email':
74 74 ADMIN_PREFIX + '/settings/email',
75 75 'admin_settings_email_update':
76 76 ADMIN_PREFIX + '/settings/email/update',
77 77 'admin_settings_hooks':
78 78 ADMIN_PREFIX + '/settings/hooks',
79 79 'admin_settings_hooks_update':
80 80 ADMIN_PREFIX + '/settings/hooks/update',
81 81 'admin_settings_hooks_delete':
82 82 ADMIN_PREFIX + '/settings/hooks/delete',
83 83 'admin_settings_search':
84 84 ADMIN_PREFIX + '/settings/search',
85 85 'admin_settings_labs':
86 86 ADMIN_PREFIX + '/settings/labs',
87 87 'admin_settings_labs_update':
88 88 ADMIN_PREFIX + '/settings/labs/update',
89 89
90 90 'admin_settings_sessions':
91 91 ADMIN_PREFIX + '/settings/sessions',
92 92 'admin_settings_sessions_cleanup':
93 93 ADMIN_PREFIX + '/settings/sessions/cleanup',
94 94 'admin_settings_system':
95 95 ADMIN_PREFIX + '/settings/system',
96 96 'admin_settings_system_update':
97 97 ADMIN_PREFIX + '/settings/system/updates',
98 98 'admin_settings_open_source':
99 99 ADMIN_PREFIX + '/settings/open_source',
100 100
101 101
102 102 }[name].format(**kwargs)
103 103
104 104 if params:
105 105 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
106 106 return base_url
107 107
108 108
109 109 @pytest.mark.usefixtures('autologin_user', 'app')
110 110 class TestAdminSettingsController(object):
111 111
112 112 @pytest.mark.parametrize('urlname', [
113 113 'admin_settings_vcs',
114 114 'admin_settings_mapping',
115 115 'admin_settings_global',
116 116 'admin_settings_visual',
117 117 'admin_settings_email',
118 118 'admin_settings_hooks',
119 119 'admin_settings_search',
120 120 ])
121 121 def test_simple_get(self, urlname):
122 122 self.app.get(route_path(urlname))
123 123
124 124 def test_create_custom_hook(self, csrf_token):
125 125 response = self.app.post(
126 126 route_path('admin_settings_hooks_update'),
127 127 params={
128 128 'new_hook_ui_key': 'test_hooks_1',
129 129 'new_hook_ui_value': 'cd /tmp',
130 130 'csrf_token': csrf_token})
131 131
132 132 response = response.follow()
133 133 response.mustcontain('test_hooks_1')
134 134 response.mustcontain('cd /tmp')
135 135
136 136 def test_create_custom_hook_delete(self, csrf_token):
137 137 response = self.app.post(
138 138 route_path('admin_settings_hooks_update'),
139 139 params={
140 140 'new_hook_ui_key': 'test_hooks_2',
141 141 'new_hook_ui_value': 'cd /tmp2',
142 142 'csrf_token': csrf_token})
143 143
144 144 response = response.follow()
145 145 response.mustcontain('test_hooks_2')
146 146 response.mustcontain('cd /tmp2')
147 147
148 148 hook_id = SettingsModel().get_ui_by_key('test_hooks_2').ui_id
149 149
150 150 # delete
151 151 self.app.post(
152 152 route_path('admin_settings_hooks_delete'),
153 153 params={'hook_id': hook_id, 'csrf_token': csrf_token})
154 154 response = self.app.get(route_path('admin_settings_hooks'))
155 155 response.mustcontain(no=['test_hooks_2'])
156 156 response.mustcontain(no=['cd /tmp2'])
157 157
158 158
159 159 @pytest.mark.usefixtures('autologin_user', 'app')
160 160 class TestAdminSettingsGlobal(object):
161 161
162 162 def test_pre_post_code_code_active(self, csrf_token):
163 163 pre_code = 'rc-pre-code-187652122'
164 164 post_code = 'rc-postcode-98165231'
165 165
166 166 response = self.post_and_verify_settings({
167 167 'rhodecode_pre_code': pre_code,
168 168 'rhodecode_post_code': post_code,
169 169 'csrf_token': csrf_token,
170 170 })
171 171
172 172 response = response.follow()
173 173 response.mustcontain(pre_code, post_code)
174 174
175 175 def test_pre_post_code_code_inactive(self, csrf_token):
176 176 pre_code = 'rc-pre-code-187652122'
177 177 post_code = 'rc-postcode-98165231'
178 178 response = self.post_and_verify_settings({
179 179 'rhodecode_pre_code': '',
180 180 'rhodecode_post_code': '',
181 181 'csrf_token': csrf_token,
182 182 })
183 183
184 184 response = response.follow()
185 185 response.mustcontain(no=[pre_code, post_code])
186 186
187 187 def test_captcha_activate(self, csrf_token):
188 188 self.post_and_verify_settings({
189 189 'rhodecode_captcha_private_key': '1234567890',
190 190 'rhodecode_captcha_public_key': '1234567890',
191 191 'csrf_token': csrf_token,
192 192 })
193 193
194 194 response = self.app.get(ADMIN_PREFIX + '/register')
195 195 response.mustcontain('captcha')
196 196
197 197 def test_captcha_deactivate(self, csrf_token):
198 198 self.post_and_verify_settings({
199 199 'rhodecode_captcha_private_key': '',
200 200 'rhodecode_captcha_public_key': '1234567890',
201 201 'csrf_token': csrf_token,
202 202 })
203 203
204 204 response = self.app.get(ADMIN_PREFIX + '/register')
205 205 response.mustcontain(no=['captcha'])
206 206
207 207 def test_title_change(self, csrf_token):
208 208 old_title = 'RhodeCode'
209 209
210 210 for new_title in ['Changed', 'Żółwik', old_title]:
211 211 response = self.post_and_verify_settings({
212 212 'rhodecode_title': new_title,
213 213 'csrf_token': csrf_token,
214 214 })
215 215
216 216 response = response.follow()
217 217 response.mustcontain(new_title)
218 218
219 219 def post_and_verify_settings(self, settings):
220 220 old_title = 'RhodeCode'
221 221 old_realm = 'RhodeCode authentication'
222 222 params = {
223 223 'rhodecode_title': old_title,
224 224 'rhodecode_realm': old_realm,
225 225 'rhodecode_pre_code': '',
226 226 'rhodecode_post_code': '',
227 227 'rhodecode_captcha_private_key': '',
228 228 'rhodecode_captcha_public_key': '',
229 229 'rhodecode_create_personal_repo_group': False,
230 230 'rhodecode_personal_repo_group_pattern': '${username}',
231 231 }
232 232 params.update(settings)
233 233 response = self.app.post(
234 234 route_path('admin_settings_global_update'), params=params)
235 235
236 236 assert_session_flash(response, 'Updated application settings')
237 237 app_settings = SettingsModel().get_all_settings()
238 238 del settings['csrf_token']
239 239 for key, value in settings.iteritems():
240 240 assert app_settings[key] == value.decode('utf-8')
241 241
242 242 return response
243 243
244 244
245 245 @pytest.mark.usefixtures('autologin_user', 'app')
246 246 class TestAdminSettingsVcs(object):
247 247
248 248 def test_contains_svn_default_patterns(self):
249 249 response = self.app.get(route_path('admin_settings_vcs'))
250 250 expected_patterns = [
251 251 '/trunk',
252 252 '/branches/*',
253 253 '/tags/*',
254 254 ]
255 255 for pattern in expected_patterns:
256 256 response.mustcontain(pattern)
257 257
258 258 def test_add_new_svn_branch_and_tag_pattern(
259 259 self, backend_svn, form_defaults, disable_sql_cache,
260 260 csrf_token):
261 261 form_defaults.update({
262 262 'new_svn_branch': '/exp/branches/*',
263 263 'new_svn_tag': '/important_tags/*',
264 264 'csrf_token': csrf_token,
265 265 })
266 266
267 267 response = self.app.post(
268 268 route_path('admin_settings_vcs_update'),
269 269 params=form_defaults, status=302)
270 270 response = response.follow()
271 271
272 272 # Expect to find the new values on the page
273 273 response.mustcontain('/exp/branches/*')
274 274 response.mustcontain('/important_tags/*')
275 275
276 276 # Expect that those patterns are used to match branches and tags now
277 277 repo = backend_svn['svn-simple-layout'].scm_instance()
278 278 assert 'exp/branches/exp-sphinx-docs' in repo.branches
279 279 assert 'important_tags/v0.5' in repo.tags
280 280
281 281 def test_add_same_svn_value_twice_shows_an_error_message(
282 282 self, form_defaults, csrf_token, settings_util):
283 283 settings_util.create_rhodecode_ui('vcs_svn_branch', '/test')
284 284 settings_util.create_rhodecode_ui('vcs_svn_tag', '/test')
285 285
286 286 response = self.app.post(
287 287 route_path('admin_settings_vcs_update'),
288 288 params={
289 289 'paths_root_path': form_defaults['paths_root_path'],
290 290 'new_svn_branch': '/test',
291 291 'new_svn_tag': '/test',
292 292 'csrf_token': csrf_token,
293 293 },
294 294 status=200)
295 295
296 296 response.mustcontain("Pattern already exists")
297 297 response.mustcontain("Some form inputs contain invalid data.")
298 298
299 299 @pytest.mark.parametrize('section', [
300 300 'vcs_svn_branch',
301 301 'vcs_svn_tag',
302 302 ])
303 303 def test_delete_svn_patterns(
304 304 self, section, csrf_token, settings_util):
305 305 setting = settings_util.create_rhodecode_ui(
306 306 section, '/test_delete', cleanup=False)
307 307
308 308 self.app.post(
309 309 route_path('admin_settings_vcs_svn_pattern_delete'),
310 310 params={
311 311 'delete_svn_pattern': setting.ui_id,
312 312 'csrf_token': csrf_token},
313 313 headers={'X-REQUESTED-WITH': 'XMLHttpRequest'})
314 314
315 315 @pytest.mark.parametrize('section', [
316 316 'vcs_svn_branch',
317 317 'vcs_svn_tag',
318 318 ])
319 319 def test_delete_svn_patterns_raises_404_when_no_xhr(
320 320 self, section, csrf_token, settings_util):
321 321 setting = settings_util.create_rhodecode_ui(section, '/test_delete')
322 322
323 323 self.app.post(
324 324 route_path('admin_settings_vcs_svn_pattern_delete'),
325 325 params={
326 326 'delete_svn_pattern': setting.ui_id,
327 327 'csrf_token': csrf_token},
328 328 status=404)
329 329
330 330 def test_extensions_hgsubversion(self, form_defaults, csrf_token):
331 331 form_defaults.update({
332 332 'csrf_token': csrf_token,
333 333 'extensions_hgsubversion': 'True',
334 334 })
335 335 response = self.app.post(
336 336 route_path('admin_settings_vcs_update'),
337 337 params=form_defaults,
338 338 status=302)
339 339
340 340 response = response.follow()
341 341 extensions_input = (
342 342 '<input id="extensions_hgsubversion" '
343 343 'name="extensions_hgsubversion" type="checkbox" '
344 344 'value="True" checked="checked" />')
345 345 response.mustcontain(extensions_input)
346 346
347 347 def test_extensions_hgevolve(self, form_defaults, csrf_token):
348 348 form_defaults.update({
349 349 'csrf_token': csrf_token,
350 350 'extensions_evolve': 'True',
351 351 })
352 352 response = self.app.post(
353 353 route_path('admin_settings_vcs_update'),
354 354 params=form_defaults,
355 355 status=302)
356 356
357 357 response = response.follow()
358 358 extensions_input = (
359 359 '<input id="extensions_evolve" '
360 360 'name="extensions_evolve" type="checkbox" '
361 361 'value="True" checked="checked" />')
362 362 response.mustcontain(extensions_input)
363 363
364 364 def test_has_a_section_for_pull_request_settings(self):
365 365 response = self.app.get(route_path('admin_settings_vcs'))
366 366 response.mustcontain('Pull Request Settings')
367 367
368 368 def test_has_an_input_for_invalidation_of_inline_comments(self):
369 369 response = self.app.get(route_path('admin_settings_vcs'))
370 assert_response = AssertResponse(response)
370 assert_response = response.assert_response()
371 371 assert_response.one_element_exists(
372 372 '[name=rhodecode_use_outdated_comments]')
373 373
374 374 @pytest.mark.parametrize('new_value', [True, False])
375 375 def test_allows_to_change_invalidation_of_inline_comments(
376 376 self, form_defaults, csrf_token, new_value):
377 377 setting_key = 'use_outdated_comments'
378 378 setting = SettingsModel().create_or_update_setting(
379 379 setting_key, not new_value, 'bool')
380 380 Session().add(setting)
381 381 Session().commit()
382 382
383 383 form_defaults.update({
384 384 'csrf_token': csrf_token,
385 385 'rhodecode_use_outdated_comments': str(new_value),
386 386 })
387 387 response = self.app.post(
388 388 route_path('admin_settings_vcs_update'),
389 389 params=form_defaults,
390 390 status=302)
391 391 response = response.follow()
392 392 setting = SettingsModel().get_setting_by_name(setting_key)
393 393 assert setting.app_settings_value is new_value
394 394
395 395 @pytest.mark.parametrize('new_value', [True, False])
396 396 def test_allows_to_change_hg_rebase_merge_strategy(
397 397 self, form_defaults, csrf_token, new_value):
398 398 setting_key = 'hg_use_rebase_for_merging'
399 399
400 400 form_defaults.update({
401 401 'csrf_token': csrf_token,
402 402 'rhodecode_' + setting_key: str(new_value),
403 403 })
404 404
405 405 with mock.patch.dict(
406 406 rhodecode.CONFIG, {'labs_settings_active': 'true'}):
407 407 self.app.post(
408 408 route_path('admin_settings_vcs_update'),
409 409 params=form_defaults,
410 410 status=302)
411 411
412 412 setting = SettingsModel().get_setting_by_name(setting_key)
413 413 assert setting.app_settings_value is new_value
414 414
415 415 @pytest.fixture()
416 416 def disable_sql_cache(self, request):
417 417 patcher = mock.patch(
418 418 'rhodecode.lib.caching_query.FromCache.process_query')
419 419 request.addfinalizer(patcher.stop)
420 420 patcher.start()
421 421
422 422 @pytest.fixture()
423 423 def form_defaults(self):
424 424 from rhodecode.apps.admin.views.settings import AdminSettingsView
425 425 return AdminSettingsView._form_defaults()
426 426
427 427 # TODO: johbo: What we really want is to checkpoint before a test run and
428 428 # reset the session afterwards.
429 429 @pytest.fixture(scope='class', autouse=True)
430 430 def cleanup_settings(self, request, baseapp):
431 431 ui_id = RhodeCodeUi.ui_id
432 432 original_ids = list(
433 433 r.ui_id for r in RhodeCodeUi.query().values(ui_id))
434 434
435 435 @request.addfinalizer
436 436 def cleanup():
437 437 RhodeCodeUi.query().filter(
438 438 ui_id.notin_(original_ids)).delete(False)
439 439
440 440
441 441 @pytest.mark.usefixtures('autologin_user', 'app')
442 442 class TestLabsSettings(object):
443 443 def test_get_settings_page_disabled(self):
444 444 with mock.patch.dict(
445 445 rhodecode.CONFIG, {'labs_settings_active': 'false'}):
446 446
447 447 response = self.app.get(
448 448 route_path('admin_settings_labs'), status=302)
449 449
450 450 assert response.location.endswith(route_path('admin_settings'))
451 451
452 452 def test_get_settings_page_enabled(self):
453 453 from rhodecode.apps.admin.views import settings
454 454 lab_settings = [
455 455 settings.LabSetting(
456 456 key='rhodecode_bool',
457 457 type='bool',
458 458 group='bool group',
459 459 label='bool label',
460 460 help='bool help'
461 461 ),
462 462 settings.LabSetting(
463 463 key='rhodecode_text',
464 464 type='unicode',
465 465 group='text group',
466 466 label='text label',
467 467 help='text help'
468 468 ),
469 469 ]
470 470 with mock.patch.dict(rhodecode.CONFIG,
471 471 {'labs_settings_active': 'true'}):
472 472 with mock.patch.object(settings, '_LAB_SETTINGS', lab_settings):
473 473 response = self.app.get(route_path('admin_settings_labs'))
474 474
475 475 assert '<label>bool group:</label>' in response
476 476 assert '<label for="rhodecode_bool">bool label</label>' in response
477 477 assert '<p class="help-block">bool help</p>' in response
478 478 assert 'name="rhodecode_bool" type="checkbox"' in response
479 479
480 480 assert '<label>text group:</label>' in response
481 481 assert '<label for="rhodecode_text">text label</label>' in response
482 482 assert '<p class="help-block">text help</p>' in response
483 483 assert 'name="rhodecode_text" size="60" type="text"' in response
484 484
485 485
486 486 @pytest.mark.usefixtures('app')
487 487 class TestOpenSourceLicenses(object):
488 488
489 489 def test_records_are_displayed(self, autologin_user):
490 490 sample_licenses = [
491 491 {
492 492 "license": [
493 493 {
494 494 "fullName": "BSD 4-clause \"Original\" or \"Old\" License",
495 495 "shortName": "bsdOriginal",
496 496 "spdxId": "BSD-4-Clause",
497 497 "url": "http://spdx.org/licenses/BSD-4-Clause.html"
498 498 }
499 499 ],
500 500 "name": "python2.7-coverage-3.7.1"
501 501 },
502 502 {
503 503 "license": [
504 504 {
505 505 "fullName": "MIT License",
506 506 "shortName": "mit",
507 507 "spdxId": "MIT",
508 508 "url": "http://spdx.org/licenses/MIT.html"
509 509 }
510 510 ],
511 511 "name": "python2.7-bootstrapped-pip-9.0.1"
512 512 },
513 513 ]
514 514 read_licenses_patch = mock.patch(
515 515 'rhodecode.apps.admin.views.open_source_licenses.read_opensource_licenses',
516 516 return_value=sample_licenses)
517 517 with read_licenses_patch:
518 518 response = self.app.get(
519 519 route_path('admin_settings_open_source'), status=200)
520 520
521 assert_response = AssertResponse(response)
521 assert_response = response.assert_response()
522 522 assert_response.element_contains(
523 523 '.panel-heading', 'Licenses of Third Party Packages')
524 524 for license_data in sample_licenses:
525 525 response.mustcontain(license_data["license"][0]["spdxId"])
526 526 assert_response.element_contains('.panel-body', license_data["name"])
527 527
528 528 def test_records_can_be_read(self, autologin_user):
529 529 response = self.app.get(
530 530 route_path('admin_settings_open_source'), status=200)
531 assert_response = AssertResponse(response)
531 assert_response = response.assert_response()
532 532 assert_response.element_contains(
533 533 '.panel-heading', 'Licenses of Third Party Packages')
534 534
535 535 def test_forbidden_when_normal_user(self, autologin_regular_user):
536 536 self.app.get(
537 537 route_path('admin_settings_open_source'), status=404)
538 538
539 539
540 540 @pytest.mark.usefixtures('app')
541 541 class TestUserSessions(object):
542 542
543 543 def test_forbidden_when_normal_user(self, autologin_regular_user):
544 544 self.app.get(route_path('admin_settings_sessions'), status=404)
545 545
546 546 def test_show_sessions_page(self, autologin_user):
547 547 response = self.app.get(route_path('admin_settings_sessions'), status=200)
548 548 response.mustcontain('file')
549 549
550 550 def test_cleanup_old_sessions(self, autologin_user, csrf_token):
551 551
552 552 post_data = {
553 553 'csrf_token': csrf_token,
554 554 'expire_days': '60'
555 555 }
556 556 response = self.app.post(
557 557 route_path('admin_settings_sessions_cleanup'), params=post_data,
558 558 status=302)
559 559 assert_session_flash(response, 'Cleaned up old sessions')
560 560
561 561
562 562 @pytest.mark.usefixtures('app')
563 563 class TestAdminSystemInfo(object):
564 564
565 565 def test_forbidden_when_normal_user(self, autologin_regular_user):
566 566 self.app.get(route_path('admin_settings_system'), status=404)
567 567
568 568 def test_system_info_page(self, autologin_user):
569 569 response = self.app.get(route_path('admin_settings_system'))
570 570 response.mustcontain('RhodeCode Community Edition, version {}'.format(
571 571 rhodecode.__version__))
572 572
573 573 def test_system_update_new_version(self, autologin_user):
574 574 update_data = {
575 575 'versions': [
576 576 {
577 577 'version': '100.3.1415926535',
578 578 'general': 'The latest version we are ever going to ship'
579 579 },
580 580 {
581 581 'version': '0.0.0',
582 582 'general': 'The first version we ever shipped'
583 583 }
584 584 ]
585 585 }
586 586 with mock.patch(UPDATE_DATA_QUALNAME, return_value=update_data):
587 587 response = self.app.get(route_path('admin_settings_system_update'))
588 588 response.mustcontain('A <b>new version</b> is available')
589 589
590 590 def test_system_update_nothing_new(self, autologin_user):
591 591 update_data = {
592 592 'versions': [
593 593 {
594 594 'version': '0.0.0',
595 595 'general': 'The first version we ever shipped'
596 596 }
597 597 ]
598 598 }
599 599 with mock.patch(UPDATE_DATA_QUALNAME, return_value=update_data):
600 600 response = self.app.get(route_path('admin_settings_system_update'))
601 601 response.mustcontain(
602 602 'This instance is already running the <b>latest</b> stable version')
603 603
604 604 def test_system_update_bad_response(self, autologin_user):
605 605 with mock.patch(UPDATE_DATA_QUALNAME, side_effect=ValueError('foo')):
606 606 response = self.app.get(route_path('admin_settings_system_update'))
607 607 response.mustcontain(
608 608 'Bad data sent from update server')
609 609
610 610
611 611 @pytest.mark.usefixtures("app")
612 612 class TestAdminSettingsIssueTracker(object):
613 613 RC_PREFIX = 'rhodecode_'
614 614 SHORT_PATTERN_KEY = 'issuetracker_pat_'
615 615 PATTERN_KEY = RC_PREFIX + SHORT_PATTERN_KEY
616 616
617 617 def test_issuetracker_index(self, autologin_user):
618 618 response = self.app.get(route_path('admin_settings_issuetracker'))
619 619 assert response.status_code == 200
620 620
621 621 def test_add_empty_issuetracker_pattern(
622 622 self, request, autologin_user, csrf_token):
623 623 post_url = route_path('admin_settings_issuetracker_update')
624 624 post_data = {
625 625 'csrf_token': csrf_token
626 626 }
627 627 self.app.post(post_url, post_data, status=302)
628 628
629 629 def test_add_issuetracker_pattern(
630 630 self, request, autologin_user, csrf_token):
631 631 pattern = 'issuetracker_pat'
632 632 another_pattern = pattern+'1'
633 633 post_url = route_path('admin_settings_issuetracker_update')
634 634 post_data = {
635 635 'new_pattern_pattern_0': pattern,
636 636 'new_pattern_url_0': 'http://url',
637 637 'new_pattern_prefix_0': 'prefix',
638 638 'new_pattern_description_0': 'description',
639 639 'new_pattern_pattern_1': another_pattern,
640 640 'new_pattern_url_1': 'https://url1',
641 641 'new_pattern_prefix_1': 'prefix1',
642 642 'new_pattern_description_1': 'description1',
643 643 'csrf_token': csrf_token
644 644 }
645 645 self.app.post(post_url, post_data, status=302)
646 646 settings = SettingsModel().get_all_settings()
647 647 self.uid = md5(pattern)
648 648 assert settings[self.PATTERN_KEY+self.uid] == pattern
649 649 self.another_uid = md5(another_pattern)
650 650 assert settings[self.PATTERN_KEY+self.another_uid] == another_pattern
651 651
652 652 @request.addfinalizer
653 653 def cleanup():
654 654 defaults = SettingsModel().get_all_settings()
655 655
656 656 entries = [name for name in defaults if (
657 657 (self.uid in name) or (self.another_uid) in name)]
658 658 start = len(self.RC_PREFIX)
659 659 for del_key in entries:
660 660 # TODO: anderson: get_by_name needs name without prefix
661 661 entry = SettingsModel().get_setting_by_name(del_key[start:])
662 662 Session().delete(entry)
663 663
664 664 Session().commit()
665 665
666 666 def test_edit_issuetracker_pattern(
667 667 self, autologin_user, backend, csrf_token, request):
668 668 old_pattern = 'issuetracker_pat'
669 669 old_uid = md5(old_pattern)
670 670 pattern = 'issuetracker_pat_new'
671 671 self.new_uid = md5(pattern)
672 672
673 673 SettingsModel().create_or_update_setting(
674 674 self.SHORT_PATTERN_KEY+old_uid, old_pattern, 'unicode')
675 675
676 676 post_url = route_path('admin_settings_issuetracker_update')
677 677 post_data = {
678 678 'new_pattern_pattern_0': pattern,
679 679 'new_pattern_url_0': 'https://url',
680 680 'new_pattern_prefix_0': 'prefix',
681 681 'new_pattern_description_0': 'description',
682 682 'uid': old_uid,
683 683 'csrf_token': csrf_token
684 684 }
685 685 self.app.post(post_url, post_data, status=302)
686 686 settings = SettingsModel().get_all_settings()
687 687 assert settings[self.PATTERN_KEY+self.new_uid] == pattern
688 688 assert self.PATTERN_KEY+old_uid not in settings
689 689
690 690 @request.addfinalizer
691 691 def cleanup():
692 692 IssueTrackerSettingsModel().delete_entries(self.new_uid)
693 693
694 694 def test_replace_issuetracker_pattern_description(
695 695 self, autologin_user, csrf_token, request, settings_util):
696 696 prefix = 'issuetracker'
697 697 pattern = 'issuetracker_pat'
698 698 self.uid = md5(pattern)
699 699 pattern_key = '_'.join([prefix, 'pat', self.uid])
700 700 rc_pattern_key = '_'.join(['rhodecode', pattern_key])
701 701 desc_key = '_'.join([prefix, 'desc', self.uid])
702 702 rc_desc_key = '_'.join(['rhodecode', desc_key])
703 703 new_description = 'new_description'
704 704
705 705 settings_util.create_rhodecode_setting(
706 706 pattern_key, pattern, 'unicode', cleanup=False)
707 707 settings_util.create_rhodecode_setting(
708 708 desc_key, 'old description', 'unicode', cleanup=False)
709 709
710 710 post_url = route_path('admin_settings_issuetracker_update')
711 711 post_data = {
712 712 'new_pattern_pattern_0': pattern,
713 713 'new_pattern_url_0': 'https://url',
714 714 'new_pattern_prefix_0': 'prefix',
715 715 'new_pattern_description_0': new_description,
716 716 'uid': self.uid,
717 717 'csrf_token': csrf_token
718 718 }
719 719 self.app.post(post_url, post_data, status=302)
720 720 settings = SettingsModel().get_all_settings()
721 721 assert settings[rc_pattern_key] == pattern
722 722 assert settings[rc_desc_key] == new_description
723 723
724 724 @request.addfinalizer
725 725 def cleanup():
726 726 IssueTrackerSettingsModel().delete_entries(self.uid)
727 727
728 728 def test_delete_issuetracker_pattern(
729 729 self, autologin_user, backend, csrf_token, settings_util):
730 730 pattern = 'issuetracker_pat'
731 731 uid = md5(pattern)
732 732 settings_util.create_rhodecode_setting(
733 733 self.SHORT_PATTERN_KEY+uid, pattern, 'unicode', cleanup=False)
734 734
735 735 post_url = route_path('admin_settings_issuetracker_delete')
736 736 post_data = {
737 737 '_method': 'delete',
738 738 'uid': uid,
739 739 'csrf_token': csrf_token
740 740 }
741 741 self.app.post(post_url, post_data, status=302)
742 742 settings = SettingsModel().get_all_settings()
743 743 assert 'rhodecode_%s%s' % (self.SHORT_PATTERN_KEY, uid) not in settings
@@ -1,118 +1,118 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import pytest
22 22
23 23 from rhodecode.lib import helpers as h
24 24 from rhodecode.tests import (
25 25 TestController, clear_cache_regions,
26 26 TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS)
27 27 from rhodecode.tests.fixture import Fixture
28 28 from rhodecode.tests.utils import AssertResponse
29 29
30 30 fixture = Fixture()
31 31
32 32
33 33 def route_path(name, params=None, **kwargs):
34 34 import urllib
35 35 from rhodecode.apps._base import ADMIN_PREFIX
36 36
37 37 base_url = {
38 38 'login': ADMIN_PREFIX + '/login',
39 39 'logout': ADMIN_PREFIX + '/logout',
40 40 'register': ADMIN_PREFIX + '/register',
41 41 'reset_password':
42 42 ADMIN_PREFIX + '/password_reset',
43 43 'reset_password_confirmation':
44 44 ADMIN_PREFIX + '/password_reset_confirmation',
45 45
46 46 'admin_permissions_application':
47 47 ADMIN_PREFIX + '/permissions/application',
48 48 'admin_permissions_application_update':
49 49 ADMIN_PREFIX + '/permissions/application/update',
50 50 }[name].format(**kwargs)
51 51
52 52 if params:
53 53 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
54 54 return base_url
55 55
56 56
57 57 class TestPasswordReset(TestController):
58 58
59 59 @pytest.mark.parametrize(
60 60 'pwd_reset_setting, show_link, show_reset', [
61 61 ('hg.password_reset.enabled', True, True),
62 62 ('hg.password_reset.hidden', False, True),
63 63 ('hg.password_reset.disabled', False, False),
64 64 ])
65 65 def test_password_reset_settings(
66 66 self, pwd_reset_setting, show_link, show_reset):
67 67 clear_cache_regions()
68 68 self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS)
69 69 params = {
70 70 'csrf_token': self.csrf_token,
71 71 'anonymous': 'True',
72 72 'default_register': 'hg.register.auto_activate',
73 73 'default_register_message': '',
74 74 'default_password_reset': pwd_reset_setting,
75 75 'default_extern_activate': 'hg.extern_activate.auto',
76 76 }
77 77 resp = self.app.post(
78 78 route_path('admin_permissions_application_update'), params=params)
79 79 self.logout_user()
80 80
81 81 login_page = self.app.get(route_path('login'))
82 82 asr_login = AssertResponse(login_page)
83 83
84 84 if show_link:
85 85 asr_login.one_element_exists('a.pwd_reset')
86 86 else:
87 87 asr_login.no_element_exists('a.pwd_reset')
88 88
89 89 response = self.app.get(route_path('reset_password'))
90 90
91 assert_response = AssertResponse(response)
91 assert_response = response.assert_response()
92 92 if show_reset:
93 93 response.mustcontain('Send password reset email')
94 94 assert_response.one_element_exists('#email')
95 95 assert_response.one_element_exists('#send')
96 96 else:
97 97 response.mustcontain('Password reset is disabled.')
98 98 assert_response.no_element_exists('#email')
99 99 assert_response.no_element_exists('#send')
100 100
101 101 def test_password_form_disabled(self):
102 102 self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS)
103 103 params = {
104 104 'csrf_token': self.csrf_token,
105 105 'anonymous': 'True',
106 106 'default_register': 'hg.register.auto_activate',
107 107 'default_register_message': '',
108 108 'default_password_reset': 'hg.password_reset.disabled',
109 109 'default_extern_activate': 'hg.extern_activate.auto',
110 110 }
111 111 self.app.post(route_path('admin_permissions_application_update'), params=params)
112 112 self.logout_user()
113 113
114 114 response = self.app.post(
115 115 route_path('reset_password'), {'email': 'lisa@rhodecode.com',}
116 116 )
117 117 response = response.follow()
118 118 response.mustcontain('Password reset is disabled.')
@@ -1,133 +1,133 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2016-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21
22 22 import mock
23 23 import pytest
24 24
25 25 from rhodecode.apps._base import ADMIN_PREFIX
26 26 from rhodecode.apps.login.views import LoginView, CaptchaData
27 27 from rhodecode.model.settings import SettingsModel
28 28 from rhodecode.lib.utils2 import AttributeDict
29 29 from rhodecode.tests.utils import AssertResponse
30 30
31 31
32 32 class RhodeCodeSetting(object):
33 33 def __init__(self, name, value):
34 34 self.name = name
35 35 self.value = value
36 36
37 37 def __enter__(self):
38 38 from rhodecode.model.settings import SettingsModel
39 39 model = SettingsModel()
40 40 self.old_setting = model.get_setting_by_name(self.name)
41 41 model.create_or_update_setting(name=self.name, val=self.value)
42 42 return self
43 43
44 44 def __exit__(self, exc_type, exc_val, exc_tb):
45 45 model = SettingsModel()
46 46 if self.old_setting:
47 47 model.create_or_update_setting(
48 48 name=self.name, val=self.old_setting.app_settings_value)
49 49 else:
50 50 model.create_or_update_setting(name=self.name)
51 51
52 52
53 53 class TestRegisterCaptcha(object):
54 54
55 55 @pytest.mark.parametrize('private_key, public_key, expected', [
56 56 ('', '', CaptchaData(False, '', '')),
57 57 ('', 'pubkey', CaptchaData(False, '', 'pubkey')),
58 58 ('privkey', '', CaptchaData(True, 'privkey', '')),
59 59 ('privkey', 'pubkey', CaptchaData(True, 'privkey', 'pubkey')),
60 60 ])
61 61 def test_get_captcha_data(self, private_key, public_key, expected,
62 62 request_stub, user_util):
63 63 request_stub.user = user_util.create_user().AuthUser()
64 64 request_stub.matched_route = AttributeDict({'name': 'login'})
65 65 login_view = LoginView(mock.Mock(), request_stub)
66 66
67 67 with RhodeCodeSetting('captcha_private_key', private_key):
68 68 with RhodeCodeSetting('captcha_public_key', public_key):
69 69 captcha = login_view._get_captcha_data()
70 70 assert captcha == expected
71 71
72 72 @pytest.mark.parametrize('active', [False, True])
73 73 @mock.patch.object(LoginView, '_get_captcha_data')
74 74 def test_private_key_does_not_leak_to_html(
75 75 self, m_get_captcha_data, active, app):
76 76 captcha = CaptchaData(
77 77 active=active, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY')
78 78 m_get_captcha_data.return_value = captcha
79 79
80 80 response = app.get(ADMIN_PREFIX + '/register')
81 81 assert 'PRIVATE_KEY' not in response
82 82
83 83 @pytest.mark.parametrize('active', [False, True])
84 84 @mock.patch.object(LoginView, '_get_captcha_data')
85 85 def test_register_view_renders_captcha(
86 86 self, m_get_captcha_data, active, app):
87 87 captcha = CaptchaData(
88 88 active=active, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY')
89 89 m_get_captcha_data.return_value = captcha
90 90
91 91 response = app.get(ADMIN_PREFIX + '/register')
92 92
93 assertr = AssertResponse(response)
93 assertr = response.assert_response()
94 94 if active:
95 95 assertr.one_element_exists('#recaptcha_field')
96 96 else:
97 97 assertr.no_element_exists('#recaptcha_field')
98 98
99 99 @pytest.mark.parametrize('valid', [False, True])
100 100 @mock.patch.object(LoginView, 'validate_captcha')
101 101 @mock.patch.object(LoginView, '_get_captcha_data')
102 102 def test_register_with_active_captcha(
103 103 self, m_get_captcha_data, m_validate_captcha, valid, app, csrf_token):
104 104 captcha = CaptchaData(
105 105 active=True, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY')
106 106 m_get_captcha_data.return_value = captcha
107 107 m_response = mock.Mock()
108 108 m_response.is_valid = valid
109 109 m_validate_captcha.return_value = valid, 'ok'
110 110
111 111 params = {
112 112 'csrf_token': csrf_token,
113 113 'email': 'pytest@example.com',
114 114 'firstname': 'pytest-firstname',
115 115 'lastname': 'pytest-lastname',
116 116 'password': 'secret',
117 117 'password_confirmation': 'secret',
118 118 'username': 'pytest',
119 119 }
120 120 response = app.post(ADMIN_PREFIX + '/register', params=params)
121 121
122 122 if valid:
123 123 # If we provided a valid captcha input we expect a successful
124 124 # registration and redirect to the login page.
125 125 assert response.status_int == 302
126 126 assert 'location' in response.headers
127 127 assert ADMIN_PREFIX + '/login' in response.headers['location']
128 128 else:
129 129 # If captche input is invalid we expect to stay on the registration
130 130 # page with an error message displayed.
131 assertr = AssertResponse(response)
131 assertr = response.assert_response()
132 132 assert response.status_int == 200
133 133 assertr.one_element_exists('#recaptcha_field ~ span.error-message')
@@ -1,137 +1,137 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import pytest
22 22 from rhodecode.model.auth_token import AuthTokenModel
23 23 from rhodecode.tests import TestController
24 24
25 25
26 26 def route_path(name, params=None, **kwargs):
27 27 import urllib
28 28
29 29 base_url = {
30 30 'rss_feed_home': '/{repo_name}/feed-rss',
31 31 'atom_feed_home': '/{repo_name}/feed-atom',
32 32 'rss_feed_home_old': '/{repo_name}/feed/rss',
33 33 'atom_feed_home_old': '/{repo_name}/feed/atom',
34 34 }[name].format(**kwargs)
35 35
36 36 if params:
37 37 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
38 38 return base_url
39 39
40 40
41 41 class TestFeedView(TestController):
42 42
43 43 @pytest.mark.parametrize("feed_type,response_types,content_type",[
44 44 ('rss', ['<rss version="2.0">'],
45 45 "application/rss+xml"),
46 46 ('atom', ['xmlns="http://www.w3.org/2005/Atom"', 'xml:lang="en-us"'],
47 47 "application/atom+xml"),
48 48 ])
49 49 def test_feed(self, backend, feed_type, response_types, content_type):
50 50 self.log_user()
51 51 response = self.app.get(
52 52 route_path('{}_feed_home'.format(feed_type),
53 53 repo_name=backend.repo_name))
54 54
55 55 for content in response_types:
56 56 response.mustcontain(content)
57 57
58 58 assert response.content_type == content_type
59 59
60 60 @pytest.mark.parametrize("feed_type, content_type", [
61 61 ('rss', "application/rss+xml"),
62 62 ('atom', "application/atom+xml")
63 63 ])
64 64 def test_feed_with_auth_token(
65 65 self, backend, user_admin, feed_type, content_type):
66 66 auth_token = user_admin.feed_token
67 67 assert auth_token != ''
68 68
69 69 response = self.app.get(
70 70 route_path(
71 71 '{}_feed_home'.format(feed_type),
72 72 repo_name=backend.repo_name,
73 73 params=dict(auth_token=auth_token)),
74 74 status=200)
75 75
76 76 assert response.content_type == content_type
77 77
78 78 @pytest.mark.parametrize("feed_type, content_type", [
79 79 ('rss', "application/rss+xml"),
80 80 ('atom', "application/atom+xml")
81 81 ])
82 82 def test_feed_with_auth_token_by_uid(
83 83 self, backend, user_admin, feed_type, content_type):
84 84 auth_token = user_admin.feed_token
85 85 assert auth_token != ''
86 86
87 87 response = self.app.get(
88 88 route_path(
89 89 '{}_feed_home'.format(feed_type),
90 90 repo_name='_{}'.format(backend.repo.repo_id),
91 91 params=dict(auth_token=auth_token)),
92 92 status=200)
93 93
94 94 assert response.content_type == content_type
95 95
96 96 @pytest.mark.parametrize("feed_type, content_type", [
97 97 ('rss', "application/rss+xml"),
98 98 ('atom', "application/atom+xml")
99 99 ])
100 100 def test_feed_old_urls_with_auth_token(
101 101 self, backend, user_admin, feed_type, content_type):
102 102 auth_token = user_admin.feed_token
103 103 assert auth_token != ''
104 104
105 105 response = self.app.get(
106 106 route_path(
107 107 '{}_feed_home_old'.format(feed_type),
108 108 repo_name=backend.repo_name,
109 109 params=dict(auth_token=auth_token)),
110 110 status=200)
111 111
112 112 assert response.content_type == content_type
113 113
114 114 @pytest.mark.parametrize("feed_type", ['rss', 'atom'])
115 115 def test_feed_with_auth_token_of_wrong_type(
116 116 self, backend, user_util, feed_type):
117 117 user = user_util.create_user()
118 118 auth_token = AuthTokenModel().create(
119 user.user_id, 'test-token', -1, AuthTokenModel.cls.ROLE_API)
119 user.user_id, u'test-token', -1, AuthTokenModel.cls.ROLE_API)
120 120 auth_token = auth_token.api_key
121 121
122 122 self.app.get(
123 123 route_path(
124 124 '{}_feed_home'.format(feed_type),
125 125 repo_name=backend.repo_name,
126 126 params=dict(auth_token=auth_token)),
127 127 status=302)
128 128
129 129 auth_token = AuthTokenModel().create(
130 user.user_id, 'test-token', -1, AuthTokenModel.cls.ROLE_FEED)
130 user.user_id, u'test-token', -1, AuthTokenModel.cls.ROLE_FEED)
131 131 auth_token = auth_token.api_key
132 132 self.app.get(
133 133 route_path(
134 134 '{}_feed_home'.format(feed_type),
135 135 repo_name=backend.repo_name,
136 136 params=dict(auth_token=auth_token)),
137 137 status=200)
@@ -1,524 +1,524 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import re
22 22
23 23 import mock
24 24 import pytest
25 25
26 26 from rhodecode.apps.repository.views.repo_summary import RepoSummaryView
27 27 from rhodecode.lib import helpers as h
28 28 from rhodecode.lib.compat import OrderedDict
29 29 from rhodecode.lib.utils2 import AttributeDict, safe_str
30 30 from rhodecode.lib.vcs.exceptions import RepositoryRequirementError
31 31 from rhodecode.model.db import Repository
32 32 from rhodecode.model.meta import Session
33 33 from rhodecode.model.repo import RepoModel
34 34 from rhodecode.model.scm import ScmModel
35 35 from rhodecode.tests import assert_session_flash
36 36 from rhodecode.tests.fixture import Fixture
37 37 from rhodecode.tests.utils import AssertResponse, repo_on_filesystem
38 38
39 39
40 40 fixture = Fixture()
41 41
42 42
43 43 def route_path(name, params=None, **kwargs):
44 44 import urllib
45 45
46 46 base_url = {
47 47 'repo_summary': '/{repo_name}',
48 48 'repo_stats': '/{repo_name}/repo_stats/{commit_id}',
49 49 'repo_refs_data': '/{repo_name}/refs-data',
50 50 'repo_refs_changelog_data': '/{repo_name}/refs-data-changelog',
51 51 'repo_creating_check': '/{repo_name}/repo_creating_check',
52 52 }[name].format(**kwargs)
53 53
54 54 if params:
55 55 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
56 56 return base_url
57 57
58 58
59 59 def assert_clone_url(response, server, repo, disabled=False):
60 60
61 61 response.mustcontain(
62 62 '<input type="text" class="input-monospace clone_url_input" '
63 63 '{disabled}readonly="readonly" '
64 64 'value="http://test_admin@{server}/{repo}"/>'.format(
65 65 server=server, repo=repo, disabled='disabled ' if disabled else ' ')
66 66 )
67 67
68 68
69 69 @pytest.mark.usefixtures('app')
70 70 class TestSummaryView(object):
71 71 def test_index(self, autologin_user, backend, http_host_only_stub):
72 72 repo_id = backend.repo.repo_id
73 73 repo_name = backend.repo_name
74 74 with mock.patch('rhodecode.lib.helpers.is_svn_without_proxy',
75 75 return_value=False):
76 76 response = self.app.get(
77 77 route_path('repo_summary', repo_name=repo_name))
78 78
79 79 # repo type
80 80 response.mustcontain(
81 81 '<i class="icon-%s">' % (backend.alias, )
82 82 )
83 83 # public/private
84 84 response.mustcontain(
85 85 """<i class="icon-unlock-alt">"""
86 86 )
87 87
88 88 # clone url...
89 89 assert_clone_url(response, http_host_only_stub, repo_name)
90 90 assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id))
91 91
92 92 def test_index_svn_without_proxy(
93 93 self, autologin_user, backend_svn, http_host_only_stub):
94 94 repo_id = backend_svn.repo.repo_id
95 95 repo_name = backend_svn.repo_name
96 96 response = self.app.get(route_path('repo_summary', repo_name=repo_name))
97 97 # clone url...
98 98
99 99 assert_clone_url(response, http_host_only_stub, repo_name, disabled=True)
100 100 assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id), disabled=True)
101 101
102 102 def test_index_with_trailing_slash(
103 103 self, autologin_user, backend, http_host_only_stub):
104 104
105 105 repo_id = backend.repo.repo_id
106 106 repo_name = backend.repo_name
107 107 with mock.patch('rhodecode.lib.helpers.is_svn_without_proxy',
108 108 return_value=False):
109 109 response = self.app.get(
110 110 route_path('repo_summary', repo_name=repo_name) + '/',
111 111 status=200)
112 112
113 113 # clone url...
114 114 assert_clone_url(response, http_host_only_stub, repo_name)
115 115 assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id))
116 116
117 117 def test_index_by_id(self, autologin_user, backend):
118 118 repo_id = backend.repo.repo_id
119 119 response = self.app.get(
120 120 route_path('repo_summary', repo_name='_%s' % (repo_id,)))
121 121
122 122 # repo type
123 123 response.mustcontain(
124 124 '<i class="icon-%s">' % (backend.alias, )
125 125 )
126 126 # public/private
127 127 response.mustcontain(
128 128 """<i class="icon-unlock-alt">"""
129 129 )
130 130
131 131 def test_index_by_repo_having_id_path_in_name_hg(self, autologin_user):
132 132 fixture.create_repo(name='repo_1')
133 133 response = self.app.get(route_path('repo_summary', repo_name='repo_1'))
134 134
135 135 try:
136 136 response.mustcontain("repo_1")
137 137 finally:
138 138 RepoModel().delete(Repository.get_by_repo_name('repo_1'))
139 139 Session().commit()
140 140
141 141 def test_index_with_anonymous_access_disabled(
142 142 self, backend, disable_anonymous_user):
143 143 response = self.app.get(
144 144 route_path('repo_summary', repo_name=backend.repo_name), status=302)
145 145 assert 'login' in response.location
146 146
147 147 def _enable_stats(self, repo):
148 148 r = Repository.get_by_repo_name(repo)
149 149 r.enable_statistics = True
150 150 Session().add(r)
151 151 Session().commit()
152 152
153 153 expected_trending = {
154 154 'hg': {
155 155 "py": {"count": 68, "desc": ["Python"]},
156 156 "rst": {"count": 16, "desc": ["Rst"]},
157 157 "css": {"count": 2, "desc": ["Css"]},
158 158 "sh": {"count": 2, "desc": ["Bash"]},
159 159 "bat": {"count": 1, "desc": ["Batch"]},
160 160 "cfg": {"count": 1, "desc": ["Ini"]},
161 161 "html": {"count": 1, "desc": ["EvoqueHtml", "Html"]},
162 162 "ini": {"count": 1, "desc": ["Ini"]},
163 163 "js": {"count": 1, "desc": ["Javascript"]},
164 164 "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]}
165 165 },
166 166 'git': {
167 167 "py": {"count": 68, "desc": ["Python"]},
168 168 "rst": {"count": 16, "desc": ["Rst"]},
169 169 "css": {"count": 2, "desc": ["Css"]},
170 170 "sh": {"count": 2, "desc": ["Bash"]},
171 171 "bat": {"count": 1, "desc": ["Batch"]},
172 172 "cfg": {"count": 1, "desc": ["Ini"]},
173 173 "html": {"count": 1, "desc": ["EvoqueHtml", "Html"]},
174 174 "ini": {"count": 1, "desc": ["Ini"]},
175 175 "js": {"count": 1, "desc": ["Javascript"]},
176 176 "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]}
177 177 },
178 178 'svn': {
179 179 "py": {"count": 75, "desc": ["Python"]},
180 180 "rst": {"count": 16, "desc": ["Rst"]},
181 181 "html": {"count": 11, "desc": ["EvoqueHtml", "Html"]},
182 182 "css": {"count": 2, "desc": ["Css"]},
183 183 "bat": {"count": 1, "desc": ["Batch"]},
184 184 "cfg": {"count": 1, "desc": ["Ini"]},
185 185 "ini": {"count": 1, "desc": ["Ini"]},
186 186 "js": {"count": 1, "desc": ["Javascript"]},
187 187 "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]},
188 188 "sh": {"count": 1, "desc": ["Bash"]}
189 189 },
190 190 }
191 191
192 192 def test_repo_stats(self, autologin_user, backend, xhr_header):
193 193 response = self.app.get(
194 194 route_path(
195 195 'repo_stats', repo_name=backend.repo_name, commit_id='tip'),
196 196 extra_environ=xhr_header,
197 197 status=200)
198 198 assert re.match(r'6[\d\.]+ KiB', response.json['size'])
199 199
200 200 def test_repo_stats_code_stats_enabled(self, autologin_user, backend, xhr_header):
201 201 repo_name = backend.repo_name
202 202
203 203 # codes stats
204 204 self._enable_stats(repo_name)
205 205 ScmModel().mark_for_invalidation(repo_name)
206 206
207 207 response = self.app.get(
208 208 route_path(
209 209 'repo_stats', repo_name=backend.repo_name, commit_id='tip'),
210 210 extra_environ=xhr_header,
211 211 status=200)
212 212
213 213 expected_data = self.expected_trending[backend.alias]
214 214 returned_stats = response.json['code_stats']
215 215 for k, v in expected_data.items():
216 216 assert v == returned_stats[k]
217 217
218 218 def test_repo_refs_data(self, backend):
219 219 response = self.app.get(
220 220 route_path('repo_refs_data', repo_name=backend.repo_name),
221 221 status=200)
222 222
223 223 # Ensure that there is the correct amount of items in the result
224 224 repo = backend.repo.scm_instance()
225 225 data = response.json['results']
226 226 items = sum(len(section['children']) for section in data)
227 227 repo_refs = len(repo.branches) + len(repo.tags) + len(repo.bookmarks)
228 228 assert items == repo_refs
229 229
230 230 def test_index_shows_missing_requirements_message(
231 231 self, backend, autologin_user):
232 232 repo_name = backend.repo_name
233 233 scm_patcher = mock.patch.object(
234 234 Repository, 'scm_instance', side_effect=RepositoryRequirementError)
235 235
236 236 with scm_patcher:
237 237 response = self.app.get(
238 238 route_path('repo_summary', repo_name=repo_name))
239 assert_response = AssertResponse(response)
239 assert_response = response.assert_response()
240 240 assert_response.element_contains(
241 241 '.main .alert-warning strong', 'Missing requirements')
242 242 assert_response.element_contains(
243 243 '.main .alert-warning',
244 244 'Commits cannot be displayed, because this repository '
245 245 'uses one or more extensions, which was not enabled.')
246 246
247 247 def test_missing_requirements_page_does_not_contains_switch_to(
248 248 self, autologin_user, backend):
249 249 repo_name = backend.repo_name
250 250 scm_patcher = mock.patch.object(
251 251 Repository, 'scm_instance', side_effect=RepositoryRequirementError)
252 252
253 253 with scm_patcher:
254 254 response = self.app.get(route_path('repo_summary', repo_name=repo_name))
255 255 response.mustcontain(no='Switch To')
256 256
257 257
258 258 @pytest.mark.usefixtures('app')
259 259 class TestRepoLocation(object):
260 260
261 261 @pytest.mark.parametrize("suffix", [u'', u'ąęł'], ids=['', 'non-ascii'])
262 262 def test_missing_filesystem_repo(
263 263 self, autologin_user, backend, suffix, csrf_token):
264 264 repo = backend.create_repo(name_suffix=suffix)
265 265 repo_name = repo.repo_name
266 266
267 267 # delete from file system
268 268 RepoModel()._delete_filesystem_repo(repo)
269 269
270 270 # test if the repo is still in the database
271 271 new_repo = RepoModel().get_by_repo_name(repo_name)
272 272 assert new_repo.repo_name == repo_name
273 273
274 274 # check if repo is not in the filesystem
275 275 assert not repo_on_filesystem(repo_name)
276 276
277 277 response = self.app.get(
278 278 route_path('repo_summary', repo_name=safe_str(repo_name)), status=302)
279 279
280 280 msg = 'The repository `%s` cannot be loaded in filesystem. ' \
281 281 'Please check if it exist, or is not damaged.' % repo_name
282 282 assert_session_flash(response, msg)
283 283
284 284 @pytest.mark.parametrize("suffix", [u'', u'ąęł'], ids=['', 'non-ascii'])
285 285 def test_missing_filesystem_repo_on_repo_check(
286 286 self, autologin_user, backend, suffix, csrf_token):
287 287 repo = backend.create_repo(name_suffix=suffix)
288 288 repo_name = repo.repo_name
289 289
290 290 # delete from file system
291 291 RepoModel()._delete_filesystem_repo(repo)
292 292
293 293 # test if the repo is still in the database
294 294 new_repo = RepoModel().get_by_repo_name(repo_name)
295 295 assert new_repo.repo_name == repo_name
296 296
297 297 # check if repo is not in the filesystem
298 298 assert not repo_on_filesystem(repo_name)
299 299
300 300 # flush the session
301 301 self.app.get(
302 302 route_path('repo_summary', repo_name=safe_str(repo_name)),
303 303 status=302)
304 304
305 305 response = self.app.get(
306 306 route_path('repo_creating_check', repo_name=safe_str(repo_name)),
307 307 status=200)
308 308 msg = 'The repository `%s` cannot be loaded in filesystem. ' \
309 309 'Please check if it exist, or is not damaged.' % repo_name
310 310 assert_session_flash(response, msg )
311 311
312 312
313 313 @pytest.fixture()
314 314 def summary_view(context_stub, request_stub, user_util):
315 315 """
316 316 Bootstrap view to test the view functions
317 317 """
318 318 request_stub.matched_route = AttributeDict(name='test_view')
319 319
320 320 request_stub.user = user_util.create_user().AuthUser()
321 321 request_stub.db_repo = user_util.create_repo()
322 322
323 323 view = RepoSummaryView(context=context_stub, request=request_stub)
324 324 return view
325 325
326 326
327 327 @pytest.mark.usefixtures('app')
328 328 class TestCreateReferenceData(object):
329 329
330 330 @pytest.fixture()
331 331 def example_refs(self):
332 332 section_1_refs = OrderedDict((('a', 'a_id'), ('b', 'b_id')))
333 333 example_refs = [
334 334 ('section_1', section_1_refs, 't1'),
335 335 ('section_2', {'c': 'c_id'}, 't2'),
336 336 ]
337 337 return example_refs
338 338
339 339 def test_generates_refs_based_on_commit_ids(self, example_refs, summary_view):
340 340 repo = mock.Mock()
341 341 repo.name = 'test-repo'
342 342 repo.alias = 'git'
343 343 full_repo_name = 'pytest-repo-group/' + repo.name
344 344
345 345 result = summary_view._create_reference_data(
346 346 repo, full_repo_name, example_refs)
347 347
348 348 expected_files_url = '/{}/files/'.format(full_repo_name)
349 349 expected_result = [
350 350 {
351 351 'children': [
352 352 {
353 353 'id': 'a', 'idx': 0, 'raw_id': 'a_id', 'text': 'a', 'type': 't1',
354 354 'files_url': expected_files_url + 'a/?at=a',
355 355 },
356 356 {
357 357 'id': 'b', 'idx': 0, 'raw_id': 'b_id', 'text': 'b', 'type': 't1',
358 358 'files_url': expected_files_url + 'b/?at=b',
359 359 }
360 360 ],
361 361 'text': 'section_1'
362 362 },
363 363 {
364 364 'children': [
365 365 {
366 366 'id': 'c', 'idx': 0, 'raw_id': 'c_id', 'text': 'c', 'type': 't2',
367 367 'files_url': expected_files_url + 'c/?at=c',
368 368 }
369 369 ],
370 370 'text': 'section_2'
371 371 }]
372 372 assert result == expected_result
373 373
374 374 def test_generates_refs_with_path_for_svn(self, example_refs, summary_view):
375 375 repo = mock.Mock()
376 376 repo.name = 'test-repo'
377 377 repo.alias = 'svn'
378 378 full_repo_name = 'pytest-repo-group/' + repo.name
379 379
380 380 result = summary_view._create_reference_data(
381 381 repo, full_repo_name, example_refs)
382 382
383 383 expected_files_url = '/{}/files/'.format(full_repo_name)
384 384 expected_result = [
385 385 {
386 386 'children': [
387 387 {
388 388 'id': 'a@a_id', 'idx': 0, 'raw_id': 'a_id',
389 389 'text': 'a', 'type': 't1',
390 390 'files_url': expected_files_url + 'a_id/a?at=a',
391 391 },
392 392 {
393 393 'id': 'b@b_id', 'idx': 0, 'raw_id': 'b_id',
394 394 'text': 'b', 'type': 't1',
395 395 'files_url': expected_files_url + 'b_id/b?at=b',
396 396 }
397 397 ],
398 398 'text': 'section_1'
399 399 },
400 400 {
401 401 'children': [
402 402 {
403 403 'id': 'c@c_id', 'idx': 0, 'raw_id': 'c_id',
404 404 'text': 'c', 'type': 't2',
405 405 'files_url': expected_files_url + 'c_id/c?at=c',
406 406 }
407 407 ],
408 408 'text': 'section_2'
409 409 }
410 410 ]
411 411 assert result == expected_result
412 412
413 413
414 414 class TestCreateFilesUrl(object):
415 415
416 416 def test_creates_non_svn_url(self, app, summary_view):
417 417 repo = mock.Mock()
418 418 repo.name = 'abcde'
419 419 full_repo_name = 'test-repo-group/' + repo.name
420 420 ref_name = 'branch1'
421 421 raw_id = 'deadbeef0123456789'
422 422 is_svn = False
423 423
424 424 with mock.patch('rhodecode.lib.helpers.route_path') as url_mock:
425 425 result = summary_view._create_files_url(
426 426 repo, full_repo_name, ref_name, raw_id, is_svn)
427 427 url_mock.assert_called_once_with(
428 428 'repo_files', repo_name=full_repo_name, commit_id=ref_name,
429 429 f_path='', _query=dict(at=ref_name))
430 430 assert result == url_mock.return_value
431 431
432 432 def test_creates_svn_url(self, app, summary_view):
433 433 repo = mock.Mock()
434 434 repo.name = 'abcde'
435 435 full_repo_name = 'test-repo-group/' + repo.name
436 436 ref_name = 'branch1'
437 437 raw_id = 'deadbeef0123456789'
438 438 is_svn = True
439 439
440 440 with mock.patch('rhodecode.lib.helpers.route_path') as url_mock:
441 441 result = summary_view._create_files_url(
442 442 repo, full_repo_name, ref_name, raw_id, is_svn)
443 443 url_mock.assert_called_once_with(
444 444 'repo_files', repo_name=full_repo_name, f_path=ref_name,
445 445 commit_id=raw_id, _query=dict(at=ref_name))
446 446 assert result == url_mock.return_value
447 447
448 448 def test_name_has_slashes(self, app, summary_view):
449 449 repo = mock.Mock()
450 450 repo.name = 'abcde'
451 451 full_repo_name = 'test-repo-group/' + repo.name
452 452 ref_name = 'branch1/branch2'
453 453 raw_id = 'deadbeef0123456789'
454 454 is_svn = False
455 455
456 456 with mock.patch('rhodecode.lib.helpers.route_path') as url_mock:
457 457 result = summary_view._create_files_url(
458 458 repo, full_repo_name, ref_name, raw_id, is_svn)
459 459 url_mock.assert_called_once_with(
460 460 'repo_files', repo_name=full_repo_name, commit_id=raw_id,
461 461 f_path='', _query=dict(at=ref_name))
462 462 assert result == url_mock.return_value
463 463
464 464
465 465 class TestReferenceItems(object):
466 466 repo = mock.Mock()
467 467 repo.name = 'pytest-repo'
468 468 repo_full_name = 'pytest-repo-group/' + repo.name
469 469 ref_type = 'branch'
470 470 fake_url = '/abcde/'
471 471
472 472 @staticmethod
473 473 def _format_function(name, id_):
474 474 return 'format_function_{}_{}'.format(name, id_)
475 475
476 476 def test_creates_required_amount_of_items(self, summary_view):
477 477 amount = 100
478 478 refs = {
479 479 'ref{}'.format(i): '{0:040d}'.format(i)
480 480 for i in range(amount)
481 481 }
482 482
483 483 url_patcher = mock.patch.object(summary_view, '_create_files_url')
484 484 svn_patcher = mock.patch('rhodecode.lib.helpers.is_svn',
485 485 return_value=False)
486 486
487 487 with url_patcher as url_mock, svn_patcher:
488 488 result = summary_view._create_reference_items(
489 489 self.repo, self.repo_full_name, refs, self.ref_type,
490 490 self._format_function)
491 491 assert len(result) == amount
492 492 assert url_mock.call_count == amount
493 493
494 494 def test_single_item_details(self, summary_view):
495 495 ref_name = 'ref1'
496 496 ref_id = 'deadbeef'
497 497 refs = {
498 498 ref_name: ref_id
499 499 }
500 500
501 501 svn_patcher = mock.patch('rhodecode.lib.helpers.is_svn',
502 502 return_value=False)
503 503
504 504 url_patcher = mock.patch.object(
505 505 summary_view, '_create_files_url', return_value=self.fake_url)
506 506
507 507 with url_patcher as url_mock, svn_patcher:
508 508 result = summary_view._create_reference_items(
509 509 self.repo, self.repo_full_name, refs, self.ref_type,
510 510 self._format_function)
511 511
512 512 url_mock.assert_called_once_with(
513 513 self.repo, self.repo_full_name, ref_name, ref_id, False)
514 514 expected_result = [
515 515 {
516 516 'text': ref_name,
517 517 'id': self._format_function(ref_name, ref_id),
518 518 'raw_id': ref_id,
519 519 'idx': 0,
520 520 'type': self.ref_type,
521 521 'files_url': self.fake_url
522 522 }
523 523 ]
524 524 assert result == expected_result
@@ -1,685 +1,685 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import mock
22 22 import pytest
23 23
24 24 from rhodecode.lib import auth
25 25 from rhodecode.lib.utils2 import str2bool
26 26 from rhodecode.model.db import (
27 27 Repository, UserRepoToPerm, User)
28 28 from rhodecode.model.meta import Session
29 29 from rhodecode.model.settings import SettingsModel, VcsSettingsModel
30 30 from rhodecode.model.user import UserModel
31 31 from rhodecode.tests import (
32 32 login_user_session, logout_user_session,
33 33 TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
34 34 from rhodecode.tests.fixture import Fixture
35 35 from rhodecode.tests.utils import AssertResponse
36 36
37 37 fixture = Fixture()
38 38
39 39
40 40 def route_path(name, params=None, **kwargs):
41 41 import urllib
42 42
43 43 base_url = {
44 44 'repo_summary': '/{repo_name}',
45 45 'repo_creating_check': '/{repo_name}/repo_creating_check',
46 46 'edit_repo': '/{repo_name}/settings',
47 47 'edit_repo_vcs': '/{repo_name}/settings/vcs',
48 48 'edit_repo_vcs_update': '/{repo_name}/settings/vcs/update',
49 49 'edit_repo_vcs_svn_pattern_delete': '/{repo_name}/settings/vcs/svn_pattern/delete'
50 50 }[name].format(**kwargs)
51 51
52 52 if params:
53 53 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
54 54 return base_url
55 55
56 56
57 57 @pytest.mark.usefixtures("app")
58 58 class TestVcsSettings(object):
59 59 FORM_DATA = {
60 60 'inherit_global_settings': False,
61 61 'hooks_changegroup_repo_size': False,
62 62 'hooks_changegroup_push_logger': False,
63 63 'hooks_outgoing_pull_logger': False,
64 64 'extensions_largefiles': False,
65 65 'extensions_evolve': False,
66 66 'phases_publish': 'False',
67 67 'rhodecode_pr_merge_enabled': False,
68 68 'rhodecode_use_outdated_comments': False,
69 69 'new_svn_branch': '',
70 70 'new_svn_tag': ''
71 71 }
72 72
73 73 @pytest.mark.skip_backends('svn')
74 74 def test_global_settings_initial_values(self, autologin_user, backend):
75 75 repo_name = backend.repo_name
76 76 response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name))
77 77
78 78 expected_settings = (
79 79 'rhodecode_use_outdated_comments', 'rhodecode_pr_merge_enabled',
80 80 'hooks_changegroup_repo_size', 'hooks_changegroup_push_logger',
81 81 'hooks_outgoing_pull_logger'
82 82 )
83 83 for setting in expected_settings:
84 84 self.assert_repo_value_equals_global_value(response, setting)
85 85
86 86 def test_show_settings_requires_repo_admin_permission(
87 87 self, backend, user_util, settings_util):
88 88 repo = backend.create_repo()
89 89 repo_name = repo.repo_name
90 90 user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN)
91 91 user_util.grant_user_permission_to_repo(repo, user, 'repository.admin')
92 92 login_user_session(
93 93 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
94 94 self.app.get(route_path('edit_repo_vcs', repo_name=repo_name), status=200)
95 95
96 96 def test_inherit_global_settings_flag_is_true_by_default(
97 97 self, autologin_user, backend):
98 98 repo_name = backend.repo_name
99 99 response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name))
100 100
101 assert_response = AssertResponse(response)
101 assert_response = response.assert_response()
102 102 element = assert_response.get_element('#inherit_global_settings')
103 103 assert element.checked
104 104
105 105 @pytest.mark.parametrize('checked_value', [True, False])
106 106 def test_inherit_global_settings_value(
107 107 self, autologin_user, backend, checked_value, settings_util):
108 108 repo = backend.create_repo()
109 109 repo_name = repo.repo_name
110 110 settings_util.create_repo_rhodecode_setting(
111 111 repo, 'inherit_vcs_settings', checked_value, 'bool')
112 112 response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name))
113 113
114 assert_response = AssertResponse(response)
114 assert_response = response.assert_response()
115 115 element = assert_response.get_element('#inherit_global_settings')
116 116 assert element.checked == checked_value
117 117
118 118 @pytest.mark.skip_backends('svn')
119 119 def test_hooks_settings_are_created(
120 120 self, autologin_user, backend, csrf_token):
121 121 repo_name = backend.repo_name
122 122 data = self.FORM_DATA.copy()
123 123 data['csrf_token'] = csrf_token
124 124 self.app.post(
125 125 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
126 126 settings = SettingsModel(repo=repo_name)
127 127 try:
128 128 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
129 129 ui = settings.get_ui_by_section_and_key(section, key)
130 130 assert ui.ui_active is False
131 131 finally:
132 132 self._cleanup_repo_settings(settings)
133 133
134 134 def test_hooks_settings_are_not_created_for_svn(
135 135 self, autologin_user, backend_svn, csrf_token):
136 136 repo_name = backend_svn.repo_name
137 137 data = self.FORM_DATA.copy()
138 138 data['csrf_token'] = csrf_token
139 139 self.app.post(
140 140 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
141 141 settings = SettingsModel(repo=repo_name)
142 142 try:
143 143 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
144 144 ui = settings.get_ui_by_section_and_key(section, key)
145 145 assert ui is None
146 146 finally:
147 147 self._cleanup_repo_settings(settings)
148 148
149 149 @pytest.mark.skip_backends('svn')
150 150 def test_hooks_settings_are_updated(
151 151 self, autologin_user, backend, csrf_token):
152 152 repo_name = backend.repo_name
153 153 settings = SettingsModel(repo=repo_name)
154 154 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
155 155 settings.create_ui_section_value(section, '', key=key, active=True)
156 156
157 157 data = self.FORM_DATA.copy()
158 158 data['csrf_token'] = csrf_token
159 159 self.app.post(
160 160 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
161 161 try:
162 162 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
163 163 ui = settings.get_ui_by_section_and_key(section, key)
164 164 assert ui.ui_active is False
165 165 finally:
166 166 self._cleanup_repo_settings(settings)
167 167
168 168 def test_hooks_settings_are_not_updated_for_svn(
169 169 self, autologin_user, backend_svn, csrf_token):
170 170 repo_name = backend_svn.repo_name
171 171 settings = SettingsModel(repo=repo_name)
172 172 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
173 173 settings.create_ui_section_value(section, '', key=key, active=True)
174 174
175 175 data = self.FORM_DATA.copy()
176 176 data['csrf_token'] = csrf_token
177 177 self.app.post(
178 178 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
179 179 try:
180 180 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
181 181 ui = settings.get_ui_by_section_and_key(section, key)
182 182 assert ui.ui_active is True
183 183 finally:
184 184 self._cleanup_repo_settings(settings)
185 185
186 186 @pytest.mark.skip_backends('svn')
187 187 def test_pr_settings_are_created(
188 188 self, autologin_user, backend, csrf_token):
189 189 repo_name = backend.repo_name
190 190 data = self.FORM_DATA.copy()
191 191 data['csrf_token'] = csrf_token
192 192 self.app.post(
193 193 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
194 194 settings = SettingsModel(repo=repo_name)
195 195 try:
196 196 for name in VcsSettingsModel.GENERAL_SETTINGS:
197 197 setting = settings.get_setting_by_name(name)
198 198 assert setting.app_settings_value is False
199 199 finally:
200 200 self._cleanup_repo_settings(settings)
201 201
202 202 def test_pr_settings_are_not_created_for_svn(
203 203 self, autologin_user, backend_svn, csrf_token):
204 204 repo_name = backend_svn.repo_name
205 205 data = self.FORM_DATA.copy()
206 206 data['csrf_token'] = csrf_token
207 207 self.app.post(
208 208 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
209 209 settings = SettingsModel(repo=repo_name)
210 210 try:
211 211 for name in VcsSettingsModel.GENERAL_SETTINGS:
212 212 setting = settings.get_setting_by_name(name)
213 213 assert setting is None
214 214 finally:
215 215 self._cleanup_repo_settings(settings)
216 216
217 217 def test_pr_settings_creation_requires_repo_admin_permission(
218 218 self, backend, user_util, settings_util, csrf_token):
219 219 repo = backend.create_repo()
220 220 repo_name = repo.repo_name
221 221
222 222 logout_user_session(self.app, csrf_token)
223 223 session = login_user_session(
224 224 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
225 225 new_csrf_token = auth.get_csrf_token(session)
226 226
227 227 user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN)
228 228 repo = Repository.get_by_repo_name(repo_name)
229 229 user_util.grant_user_permission_to_repo(repo, user, 'repository.admin')
230 230 data = self.FORM_DATA.copy()
231 231 data['csrf_token'] = new_csrf_token
232 232 settings = SettingsModel(repo=repo_name)
233 233
234 234 try:
235 235 self.app.post(
236 236 route_path('edit_repo_vcs_update', repo_name=repo_name), data,
237 237 status=302)
238 238 finally:
239 239 self._cleanup_repo_settings(settings)
240 240
241 241 @pytest.mark.skip_backends('svn')
242 242 def test_pr_settings_are_updated(
243 243 self, autologin_user, backend, csrf_token):
244 244 repo_name = backend.repo_name
245 245 settings = SettingsModel(repo=repo_name)
246 246 for name in VcsSettingsModel.GENERAL_SETTINGS:
247 247 settings.create_or_update_setting(name, True, 'bool')
248 248
249 249 data = self.FORM_DATA.copy()
250 250 data['csrf_token'] = csrf_token
251 251 self.app.post(
252 252 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
253 253 try:
254 254 for name in VcsSettingsModel.GENERAL_SETTINGS:
255 255 setting = settings.get_setting_by_name(name)
256 256 assert setting.app_settings_value is False
257 257 finally:
258 258 self._cleanup_repo_settings(settings)
259 259
260 260 def test_pr_settings_are_not_updated_for_svn(
261 261 self, autologin_user, backend_svn, csrf_token):
262 262 repo_name = backend_svn.repo_name
263 263 settings = SettingsModel(repo=repo_name)
264 264 for name in VcsSettingsModel.GENERAL_SETTINGS:
265 265 settings.create_or_update_setting(name, True, 'bool')
266 266
267 267 data = self.FORM_DATA.copy()
268 268 data['csrf_token'] = csrf_token
269 269 self.app.post(
270 270 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
271 271 try:
272 272 for name in VcsSettingsModel.GENERAL_SETTINGS:
273 273 setting = settings.get_setting_by_name(name)
274 274 assert setting.app_settings_value is True
275 275 finally:
276 276 self._cleanup_repo_settings(settings)
277 277
278 278 def test_svn_settings_are_created(
279 279 self, autologin_user, backend_svn, csrf_token, settings_util):
280 280 repo_name = backend_svn.repo_name
281 281 data = self.FORM_DATA.copy()
282 282 data['new_svn_tag'] = 'svn-tag'
283 283 data['new_svn_branch'] = 'svn-branch'
284 284 data['csrf_token'] = csrf_token
285 285
286 286 # Create few global settings to make sure that uniqueness validators
287 287 # are not triggered
288 288 settings_util.create_rhodecode_ui(
289 289 VcsSettingsModel.SVN_BRANCH_SECTION, 'svn-branch')
290 290 settings_util.create_rhodecode_ui(
291 291 VcsSettingsModel.SVN_TAG_SECTION, 'svn-tag')
292 292
293 293 self.app.post(
294 294 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
295 295 settings = SettingsModel(repo=repo_name)
296 296 try:
297 297 svn_branches = settings.get_ui_by_section(
298 298 VcsSettingsModel.SVN_BRANCH_SECTION)
299 299 svn_branch_names = [b.ui_value for b in svn_branches]
300 300 svn_tags = settings.get_ui_by_section(
301 301 VcsSettingsModel.SVN_TAG_SECTION)
302 302 svn_tag_names = [b.ui_value for b in svn_tags]
303 303 assert 'svn-branch' in svn_branch_names
304 304 assert 'svn-tag' in svn_tag_names
305 305 finally:
306 306 self._cleanup_repo_settings(settings)
307 307
308 308 def test_svn_settings_are_unique(
309 309 self, autologin_user, backend_svn, csrf_token, settings_util):
310 310 repo = backend_svn.repo
311 311 repo_name = repo.repo_name
312 312 data = self.FORM_DATA.copy()
313 313 data['new_svn_tag'] = 'test_tag'
314 314 data['new_svn_branch'] = 'test_branch'
315 315 data['csrf_token'] = csrf_token
316 316 settings_util.create_repo_rhodecode_ui(
317 317 repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch')
318 318 settings_util.create_repo_rhodecode_ui(
319 319 repo, VcsSettingsModel.SVN_TAG_SECTION, 'test_tag')
320 320
321 321 response = self.app.post(
322 322 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=200)
323 323 response.mustcontain('Pattern already exists')
324 324
325 325 def test_svn_settings_with_empty_values_are_not_created(
326 326 self, autologin_user, backend_svn, csrf_token):
327 327 repo_name = backend_svn.repo_name
328 328 data = self.FORM_DATA.copy()
329 329 data['csrf_token'] = csrf_token
330 330 self.app.post(
331 331 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
332 332 settings = SettingsModel(repo=repo_name)
333 333 try:
334 334 svn_branches = settings.get_ui_by_section(
335 335 VcsSettingsModel.SVN_BRANCH_SECTION)
336 336 svn_tags = settings.get_ui_by_section(
337 337 VcsSettingsModel.SVN_TAG_SECTION)
338 338 assert len(svn_branches) == 0
339 339 assert len(svn_tags) == 0
340 340 finally:
341 341 self._cleanup_repo_settings(settings)
342 342
343 343 def test_svn_settings_are_shown_for_svn_repository(
344 344 self, autologin_user, backend_svn, csrf_token):
345 345 repo_name = backend_svn.repo_name
346 346 response = self.app.get(
347 347 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
348 348 response.mustcontain('Subversion Settings')
349 349
350 350 @pytest.mark.skip_backends('svn')
351 351 def test_svn_settings_are_not_created_for_not_svn_repository(
352 352 self, autologin_user, backend, csrf_token):
353 353 repo_name = backend.repo_name
354 354 data = self.FORM_DATA.copy()
355 355 data['csrf_token'] = csrf_token
356 356 self.app.post(
357 357 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
358 358 settings = SettingsModel(repo=repo_name)
359 359 try:
360 360 svn_branches = settings.get_ui_by_section(
361 361 VcsSettingsModel.SVN_BRANCH_SECTION)
362 362 svn_tags = settings.get_ui_by_section(
363 363 VcsSettingsModel.SVN_TAG_SECTION)
364 364 assert len(svn_branches) == 0
365 365 assert len(svn_tags) == 0
366 366 finally:
367 367 self._cleanup_repo_settings(settings)
368 368
369 369 @pytest.mark.skip_backends('svn')
370 370 def test_svn_settings_are_shown_only_for_svn_repository(
371 371 self, autologin_user, backend, csrf_token):
372 372 repo_name = backend.repo_name
373 373 response = self.app.get(
374 374 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
375 375 response.mustcontain(no='Subversion Settings')
376 376
377 377 def test_hg_settings_are_created(
378 378 self, autologin_user, backend_hg, csrf_token):
379 379 repo_name = backend_hg.repo_name
380 380 data = self.FORM_DATA.copy()
381 381 data['new_svn_tag'] = 'svn-tag'
382 382 data['new_svn_branch'] = 'svn-branch'
383 383 data['csrf_token'] = csrf_token
384 384 self.app.post(
385 385 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
386 386 settings = SettingsModel(repo=repo_name)
387 387 try:
388 388 largefiles_ui = settings.get_ui_by_section_and_key(
389 389 'extensions', 'largefiles')
390 390 assert largefiles_ui.ui_active is False
391 391 phases_ui = settings.get_ui_by_section_and_key(
392 392 'phases', 'publish')
393 393 assert str2bool(phases_ui.ui_value) is False
394 394 finally:
395 395 self._cleanup_repo_settings(settings)
396 396
397 397 def test_hg_settings_are_updated(
398 398 self, autologin_user, backend_hg, csrf_token):
399 399 repo_name = backend_hg.repo_name
400 400 settings = SettingsModel(repo=repo_name)
401 401 settings.create_ui_section_value(
402 402 'extensions', '', key='largefiles', active=True)
403 403 settings.create_ui_section_value(
404 404 'phases', '1', key='publish', active=True)
405 405
406 406 data = self.FORM_DATA.copy()
407 407 data['csrf_token'] = csrf_token
408 408 self.app.post(
409 409 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
410 410 try:
411 411 largefiles_ui = settings.get_ui_by_section_and_key(
412 412 'extensions', 'largefiles')
413 413 assert largefiles_ui.ui_active is False
414 414 phases_ui = settings.get_ui_by_section_and_key(
415 415 'phases', 'publish')
416 416 assert str2bool(phases_ui.ui_value) is False
417 417 finally:
418 418 self._cleanup_repo_settings(settings)
419 419
420 420 def test_hg_settings_are_shown_for_hg_repository(
421 421 self, autologin_user, backend_hg, csrf_token):
422 422 repo_name = backend_hg.repo_name
423 423 response = self.app.get(
424 424 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
425 425 response.mustcontain('Mercurial Settings')
426 426
427 427 @pytest.mark.skip_backends('hg')
428 428 def test_hg_settings_are_created_only_for_hg_repository(
429 429 self, autologin_user, backend, csrf_token):
430 430 repo_name = backend.repo_name
431 431 data = self.FORM_DATA.copy()
432 432 data['csrf_token'] = csrf_token
433 433 self.app.post(
434 434 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
435 435 settings = SettingsModel(repo=repo_name)
436 436 try:
437 437 largefiles_ui = settings.get_ui_by_section_and_key(
438 438 'extensions', 'largefiles')
439 439 assert largefiles_ui is None
440 440 phases_ui = settings.get_ui_by_section_and_key(
441 441 'phases', 'publish')
442 442 assert phases_ui is None
443 443 finally:
444 444 self._cleanup_repo_settings(settings)
445 445
446 446 @pytest.mark.skip_backends('hg')
447 447 def test_hg_settings_are_shown_only_for_hg_repository(
448 448 self, autologin_user, backend, csrf_token):
449 449 repo_name = backend.repo_name
450 450 response = self.app.get(
451 451 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
452 452 response.mustcontain(no='Mercurial Settings')
453 453
454 454 @pytest.mark.skip_backends('hg')
455 455 def test_hg_settings_are_updated_only_for_hg_repository(
456 456 self, autologin_user, backend, csrf_token):
457 457 repo_name = backend.repo_name
458 458 settings = SettingsModel(repo=repo_name)
459 459 settings.create_ui_section_value(
460 460 'extensions', '', key='largefiles', active=True)
461 461 settings.create_ui_section_value(
462 462 'phases', '1', key='publish', active=True)
463 463
464 464 data = self.FORM_DATA.copy()
465 465 data['csrf_token'] = csrf_token
466 466 self.app.post(
467 467 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
468 468 try:
469 469 largefiles_ui = settings.get_ui_by_section_and_key(
470 470 'extensions', 'largefiles')
471 471 assert largefiles_ui.ui_active is True
472 472 phases_ui = settings.get_ui_by_section_and_key(
473 473 'phases', 'publish')
474 474 assert phases_ui.ui_value == '1'
475 475 finally:
476 476 self._cleanup_repo_settings(settings)
477 477
478 478 def test_per_repo_svn_settings_are_displayed(
479 479 self, autologin_user, backend_svn, settings_util):
480 480 repo = backend_svn.create_repo()
481 481 repo_name = repo.repo_name
482 482 branches = [
483 483 settings_util.create_repo_rhodecode_ui(
484 484 repo, VcsSettingsModel.SVN_BRANCH_SECTION,
485 485 'branch_{}'.format(i))
486 486 for i in range(10)]
487 487 tags = [
488 488 settings_util.create_repo_rhodecode_ui(
489 489 repo, VcsSettingsModel.SVN_TAG_SECTION, 'tag_{}'.format(i))
490 490 for i in range(10)]
491 491
492 492 response = self.app.get(
493 493 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
494 assert_response = AssertResponse(response)
494 assert_response = response.assert_response()
495 495 for branch in branches:
496 496 css_selector = '[name=branch_value_{}]'.format(branch.ui_id)
497 497 element = assert_response.get_element(css_selector)
498 498 assert element.value == branch.ui_value
499 499 for tag in tags:
500 500 css_selector = '[name=tag_ui_value_new_{}]'.format(tag.ui_id)
501 501 element = assert_response.get_element(css_selector)
502 502 assert element.value == tag.ui_value
503 503
504 504 def test_per_repo_hg_and_pr_settings_are_not_displayed_for_svn(
505 505 self, autologin_user, backend_svn, settings_util):
506 506 repo = backend_svn.create_repo()
507 507 repo_name = repo.repo_name
508 508 response = self.app.get(
509 509 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
510 510 response.mustcontain(no='<label>Hooks:</label>')
511 511 response.mustcontain(no='<label>Pull Request Settings:</label>')
512 512
513 513 def test_inherit_global_settings_value_is_saved(
514 514 self, autologin_user, backend, csrf_token):
515 515 repo_name = backend.repo_name
516 516 data = self.FORM_DATA.copy()
517 517 data['csrf_token'] = csrf_token
518 518 data['inherit_global_settings'] = True
519 519 self.app.post(
520 520 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
521 521
522 522 settings = SettingsModel(repo=repo_name)
523 523 vcs_settings = VcsSettingsModel(repo=repo_name)
524 524 try:
525 525 assert vcs_settings.inherit_global_settings is True
526 526 finally:
527 527 self._cleanup_repo_settings(settings)
528 528
529 529 def test_repo_cache_is_invalidated_when_settings_are_updated(
530 530 self, autologin_user, backend, csrf_token):
531 531 repo_name = backend.repo_name
532 532 data = self.FORM_DATA.copy()
533 533 data['csrf_token'] = csrf_token
534 534 data['inherit_global_settings'] = True
535 535 settings = SettingsModel(repo=repo_name)
536 536
537 537 invalidation_patcher = mock.patch(
538 538 'rhodecode.model.scm.ScmModel.mark_for_invalidation')
539 539 with invalidation_patcher as invalidation_mock:
540 540 self.app.post(
541 541 route_path('edit_repo_vcs_update', repo_name=repo_name), data,
542 542 status=302)
543 543 try:
544 544 invalidation_mock.assert_called_once_with(repo_name, delete=True)
545 545 finally:
546 546 self._cleanup_repo_settings(settings)
547 547
548 548 def test_other_settings_not_saved_inherit_global_settings_is_true(
549 549 self, autologin_user, backend, csrf_token):
550 550 repo_name = backend.repo_name
551 551 data = self.FORM_DATA.copy()
552 552 data['csrf_token'] = csrf_token
553 553 data['inherit_global_settings'] = True
554 554 self.app.post(
555 555 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
556 556
557 557 settings = SettingsModel(repo=repo_name)
558 558 ui_settings = (
559 559 VcsSettingsModel.HOOKS_SETTINGS + VcsSettingsModel.HG_SETTINGS)
560 560
561 561 vcs_settings = []
562 562 try:
563 563 for section, key in ui_settings:
564 564 ui = settings.get_ui_by_section_and_key(section, key)
565 565 if ui:
566 566 vcs_settings.append(ui)
567 567 vcs_settings.extend(settings.get_ui_by_section(
568 568 VcsSettingsModel.SVN_BRANCH_SECTION))
569 569 vcs_settings.extend(settings.get_ui_by_section(
570 570 VcsSettingsModel.SVN_TAG_SECTION))
571 571 for name in VcsSettingsModel.GENERAL_SETTINGS:
572 572 setting = settings.get_setting_by_name(name)
573 573 if setting:
574 574 vcs_settings.append(setting)
575 575 assert vcs_settings == []
576 576 finally:
577 577 self._cleanup_repo_settings(settings)
578 578
579 579 def test_delete_svn_branch_and_tag_patterns(
580 580 self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header):
581 581 repo = backend_svn.create_repo()
582 582 repo_name = repo.repo_name
583 583 branch = settings_util.create_repo_rhodecode_ui(
584 584 repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch',
585 585 cleanup=False)
586 586 tag = settings_util.create_repo_rhodecode_ui(
587 587 repo, VcsSettingsModel.SVN_TAG_SECTION, 'test_tag', cleanup=False)
588 588 data = {
589 589 'csrf_token': csrf_token
590 590 }
591 591 for id_ in (branch.ui_id, tag.ui_id):
592 592 data['delete_svn_pattern'] = id_,
593 593 self.app.post(
594 594 route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name),
595 595 data, extra_environ=xhr_header, status=200)
596 596 settings = VcsSettingsModel(repo=repo_name)
597 597 assert settings.get_repo_svn_branch_patterns() == []
598 598
599 599 def test_delete_svn_branch_requires_repo_admin_permission(
600 600 self, backend_svn, user_util, settings_util, csrf_token, xhr_header):
601 601 repo = backend_svn.create_repo()
602 602 repo_name = repo.repo_name
603 603
604 604 logout_user_session(self.app, csrf_token)
605 605 session = login_user_session(
606 606 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
607 607 csrf_token = auth.get_csrf_token(session)
608 608
609 609 repo = Repository.get_by_repo_name(repo_name)
610 610 user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN)
611 611 user_util.grant_user_permission_to_repo(repo, user, 'repository.admin')
612 612 branch = settings_util.create_repo_rhodecode_ui(
613 613 repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch',
614 614 cleanup=False)
615 615 data = {
616 616 'csrf_token': csrf_token,
617 617 'delete_svn_pattern': branch.ui_id
618 618 }
619 619 self.app.post(
620 620 route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name),
621 621 data, extra_environ=xhr_header, status=200)
622 622
623 623 def test_delete_svn_branch_raises_400_when_not_found(
624 624 self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header):
625 625 repo_name = backend_svn.repo_name
626 626 data = {
627 627 'delete_svn_pattern': 123,
628 628 'csrf_token': csrf_token
629 629 }
630 630 self.app.post(
631 631 route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name),
632 632 data, extra_environ=xhr_header, status=400)
633 633
634 634 def test_delete_svn_branch_raises_400_when_no_id_specified(
635 635 self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header):
636 636 repo_name = backend_svn.repo_name
637 637 data = {
638 638 'csrf_token': csrf_token
639 639 }
640 640 self.app.post(
641 641 route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name),
642 642 data, extra_environ=xhr_header, status=400)
643 643
644 644 def _cleanup_repo_settings(self, settings_model):
645 645 cleanup = []
646 646 ui_settings = (
647 647 VcsSettingsModel.HOOKS_SETTINGS + VcsSettingsModel.HG_SETTINGS)
648 648
649 649 for section, key in ui_settings:
650 650 ui = settings_model.get_ui_by_section_and_key(section, key)
651 651 if ui:
652 652 cleanup.append(ui)
653 653
654 654 cleanup.extend(settings_model.get_ui_by_section(
655 655 VcsSettingsModel.INHERIT_SETTINGS))
656 656 cleanup.extend(settings_model.get_ui_by_section(
657 657 VcsSettingsModel.SVN_BRANCH_SECTION))
658 658 cleanup.extend(settings_model.get_ui_by_section(
659 659 VcsSettingsModel.SVN_TAG_SECTION))
660 660
661 661 for name in VcsSettingsModel.GENERAL_SETTINGS:
662 662 setting = settings_model.get_setting_by_name(name)
663 663 if setting:
664 664 cleanup.append(setting)
665 665
666 666 for object_ in cleanup:
667 667 Session().delete(object_)
668 668 Session().commit()
669 669
670 670 def assert_repo_value_equals_global_value(self, response, setting):
671 assert_response = AssertResponse(response)
671 assert_response = response.assert_response()
672 672 global_css_selector = '[name={}_inherited]'.format(setting)
673 673 repo_css_selector = '[name={}]'.format(setting)
674 674 repo_element = assert_response.get_element(repo_css_selector)
675 675 global_element = assert_response.get_element(global_css_selector)
676 676 assert repo_element.value == global_element.value
677 677
678 678
679 679 def _get_permission_for_user(user, repo):
680 680 perm = UserRepoToPerm.query()\
681 681 .filter(UserRepoToPerm.repository ==
682 682 Repository.get_by_repo_name(repo))\
683 683 .filter(UserRepoToPerm.user == User.get_by_username(user))\
684 684 .all()
685 685 return perm
@@ -1,104 +1,104 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import mock
22 22 import pytest
23 23
24 24 import rhodecode
25 25 from rhodecode.model.db import Repository
26 26 from rhodecode.model.settings import SettingsModel
27 27 from rhodecode.tests.utils import AssertResponse
28 28
29 29
30 30 def route_path(name, params=None, **kwargs):
31 31 import urllib
32 32
33 33 base_url = {
34 34 'edit_repo': '/{repo_name}/settings',
35 35 'edit_repo_vcs': '/{repo_name}/settings/vcs',
36 36 'edit_repo_vcs_update': '/{repo_name}/settings/vcs/update',
37 37 }[name].format(**kwargs)
38 38
39 39 if params:
40 40 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
41 41 return base_url
42 42
43 43
44 44 @pytest.mark.usefixtures('autologin_user', 'app')
45 45 class TestAdminRepoVcsSettings(object):
46 46
47 47 @pytest.mark.parametrize('setting_name, setting_backends', [
48 48 ('hg_use_rebase_for_merging', ['hg']),
49 49 ])
50 50 def test_labs_settings_visible_if_enabled(
51 51 self, setting_name, setting_backends, backend):
52 52 if backend.alias not in setting_backends:
53 53 pytest.skip('Setting not available for backend {}'.format(backend))
54 54
55 55 vcs_settings_url = route_path(
56 56 'edit_repo_vcs', repo_name=backend.repo.repo_name)
57 57
58 58 with mock.patch.dict(
59 59 rhodecode.CONFIG, {'labs_settings_active': 'true'}):
60 60 response = self.app.get(vcs_settings_url)
61 61
62 assertr = AssertResponse(response)
62 assertr = response.assert_response()
63 63 assertr.one_element_exists('#rhodecode_{}'.format(setting_name))
64 64
65 65 @pytest.mark.parametrize('setting_name, setting_backends', [
66 66 ('hg_use_rebase_for_merging', ['hg']),
67 67 ])
68 68 def test_update_boolean_settings(
69 69 self, csrf_token, setting_name, setting_backends, backend):
70 70 if backend.alias not in setting_backends:
71 71 pytest.skip('Setting not available for backend {}'.format(backend))
72 72
73 73 repo = backend.create_repo()
74 74 repo_name = repo.repo_name
75 75
76 76 settings_model = SettingsModel(repo=repo)
77 77 vcs_settings_url = route_path(
78 78 'edit_repo_vcs_update', repo_name=repo_name)
79 79
80 80 self.app.post(
81 81 vcs_settings_url,
82 82 params={
83 83 'inherit_global_settings': False,
84 84 'new_svn_branch': 'dummy-value-for-testing',
85 85 'new_svn_tag': 'dummy-value-for-testing',
86 86 'rhodecode_{}'.format(setting_name): 'true',
87 87 'csrf_token': csrf_token,
88 88 })
89 89 settings_model = SettingsModel(repo=Repository.get_by_repo_name(repo_name))
90 90 setting = settings_model.get_setting_by_name(setting_name)
91 91 assert setting.app_settings_value
92 92
93 93 self.app.post(
94 94 vcs_settings_url,
95 95 params={
96 96 'inherit_global_settings': False,
97 97 'new_svn_branch': 'dummy-value-for-testing',
98 98 'new_svn_tag': 'dummy-value-for-testing',
99 99 'rhodecode_{}'.format(setting_name): 'false',
100 100 'csrf_token': csrf_token,
101 101 })
102 102 settings_model = SettingsModel(repo=Repository.get_by_repo_name(repo_name))
103 103 setting = settings_model.get_setting_by_name(setting_name)
104 104 assert not setting.app_settings_value
@@ -1,202 +1,202 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import os
22 22
23 23 import mock
24 24 import pytest
25 25 from whoosh import query
26 26
27 27 from rhodecode.tests import (
28 28 TestController, HG_REPO,
29 29 TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
30 30 from rhodecode.tests.utils import AssertResponse
31 31
32 32
33 33 def route_path(name, **kwargs):
34 34 from rhodecode.apps._base import ADMIN_PREFIX
35 35 return {
36 36 'search':
37 37 ADMIN_PREFIX + '/search',
38 38 'search_repo':
39 39 '/{repo_name}/search',
40 40
41 41 }[name].format(**kwargs)
42 42
43 43
44 44 class TestSearchController(TestController):
45 45
46 46 def test_index(self):
47 47 self.log_user()
48 48 response = self.app.get(route_path('search'))
49 assert_response = AssertResponse(response)
49 assert_response = response.assert_response()
50 50 assert_response.one_element_exists('input#q')
51 51
52 52 def test_search_files_empty_search(self):
53 53 if os.path.isdir(self.index_location):
54 54 pytest.skip('skipped due to existing index')
55 55 else:
56 56 self.log_user()
57 57 response = self.app.get(route_path('search'),
58 58 {'q': HG_REPO})
59 59 response.mustcontain('There is no index to search in. '
60 60 'Please run whoosh indexer')
61 61
62 62 def test_search_validation(self):
63 63 self.log_user()
64 64 response = self.app.get(route_path('search'),
65 65 {'q': query, 'type': 'content', 'page_limit': 1000})
66 66
67 67 response.mustcontain(
68 68 'page_limit - 1000 is greater than maximum value 500')
69 69
70 70 @pytest.mark.parametrize("query, expected_hits, expected_paths", [
71 71 ('todo', 23, [
72 72 'vcs/backends/hg/inmemory.py',
73 73 'vcs/tests/test_git.py']),
74 74 ('extension:rst installation', 6, [
75 75 'docs/index.rst',
76 76 'docs/installation.rst']),
77 77 ('def repo', 87, [
78 78 'vcs/tests/test_git.py',
79 79 'vcs/tests/test_changesets.py']),
80 80 ('repository:%s def test' % HG_REPO, 18, [
81 81 'vcs/tests/test_git.py',
82 82 'vcs/tests/test_changesets.py']),
83 83 ('"def main"', 9, [
84 84 'vcs/__init__.py',
85 85 'vcs/tests/__init__.py',
86 86 'vcs/utils/progressbar.py']),
87 87 ('owner:test_admin', 358, [
88 88 'vcs/tests/base.py',
89 89 'MANIFEST.in',
90 90 'vcs/utils/termcolors.py',
91 91 'docs/theme/ADC/static/documentation.png']),
92 92 ('owner:test_admin def main', 72, [
93 93 'vcs/__init__.py',
94 94 'vcs/tests/test_utils_filesize.py',
95 95 'vcs/tests/test_cli.py']),
96 96 ('owner:michał test', 0, []),
97 97 ])
98 98 def test_search_files(self, query, expected_hits, expected_paths):
99 99 self.log_user()
100 100 response = self.app.get(route_path('search'),
101 101 {'q': query, 'type': 'content', 'page_limit': 500})
102 102
103 103 response.mustcontain('%s results' % expected_hits)
104 104 for path in expected_paths:
105 105 response.mustcontain(path)
106 106
107 107 @pytest.mark.parametrize("query, expected_hits, expected_commits", [
108 108 ('bother to ask where to fetch repo during tests', 3, [
109 109 ('hg', 'a00c1b6f5d7a6ae678fd553a8b81d92367f7ecf1'),
110 110 ('git', 'c6eb379775c578a95dad8ddab53f963b80894850'),
111 111 ('svn', '98')]),
112 112 ('michał', 0, []),
113 113 ('changed:tests/utils.py', 36, [
114 114 ('hg', 'a00c1b6f5d7a6ae678fd553a8b81d92367f7ecf1')]),
115 115 ('changed:vcs/utils/archivers.py', 11, [
116 116 ('hg', '25213a5fbb048dff8ba65d21e466a835536e5b70'),
117 117 ('hg', '47aedd538bf616eedcb0e7d630ea476df0e159c7'),
118 118 ('hg', 'f5d23247fad4856a1dabd5838afade1e0eed24fb'),
119 119 ('hg', '04ad456aefd6461aea24f90b63954b6b1ce07b3e'),
120 120 ('git', 'c994f0de03b2a0aa848a04fc2c0d7e737dba31fc'),
121 121 ('git', 'd1f898326327e20524fe22417c22d71064fe54a1'),
122 122 ('git', 'fe568b4081755c12abf6ba673ba777fc02a415f3'),
123 123 ('git', 'bafe786f0d8c2ff7da5c1dcfcfa577de0b5e92f1')]),
124 124 ('added:README.rst', 3, [
125 125 ('hg', '3803844fdbd3b711175fc3da9bdacfcd6d29a6fb'),
126 126 ('git', 'ff7ca51e58c505fec0dd2491de52c622bb7a806b'),
127 127 ('svn', '8')]),
128 128 ('changed:lazy.py', 15, [
129 129 ('hg', 'eaa291c5e6ae6126a203059de9854ccf7b5baa12'),
130 130 ('git', '17438a11f72b93f56d0e08e7d1fa79a378578a82'),
131 131 ('svn', '82'),
132 132 ('svn', '262'),
133 133 ('hg', 'f5d23247fad4856a1dabd5838afade1e0eed24fb'),
134 134 ('git', '33fa3223355104431402a888fa77a4e9956feb3e')
135 135 ]),
136 136 ('author:marcin@python-blog.com '
137 137 'commit_id:b986218ba1c9b0d6a259fac9b050b1724ed8e545', 1, [
138 138 ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]),
139 139 ('b986218ba1c9b0d6a259fac9b050b1724ed8e545', 1, [
140 140 ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]),
141 141 ('b986218b', 1, [
142 142 ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]),
143 143 ])
144 144 def test_search_commit_messages(
145 145 self, query, expected_hits, expected_commits, enabled_backends):
146 146 self.log_user()
147 147 response = self.app.get(route_path('search'),
148 148 {'q': query, 'type': 'commit', 'page_limit': 500})
149 149
150 150 response.mustcontain('%s results' % expected_hits)
151 151 for backend, commit_id in expected_commits:
152 152 if backend in enabled_backends:
153 153 response.mustcontain(commit_id)
154 154
155 155 @pytest.mark.parametrize("query, expected_hits, expected_paths", [
156 156 ('readme.rst', 3, []),
157 157 ('test*', 75, []),
158 158 ('*model*', 1, []),
159 159 ('extension:rst', 48, []),
160 160 ('extension:rst api', 24, []),
161 161 ])
162 162 def test_search_file_paths(self, query, expected_hits, expected_paths):
163 163 self.log_user()
164 164 response = self.app.get(route_path('search'),
165 165 {'q': query, 'type': 'path', 'page_limit': 500})
166 166
167 167 response.mustcontain('%s results' % expected_hits)
168 168 for path in expected_paths:
169 169 response.mustcontain(path)
170 170
171 171 def test_search_commit_message_specific_repo(self, backend):
172 172 self.log_user()
173 173 response = self.app.get(
174 174 route_path('search_repo',repo_name=backend.repo_name),
175 175 {'q': 'bother to ask where to fetch repo during tests',
176 176 'type': 'commit'})
177 177
178 178 response.mustcontain('1 results')
179 179
180 180 def test_filters_are_not_applied_for_admin_user(self):
181 181 self.log_user()
182 182 with mock.patch('whoosh.searching.Searcher.search') as search_mock:
183 183 self.app.get(route_path('search'),
184 184 {'q': 'test query', 'type': 'commit'})
185 185 assert search_mock.call_count == 1
186 186 _, kwargs = search_mock.call_args
187 187 assert kwargs['filter'] is None
188 188
189 189 def test_filters_are_applied_for_normal_user(self, enabled_backends):
190 190 self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
191 191 with mock.patch('whoosh.searching.Searcher.search') as search_mock:
192 192 self.app.get(route_path('search'),
193 193 {'q': 'test query', 'type': 'commit'})
194 194 assert search_mock.call_count == 1
195 195 _, kwargs = search_mock.call_args
196 196 assert isinstance(kwargs['filter'], query.Or)
197 197 expected_repositories = [
198 198 'vcs_test_{}'.format(b) for b in enabled_backends]
199 199 queried_repositories = [
200 200 name for type_, name in kwargs['filter'].all_terms()]
201 201 for repository in expected_repositories:
202 202 assert repository in queried_repositories
@@ -1,75 +1,75 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import pytest
22 22
23 23 from rhodecode.model.db import User
24 24 from rhodecode.tests import (
25 25 TestController, TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS,
26 26 TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
27 27 from rhodecode.tests.fixture import Fixture
28 28 from rhodecode.tests.utils import AssertResponse
29 29
30 30 fixture = Fixture()
31 31
32 32
33 33 def route_path(name, **kwargs):
34 34 return '/_profiles/{username}'.format(**kwargs)
35 35
36 36
37 37 class TestUsersController(TestController):
38 38
39 39 def test_user_profile(self, user_util):
40 40 edit_link_css = '.user-profile .panel-edit'
41 41 self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
42 42 user = user_util.create_user(
43 43 'test-my-user', password='qweqwe', email='testme@rhodecode.org')
44 44 username = user.username
45 45
46 46 response = self.app.get(route_path('user_profile', username=username))
47 47 response.mustcontain('testme')
48 48 response.mustcontain('testme@rhodecode.org')
49 assert_response = AssertResponse(response)
49 assert_response = response.assert_response()
50 50 assert_response.no_element_exists(edit_link_css)
51 51
52 52 # edit should be available to superadmin users
53 53 self.logout_user()
54 54 self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS)
55 55 response = self.app.get(route_path('user_profile', username=username))
56 assert_response = AssertResponse(response)
56 assert_response = response.assert_response()
57 57 assert_response.element_contains(edit_link_css, 'Edit')
58 58
59 59 def test_user_profile_not_available(self, user_util):
60 60 user = user_util.create_user()
61 61 username = user.username
62 62
63 63 # not logged in, redirect
64 64 self.app.get(route_path('user_profile', username=username), status=302)
65 65
66 66 self.log_user()
67 67 # after log-in show
68 68 self.app.get(route_path('user_profile', username=username), status=200)
69 69
70 70 # default user, not allowed to show it
71 71 self.app.get(
72 72 route_path('user_profile', username=User.DEFAULT_USER), status=404)
73 73
74 74 # actual 404
75 75 self.app.get(route_path('user_profile', username='unknown'), status=404)
1 NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
@@ -1,946 +1,945 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 """
22 22 users model for RhodeCode
23 23 """
24 24
25 25 import logging
26 26 import traceback
27 27 import datetime
28 28 import ipaddress
29 29
30 30 from pyramid.threadlocal import get_current_request
31 31 from sqlalchemy.exc import DatabaseError
32 32
33 33 from rhodecode import events
34 34 from rhodecode.lib.user_log_filter import user_log_filter
35 35 from rhodecode.lib.utils2 import (
36 36 safe_unicode, get_current_rhodecode_user, action_logger_generic,
37 37 AttributeDict, str2bool)
38 38 from rhodecode.lib.exceptions import (
39 39 DefaultUserException, UserOwnsReposException, UserOwnsRepoGroupsException,
40 40 UserOwnsUserGroupsException, NotAllowedToCreateUserError)
41 41 from rhodecode.lib.caching_query import FromCache
42 42 from rhodecode.model import BaseModel
43 43 from rhodecode.model.auth_token import AuthTokenModel
44 44 from rhodecode.model.db import (
45 45 _hash_key, true, false, or_, joinedload, User, UserToPerm,
46 46 UserEmailMap, UserIpMap, UserLog)
47 47 from rhodecode.model.meta import Session
48 48 from rhodecode.model.repo_group import RepoGroupModel
49 49
50 50
51 51 log = logging.getLogger(__name__)
52 52
53 53
54 54 class UserModel(BaseModel):
55 55 cls = User
56 56
57 57 def get(self, user_id, cache=False):
58 58 user = self.sa.query(User)
59 59 if cache:
60 60 user = user.options(
61 61 FromCache("sql_cache_short", "get_user_%s" % user_id))
62 62 return user.get(user_id)
63 63
64 64 def get_user(self, user):
65 65 return self._get_user(user)
66 66
67 67 def _serialize_user(self, user):
68 68 import rhodecode.lib.helpers as h
69 69
70 70 return {
71 71 'id': user.user_id,
72 72 'first_name': user.first_name,
73 73 'last_name': user.last_name,
74 74 'username': user.username,
75 75 'email': user.email,
76 76 'icon_link': h.gravatar_url(user.email, 30),
77 77 'profile_link': h.link_to_user(user),
78 78 'value_display': h.escape(h.person(user)),
79 79 'value': user.username,
80 80 'value_type': 'user',
81 81 'active': user.active,
82 82 }
83 83
84 84 def get_users(self, name_contains=None, limit=20, only_active=True):
85 85
86 86 query = self.sa.query(User)
87 87 if only_active:
88 88 query = query.filter(User.active == true())
89 89
90 90 if name_contains:
91 91 ilike_expression = u'%{}%'.format(safe_unicode(name_contains))
92 92 query = query.filter(
93 93 or_(
94 94 User.name.ilike(ilike_expression),
95 95 User.lastname.ilike(ilike_expression),
96 96 User.username.ilike(ilike_expression)
97 97 )
98 98 )
99 99 query = query.limit(limit)
100 100 users = query.all()
101 101
102 102 _users = [
103 103 self._serialize_user(user) for user in users
104 104 ]
105 105 return _users
106 106
107 107 def get_by_username(self, username, cache=False, case_insensitive=False):
108 108
109 109 if case_insensitive:
110 110 user = self.sa.query(User).filter(User.username.ilike(username))
111 111 else:
112 112 user = self.sa.query(User)\
113 113 .filter(User.username == username)
114 114 if cache:
115 115 name_key = _hash_key(username)
116 116 user = user.options(
117 117 FromCache("sql_cache_short", "get_user_%s" % name_key))
118 118 return user.scalar()
119 119
120 120 def get_by_email(self, email, cache=False, case_insensitive=False):
121 121 return User.get_by_email(email, case_insensitive, cache)
122 122
123 123 def get_by_auth_token(self, auth_token, cache=False):
124 124 return User.get_by_auth_token(auth_token, cache)
125 125
126 126 def get_active_user_count(self, cache=False):
127 127 qry = User.query().filter(
128 128 User.active == true()).filter(
129 129 User.username != User.DEFAULT_USER)
130 130 if cache:
131 131 qry = qry.options(
132 132 FromCache("sql_cache_short", "get_active_users"))
133 133 return qry.count()
134 134
135 135 def create(self, form_data, cur_user=None):
136 136 if not cur_user:
137 137 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
138 138
139 139 user_data = {
140 140 'username': form_data['username'],
141 141 'password': form_data['password'],
142 142 'email': form_data['email'],
143 143 'firstname': form_data['firstname'],
144 144 'lastname': form_data['lastname'],
145 145 'active': form_data['active'],
146 146 'extern_type': form_data['extern_type'],
147 147 'extern_name': form_data['extern_name'],
148 148 'admin': False,
149 149 'cur_user': cur_user
150 150 }
151 151
152 152 if 'create_repo_group' in form_data:
153 153 user_data['create_repo_group'] = str2bool(
154 154 form_data.get('create_repo_group'))
155 155
156 156 try:
157 157 if form_data.get('password_change'):
158 158 user_data['force_password_change'] = True
159 159 return UserModel().create_or_update(**user_data)
160 160 except Exception:
161 161 log.error(traceback.format_exc())
162 162 raise
163 163
164 164 def update_user(self, user, skip_attrs=None, **kwargs):
165 165 from rhodecode.lib.auth import get_crypt_password
166 166
167 167 user = self._get_user(user)
168 168 if user.username == User.DEFAULT_USER:
169 169 raise DefaultUserException(
170 170 "You can't edit this user (`%(username)s`) since it's "
171 171 "crucial for entire application" % {
172 172 'username': user.username})
173 173
174 174 # first store only defaults
175 175 user_attrs = {
176 176 'updating_user_id': user.user_id,
177 177 'username': user.username,
178 178 'password': user.password,
179 179 'email': user.email,
180 180 'firstname': user.name,
181 181 'lastname': user.lastname,
182 182 'active': user.active,
183 183 'admin': user.admin,
184 184 'extern_name': user.extern_name,
185 185 'extern_type': user.extern_type,
186 186 'language': user.user_data.get('language')
187 187 }
188 188
189 189 # in case there's new_password, that comes from form, use it to
190 190 # store password
191 191 if kwargs.get('new_password'):
192 192 kwargs['password'] = kwargs['new_password']
193 193
194 194 # cleanups, my_account password change form
195 195 kwargs.pop('current_password', None)
196 196 kwargs.pop('new_password', None)
197 197
198 198 # cleanups, user edit password change form
199 199 kwargs.pop('password_confirmation', None)
200 200 kwargs.pop('password_change', None)
201 201
202 202 # create repo group on user creation
203 203 kwargs.pop('create_repo_group', None)
204 204
205 205 # legacy forms send name, which is the firstname
206 206 firstname = kwargs.pop('name', None)
207 207 if firstname:
208 208 kwargs['firstname'] = firstname
209 209
210 210 for k, v in kwargs.items():
211 211 # skip if we don't want to update this
212 212 if skip_attrs and k in skip_attrs:
213 213 continue
214 214
215 215 user_attrs[k] = v
216 216
217 217 try:
218 218 return self.create_or_update(**user_attrs)
219 219 except Exception:
220 220 log.error(traceback.format_exc())
221 221 raise
222 222
223 223 def create_or_update(
224 224 self, username, password, email, firstname='', lastname='',
225 225 active=True, admin=False, extern_type=None, extern_name=None,
226 226 cur_user=None, plugin=None, force_password_change=False,
227 227 allow_to_create_user=True, create_repo_group=None,
228 228 updating_user_id=None, language=None, strict_creation_check=True):
229 229 """
230 230 Creates a new instance if not found, or updates current one
231 231
232 232 :param username:
233 233 :param password:
234 234 :param email:
235 235 :param firstname:
236 236 :param lastname:
237 237 :param active:
238 238 :param admin:
239 239 :param extern_type:
240 240 :param extern_name:
241 241 :param cur_user:
242 242 :param plugin: optional plugin this method was called from
243 243 :param force_password_change: toggles new or existing user flag
244 244 for password change
245 245 :param allow_to_create_user: Defines if the method can actually create
246 246 new users
247 247 :param create_repo_group: Defines if the method should also
248 248 create an repo group with user name, and owner
249 249 :param updating_user_id: if we set it up this is the user we want to
250 250 update this allows to editing username.
251 251 :param language: language of user from interface.
252 252
253 253 :returns: new User object with injected `is_new_user` attribute.
254 254 """
255 255
256 256 if not cur_user:
257 257 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
258 258
259 259 from rhodecode.lib.auth import (
260 260 get_crypt_password, check_password, generate_auth_token)
261 261 from rhodecode.lib.hooks_base import (
262 262 log_create_user, check_allowed_create_user)
263 263
264 264 def _password_change(new_user, password):
265 265 old_password = new_user.password or ''
266 266 # empty password
267 267 if not old_password:
268 268 return False
269 269
270 270 # password check is only needed for RhodeCode internal auth calls
271 271 # in case it's a plugin we don't care
272 272 if not plugin:
273 273
274 274 # first check if we gave crypted password back, and if it
275 275 # matches it's not password change
276 276 if new_user.password == password:
277 277 return False
278 278
279 279 password_match = check_password(password, old_password)
280 280 if not password_match:
281 281 return True
282 282
283 283 return False
284 284
285 285 # read settings on default personal repo group creation
286 286 if create_repo_group is None:
287 287 default_create_repo_group = RepoGroupModel()\
288 288 .get_default_create_personal_repo_group()
289 289 create_repo_group = default_create_repo_group
290 290
291 291 user_data = {
292 292 'username': username,
293 293 'password': password,
294 294 'email': email,
295 295 'firstname': firstname,
296 296 'lastname': lastname,
297 297 'active': active,
298 298 'admin': admin
299 299 }
300 300
301 301 if updating_user_id:
302 302 log.debug('Checking for existing account in RhodeCode '
303 303 'database with user_id `%s` ', updating_user_id)
304 304 user = User.get(updating_user_id)
305 305 else:
306 306 log.debug('Checking for existing account in RhodeCode '
307 307 'database with username `%s` ', username)
308 308 user = User.get_by_username(username, case_insensitive=True)
309 309
310 310 if user is None:
311 311 # we check internal flag if this method is actually allowed to
312 312 # create new user
313 313 if not allow_to_create_user:
314 314 msg = ('Method wants to create new user, but it is not '
315 315 'allowed to do so')
316 316 log.warning(msg)
317 317 raise NotAllowedToCreateUserError(msg)
318 318
319 319 log.debug('Creating new user %s', username)
320 320
321 321 # only if we create user that is active
322 322 new_active_user = active
323 323 if new_active_user and strict_creation_check:
324 324 # raises UserCreationError if it's not allowed for any reason to
325 325 # create new active user, this also executes pre-create hooks
326 326 check_allowed_create_user(user_data, cur_user, strict_check=True)
327 327 events.trigger(events.UserPreCreate(user_data))
328 328 new_user = User()
329 329 edit = False
330 330 else:
331 331 log.debug('updating user `%s`', username)
332 332 events.trigger(events.UserPreUpdate(user, user_data))
333 333 new_user = user
334 334 edit = True
335 335
336 336 # we're not allowed to edit default user
337 337 if user.username == User.DEFAULT_USER:
338 338 raise DefaultUserException(
339 339 "You can't edit this user (`%(username)s`) since it's "
340 340 "crucial for entire application"
341 341 % {'username': user.username})
342 342
343 343 # inject special attribute that will tell us if User is new or old
344 344 new_user.is_new_user = not edit
345 345 # for users that didn's specify auth type, we use RhodeCode built in
346 346 from rhodecode.authentication.plugins import auth_rhodecode
347 347 extern_name = extern_name or auth_rhodecode.RhodeCodeAuthPlugin.uid
348 348 extern_type = extern_type or auth_rhodecode.RhodeCodeAuthPlugin.uid
349 349
350 350 try:
351 351 new_user.username = username
352 352 new_user.admin = admin
353 353 new_user.email = email
354 354 new_user.active = active
355 355 new_user.extern_name = safe_unicode(extern_name)
356 356 new_user.extern_type = safe_unicode(extern_type)
357 357 new_user.name = firstname
358 358 new_user.lastname = lastname
359 359
360 360 # set password only if creating an user or password is changed
361 361 if not edit or _password_change(new_user, password):
362 362 reason = 'new password' if edit else 'new user'
363 363 log.debug('Updating password reason=>%s', reason)
364 364 new_user.password = get_crypt_password(password) if password else None
365 365
366 366 if force_password_change:
367 367 new_user.update_userdata(force_password_change=True)
368 368 if language:
369 369 new_user.update_userdata(language=language)
370 370 new_user.update_userdata(notification_status=True)
371 371
372 372 self.sa.add(new_user)
373 373
374 374 if not edit and create_repo_group:
375 375 RepoGroupModel().create_personal_repo_group(
376 376 new_user, commit_early=False)
377 377
378 378 if not edit:
379 379 # add the RSS token
380 380 self.add_auth_token(
381 381 user=username, lifetime_minutes=-1,
382 382 role=self.auth_token_role.ROLE_FEED,
383 383 description=u'Generated feed token')
384 384
385 385 kwargs = new_user.get_dict()
386 386 # backward compat, require api_keys present
387 387 kwargs['api_keys'] = kwargs['auth_tokens']
388 388 log_create_user(created_by=cur_user, **kwargs)
389 389 events.trigger(events.UserPostCreate(user_data))
390 390 return new_user
391 391 except (DatabaseError,):
392 392 log.error(traceback.format_exc())
393 393 raise
394 394
395 395 def create_registration(self, form_data,
396 396 extern_name='rhodecode', extern_type='rhodecode'):
397 397 from rhodecode.model.notification import NotificationModel
398 398 from rhodecode.model.notification import EmailNotificationModel
399 399
400 400 try:
401 401 form_data['admin'] = False
402 402 form_data['extern_name'] = extern_name
403 403 form_data['extern_type'] = extern_type
404 404 new_user = self.create(form_data)
405 405
406 406 self.sa.add(new_user)
407 407 self.sa.flush()
408 408
409 409 user_data = new_user.get_dict()
410 410 kwargs = {
411 411 # use SQLALCHEMY safe dump of user data
412 412 'user': AttributeDict(user_data),
413 413 'date': datetime.datetime.now()
414 414 }
415 415 notification_type = EmailNotificationModel.TYPE_REGISTRATION
416 416 # pre-generate the subject for notification itself
417 417 (subject,
418 418 _h, _e, # we don't care about those
419 419 body_plaintext) = EmailNotificationModel().render_email(
420 420 notification_type, **kwargs)
421 421
422 422 # create notification objects, and emails
423 423 NotificationModel().create(
424 424 created_by=new_user,
425 425 notification_subject=subject,
426 426 notification_body=body_plaintext,
427 427 notification_type=notification_type,
428 428 recipients=None, # all admins
429 429 email_kwargs=kwargs,
430 430 )
431 431
432 432 return new_user
433 433 except Exception:
434 434 log.error(traceback.format_exc())
435 435 raise
436 436
437 437 def _handle_user_repos(self, username, repositories, handle_mode=None):
438 438 _superadmin = self.cls.get_first_super_admin()
439 439 left_overs = True
440 440
441 441 from rhodecode.model.repo import RepoModel
442 442
443 443 if handle_mode == 'detach':
444 444 for obj in repositories:
445 445 obj.user = _superadmin
446 446 # set description we know why we super admin now owns
447 447 # additional repositories that were orphaned !
448 448 obj.description += ' \n::detached repository from deleted user: %s' % (username,)
449 449 self.sa.add(obj)
450 450 left_overs = False
451 451 elif handle_mode == 'delete':
452 452 for obj in repositories:
453 453 RepoModel().delete(obj, forks='detach')
454 454 left_overs = False
455 455
456 456 # if nothing is done we have left overs left
457 457 return left_overs
458 458
459 459 def _handle_user_repo_groups(self, username, repository_groups,
460 460 handle_mode=None):
461 461 _superadmin = self.cls.get_first_super_admin()
462 462 left_overs = True
463 463
464 464 from rhodecode.model.repo_group import RepoGroupModel
465 465
466 466 if handle_mode == 'detach':
467 467 for r in repository_groups:
468 468 r.user = _superadmin
469 469 # set description we know why we super admin now owns
470 470 # additional repositories that were orphaned !
471 471 r.group_description += ' \n::detached repository group from deleted user: %s' % (username,)
472 472 r.personal = False
473 473 self.sa.add(r)
474 474 left_overs = False
475 475 elif handle_mode == 'delete':
476 476 for r in repository_groups:
477 477 RepoGroupModel().delete(r)
478 478 left_overs = False
479 479
480 480 # if nothing is done we have left overs left
481 481 return left_overs
482 482
483 483 def _handle_user_user_groups(self, username, user_groups, handle_mode=None):
484 484 _superadmin = self.cls.get_first_super_admin()
485 485 left_overs = True
486 486
487 487 from rhodecode.model.user_group import UserGroupModel
488 488
489 489 if handle_mode == 'detach':
490 490 for r in user_groups:
491 491 for user_user_group_to_perm in r.user_user_group_to_perm:
492 492 if user_user_group_to_perm.user.username == username:
493 493 user_user_group_to_perm.user = _superadmin
494 494 r.user = _superadmin
495 495 # set description we know why we super admin now owns
496 496 # additional repositories that were orphaned !
497 497 r.user_group_description += ' \n::detached user group from deleted user: %s' % (username,)
498 498 self.sa.add(r)
499 499 left_overs = False
500 500 elif handle_mode == 'delete':
501 501 for r in user_groups:
502 502 UserGroupModel().delete(r)
503 503 left_overs = False
504 504
505 505 # if nothing is done we have left overs left
506 506 return left_overs
507 507
508 508 def delete(self, user, cur_user=None, handle_repos=None,
509 509 handle_repo_groups=None, handle_user_groups=None):
510 510 from rhodecode.lib.hooks_base import log_delete_user
511 511
512 512 if not cur_user:
513 cur_user = getattr(
514 get_current_rhodecode_user(), 'username', None)
513 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
515 514 user = self._get_user(user)
516 515
517 516 try:
518 517 if user.username == User.DEFAULT_USER:
519 518 raise DefaultUserException(
520 519 u"You can't remove this user since it's"
521 520 u" crucial for entire application")
522 521
523 522 left_overs = self._handle_user_repos(
524 523 user.username, user.repositories, handle_repos)
525 524 if left_overs and user.repositories:
526 525 repos = [x.repo_name for x in user.repositories]
527 526 raise UserOwnsReposException(
528 527 u'user "%(username)s" still owns %(len_repos)s repositories and cannot be '
529 528 u'removed. Switch owners or remove those repositories:%(list_repos)s'
530 529 % {'username': user.username, 'len_repos': len(repos),
531 530 'list_repos': ', '.join(repos)})
532 531
533 532 left_overs = self._handle_user_repo_groups(
534 533 user.username, user.repository_groups, handle_repo_groups)
535 534 if left_overs and user.repository_groups:
536 535 repo_groups = [x.group_name for x in user.repository_groups]
537 536 raise UserOwnsRepoGroupsException(
538 537 u'user "%(username)s" still owns %(len_repo_groups)s repository groups and cannot be '
539 538 u'removed. Switch owners or remove those repository groups:%(list_repo_groups)s'
540 539 % {'username': user.username, 'len_repo_groups': len(repo_groups),
541 540 'list_repo_groups': ', '.join(repo_groups)})
542 541
543 542 left_overs = self._handle_user_user_groups(
544 543 user.username, user.user_groups, handle_user_groups)
545 544 if left_overs and user.user_groups:
546 545 user_groups = [x.users_group_name for x in user.user_groups]
547 546 raise UserOwnsUserGroupsException(
548 547 u'user "%s" still owns %s user groups and cannot be '
549 548 u'removed. Switch owners or remove those user groups:%s'
550 549 % (user.username, len(user_groups), ', '.join(user_groups)))
551 550
552 551 user_data = user.get_dict() # fetch user data before expire
553 552
554 553 # we might change the user data with detach/delete, make sure
555 554 # the object is marked as expired before actually deleting !
556 555 self.sa.expire(user)
557 556 self.sa.delete(user)
558 557
559 558 log_delete_user(deleted_by=cur_user, **user_data)
560 559 except Exception:
561 560 log.error(traceback.format_exc())
562 561 raise
563 562
564 563 def reset_password_link(self, data, pwd_reset_url):
565 564 from rhodecode.lib.celerylib import tasks, run_task
566 565 from rhodecode.model.notification import EmailNotificationModel
567 566 user_email = data['email']
568 567 try:
569 568 user = User.get_by_email(user_email)
570 569 if user:
571 570 log.debug('password reset user found %s', user)
572 571
573 572 email_kwargs = {
574 573 'password_reset_url': pwd_reset_url,
575 574 'user': user,
576 575 'email': user_email,
577 576 'date': datetime.datetime.now()
578 577 }
579 578
580 579 (subject, headers, email_body,
581 580 email_body_plaintext) = EmailNotificationModel().render_email(
582 581 EmailNotificationModel.TYPE_PASSWORD_RESET, **email_kwargs)
583 582
584 583 recipients = [user_email]
585 584
586 585 action_logger_generic(
587 586 'sending password reset email to user: {}'.format(
588 587 user), namespace='security.password_reset')
589 588
590 589 run_task(tasks.send_email, recipients, subject,
591 590 email_body_plaintext, email_body)
592 591
593 592 else:
594 593 log.debug("password reset email %s not found", user_email)
595 594 except Exception:
596 595 log.error(traceback.format_exc())
597 596 return False
598 597
599 598 return True
600 599
601 600 def reset_password(self, data):
602 601 from rhodecode.lib.celerylib import tasks, run_task
603 602 from rhodecode.model.notification import EmailNotificationModel
604 603 from rhodecode.lib import auth
605 604 user_email = data['email']
606 605 pre_db = True
607 606 try:
608 607 user = User.get_by_email(user_email)
609 608 new_passwd = auth.PasswordGenerator().gen_password(
610 609 12, auth.PasswordGenerator.ALPHABETS_BIG_SMALL)
611 610 if user:
612 611 user.password = auth.get_crypt_password(new_passwd)
613 612 # also force this user to reset his password !
614 613 user.update_userdata(force_password_change=True)
615 614
616 615 Session().add(user)
617 616
618 617 # now delete the token in question
619 618 UserApiKeys = AuthTokenModel.cls
620 619 UserApiKeys().query().filter(
621 620 UserApiKeys.api_key == data['token']).delete()
622 621
623 622 Session().commit()
624 623 log.info('successfully reset password for `%s`', user_email)
625 624
626 625 if new_passwd is None:
627 626 raise Exception('unable to generate new password')
628 627
629 628 pre_db = False
630 629
631 630 email_kwargs = {
632 631 'new_password': new_passwd,
633 632 'user': user,
634 633 'email': user_email,
635 634 'date': datetime.datetime.now()
636 635 }
637 636
638 637 (subject, headers, email_body,
639 638 email_body_plaintext) = EmailNotificationModel().render_email(
640 639 EmailNotificationModel.TYPE_PASSWORD_RESET_CONFIRMATION,
641 640 **email_kwargs)
642 641
643 642 recipients = [user_email]
644 643
645 644 action_logger_generic(
646 645 'sent new password to user: {} with email: {}'.format(
647 646 user, user_email), namespace='security.password_reset')
648 647
649 648 run_task(tasks.send_email, recipients, subject,
650 649 email_body_plaintext, email_body)
651 650
652 651 except Exception:
653 652 log.error('Failed to update user password')
654 653 log.error(traceback.format_exc())
655 654 if pre_db:
656 655 # we rollback only if local db stuff fails. If it goes into
657 656 # run_task, we're pass rollback state this wouldn't work then
658 657 Session().rollback()
659 658
660 659 return True
661 660
662 661 def fill_data(self, auth_user, user_id=None, api_key=None, username=None):
663 662 """
664 663 Fetches auth_user by user_id,or api_key if present.
665 664 Fills auth_user attributes with those taken from database.
666 665 Additionally set's is_authenitated if lookup fails
667 666 present in database
668 667
669 668 :param auth_user: instance of user to set attributes
670 669 :param user_id: user id to fetch by
671 670 :param api_key: api key to fetch by
672 671 :param username: username to fetch by
673 672 """
674 673 def token_obfuscate(token):
675 674 if token:
676 675 return token[:4] + "****"
677 676
678 677 if user_id is None and api_key is None and username is None:
679 678 raise Exception('You need to pass user_id, api_key or username')
680 679
681 680 log.debug(
682 681 'AuthUser: fill data execution based on: '
683 682 'user_id:%s api_key:%s username:%s', user_id, api_key, username)
684 683 try:
685 684 dbuser = None
686 685 if user_id:
687 686 dbuser = self.get(user_id)
688 687 elif api_key:
689 688 dbuser = self.get_by_auth_token(api_key)
690 689 elif username:
691 690 dbuser = self.get_by_username(username)
692 691
693 692 if not dbuser:
694 693 log.warning(
695 694 'Unable to lookup user by id:%s api_key:%s username:%s',
696 695 user_id, token_obfuscate(api_key), username)
697 696 return False
698 697 if not dbuser.active:
699 698 log.debug('User `%s:%s` is inactive, skipping fill data',
700 699 username, user_id)
701 700 return False
702 701
703 702 log.debug('AuthUser: filling found user:%s data', dbuser)
704 703 user_data = dbuser.get_dict()
705 704
706 705 user_data.update({
707 706 # set explicit the safe escaped values
708 707 'first_name': dbuser.first_name,
709 708 'last_name': dbuser.last_name,
710 709 })
711 710
712 711 for k, v in user_data.items():
713 712 # properties of auth user we dont update
714 713 if k not in ['auth_tokens', 'permissions']:
715 714 setattr(auth_user, k, v)
716 715
717 716 except Exception:
718 717 log.error(traceback.format_exc())
719 718 auth_user.is_authenticated = False
720 719 return False
721 720
722 721 return True
723 722
724 723 def has_perm(self, user, perm):
725 724 perm = self._get_perm(perm)
726 725 user = self._get_user(user)
727 726
728 727 return UserToPerm.query().filter(UserToPerm.user == user)\
729 728 .filter(UserToPerm.permission == perm).scalar() is not None
730 729
731 730 def grant_perm(self, user, perm):
732 731 """
733 732 Grant user global permissions
734 733
735 734 :param user:
736 735 :param perm:
737 736 """
738 737 user = self._get_user(user)
739 738 perm = self._get_perm(perm)
740 739 # if this permission is already granted skip it
741 740 _perm = UserToPerm.query()\
742 741 .filter(UserToPerm.user == user)\
743 742 .filter(UserToPerm.permission == perm)\
744 743 .scalar()
745 744 if _perm:
746 745 return
747 746 new = UserToPerm()
748 747 new.user = user
749 748 new.permission = perm
750 749 self.sa.add(new)
751 750 return new
752 751
753 752 def revoke_perm(self, user, perm):
754 753 """
755 754 Revoke users global permissions
756 755
757 756 :param user:
758 757 :param perm:
759 758 """
760 759 user = self._get_user(user)
761 760 perm = self._get_perm(perm)
762 761
763 762 obj = UserToPerm.query()\
764 763 .filter(UserToPerm.user == user)\
765 764 .filter(UserToPerm.permission == perm)\
766 765 .scalar()
767 766 if obj:
768 767 self.sa.delete(obj)
769 768
770 769 def add_extra_email(self, user, email):
771 770 """
772 771 Adds email address to UserEmailMap
773 772
774 773 :param user:
775 774 :param email:
776 775 """
777 776
778 777 user = self._get_user(user)
779 778
780 779 obj = UserEmailMap()
781 780 obj.user = user
782 781 obj.email = email
783 782 self.sa.add(obj)
784 783 return obj
785 784
786 785 def delete_extra_email(self, user, email_id):
787 786 """
788 787 Removes email address from UserEmailMap
789 788
790 789 :param user:
791 790 :param email_id:
792 791 """
793 792 user = self._get_user(user)
794 793 obj = UserEmailMap.query().get(email_id)
795 794 if obj and obj.user_id == user.user_id:
796 795 self.sa.delete(obj)
797 796
798 797 def parse_ip_range(self, ip_range):
799 798 ip_list = []
800 799
801 800 def make_unique(value):
802 801 seen = []
803 802 return [c for c in value if not (c in seen or seen.append(c))]
804 803
805 804 # firsts split by commas
806 805 for ip_range in ip_range.split(','):
807 806 if not ip_range:
808 807 continue
809 808 ip_range = ip_range.strip()
810 809 if '-' in ip_range:
811 810 start_ip, end_ip = ip_range.split('-', 1)
812 811 start_ip = ipaddress.ip_address(safe_unicode(start_ip.strip()))
813 812 end_ip = ipaddress.ip_address(safe_unicode(end_ip.strip()))
814 813 parsed_ip_range = []
815 814
816 815 for index in xrange(int(start_ip), int(end_ip) + 1):
817 816 new_ip = ipaddress.ip_address(index)
818 817 parsed_ip_range.append(str(new_ip))
819 818 ip_list.extend(parsed_ip_range)
820 819 else:
821 820 ip_list.append(ip_range)
822 821
823 822 return make_unique(ip_list)
824 823
825 824 def add_extra_ip(self, user, ip, description=None):
826 825 """
827 826 Adds ip address to UserIpMap
828 827
829 828 :param user:
830 829 :param ip:
831 830 """
832 831
833 832 user = self._get_user(user)
834 833 obj = UserIpMap()
835 834 obj.user = user
836 835 obj.ip_addr = ip
837 836 obj.description = description
838 837 self.sa.add(obj)
839 838 return obj
840 839
841 840 auth_token_role = AuthTokenModel.cls
842 841
843 842 def add_auth_token(self, user, lifetime_minutes, role, description=u'',
844 843 scope_callback=None):
845 844 """
846 845 Add AuthToken for user.
847 846
848 847 :param user: username/user_id
849 848 :param lifetime_minutes: in minutes the lifetime for token, -1 equals no limit
850 849 :param role: one of AuthTokenModel.cls.ROLE_*
851 850 :param description: optional string description
852 851 """
853 852
854 853 token = AuthTokenModel().create(
855 854 user, description, lifetime_minutes, role)
856 855 if scope_callback and callable(scope_callback):
857 856 # call the callback if we provide, used to attach scope for EE edition
858 857 scope_callback(token)
859 858 return token
860 859
861 860 def delete_extra_ip(self, user, ip_id):
862 861 """
863 862 Removes ip address from UserIpMap
864 863
865 864 :param user:
866 865 :param ip_id:
867 866 """
868 867 user = self._get_user(user)
869 868 obj = UserIpMap.query().get(ip_id)
870 869 if obj and obj.user_id == user.user_id:
871 870 self.sa.delete(obj)
872 871
873 872 def get_accounts_in_creation_order(self, current_user=None):
874 873 """
875 874 Get accounts in order of creation for deactivation for license limits
876 875
877 876 pick currently logged in user, and append to the list in position 0
878 877 pick all super-admins in order of creation date and add it to the list
879 878 pick all other accounts in order of creation and add it to the list.
880 879
881 880 Based on that list, the last accounts can be disabled as they are
882 881 created at the end and don't include any of the super admins as well
883 882 as the current user.
884 883
885 884 :param current_user: optionally current user running this operation
886 885 """
887 886
888 887 if not current_user:
889 888 current_user = get_current_rhodecode_user()
890 889 active_super_admins = [
891 890 x.user_id for x in User.query()
892 891 .filter(User.user_id != current_user.user_id)
893 892 .filter(User.active == true())
894 893 .filter(User.admin == true())
895 894 .order_by(User.created_on.asc())]
896 895
897 896 active_regular_users = [
898 897 x.user_id for x in User.query()
899 898 .filter(User.user_id != current_user.user_id)
900 899 .filter(User.active == true())
901 900 .filter(User.admin == false())
902 901 .order_by(User.created_on.asc())]
903 902
904 903 list_of_accounts = [current_user.user_id]
905 904 list_of_accounts += active_super_admins
906 905 list_of_accounts += active_regular_users
907 906
908 907 return list_of_accounts
909 908
910 909 def deactivate_last_users(self, expected_users, current_user=None):
911 910 """
912 911 Deactivate accounts that are over the license limits.
913 912 Algorithm of which accounts to disabled is based on the formula:
914 913
915 914 Get current user, then super admins in creation order, then regular
916 915 active users in creation order.
917 916
918 917 Using that list we mark all accounts from the end of it as inactive.
919 918 This way we block only latest created accounts.
920 919
921 920 :param expected_users: list of users in special order, we deactivate
922 921 the end N amount of users from that list
923 922 """
924 923
925 924 list_of_accounts = self.get_accounts_in_creation_order(
926 925 current_user=current_user)
927 926
928 927 for acc_id in list_of_accounts[expected_users + 1:]:
929 928 user = User.get(acc_id)
930 929 log.info('Deactivating account %s for license unlock', user)
931 930 user.active = False
932 931 Session().add(user)
933 932 Session().commit()
934 933
935 934 return
936 935
937 936 def get_user_log(self, user, filter_term):
938 937 user_log = UserLog.query()\
939 938 .filter(or_(UserLog.user_id == user.user_id,
940 939 UserLog.username == user.username))\
941 940 .options(joinedload(UserLog.user))\
942 941 .options(joinedload(UserLog.repository))\
943 942 .order_by(UserLog.action_date.desc())
944 943
945 944 user_log = user_log_filter(user_log, filter_term)
946 945 return user_log
@@ -1,617 +1,632 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import os
22 22 from hashlib import sha1
23 23
24 24 import pytest
25 25 from mock import patch
26 26
27 27 from rhodecode.lib import auth
28 28 from rhodecode.lib.utils2 import md5
29 29 from rhodecode.model.auth_token import AuthTokenModel
30 from rhodecode.model.db import User
30 from rhodecode.model.db import Session, User
31 31 from rhodecode.model.repo import RepoModel
32 32 from rhodecode.model.user import UserModel
33 33 from rhodecode.model.user_group import UserGroupModel
34 34
35 35
36 36 def test_perm_origin_dict():
37 37 pod = auth.PermOriginDict()
38 38 pod['thing'] = 'read', 'default'
39 39 assert pod['thing'] == 'read'
40 40
41 41 assert pod.perm_origin_stack == {
42 42 'thing': [('read', 'default')]}
43 43
44 44 pod['thing'] = 'write', 'admin'
45 45 assert pod['thing'] == 'write'
46 46
47 47 assert pod.perm_origin_stack == {
48 48 'thing': [('read', 'default'), ('write', 'admin')]}
49 49
50 50 pod['other'] = 'write', 'default'
51 51
52 52 assert pod.perm_origin_stack == {
53 53 'other': [('write', 'default')],
54 54 'thing': [('read', 'default'), ('write', 'admin')]}
55 55
56 56 pod['other'] = 'none', 'override'
57 57
58 58 assert pod.perm_origin_stack == {
59 59 'other': [('write', 'default'), ('none', 'override')],
60 60 'thing': [('read', 'default'), ('write', 'admin')]}
61 61
62 62 with pytest.raises(ValueError):
63 63 pod['thing'] = 'read'
64 64
65 65
66 66 def test_cached_perms_data(user_regular, backend_random):
67 67 permissions = get_permissions(user_regular)
68 68 repo_name = backend_random.repo.repo_name
69 69 expected_global_permissions = {
70 70 'repository.read', 'group.read', 'usergroup.read'}
71 71 assert expected_global_permissions.issubset(permissions['global'])
72 72 assert permissions['repositories'][repo_name] == 'repository.read'
73 73
74 74
75 75 def test_cached_perms_data_with_admin_user(user_regular, backend_random):
76 76 permissions = get_permissions(user_regular, user_is_admin=True)
77 77 repo_name = backend_random.repo.repo_name
78 78 assert 'hg.admin' in permissions['global']
79 79 assert permissions['repositories'][repo_name] == 'repository.admin'
80 80
81 81
82 82 def test_cached_perms_data_with_admin_user_extended_calculation(user_regular, backend_random):
83 83 permissions = get_permissions(user_regular, user_is_admin=True,
84 84 calculate_super_admin=True)
85 85 repo_name = backend_random.repo.repo_name
86 86 assert 'hg.admin' in permissions['global']
87 87 assert permissions['repositories'][repo_name] == 'repository.admin'
88 88
89 89
90 90 def test_cached_perms_data_user_group_global_permissions(user_util):
91 91 user, user_group = user_util.create_user_with_group()
92 92 user_group.inherit_default_permissions = False
93 93
94 94 granted_permission = 'repository.write'
95 95 UserGroupModel().grant_perm(user_group, granted_permission)
96 Session().commit()
96 97
97 98 permissions = get_permissions(user)
98 99 assert granted_permission in permissions['global']
99 100
100 101
101 102 @pytest.mark.xfail(reason="Not implemented, see TODO note")
102 103 def test_cached_perms_data_user_group_global_permissions_(user_util):
103 104 user, user_group = user_util.create_user_with_group()
104 105
105 106 granted_permission = 'repository.write'
106 107 UserGroupModel().grant_perm(user_group, granted_permission)
108 Session().commit()
107 109
108 110 permissions = get_permissions(user)
109 111 assert granted_permission in permissions['global']
110 112
111 113
112 114 def test_cached_perms_data_user_global_permissions(user_util):
113 115 user = user_util.create_user()
114 116 UserModel().grant_perm(user, 'repository.none')
117 Session().commit()
115 118
116 119 permissions = get_permissions(user, user_inherit_default_permissions=True)
117 120 assert 'repository.read' in permissions['global']
118 121
119 122
120 123 def test_cached_perms_data_repository_permissions_on_private_repository(
121 124 backend_random, user_util):
122 125 user, user_group = user_util.create_user_with_group()
123 126
124 127 repo = backend_random.create_repo()
125 128 repo.private = True
126 129
127 130 granted_permission = 'repository.write'
128 131 RepoModel().grant_user_group_permission(
129 132 repo, user_group.users_group_name, granted_permission)
133 Session().commit()
130 134
131 135 permissions = get_permissions(user)
132 136 assert permissions['repositories'][repo.repo_name] == granted_permission
133 137
134 138
135 139 def test_cached_perms_data_repository_permissions_for_owner(
136 140 backend_random, user_util):
137 141 user = user_util.create_user()
138 142
139 143 repo = backend_random.create_repo()
140 144 repo.user_id = user.user_id
141 145
142 146 permissions = get_permissions(user)
143 147 assert permissions['repositories'][repo.repo_name] == 'repository.admin'
144 148
145 149 # TODO: johbo: Make cleanup in UserUtility smarter, then remove this hack
146 150 repo.user_id = User.get_default_user().user_id
147 151
148 152
149 153 def test_cached_perms_data_repository_permissions_not_inheriting_defaults(
150 154 backend_random, user_util):
151 155 user = user_util.create_user()
152 156 repo = backend_random.create_repo()
153 157
154 158 # Don't inherit default object permissions
155 159 UserModel().grant_perm(user, 'hg.inherit_default_perms.false')
160 Session().commit()
156 161
157 162 permissions = get_permissions(user)
158 163 assert permissions['repositories'][repo.repo_name] == 'repository.none'
159 164
160 165
161 166 def test_cached_perms_data_default_permissions_on_repository_group(user_util):
162 167 # Have a repository group with default permissions set
163 168 repo_group = user_util.create_repo_group()
164 169 default_user = User.get_default_user()
165 170 user_util.grant_user_permission_to_repo_group(
166 171 repo_group, default_user, 'repository.write')
167 172 user = user_util.create_user()
168 173
169 174 permissions = get_permissions(user)
170 175 assert permissions['repositories_groups'][repo_group.group_name] == \
171 176 'repository.write'
172 177
173 178
174 179 def test_cached_perms_data_default_permissions_on_repository_group_owner(
175 180 user_util):
176 181 # Have a repository group
177 182 repo_group = user_util.create_repo_group()
178 183 default_user = User.get_default_user()
179 184
180 185 # Add a permission for the default user to hit the code path
181 186 user_util.grant_user_permission_to_repo_group(
182 187 repo_group, default_user, 'repository.write')
183 188
184 189 # Have an owner of the group
185 190 user = user_util.create_user()
186 191 repo_group.user_id = user.user_id
187 192
188 193 permissions = get_permissions(user)
189 194 assert permissions['repositories_groups'][repo_group.group_name] == \
190 195 'group.admin'
191 196
192 197
193 198 def test_cached_perms_data_default_permissions_on_repository_group_no_inherit(
194 199 user_util):
195 200 # Have a repository group
196 201 repo_group = user_util.create_repo_group()
197 202 default_user = User.get_default_user()
198 203
199 204 # Add a permission for the default user to hit the code path
200 205 user_util.grant_user_permission_to_repo_group(
201 206 repo_group, default_user, 'repository.write')
202 207
203 208 # Don't inherit default object permissions
204 209 user = user_util.create_user()
205 210 UserModel().grant_perm(user, 'hg.inherit_default_perms.false')
211 Session().commit()
206 212
207 213 permissions = get_permissions(user)
208 214 assert permissions['repositories_groups'][repo_group.group_name] == \
209 215 'group.none'
210 216
211 217
212 218 def test_cached_perms_data_repository_permissions_from_user_group(
213 219 user_util, backend_random):
214 220 user, user_group = user_util.create_user_with_group()
215 221
216 222 # Needs a second user group to make sure that we select the right
217 223 # permissions.
218 224 user_group2 = user_util.create_user_group()
219 225 UserGroupModel().add_user_to_group(user_group2, user)
220 226
221 227 repo = backend_random.create_repo()
222 228
223 229 RepoModel().grant_user_group_permission(
224 230 repo, user_group.users_group_name, 'repository.read')
225 231 RepoModel().grant_user_group_permission(
226 232 repo, user_group2.users_group_name, 'repository.write')
233 Session().commit()
227 234
228 235 permissions = get_permissions(user)
229 236 assert permissions['repositories'][repo.repo_name] == 'repository.write'
230 237
231 238
232 239 def test_cached_perms_data_repository_permissions_from_user_group_owner(
233 240 user_util, backend_random):
234 241 user, user_group = user_util.create_user_with_group()
235 242
236 243 repo = backend_random.create_repo()
237 244 repo.user_id = user.user_id
238 245
239 246 RepoModel().grant_user_group_permission(
240 247 repo, user_group.users_group_name, 'repository.write')
248 Session().commit()
241 249
242 250 permissions = get_permissions(user)
243 251 assert permissions['repositories'][repo.repo_name] == 'repository.admin'
244 252
245 253
246 254 def test_cached_perms_data_user_repository_permissions(
247 255 user_util, backend_random):
248 256 user = user_util.create_user()
249 257 repo = backend_random.create_repo()
250 258 granted_permission = 'repository.write'
251 259 RepoModel().grant_user_permission(repo, user, granted_permission)
260 Session().commit()
252 261
253 262 permissions = get_permissions(user)
254 263 assert permissions['repositories'][repo.repo_name] == granted_permission
255 264
256 265
257 266 def test_cached_perms_data_user_repository_permissions_explicit(
258 267 user_util, backend_random):
259 268 user = user_util.create_user()
260 269 repo = backend_random.create_repo()
261 270 granted_permission = 'repository.none'
262 271 RepoModel().grant_user_permission(repo, user, granted_permission)
272 Session().commit()
263 273
264 274 permissions = get_permissions(user, explicit=True)
265 275 assert permissions['repositories'][repo.repo_name] == granted_permission
266 276
267 277
268 278 def test_cached_perms_data_user_repository_permissions_owner(
269 279 user_util, backend_random):
270 280 user = user_util.create_user()
271 281 repo = backend_random.create_repo()
272 282 repo.user_id = user.user_id
273 283 RepoModel().grant_user_permission(repo, user, 'repository.write')
284 Session().commit()
274 285
275 286 permissions = get_permissions(user)
276 287 assert permissions['repositories'][repo.repo_name] == 'repository.admin'
277 288
278 289
279 290 def test_cached_perms_data_repository_groups_permissions_inherited(
280 291 user_util, backend_random):
281 292 user, user_group = user_util.create_user_with_group()
282 293
283 294 # Needs a second group to hit the last condition
284 295 user_group2 = user_util.create_user_group()
285 296 UserGroupModel().add_user_to_group(user_group2, user)
286 297
287 298 repo_group = user_util.create_repo_group()
288 299
289 300 user_util.grant_user_group_permission_to_repo_group(
290 301 repo_group, user_group, 'group.read')
291 302 user_util.grant_user_group_permission_to_repo_group(
292 303 repo_group, user_group2, 'group.write')
293 304
294 305 permissions = get_permissions(user)
295 306 assert permissions['repositories_groups'][repo_group.group_name] == \
296 307 'group.write'
297 308
298 309
299 310 def test_cached_perms_data_repository_groups_permissions_inherited_owner(
300 311 user_util, backend_random):
301 312 user, user_group = user_util.create_user_with_group()
302 313 repo_group = user_util.create_repo_group()
303 314 repo_group.user_id = user.user_id
304 315
305 316 granted_permission = 'group.write'
306 317 user_util.grant_user_group_permission_to_repo_group(
307 318 repo_group, user_group, granted_permission)
308 319
309 320 permissions = get_permissions(user)
310 321 assert permissions['repositories_groups'][repo_group.group_name] == \
311 322 'group.admin'
312 323
313 324
314 325 def test_cached_perms_data_repository_groups_permissions(
315 326 user_util, backend_random):
316 327 user = user_util.create_user()
317 328
318 329 repo_group = user_util.create_repo_group()
319 330
320 331 granted_permission = 'group.write'
321 332 user_util.grant_user_permission_to_repo_group(
322 333 repo_group, user, granted_permission)
323 334
324 335 permissions = get_permissions(user)
325 336 assert permissions['repositories_groups'][repo_group.group_name] == \
326 337 'group.write'
327 338
328 339
329 340 def test_cached_perms_data_repository_groups_permissions_explicit(
330 341 user_util, backend_random):
331 342 user = user_util.create_user()
332 343
333 344 repo_group = user_util.create_repo_group()
334 345
335 346 granted_permission = 'group.none'
336 347 user_util.grant_user_permission_to_repo_group(
337 348 repo_group, user, granted_permission)
338 349
339 350 permissions = get_permissions(user, explicit=True)
340 351 assert permissions['repositories_groups'][repo_group.group_name] == \
341 352 'group.none'
342 353
343 354
344 355 def test_cached_perms_data_repository_groups_permissions_owner(
345 356 user_util, backend_random):
346 357 user = user_util.create_user()
347 358
348 359 repo_group = user_util.create_repo_group()
349 360 repo_group.user_id = user.user_id
350 361
351 362 granted_permission = 'group.write'
352 363 user_util.grant_user_permission_to_repo_group(
353 364 repo_group, user, granted_permission)
354 365
355 366 permissions = get_permissions(user)
356 367 assert permissions['repositories_groups'][repo_group.group_name] == \
357 368 'group.admin'
358 369
359 370
360 371 def test_cached_perms_data_user_group_permissions_inherited(
361 372 user_util, backend_random):
362 373 user, user_group = user_util.create_user_with_group()
363 374 user_group2 = user_util.create_user_group()
364 375 UserGroupModel().add_user_to_group(user_group2, user)
365 376
366 377 target_user_group = user_util.create_user_group()
367 378
368 379 user_util.grant_user_group_permission_to_user_group(
369 380 target_user_group, user_group, 'usergroup.read')
370 381 user_util.grant_user_group_permission_to_user_group(
371 382 target_user_group, user_group2, 'usergroup.write')
372 383
373 384 permissions = get_permissions(user)
374 385 assert permissions['user_groups'][target_user_group.users_group_name] == \
375 386 'usergroup.write'
376 387
377 388
378 389 def test_cached_perms_data_user_group_permissions(
379 390 user_util, backend_random):
380 391 user = user_util.create_user()
381 392 user_group = user_util.create_user_group()
382 393 UserGroupModel().grant_user_permission(user_group, user, 'usergroup.write')
394 Session().commit()
383 395
384 396 permissions = get_permissions(user)
385 397 assert permissions['user_groups'][user_group.users_group_name] == \
386 398 'usergroup.write'
387 399
388 400
389 401 def test_cached_perms_data_user_group_permissions_explicit(
390 402 user_util, backend_random):
391 403 user = user_util.create_user()
392 404 user_group = user_util.create_user_group()
393 405 UserGroupModel().grant_user_permission(user_group, user, 'usergroup.none')
406 Session().commit()
394 407
395 408 permissions = get_permissions(user, explicit=True)
396 409 assert permissions['user_groups'][user_group.users_group_name] == \
397 410 'usergroup.none'
398 411
399 412
400 413 def test_cached_perms_data_user_group_permissions_not_inheriting_defaults(
401 414 user_util, backend_random):
402 415 user = user_util.create_user()
403 416 user_group = user_util.create_user_group()
404 417
405 418 # Don't inherit default object permissions
406 419 UserModel().grant_perm(user, 'hg.inherit_default_perms.false')
420 Session().commit()
407 421
408 422 permissions = get_permissions(user)
409 423 assert permissions['user_groups'][user_group.users_group_name] == \
410 424 'usergroup.none'
411 425
412 426
413 427 def test_permission_calculator_admin_permissions(
414 428 user_util, backend_random):
415 429 user = user_util.create_user()
416 430 user_group = user_util.create_user_group()
417 431 repo = backend_random.repo
418 432 repo_group = user_util.create_repo_group()
419 433
420 434 calculator = auth.PermissionCalculator(
421 435 user.user_id, {}, False, False, True, 'higherwin')
422 436 permissions = calculator._calculate_admin_permissions()
423 437
424 438 assert permissions['repositories_groups'][repo_group.group_name] == \
425 439 'group.admin'
426 440 assert permissions['user_groups'][user_group.users_group_name] == \
427 441 'usergroup.admin'
428 442 assert permissions['repositories'][repo.repo_name] == 'repository.admin'
429 443 assert 'hg.admin' in permissions['global']
430 444
431 445
432 446 def test_permission_calculator_repository_permissions_robustness_from_group(
433 447 user_util, backend_random):
434 448 user, user_group = user_util.create_user_with_group()
435 449
436 450 RepoModel().grant_user_group_permission(
437 451 backend_random.repo, user_group.users_group_name, 'repository.write')
438 452
439 453 calculator = auth.PermissionCalculator(
440 454 user.user_id, {}, False, False, False, 'higherwin')
441 455 calculator._calculate_repository_permissions()
442 456
443 457
444 458 def test_permission_calculator_repository_permissions_robustness_from_user(
445 459 user_util, backend_random):
446 460 user = user_util.create_user()
447 461
448 462 RepoModel().grant_user_permission(
449 463 backend_random.repo, user, 'repository.write')
464 Session().commit()
450 465
451 466 calculator = auth.PermissionCalculator(
452 467 user.user_id, {}, False, False, False, 'higherwin')
453 468 calculator._calculate_repository_permissions()
454 469
455 470
456 471 def test_permission_calculator_repo_group_permissions_robustness_from_group(
457 472 user_util, backend_random):
458 473 user, user_group = user_util.create_user_with_group()
459 474 repo_group = user_util.create_repo_group()
460 475
461 476 user_util.grant_user_group_permission_to_repo_group(
462 477 repo_group, user_group, 'group.write')
463 478
464 479 calculator = auth.PermissionCalculator(
465 480 user.user_id, {}, False, False, False, 'higherwin')
466 481 calculator._calculate_repository_group_permissions()
467 482
468 483
469 484 def test_permission_calculator_repo_group_permissions_robustness_from_user(
470 485 user_util, backend_random):
471 486 user = user_util.create_user()
472 487 repo_group = user_util.create_repo_group()
473 488
474 489 user_util.grant_user_permission_to_repo_group(
475 490 repo_group, user, 'group.write')
476 491
477 492 calculator = auth.PermissionCalculator(
478 493 user.user_id, {}, False, False, False, 'higherwin')
479 494 calculator._calculate_repository_group_permissions()
480 495
481 496
482 497 def test_permission_calculator_user_group_permissions_robustness_from_group(
483 498 user_util, backend_random):
484 499 user, user_group = user_util.create_user_with_group()
485 500 target_user_group = user_util.create_user_group()
486 501
487 502 user_util.grant_user_group_permission_to_user_group(
488 503 target_user_group, user_group, 'usergroup.write')
489 504
490 505 calculator = auth.PermissionCalculator(
491 506 user.user_id, {}, False, False, False, 'higherwin')
492 507 calculator._calculate_user_group_permissions()
493 508
494 509
495 510 def test_permission_calculator_user_group_permissions_robustness_from_user(
496 511 user_util, backend_random):
497 512 user = user_util.create_user()
498 513 target_user_group = user_util.create_user_group()
499 514
500 515 user_util.grant_user_permission_to_user_group(
501 516 target_user_group, user, 'usergroup.write')
502 517
503 518 calculator = auth.PermissionCalculator(
504 519 user.user_id, {}, False, False, False, 'higherwin')
505 520 calculator._calculate_user_group_permissions()
506 521
507 522
508 523 @pytest.mark.parametrize("algo, new_permission, old_permission, expected", [
509 524 ('higherwin', 'repository.none', 'repository.none', 'repository.none'),
510 525 ('higherwin', 'repository.read', 'repository.none', 'repository.read'),
511 526 ('lowerwin', 'repository.write', 'repository.write', 'repository.write'),
512 527 ('lowerwin', 'repository.read', 'repository.write', 'repository.read'),
513 528 ])
514 529 def test_permission_calculator_choose_permission(
515 530 user_regular, algo, new_permission, old_permission, expected):
516 531 calculator = auth.PermissionCalculator(
517 532 user_regular.user_id, {}, False, False, False, algo)
518 533 result = calculator._choose_permission(new_permission, old_permission)
519 534 assert result == expected
520 535
521 536
522 537 def test_permission_calculator_choose_permission_raises_on_wrong_algo(
523 538 user_regular):
524 539 calculator = auth.PermissionCalculator(
525 540 user_regular.user_id, {}, False, False, False, 'invalid')
526 541 result = calculator._choose_permission(
527 542 'repository.read', 'repository.read')
528 543 # TODO: johbo: This documents the existing behavior. Think of an
529 544 # improvement.
530 545 assert result is None
531 546
532 547
533 548 def test_auth_user_get_cookie_store_for_normal_user(user_util):
534 549 user = user_util.create_user()
535 550 auth_user = auth.AuthUser(user_id=user.user_id)
536 551 expected_data = {
537 552 'username': user.username,
538 553 'user_id': user.user_id,
539 554 'password': md5(user.password),
540 555 'is_authenticated': False
541 556 }
542 557 assert auth_user.get_cookie_store() == expected_data
543 558
544 559
545 560 def test_auth_user_get_cookie_store_for_default_user():
546 561 default_user = User.get_default_user()
547 562 auth_user = auth.AuthUser()
548 563 expected_data = {
549 564 'username': User.DEFAULT_USER,
550 565 'user_id': default_user.user_id,
551 566 'password': md5(default_user.password),
552 567 'is_authenticated': True
553 568 }
554 569 assert auth_user.get_cookie_store() == expected_data
555 570
556 571
557 572 def get_permissions(user, **kwargs):
558 573 """
559 574 Utility filling in useful defaults into the call to `_cached_perms_data`.
560 575
561 576 Fill in `**kwargs` if specific values are needed for a test.
562 577 """
563 578 call_args = {
564 579 'user_id': user.user_id,
565 580 'scope': {},
566 581 'user_is_admin': False,
567 582 'user_inherit_default_permissions': False,
568 583 'explicit': False,
569 584 'algo': 'higherwin',
570 585 'calculate_super_admin': False,
571 586 }
572 587 call_args.update(kwargs)
573 588 permissions = auth._cached_perms_data(**call_args)
574 589 return permissions
575 590
576 591
577 592 class TestGenerateAuthToken(object):
578 593 def test_salt_is_used_when_specified(self):
579 594 salt = 'abcde'
580 595 user_name = 'test_user'
581 596 result = auth.generate_auth_token(user_name, salt)
582 597 expected_result = sha1(user_name + salt).hexdigest()
583 598 assert result == expected_result
584 599
585 600 def test_salt_is_geneated_when_not_specified(self):
586 601 user_name = 'test_user'
587 602 random_salt = os.urandom(16)
588 603 with patch.object(auth, 'os') as os_mock:
589 604 os_mock.urandom.return_value = random_salt
590 605 result = auth.generate_auth_token(user_name)
591 606 expected_result = sha1(user_name + random_salt).hexdigest()
592 607 assert result == expected_result
593 608
594 609
595 610 @pytest.mark.parametrize("test_token, test_roles, auth_result, expected_tokens", [
596 611 ('', None, False,
597 612 []),
598 613 ('wrongtoken', None, False,
599 614 []),
600 615 ('abracadabra_vcs', [AuthTokenModel.cls.ROLE_API], False,
601 616 [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1)]),
602 617 ('abracadabra_api', [AuthTokenModel.cls.ROLE_API], True,
603 618 [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1)]),
604 619 ('abracadabra_api', [AuthTokenModel.cls.ROLE_API], True,
605 620 [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1),
606 621 ('abracadabra_http', AuthTokenModel.cls.ROLE_HTTP, -1)]),
607 622 ])
608 623 def test_auth_by_token(test_token, test_roles, auth_result, expected_tokens,
609 624 user_util):
610 625 user = user_util.create_user()
611 626 user_id = user.user_id
612 627 for token, role, expires in expected_tokens:
613 new_token = AuthTokenModel().create(user_id, 'test-token', expires, role)
628 new_token = AuthTokenModel().create(user_id, u'test-token', expires, role)
614 629 new_token.api_key = token # inject known name for testing...
615 630
616 631 assert auth_result == user.authenticate_by_token(
617 632 test_token, roles=test_roles)
@@ -1,1080 +1,1143 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import mock
22 22 import pytest
23 23
24 24 from rhodecode.lib.utils2 import str2bool
25 25 from rhodecode.model.meta import Session
26 26 from rhodecode.model.settings import VcsSettingsModel, UiSetting
27 27
28 28
29 29 HOOKS_FORM_DATA = {
30 30 'hooks_changegroup_repo_size': True,
31 31 'hooks_changegroup_push_logger': True,
32 32 'hooks_outgoing_pull_logger': True
33 33 }
34 34
35 35 SVN_FORM_DATA = {
36 36 'new_svn_branch': 'test-branch',
37 37 'new_svn_tag': 'test-tag'
38 38 }
39 39
40 40 GENERAL_FORM_DATA = {
41 41 'rhodecode_pr_merge_enabled': True,
42 42 'rhodecode_use_outdated_comments': True,
43 43 'rhodecode_hg_use_rebase_for_merging': True,
44 44 'rhodecode_hg_close_branch_before_merging': True,
45 45 'rhodecode_git_use_rebase_for_merging': True,
46 46 'rhodecode_git_close_branch_before_merging': True,
47 47 'rhodecode_diff_cache': True,
48 48 }
49 49
50 50
51 51 class TestInheritGlobalSettingsProperty(object):
52 52 def test_get_raises_exception_when_repository_not_specified(self):
53 53 model = VcsSettingsModel()
54 54 with pytest.raises(Exception) as exc_info:
55 55 model.inherit_global_settings
56 56 assert str(exc_info.value) == 'Repository is not specified'
57 57
58 58 def test_true_is_returned_when_value_is_not_found(self, repo_stub):
59 59 model = VcsSettingsModel(repo=repo_stub.repo_name)
60 60 assert model.inherit_global_settings is True
61 61
62 62 def test_value_is_returned(self, repo_stub, settings_util):
63 63 model = VcsSettingsModel(repo=repo_stub.repo_name)
64 64 settings_util.create_repo_rhodecode_setting(
65 65 repo_stub, VcsSettingsModel.INHERIT_SETTINGS, False, 'bool')
66 66 assert model.inherit_global_settings is False
67 67
68 68 def test_value_is_set(self, repo_stub):
69 69 model = VcsSettingsModel(repo=repo_stub.repo_name)
70 70 model.inherit_global_settings = False
71 71 setting = model.repo_settings.get_setting_by_name(
72 72 VcsSettingsModel.INHERIT_SETTINGS)
73 73 try:
74 74 assert setting.app_settings_type == 'bool'
75 75 assert setting.app_settings_value is False
76 76 finally:
77 77 Session().delete(setting)
78 78 Session().commit()
79 79
80 80 def test_set_raises_exception_when_repository_not_specified(self):
81 81 model = VcsSettingsModel()
82 82 with pytest.raises(Exception) as exc_info:
83 83 model.inherit_global_settings = False
84 84 assert str(exc_info.value) == 'Repository is not specified'
85 85
86 86
87 87 class TestVcsSettingsModel(object):
88 88 def test_global_svn_branch_patterns(self):
89 89 model = VcsSettingsModel()
90 90 expected_result = {'test': 'test'}
91 91 with mock.patch.object(model, 'global_settings') as settings_mock:
92 92 get_settings = settings_mock.get_ui_by_section
93 93 get_settings.return_value = expected_result
94 94 settings_mock.return_value = expected_result
95 95 result = model.get_global_svn_branch_patterns()
96 96
97 97 get_settings.assert_called_once_with(model.SVN_BRANCH_SECTION)
98 98 assert expected_result == result
99 99
100 100 def test_repo_svn_branch_patterns(self):
101 101 model = VcsSettingsModel()
102 102 expected_result = {'test': 'test'}
103 103 with mock.patch.object(model, 'repo_settings') as settings_mock:
104 104 get_settings = settings_mock.get_ui_by_section
105 105 get_settings.return_value = expected_result
106 106 settings_mock.return_value = expected_result
107 107 result = model.get_repo_svn_branch_patterns()
108 108
109 109 get_settings.assert_called_once_with(model.SVN_BRANCH_SECTION)
110 110 assert expected_result == result
111 111
112 112 def test_repo_svn_branch_patterns_raises_exception_when_repo_is_not_set(
113 113 self):
114 114 model = VcsSettingsModel()
115 115 with pytest.raises(Exception) as exc_info:
116 116 model.get_repo_svn_branch_patterns()
117 117 assert str(exc_info.value) == 'Repository is not specified'
118 118
119 119 def test_global_svn_tag_patterns(self):
120 120 model = VcsSettingsModel()
121 121 expected_result = {'test': 'test'}
122 122 with mock.patch.object(model, 'global_settings') as settings_mock:
123 123 get_settings = settings_mock.get_ui_by_section
124 124 get_settings.return_value = expected_result
125 125 settings_mock.return_value = expected_result
126 126 result = model.get_global_svn_tag_patterns()
127 127
128 128 get_settings.assert_called_once_with(model.SVN_TAG_SECTION)
129 129 assert expected_result == result
130 130
131 131 def test_repo_svn_tag_patterns(self):
132 132 model = VcsSettingsModel()
133 133 expected_result = {'test': 'test'}
134 134 with mock.patch.object(model, 'repo_settings') as settings_mock:
135 135 get_settings = settings_mock.get_ui_by_section
136 136 get_settings.return_value = expected_result
137 137 settings_mock.return_value = expected_result
138 138 result = model.get_repo_svn_tag_patterns()
139 139
140 140 get_settings.assert_called_once_with(model.SVN_TAG_SECTION)
141 141 assert expected_result == result
142 142
143 143 def test_repo_svn_tag_patterns_raises_exception_when_repo_is_not_set(self):
144 144 model = VcsSettingsModel()
145 145 with pytest.raises(Exception) as exc_info:
146 146 model.get_repo_svn_tag_patterns()
147 147 assert str(exc_info.value) == 'Repository is not specified'
148 148
149 149 def test_get_global_settings(self):
150 150 expected_result = {'test': 'test'}
151 151 model = VcsSettingsModel()
152 152 with mock.patch.object(model, '_collect_all_settings') as collect_mock:
153 153 collect_mock.return_value = expected_result
154 154 result = model.get_global_settings()
155 155
156 156 collect_mock.assert_called_once_with(global_=True)
157 157 assert result == expected_result
158 158
159 159 def test_get_repo_settings(self, repo_stub):
160 160 model = VcsSettingsModel(repo=repo_stub.repo_name)
161 161 expected_result = {'test': 'test'}
162 162 with mock.patch.object(model, '_collect_all_settings') as collect_mock:
163 163 collect_mock.return_value = expected_result
164 164 result = model.get_repo_settings()
165 165
166 166 collect_mock.assert_called_once_with(global_=False)
167 167 assert result == expected_result
168 168
169 169 @pytest.mark.parametrize('settings, global_', [
170 170 ('global_settings', True),
171 171 ('repo_settings', False)
172 172 ])
173 173 def test_collect_all_settings(self, settings, global_):
174 174 model = VcsSettingsModel()
175 175 result_mock = self._mock_result()
176 176
177 177 settings_patch = mock.patch.object(model, settings)
178 178 with settings_patch as settings_mock:
179 179 settings_mock.get_ui_by_section_and_key.return_value = result_mock
180 180 settings_mock.get_setting_by_name.return_value = result_mock
181 181 result = model._collect_all_settings(global_=global_)
182 182
183 183 ui_settings = model.HG_SETTINGS + model.GIT_SETTINGS + model.HOOKS_SETTINGS
184 184 self._assert_get_settings_calls(
185 185 settings_mock, ui_settings, model.GENERAL_SETTINGS)
186 186 self._assert_collect_all_settings_result(
187 187 ui_settings, model.GENERAL_SETTINGS, result)
188 188
189 189 @pytest.mark.parametrize('settings, global_', [
190 190 ('global_settings', True),
191 191 ('repo_settings', False)
192 192 ])
193 193 def test_collect_all_settings_without_empty_value(self, settings, global_):
194 194 model = VcsSettingsModel()
195 195
196 196 settings_patch = mock.patch.object(model, settings)
197 197 with settings_patch as settings_mock:
198 198 settings_mock.get_ui_by_section_and_key.return_value = None
199 199 settings_mock.get_setting_by_name.return_value = None
200 200 result = model._collect_all_settings(global_=global_)
201 201
202 202 assert result == {}
203 203
204 204 def _mock_result(self):
205 205 result_mock = mock.Mock()
206 206 result_mock.ui_value = 'ui_value'
207 207 result_mock.ui_active = True
208 208 result_mock.app_settings_value = 'setting_value'
209 209 return result_mock
210 210
211 211 def _assert_get_settings_calls(
212 212 self, settings_mock, ui_settings, general_settings):
213 213 assert (
214 214 settings_mock.get_ui_by_section_and_key.call_count ==
215 215 len(ui_settings))
216 216 assert (
217 217 settings_mock.get_setting_by_name.call_count ==
218 218 len(general_settings))
219 219
220 220 for section, key in ui_settings:
221 221 expected_call = mock.call(section, key)
222 222 assert (
223 223 expected_call in
224 224 settings_mock.get_ui_by_section_and_key.call_args_list)
225 225
226 226 for name in general_settings:
227 227 expected_call = mock.call(name)
228 228 assert (
229 229 expected_call in
230 230 settings_mock.get_setting_by_name.call_args_list)
231 231
232 232 def _assert_collect_all_settings_result(
233 233 self, ui_settings, general_settings, result):
234 234 expected_result = {}
235 235 for section, key in ui_settings:
236 236 key = '{}_{}'.format(section, key.replace('.', '_'))
237 237
238 238 if section in ('extensions', 'hooks'):
239 239 value = True
240 240 elif key in ['vcs_git_lfs_enabled']:
241 241 value = True
242 242 else:
243 243 value = 'ui_value'
244 244 expected_result[key] = value
245 245
246 246 for name in general_settings:
247 247 key = 'rhodecode_' + name
248 248 expected_result[key] = 'setting_value'
249 249
250 250 assert expected_result == result
251 251
252 252
253 253 class TestCreateOrUpdateRepoHookSettings(object):
254 254 def test_create_when_no_repo_object_found(self, repo_stub):
255 255 model = VcsSettingsModel(repo=repo_stub.repo_name)
256 256
257 257 self._create_settings(model, HOOKS_FORM_DATA)
258 258
259 259 cleanup = []
260 260 try:
261 261 for section, key in model.HOOKS_SETTINGS:
262 262 ui = model.repo_settings.get_ui_by_section_and_key(
263 263 section, key)
264 264 assert ui.ui_active is True
265 265 cleanup.append(ui)
266 266 finally:
267 267 for ui in cleanup:
268 268 Session().delete(ui)
269 269 Session().commit()
270 270
271 271 def test_create_raises_exception_when_data_incomplete(self, repo_stub):
272 272 model = VcsSettingsModel(repo=repo_stub.repo_name)
273 273
274 274 deleted_key = 'hooks_changegroup_repo_size'
275 275 data = HOOKS_FORM_DATA.copy()
276 276 data.pop(deleted_key)
277 277
278 278 with pytest.raises(ValueError) as exc_info:
279 279 model.create_or_update_repo_hook_settings(data)
280 Session().commit()
281
280 282 msg = 'The given data does not contain {} key'.format(deleted_key)
281 283 assert str(exc_info.value) == msg
282 284
283 285 def test_update_when_repo_object_found(self, repo_stub, settings_util):
284 286 model = VcsSettingsModel(repo=repo_stub.repo_name)
285 287 for section, key in model.HOOKS_SETTINGS:
286 288 settings_util.create_repo_rhodecode_ui(
287 289 repo_stub, section, None, key=key, active=False)
288 290 model.create_or_update_repo_hook_settings(HOOKS_FORM_DATA)
291 Session().commit()
292
289 293 for section, key in model.HOOKS_SETTINGS:
290 294 ui = model.repo_settings.get_ui_by_section_and_key(section, key)
291 295 assert ui.ui_active is True
292 296
293 297 def _create_settings(self, model, data):
294 298 global_patch = mock.patch.object(model, 'global_settings')
295 299 global_setting = mock.Mock()
296 300 global_setting.ui_value = 'Test value'
297 301 with global_patch as global_mock:
298 302 global_mock.get_ui_by_section_and_key.return_value = global_setting
299 303 model.create_or_update_repo_hook_settings(HOOKS_FORM_DATA)
304 Session().commit()
300 305
301 306
302 307 class TestUpdateGlobalHookSettings(object):
303 308 def test_update_raises_exception_when_data_incomplete(self):
304 309 model = VcsSettingsModel()
305 310
306 311 deleted_key = 'hooks_changegroup_repo_size'
307 312 data = HOOKS_FORM_DATA.copy()
308 313 data.pop(deleted_key)
309 314
310 315 with pytest.raises(ValueError) as exc_info:
311 316 model.update_global_hook_settings(data)
317 Session().commit()
318
312 319 msg = 'The given data does not contain {} key'.format(deleted_key)
313 320 assert str(exc_info.value) == msg
314 321
315 322 def test_update_global_hook_settings(self, settings_util):
316 323 model = VcsSettingsModel()
317 324 setting_mock = mock.MagicMock()
318 325 setting_mock.ui_active = False
319 326 get_settings_patcher = mock.patch.object(
320 327 model.global_settings, 'get_ui_by_section_and_key',
321 328 return_value=setting_mock)
322 329 session_patcher = mock.patch('rhodecode.model.settings.Session')
323 330 with get_settings_patcher as get_settings_mock, session_patcher:
324 331 model.update_global_hook_settings(HOOKS_FORM_DATA)
332 Session().commit()
333
325 334 assert setting_mock.ui_active is True
326 335 assert get_settings_mock.call_count == 3
327 336
328 337
329 338 class TestCreateOrUpdateRepoGeneralSettings(object):
330 339 def test_calls_create_or_update_general_settings(self, repo_stub):
331 340 model = VcsSettingsModel(repo=repo_stub.repo_name)
332 341 create_patch = mock.patch.object(
333 342 model, '_create_or_update_general_settings')
334 343 with create_patch as create_mock:
335 344 model.create_or_update_repo_pr_settings(GENERAL_FORM_DATA)
345 Session().commit()
346
336 347 create_mock.assert_called_once_with(
337 348 model.repo_settings, GENERAL_FORM_DATA)
338 349
339 350 def test_raises_exception_when_repository_is_not_specified(self):
340 351 model = VcsSettingsModel()
341 352 with pytest.raises(Exception) as exc_info:
342 353 model.create_or_update_repo_pr_settings(GENERAL_FORM_DATA)
343 354 assert str(exc_info.value) == 'Repository is not specified'
344 355
345 356
346 357 class TestCreateOrUpdatGlobalGeneralSettings(object):
347 358 def test_calls_create_or_update_general_settings(self):
348 359 model = VcsSettingsModel()
349 360 create_patch = mock.patch.object(
350 361 model, '_create_or_update_general_settings')
351 362 with create_patch as create_mock:
352 363 model.create_or_update_global_pr_settings(GENERAL_FORM_DATA)
353 364 create_mock.assert_called_once_with(
354 365 model.global_settings, GENERAL_FORM_DATA)
355 366
356 367
357 368 class TestCreateOrUpdateGeneralSettings(object):
358 369 def test_create_when_no_repo_settings_found(self, repo_stub):
359 370 model = VcsSettingsModel(repo=repo_stub.repo_name)
360 371 model._create_or_update_general_settings(
361 372 model.repo_settings, GENERAL_FORM_DATA)
362 373
363 374 cleanup = []
364 375 try:
365 376 for name in model.GENERAL_SETTINGS:
366 377 setting = model.repo_settings.get_setting_by_name(name)
367 378 assert setting.app_settings_value is True
368 379 cleanup.append(setting)
369 380 finally:
370 381 for setting in cleanup:
371 382 Session().delete(setting)
372 383 Session().commit()
373 384
374 385 def test_create_raises_exception_when_data_incomplete(self, repo_stub):
375 386 model = VcsSettingsModel(repo=repo_stub.repo_name)
376 387
377 388 deleted_key = 'rhodecode_pr_merge_enabled'
378 389 data = GENERAL_FORM_DATA.copy()
379 390 data.pop(deleted_key)
380 391
381 392 with pytest.raises(ValueError) as exc_info:
382 393 model._create_or_update_general_settings(model.repo_settings, data)
394 Session().commit()
383 395
384 396 msg = 'The given data does not contain {} key'.format(deleted_key)
385 397 assert str(exc_info.value) == msg
386 398
387 399 def test_update_when_repo_setting_found(self, repo_stub, settings_util):
388 400 model = VcsSettingsModel(repo=repo_stub.repo_name)
389 401 for name in model.GENERAL_SETTINGS:
390 402 settings_util.create_repo_rhodecode_setting(
391 403 repo_stub, name, False, 'bool')
392 404
393 405 model._create_or_update_general_settings(
394 406 model.repo_settings, GENERAL_FORM_DATA)
407 Session().commit()
395 408
396 409 for name in model.GENERAL_SETTINGS:
397 410 setting = model.repo_settings.get_setting_by_name(name)
398 411 assert setting.app_settings_value is True
399 412
400 413
401 414 class TestCreateRepoSvnSettings(object):
402 415 def test_calls_create_svn_settings(self, repo_stub):
403 416 model = VcsSettingsModel(repo=repo_stub.repo_name)
404 417 with mock.patch.object(model, '_create_svn_settings') as create_mock:
405 418 model.create_repo_svn_settings(SVN_FORM_DATA)
419 Session().commit()
420
406 421 create_mock.assert_called_once_with(model.repo_settings, SVN_FORM_DATA)
407 422
408 423 def test_raises_exception_when_repository_is_not_specified(self):
409 424 model = VcsSettingsModel()
410 425 with pytest.raises(Exception) as exc_info:
411 426 model.create_repo_svn_settings(SVN_FORM_DATA)
427 Session().commit()
428
412 429 assert str(exc_info.value) == 'Repository is not specified'
413 430
414 431
415 432 class TestCreateSvnSettings(object):
416 433 def test_create(self, repo_stub):
417 434 model = VcsSettingsModel(repo=repo_stub.repo_name)
418 435 model._create_svn_settings(model.repo_settings, SVN_FORM_DATA)
419 436 Session().commit()
420 437
421 438 branch_ui = model.repo_settings.get_ui_by_section(
422 439 model.SVN_BRANCH_SECTION)
423 440 tag_ui = model.repo_settings.get_ui_by_section(
424 441 model.SVN_TAG_SECTION)
425 442
426 443 try:
427 444 assert len(branch_ui) == 1
428 445 assert len(tag_ui) == 1
429 446 finally:
430 447 Session().delete(branch_ui[0])
431 448 Session().delete(tag_ui[0])
432 449 Session().commit()
433 450
434 451 def test_create_tag(self, repo_stub):
435 452 model = VcsSettingsModel(repo=repo_stub.repo_name)
436 453 data = SVN_FORM_DATA.copy()
437 454 data.pop('new_svn_branch')
438 455 model._create_svn_settings(model.repo_settings, data)
439 456 Session().commit()
440 457
441 458 branch_ui = model.repo_settings.get_ui_by_section(
442 459 model.SVN_BRANCH_SECTION)
443 460 tag_ui = model.repo_settings.get_ui_by_section(
444 461 model.SVN_TAG_SECTION)
445 462
446 463 try:
447 464 assert len(branch_ui) == 0
448 465 assert len(tag_ui) == 1
449 466 finally:
450 467 Session().delete(tag_ui[0])
451 468 Session().commit()
452 469
453 470 def test_create_nothing_when_no_svn_settings_specified(self, repo_stub):
454 471 model = VcsSettingsModel(repo=repo_stub.repo_name)
455 472 model._create_svn_settings(model.repo_settings, {})
456 473 Session().commit()
457 474
458 475 branch_ui = model.repo_settings.get_ui_by_section(
459 476 model.SVN_BRANCH_SECTION)
460 477 tag_ui = model.repo_settings.get_ui_by_section(
461 478 model.SVN_TAG_SECTION)
462 479
463 480 assert len(branch_ui) == 0
464 481 assert len(tag_ui) == 0
465 482
466 483 def test_create_nothing_when_empty_settings_specified(self, repo_stub):
467 484 model = VcsSettingsModel(repo=repo_stub.repo_name)
468 485 data = {
469 486 'new_svn_branch': '',
470 487 'new_svn_tag': ''
471 488 }
472 489 model._create_svn_settings(model.repo_settings, data)
473 490 Session().commit()
474 491
475 492 branch_ui = model.repo_settings.get_ui_by_section(
476 493 model.SVN_BRANCH_SECTION)
477 494 tag_ui = model.repo_settings.get_ui_by_section(
478 495 model.SVN_TAG_SECTION)
479 496
480 497 assert len(branch_ui) == 0
481 498 assert len(tag_ui) == 0
482 499
483 500
484 501 class TestCreateOrUpdateUi(object):
485 502 def test_create(self, repo_stub):
486 503 model = VcsSettingsModel(repo=repo_stub.repo_name)
487 504 model._create_or_update_ui(
488 505 model.repo_settings, 'test-section', 'test-key', active=False,
489 506 value='False')
490 507 Session().commit()
491 508
492 509 created_ui = model.repo_settings.get_ui_by_section_and_key(
493 510 'test-section', 'test-key')
494 511
495 512 try:
496 513 assert created_ui.ui_active is False
497 514 assert str2bool(created_ui.ui_value) is False
498 515 finally:
499 516 Session().delete(created_ui)
500 517 Session().commit()
501 518
502 519 def test_update(self, repo_stub, settings_util):
503 520 model = VcsSettingsModel(repo=repo_stub.repo_name)
504 521 # care about only 3 first settings
505 522 largefiles, phases, evolve = model.HG_SETTINGS[:3]
506 523
507 524 section = 'test-section'
508 525 key = 'test-key'
509 526 settings_util.create_repo_rhodecode_ui(
510 527 repo_stub, section, 'True', key=key, active=True)
511 528
512 529 model._create_or_update_ui(
513 530 model.repo_settings, section, key, active=False, value='False')
514 531 Session().commit()
515 532
516 533 created_ui = model.repo_settings.get_ui_by_section_and_key(
517 534 section, key)
518 535 assert created_ui.ui_active is False
519 536 assert str2bool(created_ui.ui_value) is False
520 537
521 538
522 539 class TestCreateOrUpdateRepoHgSettings(object):
523 540 FORM_DATA = {
524 541 'extensions_largefiles': False,
525 542 'extensions_evolve': False,
526 543 'phases_publish': False
527 544 }
528 545
529 546 def test_creates_repo_hg_settings_when_data_is_correct(self, repo_stub):
530 547 model = VcsSettingsModel(repo=repo_stub.repo_name)
531 548 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
532 549 model.create_or_update_repo_hg_settings(self.FORM_DATA)
533 550 expected_calls = [
534 551 mock.call(model.repo_settings, 'extensions', 'largefiles', active=False, value=''),
535 552 mock.call(model.repo_settings, 'extensions', 'evolve', active=False, value=''),
536 553 mock.call(model.repo_settings, 'experimental', 'evolution', active=False, value=''),
537 554 mock.call(model.repo_settings, 'experimental', 'evolution.exchange', active=False, value='no'),
538 555 mock.call(model.repo_settings, 'extensions', 'topic', active=False, value=''),
539 556 mock.call(model.repo_settings, 'phases', 'publish', value='False'),
540 557 ]
541 558 assert expected_calls == create_mock.call_args_list
542 559
543 560 @pytest.mark.parametrize('field_to_remove', FORM_DATA.keys())
544 561 def test_key_is_not_found(self, repo_stub, field_to_remove):
545 562 model = VcsSettingsModel(repo=repo_stub.repo_name)
546 563 data = self.FORM_DATA.copy()
547 564 data.pop(field_to_remove)
548 565 with pytest.raises(ValueError) as exc_info:
549 566 model.create_or_update_repo_hg_settings(data)
567 Session().commit()
568
550 569 expected_message = 'The given data does not contain {} key'.format(
551 570 field_to_remove)
552 571 assert str(exc_info.value) == expected_message
553 572
554 573 def test_create_raises_exception_when_repository_not_specified(self):
555 574 model = VcsSettingsModel()
556 575 with pytest.raises(Exception) as exc_info:
557 576 model.create_or_update_repo_hg_settings(self.FORM_DATA)
577 Session().commit()
578
558 579 assert str(exc_info.value) == 'Repository is not specified'
559 580
560 581
561 582 class TestUpdateGlobalSslSetting(object):
562 583 def test_updates_global_hg_settings(self):
563 584 model = VcsSettingsModel()
564 585 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
565 586 model.update_global_ssl_setting('False')
587 Session().commit()
588
566 589 create_mock.assert_called_once_with(
567 590 model.global_settings, 'web', 'push_ssl', value='False')
568 591
569 592
570 593 class TestUpdateGlobalPathSetting(object):
571 594 def test_updates_global_path_settings(self):
572 595 model = VcsSettingsModel()
573 596 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
574 597 model.update_global_path_setting('False')
598 Session().commit()
599
575 600 create_mock.assert_called_once_with(
576 601 model.global_settings, 'paths', '/', value='False')
577 602
578 603
579 604 class TestCreateOrUpdateGlobalHgSettings(object):
580 605 FORM_DATA = {
581 606 'extensions_largefiles': False,
582 607 'largefiles_usercache': '/example/largefiles-store',
583 608 'phases_publish': False,
584 609 'extensions_hgsubversion': False,
585 610 'extensions_evolve': False
586 611 }
587 612
588 613 def test_creates_repo_hg_settings_when_data_is_correct(self):
589 614 model = VcsSettingsModel()
590 615 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
591 616 model.create_or_update_global_hg_settings(self.FORM_DATA)
617 Session().commit()
618
592 619 expected_calls = [
593 620 mock.call(model.global_settings, 'extensions', 'largefiles', active=False, value=''),
594 621 mock.call(model.global_settings, 'largefiles', 'usercache', value='/example/largefiles-store'),
595 622 mock.call(model.global_settings, 'phases', 'publish', value='False'),
596 623 mock.call(model.global_settings, 'extensions', 'hgsubversion', active=False),
597 624 mock.call(model.global_settings, 'extensions', 'evolve', active=False, value=''),
598 625 mock.call(model.global_settings, 'experimental', 'evolution', active=False, value=''),
599 626 mock.call(model.global_settings, 'experimental', 'evolution.exchange', active=False, value='no'),
600 627 mock.call(model.global_settings, 'extensions', 'topic', active=False, value=''),
601 628 ]
602 629
603 630 assert expected_calls == create_mock.call_args_list
604 631
605 632 @pytest.mark.parametrize('field_to_remove', FORM_DATA.keys())
606 633 def test_key_is_not_found(self, repo_stub, field_to_remove):
607 634 model = VcsSettingsModel(repo=repo_stub.repo_name)
608 635 data = self.FORM_DATA.copy()
609 636 data.pop(field_to_remove)
610 637 with pytest.raises(Exception) as exc_info:
611 638 model.create_or_update_global_hg_settings(data)
639 Session().commit()
640
612 641 expected_message = 'The given data does not contain {} key'.format(
613 642 field_to_remove)
614 643 assert str(exc_info.value) == expected_message
615 644
616 645
617 646 class TestCreateOrUpdateGlobalGitSettings(object):
618 647 FORM_DATA = {
619 648 'vcs_git_lfs_enabled': False,
620 649 'vcs_git_lfs_store_location': '/example/lfs-store',
621 650 }
622 651
623 652 def test_creates_repo_hg_settings_when_data_is_correct(self):
624 653 model = VcsSettingsModel()
625 654 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
626 655 model.create_or_update_global_git_settings(self.FORM_DATA)
656 Session().commit()
657
627 658 expected_calls = [
628 659 mock.call(model.global_settings, 'vcs_git_lfs', 'enabled', active=False, value=False),
629 660 mock.call(model.global_settings, 'vcs_git_lfs', 'store_location', value='/example/lfs-store'),
630 661 ]
631 662 assert expected_calls == create_mock.call_args_list
632 663
633 664
634 665 class TestDeleteRepoSvnPattern(object):
635 666 def test_success_when_repo_is_set(self, backend_svn, settings_util):
636 667 repo = backend_svn.create_repo()
637 668 repo_name = repo.repo_name
638 669
639 670 model = VcsSettingsModel(repo=repo_name)
640 671 entry = settings_util.create_repo_rhodecode_ui(
641 672 repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'svn-branch')
642 673 Session().commit()
643 674
644 675 model.delete_repo_svn_pattern(entry.ui_id)
645 676
646 677 def test_fail_when_delete_id_from_other_repo(self, backend_svn):
647 678 repo_name = backend_svn.repo_name
648 679 model = VcsSettingsModel(repo=repo_name)
649 680 delete_ui_patch = mock.patch.object(model.repo_settings, 'delete_ui')
650 681 with delete_ui_patch as delete_ui_mock:
651 682 model.delete_repo_svn_pattern(123)
683 Session().commit()
684
652 685 delete_ui_mock.assert_called_once_with(-1)
653 686
654 687 def test_raises_exception_when_repository_is_not_specified(self):
655 688 model = VcsSettingsModel()
656 689 with pytest.raises(Exception) as exc_info:
657 690 model.delete_repo_svn_pattern(123)
658 691 assert str(exc_info.value) == 'Repository is not specified'
659 692
660 693
661 694 class TestDeleteGlobalSvnPattern(object):
662 695 def test_delete_global_svn_pattern_calls_delete_ui(self):
663 696 model = VcsSettingsModel()
664 697 delete_ui_patch = mock.patch.object(model.global_settings, 'delete_ui')
665 698 with delete_ui_patch as delete_ui_mock:
666 699 model.delete_global_svn_pattern(123)
667 700 delete_ui_mock.assert_called_once_with(123)
668 701
669 702
670 703 class TestFilterUiSettings(object):
671 704 def test_settings_are_filtered(self):
672 705 model = VcsSettingsModel()
673 706 repo_settings = [
674 707 UiSetting('extensions', 'largefiles', '', True),
675 708 UiSetting('phases', 'publish', 'True', True),
676 709 UiSetting('hooks', 'changegroup.repo_size', 'hook', True),
677 710 UiSetting('hooks', 'changegroup.push_logger', 'hook', True),
678 711 UiSetting('hooks', 'outgoing.pull_logger', 'hook', True),
679 712 UiSetting(
680 713 'vcs_svn_branch', '84223c972204fa545ca1b22dac7bef5b68d7442d',
681 714 'test_branch', True),
682 715 UiSetting(
683 716 'vcs_svn_tag', '84229c972204fa545ca1b22dac7bef5b68d7442d',
684 717 'test_tag', True),
685 718 ]
686 719 non_repo_settings = [
687 720 UiSetting('largefiles', 'usercache', '/example/largefiles-store', True),
688 721 UiSetting('test', 'outgoing.pull_logger', 'hook', True),
689 722 UiSetting('hooks', 'test2', 'hook', True),
690 723 UiSetting(
691 724 'vcs_svn_repo', '84229c972204fa545ca1b22dac7bef5b68d7442d',
692 725 'test_tag', True),
693 726 ]
694 727 settings = repo_settings + non_repo_settings
695 728 filtered_settings = model._filter_ui_settings(settings)
696 729 assert sorted(filtered_settings) == sorted(repo_settings)
697 730
698 731
699 732 class TestFilterGeneralSettings(object):
700 733 def test_settings_are_filtered(self):
701 734 model = VcsSettingsModel()
702 735 settings = {
703 736 'rhodecode_abcde': 'value1',
704 737 'rhodecode_vwxyz': 'value2',
705 738 }
706 739 general_settings = {
707 740 'rhodecode_{}'.format(key): 'value'
708 741 for key in VcsSettingsModel.GENERAL_SETTINGS
709 742 }
710 743 settings.update(general_settings)
711 744
712 745 filtered_settings = model._filter_general_settings(general_settings)
713 746 assert sorted(filtered_settings) == sorted(general_settings)
714 747
715 748
716 749 class TestGetRepoUiSettings(object):
717 750 def test_global_uis_are_returned_when_no_repo_uis_found(
718 751 self, repo_stub):
719 752 model = VcsSettingsModel(repo=repo_stub.repo_name)
720 753 result = model.get_repo_ui_settings()
721 754 svn_sections = (
722 755 VcsSettingsModel.SVN_TAG_SECTION,
723 756 VcsSettingsModel.SVN_BRANCH_SECTION)
724 757 expected_result = [
725 758 s for s in model.global_settings.get_ui()
726 759 if s.section not in svn_sections]
727 760 assert sorted(result) == sorted(expected_result)
728 761
729 762 def test_repo_uis_are_overriding_global_uis(
730 763 self, repo_stub, settings_util):
731 764 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
732 765 settings_util.create_repo_rhodecode_ui(
733 766 repo_stub, section, 'repo', key=key, active=False)
734 767 model = VcsSettingsModel(repo=repo_stub.repo_name)
735 768 result = model.get_repo_ui_settings()
736 769 for setting in result:
737 770 locator = (setting.section, setting.key)
738 771 if locator in VcsSettingsModel.HOOKS_SETTINGS:
739 772 assert setting.value == 'repo'
740 773
741 774 assert setting.active is False
742 775
743 776 def test_global_svn_patterns_are_not_in_list(
744 777 self, repo_stub, settings_util):
745 778 svn_sections = (
746 779 VcsSettingsModel.SVN_TAG_SECTION,
747 780 VcsSettingsModel.SVN_BRANCH_SECTION)
748 781 for section in svn_sections:
749 782 settings_util.create_rhodecode_ui(
750 783 section, 'repo', key='deadbeef' + section, active=False)
784 Session().commit()
785
751 786 model = VcsSettingsModel(repo=repo_stub.repo_name)
752 787 result = model.get_repo_ui_settings()
753 788 for setting in result:
754 789 assert setting.section not in svn_sections
755 790
756 791 def test_repo_uis_filtered_by_section_are_returned(
757 792 self, repo_stub, settings_util):
758 793 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
759 794 settings_util.create_repo_rhodecode_ui(
760 795 repo_stub, section, 'repo', key=key, active=False)
761 796 model = VcsSettingsModel(repo=repo_stub.repo_name)
762 797 section, key = VcsSettingsModel.HOOKS_SETTINGS[0]
763 798 result = model.get_repo_ui_settings(section=section)
764 799 for setting in result:
765 800 assert setting.section == section
766 801
767 802 def test_repo_uis_filtered_by_key_are_returned(
768 803 self, repo_stub, settings_util):
769 804 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
770 805 settings_util.create_repo_rhodecode_ui(
771 806 repo_stub, section, 'repo', key=key, active=False)
772 807 model = VcsSettingsModel(repo=repo_stub.repo_name)
773 808 section, key = VcsSettingsModel.HOOKS_SETTINGS[0]
774 809 result = model.get_repo_ui_settings(key=key)
775 810 for setting in result:
776 811 assert setting.key == key
777 812
778 813 def test_raises_exception_when_repository_is_not_specified(self):
779 814 model = VcsSettingsModel()
780 815 with pytest.raises(Exception) as exc_info:
781 816 model.get_repo_ui_settings()
782 817 assert str(exc_info.value) == 'Repository is not specified'
783 818
784 819
785 820 class TestGetRepoGeneralSettings(object):
786 821 def test_global_settings_are_returned_when_no_repo_settings_found(
787 822 self, repo_stub):
788 823 model = VcsSettingsModel(repo=repo_stub.repo_name)
789 824 result = model.get_repo_general_settings()
790 825 expected_result = model.global_settings.get_all_settings()
791 826 assert sorted(result) == sorted(expected_result)
792 827
793 828 def test_repo_uis_are_overriding_global_uis(
794 829 self, repo_stub, settings_util):
795 830 for key in VcsSettingsModel.GENERAL_SETTINGS:
796 831 settings_util.create_repo_rhodecode_setting(
797 832 repo_stub, key, 'abcde', type_='unicode')
833 Session().commit()
834
798 835 model = VcsSettingsModel(repo=repo_stub.repo_name)
799 836 result = model.get_repo_ui_settings()
800 837 for key in result:
801 838 if key in VcsSettingsModel.GENERAL_SETTINGS:
802 839 assert result[key] == 'abcde'
803 840
804 841 def test_raises_exception_when_repository_is_not_specified(self):
805 842 model = VcsSettingsModel()
806 843 with pytest.raises(Exception) as exc_info:
807 844 model.get_repo_general_settings()
808 845 assert str(exc_info.value) == 'Repository is not specified'
809 846
810 847
811 848 class TestGetGlobalGeneralSettings(object):
812 849 def test_global_settings_are_returned(self, repo_stub):
813 850 model = VcsSettingsModel()
814 851 result = model.get_global_general_settings()
815 852 expected_result = model.global_settings.get_all_settings()
816 853 assert sorted(result) == sorted(expected_result)
817 854
818 855 def test_repo_uis_are_not_overriding_global_uis(
819 856 self, repo_stub, settings_util):
820 857 for key in VcsSettingsModel.GENERAL_SETTINGS:
821 858 settings_util.create_repo_rhodecode_setting(
822 859 repo_stub, key, 'abcde', type_='unicode')
860 Session().commit()
861
823 862 model = VcsSettingsModel(repo=repo_stub.repo_name)
824 863 result = model.get_global_general_settings()
825 864 expected_result = model.global_settings.get_all_settings()
826 865 assert sorted(result) == sorted(expected_result)
827 866
828 867
829 868 class TestGetGlobalUiSettings(object):
830 869 def test_global_uis_are_returned(self, repo_stub):
831 870 model = VcsSettingsModel()
832 871 result = model.get_global_ui_settings()
833 872 expected_result = model.global_settings.get_ui()
834 873 assert sorted(result) == sorted(expected_result)
835 874
836 875 def test_repo_uis_are_not_overriding_global_uis(
837 876 self, repo_stub, settings_util):
838 877 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
839 878 settings_util.create_repo_rhodecode_ui(
840 879 repo_stub, section, 'repo', key=key, active=False)
880 Session().commit()
881
841 882 model = VcsSettingsModel(repo=repo_stub.repo_name)
842 883 result = model.get_global_ui_settings()
843 884 expected_result = model.global_settings.get_ui()
844 885 assert sorted(result) == sorted(expected_result)
845 886
846 887 def test_ui_settings_filtered_by_section(
847 888 self, repo_stub, settings_util):
848 889 model = VcsSettingsModel(repo=repo_stub.repo_name)
849 890 section, key = VcsSettingsModel.HOOKS_SETTINGS[0]
850 891 result = model.get_global_ui_settings(section=section)
851 892 expected_result = model.global_settings.get_ui(section=section)
852 893 assert sorted(result) == sorted(expected_result)
853 894
854 895 def test_ui_settings_filtered_by_key(
855 896 self, repo_stub, settings_util):
856 897 model = VcsSettingsModel(repo=repo_stub.repo_name)
857 898 section, key = VcsSettingsModel.HOOKS_SETTINGS[0]
858 899 result = model.get_global_ui_settings(key=key)
859 900 expected_result = model.global_settings.get_ui(key=key)
860 901 assert sorted(result) == sorted(expected_result)
861 902
862 903
863 904 class TestGetGeneralSettings(object):
864 905 def test_global_settings_are_returned_when_inherited_is_true(
865 906 self, repo_stub, settings_util):
866 907 model = VcsSettingsModel(repo=repo_stub.repo_name)
867 908 model.inherit_global_settings = True
868 909 for key in VcsSettingsModel.GENERAL_SETTINGS:
869 910 settings_util.create_repo_rhodecode_setting(
870 911 repo_stub, key, 'abcde', type_='unicode')
912 Session().commit()
913
871 914 result = model.get_general_settings()
872 915 expected_result = model.get_global_general_settings()
873 916 assert sorted(result) == sorted(expected_result)
874 917
875 918 def test_repo_settings_are_returned_when_inherited_is_false(
876 919 self, repo_stub, settings_util):
877 920 model = VcsSettingsModel(repo=repo_stub.repo_name)
878 921 model.inherit_global_settings = False
879 922 for key in VcsSettingsModel.GENERAL_SETTINGS:
880 923 settings_util.create_repo_rhodecode_setting(
881 924 repo_stub, key, 'abcde', type_='unicode')
925 Session().commit()
926
882 927 result = model.get_general_settings()
883 928 expected_result = model.get_repo_general_settings()
884 929 assert sorted(result) == sorted(expected_result)
885 930
886 931 def test_global_settings_are_returned_when_no_repository_specified(self):
887 932 model = VcsSettingsModel()
888 933 result = model.get_general_settings()
889 934 expected_result = model.get_global_general_settings()
890 935 assert sorted(result) == sorted(expected_result)
891 936
892 937
893 938 class TestGetUiSettings(object):
894 939 def test_global_settings_are_returned_when_inherited_is_true(
895 940 self, repo_stub, settings_util):
896 941 model = VcsSettingsModel(repo=repo_stub.repo_name)
897 942 model.inherit_global_settings = True
898 943 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
899 944 settings_util.create_repo_rhodecode_ui(
900 945 repo_stub, section, 'repo', key=key, active=True)
946 Session().commit()
947
901 948 result = model.get_ui_settings()
902 949 expected_result = model.get_global_ui_settings()
903 950 assert sorted(result) == sorted(expected_result)
904 951
905 952 def test_repo_settings_are_returned_when_inherited_is_false(
906 953 self, repo_stub, settings_util):
907 954 model = VcsSettingsModel(repo=repo_stub.repo_name)
908 955 model.inherit_global_settings = False
909 956 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
910 957 settings_util.create_repo_rhodecode_ui(
911 958 repo_stub, section, 'repo', key=key, active=True)
959 Session().commit()
960
912 961 result = model.get_ui_settings()
913 962 expected_result = model.get_repo_ui_settings()
914 963 assert sorted(result) == sorted(expected_result)
915 964
916 965 def test_repo_settings_filtered_by_section_and_key(self, repo_stub):
917 966 model = VcsSettingsModel(repo=repo_stub.repo_name)
918 967 model.inherit_global_settings = False
968
919 969 args = ('section', 'key')
920 970 with mock.patch.object(model, 'get_repo_ui_settings') as settings_mock:
921 971 model.get_ui_settings(*args)
972 Session().commit()
973
922 974 settings_mock.assert_called_once_with(*args)
923 975
924 976 def test_global_settings_filtered_by_section_and_key(self):
925 977 model = VcsSettingsModel()
926 978 args = ('section', 'key')
927 979 with mock.patch.object(model, 'get_global_ui_settings') as (
928 980 settings_mock):
929 981 model.get_ui_settings(*args)
930 982 settings_mock.assert_called_once_with(*args)
931 983
932 984 def test_global_settings_are_returned_when_no_repository_specified(self):
933 985 model = VcsSettingsModel()
934 986 result = model.get_ui_settings()
935 987 expected_result = model.get_global_ui_settings()
936 988 assert sorted(result) == sorted(expected_result)
937 989
938 990
939 991 class TestGetSvnPatterns(object):
940 992 def test_repo_settings_filtered_by_section_and_key(self, repo_stub):
941 993 model = VcsSettingsModel(repo=repo_stub.repo_name)
942 994 args = ('section', )
943 995 with mock.patch.object(model, 'get_repo_ui_settings') as settings_mock:
944 996 model.get_svn_patterns(*args)
997
998 Session().commit()
945 999 settings_mock.assert_called_once_with(*args)
946 1000
947 1001 def test_global_settings_filtered_by_section_and_key(self):
948 1002 model = VcsSettingsModel()
949 1003 args = ('section', )
950 1004 with mock.patch.object(model, 'get_global_ui_settings') as (
951 1005 settings_mock):
952 1006 model.get_svn_patterns(*args)
953 1007 settings_mock.assert_called_once_with(*args)
954 1008
955 1009
956 1010 class TestGetReposLocation(object):
957 1011 def test_returns_repos_location(self, repo_stub):
958 1012 model = VcsSettingsModel()
959 1013
960 1014 result_mock = mock.Mock()
961 1015 result_mock.ui_value = '/tmp'
962 1016
963 1017 with mock.patch.object(model, 'global_settings') as settings_mock:
964 1018 settings_mock.get_ui_by_key.return_value = result_mock
965 1019 result = model.get_repos_location()
966 1020
967 1021 settings_mock.get_ui_by_key.assert_called_once_with('/')
968 1022 assert result == '/tmp'
969 1023
970 1024
971 1025 class TestCreateOrUpdateRepoSettings(object):
972 1026 FORM_DATA = {
973 1027 'inherit_global_settings': False,
974 1028 'hooks_changegroup_repo_size': False,
975 1029 'hooks_changegroup_push_logger': False,
976 1030 'hooks_outgoing_pull_logger': False,
977 1031 'extensions_largefiles': False,
978 1032 'extensions_evolve': False,
979 1033 'largefiles_usercache': '/example/largefiles-store',
980 1034 'vcs_git_lfs_enabled': False,
981 1035 'vcs_git_lfs_store_location': '/',
982 1036 'phases_publish': 'False',
983 1037 'rhodecode_pr_merge_enabled': False,
984 1038 'rhodecode_use_outdated_comments': False,
985 1039 'new_svn_branch': '',
986 1040 'new_svn_tag': ''
987 1041 }
988 1042
989 1043 def test_get_raises_exception_when_repository_not_specified(self):
990 1044 model = VcsSettingsModel()
991 1045 with pytest.raises(Exception) as exc_info:
992 1046 model.create_or_update_repo_settings(data=self.FORM_DATA)
1047 Session().commit()
1048
993 1049 assert str(exc_info.value) == 'Repository is not specified'
994 1050
995 1051 def test_only_svn_settings_are_updated_when_type_is_svn(self, backend_svn):
996 1052 repo = backend_svn.create_repo()
997 1053 model = VcsSettingsModel(repo=repo)
998 1054 with self._patch_model(model) as mocks:
999 1055 model.create_or_update_repo_settings(
1000 1056 data=self.FORM_DATA, inherit_global_settings=False)
1057 Session().commit()
1058
1001 1059 mocks['create_repo_svn_settings'].assert_called_once_with(
1002 1060 self.FORM_DATA)
1003 1061 non_called_methods = (
1004 1062 'create_or_update_repo_hook_settings',
1005 1063 'create_or_update_repo_pr_settings',
1006 1064 'create_or_update_repo_hg_settings')
1007 1065 for method in non_called_methods:
1008 1066 assert mocks[method].call_count == 0
1009 1067
1010 1068 def test_non_svn_settings_are_updated_when_type_is_hg(self, backend_hg):
1011 1069 repo = backend_hg.create_repo()
1012 1070 model = VcsSettingsModel(repo=repo)
1013 1071 with self._patch_model(model) as mocks:
1014 1072 model.create_or_update_repo_settings(
1015 1073 data=self.FORM_DATA, inherit_global_settings=False)
1074 Session().commit()
1016 1075
1017 1076 assert mocks['create_repo_svn_settings'].call_count == 0
1018 1077 called_methods = (
1019 1078 'create_or_update_repo_hook_settings',
1020 1079 'create_or_update_repo_pr_settings',
1021 1080 'create_or_update_repo_hg_settings')
1022 1081 for method in called_methods:
1023 1082 mocks[method].assert_called_once_with(self.FORM_DATA)
1024 1083
1025 1084 def test_non_svn_and_hg_settings_are_updated_when_type_is_git(
1026 1085 self, backend_git):
1027 1086 repo = backend_git.create_repo()
1028 1087 model = VcsSettingsModel(repo=repo)
1029 1088 with self._patch_model(model) as mocks:
1030 1089 model.create_or_update_repo_settings(
1031 1090 data=self.FORM_DATA, inherit_global_settings=False)
1032 1091
1033 1092 assert mocks['create_repo_svn_settings'].call_count == 0
1034 1093 called_methods = (
1035 1094 'create_or_update_repo_hook_settings',
1036 1095 'create_or_update_repo_pr_settings')
1037 1096 non_called_methods = (
1038 1097 'create_repo_svn_settings',
1039 1098 'create_or_update_repo_hg_settings'
1040 1099 )
1041 1100 for method in called_methods:
1042 1101 mocks[method].assert_called_once_with(self.FORM_DATA)
1043 1102 for method in non_called_methods:
1044 1103 assert mocks[method].call_count == 0
1045 1104
1046 1105 def test_no_methods_are_called_when_settings_are_inherited(
1047 1106 self, backend):
1048 1107 repo = backend.create_repo()
1049 1108 model = VcsSettingsModel(repo=repo)
1050 1109 with self._patch_model(model) as mocks:
1051 1110 model.create_or_update_repo_settings(
1052 1111 data=self.FORM_DATA, inherit_global_settings=True)
1053 1112 for method_name in mocks:
1054 1113 assert mocks[method_name].call_count == 0
1055 1114
1056 1115 def test_cache_is_marked_for_invalidation(self, repo_stub):
1057 1116 model = VcsSettingsModel(repo=repo_stub)
1058 1117 invalidation_patcher = mock.patch(
1059 1118 'rhodecode.model.scm.ScmModel.mark_for_invalidation')
1060 1119 with invalidation_patcher as invalidation_mock:
1061 1120 model.create_or_update_repo_settings(
1062 1121 data=self.FORM_DATA, inherit_global_settings=True)
1122 Session().commit()
1123
1063 1124 invalidation_mock.assert_called_once_with(
1064 1125 repo_stub.repo_name, delete=True)
1065 1126
1066 1127 def test_inherit_flag_is_saved(self, repo_stub):
1067 1128 model = VcsSettingsModel(repo=repo_stub)
1068 1129 model.inherit_global_settings = True
1069 1130 with self._patch_model(model):
1070 1131 model.create_or_update_repo_settings(
1071 1132 data=self.FORM_DATA, inherit_global_settings=False)
1133 Session().commit()
1134
1072 1135 assert model.inherit_global_settings is False
1073 1136
1074 1137 def _patch_model(self, model):
1075 1138 return mock.patch.multiple(
1076 1139 model,
1077 1140 create_repo_svn_settings=mock.DEFAULT,
1078 1141 create_or_update_repo_hook_settings=mock.DEFAULT,
1079 1142 create_or_update_repo_pr_settings=mock.DEFAULT,
1080 1143 create_or_update_repo_hg_settings=mock.DEFAULT)
@@ -1,735 +1,744 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 import pytest
22 22
23 23 from rhodecode.lib.auth import AuthUser
24 24 from rhodecode.model.db import (
25 25 RepoGroup, User, UserGroupRepoGroupToPerm, Permission, UserToPerm,
26 26 UserGroupToPerm)
27 27 from rhodecode.model.meta import Session
28 28 from rhodecode.model.permission import PermissionModel
29 29 from rhodecode.model.repo import RepoModel
30 30 from rhodecode.model.repo_group import RepoGroupModel
31 31 from rhodecode.model.user import UserModel
32 32 from rhodecode.model.user_group import UserGroupModel
33 33 from rhodecode.tests.fixture import Fixture
34 34
35 35
36 36 fixture = Fixture()
37 37
38 38
39 39 @pytest.fixture()
40 40 def repo_name(backend_hg):
41 41 return backend_hg.repo_name
42 42
43 43
44 44 class TestPermissions(object):
45 45
46 46 @pytest.fixture(scope='class', autouse=True)
47 47 def default_permissions(self, request, baseapp):
48 48 # recreate default user to get a clean start
49 49 PermissionModel().create_default_user_permissions(
50 50 user=User.DEFAULT_USER, force=True)
51 51 Session().commit()
52 52
53 53 @pytest.fixture(autouse=True)
54 54 def prepare_users(self, request):
55 55 # TODO: User creation is a duplicate of test_nofitications, check
56 56 # if that can be unified
57 57 self.u1 = UserModel().create_or_update(
58 58 username=u'u1', password=u'qweqwe',
59 59 email=u'u1@rhodecode.org', firstname=u'u1', lastname=u'u1'
60 60 )
61 61 self.u2 = UserModel().create_or_update(
62 62 username=u'u2', password=u'qweqwe',
63 63 email=u'u2@rhodecode.org', firstname=u'u2', lastname=u'u2'
64 64 )
65 65 self.u3 = UserModel().create_or_update(
66 66 username=u'u3', password=u'qweqwe',
67 67 email=u'u3@rhodecode.org', firstname=u'u3', lastname=u'u3'
68 68 )
69 69 self.anon = User.get_default_user()
70 70 self.a1 = UserModel().create_or_update(
71 71 username=u'a1', password=u'qweqwe',
72 72 email=u'a1@rhodecode.org', firstname=u'a1', lastname=u'a1',
73 73 admin=True
74 74 )
75 75 Session().commit()
76 76
77 77 request.addfinalizer(self.cleanup)
78 78
79 79 def cleanup(self):
80 80 if hasattr(self, 'test_repo'):
81 81 RepoModel().delete(repo=self.test_repo)
82 Session().commit()
82 83
83 84 if hasattr(self, 'g1'):
84 85 RepoGroupModel().delete(self.g1.group_id)
85 86 if hasattr(self, 'g2'):
86 87 RepoGroupModel().delete(self.g2.group_id)
88 Session().commit()
87 89
88 UserModel().delete(self.u1)
89 UserModel().delete(self.u2)
90 UserModel().delete(self.u3)
91 UserModel().delete(self.a1)
90 UserModel().delete(self.u1, handle_repos='delete', handle_repo_groups='delete')
91 UserModel().delete(self.u2, handle_repos='delete', handle_repo_groups='delete')
92 UserModel().delete(self.u3, handle_repos='delete', handle_repo_groups='delete')
93 UserModel().delete(self.a1, handle_repos='delete', handle_repo_groups='delete')
94 Session().commit()
92 95
93 96 if hasattr(self, 'ug1'):
94 97 UserGroupModel().delete(self.ug1, force=True)
95
96 Session().commit()
98 Session().commit()
97 99
98 100 def test_default_perms_set(self, repo_name):
99 101 assert repo_perms(self.u1)[repo_name] == 'repository.read'
100 102 new_perm = 'repository.write'
101 103 RepoModel().grant_user_permission(repo=repo_name, user=self.u1,
102 104 perm=new_perm)
103 105 Session().commit()
104 106 assert repo_perms(self.u1)[repo_name] == new_perm
105 107
106 108 def test_default_admin_perms_set(self, repo_name):
107 109 assert repo_perms(self.a1)[repo_name] == 'repository.admin'
108 110 RepoModel().grant_user_permission(repo=repo_name, user=self.a1,
109 111 perm='repository.write')
110 112 Session().commit()
111 113 # cannot really downgrade admins permissions !? they still gets set as
112 114 # admin !
113 115 assert repo_perms(self.a1)[repo_name] == 'repository.admin'
114 116
115 117 def test_default_group_perms(self, repo_name):
116 118 self.g1 = fixture.create_repo_group('test1', skip_if_exists=True)
117 119 self.g2 = fixture.create_repo_group('test2', skip_if_exists=True)
118 120
119 121 assert repo_perms(self.u1)[repo_name] == 'repository.read'
120 122 assert group_perms(self.u1) == {
121 123 'test1': 'group.read', 'test2': 'group.read'}
122 124 assert global_perms(self.u1) == set(
123 125 Permission.DEFAULT_USER_PERMISSIONS)
124 126
125 127 def test_default_admin_group_perms(self, repo_name):
126 128 self.g1 = fixture.create_repo_group('test1', skip_if_exists=True)
127 129 self.g2 = fixture.create_repo_group('test2', skip_if_exists=True)
128 130
129 131 assert repo_perms(self.a1)[repo_name] == 'repository.admin'
130 132 assert group_perms(self.a1) == {
131 133 'test1': 'group.admin', 'test2': 'group.admin'}
132 134
133 135 def test_default_owner_repo_perms(self, backend, user_util, test_repo):
134 136 user = user_util.create_user()
135 137 repo = test_repo('minimal', backend.alias)
136 138 org_owner = repo.user
137 139 assert repo_perms(user)[repo.repo_name] == 'repository.read'
138 140
139 141 repo.user = user
140 142 assert repo_perms(user)[repo.repo_name] == 'repository.admin'
141 143 repo.user = org_owner
142 144
143 145 def test_default_owner_branch_perms(self, user_util, test_user_group):
144 146 user = user_util.create_user()
145 147 assert branch_perms(user) == {}
146 148
147 149 def test_default_owner_repo_group_perms(self, user_util, test_repo_group):
148 150 user = user_util.create_user()
149 151 org_owner = test_repo_group.user
150 152
151 153 assert group_perms(user)[test_repo_group.group_name] == 'group.read'
152 154
153 155 test_repo_group.user = user
154 156 assert group_perms(user)[test_repo_group.group_name] == 'group.admin'
155 157 test_repo_group.user = org_owner
156 158
157 159 def test_default_owner_user_group_perms(self, user_util, test_user_group):
158 160 user = user_util.create_user()
159 161 org_owner = test_user_group.user
160 162
161 163 assert user_group_perms(user)[test_user_group.users_group_name] == 'usergroup.read'
162 164
163 165 test_user_group.user = user
164 166 assert user_group_perms(user)[test_user_group.users_group_name] == 'usergroup.admin'
165 167
166 168 test_user_group.user = org_owner
167 169
168 170 def test_propagated_permission_from_users_group_by_explicit_perms_exist(
169 171 self, repo_name):
170 172 # make group
171 173 self.ug1 = fixture.create_user_group('G1')
172 174 UserGroupModel().add_user_to_group(self.ug1, self.u1)
173 175
174 176 # set permission to lower
175 177 new_perm = 'repository.none'
176 178 RepoModel().grant_user_permission(
177 179 repo=repo_name, user=self.u1, perm=new_perm)
178 180 Session().commit()
179 181 assert repo_perms(self.u1)[repo_name] == new_perm
180 182
181 183 # grant perm for group this should not override permission from user
182 184 # since it has explicitly set
183 185 new_perm_gr = 'repository.write'
184 186 RepoModel().grant_user_group_permission(
185 187 repo=repo_name, group_name=self.ug1, perm=new_perm_gr)
188 Session().commit()
186 189
187 190 assert repo_perms(self.u1)[repo_name] == new_perm
188 191 assert group_perms(self.u1) == {}
189 192
190 193 def test_propagated_permission_from_users_group(self, repo_name):
191 194 # make group
192 195 self.ug1 = fixture.create_user_group('G1')
193 196 UserGroupModel().add_user_to_group(self.ug1, self.u3)
194 197
195 198 # grant perm for group
196 199 # this should override default permission from user
197 200 new_perm_gr = 'repository.write'
198 201 RepoModel().grant_user_group_permission(
199 202 repo=repo_name, group_name=self.ug1, perm=new_perm_gr)
203 Session().commit()
200 204
201 205 assert repo_perms(self.u3)[repo_name] == new_perm_gr
202 206 assert group_perms(self.u3) == {}
203 207
204 208 def test_propagated_permission_from_users_group_lower_weight(
205 209 self, repo_name):
206 210 # make group with user
207 211 self.ug1 = fixture.create_user_group('G1')
208 212 UserGroupModel().add_user_to_group(self.ug1, self.u1)
209 213
210 214 # set permission to lower
211 215 new_perm_h = 'repository.write'
212 216 RepoModel().grant_user_permission(
213 217 repo=repo_name, user=self.u1, perm=new_perm_h)
214 218 Session().commit()
215 219
216 220 assert repo_perms(self.u1)[repo_name] == new_perm_h
217 221
218 222 # grant perm for group this should NOT override permission from user
219 223 # since it's lower than granted
220 224 new_perm_l = 'repository.read'
221 225 RepoModel().grant_user_group_permission(
222 226 repo=repo_name, group_name=self.ug1, perm=new_perm_l)
227 Session().commit()
223 228
224 229 assert repo_perms(self.u1)[repo_name] == new_perm_h
225 230 assert group_perms(self.u1) == {}
226 231
227 232 def test_repo_in_group_permissions(self):
228 233 self.g1 = fixture.create_repo_group('group1', skip_if_exists=True)
229 234 self.g2 = fixture.create_repo_group('group2', skip_if_exists=True)
230 235 # both perms should be read !
231 236 assert group_perms(self.u1) == \
232 237 {u'group1': u'group.read', u'group2': u'group.read'}
233 238
234 239 assert group_perms(self.anon) == \
235 240 {u'group1': u'group.read', u'group2': u'group.read'}
236 241
237 242 # Change perms to none for both groups
238 243 RepoGroupModel().grant_user_permission(
239 244 repo_group=self.g1, user=self.anon, perm='group.none')
240 245 RepoGroupModel().grant_user_permission(
241 246 repo_group=self.g2, user=self.anon, perm='group.none')
242 247
243 248 assert group_perms(self.u1) == \
244 249 {u'group1': u'group.none', u'group2': u'group.none'}
245 250 assert group_perms(self.anon) == \
246 251 {u'group1': u'group.none', u'group2': u'group.none'}
247 252
248 253 # add repo to group
249 254 name = RepoGroup.url_sep().join([self.g1.group_name, 'test_perm'])
250 255 self.test_repo = fixture.create_repo(name=name,
251 256 repo_type='hg',
252 257 repo_group=self.g1,
253 258 cur_user=self.u1,)
254 259
255 260 assert group_perms(self.u1) == \
256 261 {u'group1': u'group.none', u'group2': u'group.none'}
257 262 assert group_perms(self.anon) == \
258 263 {u'group1': u'group.none', u'group2': u'group.none'}
259 264
260 265 # grant permission for u2 !
261 266 RepoGroupModel().grant_user_permission(
262 267 repo_group=self.g1, user=self.u2, perm='group.read')
263 268 RepoGroupModel().grant_user_permission(
264 269 repo_group=self.g2, user=self.u2, perm='group.read')
265 270 Session().commit()
266 271 assert self.u1 != self.u2
267 272
268 273 # u1 and anon should have not change perms while u2 should !
269 274 assert group_perms(self.u1) == \
270 275 {u'group1': u'group.none', u'group2': u'group.none'}
271 276 assert group_perms(self.u2) == \
272 277 {u'group1': u'group.read', u'group2': u'group.read'}
273 278 assert group_perms(self.anon) == \
274 279 {u'group1': u'group.none', u'group2': u'group.none'}
275 280
276 281 def test_repo_group_user_as_user_group_member(self):
277 282 # create Group1
278 283 self.g1 = fixture.create_repo_group('group1', skip_if_exists=True)
279 284 assert group_perms(self.anon) == {u'group1': u'group.read'}
280 285
281 286 # set default permission to none
282 287 RepoGroupModel().grant_user_permission(
283 288 repo_group=self.g1, user=self.anon, perm='group.none')
289 Session().commit()
290
284 291 # make group
285 292 self.ug1 = fixture.create_user_group('G1')
286 293 # add user to group
287 294 UserGroupModel().add_user_to_group(self.ug1, self.u1)
288 295 Session().commit()
289 296
290 297 # check if user is in the group
291 298 ug1 = UserGroupModel().get(self.ug1.users_group_id)
292 299 members = [x.user_id for x in ug1.members]
293 300 assert members == [self.u1.user_id]
294 301 # add some user to that group
295 302
296 303 # check his permissions
297 304 assert group_perms(self.anon) == {u'group1': u'group.none'}
298 305 assert group_perms(self.u1) == {u'group1': u'group.none'}
299 306
300 307 # grant ug1 read permissions for
301 308 RepoGroupModel().grant_user_group_permission(
302 309 repo_group=self.g1, group_name=self.ug1, perm='group.read')
303 310 Session().commit()
304 311
305 312 # check if the
306 313 obj = Session().query(UserGroupRepoGroupToPerm)\
307 314 .filter(UserGroupRepoGroupToPerm.group == self.g1)\
308 315 .filter(UserGroupRepoGroupToPerm.users_group == self.ug1)\
309 316 .scalar()
310 317 assert obj.permission.permission_name == 'group.read'
311 318
312 319 assert group_perms(self.anon) == {u'group1': u'group.none'}
313 320 assert group_perms(self.u1) == {u'group1': u'group.read'}
314 321
315 322 def test_inherited_permissions_from_default_on_user_enabled(self):
316 323 # enable fork and create on default user
317 324 _form_result = {
318 325 'default_repo_create': 'hg.create.repository',
319 326 'default_fork_create': 'hg.fork.repository'
320 327 }
321 328 PermissionModel().set_new_user_perms(
322 329 User.get_default_user(), _form_result)
323 330 Session().commit()
324 331
325 332 # make sure inherit flag is turned on
326 333 self.u1.inherit_default_permissions = True
327 334 Session().commit()
328 335
329 336 # this user will have inherited permissions from default user
330 337 assert global_perms(self.u1) == default_perms()
331 338
332 339 def test_inherited_permissions_from_default_on_user_disabled(self):
333 340 # disable fork and create on default user
334 341 _form_result = {
335 342 'default_repo_create': 'hg.create.none',
336 343 'default_fork_create': 'hg.fork.none'
337 344 }
338 345 PermissionModel().set_new_user_perms(
339 346 User.get_default_user(), _form_result)
340 347 Session().commit()
341 348
342 349 # make sure inherit flag is turned on
343 350 self.u1.inherit_default_permissions = True
344 351 Session().commit()
345 352
346 353 # this user will have inherited permissions from default user
347 354 expected_perms = default_perms(
348 355 added=['hg.create.none', 'hg.fork.none'],
349 356 removed=['hg.create.repository', 'hg.fork.repository'])
350 357 assert global_perms(self.u1) == expected_perms
351 358
352 359 def test_non_inherited_permissions_from_default_on_user_enabled(self):
353 360 user_model = UserModel()
354 361 # enable fork and create on default user
355 362 usr = User.DEFAULT_USER
356 363 user_model.revoke_perm(usr, 'hg.create.none')
357 364 user_model.grant_perm(usr, 'hg.create.repository')
358 365 user_model.revoke_perm(usr, 'hg.fork.none')
359 366 user_model.grant_perm(usr, 'hg.fork.repository')
360 367
361 368 # disable global perms on specific user
362 369 user_model.revoke_perm(self.u1, 'hg.create.repository')
363 370 user_model.grant_perm(self.u1, 'hg.create.none')
364 371 user_model.revoke_perm(self.u1, 'hg.fork.repository')
365 372 user_model.grant_perm(self.u1, 'hg.fork.none')
366 373
367 374 # TODO(marcink): check branch permissions now ?
368 375
369 376 # make sure inherit flag is turned off
370 377 self.u1.inherit_default_permissions = False
371 378 Session().commit()
372 379
373 380 # this user will have non inherited permissions from he's
374 381 # explicitly set permissions
375 382 assert global_perms(self.u1) == {
376 383 'hg.create.none',
377 384 'hg.fork.none',
378 385 'hg.register.manual_activate',
379 386 'hg.password_reset.enabled',
380 387 'hg.extern_activate.auto',
381 388 'repository.read',
382 389 'group.read',
383 390 'usergroup.read',
384 391 'branch.push_force',
385 392 }
386 393
387 394 def test_non_inherited_permissions_from_default_on_user_disabled(self):
388 395 user_model = UserModel()
389 396 # disable fork and create on default user
390 397 usr = User.DEFAULT_USER
391 398 user_model.revoke_perm(usr, 'hg.create.repository')
392 399 user_model.grant_perm(usr, 'hg.create.none')
393 400 user_model.revoke_perm(usr, 'hg.fork.repository')
394 401 user_model.grant_perm(usr, 'hg.fork.none')
395 402
396 403 # enable global perms on specific user
397 404 user_model.revoke_perm(self.u1, 'hg.create.none')
398 405 user_model.grant_perm(self.u1, 'hg.create.repository')
399 406 user_model.revoke_perm(self.u1, 'hg.fork.none')
400 407 user_model.grant_perm(self.u1, 'hg.fork.repository')
401 408
402 409 # make sure inherit flag is turned off
403 410 self.u1.inherit_default_permissions = False
404 411 Session().commit()
405 412
406 413 # TODO(marcink): check branch perms
407 414
408 415 # this user will have non inherited permissions from he's
409 416 # explicitly set permissions
410 417 assert global_perms(self.u1) == {
411 418 'hg.create.repository',
412 419 'hg.fork.repository',
413 420 'hg.register.manual_activate',
414 421 'hg.password_reset.enabled',
415 422 'hg.extern_activate.auto',
416 423 'repository.read',
417 424 'group.read',
418 425 'usergroup.read',
419 426 'branch.push_force',
420 427 }
421 428
422 429 @pytest.mark.parametrize('perm, expected_perm', [
423 430 ('hg.inherit_default_perms.false', 'repository.none', ),
424 431 ('hg.inherit_default_perms.true', 'repository.read', ),
425 432 ])
426 433 def test_inherited_permissions_on_objects(self, perm, expected_perm):
427 434 _form_result = {
428 435 'default_inherit_default_permissions': perm,
429 436 }
430 437 PermissionModel().set_new_user_perms(
431 438 User.get_default_user(), _form_result)
432 439 Session().commit()
433 440
434 441 # make sure inherit flag is turned on
435 442 self.u1.inherit_default_permissions = True
436 443 Session().commit()
437 444
438 445 # TODO(marcink): check branch perms
439 446
440 447 # this user will have inherited permissions from default user
441 448 assert global_perms(self.u1) == {
442 449 'hg.create.none',
443 450 'hg.fork.none',
444 451 'hg.register.manual_activate',
445 452 'hg.password_reset.enabled',
446 453 'hg.extern_activate.auto',
447 454 'repository.read',
448 455 'group.read',
449 456 'usergroup.read',
450 457 'branch.push_force',
451 458 'hg.create.write_on_repogroup.true',
452 459 'hg.usergroup.create.false',
453 460 'hg.repogroup.create.false',
454 461 perm
455 462 }
456 463
457 464 assert set(repo_perms(self.u1).values()) == set([expected_perm])
458 465
459 466 def test_repo_owner_permissions_not_overwritten_by_group(self):
460 467 # create repo as USER,
461 468 self.test_repo = fixture.create_repo(name='myownrepo',
462 469 repo_type='hg',
463 470 cur_user=self.u1)
464 471
465 472 # he has permissions of admin as owner
466 473 assert repo_perms(self.u1)['myownrepo'] == 'repository.admin'
467 474
468 475 # set his permission as user group, he should still be admin
469 476 self.ug1 = fixture.create_user_group('G1')
470 477 UserGroupModel().add_user_to_group(self.ug1, self.u1)
471 478 RepoModel().grant_user_group_permission(
472 479 self.test_repo,
473 480 group_name=self.ug1,
474 481 perm='repository.none')
475 482 Session().commit()
476 483
477 484 assert repo_perms(self.u1)['myownrepo'] == 'repository.admin'
478 485
479 486 def test_repo_owner_permissions_not_overwritten_by_others(self):
480 487 # create repo as USER,
481 488 self.test_repo = fixture.create_repo(name='myownrepo',
482 489 repo_type='hg',
483 490 cur_user=self.u1)
484 491
485 492 # he has permissions of admin as owner
486 493 assert repo_perms(self.u1)['myownrepo'] == 'repository.admin'
487 494
488 495 # set his permission as user, he should still be admin
489 496 RepoModel().grant_user_permission(
490 497 self.test_repo, user=self.u1, perm='repository.none')
491 498 Session().commit()
492 499
493 500 assert repo_perms(self.u1)['myownrepo'] == 'repository.admin'
494 501
495 502 def test_repo_group_owner_permissions_not_overwritten_by_group(self):
496 503 # "u1" shall be owner without any special permission assigned
497 504 self.g1 = fixture.create_repo_group('test1')
498 505
499 506 # Make user group and grant a permission to user group
500 507 self.ug1 = fixture.create_user_group('G1')
501 508 UserGroupModel().add_user_to_group(self.ug1, self.u1)
502 509 RepoGroupModel().grant_user_group_permission(
503 510 repo_group=self.g1, group_name=self.ug1, perm='group.write')
511 Session().commit()
504 512
505 513 # Verify that user does not get any special permission if he is not
506 514 # owner
507 515 assert group_perms(self.u1) == {'test1': 'group.write'}
508 516
509 517 # Make him owner of the repo group
510 518 self.g1.user = self.u1
511 519 assert group_perms(self.u1) == {'test1': 'group.admin'}
512 520
513 521 def test_repo_group_owner_permissions_not_overwritten_by_others(self):
514 522 # "u1" shall be owner without any special permission assigned
515 523 self.g1 = fixture.create_repo_group('test1')
516 524 RepoGroupModel().grant_user_permission(
517 525 repo_group=self.g1, user=self.u1, perm='group.write')
526 Session().commit()
518 527
519 528 # Verify that user does not get any special permission if he is not
520 529 # owner
521 530 assert group_perms(self.u1) == {'test1': 'group.write'}
522 531
523 532 # Make him owner of the repo group
524 533 self.g1.user = self.u1
525 534 assert group_perms(self.u1) == {u'test1': 'group.admin'}
526 535
527 def _test_def_user_perm_equal(
536 def assert_user_perm_equal(
528 537 self, user, change_factor=0, compare_keys=None):
529 538 perms = UserToPerm.query().filter(UserToPerm.user == user).all()
530 539 assert len(perms) == \
531 540 len(Permission.DEFAULT_USER_PERMISSIONS) + change_factor
532 541 if compare_keys:
533 542 assert set(
534 543 x.permissions.permission_name for x in perms) == compare_keys
535 544
536 def _test_def_user_group_perm_equal(
545 def assert_def_user_group_perm_equal(
537 546 self, user_group, change_factor=0, compare_keys=None):
538 547 perms = UserGroupToPerm.query().filter(
539 548 UserGroupToPerm.users_group == user_group).all()
540 549 assert len(perms) == \
541 550 len(Permission.DEFAULT_USER_PERMISSIONS) + change_factor
542 551 if compare_keys:
543 552 assert set(
544 553 x.permissions.permission_name for x in perms) == compare_keys
545 554
546 555 def test_set_default_permissions(self):
547 556 PermissionModel().create_default_user_permissions(user=self.u1)
548 self._test_def_user_perm_equal(user=self.u1)
557 self.assert_user_perm_equal(user=self.u1)
549 558
550 559 def test_set_default_permissions_after_one_is_missing(self):
551 560 PermissionModel().create_default_user_permissions(user=self.u1)
552 self._test_def_user_perm_equal(user=self.u1)
561 self.assert_user_perm_equal(user=self.u1)
553 562 # now we delete one, it should be re-created after another call
554 563 perms = UserToPerm.query().filter(UserToPerm.user == self.u1).all()
555 564 Session().delete(perms[0])
556 565 Session().commit()
557 566
558 self._test_def_user_perm_equal(user=self.u1, change_factor=-1)
567 self.assert_user_perm_equal(user=self.u1, change_factor=-1)
559 568
560 569 # create missing one !
561 570 PermissionModel().create_default_user_permissions(user=self.u1)
562 self._test_def_user_perm_equal(user=self.u1)
571 self.assert_user_perm_equal(user=self.u1)
563 572
564 573 @pytest.mark.parametrize("perm, modify_to", [
565 574 ('repository.read', 'repository.none'),
566 575 ('group.read', 'group.none'),
567 576 ('usergroup.read', 'usergroup.none'),
568 577 ('hg.create.repository', 'hg.create.none'),
569 578 ('hg.fork.repository', 'hg.fork.none'),
570 579 ('hg.register.manual_activate', 'hg.register.auto_activate',)
571 580 ])
572 581 def test_set_default_permissions_after_modification(self, perm, modify_to):
573 582 PermissionModel().create_default_user_permissions(user=self.u1)
574 self._test_def_user_perm_equal(user=self.u1)
583 self.assert_user_perm_equal(user=self.u1)
575 584
576 585 old = Permission.get_by_key(perm)
577 586 new = Permission.get_by_key(modify_to)
578 587 assert old is not None
579 588 assert new is not None
580 589
581 590 # now modify permissions
582 591 p = UserToPerm.query().filter(
583 592 UserToPerm.user == self.u1).filter(
584 593 UserToPerm.permission == old).one()
585 594 p.permission = new
586 595 Session().add(p)
587 596 Session().commit()
588 597
589 598 PermissionModel().create_default_user_permissions(user=self.u1)
590 self._test_def_user_perm_equal(user=self.u1)
599 self.assert_user_perm_equal(user=self.u1)
591 600
592 601 def test_clear_user_perms(self):
593 602 PermissionModel().create_default_user_permissions(user=self.u1)
594 self._test_def_user_perm_equal(user=self.u1)
603 self.assert_user_perm_equal(user=self.u1)
595 604
596 605 # now clear permissions
597 606 cleared = PermissionModel()._clear_user_perms(self.u1.user_id)
598 self._test_def_user_perm_equal(user=self.u1,
599 change_factor=len(cleared)*-1)
607 self.assert_user_perm_equal(user=self.u1,
608 change_factor=len(cleared)*-1)
600 609
601 610 def test_clear_user_group_perms(self):
602 611 self.ug1 = fixture.create_user_group('G1')
603 612 PermissionModel().create_default_user_group_permissions(
604 613 user_group=self.ug1)
605 self._test_def_user_group_perm_equal(user_group=self.ug1)
614 self.assert_def_user_group_perm_equal(user_group=self.ug1)
606 615
607 616 # now clear permissions
608 617 cleared = PermissionModel()._clear_user_group_perms(
609 618 self.ug1.users_group_id)
610 self._test_def_user_group_perm_equal(user_group=self.ug1,
611 change_factor=len(cleared)*-1)
619 self.assert_def_user_group_perm_equal(user_group=self.ug1,
620 change_factor=len(cleared)*-1)
612 621
613 622 @pytest.mark.parametrize("form_result", [
614 623 {},
615 624 {'default_repo_create': 'hg.create.repository'},
616 625 {'default_repo_create': 'hg.create.repository',
617 626 'default_repo_perm': 'repository.read'},
618 627 {'default_repo_create': 'hg.create.none',
619 628 'default_repo_perm': 'repository.write',
620 629 'default_fork_create': 'hg.fork.none'},
621 630 ])
622 631 def test_set_new_user_permissions(self, form_result):
623 632 _form_result = {}
624 633 _form_result.update(form_result)
625 634 PermissionModel().set_new_user_perms(self.u1, _form_result)
626 635 Session().commit()
627 636 change_factor = -1 * (len(Permission.DEFAULT_USER_PERMISSIONS)
628 637 - len(form_result.keys()))
629 self._test_def_user_perm_equal(
638 self.assert_user_perm_equal(
630 639 self.u1, change_factor=change_factor)
631 640
632 641 @pytest.mark.parametrize("form_result", [
633 642 {},
634 643 {'default_repo_create': 'hg.create.repository'},
635 644 {'default_repo_create': 'hg.create.repository',
636 645 'default_repo_perm': 'repository.read'},
637 646 {'default_repo_create': 'hg.create.none',
638 647 'default_repo_perm': 'repository.write',
639 648 'default_fork_create': 'hg.fork.none'},
640 649 ])
641 650 def test_set_new_user_group_permissions(self, form_result):
642 651 _form_result = {}
643 652 _form_result.update(form_result)
644 653 self.ug1 = fixture.create_user_group('G1')
645 654 PermissionModel().set_new_user_group_perms(self.ug1, _form_result)
646 655 Session().commit()
647 656 change_factor = -1 * (len(Permission.DEFAULT_USER_PERMISSIONS)
648 657 - len(form_result.keys()))
649 self._test_def_user_group_perm_equal(
658 self.assert_def_user_group_perm_equal(
650 659 self.ug1, change_factor=change_factor)
651 660
652 661 @pytest.mark.parametrize("group_active, expected_perm", [
653 662 (True, 'repository.admin'),
654 663 (False, 'repository.read'),
655 664 ])
656 665 def test_get_default_repo_perms_from_user_group_with_active_group(
657 666 self, backend, user_util, group_active, expected_perm):
658 667 repo = backend.create_repo()
659 668 user = user_util.create_user()
660 669 user_group = user_util.create_user_group(
661 670 members=[user], users_group_active=group_active)
662 671
663 672 user_util.grant_user_group_permission_to_repo(
664 673 repo, user_group, 'repository.admin')
665 674 permissions = repo_perms(user)
666 675 repo_permission = permissions.get(repo.repo_name)
667 676 assert repo_permission == expected_perm
668 677
669 678 @pytest.mark.parametrize("group_active, expected_perm", [
670 679 (True, 'group.admin'),
671 680 (False, 'group.read')
672 681 ])
673 682 def test_get_default_group_perms_from_user_group_with_active_group(
674 683 self, user_util, group_active, expected_perm):
675 684 user = user_util.create_user()
676 685 repo_group = user_util.create_repo_group()
677 686 user_group = user_util.create_user_group(
678 687 members=[user], users_group_active=group_active)
679 688
680 689 user_util.grant_user_group_permission_to_repo_group(
681 690 repo_group, user_group, 'group.admin')
682 691 permissions = group_perms(user)
683 692 group_permission = permissions.get(repo_group.name)
684 693 assert group_permission == expected_perm
685 694
686 695 @pytest.mark.parametrize("group_active, expected_perm", [
687 696 (True, 'usergroup.admin'),
688 697 (False, 'usergroup.read')
689 698 ])
690 699 def test_get_default_user_group_perms_from_user_group_with_active_group(
691 700 self, user_util, group_active, expected_perm):
692 701 user = user_util.create_user()
693 702 user_group = user_util.create_user_group(
694 703 members=[user], users_group_active=group_active)
695 704 target_user_group = user_util.create_user_group()
696 705
697 706 user_util.grant_user_group_permission_to_user_group(
698 707 target_user_group, user_group, 'usergroup.admin')
699 708 permissions = user_group_perms(user)
700 709 group_permission = permissions.get(target_user_group.users_group_name)
701 710 assert group_permission == expected_perm
702 711
703 712
704 713 def repo_perms(user):
705 714 auth_user = AuthUser(user_id=user.user_id)
706 715 return auth_user.permissions['repositories']
707 716
708 717
709 718 def branch_perms(user):
710 719 auth_user = AuthUser(user_id=user.user_id)
711 720 return auth_user.permissions['repository_branches']
712 721
713 722
714 723 def group_perms(user):
715 724 auth_user = AuthUser(user_id=user.user_id)
716 725 return auth_user.permissions['repositories_groups']
717 726
718 727
719 728 def user_group_perms(user):
720 729 auth_user = AuthUser(user_id=user.user_id)
721 730 return auth_user.permissions['user_groups']
722 731
723 732
724 733 def global_perms(user):
725 734 auth_user = AuthUser(user_id=user.user_id)
726 735 return auth_user.permissions['global']
727 736
728 737
729 738 def default_perms(added=None, removed=None):
730 739 expected_perms = set(Permission.DEFAULT_USER_PERMISSIONS)
731 740 if removed:
732 741 expected_perms.difference_update(removed)
733 742 if added:
734 743 expected_perms.update(added)
735 744 return expected_perms
1 NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
General Comments 0
You need to be logged in to leave comments. Login now