##// END OF EJS Templates
tests: stabilize tests for mysql/postgres.
marcink -
r3981:39e93a55 default
parent child Browse files
Show More

The requested changes are too big and content was truncated. Show full diff

@@ -1,202 +1,202 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import pytest
21 import pytest
22
22
23 from rhodecode.tests import assert_session_flash
23 from rhodecode.tests import assert_session_flash
24 from rhodecode.tests.utils import AssertResponse
24 from rhodecode.tests.utils import AssertResponse
25 from rhodecode.model.db import Session
25 from rhodecode.model.db import Session
26 from rhodecode.model.settings import SettingsModel
26 from rhodecode.model.settings import SettingsModel
27
27
28
28
29 def assert_auth_settings_updated(response):
29 def assert_auth_settings_updated(response):
30 assert response.status_int == 302, 'Expected response HTTP Found 302'
30 assert response.status_int == 302, 'Expected response HTTP Found 302'
31 assert_session_flash(response, 'Auth settings updated successfully')
31 assert_session_flash(response, 'Auth settings updated successfully')
32
32
33
33
34 @pytest.mark.usefixtures("autologin_user", "app")
34 @pytest.mark.usefixtures("autologin_user", "app")
35 class TestAuthSettingsView(object):
35 class TestAuthSettingsView(object):
36
36
37 def _enable_plugins(self, plugins_list, csrf_token, override=None,
37 def _enable_plugins(self, plugins_list, csrf_token, override=None,
38 verify_response=False):
38 verify_response=False):
39 test_url = '/_admin/auth'
39 test_url = '/_admin/auth'
40 params = {
40 params = {
41 'auth_plugins': plugins_list,
41 'auth_plugins': plugins_list,
42 'csrf_token': csrf_token,
42 'csrf_token': csrf_token,
43 }
43 }
44 if override:
44 if override:
45 params.update(override)
45 params.update(override)
46 _enabled_plugins = []
46 _enabled_plugins = []
47 for plugin in plugins_list.split(','):
47 for plugin in plugins_list.split(','):
48 plugin_name = plugin.partition('#')[-1]
48 plugin_name = plugin.partition('#')[-1]
49 enabled_plugin = '%s_enabled' % plugin_name
49 enabled_plugin = '%s_enabled' % plugin_name
50 cache_ttl = '%s_cache_ttl' % plugin_name
50 cache_ttl = '%s_cache_ttl' % plugin_name
51
51
52 # default params that are needed for each plugin,
52 # default params that are needed for each plugin,
53 # `enabled` and `cache_ttl`
53 # `enabled` and `cache_ttl`
54 params.update({
54 params.update({
55 enabled_plugin: True,
55 enabled_plugin: True,
56 cache_ttl: 0
56 cache_ttl: 0
57 })
57 })
58 _enabled_plugins.append(enabled_plugin)
58 _enabled_plugins.append(enabled_plugin)
59
59
60 # we need to clean any enabled plugin before, since they require
60 # we need to clean any enabled plugin before, since they require
61 # form params to be present
61 # form params to be present
62 db_plugin = SettingsModel().get_setting_by_name('auth_plugins')
62 db_plugin = SettingsModel().get_setting_by_name('auth_plugins')
63 db_plugin.app_settings_value = \
63 db_plugin.app_settings_value = \
64 'egg:rhodecode-enterprise-ce#rhodecode'
64 'egg:rhodecode-enterprise-ce#rhodecode'
65 Session().add(db_plugin)
65 Session().add(db_plugin)
66 Session().commit()
66 Session().commit()
67 for _plugin in _enabled_plugins:
67 for _plugin in _enabled_plugins:
68 db_plugin = SettingsModel().get_setting_by_name(_plugin)
68 db_plugin = SettingsModel().get_setting_by_name(_plugin)
69 if db_plugin:
69 if db_plugin:
70 Session().delete(db_plugin)
70 Session().delete(db_plugin)
71 Session().commit()
71 Session().commit()
72
72
73 response = self.app.post(url=test_url, params=params)
73 response = self.app.post(url=test_url, params=params)
74
74
75 if verify_response:
75 if verify_response:
76 assert_auth_settings_updated(response)
76 assert_auth_settings_updated(response)
77 return params
77 return params
78
78
79 def _post_ldap_settings(self, params, override=None, force=False):
79 def _post_ldap_settings(self, params, override=None, force=False):
80
80
81 params.update({
81 params.update({
82 'filter': 'user',
82 'filter': 'user',
83 'user_member_of': '',
83 'user_member_of': '',
84 'user_search_base': '',
84 'user_search_base': '',
85 'user_search_filter': 'test_filter',
85 'user_search_filter': 'test_filter',
86
86
87 'host': 'dc.example.com',
87 'host': 'dc.example.com',
88 'port': '999',
88 'port': '999',
89 'timeout': 3600,
89 'timeout': 3600,
90 'tls_kind': 'PLAIN',
90 'tls_kind': 'PLAIN',
91 'tls_reqcert': 'NEVER',
91 'tls_reqcert': 'NEVER',
92 'tls_cert_dir':'/etc/openldap/cacerts',
92 'tls_cert_dir':'/etc/openldap/cacerts',
93 'dn_user': 'test_user',
93 'dn_user': 'test_user',
94 'dn_pass': 'test_pass',
94 'dn_pass': 'test_pass',
95 'base_dn': 'test_base_dn',
95 'base_dn': 'test_base_dn',
96 'search_scope': 'BASE',
96 'search_scope': 'BASE',
97 'attr_login': 'test_attr_login',
97 'attr_login': 'test_attr_login',
98 'attr_firstname': 'ima',
98 'attr_firstname': 'ima',
99 'attr_lastname': 'tester',
99 'attr_lastname': 'tester',
100 'attr_email': 'test@example.com',
100 'attr_email': 'test@example.com',
101 'cache_ttl': '0',
101 'cache_ttl': '0',
102 })
102 })
103 if force:
103 if force:
104 params = {}
104 params = {}
105 params.update(override or {})
105 params.update(override or {})
106
106
107 test_url = '/_admin/auth/ldap/'
107 test_url = '/_admin/auth/ldap/'
108
108
109 response = self.app.post(url=test_url, params=params)
109 response = self.app.post(url=test_url, params=params)
110 return response
110 return response
111
111
112 def test_index(self):
112 def test_index(self):
113 response = self.app.get('/_admin/auth')
113 response = self.app.get('/_admin/auth')
114 response.mustcontain('Authentication Plugins')
114 response.mustcontain('Authentication Plugins')
115
115
116 @pytest.mark.parametrize("disable_plugin, needs_import", [
116 @pytest.mark.parametrize("disable_plugin, needs_import", [
117 ('egg:rhodecode-enterprise-ce#headers', None),
117 ('egg:rhodecode-enterprise-ce#headers', None),
118 ('egg:rhodecode-enterprise-ce#crowd', None),
118 ('egg:rhodecode-enterprise-ce#crowd', None),
119 ('egg:rhodecode-enterprise-ce#jasig_cas', None),
119 ('egg:rhodecode-enterprise-ce#jasig_cas', None),
120 ('egg:rhodecode-enterprise-ce#ldap', None),
120 ('egg:rhodecode-enterprise-ce#ldap', None),
121 ('egg:rhodecode-enterprise-ce#pam', "pam"),
121 ('egg:rhodecode-enterprise-ce#pam', "pam"),
122 ])
122 ])
123 def test_disable_plugin(self, csrf_token, disable_plugin, needs_import):
123 def test_disable_plugin(self, csrf_token, disable_plugin, needs_import):
124 # TODO: johbo: "pam" is currently not available on darwin,
124 # TODO: johbo: "pam" is currently not available on darwin,
125 # although the docs state that it should work on darwin.
125 # although the docs state that it should work on darwin.
126 if needs_import:
126 if needs_import:
127 pytest.importorskip(needs_import)
127 pytest.importorskip(needs_import)
128
128
129 self._enable_plugins(
129 self._enable_plugins(
130 'egg:rhodecode-enterprise-ce#rhodecode,' + disable_plugin,
130 'egg:rhodecode-enterprise-ce#rhodecode,' + disable_plugin,
131 csrf_token, verify_response=True)
131 csrf_token, verify_response=True)
132
132
133 self._enable_plugins(
133 self._enable_plugins(
134 'egg:rhodecode-enterprise-ce#rhodecode', csrf_token,
134 'egg:rhodecode-enterprise-ce#rhodecode', csrf_token,
135 verify_response=True)
135 verify_response=True)
136
136
137 def test_ldap_save_settings(self, csrf_token):
137 def test_ldap_save_settings(self, csrf_token):
138 params = self._enable_plugins(
138 params = self._enable_plugins(
139 'egg:rhodecode-enterprise-ce#rhodecode,'
139 'egg:rhodecode-enterprise-ce#rhodecode,'
140 'egg:rhodecode-enterprise-ce#ldap',
140 'egg:rhodecode-enterprise-ce#ldap',
141 csrf_token)
141 csrf_token)
142 response = self._post_ldap_settings(params)
142 response = self._post_ldap_settings(params)
143 assert_auth_settings_updated(response)
143 assert_auth_settings_updated(response)
144
144
145 new_settings = SettingsModel().get_auth_settings()
145 new_settings = SettingsModel().get_auth_settings()
146 assert new_settings['auth_ldap_host'] == u'dc.example.com', \
146 assert new_settings['auth_ldap_host'] == u'dc.example.com', \
147 'fail db write compare'
147 'fail db write compare'
148
148
149 def test_ldap_error_form_wrong_port_number(self, csrf_token):
149 def test_ldap_error_form_wrong_port_number(self, csrf_token):
150 params = self._enable_plugins(
150 params = self._enable_plugins(
151 'egg:rhodecode-enterprise-ce#rhodecode,'
151 'egg:rhodecode-enterprise-ce#rhodecode,'
152 'egg:rhodecode-enterprise-ce#ldap',
152 'egg:rhodecode-enterprise-ce#ldap',
153 csrf_token)
153 csrf_token)
154 invalid_port_value = 'invalid-port-number'
154 invalid_port_value = 'invalid-port-number'
155 response = self._post_ldap_settings(params, override={
155 response = self._post_ldap_settings(params, override={
156 'port': invalid_port_value,
156 'port': invalid_port_value,
157 })
157 })
158 assertr = AssertResponse(response)
158 assertr = response.assert_response()
159 assertr.element_contains(
159 assertr.element_contains(
160 '.form .field #port ~ .error-message',
160 '.form .field #port ~ .error-message',
161 invalid_port_value)
161 invalid_port_value)
162
162
163 def test_ldap_error_form(self, csrf_token):
163 def test_ldap_error_form(self, csrf_token):
164 params = self._enable_plugins(
164 params = self._enable_plugins(
165 'egg:rhodecode-enterprise-ce#rhodecode,'
165 'egg:rhodecode-enterprise-ce#rhodecode,'
166 'egg:rhodecode-enterprise-ce#ldap',
166 'egg:rhodecode-enterprise-ce#ldap',
167 csrf_token)
167 csrf_token)
168 response = self._post_ldap_settings(params, override={
168 response = self._post_ldap_settings(params, override={
169 'attr_login': '',
169 'attr_login': '',
170 })
170 })
171 response.mustcontain("""<span class="error-message">The LDAP Login"""
171 response.mustcontain("""<span class="error-message">The LDAP Login"""
172 """ attribute of the CN must be specified""")
172 """ attribute of the CN must be specified""")
173
173
174 def test_post_ldap_group_settings(self, csrf_token):
174 def test_post_ldap_group_settings(self, csrf_token):
175 params = self._enable_plugins(
175 params = self._enable_plugins(
176 'egg:rhodecode-enterprise-ce#rhodecode,'
176 'egg:rhodecode-enterprise-ce#rhodecode,'
177 'egg:rhodecode-enterprise-ce#ldap',
177 'egg:rhodecode-enterprise-ce#ldap',
178 csrf_token)
178 csrf_token)
179
179
180 response = self._post_ldap_settings(params, override={
180 response = self._post_ldap_settings(params, override={
181 'host': 'dc-legacy.example.com',
181 'host': 'dc-legacy.example.com',
182 'port': '999',
182 'port': '999',
183 'tls_kind': 'PLAIN',
183 'tls_kind': 'PLAIN',
184 'tls_reqcert': 'NEVER',
184 'tls_reqcert': 'NEVER',
185 'dn_user': 'test_user',
185 'dn_user': 'test_user',
186 'dn_pass': 'test_pass',
186 'dn_pass': 'test_pass',
187 'base_dn': 'test_base_dn',
187 'base_dn': 'test_base_dn',
188 'filter': 'test_filter',
188 'filter': 'test_filter',
189 'search_scope': 'BASE',
189 'search_scope': 'BASE',
190 'attr_login': 'test_attr_login',
190 'attr_login': 'test_attr_login',
191 'attr_firstname': 'ima',
191 'attr_firstname': 'ima',
192 'attr_lastname': 'tester',
192 'attr_lastname': 'tester',
193 'attr_email': 'test@example.com',
193 'attr_email': 'test@example.com',
194 'cache_ttl': '60',
194 'cache_ttl': '60',
195 'csrf_token': csrf_token,
195 'csrf_token': csrf_token,
196 }
196 }
197 )
197 )
198 assert_auth_settings_updated(response)
198 assert_auth_settings_updated(response)
199
199
200 new_settings = SettingsModel().get_auth_settings()
200 new_settings = SettingsModel().get_auth_settings()
201 assert new_settings['auth_ldap_host'] == u'dc-legacy.example.com', \
201 assert new_settings['auth_ldap_host'] == u'dc-legacy.example.com', \
202 'fail db write compare'
202 'fail db write compare'
@@ -1,512 +1,512 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import urllib
21 import urllib
22
22
23 import mock
23 import mock
24 import pytest
24 import pytest
25
25
26 from rhodecode.apps._base import ADMIN_PREFIX
26 from rhodecode.apps._base import ADMIN_PREFIX
27 from rhodecode.lib import auth
27 from rhodecode.lib import auth
28 from rhodecode.lib.utils2 import safe_str
28 from rhodecode.lib.utils2 import safe_str
29 from rhodecode.lib import helpers as h
29 from rhodecode.lib import helpers as h
30 from rhodecode.model.db import (
30 from rhodecode.model.db import (
31 Repository, RepoGroup, UserRepoToPerm, User, Permission)
31 Repository, RepoGroup, UserRepoToPerm, User, Permission)
32 from rhodecode.model.meta import Session
32 from rhodecode.model.meta import Session
33 from rhodecode.model.repo import RepoModel
33 from rhodecode.model.repo import RepoModel
34 from rhodecode.model.repo_group import RepoGroupModel
34 from rhodecode.model.repo_group import RepoGroupModel
35 from rhodecode.model.user import UserModel
35 from rhodecode.model.user import UserModel
36 from rhodecode.tests import (
36 from rhodecode.tests import (
37 login_user_session, assert_session_flash, TEST_USER_ADMIN_LOGIN,
37 login_user_session, assert_session_flash, TEST_USER_ADMIN_LOGIN,
38 TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
38 TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
39 from rhodecode.tests.fixture import Fixture, error_function
39 from rhodecode.tests.fixture import Fixture, error_function
40 from rhodecode.tests.utils import AssertResponse, repo_on_filesystem
40 from rhodecode.tests.utils import AssertResponse, repo_on_filesystem
41
41
42 fixture = Fixture()
42 fixture = Fixture()
43
43
44
44
45 def route_path(name, params=None, **kwargs):
45 def route_path(name, params=None, **kwargs):
46 import urllib
46 import urllib
47
47
48 base_url = {
48 base_url = {
49 'repos': ADMIN_PREFIX + '/repos',
49 'repos': ADMIN_PREFIX + '/repos',
50 'repo_new': ADMIN_PREFIX + '/repos/new',
50 'repo_new': ADMIN_PREFIX + '/repos/new',
51 'repo_create': ADMIN_PREFIX + '/repos/create',
51 'repo_create': ADMIN_PREFIX + '/repos/create',
52
52
53 'repo_creating_check': '/{repo_name}/repo_creating_check',
53 'repo_creating_check': '/{repo_name}/repo_creating_check',
54 }[name].format(**kwargs)
54 }[name].format(**kwargs)
55
55
56 if params:
56 if params:
57 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
57 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
58 return base_url
58 return base_url
59
59
60
60
61 def _get_permission_for_user(user, repo):
61 def _get_permission_for_user(user, repo):
62 perm = UserRepoToPerm.query()\
62 perm = UserRepoToPerm.query()\
63 .filter(UserRepoToPerm.repository ==
63 .filter(UserRepoToPerm.repository ==
64 Repository.get_by_repo_name(repo))\
64 Repository.get_by_repo_name(repo))\
65 .filter(UserRepoToPerm.user == User.get_by_username(user))\
65 .filter(UserRepoToPerm.user == User.get_by_username(user))\
66 .all()
66 .all()
67 return perm
67 return perm
68
68
69
69
70 @pytest.mark.usefixtures("app")
70 @pytest.mark.usefixtures("app")
71 class TestAdminRepos(object):
71 class TestAdminRepos(object):
72
72
73 def test_repo_list(self, autologin_user, user_util):
73 def test_repo_list(self, autologin_user, user_util):
74 repo = user_util.create_repo()
74 repo = user_util.create_repo()
75 repo_name = repo.repo_name
75 repo_name = repo.repo_name
76 response = self.app.get(
76 response = self.app.get(
77 route_path('repos'), status=200)
77 route_path('repos'), status=200)
78
78
79 response.mustcontain(repo_name)
79 response.mustcontain(repo_name)
80
80
81 def test_create_page_restricted_to_single_backend(self, autologin_user, backend):
81 def test_create_page_restricted_to_single_backend(self, autologin_user, backend):
82 with mock.patch('rhodecode.BACKENDS', {'git': 'git'}):
82 with mock.patch('rhodecode.BACKENDS', {'git': 'git'}):
83 response = self.app.get(route_path('repo_new'), status=200)
83 response = self.app.get(route_path('repo_new'), status=200)
84 assert_response = AssertResponse(response)
84 assert_response = response.assert_response()
85 element = assert_response.get_element('#repo_type')
85 element = assert_response.get_element('#repo_type')
86 assert element.text_content() == '\ngit\n'
86 assert element.text_content() == '\ngit\n'
87
87
88 def test_create_page_non_restricted_backends(self, autologin_user, backend):
88 def test_create_page_non_restricted_backends(self, autologin_user, backend):
89 response = self.app.get(route_path('repo_new'), status=200)
89 response = self.app.get(route_path('repo_new'), status=200)
90 assert_response = AssertResponse(response)
90 assert_response = response.assert_response()
91 assert_response.element_contains('#repo_type', 'git')
91 assert_response.element_contains('#repo_type', 'git')
92 assert_response.element_contains('#repo_type', 'svn')
92 assert_response.element_contains('#repo_type', 'svn')
93 assert_response.element_contains('#repo_type', 'hg')
93 assert_response.element_contains('#repo_type', 'hg')
94
94
95 @pytest.mark.parametrize(
95 @pytest.mark.parametrize(
96 "suffix", [u'', u'xxa'], ids=['', 'non-ascii'])
96 "suffix", [u'', u'xxa'], ids=['', 'non-ascii'])
97 def test_create(self, autologin_user, backend, suffix, csrf_token):
97 def test_create(self, autologin_user, backend, suffix, csrf_token):
98 repo_name_unicode = backend.new_repo_name(suffix=suffix)
98 repo_name_unicode = backend.new_repo_name(suffix=suffix)
99 repo_name = repo_name_unicode.encode('utf8')
99 repo_name = repo_name_unicode.encode('utf8')
100 description_unicode = u'description for newly created repo' + suffix
100 description_unicode = u'description for newly created repo' + suffix
101 description = description_unicode.encode('utf8')
101 description = description_unicode.encode('utf8')
102 response = self.app.post(
102 response = self.app.post(
103 route_path('repo_create'),
103 route_path('repo_create'),
104 fixture._get_repo_create_params(
104 fixture._get_repo_create_params(
105 repo_private=False,
105 repo_private=False,
106 repo_name=repo_name,
106 repo_name=repo_name,
107 repo_type=backend.alias,
107 repo_type=backend.alias,
108 repo_description=description,
108 repo_description=description,
109 csrf_token=csrf_token),
109 csrf_token=csrf_token),
110 status=302)
110 status=302)
111
111
112 self.assert_repository_is_created_correctly(
112 self.assert_repository_is_created_correctly(
113 repo_name, description, backend)
113 repo_name, description, backend)
114
114
115 def test_create_numeric_name(self, autologin_user, backend, csrf_token):
115 def test_create_numeric_name(self, autologin_user, backend, csrf_token):
116 numeric_repo = '1234'
116 numeric_repo = '1234'
117 repo_name = numeric_repo
117 repo_name = numeric_repo
118 description = 'description for newly created repo' + numeric_repo
118 description = 'description for newly created repo' + numeric_repo
119 self.app.post(
119 self.app.post(
120 route_path('repo_create'),
120 route_path('repo_create'),
121 fixture._get_repo_create_params(
121 fixture._get_repo_create_params(
122 repo_private=False,
122 repo_private=False,
123 repo_name=repo_name,
123 repo_name=repo_name,
124 repo_type=backend.alias,
124 repo_type=backend.alias,
125 repo_description=description,
125 repo_description=description,
126 csrf_token=csrf_token))
126 csrf_token=csrf_token))
127
127
128 self.assert_repository_is_created_correctly(
128 self.assert_repository_is_created_correctly(
129 repo_name, description, backend)
129 repo_name, description, backend)
130
130
131 @pytest.mark.parametrize("suffix", [u'', u'ąćę'], ids=['', 'non-ascii'])
131 @pytest.mark.parametrize("suffix", [u'', u'ąćę'], ids=['', 'non-ascii'])
132 def test_create_in_group(
132 def test_create_in_group(
133 self, autologin_user, backend, suffix, csrf_token):
133 self, autologin_user, backend, suffix, csrf_token):
134 # create GROUP
134 # create GROUP
135 group_name = 'sometest_%s' % backend.alias
135 group_name = 'sometest_%s' % backend.alias
136 gr = RepoGroupModel().create(group_name=group_name,
136 gr = RepoGroupModel().create(group_name=group_name,
137 group_description='test',
137 group_description='test',
138 owner=TEST_USER_ADMIN_LOGIN)
138 owner=TEST_USER_ADMIN_LOGIN)
139 Session().commit()
139 Session().commit()
140
140
141 repo_name = u'ingroup' + suffix
141 repo_name = u'ingroup' + suffix
142 repo_name_full = RepoGroup.url_sep().join(
142 repo_name_full = RepoGroup.url_sep().join(
143 [group_name, repo_name])
143 [group_name, repo_name])
144 description = u'description for newly created repo'
144 description = u'description for newly created repo'
145 self.app.post(
145 self.app.post(
146 route_path('repo_create'),
146 route_path('repo_create'),
147 fixture._get_repo_create_params(
147 fixture._get_repo_create_params(
148 repo_private=False,
148 repo_private=False,
149 repo_name=safe_str(repo_name),
149 repo_name=safe_str(repo_name),
150 repo_type=backend.alias,
150 repo_type=backend.alias,
151 repo_description=description,
151 repo_description=description,
152 repo_group=gr.group_id,
152 repo_group=gr.group_id,
153 csrf_token=csrf_token))
153 csrf_token=csrf_token))
154
154
155 # TODO: johbo: Cleanup work to fixture
155 # TODO: johbo: Cleanup work to fixture
156 try:
156 try:
157 self.assert_repository_is_created_correctly(
157 self.assert_repository_is_created_correctly(
158 repo_name_full, description, backend)
158 repo_name_full, description, backend)
159
159
160 new_repo = RepoModel().get_by_repo_name(repo_name_full)
160 new_repo = RepoModel().get_by_repo_name(repo_name_full)
161 inherited_perms = UserRepoToPerm.query().filter(
161 inherited_perms = UserRepoToPerm.query().filter(
162 UserRepoToPerm.repository_id == new_repo.repo_id).all()
162 UserRepoToPerm.repository_id == new_repo.repo_id).all()
163 assert len(inherited_perms) == 1
163 assert len(inherited_perms) == 1
164 finally:
164 finally:
165 RepoModel().delete(repo_name_full)
165 RepoModel().delete(repo_name_full)
166 RepoGroupModel().delete(group_name)
166 RepoGroupModel().delete(group_name)
167 Session().commit()
167 Session().commit()
168
168
169 def test_create_in_group_numeric_name(
169 def test_create_in_group_numeric_name(
170 self, autologin_user, backend, csrf_token):
170 self, autologin_user, backend, csrf_token):
171 # create GROUP
171 # create GROUP
172 group_name = 'sometest_%s' % backend.alias
172 group_name = 'sometest_%s' % backend.alias
173 gr = RepoGroupModel().create(group_name=group_name,
173 gr = RepoGroupModel().create(group_name=group_name,
174 group_description='test',
174 group_description='test',
175 owner=TEST_USER_ADMIN_LOGIN)
175 owner=TEST_USER_ADMIN_LOGIN)
176 Session().commit()
176 Session().commit()
177
177
178 repo_name = '12345'
178 repo_name = '12345'
179 repo_name_full = RepoGroup.url_sep().join([group_name, repo_name])
179 repo_name_full = RepoGroup.url_sep().join([group_name, repo_name])
180 description = 'description for newly created repo'
180 description = 'description for newly created repo'
181 self.app.post(
181 self.app.post(
182 route_path('repo_create'),
182 route_path('repo_create'),
183 fixture._get_repo_create_params(
183 fixture._get_repo_create_params(
184 repo_private=False,
184 repo_private=False,
185 repo_name=repo_name,
185 repo_name=repo_name,
186 repo_type=backend.alias,
186 repo_type=backend.alias,
187 repo_description=description,
187 repo_description=description,
188 repo_group=gr.group_id,
188 repo_group=gr.group_id,
189 csrf_token=csrf_token))
189 csrf_token=csrf_token))
190
190
191 # TODO: johbo: Cleanup work to fixture
191 # TODO: johbo: Cleanup work to fixture
192 try:
192 try:
193 self.assert_repository_is_created_correctly(
193 self.assert_repository_is_created_correctly(
194 repo_name_full, description, backend)
194 repo_name_full, description, backend)
195
195
196 new_repo = RepoModel().get_by_repo_name(repo_name_full)
196 new_repo = RepoModel().get_by_repo_name(repo_name_full)
197 inherited_perms = UserRepoToPerm.query()\
197 inherited_perms = UserRepoToPerm.query()\
198 .filter(UserRepoToPerm.repository_id == new_repo.repo_id).all()
198 .filter(UserRepoToPerm.repository_id == new_repo.repo_id).all()
199 assert len(inherited_perms) == 1
199 assert len(inherited_perms) == 1
200 finally:
200 finally:
201 RepoModel().delete(repo_name_full)
201 RepoModel().delete(repo_name_full)
202 RepoGroupModel().delete(group_name)
202 RepoGroupModel().delete(group_name)
203 Session().commit()
203 Session().commit()
204
204
205 def test_create_in_group_without_needed_permissions(self, backend):
205 def test_create_in_group_without_needed_permissions(self, backend):
206 session = login_user_session(
206 session = login_user_session(
207 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
207 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
208 csrf_token = auth.get_csrf_token(session)
208 csrf_token = auth.get_csrf_token(session)
209 # revoke
209 # revoke
210 user_model = UserModel()
210 user_model = UserModel()
211 # disable fork and create on default user
211 # disable fork and create on default user
212 user_model.revoke_perm(User.DEFAULT_USER, 'hg.create.repository')
212 user_model.revoke_perm(User.DEFAULT_USER, 'hg.create.repository')
213 user_model.grant_perm(User.DEFAULT_USER, 'hg.create.none')
213 user_model.grant_perm(User.DEFAULT_USER, 'hg.create.none')
214 user_model.revoke_perm(User.DEFAULT_USER, 'hg.fork.repository')
214 user_model.revoke_perm(User.DEFAULT_USER, 'hg.fork.repository')
215 user_model.grant_perm(User.DEFAULT_USER, 'hg.fork.none')
215 user_model.grant_perm(User.DEFAULT_USER, 'hg.fork.none')
216
216
217 # disable on regular user
217 # disable on regular user
218 user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.repository')
218 user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.repository')
219 user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.none')
219 user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.none')
220 user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.repository')
220 user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.repository')
221 user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.none')
221 user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.none')
222 Session().commit()
222 Session().commit()
223
223
224 # create GROUP
224 # create GROUP
225 group_name = 'reg_sometest_%s' % backend.alias
225 group_name = 'reg_sometest_%s' % backend.alias
226 gr = RepoGroupModel().create(group_name=group_name,
226 gr = RepoGroupModel().create(group_name=group_name,
227 group_description='test',
227 group_description='test',
228 owner=TEST_USER_ADMIN_LOGIN)
228 owner=TEST_USER_ADMIN_LOGIN)
229 Session().commit()
229 Session().commit()
230 repo_group_id = gr.group_id
230 repo_group_id = gr.group_id
231
231
232 group_name_allowed = 'reg_sometest_allowed_%s' % backend.alias
232 group_name_allowed = 'reg_sometest_allowed_%s' % backend.alias
233 gr_allowed = RepoGroupModel().create(
233 gr_allowed = RepoGroupModel().create(
234 group_name=group_name_allowed,
234 group_name=group_name_allowed,
235 group_description='test',
235 group_description='test',
236 owner=TEST_USER_REGULAR_LOGIN)
236 owner=TEST_USER_REGULAR_LOGIN)
237 allowed_repo_group_id = gr_allowed.group_id
237 allowed_repo_group_id = gr_allowed.group_id
238 Session().commit()
238 Session().commit()
239
239
240 repo_name = 'ingroup'
240 repo_name = 'ingroup'
241 description = 'description for newly created repo'
241 description = 'description for newly created repo'
242 response = self.app.post(
242 response = self.app.post(
243 route_path('repo_create'),
243 route_path('repo_create'),
244 fixture._get_repo_create_params(
244 fixture._get_repo_create_params(
245 repo_private=False,
245 repo_private=False,
246 repo_name=repo_name,
246 repo_name=repo_name,
247 repo_type=backend.alias,
247 repo_type=backend.alias,
248 repo_description=description,
248 repo_description=description,
249 repo_group=repo_group_id,
249 repo_group=repo_group_id,
250 csrf_token=csrf_token))
250 csrf_token=csrf_token))
251
251
252 response.mustcontain('Invalid value')
252 response.mustcontain('Invalid value')
253
253
254 # user is allowed to create in this group
254 # user is allowed to create in this group
255 repo_name = 'ingroup'
255 repo_name = 'ingroup'
256 repo_name_full = RepoGroup.url_sep().join(
256 repo_name_full = RepoGroup.url_sep().join(
257 [group_name_allowed, repo_name])
257 [group_name_allowed, repo_name])
258 description = 'description for newly created repo'
258 description = 'description for newly created repo'
259 response = self.app.post(
259 response = self.app.post(
260 route_path('repo_create'),
260 route_path('repo_create'),
261 fixture._get_repo_create_params(
261 fixture._get_repo_create_params(
262 repo_private=False,
262 repo_private=False,
263 repo_name=repo_name,
263 repo_name=repo_name,
264 repo_type=backend.alias,
264 repo_type=backend.alias,
265 repo_description=description,
265 repo_description=description,
266 repo_group=allowed_repo_group_id,
266 repo_group=allowed_repo_group_id,
267 csrf_token=csrf_token))
267 csrf_token=csrf_token))
268
268
269 # TODO: johbo: Cleanup in pytest fixture
269 # TODO: johbo: Cleanup in pytest fixture
270 try:
270 try:
271 self.assert_repository_is_created_correctly(
271 self.assert_repository_is_created_correctly(
272 repo_name_full, description, backend)
272 repo_name_full, description, backend)
273
273
274 new_repo = RepoModel().get_by_repo_name(repo_name_full)
274 new_repo = RepoModel().get_by_repo_name(repo_name_full)
275 inherited_perms = UserRepoToPerm.query().filter(
275 inherited_perms = UserRepoToPerm.query().filter(
276 UserRepoToPerm.repository_id == new_repo.repo_id).all()
276 UserRepoToPerm.repository_id == new_repo.repo_id).all()
277 assert len(inherited_perms) == 1
277 assert len(inherited_perms) == 1
278
278
279 assert repo_on_filesystem(repo_name_full)
279 assert repo_on_filesystem(repo_name_full)
280 finally:
280 finally:
281 RepoModel().delete(repo_name_full)
281 RepoModel().delete(repo_name_full)
282 RepoGroupModel().delete(group_name)
282 RepoGroupModel().delete(group_name)
283 RepoGroupModel().delete(group_name_allowed)
283 RepoGroupModel().delete(group_name_allowed)
284 Session().commit()
284 Session().commit()
285
285
286 def test_create_in_group_inherit_permissions(self, autologin_user, backend,
286 def test_create_in_group_inherit_permissions(self, autologin_user, backend,
287 csrf_token):
287 csrf_token):
288 # create GROUP
288 # create GROUP
289 group_name = 'sometest_%s' % backend.alias
289 group_name = 'sometest_%s' % backend.alias
290 gr = RepoGroupModel().create(group_name=group_name,
290 gr = RepoGroupModel().create(group_name=group_name,
291 group_description='test',
291 group_description='test',
292 owner=TEST_USER_ADMIN_LOGIN)
292 owner=TEST_USER_ADMIN_LOGIN)
293 perm = Permission.get_by_key('repository.write')
293 perm = Permission.get_by_key('repository.write')
294 RepoGroupModel().grant_user_permission(
294 RepoGroupModel().grant_user_permission(
295 gr, TEST_USER_REGULAR_LOGIN, perm)
295 gr, TEST_USER_REGULAR_LOGIN, perm)
296
296
297 # add repo permissions
297 # add repo permissions
298 Session().commit()
298 Session().commit()
299 repo_group_id = gr.group_id
299 repo_group_id = gr.group_id
300 repo_name = 'ingroup_inherited_%s' % backend.alias
300 repo_name = 'ingroup_inherited_%s' % backend.alias
301 repo_name_full = RepoGroup.url_sep().join([group_name, repo_name])
301 repo_name_full = RepoGroup.url_sep().join([group_name, repo_name])
302 description = 'description for newly created repo'
302 description = 'description for newly created repo'
303 self.app.post(
303 self.app.post(
304 route_path('repo_create'),
304 route_path('repo_create'),
305 fixture._get_repo_create_params(
305 fixture._get_repo_create_params(
306 repo_private=False,
306 repo_private=False,
307 repo_name=repo_name,
307 repo_name=repo_name,
308 repo_type=backend.alias,
308 repo_type=backend.alias,
309 repo_description=description,
309 repo_description=description,
310 repo_group=repo_group_id,
310 repo_group=repo_group_id,
311 repo_copy_permissions=True,
311 repo_copy_permissions=True,
312 csrf_token=csrf_token))
312 csrf_token=csrf_token))
313
313
314 # TODO: johbo: Cleanup to pytest fixture
314 # TODO: johbo: Cleanup to pytest fixture
315 try:
315 try:
316 self.assert_repository_is_created_correctly(
316 self.assert_repository_is_created_correctly(
317 repo_name_full, description, backend)
317 repo_name_full, description, backend)
318 except Exception:
318 except Exception:
319 RepoGroupModel().delete(group_name)
319 RepoGroupModel().delete(group_name)
320 Session().commit()
320 Session().commit()
321 raise
321 raise
322
322
323 # check if inherited permissions are applied
323 # check if inherited permissions are applied
324 new_repo = RepoModel().get_by_repo_name(repo_name_full)
324 new_repo = RepoModel().get_by_repo_name(repo_name_full)
325 inherited_perms = UserRepoToPerm.query().filter(
325 inherited_perms = UserRepoToPerm.query().filter(
326 UserRepoToPerm.repository_id == new_repo.repo_id).all()
326 UserRepoToPerm.repository_id == new_repo.repo_id).all()
327 assert len(inherited_perms) == 2
327 assert len(inherited_perms) == 2
328
328
329 assert TEST_USER_REGULAR_LOGIN in [
329 assert TEST_USER_REGULAR_LOGIN in [
330 x.user.username for x in inherited_perms]
330 x.user.username for x in inherited_perms]
331 assert 'repository.write' in [
331 assert 'repository.write' in [
332 x.permission.permission_name for x in inherited_perms]
332 x.permission.permission_name for x in inherited_perms]
333
333
334 RepoModel().delete(repo_name_full)
334 RepoModel().delete(repo_name_full)
335 RepoGroupModel().delete(group_name)
335 RepoGroupModel().delete(group_name)
336 Session().commit()
336 Session().commit()
337
337
338 @pytest.mark.xfail_backends(
338 @pytest.mark.xfail_backends(
339 "git", "hg", reason="Missing reposerver support")
339 "git", "hg", reason="Missing reposerver support")
340 def test_create_with_clone_uri(self, autologin_user, backend, reposerver,
340 def test_create_with_clone_uri(self, autologin_user, backend, reposerver,
341 csrf_token):
341 csrf_token):
342 source_repo = backend.create_repo(number_of_commits=2)
342 source_repo = backend.create_repo(number_of_commits=2)
343 source_repo_name = source_repo.repo_name
343 source_repo_name = source_repo.repo_name
344 reposerver.serve(source_repo.scm_instance())
344 reposerver.serve(source_repo.scm_instance())
345
345
346 repo_name = backend.new_repo_name()
346 repo_name = backend.new_repo_name()
347 response = self.app.post(
347 response = self.app.post(
348 route_path('repo_create'),
348 route_path('repo_create'),
349 fixture._get_repo_create_params(
349 fixture._get_repo_create_params(
350 repo_private=False,
350 repo_private=False,
351 repo_name=repo_name,
351 repo_name=repo_name,
352 repo_type=backend.alias,
352 repo_type=backend.alias,
353 repo_description='',
353 repo_description='',
354 clone_uri=reposerver.url,
354 clone_uri=reposerver.url,
355 csrf_token=csrf_token),
355 csrf_token=csrf_token),
356 status=302)
356 status=302)
357
357
358 # Should be redirected to the creating page
358 # Should be redirected to the creating page
359 response.mustcontain('repo_creating')
359 response.mustcontain('repo_creating')
360
360
361 # Expecting that both repositories have same history
361 # Expecting that both repositories have same history
362 source_repo = RepoModel().get_by_repo_name(source_repo_name)
362 source_repo = RepoModel().get_by_repo_name(source_repo_name)
363 source_vcs = source_repo.scm_instance()
363 source_vcs = source_repo.scm_instance()
364 repo = RepoModel().get_by_repo_name(repo_name)
364 repo = RepoModel().get_by_repo_name(repo_name)
365 repo_vcs = repo.scm_instance()
365 repo_vcs = repo.scm_instance()
366 assert source_vcs[0].message == repo_vcs[0].message
366 assert source_vcs[0].message == repo_vcs[0].message
367 assert source_vcs.count() == repo_vcs.count()
367 assert source_vcs.count() == repo_vcs.count()
368 assert source_vcs.commit_ids == repo_vcs.commit_ids
368 assert source_vcs.commit_ids == repo_vcs.commit_ids
369
369
370 @pytest.mark.xfail_backends("svn", reason="Depends on import support")
370 @pytest.mark.xfail_backends("svn", reason="Depends on import support")
371 def test_create_remote_repo_wrong_clone_uri(self, autologin_user, backend,
371 def test_create_remote_repo_wrong_clone_uri(self, autologin_user, backend,
372 csrf_token):
372 csrf_token):
373 repo_name = backend.new_repo_name()
373 repo_name = backend.new_repo_name()
374 description = 'description for newly created repo'
374 description = 'description for newly created repo'
375 response = self.app.post(
375 response = self.app.post(
376 route_path('repo_create'),
376 route_path('repo_create'),
377 fixture._get_repo_create_params(
377 fixture._get_repo_create_params(
378 repo_private=False,
378 repo_private=False,
379 repo_name=repo_name,
379 repo_name=repo_name,
380 repo_type=backend.alias,
380 repo_type=backend.alias,
381 repo_description=description,
381 repo_description=description,
382 clone_uri='http://repo.invalid/repo',
382 clone_uri='http://repo.invalid/repo',
383 csrf_token=csrf_token))
383 csrf_token=csrf_token))
384 response.mustcontain('invalid clone url')
384 response.mustcontain('invalid clone url')
385
385
386 @pytest.mark.xfail_backends("svn", reason="Depends on import support")
386 @pytest.mark.xfail_backends("svn", reason="Depends on import support")
387 def test_create_remote_repo_wrong_clone_uri_hg_svn(
387 def test_create_remote_repo_wrong_clone_uri_hg_svn(
388 self, autologin_user, backend, csrf_token):
388 self, autologin_user, backend, csrf_token):
389 repo_name = backend.new_repo_name()
389 repo_name = backend.new_repo_name()
390 description = 'description for newly created repo'
390 description = 'description for newly created repo'
391 response = self.app.post(
391 response = self.app.post(
392 route_path('repo_create'),
392 route_path('repo_create'),
393 fixture._get_repo_create_params(
393 fixture._get_repo_create_params(
394 repo_private=False,
394 repo_private=False,
395 repo_name=repo_name,
395 repo_name=repo_name,
396 repo_type=backend.alias,
396 repo_type=backend.alias,
397 repo_description=description,
397 repo_description=description,
398 clone_uri='svn+http://svn.invalid/repo',
398 clone_uri='svn+http://svn.invalid/repo',
399 csrf_token=csrf_token))
399 csrf_token=csrf_token))
400 response.mustcontain('invalid clone url')
400 response.mustcontain('invalid clone url')
401
401
402 def test_create_with_git_suffix(
402 def test_create_with_git_suffix(
403 self, autologin_user, backend, csrf_token):
403 self, autologin_user, backend, csrf_token):
404 repo_name = backend.new_repo_name() + ".git"
404 repo_name = backend.new_repo_name() + ".git"
405 description = 'description for newly created repo'
405 description = 'description for newly created repo'
406 response = self.app.post(
406 response = self.app.post(
407 route_path('repo_create'),
407 route_path('repo_create'),
408 fixture._get_repo_create_params(
408 fixture._get_repo_create_params(
409 repo_private=False,
409 repo_private=False,
410 repo_name=repo_name,
410 repo_name=repo_name,
411 repo_type=backend.alias,
411 repo_type=backend.alias,
412 repo_description=description,
412 repo_description=description,
413 csrf_token=csrf_token))
413 csrf_token=csrf_token))
414 response.mustcontain('Repository name cannot end with .git')
414 response.mustcontain('Repository name cannot end with .git')
415
415
416 def test_default_user_cannot_access_private_repo_in_a_group(
416 def test_default_user_cannot_access_private_repo_in_a_group(
417 self, autologin_user, user_util, backend):
417 self, autologin_user, user_util, backend):
418
418
419 group = user_util.create_repo_group()
419 group = user_util.create_repo_group()
420
420
421 repo = backend.create_repo(
421 repo = backend.create_repo(
422 repo_private=True, repo_group=group, repo_copy_permissions=True)
422 repo_private=True, repo_group=group, repo_copy_permissions=True)
423
423
424 permissions = _get_permission_for_user(
424 permissions = _get_permission_for_user(
425 user='default', repo=repo.repo_name)
425 user='default', repo=repo.repo_name)
426 assert len(permissions) == 1
426 assert len(permissions) == 1
427 assert permissions[0].permission.permission_name == 'repository.none'
427 assert permissions[0].permission.permission_name == 'repository.none'
428 assert permissions[0].repository.private is True
428 assert permissions[0].repository.private is True
429
429
430 def test_create_on_top_level_without_permissions(self, backend):
430 def test_create_on_top_level_without_permissions(self, backend):
431 session = login_user_session(
431 session = login_user_session(
432 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
432 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
433 csrf_token = auth.get_csrf_token(session)
433 csrf_token = auth.get_csrf_token(session)
434
434
435 # revoke
435 # revoke
436 user_model = UserModel()
436 user_model = UserModel()
437 # disable fork and create on default user
437 # disable fork and create on default user
438 user_model.revoke_perm(User.DEFAULT_USER, 'hg.create.repository')
438 user_model.revoke_perm(User.DEFAULT_USER, 'hg.create.repository')
439 user_model.grant_perm(User.DEFAULT_USER, 'hg.create.none')
439 user_model.grant_perm(User.DEFAULT_USER, 'hg.create.none')
440 user_model.revoke_perm(User.DEFAULT_USER, 'hg.fork.repository')
440 user_model.revoke_perm(User.DEFAULT_USER, 'hg.fork.repository')
441 user_model.grant_perm(User.DEFAULT_USER, 'hg.fork.none')
441 user_model.grant_perm(User.DEFAULT_USER, 'hg.fork.none')
442
442
443 # disable on regular user
443 # disable on regular user
444 user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.repository')
444 user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.repository')
445 user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.none')
445 user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.create.none')
446 user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.repository')
446 user_model.revoke_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.repository')
447 user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.none')
447 user_model.grant_perm(TEST_USER_REGULAR_LOGIN, 'hg.fork.none')
448 Session().commit()
448 Session().commit()
449
449
450 repo_name = backend.new_repo_name()
450 repo_name = backend.new_repo_name()
451 description = 'description for newly created repo'
451 description = 'description for newly created repo'
452 response = self.app.post(
452 response = self.app.post(
453 route_path('repo_create'),
453 route_path('repo_create'),
454 fixture._get_repo_create_params(
454 fixture._get_repo_create_params(
455 repo_private=False,
455 repo_private=False,
456 repo_name=repo_name,
456 repo_name=repo_name,
457 repo_type=backend.alias,
457 repo_type=backend.alias,
458 repo_description=description,
458 repo_description=description,
459 csrf_token=csrf_token))
459 csrf_token=csrf_token))
460
460
461 response.mustcontain(
461 response.mustcontain(
462 u"You do not have the permission to store repositories in "
462 u"You do not have the permission to store repositories in "
463 u"the root location.")
463 u"the root location.")
464
464
465 @mock.patch.object(RepoModel, '_create_filesystem_repo', error_function)
465 @mock.patch.object(RepoModel, '_create_filesystem_repo', error_function)
466 def test_create_repo_when_filesystem_op_fails(
466 def test_create_repo_when_filesystem_op_fails(
467 self, autologin_user, backend, csrf_token):
467 self, autologin_user, backend, csrf_token):
468 repo_name = backend.new_repo_name()
468 repo_name = backend.new_repo_name()
469 description = 'description for newly created repo'
469 description = 'description for newly created repo'
470
470
471 response = self.app.post(
471 response = self.app.post(
472 route_path('repo_create'),
472 route_path('repo_create'),
473 fixture._get_repo_create_params(
473 fixture._get_repo_create_params(
474 repo_private=False,
474 repo_private=False,
475 repo_name=repo_name,
475 repo_name=repo_name,
476 repo_type=backend.alias,
476 repo_type=backend.alias,
477 repo_description=description,
477 repo_description=description,
478 csrf_token=csrf_token))
478 csrf_token=csrf_token))
479
479
480 assert_session_flash(
480 assert_session_flash(
481 response, 'Error creating repository %s' % repo_name)
481 response, 'Error creating repository %s' % repo_name)
482 # repo must not be in db
482 # repo must not be in db
483 assert backend.repo is None
483 assert backend.repo is None
484 # repo must not be in filesystem !
484 # repo must not be in filesystem !
485 assert not repo_on_filesystem(repo_name)
485 assert not repo_on_filesystem(repo_name)
486
486
487 def assert_repository_is_created_correctly(
487 def assert_repository_is_created_correctly(
488 self, repo_name, description, backend):
488 self, repo_name, description, backend):
489 repo_name_utf8 = safe_str(repo_name)
489 repo_name_utf8 = safe_str(repo_name)
490
490
491 # run the check page that triggers the flash message
491 # run the check page that triggers the flash message
492 response = self.app.get(
492 response = self.app.get(
493 route_path('repo_creating_check', repo_name=safe_str(repo_name)))
493 route_path('repo_creating_check', repo_name=safe_str(repo_name)))
494 assert response.json == {u'result': True}
494 assert response.json == {u'result': True}
495
495
496 flash_msg = u'Created repository <a href="/{}">{}</a>'.format(
496 flash_msg = u'Created repository <a href="/{}">{}</a>'.format(
497 urllib.quote(repo_name_utf8), repo_name)
497 urllib.quote(repo_name_utf8), repo_name)
498 assert_session_flash(response, flash_msg)
498 assert_session_flash(response, flash_msg)
499
499
500 # test if the repo was created in the database
500 # test if the repo was created in the database
501 new_repo = RepoModel().get_by_repo_name(repo_name)
501 new_repo = RepoModel().get_by_repo_name(repo_name)
502
502
503 assert new_repo.repo_name == repo_name
503 assert new_repo.repo_name == repo_name
504 assert new_repo.description == description
504 assert new_repo.description == description
505
505
506 # test if the repository is visible in the list ?
506 # test if the repository is visible in the list ?
507 response = self.app.get(
507 response = self.app.get(
508 h.route_path('repo_summary', repo_name=safe_str(repo_name)))
508 h.route_path('repo_summary', repo_name=safe_str(repo_name)))
509 response.mustcontain(repo_name)
509 response.mustcontain(repo_name)
510 response.mustcontain(backend.alias)
510 response.mustcontain(backend.alias)
511
511
512 assert repo_on_filesystem(repo_name)
512 assert repo_on_filesystem(repo_name)
@@ -1,743 +1,743 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import mock
21 import mock
22 import pytest
22 import pytest
23
23
24 import rhodecode
24 import rhodecode
25 from rhodecode.apps._base import ADMIN_PREFIX
25 from rhodecode.apps._base import ADMIN_PREFIX
26 from rhodecode.lib.utils2 import md5
26 from rhodecode.lib.utils2 import md5
27 from rhodecode.model.db import RhodeCodeUi
27 from rhodecode.model.db import RhodeCodeUi
28 from rhodecode.model.meta import Session
28 from rhodecode.model.meta import Session
29 from rhodecode.model.settings import SettingsModel, IssueTrackerSettingsModel
29 from rhodecode.model.settings import SettingsModel, IssueTrackerSettingsModel
30 from rhodecode.tests import assert_session_flash
30 from rhodecode.tests import assert_session_flash
31 from rhodecode.tests.utils import AssertResponse
31 from rhodecode.tests.utils import AssertResponse
32
32
33
33
34 UPDATE_DATA_QUALNAME = 'rhodecode.model.update.UpdateModel.get_update_data'
34 UPDATE_DATA_QUALNAME = 'rhodecode.model.update.UpdateModel.get_update_data'
35
35
36
36
37 def route_path(name, params=None, **kwargs):
37 def route_path(name, params=None, **kwargs):
38 import urllib
38 import urllib
39 from rhodecode.apps._base import ADMIN_PREFIX
39 from rhodecode.apps._base import ADMIN_PREFIX
40
40
41 base_url = {
41 base_url = {
42
42
43 'admin_settings':
43 'admin_settings':
44 ADMIN_PREFIX +'/settings',
44 ADMIN_PREFIX +'/settings',
45 'admin_settings_update':
45 'admin_settings_update':
46 ADMIN_PREFIX + '/settings/update',
46 ADMIN_PREFIX + '/settings/update',
47 'admin_settings_global':
47 'admin_settings_global':
48 ADMIN_PREFIX + '/settings/global',
48 ADMIN_PREFIX + '/settings/global',
49 'admin_settings_global_update':
49 'admin_settings_global_update':
50 ADMIN_PREFIX + '/settings/global/update',
50 ADMIN_PREFIX + '/settings/global/update',
51 'admin_settings_vcs':
51 'admin_settings_vcs':
52 ADMIN_PREFIX + '/settings/vcs',
52 ADMIN_PREFIX + '/settings/vcs',
53 'admin_settings_vcs_update':
53 'admin_settings_vcs_update':
54 ADMIN_PREFIX + '/settings/vcs/update',
54 ADMIN_PREFIX + '/settings/vcs/update',
55 'admin_settings_vcs_svn_pattern_delete':
55 'admin_settings_vcs_svn_pattern_delete':
56 ADMIN_PREFIX + '/settings/vcs/svn_pattern_delete',
56 ADMIN_PREFIX + '/settings/vcs/svn_pattern_delete',
57 'admin_settings_mapping':
57 'admin_settings_mapping':
58 ADMIN_PREFIX + '/settings/mapping',
58 ADMIN_PREFIX + '/settings/mapping',
59 'admin_settings_mapping_update':
59 'admin_settings_mapping_update':
60 ADMIN_PREFIX + '/settings/mapping/update',
60 ADMIN_PREFIX + '/settings/mapping/update',
61 'admin_settings_visual':
61 'admin_settings_visual':
62 ADMIN_PREFIX + '/settings/visual',
62 ADMIN_PREFIX + '/settings/visual',
63 'admin_settings_visual_update':
63 'admin_settings_visual_update':
64 ADMIN_PREFIX + '/settings/visual/update',
64 ADMIN_PREFIX + '/settings/visual/update',
65 'admin_settings_issuetracker':
65 'admin_settings_issuetracker':
66 ADMIN_PREFIX + '/settings/issue-tracker',
66 ADMIN_PREFIX + '/settings/issue-tracker',
67 'admin_settings_issuetracker_update':
67 'admin_settings_issuetracker_update':
68 ADMIN_PREFIX + '/settings/issue-tracker/update',
68 ADMIN_PREFIX + '/settings/issue-tracker/update',
69 'admin_settings_issuetracker_test':
69 'admin_settings_issuetracker_test':
70 ADMIN_PREFIX + '/settings/issue-tracker/test',
70 ADMIN_PREFIX + '/settings/issue-tracker/test',
71 'admin_settings_issuetracker_delete':
71 'admin_settings_issuetracker_delete':
72 ADMIN_PREFIX + '/settings/issue-tracker/delete',
72 ADMIN_PREFIX + '/settings/issue-tracker/delete',
73 'admin_settings_email':
73 'admin_settings_email':
74 ADMIN_PREFIX + '/settings/email',
74 ADMIN_PREFIX + '/settings/email',
75 'admin_settings_email_update':
75 'admin_settings_email_update':
76 ADMIN_PREFIX + '/settings/email/update',
76 ADMIN_PREFIX + '/settings/email/update',
77 'admin_settings_hooks':
77 'admin_settings_hooks':
78 ADMIN_PREFIX + '/settings/hooks',
78 ADMIN_PREFIX + '/settings/hooks',
79 'admin_settings_hooks_update':
79 'admin_settings_hooks_update':
80 ADMIN_PREFIX + '/settings/hooks/update',
80 ADMIN_PREFIX + '/settings/hooks/update',
81 'admin_settings_hooks_delete':
81 'admin_settings_hooks_delete':
82 ADMIN_PREFIX + '/settings/hooks/delete',
82 ADMIN_PREFIX + '/settings/hooks/delete',
83 'admin_settings_search':
83 'admin_settings_search':
84 ADMIN_PREFIX + '/settings/search',
84 ADMIN_PREFIX + '/settings/search',
85 'admin_settings_labs':
85 'admin_settings_labs':
86 ADMIN_PREFIX + '/settings/labs',
86 ADMIN_PREFIX + '/settings/labs',
87 'admin_settings_labs_update':
87 'admin_settings_labs_update':
88 ADMIN_PREFIX + '/settings/labs/update',
88 ADMIN_PREFIX + '/settings/labs/update',
89
89
90 'admin_settings_sessions':
90 'admin_settings_sessions':
91 ADMIN_PREFIX + '/settings/sessions',
91 ADMIN_PREFIX + '/settings/sessions',
92 'admin_settings_sessions_cleanup':
92 'admin_settings_sessions_cleanup':
93 ADMIN_PREFIX + '/settings/sessions/cleanup',
93 ADMIN_PREFIX + '/settings/sessions/cleanup',
94 'admin_settings_system':
94 'admin_settings_system':
95 ADMIN_PREFIX + '/settings/system',
95 ADMIN_PREFIX + '/settings/system',
96 'admin_settings_system_update':
96 'admin_settings_system_update':
97 ADMIN_PREFIX + '/settings/system/updates',
97 ADMIN_PREFIX + '/settings/system/updates',
98 'admin_settings_open_source':
98 'admin_settings_open_source':
99 ADMIN_PREFIX + '/settings/open_source',
99 ADMIN_PREFIX + '/settings/open_source',
100
100
101
101
102 }[name].format(**kwargs)
102 }[name].format(**kwargs)
103
103
104 if params:
104 if params:
105 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
105 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
106 return base_url
106 return base_url
107
107
108
108
109 @pytest.mark.usefixtures('autologin_user', 'app')
109 @pytest.mark.usefixtures('autologin_user', 'app')
110 class TestAdminSettingsController(object):
110 class TestAdminSettingsController(object):
111
111
112 @pytest.mark.parametrize('urlname', [
112 @pytest.mark.parametrize('urlname', [
113 'admin_settings_vcs',
113 'admin_settings_vcs',
114 'admin_settings_mapping',
114 'admin_settings_mapping',
115 'admin_settings_global',
115 'admin_settings_global',
116 'admin_settings_visual',
116 'admin_settings_visual',
117 'admin_settings_email',
117 'admin_settings_email',
118 'admin_settings_hooks',
118 'admin_settings_hooks',
119 'admin_settings_search',
119 'admin_settings_search',
120 ])
120 ])
121 def test_simple_get(self, urlname):
121 def test_simple_get(self, urlname):
122 self.app.get(route_path(urlname))
122 self.app.get(route_path(urlname))
123
123
124 def test_create_custom_hook(self, csrf_token):
124 def test_create_custom_hook(self, csrf_token):
125 response = self.app.post(
125 response = self.app.post(
126 route_path('admin_settings_hooks_update'),
126 route_path('admin_settings_hooks_update'),
127 params={
127 params={
128 'new_hook_ui_key': 'test_hooks_1',
128 'new_hook_ui_key': 'test_hooks_1',
129 'new_hook_ui_value': 'cd /tmp',
129 'new_hook_ui_value': 'cd /tmp',
130 'csrf_token': csrf_token})
130 'csrf_token': csrf_token})
131
131
132 response = response.follow()
132 response = response.follow()
133 response.mustcontain('test_hooks_1')
133 response.mustcontain('test_hooks_1')
134 response.mustcontain('cd /tmp')
134 response.mustcontain('cd /tmp')
135
135
136 def test_create_custom_hook_delete(self, csrf_token):
136 def test_create_custom_hook_delete(self, csrf_token):
137 response = self.app.post(
137 response = self.app.post(
138 route_path('admin_settings_hooks_update'),
138 route_path('admin_settings_hooks_update'),
139 params={
139 params={
140 'new_hook_ui_key': 'test_hooks_2',
140 'new_hook_ui_key': 'test_hooks_2',
141 'new_hook_ui_value': 'cd /tmp2',
141 'new_hook_ui_value': 'cd /tmp2',
142 'csrf_token': csrf_token})
142 'csrf_token': csrf_token})
143
143
144 response = response.follow()
144 response = response.follow()
145 response.mustcontain('test_hooks_2')
145 response.mustcontain('test_hooks_2')
146 response.mustcontain('cd /tmp2')
146 response.mustcontain('cd /tmp2')
147
147
148 hook_id = SettingsModel().get_ui_by_key('test_hooks_2').ui_id
148 hook_id = SettingsModel().get_ui_by_key('test_hooks_2').ui_id
149
149
150 # delete
150 # delete
151 self.app.post(
151 self.app.post(
152 route_path('admin_settings_hooks_delete'),
152 route_path('admin_settings_hooks_delete'),
153 params={'hook_id': hook_id, 'csrf_token': csrf_token})
153 params={'hook_id': hook_id, 'csrf_token': csrf_token})
154 response = self.app.get(route_path('admin_settings_hooks'))
154 response = self.app.get(route_path('admin_settings_hooks'))
155 response.mustcontain(no=['test_hooks_2'])
155 response.mustcontain(no=['test_hooks_2'])
156 response.mustcontain(no=['cd /tmp2'])
156 response.mustcontain(no=['cd /tmp2'])
157
157
158
158
159 @pytest.mark.usefixtures('autologin_user', 'app')
159 @pytest.mark.usefixtures('autologin_user', 'app')
160 class TestAdminSettingsGlobal(object):
160 class TestAdminSettingsGlobal(object):
161
161
162 def test_pre_post_code_code_active(self, csrf_token):
162 def test_pre_post_code_code_active(self, csrf_token):
163 pre_code = 'rc-pre-code-187652122'
163 pre_code = 'rc-pre-code-187652122'
164 post_code = 'rc-postcode-98165231'
164 post_code = 'rc-postcode-98165231'
165
165
166 response = self.post_and_verify_settings({
166 response = self.post_and_verify_settings({
167 'rhodecode_pre_code': pre_code,
167 'rhodecode_pre_code': pre_code,
168 'rhodecode_post_code': post_code,
168 'rhodecode_post_code': post_code,
169 'csrf_token': csrf_token,
169 'csrf_token': csrf_token,
170 })
170 })
171
171
172 response = response.follow()
172 response = response.follow()
173 response.mustcontain(pre_code, post_code)
173 response.mustcontain(pre_code, post_code)
174
174
175 def test_pre_post_code_code_inactive(self, csrf_token):
175 def test_pre_post_code_code_inactive(self, csrf_token):
176 pre_code = 'rc-pre-code-187652122'
176 pre_code = 'rc-pre-code-187652122'
177 post_code = 'rc-postcode-98165231'
177 post_code = 'rc-postcode-98165231'
178 response = self.post_and_verify_settings({
178 response = self.post_and_verify_settings({
179 'rhodecode_pre_code': '',
179 'rhodecode_pre_code': '',
180 'rhodecode_post_code': '',
180 'rhodecode_post_code': '',
181 'csrf_token': csrf_token,
181 'csrf_token': csrf_token,
182 })
182 })
183
183
184 response = response.follow()
184 response = response.follow()
185 response.mustcontain(no=[pre_code, post_code])
185 response.mustcontain(no=[pre_code, post_code])
186
186
187 def test_captcha_activate(self, csrf_token):
187 def test_captcha_activate(self, csrf_token):
188 self.post_and_verify_settings({
188 self.post_and_verify_settings({
189 'rhodecode_captcha_private_key': '1234567890',
189 'rhodecode_captcha_private_key': '1234567890',
190 'rhodecode_captcha_public_key': '1234567890',
190 'rhodecode_captcha_public_key': '1234567890',
191 'csrf_token': csrf_token,
191 'csrf_token': csrf_token,
192 })
192 })
193
193
194 response = self.app.get(ADMIN_PREFIX + '/register')
194 response = self.app.get(ADMIN_PREFIX + '/register')
195 response.mustcontain('captcha')
195 response.mustcontain('captcha')
196
196
197 def test_captcha_deactivate(self, csrf_token):
197 def test_captcha_deactivate(self, csrf_token):
198 self.post_and_verify_settings({
198 self.post_and_verify_settings({
199 'rhodecode_captcha_private_key': '',
199 'rhodecode_captcha_private_key': '',
200 'rhodecode_captcha_public_key': '1234567890',
200 'rhodecode_captcha_public_key': '1234567890',
201 'csrf_token': csrf_token,
201 'csrf_token': csrf_token,
202 })
202 })
203
203
204 response = self.app.get(ADMIN_PREFIX + '/register')
204 response = self.app.get(ADMIN_PREFIX + '/register')
205 response.mustcontain(no=['captcha'])
205 response.mustcontain(no=['captcha'])
206
206
207 def test_title_change(self, csrf_token):
207 def test_title_change(self, csrf_token):
208 old_title = 'RhodeCode'
208 old_title = 'RhodeCode'
209
209
210 for new_title in ['Changed', 'Żółwik', old_title]:
210 for new_title in ['Changed', 'Żółwik', old_title]:
211 response = self.post_and_verify_settings({
211 response = self.post_and_verify_settings({
212 'rhodecode_title': new_title,
212 'rhodecode_title': new_title,
213 'csrf_token': csrf_token,
213 'csrf_token': csrf_token,
214 })
214 })
215
215
216 response = response.follow()
216 response = response.follow()
217 response.mustcontain(new_title)
217 response.mustcontain(new_title)
218
218
219 def post_and_verify_settings(self, settings):
219 def post_and_verify_settings(self, settings):
220 old_title = 'RhodeCode'
220 old_title = 'RhodeCode'
221 old_realm = 'RhodeCode authentication'
221 old_realm = 'RhodeCode authentication'
222 params = {
222 params = {
223 'rhodecode_title': old_title,
223 'rhodecode_title': old_title,
224 'rhodecode_realm': old_realm,
224 'rhodecode_realm': old_realm,
225 'rhodecode_pre_code': '',
225 'rhodecode_pre_code': '',
226 'rhodecode_post_code': '',
226 'rhodecode_post_code': '',
227 'rhodecode_captcha_private_key': '',
227 'rhodecode_captcha_private_key': '',
228 'rhodecode_captcha_public_key': '',
228 'rhodecode_captcha_public_key': '',
229 'rhodecode_create_personal_repo_group': False,
229 'rhodecode_create_personal_repo_group': False,
230 'rhodecode_personal_repo_group_pattern': '${username}',
230 'rhodecode_personal_repo_group_pattern': '${username}',
231 }
231 }
232 params.update(settings)
232 params.update(settings)
233 response = self.app.post(
233 response = self.app.post(
234 route_path('admin_settings_global_update'), params=params)
234 route_path('admin_settings_global_update'), params=params)
235
235
236 assert_session_flash(response, 'Updated application settings')
236 assert_session_flash(response, 'Updated application settings')
237 app_settings = SettingsModel().get_all_settings()
237 app_settings = SettingsModel().get_all_settings()
238 del settings['csrf_token']
238 del settings['csrf_token']
239 for key, value in settings.iteritems():
239 for key, value in settings.iteritems():
240 assert app_settings[key] == value.decode('utf-8')
240 assert app_settings[key] == value.decode('utf-8')
241
241
242 return response
242 return response
243
243
244
244
245 @pytest.mark.usefixtures('autologin_user', 'app')
245 @pytest.mark.usefixtures('autologin_user', 'app')
246 class TestAdminSettingsVcs(object):
246 class TestAdminSettingsVcs(object):
247
247
248 def test_contains_svn_default_patterns(self):
248 def test_contains_svn_default_patterns(self):
249 response = self.app.get(route_path('admin_settings_vcs'))
249 response = self.app.get(route_path('admin_settings_vcs'))
250 expected_patterns = [
250 expected_patterns = [
251 '/trunk',
251 '/trunk',
252 '/branches/*',
252 '/branches/*',
253 '/tags/*',
253 '/tags/*',
254 ]
254 ]
255 for pattern in expected_patterns:
255 for pattern in expected_patterns:
256 response.mustcontain(pattern)
256 response.mustcontain(pattern)
257
257
258 def test_add_new_svn_branch_and_tag_pattern(
258 def test_add_new_svn_branch_and_tag_pattern(
259 self, backend_svn, form_defaults, disable_sql_cache,
259 self, backend_svn, form_defaults, disable_sql_cache,
260 csrf_token):
260 csrf_token):
261 form_defaults.update({
261 form_defaults.update({
262 'new_svn_branch': '/exp/branches/*',
262 'new_svn_branch': '/exp/branches/*',
263 'new_svn_tag': '/important_tags/*',
263 'new_svn_tag': '/important_tags/*',
264 'csrf_token': csrf_token,
264 'csrf_token': csrf_token,
265 })
265 })
266
266
267 response = self.app.post(
267 response = self.app.post(
268 route_path('admin_settings_vcs_update'),
268 route_path('admin_settings_vcs_update'),
269 params=form_defaults, status=302)
269 params=form_defaults, status=302)
270 response = response.follow()
270 response = response.follow()
271
271
272 # Expect to find the new values on the page
272 # Expect to find the new values on the page
273 response.mustcontain('/exp/branches/*')
273 response.mustcontain('/exp/branches/*')
274 response.mustcontain('/important_tags/*')
274 response.mustcontain('/important_tags/*')
275
275
276 # Expect that those patterns are used to match branches and tags now
276 # Expect that those patterns are used to match branches and tags now
277 repo = backend_svn['svn-simple-layout'].scm_instance()
277 repo = backend_svn['svn-simple-layout'].scm_instance()
278 assert 'exp/branches/exp-sphinx-docs' in repo.branches
278 assert 'exp/branches/exp-sphinx-docs' in repo.branches
279 assert 'important_tags/v0.5' in repo.tags
279 assert 'important_tags/v0.5' in repo.tags
280
280
281 def test_add_same_svn_value_twice_shows_an_error_message(
281 def test_add_same_svn_value_twice_shows_an_error_message(
282 self, form_defaults, csrf_token, settings_util):
282 self, form_defaults, csrf_token, settings_util):
283 settings_util.create_rhodecode_ui('vcs_svn_branch', '/test')
283 settings_util.create_rhodecode_ui('vcs_svn_branch', '/test')
284 settings_util.create_rhodecode_ui('vcs_svn_tag', '/test')
284 settings_util.create_rhodecode_ui('vcs_svn_tag', '/test')
285
285
286 response = self.app.post(
286 response = self.app.post(
287 route_path('admin_settings_vcs_update'),
287 route_path('admin_settings_vcs_update'),
288 params={
288 params={
289 'paths_root_path': form_defaults['paths_root_path'],
289 'paths_root_path': form_defaults['paths_root_path'],
290 'new_svn_branch': '/test',
290 'new_svn_branch': '/test',
291 'new_svn_tag': '/test',
291 'new_svn_tag': '/test',
292 'csrf_token': csrf_token,
292 'csrf_token': csrf_token,
293 },
293 },
294 status=200)
294 status=200)
295
295
296 response.mustcontain("Pattern already exists")
296 response.mustcontain("Pattern already exists")
297 response.mustcontain("Some form inputs contain invalid data.")
297 response.mustcontain("Some form inputs contain invalid data.")
298
298
299 @pytest.mark.parametrize('section', [
299 @pytest.mark.parametrize('section', [
300 'vcs_svn_branch',
300 'vcs_svn_branch',
301 'vcs_svn_tag',
301 'vcs_svn_tag',
302 ])
302 ])
303 def test_delete_svn_patterns(
303 def test_delete_svn_patterns(
304 self, section, csrf_token, settings_util):
304 self, section, csrf_token, settings_util):
305 setting = settings_util.create_rhodecode_ui(
305 setting = settings_util.create_rhodecode_ui(
306 section, '/test_delete', cleanup=False)
306 section, '/test_delete', cleanup=False)
307
307
308 self.app.post(
308 self.app.post(
309 route_path('admin_settings_vcs_svn_pattern_delete'),
309 route_path('admin_settings_vcs_svn_pattern_delete'),
310 params={
310 params={
311 'delete_svn_pattern': setting.ui_id,
311 'delete_svn_pattern': setting.ui_id,
312 'csrf_token': csrf_token},
312 'csrf_token': csrf_token},
313 headers={'X-REQUESTED-WITH': 'XMLHttpRequest'})
313 headers={'X-REQUESTED-WITH': 'XMLHttpRequest'})
314
314
315 @pytest.mark.parametrize('section', [
315 @pytest.mark.parametrize('section', [
316 'vcs_svn_branch',
316 'vcs_svn_branch',
317 'vcs_svn_tag',
317 'vcs_svn_tag',
318 ])
318 ])
319 def test_delete_svn_patterns_raises_404_when_no_xhr(
319 def test_delete_svn_patterns_raises_404_when_no_xhr(
320 self, section, csrf_token, settings_util):
320 self, section, csrf_token, settings_util):
321 setting = settings_util.create_rhodecode_ui(section, '/test_delete')
321 setting = settings_util.create_rhodecode_ui(section, '/test_delete')
322
322
323 self.app.post(
323 self.app.post(
324 route_path('admin_settings_vcs_svn_pattern_delete'),
324 route_path('admin_settings_vcs_svn_pattern_delete'),
325 params={
325 params={
326 'delete_svn_pattern': setting.ui_id,
326 'delete_svn_pattern': setting.ui_id,
327 'csrf_token': csrf_token},
327 'csrf_token': csrf_token},
328 status=404)
328 status=404)
329
329
330 def test_extensions_hgsubversion(self, form_defaults, csrf_token):
330 def test_extensions_hgsubversion(self, form_defaults, csrf_token):
331 form_defaults.update({
331 form_defaults.update({
332 'csrf_token': csrf_token,
332 'csrf_token': csrf_token,
333 'extensions_hgsubversion': 'True',
333 'extensions_hgsubversion': 'True',
334 })
334 })
335 response = self.app.post(
335 response = self.app.post(
336 route_path('admin_settings_vcs_update'),
336 route_path('admin_settings_vcs_update'),
337 params=form_defaults,
337 params=form_defaults,
338 status=302)
338 status=302)
339
339
340 response = response.follow()
340 response = response.follow()
341 extensions_input = (
341 extensions_input = (
342 '<input id="extensions_hgsubversion" '
342 '<input id="extensions_hgsubversion" '
343 'name="extensions_hgsubversion" type="checkbox" '
343 'name="extensions_hgsubversion" type="checkbox" '
344 'value="True" checked="checked" />')
344 'value="True" checked="checked" />')
345 response.mustcontain(extensions_input)
345 response.mustcontain(extensions_input)
346
346
347 def test_extensions_hgevolve(self, form_defaults, csrf_token):
347 def test_extensions_hgevolve(self, form_defaults, csrf_token):
348 form_defaults.update({
348 form_defaults.update({
349 'csrf_token': csrf_token,
349 'csrf_token': csrf_token,
350 'extensions_evolve': 'True',
350 'extensions_evolve': 'True',
351 })
351 })
352 response = self.app.post(
352 response = self.app.post(
353 route_path('admin_settings_vcs_update'),
353 route_path('admin_settings_vcs_update'),
354 params=form_defaults,
354 params=form_defaults,
355 status=302)
355 status=302)
356
356
357 response = response.follow()
357 response = response.follow()
358 extensions_input = (
358 extensions_input = (
359 '<input id="extensions_evolve" '
359 '<input id="extensions_evolve" '
360 'name="extensions_evolve" type="checkbox" '
360 'name="extensions_evolve" type="checkbox" '
361 'value="True" checked="checked" />')
361 'value="True" checked="checked" />')
362 response.mustcontain(extensions_input)
362 response.mustcontain(extensions_input)
363
363
364 def test_has_a_section_for_pull_request_settings(self):
364 def test_has_a_section_for_pull_request_settings(self):
365 response = self.app.get(route_path('admin_settings_vcs'))
365 response = self.app.get(route_path('admin_settings_vcs'))
366 response.mustcontain('Pull Request Settings')
366 response.mustcontain('Pull Request Settings')
367
367
368 def test_has_an_input_for_invalidation_of_inline_comments(self):
368 def test_has_an_input_for_invalidation_of_inline_comments(self):
369 response = self.app.get(route_path('admin_settings_vcs'))
369 response = self.app.get(route_path('admin_settings_vcs'))
370 assert_response = AssertResponse(response)
370 assert_response = response.assert_response()
371 assert_response.one_element_exists(
371 assert_response.one_element_exists(
372 '[name=rhodecode_use_outdated_comments]')
372 '[name=rhodecode_use_outdated_comments]')
373
373
374 @pytest.mark.parametrize('new_value', [True, False])
374 @pytest.mark.parametrize('new_value', [True, False])
375 def test_allows_to_change_invalidation_of_inline_comments(
375 def test_allows_to_change_invalidation_of_inline_comments(
376 self, form_defaults, csrf_token, new_value):
376 self, form_defaults, csrf_token, new_value):
377 setting_key = 'use_outdated_comments'
377 setting_key = 'use_outdated_comments'
378 setting = SettingsModel().create_or_update_setting(
378 setting = SettingsModel().create_or_update_setting(
379 setting_key, not new_value, 'bool')
379 setting_key, not new_value, 'bool')
380 Session().add(setting)
380 Session().add(setting)
381 Session().commit()
381 Session().commit()
382
382
383 form_defaults.update({
383 form_defaults.update({
384 'csrf_token': csrf_token,
384 'csrf_token': csrf_token,
385 'rhodecode_use_outdated_comments': str(new_value),
385 'rhodecode_use_outdated_comments': str(new_value),
386 })
386 })
387 response = self.app.post(
387 response = self.app.post(
388 route_path('admin_settings_vcs_update'),
388 route_path('admin_settings_vcs_update'),
389 params=form_defaults,
389 params=form_defaults,
390 status=302)
390 status=302)
391 response = response.follow()
391 response = response.follow()
392 setting = SettingsModel().get_setting_by_name(setting_key)
392 setting = SettingsModel().get_setting_by_name(setting_key)
393 assert setting.app_settings_value is new_value
393 assert setting.app_settings_value is new_value
394
394
395 @pytest.mark.parametrize('new_value', [True, False])
395 @pytest.mark.parametrize('new_value', [True, False])
396 def test_allows_to_change_hg_rebase_merge_strategy(
396 def test_allows_to_change_hg_rebase_merge_strategy(
397 self, form_defaults, csrf_token, new_value):
397 self, form_defaults, csrf_token, new_value):
398 setting_key = 'hg_use_rebase_for_merging'
398 setting_key = 'hg_use_rebase_for_merging'
399
399
400 form_defaults.update({
400 form_defaults.update({
401 'csrf_token': csrf_token,
401 'csrf_token': csrf_token,
402 'rhodecode_' + setting_key: str(new_value),
402 'rhodecode_' + setting_key: str(new_value),
403 })
403 })
404
404
405 with mock.patch.dict(
405 with mock.patch.dict(
406 rhodecode.CONFIG, {'labs_settings_active': 'true'}):
406 rhodecode.CONFIG, {'labs_settings_active': 'true'}):
407 self.app.post(
407 self.app.post(
408 route_path('admin_settings_vcs_update'),
408 route_path('admin_settings_vcs_update'),
409 params=form_defaults,
409 params=form_defaults,
410 status=302)
410 status=302)
411
411
412 setting = SettingsModel().get_setting_by_name(setting_key)
412 setting = SettingsModel().get_setting_by_name(setting_key)
413 assert setting.app_settings_value is new_value
413 assert setting.app_settings_value is new_value
414
414
415 @pytest.fixture()
415 @pytest.fixture()
416 def disable_sql_cache(self, request):
416 def disable_sql_cache(self, request):
417 patcher = mock.patch(
417 patcher = mock.patch(
418 'rhodecode.lib.caching_query.FromCache.process_query')
418 'rhodecode.lib.caching_query.FromCache.process_query')
419 request.addfinalizer(patcher.stop)
419 request.addfinalizer(patcher.stop)
420 patcher.start()
420 patcher.start()
421
421
422 @pytest.fixture()
422 @pytest.fixture()
423 def form_defaults(self):
423 def form_defaults(self):
424 from rhodecode.apps.admin.views.settings import AdminSettingsView
424 from rhodecode.apps.admin.views.settings import AdminSettingsView
425 return AdminSettingsView._form_defaults()
425 return AdminSettingsView._form_defaults()
426
426
427 # TODO: johbo: What we really want is to checkpoint before a test run and
427 # TODO: johbo: What we really want is to checkpoint before a test run and
428 # reset the session afterwards.
428 # reset the session afterwards.
429 @pytest.fixture(scope='class', autouse=True)
429 @pytest.fixture(scope='class', autouse=True)
430 def cleanup_settings(self, request, baseapp):
430 def cleanup_settings(self, request, baseapp):
431 ui_id = RhodeCodeUi.ui_id
431 ui_id = RhodeCodeUi.ui_id
432 original_ids = list(
432 original_ids = list(
433 r.ui_id for r in RhodeCodeUi.query().values(ui_id))
433 r.ui_id for r in RhodeCodeUi.query().values(ui_id))
434
434
435 @request.addfinalizer
435 @request.addfinalizer
436 def cleanup():
436 def cleanup():
437 RhodeCodeUi.query().filter(
437 RhodeCodeUi.query().filter(
438 ui_id.notin_(original_ids)).delete(False)
438 ui_id.notin_(original_ids)).delete(False)
439
439
440
440
441 @pytest.mark.usefixtures('autologin_user', 'app')
441 @pytest.mark.usefixtures('autologin_user', 'app')
442 class TestLabsSettings(object):
442 class TestLabsSettings(object):
443 def test_get_settings_page_disabled(self):
443 def test_get_settings_page_disabled(self):
444 with mock.patch.dict(
444 with mock.patch.dict(
445 rhodecode.CONFIG, {'labs_settings_active': 'false'}):
445 rhodecode.CONFIG, {'labs_settings_active': 'false'}):
446
446
447 response = self.app.get(
447 response = self.app.get(
448 route_path('admin_settings_labs'), status=302)
448 route_path('admin_settings_labs'), status=302)
449
449
450 assert response.location.endswith(route_path('admin_settings'))
450 assert response.location.endswith(route_path('admin_settings'))
451
451
452 def test_get_settings_page_enabled(self):
452 def test_get_settings_page_enabled(self):
453 from rhodecode.apps.admin.views import settings
453 from rhodecode.apps.admin.views import settings
454 lab_settings = [
454 lab_settings = [
455 settings.LabSetting(
455 settings.LabSetting(
456 key='rhodecode_bool',
456 key='rhodecode_bool',
457 type='bool',
457 type='bool',
458 group='bool group',
458 group='bool group',
459 label='bool label',
459 label='bool label',
460 help='bool help'
460 help='bool help'
461 ),
461 ),
462 settings.LabSetting(
462 settings.LabSetting(
463 key='rhodecode_text',
463 key='rhodecode_text',
464 type='unicode',
464 type='unicode',
465 group='text group',
465 group='text group',
466 label='text label',
466 label='text label',
467 help='text help'
467 help='text help'
468 ),
468 ),
469 ]
469 ]
470 with mock.patch.dict(rhodecode.CONFIG,
470 with mock.patch.dict(rhodecode.CONFIG,
471 {'labs_settings_active': 'true'}):
471 {'labs_settings_active': 'true'}):
472 with mock.patch.object(settings, '_LAB_SETTINGS', lab_settings):
472 with mock.patch.object(settings, '_LAB_SETTINGS', lab_settings):
473 response = self.app.get(route_path('admin_settings_labs'))
473 response = self.app.get(route_path('admin_settings_labs'))
474
474
475 assert '<label>bool group:</label>' in response
475 assert '<label>bool group:</label>' in response
476 assert '<label for="rhodecode_bool">bool label</label>' in response
476 assert '<label for="rhodecode_bool">bool label</label>' in response
477 assert '<p class="help-block">bool help</p>' in response
477 assert '<p class="help-block">bool help</p>' in response
478 assert 'name="rhodecode_bool" type="checkbox"' in response
478 assert 'name="rhodecode_bool" type="checkbox"' in response
479
479
480 assert '<label>text group:</label>' in response
480 assert '<label>text group:</label>' in response
481 assert '<label for="rhodecode_text">text label</label>' in response
481 assert '<label for="rhodecode_text">text label</label>' in response
482 assert '<p class="help-block">text help</p>' in response
482 assert '<p class="help-block">text help</p>' in response
483 assert 'name="rhodecode_text" size="60" type="text"' in response
483 assert 'name="rhodecode_text" size="60" type="text"' in response
484
484
485
485
486 @pytest.mark.usefixtures('app')
486 @pytest.mark.usefixtures('app')
487 class TestOpenSourceLicenses(object):
487 class TestOpenSourceLicenses(object):
488
488
489 def test_records_are_displayed(self, autologin_user):
489 def test_records_are_displayed(self, autologin_user):
490 sample_licenses = [
490 sample_licenses = [
491 {
491 {
492 "license": [
492 "license": [
493 {
493 {
494 "fullName": "BSD 4-clause \"Original\" or \"Old\" License",
494 "fullName": "BSD 4-clause \"Original\" or \"Old\" License",
495 "shortName": "bsdOriginal",
495 "shortName": "bsdOriginal",
496 "spdxId": "BSD-4-Clause",
496 "spdxId": "BSD-4-Clause",
497 "url": "http://spdx.org/licenses/BSD-4-Clause.html"
497 "url": "http://spdx.org/licenses/BSD-4-Clause.html"
498 }
498 }
499 ],
499 ],
500 "name": "python2.7-coverage-3.7.1"
500 "name": "python2.7-coverage-3.7.1"
501 },
501 },
502 {
502 {
503 "license": [
503 "license": [
504 {
504 {
505 "fullName": "MIT License",
505 "fullName": "MIT License",
506 "shortName": "mit",
506 "shortName": "mit",
507 "spdxId": "MIT",
507 "spdxId": "MIT",
508 "url": "http://spdx.org/licenses/MIT.html"
508 "url": "http://spdx.org/licenses/MIT.html"
509 }
509 }
510 ],
510 ],
511 "name": "python2.7-bootstrapped-pip-9.0.1"
511 "name": "python2.7-bootstrapped-pip-9.0.1"
512 },
512 },
513 ]
513 ]
514 read_licenses_patch = mock.patch(
514 read_licenses_patch = mock.patch(
515 'rhodecode.apps.admin.views.open_source_licenses.read_opensource_licenses',
515 'rhodecode.apps.admin.views.open_source_licenses.read_opensource_licenses',
516 return_value=sample_licenses)
516 return_value=sample_licenses)
517 with read_licenses_patch:
517 with read_licenses_patch:
518 response = self.app.get(
518 response = self.app.get(
519 route_path('admin_settings_open_source'), status=200)
519 route_path('admin_settings_open_source'), status=200)
520
520
521 assert_response = AssertResponse(response)
521 assert_response = response.assert_response()
522 assert_response.element_contains(
522 assert_response.element_contains(
523 '.panel-heading', 'Licenses of Third Party Packages')
523 '.panel-heading', 'Licenses of Third Party Packages')
524 for license_data in sample_licenses:
524 for license_data in sample_licenses:
525 response.mustcontain(license_data["license"][0]["spdxId"])
525 response.mustcontain(license_data["license"][0]["spdxId"])
526 assert_response.element_contains('.panel-body', license_data["name"])
526 assert_response.element_contains('.panel-body', license_data["name"])
527
527
528 def test_records_can_be_read(self, autologin_user):
528 def test_records_can_be_read(self, autologin_user):
529 response = self.app.get(
529 response = self.app.get(
530 route_path('admin_settings_open_source'), status=200)
530 route_path('admin_settings_open_source'), status=200)
531 assert_response = AssertResponse(response)
531 assert_response = response.assert_response()
532 assert_response.element_contains(
532 assert_response.element_contains(
533 '.panel-heading', 'Licenses of Third Party Packages')
533 '.panel-heading', 'Licenses of Third Party Packages')
534
534
535 def test_forbidden_when_normal_user(self, autologin_regular_user):
535 def test_forbidden_when_normal_user(self, autologin_regular_user):
536 self.app.get(
536 self.app.get(
537 route_path('admin_settings_open_source'), status=404)
537 route_path('admin_settings_open_source'), status=404)
538
538
539
539
540 @pytest.mark.usefixtures('app')
540 @pytest.mark.usefixtures('app')
541 class TestUserSessions(object):
541 class TestUserSessions(object):
542
542
543 def test_forbidden_when_normal_user(self, autologin_regular_user):
543 def test_forbidden_when_normal_user(self, autologin_regular_user):
544 self.app.get(route_path('admin_settings_sessions'), status=404)
544 self.app.get(route_path('admin_settings_sessions'), status=404)
545
545
546 def test_show_sessions_page(self, autologin_user):
546 def test_show_sessions_page(self, autologin_user):
547 response = self.app.get(route_path('admin_settings_sessions'), status=200)
547 response = self.app.get(route_path('admin_settings_sessions'), status=200)
548 response.mustcontain('file')
548 response.mustcontain('file')
549
549
550 def test_cleanup_old_sessions(self, autologin_user, csrf_token):
550 def test_cleanup_old_sessions(self, autologin_user, csrf_token):
551
551
552 post_data = {
552 post_data = {
553 'csrf_token': csrf_token,
553 'csrf_token': csrf_token,
554 'expire_days': '60'
554 'expire_days': '60'
555 }
555 }
556 response = self.app.post(
556 response = self.app.post(
557 route_path('admin_settings_sessions_cleanup'), params=post_data,
557 route_path('admin_settings_sessions_cleanup'), params=post_data,
558 status=302)
558 status=302)
559 assert_session_flash(response, 'Cleaned up old sessions')
559 assert_session_flash(response, 'Cleaned up old sessions')
560
560
561
561
562 @pytest.mark.usefixtures('app')
562 @pytest.mark.usefixtures('app')
563 class TestAdminSystemInfo(object):
563 class TestAdminSystemInfo(object):
564
564
565 def test_forbidden_when_normal_user(self, autologin_regular_user):
565 def test_forbidden_when_normal_user(self, autologin_regular_user):
566 self.app.get(route_path('admin_settings_system'), status=404)
566 self.app.get(route_path('admin_settings_system'), status=404)
567
567
568 def test_system_info_page(self, autologin_user):
568 def test_system_info_page(self, autologin_user):
569 response = self.app.get(route_path('admin_settings_system'))
569 response = self.app.get(route_path('admin_settings_system'))
570 response.mustcontain('RhodeCode Community Edition, version {}'.format(
570 response.mustcontain('RhodeCode Community Edition, version {}'.format(
571 rhodecode.__version__))
571 rhodecode.__version__))
572
572
573 def test_system_update_new_version(self, autologin_user):
573 def test_system_update_new_version(self, autologin_user):
574 update_data = {
574 update_data = {
575 'versions': [
575 'versions': [
576 {
576 {
577 'version': '100.3.1415926535',
577 'version': '100.3.1415926535',
578 'general': 'The latest version we are ever going to ship'
578 'general': 'The latest version we are ever going to ship'
579 },
579 },
580 {
580 {
581 'version': '0.0.0',
581 'version': '0.0.0',
582 'general': 'The first version we ever shipped'
582 'general': 'The first version we ever shipped'
583 }
583 }
584 ]
584 ]
585 }
585 }
586 with mock.patch(UPDATE_DATA_QUALNAME, return_value=update_data):
586 with mock.patch(UPDATE_DATA_QUALNAME, return_value=update_data):
587 response = self.app.get(route_path('admin_settings_system_update'))
587 response = self.app.get(route_path('admin_settings_system_update'))
588 response.mustcontain('A <b>new version</b> is available')
588 response.mustcontain('A <b>new version</b> is available')
589
589
590 def test_system_update_nothing_new(self, autologin_user):
590 def test_system_update_nothing_new(self, autologin_user):
591 update_data = {
591 update_data = {
592 'versions': [
592 'versions': [
593 {
593 {
594 'version': '0.0.0',
594 'version': '0.0.0',
595 'general': 'The first version we ever shipped'
595 'general': 'The first version we ever shipped'
596 }
596 }
597 ]
597 ]
598 }
598 }
599 with mock.patch(UPDATE_DATA_QUALNAME, return_value=update_data):
599 with mock.patch(UPDATE_DATA_QUALNAME, return_value=update_data):
600 response = self.app.get(route_path('admin_settings_system_update'))
600 response = self.app.get(route_path('admin_settings_system_update'))
601 response.mustcontain(
601 response.mustcontain(
602 'This instance is already running the <b>latest</b> stable version')
602 'This instance is already running the <b>latest</b> stable version')
603
603
604 def test_system_update_bad_response(self, autologin_user):
604 def test_system_update_bad_response(self, autologin_user):
605 with mock.patch(UPDATE_DATA_QUALNAME, side_effect=ValueError('foo')):
605 with mock.patch(UPDATE_DATA_QUALNAME, side_effect=ValueError('foo')):
606 response = self.app.get(route_path('admin_settings_system_update'))
606 response = self.app.get(route_path('admin_settings_system_update'))
607 response.mustcontain(
607 response.mustcontain(
608 'Bad data sent from update server')
608 'Bad data sent from update server')
609
609
610
610
611 @pytest.mark.usefixtures("app")
611 @pytest.mark.usefixtures("app")
612 class TestAdminSettingsIssueTracker(object):
612 class TestAdminSettingsIssueTracker(object):
613 RC_PREFIX = 'rhodecode_'
613 RC_PREFIX = 'rhodecode_'
614 SHORT_PATTERN_KEY = 'issuetracker_pat_'
614 SHORT_PATTERN_KEY = 'issuetracker_pat_'
615 PATTERN_KEY = RC_PREFIX + SHORT_PATTERN_KEY
615 PATTERN_KEY = RC_PREFIX + SHORT_PATTERN_KEY
616
616
617 def test_issuetracker_index(self, autologin_user):
617 def test_issuetracker_index(self, autologin_user):
618 response = self.app.get(route_path('admin_settings_issuetracker'))
618 response = self.app.get(route_path('admin_settings_issuetracker'))
619 assert response.status_code == 200
619 assert response.status_code == 200
620
620
621 def test_add_empty_issuetracker_pattern(
621 def test_add_empty_issuetracker_pattern(
622 self, request, autologin_user, csrf_token):
622 self, request, autologin_user, csrf_token):
623 post_url = route_path('admin_settings_issuetracker_update')
623 post_url = route_path('admin_settings_issuetracker_update')
624 post_data = {
624 post_data = {
625 'csrf_token': csrf_token
625 'csrf_token': csrf_token
626 }
626 }
627 self.app.post(post_url, post_data, status=302)
627 self.app.post(post_url, post_data, status=302)
628
628
629 def test_add_issuetracker_pattern(
629 def test_add_issuetracker_pattern(
630 self, request, autologin_user, csrf_token):
630 self, request, autologin_user, csrf_token):
631 pattern = 'issuetracker_pat'
631 pattern = 'issuetracker_pat'
632 another_pattern = pattern+'1'
632 another_pattern = pattern+'1'
633 post_url = route_path('admin_settings_issuetracker_update')
633 post_url = route_path('admin_settings_issuetracker_update')
634 post_data = {
634 post_data = {
635 'new_pattern_pattern_0': pattern,
635 'new_pattern_pattern_0': pattern,
636 'new_pattern_url_0': 'http://url',
636 'new_pattern_url_0': 'http://url',
637 'new_pattern_prefix_0': 'prefix',
637 'new_pattern_prefix_0': 'prefix',
638 'new_pattern_description_0': 'description',
638 'new_pattern_description_0': 'description',
639 'new_pattern_pattern_1': another_pattern,
639 'new_pattern_pattern_1': another_pattern,
640 'new_pattern_url_1': 'https://url1',
640 'new_pattern_url_1': 'https://url1',
641 'new_pattern_prefix_1': 'prefix1',
641 'new_pattern_prefix_1': 'prefix1',
642 'new_pattern_description_1': 'description1',
642 'new_pattern_description_1': 'description1',
643 'csrf_token': csrf_token
643 'csrf_token': csrf_token
644 }
644 }
645 self.app.post(post_url, post_data, status=302)
645 self.app.post(post_url, post_data, status=302)
646 settings = SettingsModel().get_all_settings()
646 settings = SettingsModel().get_all_settings()
647 self.uid = md5(pattern)
647 self.uid = md5(pattern)
648 assert settings[self.PATTERN_KEY+self.uid] == pattern
648 assert settings[self.PATTERN_KEY+self.uid] == pattern
649 self.another_uid = md5(another_pattern)
649 self.another_uid = md5(another_pattern)
650 assert settings[self.PATTERN_KEY+self.another_uid] == another_pattern
650 assert settings[self.PATTERN_KEY+self.another_uid] == another_pattern
651
651
652 @request.addfinalizer
652 @request.addfinalizer
653 def cleanup():
653 def cleanup():
654 defaults = SettingsModel().get_all_settings()
654 defaults = SettingsModel().get_all_settings()
655
655
656 entries = [name for name in defaults if (
656 entries = [name for name in defaults if (
657 (self.uid in name) or (self.another_uid) in name)]
657 (self.uid in name) or (self.another_uid) in name)]
658 start = len(self.RC_PREFIX)
658 start = len(self.RC_PREFIX)
659 for del_key in entries:
659 for del_key in entries:
660 # TODO: anderson: get_by_name needs name without prefix
660 # TODO: anderson: get_by_name needs name without prefix
661 entry = SettingsModel().get_setting_by_name(del_key[start:])
661 entry = SettingsModel().get_setting_by_name(del_key[start:])
662 Session().delete(entry)
662 Session().delete(entry)
663
663
664 Session().commit()
664 Session().commit()
665
665
666 def test_edit_issuetracker_pattern(
666 def test_edit_issuetracker_pattern(
667 self, autologin_user, backend, csrf_token, request):
667 self, autologin_user, backend, csrf_token, request):
668 old_pattern = 'issuetracker_pat'
668 old_pattern = 'issuetracker_pat'
669 old_uid = md5(old_pattern)
669 old_uid = md5(old_pattern)
670 pattern = 'issuetracker_pat_new'
670 pattern = 'issuetracker_pat_new'
671 self.new_uid = md5(pattern)
671 self.new_uid = md5(pattern)
672
672
673 SettingsModel().create_or_update_setting(
673 SettingsModel().create_or_update_setting(
674 self.SHORT_PATTERN_KEY+old_uid, old_pattern, 'unicode')
674 self.SHORT_PATTERN_KEY+old_uid, old_pattern, 'unicode')
675
675
676 post_url = route_path('admin_settings_issuetracker_update')
676 post_url = route_path('admin_settings_issuetracker_update')
677 post_data = {
677 post_data = {
678 'new_pattern_pattern_0': pattern,
678 'new_pattern_pattern_0': pattern,
679 'new_pattern_url_0': 'https://url',
679 'new_pattern_url_0': 'https://url',
680 'new_pattern_prefix_0': 'prefix',
680 'new_pattern_prefix_0': 'prefix',
681 'new_pattern_description_0': 'description',
681 'new_pattern_description_0': 'description',
682 'uid': old_uid,
682 'uid': old_uid,
683 'csrf_token': csrf_token
683 'csrf_token': csrf_token
684 }
684 }
685 self.app.post(post_url, post_data, status=302)
685 self.app.post(post_url, post_data, status=302)
686 settings = SettingsModel().get_all_settings()
686 settings = SettingsModel().get_all_settings()
687 assert settings[self.PATTERN_KEY+self.new_uid] == pattern
687 assert settings[self.PATTERN_KEY+self.new_uid] == pattern
688 assert self.PATTERN_KEY+old_uid not in settings
688 assert self.PATTERN_KEY+old_uid not in settings
689
689
690 @request.addfinalizer
690 @request.addfinalizer
691 def cleanup():
691 def cleanup():
692 IssueTrackerSettingsModel().delete_entries(self.new_uid)
692 IssueTrackerSettingsModel().delete_entries(self.new_uid)
693
693
694 def test_replace_issuetracker_pattern_description(
694 def test_replace_issuetracker_pattern_description(
695 self, autologin_user, csrf_token, request, settings_util):
695 self, autologin_user, csrf_token, request, settings_util):
696 prefix = 'issuetracker'
696 prefix = 'issuetracker'
697 pattern = 'issuetracker_pat'
697 pattern = 'issuetracker_pat'
698 self.uid = md5(pattern)
698 self.uid = md5(pattern)
699 pattern_key = '_'.join([prefix, 'pat', self.uid])
699 pattern_key = '_'.join([prefix, 'pat', self.uid])
700 rc_pattern_key = '_'.join(['rhodecode', pattern_key])
700 rc_pattern_key = '_'.join(['rhodecode', pattern_key])
701 desc_key = '_'.join([prefix, 'desc', self.uid])
701 desc_key = '_'.join([prefix, 'desc', self.uid])
702 rc_desc_key = '_'.join(['rhodecode', desc_key])
702 rc_desc_key = '_'.join(['rhodecode', desc_key])
703 new_description = 'new_description'
703 new_description = 'new_description'
704
704
705 settings_util.create_rhodecode_setting(
705 settings_util.create_rhodecode_setting(
706 pattern_key, pattern, 'unicode', cleanup=False)
706 pattern_key, pattern, 'unicode', cleanup=False)
707 settings_util.create_rhodecode_setting(
707 settings_util.create_rhodecode_setting(
708 desc_key, 'old description', 'unicode', cleanup=False)
708 desc_key, 'old description', 'unicode', cleanup=False)
709
709
710 post_url = route_path('admin_settings_issuetracker_update')
710 post_url = route_path('admin_settings_issuetracker_update')
711 post_data = {
711 post_data = {
712 'new_pattern_pattern_0': pattern,
712 'new_pattern_pattern_0': pattern,
713 'new_pattern_url_0': 'https://url',
713 'new_pattern_url_0': 'https://url',
714 'new_pattern_prefix_0': 'prefix',
714 'new_pattern_prefix_0': 'prefix',
715 'new_pattern_description_0': new_description,
715 'new_pattern_description_0': new_description,
716 'uid': self.uid,
716 'uid': self.uid,
717 'csrf_token': csrf_token
717 'csrf_token': csrf_token
718 }
718 }
719 self.app.post(post_url, post_data, status=302)
719 self.app.post(post_url, post_data, status=302)
720 settings = SettingsModel().get_all_settings()
720 settings = SettingsModel().get_all_settings()
721 assert settings[rc_pattern_key] == pattern
721 assert settings[rc_pattern_key] == pattern
722 assert settings[rc_desc_key] == new_description
722 assert settings[rc_desc_key] == new_description
723
723
724 @request.addfinalizer
724 @request.addfinalizer
725 def cleanup():
725 def cleanup():
726 IssueTrackerSettingsModel().delete_entries(self.uid)
726 IssueTrackerSettingsModel().delete_entries(self.uid)
727
727
728 def test_delete_issuetracker_pattern(
728 def test_delete_issuetracker_pattern(
729 self, autologin_user, backend, csrf_token, settings_util):
729 self, autologin_user, backend, csrf_token, settings_util):
730 pattern = 'issuetracker_pat'
730 pattern = 'issuetracker_pat'
731 uid = md5(pattern)
731 uid = md5(pattern)
732 settings_util.create_rhodecode_setting(
732 settings_util.create_rhodecode_setting(
733 self.SHORT_PATTERN_KEY+uid, pattern, 'unicode', cleanup=False)
733 self.SHORT_PATTERN_KEY+uid, pattern, 'unicode', cleanup=False)
734
734
735 post_url = route_path('admin_settings_issuetracker_delete')
735 post_url = route_path('admin_settings_issuetracker_delete')
736 post_data = {
736 post_data = {
737 '_method': 'delete',
737 '_method': 'delete',
738 'uid': uid,
738 'uid': uid,
739 'csrf_token': csrf_token
739 'csrf_token': csrf_token
740 }
740 }
741 self.app.post(post_url, post_data, status=302)
741 self.app.post(post_url, post_data, status=302)
742 settings = SettingsModel().get_all_settings()
742 settings = SettingsModel().get_all_settings()
743 assert 'rhodecode_%s%s' % (self.SHORT_PATTERN_KEY, uid) not in settings
743 assert 'rhodecode_%s%s' % (self.SHORT_PATTERN_KEY, uid) not in settings
@@ -1,118 +1,118 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import pytest
21 import pytest
22
22
23 from rhodecode.lib import helpers as h
23 from rhodecode.lib import helpers as h
24 from rhodecode.tests import (
24 from rhodecode.tests import (
25 TestController, clear_cache_regions,
25 TestController, clear_cache_regions,
26 TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS)
26 TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS)
27 from rhodecode.tests.fixture import Fixture
27 from rhodecode.tests.fixture import Fixture
28 from rhodecode.tests.utils import AssertResponse
28 from rhodecode.tests.utils import AssertResponse
29
29
30 fixture = Fixture()
30 fixture = Fixture()
31
31
32
32
33 def route_path(name, params=None, **kwargs):
33 def route_path(name, params=None, **kwargs):
34 import urllib
34 import urllib
35 from rhodecode.apps._base import ADMIN_PREFIX
35 from rhodecode.apps._base import ADMIN_PREFIX
36
36
37 base_url = {
37 base_url = {
38 'login': ADMIN_PREFIX + '/login',
38 'login': ADMIN_PREFIX + '/login',
39 'logout': ADMIN_PREFIX + '/logout',
39 'logout': ADMIN_PREFIX + '/logout',
40 'register': ADMIN_PREFIX + '/register',
40 'register': ADMIN_PREFIX + '/register',
41 'reset_password':
41 'reset_password':
42 ADMIN_PREFIX + '/password_reset',
42 ADMIN_PREFIX + '/password_reset',
43 'reset_password_confirmation':
43 'reset_password_confirmation':
44 ADMIN_PREFIX + '/password_reset_confirmation',
44 ADMIN_PREFIX + '/password_reset_confirmation',
45
45
46 'admin_permissions_application':
46 'admin_permissions_application':
47 ADMIN_PREFIX + '/permissions/application',
47 ADMIN_PREFIX + '/permissions/application',
48 'admin_permissions_application_update':
48 'admin_permissions_application_update':
49 ADMIN_PREFIX + '/permissions/application/update',
49 ADMIN_PREFIX + '/permissions/application/update',
50 }[name].format(**kwargs)
50 }[name].format(**kwargs)
51
51
52 if params:
52 if params:
53 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
53 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
54 return base_url
54 return base_url
55
55
56
56
57 class TestPasswordReset(TestController):
57 class TestPasswordReset(TestController):
58
58
59 @pytest.mark.parametrize(
59 @pytest.mark.parametrize(
60 'pwd_reset_setting, show_link, show_reset', [
60 'pwd_reset_setting, show_link, show_reset', [
61 ('hg.password_reset.enabled', True, True),
61 ('hg.password_reset.enabled', True, True),
62 ('hg.password_reset.hidden', False, True),
62 ('hg.password_reset.hidden', False, True),
63 ('hg.password_reset.disabled', False, False),
63 ('hg.password_reset.disabled', False, False),
64 ])
64 ])
65 def test_password_reset_settings(
65 def test_password_reset_settings(
66 self, pwd_reset_setting, show_link, show_reset):
66 self, pwd_reset_setting, show_link, show_reset):
67 clear_cache_regions()
67 clear_cache_regions()
68 self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS)
68 self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS)
69 params = {
69 params = {
70 'csrf_token': self.csrf_token,
70 'csrf_token': self.csrf_token,
71 'anonymous': 'True',
71 'anonymous': 'True',
72 'default_register': 'hg.register.auto_activate',
72 'default_register': 'hg.register.auto_activate',
73 'default_register_message': '',
73 'default_register_message': '',
74 'default_password_reset': pwd_reset_setting,
74 'default_password_reset': pwd_reset_setting,
75 'default_extern_activate': 'hg.extern_activate.auto',
75 'default_extern_activate': 'hg.extern_activate.auto',
76 }
76 }
77 resp = self.app.post(
77 resp = self.app.post(
78 route_path('admin_permissions_application_update'), params=params)
78 route_path('admin_permissions_application_update'), params=params)
79 self.logout_user()
79 self.logout_user()
80
80
81 login_page = self.app.get(route_path('login'))
81 login_page = self.app.get(route_path('login'))
82 asr_login = AssertResponse(login_page)
82 asr_login = AssertResponse(login_page)
83
83
84 if show_link:
84 if show_link:
85 asr_login.one_element_exists('a.pwd_reset')
85 asr_login.one_element_exists('a.pwd_reset')
86 else:
86 else:
87 asr_login.no_element_exists('a.pwd_reset')
87 asr_login.no_element_exists('a.pwd_reset')
88
88
89 response = self.app.get(route_path('reset_password'))
89 response = self.app.get(route_path('reset_password'))
90
90
91 assert_response = AssertResponse(response)
91 assert_response = response.assert_response()
92 if show_reset:
92 if show_reset:
93 response.mustcontain('Send password reset email')
93 response.mustcontain('Send password reset email')
94 assert_response.one_element_exists('#email')
94 assert_response.one_element_exists('#email')
95 assert_response.one_element_exists('#send')
95 assert_response.one_element_exists('#send')
96 else:
96 else:
97 response.mustcontain('Password reset is disabled.')
97 response.mustcontain('Password reset is disabled.')
98 assert_response.no_element_exists('#email')
98 assert_response.no_element_exists('#email')
99 assert_response.no_element_exists('#send')
99 assert_response.no_element_exists('#send')
100
100
101 def test_password_form_disabled(self):
101 def test_password_form_disabled(self):
102 self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS)
102 self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS)
103 params = {
103 params = {
104 'csrf_token': self.csrf_token,
104 'csrf_token': self.csrf_token,
105 'anonymous': 'True',
105 'anonymous': 'True',
106 'default_register': 'hg.register.auto_activate',
106 'default_register': 'hg.register.auto_activate',
107 'default_register_message': '',
107 'default_register_message': '',
108 'default_password_reset': 'hg.password_reset.disabled',
108 'default_password_reset': 'hg.password_reset.disabled',
109 'default_extern_activate': 'hg.extern_activate.auto',
109 'default_extern_activate': 'hg.extern_activate.auto',
110 }
110 }
111 self.app.post(route_path('admin_permissions_application_update'), params=params)
111 self.app.post(route_path('admin_permissions_application_update'), params=params)
112 self.logout_user()
112 self.logout_user()
113
113
114 response = self.app.post(
114 response = self.app.post(
115 route_path('reset_password'), {'email': 'lisa@rhodecode.com',}
115 route_path('reset_password'), {'email': 'lisa@rhodecode.com',}
116 )
116 )
117 response = response.follow()
117 response = response.follow()
118 response.mustcontain('Password reset is disabled.')
118 response.mustcontain('Password reset is disabled.')
@@ -1,133 +1,133 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2016-2019 RhodeCode GmbH
3 # Copyright (C) 2016-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21
21
22 import mock
22 import mock
23 import pytest
23 import pytest
24
24
25 from rhodecode.apps._base import ADMIN_PREFIX
25 from rhodecode.apps._base import ADMIN_PREFIX
26 from rhodecode.apps.login.views import LoginView, CaptchaData
26 from rhodecode.apps.login.views import LoginView, CaptchaData
27 from rhodecode.model.settings import SettingsModel
27 from rhodecode.model.settings import SettingsModel
28 from rhodecode.lib.utils2 import AttributeDict
28 from rhodecode.lib.utils2 import AttributeDict
29 from rhodecode.tests.utils import AssertResponse
29 from rhodecode.tests.utils import AssertResponse
30
30
31
31
32 class RhodeCodeSetting(object):
32 class RhodeCodeSetting(object):
33 def __init__(self, name, value):
33 def __init__(self, name, value):
34 self.name = name
34 self.name = name
35 self.value = value
35 self.value = value
36
36
37 def __enter__(self):
37 def __enter__(self):
38 from rhodecode.model.settings import SettingsModel
38 from rhodecode.model.settings import SettingsModel
39 model = SettingsModel()
39 model = SettingsModel()
40 self.old_setting = model.get_setting_by_name(self.name)
40 self.old_setting = model.get_setting_by_name(self.name)
41 model.create_or_update_setting(name=self.name, val=self.value)
41 model.create_or_update_setting(name=self.name, val=self.value)
42 return self
42 return self
43
43
44 def __exit__(self, exc_type, exc_val, exc_tb):
44 def __exit__(self, exc_type, exc_val, exc_tb):
45 model = SettingsModel()
45 model = SettingsModel()
46 if self.old_setting:
46 if self.old_setting:
47 model.create_or_update_setting(
47 model.create_or_update_setting(
48 name=self.name, val=self.old_setting.app_settings_value)
48 name=self.name, val=self.old_setting.app_settings_value)
49 else:
49 else:
50 model.create_or_update_setting(name=self.name)
50 model.create_or_update_setting(name=self.name)
51
51
52
52
53 class TestRegisterCaptcha(object):
53 class TestRegisterCaptcha(object):
54
54
55 @pytest.mark.parametrize('private_key, public_key, expected', [
55 @pytest.mark.parametrize('private_key, public_key, expected', [
56 ('', '', CaptchaData(False, '', '')),
56 ('', '', CaptchaData(False, '', '')),
57 ('', 'pubkey', CaptchaData(False, '', 'pubkey')),
57 ('', 'pubkey', CaptchaData(False, '', 'pubkey')),
58 ('privkey', '', CaptchaData(True, 'privkey', '')),
58 ('privkey', '', CaptchaData(True, 'privkey', '')),
59 ('privkey', 'pubkey', CaptchaData(True, 'privkey', 'pubkey')),
59 ('privkey', 'pubkey', CaptchaData(True, 'privkey', 'pubkey')),
60 ])
60 ])
61 def test_get_captcha_data(self, private_key, public_key, expected,
61 def test_get_captcha_data(self, private_key, public_key, expected,
62 request_stub, user_util):
62 request_stub, user_util):
63 request_stub.user = user_util.create_user().AuthUser()
63 request_stub.user = user_util.create_user().AuthUser()
64 request_stub.matched_route = AttributeDict({'name': 'login'})
64 request_stub.matched_route = AttributeDict({'name': 'login'})
65 login_view = LoginView(mock.Mock(), request_stub)
65 login_view = LoginView(mock.Mock(), request_stub)
66
66
67 with RhodeCodeSetting('captcha_private_key', private_key):
67 with RhodeCodeSetting('captcha_private_key', private_key):
68 with RhodeCodeSetting('captcha_public_key', public_key):
68 with RhodeCodeSetting('captcha_public_key', public_key):
69 captcha = login_view._get_captcha_data()
69 captcha = login_view._get_captcha_data()
70 assert captcha == expected
70 assert captcha == expected
71
71
72 @pytest.mark.parametrize('active', [False, True])
72 @pytest.mark.parametrize('active', [False, True])
73 @mock.patch.object(LoginView, '_get_captcha_data')
73 @mock.patch.object(LoginView, '_get_captcha_data')
74 def test_private_key_does_not_leak_to_html(
74 def test_private_key_does_not_leak_to_html(
75 self, m_get_captcha_data, active, app):
75 self, m_get_captcha_data, active, app):
76 captcha = CaptchaData(
76 captcha = CaptchaData(
77 active=active, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY')
77 active=active, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY')
78 m_get_captcha_data.return_value = captcha
78 m_get_captcha_data.return_value = captcha
79
79
80 response = app.get(ADMIN_PREFIX + '/register')
80 response = app.get(ADMIN_PREFIX + '/register')
81 assert 'PRIVATE_KEY' not in response
81 assert 'PRIVATE_KEY' not in response
82
82
83 @pytest.mark.parametrize('active', [False, True])
83 @pytest.mark.parametrize('active', [False, True])
84 @mock.patch.object(LoginView, '_get_captcha_data')
84 @mock.patch.object(LoginView, '_get_captcha_data')
85 def test_register_view_renders_captcha(
85 def test_register_view_renders_captcha(
86 self, m_get_captcha_data, active, app):
86 self, m_get_captcha_data, active, app):
87 captcha = CaptchaData(
87 captcha = CaptchaData(
88 active=active, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY')
88 active=active, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY')
89 m_get_captcha_data.return_value = captcha
89 m_get_captcha_data.return_value = captcha
90
90
91 response = app.get(ADMIN_PREFIX + '/register')
91 response = app.get(ADMIN_PREFIX + '/register')
92
92
93 assertr = AssertResponse(response)
93 assertr = response.assert_response()
94 if active:
94 if active:
95 assertr.one_element_exists('#recaptcha_field')
95 assertr.one_element_exists('#recaptcha_field')
96 else:
96 else:
97 assertr.no_element_exists('#recaptcha_field')
97 assertr.no_element_exists('#recaptcha_field')
98
98
99 @pytest.mark.parametrize('valid', [False, True])
99 @pytest.mark.parametrize('valid', [False, True])
100 @mock.patch.object(LoginView, 'validate_captcha')
100 @mock.patch.object(LoginView, 'validate_captcha')
101 @mock.patch.object(LoginView, '_get_captcha_data')
101 @mock.patch.object(LoginView, '_get_captcha_data')
102 def test_register_with_active_captcha(
102 def test_register_with_active_captcha(
103 self, m_get_captcha_data, m_validate_captcha, valid, app, csrf_token):
103 self, m_get_captcha_data, m_validate_captcha, valid, app, csrf_token):
104 captcha = CaptchaData(
104 captcha = CaptchaData(
105 active=True, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY')
105 active=True, private_key='PRIVATE_KEY', public_key='PUBLIC_KEY')
106 m_get_captcha_data.return_value = captcha
106 m_get_captcha_data.return_value = captcha
107 m_response = mock.Mock()
107 m_response = mock.Mock()
108 m_response.is_valid = valid
108 m_response.is_valid = valid
109 m_validate_captcha.return_value = valid, 'ok'
109 m_validate_captcha.return_value = valid, 'ok'
110
110
111 params = {
111 params = {
112 'csrf_token': csrf_token,
112 'csrf_token': csrf_token,
113 'email': 'pytest@example.com',
113 'email': 'pytest@example.com',
114 'firstname': 'pytest-firstname',
114 'firstname': 'pytest-firstname',
115 'lastname': 'pytest-lastname',
115 'lastname': 'pytest-lastname',
116 'password': 'secret',
116 'password': 'secret',
117 'password_confirmation': 'secret',
117 'password_confirmation': 'secret',
118 'username': 'pytest',
118 'username': 'pytest',
119 }
119 }
120 response = app.post(ADMIN_PREFIX + '/register', params=params)
120 response = app.post(ADMIN_PREFIX + '/register', params=params)
121
121
122 if valid:
122 if valid:
123 # If we provided a valid captcha input we expect a successful
123 # If we provided a valid captcha input we expect a successful
124 # registration and redirect to the login page.
124 # registration and redirect to the login page.
125 assert response.status_int == 302
125 assert response.status_int == 302
126 assert 'location' in response.headers
126 assert 'location' in response.headers
127 assert ADMIN_PREFIX + '/login' in response.headers['location']
127 assert ADMIN_PREFIX + '/login' in response.headers['location']
128 else:
128 else:
129 # If captche input is invalid we expect to stay on the registration
129 # If captche input is invalid we expect to stay on the registration
130 # page with an error message displayed.
130 # page with an error message displayed.
131 assertr = AssertResponse(response)
131 assertr = response.assert_response()
132 assert response.status_int == 200
132 assert response.status_int == 200
133 assertr.one_element_exists('#recaptcha_field ~ span.error-message')
133 assertr.one_element_exists('#recaptcha_field ~ span.error-message')
@@ -1,137 +1,137 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import pytest
21 import pytest
22 from rhodecode.model.auth_token import AuthTokenModel
22 from rhodecode.model.auth_token import AuthTokenModel
23 from rhodecode.tests import TestController
23 from rhodecode.tests import TestController
24
24
25
25
26 def route_path(name, params=None, **kwargs):
26 def route_path(name, params=None, **kwargs):
27 import urllib
27 import urllib
28
28
29 base_url = {
29 base_url = {
30 'rss_feed_home': '/{repo_name}/feed-rss',
30 'rss_feed_home': '/{repo_name}/feed-rss',
31 'atom_feed_home': '/{repo_name}/feed-atom',
31 'atom_feed_home': '/{repo_name}/feed-atom',
32 'rss_feed_home_old': '/{repo_name}/feed/rss',
32 'rss_feed_home_old': '/{repo_name}/feed/rss',
33 'atom_feed_home_old': '/{repo_name}/feed/atom',
33 'atom_feed_home_old': '/{repo_name}/feed/atom',
34 }[name].format(**kwargs)
34 }[name].format(**kwargs)
35
35
36 if params:
36 if params:
37 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
37 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
38 return base_url
38 return base_url
39
39
40
40
41 class TestFeedView(TestController):
41 class TestFeedView(TestController):
42
42
43 @pytest.mark.parametrize("feed_type,response_types,content_type",[
43 @pytest.mark.parametrize("feed_type,response_types,content_type",[
44 ('rss', ['<rss version="2.0">'],
44 ('rss', ['<rss version="2.0">'],
45 "application/rss+xml"),
45 "application/rss+xml"),
46 ('atom', ['xmlns="http://www.w3.org/2005/Atom"', 'xml:lang="en-us"'],
46 ('atom', ['xmlns="http://www.w3.org/2005/Atom"', 'xml:lang="en-us"'],
47 "application/atom+xml"),
47 "application/atom+xml"),
48 ])
48 ])
49 def test_feed(self, backend, feed_type, response_types, content_type):
49 def test_feed(self, backend, feed_type, response_types, content_type):
50 self.log_user()
50 self.log_user()
51 response = self.app.get(
51 response = self.app.get(
52 route_path('{}_feed_home'.format(feed_type),
52 route_path('{}_feed_home'.format(feed_type),
53 repo_name=backend.repo_name))
53 repo_name=backend.repo_name))
54
54
55 for content in response_types:
55 for content in response_types:
56 response.mustcontain(content)
56 response.mustcontain(content)
57
57
58 assert response.content_type == content_type
58 assert response.content_type == content_type
59
59
60 @pytest.mark.parametrize("feed_type, content_type", [
60 @pytest.mark.parametrize("feed_type, content_type", [
61 ('rss', "application/rss+xml"),
61 ('rss', "application/rss+xml"),
62 ('atom', "application/atom+xml")
62 ('atom', "application/atom+xml")
63 ])
63 ])
64 def test_feed_with_auth_token(
64 def test_feed_with_auth_token(
65 self, backend, user_admin, feed_type, content_type):
65 self, backend, user_admin, feed_type, content_type):
66 auth_token = user_admin.feed_token
66 auth_token = user_admin.feed_token
67 assert auth_token != ''
67 assert auth_token != ''
68
68
69 response = self.app.get(
69 response = self.app.get(
70 route_path(
70 route_path(
71 '{}_feed_home'.format(feed_type),
71 '{}_feed_home'.format(feed_type),
72 repo_name=backend.repo_name,
72 repo_name=backend.repo_name,
73 params=dict(auth_token=auth_token)),
73 params=dict(auth_token=auth_token)),
74 status=200)
74 status=200)
75
75
76 assert response.content_type == content_type
76 assert response.content_type == content_type
77
77
78 @pytest.mark.parametrize("feed_type, content_type", [
78 @pytest.mark.parametrize("feed_type, content_type", [
79 ('rss', "application/rss+xml"),
79 ('rss', "application/rss+xml"),
80 ('atom', "application/atom+xml")
80 ('atom', "application/atom+xml")
81 ])
81 ])
82 def test_feed_with_auth_token_by_uid(
82 def test_feed_with_auth_token_by_uid(
83 self, backend, user_admin, feed_type, content_type):
83 self, backend, user_admin, feed_type, content_type):
84 auth_token = user_admin.feed_token
84 auth_token = user_admin.feed_token
85 assert auth_token != ''
85 assert auth_token != ''
86
86
87 response = self.app.get(
87 response = self.app.get(
88 route_path(
88 route_path(
89 '{}_feed_home'.format(feed_type),
89 '{}_feed_home'.format(feed_type),
90 repo_name='_{}'.format(backend.repo.repo_id),
90 repo_name='_{}'.format(backend.repo.repo_id),
91 params=dict(auth_token=auth_token)),
91 params=dict(auth_token=auth_token)),
92 status=200)
92 status=200)
93
93
94 assert response.content_type == content_type
94 assert response.content_type == content_type
95
95
96 @pytest.mark.parametrize("feed_type, content_type", [
96 @pytest.mark.parametrize("feed_type, content_type", [
97 ('rss', "application/rss+xml"),
97 ('rss', "application/rss+xml"),
98 ('atom', "application/atom+xml")
98 ('atom', "application/atom+xml")
99 ])
99 ])
100 def test_feed_old_urls_with_auth_token(
100 def test_feed_old_urls_with_auth_token(
101 self, backend, user_admin, feed_type, content_type):
101 self, backend, user_admin, feed_type, content_type):
102 auth_token = user_admin.feed_token
102 auth_token = user_admin.feed_token
103 assert auth_token != ''
103 assert auth_token != ''
104
104
105 response = self.app.get(
105 response = self.app.get(
106 route_path(
106 route_path(
107 '{}_feed_home_old'.format(feed_type),
107 '{}_feed_home_old'.format(feed_type),
108 repo_name=backend.repo_name,
108 repo_name=backend.repo_name,
109 params=dict(auth_token=auth_token)),
109 params=dict(auth_token=auth_token)),
110 status=200)
110 status=200)
111
111
112 assert response.content_type == content_type
112 assert response.content_type == content_type
113
113
114 @pytest.mark.parametrize("feed_type", ['rss', 'atom'])
114 @pytest.mark.parametrize("feed_type", ['rss', 'atom'])
115 def test_feed_with_auth_token_of_wrong_type(
115 def test_feed_with_auth_token_of_wrong_type(
116 self, backend, user_util, feed_type):
116 self, backend, user_util, feed_type):
117 user = user_util.create_user()
117 user = user_util.create_user()
118 auth_token = AuthTokenModel().create(
118 auth_token = AuthTokenModel().create(
119 user.user_id, 'test-token', -1, AuthTokenModel.cls.ROLE_API)
119 user.user_id, u'test-token', -1, AuthTokenModel.cls.ROLE_API)
120 auth_token = auth_token.api_key
120 auth_token = auth_token.api_key
121
121
122 self.app.get(
122 self.app.get(
123 route_path(
123 route_path(
124 '{}_feed_home'.format(feed_type),
124 '{}_feed_home'.format(feed_type),
125 repo_name=backend.repo_name,
125 repo_name=backend.repo_name,
126 params=dict(auth_token=auth_token)),
126 params=dict(auth_token=auth_token)),
127 status=302)
127 status=302)
128
128
129 auth_token = AuthTokenModel().create(
129 auth_token = AuthTokenModel().create(
130 user.user_id, 'test-token', -1, AuthTokenModel.cls.ROLE_FEED)
130 user.user_id, u'test-token', -1, AuthTokenModel.cls.ROLE_FEED)
131 auth_token = auth_token.api_key
131 auth_token = auth_token.api_key
132 self.app.get(
132 self.app.get(
133 route_path(
133 route_path(
134 '{}_feed_home'.format(feed_type),
134 '{}_feed_home'.format(feed_type),
135 repo_name=backend.repo_name,
135 repo_name=backend.repo_name,
136 params=dict(auth_token=auth_token)),
136 params=dict(auth_token=auth_token)),
137 status=200)
137 status=200)
@@ -1,524 +1,524 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import re
21 import re
22
22
23 import mock
23 import mock
24 import pytest
24 import pytest
25
25
26 from rhodecode.apps.repository.views.repo_summary import RepoSummaryView
26 from rhodecode.apps.repository.views.repo_summary import RepoSummaryView
27 from rhodecode.lib import helpers as h
27 from rhodecode.lib import helpers as h
28 from rhodecode.lib.compat import OrderedDict
28 from rhodecode.lib.compat import OrderedDict
29 from rhodecode.lib.utils2 import AttributeDict, safe_str
29 from rhodecode.lib.utils2 import AttributeDict, safe_str
30 from rhodecode.lib.vcs.exceptions import RepositoryRequirementError
30 from rhodecode.lib.vcs.exceptions import RepositoryRequirementError
31 from rhodecode.model.db import Repository
31 from rhodecode.model.db import Repository
32 from rhodecode.model.meta import Session
32 from rhodecode.model.meta import Session
33 from rhodecode.model.repo import RepoModel
33 from rhodecode.model.repo import RepoModel
34 from rhodecode.model.scm import ScmModel
34 from rhodecode.model.scm import ScmModel
35 from rhodecode.tests import assert_session_flash
35 from rhodecode.tests import assert_session_flash
36 from rhodecode.tests.fixture import Fixture
36 from rhodecode.tests.fixture import Fixture
37 from rhodecode.tests.utils import AssertResponse, repo_on_filesystem
37 from rhodecode.tests.utils import AssertResponse, repo_on_filesystem
38
38
39
39
40 fixture = Fixture()
40 fixture = Fixture()
41
41
42
42
43 def route_path(name, params=None, **kwargs):
43 def route_path(name, params=None, **kwargs):
44 import urllib
44 import urllib
45
45
46 base_url = {
46 base_url = {
47 'repo_summary': '/{repo_name}',
47 'repo_summary': '/{repo_name}',
48 'repo_stats': '/{repo_name}/repo_stats/{commit_id}',
48 'repo_stats': '/{repo_name}/repo_stats/{commit_id}',
49 'repo_refs_data': '/{repo_name}/refs-data',
49 'repo_refs_data': '/{repo_name}/refs-data',
50 'repo_refs_changelog_data': '/{repo_name}/refs-data-changelog',
50 'repo_refs_changelog_data': '/{repo_name}/refs-data-changelog',
51 'repo_creating_check': '/{repo_name}/repo_creating_check',
51 'repo_creating_check': '/{repo_name}/repo_creating_check',
52 }[name].format(**kwargs)
52 }[name].format(**kwargs)
53
53
54 if params:
54 if params:
55 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
55 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
56 return base_url
56 return base_url
57
57
58
58
59 def assert_clone_url(response, server, repo, disabled=False):
59 def assert_clone_url(response, server, repo, disabled=False):
60
60
61 response.mustcontain(
61 response.mustcontain(
62 '<input type="text" class="input-monospace clone_url_input" '
62 '<input type="text" class="input-monospace clone_url_input" '
63 '{disabled}readonly="readonly" '
63 '{disabled}readonly="readonly" '
64 'value="http://test_admin@{server}/{repo}"/>'.format(
64 'value="http://test_admin@{server}/{repo}"/>'.format(
65 server=server, repo=repo, disabled='disabled ' if disabled else ' ')
65 server=server, repo=repo, disabled='disabled ' if disabled else ' ')
66 )
66 )
67
67
68
68
69 @pytest.mark.usefixtures('app')
69 @pytest.mark.usefixtures('app')
70 class TestSummaryView(object):
70 class TestSummaryView(object):
71 def test_index(self, autologin_user, backend, http_host_only_stub):
71 def test_index(self, autologin_user, backend, http_host_only_stub):
72 repo_id = backend.repo.repo_id
72 repo_id = backend.repo.repo_id
73 repo_name = backend.repo_name
73 repo_name = backend.repo_name
74 with mock.patch('rhodecode.lib.helpers.is_svn_without_proxy',
74 with mock.patch('rhodecode.lib.helpers.is_svn_without_proxy',
75 return_value=False):
75 return_value=False):
76 response = self.app.get(
76 response = self.app.get(
77 route_path('repo_summary', repo_name=repo_name))
77 route_path('repo_summary', repo_name=repo_name))
78
78
79 # repo type
79 # repo type
80 response.mustcontain(
80 response.mustcontain(
81 '<i class="icon-%s">' % (backend.alias, )
81 '<i class="icon-%s">' % (backend.alias, )
82 )
82 )
83 # public/private
83 # public/private
84 response.mustcontain(
84 response.mustcontain(
85 """<i class="icon-unlock-alt">"""
85 """<i class="icon-unlock-alt">"""
86 )
86 )
87
87
88 # clone url...
88 # clone url...
89 assert_clone_url(response, http_host_only_stub, repo_name)
89 assert_clone_url(response, http_host_only_stub, repo_name)
90 assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id))
90 assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id))
91
91
92 def test_index_svn_without_proxy(
92 def test_index_svn_without_proxy(
93 self, autologin_user, backend_svn, http_host_only_stub):
93 self, autologin_user, backend_svn, http_host_only_stub):
94 repo_id = backend_svn.repo.repo_id
94 repo_id = backend_svn.repo.repo_id
95 repo_name = backend_svn.repo_name
95 repo_name = backend_svn.repo_name
96 response = self.app.get(route_path('repo_summary', repo_name=repo_name))
96 response = self.app.get(route_path('repo_summary', repo_name=repo_name))
97 # clone url...
97 # clone url...
98
98
99 assert_clone_url(response, http_host_only_stub, repo_name, disabled=True)
99 assert_clone_url(response, http_host_only_stub, repo_name, disabled=True)
100 assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id), disabled=True)
100 assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id), disabled=True)
101
101
102 def test_index_with_trailing_slash(
102 def test_index_with_trailing_slash(
103 self, autologin_user, backend, http_host_only_stub):
103 self, autologin_user, backend, http_host_only_stub):
104
104
105 repo_id = backend.repo.repo_id
105 repo_id = backend.repo.repo_id
106 repo_name = backend.repo_name
106 repo_name = backend.repo_name
107 with mock.patch('rhodecode.lib.helpers.is_svn_without_proxy',
107 with mock.patch('rhodecode.lib.helpers.is_svn_without_proxy',
108 return_value=False):
108 return_value=False):
109 response = self.app.get(
109 response = self.app.get(
110 route_path('repo_summary', repo_name=repo_name) + '/',
110 route_path('repo_summary', repo_name=repo_name) + '/',
111 status=200)
111 status=200)
112
112
113 # clone url...
113 # clone url...
114 assert_clone_url(response, http_host_only_stub, repo_name)
114 assert_clone_url(response, http_host_only_stub, repo_name)
115 assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id))
115 assert_clone_url(response, http_host_only_stub, '_{}'.format(repo_id))
116
116
117 def test_index_by_id(self, autologin_user, backend):
117 def test_index_by_id(self, autologin_user, backend):
118 repo_id = backend.repo.repo_id
118 repo_id = backend.repo.repo_id
119 response = self.app.get(
119 response = self.app.get(
120 route_path('repo_summary', repo_name='_%s' % (repo_id,)))
120 route_path('repo_summary', repo_name='_%s' % (repo_id,)))
121
121
122 # repo type
122 # repo type
123 response.mustcontain(
123 response.mustcontain(
124 '<i class="icon-%s">' % (backend.alias, )
124 '<i class="icon-%s">' % (backend.alias, )
125 )
125 )
126 # public/private
126 # public/private
127 response.mustcontain(
127 response.mustcontain(
128 """<i class="icon-unlock-alt">"""
128 """<i class="icon-unlock-alt">"""
129 )
129 )
130
130
131 def test_index_by_repo_having_id_path_in_name_hg(self, autologin_user):
131 def test_index_by_repo_having_id_path_in_name_hg(self, autologin_user):
132 fixture.create_repo(name='repo_1')
132 fixture.create_repo(name='repo_1')
133 response = self.app.get(route_path('repo_summary', repo_name='repo_1'))
133 response = self.app.get(route_path('repo_summary', repo_name='repo_1'))
134
134
135 try:
135 try:
136 response.mustcontain("repo_1")
136 response.mustcontain("repo_1")
137 finally:
137 finally:
138 RepoModel().delete(Repository.get_by_repo_name('repo_1'))
138 RepoModel().delete(Repository.get_by_repo_name('repo_1'))
139 Session().commit()
139 Session().commit()
140
140
141 def test_index_with_anonymous_access_disabled(
141 def test_index_with_anonymous_access_disabled(
142 self, backend, disable_anonymous_user):
142 self, backend, disable_anonymous_user):
143 response = self.app.get(
143 response = self.app.get(
144 route_path('repo_summary', repo_name=backend.repo_name), status=302)
144 route_path('repo_summary', repo_name=backend.repo_name), status=302)
145 assert 'login' in response.location
145 assert 'login' in response.location
146
146
147 def _enable_stats(self, repo):
147 def _enable_stats(self, repo):
148 r = Repository.get_by_repo_name(repo)
148 r = Repository.get_by_repo_name(repo)
149 r.enable_statistics = True
149 r.enable_statistics = True
150 Session().add(r)
150 Session().add(r)
151 Session().commit()
151 Session().commit()
152
152
153 expected_trending = {
153 expected_trending = {
154 'hg': {
154 'hg': {
155 "py": {"count": 68, "desc": ["Python"]},
155 "py": {"count": 68, "desc": ["Python"]},
156 "rst": {"count": 16, "desc": ["Rst"]},
156 "rst": {"count": 16, "desc": ["Rst"]},
157 "css": {"count": 2, "desc": ["Css"]},
157 "css": {"count": 2, "desc": ["Css"]},
158 "sh": {"count": 2, "desc": ["Bash"]},
158 "sh": {"count": 2, "desc": ["Bash"]},
159 "bat": {"count": 1, "desc": ["Batch"]},
159 "bat": {"count": 1, "desc": ["Batch"]},
160 "cfg": {"count": 1, "desc": ["Ini"]},
160 "cfg": {"count": 1, "desc": ["Ini"]},
161 "html": {"count": 1, "desc": ["EvoqueHtml", "Html"]},
161 "html": {"count": 1, "desc": ["EvoqueHtml", "Html"]},
162 "ini": {"count": 1, "desc": ["Ini"]},
162 "ini": {"count": 1, "desc": ["Ini"]},
163 "js": {"count": 1, "desc": ["Javascript"]},
163 "js": {"count": 1, "desc": ["Javascript"]},
164 "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]}
164 "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]}
165 },
165 },
166 'git': {
166 'git': {
167 "py": {"count": 68, "desc": ["Python"]},
167 "py": {"count": 68, "desc": ["Python"]},
168 "rst": {"count": 16, "desc": ["Rst"]},
168 "rst": {"count": 16, "desc": ["Rst"]},
169 "css": {"count": 2, "desc": ["Css"]},
169 "css": {"count": 2, "desc": ["Css"]},
170 "sh": {"count": 2, "desc": ["Bash"]},
170 "sh": {"count": 2, "desc": ["Bash"]},
171 "bat": {"count": 1, "desc": ["Batch"]},
171 "bat": {"count": 1, "desc": ["Batch"]},
172 "cfg": {"count": 1, "desc": ["Ini"]},
172 "cfg": {"count": 1, "desc": ["Ini"]},
173 "html": {"count": 1, "desc": ["EvoqueHtml", "Html"]},
173 "html": {"count": 1, "desc": ["EvoqueHtml", "Html"]},
174 "ini": {"count": 1, "desc": ["Ini"]},
174 "ini": {"count": 1, "desc": ["Ini"]},
175 "js": {"count": 1, "desc": ["Javascript"]},
175 "js": {"count": 1, "desc": ["Javascript"]},
176 "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]}
176 "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]}
177 },
177 },
178 'svn': {
178 'svn': {
179 "py": {"count": 75, "desc": ["Python"]},
179 "py": {"count": 75, "desc": ["Python"]},
180 "rst": {"count": 16, "desc": ["Rst"]},
180 "rst": {"count": 16, "desc": ["Rst"]},
181 "html": {"count": 11, "desc": ["EvoqueHtml", "Html"]},
181 "html": {"count": 11, "desc": ["EvoqueHtml", "Html"]},
182 "css": {"count": 2, "desc": ["Css"]},
182 "css": {"count": 2, "desc": ["Css"]},
183 "bat": {"count": 1, "desc": ["Batch"]},
183 "bat": {"count": 1, "desc": ["Batch"]},
184 "cfg": {"count": 1, "desc": ["Ini"]},
184 "cfg": {"count": 1, "desc": ["Ini"]},
185 "ini": {"count": 1, "desc": ["Ini"]},
185 "ini": {"count": 1, "desc": ["Ini"]},
186 "js": {"count": 1, "desc": ["Javascript"]},
186 "js": {"count": 1, "desc": ["Javascript"]},
187 "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]},
187 "makefile": {"count": 1, "desc": ["Makefile", "Makefile"]},
188 "sh": {"count": 1, "desc": ["Bash"]}
188 "sh": {"count": 1, "desc": ["Bash"]}
189 },
189 },
190 }
190 }
191
191
192 def test_repo_stats(self, autologin_user, backend, xhr_header):
192 def test_repo_stats(self, autologin_user, backend, xhr_header):
193 response = self.app.get(
193 response = self.app.get(
194 route_path(
194 route_path(
195 'repo_stats', repo_name=backend.repo_name, commit_id='tip'),
195 'repo_stats', repo_name=backend.repo_name, commit_id='tip'),
196 extra_environ=xhr_header,
196 extra_environ=xhr_header,
197 status=200)
197 status=200)
198 assert re.match(r'6[\d\.]+ KiB', response.json['size'])
198 assert re.match(r'6[\d\.]+ KiB', response.json['size'])
199
199
200 def test_repo_stats_code_stats_enabled(self, autologin_user, backend, xhr_header):
200 def test_repo_stats_code_stats_enabled(self, autologin_user, backend, xhr_header):
201 repo_name = backend.repo_name
201 repo_name = backend.repo_name
202
202
203 # codes stats
203 # codes stats
204 self._enable_stats(repo_name)
204 self._enable_stats(repo_name)
205 ScmModel().mark_for_invalidation(repo_name)
205 ScmModel().mark_for_invalidation(repo_name)
206
206
207 response = self.app.get(
207 response = self.app.get(
208 route_path(
208 route_path(
209 'repo_stats', repo_name=backend.repo_name, commit_id='tip'),
209 'repo_stats', repo_name=backend.repo_name, commit_id='tip'),
210 extra_environ=xhr_header,
210 extra_environ=xhr_header,
211 status=200)
211 status=200)
212
212
213 expected_data = self.expected_trending[backend.alias]
213 expected_data = self.expected_trending[backend.alias]
214 returned_stats = response.json['code_stats']
214 returned_stats = response.json['code_stats']
215 for k, v in expected_data.items():
215 for k, v in expected_data.items():
216 assert v == returned_stats[k]
216 assert v == returned_stats[k]
217
217
218 def test_repo_refs_data(self, backend):
218 def test_repo_refs_data(self, backend):
219 response = self.app.get(
219 response = self.app.get(
220 route_path('repo_refs_data', repo_name=backend.repo_name),
220 route_path('repo_refs_data', repo_name=backend.repo_name),
221 status=200)
221 status=200)
222
222
223 # Ensure that there is the correct amount of items in the result
223 # Ensure that there is the correct amount of items in the result
224 repo = backend.repo.scm_instance()
224 repo = backend.repo.scm_instance()
225 data = response.json['results']
225 data = response.json['results']
226 items = sum(len(section['children']) for section in data)
226 items = sum(len(section['children']) for section in data)
227 repo_refs = len(repo.branches) + len(repo.tags) + len(repo.bookmarks)
227 repo_refs = len(repo.branches) + len(repo.tags) + len(repo.bookmarks)
228 assert items == repo_refs
228 assert items == repo_refs
229
229
230 def test_index_shows_missing_requirements_message(
230 def test_index_shows_missing_requirements_message(
231 self, backend, autologin_user):
231 self, backend, autologin_user):
232 repo_name = backend.repo_name
232 repo_name = backend.repo_name
233 scm_patcher = mock.patch.object(
233 scm_patcher = mock.patch.object(
234 Repository, 'scm_instance', side_effect=RepositoryRequirementError)
234 Repository, 'scm_instance', side_effect=RepositoryRequirementError)
235
235
236 with scm_patcher:
236 with scm_patcher:
237 response = self.app.get(
237 response = self.app.get(
238 route_path('repo_summary', repo_name=repo_name))
238 route_path('repo_summary', repo_name=repo_name))
239 assert_response = AssertResponse(response)
239 assert_response = response.assert_response()
240 assert_response.element_contains(
240 assert_response.element_contains(
241 '.main .alert-warning strong', 'Missing requirements')
241 '.main .alert-warning strong', 'Missing requirements')
242 assert_response.element_contains(
242 assert_response.element_contains(
243 '.main .alert-warning',
243 '.main .alert-warning',
244 'Commits cannot be displayed, because this repository '
244 'Commits cannot be displayed, because this repository '
245 'uses one or more extensions, which was not enabled.')
245 'uses one or more extensions, which was not enabled.')
246
246
247 def test_missing_requirements_page_does_not_contains_switch_to(
247 def test_missing_requirements_page_does_not_contains_switch_to(
248 self, autologin_user, backend):
248 self, autologin_user, backend):
249 repo_name = backend.repo_name
249 repo_name = backend.repo_name
250 scm_patcher = mock.patch.object(
250 scm_patcher = mock.patch.object(
251 Repository, 'scm_instance', side_effect=RepositoryRequirementError)
251 Repository, 'scm_instance', side_effect=RepositoryRequirementError)
252
252
253 with scm_patcher:
253 with scm_patcher:
254 response = self.app.get(route_path('repo_summary', repo_name=repo_name))
254 response = self.app.get(route_path('repo_summary', repo_name=repo_name))
255 response.mustcontain(no='Switch To')
255 response.mustcontain(no='Switch To')
256
256
257
257
258 @pytest.mark.usefixtures('app')
258 @pytest.mark.usefixtures('app')
259 class TestRepoLocation(object):
259 class TestRepoLocation(object):
260
260
261 @pytest.mark.parametrize("suffix", [u'', u'ąęł'], ids=['', 'non-ascii'])
261 @pytest.mark.parametrize("suffix", [u'', u'ąęł'], ids=['', 'non-ascii'])
262 def test_missing_filesystem_repo(
262 def test_missing_filesystem_repo(
263 self, autologin_user, backend, suffix, csrf_token):
263 self, autologin_user, backend, suffix, csrf_token):
264 repo = backend.create_repo(name_suffix=suffix)
264 repo = backend.create_repo(name_suffix=suffix)
265 repo_name = repo.repo_name
265 repo_name = repo.repo_name
266
266
267 # delete from file system
267 # delete from file system
268 RepoModel()._delete_filesystem_repo(repo)
268 RepoModel()._delete_filesystem_repo(repo)
269
269
270 # test if the repo is still in the database
270 # test if the repo is still in the database
271 new_repo = RepoModel().get_by_repo_name(repo_name)
271 new_repo = RepoModel().get_by_repo_name(repo_name)
272 assert new_repo.repo_name == repo_name
272 assert new_repo.repo_name == repo_name
273
273
274 # check if repo is not in the filesystem
274 # check if repo is not in the filesystem
275 assert not repo_on_filesystem(repo_name)
275 assert not repo_on_filesystem(repo_name)
276
276
277 response = self.app.get(
277 response = self.app.get(
278 route_path('repo_summary', repo_name=safe_str(repo_name)), status=302)
278 route_path('repo_summary', repo_name=safe_str(repo_name)), status=302)
279
279
280 msg = 'The repository `%s` cannot be loaded in filesystem. ' \
280 msg = 'The repository `%s` cannot be loaded in filesystem. ' \
281 'Please check if it exist, or is not damaged.' % repo_name
281 'Please check if it exist, or is not damaged.' % repo_name
282 assert_session_flash(response, msg)
282 assert_session_flash(response, msg)
283
283
284 @pytest.mark.parametrize("suffix", [u'', u'ąęł'], ids=['', 'non-ascii'])
284 @pytest.mark.parametrize("suffix", [u'', u'ąęł'], ids=['', 'non-ascii'])
285 def test_missing_filesystem_repo_on_repo_check(
285 def test_missing_filesystem_repo_on_repo_check(
286 self, autologin_user, backend, suffix, csrf_token):
286 self, autologin_user, backend, suffix, csrf_token):
287 repo = backend.create_repo(name_suffix=suffix)
287 repo = backend.create_repo(name_suffix=suffix)
288 repo_name = repo.repo_name
288 repo_name = repo.repo_name
289
289
290 # delete from file system
290 # delete from file system
291 RepoModel()._delete_filesystem_repo(repo)
291 RepoModel()._delete_filesystem_repo(repo)
292
292
293 # test if the repo is still in the database
293 # test if the repo is still in the database
294 new_repo = RepoModel().get_by_repo_name(repo_name)
294 new_repo = RepoModel().get_by_repo_name(repo_name)
295 assert new_repo.repo_name == repo_name
295 assert new_repo.repo_name == repo_name
296
296
297 # check if repo is not in the filesystem
297 # check if repo is not in the filesystem
298 assert not repo_on_filesystem(repo_name)
298 assert not repo_on_filesystem(repo_name)
299
299
300 # flush the session
300 # flush the session
301 self.app.get(
301 self.app.get(
302 route_path('repo_summary', repo_name=safe_str(repo_name)),
302 route_path('repo_summary', repo_name=safe_str(repo_name)),
303 status=302)
303 status=302)
304
304
305 response = self.app.get(
305 response = self.app.get(
306 route_path('repo_creating_check', repo_name=safe_str(repo_name)),
306 route_path('repo_creating_check', repo_name=safe_str(repo_name)),
307 status=200)
307 status=200)
308 msg = 'The repository `%s` cannot be loaded in filesystem. ' \
308 msg = 'The repository `%s` cannot be loaded in filesystem. ' \
309 'Please check if it exist, or is not damaged.' % repo_name
309 'Please check if it exist, or is not damaged.' % repo_name
310 assert_session_flash(response, msg )
310 assert_session_flash(response, msg )
311
311
312
312
313 @pytest.fixture()
313 @pytest.fixture()
314 def summary_view(context_stub, request_stub, user_util):
314 def summary_view(context_stub, request_stub, user_util):
315 """
315 """
316 Bootstrap view to test the view functions
316 Bootstrap view to test the view functions
317 """
317 """
318 request_stub.matched_route = AttributeDict(name='test_view')
318 request_stub.matched_route = AttributeDict(name='test_view')
319
319
320 request_stub.user = user_util.create_user().AuthUser()
320 request_stub.user = user_util.create_user().AuthUser()
321 request_stub.db_repo = user_util.create_repo()
321 request_stub.db_repo = user_util.create_repo()
322
322
323 view = RepoSummaryView(context=context_stub, request=request_stub)
323 view = RepoSummaryView(context=context_stub, request=request_stub)
324 return view
324 return view
325
325
326
326
327 @pytest.mark.usefixtures('app')
327 @pytest.mark.usefixtures('app')
328 class TestCreateReferenceData(object):
328 class TestCreateReferenceData(object):
329
329
330 @pytest.fixture()
330 @pytest.fixture()
331 def example_refs(self):
331 def example_refs(self):
332 section_1_refs = OrderedDict((('a', 'a_id'), ('b', 'b_id')))
332 section_1_refs = OrderedDict((('a', 'a_id'), ('b', 'b_id')))
333 example_refs = [
333 example_refs = [
334 ('section_1', section_1_refs, 't1'),
334 ('section_1', section_1_refs, 't1'),
335 ('section_2', {'c': 'c_id'}, 't2'),
335 ('section_2', {'c': 'c_id'}, 't2'),
336 ]
336 ]
337 return example_refs
337 return example_refs
338
338
339 def test_generates_refs_based_on_commit_ids(self, example_refs, summary_view):
339 def test_generates_refs_based_on_commit_ids(self, example_refs, summary_view):
340 repo = mock.Mock()
340 repo = mock.Mock()
341 repo.name = 'test-repo'
341 repo.name = 'test-repo'
342 repo.alias = 'git'
342 repo.alias = 'git'
343 full_repo_name = 'pytest-repo-group/' + repo.name
343 full_repo_name = 'pytest-repo-group/' + repo.name
344
344
345 result = summary_view._create_reference_data(
345 result = summary_view._create_reference_data(
346 repo, full_repo_name, example_refs)
346 repo, full_repo_name, example_refs)
347
347
348 expected_files_url = '/{}/files/'.format(full_repo_name)
348 expected_files_url = '/{}/files/'.format(full_repo_name)
349 expected_result = [
349 expected_result = [
350 {
350 {
351 'children': [
351 'children': [
352 {
352 {
353 'id': 'a', 'idx': 0, 'raw_id': 'a_id', 'text': 'a', 'type': 't1',
353 'id': 'a', 'idx': 0, 'raw_id': 'a_id', 'text': 'a', 'type': 't1',
354 'files_url': expected_files_url + 'a/?at=a',
354 'files_url': expected_files_url + 'a/?at=a',
355 },
355 },
356 {
356 {
357 'id': 'b', 'idx': 0, 'raw_id': 'b_id', 'text': 'b', 'type': 't1',
357 'id': 'b', 'idx': 0, 'raw_id': 'b_id', 'text': 'b', 'type': 't1',
358 'files_url': expected_files_url + 'b/?at=b',
358 'files_url': expected_files_url + 'b/?at=b',
359 }
359 }
360 ],
360 ],
361 'text': 'section_1'
361 'text': 'section_1'
362 },
362 },
363 {
363 {
364 'children': [
364 'children': [
365 {
365 {
366 'id': 'c', 'idx': 0, 'raw_id': 'c_id', 'text': 'c', 'type': 't2',
366 'id': 'c', 'idx': 0, 'raw_id': 'c_id', 'text': 'c', 'type': 't2',
367 'files_url': expected_files_url + 'c/?at=c',
367 'files_url': expected_files_url + 'c/?at=c',
368 }
368 }
369 ],
369 ],
370 'text': 'section_2'
370 'text': 'section_2'
371 }]
371 }]
372 assert result == expected_result
372 assert result == expected_result
373
373
374 def test_generates_refs_with_path_for_svn(self, example_refs, summary_view):
374 def test_generates_refs_with_path_for_svn(self, example_refs, summary_view):
375 repo = mock.Mock()
375 repo = mock.Mock()
376 repo.name = 'test-repo'
376 repo.name = 'test-repo'
377 repo.alias = 'svn'
377 repo.alias = 'svn'
378 full_repo_name = 'pytest-repo-group/' + repo.name
378 full_repo_name = 'pytest-repo-group/' + repo.name
379
379
380 result = summary_view._create_reference_data(
380 result = summary_view._create_reference_data(
381 repo, full_repo_name, example_refs)
381 repo, full_repo_name, example_refs)
382
382
383 expected_files_url = '/{}/files/'.format(full_repo_name)
383 expected_files_url = '/{}/files/'.format(full_repo_name)
384 expected_result = [
384 expected_result = [
385 {
385 {
386 'children': [
386 'children': [
387 {
387 {
388 'id': 'a@a_id', 'idx': 0, 'raw_id': 'a_id',
388 'id': 'a@a_id', 'idx': 0, 'raw_id': 'a_id',
389 'text': 'a', 'type': 't1',
389 'text': 'a', 'type': 't1',
390 'files_url': expected_files_url + 'a_id/a?at=a',
390 'files_url': expected_files_url + 'a_id/a?at=a',
391 },
391 },
392 {
392 {
393 'id': 'b@b_id', 'idx': 0, 'raw_id': 'b_id',
393 'id': 'b@b_id', 'idx': 0, 'raw_id': 'b_id',
394 'text': 'b', 'type': 't1',
394 'text': 'b', 'type': 't1',
395 'files_url': expected_files_url + 'b_id/b?at=b',
395 'files_url': expected_files_url + 'b_id/b?at=b',
396 }
396 }
397 ],
397 ],
398 'text': 'section_1'
398 'text': 'section_1'
399 },
399 },
400 {
400 {
401 'children': [
401 'children': [
402 {
402 {
403 'id': 'c@c_id', 'idx': 0, 'raw_id': 'c_id',
403 'id': 'c@c_id', 'idx': 0, 'raw_id': 'c_id',
404 'text': 'c', 'type': 't2',
404 'text': 'c', 'type': 't2',
405 'files_url': expected_files_url + 'c_id/c?at=c',
405 'files_url': expected_files_url + 'c_id/c?at=c',
406 }
406 }
407 ],
407 ],
408 'text': 'section_2'
408 'text': 'section_2'
409 }
409 }
410 ]
410 ]
411 assert result == expected_result
411 assert result == expected_result
412
412
413
413
414 class TestCreateFilesUrl(object):
414 class TestCreateFilesUrl(object):
415
415
416 def test_creates_non_svn_url(self, app, summary_view):
416 def test_creates_non_svn_url(self, app, summary_view):
417 repo = mock.Mock()
417 repo = mock.Mock()
418 repo.name = 'abcde'
418 repo.name = 'abcde'
419 full_repo_name = 'test-repo-group/' + repo.name
419 full_repo_name = 'test-repo-group/' + repo.name
420 ref_name = 'branch1'
420 ref_name = 'branch1'
421 raw_id = 'deadbeef0123456789'
421 raw_id = 'deadbeef0123456789'
422 is_svn = False
422 is_svn = False
423
423
424 with mock.patch('rhodecode.lib.helpers.route_path') as url_mock:
424 with mock.patch('rhodecode.lib.helpers.route_path') as url_mock:
425 result = summary_view._create_files_url(
425 result = summary_view._create_files_url(
426 repo, full_repo_name, ref_name, raw_id, is_svn)
426 repo, full_repo_name, ref_name, raw_id, is_svn)
427 url_mock.assert_called_once_with(
427 url_mock.assert_called_once_with(
428 'repo_files', repo_name=full_repo_name, commit_id=ref_name,
428 'repo_files', repo_name=full_repo_name, commit_id=ref_name,
429 f_path='', _query=dict(at=ref_name))
429 f_path='', _query=dict(at=ref_name))
430 assert result == url_mock.return_value
430 assert result == url_mock.return_value
431
431
432 def test_creates_svn_url(self, app, summary_view):
432 def test_creates_svn_url(self, app, summary_view):
433 repo = mock.Mock()
433 repo = mock.Mock()
434 repo.name = 'abcde'
434 repo.name = 'abcde'
435 full_repo_name = 'test-repo-group/' + repo.name
435 full_repo_name = 'test-repo-group/' + repo.name
436 ref_name = 'branch1'
436 ref_name = 'branch1'
437 raw_id = 'deadbeef0123456789'
437 raw_id = 'deadbeef0123456789'
438 is_svn = True
438 is_svn = True
439
439
440 with mock.patch('rhodecode.lib.helpers.route_path') as url_mock:
440 with mock.patch('rhodecode.lib.helpers.route_path') as url_mock:
441 result = summary_view._create_files_url(
441 result = summary_view._create_files_url(
442 repo, full_repo_name, ref_name, raw_id, is_svn)
442 repo, full_repo_name, ref_name, raw_id, is_svn)
443 url_mock.assert_called_once_with(
443 url_mock.assert_called_once_with(
444 'repo_files', repo_name=full_repo_name, f_path=ref_name,
444 'repo_files', repo_name=full_repo_name, f_path=ref_name,
445 commit_id=raw_id, _query=dict(at=ref_name))
445 commit_id=raw_id, _query=dict(at=ref_name))
446 assert result == url_mock.return_value
446 assert result == url_mock.return_value
447
447
448 def test_name_has_slashes(self, app, summary_view):
448 def test_name_has_slashes(self, app, summary_view):
449 repo = mock.Mock()
449 repo = mock.Mock()
450 repo.name = 'abcde'
450 repo.name = 'abcde'
451 full_repo_name = 'test-repo-group/' + repo.name
451 full_repo_name = 'test-repo-group/' + repo.name
452 ref_name = 'branch1/branch2'
452 ref_name = 'branch1/branch2'
453 raw_id = 'deadbeef0123456789'
453 raw_id = 'deadbeef0123456789'
454 is_svn = False
454 is_svn = False
455
455
456 with mock.patch('rhodecode.lib.helpers.route_path') as url_mock:
456 with mock.patch('rhodecode.lib.helpers.route_path') as url_mock:
457 result = summary_view._create_files_url(
457 result = summary_view._create_files_url(
458 repo, full_repo_name, ref_name, raw_id, is_svn)
458 repo, full_repo_name, ref_name, raw_id, is_svn)
459 url_mock.assert_called_once_with(
459 url_mock.assert_called_once_with(
460 'repo_files', repo_name=full_repo_name, commit_id=raw_id,
460 'repo_files', repo_name=full_repo_name, commit_id=raw_id,
461 f_path='', _query=dict(at=ref_name))
461 f_path='', _query=dict(at=ref_name))
462 assert result == url_mock.return_value
462 assert result == url_mock.return_value
463
463
464
464
465 class TestReferenceItems(object):
465 class TestReferenceItems(object):
466 repo = mock.Mock()
466 repo = mock.Mock()
467 repo.name = 'pytest-repo'
467 repo.name = 'pytest-repo'
468 repo_full_name = 'pytest-repo-group/' + repo.name
468 repo_full_name = 'pytest-repo-group/' + repo.name
469 ref_type = 'branch'
469 ref_type = 'branch'
470 fake_url = '/abcde/'
470 fake_url = '/abcde/'
471
471
472 @staticmethod
472 @staticmethod
473 def _format_function(name, id_):
473 def _format_function(name, id_):
474 return 'format_function_{}_{}'.format(name, id_)
474 return 'format_function_{}_{}'.format(name, id_)
475
475
476 def test_creates_required_amount_of_items(self, summary_view):
476 def test_creates_required_amount_of_items(self, summary_view):
477 amount = 100
477 amount = 100
478 refs = {
478 refs = {
479 'ref{}'.format(i): '{0:040d}'.format(i)
479 'ref{}'.format(i): '{0:040d}'.format(i)
480 for i in range(amount)
480 for i in range(amount)
481 }
481 }
482
482
483 url_patcher = mock.patch.object(summary_view, '_create_files_url')
483 url_patcher = mock.patch.object(summary_view, '_create_files_url')
484 svn_patcher = mock.patch('rhodecode.lib.helpers.is_svn',
484 svn_patcher = mock.patch('rhodecode.lib.helpers.is_svn',
485 return_value=False)
485 return_value=False)
486
486
487 with url_patcher as url_mock, svn_patcher:
487 with url_patcher as url_mock, svn_patcher:
488 result = summary_view._create_reference_items(
488 result = summary_view._create_reference_items(
489 self.repo, self.repo_full_name, refs, self.ref_type,
489 self.repo, self.repo_full_name, refs, self.ref_type,
490 self._format_function)
490 self._format_function)
491 assert len(result) == amount
491 assert len(result) == amount
492 assert url_mock.call_count == amount
492 assert url_mock.call_count == amount
493
493
494 def test_single_item_details(self, summary_view):
494 def test_single_item_details(self, summary_view):
495 ref_name = 'ref1'
495 ref_name = 'ref1'
496 ref_id = 'deadbeef'
496 ref_id = 'deadbeef'
497 refs = {
497 refs = {
498 ref_name: ref_id
498 ref_name: ref_id
499 }
499 }
500
500
501 svn_patcher = mock.patch('rhodecode.lib.helpers.is_svn',
501 svn_patcher = mock.patch('rhodecode.lib.helpers.is_svn',
502 return_value=False)
502 return_value=False)
503
503
504 url_patcher = mock.patch.object(
504 url_patcher = mock.patch.object(
505 summary_view, '_create_files_url', return_value=self.fake_url)
505 summary_view, '_create_files_url', return_value=self.fake_url)
506
506
507 with url_patcher as url_mock, svn_patcher:
507 with url_patcher as url_mock, svn_patcher:
508 result = summary_view._create_reference_items(
508 result = summary_view._create_reference_items(
509 self.repo, self.repo_full_name, refs, self.ref_type,
509 self.repo, self.repo_full_name, refs, self.ref_type,
510 self._format_function)
510 self._format_function)
511
511
512 url_mock.assert_called_once_with(
512 url_mock.assert_called_once_with(
513 self.repo, self.repo_full_name, ref_name, ref_id, False)
513 self.repo, self.repo_full_name, ref_name, ref_id, False)
514 expected_result = [
514 expected_result = [
515 {
515 {
516 'text': ref_name,
516 'text': ref_name,
517 'id': self._format_function(ref_name, ref_id),
517 'id': self._format_function(ref_name, ref_id),
518 'raw_id': ref_id,
518 'raw_id': ref_id,
519 'idx': 0,
519 'idx': 0,
520 'type': self.ref_type,
520 'type': self.ref_type,
521 'files_url': self.fake_url
521 'files_url': self.fake_url
522 }
522 }
523 ]
523 ]
524 assert result == expected_result
524 assert result == expected_result
@@ -1,685 +1,685 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import mock
21 import mock
22 import pytest
22 import pytest
23
23
24 from rhodecode.lib import auth
24 from rhodecode.lib import auth
25 from rhodecode.lib.utils2 import str2bool
25 from rhodecode.lib.utils2 import str2bool
26 from rhodecode.model.db import (
26 from rhodecode.model.db import (
27 Repository, UserRepoToPerm, User)
27 Repository, UserRepoToPerm, User)
28 from rhodecode.model.meta import Session
28 from rhodecode.model.meta import Session
29 from rhodecode.model.settings import SettingsModel, VcsSettingsModel
29 from rhodecode.model.settings import SettingsModel, VcsSettingsModel
30 from rhodecode.model.user import UserModel
30 from rhodecode.model.user import UserModel
31 from rhodecode.tests import (
31 from rhodecode.tests import (
32 login_user_session, logout_user_session,
32 login_user_session, logout_user_session,
33 TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
33 TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
34 from rhodecode.tests.fixture import Fixture
34 from rhodecode.tests.fixture import Fixture
35 from rhodecode.tests.utils import AssertResponse
35 from rhodecode.tests.utils import AssertResponse
36
36
37 fixture = Fixture()
37 fixture = Fixture()
38
38
39
39
40 def route_path(name, params=None, **kwargs):
40 def route_path(name, params=None, **kwargs):
41 import urllib
41 import urllib
42
42
43 base_url = {
43 base_url = {
44 'repo_summary': '/{repo_name}',
44 'repo_summary': '/{repo_name}',
45 'repo_creating_check': '/{repo_name}/repo_creating_check',
45 'repo_creating_check': '/{repo_name}/repo_creating_check',
46 'edit_repo': '/{repo_name}/settings',
46 'edit_repo': '/{repo_name}/settings',
47 'edit_repo_vcs': '/{repo_name}/settings/vcs',
47 'edit_repo_vcs': '/{repo_name}/settings/vcs',
48 'edit_repo_vcs_update': '/{repo_name}/settings/vcs/update',
48 'edit_repo_vcs_update': '/{repo_name}/settings/vcs/update',
49 'edit_repo_vcs_svn_pattern_delete': '/{repo_name}/settings/vcs/svn_pattern/delete'
49 'edit_repo_vcs_svn_pattern_delete': '/{repo_name}/settings/vcs/svn_pattern/delete'
50 }[name].format(**kwargs)
50 }[name].format(**kwargs)
51
51
52 if params:
52 if params:
53 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
53 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
54 return base_url
54 return base_url
55
55
56
56
57 @pytest.mark.usefixtures("app")
57 @pytest.mark.usefixtures("app")
58 class TestVcsSettings(object):
58 class TestVcsSettings(object):
59 FORM_DATA = {
59 FORM_DATA = {
60 'inherit_global_settings': False,
60 'inherit_global_settings': False,
61 'hooks_changegroup_repo_size': False,
61 'hooks_changegroup_repo_size': False,
62 'hooks_changegroup_push_logger': False,
62 'hooks_changegroup_push_logger': False,
63 'hooks_outgoing_pull_logger': False,
63 'hooks_outgoing_pull_logger': False,
64 'extensions_largefiles': False,
64 'extensions_largefiles': False,
65 'extensions_evolve': False,
65 'extensions_evolve': False,
66 'phases_publish': 'False',
66 'phases_publish': 'False',
67 'rhodecode_pr_merge_enabled': False,
67 'rhodecode_pr_merge_enabled': False,
68 'rhodecode_use_outdated_comments': False,
68 'rhodecode_use_outdated_comments': False,
69 'new_svn_branch': '',
69 'new_svn_branch': '',
70 'new_svn_tag': ''
70 'new_svn_tag': ''
71 }
71 }
72
72
73 @pytest.mark.skip_backends('svn')
73 @pytest.mark.skip_backends('svn')
74 def test_global_settings_initial_values(self, autologin_user, backend):
74 def test_global_settings_initial_values(self, autologin_user, backend):
75 repo_name = backend.repo_name
75 repo_name = backend.repo_name
76 response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name))
76 response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name))
77
77
78 expected_settings = (
78 expected_settings = (
79 'rhodecode_use_outdated_comments', 'rhodecode_pr_merge_enabled',
79 'rhodecode_use_outdated_comments', 'rhodecode_pr_merge_enabled',
80 'hooks_changegroup_repo_size', 'hooks_changegroup_push_logger',
80 'hooks_changegroup_repo_size', 'hooks_changegroup_push_logger',
81 'hooks_outgoing_pull_logger'
81 'hooks_outgoing_pull_logger'
82 )
82 )
83 for setting in expected_settings:
83 for setting in expected_settings:
84 self.assert_repo_value_equals_global_value(response, setting)
84 self.assert_repo_value_equals_global_value(response, setting)
85
85
86 def test_show_settings_requires_repo_admin_permission(
86 def test_show_settings_requires_repo_admin_permission(
87 self, backend, user_util, settings_util):
87 self, backend, user_util, settings_util):
88 repo = backend.create_repo()
88 repo = backend.create_repo()
89 repo_name = repo.repo_name
89 repo_name = repo.repo_name
90 user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN)
90 user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN)
91 user_util.grant_user_permission_to_repo(repo, user, 'repository.admin')
91 user_util.grant_user_permission_to_repo(repo, user, 'repository.admin')
92 login_user_session(
92 login_user_session(
93 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
93 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
94 self.app.get(route_path('edit_repo_vcs', repo_name=repo_name), status=200)
94 self.app.get(route_path('edit_repo_vcs', repo_name=repo_name), status=200)
95
95
96 def test_inherit_global_settings_flag_is_true_by_default(
96 def test_inherit_global_settings_flag_is_true_by_default(
97 self, autologin_user, backend):
97 self, autologin_user, backend):
98 repo_name = backend.repo_name
98 repo_name = backend.repo_name
99 response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name))
99 response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name))
100
100
101 assert_response = AssertResponse(response)
101 assert_response = response.assert_response()
102 element = assert_response.get_element('#inherit_global_settings')
102 element = assert_response.get_element('#inherit_global_settings')
103 assert element.checked
103 assert element.checked
104
104
105 @pytest.mark.parametrize('checked_value', [True, False])
105 @pytest.mark.parametrize('checked_value', [True, False])
106 def test_inherit_global_settings_value(
106 def test_inherit_global_settings_value(
107 self, autologin_user, backend, checked_value, settings_util):
107 self, autologin_user, backend, checked_value, settings_util):
108 repo = backend.create_repo()
108 repo = backend.create_repo()
109 repo_name = repo.repo_name
109 repo_name = repo.repo_name
110 settings_util.create_repo_rhodecode_setting(
110 settings_util.create_repo_rhodecode_setting(
111 repo, 'inherit_vcs_settings', checked_value, 'bool')
111 repo, 'inherit_vcs_settings', checked_value, 'bool')
112 response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name))
112 response = self.app.get(route_path('edit_repo_vcs', repo_name=repo_name))
113
113
114 assert_response = AssertResponse(response)
114 assert_response = response.assert_response()
115 element = assert_response.get_element('#inherit_global_settings')
115 element = assert_response.get_element('#inherit_global_settings')
116 assert element.checked == checked_value
116 assert element.checked == checked_value
117
117
118 @pytest.mark.skip_backends('svn')
118 @pytest.mark.skip_backends('svn')
119 def test_hooks_settings_are_created(
119 def test_hooks_settings_are_created(
120 self, autologin_user, backend, csrf_token):
120 self, autologin_user, backend, csrf_token):
121 repo_name = backend.repo_name
121 repo_name = backend.repo_name
122 data = self.FORM_DATA.copy()
122 data = self.FORM_DATA.copy()
123 data['csrf_token'] = csrf_token
123 data['csrf_token'] = csrf_token
124 self.app.post(
124 self.app.post(
125 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
125 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
126 settings = SettingsModel(repo=repo_name)
126 settings = SettingsModel(repo=repo_name)
127 try:
127 try:
128 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
128 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
129 ui = settings.get_ui_by_section_and_key(section, key)
129 ui = settings.get_ui_by_section_and_key(section, key)
130 assert ui.ui_active is False
130 assert ui.ui_active is False
131 finally:
131 finally:
132 self._cleanup_repo_settings(settings)
132 self._cleanup_repo_settings(settings)
133
133
134 def test_hooks_settings_are_not_created_for_svn(
134 def test_hooks_settings_are_not_created_for_svn(
135 self, autologin_user, backend_svn, csrf_token):
135 self, autologin_user, backend_svn, csrf_token):
136 repo_name = backend_svn.repo_name
136 repo_name = backend_svn.repo_name
137 data = self.FORM_DATA.copy()
137 data = self.FORM_DATA.copy()
138 data['csrf_token'] = csrf_token
138 data['csrf_token'] = csrf_token
139 self.app.post(
139 self.app.post(
140 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
140 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
141 settings = SettingsModel(repo=repo_name)
141 settings = SettingsModel(repo=repo_name)
142 try:
142 try:
143 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
143 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
144 ui = settings.get_ui_by_section_and_key(section, key)
144 ui = settings.get_ui_by_section_and_key(section, key)
145 assert ui is None
145 assert ui is None
146 finally:
146 finally:
147 self._cleanup_repo_settings(settings)
147 self._cleanup_repo_settings(settings)
148
148
149 @pytest.mark.skip_backends('svn')
149 @pytest.mark.skip_backends('svn')
150 def test_hooks_settings_are_updated(
150 def test_hooks_settings_are_updated(
151 self, autologin_user, backend, csrf_token):
151 self, autologin_user, backend, csrf_token):
152 repo_name = backend.repo_name
152 repo_name = backend.repo_name
153 settings = SettingsModel(repo=repo_name)
153 settings = SettingsModel(repo=repo_name)
154 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
154 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
155 settings.create_ui_section_value(section, '', key=key, active=True)
155 settings.create_ui_section_value(section, '', key=key, active=True)
156
156
157 data = self.FORM_DATA.copy()
157 data = self.FORM_DATA.copy()
158 data['csrf_token'] = csrf_token
158 data['csrf_token'] = csrf_token
159 self.app.post(
159 self.app.post(
160 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
160 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
161 try:
161 try:
162 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
162 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
163 ui = settings.get_ui_by_section_and_key(section, key)
163 ui = settings.get_ui_by_section_and_key(section, key)
164 assert ui.ui_active is False
164 assert ui.ui_active is False
165 finally:
165 finally:
166 self._cleanup_repo_settings(settings)
166 self._cleanup_repo_settings(settings)
167
167
168 def test_hooks_settings_are_not_updated_for_svn(
168 def test_hooks_settings_are_not_updated_for_svn(
169 self, autologin_user, backend_svn, csrf_token):
169 self, autologin_user, backend_svn, csrf_token):
170 repo_name = backend_svn.repo_name
170 repo_name = backend_svn.repo_name
171 settings = SettingsModel(repo=repo_name)
171 settings = SettingsModel(repo=repo_name)
172 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
172 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
173 settings.create_ui_section_value(section, '', key=key, active=True)
173 settings.create_ui_section_value(section, '', key=key, active=True)
174
174
175 data = self.FORM_DATA.copy()
175 data = self.FORM_DATA.copy()
176 data['csrf_token'] = csrf_token
176 data['csrf_token'] = csrf_token
177 self.app.post(
177 self.app.post(
178 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
178 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
179 try:
179 try:
180 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
180 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
181 ui = settings.get_ui_by_section_and_key(section, key)
181 ui = settings.get_ui_by_section_and_key(section, key)
182 assert ui.ui_active is True
182 assert ui.ui_active is True
183 finally:
183 finally:
184 self._cleanup_repo_settings(settings)
184 self._cleanup_repo_settings(settings)
185
185
186 @pytest.mark.skip_backends('svn')
186 @pytest.mark.skip_backends('svn')
187 def test_pr_settings_are_created(
187 def test_pr_settings_are_created(
188 self, autologin_user, backend, csrf_token):
188 self, autologin_user, backend, csrf_token):
189 repo_name = backend.repo_name
189 repo_name = backend.repo_name
190 data = self.FORM_DATA.copy()
190 data = self.FORM_DATA.copy()
191 data['csrf_token'] = csrf_token
191 data['csrf_token'] = csrf_token
192 self.app.post(
192 self.app.post(
193 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
193 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
194 settings = SettingsModel(repo=repo_name)
194 settings = SettingsModel(repo=repo_name)
195 try:
195 try:
196 for name in VcsSettingsModel.GENERAL_SETTINGS:
196 for name in VcsSettingsModel.GENERAL_SETTINGS:
197 setting = settings.get_setting_by_name(name)
197 setting = settings.get_setting_by_name(name)
198 assert setting.app_settings_value is False
198 assert setting.app_settings_value is False
199 finally:
199 finally:
200 self._cleanup_repo_settings(settings)
200 self._cleanup_repo_settings(settings)
201
201
202 def test_pr_settings_are_not_created_for_svn(
202 def test_pr_settings_are_not_created_for_svn(
203 self, autologin_user, backend_svn, csrf_token):
203 self, autologin_user, backend_svn, csrf_token):
204 repo_name = backend_svn.repo_name
204 repo_name = backend_svn.repo_name
205 data = self.FORM_DATA.copy()
205 data = self.FORM_DATA.copy()
206 data['csrf_token'] = csrf_token
206 data['csrf_token'] = csrf_token
207 self.app.post(
207 self.app.post(
208 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
208 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
209 settings = SettingsModel(repo=repo_name)
209 settings = SettingsModel(repo=repo_name)
210 try:
210 try:
211 for name in VcsSettingsModel.GENERAL_SETTINGS:
211 for name in VcsSettingsModel.GENERAL_SETTINGS:
212 setting = settings.get_setting_by_name(name)
212 setting = settings.get_setting_by_name(name)
213 assert setting is None
213 assert setting is None
214 finally:
214 finally:
215 self._cleanup_repo_settings(settings)
215 self._cleanup_repo_settings(settings)
216
216
217 def test_pr_settings_creation_requires_repo_admin_permission(
217 def test_pr_settings_creation_requires_repo_admin_permission(
218 self, backend, user_util, settings_util, csrf_token):
218 self, backend, user_util, settings_util, csrf_token):
219 repo = backend.create_repo()
219 repo = backend.create_repo()
220 repo_name = repo.repo_name
220 repo_name = repo.repo_name
221
221
222 logout_user_session(self.app, csrf_token)
222 logout_user_session(self.app, csrf_token)
223 session = login_user_session(
223 session = login_user_session(
224 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
224 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
225 new_csrf_token = auth.get_csrf_token(session)
225 new_csrf_token = auth.get_csrf_token(session)
226
226
227 user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN)
227 user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN)
228 repo = Repository.get_by_repo_name(repo_name)
228 repo = Repository.get_by_repo_name(repo_name)
229 user_util.grant_user_permission_to_repo(repo, user, 'repository.admin')
229 user_util.grant_user_permission_to_repo(repo, user, 'repository.admin')
230 data = self.FORM_DATA.copy()
230 data = self.FORM_DATA.copy()
231 data['csrf_token'] = new_csrf_token
231 data['csrf_token'] = new_csrf_token
232 settings = SettingsModel(repo=repo_name)
232 settings = SettingsModel(repo=repo_name)
233
233
234 try:
234 try:
235 self.app.post(
235 self.app.post(
236 route_path('edit_repo_vcs_update', repo_name=repo_name), data,
236 route_path('edit_repo_vcs_update', repo_name=repo_name), data,
237 status=302)
237 status=302)
238 finally:
238 finally:
239 self._cleanup_repo_settings(settings)
239 self._cleanup_repo_settings(settings)
240
240
241 @pytest.mark.skip_backends('svn')
241 @pytest.mark.skip_backends('svn')
242 def test_pr_settings_are_updated(
242 def test_pr_settings_are_updated(
243 self, autologin_user, backend, csrf_token):
243 self, autologin_user, backend, csrf_token):
244 repo_name = backend.repo_name
244 repo_name = backend.repo_name
245 settings = SettingsModel(repo=repo_name)
245 settings = SettingsModel(repo=repo_name)
246 for name in VcsSettingsModel.GENERAL_SETTINGS:
246 for name in VcsSettingsModel.GENERAL_SETTINGS:
247 settings.create_or_update_setting(name, True, 'bool')
247 settings.create_or_update_setting(name, True, 'bool')
248
248
249 data = self.FORM_DATA.copy()
249 data = self.FORM_DATA.copy()
250 data['csrf_token'] = csrf_token
250 data['csrf_token'] = csrf_token
251 self.app.post(
251 self.app.post(
252 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
252 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
253 try:
253 try:
254 for name in VcsSettingsModel.GENERAL_SETTINGS:
254 for name in VcsSettingsModel.GENERAL_SETTINGS:
255 setting = settings.get_setting_by_name(name)
255 setting = settings.get_setting_by_name(name)
256 assert setting.app_settings_value is False
256 assert setting.app_settings_value is False
257 finally:
257 finally:
258 self._cleanup_repo_settings(settings)
258 self._cleanup_repo_settings(settings)
259
259
260 def test_pr_settings_are_not_updated_for_svn(
260 def test_pr_settings_are_not_updated_for_svn(
261 self, autologin_user, backend_svn, csrf_token):
261 self, autologin_user, backend_svn, csrf_token):
262 repo_name = backend_svn.repo_name
262 repo_name = backend_svn.repo_name
263 settings = SettingsModel(repo=repo_name)
263 settings = SettingsModel(repo=repo_name)
264 for name in VcsSettingsModel.GENERAL_SETTINGS:
264 for name in VcsSettingsModel.GENERAL_SETTINGS:
265 settings.create_or_update_setting(name, True, 'bool')
265 settings.create_or_update_setting(name, True, 'bool')
266
266
267 data = self.FORM_DATA.copy()
267 data = self.FORM_DATA.copy()
268 data['csrf_token'] = csrf_token
268 data['csrf_token'] = csrf_token
269 self.app.post(
269 self.app.post(
270 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
270 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
271 try:
271 try:
272 for name in VcsSettingsModel.GENERAL_SETTINGS:
272 for name in VcsSettingsModel.GENERAL_SETTINGS:
273 setting = settings.get_setting_by_name(name)
273 setting = settings.get_setting_by_name(name)
274 assert setting.app_settings_value is True
274 assert setting.app_settings_value is True
275 finally:
275 finally:
276 self._cleanup_repo_settings(settings)
276 self._cleanup_repo_settings(settings)
277
277
278 def test_svn_settings_are_created(
278 def test_svn_settings_are_created(
279 self, autologin_user, backend_svn, csrf_token, settings_util):
279 self, autologin_user, backend_svn, csrf_token, settings_util):
280 repo_name = backend_svn.repo_name
280 repo_name = backend_svn.repo_name
281 data = self.FORM_DATA.copy()
281 data = self.FORM_DATA.copy()
282 data['new_svn_tag'] = 'svn-tag'
282 data['new_svn_tag'] = 'svn-tag'
283 data['new_svn_branch'] = 'svn-branch'
283 data['new_svn_branch'] = 'svn-branch'
284 data['csrf_token'] = csrf_token
284 data['csrf_token'] = csrf_token
285
285
286 # Create few global settings to make sure that uniqueness validators
286 # Create few global settings to make sure that uniqueness validators
287 # are not triggered
287 # are not triggered
288 settings_util.create_rhodecode_ui(
288 settings_util.create_rhodecode_ui(
289 VcsSettingsModel.SVN_BRANCH_SECTION, 'svn-branch')
289 VcsSettingsModel.SVN_BRANCH_SECTION, 'svn-branch')
290 settings_util.create_rhodecode_ui(
290 settings_util.create_rhodecode_ui(
291 VcsSettingsModel.SVN_TAG_SECTION, 'svn-tag')
291 VcsSettingsModel.SVN_TAG_SECTION, 'svn-tag')
292
292
293 self.app.post(
293 self.app.post(
294 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
294 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
295 settings = SettingsModel(repo=repo_name)
295 settings = SettingsModel(repo=repo_name)
296 try:
296 try:
297 svn_branches = settings.get_ui_by_section(
297 svn_branches = settings.get_ui_by_section(
298 VcsSettingsModel.SVN_BRANCH_SECTION)
298 VcsSettingsModel.SVN_BRANCH_SECTION)
299 svn_branch_names = [b.ui_value for b in svn_branches]
299 svn_branch_names = [b.ui_value for b in svn_branches]
300 svn_tags = settings.get_ui_by_section(
300 svn_tags = settings.get_ui_by_section(
301 VcsSettingsModel.SVN_TAG_SECTION)
301 VcsSettingsModel.SVN_TAG_SECTION)
302 svn_tag_names = [b.ui_value for b in svn_tags]
302 svn_tag_names = [b.ui_value for b in svn_tags]
303 assert 'svn-branch' in svn_branch_names
303 assert 'svn-branch' in svn_branch_names
304 assert 'svn-tag' in svn_tag_names
304 assert 'svn-tag' in svn_tag_names
305 finally:
305 finally:
306 self._cleanup_repo_settings(settings)
306 self._cleanup_repo_settings(settings)
307
307
308 def test_svn_settings_are_unique(
308 def test_svn_settings_are_unique(
309 self, autologin_user, backend_svn, csrf_token, settings_util):
309 self, autologin_user, backend_svn, csrf_token, settings_util):
310 repo = backend_svn.repo
310 repo = backend_svn.repo
311 repo_name = repo.repo_name
311 repo_name = repo.repo_name
312 data = self.FORM_DATA.copy()
312 data = self.FORM_DATA.copy()
313 data['new_svn_tag'] = 'test_tag'
313 data['new_svn_tag'] = 'test_tag'
314 data['new_svn_branch'] = 'test_branch'
314 data['new_svn_branch'] = 'test_branch'
315 data['csrf_token'] = csrf_token
315 data['csrf_token'] = csrf_token
316 settings_util.create_repo_rhodecode_ui(
316 settings_util.create_repo_rhodecode_ui(
317 repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch')
317 repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch')
318 settings_util.create_repo_rhodecode_ui(
318 settings_util.create_repo_rhodecode_ui(
319 repo, VcsSettingsModel.SVN_TAG_SECTION, 'test_tag')
319 repo, VcsSettingsModel.SVN_TAG_SECTION, 'test_tag')
320
320
321 response = self.app.post(
321 response = self.app.post(
322 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=200)
322 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=200)
323 response.mustcontain('Pattern already exists')
323 response.mustcontain('Pattern already exists')
324
324
325 def test_svn_settings_with_empty_values_are_not_created(
325 def test_svn_settings_with_empty_values_are_not_created(
326 self, autologin_user, backend_svn, csrf_token):
326 self, autologin_user, backend_svn, csrf_token):
327 repo_name = backend_svn.repo_name
327 repo_name = backend_svn.repo_name
328 data = self.FORM_DATA.copy()
328 data = self.FORM_DATA.copy()
329 data['csrf_token'] = csrf_token
329 data['csrf_token'] = csrf_token
330 self.app.post(
330 self.app.post(
331 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
331 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
332 settings = SettingsModel(repo=repo_name)
332 settings = SettingsModel(repo=repo_name)
333 try:
333 try:
334 svn_branches = settings.get_ui_by_section(
334 svn_branches = settings.get_ui_by_section(
335 VcsSettingsModel.SVN_BRANCH_SECTION)
335 VcsSettingsModel.SVN_BRANCH_SECTION)
336 svn_tags = settings.get_ui_by_section(
336 svn_tags = settings.get_ui_by_section(
337 VcsSettingsModel.SVN_TAG_SECTION)
337 VcsSettingsModel.SVN_TAG_SECTION)
338 assert len(svn_branches) == 0
338 assert len(svn_branches) == 0
339 assert len(svn_tags) == 0
339 assert len(svn_tags) == 0
340 finally:
340 finally:
341 self._cleanup_repo_settings(settings)
341 self._cleanup_repo_settings(settings)
342
342
343 def test_svn_settings_are_shown_for_svn_repository(
343 def test_svn_settings_are_shown_for_svn_repository(
344 self, autologin_user, backend_svn, csrf_token):
344 self, autologin_user, backend_svn, csrf_token):
345 repo_name = backend_svn.repo_name
345 repo_name = backend_svn.repo_name
346 response = self.app.get(
346 response = self.app.get(
347 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
347 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
348 response.mustcontain('Subversion Settings')
348 response.mustcontain('Subversion Settings')
349
349
350 @pytest.mark.skip_backends('svn')
350 @pytest.mark.skip_backends('svn')
351 def test_svn_settings_are_not_created_for_not_svn_repository(
351 def test_svn_settings_are_not_created_for_not_svn_repository(
352 self, autologin_user, backend, csrf_token):
352 self, autologin_user, backend, csrf_token):
353 repo_name = backend.repo_name
353 repo_name = backend.repo_name
354 data = self.FORM_DATA.copy()
354 data = self.FORM_DATA.copy()
355 data['csrf_token'] = csrf_token
355 data['csrf_token'] = csrf_token
356 self.app.post(
356 self.app.post(
357 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
357 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
358 settings = SettingsModel(repo=repo_name)
358 settings = SettingsModel(repo=repo_name)
359 try:
359 try:
360 svn_branches = settings.get_ui_by_section(
360 svn_branches = settings.get_ui_by_section(
361 VcsSettingsModel.SVN_BRANCH_SECTION)
361 VcsSettingsModel.SVN_BRANCH_SECTION)
362 svn_tags = settings.get_ui_by_section(
362 svn_tags = settings.get_ui_by_section(
363 VcsSettingsModel.SVN_TAG_SECTION)
363 VcsSettingsModel.SVN_TAG_SECTION)
364 assert len(svn_branches) == 0
364 assert len(svn_branches) == 0
365 assert len(svn_tags) == 0
365 assert len(svn_tags) == 0
366 finally:
366 finally:
367 self._cleanup_repo_settings(settings)
367 self._cleanup_repo_settings(settings)
368
368
369 @pytest.mark.skip_backends('svn')
369 @pytest.mark.skip_backends('svn')
370 def test_svn_settings_are_shown_only_for_svn_repository(
370 def test_svn_settings_are_shown_only_for_svn_repository(
371 self, autologin_user, backend, csrf_token):
371 self, autologin_user, backend, csrf_token):
372 repo_name = backend.repo_name
372 repo_name = backend.repo_name
373 response = self.app.get(
373 response = self.app.get(
374 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
374 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
375 response.mustcontain(no='Subversion Settings')
375 response.mustcontain(no='Subversion Settings')
376
376
377 def test_hg_settings_are_created(
377 def test_hg_settings_are_created(
378 self, autologin_user, backend_hg, csrf_token):
378 self, autologin_user, backend_hg, csrf_token):
379 repo_name = backend_hg.repo_name
379 repo_name = backend_hg.repo_name
380 data = self.FORM_DATA.copy()
380 data = self.FORM_DATA.copy()
381 data['new_svn_tag'] = 'svn-tag'
381 data['new_svn_tag'] = 'svn-tag'
382 data['new_svn_branch'] = 'svn-branch'
382 data['new_svn_branch'] = 'svn-branch'
383 data['csrf_token'] = csrf_token
383 data['csrf_token'] = csrf_token
384 self.app.post(
384 self.app.post(
385 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
385 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
386 settings = SettingsModel(repo=repo_name)
386 settings = SettingsModel(repo=repo_name)
387 try:
387 try:
388 largefiles_ui = settings.get_ui_by_section_and_key(
388 largefiles_ui = settings.get_ui_by_section_and_key(
389 'extensions', 'largefiles')
389 'extensions', 'largefiles')
390 assert largefiles_ui.ui_active is False
390 assert largefiles_ui.ui_active is False
391 phases_ui = settings.get_ui_by_section_and_key(
391 phases_ui = settings.get_ui_by_section_and_key(
392 'phases', 'publish')
392 'phases', 'publish')
393 assert str2bool(phases_ui.ui_value) is False
393 assert str2bool(phases_ui.ui_value) is False
394 finally:
394 finally:
395 self._cleanup_repo_settings(settings)
395 self._cleanup_repo_settings(settings)
396
396
397 def test_hg_settings_are_updated(
397 def test_hg_settings_are_updated(
398 self, autologin_user, backend_hg, csrf_token):
398 self, autologin_user, backend_hg, csrf_token):
399 repo_name = backend_hg.repo_name
399 repo_name = backend_hg.repo_name
400 settings = SettingsModel(repo=repo_name)
400 settings = SettingsModel(repo=repo_name)
401 settings.create_ui_section_value(
401 settings.create_ui_section_value(
402 'extensions', '', key='largefiles', active=True)
402 'extensions', '', key='largefiles', active=True)
403 settings.create_ui_section_value(
403 settings.create_ui_section_value(
404 'phases', '1', key='publish', active=True)
404 'phases', '1', key='publish', active=True)
405
405
406 data = self.FORM_DATA.copy()
406 data = self.FORM_DATA.copy()
407 data['csrf_token'] = csrf_token
407 data['csrf_token'] = csrf_token
408 self.app.post(
408 self.app.post(
409 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
409 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
410 try:
410 try:
411 largefiles_ui = settings.get_ui_by_section_and_key(
411 largefiles_ui = settings.get_ui_by_section_and_key(
412 'extensions', 'largefiles')
412 'extensions', 'largefiles')
413 assert largefiles_ui.ui_active is False
413 assert largefiles_ui.ui_active is False
414 phases_ui = settings.get_ui_by_section_and_key(
414 phases_ui = settings.get_ui_by_section_and_key(
415 'phases', 'publish')
415 'phases', 'publish')
416 assert str2bool(phases_ui.ui_value) is False
416 assert str2bool(phases_ui.ui_value) is False
417 finally:
417 finally:
418 self._cleanup_repo_settings(settings)
418 self._cleanup_repo_settings(settings)
419
419
420 def test_hg_settings_are_shown_for_hg_repository(
420 def test_hg_settings_are_shown_for_hg_repository(
421 self, autologin_user, backend_hg, csrf_token):
421 self, autologin_user, backend_hg, csrf_token):
422 repo_name = backend_hg.repo_name
422 repo_name = backend_hg.repo_name
423 response = self.app.get(
423 response = self.app.get(
424 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
424 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
425 response.mustcontain('Mercurial Settings')
425 response.mustcontain('Mercurial Settings')
426
426
427 @pytest.mark.skip_backends('hg')
427 @pytest.mark.skip_backends('hg')
428 def test_hg_settings_are_created_only_for_hg_repository(
428 def test_hg_settings_are_created_only_for_hg_repository(
429 self, autologin_user, backend, csrf_token):
429 self, autologin_user, backend, csrf_token):
430 repo_name = backend.repo_name
430 repo_name = backend.repo_name
431 data = self.FORM_DATA.copy()
431 data = self.FORM_DATA.copy()
432 data['csrf_token'] = csrf_token
432 data['csrf_token'] = csrf_token
433 self.app.post(
433 self.app.post(
434 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
434 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
435 settings = SettingsModel(repo=repo_name)
435 settings = SettingsModel(repo=repo_name)
436 try:
436 try:
437 largefiles_ui = settings.get_ui_by_section_and_key(
437 largefiles_ui = settings.get_ui_by_section_and_key(
438 'extensions', 'largefiles')
438 'extensions', 'largefiles')
439 assert largefiles_ui is None
439 assert largefiles_ui is None
440 phases_ui = settings.get_ui_by_section_and_key(
440 phases_ui = settings.get_ui_by_section_and_key(
441 'phases', 'publish')
441 'phases', 'publish')
442 assert phases_ui is None
442 assert phases_ui is None
443 finally:
443 finally:
444 self._cleanup_repo_settings(settings)
444 self._cleanup_repo_settings(settings)
445
445
446 @pytest.mark.skip_backends('hg')
446 @pytest.mark.skip_backends('hg')
447 def test_hg_settings_are_shown_only_for_hg_repository(
447 def test_hg_settings_are_shown_only_for_hg_repository(
448 self, autologin_user, backend, csrf_token):
448 self, autologin_user, backend, csrf_token):
449 repo_name = backend.repo_name
449 repo_name = backend.repo_name
450 response = self.app.get(
450 response = self.app.get(
451 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
451 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
452 response.mustcontain(no='Mercurial Settings')
452 response.mustcontain(no='Mercurial Settings')
453
453
454 @pytest.mark.skip_backends('hg')
454 @pytest.mark.skip_backends('hg')
455 def test_hg_settings_are_updated_only_for_hg_repository(
455 def test_hg_settings_are_updated_only_for_hg_repository(
456 self, autologin_user, backend, csrf_token):
456 self, autologin_user, backend, csrf_token):
457 repo_name = backend.repo_name
457 repo_name = backend.repo_name
458 settings = SettingsModel(repo=repo_name)
458 settings = SettingsModel(repo=repo_name)
459 settings.create_ui_section_value(
459 settings.create_ui_section_value(
460 'extensions', '', key='largefiles', active=True)
460 'extensions', '', key='largefiles', active=True)
461 settings.create_ui_section_value(
461 settings.create_ui_section_value(
462 'phases', '1', key='publish', active=True)
462 'phases', '1', key='publish', active=True)
463
463
464 data = self.FORM_DATA.copy()
464 data = self.FORM_DATA.copy()
465 data['csrf_token'] = csrf_token
465 data['csrf_token'] = csrf_token
466 self.app.post(
466 self.app.post(
467 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
467 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
468 try:
468 try:
469 largefiles_ui = settings.get_ui_by_section_and_key(
469 largefiles_ui = settings.get_ui_by_section_and_key(
470 'extensions', 'largefiles')
470 'extensions', 'largefiles')
471 assert largefiles_ui.ui_active is True
471 assert largefiles_ui.ui_active is True
472 phases_ui = settings.get_ui_by_section_and_key(
472 phases_ui = settings.get_ui_by_section_and_key(
473 'phases', 'publish')
473 'phases', 'publish')
474 assert phases_ui.ui_value == '1'
474 assert phases_ui.ui_value == '1'
475 finally:
475 finally:
476 self._cleanup_repo_settings(settings)
476 self._cleanup_repo_settings(settings)
477
477
478 def test_per_repo_svn_settings_are_displayed(
478 def test_per_repo_svn_settings_are_displayed(
479 self, autologin_user, backend_svn, settings_util):
479 self, autologin_user, backend_svn, settings_util):
480 repo = backend_svn.create_repo()
480 repo = backend_svn.create_repo()
481 repo_name = repo.repo_name
481 repo_name = repo.repo_name
482 branches = [
482 branches = [
483 settings_util.create_repo_rhodecode_ui(
483 settings_util.create_repo_rhodecode_ui(
484 repo, VcsSettingsModel.SVN_BRANCH_SECTION,
484 repo, VcsSettingsModel.SVN_BRANCH_SECTION,
485 'branch_{}'.format(i))
485 'branch_{}'.format(i))
486 for i in range(10)]
486 for i in range(10)]
487 tags = [
487 tags = [
488 settings_util.create_repo_rhodecode_ui(
488 settings_util.create_repo_rhodecode_ui(
489 repo, VcsSettingsModel.SVN_TAG_SECTION, 'tag_{}'.format(i))
489 repo, VcsSettingsModel.SVN_TAG_SECTION, 'tag_{}'.format(i))
490 for i in range(10)]
490 for i in range(10)]
491
491
492 response = self.app.get(
492 response = self.app.get(
493 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
493 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
494 assert_response = AssertResponse(response)
494 assert_response = response.assert_response()
495 for branch in branches:
495 for branch in branches:
496 css_selector = '[name=branch_value_{}]'.format(branch.ui_id)
496 css_selector = '[name=branch_value_{}]'.format(branch.ui_id)
497 element = assert_response.get_element(css_selector)
497 element = assert_response.get_element(css_selector)
498 assert element.value == branch.ui_value
498 assert element.value == branch.ui_value
499 for tag in tags:
499 for tag in tags:
500 css_selector = '[name=tag_ui_value_new_{}]'.format(tag.ui_id)
500 css_selector = '[name=tag_ui_value_new_{}]'.format(tag.ui_id)
501 element = assert_response.get_element(css_selector)
501 element = assert_response.get_element(css_selector)
502 assert element.value == tag.ui_value
502 assert element.value == tag.ui_value
503
503
504 def test_per_repo_hg_and_pr_settings_are_not_displayed_for_svn(
504 def test_per_repo_hg_and_pr_settings_are_not_displayed_for_svn(
505 self, autologin_user, backend_svn, settings_util):
505 self, autologin_user, backend_svn, settings_util):
506 repo = backend_svn.create_repo()
506 repo = backend_svn.create_repo()
507 repo_name = repo.repo_name
507 repo_name = repo.repo_name
508 response = self.app.get(
508 response = self.app.get(
509 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
509 route_path('edit_repo_vcs', repo_name=repo_name), status=200)
510 response.mustcontain(no='<label>Hooks:</label>')
510 response.mustcontain(no='<label>Hooks:</label>')
511 response.mustcontain(no='<label>Pull Request Settings:</label>')
511 response.mustcontain(no='<label>Pull Request Settings:</label>')
512
512
513 def test_inherit_global_settings_value_is_saved(
513 def test_inherit_global_settings_value_is_saved(
514 self, autologin_user, backend, csrf_token):
514 self, autologin_user, backend, csrf_token):
515 repo_name = backend.repo_name
515 repo_name = backend.repo_name
516 data = self.FORM_DATA.copy()
516 data = self.FORM_DATA.copy()
517 data['csrf_token'] = csrf_token
517 data['csrf_token'] = csrf_token
518 data['inherit_global_settings'] = True
518 data['inherit_global_settings'] = True
519 self.app.post(
519 self.app.post(
520 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
520 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
521
521
522 settings = SettingsModel(repo=repo_name)
522 settings = SettingsModel(repo=repo_name)
523 vcs_settings = VcsSettingsModel(repo=repo_name)
523 vcs_settings = VcsSettingsModel(repo=repo_name)
524 try:
524 try:
525 assert vcs_settings.inherit_global_settings is True
525 assert vcs_settings.inherit_global_settings is True
526 finally:
526 finally:
527 self._cleanup_repo_settings(settings)
527 self._cleanup_repo_settings(settings)
528
528
529 def test_repo_cache_is_invalidated_when_settings_are_updated(
529 def test_repo_cache_is_invalidated_when_settings_are_updated(
530 self, autologin_user, backend, csrf_token):
530 self, autologin_user, backend, csrf_token):
531 repo_name = backend.repo_name
531 repo_name = backend.repo_name
532 data = self.FORM_DATA.copy()
532 data = self.FORM_DATA.copy()
533 data['csrf_token'] = csrf_token
533 data['csrf_token'] = csrf_token
534 data['inherit_global_settings'] = True
534 data['inherit_global_settings'] = True
535 settings = SettingsModel(repo=repo_name)
535 settings = SettingsModel(repo=repo_name)
536
536
537 invalidation_patcher = mock.patch(
537 invalidation_patcher = mock.patch(
538 'rhodecode.model.scm.ScmModel.mark_for_invalidation')
538 'rhodecode.model.scm.ScmModel.mark_for_invalidation')
539 with invalidation_patcher as invalidation_mock:
539 with invalidation_patcher as invalidation_mock:
540 self.app.post(
540 self.app.post(
541 route_path('edit_repo_vcs_update', repo_name=repo_name), data,
541 route_path('edit_repo_vcs_update', repo_name=repo_name), data,
542 status=302)
542 status=302)
543 try:
543 try:
544 invalidation_mock.assert_called_once_with(repo_name, delete=True)
544 invalidation_mock.assert_called_once_with(repo_name, delete=True)
545 finally:
545 finally:
546 self._cleanup_repo_settings(settings)
546 self._cleanup_repo_settings(settings)
547
547
548 def test_other_settings_not_saved_inherit_global_settings_is_true(
548 def test_other_settings_not_saved_inherit_global_settings_is_true(
549 self, autologin_user, backend, csrf_token):
549 self, autologin_user, backend, csrf_token):
550 repo_name = backend.repo_name
550 repo_name = backend.repo_name
551 data = self.FORM_DATA.copy()
551 data = self.FORM_DATA.copy()
552 data['csrf_token'] = csrf_token
552 data['csrf_token'] = csrf_token
553 data['inherit_global_settings'] = True
553 data['inherit_global_settings'] = True
554 self.app.post(
554 self.app.post(
555 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
555 route_path('edit_repo_vcs_update', repo_name=repo_name), data, status=302)
556
556
557 settings = SettingsModel(repo=repo_name)
557 settings = SettingsModel(repo=repo_name)
558 ui_settings = (
558 ui_settings = (
559 VcsSettingsModel.HOOKS_SETTINGS + VcsSettingsModel.HG_SETTINGS)
559 VcsSettingsModel.HOOKS_SETTINGS + VcsSettingsModel.HG_SETTINGS)
560
560
561 vcs_settings = []
561 vcs_settings = []
562 try:
562 try:
563 for section, key in ui_settings:
563 for section, key in ui_settings:
564 ui = settings.get_ui_by_section_and_key(section, key)
564 ui = settings.get_ui_by_section_and_key(section, key)
565 if ui:
565 if ui:
566 vcs_settings.append(ui)
566 vcs_settings.append(ui)
567 vcs_settings.extend(settings.get_ui_by_section(
567 vcs_settings.extend(settings.get_ui_by_section(
568 VcsSettingsModel.SVN_BRANCH_SECTION))
568 VcsSettingsModel.SVN_BRANCH_SECTION))
569 vcs_settings.extend(settings.get_ui_by_section(
569 vcs_settings.extend(settings.get_ui_by_section(
570 VcsSettingsModel.SVN_TAG_SECTION))
570 VcsSettingsModel.SVN_TAG_SECTION))
571 for name in VcsSettingsModel.GENERAL_SETTINGS:
571 for name in VcsSettingsModel.GENERAL_SETTINGS:
572 setting = settings.get_setting_by_name(name)
572 setting = settings.get_setting_by_name(name)
573 if setting:
573 if setting:
574 vcs_settings.append(setting)
574 vcs_settings.append(setting)
575 assert vcs_settings == []
575 assert vcs_settings == []
576 finally:
576 finally:
577 self._cleanup_repo_settings(settings)
577 self._cleanup_repo_settings(settings)
578
578
579 def test_delete_svn_branch_and_tag_patterns(
579 def test_delete_svn_branch_and_tag_patterns(
580 self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header):
580 self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header):
581 repo = backend_svn.create_repo()
581 repo = backend_svn.create_repo()
582 repo_name = repo.repo_name
582 repo_name = repo.repo_name
583 branch = settings_util.create_repo_rhodecode_ui(
583 branch = settings_util.create_repo_rhodecode_ui(
584 repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch',
584 repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch',
585 cleanup=False)
585 cleanup=False)
586 tag = settings_util.create_repo_rhodecode_ui(
586 tag = settings_util.create_repo_rhodecode_ui(
587 repo, VcsSettingsModel.SVN_TAG_SECTION, 'test_tag', cleanup=False)
587 repo, VcsSettingsModel.SVN_TAG_SECTION, 'test_tag', cleanup=False)
588 data = {
588 data = {
589 'csrf_token': csrf_token
589 'csrf_token': csrf_token
590 }
590 }
591 for id_ in (branch.ui_id, tag.ui_id):
591 for id_ in (branch.ui_id, tag.ui_id):
592 data['delete_svn_pattern'] = id_,
592 data['delete_svn_pattern'] = id_,
593 self.app.post(
593 self.app.post(
594 route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name),
594 route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name),
595 data, extra_environ=xhr_header, status=200)
595 data, extra_environ=xhr_header, status=200)
596 settings = VcsSettingsModel(repo=repo_name)
596 settings = VcsSettingsModel(repo=repo_name)
597 assert settings.get_repo_svn_branch_patterns() == []
597 assert settings.get_repo_svn_branch_patterns() == []
598
598
599 def test_delete_svn_branch_requires_repo_admin_permission(
599 def test_delete_svn_branch_requires_repo_admin_permission(
600 self, backend_svn, user_util, settings_util, csrf_token, xhr_header):
600 self, backend_svn, user_util, settings_util, csrf_token, xhr_header):
601 repo = backend_svn.create_repo()
601 repo = backend_svn.create_repo()
602 repo_name = repo.repo_name
602 repo_name = repo.repo_name
603
603
604 logout_user_session(self.app, csrf_token)
604 logout_user_session(self.app, csrf_token)
605 session = login_user_session(
605 session = login_user_session(
606 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
606 self.app, TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
607 csrf_token = auth.get_csrf_token(session)
607 csrf_token = auth.get_csrf_token(session)
608
608
609 repo = Repository.get_by_repo_name(repo_name)
609 repo = Repository.get_by_repo_name(repo_name)
610 user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN)
610 user = UserModel().get_by_username(TEST_USER_REGULAR_LOGIN)
611 user_util.grant_user_permission_to_repo(repo, user, 'repository.admin')
611 user_util.grant_user_permission_to_repo(repo, user, 'repository.admin')
612 branch = settings_util.create_repo_rhodecode_ui(
612 branch = settings_util.create_repo_rhodecode_ui(
613 repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch',
613 repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'test_branch',
614 cleanup=False)
614 cleanup=False)
615 data = {
615 data = {
616 'csrf_token': csrf_token,
616 'csrf_token': csrf_token,
617 'delete_svn_pattern': branch.ui_id
617 'delete_svn_pattern': branch.ui_id
618 }
618 }
619 self.app.post(
619 self.app.post(
620 route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name),
620 route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name),
621 data, extra_environ=xhr_header, status=200)
621 data, extra_environ=xhr_header, status=200)
622
622
623 def test_delete_svn_branch_raises_400_when_not_found(
623 def test_delete_svn_branch_raises_400_when_not_found(
624 self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header):
624 self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header):
625 repo_name = backend_svn.repo_name
625 repo_name = backend_svn.repo_name
626 data = {
626 data = {
627 'delete_svn_pattern': 123,
627 'delete_svn_pattern': 123,
628 'csrf_token': csrf_token
628 'csrf_token': csrf_token
629 }
629 }
630 self.app.post(
630 self.app.post(
631 route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name),
631 route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name),
632 data, extra_environ=xhr_header, status=400)
632 data, extra_environ=xhr_header, status=400)
633
633
634 def test_delete_svn_branch_raises_400_when_no_id_specified(
634 def test_delete_svn_branch_raises_400_when_no_id_specified(
635 self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header):
635 self, autologin_user, backend_svn, settings_util, csrf_token, xhr_header):
636 repo_name = backend_svn.repo_name
636 repo_name = backend_svn.repo_name
637 data = {
637 data = {
638 'csrf_token': csrf_token
638 'csrf_token': csrf_token
639 }
639 }
640 self.app.post(
640 self.app.post(
641 route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name),
641 route_path('edit_repo_vcs_svn_pattern_delete', repo_name=repo_name),
642 data, extra_environ=xhr_header, status=400)
642 data, extra_environ=xhr_header, status=400)
643
643
644 def _cleanup_repo_settings(self, settings_model):
644 def _cleanup_repo_settings(self, settings_model):
645 cleanup = []
645 cleanup = []
646 ui_settings = (
646 ui_settings = (
647 VcsSettingsModel.HOOKS_SETTINGS + VcsSettingsModel.HG_SETTINGS)
647 VcsSettingsModel.HOOKS_SETTINGS + VcsSettingsModel.HG_SETTINGS)
648
648
649 for section, key in ui_settings:
649 for section, key in ui_settings:
650 ui = settings_model.get_ui_by_section_and_key(section, key)
650 ui = settings_model.get_ui_by_section_and_key(section, key)
651 if ui:
651 if ui:
652 cleanup.append(ui)
652 cleanup.append(ui)
653
653
654 cleanup.extend(settings_model.get_ui_by_section(
654 cleanup.extend(settings_model.get_ui_by_section(
655 VcsSettingsModel.INHERIT_SETTINGS))
655 VcsSettingsModel.INHERIT_SETTINGS))
656 cleanup.extend(settings_model.get_ui_by_section(
656 cleanup.extend(settings_model.get_ui_by_section(
657 VcsSettingsModel.SVN_BRANCH_SECTION))
657 VcsSettingsModel.SVN_BRANCH_SECTION))
658 cleanup.extend(settings_model.get_ui_by_section(
658 cleanup.extend(settings_model.get_ui_by_section(
659 VcsSettingsModel.SVN_TAG_SECTION))
659 VcsSettingsModel.SVN_TAG_SECTION))
660
660
661 for name in VcsSettingsModel.GENERAL_SETTINGS:
661 for name in VcsSettingsModel.GENERAL_SETTINGS:
662 setting = settings_model.get_setting_by_name(name)
662 setting = settings_model.get_setting_by_name(name)
663 if setting:
663 if setting:
664 cleanup.append(setting)
664 cleanup.append(setting)
665
665
666 for object_ in cleanup:
666 for object_ in cleanup:
667 Session().delete(object_)
667 Session().delete(object_)
668 Session().commit()
668 Session().commit()
669
669
670 def assert_repo_value_equals_global_value(self, response, setting):
670 def assert_repo_value_equals_global_value(self, response, setting):
671 assert_response = AssertResponse(response)
671 assert_response = response.assert_response()
672 global_css_selector = '[name={}_inherited]'.format(setting)
672 global_css_selector = '[name={}_inherited]'.format(setting)
673 repo_css_selector = '[name={}]'.format(setting)
673 repo_css_selector = '[name={}]'.format(setting)
674 repo_element = assert_response.get_element(repo_css_selector)
674 repo_element = assert_response.get_element(repo_css_selector)
675 global_element = assert_response.get_element(global_css_selector)
675 global_element = assert_response.get_element(global_css_selector)
676 assert repo_element.value == global_element.value
676 assert repo_element.value == global_element.value
677
677
678
678
679 def _get_permission_for_user(user, repo):
679 def _get_permission_for_user(user, repo):
680 perm = UserRepoToPerm.query()\
680 perm = UserRepoToPerm.query()\
681 .filter(UserRepoToPerm.repository ==
681 .filter(UserRepoToPerm.repository ==
682 Repository.get_by_repo_name(repo))\
682 Repository.get_by_repo_name(repo))\
683 .filter(UserRepoToPerm.user == User.get_by_username(user))\
683 .filter(UserRepoToPerm.user == User.get_by_username(user))\
684 .all()
684 .all()
685 return perm
685 return perm
@@ -1,104 +1,104 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import mock
21 import mock
22 import pytest
22 import pytest
23
23
24 import rhodecode
24 import rhodecode
25 from rhodecode.model.db import Repository
25 from rhodecode.model.db import Repository
26 from rhodecode.model.settings import SettingsModel
26 from rhodecode.model.settings import SettingsModel
27 from rhodecode.tests.utils import AssertResponse
27 from rhodecode.tests.utils import AssertResponse
28
28
29
29
30 def route_path(name, params=None, **kwargs):
30 def route_path(name, params=None, **kwargs):
31 import urllib
31 import urllib
32
32
33 base_url = {
33 base_url = {
34 'edit_repo': '/{repo_name}/settings',
34 'edit_repo': '/{repo_name}/settings',
35 'edit_repo_vcs': '/{repo_name}/settings/vcs',
35 'edit_repo_vcs': '/{repo_name}/settings/vcs',
36 'edit_repo_vcs_update': '/{repo_name}/settings/vcs/update',
36 'edit_repo_vcs_update': '/{repo_name}/settings/vcs/update',
37 }[name].format(**kwargs)
37 }[name].format(**kwargs)
38
38
39 if params:
39 if params:
40 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
40 base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
41 return base_url
41 return base_url
42
42
43
43
44 @pytest.mark.usefixtures('autologin_user', 'app')
44 @pytest.mark.usefixtures('autologin_user', 'app')
45 class TestAdminRepoVcsSettings(object):
45 class TestAdminRepoVcsSettings(object):
46
46
47 @pytest.mark.parametrize('setting_name, setting_backends', [
47 @pytest.mark.parametrize('setting_name, setting_backends', [
48 ('hg_use_rebase_for_merging', ['hg']),
48 ('hg_use_rebase_for_merging', ['hg']),
49 ])
49 ])
50 def test_labs_settings_visible_if_enabled(
50 def test_labs_settings_visible_if_enabled(
51 self, setting_name, setting_backends, backend):
51 self, setting_name, setting_backends, backend):
52 if backend.alias not in setting_backends:
52 if backend.alias not in setting_backends:
53 pytest.skip('Setting not available for backend {}'.format(backend))
53 pytest.skip('Setting not available for backend {}'.format(backend))
54
54
55 vcs_settings_url = route_path(
55 vcs_settings_url = route_path(
56 'edit_repo_vcs', repo_name=backend.repo.repo_name)
56 'edit_repo_vcs', repo_name=backend.repo.repo_name)
57
57
58 with mock.patch.dict(
58 with mock.patch.dict(
59 rhodecode.CONFIG, {'labs_settings_active': 'true'}):
59 rhodecode.CONFIG, {'labs_settings_active': 'true'}):
60 response = self.app.get(vcs_settings_url)
60 response = self.app.get(vcs_settings_url)
61
61
62 assertr = AssertResponse(response)
62 assertr = response.assert_response()
63 assertr.one_element_exists('#rhodecode_{}'.format(setting_name))
63 assertr.one_element_exists('#rhodecode_{}'.format(setting_name))
64
64
65 @pytest.mark.parametrize('setting_name, setting_backends', [
65 @pytest.mark.parametrize('setting_name, setting_backends', [
66 ('hg_use_rebase_for_merging', ['hg']),
66 ('hg_use_rebase_for_merging', ['hg']),
67 ])
67 ])
68 def test_update_boolean_settings(
68 def test_update_boolean_settings(
69 self, csrf_token, setting_name, setting_backends, backend):
69 self, csrf_token, setting_name, setting_backends, backend):
70 if backend.alias not in setting_backends:
70 if backend.alias not in setting_backends:
71 pytest.skip('Setting not available for backend {}'.format(backend))
71 pytest.skip('Setting not available for backend {}'.format(backend))
72
72
73 repo = backend.create_repo()
73 repo = backend.create_repo()
74 repo_name = repo.repo_name
74 repo_name = repo.repo_name
75
75
76 settings_model = SettingsModel(repo=repo)
76 settings_model = SettingsModel(repo=repo)
77 vcs_settings_url = route_path(
77 vcs_settings_url = route_path(
78 'edit_repo_vcs_update', repo_name=repo_name)
78 'edit_repo_vcs_update', repo_name=repo_name)
79
79
80 self.app.post(
80 self.app.post(
81 vcs_settings_url,
81 vcs_settings_url,
82 params={
82 params={
83 'inherit_global_settings': False,
83 'inherit_global_settings': False,
84 'new_svn_branch': 'dummy-value-for-testing',
84 'new_svn_branch': 'dummy-value-for-testing',
85 'new_svn_tag': 'dummy-value-for-testing',
85 'new_svn_tag': 'dummy-value-for-testing',
86 'rhodecode_{}'.format(setting_name): 'true',
86 'rhodecode_{}'.format(setting_name): 'true',
87 'csrf_token': csrf_token,
87 'csrf_token': csrf_token,
88 })
88 })
89 settings_model = SettingsModel(repo=Repository.get_by_repo_name(repo_name))
89 settings_model = SettingsModel(repo=Repository.get_by_repo_name(repo_name))
90 setting = settings_model.get_setting_by_name(setting_name)
90 setting = settings_model.get_setting_by_name(setting_name)
91 assert setting.app_settings_value
91 assert setting.app_settings_value
92
92
93 self.app.post(
93 self.app.post(
94 vcs_settings_url,
94 vcs_settings_url,
95 params={
95 params={
96 'inherit_global_settings': False,
96 'inherit_global_settings': False,
97 'new_svn_branch': 'dummy-value-for-testing',
97 'new_svn_branch': 'dummy-value-for-testing',
98 'new_svn_tag': 'dummy-value-for-testing',
98 'new_svn_tag': 'dummy-value-for-testing',
99 'rhodecode_{}'.format(setting_name): 'false',
99 'rhodecode_{}'.format(setting_name): 'false',
100 'csrf_token': csrf_token,
100 'csrf_token': csrf_token,
101 })
101 })
102 settings_model = SettingsModel(repo=Repository.get_by_repo_name(repo_name))
102 settings_model = SettingsModel(repo=Repository.get_by_repo_name(repo_name))
103 setting = settings_model.get_setting_by_name(setting_name)
103 setting = settings_model.get_setting_by_name(setting_name)
104 assert not setting.app_settings_value
104 assert not setting.app_settings_value
@@ -1,202 +1,202 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import os
21 import os
22
22
23 import mock
23 import mock
24 import pytest
24 import pytest
25 from whoosh import query
25 from whoosh import query
26
26
27 from rhodecode.tests import (
27 from rhodecode.tests import (
28 TestController, HG_REPO,
28 TestController, HG_REPO,
29 TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
29 TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
30 from rhodecode.tests.utils import AssertResponse
30 from rhodecode.tests.utils import AssertResponse
31
31
32
32
33 def route_path(name, **kwargs):
33 def route_path(name, **kwargs):
34 from rhodecode.apps._base import ADMIN_PREFIX
34 from rhodecode.apps._base import ADMIN_PREFIX
35 return {
35 return {
36 'search':
36 'search':
37 ADMIN_PREFIX + '/search',
37 ADMIN_PREFIX + '/search',
38 'search_repo':
38 'search_repo':
39 '/{repo_name}/search',
39 '/{repo_name}/search',
40
40
41 }[name].format(**kwargs)
41 }[name].format(**kwargs)
42
42
43
43
44 class TestSearchController(TestController):
44 class TestSearchController(TestController):
45
45
46 def test_index(self):
46 def test_index(self):
47 self.log_user()
47 self.log_user()
48 response = self.app.get(route_path('search'))
48 response = self.app.get(route_path('search'))
49 assert_response = AssertResponse(response)
49 assert_response = response.assert_response()
50 assert_response.one_element_exists('input#q')
50 assert_response.one_element_exists('input#q')
51
51
52 def test_search_files_empty_search(self):
52 def test_search_files_empty_search(self):
53 if os.path.isdir(self.index_location):
53 if os.path.isdir(self.index_location):
54 pytest.skip('skipped due to existing index')
54 pytest.skip('skipped due to existing index')
55 else:
55 else:
56 self.log_user()
56 self.log_user()
57 response = self.app.get(route_path('search'),
57 response = self.app.get(route_path('search'),
58 {'q': HG_REPO})
58 {'q': HG_REPO})
59 response.mustcontain('There is no index to search in. '
59 response.mustcontain('There is no index to search in. '
60 'Please run whoosh indexer')
60 'Please run whoosh indexer')
61
61
62 def test_search_validation(self):
62 def test_search_validation(self):
63 self.log_user()
63 self.log_user()
64 response = self.app.get(route_path('search'),
64 response = self.app.get(route_path('search'),
65 {'q': query, 'type': 'content', 'page_limit': 1000})
65 {'q': query, 'type': 'content', 'page_limit': 1000})
66
66
67 response.mustcontain(
67 response.mustcontain(
68 'page_limit - 1000 is greater than maximum value 500')
68 'page_limit - 1000 is greater than maximum value 500')
69
69
70 @pytest.mark.parametrize("query, expected_hits, expected_paths", [
70 @pytest.mark.parametrize("query, expected_hits, expected_paths", [
71 ('todo', 23, [
71 ('todo', 23, [
72 'vcs/backends/hg/inmemory.py',
72 'vcs/backends/hg/inmemory.py',
73 'vcs/tests/test_git.py']),
73 'vcs/tests/test_git.py']),
74 ('extension:rst installation', 6, [
74 ('extension:rst installation', 6, [
75 'docs/index.rst',
75 'docs/index.rst',
76 'docs/installation.rst']),
76 'docs/installation.rst']),
77 ('def repo', 87, [
77 ('def repo', 87, [
78 'vcs/tests/test_git.py',
78 'vcs/tests/test_git.py',
79 'vcs/tests/test_changesets.py']),
79 'vcs/tests/test_changesets.py']),
80 ('repository:%s def test' % HG_REPO, 18, [
80 ('repository:%s def test' % HG_REPO, 18, [
81 'vcs/tests/test_git.py',
81 'vcs/tests/test_git.py',
82 'vcs/tests/test_changesets.py']),
82 'vcs/tests/test_changesets.py']),
83 ('"def main"', 9, [
83 ('"def main"', 9, [
84 'vcs/__init__.py',
84 'vcs/__init__.py',
85 'vcs/tests/__init__.py',
85 'vcs/tests/__init__.py',
86 'vcs/utils/progressbar.py']),
86 'vcs/utils/progressbar.py']),
87 ('owner:test_admin', 358, [
87 ('owner:test_admin', 358, [
88 'vcs/tests/base.py',
88 'vcs/tests/base.py',
89 'MANIFEST.in',
89 'MANIFEST.in',
90 'vcs/utils/termcolors.py',
90 'vcs/utils/termcolors.py',
91 'docs/theme/ADC/static/documentation.png']),
91 'docs/theme/ADC/static/documentation.png']),
92 ('owner:test_admin def main', 72, [
92 ('owner:test_admin def main', 72, [
93 'vcs/__init__.py',
93 'vcs/__init__.py',
94 'vcs/tests/test_utils_filesize.py',
94 'vcs/tests/test_utils_filesize.py',
95 'vcs/tests/test_cli.py']),
95 'vcs/tests/test_cli.py']),
96 ('owner:michał test', 0, []),
96 ('owner:michał test', 0, []),
97 ])
97 ])
98 def test_search_files(self, query, expected_hits, expected_paths):
98 def test_search_files(self, query, expected_hits, expected_paths):
99 self.log_user()
99 self.log_user()
100 response = self.app.get(route_path('search'),
100 response = self.app.get(route_path('search'),
101 {'q': query, 'type': 'content', 'page_limit': 500})
101 {'q': query, 'type': 'content', 'page_limit': 500})
102
102
103 response.mustcontain('%s results' % expected_hits)
103 response.mustcontain('%s results' % expected_hits)
104 for path in expected_paths:
104 for path in expected_paths:
105 response.mustcontain(path)
105 response.mustcontain(path)
106
106
107 @pytest.mark.parametrize("query, expected_hits, expected_commits", [
107 @pytest.mark.parametrize("query, expected_hits, expected_commits", [
108 ('bother to ask where to fetch repo during tests', 3, [
108 ('bother to ask where to fetch repo during tests', 3, [
109 ('hg', 'a00c1b6f5d7a6ae678fd553a8b81d92367f7ecf1'),
109 ('hg', 'a00c1b6f5d7a6ae678fd553a8b81d92367f7ecf1'),
110 ('git', 'c6eb379775c578a95dad8ddab53f963b80894850'),
110 ('git', 'c6eb379775c578a95dad8ddab53f963b80894850'),
111 ('svn', '98')]),
111 ('svn', '98')]),
112 ('michał', 0, []),
112 ('michał', 0, []),
113 ('changed:tests/utils.py', 36, [
113 ('changed:tests/utils.py', 36, [
114 ('hg', 'a00c1b6f5d7a6ae678fd553a8b81d92367f7ecf1')]),
114 ('hg', 'a00c1b6f5d7a6ae678fd553a8b81d92367f7ecf1')]),
115 ('changed:vcs/utils/archivers.py', 11, [
115 ('changed:vcs/utils/archivers.py', 11, [
116 ('hg', '25213a5fbb048dff8ba65d21e466a835536e5b70'),
116 ('hg', '25213a5fbb048dff8ba65d21e466a835536e5b70'),
117 ('hg', '47aedd538bf616eedcb0e7d630ea476df0e159c7'),
117 ('hg', '47aedd538bf616eedcb0e7d630ea476df0e159c7'),
118 ('hg', 'f5d23247fad4856a1dabd5838afade1e0eed24fb'),
118 ('hg', 'f5d23247fad4856a1dabd5838afade1e0eed24fb'),
119 ('hg', '04ad456aefd6461aea24f90b63954b6b1ce07b3e'),
119 ('hg', '04ad456aefd6461aea24f90b63954b6b1ce07b3e'),
120 ('git', 'c994f0de03b2a0aa848a04fc2c0d7e737dba31fc'),
120 ('git', 'c994f0de03b2a0aa848a04fc2c0d7e737dba31fc'),
121 ('git', 'd1f898326327e20524fe22417c22d71064fe54a1'),
121 ('git', 'd1f898326327e20524fe22417c22d71064fe54a1'),
122 ('git', 'fe568b4081755c12abf6ba673ba777fc02a415f3'),
122 ('git', 'fe568b4081755c12abf6ba673ba777fc02a415f3'),
123 ('git', 'bafe786f0d8c2ff7da5c1dcfcfa577de0b5e92f1')]),
123 ('git', 'bafe786f0d8c2ff7da5c1dcfcfa577de0b5e92f1')]),
124 ('added:README.rst', 3, [
124 ('added:README.rst', 3, [
125 ('hg', '3803844fdbd3b711175fc3da9bdacfcd6d29a6fb'),
125 ('hg', '3803844fdbd3b711175fc3da9bdacfcd6d29a6fb'),
126 ('git', 'ff7ca51e58c505fec0dd2491de52c622bb7a806b'),
126 ('git', 'ff7ca51e58c505fec0dd2491de52c622bb7a806b'),
127 ('svn', '8')]),
127 ('svn', '8')]),
128 ('changed:lazy.py', 15, [
128 ('changed:lazy.py', 15, [
129 ('hg', 'eaa291c5e6ae6126a203059de9854ccf7b5baa12'),
129 ('hg', 'eaa291c5e6ae6126a203059de9854ccf7b5baa12'),
130 ('git', '17438a11f72b93f56d0e08e7d1fa79a378578a82'),
130 ('git', '17438a11f72b93f56d0e08e7d1fa79a378578a82'),
131 ('svn', '82'),
131 ('svn', '82'),
132 ('svn', '262'),
132 ('svn', '262'),
133 ('hg', 'f5d23247fad4856a1dabd5838afade1e0eed24fb'),
133 ('hg', 'f5d23247fad4856a1dabd5838afade1e0eed24fb'),
134 ('git', '33fa3223355104431402a888fa77a4e9956feb3e')
134 ('git', '33fa3223355104431402a888fa77a4e9956feb3e')
135 ]),
135 ]),
136 ('author:marcin@python-blog.com '
136 ('author:marcin@python-blog.com '
137 'commit_id:b986218ba1c9b0d6a259fac9b050b1724ed8e545', 1, [
137 'commit_id:b986218ba1c9b0d6a259fac9b050b1724ed8e545', 1, [
138 ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]),
138 ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]),
139 ('b986218ba1c9b0d6a259fac9b050b1724ed8e545', 1, [
139 ('b986218ba1c9b0d6a259fac9b050b1724ed8e545', 1, [
140 ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]),
140 ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]),
141 ('b986218b', 1, [
141 ('b986218b', 1, [
142 ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]),
142 ('hg', 'b986218ba1c9b0d6a259fac9b050b1724ed8e545')]),
143 ])
143 ])
144 def test_search_commit_messages(
144 def test_search_commit_messages(
145 self, query, expected_hits, expected_commits, enabled_backends):
145 self, query, expected_hits, expected_commits, enabled_backends):
146 self.log_user()
146 self.log_user()
147 response = self.app.get(route_path('search'),
147 response = self.app.get(route_path('search'),
148 {'q': query, 'type': 'commit', 'page_limit': 500})
148 {'q': query, 'type': 'commit', 'page_limit': 500})
149
149
150 response.mustcontain('%s results' % expected_hits)
150 response.mustcontain('%s results' % expected_hits)
151 for backend, commit_id in expected_commits:
151 for backend, commit_id in expected_commits:
152 if backend in enabled_backends:
152 if backend in enabled_backends:
153 response.mustcontain(commit_id)
153 response.mustcontain(commit_id)
154
154
155 @pytest.mark.parametrize("query, expected_hits, expected_paths", [
155 @pytest.mark.parametrize("query, expected_hits, expected_paths", [
156 ('readme.rst', 3, []),
156 ('readme.rst', 3, []),
157 ('test*', 75, []),
157 ('test*', 75, []),
158 ('*model*', 1, []),
158 ('*model*', 1, []),
159 ('extension:rst', 48, []),
159 ('extension:rst', 48, []),
160 ('extension:rst api', 24, []),
160 ('extension:rst api', 24, []),
161 ])
161 ])
162 def test_search_file_paths(self, query, expected_hits, expected_paths):
162 def test_search_file_paths(self, query, expected_hits, expected_paths):
163 self.log_user()
163 self.log_user()
164 response = self.app.get(route_path('search'),
164 response = self.app.get(route_path('search'),
165 {'q': query, 'type': 'path', 'page_limit': 500})
165 {'q': query, 'type': 'path', 'page_limit': 500})
166
166
167 response.mustcontain('%s results' % expected_hits)
167 response.mustcontain('%s results' % expected_hits)
168 for path in expected_paths:
168 for path in expected_paths:
169 response.mustcontain(path)
169 response.mustcontain(path)
170
170
171 def test_search_commit_message_specific_repo(self, backend):
171 def test_search_commit_message_specific_repo(self, backend):
172 self.log_user()
172 self.log_user()
173 response = self.app.get(
173 response = self.app.get(
174 route_path('search_repo',repo_name=backend.repo_name),
174 route_path('search_repo',repo_name=backend.repo_name),
175 {'q': 'bother to ask where to fetch repo during tests',
175 {'q': 'bother to ask where to fetch repo during tests',
176 'type': 'commit'})
176 'type': 'commit'})
177
177
178 response.mustcontain('1 results')
178 response.mustcontain('1 results')
179
179
180 def test_filters_are_not_applied_for_admin_user(self):
180 def test_filters_are_not_applied_for_admin_user(self):
181 self.log_user()
181 self.log_user()
182 with mock.patch('whoosh.searching.Searcher.search') as search_mock:
182 with mock.patch('whoosh.searching.Searcher.search') as search_mock:
183 self.app.get(route_path('search'),
183 self.app.get(route_path('search'),
184 {'q': 'test query', 'type': 'commit'})
184 {'q': 'test query', 'type': 'commit'})
185 assert search_mock.call_count == 1
185 assert search_mock.call_count == 1
186 _, kwargs = search_mock.call_args
186 _, kwargs = search_mock.call_args
187 assert kwargs['filter'] is None
187 assert kwargs['filter'] is None
188
188
189 def test_filters_are_applied_for_normal_user(self, enabled_backends):
189 def test_filters_are_applied_for_normal_user(self, enabled_backends):
190 self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
190 self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
191 with mock.patch('whoosh.searching.Searcher.search') as search_mock:
191 with mock.patch('whoosh.searching.Searcher.search') as search_mock:
192 self.app.get(route_path('search'),
192 self.app.get(route_path('search'),
193 {'q': 'test query', 'type': 'commit'})
193 {'q': 'test query', 'type': 'commit'})
194 assert search_mock.call_count == 1
194 assert search_mock.call_count == 1
195 _, kwargs = search_mock.call_args
195 _, kwargs = search_mock.call_args
196 assert isinstance(kwargs['filter'], query.Or)
196 assert isinstance(kwargs['filter'], query.Or)
197 expected_repositories = [
197 expected_repositories = [
198 'vcs_test_{}'.format(b) for b in enabled_backends]
198 'vcs_test_{}'.format(b) for b in enabled_backends]
199 queried_repositories = [
199 queried_repositories = [
200 name for type_, name in kwargs['filter'].all_terms()]
200 name for type_, name in kwargs['filter'].all_terms()]
201 for repository in expected_repositories:
201 for repository in expected_repositories:
202 assert repository in queried_repositories
202 assert repository in queried_repositories
@@ -1,75 +1,75 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import pytest
21 import pytest
22
22
23 from rhodecode.model.db import User
23 from rhodecode.model.db import User
24 from rhodecode.tests import (
24 from rhodecode.tests import (
25 TestController, TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS,
25 TestController, TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS,
26 TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
26 TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
27 from rhodecode.tests.fixture import Fixture
27 from rhodecode.tests.fixture import Fixture
28 from rhodecode.tests.utils import AssertResponse
28 from rhodecode.tests.utils import AssertResponse
29
29
30 fixture = Fixture()
30 fixture = Fixture()
31
31
32
32
33 def route_path(name, **kwargs):
33 def route_path(name, **kwargs):
34 return '/_profiles/{username}'.format(**kwargs)
34 return '/_profiles/{username}'.format(**kwargs)
35
35
36
36
37 class TestUsersController(TestController):
37 class TestUsersController(TestController):
38
38
39 def test_user_profile(self, user_util):
39 def test_user_profile(self, user_util):
40 edit_link_css = '.user-profile .panel-edit'
40 edit_link_css = '.user-profile .panel-edit'
41 self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
41 self.log_user(TEST_USER_REGULAR_LOGIN, TEST_USER_REGULAR_PASS)
42 user = user_util.create_user(
42 user = user_util.create_user(
43 'test-my-user', password='qweqwe', email='testme@rhodecode.org')
43 'test-my-user', password='qweqwe', email='testme@rhodecode.org')
44 username = user.username
44 username = user.username
45
45
46 response = self.app.get(route_path('user_profile', username=username))
46 response = self.app.get(route_path('user_profile', username=username))
47 response.mustcontain('testme')
47 response.mustcontain('testme')
48 response.mustcontain('testme@rhodecode.org')
48 response.mustcontain('testme@rhodecode.org')
49 assert_response = AssertResponse(response)
49 assert_response = response.assert_response()
50 assert_response.no_element_exists(edit_link_css)
50 assert_response.no_element_exists(edit_link_css)
51
51
52 # edit should be available to superadmin users
52 # edit should be available to superadmin users
53 self.logout_user()
53 self.logout_user()
54 self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS)
54 self.log_user(TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS)
55 response = self.app.get(route_path('user_profile', username=username))
55 response = self.app.get(route_path('user_profile', username=username))
56 assert_response = AssertResponse(response)
56 assert_response = response.assert_response()
57 assert_response.element_contains(edit_link_css, 'Edit')
57 assert_response.element_contains(edit_link_css, 'Edit')
58
58
59 def test_user_profile_not_available(self, user_util):
59 def test_user_profile_not_available(self, user_util):
60 user = user_util.create_user()
60 user = user_util.create_user()
61 username = user.username
61 username = user.username
62
62
63 # not logged in, redirect
63 # not logged in, redirect
64 self.app.get(route_path('user_profile', username=username), status=302)
64 self.app.get(route_path('user_profile', username=username), status=302)
65
65
66 self.log_user()
66 self.log_user()
67 # after log-in show
67 # after log-in show
68 self.app.get(route_path('user_profile', username=username), status=200)
68 self.app.get(route_path('user_profile', username=username), status=200)
69
69
70 # default user, not allowed to show it
70 # default user, not allowed to show it
71 self.app.get(
71 self.app.get(
72 route_path('user_profile', username=User.DEFAULT_USER), status=404)
72 route_path('user_profile', username=User.DEFAULT_USER), status=404)
73
73
74 # actual 404
74 # actual 404
75 self.app.get(route_path('user_profile', username='unknown'), status=404)
75 self.app.get(route_path('user_profile', username='unknown'), status=404)
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
@@ -1,946 +1,945 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 """
21 """
22 users model for RhodeCode
22 users model for RhodeCode
23 """
23 """
24
24
25 import logging
25 import logging
26 import traceback
26 import traceback
27 import datetime
27 import datetime
28 import ipaddress
28 import ipaddress
29
29
30 from pyramid.threadlocal import get_current_request
30 from pyramid.threadlocal import get_current_request
31 from sqlalchemy.exc import DatabaseError
31 from sqlalchemy.exc import DatabaseError
32
32
33 from rhodecode import events
33 from rhodecode import events
34 from rhodecode.lib.user_log_filter import user_log_filter
34 from rhodecode.lib.user_log_filter import user_log_filter
35 from rhodecode.lib.utils2 import (
35 from rhodecode.lib.utils2 import (
36 safe_unicode, get_current_rhodecode_user, action_logger_generic,
36 safe_unicode, get_current_rhodecode_user, action_logger_generic,
37 AttributeDict, str2bool)
37 AttributeDict, str2bool)
38 from rhodecode.lib.exceptions import (
38 from rhodecode.lib.exceptions import (
39 DefaultUserException, UserOwnsReposException, UserOwnsRepoGroupsException,
39 DefaultUserException, UserOwnsReposException, UserOwnsRepoGroupsException,
40 UserOwnsUserGroupsException, NotAllowedToCreateUserError)
40 UserOwnsUserGroupsException, NotAllowedToCreateUserError)
41 from rhodecode.lib.caching_query import FromCache
41 from rhodecode.lib.caching_query import FromCache
42 from rhodecode.model import BaseModel
42 from rhodecode.model import BaseModel
43 from rhodecode.model.auth_token import AuthTokenModel
43 from rhodecode.model.auth_token import AuthTokenModel
44 from rhodecode.model.db import (
44 from rhodecode.model.db import (
45 _hash_key, true, false, or_, joinedload, User, UserToPerm,
45 _hash_key, true, false, or_, joinedload, User, UserToPerm,
46 UserEmailMap, UserIpMap, UserLog)
46 UserEmailMap, UserIpMap, UserLog)
47 from rhodecode.model.meta import Session
47 from rhodecode.model.meta import Session
48 from rhodecode.model.repo_group import RepoGroupModel
48 from rhodecode.model.repo_group import RepoGroupModel
49
49
50
50
51 log = logging.getLogger(__name__)
51 log = logging.getLogger(__name__)
52
52
53
53
54 class UserModel(BaseModel):
54 class UserModel(BaseModel):
55 cls = User
55 cls = User
56
56
57 def get(self, user_id, cache=False):
57 def get(self, user_id, cache=False):
58 user = self.sa.query(User)
58 user = self.sa.query(User)
59 if cache:
59 if cache:
60 user = user.options(
60 user = user.options(
61 FromCache("sql_cache_short", "get_user_%s" % user_id))
61 FromCache("sql_cache_short", "get_user_%s" % user_id))
62 return user.get(user_id)
62 return user.get(user_id)
63
63
64 def get_user(self, user):
64 def get_user(self, user):
65 return self._get_user(user)
65 return self._get_user(user)
66
66
67 def _serialize_user(self, user):
67 def _serialize_user(self, user):
68 import rhodecode.lib.helpers as h
68 import rhodecode.lib.helpers as h
69
69
70 return {
70 return {
71 'id': user.user_id,
71 'id': user.user_id,
72 'first_name': user.first_name,
72 'first_name': user.first_name,
73 'last_name': user.last_name,
73 'last_name': user.last_name,
74 'username': user.username,
74 'username': user.username,
75 'email': user.email,
75 'email': user.email,
76 'icon_link': h.gravatar_url(user.email, 30),
76 'icon_link': h.gravatar_url(user.email, 30),
77 'profile_link': h.link_to_user(user),
77 'profile_link': h.link_to_user(user),
78 'value_display': h.escape(h.person(user)),
78 'value_display': h.escape(h.person(user)),
79 'value': user.username,
79 'value': user.username,
80 'value_type': 'user',
80 'value_type': 'user',
81 'active': user.active,
81 'active': user.active,
82 }
82 }
83
83
84 def get_users(self, name_contains=None, limit=20, only_active=True):
84 def get_users(self, name_contains=None, limit=20, only_active=True):
85
85
86 query = self.sa.query(User)
86 query = self.sa.query(User)
87 if only_active:
87 if only_active:
88 query = query.filter(User.active == true())
88 query = query.filter(User.active == true())
89
89
90 if name_contains:
90 if name_contains:
91 ilike_expression = u'%{}%'.format(safe_unicode(name_contains))
91 ilike_expression = u'%{}%'.format(safe_unicode(name_contains))
92 query = query.filter(
92 query = query.filter(
93 or_(
93 or_(
94 User.name.ilike(ilike_expression),
94 User.name.ilike(ilike_expression),
95 User.lastname.ilike(ilike_expression),
95 User.lastname.ilike(ilike_expression),
96 User.username.ilike(ilike_expression)
96 User.username.ilike(ilike_expression)
97 )
97 )
98 )
98 )
99 query = query.limit(limit)
99 query = query.limit(limit)
100 users = query.all()
100 users = query.all()
101
101
102 _users = [
102 _users = [
103 self._serialize_user(user) for user in users
103 self._serialize_user(user) for user in users
104 ]
104 ]
105 return _users
105 return _users
106
106
107 def get_by_username(self, username, cache=False, case_insensitive=False):
107 def get_by_username(self, username, cache=False, case_insensitive=False):
108
108
109 if case_insensitive:
109 if case_insensitive:
110 user = self.sa.query(User).filter(User.username.ilike(username))
110 user = self.sa.query(User).filter(User.username.ilike(username))
111 else:
111 else:
112 user = self.sa.query(User)\
112 user = self.sa.query(User)\
113 .filter(User.username == username)
113 .filter(User.username == username)
114 if cache:
114 if cache:
115 name_key = _hash_key(username)
115 name_key = _hash_key(username)
116 user = user.options(
116 user = user.options(
117 FromCache("sql_cache_short", "get_user_%s" % name_key))
117 FromCache("sql_cache_short", "get_user_%s" % name_key))
118 return user.scalar()
118 return user.scalar()
119
119
120 def get_by_email(self, email, cache=False, case_insensitive=False):
120 def get_by_email(self, email, cache=False, case_insensitive=False):
121 return User.get_by_email(email, case_insensitive, cache)
121 return User.get_by_email(email, case_insensitive, cache)
122
122
123 def get_by_auth_token(self, auth_token, cache=False):
123 def get_by_auth_token(self, auth_token, cache=False):
124 return User.get_by_auth_token(auth_token, cache)
124 return User.get_by_auth_token(auth_token, cache)
125
125
126 def get_active_user_count(self, cache=False):
126 def get_active_user_count(self, cache=False):
127 qry = User.query().filter(
127 qry = User.query().filter(
128 User.active == true()).filter(
128 User.active == true()).filter(
129 User.username != User.DEFAULT_USER)
129 User.username != User.DEFAULT_USER)
130 if cache:
130 if cache:
131 qry = qry.options(
131 qry = qry.options(
132 FromCache("sql_cache_short", "get_active_users"))
132 FromCache("sql_cache_short", "get_active_users"))
133 return qry.count()
133 return qry.count()
134
134
135 def create(self, form_data, cur_user=None):
135 def create(self, form_data, cur_user=None):
136 if not cur_user:
136 if not cur_user:
137 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
137 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
138
138
139 user_data = {
139 user_data = {
140 'username': form_data['username'],
140 'username': form_data['username'],
141 'password': form_data['password'],
141 'password': form_data['password'],
142 'email': form_data['email'],
142 'email': form_data['email'],
143 'firstname': form_data['firstname'],
143 'firstname': form_data['firstname'],
144 'lastname': form_data['lastname'],
144 'lastname': form_data['lastname'],
145 'active': form_data['active'],
145 'active': form_data['active'],
146 'extern_type': form_data['extern_type'],
146 'extern_type': form_data['extern_type'],
147 'extern_name': form_data['extern_name'],
147 'extern_name': form_data['extern_name'],
148 'admin': False,
148 'admin': False,
149 'cur_user': cur_user
149 'cur_user': cur_user
150 }
150 }
151
151
152 if 'create_repo_group' in form_data:
152 if 'create_repo_group' in form_data:
153 user_data['create_repo_group'] = str2bool(
153 user_data['create_repo_group'] = str2bool(
154 form_data.get('create_repo_group'))
154 form_data.get('create_repo_group'))
155
155
156 try:
156 try:
157 if form_data.get('password_change'):
157 if form_data.get('password_change'):
158 user_data['force_password_change'] = True
158 user_data['force_password_change'] = True
159 return UserModel().create_or_update(**user_data)
159 return UserModel().create_or_update(**user_data)
160 except Exception:
160 except Exception:
161 log.error(traceback.format_exc())
161 log.error(traceback.format_exc())
162 raise
162 raise
163
163
164 def update_user(self, user, skip_attrs=None, **kwargs):
164 def update_user(self, user, skip_attrs=None, **kwargs):
165 from rhodecode.lib.auth import get_crypt_password
165 from rhodecode.lib.auth import get_crypt_password
166
166
167 user = self._get_user(user)
167 user = self._get_user(user)
168 if user.username == User.DEFAULT_USER:
168 if user.username == User.DEFAULT_USER:
169 raise DefaultUserException(
169 raise DefaultUserException(
170 "You can't edit this user (`%(username)s`) since it's "
170 "You can't edit this user (`%(username)s`) since it's "
171 "crucial for entire application" % {
171 "crucial for entire application" % {
172 'username': user.username})
172 'username': user.username})
173
173
174 # first store only defaults
174 # first store only defaults
175 user_attrs = {
175 user_attrs = {
176 'updating_user_id': user.user_id,
176 'updating_user_id': user.user_id,
177 'username': user.username,
177 'username': user.username,
178 'password': user.password,
178 'password': user.password,
179 'email': user.email,
179 'email': user.email,
180 'firstname': user.name,
180 'firstname': user.name,
181 'lastname': user.lastname,
181 'lastname': user.lastname,
182 'active': user.active,
182 'active': user.active,
183 'admin': user.admin,
183 'admin': user.admin,
184 'extern_name': user.extern_name,
184 'extern_name': user.extern_name,
185 'extern_type': user.extern_type,
185 'extern_type': user.extern_type,
186 'language': user.user_data.get('language')
186 'language': user.user_data.get('language')
187 }
187 }
188
188
189 # in case there's new_password, that comes from form, use it to
189 # in case there's new_password, that comes from form, use it to
190 # store password
190 # store password
191 if kwargs.get('new_password'):
191 if kwargs.get('new_password'):
192 kwargs['password'] = kwargs['new_password']
192 kwargs['password'] = kwargs['new_password']
193
193
194 # cleanups, my_account password change form
194 # cleanups, my_account password change form
195 kwargs.pop('current_password', None)
195 kwargs.pop('current_password', None)
196 kwargs.pop('new_password', None)
196 kwargs.pop('new_password', None)
197
197
198 # cleanups, user edit password change form
198 # cleanups, user edit password change form
199 kwargs.pop('password_confirmation', None)
199 kwargs.pop('password_confirmation', None)
200 kwargs.pop('password_change', None)
200 kwargs.pop('password_change', None)
201
201
202 # create repo group on user creation
202 # create repo group on user creation
203 kwargs.pop('create_repo_group', None)
203 kwargs.pop('create_repo_group', None)
204
204
205 # legacy forms send name, which is the firstname
205 # legacy forms send name, which is the firstname
206 firstname = kwargs.pop('name', None)
206 firstname = kwargs.pop('name', None)
207 if firstname:
207 if firstname:
208 kwargs['firstname'] = firstname
208 kwargs['firstname'] = firstname
209
209
210 for k, v in kwargs.items():
210 for k, v in kwargs.items():
211 # skip if we don't want to update this
211 # skip if we don't want to update this
212 if skip_attrs and k in skip_attrs:
212 if skip_attrs and k in skip_attrs:
213 continue
213 continue
214
214
215 user_attrs[k] = v
215 user_attrs[k] = v
216
216
217 try:
217 try:
218 return self.create_or_update(**user_attrs)
218 return self.create_or_update(**user_attrs)
219 except Exception:
219 except Exception:
220 log.error(traceback.format_exc())
220 log.error(traceback.format_exc())
221 raise
221 raise
222
222
223 def create_or_update(
223 def create_or_update(
224 self, username, password, email, firstname='', lastname='',
224 self, username, password, email, firstname='', lastname='',
225 active=True, admin=False, extern_type=None, extern_name=None,
225 active=True, admin=False, extern_type=None, extern_name=None,
226 cur_user=None, plugin=None, force_password_change=False,
226 cur_user=None, plugin=None, force_password_change=False,
227 allow_to_create_user=True, create_repo_group=None,
227 allow_to_create_user=True, create_repo_group=None,
228 updating_user_id=None, language=None, strict_creation_check=True):
228 updating_user_id=None, language=None, strict_creation_check=True):
229 """
229 """
230 Creates a new instance if not found, or updates current one
230 Creates a new instance if not found, or updates current one
231
231
232 :param username:
232 :param username:
233 :param password:
233 :param password:
234 :param email:
234 :param email:
235 :param firstname:
235 :param firstname:
236 :param lastname:
236 :param lastname:
237 :param active:
237 :param active:
238 :param admin:
238 :param admin:
239 :param extern_type:
239 :param extern_type:
240 :param extern_name:
240 :param extern_name:
241 :param cur_user:
241 :param cur_user:
242 :param plugin: optional plugin this method was called from
242 :param plugin: optional plugin this method was called from
243 :param force_password_change: toggles new or existing user flag
243 :param force_password_change: toggles new or existing user flag
244 for password change
244 for password change
245 :param allow_to_create_user: Defines if the method can actually create
245 :param allow_to_create_user: Defines if the method can actually create
246 new users
246 new users
247 :param create_repo_group: Defines if the method should also
247 :param create_repo_group: Defines if the method should also
248 create an repo group with user name, and owner
248 create an repo group with user name, and owner
249 :param updating_user_id: if we set it up this is the user we want to
249 :param updating_user_id: if we set it up this is the user we want to
250 update this allows to editing username.
250 update this allows to editing username.
251 :param language: language of user from interface.
251 :param language: language of user from interface.
252
252
253 :returns: new User object with injected `is_new_user` attribute.
253 :returns: new User object with injected `is_new_user` attribute.
254 """
254 """
255
255
256 if not cur_user:
256 if not cur_user:
257 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
257 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
258
258
259 from rhodecode.lib.auth import (
259 from rhodecode.lib.auth import (
260 get_crypt_password, check_password, generate_auth_token)
260 get_crypt_password, check_password, generate_auth_token)
261 from rhodecode.lib.hooks_base import (
261 from rhodecode.lib.hooks_base import (
262 log_create_user, check_allowed_create_user)
262 log_create_user, check_allowed_create_user)
263
263
264 def _password_change(new_user, password):
264 def _password_change(new_user, password):
265 old_password = new_user.password or ''
265 old_password = new_user.password or ''
266 # empty password
266 # empty password
267 if not old_password:
267 if not old_password:
268 return False
268 return False
269
269
270 # password check is only needed for RhodeCode internal auth calls
270 # password check is only needed for RhodeCode internal auth calls
271 # in case it's a plugin we don't care
271 # in case it's a plugin we don't care
272 if not plugin:
272 if not plugin:
273
273
274 # first check if we gave crypted password back, and if it
274 # first check if we gave crypted password back, and if it
275 # matches it's not password change
275 # matches it's not password change
276 if new_user.password == password:
276 if new_user.password == password:
277 return False
277 return False
278
278
279 password_match = check_password(password, old_password)
279 password_match = check_password(password, old_password)
280 if not password_match:
280 if not password_match:
281 return True
281 return True
282
282
283 return False
283 return False
284
284
285 # read settings on default personal repo group creation
285 # read settings on default personal repo group creation
286 if create_repo_group is None:
286 if create_repo_group is None:
287 default_create_repo_group = RepoGroupModel()\
287 default_create_repo_group = RepoGroupModel()\
288 .get_default_create_personal_repo_group()
288 .get_default_create_personal_repo_group()
289 create_repo_group = default_create_repo_group
289 create_repo_group = default_create_repo_group
290
290
291 user_data = {
291 user_data = {
292 'username': username,
292 'username': username,
293 'password': password,
293 'password': password,
294 'email': email,
294 'email': email,
295 'firstname': firstname,
295 'firstname': firstname,
296 'lastname': lastname,
296 'lastname': lastname,
297 'active': active,
297 'active': active,
298 'admin': admin
298 'admin': admin
299 }
299 }
300
300
301 if updating_user_id:
301 if updating_user_id:
302 log.debug('Checking for existing account in RhodeCode '
302 log.debug('Checking for existing account in RhodeCode '
303 'database with user_id `%s` ', updating_user_id)
303 'database with user_id `%s` ', updating_user_id)
304 user = User.get(updating_user_id)
304 user = User.get(updating_user_id)
305 else:
305 else:
306 log.debug('Checking for existing account in RhodeCode '
306 log.debug('Checking for existing account in RhodeCode '
307 'database with username `%s` ', username)
307 'database with username `%s` ', username)
308 user = User.get_by_username(username, case_insensitive=True)
308 user = User.get_by_username(username, case_insensitive=True)
309
309
310 if user is None:
310 if user is None:
311 # we check internal flag if this method is actually allowed to
311 # we check internal flag if this method is actually allowed to
312 # create new user
312 # create new user
313 if not allow_to_create_user:
313 if not allow_to_create_user:
314 msg = ('Method wants to create new user, but it is not '
314 msg = ('Method wants to create new user, but it is not '
315 'allowed to do so')
315 'allowed to do so')
316 log.warning(msg)
316 log.warning(msg)
317 raise NotAllowedToCreateUserError(msg)
317 raise NotAllowedToCreateUserError(msg)
318
318
319 log.debug('Creating new user %s', username)
319 log.debug('Creating new user %s', username)
320
320
321 # only if we create user that is active
321 # only if we create user that is active
322 new_active_user = active
322 new_active_user = active
323 if new_active_user and strict_creation_check:
323 if new_active_user and strict_creation_check:
324 # raises UserCreationError if it's not allowed for any reason to
324 # raises UserCreationError if it's not allowed for any reason to
325 # create new active user, this also executes pre-create hooks
325 # create new active user, this also executes pre-create hooks
326 check_allowed_create_user(user_data, cur_user, strict_check=True)
326 check_allowed_create_user(user_data, cur_user, strict_check=True)
327 events.trigger(events.UserPreCreate(user_data))
327 events.trigger(events.UserPreCreate(user_data))
328 new_user = User()
328 new_user = User()
329 edit = False
329 edit = False
330 else:
330 else:
331 log.debug('updating user `%s`', username)
331 log.debug('updating user `%s`', username)
332 events.trigger(events.UserPreUpdate(user, user_data))
332 events.trigger(events.UserPreUpdate(user, user_data))
333 new_user = user
333 new_user = user
334 edit = True
334 edit = True
335
335
336 # we're not allowed to edit default user
336 # we're not allowed to edit default user
337 if user.username == User.DEFAULT_USER:
337 if user.username == User.DEFAULT_USER:
338 raise DefaultUserException(
338 raise DefaultUserException(
339 "You can't edit this user (`%(username)s`) since it's "
339 "You can't edit this user (`%(username)s`) since it's "
340 "crucial for entire application"
340 "crucial for entire application"
341 % {'username': user.username})
341 % {'username': user.username})
342
342
343 # inject special attribute that will tell us if User is new or old
343 # inject special attribute that will tell us if User is new or old
344 new_user.is_new_user = not edit
344 new_user.is_new_user = not edit
345 # for users that didn's specify auth type, we use RhodeCode built in
345 # for users that didn's specify auth type, we use RhodeCode built in
346 from rhodecode.authentication.plugins import auth_rhodecode
346 from rhodecode.authentication.plugins import auth_rhodecode
347 extern_name = extern_name or auth_rhodecode.RhodeCodeAuthPlugin.uid
347 extern_name = extern_name or auth_rhodecode.RhodeCodeAuthPlugin.uid
348 extern_type = extern_type or auth_rhodecode.RhodeCodeAuthPlugin.uid
348 extern_type = extern_type or auth_rhodecode.RhodeCodeAuthPlugin.uid
349
349
350 try:
350 try:
351 new_user.username = username
351 new_user.username = username
352 new_user.admin = admin
352 new_user.admin = admin
353 new_user.email = email
353 new_user.email = email
354 new_user.active = active
354 new_user.active = active
355 new_user.extern_name = safe_unicode(extern_name)
355 new_user.extern_name = safe_unicode(extern_name)
356 new_user.extern_type = safe_unicode(extern_type)
356 new_user.extern_type = safe_unicode(extern_type)
357 new_user.name = firstname
357 new_user.name = firstname
358 new_user.lastname = lastname
358 new_user.lastname = lastname
359
359
360 # set password only if creating an user or password is changed
360 # set password only if creating an user or password is changed
361 if not edit or _password_change(new_user, password):
361 if not edit or _password_change(new_user, password):
362 reason = 'new password' if edit else 'new user'
362 reason = 'new password' if edit else 'new user'
363 log.debug('Updating password reason=>%s', reason)
363 log.debug('Updating password reason=>%s', reason)
364 new_user.password = get_crypt_password(password) if password else None
364 new_user.password = get_crypt_password(password) if password else None
365
365
366 if force_password_change:
366 if force_password_change:
367 new_user.update_userdata(force_password_change=True)
367 new_user.update_userdata(force_password_change=True)
368 if language:
368 if language:
369 new_user.update_userdata(language=language)
369 new_user.update_userdata(language=language)
370 new_user.update_userdata(notification_status=True)
370 new_user.update_userdata(notification_status=True)
371
371
372 self.sa.add(new_user)
372 self.sa.add(new_user)
373
373
374 if not edit and create_repo_group:
374 if not edit and create_repo_group:
375 RepoGroupModel().create_personal_repo_group(
375 RepoGroupModel().create_personal_repo_group(
376 new_user, commit_early=False)
376 new_user, commit_early=False)
377
377
378 if not edit:
378 if not edit:
379 # add the RSS token
379 # add the RSS token
380 self.add_auth_token(
380 self.add_auth_token(
381 user=username, lifetime_minutes=-1,
381 user=username, lifetime_minutes=-1,
382 role=self.auth_token_role.ROLE_FEED,
382 role=self.auth_token_role.ROLE_FEED,
383 description=u'Generated feed token')
383 description=u'Generated feed token')
384
384
385 kwargs = new_user.get_dict()
385 kwargs = new_user.get_dict()
386 # backward compat, require api_keys present
386 # backward compat, require api_keys present
387 kwargs['api_keys'] = kwargs['auth_tokens']
387 kwargs['api_keys'] = kwargs['auth_tokens']
388 log_create_user(created_by=cur_user, **kwargs)
388 log_create_user(created_by=cur_user, **kwargs)
389 events.trigger(events.UserPostCreate(user_data))
389 events.trigger(events.UserPostCreate(user_data))
390 return new_user
390 return new_user
391 except (DatabaseError,):
391 except (DatabaseError,):
392 log.error(traceback.format_exc())
392 log.error(traceback.format_exc())
393 raise
393 raise
394
394
395 def create_registration(self, form_data,
395 def create_registration(self, form_data,
396 extern_name='rhodecode', extern_type='rhodecode'):
396 extern_name='rhodecode', extern_type='rhodecode'):
397 from rhodecode.model.notification import NotificationModel
397 from rhodecode.model.notification import NotificationModel
398 from rhodecode.model.notification import EmailNotificationModel
398 from rhodecode.model.notification import EmailNotificationModel
399
399
400 try:
400 try:
401 form_data['admin'] = False
401 form_data['admin'] = False
402 form_data['extern_name'] = extern_name
402 form_data['extern_name'] = extern_name
403 form_data['extern_type'] = extern_type
403 form_data['extern_type'] = extern_type
404 new_user = self.create(form_data)
404 new_user = self.create(form_data)
405
405
406 self.sa.add(new_user)
406 self.sa.add(new_user)
407 self.sa.flush()
407 self.sa.flush()
408
408
409 user_data = new_user.get_dict()
409 user_data = new_user.get_dict()
410 kwargs = {
410 kwargs = {
411 # use SQLALCHEMY safe dump of user data
411 # use SQLALCHEMY safe dump of user data
412 'user': AttributeDict(user_data),
412 'user': AttributeDict(user_data),
413 'date': datetime.datetime.now()
413 'date': datetime.datetime.now()
414 }
414 }
415 notification_type = EmailNotificationModel.TYPE_REGISTRATION
415 notification_type = EmailNotificationModel.TYPE_REGISTRATION
416 # pre-generate the subject for notification itself
416 # pre-generate the subject for notification itself
417 (subject,
417 (subject,
418 _h, _e, # we don't care about those
418 _h, _e, # we don't care about those
419 body_plaintext) = EmailNotificationModel().render_email(
419 body_plaintext) = EmailNotificationModel().render_email(
420 notification_type, **kwargs)
420 notification_type, **kwargs)
421
421
422 # create notification objects, and emails
422 # create notification objects, and emails
423 NotificationModel().create(
423 NotificationModel().create(
424 created_by=new_user,
424 created_by=new_user,
425 notification_subject=subject,
425 notification_subject=subject,
426 notification_body=body_plaintext,
426 notification_body=body_plaintext,
427 notification_type=notification_type,
427 notification_type=notification_type,
428 recipients=None, # all admins
428 recipients=None, # all admins
429 email_kwargs=kwargs,
429 email_kwargs=kwargs,
430 )
430 )
431
431
432 return new_user
432 return new_user
433 except Exception:
433 except Exception:
434 log.error(traceback.format_exc())
434 log.error(traceback.format_exc())
435 raise
435 raise
436
436
437 def _handle_user_repos(self, username, repositories, handle_mode=None):
437 def _handle_user_repos(self, username, repositories, handle_mode=None):
438 _superadmin = self.cls.get_first_super_admin()
438 _superadmin = self.cls.get_first_super_admin()
439 left_overs = True
439 left_overs = True
440
440
441 from rhodecode.model.repo import RepoModel
441 from rhodecode.model.repo import RepoModel
442
442
443 if handle_mode == 'detach':
443 if handle_mode == 'detach':
444 for obj in repositories:
444 for obj in repositories:
445 obj.user = _superadmin
445 obj.user = _superadmin
446 # set description we know why we super admin now owns
446 # set description we know why we super admin now owns
447 # additional repositories that were orphaned !
447 # additional repositories that were orphaned !
448 obj.description += ' \n::detached repository from deleted user: %s' % (username,)
448 obj.description += ' \n::detached repository from deleted user: %s' % (username,)
449 self.sa.add(obj)
449 self.sa.add(obj)
450 left_overs = False
450 left_overs = False
451 elif handle_mode == 'delete':
451 elif handle_mode == 'delete':
452 for obj in repositories:
452 for obj in repositories:
453 RepoModel().delete(obj, forks='detach')
453 RepoModel().delete(obj, forks='detach')
454 left_overs = False
454 left_overs = False
455
455
456 # if nothing is done we have left overs left
456 # if nothing is done we have left overs left
457 return left_overs
457 return left_overs
458
458
459 def _handle_user_repo_groups(self, username, repository_groups,
459 def _handle_user_repo_groups(self, username, repository_groups,
460 handle_mode=None):
460 handle_mode=None):
461 _superadmin = self.cls.get_first_super_admin()
461 _superadmin = self.cls.get_first_super_admin()
462 left_overs = True
462 left_overs = True
463
463
464 from rhodecode.model.repo_group import RepoGroupModel
464 from rhodecode.model.repo_group import RepoGroupModel
465
465
466 if handle_mode == 'detach':
466 if handle_mode == 'detach':
467 for r in repository_groups:
467 for r in repository_groups:
468 r.user = _superadmin
468 r.user = _superadmin
469 # set description we know why we super admin now owns
469 # set description we know why we super admin now owns
470 # additional repositories that were orphaned !
470 # additional repositories that were orphaned !
471 r.group_description += ' \n::detached repository group from deleted user: %s' % (username,)
471 r.group_description += ' \n::detached repository group from deleted user: %s' % (username,)
472 r.personal = False
472 r.personal = False
473 self.sa.add(r)
473 self.sa.add(r)
474 left_overs = False
474 left_overs = False
475 elif handle_mode == 'delete':
475 elif handle_mode == 'delete':
476 for r in repository_groups:
476 for r in repository_groups:
477 RepoGroupModel().delete(r)
477 RepoGroupModel().delete(r)
478 left_overs = False
478 left_overs = False
479
479
480 # if nothing is done we have left overs left
480 # if nothing is done we have left overs left
481 return left_overs
481 return left_overs
482
482
483 def _handle_user_user_groups(self, username, user_groups, handle_mode=None):
483 def _handle_user_user_groups(self, username, user_groups, handle_mode=None):
484 _superadmin = self.cls.get_first_super_admin()
484 _superadmin = self.cls.get_first_super_admin()
485 left_overs = True
485 left_overs = True
486
486
487 from rhodecode.model.user_group import UserGroupModel
487 from rhodecode.model.user_group import UserGroupModel
488
488
489 if handle_mode == 'detach':
489 if handle_mode == 'detach':
490 for r in user_groups:
490 for r in user_groups:
491 for user_user_group_to_perm in r.user_user_group_to_perm:
491 for user_user_group_to_perm in r.user_user_group_to_perm:
492 if user_user_group_to_perm.user.username == username:
492 if user_user_group_to_perm.user.username == username:
493 user_user_group_to_perm.user = _superadmin
493 user_user_group_to_perm.user = _superadmin
494 r.user = _superadmin
494 r.user = _superadmin
495 # set description we know why we super admin now owns
495 # set description we know why we super admin now owns
496 # additional repositories that were orphaned !
496 # additional repositories that were orphaned !
497 r.user_group_description += ' \n::detached user group from deleted user: %s' % (username,)
497 r.user_group_description += ' \n::detached user group from deleted user: %s' % (username,)
498 self.sa.add(r)
498 self.sa.add(r)
499 left_overs = False
499 left_overs = False
500 elif handle_mode == 'delete':
500 elif handle_mode == 'delete':
501 for r in user_groups:
501 for r in user_groups:
502 UserGroupModel().delete(r)
502 UserGroupModel().delete(r)
503 left_overs = False
503 left_overs = False
504
504
505 # if nothing is done we have left overs left
505 # if nothing is done we have left overs left
506 return left_overs
506 return left_overs
507
507
508 def delete(self, user, cur_user=None, handle_repos=None,
508 def delete(self, user, cur_user=None, handle_repos=None,
509 handle_repo_groups=None, handle_user_groups=None):
509 handle_repo_groups=None, handle_user_groups=None):
510 from rhodecode.lib.hooks_base import log_delete_user
510 from rhodecode.lib.hooks_base import log_delete_user
511
511
512 if not cur_user:
512 if not cur_user:
513 cur_user = getattr(
513 cur_user = getattr(get_current_rhodecode_user(), 'username', None)
514 get_current_rhodecode_user(), 'username', None)
515 user = self._get_user(user)
514 user = self._get_user(user)
516
515
517 try:
516 try:
518 if user.username == User.DEFAULT_USER:
517 if user.username == User.DEFAULT_USER:
519 raise DefaultUserException(
518 raise DefaultUserException(
520 u"You can't remove this user since it's"
519 u"You can't remove this user since it's"
521 u" crucial for entire application")
520 u" crucial for entire application")
522
521
523 left_overs = self._handle_user_repos(
522 left_overs = self._handle_user_repos(
524 user.username, user.repositories, handle_repos)
523 user.username, user.repositories, handle_repos)
525 if left_overs and user.repositories:
524 if left_overs and user.repositories:
526 repos = [x.repo_name for x in user.repositories]
525 repos = [x.repo_name for x in user.repositories]
527 raise UserOwnsReposException(
526 raise UserOwnsReposException(
528 u'user "%(username)s" still owns %(len_repos)s repositories and cannot be '
527 u'user "%(username)s" still owns %(len_repos)s repositories and cannot be '
529 u'removed. Switch owners or remove those repositories:%(list_repos)s'
528 u'removed. Switch owners or remove those repositories:%(list_repos)s'
530 % {'username': user.username, 'len_repos': len(repos),
529 % {'username': user.username, 'len_repos': len(repos),
531 'list_repos': ', '.join(repos)})
530 'list_repos': ', '.join(repos)})
532
531
533 left_overs = self._handle_user_repo_groups(
532 left_overs = self._handle_user_repo_groups(
534 user.username, user.repository_groups, handle_repo_groups)
533 user.username, user.repository_groups, handle_repo_groups)
535 if left_overs and user.repository_groups:
534 if left_overs and user.repository_groups:
536 repo_groups = [x.group_name for x in user.repository_groups]
535 repo_groups = [x.group_name for x in user.repository_groups]
537 raise UserOwnsRepoGroupsException(
536 raise UserOwnsRepoGroupsException(
538 u'user "%(username)s" still owns %(len_repo_groups)s repository groups and cannot be '
537 u'user "%(username)s" still owns %(len_repo_groups)s repository groups and cannot be '
539 u'removed. Switch owners or remove those repository groups:%(list_repo_groups)s'
538 u'removed. Switch owners or remove those repository groups:%(list_repo_groups)s'
540 % {'username': user.username, 'len_repo_groups': len(repo_groups),
539 % {'username': user.username, 'len_repo_groups': len(repo_groups),
541 'list_repo_groups': ', '.join(repo_groups)})
540 'list_repo_groups': ', '.join(repo_groups)})
542
541
543 left_overs = self._handle_user_user_groups(
542 left_overs = self._handle_user_user_groups(
544 user.username, user.user_groups, handle_user_groups)
543 user.username, user.user_groups, handle_user_groups)
545 if left_overs and user.user_groups:
544 if left_overs and user.user_groups:
546 user_groups = [x.users_group_name for x in user.user_groups]
545 user_groups = [x.users_group_name for x in user.user_groups]
547 raise UserOwnsUserGroupsException(
546 raise UserOwnsUserGroupsException(
548 u'user "%s" still owns %s user groups and cannot be '
547 u'user "%s" still owns %s user groups and cannot be '
549 u'removed. Switch owners or remove those user groups:%s'
548 u'removed. Switch owners or remove those user groups:%s'
550 % (user.username, len(user_groups), ', '.join(user_groups)))
549 % (user.username, len(user_groups), ', '.join(user_groups)))
551
550
552 user_data = user.get_dict() # fetch user data before expire
551 user_data = user.get_dict() # fetch user data before expire
553
552
554 # we might change the user data with detach/delete, make sure
553 # we might change the user data with detach/delete, make sure
555 # the object is marked as expired before actually deleting !
554 # the object is marked as expired before actually deleting !
556 self.sa.expire(user)
555 self.sa.expire(user)
557 self.sa.delete(user)
556 self.sa.delete(user)
558
557
559 log_delete_user(deleted_by=cur_user, **user_data)
558 log_delete_user(deleted_by=cur_user, **user_data)
560 except Exception:
559 except Exception:
561 log.error(traceback.format_exc())
560 log.error(traceback.format_exc())
562 raise
561 raise
563
562
564 def reset_password_link(self, data, pwd_reset_url):
563 def reset_password_link(self, data, pwd_reset_url):
565 from rhodecode.lib.celerylib import tasks, run_task
564 from rhodecode.lib.celerylib import tasks, run_task
566 from rhodecode.model.notification import EmailNotificationModel
565 from rhodecode.model.notification import EmailNotificationModel
567 user_email = data['email']
566 user_email = data['email']
568 try:
567 try:
569 user = User.get_by_email(user_email)
568 user = User.get_by_email(user_email)
570 if user:
569 if user:
571 log.debug('password reset user found %s', user)
570 log.debug('password reset user found %s', user)
572
571
573 email_kwargs = {
572 email_kwargs = {
574 'password_reset_url': pwd_reset_url,
573 'password_reset_url': pwd_reset_url,
575 'user': user,
574 'user': user,
576 'email': user_email,
575 'email': user_email,
577 'date': datetime.datetime.now()
576 'date': datetime.datetime.now()
578 }
577 }
579
578
580 (subject, headers, email_body,
579 (subject, headers, email_body,
581 email_body_plaintext) = EmailNotificationModel().render_email(
580 email_body_plaintext) = EmailNotificationModel().render_email(
582 EmailNotificationModel.TYPE_PASSWORD_RESET, **email_kwargs)
581 EmailNotificationModel.TYPE_PASSWORD_RESET, **email_kwargs)
583
582
584 recipients = [user_email]
583 recipients = [user_email]
585
584
586 action_logger_generic(
585 action_logger_generic(
587 'sending password reset email to user: {}'.format(
586 'sending password reset email to user: {}'.format(
588 user), namespace='security.password_reset')
587 user), namespace='security.password_reset')
589
588
590 run_task(tasks.send_email, recipients, subject,
589 run_task(tasks.send_email, recipients, subject,
591 email_body_plaintext, email_body)
590 email_body_plaintext, email_body)
592
591
593 else:
592 else:
594 log.debug("password reset email %s not found", user_email)
593 log.debug("password reset email %s not found", user_email)
595 except Exception:
594 except Exception:
596 log.error(traceback.format_exc())
595 log.error(traceback.format_exc())
597 return False
596 return False
598
597
599 return True
598 return True
600
599
601 def reset_password(self, data):
600 def reset_password(self, data):
602 from rhodecode.lib.celerylib import tasks, run_task
601 from rhodecode.lib.celerylib import tasks, run_task
603 from rhodecode.model.notification import EmailNotificationModel
602 from rhodecode.model.notification import EmailNotificationModel
604 from rhodecode.lib import auth
603 from rhodecode.lib import auth
605 user_email = data['email']
604 user_email = data['email']
606 pre_db = True
605 pre_db = True
607 try:
606 try:
608 user = User.get_by_email(user_email)
607 user = User.get_by_email(user_email)
609 new_passwd = auth.PasswordGenerator().gen_password(
608 new_passwd = auth.PasswordGenerator().gen_password(
610 12, auth.PasswordGenerator.ALPHABETS_BIG_SMALL)
609 12, auth.PasswordGenerator.ALPHABETS_BIG_SMALL)
611 if user:
610 if user:
612 user.password = auth.get_crypt_password(new_passwd)
611 user.password = auth.get_crypt_password(new_passwd)
613 # also force this user to reset his password !
612 # also force this user to reset his password !
614 user.update_userdata(force_password_change=True)
613 user.update_userdata(force_password_change=True)
615
614
616 Session().add(user)
615 Session().add(user)
617
616
618 # now delete the token in question
617 # now delete the token in question
619 UserApiKeys = AuthTokenModel.cls
618 UserApiKeys = AuthTokenModel.cls
620 UserApiKeys().query().filter(
619 UserApiKeys().query().filter(
621 UserApiKeys.api_key == data['token']).delete()
620 UserApiKeys.api_key == data['token']).delete()
622
621
623 Session().commit()
622 Session().commit()
624 log.info('successfully reset password for `%s`', user_email)
623 log.info('successfully reset password for `%s`', user_email)
625
624
626 if new_passwd is None:
625 if new_passwd is None:
627 raise Exception('unable to generate new password')
626 raise Exception('unable to generate new password')
628
627
629 pre_db = False
628 pre_db = False
630
629
631 email_kwargs = {
630 email_kwargs = {
632 'new_password': new_passwd,
631 'new_password': new_passwd,
633 'user': user,
632 'user': user,
634 'email': user_email,
633 'email': user_email,
635 'date': datetime.datetime.now()
634 'date': datetime.datetime.now()
636 }
635 }
637
636
638 (subject, headers, email_body,
637 (subject, headers, email_body,
639 email_body_plaintext) = EmailNotificationModel().render_email(
638 email_body_plaintext) = EmailNotificationModel().render_email(
640 EmailNotificationModel.TYPE_PASSWORD_RESET_CONFIRMATION,
639 EmailNotificationModel.TYPE_PASSWORD_RESET_CONFIRMATION,
641 **email_kwargs)
640 **email_kwargs)
642
641
643 recipients = [user_email]
642 recipients = [user_email]
644
643
645 action_logger_generic(
644 action_logger_generic(
646 'sent new password to user: {} with email: {}'.format(
645 'sent new password to user: {} with email: {}'.format(
647 user, user_email), namespace='security.password_reset')
646 user, user_email), namespace='security.password_reset')
648
647
649 run_task(tasks.send_email, recipients, subject,
648 run_task(tasks.send_email, recipients, subject,
650 email_body_plaintext, email_body)
649 email_body_plaintext, email_body)
651
650
652 except Exception:
651 except Exception:
653 log.error('Failed to update user password')
652 log.error('Failed to update user password')
654 log.error(traceback.format_exc())
653 log.error(traceback.format_exc())
655 if pre_db:
654 if pre_db:
656 # we rollback only if local db stuff fails. If it goes into
655 # we rollback only if local db stuff fails. If it goes into
657 # run_task, we're pass rollback state this wouldn't work then
656 # run_task, we're pass rollback state this wouldn't work then
658 Session().rollback()
657 Session().rollback()
659
658
660 return True
659 return True
661
660
662 def fill_data(self, auth_user, user_id=None, api_key=None, username=None):
661 def fill_data(self, auth_user, user_id=None, api_key=None, username=None):
663 """
662 """
664 Fetches auth_user by user_id,or api_key if present.
663 Fetches auth_user by user_id,or api_key if present.
665 Fills auth_user attributes with those taken from database.
664 Fills auth_user attributes with those taken from database.
666 Additionally set's is_authenitated if lookup fails
665 Additionally set's is_authenitated if lookup fails
667 present in database
666 present in database
668
667
669 :param auth_user: instance of user to set attributes
668 :param auth_user: instance of user to set attributes
670 :param user_id: user id to fetch by
669 :param user_id: user id to fetch by
671 :param api_key: api key to fetch by
670 :param api_key: api key to fetch by
672 :param username: username to fetch by
671 :param username: username to fetch by
673 """
672 """
674 def token_obfuscate(token):
673 def token_obfuscate(token):
675 if token:
674 if token:
676 return token[:4] + "****"
675 return token[:4] + "****"
677
676
678 if user_id is None and api_key is None and username is None:
677 if user_id is None and api_key is None and username is None:
679 raise Exception('You need to pass user_id, api_key or username')
678 raise Exception('You need to pass user_id, api_key or username')
680
679
681 log.debug(
680 log.debug(
682 'AuthUser: fill data execution based on: '
681 'AuthUser: fill data execution based on: '
683 'user_id:%s api_key:%s username:%s', user_id, api_key, username)
682 'user_id:%s api_key:%s username:%s', user_id, api_key, username)
684 try:
683 try:
685 dbuser = None
684 dbuser = None
686 if user_id:
685 if user_id:
687 dbuser = self.get(user_id)
686 dbuser = self.get(user_id)
688 elif api_key:
687 elif api_key:
689 dbuser = self.get_by_auth_token(api_key)
688 dbuser = self.get_by_auth_token(api_key)
690 elif username:
689 elif username:
691 dbuser = self.get_by_username(username)
690 dbuser = self.get_by_username(username)
692
691
693 if not dbuser:
692 if not dbuser:
694 log.warning(
693 log.warning(
695 'Unable to lookup user by id:%s api_key:%s username:%s',
694 'Unable to lookup user by id:%s api_key:%s username:%s',
696 user_id, token_obfuscate(api_key), username)
695 user_id, token_obfuscate(api_key), username)
697 return False
696 return False
698 if not dbuser.active:
697 if not dbuser.active:
699 log.debug('User `%s:%s` is inactive, skipping fill data',
698 log.debug('User `%s:%s` is inactive, skipping fill data',
700 username, user_id)
699 username, user_id)
701 return False
700 return False
702
701
703 log.debug('AuthUser: filling found user:%s data', dbuser)
702 log.debug('AuthUser: filling found user:%s data', dbuser)
704 user_data = dbuser.get_dict()
703 user_data = dbuser.get_dict()
705
704
706 user_data.update({
705 user_data.update({
707 # set explicit the safe escaped values
706 # set explicit the safe escaped values
708 'first_name': dbuser.first_name,
707 'first_name': dbuser.first_name,
709 'last_name': dbuser.last_name,
708 'last_name': dbuser.last_name,
710 })
709 })
711
710
712 for k, v in user_data.items():
711 for k, v in user_data.items():
713 # properties of auth user we dont update
712 # properties of auth user we dont update
714 if k not in ['auth_tokens', 'permissions']:
713 if k not in ['auth_tokens', 'permissions']:
715 setattr(auth_user, k, v)
714 setattr(auth_user, k, v)
716
715
717 except Exception:
716 except Exception:
718 log.error(traceback.format_exc())
717 log.error(traceback.format_exc())
719 auth_user.is_authenticated = False
718 auth_user.is_authenticated = False
720 return False
719 return False
721
720
722 return True
721 return True
723
722
724 def has_perm(self, user, perm):
723 def has_perm(self, user, perm):
725 perm = self._get_perm(perm)
724 perm = self._get_perm(perm)
726 user = self._get_user(user)
725 user = self._get_user(user)
727
726
728 return UserToPerm.query().filter(UserToPerm.user == user)\
727 return UserToPerm.query().filter(UserToPerm.user == user)\
729 .filter(UserToPerm.permission == perm).scalar() is not None
728 .filter(UserToPerm.permission == perm).scalar() is not None
730
729
731 def grant_perm(self, user, perm):
730 def grant_perm(self, user, perm):
732 """
731 """
733 Grant user global permissions
732 Grant user global permissions
734
733
735 :param user:
734 :param user:
736 :param perm:
735 :param perm:
737 """
736 """
738 user = self._get_user(user)
737 user = self._get_user(user)
739 perm = self._get_perm(perm)
738 perm = self._get_perm(perm)
740 # if this permission is already granted skip it
739 # if this permission is already granted skip it
741 _perm = UserToPerm.query()\
740 _perm = UserToPerm.query()\
742 .filter(UserToPerm.user == user)\
741 .filter(UserToPerm.user == user)\
743 .filter(UserToPerm.permission == perm)\
742 .filter(UserToPerm.permission == perm)\
744 .scalar()
743 .scalar()
745 if _perm:
744 if _perm:
746 return
745 return
747 new = UserToPerm()
746 new = UserToPerm()
748 new.user = user
747 new.user = user
749 new.permission = perm
748 new.permission = perm
750 self.sa.add(new)
749 self.sa.add(new)
751 return new
750 return new
752
751
753 def revoke_perm(self, user, perm):
752 def revoke_perm(self, user, perm):
754 """
753 """
755 Revoke users global permissions
754 Revoke users global permissions
756
755
757 :param user:
756 :param user:
758 :param perm:
757 :param perm:
759 """
758 """
760 user = self._get_user(user)
759 user = self._get_user(user)
761 perm = self._get_perm(perm)
760 perm = self._get_perm(perm)
762
761
763 obj = UserToPerm.query()\
762 obj = UserToPerm.query()\
764 .filter(UserToPerm.user == user)\
763 .filter(UserToPerm.user == user)\
765 .filter(UserToPerm.permission == perm)\
764 .filter(UserToPerm.permission == perm)\
766 .scalar()
765 .scalar()
767 if obj:
766 if obj:
768 self.sa.delete(obj)
767 self.sa.delete(obj)
769
768
770 def add_extra_email(self, user, email):
769 def add_extra_email(self, user, email):
771 """
770 """
772 Adds email address to UserEmailMap
771 Adds email address to UserEmailMap
773
772
774 :param user:
773 :param user:
775 :param email:
774 :param email:
776 """
775 """
777
776
778 user = self._get_user(user)
777 user = self._get_user(user)
779
778
780 obj = UserEmailMap()
779 obj = UserEmailMap()
781 obj.user = user
780 obj.user = user
782 obj.email = email
781 obj.email = email
783 self.sa.add(obj)
782 self.sa.add(obj)
784 return obj
783 return obj
785
784
786 def delete_extra_email(self, user, email_id):
785 def delete_extra_email(self, user, email_id):
787 """
786 """
788 Removes email address from UserEmailMap
787 Removes email address from UserEmailMap
789
788
790 :param user:
789 :param user:
791 :param email_id:
790 :param email_id:
792 """
791 """
793 user = self._get_user(user)
792 user = self._get_user(user)
794 obj = UserEmailMap.query().get(email_id)
793 obj = UserEmailMap.query().get(email_id)
795 if obj and obj.user_id == user.user_id:
794 if obj and obj.user_id == user.user_id:
796 self.sa.delete(obj)
795 self.sa.delete(obj)
797
796
798 def parse_ip_range(self, ip_range):
797 def parse_ip_range(self, ip_range):
799 ip_list = []
798 ip_list = []
800
799
801 def make_unique(value):
800 def make_unique(value):
802 seen = []
801 seen = []
803 return [c for c in value if not (c in seen or seen.append(c))]
802 return [c for c in value if not (c in seen or seen.append(c))]
804
803
805 # firsts split by commas
804 # firsts split by commas
806 for ip_range in ip_range.split(','):
805 for ip_range in ip_range.split(','):
807 if not ip_range:
806 if not ip_range:
808 continue
807 continue
809 ip_range = ip_range.strip()
808 ip_range = ip_range.strip()
810 if '-' in ip_range:
809 if '-' in ip_range:
811 start_ip, end_ip = ip_range.split('-', 1)
810 start_ip, end_ip = ip_range.split('-', 1)
812 start_ip = ipaddress.ip_address(safe_unicode(start_ip.strip()))
811 start_ip = ipaddress.ip_address(safe_unicode(start_ip.strip()))
813 end_ip = ipaddress.ip_address(safe_unicode(end_ip.strip()))
812 end_ip = ipaddress.ip_address(safe_unicode(end_ip.strip()))
814 parsed_ip_range = []
813 parsed_ip_range = []
815
814
816 for index in xrange(int(start_ip), int(end_ip) + 1):
815 for index in xrange(int(start_ip), int(end_ip) + 1):
817 new_ip = ipaddress.ip_address(index)
816 new_ip = ipaddress.ip_address(index)
818 parsed_ip_range.append(str(new_ip))
817 parsed_ip_range.append(str(new_ip))
819 ip_list.extend(parsed_ip_range)
818 ip_list.extend(parsed_ip_range)
820 else:
819 else:
821 ip_list.append(ip_range)
820 ip_list.append(ip_range)
822
821
823 return make_unique(ip_list)
822 return make_unique(ip_list)
824
823
825 def add_extra_ip(self, user, ip, description=None):
824 def add_extra_ip(self, user, ip, description=None):
826 """
825 """
827 Adds ip address to UserIpMap
826 Adds ip address to UserIpMap
828
827
829 :param user:
828 :param user:
830 :param ip:
829 :param ip:
831 """
830 """
832
831
833 user = self._get_user(user)
832 user = self._get_user(user)
834 obj = UserIpMap()
833 obj = UserIpMap()
835 obj.user = user
834 obj.user = user
836 obj.ip_addr = ip
835 obj.ip_addr = ip
837 obj.description = description
836 obj.description = description
838 self.sa.add(obj)
837 self.sa.add(obj)
839 return obj
838 return obj
840
839
841 auth_token_role = AuthTokenModel.cls
840 auth_token_role = AuthTokenModel.cls
842
841
843 def add_auth_token(self, user, lifetime_minutes, role, description=u'',
842 def add_auth_token(self, user, lifetime_minutes, role, description=u'',
844 scope_callback=None):
843 scope_callback=None):
845 """
844 """
846 Add AuthToken for user.
845 Add AuthToken for user.
847
846
848 :param user: username/user_id
847 :param user: username/user_id
849 :param lifetime_minutes: in minutes the lifetime for token, -1 equals no limit
848 :param lifetime_minutes: in minutes the lifetime for token, -1 equals no limit
850 :param role: one of AuthTokenModel.cls.ROLE_*
849 :param role: one of AuthTokenModel.cls.ROLE_*
851 :param description: optional string description
850 :param description: optional string description
852 """
851 """
853
852
854 token = AuthTokenModel().create(
853 token = AuthTokenModel().create(
855 user, description, lifetime_minutes, role)
854 user, description, lifetime_minutes, role)
856 if scope_callback and callable(scope_callback):
855 if scope_callback and callable(scope_callback):
857 # call the callback if we provide, used to attach scope for EE edition
856 # call the callback if we provide, used to attach scope for EE edition
858 scope_callback(token)
857 scope_callback(token)
859 return token
858 return token
860
859
861 def delete_extra_ip(self, user, ip_id):
860 def delete_extra_ip(self, user, ip_id):
862 """
861 """
863 Removes ip address from UserIpMap
862 Removes ip address from UserIpMap
864
863
865 :param user:
864 :param user:
866 :param ip_id:
865 :param ip_id:
867 """
866 """
868 user = self._get_user(user)
867 user = self._get_user(user)
869 obj = UserIpMap.query().get(ip_id)
868 obj = UserIpMap.query().get(ip_id)
870 if obj and obj.user_id == user.user_id:
869 if obj and obj.user_id == user.user_id:
871 self.sa.delete(obj)
870 self.sa.delete(obj)
872
871
873 def get_accounts_in_creation_order(self, current_user=None):
872 def get_accounts_in_creation_order(self, current_user=None):
874 """
873 """
875 Get accounts in order of creation for deactivation for license limits
874 Get accounts in order of creation for deactivation for license limits
876
875
877 pick currently logged in user, and append to the list in position 0
876 pick currently logged in user, and append to the list in position 0
878 pick all super-admins in order of creation date and add it to the list
877 pick all super-admins in order of creation date and add it to the list
879 pick all other accounts in order of creation and add it to the list.
878 pick all other accounts in order of creation and add it to the list.
880
879
881 Based on that list, the last accounts can be disabled as they are
880 Based on that list, the last accounts can be disabled as they are
882 created at the end and don't include any of the super admins as well
881 created at the end and don't include any of the super admins as well
883 as the current user.
882 as the current user.
884
883
885 :param current_user: optionally current user running this operation
884 :param current_user: optionally current user running this operation
886 """
885 """
887
886
888 if not current_user:
887 if not current_user:
889 current_user = get_current_rhodecode_user()
888 current_user = get_current_rhodecode_user()
890 active_super_admins = [
889 active_super_admins = [
891 x.user_id for x in User.query()
890 x.user_id for x in User.query()
892 .filter(User.user_id != current_user.user_id)
891 .filter(User.user_id != current_user.user_id)
893 .filter(User.active == true())
892 .filter(User.active == true())
894 .filter(User.admin == true())
893 .filter(User.admin == true())
895 .order_by(User.created_on.asc())]
894 .order_by(User.created_on.asc())]
896
895
897 active_regular_users = [
896 active_regular_users = [
898 x.user_id for x in User.query()
897 x.user_id for x in User.query()
899 .filter(User.user_id != current_user.user_id)
898 .filter(User.user_id != current_user.user_id)
900 .filter(User.active == true())
899 .filter(User.active == true())
901 .filter(User.admin == false())
900 .filter(User.admin == false())
902 .order_by(User.created_on.asc())]
901 .order_by(User.created_on.asc())]
903
902
904 list_of_accounts = [current_user.user_id]
903 list_of_accounts = [current_user.user_id]
905 list_of_accounts += active_super_admins
904 list_of_accounts += active_super_admins
906 list_of_accounts += active_regular_users
905 list_of_accounts += active_regular_users
907
906
908 return list_of_accounts
907 return list_of_accounts
909
908
910 def deactivate_last_users(self, expected_users, current_user=None):
909 def deactivate_last_users(self, expected_users, current_user=None):
911 """
910 """
912 Deactivate accounts that are over the license limits.
911 Deactivate accounts that are over the license limits.
913 Algorithm of which accounts to disabled is based on the formula:
912 Algorithm of which accounts to disabled is based on the formula:
914
913
915 Get current user, then super admins in creation order, then regular
914 Get current user, then super admins in creation order, then regular
916 active users in creation order.
915 active users in creation order.
917
916
918 Using that list we mark all accounts from the end of it as inactive.
917 Using that list we mark all accounts from the end of it as inactive.
919 This way we block only latest created accounts.
918 This way we block only latest created accounts.
920
919
921 :param expected_users: list of users in special order, we deactivate
920 :param expected_users: list of users in special order, we deactivate
922 the end N amount of users from that list
921 the end N amount of users from that list
923 """
922 """
924
923
925 list_of_accounts = self.get_accounts_in_creation_order(
924 list_of_accounts = self.get_accounts_in_creation_order(
926 current_user=current_user)
925 current_user=current_user)
927
926
928 for acc_id in list_of_accounts[expected_users + 1:]:
927 for acc_id in list_of_accounts[expected_users + 1:]:
929 user = User.get(acc_id)
928 user = User.get(acc_id)
930 log.info('Deactivating account %s for license unlock', user)
929 log.info('Deactivating account %s for license unlock', user)
931 user.active = False
930 user.active = False
932 Session().add(user)
931 Session().add(user)
933 Session().commit()
932 Session().commit()
934
933
935 return
934 return
936
935
937 def get_user_log(self, user, filter_term):
936 def get_user_log(self, user, filter_term):
938 user_log = UserLog.query()\
937 user_log = UserLog.query()\
939 .filter(or_(UserLog.user_id == user.user_id,
938 .filter(or_(UserLog.user_id == user.user_id,
940 UserLog.username == user.username))\
939 UserLog.username == user.username))\
941 .options(joinedload(UserLog.user))\
940 .options(joinedload(UserLog.user))\
942 .options(joinedload(UserLog.repository))\
941 .options(joinedload(UserLog.repository))\
943 .order_by(UserLog.action_date.desc())
942 .order_by(UserLog.action_date.desc())
944
943
945 user_log = user_log_filter(user_log, filter_term)
944 user_log = user_log_filter(user_log, filter_term)
946 return user_log
945 return user_log
@@ -1,617 +1,632 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import os
21 import os
22 from hashlib import sha1
22 from hashlib import sha1
23
23
24 import pytest
24 import pytest
25 from mock import patch
25 from mock import patch
26
26
27 from rhodecode.lib import auth
27 from rhodecode.lib import auth
28 from rhodecode.lib.utils2 import md5
28 from rhodecode.lib.utils2 import md5
29 from rhodecode.model.auth_token import AuthTokenModel
29 from rhodecode.model.auth_token import AuthTokenModel
30 from rhodecode.model.db import User
30 from rhodecode.model.db import Session, User
31 from rhodecode.model.repo import RepoModel
31 from rhodecode.model.repo import RepoModel
32 from rhodecode.model.user import UserModel
32 from rhodecode.model.user import UserModel
33 from rhodecode.model.user_group import UserGroupModel
33 from rhodecode.model.user_group import UserGroupModel
34
34
35
35
36 def test_perm_origin_dict():
36 def test_perm_origin_dict():
37 pod = auth.PermOriginDict()
37 pod = auth.PermOriginDict()
38 pod['thing'] = 'read', 'default'
38 pod['thing'] = 'read', 'default'
39 assert pod['thing'] == 'read'
39 assert pod['thing'] == 'read'
40
40
41 assert pod.perm_origin_stack == {
41 assert pod.perm_origin_stack == {
42 'thing': [('read', 'default')]}
42 'thing': [('read', 'default')]}
43
43
44 pod['thing'] = 'write', 'admin'
44 pod['thing'] = 'write', 'admin'
45 assert pod['thing'] == 'write'
45 assert pod['thing'] == 'write'
46
46
47 assert pod.perm_origin_stack == {
47 assert pod.perm_origin_stack == {
48 'thing': [('read', 'default'), ('write', 'admin')]}
48 'thing': [('read', 'default'), ('write', 'admin')]}
49
49
50 pod['other'] = 'write', 'default'
50 pod['other'] = 'write', 'default'
51
51
52 assert pod.perm_origin_stack == {
52 assert pod.perm_origin_stack == {
53 'other': [('write', 'default')],
53 'other': [('write', 'default')],
54 'thing': [('read', 'default'), ('write', 'admin')]}
54 'thing': [('read', 'default'), ('write', 'admin')]}
55
55
56 pod['other'] = 'none', 'override'
56 pod['other'] = 'none', 'override'
57
57
58 assert pod.perm_origin_stack == {
58 assert pod.perm_origin_stack == {
59 'other': [('write', 'default'), ('none', 'override')],
59 'other': [('write', 'default'), ('none', 'override')],
60 'thing': [('read', 'default'), ('write', 'admin')]}
60 'thing': [('read', 'default'), ('write', 'admin')]}
61
61
62 with pytest.raises(ValueError):
62 with pytest.raises(ValueError):
63 pod['thing'] = 'read'
63 pod['thing'] = 'read'
64
64
65
65
66 def test_cached_perms_data(user_regular, backend_random):
66 def test_cached_perms_data(user_regular, backend_random):
67 permissions = get_permissions(user_regular)
67 permissions = get_permissions(user_regular)
68 repo_name = backend_random.repo.repo_name
68 repo_name = backend_random.repo.repo_name
69 expected_global_permissions = {
69 expected_global_permissions = {
70 'repository.read', 'group.read', 'usergroup.read'}
70 'repository.read', 'group.read', 'usergroup.read'}
71 assert expected_global_permissions.issubset(permissions['global'])
71 assert expected_global_permissions.issubset(permissions['global'])
72 assert permissions['repositories'][repo_name] == 'repository.read'
72 assert permissions['repositories'][repo_name] == 'repository.read'
73
73
74
74
75 def test_cached_perms_data_with_admin_user(user_regular, backend_random):
75 def test_cached_perms_data_with_admin_user(user_regular, backend_random):
76 permissions = get_permissions(user_regular, user_is_admin=True)
76 permissions = get_permissions(user_regular, user_is_admin=True)
77 repo_name = backend_random.repo.repo_name
77 repo_name = backend_random.repo.repo_name
78 assert 'hg.admin' in permissions['global']
78 assert 'hg.admin' in permissions['global']
79 assert permissions['repositories'][repo_name] == 'repository.admin'
79 assert permissions['repositories'][repo_name] == 'repository.admin'
80
80
81
81
82 def test_cached_perms_data_with_admin_user_extended_calculation(user_regular, backend_random):
82 def test_cached_perms_data_with_admin_user_extended_calculation(user_regular, backend_random):
83 permissions = get_permissions(user_regular, user_is_admin=True,
83 permissions = get_permissions(user_regular, user_is_admin=True,
84 calculate_super_admin=True)
84 calculate_super_admin=True)
85 repo_name = backend_random.repo.repo_name
85 repo_name = backend_random.repo.repo_name
86 assert 'hg.admin' in permissions['global']
86 assert 'hg.admin' in permissions['global']
87 assert permissions['repositories'][repo_name] == 'repository.admin'
87 assert permissions['repositories'][repo_name] == 'repository.admin'
88
88
89
89
90 def test_cached_perms_data_user_group_global_permissions(user_util):
90 def test_cached_perms_data_user_group_global_permissions(user_util):
91 user, user_group = user_util.create_user_with_group()
91 user, user_group = user_util.create_user_with_group()
92 user_group.inherit_default_permissions = False
92 user_group.inherit_default_permissions = False
93
93
94 granted_permission = 'repository.write'
94 granted_permission = 'repository.write'
95 UserGroupModel().grant_perm(user_group, granted_permission)
95 UserGroupModel().grant_perm(user_group, granted_permission)
96 Session().commit()
96
97
97 permissions = get_permissions(user)
98 permissions = get_permissions(user)
98 assert granted_permission in permissions['global']
99 assert granted_permission in permissions['global']
99
100
100
101
101 @pytest.mark.xfail(reason="Not implemented, see TODO note")
102 @pytest.mark.xfail(reason="Not implemented, see TODO note")
102 def test_cached_perms_data_user_group_global_permissions_(user_util):
103 def test_cached_perms_data_user_group_global_permissions_(user_util):
103 user, user_group = user_util.create_user_with_group()
104 user, user_group = user_util.create_user_with_group()
104
105
105 granted_permission = 'repository.write'
106 granted_permission = 'repository.write'
106 UserGroupModel().grant_perm(user_group, granted_permission)
107 UserGroupModel().grant_perm(user_group, granted_permission)
108 Session().commit()
107
109
108 permissions = get_permissions(user)
110 permissions = get_permissions(user)
109 assert granted_permission in permissions['global']
111 assert granted_permission in permissions['global']
110
112
111
113
112 def test_cached_perms_data_user_global_permissions(user_util):
114 def test_cached_perms_data_user_global_permissions(user_util):
113 user = user_util.create_user()
115 user = user_util.create_user()
114 UserModel().grant_perm(user, 'repository.none')
116 UserModel().grant_perm(user, 'repository.none')
117 Session().commit()
115
118
116 permissions = get_permissions(user, user_inherit_default_permissions=True)
119 permissions = get_permissions(user, user_inherit_default_permissions=True)
117 assert 'repository.read' in permissions['global']
120 assert 'repository.read' in permissions['global']
118
121
119
122
120 def test_cached_perms_data_repository_permissions_on_private_repository(
123 def test_cached_perms_data_repository_permissions_on_private_repository(
121 backend_random, user_util):
124 backend_random, user_util):
122 user, user_group = user_util.create_user_with_group()
125 user, user_group = user_util.create_user_with_group()
123
126
124 repo = backend_random.create_repo()
127 repo = backend_random.create_repo()
125 repo.private = True
128 repo.private = True
126
129
127 granted_permission = 'repository.write'
130 granted_permission = 'repository.write'
128 RepoModel().grant_user_group_permission(
131 RepoModel().grant_user_group_permission(
129 repo, user_group.users_group_name, granted_permission)
132 repo, user_group.users_group_name, granted_permission)
133 Session().commit()
130
134
131 permissions = get_permissions(user)
135 permissions = get_permissions(user)
132 assert permissions['repositories'][repo.repo_name] == granted_permission
136 assert permissions['repositories'][repo.repo_name] == granted_permission
133
137
134
138
135 def test_cached_perms_data_repository_permissions_for_owner(
139 def test_cached_perms_data_repository_permissions_for_owner(
136 backend_random, user_util):
140 backend_random, user_util):
137 user = user_util.create_user()
141 user = user_util.create_user()
138
142
139 repo = backend_random.create_repo()
143 repo = backend_random.create_repo()
140 repo.user_id = user.user_id
144 repo.user_id = user.user_id
141
145
142 permissions = get_permissions(user)
146 permissions = get_permissions(user)
143 assert permissions['repositories'][repo.repo_name] == 'repository.admin'
147 assert permissions['repositories'][repo.repo_name] == 'repository.admin'
144
148
145 # TODO: johbo: Make cleanup in UserUtility smarter, then remove this hack
149 # TODO: johbo: Make cleanup in UserUtility smarter, then remove this hack
146 repo.user_id = User.get_default_user().user_id
150 repo.user_id = User.get_default_user().user_id
147
151
148
152
149 def test_cached_perms_data_repository_permissions_not_inheriting_defaults(
153 def test_cached_perms_data_repository_permissions_not_inheriting_defaults(
150 backend_random, user_util):
154 backend_random, user_util):
151 user = user_util.create_user()
155 user = user_util.create_user()
152 repo = backend_random.create_repo()
156 repo = backend_random.create_repo()
153
157
154 # Don't inherit default object permissions
158 # Don't inherit default object permissions
155 UserModel().grant_perm(user, 'hg.inherit_default_perms.false')
159 UserModel().grant_perm(user, 'hg.inherit_default_perms.false')
160 Session().commit()
156
161
157 permissions = get_permissions(user)
162 permissions = get_permissions(user)
158 assert permissions['repositories'][repo.repo_name] == 'repository.none'
163 assert permissions['repositories'][repo.repo_name] == 'repository.none'
159
164
160
165
161 def test_cached_perms_data_default_permissions_on_repository_group(user_util):
166 def test_cached_perms_data_default_permissions_on_repository_group(user_util):
162 # Have a repository group with default permissions set
167 # Have a repository group with default permissions set
163 repo_group = user_util.create_repo_group()
168 repo_group = user_util.create_repo_group()
164 default_user = User.get_default_user()
169 default_user = User.get_default_user()
165 user_util.grant_user_permission_to_repo_group(
170 user_util.grant_user_permission_to_repo_group(
166 repo_group, default_user, 'repository.write')
171 repo_group, default_user, 'repository.write')
167 user = user_util.create_user()
172 user = user_util.create_user()
168
173
169 permissions = get_permissions(user)
174 permissions = get_permissions(user)
170 assert permissions['repositories_groups'][repo_group.group_name] == \
175 assert permissions['repositories_groups'][repo_group.group_name] == \
171 'repository.write'
176 'repository.write'
172
177
173
178
174 def test_cached_perms_data_default_permissions_on_repository_group_owner(
179 def test_cached_perms_data_default_permissions_on_repository_group_owner(
175 user_util):
180 user_util):
176 # Have a repository group
181 # Have a repository group
177 repo_group = user_util.create_repo_group()
182 repo_group = user_util.create_repo_group()
178 default_user = User.get_default_user()
183 default_user = User.get_default_user()
179
184
180 # Add a permission for the default user to hit the code path
185 # Add a permission for the default user to hit the code path
181 user_util.grant_user_permission_to_repo_group(
186 user_util.grant_user_permission_to_repo_group(
182 repo_group, default_user, 'repository.write')
187 repo_group, default_user, 'repository.write')
183
188
184 # Have an owner of the group
189 # Have an owner of the group
185 user = user_util.create_user()
190 user = user_util.create_user()
186 repo_group.user_id = user.user_id
191 repo_group.user_id = user.user_id
187
192
188 permissions = get_permissions(user)
193 permissions = get_permissions(user)
189 assert permissions['repositories_groups'][repo_group.group_name] == \
194 assert permissions['repositories_groups'][repo_group.group_name] == \
190 'group.admin'
195 'group.admin'
191
196
192
197
193 def test_cached_perms_data_default_permissions_on_repository_group_no_inherit(
198 def test_cached_perms_data_default_permissions_on_repository_group_no_inherit(
194 user_util):
199 user_util):
195 # Have a repository group
200 # Have a repository group
196 repo_group = user_util.create_repo_group()
201 repo_group = user_util.create_repo_group()
197 default_user = User.get_default_user()
202 default_user = User.get_default_user()
198
203
199 # Add a permission for the default user to hit the code path
204 # Add a permission for the default user to hit the code path
200 user_util.grant_user_permission_to_repo_group(
205 user_util.grant_user_permission_to_repo_group(
201 repo_group, default_user, 'repository.write')
206 repo_group, default_user, 'repository.write')
202
207
203 # Don't inherit default object permissions
208 # Don't inherit default object permissions
204 user = user_util.create_user()
209 user = user_util.create_user()
205 UserModel().grant_perm(user, 'hg.inherit_default_perms.false')
210 UserModel().grant_perm(user, 'hg.inherit_default_perms.false')
211 Session().commit()
206
212
207 permissions = get_permissions(user)
213 permissions = get_permissions(user)
208 assert permissions['repositories_groups'][repo_group.group_name] == \
214 assert permissions['repositories_groups'][repo_group.group_name] == \
209 'group.none'
215 'group.none'
210
216
211
217
212 def test_cached_perms_data_repository_permissions_from_user_group(
218 def test_cached_perms_data_repository_permissions_from_user_group(
213 user_util, backend_random):
219 user_util, backend_random):
214 user, user_group = user_util.create_user_with_group()
220 user, user_group = user_util.create_user_with_group()
215
221
216 # Needs a second user group to make sure that we select the right
222 # Needs a second user group to make sure that we select the right
217 # permissions.
223 # permissions.
218 user_group2 = user_util.create_user_group()
224 user_group2 = user_util.create_user_group()
219 UserGroupModel().add_user_to_group(user_group2, user)
225 UserGroupModel().add_user_to_group(user_group2, user)
220
226
221 repo = backend_random.create_repo()
227 repo = backend_random.create_repo()
222
228
223 RepoModel().grant_user_group_permission(
229 RepoModel().grant_user_group_permission(
224 repo, user_group.users_group_name, 'repository.read')
230 repo, user_group.users_group_name, 'repository.read')
225 RepoModel().grant_user_group_permission(
231 RepoModel().grant_user_group_permission(
226 repo, user_group2.users_group_name, 'repository.write')
232 repo, user_group2.users_group_name, 'repository.write')
233 Session().commit()
227
234
228 permissions = get_permissions(user)
235 permissions = get_permissions(user)
229 assert permissions['repositories'][repo.repo_name] == 'repository.write'
236 assert permissions['repositories'][repo.repo_name] == 'repository.write'
230
237
231
238
232 def test_cached_perms_data_repository_permissions_from_user_group_owner(
239 def test_cached_perms_data_repository_permissions_from_user_group_owner(
233 user_util, backend_random):
240 user_util, backend_random):
234 user, user_group = user_util.create_user_with_group()
241 user, user_group = user_util.create_user_with_group()
235
242
236 repo = backend_random.create_repo()
243 repo = backend_random.create_repo()
237 repo.user_id = user.user_id
244 repo.user_id = user.user_id
238
245
239 RepoModel().grant_user_group_permission(
246 RepoModel().grant_user_group_permission(
240 repo, user_group.users_group_name, 'repository.write')
247 repo, user_group.users_group_name, 'repository.write')
248 Session().commit()
241
249
242 permissions = get_permissions(user)
250 permissions = get_permissions(user)
243 assert permissions['repositories'][repo.repo_name] == 'repository.admin'
251 assert permissions['repositories'][repo.repo_name] == 'repository.admin'
244
252
245
253
246 def test_cached_perms_data_user_repository_permissions(
254 def test_cached_perms_data_user_repository_permissions(
247 user_util, backend_random):
255 user_util, backend_random):
248 user = user_util.create_user()
256 user = user_util.create_user()
249 repo = backend_random.create_repo()
257 repo = backend_random.create_repo()
250 granted_permission = 'repository.write'
258 granted_permission = 'repository.write'
251 RepoModel().grant_user_permission(repo, user, granted_permission)
259 RepoModel().grant_user_permission(repo, user, granted_permission)
260 Session().commit()
252
261
253 permissions = get_permissions(user)
262 permissions = get_permissions(user)
254 assert permissions['repositories'][repo.repo_name] == granted_permission
263 assert permissions['repositories'][repo.repo_name] == granted_permission
255
264
256
265
257 def test_cached_perms_data_user_repository_permissions_explicit(
266 def test_cached_perms_data_user_repository_permissions_explicit(
258 user_util, backend_random):
267 user_util, backend_random):
259 user = user_util.create_user()
268 user = user_util.create_user()
260 repo = backend_random.create_repo()
269 repo = backend_random.create_repo()
261 granted_permission = 'repository.none'
270 granted_permission = 'repository.none'
262 RepoModel().grant_user_permission(repo, user, granted_permission)
271 RepoModel().grant_user_permission(repo, user, granted_permission)
272 Session().commit()
263
273
264 permissions = get_permissions(user, explicit=True)
274 permissions = get_permissions(user, explicit=True)
265 assert permissions['repositories'][repo.repo_name] == granted_permission
275 assert permissions['repositories'][repo.repo_name] == granted_permission
266
276
267
277
268 def test_cached_perms_data_user_repository_permissions_owner(
278 def test_cached_perms_data_user_repository_permissions_owner(
269 user_util, backend_random):
279 user_util, backend_random):
270 user = user_util.create_user()
280 user = user_util.create_user()
271 repo = backend_random.create_repo()
281 repo = backend_random.create_repo()
272 repo.user_id = user.user_id
282 repo.user_id = user.user_id
273 RepoModel().grant_user_permission(repo, user, 'repository.write')
283 RepoModel().grant_user_permission(repo, user, 'repository.write')
284 Session().commit()
274
285
275 permissions = get_permissions(user)
286 permissions = get_permissions(user)
276 assert permissions['repositories'][repo.repo_name] == 'repository.admin'
287 assert permissions['repositories'][repo.repo_name] == 'repository.admin'
277
288
278
289
279 def test_cached_perms_data_repository_groups_permissions_inherited(
290 def test_cached_perms_data_repository_groups_permissions_inherited(
280 user_util, backend_random):
291 user_util, backend_random):
281 user, user_group = user_util.create_user_with_group()
292 user, user_group = user_util.create_user_with_group()
282
293
283 # Needs a second group to hit the last condition
294 # Needs a second group to hit the last condition
284 user_group2 = user_util.create_user_group()
295 user_group2 = user_util.create_user_group()
285 UserGroupModel().add_user_to_group(user_group2, user)
296 UserGroupModel().add_user_to_group(user_group2, user)
286
297
287 repo_group = user_util.create_repo_group()
298 repo_group = user_util.create_repo_group()
288
299
289 user_util.grant_user_group_permission_to_repo_group(
300 user_util.grant_user_group_permission_to_repo_group(
290 repo_group, user_group, 'group.read')
301 repo_group, user_group, 'group.read')
291 user_util.grant_user_group_permission_to_repo_group(
302 user_util.grant_user_group_permission_to_repo_group(
292 repo_group, user_group2, 'group.write')
303 repo_group, user_group2, 'group.write')
293
304
294 permissions = get_permissions(user)
305 permissions = get_permissions(user)
295 assert permissions['repositories_groups'][repo_group.group_name] == \
306 assert permissions['repositories_groups'][repo_group.group_name] == \
296 'group.write'
307 'group.write'
297
308
298
309
299 def test_cached_perms_data_repository_groups_permissions_inherited_owner(
310 def test_cached_perms_data_repository_groups_permissions_inherited_owner(
300 user_util, backend_random):
311 user_util, backend_random):
301 user, user_group = user_util.create_user_with_group()
312 user, user_group = user_util.create_user_with_group()
302 repo_group = user_util.create_repo_group()
313 repo_group = user_util.create_repo_group()
303 repo_group.user_id = user.user_id
314 repo_group.user_id = user.user_id
304
315
305 granted_permission = 'group.write'
316 granted_permission = 'group.write'
306 user_util.grant_user_group_permission_to_repo_group(
317 user_util.grant_user_group_permission_to_repo_group(
307 repo_group, user_group, granted_permission)
318 repo_group, user_group, granted_permission)
308
319
309 permissions = get_permissions(user)
320 permissions = get_permissions(user)
310 assert permissions['repositories_groups'][repo_group.group_name] == \
321 assert permissions['repositories_groups'][repo_group.group_name] == \
311 'group.admin'
322 'group.admin'
312
323
313
324
314 def test_cached_perms_data_repository_groups_permissions(
325 def test_cached_perms_data_repository_groups_permissions(
315 user_util, backend_random):
326 user_util, backend_random):
316 user = user_util.create_user()
327 user = user_util.create_user()
317
328
318 repo_group = user_util.create_repo_group()
329 repo_group = user_util.create_repo_group()
319
330
320 granted_permission = 'group.write'
331 granted_permission = 'group.write'
321 user_util.grant_user_permission_to_repo_group(
332 user_util.grant_user_permission_to_repo_group(
322 repo_group, user, granted_permission)
333 repo_group, user, granted_permission)
323
334
324 permissions = get_permissions(user)
335 permissions = get_permissions(user)
325 assert permissions['repositories_groups'][repo_group.group_name] == \
336 assert permissions['repositories_groups'][repo_group.group_name] == \
326 'group.write'
337 'group.write'
327
338
328
339
329 def test_cached_perms_data_repository_groups_permissions_explicit(
340 def test_cached_perms_data_repository_groups_permissions_explicit(
330 user_util, backend_random):
341 user_util, backend_random):
331 user = user_util.create_user()
342 user = user_util.create_user()
332
343
333 repo_group = user_util.create_repo_group()
344 repo_group = user_util.create_repo_group()
334
345
335 granted_permission = 'group.none'
346 granted_permission = 'group.none'
336 user_util.grant_user_permission_to_repo_group(
347 user_util.grant_user_permission_to_repo_group(
337 repo_group, user, granted_permission)
348 repo_group, user, granted_permission)
338
349
339 permissions = get_permissions(user, explicit=True)
350 permissions = get_permissions(user, explicit=True)
340 assert permissions['repositories_groups'][repo_group.group_name] == \
351 assert permissions['repositories_groups'][repo_group.group_name] == \
341 'group.none'
352 'group.none'
342
353
343
354
344 def test_cached_perms_data_repository_groups_permissions_owner(
355 def test_cached_perms_data_repository_groups_permissions_owner(
345 user_util, backend_random):
356 user_util, backend_random):
346 user = user_util.create_user()
357 user = user_util.create_user()
347
358
348 repo_group = user_util.create_repo_group()
359 repo_group = user_util.create_repo_group()
349 repo_group.user_id = user.user_id
360 repo_group.user_id = user.user_id
350
361
351 granted_permission = 'group.write'
362 granted_permission = 'group.write'
352 user_util.grant_user_permission_to_repo_group(
363 user_util.grant_user_permission_to_repo_group(
353 repo_group, user, granted_permission)
364 repo_group, user, granted_permission)
354
365
355 permissions = get_permissions(user)
366 permissions = get_permissions(user)
356 assert permissions['repositories_groups'][repo_group.group_name] == \
367 assert permissions['repositories_groups'][repo_group.group_name] == \
357 'group.admin'
368 'group.admin'
358
369
359
370
360 def test_cached_perms_data_user_group_permissions_inherited(
371 def test_cached_perms_data_user_group_permissions_inherited(
361 user_util, backend_random):
372 user_util, backend_random):
362 user, user_group = user_util.create_user_with_group()
373 user, user_group = user_util.create_user_with_group()
363 user_group2 = user_util.create_user_group()
374 user_group2 = user_util.create_user_group()
364 UserGroupModel().add_user_to_group(user_group2, user)
375 UserGroupModel().add_user_to_group(user_group2, user)
365
376
366 target_user_group = user_util.create_user_group()
377 target_user_group = user_util.create_user_group()
367
378
368 user_util.grant_user_group_permission_to_user_group(
379 user_util.grant_user_group_permission_to_user_group(
369 target_user_group, user_group, 'usergroup.read')
380 target_user_group, user_group, 'usergroup.read')
370 user_util.grant_user_group_permission_to_user_group(
381 user_util.grant_user_group_permission_to_user_group(
371 target_user_group, user_group2, 'usergroup.write')
382 target_user_group, user_group2, 'usergroup.write')
372
383
373 permissions = get_permissions(user)
384 permissions = get_permissions(user)
374 assert permissions['user_groups'][target_user_group.users_group_name] == \
385 assert permissions['user_groups'][target_user_group.users_group_name] == \
375 'usergroup.write'
386 'usergroup.write'
376
387
377
388
378 def test_cached_perms_data_user_group_permissions(
389 def test_cached_perms_data_user_group_permissions(
379 user_util, backend_random):
390 user_util, backend_random):
380 user = user_util.create_user()
391 user = user_util.create_user()
381 user_group = user_util.create_user_group()
392 user_group = user_util.create_user_group()
382 UserGroupModel().grant_user_permission(user_group, user, 'usergroup.write')
393 UserGroupModel().grant_user_permission(user_group, user, 'usergroup.write')
394 Session().commit()
383
395
384 permissions = get_permissions(user)
396 permissions = get_permissions(user)
385 assert permissions['user_groups'][user_group.users_group_name] == \
397 assert permissions['user_groups'][user_group.users_group_name] == \
386 'usergroup.write'
398 'usergroup.write'
387
399
388
400
389 def test_cached_perms_data_user_group_permissions_explicit(
401 def test_cached_perms_data_user_group_permissions_explicit(
390 user_util, backend_random):
402 user_util, backend_random):
391 user = user_util.create_user()
403 user = user_util.create_user()
392 user_group = user_util.create_user_group()
404 user_group = user_util.create_user_group()
393 UserGroupModel().grant_user_permission(user_group, user, 'usergroup.none')
405 UserGroupModel().grant_user_permission(user_group, user, 'usergroup.none')
406 Session().commit()
394
407
395 permissions = get_permissions(user, explicit=True)
408 permissions = get_permissions(user, explicit=True)
396 assert permissions['user_groups'][user_group.users_group_name] == \
409 assert permissions['user_groups'][user_group.users_group_name] == \
397 'usergroup.none'
410 'usergroup.none'
398
411
399
412
400 def test_cached_perms_data_user_group_permissions_not_inheriting_defaults(
413 def test_cached_perms_data_user_group_permissions_not_inheriting_defaults(
401 user_util, backend_random):
414 user_util, backend_random):
402 user = user_util.create_user()
415 user = user_util.create_user()
403 user_group = user_util.create_user_group()
416 user_group = user_util.create_user_group()
404
417
405 # Don't inherit default object permissions
418 # Don't inherit default object permissions
406 UserModel().grant_perm(user, 'hg.inherit_default_perms.false')
419 UserModel().grant_perm(user, 'hg.inherit_default_perms.false')
420 Session().commit()
407
421
408 permissions = get_permissions(user)
422 permissions = get_permissions(user)
409 assert permissions['user_groups'][user_group.users_group_name] == \
423 assert permissions['user_groups'][user_group.users_group_name] == \
410 'usergroup.none'
424 'usergroup.none'
411
425
412
426
413 def test_permission_calculator_admin_permissions(
427 def test_permission_calculator_admin_permissions(
414 user_util, backend_random):
428 user_util, backend_random):
415 user = user_util.create_user()
429 user = user_util.create_user()
416 user_group = user_util.create_user_group()
430 user_group = user_util.create_user_group()
417 repo = backend_random.repo
431 repo = backend_random.repo
418 repo_group = user_util.create_repo_group()
432 repo_group = user_util.create_repo_group()
419
433
420 calculator = auth.PermissionCalculator(
434 calculator = auth.PermissionCalculator(
421 user.user_id, {}, False, False, True, 'higherwin')
435 user.user_id, {}, False, False, True, 'higherwin')
422 permissions = calculator._calculate_admin_permissions()
436 permissions = calculator._calculate_admin_permissions()
423
437
424 assert permissions['repositories_groups'][repo_group.group_name] == \
438 assert permissions['repositories_groups'][repo_group.group_name] == \
425 'group.admin'
439 'group.admin'
426 assert permissions['user_groups'][user_group.users_group_name] == \
440 assert permissions['user_groups'][user_group.users_group_name] == \
427 'usergroup.admin'
441 'usergroup.admin'
428 assert permissions['repositories'][repo.repo_name] == 'repository.admin'
442 assert permissions['repositories'][repo.repo_name] == 'repository.admin'
429 assert 'hg.admin' in permissions['global']
443 assert 'hg.admin' in permissions['global']
430
444
431
445
432 def test_permission_calculator_repository_permissions_robustness_from_group(
446 def test_permission_calculator_repository_permissions_robustness_from_group(
433 user_util, backend_random):
447 user_util, backend_random):
434 user, user_group = user_util.create_user_with_group()
448 user, user_group = user_util.create_user_with_group()
435
449
436 RepoModel().grant_user_group_permission(
450 RepoModel().grant_user_group_permission(
437 backend_random.repo, user_group.users_group_name, 'repository.write')
451 backend_random.repo, user_group.users_group_name, 'repository.write')
438
452
439 calculator = auth.PermissionCalculator(
453 calculator = auth.PermissionCalculator(
440 user.user_id, {}, False, False, False, 'higherwin')
454 user.user_id, {}, False, False, False, 'higherwin')
441 calculator._calculate_repository_permissions()
455 calculator._calculate_repository_permissions()
442
456
443
457
444 def test_permission_calculator_repository_permissions_robustness_from_user(
458 def test_permission_calculator_repository_permissions_robustness_from_user(
445 user_util, backend_random):
459 user_util, backend_random):
446 user = user_util.create_user()
460 user = user_util.create_user()
447
461
448 RepoModel().grant_user_permission(
462 RepoModel().grant_user_permission(
449 backend_random.repo, user, 'repository.write')
463 backend_random.repo, user, 'repository.write')
464 Session().commit()
450
465
451 calculator = auth.PermissionCalculator(
466 calculator = auth.PermissionCalculator(
452 user.user_id, {}, False, False, False, 'higherwin')
467 user.user_id, {}, False, False, False, 'higherwin')
453 calculator._calculate_repository_permissions()
468 calculator._calculate_repository_permissions()
454
469
455
470
456 def test_permission_calculator_repo_group_permissions_robustness_from_group(
471 def test_permission_calculator_repo_group_permissions_robustness_from_group(
457 user_util, backend_random):
472 user_util, backend_random):
458 user, user_group = user_util.create_user_with_group()
473 user, user_group = user_util.create_user_with_group()
459 repo_group = user_util.create_repo_group()
474 repo_group = user_util.create_repo_group()
460
475
461 user_util.grant_user_group_permission_to_repo_group(
476 user_util.grant_user_group_permission_to_repo_group(
462 repo_group, user_group, 'group.write')
477 repo_group, user_group, 'group.write')
463
478
464 calculator = auth.PermissionCalculator(
479 calculator = auth.PermissionCalculator(
465 user.user_id, {}, False, False, False, 'higherwin')
480 user.user_id, {}, False, False, False, 'higherwin')
466 calculator._calculate_repository_group_permissions()
481 calculator._calculate_repository_group_permissions()
467
482
468
483
469 def test_permission_calculator_repo_group_permissions_robustness_from_user(
484 def test_permission_calculator_repo_group_permissions_robustness_from_user(
470 user_util, backend_random):
485 user_util, backend_random):
471 user = user_util.create_user()
486 user = user_util.create_user()
472 repo_group = user_util.create_repo_group()
487 repo_group = user_util.create_repo_group()
473
488
474 user_util.grant_user_permission_to_repo_group(
489 user_util.grant_user_permission_to_repo_group(
475 repo_group, user, 'group.write')
490 repo_group, user, 'group.write')
476
491
477 calculator = auth.PermissionCalculator(
492 calculator = auth.PermissionCalculator(
478 user.user_id, {}, False, False, False, 'higherwin')
493 user.user_id, {}, False, False, False, 'higherwin')
479 calculator._calculate_repository_group_permissions()
494 calculator._calculate_repository_group_permissions()
480
495
481
496
482 def test_permission_calculator_user_group_permissions_robustness_from_group(
497 def test_permission_calculator_user_group_permissions_robustness_from_group(
483 user_util, backend_random):
498 user_util, backend_random):
484 user, user_group = user_util.create_user_with_group()
499 user, user_group = user_util.create_user_with_group()
485 target_user_group = user_util.create_user_group()
500 target_user_group = user_util.create_user_group()
486
501
487 user_util.grant_user_group_permission_to_user_group(
502 user_util.grant_user_group_permission_to_user_group(
488 target_user_group, user_group, 'usergroup.write')
503 target_user_group, user_group, 'usergroup.write')
489
504
490 calculator = auth.PermissionCalculator(
505 calculator = auth.PermissionCalculator(
491 user.user_id, {}, False, False, False, 'higherwin')
506 user.user_id, {}, False, False, False, 'higherwin')
492 calculator._calculate_user_group_permissions()
507 calculator._calculate_user_group_permissions()
493
508
494
509
495 def test_permission_calculator_user_group_permissions_robustness_from_user(
510 def test_permission_calculator_user_group_permissions_robustness_from_user(
496 user_util, backend_random):
511 user_util, backend_random):
497 user = user_util.create_user()
512 user = user_util.create_user()
498 target_user_group = user_util.create_user_group()
513 target_user_group = user_util.create_user_group()
499
514
500 user_util.grant_user_permission_to_user_group(
515 user_util.grant_user_permission_to_user_group(
501 target_user_group, user, 'usergroup.write')
516 target_user_group, user, 'usergroup.write')
502
517
503 calculator = auth.PermissionCalculator(
518 calculator = auth.PermissionCalculator(
504 user.user_id, {}, False, False, False, 'higherwin')
519 user.user_id, {}, False, False, False, 'higherwin')
505 calculator._calculate_user_group_permissions()
520 calculator._calculate_user_group_permissions()
506
521
507
522
508 @pytest.mark.parametrize("algo, new_permission, old_permission, expected", [
523 @pytest.mark.parametrize("algo, new_permission, old_permission, expected", [
509 ('higherwin', 'repository.none', 'repository.none', 'repository.none'),
524 ('higherwin', 'repository.none', 'repository.none', 'repository.none'),
510 ('higherwin', 'repository.read', 'repository.none', 'repository.read'),
525 ('higherwin', 'repository.read', 'repository.none', 'repository.read'),
511 ('lowerwin', 'repository.write', 'repository.write', 'repository.write'),
526 ('lowerwin', 'repository.write', 'repository.write', 'repository.write'),
512 ('lowerwin', 'repository.read', 'repository.write', 'repository.read'),
527 ('lowerwin', 'repository.read', 'repository.write', 'repository.read'),
513 ])
528 ])
514 def test_permission_calculator_choose_permission(
529 def test_permission_calculator_choose_permission(
515 user_regular, algo, new_permission, old_permission, expected):
530 user_regular, algo, new_permission, old_permission, expected):
516 calculator = auth.PermissionCalculator(
531 calculator = auth.PermissionCalculator(
517 user_regular.user_id, {}, False, False, False, algo)
532 user_regular.user_id, {}, False, False, False, algo)
518 result = calculator._choose_permission(new_permission, old_permission)
533 result = calculator._choose_permission(new_permission, old_permission)
519 assert result == expected
534 assert result == expected
520
535
521
536
522 def test_permission_calculator_choose_permission_raises_on_wrong_algo(
537 def test_permission_calculator_choose_permission_raises_on_wrong_algo(
523 user_regular):
538 user_regular):
524 calculator = auth.PermissionCalculator(
539 calculator = auth.PermissionCalculator(
525 user_regular.user_id, {}, False, False, False, 'invalid')
540 user_regular.user_id, {}, False, False, False, 'invalid')
526 result = calculator._choose_permission(
541 result = calculator._choose_permission(
527 'repository.read', 'repository.read')
542 'repository.read', 'repository.read')
528 # TODO: johbo: This documents the existing behavior. Think of an
543 # TODO: johbo: This documents the existing behavior. Think of an
529 # improvement.
544 # improvement.
530 assert result is None
545 assert result is None
531
546
532
547
533 def test_auth_user_get_cookie_store_for_normal_user(user_util):
548 def test_auth_user_get_cookie_store_for_normal_user(user_util):
534 user = user_util.create_user()
549 user = user_util.create_user()
535 auth_user = auth.AuthUser(user_id=user.user_id)
550 auth_user = auth.AuthUser(user_id=user.user_id)
536 expected_data = {
551 expected_data = {
537 'username': user.username,
552 'username': user.username,
538 'user_id': user.user_id,
553 'user_id': user.user_id,
539 'password': md5(user.password),
554 'password': md5(user.password),
540 'is_authenticated': False
555 'is_authenticated': False
541 }
556 }
542 assert auth_user.get_cookie_store() == expected_data
557 assert auth_user.get_cookie_store() == expected_data
543
558
544
559
545 def test_auth_user_get_cookie_store_for_default_user():
560 def test_auth_user_get_cookie_store_for_default_user():
546 default_user = User.get_default_user()
561 default_user = User.get_default_user()
547 auth_user = auth.AuthUser()
562 auth_user = auth.AuthUser()
548 expected_data = {
563 expected_data = {
549 'username': User.DEFAULT_USER,
564 'username': User.DEFAULT_USER,
550 'user_id': default_user.user_id,
565 'user_id': default_user.user_id,
551 'password': md5(default_user.password),
566 'password': md5(default_user.password),
552 'is_authenticated': True
567 'is_authenticated': True
553 }
568 }
554 assert auth_user.get_cookie_store() == expected_data
569 assert auth_user.get_cookie_store() == expected_data
555
570
556
571
557 def get_permissions(user, **kwargs):
572 def get_permissions(user, **kwargs):
558 """
573 """
559 Utility filling in useful defaults into the call to `_cached_perms_data`.
574 Utility filling in useful defaults into the call to `_cached_perms_data`.
560
575
561 Fill in `**kwargs` if specific values are needed for a test.
576 Fill in `**kwargs` if specific values are needed for a test.
562 """
577 """
563 call_args = {
578 call_args = {
564 'user_id': user.user_id,
579 'user_id': user.user_id,
565 'scope': {},
580 'scope': {},
566 'user_is_admin': False,
581 'user_is_admin': False,
567 'user_inherit_default_permissions': False,
582 'user_inherit_default_permissions': False,
568 'explicit': False,
583 'explicit': False,
569 'algo': 'higherwin',
584 'algo': 'higherwin',
570 'calculate_super_admin': False,
585 'calculate_super_admin': False,
571 }
586 }
572 call_args.update(kwargs)
587 call_args.update(kwargs)
573 permissions = auth._cached_perms_data(**call_args)
588 permissions = auth._cached_perms_data(**call_args)
574 return permissions
589 return permissions
575
590
576
591
577 class TestGenerateAuthToken(object):
592 class TestGenerateAuthToken(object):
578 def test_salt_is_used_when_specified(self):
593 def test_salt_is_used_when_specified(self):
579 salt = 'abcde'
594 salt = 'abcde'
580 user_name = 'test_user'
595 user_name = 'test_user'
581 result = auth.generate_auth_token(user_name, salt)
596 result = auth.generate_auth_token(user_name, salt)
582 expected_result = sha1(user_name + salt).hexdigest()
597 expected_result = sha1(user_name + salt).hexdigest()
583 assert result == expected_result
598 assert result == expected_result
584
599
585 def test_salt_is_geneated_when_not_specified(self):
600 def test_salt_is_geneated_when_not_specified(self):
586 user_name = 'test_user'
601 user_name = 'test_user'
587 random_salt = os.urandom(16)
602 random_salt = os.urandom(16)
588 with patch.object(auth, 'os') as os_mock:
603 with patch.object(auth, 'os') as os_mock:
589 os_mock.urandom.return_value = random_salt
604 os_mock.urandom.return_value = random_salt
590 result = auth.generate_auth_token(user_name)
605 result = auth.generate_auth_token(user_name)
591 expected_result = sha1(user_name + random_salt).hexdigest()
606 expected_result = sha1(user_name + random_salt).hexdigest()
592 assert result == expected_result
607 assert result == expected_result
593
608
594
609
595 @pytest.mark.parametrize("test_token, test_roles, auth_result, expected_tokens", [
610 @pytest.mark.parametrize("test_token, test_roles, auth_result, expected_tokens", [
596 ('', None, False,
611 ('', None, False,
597 []),
612 []),
598 ('wrongtoken', None, False,
613 ('wrongtoken', None, False,
599 []),
614 []),
600 ('abracadabra_vcs', [AuthTokenModel.cls.ROLE_API], False,
615 ('abracadabra_vcs', [AuthTokenModel.cls.ROLE_API], False,
601 [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1)]),
616 [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1)]),
602 ('abracadabra_api', [AuthTokenModel.cls.ROLE_API], True,
617 ('abracadabra_api', [AuthTokenModel.cls.ROLE_API], True,
603 [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1)]),
618 [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1)]),
604 ('abracadabra_api', [AuthTokenModel.cls.ROLE_API], True,
619 ('abracadabra_api', [AuthTokenModel.cls.ROLE_API], True,
605 [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1),
620 [('abracadabra_api', AuthTokenModel.cls.ROLE_API, -1),
606 ('abracadabra_http', AuthTokenModel.cls.ROLE_HTTP, -1)]),
621 ('abracadabra_http', AuthTokenModel.cls.ROLE_HTTP, -1)]),
607 ])
622 ])
608 def test_auth_by_token(test_token, test_roles, auth_result, expected_tokens,
623 def test_auth_by_token(test_token, test_roles, auth_result, expected_tokens,
609 user_util):
624 user_util):
610 user = user_util.create_user()
625 user = user_util.create_user()
611 user_id = user.user_id
626 user_id = user.user_id
612 for token, role, expires in expected_tokens:
627 for token, role, expires in expected_tokens:
613 new_token = AuthTokenModel().create(user_id, 'test-token', expires, role)
628 new_token = AuthTokenModel().create(user_id, u'test-token', expires, role)
614 new_token.api_key = token # inject known name for testing...
629 new_token.api_key = token # inject known name for testing...
615
630
616 assert auth_result == user.authenticate_by_token(
631 assert auth_result == user.authenticate_by_token(
617 test_token, roles=test_roles)
632 test_token, roles=test_roles)
@@ -1,1080 +1,1143 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import mock
21 import mock
22 import pytest
22 import pytest
23
23
24 from rhodecode.lib.utils2 import str2bool
24 from rhodecode.lib.utils2 import str2bool
25 from rhodecode.model.meta import Session
25 from rhodecode.model.meta import Session
26 from rhodecode.model.settings import VcsSettingsModel, UiSetting
26 from rhodecode.model.settings import VcsSettingsModel, UiSetting
27
27
28
28
29 HOOKS_FORM_DATA = {
29 HOOKS_FORM_DATA = {
30 'hooks_changegroup_repo_size': True,
30 'hooks_changegroup_repo_size': True,
31 'hooks_changegroup_push_logger': True,
31 'hooks_changegroup_push_logger': True,
32 'hooks_outgoing_pull_logger': True
32 'hooks_outgoing_pull_logger': True
33 }
33 }
34
34
35 SVN_FORM_DATA = {
35 SVN_FORM_DATA = {
36 'new_svn_branch': 'test-branch',
36 'new_svn_branch': 'test-branch',
37 'new_svn_tag': 'test-tag'
37 'new_svn_tag': 'test-tag'
38 }
38 }
39
39
40 GENERAL_FORM_DATA = {
40 GENERAL_FORM_DATA = {
41 'rhodecode_pr_merge_enabled': True,
41 'rhodecode_pr_merge_enabled': True,
42 'rhodecode_use_outdated_comments': True,
42 'rhodecode_use_outdated_comments': True,
43 'rhodecode_hg_use_rebase_for_merging': True,
43 'rhodecode_hg_use_rebase_for_merging': True,
44 'rhodecode_hg_close_branch_before_merging': True,
44 'rhodecode_hg_close_branch_before_merging': True,
45 'rhodecode_git_use_rebase_for_merging': True,
45 'rhodecode_git_use_rebase_for_merging': True,
46 'rhodecode_git_close_branch_before_merging': True,
46 'rhodecode_git_close_branch_before_merging': True,
47 'rhodecode_diff_cache': True,
47 'rhodecode_diff_cache': True,
48 }
48 }
49
49
50
50
51 class TestInheritGlobalSettingsProperty(object):
51 class TestInheritGlobalSettingsProperty(object):
52 def test_get_raises_exception_when_repository_not_specified(self):
52 def test_get_raises_exception_when_repository_not_specified(self):
53 model = VcsSettingsModel()
53 model = VcsSettingsModel()
54 with pytest.raises(Exception) as exc_info:
54 with pytest.raises(Exception) as exc_info:
55 model.inherit_global_settings
55 model.inherit_global_settings
56 assert str(exc_info.value) == 'Repository is not specified'
56 assert str(exc_info.value) == 'Repository is not specified'
57
57
58 def test_true_is_returned_when_value_is_not_found(self, repo_stub):
58 def test_true_is_returned_when_value_is_not_found(self, repo_stub):
59 model = VcsSettingsModel(repo=repo_stub.repo_name)
59 model = VcsSettingsModel(repo=repo_stub.repo_name)
60 assert model.inherit_global_settings is True
60 assert model.inherit_global_settings is True
61
61
62 def test_value_is_returned(self, repo_stub, settings_util):
62 def test_value_is_returned(self, repo_stub, settings_util):
63 model = VcsSettingsModel(repo=repo_stub.repo_name)
63 model = VcsSettingsModel(repo=repo_stub.repo_name)
64 settings_util.create_repo_rhodecode_setting(
64 settings_util.create_repo_rhodecode_setting(
65 repo_stub, VcsSettingsModel.INHERIT_SETTINGS, False, 'bool')
65 repo_stub, VcsSettingsModel.INHERIT_SETTINGS, False, 'bool')
66 assert model.inherit_global_settings is False
66 assert model.inherit_global_settings is False
67
67
68 def test_value_is_set(self, repo_stub):
68 def test_value_is_set(self, repo_stub):
69 model = VcsSettingsModel(repo=repo_stub.repo_name)
69 model = VcsSettingsModel(repo=repo_stub.repo_name)
70 model.inherit_global_settings = False
70 model.inherit_global_settings = False
71 setting = model.repo_settings.get_setting_by_name(
71 setting = model.repo_settings.get_setting_by_name(
72 VcsSettingsModel.INHERIT_SETTINGS)
72 VcsSettingsModel.INHERIT_SETTINGS)
73 try:
73 try:
74 assert setting.app_settings_type == 'bool'
74 assert setting.app_settings_type == 'bool'
75 assert setting.app_settings_value is False
75 assert setting.app_settings_value is False
76 finally:
76 finally:
77 Session().delete(setting)
77 Session().delete(setting)
78 Session().commit()
78 Session().commit()
79
79
80 def test_set_raises_exception_when_repository_not_specified(self):
80 def test_set_raises_exception_when_repository_not_specified(self):
81 model = VcsSettingsModel()
81 model = VcsSettingsModel()
82 with pytest.raises(Exception) as exc_info:
82 with pytest.raises(Exception) as exc_info:
83 model.inherit_global_settings = False
83 model.inherit_global_settings = False
84 assert str(exc_info.value) == 'Repository is not specified'
84 assert str(exc_info.value) == 'Repository is not specified'
85
85
86
86
87 class TestVcsSettingsModel(object):
87 class TestVcsSettingsModel(object):
88 def test_global_svn_branch_patterns(self):
88 def test_global_svn_branch_patterns(self):
89 model = VcsSettingsModel()
89 model = VcsSettingsModel()
90 expected_result = {'test': 'test'}
90 expected_result = {'test': 'test'}
91 with mock.patch.object(model, 'global_settings') as settings_mock:
91 with mock.patch.object(model, 'global_settings') as settings_mock:
92 get_settings = settings_mock.get_ui_by_section
92 get_settings = settings_mock.get_ui_by_section
93 get_settings.return_value = expected_result
93 get_settings.return_value = expected_result
94 settings_mock.return_value = expected_result
94 settings_mock.return_value = expected_result
95 result = model.get_global_svn_branch_patterns()
95 result = model.get_global_svn_branch_patterns()
96
96
97 get_settings.assert_called_once_with(model.SVN_BRANCH_SECTION)
97 get_settings.assert_called_once_with(model.SVN_BRANCH_SECTION)
98 assert expected_result == result
98 assert expected_result == result
99
99
100 def test_repo_svn_branch_patterns(self):
100 def test_repo_svn_branch_patterns(self):
101 model = VcsSettingsModel()
101 model = VcsSettingsModel()
102 expected_result = {'test': 'test'}
102 expected_result = {'test': 'test'}
103 with mock.patch.object(model, 'repo_settings') as settings_mock:
103 with mock.patch.object(model, 'repo_settings') as settings_mock:
104 get_settings = settings_mock.get_ui_by_section
104 get_settings = settings_mock.get_ui_by_section
105 get_settings.return_value = expected_result
105 get_settings.return_value = expected_result
106 settings_mock.return_value = expected_result
106 settings_mock.return_value = expected_result
107 result = model.get_repo_svn_branch_patterns()
107 result = model.get_repo_svn_branch_patterns()
108
108
109 get_settings.assert_called_once_with(model.SVN_BRANCH_SECTION)
109 get_settings.assert_called_once_with(model.SVN_BRANCH_SECTION)
110 assert expected_result == result
110 assert expected_result == result
111
111
112 def test_repo_svn_branch_patterns_raises_exception_when_repo_is_not_set(
112 def test_repo_svn_branch_patterns_raises_exception_when_repo_is_not_set(
113 self):
113 self):
114 model = VcsSettingsModel()
114 model = VcsSettingsModel()
115 with pytest.raises(Exception) as exc_info:
115 with pytest.raises(Exception) as exc_info:
116 model.get_repo_svn_branch_patterns()
116 model.get_repo_svn_branch_patterns()
117 assert str(exc_info.value) == 'Repository is not specified'
117 assert str(exc_info.value) == 'Repository is not specified'
118
118
119 def test_global_svn_tag_patterns(self):
119 def test_global_svn_tag_patterns(self):
120 model = VcsSettingsModel()
120 model = VcsSettingsModel()
121 expected_result = {'test': 'test'}
121 expected_result = {'test': 'test'}
122 with mock.patch.object(model, 'global_settings') as settings_mock:
122 with mock.patch.object(model, 'global_settings') as settings_mock:
123 get_settings = settings_mock.get_ui_by_section
123 get_settings = settings_mock.get_ui_by_section
124 get_settings.return_value = expected_result
124 get_settings.return_value = expected_result
125 settings_mock.return_value = expected_result
125 settings_mock.return_value = expected_result
126 result = model.get_global_svn_tag_patterns()
126 result = model.get_global_svn_tag_patterns()
127
127
128 get_settings.assert_called_once_with(model.SVN_TAG_SECTION)
128 get_settings.assert_called_once_with(model.SVN_TAG_SECTION)
129 assert expected_result == result
129 assert expected_result == result
130
130
131 def test_repo_svn_tag_patterns(self):
131 def test_repo_svn_tag_patterns(self):
132 model = VcsSettingsModel()
132 model = VcsSettingsModel()
133 expected_result = {'test': 'test'}
133 expected_result = {'test': 'test'}
134 with mock.patch.object(model, 'repo_settings') as settings_mock:
134 with mock.patch.object(model, 'repo_settings') as settings_mock:
135 get_settings = settings_mock.get_ui_by_section
135 get_settings = settings_mock.get_ui_by_section
136 get_settings.return_value = expected_result
136 get_settings.return_value = expected_result
137 settings_mock.return_value = expected_result
137 settings_mock.return_value = expected_result
138 result = model.get_repo_svn_tag_patterns()
138 result = model.get_repo_svn_tag_patterns()
139
139
140 get_settings.assert_called_once_with(model.SVN_TAG_SECTION)
140 get_settings.assert_called_once_with(model.SVN_TAG_SECTION)
141 assert expected_result == result
141 assert expected_result == result
142
142
143 def test_repo_svn_tag_patterns_raises_exception_when_repo_is_not_set(self):
143 def test_repo_svn_tag_patterns_raises_exception_when_repo_is_not_set(self):
144 model = VcsSettingsModel()
144 model = VcsSettingsModel()
145 with pytest.raises(Exception) as exc_info:
145 with pytest.raises(Exception) as exc_info:
146 model.get_repo_svn_tag_patterns()
146 model.get_repo_svn_tag_patterns()
147 assert str(exc_info.value) == 'Repository is not specified'
147 assert str(exc_info.value) == 'Repository is not specified'
148
148
149 def test_get_global_settings(self):
149 def test_get_global_settings(self):
150 expected_result = {'test': 'test'}
150 expected_result = {'test': 'test'}
151 model = VcsSettingsModel()
151 model = VcsSettingsModel()
152 with mock.patch.object(model, '_collect_all_settings') as collect_mock:
152 with mock.patch.object(model, '_collect_all_settings') as collect_mock:
153 collect_mock.return_value = expected_result
153 collect_mock.return_value = expected_result
154 result = model.get_global_settings()
154 result = model.get_global_settings()
155
155
156 collect_mock.assert_called_once_with(global_=True)
156 collect_mock.assert_called_once_with(global_=True)
157 assert result == expected_result
157 assert result == expected_result
158
158
159 def test_get_repo_settings(self, repo_stub):
159 def test_get_repo_settings(self, repo_stub):
160 model = VcsSettingsModel(repo=repo_stub.repo_name)
160 model = VcsSettingsModel(repo=repo_stub.repo_name)
161 expected_result = {'test': 'test'}
161 expected_result = {'test': 'test'}
162 with mock.patch.object(model, '_collect_all_settings') as collect_mock:
162 with mock.patch.object(model, '_collect_all_settings') as collect_mock:
163 collect_mock.return_value = expected_result
163 collect_mock.return_value = expected_result
164 result = model.get_repo_settings()
164 result = model.get_repo_settings()
165
165
166 collect_mock.assert_called_once_with(global_=False)
166 collect_mock.assert_called_once_with(global_=False)
167 assert result == expected_result
167 assert result == expected_result
168
168
169 @pytest.mark.parametrize('settings, global_', [
169 @pytest.mark.parametrize('settings, global_', [
170 ('global_settings', True),
170 ('global_settings', True),
171 ('repo_settings', False)
171 ('repo_settings', False)
172 ])
172 ])
173 def test_collect_all_settings(self, settings, global_):
173 def test_collect_all_settings(self, settings, global_):
174 model = VcsSettingsModel()
174 model = VcsSettingsModel()
175 result_mock = self._mock_result()
175 result_mock = self._mock_result()
176
176
177 settings_patch = mock.patch.object(model, settings)
177 settings_patch = mock.patch.object(model, settings)
178 with settings_patch as settings_mock:
178 with settings_patch as settings_mock:
179 settings_mock.get_ui_by_section_and_key.return_value = result_mock
179 settings_mock.get_ui_by_section_and_key.return_value = result_mock
180 settings_mock.get_setting_by_name.return_value = result_mock
180 settings_mock.get_setting_by_name.return_value = result_mock
181 result = model._collect_all_settings(global_=global_)
181 result = model._collect_all_settings(global_=global_)
182
182
183 ui_settings = model.HG_SETTINGS + model.GIT_SETTINGS + model.HOOKS_SETTINGS
183 ui_settings = model.HG_SETTINGS + model.GIT_SETTINGS + model.HOOKS_SETTINGS
184 self._assert_get_settings_calls(
184 self._assert_get_settings_calls(
185 settings_mock, ui_settings, model.GENERAL_SETTINGS)
185 settings_mock, ui_settings, model.GENERAL_SETTINGS)
186 self._assert_collect_all_settings_result(
186 self._assert_collect_all_settings_result(
187 ui_settings, model.GENERAL_SETTINGS, result)
187 ui_settings, model.GENERAL_SETTINGS, result)
188
188
189 @pytest.mark.parametrize('settings, global_', [
189 @pytest.mark.parametrize('settings, global_', [
190 ('global_settings', True),
190 ('global_settings', True),
191 ('repo_settings', False)
191 ('repo_settings', False)
192 ])
192 ])
193 def test_collect_all_settings_without_empty_value(self, settings, global_):
193 def test_collect_all_settings_without_empty_value(self, settings, global_):
194 model = VcsSettingsModel()
194 model = VcsSettingsModel()
195
195
196 settings_patch = mock.patch.object(model, settings)
196 settings_patch = mock.patch.object(model, settings)
197 with settings_patch as settings_mock:
197 with settings_patch as settings_mock:
198 settings_mock.get_ui_by_section_and_key.return_value = None
198 settings_mock.get_ui_by_section_and_key.return_value = None
199 settings_mock.get_setting_by_name.return_value = None
199 settings_mock.get_setting_by_name.return_value = None
200 result = model._collect_all_settings(global_=global_)
200 result = model._collect_all_settings(global_=global_)
201
201
202 assert result == {}
202 assert result == {}
203
203
204 def _mock_result(self):
204 def _mock_result(self):
205 result_mock = mock.Mock()
205 result_mock = mock.Mock()
206 result_mock.ui_value = 'ui_value'
206 result_mock.ui_value = 'ui_value'
207 result_mock.ui_active = True
207 result_mock.ui_active = True
208 result_mock.app_settings_value = 'setting_value'
208 result_mock.app_settings_value = 'setting_value'
209 return result_mock
209 return result_mock
210
210
211 def _assert_get_settings_calls(
211 def _assert_get_settings_calls(
212 self, settings_mock, ui_settings, general_settings):
212 self, settings_mock, ui_settings, general_settings):
213 assert (
213 assert (
214 settings_mock.get_ui_by_section_and_key.call_count ==
214 settings_mock.get_ui_by_section_and_key.call_count ==
215 len(ui_settings))
215 len(ui_settings))
216 assert (
216 assert (
217 settings_mock.get_setting_by_name.call_count ==
217 settings_mock.get_setting_by_name.call_count ==
218 len(general_settings))
218 len(general_settings))
219
219
220 for section, key in ui_settings:
220 for section, key in ui_settings:
221 expected_call = mock.call(section, key)
221 expected_call = mock.call(section, key)
222 assert (
222 assert (
223 expected_call in
223 expected_call in
224 settings_mock.get_ui_by_section_and_key.call_args_list)
224 settings_mock.get_ui_by_section_and_key.call_args_list)
225
225
226 for name in general_settings:
226 for name in general_settings:
227 expected_call = mock.call(name)
227 expected_call = mock.call(name)
228 assert (
228 assert (
229 expected_call in
229 expected_call in
230 settings_mock.get_setting_by_name.call_args_list)
230 settings_mock.get_setting_by_name.call_args_list)
231
231
232 def _assert_collect_all_settings_result(
232 def _assert_collect_all_settings_result(
233 self, ui_settings, general_settings, result):
233 self, ui_settings, general_settings, result):
234 expected_result = {}
234 expected_result = {}
235 for section, key in ui_settings:
235 for section, key in ui_settings:
236 key = '{}_{}'.format(section, key.replace('.', '_'))
236 key = '{}_{}'.format(section, key.replace('.', '_'))
237
237
238 if section in ('extensions', 'hooks'):
238 if section in ('extensions', 'hooks'):
239 value = True
239 value = True
240 elif key in ['vcs_git_lfs_enabled']:
240 elif key in ['vcs_git_lfs_enabled']:
241 value = True
241 value = True
242 else:
242 else:
243 value = 'ui_value'
243 value = 'ui_value'
244 expected_result[key] = value
244 expected_result[key] = value
245
245
246 for name in general_settings:
246 for name in general_settings:
247 key = 'rhodecode_' + name
247 key = 'rhodecode_' + name
248 expected_result[key] = 'setting_value'
248 expected_result[key] = 'setting_value'
249
249
250 assert expected_result == result
250 assert expected_result == result
251
251
252
252
253 class TestCreateOrUpdateRepoHookSettings(object):
253 class TestCreateOrUpdateRepoHookSettings(object):
254 def test_create_when_no_repo_object_found(self, repo_stub):
254 def test_create_when_no_repo_object_found(self, repo_stub):
255 model = VcsSettingsModel(repo=repo_stub.repo_name)
255 model = VcsSettingsModel(repo=repo_stub.repo_name)
256
256
257 self._create_settings(model, HOOKS_FORM_DATA)
257 self._create_settings(model, HOOKS_FORM_DATA)
258
258
259 cleanup = []
259 cleanup = []
260 try:
260 try:
261 for section, key in model.HOOKS_SETTINGS:
261 for section, key in model.HOOKS_SETTINGS:
262 ui = model.repo_settings.get_ui_by_section_and_key(
262 ui = model.repo_settings.get_ui_by_section_and_key(
263 section, key)
263 section, key)
264 assert ui.ui_active is True
264 assert ui.ui_active is True
265 cleanup.append(ui)
265 cleanup.append(ui)
266 finally:
266 finally:
267 for ui in cleanup:
267 for ui in cleanup:
268 Session().delete(ui)
268 Session().delete(ui)
269 Session().commit()
269 Session().commit()
270
270
271 def test_create_raises_exception_when_data_incomplete(self, repo_stub):
271 def test_create_raises_exception_when_data_incomplete(self, repo_stub):
272 model = VcsSettingsModel(repo=repo_stub.repo_name)
272 model = VcsSettingsModel(repo=repo_stub.repo_name)
273
273
274 deleted_key = 'hooks_changegroup_repo_size'
274 deleted_key = 'hooks_changegroup_repo_size'
275 data = HOOKS_FORM_DATA.copy()
275 data = HOOKS_FORM_DATA.copy()
276 data.pop(deleted_key)
276 data.pop(deleted_key)
277
277
278 with pytest.raises(ValueError) as exc_info:
278 with pytest.raises(ValueError) as exc_info:
279 model.create_or_update_repo_hook_settings(data)
279 model.create_or_update_repo_hook_settings(data)
280 Session().commit()
281
280 msg = 'The given data does not contain {} key'.format(deleted_key)
282 msg = 'The given data does not contain {} key'.format(deleted_key)
281 assert str(exc_info.value) == msg
283 assert str(exc_info.value) == msg
282
284
283 def test_update_when_repo_object_found(self, repo_stub, settings_util):
285 def test_update_when_repo_object_found(self, repo_stub, settings_util):
284 model = VcsSettingsModel(repo=repo_stub.repo_name)
286 model = VcsSettingsModel(repo=repo_stub.repo_name)
285 for section, key in model.HOOKS_SETTINGS:
287 for section, key in model.HOOKS_SETTINGS:
286 settings_util.create_repo_rhodecode_ui(
288 settings_util.create_repo_rhodecode_ui(
287 repo_stub, section, None, key=key, active=False)
289 repo_stub, section, None, key=key, active=False)
288 model.create_or_update_repo_hook_settings(HOOKS_FORM_DATA)
290 model.create_or_update_repo_hook_settings(HOOKS_FORM_DATA)
291 Session().commit()
292
289 for section, key in model.HOOKS_SETTINGS:
293 for section, key in model.HOOKS_SETTINGS:
290 ui = model.repo_settings.get_ui_by_section_and_key(section, key)
294 ui = model.repo_settings.get_ui_by_section_and_key(section, key)
291 assert ui.ui_active is True
295 assert ui.ui_active is True
292
296
293 def _create_settings(self, model, data):
297 def _create_settings(self, model, data):
294 global_patch = mock.patch.object(model, 'global_settings')
298 global_patch = mock.patch.object(model, 'global_settings')
295 global_setting = mock.Mock()
299 global_setting = mock.Mock()
296 global_setting.ui_value = 'Test value'
300 global_setting.ui_value = 'Test value'
297 with global_patch as global_mock:
301 with global_patch as global_mock:
298 global_mock.get_ui_by_section_and_key.return_value = global_setting
302 global_mock.get_ui_by_section_and_key.return_value = global_setting
299 model.create_or_update_repo_hook_settings(HOOKS_FORM_DATA)
303 model.create_or_update_repo_hook_settings(HOOKS_FORM_DATA)
304 Session().commit()
300
305
301
306
302 class TestUpdateGlobalHookSettings(object):
307 class TestUpdateGlobalHookSettings(object):
303 def test_update_raises_exception_when_data_incomplete(self):
308 def test_update_raises_exception_when_data_incomplete(self):
304 model = VcsSettingsModel()
309 model = VcsSettingsModel()
305
310
306 deleted_key = 'hooks_changegroup_repo_size'
311 deleted_key = 'hooks_changegroup_repo_size'
307 data = HOOKS_FORM_DATA.copy()
312 data = HOOKS_FORM_DATA.copy()
308 data.pop(deleted_key)
313 data.pop(deleted_key)
309
314
310 with pytest.raises(ValueError) as exc_info:
315 with pytest.raises(ValueError) as exc_info:
311 model.update_global_hook_settings(data)
316 model.update_global_hook_settings(data)
317 Session().commit()
318
312 msg = 'The given data does not contain {} key'.format(deleted_key)
319 msg = 'The given data does not contain {} key'.format(deleted_key)
313 assert str(exc_info.value) == msg
320 assert str(exc_info.value) == msg
314
321
315 def test_update_global_hook_settings(self, settings_util):
322 def test_update_global_hook_settings(self, settings_util):
316 model = VcsSettingsModel()
323 model = VcsSettingsModel()
317 setting_mock = mock.MagicMock()
324 setting_mock = mock.MagicMock()
318 setting_mock.ui_active = False
325 setting_mock.ui_active = False
319 get_settings_patcher = mock.patch.object(
326 get_settings_patcher = mock.patch.object(
320 model.global_settings, 'get_ui_by_section_and_key',
327 model.global_settings, 'get_ui_by_section_and_key',
321 return_value=setting_mock)
328 return_value=setting_mock)
322 session_patcher = mock.patch('rhodecode.model.settings.Session')
329 session_patcher = mock.patch('rhodecode.model.settings.Session')
323 with get_settings_patcher as get_settings_mock, session_patcher:
330 with get_settings_patcher as get_settings_mock, session_patcher:
324 model.update_global_hook_settings(HOOKS_FORM_DATA)
331 model.update_global_hook_settings(HOOKS_FORM_DATA)
332 Session().commit()
333
325 assert setting_mock.ui_active is True
334 assert setting_mock.ui_active is True
326 assert get_settings_mock.call_count == 3
335 assert get_settings_mock.call_count == 3
327
336
328
337
329 class TestCreateOrUpdateRepoGeneralSettings(object):
338 class TestCreateOrUpdateRepoGeneralSettings(object):
330 def test_calls_create_or_update_general_settings(self, repo_stub):
339 def test_calls_create_or_update_general_settings(self, repo_stub):
331 model = VcsSettingsModel(repo=repo_stub.repo_name)
340 model = VcsSettingsModel(repo=repo_stub.repo_name)
332 create_patch = mock.patch.object(
341 create_patch = mock.patch.object(
333 model, '_create_or_update_general_settings')
342 model, '_create_or_update_general_settings')
334 with create_patch as create_mock:
343 with create_patch as create_mock:
335 model.create_or_update_repo_pr_settings(GENERAL_FORM_DATA)
344 model.create_or_update_repo_pr_settings(GENERAL_FORM_DATA)
345 Session().commit()
346
336 create_mock.assert_called_once_with(
347 create_mock.assert_called_once_with(
337 model.repo_settings, GENERAL_FORM_DATA)
348 model.repo_settings, GENERAL_FORM_DATA)
338
349
339 def test_raises_exception_when_repository_is_not_specified(self):
350 def test_raises_exception_when_repository_is_not_specified(self):
340 model = VcsSettingsModel()
351 model = VcsSettingsModel()
341 with pytest.raises(Exception) as exc_info:
352 with pytest.raises(Exception) as exc_info:
342 model.create_or_update_repo_pr_settings(GENERAL_FORM_DATA)
353 model.create_or_update_repo_pr_settings(GENERAL_FORM_DATA)
343 assert str(exc_info.value) == 'Repository is not specified'
354 assert str(exc_info.value) == 'Repository is not specified'
344
355
345
356
346 class TestCreateOrUpdatGlobalGeneralSettings(object):
357 class TestCreateOrUpdatGlobalGeneralSettings(object):
347 def test_calls_create_or_update_general_settings(self):
358 def test_calls_create_or_update_general_settings(self):
348 model = VcsSettingsModel()
359 model = VcsSettingsModel()
349 create_patch = mock.patch.object(
360 create_patch = mock.patch.object(
350 model, '_create_or_update_general_settings')
361 model, '_create_or_update_general_settings')
351 with create_patch as create_mock:
362 with create_patch as create_mock:
352 model.create_or_update_global_pr_settings(GENERAL_FORM_DATA)
363 model.create_or_update_global_pr_settings(GENERAL_FORM_DATA)
353 create_mock.assert_called_once_with(
364 create_mock.assert_called_once_with(
354 model.global_settings, GENERAL_FORM_DATA)
365 model.global_settings, GENERAL_FORM_DATA)
355
366
356
367
357 class TestCreateOrUpdateGeneralSettings(object):
368 class TestCreateOrUpdateGeneralSettings(object):
358 def test_create_when_no_repo_settings_found(self, repo_stub):
369 def test_create_when_no_repo_settings_found(self, repo_stub):
359 model = VcsSettingsModel(repo=repo_stub.repo_name)
370 model = VcsSettingsModel(repo=repo_stub.repo_name)
360 model._create_or_update_general_settings(
371 model._create_or_update_general_settings(
361 model.repo_settings, GENERAL_FORM_DATA)
372 model.repo_settings, GENERAL_FORM_DATA)
362
373
363 cleanup = []
374 cleanup = []
364 try:
375 try:
365 for name in model.GENERAL_SETTINGS:
376 for name in model.GENERAL_SETTINGS:
366 setting = model.repo_settings.get_setting_by_name(name)
377 setting = model.repo_settings.get_setting_by_name(name)
367 assert setting.app_settings_value is True
378 assert setting.app_settings_value is True
368 cleanup.append(setting)
379 cleanup.append(setting)
369 finally:
380 finally:
370 for setting in cleanup:
381 for setting in cleanup:
371 Session().delete(setting)
382 Session().delete(setting)
372 Session().commit()
383 Session().commit()
373
384
374 def test_create_raises_exception_when_data_incomplete(self, repo_stub):
385 def test_create_raises_exception_when_data_incomplete(self, repo_stub):
375 model = VcsSettingsModel(repo=repo_stub.repo_name)
386 model = VcsSettingsModel(repo=repo_stub.repo_name)
376
387
377 deleted_key = 'rhodecode_pr_merge_enabled'
388 deleted_key = 'rhodecode_pr_merge_enabled'
378 data = GENERAL_FORM_DATA.copy()
389 data = GENERAL_FORM_DATA.copy()
379 data.pop(deleted_key)
390 data.pop(deleted_key)
380
391
381 with pytest.raises(ValueError) as exc_info:
392 with pytest.raises(ValueError) as exc_info:
382 model._create_or_update_general_settings(model.repo_settings, data)
393 model._create_or_update_general_settings(model.repo_settings, data)
394 Session().commit()
383
395
384 msg = 'The given data does not contain {} key'.format(deleted_key)
396 msg = 'The given data does not contain {} key'.format(deleted_key)
385 assert str(exc_info.value) == msg
397 assert str(exc_info.value) == msg
386
398
387 def test_update_when_repo_setting_found(self, repo_stub, settings_util):
399 def test_update_when_repo_setting_found(self, repo_stub, settings_util):
388 model = VcsSettingsModel(repo=repo_stub.repo_name)
400 model = VcsSettingsModel(repo=repo_stub.repo_name)
389 for name in model.GENERAL_SETTINGS:
401 for name in model.GENERAL_SETTINGS:
390 settings_util.create_repo_rhodecode_setting(
402 settings_util.create_repo_rhodecode_setting(
391 repo_stub, name, False, 'bool')
403 repo_stub, name, False, 'bool')
392
404
393 model._create_or_update_general_settings(
405 model._create_or_update_general_settings(
394 model.repo_settings, GENERAL_FORM_DATA)
406 model.repo_settings, GENERAL_FORM_DATA)
407 Session().commit()
395
408
396 for name in model.GENERAL_SETTINGS:
409 for name in model.GENERAL_SETTINGS:
397 setting = model.repo_settings.get_setting_by_name(name)
410 setting = model.repo_settings.get_setting_by_name(name)
398 assert setting.app_settings_value is True
411 assert setting.app_settings_value is True
399
412
400
413
401 class TestCreateRepoSvnSettings(object):
414 class TestCreateRepoSvnSettings(object):
402 def test_calls_create_svn_settings(self, repo_stub):
415 def test_calls_create_svn_settings(self, repo_stub):
403 model = VcsSettingsModel(repo=repo_stub.repo_name)
416 model = VcsSettingsModel(repo=repo_stub.repo_name)
404 with mock.patch.object(model, '_create_svn_settings') as create_mock:
417 with mock.patch.object(model, '_create_svn_settings') as create_mock:
405 model.create_repo_svn_settings(SVN_FORM_DATA)
418 model.create_repo_svn_settings(SVN_FORM_DATA)
419 Session().commit()
420
406 create_mock.assert_called_once_with(model.repo_settings, SVN_FORM_DATA)
421 create_mock.assert_called_once_with(model.repo_settings, SVN_FORM_DATA)
407
422
408 def test_raises_exception_when_repository_is_not_specified(self):
423 def test_raises_exception_when_repository_is_not_specified(self):
409 model = VcsSettingsModel()
424 model = VcsSettingsModel()
410 with pytest.raises(Exception) as exc_info:
425 with pytest.raises(Exception) as exc_info:
411 model.create_repo_svn_settings(SVN_FORM_DATA)
426 model.create_repo_svn_settings(SVN_FORM_DATA)
427 Session().commit()
428
412 assert str(exc_info.value) == 'Repository is not specified'
429 assert str(exc_info.value) == 'Repository is not specified'
413
430
414
431
415 class TestCreateSvnSettings(object):
432 class TestCreateSvnSettings(object):
416 def test_create(self, repo_stub):
433 def test_create(self, repo_stub):
417 model = VcsSettingsModel(repo=repo_stub.repo_name)
434 model = VcsSettingsModel(repo=repo_stub.repo_name)
418 model._create_svn_settings(model.repo_settings, SVN_FORM_DATA)
435 model._create_svn_settings(model.repo_settings, SVN_FORM_DATA)
419 Session().commit()
436 Session().commit()
420
437
421 branch_ui = model.repo_settings.get_ui_by_section(
438 branch_ui = model.repo_settings.get_ui_by_section(
422 model.SVN_BRANCH_SECTION)
439 model.SVN_BRANCH_SECTION)
423 tag_ui = model.repo_settings.get_ui_by_section(
440 tag_ui = model.repo_settings.get_ui_by_section(
424 model.SVN_TAG_SECTION)
441 model.SVN_TAG_SECTION)
425
442
426 try:
443 try:
427 assert len(branch_ui) == 1
444 assert len(branch_ui) == 1
428 assert len(tag_ui) == 1
445 assert len(tag_ui) == 1
429 finally:
446 finally:
430 Session().delete(branch_ui[0])
447 Session().delete(branch_ui[0])
431 Session().delete(tag_ui[0])
448 Session().delete(tag_ui[0])
432 Session().commit()
449 Session().commit()
433
450
434 def test_create_tag(self, repo_stub):
451 def test_create_tag(self, repo_stub):
435 model = VcsSettingsModel(repo=repo_stub.repo_name)
452 model = VcsSettingsModel(repo=repo_stub.repo_name)
436 data = SVN_FORM_DATA.copy()
453 data = SVN_FORM_DATA.copy()
437 data.pop('new_svn_branch')
454 data.pop('new_svn_branch')
438 model._create_svn_settings(model.repo_settings, data)
455 model._create_svn_settings(model.repo_settings, data)
439 Session().commit()
456 Session().commit()
440
457
441 branch_ui = model.repo_settings.get_ui_by_section(
458 branch_ui = model.repo_settings.get_ui_by_section(
442 model.SVN_BRANCH_SECTION)
459 model.SVN_BRANCH_SECTION)
443 tag_ui = model.repo_settings.get_ui_by_section(
460 tag_ui = model.repo_settings.get_ui_by_section(
444 model.SVN_TAG_SECTION)
461 model.SVN_TAG_SECTION)
445
462
446 try:
463 try:
447 assert len(branch_ui) == 0
464 assert len(branch_ui) == 0
448 assert len(tag_ui) == 1
465 assert len(tag_ui) == 1
449 finally:
466 finally:
450 Session().delete(tag_ui[0])
467 Session().delete(tag_ui[0])
451 Session().commit()
468 Session().commit()
452
469
453 def test_create_nothing_when_no_svn_settings_specified(self, repo_stub):
470 def test_create_nothing_when_no_svn_settings_specified(self, repo_stub):
454 model = VcsSettingsModel(repo=repo_stub.repo_name)
471 model = VcsSettingsModel(repo=repo_stub.repo_name)
455 model._create_svn_settings(model.repo_settings, {})
472 model._create_svn_settings(model.repo_settings, {})
456 Session().commit()
473 Session().commit()
457
474
458 branch_ui = model.repo_settings.get_ui_by_section(
475 branch_ui = model.repo_settings.get_ui_by_section(
459 model.SVN_BRANCH_SECTION)
476 model.SVN_BRANCH_SECTION)
460 tag_ui = model.repo_settings.get_ui_by_section(
477 tag_ui = model.repo_settings.get_ui_by_section(
461 model.SVN_TAG_SECTION)
478 model.SVN_TAG_SECTION)
462
479
463 assert len(branch_ui) == 0
480 assert len(branch_ui) == 0
464 assert len(tag_ui) == 0
481 assert len(tag_ui) == 0
465
482
466 def test_create_nothing_when_empty_settings_specified(self, repo_stub):
483 def test_create_nothing_when_empty_settings_specified(self, repo_stub):
467 model = VcsSettingsModel(repo=repo_stub.repo_name)
484 model = VcsSettingsModel(repo=repo_stub.repo_name)
468 data = {
485 data = {
469 'new_svn_branch': '',
486 'new_svn_branch': '',
470 'new_svn_tag': ''
487 'new_svn_tag': ''
471 }
488 }
472 model._create_svn_settings(model.repo_settings, data)
489 model._create_svn_settings(model.repo_settings, data)
473 Session().commit()
490 Session().commit()
474
491
475 branch_ui = model.repo_settings.get_ui_by_section(
492 branch_ui = model.repo_settings.get_ui_by_section(
476 model.SVN_BRANCH_SECTION)
493 model.SVN_BRANCH_SECTION)
477 tag_ui = model.repo_settings.get_ui_by_section(
494 tag_ui = model.repo_settings.get_ui_by_section(
478 model.SVN_TAG_SECTION)
495 model.SVN_TAG_SECTION)
479
496
480 assert len(branch_ui) == 0
497 assert len(branch_ui) == 0
481 assert len(tag_ui) == 0
498 assert len(tag_ui) == 0
482
499
483
500
484 class TestCreateOrUpdateUi(object):
501 class TestCreateOrUpdateUi(object):
485 def test_create(self, repo_stub):
502 def test_create(self, repo_stub):
486 model = VcsSettingsModel(repo=repo_stub.repo_name)
503 model = VcsSettingsModel(repo=repo_stub.repo_name)
487 model._create_or_update_ui(
504 model._create_or_update_ui(
488 model.repo_settings, 'test-section', 'test-key', active=False,
505 model.repo_settings, 'test-section', 'test-key', active=False,
489 value='False')
506 value='False')
490 Session().commit()
507 Session().commit()
491
508
492 created_ui = model.repo_settings.get_ui_by_section_and_key(
509 created_ui = model.repo_settings.get_ui_by_section_and_key(
493 'test-section', 'test-key')
510 'test-section', 'test-key')
494
511
495 try:
512 try:
496 assert created_ui.ui_active is False
513 assert created_ui.ui_active is False
497 assert str2bool(created_ui.ui_value) is False
514 assert str2bool(created_ui.ui_value) is False
498 finally:
515 finally:
499 Session().delete(created_ui)
516 Session().delete(created_ui)
500 Session().commit()
517 Session().commit()
501
518
502 def test_update(self, repo_stub, settings_util):
519 def test_update(self, repo_stub, settings_util):
503 model = VcsSettingsModel(repo=repo_stub.repo_name)
520 model = VcsSettingsModel(repo=repo_stub.repo_name)
504 # care about only 3 first settings
521 # care about only 3 first settings
505 largefiles, phases, evolve = model.HG_SETTINGS[:3]
522 largefiles, phases, evolve = model.HG_SETTINGS[:3]
506
523
507 section = 'test-section'
524 section = 'test-section'
508 key = 'test-key'
525 key = 'test-key'
509 settings_util.create_repo_rhodecode_ui(
526 settings_util.create_repo_rhodecode_ui(
510 repo_stub, section, 'True', key=key, active=True)
527 repo_stub, section, 'True', key=key, active=True)
511
528
512 model._create_or_update_ui(
529 model._create_or_update_ui(
513 model.repo_settings, section, key, active=False, value='False')
530 model.repo_settings, section, key, active=False, value='False')
514 Session().commit()
531 Session().commit()
515
532
516 created_ui = model.repo_settings.get_ui_by_section_and_key(
533 created_ui = model.repo_settings.get_ui_by_section_and_key(
517 section, key)
534 section, key)
518 assert created_ui.ui_active is False
535 assert created_ui.ui_active is False
519 assert str2bool(created_ui.ui_value) is False
536 assert str2bool(created_ui.ui_value) is False
520
537
521
538
522 class TestCreateOrUpdateRepoHgSettings(object):
539 class TestCreateOrUpdateRepoHgSettings(object):
523 FORM_DATA = {
540 FORM_DATA = {
524 'extensions_largefiles': False,
541 'extensions_largefiles': False,
525 'extensions_evolve': False,
542 'extensions_evolve': False,
526 'phases_publish': False
543 'phases_publish': False
527 }
544 }
528
545
529 def test_creates_repo_hg_settings_when_data_is_correct(self, repo_stub):
546 def test_creates_repo_hg_settings_when_data_is_correct(self, repo_stub):
530 model = VcsSettingsModel(repo=repo_stub.repo_name)
547 model = VcsSettingsModel(repo=repo_stub.repo_name)
531 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
548 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
532 model.create_or_update_repo_hg_settings(self.FORM_DATA)
549 model.create_or_update_repo_hg_settings(self.FORM_DATA)
533 expected_calls = [
550 expected_calls = [
534 mock.call(model.repo_settings, 'extensions', 'largefiles', active=False, value=''),
551 mock.call(model.repo_settings, 'extensions', 'largefiles', active=False, value=''),
535 mock.call(model.repo_settings, 'extensions', 'evolve', active=False, value=''),
552 mock.call(model.repo_settings, 'extensions', 'evolve', active=False, value=''),
536 mock.call(model.repo_settings, 'experimental', 'evolution', active=False, value=''),
553 mock.call(model.repo_settings, 'experimental', 'evolution', active=False, value=''),
537 mock.call(model.repo_settings, 'experimental', 'evolution.exchange', active=False, value='no'),
554 mock.call(model.repo_settings, 'experimental', 'evolution.exchange', active=False, value='no'),
538 mock.call(model.repo_settings, 'extensions', 'topic', active=False, value=''),
555 mock.call(model.repo_settings, 'extensions', 'topic', active=False, value=''),
539 mock.call(model.repo_settings, 'phases', 'publish', value='False'),
556 mock.call(model.repo_settings, 'phases', 'publish', value='False'),
540 ]
557 ]
541 assert expected_calls == create_mock.call_args_list
558 assert expected_calls == create_mock.call_args_list
542
559
543 @pytest.mark.parametrize('field_to_remove', FORM_DATA.keys())
560 @pytest.mark.parametrize('field_to_remove', FORM_DATA.keys())
544 def test_key_is_not_found(self, repo_stub, field_to_remove):
561 def test_key_is_not_found(self, repo_stub, field_to_remove):
545 model = VcsSettingsModel(repo=repo_stub.repo_name)
562 model = VcsSettingsModel(repo=repo_stub.repo_name)
546 data = self.FORM_DATA.copy()
563 data = self.FORM_DATA.copy()
547 data.pop(field_to_remove)
564 data.pop(field_to_remove)
548 with pytest.raises(ValueError) as exc_info:
565 with pytest.raises(ValueError) as exc_info:
549 model.create_or_update_repo_hg_settings(data)
566 model.create_or_update_repo_hg_settings(data)
567 Session().commit()
568
550 expected_message = 'The given data does not contain {} key'.format(
569 expected_message = 'The given data does not contain {} key'.format(
551 field_to_remove)
570 field_to_remove)
552 assert str(exc_info.value) == expected_message
571 assert str(exc_info.value) == expected_message
553
572
554 def test_create_raises_exception_when_repository_not_specified(self):
573 def test_create_raises_exception_when_repository_not_specified(self):
555 model = VcsSettingsModel()
574 model = VcsSettingsModel()
556 with pytest.raises(Exception) as exc_info:
575 with pytest.raises(Exception) as exc_info:
557 model.create_or_update_repo_hg_settings(self.FORM_DATA)
576 model.create_or_update_repo_hg_settings(self.FORM_DATA)
577 Session().commit()
578
558 assert str(exc_info.value) == 'Repository is not specified'
579 assert str(exc_info.value) == 'Repository is not specified'
559
580
560
581
561 class TestUpdateGlobalSslSetting(object):
582 class TestUpdateGlobalSslSetting(object):
562 def test_updates_global_hg_settings(self):
583 def test_updates_global_hg_settings(self):
563 model = VcsSettingsModel()
584 model = VcsSettingsModel()
564 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
585 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
565 model.update_global_ssl_setting('False')
586 model.update_global_ssl_setting('False')
587 Session().commit()
588
566 create_mock.assert_called_once_with(
589 create_mock.assert_called_once_with(
567 model.global_settings, 'web', 'push_ssl', value='False')
590 model.global_settings, 'web', 'push_ssl', value='False')
568
591
569
592
570 class TestUpdateGlobalPathSetting(object):
593 class TestUpdateGlobalPathSetting(object):
571 def test_updates_global_path_settings(self):
594 def test_updates_global_path_settings(self):
572 model = VcsSettingsModel()
595 model = VcsSettingsModel()
573 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
596 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
574 model.update_global_path_setting('False')
597 model.update_global_path_setting('False')
598 Session().commit()
599
575 create_mock.assert_called_once_with(
600 create_mock.assert_called_once_with(
576 model.global_settings, 'paths', '/', value='False')
601 model.global_settings, 'paths', '/', value='False')
577
602
578
603
579 class TestCreateOrUpdateGlobalHgSettings(object):
604 class TestCreateOrUpdateGlobalHgSettings(object):
580 FORM_DATA = {
605 FORM_DATA = {
581 'extensions_largefiles': False,
606 'extensions_largefiles': False,
582 'largefiles_usercache': '/example/largefiles-store',
607 'largefiles_usercache': '/example/largefiles-store',
583 'phases_publish': False,
608 'phases_publish': False,
584 'extensions_hgsubversion': False,
609 'extensions_hgsubversion': False,
585 'extensions_evolve': False
610 'extensions_evolve': False
586 }
611 }
587
612
588 def test_creates_repo_hg_settings_when_data_is_correct(self):
613 def test_creates_repo_hg_settings_when_data_is_correct(self):
589 model = VcsSettingsModel()
614 model = VcsSettingsModel()
590 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
615 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
591 model.create_or_update_global_hg_settings(self.FORM_DATA)
616 model.create_or_update_global_hg_settings(self.FORM_DATA)
617 Session().commit()
618
592 expected_calls = [
619 expected_calls = [
593 mock.call(model.global_settings, 'extensions', 'largefiles', active=False, value=''),
620 mock.call(model.global_settings, 'extensions', 'largefiles', active=False, value=''),
594 mock.call(model.global_settings, 'largefiles', 'usercache', value='/example/largefiles-store'),
621 mock.call(model.global_settings, 'largefiles', 'usercache', value='/example/largefiles-store'),
595 mock.call(model.global_settings, 'phases', 'publish', value='False'),
622 mock.call(model.global_settings, 'phases', 'publish', value='False'),
596 mock.call(model.global_settings, 'extensions', 'hgsubversion', active=False),
623 mock.call(model.global_settings, 'extensions', 'hgsubversion', active=False),
597 mock.call(model.global_settings, 'extensions', 'evolve', active=False, value=''),
624 mock.call(model.global_settings, 'extensions', 'evolve', active=False, value=''),
598 mock.call(model.global_settings, 'experimental', 'evolution', active=False, value=''),
625 mock.call(model.global_settings, 'experimental', 'evolution', active=False, value=''),
599 mock.call(model.global_settings, 'experimental', 'evolution.exchange', active=False, value='no'),
626 mock.call(model.global_settings, 'experimental', 'evolution.exchange', active=False, value='no'),
600 mock.call(model.global_settings, 'extensions', 'topic', active=False, value=''),
627 mock.call(model.global_settings, 'extensions', 'topic', active=False, value=''),
601 ]
628 ]
602
629
603 assert expected_calls == create_mock.call_args_list
630 assert expected_calls == create_mock.call_args_list
604
631
605 @pytest.mark.parametrize('field_to_remove', FORM_DATA.keys())
632 @pytest.mark.parametrize('field_to_remove', FORM_DATA.keys())
606 def test_key_is_not_found(self, repo_stub, field_to_remove):
633 def test_key_is_not_found(self, repo_stub, field_to_remove):
607 model = VcsSettingsModel(repo=repo_stub.repo_name)
634 model = VcsSettingsModel(repo=repo_stub.repo_name)
608 data = self.FORM_DATA.copy()
635 data = self.FORM_DATA.copy()
609 data.pop(field_to_remove)
636 data.pop(field_to_remove)
610 with pytest.raises(Exception) as exc_info:
637 with pytest.raises(Exception) as exc_info:
611 model.create_or_update_global_hg_settings(data)
638 model.create_or_update_global_hg_settings(data)
639 Session().commit()
640
612 expected_message = 'The given data does not contain {} key'.format(
641 expected_message = 'The given data does not contain {} key'.format(
613 field_to_remove)
642 field_to_remove)
614 assert str(exc_info.value) == expected_message
643 assert str(exc_info.value) == expected_message
615
644
616
645
617 class TestCreateOrUpdateGlobalGitSettings(object):
646 class TestCreateOrUpdateGlobalGitSettings(object):
618 FORM_DATA = {
647 FORM_DATA = {
619 'vcs_git_lfs_enabled': False,
648 'vcs_git_lfs_enabled': False,
620 'vcs_git_lfs_store_location': '/example/lfs-store',
649 'vcs_git_lfs_store_location': '/example/lfs-store',
621 }
650 }
622
651
623 def test_creates_repo_hg_settings_when_data_is_correct(self):
652 def test_creates_repo_hg_settings_when_data_is_correct(self):
624 model = VcsSettingsModel()
653 model = VcsSettingsModel()
625 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
654 with mock.patch.object(model, '_create_or_update_ui') as create_mock:
626 model.create_or_update_global_git_settings(self.FORM_DATA)
655 model.create_or_update_global_git_settings(self.FORM_DATA)
656 Session().commit()
657
627 expected_calls = [
658 expected_calls = [
628 mock.call(model.global_settings, 'vcs_git_lfs', 'enabled', active=False, value=False),
659 mock.call(model.global_settings, 'vcs_git_lfs', 'enabled', active=False, value=False),
629 mock.call(model.global_settings, 'vcs_git_lfs', 'store_location', value='/example/lfs-store'),
660 mock.call(model.global_settings, 'vcs_git_lfs', 'store_location', value='/example/lfs-store'),
630 ]
661 ]
631 assert expected_calls == create_mock.call_args_list
662 assert expected_calls == create_mock.call_args_list
632
663
633
664
634 class TestDeleteRepoSvnPattern(object):
665 class TestDeleteRepoSvnPattern(object):
635 def test_success_when_repo_is_set(self, backend_svn, settings_util):
666 def test_success_when_repo_is_set(self, backend_svn, settings_util):
636 repo = backend_svn.create_repo()
667 repo = backend_svn.create_repo()
637 repo_name = repo.repo_name
668 repo_name = repo.repo_name
638
669
639 model = VcsSettingsModel(repo=repo_name)
670 model = VcsSettingsModel(repo=repo_name)
640 entry = settings_util.create_repo_rhodecode_ui(
671 entry = settings_util.create_repo_rhodecode_ui(
641 repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'svn-branch')
672 repo, VcsSettingsModel.SVN_BRANCH_SECTION, 'svn-branch')
642 Session().commit()
673 Session().commit()
643
674
644 model.delete_repo_svn_pattern(entry.ui_id)
675 model.delete_repo_svn_pattern(entry.ui_id)
645
676
646 def test_fail_when_delete_id_from_other_repo(self, backend_svn):
677 def test_fail_when_delete_id_from_other_repo(self, backend_svn):
647 repo_name = backend_svn.repo_name
678 repo_name = backend_svn.repo_name
648 model = VcsSettingsModel(repo=repo_name)
679 model = VcsSettingsModel(repo=repo_name)
649 delete_ui_patch = mock.patch.object(model.repo_settings, 'delete_ui')
680 delete_ui_patch = mock.patch.object(model.repo_settings, 'delete_ui')
650 with delete_ui_patch as delete_ui_mock:
681 with delete_ui_patch as delete_ui_mock:
651 model.delete_repo_svn_pattern(123)
682 model.delete_repo_svn_pattern(123)
683 Session().commit()
684
652 delete_ui_mock.assert_called_once_with(-1)
685 delete_ui_mock.assert_called_once_with(-1)
653
686
654 def test_raises_exception_when_repository_is_not_specified(self):
687 def test_raises_exception_when_repository_is_not_specified(self):
655 model = VcsSettingsModel()
688 model = VcsSettingsModel()
656 with pytest.raises(Exception) as exc_info:
689 with pytest.raises(Exception) as exc_info:
657 model.delete_repo_svn_pattern(123)
690 model.delete_repo_svn_pattern(123)
658 assert str(exc_info.value) == 'Repository is not specified'
691 assert str(exc_info.value) == 'Repository is not specified'
659
692
660
693
661 class TestDeleteGlobalSvnPattern(object):
694 class TestDeleteGlobalSvnPattern(object):
662 def test_delete_global_svn_pattern_calls_delete_ui(self):
695 def test_delete_global_svn_pattern_calls_delete_ui(self):
663 model = VcsSettingsModel()
696 model = VcsSettingsModel()
664 delete_ui_patch = mock.patch.object(model.global_settings, 'delete_ui')
697 delete_ui_patch = mock.patch.object(model.global_settings, 'delete_ui')
665 with delete_ui_patch as delete_ui_mock:
698 with delete_ui_patch as delete_ui_mock:
666 model.delete_global_svn_pattern(123)
699 model.delete_global_svn_pattern(123)
667 delete_ui_mock.assert_called_once_with(123)
700 delete_ui_mock.assert_called_once_with(123)
668
701
669
702
670 class TestFilterUiSettings(object):
703 class TestFilterUiSettings(object):
671 def test_settings_are_filtered(self):
704 def test_settings_are_filtered(self):
672 model = VcsSettingsModel()
705 model = VcsSettingsModel()
673 repo_settings = [
706 repo_settings = [
674 UiSetting('extensions', 'largefiles', '', True),
707 UiSetting('extensions', 'largefiles', '', True),
675 UiSetting('phases', 'publish', 'True', True),
708 UiSetting('phases', 'publish', 'True', True),
676 UiSetting('hooks', 'changegroup.repo_size', 'hook', True),
709 UiSetting('hooks', 'changegroup.repo_size', 'hook', True),
677 UiSetting('hooks', 'changegroup.push_logger', 'hook', True),
710 UiSetting('hooks', 'changegroup.push_logger', 'hook', True),
678 UiSetting('hooks', 'outgoing.pull_logger', 'hook', True),
711 UiSetting('hooks', 'outgoing.pull_logger', 'hook', True),
679 UiSetting(
712 UiSetting(
680 'vcs_svn_branch', '84223c972204fa545ca1b22dac7bef5b68d7442d',
713 'vcs_svn_branch', '84223c972204fa545ca1b22dac7bef5b68d7442d',
681 'test_branch', True),
714 'test_branch', True),
682 UiSetting(
715 UiSetting(
683 'vcs_svn_tag', '84229c972204fa545ca1b22dac7bef5b68d7442d',
716 'vcs_svn_tag', '84229c972204fa545ca1b22dac7bef5b68d7442d',
684 'test_tag', True),
717 'test_tag', True),
685 ]
718 ]
686 non_repo_settings = [
719 non_repo_settings = [
687 UiSetting('largefiles', 'usercache', '/example/largefiles-store', True),
720 UiSetting('largefiles', 'usercache', '/example/largefiles-store', True),
688 UiSetting('test', 'outgoing.pull_logger', 'hook', True),
721 UiSetting('test', 'outgoing.pull_logger', 'hook', True),
689 UiSetting('hooks', 'test2', 'hook', True),
722 UiSetting('hooks', 'test2', 'hook', True),
690 UiSetting(
723 UiSetting(
691 'vcs_svn_repo', '84229c972204fa545ca1b22dac7bef5b68d7442d',
724 'vcs_svn_repo', '84229c972204fa545ca1b22dac7bef5b68d7442d',
692 'test_tag', True),
725 'test_tag', True),
693 ]
726 ]
694 settings = repo_settings + non_repo_settings
727 settings = repo_settings + non_repo_settings
695 filtered_settings = model._filter_ui_settings(settings)
728 filtered_settings = model._filter_ui_settings(settings)
696 assert sorted(filtered_settings) == sorted(repo_settings)
729 assert sorted(filtered_settings) == sorted(repo_settings)
697
730
698
731
699 class TestFilterGeneralSettings(object):
732 class TestFilterGeneralSettings(object):
700 def test_settings_are_filtered(self):
733 def test_settings_are_filtered(self):
701 model = VcsSettingsModel()
734 model = VcsSettingsModel()
702 settings = {
735 settings = {
703 'rhodecode_abcde': 'value1',
736 'rhodecode_abcde': 'value1',
704 'rhodecode_vwxyz': 'value2',
737 'rhodecode_vwxyz': 'value2',
705 }
738 }
706 general_settings = {
739 general_settings = {
707 'rhodecode_{}'.format(key): 'value'
740 'rhodecode_{}'.format(key): 'value'
708 for key in VcsSettingsModel.GENERAL_SETTINGS
741 for key in VcsSettingsModel.GENERAL_SETTINGS
709 }
742 }
710 settings.update(general_settings)
743 settings.update(general_settings)
711
744
712 filtered_settings = model._filter_general_settings(general_settings)
745 filtered_settings = model._filter_general_settings(general_settings)
713 assert sorted(filtered_settings) == sorted(general_settings)
746 assert sorted(filtered_settings) == sorted(general_settings)
714
747
715
748
716 class TestGetRepoUiSettings(object):
749 class TestGetRepoUiSettings(object):
717 def test_global_uis_are_returned_when_no_repo_uis_found(
750 def test_global_uis_are_returned_when_no_repo_uis_found(
718 self, repo_stub):
751 self, repo_stub):
719 model = VcsSettingsModel(repo=repo_stub.repo_name)
752 model = VcsSettingsModel(repo=repo_stub.repo_name)
720 result = model.get_repo_ui_settings()
753 result = model.get_repo_ui_settings()
721 svn_sections = (
754 svn_sections = (
722 VcsSettingsModel.SVN_TAG_SECTION,
755 VcsSettingsModel.SVN_TAG_SECTION,
723 VcsSettingsModel.SVN_BRANCH_SECTION)
756 VcsSettingsModel.SVN_BRANCH_SECTION)
724 expected_result = [
757 expected_result = [
725 s for s in model.global_settings.get_ui()
758 s for s in model.global_settings.get_ui()
726 if s.section not in svn_sections]
759 if s.section not in svn_sections]
727 assert sorted(result) == sorted(expected_result)
760 assert sorted(result) == sorted(expected_result)
728
761
729 def test_repo_uis_are_overriding_global_uis(
762 def test_repo_uis_are_overriding_global_uis(
730 self, repo_stub, settings_util):
763 self, repo_stub, settings_util):
731 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
764 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
732 settings_util.create_repo_rhodecode_ui(
765 settings_util.create_repo_rhodecode_ui(
733 repo_stub, section, 'repo', key=key, active=False)
766 repo_stub, section, 'repo', key=key, active=False)
734 model = VcsSettingsModel(repo=repo_stub.repo_name)
767 model = VcsSettingsModel(repo=repo_stub.repo_name)
735 result = model.get_repo_ui_settings()
768 result = model.get_repo_ui_settings()
736 for setting in result:
769 for setting in result:
737 locator = (setting.section, setting.key)
770 locator = (setting.section, setting.key)
738 if locator in VcsSettingsModel.HOOKS_SETTINGS:
771 if locator in VcsSettingsModel.HOOKS_SETTINGS:
739 assert setting.value == 'repo'
772 assert setting.value == 'repo'
740
773
741 assert setting.active is False
774 assert setting.active is False
742
775
743 def test_global_svn_patterns_are_not_in_list(
776 def test_global_svn_patterns_are_not_in_list(
744 self, repo_stub, settings_util):
777 self, repo_stub, settings_util):
745 svn_sections = (
778 svn_sections = (
746 VcsSettingsModel.SVN_TAG_SECTION,
779 VcsSettingsModel.SVN_TAG_SECTION,
747 VcsSettingsModel.SVN_BRANCH_SECTION)
780 VcsSettingsModel.SVN_BRANCH_SECTION)
748 for section in svn_sections:
781 for section in svn_sections:
749 settings_util.create_rhodecode_ui(
782 settings_util.create_rhodecode_ui(
750 section, 'repo', key='deadbeef' + section, active=False)
783 section, 'repo', key='deadbeef' + section, active=False)
784 Session().commit()
785
751 model = VcsSettingsModel(repo=repo_stub.repo_name)
786 model = VcsSettingsModel(repo=repo_stub.repo_name)
752 result = model.get_repo_ui_settings()
787 result = model.get_repo_ui_settings()
753 for setting in result:
788 for setting in result:
754 assert setting.section not in svn_sections
789 assert setting.section not in svn_sections
755
790
756 def test_repo_uis_filtered_by_section_are_returned(
791 def test_repo_uis_filtered_by_section_are_returned(
757 self, repo_stub, settings_util):
792 self, repo_stub, settings_util):
758 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
793 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
759 settings_util.create_repo_rhodecode_ui(
794 settings_util.create_repo_rhodecode_ui(
760 repo_stub, section, 'repo', key=key, active=False)
795 repo_stub, section, 'repo', key=key, active=False)
761 model = VcsSettingsModel(repo=repo_stub.repo_name)
796 model = VcsSettingsModel(repo=repo_stub.repo_name)
762 section, key = VcsSettingsModel.HOOKS_SETTINGS[0]
797 section, key = VcsSettingsModel.HOOKS_SETTINGS[0]
763 result = model.get_repo_ui_settings(section=section)
798 result = model.get_repo_ui_settings(section=section)
764 for setting in result:
799 for setting in result:
765 assert setting.section == section
800 assert setting.section == section
766
801
767 def test_repo_uis_filtered_by_key_are_returned(
802 def test_repo_uis_filtered_by_key_are_returned(
768 self, repo_stub, settings_util):
803 self, repo_stub, settings_util):
769 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
804 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
770 settings_util.create_repo_rhodecode_ui(
805 settings_util.create_repo_rhodecode_ui(
771 repo_stub, section, 'repo', key=key, active=False)
806 repo_stub, section, 'repo', key=key, active=False)
772 model = VcsSettingsModel(repo=repo_stub.repo_name)
807 model = VcsSettingsModel(repo=repo_stub.repo_name)
773 section, key = VcsSettingsModel.HOOKS_SETTINGS[0]
808 section, key = VcsSettingsModel.HOOKS_SETTINGS[0]
774 result = model.get_repo_ui_settings(key=key)
809 result = model.get_repo_ui_settings(key=key)
775 for setting in result:
810 for setting in result:
776 assert setting.key == key
811 assert setting.key == key
777
812
778 def test_raises_exception_when_repository_is_not_specified(self):
813 def test_raises_exception_when_repository_is_not_specified(self):
779 model = VcsSettingsModel()
814 model = VcsSettingsModel()
780 with pytest.raises(Exception) as exc_info:
815 with pytest.raises(Exception) as exc_info:
781 model.get_repo_ui_settings()
816 model.get_repo_ui_settings()
782 assert str(exc_info.value) == 'Repository is not specified'
817 assert str(exc_info.value) == 'Repository is not specified'
783
818
784
819
785 class TestGetRepoGeneralSettings(object):
820 class TestGetRepoGeneralSettings(object):
786 def test_global_settings_are_returned_when_no_repo_settings_found(
821 def test_global_settings_are_returned_when_no_repo_settings_found(
787 self, repo_stub):
822 self, repo_stub):
788 model = VcsSettingsModel(repo=repo_stub.repo_name)
823 model = VcsSettingsModel(repo=repo_stub.repo_name)
789 result = model.get_repo_general_settings()
824 result = model.get_repo_general_settings()
790 expected_result = model.global_settings.get_all_settings()
825 expected_result = model.global_settings.get_all_settings()
791 assert sorted(result) == sorted(expected_result)
826 assert sorted(result) == sorted(expected_result)
792
827
793 def test_repo_uis_are_overriding_global_uis(
828 def test_repo_uis_are_overriding_global_uis(
794 self, repo_stub, settings_util):
829 self, repo_stub, settings_util):
795 for key in VcsSettingsModel.GENERAL_SETTINGS:
830 for key in VcsSettingsModel.GENERAL_SETTINGS:
796 settings_util.create_repo_rhodecode_setting(
831 settings_util.create_repo_rhodecode_setting(
797 repo_stub, key, 'abcde', type_='unicode')
832 repo_stub, key, 'abcde', type_='unicode')
833 Session().commit()
834
798 model = VcsSettingsModel(repo=repo_stub.repo_name)
835 model = VcsSettingsModel(repo=repo_stub.repo_name)
799 result = model.get_repo_ui_settings()
836 result = model.get_repo_ui_settings()
800 for key in result:
837 for key in result:
801 if key in VcsSettingsModel.GENERAL_SETTINGS:
838 if key in VcsSettingsModel.GENERAL_SETTINGS:
802 assert result[key] == 'abcde'
839 assert result[key] == 'abcde'
803
840
804 def test_raises_exception_when_repository_is_not_specified(self):
841 def test_raises_exception_when_repository_is_not_specified(self):
805 model = VcsSettingsModel()
842 model = VcsSettingsModel()
806 with pytest.raises(Exception) as exc_info:
843 with pytest.raises(Exception) as exc_info:
807 model.get_repo_general_settings()
844 model.get_repo_general_settings()
808 assert str(exc_info.value) == 'Repository is not specified'
845 assert str(exc_info.value) == 'Repository is not specified'
809
846
810
847
811 class TestGetGlobalGeneralSettings(object):
848 class TestGetGlobalGeneralSettings(object):
812 def test_global_settings_are_returned(self, repo_stub):
849 def test_global_settings_are_returned(self, repo_stub):
813 model = VcsSettingsModel()
850 model = VcsSettingsModel()
814 result = model.get_global_general_settings()
851 result = model.get_global_general_settings()
815 expected_result = model.global_settings.get_all_settings()
852 expected_result = model.global_settings.get_all_settings()
816 assert sorted(result) == sorted(expected_result)
853 assert sorted(result) == sorted(expected_result)
817
854
818 def test_repo_uis_are_not_overriding_global_uis(
855 def test_repo_uis_are_not_overriding_global_uis(
819 self, repo_stub, settings_util):
856 self, repo_stub, settings_util):
820 for key in VcsSettingsModel.GENERAL_SETTINGS:
857 for key in VcsSettingsModel.GENERAL_SETTINGS:
821 settings_util.create_repo_rhodecode_setting(
858 settings_util.create_repo_rhodecode_setting(
822 repo_stub, key, 'abcde', type_='unicode')
859 repo_stub, key, 'abcde', type_='unicode')
860 Session().commit()
861
823 model = VcsSettingsModel(repo=repo_stub.repo_name)
862 model = VcsSettingsModel(repo=repo_stub.repo_name)
824 result = model.get_global_general_settings()
863 result = model.get_global_general_settings()
825 expected_result = model.global_settings.get_all_settings()
864 expected_result = model.global_settings.get_all_settings()
826 assert sorted(result) == sorted(expected_result)
865 assert sorted(result) == sorted(expected_result)
827
866
828
867
829 class TestGetGlobalUiSettings(object):
868 class TestGetGlobalUiSettings(object):
830 def test_global_uis_are_returned(self, repo_stub):
869 def test_global_uis_are_returned(self, repo_stub):
831 model = VcsSettingsModel()
870 model = VcsSettingsModel()
832 result = model.get_global_ui_settings()
871 result = model.get_global_ui_settings()
833 expected_result = model.global_settings.get_ui()
872 expected_result = model.global_settings.get_ui()
834 assert sorted(result) == sorted(expected_result)
873 assert sorted(result) == sorted(expected_result)
835
874
836 def test_repo_uis_are_not_overriding_global_uis(
875 def test_repo_uis_are_not_overriding_global_uis(
837 self, repo_stub, settings_util):
876 self, repo_stub, settings_util):
838 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
877 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
839 settings_util.create_repo_rhodecode_ui(
878 settings_util.create_repo_rhodecode_ui(
840 repo_stub, section, 'repo', key=key, active=False)
879 repo_stub, section, 'repo', key=key, active=False)
880 Session().commit()
881
841 model = VcsSettingsModel(repo=repo_stub.repo_name)
882 model = VcsSettingsModel(repo=repo_stub.repo_name)
842 result = model.get_global_ui_settings()
883 result = model.get_global_ui_settings()
843 expected_result = model.global_settings.get_ui()
884 expected_result = model.global_settings.get_ui()
844 assert sorted(result) == sorted(expected_result)
885 assert sorted(result) == sorted(expected_result)
845
886
846 def test_ui_settings_filtered_by_section(
887 def test_ui_settings_filtered_by_section(
847 self, repo_stub, settings_util):
888 self, repo_stub, settings_util):
848 model = VcsSettingsModel(repo=repo_stub.repo_name)
889 model = VcsSettingsModel(repo=repo_stub.repo_name)
849 section, key = VcsSettingsModel.HOOKS_SETTINGS[0]
890 section, key = VcsSettingsModel.HOOKS_SETTINGS[0]
850 result = model.get_global_ui_settings(section=section)
891 result = model.get_global_ui_settings(section=section)
851 expected_result = model.global_settings.get_ui(section=section)
892 expected_result = model.global_settings.get_ui(section=section)
852 assert sorted(result) == sorted(expected_result)
893 assert sorted(result) == sorted(expected_result)
853
894
854 def test_ui_settings_filtered_by_key(
895 def test_ui_settings_filtered_by_key(
855 self, repo_stub, settings_util):
896 self, repo_stub, settings_util):
856 model = VcsSettingsModel(repo=repo_stub.repo_name)
897 model = VcsSettingsModel(repo=repo_stub.repo_name)
857 section, key = VcsSettingsModel.HOOKS_SETTINGS[0]
898 section, key = VcsSettingsModel.HOOKS_SETTINGS[0]
858 result = model.get_global_ui_settings(key=key)
899 result = model.get_global_ui_settings(key=key)
859 expected_result = model.global_settings.get_ui(key=key)
900 expected_result = model.global_settings.get_ui(key=key)
860 assert sorted(result) == sorted(expected_result)
901 assert sorted(result) == sorted(expected_result)
861
902
862
903
863 class TestGetGeneralSettings(object):
904 class TestGetGeneralSettings(object):
864 def test_global_settings_are_returned_when_inherited_is_true(
905 def test_global_settings_are_returned_when_inherited_is_true(
865 self, repo_stub, settings_util):
906 self, repo_stub, settings_util):
866 model = VcsSettingsModel(repo=repo_stub.repo_name)
907 model = VcsSettingsModel(repo=repo_stub.repo_name)
867 model.inherit_global_settings = True
908 model.inherit_global_settings = True
868 for key in VcsSettingsModel.GENERAL_SETTINGS:
909 for key in VcsSettingsModel.GENERAL_SETTINGS:
869 settings_util.create_repo_rhodecode_setting(
910 settings_util.create_repo_rhodecode_setting(
870 repo_stub, key, 'abcde', type_='unicode')
911 repo_stub, key, 'abcde', type_='unicode')
912 Session().commit()
913
871 result = model.get_general_settings()
914 result = model.get_general_settings()
872 expected_result = model.get_global_general_settings()
915 expected_result = model.get_global_general_settings()
873 assert sorted(result) == sorted(expected_result)
916 assert sorted(result) == sorted(expected_result)
874
917
875 def test_repo_settings_are_returned_when_inherited_is_false(
918 def test_repo_settings_are_returned_when_inherited_is_false(
876 self, repo_stub, settings_util):
919 self, repo_stub, settings_util):
877 model = VcsSettingsModel(repo=repo_stub.repo_name)
920 model = VcsSettingsModel(repo=repo_stub.repo_name)
878 model.inherit_global_settings = False
921 model.inherit_global_settings = False
879 for key in VcsSettingsModel.GENERAL_SETTINGS:
922 for key in VcsSettingsModel.GENERAL_SETTINGS:
880 settings_util.create_repo_rhodecode_setting(
923 settings_util.create_repo_rhodecode_setting(
881 repo_stub, key, 'abcde', type_='unicode')
924 repo_stub, key, 'abcde', type_='unicode')
925 Session().commit()
926
882 result = model.get_general_settings()
927 result = model.get_general_settings()
883 expected_result = model.get_repo_general_settings()
928 expected_result = model.get_repo_general_settings()
884 assert sorted(result) == sorted(expected_result)
929 assert sorted(result) == sorted(expected_result)
885
930
886 def test_global_settings_are_returned_when_no_repository_specified(self):
931 def test_global_settings_are_returned_when_no_repository_specified(self):
887 model = VcsSettingsModel()
932 model = VcsSettingsModel()
888 result = model.get_general_settings()
933 result = model.get_general_settings()
889 expected_result = model.get_global_general_settings()
934 expected_result = model.get_global_general_settings()
890 assert sorted(result) == sorted(expected_result)
935 assert sorted(result) == sorted(expected_result)
891
936
892
937
893 class TestGetUiSettings(object):
938 class TestGetUiSettings(object):
894 def test_global_settings_are_returned_when_inherited_is_true(
939 def test_global_settings_are_returned_when_inherited_is_true(
895 self, repo_stub, settings_util):
940 self, repo_stub, settings_util):
896 model = VcsSettingsModel(repo=repo_stub.repo_name)
941 model = VcsSettingsModel(repo=repo_stub.repo_name)
897 model.inherit_global_settings = True
942 model.inherit_global_settings = True
898 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
943 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
899 settings_util.create_repo_rhodecode_ui(
944 settings_util.create_repo_rhodecode_ui(
900 repo_stub, section, 'repo', key=key, active=True)
945 repo_stub, section, 'repo', key=key, active=True)
946 Session().commit()
947
901 result = model.get_ui_settings()
948 result = model.get_ui_settings()
902 expected_result = model.get_global_ui_settings()
949 expected_result = model.get_global_ui_settings()
903 assert sorted(result) == sorted(expected_result)
950 assert sorted(result) == sorted(expected_result)
904
951
905 def test_repo_settings_are_returned_when_inherited_is_false(
952 def test_repo_settings_are_returned_when_inherited_is_false(
906 self, repo_stub, settings_util):
953 self, repo_stub, settings_util):
907 model = VcsSettingsModel(repo=repo_stub.repo_name)
954 model = VcsSettingsModel(repo=repo_stub.repo_name)
908 model.inherit_global_settings = False
955 model.inherit_global_settings = False
909 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
956 for section, key in VcsSettingsModel.HOOKS_SETTINGS:
910 settings_util.create_repo_rhodecode_ui(
957 settings_util.create_repo_rhodecode_ui(
911 repo_stub, section, 'repo', key=key, active=True)
958 repo_stub, section, 'repo', key=key, active=True)
959 Session().commit()
960
912 result = model.get_ui_settings()
961 result = model.get_ui_settings()
913 expected_result = model.get_repo_ui_settings()
962 expected_result = model.get_repo_ui_settings()
914 assert sorted(result) == sorted(expected_result)
963 assert sorted(result) == sorted(expected_result)
915
964
916 def test_repo_settings_filtered_by_section_and_key(self, repo_stub):
965 def test_repo_settings_filtered_by_section_and_key(self, repo_stub):
917 model = VcsSettingsModel(repo=repo_stub.repo_name)
966 model = VcsSettingsModel(repo=repo_stub.repo_name)
918 model.inherit_global_settings = False
967 model.inherit_global_settings = False
968
919 args = ('section', 'key')
969 args = ('section', 'key')
920 with mock.patch.object(model, 'get_repo_ui_settings') as settings_mock:
970 with mock.patch.object(model, 'get_repo_ui_settings') as settings_mock:
921 model.get_ui_settings(*args)
971 model.get_ui_settings(*args)
972 Session().commit()
973
922 settings_mock.assert_called_once_with(*args)
974 settings_mock.assert_called_once_with(*args)
923
975
924 def test_global_settings_filtered_by_section_and_key(self):
976 def test_global_settings_filtered_by_section_and_key(self):
925 model = VcsSettingsModel()
977 model = VcsSettingsModel()
926 args = ('section', 'key')
978 args = ('section', 'key')
927 with mock.patch.object(model, 'get_global_ui_settings') as (
979 with mock.patch.object(model, 'get_global_ui_settings') as (
928 settings_mock):
980 settings_mock):
929 model.get_ui_settings(*args)
981 model.get_ui_settings(*args)
930 settings_mock.assert_called_once_with(*args)
982 settings_mock.assert_called_once_with(*args)
931
983
932 def test_global_settings_are_returned_when_no_repository_specified(self):
984 def test_global_settings_are_returned_when_no_repository_specified(self):
933 model = VcsSettingsModel()
985 model = VcsSettingsModel()
934 result = model.get_ui_settings()
986 result = model.get_ui_settings()
935 expected_result = model.get_global_ui_settings()
987 expected_result = model.get_global_ui_settings()
936 assert sorted(result) == sorted(expected_result)
988 assert sorted(result) == sorted(expected_result)
937
989
938
990
939 class TestGetSvnPatterns(object):
991 class TestGetSvnPatterns(object):
940 def test_repo_settings_filtered_by_section_and_key(self, repo_stub):
992 def test_repo_settings_filtered_by_section_and_key(self, repo_stub):
941 model = VcsSettingsModel(repo=repo_stub.repo_name)
993 model = VcsSettingsModel(repo=repo_stub.repo_name)
942 args = ('section', )
994 args = ('section', )
943 with mock.patch.object(model, 'get_repo_ui_settings') as settings_mock:
995 with mock.patch.object(model, 'get_repo_ui_settings') as settings_mock:
944 model.get_svn_patterns(*args)
996 model.get_svn_patterns(*args)
997
998 Session().commit()
945 settings_mock.assert_called_once_with(*args)
999 settings_mock.assert_called_once_with(*args)
946
1000
947 def test_global_settings_filtered_by_section_and_key(self):
1001 def test_global_settings_filtered_by_section_and_key(self):
948 model = VcsSettingsModel()
1002 model = VcsSettingsModel()
949 args = ('section', )
1003 args = ('section', )
950 with mock.patch.object(model, 'get_global_ui_settings') as (
1004 with mock.patch.object(model, 'get_global_ui_settings') as (
951 settings_mock):
1005 settings_mock):
952 model.get_svn_patterns(*args)
1006 model.get_svn_patterns(*args)
953 settings_mock.assert_called_once_with(*args)
1007 settings_mock.assert_called_once_with(*args)
954
1008
955
1009
956 class TestGetReposLocation(object):
1010 class TestGetReposLocation(object):
957 def test_returns_repos_location(self, repo_stub):
1011 def test_returns_repos_location(self, repo_stub):
958 model = VcsSettingsModel()
1012 model = VcsSettingsModel()
959
1013
960 result_mock = mock.Mock()
1014 result_mock = mock.Mock()
961 result_mock.ui_value = '/tmp'
1015 result_mock.ui_value = '/tmp'
962
1016
963 with mock.patch.object(model, 'global_settings') as settings_mock:
1017 with mock.patch.object(model, 'global_settings') as settings_mock:
964 settings_mock.get_ui_by_key.return_value = result_mock
1018 settings_mock.get_ui_by_key.return_value = result_mock
965 result = model.get_repos_location()
1019 result = model.get_repos_location()
966
1020
967 settings_mock.get_ui_by_key.assert_called_once_with('/')
1021 settings_mock.get_ui_by_key.assert_called_once_with('/')
968 assert result == '/tmp'
1022 assert result == '/tmp'
969
1023
970
1024
971 class TestCreateOrUpdateRepoSettings(object):
1025 class TestCreateOrUpdateRepoSettings(object):
972 FORM_DATA = {
1026 FORM_DATA = {
973 'inherit_global_settings': False,
1027 'inherit_global_settings': False,
974 'hooks_changegroup_repo_size': False,
1028 'hooks_changegroup_repo_size': False,
975 'hooks_changegroup_push_logger': False,
1029 'hooks_changegroup_push_logger': False,
976 'hooks_outgoing_pull_logger': False,
1030 'hooks_outgoing_pull_logger': False,
977 'extensions_largefiles': False,
1031 'extensions_largefiles': False,
978 'extensions_evolve': False,
1032 'extensions_evolve': False,
979 'largefiles_usercache': '/example/largefiles-store',
1033 'largefiles_usercache': '/example/largefiles-store',
980 'vcs_git_lfs_enabled': False,
1034 'vcs_git_lfs_enabled': False,
981 'vcs_git_lfs_store_location': '/',
1035 'vcs_git_lfs_store_location': '/',
982 'phases_publish': 'False',
1036 'phases_publish': 'False',
983 'rhodecode_pr_merge_enabled': False,
1037 'rhodecode_pr_merge_enabled': False,
984 'rhodecode_use_outdated_comments': False,
1038 'rhodecode_use_outdated_comments': False,
985 'new_svn_branch': '',
1039 'new_svn_branch': '',
986 'new_svn_tag': ''
1040 'new_svn_tag': ''
987 }
1041 }
988
1042
989 def test_get_raises_exception_when_repository_not_specified(self):
1043 def test_get_raises_exception_when_repository_not_specified(self):
990 model = VcsSettingsModel()
1044 model = VcsSettingsModel()
991 with pytest.raises(Exception) as exc_info:
1045 with pytest.raises(Exception) as exc_info:
992 model.create_or_update_repo_settings(data=self.FORM_DATA)
1046 model.create_or_update_repo_settings(data=self.FORM_DATA)
1047 Session().commit()
1048
993 assert str(exc_info.value) == 'Repository is not specified'
1049 assert str(exc_info.value) == 'Repository is not specified'
994
1050
995 def test_only_svn_settings_are_updated_when_type_is_svn(self, backend_svn):
1051 def test_only_svn_settings_are_updated_when_type_is_svn(self, backend_svn):
996 repo = backend_svn.create_repo()
1052 repo = backend_svn.create_repo()
997 model = VcsSettingsModel(repo=repo)
1053 model = VcsSettingsModel(repo=repo)
998 with self._patch_model(model) as mocks:
1054 with self._patch_model(model) as mocks:
999 model.create_or_update_repo_settings(
1055 model.create_or_update_repo_settings(
1000 data=self.FORM_DATA, inherit_global_settings=False)
1056 data=self.FORM_DATA, inherit_global_settings=False)
1057 Session().commit()
1058
1001 mocks['create_repo_svn_settings'].assert_called_once_with(
1059 mocks['create_repo_svn_settings'].assert_called_once_with(
1002 self.FORM_DATA)
1060 self.FORM_DATA)
1003 non_called_methods = (
1061 non_called_methods = (
1004 'create_or_update_repo_hook_settings',
1062 'create_or_update_repo_hook_settings',
1005 'create_or_update_repo_pr_settings',
1063 'create_or_update_repo_pr_settings',
1006 'create_or_update_repo_hg_settings')
1064 'create_or_update_repo_hg_settings')
1007 for method in non_called_methods:
1065 for method in non_called_methods:
1008 assert mocks[method].call_count == 0
1066 assert mocks[method].call_count == 0
1009
1067
1010 def test_non_svn_settings_are_updated_when_type_is_hg(self, backend_hg):
1068 def test_non_svn_settings_are_updated_when_type_is_hg(self, backend_hg):
1011 repo = backend_hg.create_repo()
1069 repo = backend_hg.create_repo()
1012 model = VcsSettingsModel(repo=repo)
1070 model = VcsSettingsModel(repo=repo)
1013 with self._patch_model(model) as mocks:
1071 with self._patch_model(model) as mocks:
1014 model.create_or_update_repo_settings(
1072 model.create_or_update_repo_settings(
1015 data=self.FORM_DATA, inherit_global_settings=False)
1073 data=self.FORM_DATA, inherit_global_settings=False)
1074 Session().commit()
1016
1075
1017 assert mocks['create_repo_svn_settings'].call_count == 0
1076 assert mocks['create_repo_svn_settings'].call_count == 0
1018 called_methods = (
1077 called_methods = (
1019 'create_or_update_repo_hook_settings',
1078 'create_or_update_repo_hook_settings',
1020 'create_or_update_repo_pr_settings',
1079 'create_or_update_repo_pr_settings',
1021 'create_or_update_repo_hg_settings')
1080 'create_or_update_repo_hg_settings')
1022 for method in called_methods:
1081 for method in called_methods:
1023 mocks[method].assert_called_once_with(self.FORM_DATA)
1082 mocks[method].assert_called_once_with(self.FORM_DATA)
1024
1083
1025 def test_non_svn_and_hg_settings_are_updated_when_type_is_git(
1084 def test_non_svn_and_hg_settings_are_updated_when_type_is_git(
1026 self, backend_git):
1085 self, backend_git):
1027 repo = backend_git.create_repo()
1086 repo = backend_git.create_repo()
1028 model = VcsSettingsModel(repo=repo)
1087 model = VcsSettingsModel(repo=repo)
1029 with self._patch_model(model) as mocks:
1088 with self._patch_model(model) as mocks:
1030 model.create_or_update_repo_settings(
1089 model.create_or_update_repo_settings(
1031 data=self.FORM_DATA, inherit_global_settings=False)
1090 data=self.FORM_DATA, inherit_global_settings=False)
1032
1091
1033 assert mocks['create_repo_svn_settings'].call_count == 0
1092 assert mocks['create_repo_svn_settings'].call_count == 0
1034 called_methods = (
1093 called_methods = (
1035 'create_or_update_repo_hook_settings',
1094 'create_or_update_repo_hook_settings',
1036 'create_or_update_repo_pr_settings')
1095 'create_or_update_repo_pr_settings')
1037 non_called_methods = (
1096 non_called_methods = (
1038 'create_repo_svn_settings',
1097 'create_repo_svn_settings',
1039 'create_or_update_repo_hg_settings'
1098 'create_or_update_repo_hg_settings'
1040 )
1099 )
1041 for method in called_methods:
1100 for method in called_methods:
1042 mocks[method].assert_called_once_with(self.FORM_DATA)
1101 mocks[method].assert_called_once_with(self.FORM_DATA)
1043 for method in non_called_methods:
1102 for method in non_called_methods:
1044 assert mocks[method].call_count == 0
1103 assert mocks[method].call_count == 0
1045
1104
1046 def test_no_methods_are_called_when_settings_are_inherited(
1105 def test_no_methods_are_called_when_settings_are_inherited(
1047 self, backend):
1106 self, backend):
1048 repo = backend.create_repo()
1107 repo = backend.create_repo()
1049 model = VcsSettingsModel(repo=repo)
1108 model = VcsSettingsModel(repo=repo)
1050 with self._patch_model(model) as mocks:
1109 with self._patch_model(model) as mocks:
1051 model.create_or_update_repo_settings(
1110 model.create_or_update_repo_settings(
1052 data=self.FORM_DATA, inherit_global_settings=True)
1111 data=self.FORM_DATA, inherit_global_settings=True)
1053 for method_name in mocks:
1112 for method_name in mocks:
1054 assert mocks[method_name].call_count == 0
1113 assert mocks[method_name].call_count == 0
1055
1114
1056 def test_cache_is_marked_for_invalidation(self, repo_stub):
1115 def test_cache_is_marked_for_invalidation(self, repo_stub):
1057 model = VcsSettingsModel(repo=repo_stub)
1116 model = VcsSettingsModel(repo=repo_stub)
1058 invalidation_patcher = mock.patch(
1117 invalidation_patcher = mock.patch(
1059 'rhodecode.model.scm.ScmModel.mark_for_invalidation')
1118 'rhodecode.model.scm.ScmModel.mark_for_invalidation')
1060 with invalidation_patcher as invalidation_mock:
1119 with invalidation_patcher as invalidation_mock:
1061 model.create_or_update_repo_settings(
1120 model.create_or_update_repo_settings(
1062 data=self.FORM_DATA, inherit_global_settings=True)
1121 data=self.FORM_DATA, inherit_global_settings=True)
1122 Session().commit()
1123
1063 invalidation_mock.assert_called_once_with(
1124 invalidation_mock.assert_called_once_with(
1064 repo_stub.repo_name, delete=True)
1125 repo_stub.repo_name, delete=True)
1065
1126
1066 def test_inherit_flag_is_saved(self, repo_stub):
1127 def test_inherit_flag_is_saved(self, repo_stub):
1067 model = VcsSettingsModel(repo=repo_stub)
1128 model = VcsSettingsModel(repo=repo_stub)
1068 model.inherit_global_settings = True
1129 model.inherit_global_settings = True
1069 with self._patch_model(model):
1130 with self._patch_model(model):
1070 model.create_or_update_repo_settings(
1131 model.create_or_update_repo_settings(
1071 data=self.FORM_DATA, inherit_global_settings=False)
1132 data=self.FORM_DATA, inherit_global_settings=False)
1133 Session().commit()
1134
1072 assert model.inherit_global_settings is False
1135 assert model.inherit_global_settings is False
1073
1136
1074 def _patch_model(self, model):
1137 def _patch_model(self, model):
1075 return mock.patch.multiple(
1138 return mock.patch.multiple(
1076 model,
1139 model,
1077 create_repo_svn_settings=mock.DEFAULT,
1140 create_repo_svn_settings=mock.DEFAULT,
1078 create_or_update_repo_hook_settings=mock.DEFAULT,
1141 create_or_update_repo_hook_settings=mock.DEFAULT,
1079 create_or_update_repo_pr_settings=mock.DEFAULT,
1142 create_or_update_repo_pr_settings=mock.DEFAULT,
1080 create_or_update_repo_hg_settings=mock.DEFAULT)
1143 create_or_update_repo_hg_settings=mock.DEFAULT)
@@ -1,735 +1,744 b''
1 # -*- coding: utf-8 -*-
1 # -*- coding: utf-8 -*-
2
2
3 # Copyright (C) 2010-2019 RhodeCode GmbH
3 # Copyright (C) 2010-2019 RhodeCode GmbH
4 #
4 #
5 # This program is free software: you can redistribute it and/or modify
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU Affero General Public License, version 3
6 # it under the terms of the GNU Affero General Public License, version 3
7 # (only), as published by the Free Software Foundation.
7 # (only), as published by the Free Software Foundation.
8 #
8 #
9 # This program is distributed in the hope that it will be useful,
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
12 # GNU General Public License for more details.
13 #
13 #
14 # You should have received a copy of the GNU Affero General Public License
14 # You should have received a copy of the GNU Affero General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 #
16 #
17 # This program is dual-licensed. If you wish to learn more about the
17 # This program is dual-licensed. If you wish to learn more about the
18 # RhodeCode Enterprise Edition, including its added features, Support services,
18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20
20
21 import pytest
21 import pytest
22
22
23 from rhodecode.lib.auth import AuthUser
23 from rhodecode.lib.auth import AuthUser
24 from rhodecode.model.db import (
24 from rhodecode.model.db import (
25 RepoGroup, User, UserGroupRepoGroupToPerm, Permission, UserToPerm,
25 RepoGroup, User, UserGroupRepoGroupToPerm, Permission, UserToPerm,
26 UserGroupToPerm)
26 UserGroupToPerm)
27 from rhodecode.model.meta import Session
27 from rhodecode.model.meta import Session
28 from rhodecode.model.permission import PermissionModel
28 from rhodecode.model.permission import PermissionModel
29 from rhodecode.model.repo import RepoModel
29 from rhodecode.model.repo import RepoModel
30 from rhodecode.model.repo_group import RepoGroupModel
30 from rhodecode.model.repo_group import RepoGroupModel
31 from rhodecode.model.user import UserModel
31 from rhodecode.model.user import UserModel
32 from rhodecode.model.user_group import UserGroupModel
32 from rhodecode.model.user_group import UserGroupModel
33 from rhodecode.tests.fixture import Fixture
33 from rhodecode.tests.fixture import Fixture
34
34
35
35
36 fixture = Fixture()
36 fixture = Fixture()
37
37
38
38
39 @pytest.fixture()
39 @pytest.fixture()
40 def repo_name(backend_hg):
40 def repo_name(backend_hg):
41 return backend_hg.repo_name
41 return backend_hg.repo_name
42
42
43
43
44 class TestPermissions(object):
44 class TestPermissions(object):
45
45
46 @pytest.fixture(scope='class', autouse=True)
46 @pytest.fixture(scope='class', autouse=True)
47 def default_permissions(self, request, baseapp):
47 def default_permissions(self, request, baseapp):
48 # recreate default user to get a clean start
48 # recreate default user to get a clean start
49 PermissionModel().create_default_user_permissions(
49 PermissionModel().create_default_user_permissions(
50 user=User.DEFAULT_USER, force=True)
50 user=User.DEFAULT_USER, force=True)
51 Session().commit()
51 Session().commit()
52
52
53 @pytest.fixture(autouse=True)
53 @pytest.fixture(autouse=True)
54 def prepare_users(self, request):
54 def prepare_users(self, request):
55 # TODO: User creation is a duplicate of test_nofitications, check
55 # TODO: User creation is a duplicate of test_nofitications, check
56 # if that can be unified
56 # if that can be unified
57 self.u1 = UserModel().create_or_update(
57 self.u1 = UserModel().create_or_update(
58 username=u'u1', password=u'qweqwe',
58 username=u'u1', password=u'qweqwe',
59 email=u'u1@rhodecode.org', firstname=u'u1', lastname=u'u1'
59 email=u'u1@rhodecode.org', firstname=u'u1', lastname=u'u1'
60 )
60 )
61 self.u2 = UserModel().create_or_update(
61 self.u2 = UserModel().create_or_update(
62 username=u'u2', password=u'qweqwe',
62 username=u'u2', password=u'qweqwe',
63 email=u'u2@rhodecode.org', firstname=u'u2', lastname=u'u2'
63 email=u'u2@rhodecode.org', firstname=u'u2', lastname=u'u2'
64 )
64 )
65 self.u3 = UserModel().create_or_update(
65 self.u3 = UserModel().create_or_update(
66 username=u'u3', password=u'qweqwe',
66 username=u'u3', password=u'qweqwe',
67 email=u'u3@rhodecode.org', firstname=u'u3', lastname=u'u3'
67 email=u'u3@rhodecode.org', firstname=u'u3', lastname=u'u3'
68 )
68 )
69 self.anon = User.get_default_user()
69 self.anon = User.get_default_user()
70 self.a1 = UserModel().create_or_update(
70 self.a1 = UserModel().create_or_update(
71 username=u'a1', password=u'qweqwe',
71 username=u'a1', password=u'qweqwe',
72 email=u'a1@rhodecode.org', firstname=u'a1', lastname=u'a1',
72 email=u'a1@rhodecode.org', firstname=u'a1', lastname=u'a1',
73 admin=True
73 admin=True
74 )
74 )
75 Session().commit()
75 Session().commit()
76
76
77 request.addfinalizer(self.cleanup)
77 request.addfinalizer(self.cleanup)
78
78
79 def cleanup(self):
79 def cleanup(self):
80 if hasattr(self, 'test_repo'):
80 if hasattr(self, 'test_repo'):
81 RepoModel().delete(repo=self.test_repo)
81 RepoModel().delete(repo=self.test_repo)
82 Session().commit()
82
83
83 if hasattr(self, 'g1'):
84 if hasattr(self, 'g1'):
84 RepoGroupModel().delete(self.g1.group_id)
85 RepoGroupModel().delete(self.g1.group_id)
85 if hasattr(self, 'g2'):
86 if hasattr(self, 'g2'):
86 RepoGroupModel().delete(self.g2.group_id)
87 RepoGroupModel().delete(self.g2.group_id)
88 Session().commit()
87
89
88 UserModel().delete(self.u1)
90 UserModel().delete(self.u1, handle_repos='delete', handle_repo_groups='delete')
89 UserModel().delete(self.u2)
91 UserModel().delete(self.u2, handle_repos='delete', handle_repo_groups='delete')
90 UserModel().delete(self.u3)
92 UserModel().delete(self.u3, handle_repos='delete', handle_repo_groups='delete')
91 UserModel().delete(self.a1)
93 UserModel().delete(self.a1, handle_repos='delete', handle_repo_groups='delete')
94 Session().commit()
92
95
93 if hasattr(self, 'ug1'):
96 if hasattr(self, 'ug1'):
94 UserGroupModel().delete(self.ug1, force=True)
97 UserGroupModel().delete(self.ug1, force=True)
95
98 Session().commit()
96 Session().commit()
97
99
98 def test_default_perms_set(self, repo_name):
100 def test_default_perms_set(self, repo_name):
99 assert repo_perms(self.u1)[repo_name] == 'repository.read'
101 assert repo_perms(self.u1)[repo_name] == 'repository.read'
100 new_perm = 'repository.write'
102 new_perm = 'repository.write'
101 RepoModel().grant_user_permission(repo=repo_name, user=self.u1,
103 RepoModel().grant_user_permission(repo=repo_name, user=self.u1,
102 perm=new_perm)
104 perm=new_perm)
103 Session().commit()
105 Session().commit()
104 assert repo_perms(self.u1)[repo_name] == new_perm
106 assert repo_perms(self.u1)[repo_name] == new_perm
105
107
106 def test_default_admin_perms_set(self, repo_name):
108 def test_default_admin_perms_set(self, repo_name):
107 assert repo_perms(self.a1)[repo_name] == 'repository.admin'
109 assert repo_perms(self.a1)[repo_name] == 'repository.admin'
108 RepoModel().grant_user_permission(repo=repo_name, user=self.a1,
110 RepoModel().grant_user_permission(repo=repo_name, user=self.a1,
109 perm='repository.write')
111 perm='repository.write')
110 Session().commit()
112 Session().commit()
111 # cannot really downgrade admins permissions !? they still gets set as
113 # cannot really downgrade admins permissions !? they still gets set as
112 # admin !
114 # admin !
113 assert repo_perms(self.a1)[repo_name] == 'repository.admin'
115 assert repo_perms(self.a1)[repo_name] == 'repository.admin'
114
116
115 def test_default_group_perms(self, repo_name):
117 def test_default_group_perms(self, repo_name):
116 self.g1 = fixture.create_repo_group('test1', skip_if_exists=True)
118 self.g1 = fixture.create_repo_group('test1', skip_if_exists=True)
117 self.g2 = fixture.create_repo_group('test2', skip_if_exists=True)
119 self.g2 = fixture.create_repo_group('test2', skip_if_exists=True)
118
120
119 assert repo_perms(self.u1)[repo_name] == 'repository.read'
121 assert repo_perms(self.u1)[repo_name] == 'repository.read'
120 assert group_perms(self.u1) == {
122 assert group_perms(self.u1) == {
121 'test1': 'group.read', 'test2': 'group.read'}
123 'test1': 'group.read', 'test2': 'group.read'}
122 assert global_perms(self.u1) == set(
124 assert global_perms(self.u1) == set(
123 Permission.DEFAULT_USER_PERMISSIONS)
125 Permission.DEFAULT_USER_PERMISSIONS)
124
126
125 def test_default_admin_group_perms(self, repo_name):
127 def test_default_admin_group_perms(self, repo_name):
126 self.g1 = fixture.create_repo_group('test1', skip_if_exists=True)
128 self.g1 = fixture.create_repo_group('test1', skip_if_exists=True)
127 self.g2 = fixture.create_repo_group('test2', skip_if_exists=True)
129 self.g2 = fixture.create_repo_group('test2', skip_if_exists=True)
128
130
129 assert repo_perms(self.a1)[repo_name] == 'repository.admin'
131 assert repo_perms(self.a1)[repo_name] == 'repository.admin'
130 assert group_perms(self.a1) == {
132 assert group_perms(self.a1) == {
131 'test1': 'group.admin', 'test2': 'group.admin'}
133 'test1': 'group.admin', 'test2': 'group.admin'}
132
134
133 def test_default_owner_repo_perms(self, backend, user_util, test_repo):
135 def test_default_owner_repo_perms(self, backend, user_util, test_repo):
134 user = user_util.create_user()
136 user = user_util.create_user()
135 repo = test_repo('minimal', backend.alias)
137 repo = test_repo('minimal', backend.alias)
136 org_owner = repo.user
138 org_owner = repo.user
137 assert repo_perms(user)[repo.repo_name] == 'repository.read'
139 assert repo_perms(user)[repo.repo_name] == 'repository.read'
138
140
139 repo.user = user
141 repo.user = user
140 assert repo_perms(user)[repo.repo_name] == 'repository.admin'
142 assert repo_perms(user)[repo.repo_name] == 'repository.admin'
141 repo.user = org_owner
143 repo.user = org_owner
142
144
143 def test_default_owner_branch_perms(self, user_util, test_user_group):
145 def test_default_owner_branch_perms(self, user_util, test_user_group):
144 user = user_util.create_user()
146 user = user_util.create_user()
145 assert branch_perms(user) == {}
147 assert branch_perms(user) == {}
146
148
147 def test_default_owner_repo_group_perms(self, user_util, test_repo_group):
149 def test_default_owner_repo_group_perms(self, user_util, test_repo_group):
148 user = user_util.create_user()
150 user = user_util.create_user()
149 org_owner = test_repo_group.user
151 org_owner = test_repo_group.user
150
152
151 assert group_perms(user)[test_repo_group.group_name] == 'group.read'
153 assert group_perms(user)[test_repo_group.group_name] == 'group.read'
152
154
153 test_repo_group.user = user
155 test_repo_group.user = user
154 assert group_perms(user)[test_repo_group.group_name] == 'group.admin'
156 assert group_perms(user)[test_repo_group.group_name] == 'group.admin'
155 test_repo_group.user = org_owner
157 test_repo_group.user = org_owner
156
158
157 def test_default_owner_user_group_perms(self, user_util, test_user_group):
159 def test_default_owner_user_group_perms(self, user_util, test_user_group):
158 user = user_util.create_user()
160 user = user_util.create_user()
159 org_owner = test_user_group.user
161 org_owner = test_user_group.user
160
162
161 assert user_group_perms(user)[test_user_group.users_group_name] == 'usergroup.read'
163 assert user_group_perms(user)[test_user_group.users_group_name] == 'usergroup.read'
162
164
163 test_user_group.user = user
165 test_user_group.user = user
164 assert user_group_perms(user)[test_user_group.users_group_name] == 'usergroup.admin'
166 assert user_group_perms(user)[test_user_group.users_group_name] == 'usergroup.admin'
165
167
166 test_user_group.user = org_owner
168 test_user_group.user = org_owner
167
169
168 def test_propagated_permission_from_users_group_by_explicit_perms_exist(
170 def test_propagated_permission_from_users_group_by_explicit_perms_exist(
169 self, repo_name):
171 self, repo_name):
170 # make group
172 # make group
171 self.ug1 = fixture.create_user_group('G1')
173 self.ug1 = fixture.create_user_group('G1')
172 UserGroupModel().add_user_to_group(self.ug1, self.u1)
174 UserGroupModel().add_user_to_group(self.ug1, self.u1)
173
175
174 # set permission to lower
176 # set permission to lower
175 new_perm = 'repository.none'
177 new_perm = 'repository.none'
176 RepoModel().grant_user_permission(
178 RepoModel().grant_user_permission(
177 repo=repo_name, user=self.u1, perm=new_perm)
179 repo=repo_name, user=self.u1, perm=new_perm)
178 Session().commit()
180 Session().commit()
179 assert repo_perms(self.u1)[repo_name] == new_perm
181 assert repo_perms(self.u1)[repo_name] == new_perm
180
182
181 # grant perm for group this should not override permission from user
183 # grant perm for group this should not override permission from user
182 # since it has explicitly set
184 # since it has explicitly set
183 new_perm_gr = 'repository.write'
185 new_perm_gr = 'repository.write'
184 RepoModel().grant_user_group_permission(
186 RepoModel().grant_user_group_permission(
185 repo=repo_name, group_name=self.ug1, perm=new_perm_gr)
187 repo=repo_name, group_name=self.ug1, perm=new_perm_gr)
188 Session().commit()
186
189
187 assert repo_perms(self.u1)[repo_name] == new_perm
190 assert repo_perms(self.u1)[repo_name] == new_perm
188 assert group_perms(self.u1) == {}
191 assert group_perms(self.u1) == {}
189
192
190 def test_propagated_permission_from_users_group(self, repo_name):
193 def test_propagated_permission_from_users_group(self, repo_name):
191 # make group
194 # make group
192 self.ug1 = fixture.create_user_group('G1')
195 self.ug1 = fixture.create_user_group('G1')
193 UserGroupModel().add_user_to_group(self.ug1, self.u3)
196 UserGroupModel().add_user_to_group(self.ug1, self.u3)
194
197
195 # grant perm for group
198 # grant perm for group
196 # this should override default permission from user
199 # this should override default permission from user
197 new_perm_gr = 'repository.write'
200 new_perm_gr = 'repository.write'
198 RepoModel().grant_user_group_permission(
201 RepoModel().grant_user_group_permission(
199 repo=repo_name, group_name=self.ug1, perm=new_perm_gr)
202 repo=repo_name, group_name=self.ug1, perm=new_perm_gr)
203 Session().commit()
200
204
201 assert repo_perms(self.u3)[repo_name] == new_perm_gr
205 assert repo_perms(self.u3)[repo_name] == new_perm_gr
202 assert group_perms(self.u3) == {}
206 assert group_perms(self.u3) == {}
203
207
204 def test_propagated_permission_from_users_group_lower_weight(
208 def test_propagated_permission_from_users_group_lower_weight(
205 self, repo_name):
209 self, repo_name):
206 # make group with user
210 # make group with user
207 self.ug1 = fixture.create_user_group('G1')
211 self.ug1 = fixture.create_user_group('G1')
208 UserGroupModel().add_user_to_group(self.ug1, self.u1)
212 UserGroupModel().add_user_to_group(self.ug1, self.u1)
209
213
210 # set permission to lower
214 # set permission to lower
211 new_perm_h = 'repository.write'
215 new_perm_h = 'repository.write'
212 RepoModel().grant_user_permission(
216 RepoModel().grant_user_permission(
213 repo=repo_name, user=self.u1, perm=new_perm_h)
217 repo=repo_name, user=self.u1, perm=new_perm_h)
214 Session().commit()
218 Session().commit()
215
219
216 assert repo_perms(self.u1)[repo_name] == new_perm_h
220 assert repo_perms(self.u1)[repo_name] == new_perm_h
217
221
218 # grant perm for group this should NOT override permission from user
222 # grant perm for group this should NOT override permission from user
219 # since it's lower than granted
223 # since it's lower than granted
220 new_perm_l = 'repository.read'
224 new_perm_l = 'repository.read'
221 RepoModel().grant_user_group_permission(
225 RepoModel().grant_user_group_permission(
222 repo=repo_name, group_name=self.ug1, perm=new_perm_l)
226 repo=repo_name, group_name=self.ug1, perm=new_perm_l)
227 Session().commit()
223
228
224 assert repo_perms(self.u1)[repo_name] == new_perm_h
229 assert repo_perms(self.u1)[repo_name] == new_perm_h
225 assert group_perms(self.u1) == {}
230 assert group_perms(self.u1) == {}
226
231
227 def test_repo_in_group_permissions(self):
232 def test_repo_in_group_permissions(self):
228 self.g1 = fixture.create_repo_group('group1', skip_if_exists=True)
233 self.g1 = fixture.create_repo_group('group1', skip_if_exists=True)
229 self.g2 = fixture.create_repo_group('group2', skip_if_exists=True)
234 self.g2 = fixture.create_repo_group('group2', skip_if_exists=True)
230 # both perms should be read !
235 # both perms should be read !
231 assert group_perms(self.u1) == \
236 assert group_perms(self.u1) == \
232 {u'group1': u'group.read', u'group2': u'group.read'}
237 {u'group1': u'group.read', u'group2': u'group.read'}
233
238
234 assert group_perms(self.anon) == \
239 assert group_perms(self.anon) == \
235 {u'group1': u'group.read', u'group2': u'group.read'}
240 {u'group1': u'group.read', u'group2': u'group.read'}
236
241
237 # Change perms to none for both groups
242 # Change perms to none for both groups
238 RepoGroupModel().grant_user_permission(
243 RepoGroupModel().grant_user_permission(
239 repo_group=self.g1, user=self.anon, perm='group.none')
244 repo_group=self.g1, user=self.anon, perm='group.none')
240 RepoGroupModel().grant_user_permission(
245 RepoGroupModel().grant_user_permission(
241 repo_group=self.g2, user=self.anon, perm='group.none')
246 repo_group=self.g2, user=self.anon, perm='group.none')
242
247
243 assert group_perms(self.u1) == \
248 assert group_perms(self.u1) == \
244 {u'group1': u'group.none', u'group2': u'group.none'}
249 {u'group1': u'group.none', u'group2': u'group.none'}
245 assert group_perms(self.anon) == \
250 assert group_perms(self.anon) == \
246 {u'group1': u'group.none', u'group2': u'group.none'}
251 {u'group1': u'group.none', u'group2': u'group.none'}
247
252
248 # add repo to group
253 # add repo to group
249 name = RepoGroup.url_sep().join([self.g1.group_name, 'test_perm'])
254 name = RepoGroup.url_sep().join([self.g1.group_name, 'test_perm'])
250 self.test_repo = fixture.create_repo(name=name,
255 self.test_repo = fixture.create_repo(name=name,
251 repo_type='hg',
256 repo_type='hg',
252 repo_group=self.g1,
257 repo_group=self.g1,
253 cur_user=self.u1,)
258 cur_user=self.u1,)
254
259
255 assert group_perms(self.u1) == \
260 assert group_perms(self.u1) == \
256 {u'group1': u'group.none', u'group2': u'group.none'}
261 {u'group1': u'group.none', u'group2': u'group.none'}
257 assert group_perms(self.anon) == \
262 assert group_perms(self.anon) == \
258 {u'group1': u'group.none', u'group2': u'group.none'}
263 {u'group1': u'group.none', u'group2': u'group.none'}
259
264
260 # grant permission for u2 !
265 # grant permission for u2 !
261 RepoGroupModel().grant_user_permission(
266 RepoGroupModel().grant_user_permission(
262 repo_group=self.g1, user=self.u2, perm='group.read')
267 repo_group=self.g1, user=self.u2, perm='group.read')
263 RepoGroupModel().grant_user_permission(
268 RepoGroupModel().grant_user_permission(
264 repo_group=self.g2, user=self.u2, perm='group.read')
269 repo_group=self.g2, user=self.u2, perm='group.read')
265 Session().commit()
270 Session().commit()
266 assert self.u1 != self.u2
271 assert self.u1 != self.u2
267
272
268 # u1 and anon should have not change perms while u2 should !
273 # u1 and anon should have not change perms while u2 should !
269 assert group_perms(self.u1) == \
274 assert group_perms(self.u1) == \
270 {u'group1': u'group.none', u'group2': u'group.none'}
275 {u'group1': u'group.none', u'group2': u'group.none'}
271 assert group_perms(self.u2) == \
276 assert group_perms(self.u2) == \
272 {u'group1': u'group.read', u'group2': u'group.read'}
277 {u'group1': u'group.read', u'group2': u'group.read'}
273 assert group_perms(self.anon) == \
278 assert group_perms(self.anon) == \
274 {u'group1': u'group.none', u'group2': u'group.none'}
279 {u'group1': u'group.none', u'group2': u'group.none'}
275
280
276 def test_repo_group_user_as_user_group_member(self):
281 def test_repo_group_user_as_user_group_member(self):
277 # create Group1
282 # create Group1
278 self.g1 = fixture.create_repo_group('group1', skip_if_exists=True)
283 self.g1 = fixture.create_repo_group('group1', skip_if_exists=True)
279 assert group_perms(self.anon) == {u'group1': u'group.read'}
284 assert group_perms(self.anon) == {u'group1': u'group.read'}
280
285
281 # set default permission to none
286 # set default permission to none
282 RepoGroupModel().grant_user_permission(
287 RepoGroupModel().grant_user_permission(
283 repo_group=self.g1, user=self.anon, perm='group.none')
288 repo_group=self.g1, user=self.anon, perm='group.none')
289 Session().commit()
290
284 # make group
291 # make group
285 self.ug1 = fixture.create_user_group('G1')
292 self.ug1 = fixture.create_user_group('G1')
286 # add user to group
293 # add user to group
287 UserGroupModel().add_user_to_group(self.ug1, self.u1)
294 UserGroupModel().add_user_to_group(self.ug1, self.u1)
288 Session().commit()
295 Session().commit()
289
296
290 # check if user is in the group
297 # check if user is in the group
291 ug1 = UserGroupModel().get(self.ug1.users_group_id)
298 ug1 = UserGroupModel().get(self.ug1.users_group_id)
292 members = [x.user_id for x in ug1.members]
299 members = [x.user_id for x in ug1.members]
293 assert members == [self.u1.user_id]
300 assert members == [self.u1.user_id]
294 # add some user to that group
301 # add some user to that group
295
302
296 # check his permissions
303 # check his permissions
297 assert group_perms(self.anon) == {u'group1': u'group.none'}
304 assert group_perms(self.anon) == {u'group1': u'group.none'}
298 assert group_perms(self.u1) == {u'group1': u'group.none'}
305 assert group_perms(self.u1) == {u'group1': u'group.none'}
299
306
300 # grant ug1 read permissions for
307 # grant ug1 read permissions for
301 RepoGroupModel().grant_user_group_permission(
308 RepoGroupModel().grant_user_group_permission(
302 repo_group=self.g1, group_name=self.ug1, perm='group.read')
309 repo_group=self.g1, group_name=self.ug1, perm='group.read')
303 Session().commit()
310 Session().commit()
304
311
305 # check if the
312 # check if the
306 obj = Session().query(UserGroupRepoGroupToPerm)\
313 obj = Session().query(UserGroupRepoGroupToPerm)\
307 .filter(UserGroupRepoGroupToPerm.group == self.g1)\
314 .filter(UserGroupRepoGroupToPerm.group == self.g1)\
308 .filter(UserGroupRepoGroupToPerm.users_group == self.ug1)\
315 .filter(UserGroupRepoGroupToPerm.users_group == self.ug1)\
309 .scalar()
316 .scalar()
310 assert obj.permission.permission_name == 'group.read'
317 assert obj.permission.permission_name == 'group.read'
311
318
312 assert group_perms(self.anon) == {u'group1': u'group.none'}
319 assert group_perms(self.anon) == {u'group1': u'group.none'}
313 assert group_perms(self.u1) == {u'group1': u'group.read'}
320 assert group_perms(self.u1) == {u'group1': u'group.read'}
314
321
315 def test_inherited_permissions_from_default_on_user_enabled(self):
322 def test_inherited_permissions_from_default_on_user_enabled(self):
316 # enable fork and create on default user
323 # enable fork and create on default user
317 _form_result = {
324 _form_result = {
318 'default_repo_create': 'hg.create.repository',
325 'default_repo_create': 'hg.create.repository',
319 'default_fork_create': 'hg.fork.repository'
326 'default_fork_create': 'hg.fork.repository'
320 }
327 }
321 PermissionModel().set_new_user_perms(
328 PermissionModel().set_new_user_perms(
322 User.get_default_user(), _form_result)
329 User.get_default_user(), _form_result)
323 Session().commit()
330 Session().commit()
324
331
325 # make sure inherit flag is turned on
332 # make sure inherit flag is turned on
326 self.u1.inherit_default_permissions = True
333 self.u1.inherit_default_permissions = True
327 Session().commit()
334 Session().commit()
328
335
329 # this user will have inherited permissions from default user
336 # this user will have inherited permissions from default user
330 assert global_perms(self.u1) == default_perms()
337 assert global_perms(self.u1) == default_perms()
331
338
332 def test_inherited_permissions_from_default_on_user_disabled(self):
339 def test_inherited_permissions_from_default_on_user_disabled(self):
333 # disable fork and create on default user
340 # disable fork and create on default user
334 _form_result = {
341 _form_result = {
335 'default_repo_create': 'hg.create.none',
342 'default_repo_create': 'hg.create.none',
336 'default_fork_create': 'hg.fork.none'
343 'default_fork_create': 'hg.fork.none'
337 }
344 }
338 PermissionModel().set_new_user_perms(
345 PermissionModel().set_new_user_perms(
339 User.get_default_user(), _form_result)
346 User.get_default_user(), _form_result)
340 Session().commit()
347 Session().commit()
341
348
342 # make sure inherit flag is turned on
349 # make sure inherit flag is turned on
343 self.u1.inherit_default_permissions = True
350 self.u1.inherit_default_permissions = True
344 Session().commit()
351 Session().commit()
345
352
346 # this user will have inherited permissions from default user
353 # this user will have inherited permissions from default user
347 expected_perms = default_perms(
354 expected_perms = default_perms(
348 added=['hg.create.none', 'hg.fork.none'],
355 added=['hg.create.none', 'hg.fork.none'],
349 removed=['hg.create.repository', 'hg.fork.repository'])
356 removed=['hg.create.repository', 'hg.fork.repository'])
350 assert global_perms(self.u1) == expected_perms
357 assert global_perms(self.u1) == expected_perms
351
358
352 def test_non_inherited_permissions_from_default_on_user_enabled(self):
359 def test_non_inherited_permissions_from_default_on_user_enabled(self):
353 user_model = UserModel()
360 user_model = UserModel()
354 # enable fork and create on default user
361 # enable fork and create on default user
355 usr = User.DEFAULT_USER
362 usr = User.DEFAULT_USER
356 user_model.revoke_perm(usr, 'hg.create.none')
363 user_model.revoke_perm(usr, 'hg.create.none')
357 user_model.grant_perm(usr, 'hg.create.repository')
364 user_model.grant_perm(usr, 'hg.create.repository')
358 user_model.revoke_perm(usr, 'hg.fork.none')
365 user_model.revoke_perm(usr, 'hg.fork.none')
359 user_model.grant_perm(usr, 'hg.fork.repository')
366 user_model.grant_perm(usr, 'hg.fork.repository')
360
367
361 # disable global perms on specific user
368 # disable global perms on specific user
362 user_model.revoke_perm(self.u1, 'hg.create.repository')
369 user_model.revoke_perm(self.u1, 'hg.create.repository')
363 user_model.grant_perm(self.u1, 'hg.create.none')
370 user_model.grant_perm(self.u1, 'hg.create.none')
364 user_model.revoke_perm(self.u1, 'hg.fork.repository')
371 user_model.revoke_perm(self.u1, 'hg.fork.repository')
365 user_model.grant_perm(self.u1, 'hg.fork.none')
372 user_model.grant_perm(self.u1, 'hg.fork.none')
366
373
367 # TODO(marcink): check branch permissions now ?
374 # TODO(marcink): check branch permissions now ?
368
375
369 # make sure inherit flag is turned off
376 # make sure inherit flag is turned off
370 self.u1.inherit_default_permissions = False
377 self.u1.inherit_default_permissions = False
371 Session().commit()
378 Session().commit()
372
379
373 # this user will have non inherited permissions from he's
380 # this user will have non inherited permissions from he's
374 # explicitly set permissions
381 # explicitly set permissions
375 assert global_perms(self.u1) == {
382 assert global_perms(self.u1) == {
376 'hg.create.none',
383 'hg.create.none',
377 'hg.fork.none',
384 'hg.fork.none',
378 'hg.register.manual_activate',
385 'hg.register.manual_activate',
379 'hg.password_reset.enabled',
386 'hg.password_reset.enabled',
380 'hg.extern_activate.auto',
387 'hg.extern_activate.auto',
381 'repository.read',
388 'repository.read',
382 'group.read',
389 'group.read',
383 'usergroup.read',
390 'usergroup.read',
384 'branch.push_force',
391 'branch.push_force',
385 }
392 }
386
393
387 def test_non_inherited_permissions_from_default_on_user_disabled(self):
394 def test_non_inherited_permissions_from_default_on_user_disabled(self):
388 user_model = UserModel()
395 user_model = UserModel()
389 # disable fork and create on default user
396 # disable fork and create on default user
390 usr = User.DEFAULT_USER
397 usr = User.DEFAULT_USER
391 user_model.revoke_perm(usr, 'hg.create.repository')
398 user_model.revoke_perm(usr, 'hg.create.repository')
392 user_model.grant_perm(usr, 'hg.create.none')
399 user_model.grant_perm(usr, 'hg.create.none')
393 user_model.revoke_perm(usr, 'hg.fork.repository')
400 user_model.revoke_perm(usr, 'hg.fork.repository')
394 user_model.grant_perm(usr, 'hg.fork.none')
401 user_model.grant_perm(usr, 'hg.fork.none')
395
402
396 # enable global perms on specific user
403 # enable global perms on specific user
397 user_model.revoke_perm(self.u1, 'hg.create.none')
404 user_model.revoke_perm(self.u1, 'hg.create.none')
398 user_model.grant_perm(self.u1, 'hg.create.repository')
405 user_model.grant_perm(self.u1, 'hg.create.repository')
399 user_model.revoke_perm(self.u1, 'hg.fork.none')
406 user_model.revoke_perm(self.u1, 'hg.fork.none')
400 user_model.grant_perm(self.u1, 'hg.fork.repository')
407 user_model.grant_perm(self.u1, 'hg.fork.repository')
401
408
402 # make sure inherit flag is turned off
409 # make sure inherit flag is turned off
403 self.u1.inherit_default_permissions = False
410 self.u1.inherit_default_permissions = False
404 Session().commit()
411 Session().commit()
405
412
406 # TODO(marcink): check branch perms
413 # TODO(marcink): check branch perms
407
414
408 # this user will have non inherited permissions from he's
415 # this user will have non inherited permissions from he's
409 # explicitly set permissions
416 # explicitly set permissions
410 assert global_perms(self.u1) == {
417 assert global_perms(self.u1) == {
411 'hg.create.repository',
418 'hg.create.repository',
412 'hg.fork.repository',
419 'hg.fork.repository',
413 'hg.register.manual_activate',
420 'hg.register.manual_activate',
414 'hg.password_reset.enabled',
421 'hg.password_reset.enabled',
415 'hg.extern_activate.auto',
422 'hg.extern_activate.auto',
416 'repository.read',
423 'repository.read',
417 'group.read',
424 'group.read',
418 'usergroup.read',
425 'usergroup.read',
419 'branch.push_force',
426 'branch.push_force',
420 }
427 }
421
428
422 @pytest.mark.parametrize('perm, expected_perm', [
429 @pytest.mark.parametrize('perm, expected_perm', [
423 ('hg.inherit_default_perms.false', 'repository.none', ),
430 ('hg.inherit_default_perms.false', 'repository.none', ),
424 ('hg.inherit_default_perms.true', 'repository.read', ),
431 ('hg.inherit_default_perms.true', 'repository.read', ),
425 ])
432 ])
426 def test_inherited_permissions_on_objects(self, perm, expected_perm):
433 def test_inherited_permissions_on_objects(self, perm, expected_perm):
427 _form_result = {
434 _form_result = {
428 'default_inherit_default_permissions': perm,
435 'default_inherit_default_permissions': perm,
429 }
436 }
430 PermissionModel().set_new_user_perms(
437 PermissionModel().set_new_user_perms(
431 User.get_default_user(), _form_result)
438 User.get_default_user(), _form_result)
432 Session().commit()
439 Session().commit()
433
440
434 # make sure inherit flag is turned on
441 # make sure inherit flag is turned on
435 self.u1.inherit_default_permissions = True
442 self.u1.inherit_default_permissions = True
436 Session().commit()
443 Session().commit()
437
444
438 # TODO(marcink): check branch perms
445 # TODO(marcink): check branch perms
439
446
440 # this user will have inherited permissions from default user
447 # this user will have inherited permissions from default user
441 assert global_perms(self.u1) == {
448 assert global_perms(self.u1) == {
442 'hg.create.none',
449 'hg.create.none',
443 'hg.fork.none',
450 'hg.fork.none',
444 'hg.register.manual_activate',
451 'hg.register.manual_activate',
445 'hg.password_reset.enabled',
452 'hg.password_reset.enabled',
446 'hg.extern_activate.auto',
453 'hg.extern_activate.auto',
447 'repository.read',
454 'repository.read',
448 'group.read',
455 'group.read',
449 'usergroup.read',
456 'usergroup.read',
450 'branch.push_force',
457 'branch.push_force',
451 'hg.create.write_on_repogroup.true',
458 'hg.create.write_on_repogroup.true',
452 'hg.usergroup.create.false',
459 'hg.usergroup.create.false',
453 'hg.repogroup.create.false',
460 'hg.repogroup.create.false',
454 perm
461 perm
455 }
462 }
456
463
457 assert set(repo_perms(self.u1).values()) == set([expected_perm])
464 assert set(repo_perms(self.u1).values()) == set([expected_perm])
458
465
459 def test_repo_owner_permissions_not_overwritten_by_group(self):
466 def test_repo_owner_permissions_not_overwritten_by_group(self):
460 # create repo as USER,
467 # create repo as USER,
461 self.test_repo = fixture.create_repo(name='myownrepo',
468 self.test_repo = fixture.create_repo(name='myownrepo',
462 repo_type='hg',
469 repo_type='hg',
463 cur_user=self.u1)
470 cur_user=self.u1)
464
471
465 # he has permissions of admin as owner
472 # he has permissions of admin as owner
466 assert repo_perms(self.u1)['myownrepo'] == 'repository.admin'
473 assert repo_perms(self.u1)['myownrepo'] == 'repository.admin'
467
474
468 # set his permission as user group, he should still be admin
475 # set his permission as user group, he should still be admin
469 self.ug1 = fixture.create_user_group('G1')
476 self.ug1 = fixture.create_user_group('G1')
470 UserGroupModel().add_user_to_group(self.ug1, self.u1)
477 UserGroupModel().add_user_to_group(self.ug1, self.u1)
471 RepoModel().grant_user_group_permission(
478 RepoModel().grant_user_group_permission(
472 self.test_repo,
479 self.test_repo,
473 group_name=self.ug1,
480 group_name=self.ug1,
474 perm='repository.none')
481 perm='repository.none')
475 Session().commit()
482 Session().commit()
476
483
477 assert repo_perms(self.u1)['myownrepo'] == 'repository.admin'
484 assert repo_perms(self.u1)['myownrepo'] == 'repository.admin'
478
485
479 def test_repo_owner_permissions_not_overwritten_by_others(self):
486 def test_repo_owner_permissions_not_overwritten_by_others(self):
480 # create repo as USER,
487 # create repo as USER,
481 self.test_repo = fixture.create_repo(name='myownrepo',
488 self.test_repo = fixture.create_repo(name='myownrepo',
482 repo_type='hg',
489 repo_type='hg',
483 cur_user=self.u1)
490 cur_user=self.u1)
484
491
485 # he has permissions of admin as owner
492 # he has permissions of admin as owner
486 assert repo_perms(self.u1)['myownrepo'] == 'repository.admin'
493 assert repo_perms(self.u1)['myownrepo'] == 'repository.admin'
487
494
488 # set his permission as user, he should still be admin
495 # set his permission as user, he should still be admin
489 RepoModel().grant_user_permission(
496 RepoModel().grant_user_permission(
490 self.test_repo, user=self.u1, perm='repository.none')
497 self.test_repo, user=self.u1, perm='repository.none')
491 Session().commit()
498 Session().commit()
492
499
493 assert repo_perms(self.u1)['myownrepo'] == 'repository.admin'
500 assert repo_perms(self.u1)['myownrepo'] == 'repository.admin'
494
501
495 def test_repo_group_owner_permissions_not_overwritten_by_group(self):
502 def test_repo_group_owner_permissions_not_overwritten_by_group(self):
496 # "u1" shall be owner without any special permission assigned
503 # "u1" shall be owner without any special permission assigned
497 self.g1 = fixture.create_repo_group('test1')
504 self.g1 = fixture.create_repo_group('test1')
498
505
499 # Make user group and grant a permission to user group
506 # Make user group and grant a permission to user group
500 self.ug1 = fixture.create_user_group('G1')
507 self.ug1 = fixture.create_user_group('G1')
501 UserGroupModel().add_user_to_group(self.ug1, self.u1)
508 UserGroupModel().add_user_to_group(self.ug1, self.u1)
502 RepoGroupModel().grant_user_group_permission(
509 RepoGroupModel().grant_user_group_permission(
503 repo_group=self.g1, group_name=self.ug1, perm='group.write')
510 repo_group=self.g1, group_name=self.ug1, perm='group.write')
511 Session().commit()
504
512
505 # Verify that user does not get any special permission if he is not
513 # Verify that user does not get any special permission if he is not
506 # owner
514 # owner
507 assert group_perms(self.u1) == {'test1': 'group.write'}
515 assert group_perms(self.u1) == {'test1': 'group.write'}
508
516
509 # Make him owner of the repo group
517 # Make him owner of the repo group
510 self.g1.user = self.u1
518 self.g1.user = self.u1
511 assert group_perms(self.u1) == {'test1': 'group.admin'}
519 assert group_perms(self.u1) == {'test1': 'group.admin'}
512
520
513 def test_repo_group_owner_permissions_not_overwritten_by_others(self):
521 def test_repo_group_owner_permissions_not_overwritten_by_others(self):
514 # "u1" shall be owner without any special permission assigned
522 # "u1" shall be owner without any special permission assigned
515 self.g1 = fixture.create_repo_group('test1')
523 self.g1 = fixture.create_repo_group('test1')
516 RepoGroupModel().grant_user_permission(
524 RepoGroupModel().grant_user_permission(
517 repo_group=self.g1, user=self.u1, perm='group.write')
525 repo_group=self.g1, user=self.u1, perm='group.write')
526 Session().commit()
518
527
519 # Verify that user does not get any special permission if he is not
528 # Verify that user does not get any special permission if he is not
520 # owner
529 # owner
521 assert group_perms(self.u1) == {'test1': 'group.write'}
530 assert group_perms(self.u1) == {'test1': 'group.write'}
522
531
523 # Make him owner of the repo group
532 # Make him owner of the repo group
524 self.g1.user = self.u1
533 self.g1.user = self.u1
525 assert group_perms(self.u1) == {u'test1': 'group.admin'}
534 assert group_perms(self.u1) == {u'test1': 'group.admin'}
526
535
527 def _test_def_user_perm_equal(
536 def assert_user_perm_equal(
528 self, user, change_factor=0, compare_keys=None):
537 self, user, change_factor=0, compare_keys=None):
529 perms = UserToPerm.query().filter(UserToPerm.user == user).all()
538 perms = UserToPerm.query().filter(UserToPerm.user == user).all()
530 assert len(perms) == \
539 assert len(perms) == \
531 len(Permission.DEFAULT_USER_PERMISSIONS) + change_factor
540 len(Permission.DEFAULT_USER_PERMISSIONS) + change_factor
532 if compare_keys:
541 if compare_keys:
533 assert set(
542 assert set(
534 x.permissions.permission_name for x in perms) == compare_keys
543 x.permissions.permission_name for x in perms) == compare_keys
535
544
536 def _test_def_user_group_perm_equal(
545 def assert_def_user_group_perm_equal(
537 self, user_group, change_factor=0, compare_keys=None):
546 self, user_group, change_factor=0, compare_keys=None):
538 perms = UserGroupToPerm.query().filter(
547 perms = UserGroupToPerm.query().filter(
539 UserGroupToPerm.users_group == user_group).all()
548 UserGroupToPerm.users_group == user_group).all()
540 assert len(perms) == \
549 assert len(perms) == \
541 len(Permission.DEFAULT_USER_PERMISSIONS) + change_factor
550 len(Permission.DEFAULT_USER_PERMISSIONS) + change_factor
542 if compare_keys:
551 if compare_keys:
543 assert set(
552 assert set(
544 x.permissions.permission_name for x in perms) == compare_keys
553 x.permissions.permission_name for x in perms) == compare_keys
545
554
546 def test_set_default_permissions(self):
555 def test_set_default_permissions(self):
547 PermissionModel().create_default_user_permissions(user=self.u1)
556 PermissionModel().create_default_user_permissions(user=self.u1)
548 self._test_def_user_perm_equal(user=self.u1)
557 self.assert_user_perm_equal(user=self.u1)
549
558
550 def test_set_default_permissions_after_one_is_missing(self):
559 def test_set_default_permissions_after_one_is_missing(self):
551 PermissionModel().create_default_user_permissions(user=self.u1)
560 PermissionModel().create_default_user_permissions(user=self.u1)
552 self._test_def_user_perm_equal(user=self.u1)
561 self.assert_user_perm_equal(user=self.u1)
553 # now we delete one, it should be re-created after another call
562 # now we delete one, it should be re-created after another call
554 perms = UserToPerm.query().filter(UserToPerm.user == self.u1).all()
563 perms = UserToPerm.query().filter(UserToPerm.user == self.u1).all()
555 Session().delete(perms[0])
564 Session().delete(perms[0])
556 Session().commit()
565 Session().commit()
557
566
558 self._test_def_user_perm_equal(user=self.u1, change_factor=-1)
567 self.assert_user_perm_equal(user=self.u1, change_factor=-1)
559
568
560 # create missing one !
569 # create missing one !
561 PermissionModel().create_default_user_permissions(user=self.u1)
570 PermissionModel().create_default_user_permissions(user=self.u1)
562 self._test_def_user_perm_equal(user=self.u1)
571 self.assert_user_perm_equal(user=self.u1)
563
572
564 @pytest.mark.parametrize("perm, modify_to", [
573 @pytest.mark.parametrize("perm, modify_to", [
565 ('repository.read', 'repository.none'),
574 ('repository.read', 'repository.none'),
566 ('group.read', 'group.none'),
575 ('group.read', 'group.none'),
567 ('usergroup.read', 'usergroup.none'),
576 ('usergroup.read', 'usergroup.none'),
568 ('hg.create.repository', 'hg.create.none'),
577 ('hg.create.repository', 'hg.create.none'),
569 ('hg.fork.repository', 'hg.fork.none'),
578 ('hg.fork.repository', 'hg.fork.none'),
570 ('hg.register.manual_activate', 'hg.register.auto_activate',)
579 ('hg.register.manual_activate', 'hg.register.auto_activate',)
571 ])
580 ])
572 def test_set_default_permissions_after_modification(self, perm, modify_to):
581 def test_set_default_permissions_after_modification(self, perm, modify_to):
573 PermissionModel().create_default_user_permissions(user=self.u1)
582 PermissionModel().create_default_user_permissions(user=self.u1)
574 self._test_def_user_perm_equal(user=self.u1)
583 self.assert_user_perm_equal(user=self.u1)
575
584
576 old = Permission.get_by_key(perm)
585 old = Permission.get_by_key(perm)
577 new = Permission.get_by_key(modify_to)
586 new = Permission.get_by_key(modify_to)
578 assert old is not None
587 assert old is not None
579 assert new is not None
588 assert new is not None
580
589
581 # now modify permissions
590 # now modify permissions
582 p = UserToPerm.query().filter(
591 p = UserToPerm.query().filter(
583 UserToPerm.user == self.u1).filter(
592 UserToPerm.user == self.u1).filter(
584 UserToPerm.permission == old).one()
593 UserToPerm.permission == old).one()
585 p.permission = new
594 p.permission = new
586 Session().add(p)
595 Session().add(p)
587 Session().commit()
596 Session().commit()
588
597
589 PermissionModel().create_default_user_permissions(user=self.u1)
598 PermissionModel().create_default_user_permissions(user=self.u1)
590 self._test_def_user_perm_equal(user=self.u1)
599 self.assert_user_perm_equal(user=self.u1)
591
600
592 def test_clear_user_perms(self):
601 def test_clear_user_perms(self):
593 PermissionModel().create_default_user_permissions(user=self.u1)
602 PermissionModel().create_default_user_permissions(user=self.u1)
594 self._test_def_user_perm_equal(user=self.u1)
603 self.assert_user_perm_equal(user=self.u1)
595
604
596 # now clear permissions
605 # now clear permissions
597 cleared = PermissionModel()._clear_user_perms(self.u1.user_id)
606 cleared = PermissionModel()._clear_user_perms(self.u1.user_id)
598 self._test_def_user_perm_equal(user=self.u1,
607 self.assert_user_perm_equal(user=self.u1,
599 change_factor=len(cleared)*-1)
608 change_factor=len(cleared)*-1)
600
609
601 def test_clear_user_group_perms(self):
610 def test_clear_user_group_perms(self):
602 self.ug1 = fixture.create_user_group('G1')
611 self.ug1 = fixture.create_user_group('G1')
603 PermissionModel().create_default_user_group_permissions(
612 PermissionModel().create_default_user_group_permissions(
604 user_group=self.ug1)
613 user_group=self.ug1)
605 self._test_def_user_group_perm_equal(user_group=self.ug1)
614 self.assert_def_user_group_perm_equal(user_group=self.ug1)
606
615
607 # now clear permissions
616 # now clear permissions
608 cleared = PermissionModel()._clear_user_group_perms(
617 cleared = PermissionModel()._clear_user_group_perms(
609 self.ug1.users_group_id)
618 self.ug1.users_group_id)
610 self._test_def_user_group_perm_equal(user_group=self.ug1,
619 self.assert_def_user_group_perm_equal(user_group=self.ug1,
611 change_factor=len(cleared)*-1)
620 change_factor=len(cleared)*-1)
612
621
613 @pytest.mark.parametrize("form_result", [
622 @pytest.mark.parametrize("form_result", [
614 {},
623 {},
615 {'default_repo_create': 'hg.create.repository'},
624 {'default_repo_create': 'hg.create.repository'},
616 {'default_repo_create': 'hg.create.repository',
625 {'default_repo_create': 'hg.create.repository',
617 'default_repo_perm': 'repository.read'},
626 'default_repo_perm': 'repository.read'},
618 {'default_repo_create': 'hg.create.none',
627 {'default_repo_create': 'hg.create.none',
619 'default_repo_perm': 'repository.write',
628 'default_repo_perm': 'repository.write',
620 'default_fork_create': 'hg.fork.none'},
629 'default_fork_create': 'hg.fork.none'},
621 ])
630 ])
622 def test_set_new_user_permissions(self, form_result):
631 def test_set_new_user_permissions(self, form_result):
623 _form_result = {}
632 _form_result = {}
624 _form_result.update(form_result)
633 _form_result.update(form_result)
625 PermissionModel().set_new_user_perms(self.u1, _form_result)
634 PermissionModel().set_new_user_perms(self.u1, _form_result)
626 Session().commit()
635 Session().commit()
627 change_factor = -1 * (len(Permission.DEFAULT_USER_PERMISSIONS)
636 change_factor = -1 * (len(Permission.DEFAULT_USER_PERMISSIONS)
628 - len(form_result.keys()))
637 - len(form_result.keys()))
629 self._test_def_user_perm_equal(
638 self.assert_user_perm_equal(
630 self.u1, change_factor=change_factor)
639 self.u1, change_factor=change_factor)
631
640
632 @pytest.mark.parametrize("form_result", [
641 @pytest.mark.parametrize("form_result", [
633 {},
642 {},
634 {'default_repo_create': 'hg.create.repository'},
643 {'default_repo_create': 'hg.create.repository'},
635 {'default_repo_create': 'hg.create.repository',
644 {'default_repo_create': 'hg.create.repository',
636 'default_repo_perm': 'repository.read'},
645 'default_repo_perm': 'repository.read'},
637 {'default_repo_create': 'hg.create.none',
646 {'default_repo_create': 'hg.create.none',
638 'default_repo_perm': 'repository.write',
647 'default_repo_perm': 'repository.write',
639 'default_fork_create': 'hg.fork.none'},
648 'default_fork_create': 'hg.fork.none'},
640 ])
649 ])
641 def test_set_new_user_group_permissions(self, form_result):
650 def test_set_new_user_group_permissions(self, form_result):
642 _form_result = {}
651 _form_result = {}
643 _form_result.update(form_result)
652 _form_result.update(form_result)
644 self.ug1 = fixture.create_user_group('G1')
653 self.ug1 = fixture.create_user_group('G1')
645 PermissionModel().set_new_user_group_perms(self.ug1, _form_result)
654 PermissionModel().set_new_user_group_perms(self.ug1, _form_result)
646 Session().commit()
655 Session().commit()
647 change_factor = -1 * (len(Permission.DEFAULT_USER_PERMISSIONS)
656 change_factor = -1 * (len(Permission.DEFAULT_USER_PERMISSIONS)
648 - len(form_result.keys()))
657 - len(form_result.keys()))
649 self._test_def_user_group_perm_equal(
658 self.assert_def_user_group_perm_equal(
650 self.ug1, change_factor=change_factor)
659 self.ug1, change_factor=change_factor)
651
660
652 @pytest.mark.parametrize("group_active, expected_perm", [
661 @pytest.mark.parametrize("group_active, expected_perm", [
653 (True, 'repository.admin'),
662 (True, 'repository.admin'),
654 (False, 'repository.read'),
663 (False, 'repository.read'),
655 ])
664 ])
656 def test_get_default_repo_perms_from_user_group_with_active_group(
665 def test_get_default_repo_perms_from_user_group_with_active_group(
657 self, backend, user_util, group_active, expected_perm):
666 self, backend, user_util, group_active, expected_perm):
658 repo = backend.create_repo()
667 repo = backend.create_repo()
659 user = user_util.create_user()
668 user = user_util.create_user()
660 user_group = user_util.create_user_group(
669 user_group = user_util.create_user_group(
661 members=[user], users_group_active=group_active)
670 members=[user], users_group_active=group_active)
662
671
663 user_util.grant_user_group_permission_to_repo(
672 user_util.grant_user_group_permission_to_repo(
664 repo, user_group, 'repository.admin')
673 repo, user_group, 'repository.admin')
665 permissions = repo_perms(user)
674 permissions = repo_perms(user)
666 repo_permission = permissions.get(repo.repo_name)
675 repo_permission = permissions.get(repo.repo_name)
667 assert repo_permission == expected_perm
676 assert repo_permission == expected_perm
668
677
669 @pytest.mark.parametrize("group_active, expected_perm", [
678 @pytest.mark.parametrize("group_active, expected_perm", [
670 (True, 'group.admin'),
679 (True, 'group.admin'),
671 (False, 'group.read')
680 (False, 'group.read')
672 ])
681 ])
673 def test_get_default_group_perms_from_user_group_with_active_group(
682 def test_get_default_group_perms_from_user_group_with_active_group(
674 self, user_util, group_active, expected_perm):
683 self, user_util, group_active, expected_perm):
675 user = user_util.create_user()
684 user = user_util.create_user()
676 repo_group = user_util.create_repo_group()
685 repo_group = user_util.create_repo_group()
677 user_group = user_util.create_user_group(
686 user_group = user_util.create_user_group(
678 members=[user], users_group_active=group_active)
687 members=[user], users_group_active=group_active)
679
688
680 user_util.grant_user_group_permission_to_repo_group(
689 user_util.grant_user_group_permission_to_repo_group(
681 repo_group, user_group, 'group.admin')
690 repo_group, user_group, 'group.admin')
682 permissions = group_perms(user)
691 permissions = group_perms(user)
683 group_permission = permissions.get(repo_group.name)
692 group_permission = permissions.get(repo_group.name)
684 assert group_permission == expected_perm
693 assert group_permission == expected_perm
685
694
686 @pytest.mark.parametrize("group_active, expected_perm", [
695 @pytest.mark.parametrize("group_active, expected_perm", [
687 (True, 'usergroup.admin'),
696 (True, 'usergroup.admin'),
688 (False, 'usergroup.read')
697 (False, 'usergroup.read')
689 ])
698 ])
690 def test_get_default_user_group_perms_from_user_group_with_active_group(
699 def test_get_default_user_group_perms_from_user_group_with_active_group(
691 self, user_util, group_active, expected_perm):
700 self, user_util, group_active, expected_perm):
692 user = user_util.create_user()
701 user = user_util.create_user()
693 user_group = user_util.create_user_group(
702 user_group = user_util.create_user_group(
694 members=[user], users_group_active=group_active)
703 members=[user], users_group_active=group_active)
695 target_user_group = user_util.create_user_group()
704 target_user_group = user_util.create_user_group()
696
705
697 user_util.grant_user_group_permission_to_user_group(
706 user_util.grant_user_group_permission_to_user_group(
698 target_user_group, user_group, 'usergroup.admin')
707 target_user_group, user_group, 'usergroup.admin')
699 permissions = user_group_perms(user)
708 permissions = user_group_perms(user)
700 group_permission = permissions.get(target_user_group.users_group_name)
709 group_permission = permissions.get(target_user_group.users_group_name)
701 assert group_permission == expected_perm
710 assert group_permission == expected_perm
702
711
703
712
704 def repo_perms(user):
713 def repo_perms(user):
705 auth_user = AuthUser(user_id=user.user_id)
714 auth_user = AuthUser(user_id=user.user_id)
706 return auth_user.permissions['repositories']
715 return auth_user.permissions['repositories']
707
716
708
717
709 def branch_perms(user):
718 def branch_perms(user):
710 auth_user = AuthUser(user_id=user.user_id)
719 auth_user = AuthUser(user_id=user.user_id)
711 return auth_user.permissions['repository_branches']
720 return auth_user.permissions['repository_branches']
712
721
713
722
714 def group_perms(user):
723 def group_perms(user):
715 auth_user = AuthUser(user_id=user.user_id)
724 auth_user = AuthUser(user_id=user.user_id)
716 return auth_user.permissions['repositories_groups']
725 return auth_user.permissions['repositories_groups']
717
726
718
727
719 def user_group_perms(user):
728 def user_group_perms(user):
720 auth_user = AuthUser(user_id=user.user_id)
729 auth_user = AuthUser(user_id=user.user_id)
721 return auth_user.permissions['user_groups']
730 return auth_user.permissions['user_groups']
722
731
723
732
724 def global_perms(user):
733 def global_perms(user):
725 auth_user = AuthUser(user_id=user.user_id)
734 auth_user = AuthUser(user_id=user.user_id)
726 return auth_user.permissions['global']
735 return auth_user.permissions['global']
727
736
728
737
729 def default_perms(added=None, removed=None):
738 def default_perms(added=None, removed=None):
730 expected_perms = set(Permission.DEFAULT_USER_PERMISSIONS)
739 expected_perms = set(Permission.DEFAULT_USER_PERMISSIONS)
731 if removed:
740 if removed:
732 expected_perms.difference_update(removed)
741 expected_perms.difference_update(removed)
733 if added:
742 if added:
734 expected_perms.update(added)
743 expected_perms.update(added)
735 return expected_perms
744 return expected_perms
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
1 NO CONTENT: modified file
NO CONTENT: modified file
The requested commit or file is too big and content was truncated. Show full diff
General Comments 0
You need to be logged in to leave comments. Login now