|
|
|
|
|
|
|
|
# Copyright (C) 2016-2023 RhodeCode GmbH
|
|
|
#
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
# it under the terms of the GNU Affero General Public License, version 3
|
|
|
# (only), as published by the Free Software Foundation.
|
|
|
#
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
# GNU General Public License for more details.
|
|
|
#
|
|
|
# You should have received a copy of the GNU Affero General Public License
|
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
#
|
|
|
# This program is dual-licensed. If you wish to learn more about the
|
|
|
# RhodeCode Enterprise Edition, including its added features, Support services,
|
|
|
# and proprietary license terms, please see https://rhodecode.com/licenses/
|
|
|
|
|
|
import pytest
|
|
|
|
|
|
from rhodecode.tests import TestController
|
|
|
from rhodecode.tests.fixture import Fixture
|
|
|
from rhodecode.tests.routes import route_path
|
|
|
|
|
|
|
|
|
fixture = Fixture()
|
|
|
|
|
|
|
|
|
class TestAdminDelegatedUser(TestController):
|
|
|
|
|
|
def test_regular_user_cannot_see_admin_interfaces(self, user_util, xhr_header):
|
|
|
user = user_util.create_user(password='qweqwe')
|
|
|
user_util.inherit_default_user_permissions(user.username, False)
|
|
|
|
|
|
self.log_user(user.username, 'qweqwe')
|
|
|
|
|
|
# user doesn't have any access to resources so main admin page should 404
|
|
|
self.app.get(route_path('admin_home'), status=404)
|
|
|
|
|
|
response = self.app.get(route_path('repos_data'),
|
|
|
status=200, extra_environ=xhr_header)
|
|
|
assert response.json['data'] == []
|
|
|
|
|
|
response = self.app.get(route_path('repo_groups_data'),
|
|
|
status=200, extra_environ=xhr_header)
|
|
|
assert response.json['data'] == []
|
|
|
|
|
|
response = self.app.get(route_path('user_groups_data'),
|
|
|
status=200, extra_environ=xhr_header)
|
|
|
assert response.json['data'] == []
|
|
|
|
|
|
def test_regular_user_can_see_admin_interfaces_if_owner(self, user_util, xhr_header):
|
|
|
user = user_util.create_user(password='qweqwe')
|
|
|
username = user.username
|
|
|
|
|
|
repo = user_util.create_repo(owner=username)
|
|
|
repo_name = repo.repo_name
|
|
|
|
|
|
repo_group = user_util.create_repo_group(owner=username)
|
|
|
repo_group_name = repo_group.group_name
|
|
|
|
|
|
user_group = user_util.create_user_group(owner=username)
|
|
|
user_group_name = user_group.users_group_name
|
|
|
|
|
|
self.log_user(username, 'qweqwe')
|
|
|
|
|
|
response = self.app.get(route_path('admin_home'))
|
|
|
|
|
|
assert_response = response.assert_response()
|
|
|
|
|
|
assert_response.element_contains('td.delegated-admin-repos', '1')
|
|
|
assert_response.element_contains('td.delegated-admin-repo-groups', '1')
|
|
|
assert_response.element_contains('td.delegated-admin-user-groups', '1')
|
|
|
|
|
|
# admin interfaces have visible elements
|
|
|
response = self.app.get(route_path('repos_data'),
|
|
|
extra_environ=xhr_header, status=200)
|
|
|
response.mustcontain('<a href=\\"/{}\\">'.format(repo_name))
|
|
|
|
|
|
response = self.app.get(route_path('repo_groups_data'),
|
|
|
extra_environ=xhr_header, status=200)
|
|
|
response.mustcontain('<a href=\\"/{}\\">'.format(repo_group_name))
|
|
|
|
|
|
response = self.app.get(route_path('user_groups_data'),
|
|
|
extra_environ=xhr_header, status=200)
|
|
|
response.mustcontain('<a href=\\"/_profile_user_group/{}\\">'.format(user_group_name))
|
|
|
|
|
|
def test_regular_user_can_see_admin_interfaces_if_admin_perm(
|
|
|
self, user_util, xhr_header):
|
|
|
user = user_util.create_user(password='qweqwe')
|
|
|
username = user.username
|
|
|
|
|
|
repo = user_util.create_repo()
|
|
|
repo_name = repo.repo_name
|
|
|
|
|
|
repo_group = user_util.create_repo_group()
|
|
|
repo_group_name = repo_group.group_name
|
|
|
|
|
|
user_group = user_util.create_user_group()
|
|
|
user_group_name = user_group.users_group_name
|
|
|
|
|
|
user_util.grant_user_permission_to_repo(
|
|
|
repo, user, 'repository.admin')
|
|
|
user_util.grant_user_permission_to_repo_group(
|
|
|
repo_group, user, 'group.admin')
|
|
|
user_util.grant_user_permission_to_user_group(
|
|
|
user_group, user, 'usergroup.admin')
|
|
|
|
|
|
self.log_user(username, 'qweqwe')
|
|
|
# check if in home view, such user doesn't see the "admin" menus
|
|
|
response = self.app.get(route_path('admin_home'))
|
|
|
|
|
|
assert_response = response.assert_response()
|
|
|
|
|
|
assert_response.element_contains('td.delegated-admin-repos', '1')
|
|
|
assert_response.element_contains('td.delegated-admin-repo-groups', '1')
|
|
|
assert_response.element_contains('td.delegated-admin-user-groups', '1')
|
|
|
|
|
|
# admin interfaces have visible elements
|
|
|
response = self.app.get(route_path('repos_data'),
|
|
|
extra_environ=xhr_header, status=200)
|
|
|
response.mustcontain('<a href=\\"/{}\\">'.format(repo_name))
|
|
|
|
|
|
response = self.app.get(route_path('repo_groups_data'),
|
|
|
extra_environ=xhr_header, status=200)
|
|
|
response.mustcontain('<a href=\\"/{}\\">'.format(repo_group_name))
|
|
|
|
|
|
response = self.app.get(route_path('user_groups_data'),
|
|
|
extra_environ=xhr_header, status=200)
|
|
|
response.mustcontain('<a href=\\"/_profile_user_group/{}\\">'.format(user_group_name))
|
|
|
|