##// END OF EJS Templates
repos: only flush permissions for owner on creation. The repo creation task flushes ALL and can be done async
repos: only flush permissions for owner on creation. The repo creation task flushes ALL and can be done async

File last commit:

r4306:09801de9 default
r4869:dbc52491 default
Show More
test_delegated_admin.py
157 lines | 6.1 KiB | text/x-python | PythonLexer
# -*- coding: utf-8 -*-
# Copyright (C) 2016-2020 RhodeCode GmbH
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License, version 3
# (only), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
# This program is dual-licensed. If you wish to learn more about the
# RhodeCode Enterprise Edition, including its added features, Support services,
# and proprietary license terms, please see https://rhodecode.com/licenses/
import pytest
from rhodecode.tests import TestController
from rhodecode.tests.fixture import Fixture
def route_path(name, params=None, **kwargs):
import urllib
from rhodecode.apps._base import ADMIN_PREFIX
base_url = {
'home': '/',
'admin_home': ADMIN_PREFIX,
'repos':
ADMIN_PREFIX + '/repos',
'repos_data':
ADMIN_PREFIX + '/repos_data',
'repo_groups':
ADMIN_PREFIX + '/repo_groups',
'repo_groups_data':
ADMIN_PREFIX + '/repo_groups_data',
'user_groups':
ADMIN_PREFIX + '/user_groups',
'user_groups_data':
ADMIN_PREFIX + '/user_groups_data',
}[name].format(**kwargs)
if params:
base_url = '{}?{}'.format(base_url, urllib.urlencode(params))
return base_url
fixture = Fixture()
class TestAdminDelegatedUser(TestController):
def test_regular_user_cannot_see_admin_interfaces(self, user_util, xhr_header):
user = user_util.create_user(password='qweqwe')
user_util.inherit_default_user_permissions(user.username, False)
self.log_user(user.username, 'qweqwe')
# user doesn't have any access to resources so main admin page should 404
self.app.get(route_path('admin_home'), status=404)
response = self.app.get(route_path('repos_data'),
status=200, extra_environ=xhr_header)
assert response.json['data'] == []
response = self.app.get(route_path('repo_groups_data'),
status=200, extra_environ=xhr_header)
assert response.json['data'] == []
response = self.app.get(route_path('user_groups_data'),
status=200, extra_environ=xhr_header)
assert response.json['data'] == []
def test_regular_user_can_see_admin_interfaces_if_owner(self, user_util, xhr_header):
user = user_util.create_user(password='qweqwe')
username = user.username
repo = user_util.create_repo(owner=username)
repo_name = repo.repo_name
repo_group = user_util.create_repo_group(owner=username)
repo_group_name = repo_group.group_name
user_group = user_util.create_user_group(owner=username)
user_group_name = user_group.users_group_name
self.log_user(username, 'qweqwe')
response = self.app.get(route_path('admin_home'))
assert_response = response.assert_response()
assert_response.element_contains('td.delegated-admin-repos', '1')
assert_response.element_contains('td.delegated-admin-repo-groups', '1')
assert_response.element_contains('td.delegated-admin-user-groups', '1')
# admin interfaces have visible elements
response = self.app.get(route_path('repos_data'),
extra_environ=xhr_header, status=200)
response.mustcontain('<a href=\\"/{}\\">'.format(repo_name))
response = self.app.get(route_path('repo_groups_data'),
extra_environ=xhr_header, status=200)
response.mustcontain('<a href=\\"/{}\\">'.format(repo_group_name))
response = self.app.get(route_path('user_groups_data'),
extra_environ=xhr_header, status=200)
response.mustcontain('<a href=\\"/_profile_user_group/{}\\">'.format(user_group_name))
def test_regular_user_can_see_admin_interfaces_if_admin_perm(
self, user_util, xhr_header):
user = user_util.create_user(password='qweqwe')
username = user.username
repo = user_util.create_repo()
repo_name = repo.repo_name
repo_group = user_util.create_repo_group()
repo_group_name = repo_group.group_name
user_group = user_util.create_user_group()
user_group_name = user_group.users_group_name
user_util.grant_user_permission_to_repo(
repo, user, 'repository.admin')
user_util.grant_user_permission_to_repo_group(
repo_group, user, 'group.admin')
user_util.grant_user_permission_to_user_group(
user_group, user, 'usergroup.admin')
self.log_user(username, 'qweqwe')
# check if in home view, such user doesn't see the "admin" menus
response = self.app.get(route_path('admin_home'))
assert_response = response.assert_response()
assert_response.element_contains('td.delegated-admin-repos', '1')
assert_response.element_contains('td.delegated-admin-repo-groups', '1')
assert_response.element_contains('td.delegated-admin-user-groups', '1')
# admin interfaces have visible elements
response = self.app.get(route_path('repos_data'),
extra_environ=xhr_header, status=200)
response.mustcontain('<a href=\\"/{}\\">'.format(repo_name))
response = self.app.get(route_path('repo_groups_data'),
extra_environ=xhr_header, status=200)
response.mustcontain('<a href=\\"/{}\\">'.format(repo_group_name))
response = self.app.get(route_path('user_groups_data'),
extra_environ=xhr_header, status=200)
response.mustcontain('<a href=\\"/_profile_user_group/{}\\">'.format(user_group_name))