# -*- coding: utf-8 -*- # Copyright (C) 2016-2020 RhodeCode GmbH # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU Affero General Public License, version 3 # (only), as published by the Free Software Foundation. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU Affero General Public License # along with this program. If not, see . # # This program is dual-licensed. If you wish to learn more about the # RhodeCode Enterprise Edition, including its added features, Support services, # and proprietary license terms, please see https://rhodecode.com/licenses/ import colander import pytest from rhodecode.integrations import integration_type_registry from rhodecode.integrations.types.base import IntegrationTypeBase from rhodecode.model.validation_schema.schemas.integration_schema import ( make_integration_schema ) @pytest.mark.usefixtures('app', 'autologin_user') class TestIntegrationSchema(object): def test_deserialize_integration_schema_perms( self, backend_random, test_repo_group, StubIntegrationType): repo = backend_random.repo repo_group = test_repo_group empty_perms_dict = { 'global': [], 'repositories': {}, 'repositories_groups': {}, } perms_tests = [ ( 'repo:%s' % repo.repo_name, { 'child_repos_only': False, 'repo_group': None, 'repo': repo, }, [ ({}, False), ({'global': ['hg.admin']}, True), ({'global': []}, False), ({'repositories': {repo.repo_name: 'repository.admin'}}, True), ({'repositories': {repo.repo_name: 'repository.read'}}, False), ({'repositories': {repo.repo_name: 'repository.write'}}, False), ({'repositories': {repo.repo_name: 'repository.none'}}, False), ] ), ( 'repogroup:%s' % repo_group.group_name, { 'repo': None, 'repo_group': repo_group, 'child_repos_only': True, }, [ ({}, False), ({'global': ['hg.admin']}, True), ({'global': []}, False), ({'repositories_groups': {repo_group.group_name: 'group.admin'}}, True), ({'repositories_groups': {repo_group.group_name: 'group.read'}}, False), ({'repositories_groups': {repo_group.group_name: 'group.write'}}, False), ({'repositories_groups': {repo_group.group_name: 'group.none'}}, False), ] ), ( 'repogroup-recursive:%s' % repo_group.group_name, { 'repo': None, 'repo_group': repo_group, 'child_repos_only': False, }, [ ({}, False), ({'global': ['hg.admin']}, True), ({'global': []}, False), ({'repositories_groups': {repo_group.group_name: 'group.admin'}}, True), ({'repositories_groups': {repo_group.group_name: 'group.read'}}, False), ({'repositories_groups': {repo_group.group_name: 'group.write'}}, False), ({'repositories_groups': {repo_group.group_name: 'group.none'}}, False), ] ), ( 'global', { 'repo': None, 'repo_group': None, 'child_repos_only': False, }, [ ({}, False), ({'global': ['hg.admin']}, True), ({'global': []}, False), ] ), ( 'root-repos', { 'repo': None, 'repo_group': None, 'child_repos_only': True, }, [ ({}, False), ({'global': ['hg.admin']}, True), ({'global': []}, False), ] ), ] for scope_input, scope_output, perms_allowed in perms_tests: for perms_update, allowed in perms_allowed: perms = dict(empty_perms_dict, **perms_update) schema = make_integration_schema( IntegrationType=StubIntegrationType ).bind(permissions=perms) input_data = { 'options': { 'enabled': 'true', 'scope': scope_input, 'name': 'test integration', }, 'settings': { 'test_string_field': 'stringy', 'test_int_field': '100', } } if not allowed: with pytest.raises(colander.Invalid): schema.deserialize(input_data) else: assert schema.deserialize(input_data) == { 'options': { 'enabled': True, 'scope': scope_output, 'name': 'test integration', }, 'settings': { 'test_string_field': 'stringy', 'test_int_field': 100, } }