|
|
from rhodecode.tests import *
|
|
|
from rhodecode.model.db import UserGroup, UserGroupToPerm, Permission
|
|
|
|
|
|
TEST_USER_GROUP = 'admins_test'
|
|
|
|
|
|
|
|
|
class TestAdminUsersGroupsController(TestController):
|
|
|
|
|
|
def test_index(self):
|
|
|
response = self.app.get(url('users_groups'))
|
|
|
# Test response...
|
|
|
|
|
|
def test_index_as_xml(self):
|
|
|
response = self.app.get(url('formatted_users_groups', format='xml'))
|
|
|
|
|
|
def test_create(self):
|
|
|
self.log_user()
|
|
|
users_group_name = TEST_USER_GROUP
|
|
|
response = self.app.post(url('users_groups'),
|
|
|
{'users_group_name': users_group_name,
|
|
|
'active':True})
|
|
|
response.follow()
|
|
|
|
|
|
self.checkSessionFlash(response,
|
|
|
'created user group %s' % TEST_USER_GROUP)
|
|
|
|
|
|
def test_new(self):
|
|
|
response = self.app.get(url('new_users_group'))
|
|
|
|
|
|
def test_new_as_xml(self):
|
|
|
response = self.app.get(url('formatted_new_users_group', format='xml'))
|
|
|
|
|
|
def test_update(self):
|
|
|
response = self.app.put(url('users_group', id=1))
|
|
|
|
|
|
def test_update_browser_fakeout(self):
|
|
|
response = self.app.post(url('users_group', id=1),
|
|
|
params=dict(_method='put'))
|
|
|
|
|
|
def test_delete(self):
|
|
|
self.log_user()
|
|
|
users_group_name = TEST_USER_GROUP + 'another'
|
|
|
response = self.app.post(url('users_groups'),
|
|
|
{'users_group_name':users_group_name,
|
|
|
'active':True})
|
|
|
response.follow()
|
|
|
|
|
|
self.checkSessionFlash(response,
|
|
|
'created user group %s' % users_group_name)
|
|
|
|
|
|
gr = self.Session.query(UserGroup)\
|
|
|
.filter(UserGroup.users_group_name ==
|
|
|
users_group_name).one()
|
|
|
|
|
|
response = self.app.delete(url('users_group', id=gr.users_group_id))
|
|
|
|
|
|
gr = self.Session.query(UserGroup)\
|
|
|
.filter(UserGroup.users_group_name ==
|
|
|
users_group_name).scalar()
|
|
|
|
|
|
self.assertEqual(gr, None)
|
|
|
|
|
|
def test_enable_repository_read_on_group(self):
|
|
|
self.log_user()
|
|
|
users_group_name = TEST_USER_GROUP + 'another2'
|
|
|
response = self.app.post(url('users_groups'),
|
|
|
{'users_group_name': users_group_name,
|
|
|
'active': True})
|
|
|
response.follow()
|
|
|
|
|
|
ug = UserGroup.get_by_group_name(users_group_name)
|
|
|
self.checkSessionFlash(response,
|
|
|
'created user group %s' % users_group_name)
|
|
|
## ENABLE REPO CREATE ON A GROUP
|
|
|
response = self.app.put(url('users_group_perm', id=ug.users_group_id),
|
|
|
{'create_repo_perm': True})
|
|
|
|
|
|
response.follow()
|
|
|
ug = UserGroup.get_by_group_name(users_group_name)
|
|
|
p = Permission.get_by_key('hg.create.repository')
|
|
|
p2 = Permission.get_by_key('hg.fork.none')
|
|
|
# check if user has this perms, they should be here since
|
|
|
# defaults are on
|
|
|
perms = UserGroupToPerm.query()\
|
|
|
.filter(UserGroupToPerm.users_group == ug).all()
|
|
|
|
|
|
self.assertEqual(
|
|
|
[[x.users_group_id, x.permission_id, ] for x in perms],
|
|
|
[[ug.users_group_id, p.permission_id],
|
|
|
[ug.users_group_id, p2.permission_id]]
|
|
|
)
|
|
|
|
|
|
## DISABLE REPO CREATE ON A GROUP
|
|
|
response = self.app.put(url('users_group_perm', id=ug.users_group_id),
|
|
|
{})
|
|
|
|
|
|
response.follow()
|
|
|
ug = UserGroup.get_by_group_name(users_group_name)
|
|
|
p = Permission.get_by_key('hg.create.none')
|
|
|
p2 = Permission.get_by_key('hg.fork.none')
|
|
|
# check if user has this perms, they should be here since
|
|
|
# defaults are on
|
|
|
perms = UserGroupToPerm.query()\
|
|
|
.filter(UserGroupToPerm.users_group == ug).all()
|
|
|
|
|
|
self.assertEqual(
|
|
|
sorted([[x.users_group_id, x.permission_id, ] for x in perms]),
|
|
|
sorted([[ug.users_group_id, p.permission_id],
|
|
|
[ug.users_group_id, p2.permission_id]])
|
|
|
)
|
|
|
|
|
|
# DELETE !
|
|
|
ug = UserGroup.get_by_group_name(users_group_name)
|
|
|
ugid = ug.users_group_id
|
|
|
response = self.app.delete(url('users_group', id=ug.users_group_id))
|
|
|
response = response.follow()
|
|
|
gr = self.Session.query(UserGroup)\
|
|
|
.filter(UserGroup.users_group_name ==
|
|
|
users_group_name).scalar()
|
|
|
|
|
|
self.assertEqual(gr, None)
|
|
|
p = Permission.get_by_key('hg.create.repository')
|
|
|
perms = UserGroupToPerm.query()\
|
|
|
.filter(UserGroupToPerm.users_group_id == ugid).all()
|
|
|
perms = [[x.users_group_id,
|
|
|
x.permission_id, ] for x in perms]
|
|
|
self.assertEqual(
|
|
|
perms,
|
|
|
[]
|
|
|
)
|
|
|
|
|
|
def test_enable_repository_fork_on_group(self):
|
|
|
self.log_user()
|
|
|
users_group_name = TEST_USER_GROUP + 'another2'
|
|
|
response = self.app.post(url('users_groups'),
|
|
|
{'users_group_name': users_group_name,
|
|
|
'active': True})
|
|
|
response.follow()
|
|
|
|
|
|
ug = UserGroup.get_by_group_name(users_group_name)
|
|
|
self.checkSessionFlash(response,
|
|
|
'created user group %s' % users_group_name)
|
|
|
## ENABLE REPO CREATE ON A GROUP
|
|
|
response = self.app.put(url('users_group_perm', id=ug.users_group_id),
|
|
|
{'fork_repo_perm': True})
|
|
|
|
|
|
response.follow()
|
|
|
ug = UserGroup.get_by_group_name(users_group_name)
|
|
|
p = Permission.get_by_key('hg.create.none')
|
|
|
p2 = Permission.get_by_key('hg.fork.repository')
|
|
|
# check if user has this perms, they should be here since
|
|
|
# defaults are on
|
|
|
perms = UserGroupToPerm.query()\
|
|
|
.filter(UserGroupToPerm.users_group == ug).all()
|
|
|
|
|
|
self.assertEqual(
|
|
|
[[x.users_group_id, x.permission_id, ] for x in perms],
|
|
|
[[ug.users_group_id, p.permission_id],
|
|
|
[ug.users_group_id, p2.permission_id]]
|
|
|
)
|
|
|
|
|
|
## DISABLE REPO CREATE ON A GROUP
|
|
|
response = self.app.put(url('users_group_perm', id=ug.users_group_id),
|
|
|
{})
|
|
|
|
|
|
response.follow()
|
|
|
ug = UserGroup.get_by_group_name(users_group_name)
|
|
|
p = Permission.get_by_key('hg.create.none')
|
|
|
p2 = Permission.get_by_key('hg.fork.none')
|
|
|
# check if user has this perms, they should be here since
|
|
|
# defaults are on
|
|
|
perms = UserGroupToPerm.query()\
|
|
|
.filter(UserGroupToPerm.users_group == ug).all()
|
|
|
|
|
|
self.assertEqual(
|
|
|
[[x.users_group_id, x.permission_id, ] for x in perms],
|
|
|
[[ug.users_group_id, p.permission_id],
|
|
|
[ug.users_group_id, p2.permission_id]]
|
|
|
)
|
|
|
|
|
|
# DELETE !
|
|
|
ug = UserGroup.get_by_group_name(users_group_name)
|
|
|
ugid = ug.users_group_id
|
|
|
response = self.app.delete(url('users_group', id=ug.users_group_id))
|
|
|
response = response.follow()
|
|
|
gr = self.Session.query(UserGroup)\
|
|
|
.filter(UserGroup.users_group_name ==
|
|
|
users_group_name).scalar()
|
|
|
|
|
|
self.assertEqual(gr, None)
|
|
|
p = Permission.get_by_key('hg.fork.repository')
|
|
|
perms = UserGroupToPerm.query()\
|
|
|
.filter(UserGroupToPerm.users_group_id == ugid).all()
|
|
|
perms = [[x.users_group_id,
|
|
|
x.permission_id, ] for x in perms]
|
|
|
self.assertEqual(
|
|
|
perms,
|
|
|
[]
|
|
|
)
|
|
|
|
|
|
def test_delete_browser_fakeout(self):
|
|
|
response = self.app.post(url('users_group', id=1),
|
|
|
params=dict(_method='delete'))
|
|
|
|
|
|
def test_show(self):
|
|
|
response = self.app.get(url('users_group', id=1))
|
|
|
|
|
|
def test_show_as_xml(self):
|
|
|
response = self.app.get(url('formatted_users_group', id=1, format='xml'))
|
|
|
|
|
|
def test_edit(self):
|
|
|
response = self.app.get(url('edit_users_group', id=1))
|
|
|
|
|
|
def test_edit_as_xml(self):
|
|
|
response = self.app.get(url('formatted_edit_users_group', id=1, format='xml'))
|
|
|
|
|
|
def test_assign_members(self):
|
|
|
pass
|
|
|
|
|
|
def test_add_create_permission(self):
|
|
|
pass
|
|
|
|
|
|
def test_revoke_members(self):
|
|
|
pass
|
|
|
|