def test_match_user_roles_data(self): self.browser_do_login('admin', '') auth_tool = self.portal.getAuthenticationTool() user = auth_tool.getUser(self.username) role_logger = IRoleLogger(self.portal) user.setRoles(self.portal, ['Manager']) info = auth_tool.getUserRoles(user) additional_info = role_logger.getUserRolesInfo(self.username) zope_roles = set(info) naaya_roles = self._get_roles_from_additional_info(additional_info) self.assertTrue(len(zope_roles.symmetric_difference(naaya_roles)) == 0) user.addRoles(self.portal, ['Reader']) info = auth_tool.getUserRoles(user) additional_info = role_logger.getUserRolesInfo(self.username) zope_roles = set(info) naaya_roles = self._get_roles_from_additional_info(additional_info) self.assertTrue(len(zope_roles.symmetric_difference(naaya_roles)) == 0) user.delRoles(self.portal) info = auth_tool.getUserRoles(user) additional_info = role_logger.getUserRolesInfo(self.username) zope_roles = set(info) naaya_roles = self._get_roles_from_additional_info(additional_info) self.assertTrue(len(zope_roles.symmetric_difference(naaya_roles)) == 0) self.browser_do_logout()
def test_user_roles_add_remove(self): self.browser_do_login('admin', '') auth_tool = self.portal.getAuthenticationTool() user = auth_tool.getUser(self.username) role_logger = IRoleLogger(self.portal) user.setRoles(self.portal, ['Manager']) additional_info = role_logger.getUserRolesInfo(self.username) self.assertTrue(len(additional_info) == 1) self.assertTrue(additional_info[0]['roles'] == ['Manager']) self.assertTrue(additional_info[0].has_key('date')) self.assertTrue(additional_info[0]['user_granting_roles'] == 'admin') user.addRoles(self.portal, ['Reader']) additional_info = role_logger.getUserRolesInfo(self.username) self.assertTrue(len(additional_info) == 2) self.assertTrue(additional_info[0]['roles'] == ['Manager']) self.assertTrue(additional_info[0].has_key('date')) self.assertTrue(additional_info[0]['user_granting_roles'] == 'admin') self.assertTrue(additional_info[1]['roles'] == ['Reader']) self.assertTrue(additional_info[1].has_key('date')) self.assertTrue(additional_info[1]['user_granting_roles'] == 'admin') user.delRoles(self.portal) additional_info = role_logger.getUserRolesInfo(self.username) self.assertTrue(additional_info is None) self.browser_do_logout()
def test_match_local_roles_data(self): self.browser_do_login('admin', '') role_logger = IRoleLogger(self.portal.info) self.portal.info.manage_setLocalRoles(self.username, ['Manager']) info = self.portal.info.get_local_roles_for_userid(self.username) additional_info = role_logger.getLocalRolesInfo(self.username) zope_roles = set(info) naaya_roles = self._get_roles_from_additional_info(additional_info) self.assertTrue(len(zope_roles.symmetric_difference(naaya_roles)) == 0) self.portal.info.manage_addLocalRoles(self.username, ['Reader']) info = self.portal.info.get_local_roles_for_userid(self.username) additional_info = role_logger.getLocalRolesInfo(self.username) zope_roles = set(info) naaya_roles = self._get_roles_from_additional_info(additional_info) self.assertTrue(len(zope_roles.symmetric_difference(naaya_roles)) == 0) self.portal.info.manage_delLocalRoles([self.username]) info = self.portal.info.get_local_roles_for_userid(self.username) additional_info = role_logger.getLocalRolesInfo(self.username) zope_roles = set(info) naaya_roles = self._get_roles_from_additional_info(additional_info) self.assertTrue(len(zope_roles.symmetric_difference(naaya_roles)) == 0) self.browser_do_logout()
def test_local_roles_add_remove(self): self.browser_do_login('admin', '') role_logger = IRoleLogger(self.portal.info) self.portal.info.manage_setLocalRoles(self.username, ['Manager']) additional_info = role_logger.getLocalRolesInfo(self.username) self.assertTrue(len(additional_info) == 1) self.assertTrue(additional_info[0]['roles'] == ['Manager']) self.assertTrue(additional_info[0].has_key('date')) self.assertTrue(additional_info[0]['user_granting_roles'] == 'admin') self.portal.info.manage_addLocalRoles(self.username, ['Reader']) additional_info = role_logger.getLocalRolesInfo(self.username) self.assertTrue(len(additional_info) == 2) self.assertTrue(additional_info[0]['roles'] == ['Manager']) self.assertTrue(additional_info[0].has_key('date')) self.assertTrue(additional_info[0]['user_granting_roles'] == 'admin') self.assertTrue(additional_info[1]['roles'] == ['Reader']) self.assertTrue(additional_info[1].has_key('date')) self.assertTrue(additional_info[1]['user_granting_roles'] == 'admin') self.portal.info.manage_delLocalRoles([self.username]) additional_info = role_logger.getLocalRolesInfo(self.username) self.assertTrue(additional_info is None) self.browser_do_logout()
def test_user_roles_add_remove_raw(self): self.browser_do_login('admin', '') role_logger = IRoleLogger(self.portal) role_logger.setUserRolesInfo(self.username, ['Manager']) additional_info = role_logger.getUserRolesInfo(self.username) self.assertTrue(len(additional_info) == 1) self.assertTrue(additional_info[0]['roles'] == ['Manager']) self.assertTrue(additional_info[0].has_key('date')) self.assertTrue(additional_info[0]['user_granting_roles'] == 'admin') role_logger.addUserRolesInfo(self.username, ['Reader']) additional_info = role_logger.getUserRolesInfo(self.username) self.assertTrue(len(additional_info) == 2) self.assertTrue(additional_info[0]['roles'] == ['Manager']) self.assertTrue(additional_info[0].has_key('date')) self.assertTrue(additional_info[0]['user_granting_roles'] == 'admin') self.assertTrue(additional_info[1]['roles'] == ['Reader']) self.assertTrue(additional_info[1].has_key('date')) self.assertTrue(additional_info[1]['user_granting_roles'] == 'admin') role_logger.delUserRolesInfo([self.username]) additional_info = role_logger.getUserRolesInfo(self.username) self.assertTrue(additional_info is None) self.browser_do_logout()
def test_group_roles_add_remove(self): self.browser_do_login('admin', '') satellite = self.portal.acl_satellite role_logger = IRoleLogger(self.portal) additional_info = role_logger.getLDAPGroupRolesInfo(self.groupname) self.assertTrue(additional_info is None) satellite.add_group_roles(self.groupname, ['Manager']) additional_info = role_logger.getLDAPGroupRolesInfo(self.groupname) self.assertTrue(len(additional_info) == 1) self.assertTrue(additional_info[0]['roles'] == ['Manager']) self.assertTrue(additional_info[0].has_key('date')) self.assertTrue(additional_info[0]['user_granting_roles'] == 'admin') satellite.remove_group_roles(self.groupname, ['Manager']) additional_info = role_logger.getLDAPGroupRolesInfo(self.groupname) self.assertTrue(additional_info is None) self.browser_do_logout()
def test_all_local_roles_info(self): self.browser_do_login('admin', '') auth_tool = self.portal.getAuthenticationTool() user = auth_tool.getUser(self.username) user.setRoles(self.portal, ['Manager']) user.roles.extend(['Reader']) role_logger = IRoleLogger(self.portal) all_info = role_logger.getAllUserRolesInfo() self.assertTrue(all_info.has_key(self.username)) user_info = all_info[self.username] self.assertTrue(len(user_info) == 2) self.assertTrue(user_info[0]['roles'] == ['Manager']) self.assertTrue(user_info[0].has_key('date')) self.assertTrue(user_info[0]['user_granting_roles'] == 'admin') self.assertTrue(user_info[1]['roles'] == ['Reader']) self.assertTrue(not user_info[1].has_key('date')) self.assertTrue(not user_info[1].has_key('user_granting_roles')) self.browser_do_logout()
def test_all_group_roles_info(self): self.browser_do_login('admin', '') satellite = self.portal.acl_satellite role_logger = IRoleLogger(self.portal) additional_info = role_logger.getLDAPGroupRolesInfo(self.groupname) self.assertTrue(additional_info is None) satellite.add_group_roles(self.groupname, ['Manager']) satellite.add_group_roles(self.groupname, ['Reader']) all_info = role_logger.getAllLDAPGroupRolesInfo() self.assertTrue(all_info.has_key(self.groupname)) group_info = all_info[self.groupname] self.assertTrue(len(group_info) == 2) self.assertTrue(group_info[0]['roles'] == ['Manager']) self.assertTrue(group_info[0].has_key('date')) self.assertTrue(group_info[0]['user_granting_roles'] == 'admin') self.assertTrue(group_info[1]['roles'] == ['Reader']) self.assertTrue(group_info[1].has_key('date')) self.assertTrue(group_info[1]['user_granting_roles'] == 'admin') self.browser_do_logout()
def test_match_group_roles_data(self): self.browser_do_login('admin', '') satellite = self.portal.acl_satellite role_logger = IRoleLogger(self.portal) additional_info = role_logger.getLDAPGroupRolesInfo(self.groupname) self.assertTrue(additional_info is None) satellite.add_group_roles(self.groupname, ['Manager']) info = satellite.getAllLocalRoles()[self.groupname] additional_info = role_logger.getLDAPGroupRolesInfo(self.groupname) zope_roles = set(info) naaya_roles = self._get_roles_from_additional_info(additional_info) self.assertTrue(len(zope_roles.symmetric_difference(naaya_roles)) == 0) satellite.remove_group_roles(self.groupname, ['Manager']) info = satellite.getAllLocalRoles().get(self.groupname, []) additional_info = role_logger.getLDAPGroupRolesInfo(self.groupname) zope_roles = set(info) naaya_roles = self._get_roles_from_additional_info(additional_info) self.assertTrue(len(zope_roles.symmetric_difference(naaya_roles)) == 0) self.browser_do_logout()