def setUp(self):
        test_helpers.patch(self, [
            'libs.access._is_domain_allowed',
            'libs.auth.get_current_user',
            'clusterfuzz._internal.config.db_config.get',
            'libs.issue_management.issue_tracker.IssueTracker.get_original_issue',
            'libs.issue_management.issue_tracker_utils.'
            'get_issue_tracker_for_testcase',
            'libs.issue_management.monorail.issue_tracker_manager.'
            'IssueTrackerManager',
        ])
        self.itm = issue_tracker_manager.IssueTrackerManager('test')
        self.itm.project_name = 'test-project'
        self.mock.get_issue_tracker_for_testcase.return_value = (
            monorail.IssueTracker(self.itm))
        self.get_issue = self.itm.get_issue

        self.email = '*****@*****.**'
        self.mock.get_current_user.return_value = auth.User(self.email)

        self.bug = issue.Issue()
        self.bug.id = 1234
        self.bug.itm = self.itm
        self.original_bug = issue.Issue()
        self.original_bug.id = 5678
        self.original_bug.itm = self.itm

        self.testcase = data_types.Testcase()

        self.mock.get.return_value = (data_types.Config(
            relax_testcase_restrictions=True))
        self.mock._is_domain_allowed.return_value = False
Exemple #2
0
 def setUp(self):
     test_helpers.patch(self, [
         'libs.auth.get_current_user',
         'libs.auth.is_current_user_admin',
         'libs.access._is_privileged_user',
         'libs.access._is_domain_allowed',
         'base.external_users.is_fuzzer_allowed_for_user',
         'base.external_users.is_job_allowed_for_user',
     ])
     self.user = auth.User('*****@*****.**')
 def setUp(self):
     test_helpers.patch(self, [
         'libs.auth.get_current_user',
         'libs.auth.is_current_user_admin',
         'libs.access._is_blacklisted_user',
         'libs.access._is_privileged_user',
         'libs.access._is_domain_allowed',
         'clusterfuzz._internal.base.external_users.is_fuzzer_allowed_for_user',
         'clusterfuzz._internal.base.external_users.is_job_allowed_for_user',
     ])
     self.mock._is_blacklisted_user.return_value = False
     self.user = auth.User('*****@*****.**')
Exemple #4
0
  def setUp(self):
    test_helpers.patch(self, [
        'config.db_config.get_value',
        'libs.form.generate_csrf_token',
        'libs.auth.is_current_user_admin',
        'libs.auth.get_current_user',
    ])
    self.mock.generate_csrf_token.return_value = 'csrf_token'
    self.mock.is_current_user_admin.return_value = False
    self.mock.get_current_user.return_value = auth.User('*****@*****.**')

    self.app = webtest.TestApp(webapp2.WSGIApplication([('/', CronHandler)]))
Exemple #5
0
  def setUp(self):
    test_helpers.patch(self, [
        'clusterfuzz._internal.config.db_config.get_value',
        'libs.form.generate_csrf_token',
        'libs.auth.is_current_user_admin',
        'libs.auth.get_current_user',
    ])
    self.mock.generate_csrf_token.return_value = 'csrf_token'
    self.mock.is_current_user_admin.return_value = False
    self.mock.get_current_user.return_value = auth.User('*****@*****.**')

    flaskapp = flask.Flask('testflask')
    flaskapp.add_url_rule('/', view_func=CronHandler.as_view('/'))
    self.app = webtest.TestApp(flaskapp)
 def test_get_user_email_success(self):
     """Ensure it gets the email when a user is valid."""
     self.mock.get_current_user.return_value = (auth.User('*****@*****.**'))
     self.assertEqual(helpers.get_user_email(), '*****@*****.**')