def setUp(self): test_helpers.patch(self, [ 'libs.access._is_domain_allowed', 'libs.auth.get_current_user', 'clusterfuzz._internal.config.db_config.get', 'libs.issue_management.issue_tracker.IssueTracker.get_original_issue', 'libs.issue_management.issue_tracker_utils.' 'get_issue_tracker_for_testcase', 'libs.issue_management.monorail.issue_tracker_manager.' 'IssueTrackerManager', ]) self.itm = issue_tracker_manager.IssueTrackerManager('test') self.itm.project_name = 'test-project' self.mock.get_issue_tracker_for_testcase.return_value = ( monorail.IssueTracker(self.itm)) self.get_issue = self.itm.get_issue self.email = '*****@*****.**' self.mock.get_current_user.return_value = auth.User(self.email) self.bug = issue.Issue() self.bug.id = 1234 self.bug.itm = self.itm self.original_bug = issue.Issue() self.original_bug.id = 5678 self.original_bug.itm = self.itm self.testcase = data_types.Testcase() self.mock.get.return_value = (data_types.Config( relax_testcase_restrictions=True)) self.mock._is_domain_allowed.return_value = False
def setUp(self): test_helpers.patch(self, [ 'libs.auth.get_current_user', 'libs.auth.is_current_user_admin', 'libs.access._is_privileged_user', 'libs.access._is_domain_allowed', 'base.external_users.is_fuzzer_allowed_for_user', 'base.external_users.is_job_allowed_for_user', ]) self.user = auth.User('*****@*****.**')
def setUp(self): test_helpers.patch(self, [ 'libs.auth.get_current_user', 'libs.auth.is_current_user_admin', 'libs.access._is_blacklisted_user', 'libs.access._is_privileged_user', 'libs.access._is_domain_allowed', 'clusterfuzz._internal.base.external_users.is_fuzzer_allowed_for_user', 'clusterfuzz._internal.base.external_users.is_job_allowed_for_user', ]) self.mock._is_blacklisted_user.return_value = False self.user = auth.User('*****@*****.**')
def setUp(self): test_helpers.patch(self, [ 'config.db_config.get_value', 'libs.form.generate_csrf_token', 'libs.auth.is_current_user_admin', 'libs.auth.get_current_user', ]) self.mock.generate_csrf_token.return_value = 'csrf_token' self.mock.is_current_user_admin.return_value = False self.mock.get_current_user.return_value = auth.User('*****@*****.**') self.app = webtest.TestApp(webapp2.WSGIApplication([('/', CronHandler)]))
def setUp(self): test_helpers.patch(self, [ 'clusterfuzz._internal.config.db_config.get_value', 'libs.form.generate_csrf_token', 'libs.auth.is_current_user_admin', 'libs.auth.get_current_user', ]) self.mock.generate_csrf_token.return_value = 'csrf_token' self.mock.is_current_user_admin.return_value = False self.mock.get_current_user.return_value = auth.User('*****@*****.**') flaskapp = flask.Flask('testflask') flaskapp.add_url_rule('/', view_func=CronHandler.as_view('/')) self.app = webtest.TestApp(flaskapp)
def test_get_user_email_success(self): """Ensure it gets the email when a user is valid.""" self.mock.get_current_user.return_value = (auth.User('*****@*****.**')) self.assertEqual(helpers.get_user_email(), '*****@*****.**')