def test_no_root_view_permissions(nobody, default, admin, view, project_foo, project_bar): """Tests user-accessible projects when there are no permissions set at the root. """ ALL_PROJECTS = [project_foo.code, project_bar.code] foo_user = UserFactory.create(username='******') bar_user = UserFactory.create(username='******') # By setting explicit `view` permissions for `foo_user` in `project_foo`, # only `foo_user` will be able to access that project _require_permission_set(foo_user, project_foo.directory, [view]) assert items_equal(Project.accessible_by_user(admin), ALL_PROJECTS) assert items_equal( Project.accessible_by_user(foo_user), [project_foo.code]) assert items_equal(Project.accessible_by_user(bar_user), []) assert items_equal(Project.accessible_by_user(default), []) assert items_equal(Project.accessible_by_user(nobody), []) # Now let's allow showing `project_bar` to all registered users, but keep # `project_foo` visible only to `foo_user`. _require_permission_set(default, project_bar.directory, [view]) assert items_equal(Project.accessible_by_user(admin), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(foo_user), ALL_PROJECTS) assert items_equal( Project.accessible_by_user(bar_user), [project_bar.code]) assert items_equal(Project.accessible_by_user(default), [project_bar.code]) assert items_equal(Project.accessible_by_user(nobody), [])
def test_apiview_put(rf): """Tests updating an object using the API.""" view = WriteableUserAPIView.as_view() user = UserFactory.create(username='******') # Malformed request, only JSON-encoded data is understood request = create_api_request(rf, 'put') response = view(request, id=user.id) response_data = json.loads(response.content) assert response.status_code == 400 assert response_data['msg'] == 'Invalid JSON data' # Update a field's data new_username = '******' update_data = { 'username': new_username, } request = create_api_request(rf, 'put', data=update_data) # Requesting unknown resources is a 404 with pytest.raises(Http404): view(request, id='11') # All fields must be submitted response = view(request, id=user.id) response_data = json.loads(response.content) assert response.status_code == 400 assert 'errors' in response_data # Specify missing fields update_data.update({ 'email': user.email, }) request = create_api_request(rf, 'put', data=update_data) response = view(request, id=user.id) response_data = json.loads(response.content) # Now all is ok assert response.status_code == 200 assert response_data['username'] == new_username # Email shouldn't have changed assert response_data['email'] == user.email # View with a custom form update_data.update({ 'password': '******', }) view = WriteableUserSettingsAPIView.as_view() request = create_api_request(rf, 'put', data=update_data) response = view(request, id=user.id) response_data = json.loads(response.content) assert response.status_code == 200 assert 'password' not in response_data
def test_no_root_hide_permissions(nobody, default, admin, hide, view, project_foo, project_bar, root): """Tests user-accessible projects when there are no `hide` permissions set at the root. """ ALL_PROJECTS = [project_foo.code, project_bar.code] foo_user = UserFactory.create(username='******') bar_user = UserFactory.create(username='******') # By default everyone has access to projects _require_permission_set(default, root, [view]) _require_permission_set(nobody, root, [view]) # At the same time, `project_foo` is inaccessible registered users... _require_permission_set(default, project_foo.directory, negative_permissions=[hide]) assert items_equal(Project.accessible_by_user(admin), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(default), [project_bar.code]) assert items_equal(Project.accessible_by_user(nobody), [project_bar.code]) assert items_equal( Project.accessible_by_user(foo_user), [project_bar.code]) assert items_equal( Project.accessible_by_user(bar_user), [project_bar.code]) # ...and anonymous users as well _require_permission_set(nobody, project_foo.directory, negative_permissions=[hide]) assert items_equal(Project.accessible_by_user(nobody), [project_bar.code]) # Let's make `project_foo` accessible for `foo_user` _require_permission_set(foo_user, project_foo.directory, [view]) assert items_equal(Project.accessible_by_user(foo_user), ALL_PROJECTS) # `project_bar` is now inaccessible for anonymous users _require_permission_set(nobody, project_bar.directory, negative_permissions=[hide]) assert items_equal(Project.accessible_by_user(nobody), [])
def test_root_view_permissions(nobody, default, admin, view, project_foo, project_bar, root): """Tests user-accessible projects with view permissions at the root.""" ALL_PROJECTS = [project_foo.code, project_bar.code] foo_user = UserFactory.create(username='******') bar_user = UserFactory.create(username='******') # We'll only give `bar_user` access to all projects server-wide _require_permission_set(bar_user, root, [view]) assert items_equal(Project.accessible_by_user(admin), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(bar_user), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(foo_user), []) assert items_equal(Project.accessible_by_user(default), []) assert items_equal(Project.accessible_by_user(nobody), []) # Now we'll also allow `foo_user` access `project_foo` _require_permission_set(foo_user, project_foo.directory, [view]) assert items_equal( Project.accessible_by_user(foo_user), [project_foo.code]) # Let's change server-wide defaults: all registered users have access to # all projects. `foo_user`, albeit having explicit access for # `project_foo`, will be able to access any project because they fall back # and extend with the defaults. _require_permission_set(default, root, [view]) assert items_equal(Project.accessible_by_user(admin), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(foo_user), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(bar_user), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(default), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(nobody), []) # Let's give anonymous users access to all projects too _require_permission_set(nobody, root, [view]) assert items_equal(Project.accessible_by_user(nobody), ALL_PROJECTS)
def test_root_hide_permissions(nobody, default, admin, hide, view, project_foo, project_bar, root): """Tests user-accessible projects when there are `hide` permissions set at the root. """ ALL_PROJECTS = [project_foo.code, project_bar.code] foo_user = UserFactory.create(username='******') bar_user = UserFactory.create(username='******') # By default all projects are not accessible _require_permission_set(default, root, negative_permissions=[hide]) _require_permission_set(nobody, root, negative_permissions=[hide]) assert items_equal(Project.accessible_by_user(admin), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(default), []) assert items_equal(Project.accessible_by_user(nobody), []) assert items_equal(Project.accessible_by_user(foo_user), []) assert items_equal(Project.accessible_by_user(bar_user), []) # Now let's make `project_foo` accessible to `foo_user`. _require_permission_set(foo_user, project_foo.directory, [view]) assert items_equal(Project.accessible_by_user(admin), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(default), []) assert items_equal(Project.accessible_by_user(nobody), []) assert items_equal( Project.accessible_by_user(foo_user), [project_foo.code]) assert items_equal(Project.accessible_by_user(bar_user), []) # Making projects accessible for anonymous users should open the door for # everyone _require_permission_set(nobody, root, [view]) assert items_equal(Project.accessible_by_user(admin), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(default), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(nobody), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(foo_user), ALL_PROJECTS) assert items_equal(Project.accessible_by_user(bar_user), ALL_PROJECTS)
def test_apiview_search(rf): """Tests filtering through a search query.""" # Note that `UserAPIView` is configured to search in all defined fields, # which are `username` and `full_name` view = UserAPIView.as_view() # Let's create some users to search for UserFactory.create(username='******', full_name='Foo Bar') UserFactory.create(username='******', full_name='Foo Bar') UserFactory.create(username='******', full_name='Foo Bar') # `q=bar` should match 3 users (full names match) request = create_api_request(rf, url='/?q=bar') response = view(request) response_data = json.loads(response.content) assert response.status_code == 200 assert len(response_data['models']) == 3 # `q=baz` should match 1 user request = create_api_request(rf, url='/?q=baz') response = view(request) response_data = json.loads(response.content) assert response.status_code == 200 assert len(response_data['models']) == 1 # Searches are case insensitive; `q=BaZ` should match 1 user request = create_api_request(rf, url='/?q=BaZ') response = view(request) response_data = json.loads(response.content) assert response.status_code == 200 assert len(response_data['models']) == 1
def test_apiview_get_multiple(rf): """Tests retrieving multiple objects using the API.""" view = UserAPIView.as_view() UserFactory.create(username='******') request = create_api_request(rf) response = view(request) response_data = json.loads(response.content) # Response should contain a 1-item list assert response.status_code == 200 assert isinstance(response_data, dict) assert 'count' in response_data assert 'models' in response_data assert len(response_data['models']) == 1 # Let's add more users UserFactory.create_batch(5) response = view(request) response_data = json.loads(response.content) assert response.status_code == 200 assert isinstance(response_data, dict) assert 'count' in response_data assert 'models' in response_data assert len(response_data['models']) == 6 # Let's add even more users to test pagination UserFactory.create_batch(5) response = view(request) response_data = json.loads(response.content) # First page is full assert response.status_code == 200 assert isinstance(response_data, dict) assert 'count' in response_data assert 'models' in response_data assert len(response_data['models']) == 10 request = create_api_request(rf, url='/?p=2') response = view(request) response_data = json.loads(response.content) # Second page constains a single user assert response.status_code == 200 assert isinstance(response_data, dict) assert 'count' in response_data assert 'models' in response_data assert len(response_data['models']) == 1
def test_apiview_get_single(rf): """Tests retrieving a single object using the API.""" view = UserAPIView.as_view() user = UserFactory.create(username='******') request = create_api_request(rf) response = view(request, id=user.id) # This should have been a valid request... assert response.status_code == 200 # ...and JSON-encoded, so should properly parse it response_data = json.loads(response.content) assert isinstance(response_data, dict) assert response_data['username'] == 'foo' assert 'email' not in response_data # Non-existent IDs should return 404 with pytest.raises(Http404): view(request, id='7')
def test_apiview_delete(rf, trans_nobody): """Tests deleting an object using the API.""" view = UserAPIView.as_view() user = UserFactory.create(username='******') # Delete is not supported for collections request = create_api_request(rf, 'delete') response = view(request) assert response.status_code == 405 assert User.objects.filter(id=user.id).count() == 1 # But it is supported for single items (specified by id): response = view(request, id=user.id) assert response.status_code == 200 assert User.objects.filter(id=user.id).count() == 0 # Should raise 404 if we try to access a deleted resource again: with pytest.raises(Http404): view(request, id=user.id)
def test_pending_agreements(): """Tests proper user pending agreements are returned.""" foo_user = UserFactory.create(username='******') privacy_policy = LegalPageFactory.create( active=True, modified_on=aware_datetime(2014, 01, 01), ) # `foo_user` hasn't agreed the privacy policy yet pending = list(LegalPage.objects.pending_user_agreement(foo_user)) assert len(pending) == 1 assert privacy_policy in pending # `foo_user` agreed the privacy policy AgreementFactory.create( user=foo_user, document=privacy_policy, agreed_on=aware_datetime(2014, 02, 02), ) pending = list(LegalPage.objects.pending_user_agreement(foo_user)) assert len(pending) == 0 # Let's add a new ToS tos = LegalPageFactory.create( active=True, modified_on=aware_datetime(2015, 01, 01), ) pending = list(LegalPage.objects.pending_user_agreement(foo_user)) assert len(pending) == 1 assert tos in pending # `foo_user` also accepted the ToS AgreementFactory.create( user=foo_user, document=tos, agreed_on=aware_datetime(2015, 02, 02), ) pending = list(LegalPage.objects.pending_user_agreement(foo_user)) assert len(pending) == 0 # The ToS were modified, `foo_user` must agree it tos.modified_on = aware_datetime(2015, 03, 03) tos.save() pending = list(LegalPage.objects.pending_user_agreement(foo_user)) assert len(pending) == 1 assert tos in pending # Same with the privacy policy privacy_policy.modified_on = aware_datetime(2015, 04, 04) privacy_policy.save() pending = list(LegalPage.objects.pending_user_agreement(foo_user)) assert len(pending) == 2 assert privacy_policy in pending assert tos in pending # Let's disable the ToS tos.active = False tos.save() pending = list(LegalPage.objects.pending_user_agreement(foo_user)) assert len(pending) == 1 assert privacy_policy in pending