def test_install_and_migrate(self): """ Migrate images to PNG """ qi_tool = getToolByName(self.portal, 'portal_quickinstaller') qi_tool.uninstallProducts(['openmultimedia.imagewatchdog']) install_and_migrate(self.portal) for i in range(IMAGES_RANGE): im = Image.open(StringIO(self.portal['test_jpeg_image%s' % i].getImage())) self.assertEqual(im.format, 'PNG')
def spoofRequest(app): """ Make REQUEST variable to be available on the Zope application server. This allows acquisition to work properly """ _policy = PermissiveSecurityPolicy() setSecurityPolicy(_policy) newSecurityManager(None, OmnipotentUser().__of__(app.acl_users)) return makerequest(app) if 'app' in locals(): # Enable Faux HTTP request object app = locals()['app'] # please pep8 if len(sys.argv) == 1: logger.error("missing portal name") else: app = spoofRequest(app) admin = app.acl_users.getUserById("admin") newSecurityManager(None, admin) portal = app.unrestrictedTraverse(sys.argv[1], None) if not portal: logger.error("portal not found") else: portal.setupCurrentSkin(app.REQUEST) setSite(portal) install_and_migrate(portal) transaction.commit()
def spoofRequest(app): """ Make REQUEST variable to be available on the Zope application server. This allows acquisition to work properly """ _policy = PermissiveSecurityPolicy() setSecurityPolicy(_policy) newSecurityManager(None, OmnipotentUser().__of__(app.acl_users)) return makerequest(app) if 'app' in locals(): # Enable Faux HTTP request object app = locals()['app'] # please pep8 if len(sys.argv) == 1: logger.error("missing portal name") else: app = spoofRequest(app) admin = app.acl_users.getUserById("admin") newSecurityManager(None, admin) portal = app.unrestrictedTraverse(sys.argv[1], None) if not portal: logger.error("portal not found") else: portal.setupCurrentSkin(app.REQUEST) setSite(portal) install_and_migrate(portal) transaction.commit()