def test_check_user_can_view_video_permission(self): with test_utils.patch_get_workflow() as workflow: workflow.user_can_view_video.return_value = False response = self.client.get(self.url) assert_equal(response.status_code, status.HTTP_403_FORBIDDEN) # check the call args assert_equal(workflow.user_can_view_video.call_args, mock.call(self.user))
def test_edit_video_permission_check(self): team_video = TeamVideoFactory(team=self.team) self.serializer.instance = team_video.video with test_utils.patch_get_workflow() as workflow: workflow.user_can_edit_video.return_value = False with assert_raises(PermissionDenied): self.viewset.check_save_permissions(self.serializer) assert_equal(workflow.user_can_edit_video.call_args, mock.call(self.user))
def test_check_user_can_edit_subtitles_permission(self): with test_utils.patch_get_workflow() as workflow: workflow.user_can_edit_subtitles.return_value = False response = self.client.post( self.url, {'subtitles': SubtitleSetFactory().to_xml()}) assert_equal(response.status_code, status.HTTP_403_FORBIDDEN) # check the call args assert_equal(workflow.user_can_edit_subtitles.call_args, mock.call(self.user, 'en'))
def test_check_user_can_view_private_versions_permission(self): v = pipeline.add_subtitles(self.video, 'en', SubtitleSetFactory(num_subs=1), visibility='private') with test_utils.patch_get_workflow() as workflow: workflow.user_can_view_private_subtitles.return_value = False response = self.client.get(self.url, { 'version_number': v.version_number, }) assert_equal(response.status_code, status.HTTP_403_FORBIDDEN) # check the call args assert_equal(workflow.user_can_view_private_subtitles.call_args, mock.call(self.user, 'en'))