Files @ 2b5f94fc3b7a
Branch filter:

Location: kallithea/rhodecode/tests/functional/test_admin_users_groups.py - annotation

Marcin Kuzminski
current revision will show workdir state, not the latest revision
c310e1e1e757
fa6ba6727475
c310e1e1e757
fa6ba6727475
c310e1e1e757
c9adf2a4929a
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
6dee43453f58
fa6ba6727475
c310e1e1e757
c9adf2a4929a
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
a8f2d78d14ea
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
88d13c1c6a55
88d13c1c6a55
c310e1e1e757
c310e1e1e757
88d13c1c6a55
fa6ba6727475
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
a8f2d78d14ea
88d13c1c6a55
fa6ba6727475
fa6ba6727475
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
fa6ba6727475
fa6ba6727475
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
c9adf2a4929a
c9adf2a4929a
fa6ba6727475
c9adf2a4929a
c9adf2a4929a
d2d35cf2b351
c9adf2a4929a
c9adf2a4929a
fa6ba6727475
c9adf2a4929a
a8f2d78d14ea
d2d35cf2b351
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
fa6ba6727475
c9adf2a4929a
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
fa6ba6727475
d2d35cf2b351
c9adf2a4929a
752a57988a48
752a57988a48
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
d2d35cf2b351
752a57988a48
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
a89d375c5788
a89d375c5788
752a57988a48
752a57988a48
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
fa6ba6727475
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
fa6ba6727475
fa6ba6727475
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
fa6ba6727475
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
d2d35cf2b351
a8f2d78d14ea
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
d2d35cf2b351
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
752a57988a48
752a57988a48
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
d2d35cf2b351
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
752a57988a48
752a57988a48
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
c310e1e1e757
c310e1e1e757
88d13c1c6a55
88d13c1c6a55
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
from rhodecode.tests import *
from rhodecode.model.db import UserGroup, UserGroupToPerm, Permission

TEST_USER_GROUP = 'admins_test'


class TestAdminUsersGroupsController(TestController):

    def test_index(self):
        response = self.app.get(url('users_groups'))
        # Test response...

    def test_index_as_xml(self):
        response = self.app.get(url('formatted_users_groups', format='xml'))

    def test_create(self):
        self.log_user()
        users_group_name = TEST_USER_GROUP
        response = self.app.post(url('users_groups'),
                                 {'users_group_name': users_group_name,
                                  'active':True})
        response.follow()

        self.checkSessionFlash(response,
                               'Created user group %s' % TEST_USER_GROUP)

    def test_new(self):
        response = self.app.get(url('new_users_group'))

    def test_new_as_xml(self):
        response = self.app.get(url('formatted_new_users_group', format='xml'))

    def test_update(self):
        response = self.app.put(url('users_group', id=1))

    def test_update_browser_fakeout(self):
        response = self.app.post(url('users_group', id=1),
                                 params=dict(_method='put'))

    def test_delete(self):
        self.log_user()
        users_group_name = TEST_USER_GROUP + 'another'
        response = self.app.post(url('users_groups'),
                                 {'users_group_name':users_group_name,
                                  'active':True})
        response.follow()

        self.checkSessionFlash(response,
                               'Created user group %s' % users_group_name)

        gr = self.Session.query(UserGroup)\
                           .filter(UserGroup.users_group_name ==
                                   users_group_name).one()

        response = self.app.delete(url('users_group', id=gr.users_group_id))

        gr = self.Session.query(UserGroup)\
                           .filter(UserGroup.users_group_name ==
                                   users_group_name).scalar()

        self.assertEqual(gr, None)

    def test_enable_repository_read_on_group(self):
        self.log_user()
        users_group_name = TEST_USER_GROUP + 'another2'
        response = self.app.post(url('users_groups'),
                                 {'users_group_name': users_group_name,
                                  'active': True})
        response.follow()

        ug = UserGroup.get_by_group_name(users_group_name)
        self.checkSessionFlash(response,
                               'Created user group %s' % users_group_name)
        ## ENABLE REPO CREATE ON A GROUP
        response = self.app.put(url('users_group_perm', id=ug.users_group_id),
                                 {'create_repo_perm': True})

        response.follow()
        ug = UserGroup.get_by_group_name(users_group_name)
        p = Permission.get_by_key('hg.create.repository')
        p2 = Permission.get_by_key('hg.usergroup.create.false')
        p3 = Permission.get_by_key('hg.fork.none')
        # check if user has this perms, they should be here since
        # defaults are on
        perms = UserGroupToPerm.query()\
            .filter(UserGroupToPerm.users_group == ug).all()

        self.assertEqual(
            sorted([[x.users_group_id, x.permission_id, ] for x in perms]),
            sorted([[ug.users_group_id, p.permission_id],
                    [ug.users_group_id, p2.permission_id],
                    [ug.users_group_id, p3.permission_id]])
        )

        ## DISABLE REPO CREATE ON A GROUP
        response = self.app.put(url('users_group_perm', id=ug.users_group_id),
                                    {})

        response.follow()
        ug = UserGroup.get_by_group_name(users_group_name)
        p = Permission.get_by_key('hg.create.none')
        p2 = Permission.get_by_key('hg.usergroup.create.false')
        p3 = Permission.get_by_key('hg.fork.none')

        # check if user has this perms, they should be here since
        # defaults are on
        perms = UserGroupToPerm.query()\
            .filter(UserGroupToPerm.users_group == ug).all()

        self.assertEqual(
            sorted([[x.users_group_id, x.permission_id, ] for x in perms]),
            sorted([[ug.users_group_id, p.permission_id],
                    [ug.users_group_id, p2.permission_id],
                    [ug.users_group_id, p3.permission_id]])
        )

        # DELETE !
        ug = UserGroup.get_by_group_name(users_group_name)
        ugid = ug.users_group_id
        response = self.app.delete(url('users_group', id=ug.users_group_id))
        response = response.follow()
        gr = self.Session.query(UserGroup)\
                           .filter(UserGroup.users_group_name ==
                                   users_group_name).scalar()

        self.assertEqual(gr, None)
        p = Permission.get_by_key('hg.create.repository')
        perms = UserGroupToPerm.query()\
            .filter(UserGroupToPerm.users_group_id == ugid).all()
        perms = [[x.users_group_id,
                  x.permission_id, ] for x in perms]
        self.assertEqual(
            perms,
            []
        )

    def test_enable_repository_fork_on_group(self):
        self.log_user()
        users_group_name = TEST_USER_GROUP + 'another2'
        response = self.app.post(url('users_groups'),
                                 {'users_group_name': users_group_name,
                                  'active': True})
        response.follow()

        ug = UserGroup.get_by_group_name(users_group_name)
        self.checkSessionFlash(response,
                               'Created user group %s' % users_group_name)
        ## ENABLE REPO CREATE ON A GROUP
        response = self.app.put(url('users_group_perm', id=ug.users_group_id),
                                 {'fork_repo_perm': True})

        response.follow()
        ug = UserGroup.get_by_group_name(users_group_name)
        p = Permission.get_by_key('hg.create.none')
        p2 = Permission.get_by_key('hg.usergroup.create.false')
        p3 = Permission.get_by_key('hg.fork.repository')
        # check if user has this perms, they should be here since
        # defaults are on
        perms = UserGroupToPerm.query()\
            .filter(UserGroupToPerm.users_group == ug).all()

        self.assertEqual(
            sorted([[x.users_group_id, x.permission_id, ] for x in perms]),
            sorted([[ug.users_group_id, p.permission_id],
                    [ug.users_group_id, p2.permission_id],
                    [ug.users_group_id, p3.permission_id]])
        )

        ## DISABLE REPO CREATE ON A GROUP
        response = self.app.put(url('users_group_perm', id=ug.users_group_id),
                                    {})

        response.follow()
        ug = UserGroup.get_by_group_name(users_group_name)
        p = Permission.get_by_key('hg.create.none')
        p2 = Permission.get_by_key('hg.usergroup.create.false')
        p3 = Permission.get_by_key('hg.fork.none')
        # check if user has this perms, they should be here since
        # defaults are on
        perms = UserGroupToPerm.query()\
            .filter(UserGroupToPerm.users_group == ug).all()

        self.assertEqual(
            sorted([[x.users_group_id, x.permission_id, ] for x in perms]),
            sorted([[ug.users_group_id, p.permission_id],
                    [ug.users_group_id, p2.permission_id],
                    [ug.users_group_id, p3.permission_id]])
        )

        # DELETE !
        ug = UserGroup.get_by_group_name(users_group_name)
        ugid = ug.users_group_id
        response = self.app.delete(url('users_group', id=ug.users_group_id))
        response = response.follow()
        gr = self.Session.query(UserGroup)\
                           .filter(UserGroup.users_group_name ==
                                   users_group_name).scalar()

        self.assertEqual(gr, None)
        p = Permission.get_by_key('hg.fork.repository')
        perms = UserGroupToPerm.query()\
            .filter(UserGroupToPerm.users_group_id == ugid).all()
        perms = [[x.users_group_id,
                  x.permission_id, ] for x in perms]
        self.assertEqual(
            perms,
            []
        )

    def test_delete_browser_fakeout(self):
        response = self.app.post(url('users_group', id=1),
                                 params=dict(_method='delete'))

    def test_show(self):
        response = self.app.get(url('users_group', id=1))

    def test_show_as_xml(self):
        response = self.app.get(url('formatted_users_group', id=1, format='xml'))

    def test_edit(self):
        response = self.app.get(url('edit_users_group', id=1))

    def test_edit_as_xml(self):
        response = self.app.get(url('formatted_edit_users_group', id=1, format='xml'))

    def test_assign_members(self):
        pass

    def test_add_create_permission(self):
        pass

    def test_revoke_members(self):
        pass