Files @ cdf10b3df899
Branch filter:

Location: kallithea/rhodecode/tests/functional/test_admin_users_groups.py - annotation

Jonathan Sternberg
Allow RhodeCode maintainers to specify a custom bug tracker.

This allows people who maintain large RhodeCode installations to setup their
own bug tracker and respond to requests against their specific installation.
The maintainer is then free to forward problems with RhodeCode to the
canonical issue tracker on bitbucket.

If the config option "bugtracker" is present, its value will be used with the
"Report a bug" button. If left blank, this disables the button. If no value is
present, then the default is used. This is so that the new config option
doesn't break installations of RhodeCode upgrading to a newer version and to
allow easier installation for the common use case.
c310e1e1e757
fa6ba6727475
d7488551578e
c310e1e1e757
fa6ba6727475
c310e1e1e757
c9adf2a4929a
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
6dee43453f58
fa6ba6727475
c310e1e1e757
c9adf2a4929a
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
a8f2d78d14ea
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
88d13c1c6a55
88d13c1c6a55
c310e1e1e757
c310e1e1e757
88d13c1c6a55
fa6ba6727475
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
a8f2d78d14ea
88d13c1c6a55
d7488551578e
fa6ba6727475
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
d7488551578e
fa6ba6727475
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
88d13c1c6a55
c9adf2a4929a
c9adf2a4929a
fa6ba6727475
c9adf2a4929a
c9adf2a4929a
d2d35cf2b351
c9adf2a4929a
c9adf2a4929a
fa6ba6727475
c9adf2a4929a
a8f2d78d14ea
d2d35cf2b351
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
fa6ba6727475
c9adf2a4929a
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
fa6ba6727475
d2d35cf2b351
c9adf2a4929a
752a57988a48
752a57988a48
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
d2d35cf2b351
752a57988a48
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
a89d375c5788
a89d375c5788
752a57988a48
752a57988a48
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
fa6ba6727475
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
d7488551578e
fa6ba6727475
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
fa6ba6727475
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
d2d35cf2b351
a8f2d78d14ea
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
d2d35cf2b351
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
752a57988a48
752a57988a48
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
d2d35cf2b351
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
752a57988a48
752a57988a48
752a57988a48
752a57988a48
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d7488551578e
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
d2d35cf2b351
fa6ba6727475
fa6ba6727475
d2d35cf2b351
d2d35cf2b351
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
c9adf2a4929a
c310e1e1e757
c310e1e1e757
88d13c1c6a55
88d13c1c6a55
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
c310e1e1e757
from rhodecode.tests import *
from rhodecode.model.db import UserGroup, UserGroupToPerm, Permission
from rhodecode.model.meta import Session

TEST_USER_GROUP = 'admins_test'


class TestAdminUsersGroupsController(TestController):

    def test_index(self):
        response = self.app.get(url('users_groups'))
        # Test response...

    def test_index_as_xml(self):
        response = self.app.get(url('formatted_users_groups', format='xml'))

    def test_create(self):
        self.log_user()
        users_group_name = TEST_USER_GROUP
        response = self.app.post(url('users_groups'),
                                 {'users_group_name': users_group_name,
                                  'active':True})
        response.follow()

        self.checkSessionFlash(response,
                               'Created user group %s' % TEST_USER_GROUP)

    def test_new(self):
        response = self.app.get(url('new_users_group'))

    def test_new_as_xml(self):
        response = self.app.get(url('formatted_new_users_group', format='xml'))

    def test_update(self):
        response = self.app.put(url('users_group', id=1))

    def test_update_browser_fakeout(self):
        response = self.app.post(url('users_group', id=1),
                                 params=dict(_method='put'))

    def test_delete(self):
        self.log_user()
        users_group_name = TEST_USER_GROUP + 'another'
        response = self.app.post(url('users_groups'),
                                 {'users_group_name':users_group_name,
                                  'active':True})
        response.follow()

        self.checkSessionFlash(response,
                               'Created user group %s' % users_group_name)

        gr = Session().query(UserGroup)\
                           .filter(UserGroup.users_group_name ==
                                   users_group_name).one()

        response = self.app.delete(url('users_group', id=gr.users_group_id))

        gr = Session().query(UserGroup)\
                           .filter(UserGroup.users_group_name ==
                                   users_group_name).scalar()

        self.assertEqual(gr, None)

    def test_enable_repository_read_on_group(self):
        self.log_user()
        users_group_name = TEST_USER_GROUP + 'another2'
        response = self.app.post(url('users_groups'),
                                 {'users_group_name': users_group_name,
                                  'active': True})
        response.follow()

        ug = UserGroup.get_by_group_name(users_group_name)
        self.checkSessionFlash(response,
                               'Created user group %s' % users_group_name)
        ## ENABLE REPO CREATE ON A GROUP
        response = self.app.put(url('users_group_perm', id=ug.users_group_id),
                                 {'create_repo_perm': True})

        response.follow()
        ug = UserGroup.get_by_group_name(users_group_name)
        p = Permission.get_by_key('hg.create.repository')
        p2 = Permission.get_by_key('hg.usergroup.create.false')
        p3 = Permission.get_by_key('hg.fork.none')
        # check if user has this perms, they should be here since
        # defaults are on
        perms = UserGroupToPerm.query()\
            .filter(UserGroupToPerm.users_group == ug).all()

        self.assertEqual(
            sorted([[x.users_group_id, x.permission_id, ] for x in perms]),
            sorted([[ug.users_group_id, p.permission_id],
                    [ug.users_group_id, p2.permission_id],
                    [ug.users_group_id, p3.permission_id]])
        )

        ## DISABLE REPO CREATE ON A GROUP
        response = self.app.put(url('users_group_perm', id=ug.users_group_id),
                                    {})

        response.follow()
        ug = UserGroup.get_by_group_name(users_group_name)
        p = Permission.get_by_key('hg.create.none')
        p2 = Permission.get_by_key('hg.usergroup.create.false')
        p3 = Permission.get_by_key('hg.fork.none')

        # check if user has this perms, they should be here since
        # defaults are on
        perms = UserGroupToPerm.query()\
            .filter(UserGroupToPerm.users_group == ug).all()

        self.assertEqual(
            sorted([[x.users_group_id, x.permission_id, ] for x in perms]),
            sorted([[ug.users_group_id, p.permission_id],
                    [ug.users_group_id, p2.permission_id],
                    [ug.users_group_id, p3.permission_id]])
        )

        # DELETE !
        ug = UserGroup.get_by_group_name(users_group_name)
        ugid = ug.users_group_id
        response = self.app.delete(url('users_group', id=ug.users_group_id))
        response = response.follow()
        gr = Session().query(UserGroup)\
                           .filter(UserGroup.users_group_name ==
                                   users_group_name).scalar()

        self.assertEqual(gr, None)
        p = Permission.get_by_key('hg.create.repository')
        perms = UserGroupToPerm.query()\
            .filter(UserGroupToPerm.users_group_id == ugid).all()
        perms = [[x.users_group_id,
                  x.permission_id, ] for x in perms]
        self.assertEqual(
            perms,
            []
        )

    def test_enable_repository_fork_on_group(self):
        self.log_user()
        users_group_name = TEST_USER_GROUP + 'another2'
        response = self.app.post(url('users_groups'),
                                 {'users_group_name': users_group_name,
                                  'active': True})
        response.follow()

        ug = UserGroup.get_by_group_name(users_group_name)
        self.checkSessionFlash(response,
                               'Created user group %s' % users_group_name)
        ## ENABLE REPO CREATE ON A GROUP
        response = self.app.put(url('users_group_perm', id=ug.users_group_id),
                                 {'fork_repo_perm': True})

        response.follow()
        ug = UserGroup.get_by_group_name(users_group_name)
        p = Permission.get_by_key('hg.create.none')
        p2 = Permission.get_by_key('hg.usergroup.create.false')
        p3 = Permission.get_by_key('hg.fork.repository')
        # check if user has this perms, they should be here since
        # defaults are on
        perms = UserGroupToPerm.query()\
            .filter(UserGroupToPerm.users_group == ug).all()

        self.assertEqual(
            sorted([[x.users_group_id, x.permission_id, ] for x in perms]),
            sorted([[ug.users_group_id, p.permission_id],
                    [ug.users_group_id, p2.permission_id],
                    [ug.users_group_id, p3.permission_id]])
        )

        ## DISABLE REPO CREATE ON A GROUP
        response = self.app.put(url('users_group_perm', id=ug.users_group_id),
                                    {})

        response.follow()
        ug = UserGroup.get_by_group_name(users_group_name)
        p = Permission.get_by_key('hg.create.none')
        p2 = Permission.get_by_key('hg.usergroup.create.false')
        p3 = Permission.get_by_key('hg.fork.none')
        # check if user has this perms, they should be here since
        # defaults are on
        perms = UserGroupToPerm.query()\
            .filter(UserGroupToPerm.users_group == ug).all()

        self.assertEqual(
            sorted([[x.users_group_id, x.permission_id, ] for x in perms]),
            sorted([[ug.users_group_id, p.permission_id],
                    [ug.users_group_id, p2.permission_id],
                    [ug.users_group_id, p3.permission_id]])
        )

        # DELETE !
        ug = UserGroup.get_by_group_name(users_group_name)
        ugid = ug.users_group_id
        response = self.app.delete(url('users_group', id=ug.users_group_id))
        response = response.follow()
        gr = Session().query(UserGroup)\
                           .filter(UserGroup.users_group_name ==
                                   users_group_name).scalar()

        self.assertEqual(gr, None)
        p = Permission.get_by_key('hg.fork.repository')
        perms = UserGroupToPerm.query()\
            .filter(UserGroupToPerm.users_group_id == ugid).all()
        perms = [[x.users_group_id,
                  x.permission_id, ] for x in perms]
        self.assertEqual(
            perms,
            []
        )

    def test_delete_browser_fakeout(self):
        response = self.app.post(url('users_group', id=1),
                                 params=dict(_method='delete'))

    def test_show(self):
        response = self.app.get(url('users_group', id=1))

    def test_show_as_xml(self):
        response = self.app.get(url('formatted_users_group', id=1, format='xml'))

    def test_edit(self):
        response = self.app.get(url('edit_users_group', id=1))

    def test_edit_as_xml(self):
        response = self.app.get(url('formatted_edit_users_group', id=1, format='xml'))

    def test_assign_members(self):
        pass

    def test_add_create_permission(self):
        pass

    def test_revoke_members(self):
        pass