Add support for Role ACLs.

Signed-off-by: Roberto Rosario <roberto.rosario.gonzalez@gmail.com>
This commit is contained in:
Roberto Rosario
2018-04-02 02:36:20 -04:00
parent 57e7722f59
commit cf99201b89
6 changed files with 160 additions and 61 deletions

View File

@@ -1,64 +1,158 @@
from __future__ import unicode_literals
from django.test.client import Client
from django.urls import reverse
from django.contrib.auth.models import Group
from common.tests import BaseTestCase
from user_management.tests import TEST_ADMIN_PASSWORD, TEST_ADMIN_USERNAME
from common.tests import GenericViewTestCase
from user_management.permissions import permission_group_edit
from user_management.tests.literals import TEST_GROUP_2_NAME
from ..models import Role
from ..permissions import (
permission_role_create, permission_role_delete, permission_role_edit,
permission_role_view
)
from .literals import TEST_ROLE_LABEL, TEST_ROLE_LABEL_EDITED
from .literals import TEST_ROLE_2_LABEL, TEST_ROLE_LABEL_EDITED
class PermissionsViewsTestCase(BaseTestCase):
class PermissionsViewsTestCase(GenericViewTestCase):
def setUp(self):
super(PermissionsViewsTestCase, self).setUp()
self.client = Client()
# Login the admin user
logged_in = self.client.login(
username=TEST_ADMIN_USERNAME, password=TEST_ADMIN_PASSWORD
)
self.assertTrue(logged_in)
self.assertTrue(self.admin_user.is_authenticated)
self.login_user()
def test_role_creation_view(self):
self.role.delete()
response = self.client.post(
reverse(
'permissions:role_create',
), data={
'label': TEST_ROLE_LABEL,
}, follow=True
def _request_create_role_view(self):
return self.post(
viewname='permissions:role_create', data={
'label': TEST_ROLE_2_LABEL,
}
)
self.assertContains(response, 'created', status_code=200)
def test_role_creation_view_no_permission(self):
response = self._request_create_role_view()
self.assertEqual(response.status_code, 403)
self.assertEqual(Role.objects.count(), 1)
self.assertEqual(Role.objects.first().label, TEST_ROLE_LABEL)
self.assertFalse(TEST_ROLE_2_LABEL in Role.objects.values_list('label', flat=True))
def test_role_delete_view(self):
response = self.client.post(
reverse(
'permissions:role_delete', args=(self.role.pk,),
), follow=True
def test_role_creation_view_with_permission(self):
self.grant_permission(permission=permission_role_create)
response = self._request_create_role_view()
self.assertEqual(response.status_code, 302)
self.assertEqual(Role.objects.count(), 2)
self.assertTrue(TEST_ROLE_2_LABEL in Role.objects.values_list('label', flat=True))
def _request_role_delete_view(self):
return self.post(
viewname='permissions:role_delete', args=(self.role_2.pk,),
)
self.assertContains(response, 'deleted', status_code=200)
def _create_role(self):
self.role_2 = Role.objects.create(label=TEST_ROLE_2_LABEL)
self.assertEqual(Role.objects.count(), 0)
def test_role_delete_view_no_access(self):
self._create_role()
response = self._request_role_delete_view()
self.assertEqual(response.status_code, 403)
self.assertEqual(Role.objects.count(), 2)
self.assertTrue(TEST_ROLE_2_LABEL in Role.objects.values_list('label', flat=True))
def test_role_edit_view(self):
response = self.client.post(
reverse(
'permissions:role_edit', args=(self.role.pk,),
), data={
def test_role_delete_view_with_access(self):
self._create_role()
self.grant_access(permission=permission_role_delete, obj=self.role_2)
response = self._request_role_delete_view()
self.assertEqual(response.status_code, 302)
self.assertEqual(Role.objects.count(), 1)
self.assertFalse(TEST_ROLE_2_LABEL in Role.objects.values_list('label', flat=True))
def _request_role_edit_view(self):
return self.post(
viewname='permissions:role_edit', args=(self.role_2.pk,), data={
'label': TEST_ROLE_LABEL_EDITED,
}, follow=True
}
)
self.assertContains(response, 'update', status_code=200)
def test_role_edit_view_no_access(self):
self._create_role()
response = self._request_role_edit_view()
self.assertEqual(Role.objects.count(), 1)
self.assertEqual(Role.objects.first().label, TEST_ROLE_LABEL_EDITED)
self.assertEqual(response.status_code, 403)
self.role_2.refresh_from_db()
self.assertEqual(Role.objects.count(), 2)
self.assertEqual(self.role_2.label, TEST_ROLE_2_LABEL)
def test_role_edit_view_with_access(self):
self._create_role()
self.grant_access(permission=permission_role_edit, obj=self.role_2)
response = self._request_role_edit_view()
self.assertEqual(response.status_code, 302)
self.role_2.refresh_from_db()
self.assertEqual(Role.objects.count(), 2)
self.assertEqual(self.role_2.label, TEST_ROLE_LABEL_EDITED)
def _request_role_list_view(self):
return self.get(viewname='permissions:role_list')
def test_role_list_view_no_access(self):
self._create_role()
response = self._request_role_list_view()
self.assertEqual(response.status_code, 200)
self.assertNotContains(response, text=TEST_ROLE_2_LABEL, status_code=200)
def test_role_list_view_with_access(self):
self._create_role()
self.grant_access(permission=permission_role_view, obj=self.role_2)
response = self._request_role_list_view()
self.assertContains(response, text=TEST_ROLE_2_LABEL, status_code=200)
def _request_role_permissions_view(self):
return self.get(
viewname='permissions:role_permissions', args=(self.role_2.pk,)
)
def test_role_permissions_view_no_access(self):
self._create_role()
response = self._request_role_permissions_view()
self.assertEqual(response.status_code, 403)
def test_role_permissions_view_with_access(self):
self._create_role()
self.grant_access(permission=permission_role_edit, obj=self.role_2)
response = self._request_role_permissions_view()
self.assertEqual(response.status_code, 200)
def _request_role_groups_view(self):
return self.get(
viewname='permissions:role_groups', args=(self.role_2.pk,)
)
def test_role_groups_view_no_access(self):
self._create_role()
response = self._request_role_groups_view()
self.assertEqual(response.status_code, 403)
def test_role_groups_view_with_access(self):
self._create_role()
self.grant_access(permission=permission_role_edit, obj=self.role_2)
response = self._request_role_groups_view()
self.assertEqual(response.status_code, 200)
def _create_group(self):
self.group_2 = Group.objects.create(name=TEST_GROUP_2_NAME)
def _request_group_roles_view(self):
return self.get(
viewname='permissions:group_roles', args=(self.group_2.pk,)
)
def test_group_roles_view_no_access(self):
self._create_group()
response = self._request_group_roles_view()
self.assertEqual(response.status_code, 403)
def test_group_roles_view_with_access(self):
self._create_group()
self.grant_access(permission=permission_group_edit, obj=self.group_2)
response = self._request_group_roles_view()
self.assertEqual(response.status_code, 200)