246 lines
8.2 KiB
Python
246 lines
8.2 KiB
Python
from __future__ import unicode_literals
|
|
|
|
from django.contrib.auth import get_user_model
|
|
from django.contrib.auth.models import Group
|
|
|
|
from common.tests.test_views import GenericViewTestCase
|
|
from documents.tests.test_views import GenericDocumentViewTestCase
|
|
|
|
from metadata.models import MetadataType
|
|
from metadata.permissions import permission_metadata_document_edit
|
|
|
|
from metadata.tests.literals import (
|
|
TEST_METADATA_TYPE_LABEL, TEST_METADATA_TYPE_NAME,
|
|
)
|
|
|
|
from ..permissions import (
|
|
permission_user_delete, permission_user_edit, permission_user_view
|
|
)
|
|
|
|
from .literals import (
|
|
TEST_USER_PASSWORD, TEST_USER_PASSWORD_EDITED, TEST_USER_USERNAME
|
|
)
|
|
|
|
TEST_USER_TO_DELETE_USERNAME = 'user_to_delete'
|
|
|
|
|
|
class UserManagementViewTestCase(GenericViewTestCase):
|
|
def test_user_set_password_view_no_permissions(self):
|
|
self.login(username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD)
|
|
|
|
self.role.permissions.add(permission_user_view.stored_permission)
|
|
|
|
response = self.post(
|
|
'user_management:user_set_password', args=(self.user.pk,), data={
|
|
'new_password_1': TEST_USER_PASSWORD_EDITED,
|
|
'new_password_2': TEST_USER_PASSWORD_EDITED
|
|
}
|
|
)
|
|
|
|
self.assertEqual(response.status_code, 403)
|
|
|
|
self.client.logout()
|
|
self.client.login(
|
|
username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD_EDITED
|
|
)
|
|
|
|
response = self.get('common:current_user_details')
|
|
|
|
self.assertEqual(response.status_code, 302)
|
|
|
|
def test_user_set_password_view_with_permissions(self):
|
|
self.login(username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD)
|
|
|
|
self.role.permissions.add(permission_user_edit.stored_permission)
|
|
self.role.permissions.add(permission_user_view.stored_permission)
|
|
|
|
response = self.post(
|
|
'user_management:user_set_password', args=(self.user.pk,), data={
|
|
'new_password_1': TEST_USER_PASSWORD_EDITED,
|
|
'new_password_2': TEST_USER_PASSWORD_EDITED
|
|
}, follow=True
|
|
)
|
|
|
|
self.assertContains(response, text='Successfull', status_code=200)
|
|
|
|
self.client.logout()
|
|
self.client.login(
|
|
username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD_EDITED
|
|
)
|
|
response = self.get('common:current_user_details')
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
def test_user_multiple_set_password_view_no_permissions(self):
|
|
self.login(username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD)
|
|
|
|
self.role.permissions.add(permission_user_view.stored_permission)
|
|
|
|
response = self.post(
|
|
'user_management:user_multiple_set_password', data={
|
|
'id_list': self.user.pk,
|
|
'new_password_1': TEST_USER_PASSWORD_EDITED,
|
|
'new_password_2': TEST_USER_PASSWORD_EDITED
|
|
}
|
|
)
|
|
|
|
self.assertEqual(response.status_code, 403)
|
|
|
|
self.client.logout()
|
|
self.client.login(
|
|
username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD_EDITED
|
|
)
|
|
|
|
response = self.get('common:current_user_details')
|
|
|
|
self.assertEqual(response.status_code, 302)
|
|
|
|
def test_user_multiple_set_password_view_with_permissions(self):
|
|
self.login(username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD)
|
|
|
|
self.role.permissions.add(permission_user_edit.stored_permission)
|
|
self.role.permissions.add(permission_user_view.stored_permission)
|
|
|
|
response = self.post(
|
|
'user_management:user_multiple_set_password', data={
|
|
'id_list': self.user.pk,
|
|
'new_password_1': TEST_USER_PASSWORD_EDITED,
|
|
'new_password_2': TEST_USER_PASSWORD_EDITED
|
|
}, follow=True
|
|
)
|
|
|
|
self.assertContains(response, text='Successfull', status_code=200)
|
|
|
|
self.client.logout()
|
|
self.client.login(
|
|
username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD_EDITED
|
|
)
|
|
response = self.get('common:current_user_details')
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
def test_user_delete_view_no_permissions(self):
|
|
user = get_user_model().objects.create(
|
|
username=TEST_USER_TO_DELETE_USERNAME
|
|
)
|
|
|
|
self.login(username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD)
|
|
|
|
self.role.permissions.add(permission_user_view.stored_permission)
|
|
|
|
response = self.post(
|
|
'user_management:user_delete', args=(user.pk,)
|
|
)
|
|
|
|
self.assertEqual(response.status_code, 403)
|
|
self.assertEqual(get_user_model().objects.count(), 3)
|
|
|
|
def test_user_delete_view_with_permissions(self):
|
|
user = get_user_model().objects.create(
|
|
username=TEST_USER_TO_DELETE_USERNAME
|
|
)
|
|
|
|
self.login(username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD)
|
|
|
|
self.role.permissions.add(permission_user_delete.stored_permission)
|
|
self.role.permissions.add(permission_user_view.stored_permission)
|
|
|
|
response = self.post(
|
|
'user_management:user_delete', args=(user.pk,), follow=True
|
|
)
|
|
|
|
self.assertContains(response, text='deleted', status_code=200)
|
|
self.assertEqual(get_user_model().objects.count(), 2)
|
|
|
|
def test_user_multiple_delete_view_no_permissions(self):
|
|
user = get_user_model().objects.create(
|
|
username=TEST_USER_TO_DELETE_USERNAME
|
|
)
|
|
|
|
self.login(username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD)
|
|
|
|
self.role.permissions.add(permission_user_view.stored_permission)
|
|
|
|
response = self.post(
|
|
'user_management:user_multiple_delete', data={
|
|
'id_list': user.pk
|
|
}
|
|
)
|
|
|
|
self.assertEqual(response.status_code, 403)
|
|
self.assertEqual(get_user_model().objects.count(), 3)
|
|
|
|
def test_user_multiple_delete_view_with_permissions(self):
|
|
user = get_user_model().objects.create(
|
|
username=TEST_USER_TO_DELETE_USERNAME
|
|
)
|
|
|
|
self.login(username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD)
|
|
|
|
self.role.permissions.add(permission_user_delete.stored_permission)
|
|
self.role.permissions.add(permission_user_view.stored_permission)
|
|
|
|
response = self.post(
|
|
'user_management:user_multiple_delete', data={
|
|
'id_list': user.pk,
|
|
}, follow=True
|
|
)
|
|
|
|
self.assertContains(response, text='deleted', status_code=200)
|
|
self.assertEqual(get_user_model().objects.count(), 2)
|
|
|
|
|
|
class MetadataLookupIntegrationTestCase(GenericDocumentViewTestCase):
|
|
def setUp(self):
|
|
super(MetadataLookupIntegrationTestCase, self).setUp()
|
|
|
|
self.metadata_type = MetadataType.objects.create(
|
|
name=TEST_METADATA_TYPE_NAME, label=TEST_METADATA_TYPE_LABEL
|
|
)
|
|
|
|
self.document_type.metadata.create(metadata_type=self.metadata_type)
|
|
|
|
def test_user_list_lookup_render(self):
|
|
self.login(
|
|
username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD
|
|
)
|
|
|
|
self.metadata_type.lookup = '{{ users }}'
|
|
self.metadata_type.save()
|
|
self.document.metadata.create(metadata_type=self.metadata_type)
|
|
self.role.permissions.add(
|
|
permission_metadata_document_edit.stored_permission
|
|
)
|
|
|
|
response = self.get(
|
|
viewname='metadata:metadata_edit', args=(self.document.pk,)
|
|
)
|
|
|
|
self.assertContains(
|
|
response, text='<option value="{}">{}</option>'.format(
|
|
TEST_USER_USERNAME, TEST_USER_USERNAME
|
|
), status_code=200
|
|
)
|
|
|
|
def test_group_list_lookup_render(self):
|
|
self.login(
|
|
username=TEST_USER_USERNAME, password=TEST_USER_PASSWORD
|
|
)
|
|
|
|
self.metadata_type.lookup = '{{ groups }}'
|
|
self.metadata_type.save()
|
|
self.document.metadata.create(metadata_type=self.metadata_type)
|
|
self.role.permissions.add(
|
|
permission_metadata_document_edit.stored_permission
|
|
)
|
|
|
|
response = self.get(
|
|
viewname='metadata:metadata_edit', args=(self.document.pk,)
|
|
)
|
|
|
|
self.assertContains(
|
|
response, text='<option value="{}">{}</option>'.format(
|
|
Group.objects.first().name, Group.objects.first().name
|
|
), status_code=200
|
|
)
|