123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257 |
- # -*- coding: utf-8 -*-
- """
- (c) 2015-2016 - Copyright Red Hat Inc
- Authors:
- Pierre-Yves Chibon <pingou@pingoured.fr>
- """
- __requires__ = ['SQLAlchemy >= 0.8']
- import pkg_resources
- import json
- import unittest
- import shutil
- import sys
- import os
- import pygit2
- from mock import patch
- sys.path.insert(0, os.path.join(os.path.dirname(
- os.path.abspath(__file__)), '..'))
- import pagure.lib
- import tests
- class PagureFlaskAdmintests(tests.Modeltests):
- """ Tests for flask admin controller of pagure """
- def setUp(self):
- """ Set up the environnment, ran before every tests. """
- super(PagureFlaskAdmintests, self).setUp()
- pagure.APP.config['TESTING'] = True
- pagure.SESSION = self.session
- pagure.ui.SESSION = self.session
- pagure.ui.app.SESSION = self.session
- pagure.ui.filters.SESSION = self.session
- pagure.ui.repo.SESSION = self.session
- pagure.ui.admin.SESSION = self.session
- pagure.APP.config['GIT_FOLDER'] = tests.HERE
- pagure.APP.config['FORK_FOLDER'] = os.path.join(
- tests.HERE, 'forks')
- pagure.APP.config['TICKETS_FOLDER'] = os.path.join(
- tests.HERE, 'tickets')
- pagure.APP.config['DOCS_FOLDER'] = os.path.join(
- tests.HERE, 'docs')
- self.app = pagure.APP.test_client()
- def test_admin_index(self):
- """ Test the admin_index endpoint. """
- output = self.app.get('/admin')
- self.assertEqual(output.status_code, 302)
- user = tests.FakeUser()
- with tests.user_set(pagure.APP, user):
- output = self.app.post('/admin', follow_redirects=True)
- self.assertEqual(output.status_code, 404)
- self.assertIn(
- '</button>\n Access restricted',
- output.data)
- user.username = 'foo'
- with tests.user_set(pagure.APP, user):
- output = self.app.get('/admin', follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertIn(
- '</button>\n Access restricted',
- output.data)
- user = tests.FakeUser(
- username='pingou',
- groups=pagure.APP.config['ADMIN_GROUP'])
- with tests.user_set(pagure.APP, user):
- output = self.app.get('/admin', follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertTrue('<h2>Admin section</h2>' in output.data)
- self.assertTrue('Re-generate gitolite ACLs file' in output.data)
- self.assertTrue(
- 'Re-generate user ssh key files' in output.data)
- @patch('pagure.lib.git.write_gitolite_acls')
- def test_admin_generate_acl(self, wga):
- """ Test the admin_generate_acl endpoint. """
- wga.return_value = True
- output = self.app.get('/admin/gitolite')
- self.assertEqual(output.status_code, 404)
- output = self.app.post('/admin/gitolite')
- self.assertEqual(output.status_code, 302)
- user = tests.FakeUser()
- with tests.user_set(pagure.APP, user):
- output = self.app.post('/admin/gitolite', follow_redirects=True)
- self.assertEqual(output.status_code, 404)
- self.assertIn(
- '</button>\n Access restricted',
- output.data)
- user.username = 'foo'
- with tests.user_set(pagure.APP, user):
- output = self.app.post('/admin/gitolite', follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertIn(
- '</button>\n Access restricted',
- output.data)
- user = tests.FakeUser(
- username='pingou',
- groups=pagure.APP.config['ADMIN_GROUP'])
- with tests.user_set(pagure.APP, user):
- output = self.app.post('/admin/gitolite', follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertTrue('<h2>Admin section</h2>' in output.data)
- self.assertTrue('Re-generate gitolite ACLs file' in output.data)
- self.assertTrue(
- 'Re-generate user ssh key files' in output.data)
- self.assertFalse(
- '<li class="message">Gitolite ACLs updated</li>'
- in output.data)
- csrf_token = output.data.split(
- 'name="csrf_token" type="hidden" value="')[1].split('">')[0]
- data = {'csrf_token': csrf_token}
- output = self.app.post(
- '/admin/gitolite', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertTrue('<h2>Admin section</h2>' in output.data)
- self.assertTrue('Re-generate gitolite ACLs file' in output.data)
- self.assertTrue(
- 'Re-generate user ssh key files' in output.data)
- self.assertTrue(
- '</button>\n Gitolite ACLs updated'
- in output.data)
- @patch('pagure.generate_user_key_files')
- def test_admin_refresh_ssh(self, gakf):
- """ Test the admin_refresh_ssh endpoint. """
- gakf.return_value = True
- output = self.app.get('/admin/ssh')
- self.assertEqual(output.status_code, 404)
- output = self.app.post('/admin/ssh')
- self.assertEqual(output.status_code, 302)
- user = tests.FakeUser()
- with tests.user_set(pagure.APP, user):
- output = self.app.post('/admin/ssh', follow_redirects=True)
- self.assertEqual(output.status_code, 404)
- self.assertIn(
- '</button>\n Access restricted',
- output.data)
- user.username = 'foo'
- with tests.user_set(pagure.APP, user):
- output = self.app.post('/admin/ssh', follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertIn(
- '</button>\n Access restricted',
- output.data)
- user = tests.FakeUser(
- username='pingou',
- groups=pagure.APP.config['ADMIN_GROUP'])
- with tests.user_set(pagure.APP, user):
- output = self.app.post('/admin/ssh', follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertTrue('<h2>Admin section</h2>' in output.data)
- self.assertTrue('Re-generate gitolite ACLs file' in output.data)
- self.assertTrue(
- 'Re-generate user ssh key files' in output.data)
- self.assertFalse(
- '<li class="message">Authorized file updated</li>'
- in output.data)
- csrf_token = output.data.split(
- 'name="csrf_token" type="hidden" value="')[1].split('">')[0]
- data = {'csrf_token': csrf_token}
- output = self.app.post(
- '/admin/ssh', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertTrue('<h2>Admin section</h2>' in output.data)
- self.assertTrue('Re-generate gitolite ACLs file' in output.data)
- self.assertTrue(
- 'Re-generate user ssh key files' in output.data)
- self.assertTrue(
- '</button>\n User key files regenerated'
- in output.data)
- def test_admin_generate_hook_token(self):
- """ Test the admin_generate_hook_token endpoint. """
- output = self.app.get('/admin/hook_token')
- self.assertEqual(output.status_code, 404)
- output = self.app.post('/admin/hook_token')
- self.assertEqual(output.status_code, 302)
- user = tests.FakeUser()
- with tests.user_set(pagure.APP, user):
- output = self.app.post('/admin/hook_token', follow_redirects=True)
- self.assertEqual(output.status_code, 404)
- self.assertIn(
- '</button>\n Access restricted',
- output.data)
- user.username = 'foo'
- with tests.user_set(pagure.APP, user):
- output = self.app.post('/admin/hook_token', follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertIn(
- '</button>\n Access restricted',
- output.data)
- user = tests.FakeUser(
- username='pingou',
- groups=pagure.APP.config['ADMIN_GROUP'])
- with tests.user_set(pagure.APP, user):
- output = self.app.post('/admin/hook_token', follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertTrue('<h2>Admin section</h2>' in output.data)
- self.assertTrue('Re-generate gitolite ACLs file' in output.data)
- self.assertTrue(
- 'Re-generate user ssh key files' in output.data)
- self.assertTrue(
- 'Re-generate hook-token for every projects' in output.data)
- csrf_token = output.data.split(
- 'name="csrf_token" type="hidden" value="')[1].split('">')[0]
- data = {'csrf_token': csrf_token}
- output = self.app.post(
- '/admin/hook_token', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertTrue('<h2>Admin section</h2>' in output.data)
- self.assertTrue('Re-generate gitolite ACLs file' in output.data)
- self.assertTrue(
- 'Re-generate user ssh key files' in output.data)
- self.assertTrue(
- 'Re-generate hook-token for every projects' in output.data)
- self.assertTrue(
- '</button>\n Hook token all re-generated'
- in output.data)
- if __name__ == '__main__':
- SUITE = unittest.TestLoader().loadTestsFromTestCase(PagureFlaskAdmintests)
- unittest.TextTestRunner(verbosity=2).run(SUITE)
|