123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417 |
- # -*- coding: utf-8 -*-
- """
- (c) 2017 - Copyright Red Hat Inc
- Authors:
- Pierre-Yves Chibon <pingou@pingoured.fr>
- """
- from __future__ import unicode_literals
- __requires__ = ['SQLAlchemy >= 0.8']
- import pkg_resources
- import unittest
- import shutil
- import sys
- import tempfile
- import os
- from mock import patch, MagicMock
- sys.path.insert(0, os.path.join(os.path.dirname(
- os.path.abspath(__file__)), '..'))
- import pagure
- import pagure.lib
- import tests
- class PagureFlaskGiveRepotests(tests.SimplePagureTest):
- """ Tests for give a project on pagure """
- def setUp(self):
- """ Set up the environnment, ran before every tests. """
- super(PagureFlaskGiveRepotests, self).setUp()
- pagure.config.config['VIRUS_SCAN_ATTACHMENTS'] = False
- pagure.config.config['UPLOAD_FOLDER_URL'] = '/releases/'
- pagure.config.config['UPLOAD_FOLDER_PATH'] = os.path.join(
- self.path, 'releases')
- tests.create_projects(self.session)
- tests.create_projects_git(os.path.join(self.path, 'repos'), bare=True)
- self._check_user(user='pingou')
- def _check_user(self, user='pingou'):
- self.session.commit()
- project = pagure.lib.get_authorized_project(
- self.session, project_name='test')
- self.assertEqual(project.user.user, user)
- def test_give_project_no_project(self):
- """ Test the give_project endpoint. """
- # No such project
- output = self.app.post('/test42/give')
- self.assertEqual(output.status_code, 404)
- def test_give_project_no_csrf(self):
- """ Test the give_project endpoint. """
- user = tests.FakeUser()
- user.username = 'pingou'
- with tests.user_set(self.app.application, user):
- self._check_user()
- # Missing CSRF
- data = {
- 'user': 'foo',
- }
- output = self.app.post(
- '/test/give', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertIn(
- '<title>Overview - test - Pagure</title>',
- output.get_data(as_text=True))
- self._check_user()
- def test_give_project_invalid_user(self):
- """ Test the give_project endpoint. """
- user = tests.FakeUser()
- user.username = 'pingou'
- with tests.user_set(self.app.application, user):
- csrf_token = self.get_csrf()
- self._check_user()
- # Invalid user
- data = {
- 'user': 'foobar',
- 'csrf_token': csrf_token,
- }
- output = self.app.post(
- '/test/give', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 404)
- self.assertIn(
- '<p>No such user foobar found</p>',
- output.get_data(as_text=True))
- self._check_user()
- def test_give_project_no_user(self):
- """ Test the give_project endpoint. """
- user = tests.FakeUser()
- user.username = 'pingou'
- with tests.user_set(self.app.application, user):
- csrf_token = self.get_csrf()
- self._check_user()
- # No user
- data = {
- 'csrf_token': csrf_token,
- }
- output = self.app.post(
- '/test/give', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 404)
- self.assertIn('<p>No user specified</p>', output.get_data(as_text=True))
- self._check_user()
- def test_give_project_not_owner(self):
- """ Test the give_project endpoint. """
- user = tests.FakeUser()
- user.username = 'foo'
- with tests.user_set(self.app.application, user):
- csrf_token = self.get_csrf()
- self._check_user()
- # User isn't the admin
- data = {
- 'user': 'foo',
- 'csrf_token': csrf_token,
- }
- output = self.app.post(
- '/test/give', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 403)
- self.assertIn(
- '<p>You are not allowed to change the settings for this '
- 'project</p>', output.get_data(as_text=True))
- self._check_user()
- def test_give_project_not_admin(self):
- """ Test the give_project endpoint. """
- user = tests.FakeUser()
- user.username = 'foo'
- with tests.user_set(self.app.application, user):
- csrf_token = self.get_csrf()
- self._check_user()
- # User isn't the admin
- data = {
- 'user': 'foo',
- 'csrf_token': csrf_token,
- }
- output = self.app.post(
- '/test/give', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 403)
- self.assertIn(
- '<p>You are not allowed to change the settings for this '
- 'project</p>', output.get_data(as_text=True))
- self._check_user()
- def test_give_project_not_owner_but_is_admin(self):
- """ Test the give_project endpoint. """
- project = pagure.lib.get_authorized_project(
- self.session, project_name='test')
- msg = pagure.lib.add_user_to_project(
- self.session,
- project=project,
- new_user='foo',
- user='pingou',
- access='admin')
- self.session.commit()
- self.assertEqual(msg, 'User added')
- user = tests.FakeUser()
- user.username = 'foo'
- with tests.user_set(self.app.application, user):
- csrf_token = self.get_csrf()
- self._check_user()
- # User isn't the owner
- data = {
- 'user': 'foo',
- 'csrf_token': csrf_token,
- }
- output = self.app.post(
- '/test/give', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 403)
- self.assertIn(
- '<p>You are not allowed to give this project</p>',
- output.get_data(as_text=True))
- self._check_user()
- @patch.dict('pagure.config.config', {'PAGURE_ADMIN_USERS': 'foo'})
- @patch('pagure.lib.git.generate_gitolite_acls', MagicMock())
- def test_give_project_not_owner_but_admin(self):
- """ Test the give_project endpoint.
- Test giving a project when the person giving the project is a pagure
- admin (instance wide admin) but not a project admin.
- """
- user = tests.FakeUser()
- user.username = 'foo'
- user.cla_done = True
- user.groups = ['foo']
- with tests.user_set(self.app.application, user):
- csrf_token = self.get_csrf()
- self._check_user()
- # User isn't the owner but is an instance admin
- data = {
- 'user': 'foo',
- 'csrf_token': csrf_token,
- }
- output = self.app.post(
- '/test/give', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertIn(
- 'The project has been '
- 'transferred to foo',
- output.get_data(as_text=True))
- self._check_user('foo')
- @patch.dict('pagure.config.config', {'PAGURE_ADMIN_USERS': 'foo'})
- @patch('pagure.lib.git.generate_gitolite_acls', MagicMock())
- def test_give_project(self):
- """ Test the give_project endpoint. """
- user = tests.FakeUser()
- user.username = 'pingou'
- with tests.user_set(self.app.application, user):
- csrf_token = self.get_csrf()
- self._check_user()
- # All good
- data = {
- 'user': 'foo',
- 'csrf_token': csrf_token,
- }
- output = self.app.post(
- '/test/give', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertIn(
- 'The project has been '
- 'transferred to foo',
- output.get_data(as_text=True))
- self._check_user('foo')
- # Make sure that the user giving the project is still an admin
- project = pagure.lib.get_authorized_project(
- self.session, project_name='test')
- self.assertEqual(len(project.users), 1)
- self.assertEqual(project.users[0].user, 'pingou')
- @patch.dict('pagure.config.config', {'PAGURE_ADMIN_USERS': 'foo'})
- @patch('pagure.lib.git.generate_gitolite_acls', MagicMock())
- def test_give_project_already_user(self):
- """ Test the give_project endpoint when the new main_admin is already
- a committer on the project. """
- project = pagure.lib._get_project(self.session, 'test')
- pagure.lib.add_user_to_project(
- self.session, project,
- new_user='foo',
- user='pingou',
- access='commit'
- )
- self.session.commit()
- user = tests.FakeUser()
- user.username = 'pingou'
- with tests.user_set(self.app.application, user):
- csrf_token = self.get_csrf()
- self._check_user()
- # All good
- data = {
- 'user': 'foo',
- 'csrf_token': csrf_token,
- }
- output = self.app.post(
- '/test/give', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertIn(
- 'The project has been '
- 'transferred to foo',
- output.get_data(as_text=True))
- self._check_user('foo')
- # Make sure that the user giving the project is still an admin
- project = pagure.lib.get_authorized_project(
- self.session, project_name='test')
- self.assertEqual(len(project.users), 1)
- self.assertEqual(project.users[0].user, 'pingou')
- @patch.dict('pagure.config.config', {'REQUIRED_GROUPS': {'*': ['packager']}})
- @patch.dict('pagure.config.config', {'PAGURE_ADMIN_USERS': 'foo'})
- @patch('pagure.lib.git.generate_gitolite_acls', MagicMock())
- def test_give_project_not_in_required_group(self):
- """ Test the give_project endpoint. """
- user = tests.FakeUser()
- user.username = 'pingou'
- with tests.user_set(self.app.application, user):
- csrf_token = self.get_csrf()
- self._check_user()
- # User not a packager
- data = {
- 'user': 'foo',
- 'csrf_token': csrf_token,
- }
- output = self.app.post(
- '/test/give', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertIn(
- '</i> This user must be in one of the following groups to '
- 'be allowed to be added to this project: packager</div>',
- output.get_data(as_text=True))
- self._check_user(user='pingou')
- @patch.dict('pagure.config.config', {'REQUIRED_GROUPS': {'*': ['packager']}})
- @patch.dict('pagure.config.config', {'PAGURE_ADMIN_USERS': 'foo'})
- @patch('pagure.lib.git.generate_gitolite_acls', MagicMock())
- def test_give_project_in_required_group(self):
- """ Test the give_project endpoint. """
- # Create the packager group
- msg = pagure.lib.add_group(
- self.session,
- group_name='packager',
- display_name='packager group',
- description=None,
- group_type='user',
- user='pingou',
- is_admin=False,
- blacklist=[],
- )
- self.session.commit()
- self.assertEqual(msg, 'User `pingou` added to the group `packager`.')
- # Add foo to the packager group
- group = pagure.lib.search_groups(self.session, group_name='packager')
- msg = pagure.lib.add_user_to_group(
- self.session,
- username='foo',
- group=group,
- user='pingou',
- is_admin=False,
- )
- self.session.commit()
- self.assertEqual(msg, 'User `foo` added to the group `packager`.')
- # pingou transferts test to foo
- user = tests.FakeUser()
- user.username = 'pingou'
- with tests.user_set(self.app.application, user):
- csrf_token = self.get_csrf()
- self._check_user()
- # User not a packager
- data = {
- 'user': 'foo',
- 'csrf_token': csrf_token,
- }
- output = self.app.post(
- '/test/give', data=data, follow_redirects=True)
- self.assertEqual(output.status_code, 200)
- self.assertIn(
- '</i> The project has been transferred to foo</div>',
- output.get_data(as_text=True))
- self._check_user('foo')
- # Make sure that the user giving the project is still an admin
- project = pagure.lib.get_authorized_project(
- self.session, project_name='test')
- self.assertEqual(len(project.users), 1)
- self.assertEqual(project.users[0].user, 'pingou')
- if __name__ == '__main__':
- unittest.main(verbosity=2)
|