-
Notifications
You must be signed in to change notification settings - Fork 2k
/
test_publisher_auth.py
270 lines (209 loc) · 9.32 KB
/
test_publisher_auth.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
import re
from nose.tools import assert_equal
import ckan.model as model
from ckan.lib.create_test_data import CreateTestData
from ckan.logic import NotAuthorized
from ckan.tests import *
from ckan.tests import setup_test_search_index
from base import FunctionalTestCase
from ckan.tests import search_related, is_search_supported
class TestPublisherGroups(FunctionalTestCase):
@classmethod
def setup_class(self):
from ckan.tests.mock_publisher_auth import MockPublisherAuth
self.auth = MockPublisherAuth()
model.Session.remove()
CreateTestData.create(auth_profile='publisher')
self.groupname = u'david'
self.packagename = u'testpkg'
model.repo.new_revision()
model.Session.add(model.Package(name=self.packagename))
model.repo.commit_and_remove()
@classmethod
def teardown_class(self):
model.Session.remove()
model.repo.rebuild_db()
model.Session.remove()
def _run_fail_test( self, username, action):
grp = model.Group.by_name(self.groupname)
context = { 'group': grp, 'model': model, 'user': username }
try:
self.auth.check_access(action,context, {})
assert False, "The user should not have access"
except NotAuthorized, e:
pass
def _run_success_test( self, username, action):
userobj = model.User.get(username)
grp = model.Group.by_name(self.groupname)
f = model.User.get_groups
def gg(*args, **kwargs):
return [grp]
model.User.get_groups = gg
context = { 'group': grp, 'model': model, 'user': username }
try:
self.auth.check_access(action, context, {})
except NotAuthorized, e:
assert False, "The user should have %s access: %r." % (action, e.extra_msg)
model.User.get_groups = f
def test_new_success(self):
self._run_success_test( 'russianfan', 'group_create' )
def test_new_fail(self):
self._run_fail_test( 'russianfan', 'group_create' )
def test_new_anon_fail(self):
self._run_fail_test( '', 'group_create' )
def test_new_unknown_fail(self):
self._run_fail_test( 'nosuchuser', 'group_create' )
def test_edit_success(self):
""" Success because user in group """
self._run_success_test( 'russianfan', 'group_update' )
def test_edit_fail(self):
""" Fail because user not in group """
self._run_fail_test( 'russianfan', 'group_update' )
def test_edit_anon_fail(self):
""" Fail because user is anon """
self._run_fail_test( '', 'group_update' )
def test_edit_unknown_fail(self):
self._run_fail_test( 'nosuchuser', 'group_update' )
def test_delete_success(self):
""" Success because user in group """
self._run_success_test( 'russianfan', 'group_delete' )
def test_delete_fail(self):
""" Fail because user not in group """
self._run_fail_test( 'russianfan', 'group_delete' )
def test_delete_anon_fail(self):
""" Fail because user is anon """
self._run_fail_test( '', 'group_delete' )
def test_delete_unknown_fail(self):
self._run_fail_test( 'nosuchuser', 'group_delete' )
class TestPublisherGroupPackages(FunctionalTestCase):
@classmethod
def setup_class(self):
from ckan.tests.mock_publisher_auth import MockPublisherAuth
self.auth = MockPublisherAuth()
model.Session.remove()
CreateTestData.create(auth_profile='publisher')
self.groupname = u'david'
self.packagename = u'testpkg'
model.repo.new_revision()
model.Session.add(model.Package(name=self.packagename))
model.repo.commit_and_remove()
@classmethod
def teardown_class(self):
model.Session.remove()
model.repo.rebuild_db()
model.Session.remove()
def _run_fail_test( self, username, action):
pkg = model.Package.by_name(self.packagename)
context = { 'package': pkg, 'model': model, 'user': username }
try:
self.auth.check_access(action, context, {})
assert False, "The user should not have access"
except NotAuthorized, e:
pass
def _run_success_test( self, username, action):
userobj = model.User.get(username)
grp = model.Group.by_name(self.groupname)
pkg = model.Package.by_name(self.packagename)
f = model.User.get_groups
g = model.Package.get_groups
def gg(*args, **kwargs):
return [grp]
model.User.get_groups = gg
model.Package.get_groups = gg
context = { 'package': pkg, 'model': model, 'user': username }
try:
self.auth.check_access(action, context, {})
except NotAuthorized, e:
assert False, "The user should have %s access: %r." % (action, e.extra_msg)
model.User.get_groups = f
model.Package.get_groups = g
def test_new_success(self):
self._run_success_test( 'russianfan', 'package_create' )
# Currently valid to have any logged in user succeed
#def test_new_fail(self):
# self._run_fail_test( 'russianfan', 'package_create' )
def test_new_anon_fail(self):
self._run_fail_test( '', 'package_create' )
def test_new_unknown_fail(self):
self._run_fail_test( 'nosuchuser', 'package_create' )
def test_edit_success(self):
""" Success because user in group """
self._run_success_test( 'russianfan', 'package_update' )
def test_edit_fail(self):
""" Fail because user not in group """
self._run_fail_test( 'russianfan', 'package_update' )
def test_edit_anon_fail(self):
""" Fail because user is anon """
self._run_fail_test( '', 'package_update' )
def test_edit_unknown_fail(self):
self._run_fail_test( 'nosuchuser', 'package_update' )
def test_delete_success(self):
""" Success because user in group """
self._run_success_test( 'russianfan', 'package_delete' )
def test_delete_fail(self):
""" Fail because user not in group """
self._run_fail_test( 'russianfan', 'package_delete' )
def test_delete_anon_fail(self):
""" Fail because user is anon """
self._run_fail_test( '', 'package_delete' )
def test_delete_unknown_fail(self):
self._run_fail_test( 'nosuchuser', 'package_delete' )
class TestPublisherPackageRelationships(FunctionalTestCase):
@classmethod
def setup_class(self):
from ckan.tests.mock_publisher_auth import MockPublisherAuth
self.auth = MockPublisherAuth()
model.Session.remove()
CreateTestData.create(auth_profile='publisher')
self.groupname = u'david'
self.package1name = u'testpkg'
self.package2name = u'testpkg2'
model.repo.new_revision()
model.Session.add(model.Package(name=self.package1name))
model.Session.add(model.Package(name=self.package2name))
model.repo.commit_and_remove()
@classmethod
def teardown_class(self):
model.Session.remove()
model.repo.rebuild_db()
model.Session.remove()
def test_create_fail_user( self):
p1 = model.Package.by_name( self.package1name )
p2 = model.Package.by_name( self.package2name )
context = { 'model': model, 'user': 'russianfan' }
try:
self.auth.check_access('package_relationship_create', context, {'id': p1.id, 'id2': p2.id})
assert False, "The user should not have access."
except NotAuthorized, e:
pass
def test_create_fail_ddict( self):
p1 = model.Package.by_name( self.package1name )
p2 = model.Package.by_name( self.package2name )
context = { 'model': model, 'user': 'russianfan' }
try:
self.auth.check_access('package_relationship_create', context, {'id': p1.id})
assert False, "The user should not have access."
except NotAuthorized, e:
pass
try:
self.auth.check_access('package_relationship_create', context, {'id2': p2.id})
assert False, "The user should not have access."
except NotAuthorized, e:
pass
def test_create_success(self):
userobj = model.User.get('russianfan')
f = model.User.get_groups
g = model.Package.get_groups
def gg(*args, **kwargs):
return ['test_group']
model.User.get_groups = gg
model.Package.get_groups = gg
p1 = model.Package.by_name( self.package1name )
p2 = model.Package.by_name( self.package2name )
context = { 'model': model, 'user': 'russianfan' }
try:
self.auth.check_access('package_relationship_create', context, {'id': p1.id, 'id2': p2.id})
except NotAuthorized, e:
assert False, "The user should have %s access: %r." % (action, e.extra_msg)
model.User.get_groups = f
model.Package.get_groups = g