-
Notifications
You must be signed in to change notification settings - Fork 170
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add support for non-integer primary key user models
Simplify URL and view structure. Add support for multiple PK types based on URL pattern as well as natural key support via URL patterns. Changes: * Deprecate `HIJACK_URL_ALLOWED_ATTRIBUTES` setting favoring `HIJACK_USER_URL_PATTERN`. * Deprecate URL names `login_with_id`, `login_with_username` and `login_with_email` favoring `acquire`. * Deprecate URL name `release_hijack` favoring `release`. * Deprecate views `login_with_id`, `login_with_username` and `login_with_email` favoring `release_user_view`. * Deprecate view `release_hijack` favoring `release_user_view`. Close #196 Close #183 Close #184 Close #198 Close #175 Co-Authored-By: Alexandr Artemyev <mogost@gmail.com>
- Loading branch information
Showing
11 changed files
with
219 additions
and
135 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
import pytest | ||
from django.db import models | ||
|
||
from hijack.urls import _get_user_url_pattern | ||
|
||
|
||
def test__get_user_url_pattern__int_pk_url(): | ||
assert _get_user_url_pattern().pattern.match("acquire/123/") | ||
assert not _get_user_url_pattern().pattern.match( | ||
"acquire/f545f538-ece0-4883-93d0-c55a13df60a4/" | ||
) | ||
assert not _get_user_url_pattern().pattern.match("acquire/user-slug/") | ||
|
||
|
||
def test__get_user_url_pattern__uuid_pk_url(): | ||
assert _get_user_url_pattern(pk=models.UUIDField()).pattern.match( | ||
"acquire/f545f538-ece0-4883-93d0-c55a13df60a4/" | ||
) | ||
assert not _get_user_url_pattern(pk=models.UUIDField()).pattern.match( | ||
"acquire/123/" | ||
) | ||
assert not _get_user_url_pattern(pk=models.UUIDField()).pattern.match( | ||
"acquire/user-slug/" | ||
) | ||
|
||
|
||
def test__get_user_url_pattern__slug_pk_url(): | ||
assert _get_user_url_pattern(pk=models.SlugField()).pattern.match( | ||
"acquire/user-slug/" | ||
) | ||
|
||
|
||
def test__get_user_url_pattern__custom_pattern(): | ||
assert _get_user_url_pattern(pattern=r"^acquire/(?P<username>\w+)/$").pattern.match( | ||
"acquire/spiderman/" | ||
) | ||
assert not _get_user_url_pattern( | ||
pattern=r"^acquire/(?P<username>\w+)/$" | ||
).pattern.match("acquire/spider-man/") | ||
|
||
|
||
def test__get_user_url_pattern__raise_not_implemented_error(): | ||
with pytest.raises(NotImplementedError) as e: | ||
_get_user_url_pattern(pk=models.CharField()) | ||
assert ( | ||
"User model's primary key type CharField is not supported." | ||
" Please provide your own HIJACK_USER_URL_PATTERN setting." in str(e) | ||
) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
from unittest.mock import MagicMock | ||
|
||
import pytest | ||
from django.contrib.auth import get_user_model | ||
|
||
from hijack import views | ||
|
||
|
||
def test_login_with_id(rf, db, admin_user, monkeypatch): | ||
request = rf.post("/") | ||
request.user = admin_user | ||
login_user = MagicMock() | ||
monkeypatch.setattr("hijack.views.login_user", login_user) | ||
user = get_user_model().objects.create(pk=123) | ||
with pytest.deprecated_call(): | ||
views.login_with_id(request, 123) | ||
login_user.assert_called_once_with(request, user) | ||
|
||
|
||
def test_login_with_email(rf, db, admin_user, monkeypatch): | ||
request = rf.post("/") | ||
request.user = admin_user | ||
login_user = MagicMock() | ||
monkeypatch.setattr("hijack.views.login_user", login_user) | ||
user = get_user_model().objects.create(email="spiderman@averngers.com") | ||
with pytest.deprecated_call(): | ||
views.login_with_email(request, "spiderman@averngers.com") | ||
login_user.assert_called_once_with(request, user) | ||
|
||
|
||
def test_login_with_username(rf, db, admin_user, monkeypatch): | ||
request = rf.post("/") | ||
request.user = admin_user | ||
login_user = MagicMock() | ||
monkeypatch.setattr("hijack.views.login_user", login_user) | ||
user = get_user_model().objects.create(username="spiderman") | ||
with pytest.deprecated_call(): | ||
views.login_with_username(request, "spiderman") | ||
login_user.assert_called_once_with(request, user) | ||
|
||
|
||
def test_release_hijack(rf, monkeypatch): | ||
request = rf.get("/") | ||
release_user_view = MagicMock() | ||
monkeypatch.setattr("hijack.views.release_user_view", release_user_view) | ||
with pytest.deprecated_call(): | ||
views.release_hijack(request) | ||
release_user_view.assert_called_once_with(request) |
Oops, something went wrong.