258 lines
9.9 KiB
Python
258 lines
9.9 KiB
Python
|
# -*- coding: utf-8 -*-
|
||
|
|
||
|
"""
|
||
|
(c) 2015-2016 - Copyright Red Hat Inc
|
||
|
|
||
|
Authors:
|
||
|
Pierre-Yves Chibon <pingou@pingoured.fr>
|
||
|
|
||
|
"""
|
||
|
|
||
|
__requires__ = ['SQLAlchemy >= 0.8']
|
||
|
import pkg_resources
|
||
|
|
||
|
import json
|
||
|
import unittest
|
||
|
import shutil
|
||
|
import sys
|
||
|
import os
|
||
|
|
||
|
import pygit2
|
||
|
from mock import patch
|
||
|
|
||
|
sys.path.insert(0, os.path.join(os.path.dirname(
|
||
|
os.path.abspath(__file__)), '..'))
|
||
|
|
||
|
import pagure.lib
|
||
|
import tests
|
||
|
|
||
|
|
||
|
class PagureFlaskAdmintests(tests.Modeltests):
|
||
|
""" Tests for flask admin controller of pagure """
|
||
|
|
||
|
def setUp(self):
|
||
|
""" Set up the environnment, ran before every tests. """
|
||
|
super(PagureFlaskAdmintests, self).setUp()
|
||
|
|
||
|
pagure.APP.config['TESTING'] = True
|
||
|
pagure.SESSION = self.session
|
||
|
pagure.ui.SESSION = self.session
|
||
|
pagure.ui.app.SESSION = self.session
|
||
|
pagure.ui.filters.SESSION = self.session
|
||
|
pagure.ui.repo.SESSION = self.session
|
||
|
pagure.ui.admin.SESSION = self.session
|
||
|
|
||
|
pagure.APP.config['GIT_FOLDER'] = tests.HERE
|
||
|
pagure.APP.config['FORK_FOLDER'] = os.path.join(
|
||
|
tests.HERE, 'forks')
|
||
|
pagure.APP.config['TICKETS_FOLDER'] = os.path.join(
|
||
|
tests.HERE, 'tickets')
|
||
|
pagure.APP.config['DOCS_FOLDER'] = os.path.join(
|
||
|
tests.HERE, 'docs')
|
||
|
self.app = pagure.APP.test_client()
|
||
|
|
||
|
def test_admin_index(self):
|
||
|
""" Test the admin_index endpoint. """
|
||
|
|
||
|
output = self.app.get('/admin')
|
||
|
self.assertEqual(output.status_code, 302)
|
||
|
|
||
|
user = tests.FakeUser()
|
||
|
with tests.user_set(pagure.APP, user):
|
||
|
output = self.app.post('/admin', follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 404)
|
||
|
self.assertIn(
|
||
|
'</button>\n Access restricted',
|
||
|
output.data)
|
||
|
|
||
|
user.username = 'foo'
|
||
|
with tests.user_set(pagure.APP, user):
|
||
|
output = self.app.get('/admin', follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 200)
|
||
|
self.assertIn(
|
||
|
'</button>\n Access restricted',
|
||
|
output.data)
|
||
|
|
||
|
user = tests.FakeUser(
|
||
|
username='pingou',
|
||
|
groups=pagure.APP.config['ADMIN_GROUP'])
|
||
|
with tests.user_set(pagure.APP, user):
|
||
|
output = self.app.get('/admin', follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 200)
|
||
|
self.assertTrue('<h2>Admin section</h2>' in output.data)
|
||
|
self.assertTrue('Re-generate gitolite ACLs file' in output.data)
|
||
|
self.assertTrue(
|
||
|
'Re-generate user ssh key files' in output.data)
|
||
|
|
||
|
@patch('pagure.lib.git.write_gitolite_acls')
|
||
|
def test_admin_generate_acl(self, wga):
|
||
|
""" Test the admin_generate_acl endpoint. """
|
||
|
wga.return_value = True
|
||
|
|
||
|
output = self.app.get('/admin/gitolite')
|
||
|
self.assertEqual(output.status_code, 404)
|
||
|
|
||
|
output = self.app.post('/admin/gitolite')
|
||
|
self.assertEqual(output.status_code, 302)
|
||
|
|
||
|
user = tests.FakeUser()
|
||
|
with tests.user_set(pagure.APP, user):
|
||
|
output = self.app.post('/admin/gitolite', follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 404)
|
||
|
self.assertIn(
|
||
|
'</button>\n Access restricted',
|
||
|
output.data)
|
||
|
|
||
|
user.username = 'foo'
|
||
|
with tests.user_set(pagure.APP, user):
|
||
|
output = self.app.post('/admin/gitolite', follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 200)
|
||
|
self.assertIn(
|
||
|
'</button>\n Access restricted',
|
||
|
output.data)
|
||
|
|
||
|
user = tests.FakeUser(
|
||
|
username='pingou',
|
||
|
groups=pagure.APP.config['ADMIN_GROUP'])
|
||
|
with tests.user_set(pagure.APP, user):
|
||
|
output = self.app.post('/admin/gitolite', follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 200)
|
||
|
self.assertTrue('<h2>Admin section</h2>' in output.data)
|
||
|
self.assertTrue('Re-generate gitolite ACLs file' in output.data)
|
||
|
self.assertTrue(
|
||
|
'Re-generate user ssh key files' in output.data)
|
||
|
self.assertFalse(
|
||
|
'<li class="message">Gitolite ACLs updated</li>'
|
||
|
in output.data)
|
||
|
|
||
|
csrf_token = output.data.split(
|
||
|
'name="csrf_token" type="hidden" value="')[1].split('">')[0]
|
||
|
|
||
|
data = {'csrf_token': csrf_token}
|
||
|
output = self.app.post(
|
||
|
'/admin/gitolite', data=data, follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 200)
|
||
|
self.assertTrue('<h2>Admin section</h2>' in output.data)
|
||
|
self.assertTrue('Re-generate gitolite ACLs file' in output.data)
|
||
|
self.assertTrue(
|
||
|
'Re-generate user ssh key files' in output.data)
|
||
|
self.assertTrue(
|
||
|
'</button>\n Gitolite ACLs updated'
|
||
|
in output.data)
|
||
|
|
||
|
@patch('pagure.generate_user_key_files')
|
||
|
def test_admin_refresh_ssh(self, gakf):
|
||
|
""" Test the admin_refresh_ssh endpoint. """
|
||
|
gakf.return_value = True
|
||
|
|
||
|
output = self.app.get('/admin/ssh')
|
||
|
self.assertEqual(output.status_code, 404)
|
||
|
|
||
|
output = self.app.post('/admin/ssh')
|
||
|
self.assertEqual(output.status_code, 302)
|
||
|
|
||
|
user = tests.FakeUser()
|
||
|
with tests.user_set(pagure.APP, user):
|
||
|
output = self.app.post('/admin/ssh', follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 404)
|
||
|
self.assertIn(
|
||
|
'</button>\n Access restricted',
|
||
|
output.data)
|
||
|
|
||
|
user.username = 'foo'
|
||
|
with tests.user_set(pagure.APP, user):
|
||
|
output = self.app.post('/admin/ssh', follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 200)
|
||
|
self.assertIn(
|
||
|
'</button>\n Access restricted',
|
||
|
output.data)
|
||
|
|
||
|
user = tests.FakeUser(
|
||
|
username='pingou',
|
||
|
groups=pagure.APP.config['ADMIN_GROUP'])
|
||
|
with tests.user_set(pagure.APP, user):
|
||
|
output = self.app.post('/admin/ssh', follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 200)
|
||
|
self.assertTrue('<h2>Admin section</h2>' in output.data)
|
||
|
self.assertTrue('Re-generate gitolite ACLs file' in output.data)
|
||
|
self.assertTrue(
|
||
|
'Re-generate user ssh key files' in output.data)
|
||
|
self.assertFalse(
|
||
|
'<li class="message">Authorized file updated</li>'
|
||
|
in output.data)
|
||
|
|
||
|
csrf_token = output.data.split(
|
||
|
'name="csrf_token" type="hidden" value="')[1].split('">')[0]
|
||
|
|
||
|
data = {'csrf_token': csrf_token}
|
||
|
output = self.app.post(
|
||
|
'/admin/ssh', data=data, follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 200)
|
||
|
self.assertTrue('<h2>Admin section</h2>' in output.data)
|
||
|
self.assertTrue('Re-generate gitolite ACLs file' in output.data)
|
||
|
self.assertTrue(
|
||
|
'Re-generate user ssh key files' in output.data)
|
||
|
self.assertTrue(
|
||
|
'</button>\n User key files regenerated'
|
||
|
in output.data)
|
||
|
|
||
|
def test_admin_generate_hook_token(self):
|
||
|
""" Test the admin_generate_hook_token endpoint. """
|
||
|
|
||
|
output = self.app.get('/admin/hook_token')
|
||
|
self.assertEqual(output.status_code, 404)
|
||
|
|
||
|
output = self.app.post('/admin/hook_token')
|
||
|
self.assertEqual(output.status_code, 302)
|
||
|
|
||
|
user = tests.FakeUser()
|
||
|
with tests.user_set(pagure.APP, user):
|
||
|
output = self.app.post('/admin/hook_token', follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 404)
|
||
|
self.assertIn(
|
||
|
'</button>\n Access restricted',
|
||
|
output.data)
|
||
|
|
||
|
user.username = 'foo'
|
||
|
with tests.user_set(pagure.APP, user):
|
||
|
output = self.app.post('/admin/hook_token', follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 200)
|
||
|
self.assertIn(
|
||
|
'</button>\n Access restricted',
|
||
|
output.data)
|
||
|
|
||
|
user = tests.FakeUser(
|
||
|
username='pingou',
|
||
|
groups=pagure.APP.config['ADMIN_GROUP'])
|
||
|
with tests.user_set(pagure.APP, user):
|
||
|
output = self.app.post('/admin/hook_token', follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 200)
|
||
|
self.assertTrue('<h2>Admin section</h2>' in output.data)
|
||
|
self.assertTrue('Re-generate gitolite ACLs file' in output.data)
|
||
|
self.assertTrue(
|
||
|
'Re-generate user ssh key files' in output.data)
|
||
|
self.assertTrue(
|
||
|
'Re-generate hook-token for every projects' in output.data)
|
||
|
|
||
|
csrf_token = output.data.split(
|
||
|
'name="csrf_token" type="hidden" value="')[1].split('">')[0]
|
||
|
data = {'csrf_token': csrf_token}
|
||
|
|
||
|
output = self.app.post(
|
||
|
'/admin/hook_token', data=data, follow_redirects=True)
|
||
|
self.assertEqual(output.status_code, 200)
|
||
|
self.assertTrue('<h2>Admin section</h2>' in output.data)
|
||
|
self.assertTrue('Re-generate gitolite ACLs file' in output.data)
|
||
|
self.assertTrue(
|
||
|
'Re-generate user ssh key files' in output.data)
|
||
|
self.assertTrue(
|
||
|
'Re-generate hook-token for every projects' in output.data)
|
||
|
self.assertTrue(
|
||
|
'</button>\n Hook token all re-generated'
|
||
|
in output.data)
|
||
|
|
||
|
|
||
|
if __name__ == '__main__':
|
||
|
SUITE = unittest.TestLoader().loadTestsFromTestCase(PagureFlaskAdmintests)
|
||
|
unittest.TextTestRunner(verbosity=2).run(SUITE)
|