2014-09-23 15:19:31 +00:00
|
|
|
# coding=utf-8
|
|
|
|
|
2014-01-31 21:19:29 +00:00
|
|
|
import unittest
|
2014-02-06 19:40:36 +00:00
|
|
|
import json as py_json
|
2014-01-31 21:19:29 +00:00
|
|
|
|
2014-03-25 19:17:02 +00:00
|
|
|
from urllib import urlencode
|
|
|
|
from urlparse import urlparse, urlunparse, parse_qs
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
from endpoints.api import api_bp, api
|
2014-02-26 20:19:07 +00:00
|
|
|
from endpoints.webhooks import webhooks
|
2014-03-19 00:32:37 +00:00
|
|
|
from endpoints.trigger import BuildTrigger as BuildTriggerBase
|
2014-01-31 21:19:29 +00:00
|
|
|
from app import app
|
|
|
|
from initdb import setup_database_for_testing, finished_database_for_testing
|
2014-02-26 20:19:07 +00:00
|
|
|
from data import model, database
|
2014-01-31 21:19:29 +00:00
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
from endpoints.api.team import TeamMember, TeamMemberList, TeamMemberInvite, OrganizationTeam
|
2014-03-18 23:34:26 +00:00
|
|
|
from endpoints.api.tag import RepositoryTagImages, RepositoryTag
|
|
|
|
from endpoints.api.search import FindRepositories, EntitySearch
|
|
|
|
from endpoints.api.image import RepositoryImage, RepositoryImageList
|
2015-02-13 20:54:01 +00:00
|
|
|
from endpoints.api.build import (RepositoryBuildStatus, RepositoryBuildLogs, RepositoryBuildList,
|
|
|
|
RepositoryBuildResource)
|
2014-08-25 21:19:23 +00:00
|
|
|
from endpoints.api.robot import (UserRobotList, OrgRobot, OrgRobotList, UserRobot,
|
|
|
|
RegenerateUserRobot, RegenerateOrgRobot)
|
2014-03-18 23:34:26 +00:00
|
|
|
from endpoints.api.trigger import (BuildTriggerActivate, BuildTriggerSources, BuildTriggerSubdirs,
|
|
|
|
TriggerBuildList, ActivateBuildTrigger, BuildTrigger,
|
2014-09-30 20:29:32 +00:00
|
|
|
BuildTriggerList, BuildTriggerAnalyze, BuildTriggerFieldValues)
|
2014-07-28 18:58:12 +00:00
|
|
|
from endpoints.api.repoemail import RepositoryAuthorizedEmail
|
2014-07-18 02:51:58 +00:00
|
|
|
from endpoints.api.repositorynotification import RepositoryNotification, RepositoryNotificationList
|
2014-03-25 00:57:02 +00:00
|
|
|
from endpoints.api.user import (PrivateRepositories, ConvertToOrganization, Signout, Signin, User,
|
2014-07-28 22:23:46 +00:00
|
|
|
UserAuthorizationList, UserAuthorization, UserNotification,
|
2015-02-20 20:11:41 +00:00
|
|
|
UserNotificationList, StarredRepositoryList, StarredRepository)
|
2014-03-25 00:57:02 +00:00
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
from endpoints.api.repotoken import RepositoryToken, RepositoryTokenList
|
|
|
|
from endpoints.api.prototype import PermissionPrototype, PermissionPrototypeList
|
|
|
|
from endpoints.api.logs import UserLogs, OrgLogs
|
|
|
|
from endpoints.api.billing import (UserCard, UserPlan, ListPlans, OrganizationCard,
|
|
|
|
OrganizationPlan)
|
|
|
|
from endpoints.api.discovery import DiscoveryResource
|
|
|
|
from endpoints.api.organization import (OrganizationList, OrganizationMember,
|
|
|
|
OrgPrivateRepositories, OrgnaizationMemberList,
|
2014-03-20 19:46:13 +00:00
|
|
|
Organization, ApplicationInformation,
|
|
|
|
OrganizationApplications, OrganizationApplicationResource,
|
|
|
|
OrganizationApplicationResetClientSecret)
|
2014-03-18 23:34:26 +00:00
|
|
|
from endpoints.api.repository import RepositoryList, RepositoryVisibility, Repository
|
|
|
|
from endpoints.api.permission import (RepositoryUserPermission, RepositoryTeamPermission,
|
|
|
|
RepositoryTeamPermissionList, RepositoryUserPermissionList)
|
2014-10-30 17:26:02 +00:00
|
|
|
from endpoints.api.superuser import (SuperUserLogs, SuperUserList, SuperUserManagement,
|
|
|
|
UsageInformation)
|
2014-03-18 23:34:26 +00:00
|
|
|
|
2014-03-19 22:21:58 +00:00
|
|
|
try:
|
|
|
|
app.register_blueprint(api_bp, url_prefix='/api')
|
|
|
|
except ValueError:
|
|
|
|
# This blueprint was already registered
|
|
|
|
pass
|
|
|
|
|
2014-02-26 20:19:07 +00:00
|
|
|
app.register_blueprint(webhooks, url_prefix='/webhooks')
|
2014-01-31 21:19:29 +00:00
|
|
|
|
|
|
|
NO_ACCESS_USER = 'freshuser'
|
|
|
|
READ_ACCESS_USER = 'reader'
|
|
|
|
ADMIN_ACCESS_USER = 'devtable'
|
2014-02-03 23:18:33 +00:00
|
|
|
PUBLIC_USER = 'public'
|
|
|
|
|
2014-07-08 22:19:13 +00:00
|
|
|
ADMIN_ACCESS_EMAIL = 'jschorr@devtable.com'
|
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
ORG_REPO = 'orgrepo'
|
|
|
|
|
2014-01-31 21:19:29 +00:00
|
|
|
ORGANIZATION = 'buynlarge'
|
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
NEW_USER_DETAILS = {
|
|
|
|
'username': 'bobby',
|
|
|
|
'password': 'password',
|
|
|
|
'email': 'bobby@tables.com',
|
|
|
|
}
|
|
|
|
|
2014-03-20 19:46:13 +00:00
|
|
|
FAKE_APPLICATION_CLIENT_ID = 'deadbeef'
|
2014-02-06 19:40:36 +00:00
|
|
|
|
2014-03-25 19:17:02 +00:00
|
|
|
CSRF_TOKEN_KEY = '_csrf_token'
|
|
|
|
CSRF_TOKEN = '123csrfforme'
|
2014-02-06 19:40:36 +00:00
|
|
|
|
2014-01-31 21:19:29 +00:00
|
|
|
class ApiTestCase(unittest.TestCase):
|
2014-05-20 22:26:29 +00:00
|
|
|
maxDiff = None
|
|
|
|
|
2014-03-25 19:17:02 +00:00
|
|
|
@staticmethod
|
|
|
|
def _add_csrf(without_csrf):
|
|
|
|
parts = urlparse(without_csrf)
|
|
|
|
query = parse_qs(parts[4])
|
|
|
|
query[CSRF_TOKEN_KEY] = CSRF_TOKEN
|
|
|
|
return urlunparse(list(parts[0:4]) + [urlencode(query)] + list(parts[5:]))
|
|
|
|
|
|
|
|
def url_for(self, resource_name, params={}):
|
|
|
|
url = api.url_for(resource_name, **params)
|
|
|
|
url = ApiTestCase._add_csrf(url)
|
|
|
|
return url
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-01-31 21:19:29 +00:00
|
|
|
def setUp(self):
|
|
|
|
setup_database_for_testing(self)
|
|
|
|
self.app = app.test_client()
|
|
|
|
self.ctx = app.test_request_context()
|
|
|
|
self.ctx.__enter__()
|
2014-03-25 19:17:02 +00:00
|
|
|
self.setCsrfToken(CSRF_TOKEN)
|
2014-01-31 21:19:29 +00:00
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
finished_database_for_testing(self)
|
|
|
|
self.ctx.__exit__(True, None, None)
|
|
|
|
|
2014-03-25 19:17:02 +00:00
|
|
|
def setCsrfToken(self, token):
|
|
|
|
with self.app.session_transaction() as sess:
|
|
|
|
sess[CSRF_TOKEN_KEY] = token
|
|
|
|
|
2014-03-19 00:32:37 +00:00
|
|
|
def getJsonResponse(self, resource_name, params={}, expected_code=200):
|
2014-03-18 23:34:26 +00:00
|
|
|
rv = self.app.get(api.url_for(resource_name, **params))
|
2014-03-19 00:32:37 +00:00
|
|
|
self.assertEquals(expected_code, rv.status_code)
|
2014-01-31 22:54:01 +00:00
|
|
|
data = rv.data
|
2014-02-06 19:40:36 +00:00
|
|
|
parsed = py_json.loads(data)
|
2014-01-31 22:54:01 +00:00
|
|
|
return parsed
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
def postResponse(self, resource_name, params={}, data={}, expected_code=200):
|
2014-03-25 19:17:02 +00:00
|
|
|
rv = self.app.post(self.url_for(resource_name, params),
|
2014-02-06 19:40:36 +00:00
|
|
|
data=py_json.dumps(data),
|
|
|
|
headers={"Content-Type": "application/json"})
|
2014-01-31 22:54:01 +00:00
|
|
|
self.assertEquals(rv.status_code, expected_code)
|
|
|
|
return rv.data
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
def getResponse(self, resource_name, params={}, expected_code=200):
|
|
|
|
rv = self.app.get(api.url_for(resource_name, **params))
|
2014-01-31 22:54:01 +00:00
|
|
|
self.assertEquals(rv.status_code, expected_code)
|
|
|
|
return rv.data
|
|
|
|
|
2014-03-26 23:42:29 +00:00
|
|
|
def putResponse(self, resource_name, params={}, data={}, expected_code=200):
|
|
|
|
rv = self.app.put(self.url_for(resource_name, params),
|
2014-02-28 05:12:09 +00:00
|
|
|
data=py_json.dumps(data),
|
|
|
|
headers={"Content-Type": "application/json"})
|
|
|
|
self.assertEquals(rv.status_code, expected_code)
|
|
|
|
return rv.data
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
def deleteResponse(self, resource_name, params={}, expected_code=204):
|
2014-03-25 19:17:02 +00:00
|
|
|
rv = self.app.delete(self.url_for(resource_name, params))
|
2014-09-08 21:20:01 +00:00
|
|
|
|
|
|
|
if rv.status_code != expected_code:
|
|
|
|
print 'Mismatch data for resource DELETE %s: %s' % (resource_name, rv.data)
|
|
|
|
|
2014-01-31 23:54:31 +00:00
|
|
|
self.assertEquals(rv.status_code, expected_code)
|
|
|
|
return rv.data
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
def postJsonResponse(self, resource_name, params={}, data={},
|
2014-02-06 19:40:36 +00:00
|
|
|
expected_code=200):
|
2014-03-25 19:17:02 +00:00
|
|
|
rv = self.app.post(self.url_for(resource_name, params),
|
2014-02-06 19:40:36 +00:00
|
|
|
data=py_json.dumps(data),
|
|
|
|
headers={"Content-Type": "application/json"})
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
if rv.status_code != expected_code:
|
2014-03-18 23:34:26 +00:00
|
|
|
print 'Mismatch data for resource POST %s: %s' % (resource_name, rv.data)
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
self.assertEquals(rv.status_code, expected_code)
|
2014-01-31 21:19:29 +00:00
|
|
|
data = rv.data
|
2014-02-06 19:40:36 +00:00
|
|
|
parsed = py_json.loads(data)
|
2014-01-31 21:19:29 +00:00
|
|
|
return parsed
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
def putJsonResponse(self, resource_name, params={}, data={},
|
2014-02-06 19:40:36 +00:00
|
|
|
expected_code=200):
|
2014-03-25 19:17:02 +00:00
|
|
|
rv = self.app.put(self.url_for(resource_name, params),
|
2014-03-18 23:34:26 +00:00
|
|
|
data=py_json.dumps(data),
|
2014-02-06 19:40:36 +00:00
|
|
|
headers={"Content-Type": "application/json"})
|
2014-01-31 21:19:29 +00:00
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
if rv.status_code != expected_code:
|
2014-03-18 23:34:26 +00:00
|
|
|
print 'Mismatch data for resource PUT %s: %s' % (resource_name, rv.data)
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
self.assertEquals(rv.status_code, expected_code)
|
|
|
|
data = rv.data
|
2014-02-06 19:40:36 +00:00
|
|
|
parsed = py_json.loads(data)
|
2014-01-31 22:54:01 +00:00
|
|
|
return parsed
|
|
|
|
|
2014-09-11 19:45:41 +00:00
|
|
|
def assertInTeam(self, data, membername):
|
|
|
|
for memberData in data['members']:
|
|
|
|
if memberData['name'] == membername:
|
|
|
|
return
|
|
|
|
|
2014-10-03 19:05:34 +00:00
|
|
|
self.fail(membername + ' not found in team: ' + py_json.dumps(data))
|
2014-09-11 19:45:41 +00:00
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
def login(self, username, password='password'):
|
2014-03-18 23:34:26 +00:00
|
|
|
return self.postJsonResponse(Signin, data=dict(username=username, password=password))
|
2014-02-06 19:40:36 +00:00
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
|
2014-03-25 19:17:02 +00:00
|
|
|
class TestCSRFFailure(ApiTestCase):
|
|
|
|
def test_csrf_failure(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
|
|
|
|
|
|
|
# Make sure a simple post call succeeds.
|
|
|
|
self.putJsonResponse(User,
|
2014-11-24 21:07:38 +00:00
|
|
|
data=dict(password='newpasswordiscool'))
|
2014-03-25 19:17:02 +00:00
|
|
|
|
|
|
|
# Change the session's CSRF token.
|
|
|
|
self.setCsrfToken('someinvalidtoken')
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-25 19:17:02 +00:00
|
|
|
# Verify that the call now fails.
|
|
|
|
self.putJsonResponse(User,
|
|
|
|
data=dict(password='newpasswordiscool'),
|
|
|
|
expected_code=403)
|
2014-02-06 19:40:36 +00:00
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
|
2014-01-31 21:19:29 +00:00
|
|
|
class TestDiscovery(ApiTestCase):
|
|
|
|
def test_discovery(self):
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(DiscoveryResource)
|
2014-03-19 00:32:37 +00:00
|
|
|
assert 'apis' in json
|
2014-01-31 21:19:29 +00:00
|
|
|
|
2014-02-06 19:40:36 +00:00
|
|
|
|
2014-01-31 21:19:29 +00:00
|
|
|
class TestPlans(ApiTestCase):
|
|
|
|
def test_plans(self):
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(ListPlans)
|
2014-01-31 21:19:29 +00:00
|
|
|
found = set([])
|
|
|
|
for method_info in json['plans']:
|
|
|
|
found.add(method_info['stripeId'])
|
|
|
|
|
|
|
|
assert 'free' in found
|
|
|
|
|
2014-02-06 19:40:36 +00:00
|
|
|
|
2014-01-31 21:19:29 +00:00
|
|
|
class TestLoggedInUser(ApiTestCase):
|
|
|
|
def test_guest(self):
|
2014-03-19 00:32:37 +00:00
|
|
|
self.getJsonResponse(User, expected_code=401)
|
2014-01-31 21:19:29 +00:00
|
|
|
|
|
|
|
def test_user(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(User)
|
2014-01-31 21:19:29 +00:00
|
|
|
assert json['anonymous'] == False
|
|
|
|
assert json['username'] == READ_ACCESS_USER
|
|
|
|
|
2015-02-24 22:50:54 +00:00
|
|
|
|
2015-02-20 20:11:41 +00:00
|
|
|
class TestUserStarredRepositoryList(ApiTestCase):
|
|
|
|
def test_get_stars_guest(self):
|
|
|
|
self.getJsonResponse(StarredRepositoryList, expected_code=401)
|
|
|
|
|
|
|
|
def test_get_stars_user(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
|
|
|
self.getJsonResponse(StarredRepositoryList, expected_code=200)
|
|
|
|
|
|
|
|
def test_star_repo_guest(self):
|
|
|
|
self.postJsonResponse(StarredRepositoryList,
|
|
|
|
data={
|
|
|
|
'namespace': 'public',
|
|
|
|
'repository': 'publicrepo',
|
|
|
|
},
|
|
|
|
expected_code=401)
|
|
|
|
|
|
|
|
def test_star_and_unstar_repo_user(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
|
|
|
json = self.getJsonResponse(StarredRepositoryList)
|
|
|
|
assert json['repositories'] == []
|
|
|
|
|
|
|
|
json = self.postJsonResponse(StarredRepositoryList,
|
|
|
|
data={
|
|
|
|
'namespace': 'public',
|
|
|
|
'repository': 'publicrepo',
|
|
|
|
},
|
|
|
|
expected_code=201)
|
|
|
|
assert json['namespace'] == 'public'
|
|
|
|
assert json['repository'] == 'publicrepo'
|
|
|
|
|
2015-02-24 22:50:54 +00:00
|
|
|
self.deleteResponse(StarredRepository, params=dict(repository='public/publicrepo'),
|
|
|
|
expected_code=204)
|
2015-02-20 20:11:41 +00:00
|
|
|
|
2015-02-24 22:50:54 +00:00
|
|
|
json = self.getJsonResponse(StarredRepositoryList)
|
|
|
|
assert json['repositories'] == []
|
2015-02-20 20:11:41 +00:00
|
|
|
|
2014-02-06 19:40:36 +00:00
|
|
|
|
2014-07-28 22:23:46 +00:00
|
|
|
class TestUserNotification(ApiTestCase):
|
|
|
|
def test_get(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
json = self.getJsonResponse(UserNotificationList)
|
|
|
|
|
|
|
|
# Make sure each notification can be retrieved.
|
|
|
|
for notification in json['notifications']:
|
|
|
|
njson = self.getJsonResponse(UserNotification, params=dict(uuid=notification['id']))
|
|
|
|
self.assertEquals(notification['id'], njson['id'])
|
|
|
|
|
|
|
|
# Update a notification.
|
|
|
|
assert json['notifications']
|
|
|
|
assert not json['notifications'][0]['dismissed']
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-07-28 22:23:46 +00:00
|
|
|
pjson = self.putJsonResponse(UserNotification, params=dict(uuid=notification['id']),
|
|
|
|
data=dict(dismissed=True))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-07-28 22:23:46 +00:00
|
|
|
self.assertEquals(True, pjson['dismissed'])
|
|
|
|
|
|
|
|
|
2014-03-06 23:36:52 +00:00
|
|
|
class TestGetUserPrivateAllowed(ApiTestCase):
|
2014-01-31 21:19:29 +00:00
|
|
|
def test_nonallowed(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(PrivateRepositories)
|
2014-01-31 21:19:29 +00:00
|
|
|
assert json['privateCount'] == 0
|
2014-03-06 23:36:52 +00:00
|
|
|
assert not json['privateAllowed']
|
2014-01-31 21:19:29 +00:00
|
|
|
|
|
|
|
def test_allowed(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(PrivateRepositories)
|
2014-07-15 19:13:58 +00:00
|
|
|
assert json['privateCount'] >= 6
|
2014-03-06 23:36:52 +00:00
|
|
|
assert json['privateAllowed']
|
2014-01-31 21:19:29 +00:00
|
|
|
|
2014-02-06 19:40:36 +00:00
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
class TestConvertToOrganization(ApiTestCase):
|
|
|
|
def test_sameadminuser(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(ConvertToOrganization,
|
2014-02-06 19:40:36 +00:00
|
|
|
data={'adminUser': READ_ACCESS_USER,
|
2014-03-19 00:32:37 +00:00
|
|
|
'adminPassword': 'password',
|
|
|
|
'plan': 'free'},
|
2014-01-31 22:54:01 +00:00
|
|
|
expected_code=400)
|
|
|
|
|
|
|
|
self.assertEqual('The admin user is not valid', json['message'])
|
|
|
|
|
|
|
|
def test_invalidadminuser(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(ConvertToOrganization,
|
2014-02-06 19:40:36 +00:00
|
|
|
data={'adminUser': 'unknownuser',
|
2014-03-19 00:32:37 +00:00
|
|
|
'adminPassword': 'password',
|
|
|
|
'plan': 'free'},
|
2014-01-31 22:54:01 +00:00
|
|
|
expected_code=400)
|
|
|
|
|
2014-02-06 19:40:36 +00:00
|
|
|
self.assertEqual('The admin user credentials are not valid',
|
|
|
|
json['message'])
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
def test_invalidadminpassword(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(ConvertToOrganization,
|
2014-02-06 19:40:36 +00:00
|
|
|
data={'adminUser': ADMIN_ACCESS_USER,
|
2014-03-19 00:32:37 +00:00
|
|
|
'adminPassword': 'invalidpass',
|
|
|
|
'plan': 'free'},
|
2014-01-31 22:54:01 +00:00
|
|
|
expected_code=400)
|
|
|
|
|
2014-02-06 19:40:36 +00:00
|
|
|
self.assertEqual('The admin user credentials are not valid',
|
|
|
|
json['message'])
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
def test_convert(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(ConvertToOrganization,
|
2014-01-31 22:54:01 +00:00
|
|
|
data={'adminUser': ADMIN_ACCESS_USER,
|
|
|
|
'adminPassword': 'password',
|
|
|
|
'plan': 'free'})
|
|
|
|
|
|
|
|
self.assertEqual(True, json['success'])
|
|
|
|
|
|
|
|
# Verify the organization exists.
|
|
|
|
organization = model.get_organization(READ_ACCESS_USER)
|
|
|
|
assert organization is not None
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-01-31 23:54:31 +00:00
|
|
|
# Verify the admin user is the org's admin.
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Organization,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname=READ_ACCESS_USER))
|
2014-01-31 23:54:31 +00:00
|
|
|
|
|
|
|
self.assertEquals(READ_ACCESS_USER, json['name'])
|
|
|
|
self.assertEquals(True, json['is_admin'])
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
|
2014-07-08 22:19:13 +00:00
|
|
|
def test_convert_via_email(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
|
|
|
json = self.postJsonResponse(ConvertToOrganization,
|
|
|
|
data={'adminUser': ADMIN_ACCESS_EMAIL,
|
|
|
|
'adminPassword': 'password',
|
|
|
|
'plan': 'free'})
|
|
|
|
|
|
|
|
self.assertEqual(True, json['success'])
|
|
|
|
|
|
|
|
# Verify the organization exists.
|
|
|
|
organization = model.get_organization(READ_ACCESS_USER)
|
|
|
|
assert organization is not None
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-07-08 22:19:13 +00:00
|
|
|
# Verify the admin user is the org's admin.
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
json = self.getJsonResponse(Organization,
|
|
|
|
params=dict(orgname=READ_ACCESS_USER))
|
|
|
|
|
|
|
|
self.assertEquals(READ_ACCESS_USER, json['name'])
|
|
|
|
self.assertEquals(True, json['is_admin'])
|
|
|
|
|
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
class TestChangeUserDetails(ApiTestCase):
|
|
|
|
def test_changepassword(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
self.putJsonResponse(User,
|
2014-02-06 19:40:36 +00:00
|
|
|
data=dict(password='newpasswordiscool'))
|
2014-01-31 22:54:01 +00:00
|
|
|
self.login(READ_ACCESS_USER, password='newpasswordiscool')
|
2014-09-03 19:41:25 +00:00
|
|
|
|
2014-09-18 21:36:26 +00:00
|
|
|
def test_changepassword_unicode(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
|
|
|
self.putJsonResponse(User,
|
2014-09-22 22:49:52 +00:00
|
|
|
data=dict(password=u'someunicode北京市pass'))
|
|
|
|
self.login(READ_ACCESS_USER, password=u'someunicode北京市pass')
|
2014-09-18 21:36:26 +00:00
|
|
|
|
2014-09-03 19:41:25 +00:00
|
|
|
def test_changeeemail(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
|
|
|
|
|
|
|
self.putJsonResponse(User,
|
2014-09-04 18:24:20 +00:00
|
|
|
data=dict(email='test+foo@devtable.com'))
|
2014-09-03 19:41:25 +00:00
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
def test_changeinvoiceemail(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.putJsonResponse(User,
|
2014-02-06 19:40:36 +00:00
|
|
|
data=dict(invoice_email=True))
|
2014-01-31 22:54:01 +00:00
|
|
|
self.assertEquals(True, json['invoice_email'])
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.putJsonResponse(User,
|
2014-02-06 19:40:36 +00:00
|
|
|
data=dict(invoice_email=False))
|
2014-01-31 22:54:01 +00:00
|
|
|
self.assertEquals(False, json['invoice_email'])
|
|
|
|
|
|
|
|
|
|
|
|
class TestCreateNewUser(ApiTestCase):
|
|
|
|
def test_existingusername(self):
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(User,
|
2014-01-31 22:54:01 +00:00
|
|
|
data=dict(username=READ_ACCESS_USER,
|
|
|
|
password='password',
|
|
|
|
email='test@example.com'),
|
|
|
|
expected_code=400)
|
|
|
|
|
|
|
|
self.assertEquals('The username already exists', json['message'])
|
2014-04-08 00:37:02 +00:00
|
|
|
|
|
|
|
def test_trycreatetooshort(self):
|
|
|
|
json = self.postJsonResponse(User,
|
|
|
|
data=dict(username='a',
|
|
|
|
password='password',
|
|
|
|
email='test@example.com'),
|
|
|
|
expected_code=400)
|
|
|
|
|
|
|
|
self.assertEquals('Invalid username a: Username must be between 4 and 30 characters in length', json['error_description'])
|
|
|
|
|
|
|
|
def test_trycreateregexmismatch(self):
|
|
|
|
json = self.postJsonResponse(User,
|
|
|
|
data=dict(username='auserName',
|
|
|
|
password='password',
|
|
|
|
email='test@example.com'),
|
|
|
|
expected_code=400)
|
|
|
|
|
|
|
|
self.assertEquals('Invalid username auserName: Username must match expression [a-z0-9_]+', json['error_description'])
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
def test_createuser(self):
|
2014-09-23 15:33:52 +00:00
|
|
|
data = self.postJsonResponse(User,
|
2014-01-31 22:54:01 +00:00
|
|
|
data=NEW_USER_DETAILS,
|
2014-09-23 15:33:52 +00:00
|
|
|
expected_code=200)
|
|
|
|
self.assertEquals(True, data['awaiting_verification'])
|
2014-01-31 22:54:01 +00:00
|
|
|
|
2014-09-11 19:45:41 +00:00
|
|
|
def test_createuser_withteaminvite(self):
|
|
|
|
inviter = model.get_user(ADMIN_ACCESS_USER)
|
|
|
|
team = model.get_organization_team(ORGANIZATION, 'owners')
|
|
|
|
invite = model.add_or_invite_to_team(inviter, team, None, 'foo@example.com')
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-09-11 19:45:41 +00:00
|
|
|
details = {
|
2014-10-03 19:05:34 +00:00
|
|
|
'invite_code': invite.invite_token
|
2014-09-11 19:45:41 +00:00
|
|
|
}
|
|
|
|
details.update(NEW_USER_DETAILS);
|
|
|
|
|
2014-09-23 15:33:52 +00:00
|
|
|
data = self.postJsonResponse(User, data=details, expected_code=200)
|
|
|
|
self.assertEquals(True, data['awaiting_verification'])
|
2014-09-11 19:45:41 +00:00
|
|
|
|
|
|
|
# Make sure the user was added to the team.
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
json = self.getJsonResponse(TeamMemberList,
|
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
teamname='owners'))
|
|
|
|
self.assertInTeam(json, NEW_USER_DETAILS['username'])
|
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
class TestSignout(ApiTestCase):
|
|
|
|
def test_signout(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(User)
|
2014-01-31 22:54:01 +00:00
|
|
|
assert json['username'] == READ_ACCESS_USER
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
self.postResponse(Signout)
|
2014-01-31 22:54:01 +00:00
|
|
|
|
2014-03-19 00:32:37 +00:00
|
|
|
# Make sure we're now signed out.
|
|
|
|
self.getJsonResponse(User, expected_code=401)
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestGetMatchingEntities(ApiTestCase):
|
|
|
|
def test_notinorg(self):
|
|
|
|
self.login(NO_ACCESS_USER)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(EntitySearch,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(prefix='o', namespace=ORGANIZATION,
|
2014-02-17 22:28:20 +00:00
|
|
|
includeTeams='true'))
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
names = set([r['name'] for r in json['results']])
|
|
|
|
assert 'outsideorg' in names
|
|
|
|
assert not 'owners' in names
|
|
|
|
|
|
|
|
def test_inorg(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(EntitySearch,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(prefix='o', namespace=ORGANIZATION,
|
2014-02-17 22:28:20 +00:00
|
|
|
includeTeams='true'))
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
names = set([r['name'] for r in json['results']])
|
|
|
|
assert 'outsideorg' in names
|
|
|
|
assert 'owners' in names
|
|
|
|
|
2014-07-22 17:47:35 +00:00
|
|
|
def test_inorg_withorgs(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-07-22 17:47:35 +00:00
|
|
|
json = self.getJsonResponse(EntitySearch,
|
|
|
|
params=dict(prefix=ORGANIZATION[0], namespace=ORGANIZATION,
|
|
|
|
includeOrgs='true'))
|
|
|
|
|
|
|
|
names = set([r['name'] for r in json['results']])
|
|
|
|
assert ORGANIZATION in names
|
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
class TestCreateOrganization(ApiTestCase):
|
|
|
|
def test_existinguser(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(OrganizationList,
|
2014-03-19 00:32:37 +00:00
|
|
|
data=dict(name=ADMIN_ACCESS_USER, email='testorg@example.com'),
|
2014-01-31 22:54:01 +00:00
|
|
|
expected_code=400)
|
|
|
|
|
2014-02-06 19:40:36 +00:00
|
|
|
self.assertEquals('A user or organization with this name already exists',
|
|
|
|
json['message'])
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
def test_existingorg(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(OrganizationList,
|
2014-03-19 00:32:37 +00:00
|
|
|
data=dict(name=ORGANIZATION, email='testorg@example.com'),
|
2014-01-31 22:54:01 +00:00
|
|
|
expected_code=400)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-02-06 19:40:36 +00:00
|
|
|
self.assertEquals('A user or organization with this name already exists',
|
|
|
|
json['message'])
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
def test_createorg(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
data = self.postResponse(OrganizationList,
|
2014-02-06 19:40:36 +00:00
|
|
|
data=dict(name='neworg',
|
2014-03-19 00:32:37 +00:00
|
|
|
email='testorg@example.com'),
|
2014-01-31 22:54:01 +00:00
|
|
|
expected_code=201)
|
|
|
|
|
2014-03-19 00:32:37 +00:00
|
|
|
self.assertEquals('"Created"', data)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
# Ensure the org was created.
|
|
|
|
organization = model.get_organization('neworg')
|
|
|
|
assert organization is not None
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-01-31 23:54:31 +00:00
|
|
|
# Verify the admin user is the org's admin.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Organization,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname='neworg'))
|
2014-01-31 23:54:31 +00:00
|
|
|
self.assertEquals('neworg', json['name'])
|
|
|
|
self.assertEquals(True, json['is_admin'])
|
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
class TestGetOrganization(ApiTestCase):
|
|
|
|
def test_unknownorg(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
self.getResponse(Organization, params=dict(orgname='notvalid'),
|
2014-01-31 22:54:01 +00:00
|
|
|
expected_code=403)
|
|
|
|
|
|
|
|
def test_cannotaccess(self):
|
|
|
|
self.login(NO_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
self.getResponse(Organization, params=dict(orgname=ORGANIZATION),
|
2014-01-31 22:54:01 +00:00
|
|
|
expected_code=403)
|
|
|
|
|
|
|
|
def test_getorganization(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Organization,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
self.assertEquals(ORGANIZATION, json['name'])
|
|
|
|
self.assertEquals(False, json['is_admin'])
|
|
|
|
|
|
|
|
def test_getorganization_asadmin(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Organization,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))
|
2014-01-31 22:54:01 +00:00
|
|
|
|
|
|
|
self.assertEquals(ORGANIZATION, json['name'])
|
|
|
|
self.assertEquals(True, json['is_admin'])
|
|
|
|
|
2014-01-31 23:54:31 +00:00
|
|
|
|
2014-01-31 22:54:01 +00:00
|
|
|
class TestChangeOrganizationDetails(ApiTestCase):
|
|
|
|
def test_changeinvoiceemail(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.putJsonResponse(Organization,
|
2014-01-31 22:54:01 +00:00
|
|
|
params=dict(orgname=ORGANIZATION),
|
|
|
|
data=dict(invoice_email=True))
|
|
|
|
|
|
|
|
self.assertEquals(True, json['invoice_email'])
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.putJsonResponse(Organization,
|
2014-01-31 22:54:01 +00:00
|
|
|
params=dict(orgname=ORGANIZATION),
|
|
|
|
data=dict(invoice_email=False))
|
|
|
|
self.assertEquals(False, json['invoice_email'])
|
|
|
|
|
|
|
|
|
|
|
|
def test_changemail(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.putJsonResponse(Organization,
|
2014-01-31 22:54:01 +00:00
|
|
|
params=dict(orgname=ORGANIZATION),
|
|
|
|
data=dict(email='newemail@example.com'))
|
|
|
|
|
|
|
|
self.assertEquals('newemail@example.com', json['email'])
|
|
|
|
|
|
|
|
|
2014-01-31 23:54:31 +00:00
|
|
|
class TestGetOrganizationPrototypes(ApiTestCase):
|
|
|
|
def test_getprototypes(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(PermissionPrototypeList,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))
|
|
|
|
|
|
|
|
assert len(json['prototypes']) > 0
|
|
|
|
|
|
|
|
|
|
|
|
class TestCreateOrganizationPrototypes(ApiTestCase):
|
|
|
|
def test_invaliduser(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(PermissionPrototypeList,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION),
|
|
|
|
data=dict(activating_user={'name': 'unknownuser'},
|
|
|
|
role='read',
|
|
|
|
delegate={'kind': 'team', 'name': 'owners'}),
|
|
|
|
expected_code=400)
|
|
|
|
|
|
|
|
self.assertEquals('Unknown activating user', json['message'])
|
|
|
|
|
|
|
|
|
|
|
|
def test_missingdelegate(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-19 00:32:37 +00:00
|
|
|
self.postJsonResponse(PermissionPrototypeList,
|
|
|
|
params=dict(orgname=ORGANIZATION),
|
|
|
|
data=dict(role='read'),
|
|
|
|
expected_code=400)
|
2014-01-31 23:54:31 +00:00
|
|
|
|
|
|
|
|
|
|
|
def test_createprototype(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(PermissionPrototypeList,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION),
|
2014-02-06 19:40:36 +00:00
|
|
|
data=dict(role='read',
|
|
|
|
delegate={'kind': 'team',
|
|
|
|
'name': 'readers'}))
|
2014-01-31 23:54:31 +00:00
|
|
|
|
|
|
|
self.assertEquals('read', json['role'])
|
|
|
|
pid = json['id']
|
|
|
|
|
|
|
|
# Verify the prototype exists.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(PermissionPrototypeList,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))
|
|
|
|
|
|
|
|
ids = set([p['id'] for p in json['prototypes']])
|
|
|
|
assert pid in ids
|
|
|
|
|
|
|
|
|
|
|
|
class TestDeleteOrganizationPrototypes(ApiTestCase):
|
|
|
|
def test_deleteprototype(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Get the existing prototypes
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(PermissionPrototypeList,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))
|
|
|
|
|
|
|
|
ids = [p['id'] for p in json['prototypes']]
|
|
|
|
pid = ids[0]
|
|
|
|
|
|
|
|
# Delete a prototype.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(PermissionPrototype,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION, prototypeid=pid))
|
|
|
|
|
|
|
|
# Verify the prototype no longer exists.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(PermissionPrototypeList,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))
|
|
|
|
|
|
|
|
newids = [p['id'] for p in json['prototypes']]
|
|
|
|
assert not pid in newids
|
|
|
|
|
|
|
|
|
|
|
|
class TestUpdateOrganizationPrototypes(ApiTestCase):
|
|
|
|
def test_updateprototype(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Get the existing prototypes
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(PermissionPrototypeList,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))
|
|
|
|
|
|
|
|
ids = [p['id'] for p in json['prototypes']]
|
|
|
|
pid = ids[0]
|
|
|
|
|
|
|
|
# Update a prototype.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.putJsonResponse(PermissionPrototype,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
prototypeid=pid), data=dict(role='admin'))
|
2014-01-31 23:54:31 +00:00
|
|
|
|
|
|
|
self.assertEquals('admin', json['role'])
|
|
|
|
|
|
|
|
|
|
|
|
class TestGetOrganiaztionMembers(ApiTestCase):
|
|
|
|
def test_getmembers(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(OrgnaizationMemberList,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))
|
|
|
|
|
|
|
|
assert ADMIN_ACCESS_USER in json['members']
|
|
|
|
assert READ_ACCESS_USER in json['members']
|
|
|
|
assert not NO_ACCESS_USER in json['members']
|
|
|
|
|
|
|
|
def test_getspecificmember(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(OrganizationMember,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
membername=ADMIN_ACCESS_USER))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-01-31 23:54:31 +00:00
|
|
|
self.assertEquals(ADMIN_ACCESS_USER, json['member']['name'])
|
|
|
|
self.assertEquals('user', json['member']['kind'])
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-01-31 23:54:31 +00:00
|
|
|
assert 'owners' in json['member']['teams']
|
|
|
|
|
|
|
|
|
|
|
|
class TestGetOrganizationPrivateAllowed(ApiTestCase):
|
|
|
|
def test_existingorg(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(OrgPrivateRepositories,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))
|
|
|
|
|
|
|
|
self.assertEquals(True, json['privateAllowed'])
|
|
|
|
assert not 'reposAllowed' in json
|
|
|
|
|
|
|
|
|
|
|
|
def test_neworg(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
data = self.postResponse(OrganizationList,
|
2014-02-06 19:40:36 +00:00
|
|
|
data=dict(name='neworg',
|
|
|
|
email='test@example.com'),
|
2014-01-31 23:54:31 +00:00
|
|
|
expected_code=201)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(OrgPrivateRepositories,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname='neworg'))
|
|
|
|
|
|
|
|
self.assertEquals(False, json['privateAllowed'])
|
|
|
|
|
|
|
|
|
|
|
|
class TestUpdateOrganizationTeam(ApiTestCase):
|
|
|
|
def test_updateexisting(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-19 00:32:37 +00:00
|
|
|
data = self.putJsonResponse(OrganizationTeam,
|
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
teamname='readers'),
|
|
|
|
data=dict(description='My cool team',
|
|
|
|
role='creator'))
|
2014-01-31 23:54:31 +00:00
|
|
|
|
|
|
|
self.assertEquals('My cool team', data['description'])
|
|
|
|
self.assertEquals('creator', data['role'])
|
|
|
|
|
|
|
|
def test_attemptchangeroleonowners(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-19 00:32:37 +00:00
|
|
|
self.putJsonResponse(OrganizationTeam,
|
|
|
|
params=dict(orgname=ORGANIZATION, teamname='owners'),
|
2015-02-20 20:11:41 +00:00
|
|
|
data=dict(role='creator'),
|
2014-03-19 00:32:37 +00:00
|
|
|
expected_code=400)
|
2014-01-31 23:54:31 +00:00
|
|
|
|
|
|
|
def test_createnewteam(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
data = self.putJsonResponse(OrganizationTeam,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
teamname='newteam'),
|
|
|
|
data=dict(description='My cool team',
|
2014-03-19 00:32:37 +00:00
|
|
|
role='member'))
|
2014-01-31 23:54:31 +00:00
|
|
|
|
|
|
|
self.assertEquals('My cool team', data['description'])
|
|
|
|
self.assertEquals('member', data['role'])
|
|
|
|
|
|
|
|
# Verify the team was created.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Organization,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))
|
2014-01-31 23:54:31 +00:00
|
|
|
assert 'newteam' in json['teams']
|
|
|
|
|
|
|
|
|
|
|
|
class TestDeleteOrganizationTeam(ApiTestCase):
|
|
|
|
def test_deleteteam(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(OrganizationTeam,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION, teamname='readers'))
|
|
|
|
|
|
|
|
# Make sure the team was deleted
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Organization,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))
|
2014-01-31 23:54:31 +00:00
|
|
|
assert not 'readers' in json['teams']
|
|
|
|
|
|
|
|
def test_attemptdeleteowners(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(OrganizationTeam,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION, teamname='owners'),
|
|
|
|
expected_code=400)
|
|
|
|
|
|
|
|
|
|
|
|
class TestGetOrganizationTeamMembers(ApiTestCase):
|
|
|
|
def test_invalidteam(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
self.getResponse(TeamMemberList,
|
2014-01-31 23:54:31 +00:00
|
|
|
params=dict(orgname=ORGANIZATION, teamname='notvalid'),
|
|
|
|
expected_code=404)
|
|
|
|
|
|
|
|
def test_getmembers(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(TeamMemberList,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
teamname='readers'))
|
2014-01-31 23:54:31 +00:00
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
self.assertEquals(READ_ACCESS_USER, json['members'][1]['name'])
|
2014-01-31 23:54:31 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestUpdateOrganizationTeamMember(ApiTestCase):
|
2014-08-18 21:24:00 +00:00
|
|
|
def test_addmember_alreadyteammember(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
membername = READ_ACCESS_USER
|
|
|
|
self.putResponse(TeamMember,
|
|
|
|
params=dict(orgname=ORGANIZATION, teamname='readers',
|
|
|
|
membername=membername),
|
|
|
|
expected_code=400)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
|
|
|
|
def test_addmember_orgmember(self):
|
2014-01-31 23:54:31 +00:00
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
membername = READ_ACCESS_USER
|
|
|
|
self.putJsonResponse(TeamMember,
|
|
|
|
params=dict(orgname=ORGANIZATION, teamname='owners',
|
|
|
|
membername=membername))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
# Verify the user was added to the team.
|
|
|
|
json = self.getJsonResponse(TeamMemberList,
|
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
teamname='owners'))
|
|
|
|
|
|
|
|
self.assertInTeam(json, membername)
|
|
|
|
|
|
|
|
|
|
|
|
def test_addmember_robot(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
membername = ORGANIZATION + '+coolrobot'
|
2014-03-19 00:32:37 +00:00
|
|
|
self.putJsonResponse(TeamMember,
|
|
|
|
params=dict(orgname=ORGANIZATION, teamname='readers',
|
2014-08-18 21:24:00 +00:00
|
|
|
membername=membername))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-01-31 23:54:31 +00:00
|
|
|
|
|
|
|
# Verify the user was added to the team.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(TeamMemberList,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
teamname='readers'))
|
2014-01-31 23:54:31 +00:00
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
self.assertInTeam(json, membername)
|
|
|
|
|
|
|
|
|
|
|
|
def test_addmember_invalidrobot(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
membername = 'freshuser+anotherrobot'
|
|
|
|
self.putResponse(TeamMember,
|
|
|
|
params=dict(orgname=ORGANIZATION, teamname='readers',
|
|
|
|
membername=membername),
|
|
|
|
expected_code=400)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
def test_addmember_nonorgmember(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
membername = NO_ACCESS_USER
|
|
|
|
response = self.putJsonResponse(TeamMember,
|
|
|
|
params=dict(orgname=ORGANIZATION, teamname='owners',
|
|
|
|
membername=membername))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
|
|
|
|
self.assertEquals(True, response['invited'])
|
|
|
|
|
|
|
|
# Make sure the user is not (yet) part of the team.
|
|
|
|
json = self.getJsonResponse(TeamMemberList,
|
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
teamname='readers'))
|
|
|
|
|
|
|
|
for member in json['members']:
|
|
|
|
self.assertNotEqual(membername, member['name'])
|
|
|
|
|
|
|
|
|
|
|
|
class TestAcceptTeamMemberInvite(ApiTestCase):
|
|
|
|
def assertInTeam(self, data, membername):
|
|
|
|
for memberData in data['members']:
|
|
|
|
if memberData['name'] == membername:
|
|
|
|
return
|
|
|
|
|
|
|
|
self.fail(membername + ' not found in team: ' + json.dumps(data))
|
|
|
|
|
|
|
|
def test_accept(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Create the invite.
|
|
|
|
membername = NO_ACCESS_USER
|
|
|
|
response = self.putJsonResponse(TeamMember,
|
|
|
|
params=dict(orgname=ORGANIZATION, teamname='owners',
|
|
|
|
membername=membername))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
self.assertEquals(True, response['invited'])
|
|
|
|
|
|
|
|
# Login as the user.
|
|
|
|
self.login(membername)
|
|
|
|
|
|
|
|
# Accept the invite.
|
|
|
|
user = model.get_user(membername)
|
|
|
|
invites = list(model.lookup_team_invites(user))
|
|
|
|
self.assertEquals(1, len(invites))
|
|
|
|
|
|
|
|
self.putJsonResponse(TeamMemberInvite,
|
|
|
|
params=dict(code=invites[0].invite_token))
|
|
|
|
|
|
|
|
# Verify the user is now on the team.
|
|
|
|
json = self.getJsonResponse(TeamMemberList,
|
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
teamname='owners'))
|
|
|
|
|
|
|
|
self.assertInTeam(json, membername)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
# Verify the accept now fails.
|
|
|
|
self.putResponse(TeamMemberInvite,
|
|
|
|
params=dict(code=invites[0].invite_token),
|
2014-09-12 18:29:01 +00:00
|
|
|
expected_code=400)
|
2014-08-18 21:24:00 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class TestDeclineTeamMemberInvite(ApiTestCase):
|
|
|
|
def test_decline_wronguser(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Create the invite.
|
|
|
|
membername = NO_ACCESS_USER
|
|
|
|
response = self.putJsonResponse(TeamMember,
|
|
|
|
params=dict(orgname=ORGANIZATION, teamname='owners',
|
|
|
|
membername=membername))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
self.assertEquals(True, response['invited'])
|
|
|
|
|
|
|
|
# Try to decline the invite.
|
|
|
|
user = model.get_user(membername)
|
|
|
|
invites = list(model.lookup_team_invites(user))
|
|
|
|
self.assertEquals(1, len(invites))
|
|
|
|
|
|
|
|
self.deleteResponse(TeamMemberInvite,
|
|
|
|
params=dict(code=invites[0].invite_token),
|
2014-09-12 18:29:01 +00:00
|
|
|
expected_code=400)
|
2014-08-18 21:24:00 +00:00
|
|
|
|
|
|
|
|
|
|
|
def test_decline(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Create the invite.
|
|
|
|
membername = NO_ACCESS_USER
|
|
|
|
response = self.putJsonResponse(TeamMember,
|
|
|
|
params=dict(orgname=ORGANIZATION, teamname='owners',
|
|
|
|
membername=membername))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
self.assertEquals(True, response['invited'])
|
|
|
|
|
|
|
|
# Login as the user.
|
|
|
|
self.login(membername)
|
|
|
|
|
|
|
|
# Decline the invite.
|
|
|
|
user = model.get_user(membername)
|
|
|
|
invites = list(model.lookup_team_invites(user))
|
|
|
|
self.assertEquals(1, len(invites))
|
|
|
|
|
|
|
|
self.deleteResponse(TeamMemberInvite,
|
|
|
|
params=dict(code=invites[0].invite_token))
|
|
|
|
|
|
|
|
# Make sure the invite was deleted.
|
|
|
|
self.deleteResponse(TeamMemberInvite,
|
|
|
|
params=dict(code=invites[0].invite_token),
|
2014-09-12 18:29:01 +00:00
|
|
|
expected_code=400)
|
2014-01-31 23:54:31 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestDeleteOrganizationTeamMember(ApiTestCase):
|
2014-09-08 21:20:01 +00:00
|
|
|
def test_deletememberinvite(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
membername = NO_ACCESS_USER
|
|
|
|
response = self.putJsonResponse(TeamMember,
|
|
|
|
params=dict(orgname=ORGANIZATION, teamname='readers',
|
|
|
|
membername=membername))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-09-08 21:20:01 +00:00
|
|
|
|
|
|
|
self.assertEquals(True, response['invited'])
|
|
|
|
|
|
|
|
# Verify the invite was added.
|
|
|
|
json = self.getJsonResponse(TeamMemberList,
|
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
teamname='readers',
|
|
|
|
includePending=True))
|
|
|
|
|
|
|
|
assert len(json['members']) == 3
|
|
|
|
|
|
|
|
# Delete the invite.
|
|
|
|
self.deleteResponse(TeamMember,
|
|
|
|
params=dict(orgname=ORGANIZATION, teamname='readers',
|
|
|
|
membername=membername))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-09-08 21:20:01 +00:00
|
|
|
|
|
|
|
# Verify the user was removed from the team.
|
|
|
|
json = self.getJsonResponse(TeamMemberList,
|
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
teamname='readers',
|
|
|
|
includePending=True))
|
|
|
|
|
|
|
|
assert len(json['members']) == 2
|
|
|
|
|
|
|
|
|
2014-01-31 23:54:31 +00:00
|
|
|
def test_deletemember(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(TeamMember,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname=ORGANIZATION, teamname='readers',
|
|
|
|
membername=READ_ACCESS_USER))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-01-31 23:54:31 +00:00
|
|
|
|
|
|
|
# Verify the user was removed from the team.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(TeamMemberList,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(orgname=ORGANIZATION,
|
|
|
|
teamname='readers'))
|
2014-01-31 23:54:31 +00:00
|
|
|
|
2014-08-18 21:24:00 +00:00
|
|
|
assert len(json['members']) == 1
|
2014-01-31 23:54:31 +00:00
|
|
|
|
|
|
|
|
2014-02-01 00:45:44 +00:00
|
|
|
class TestCreateRepo(ApiTestCase):
|
|
|
|
def test_duplicaterepo(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(RepositoryList,
|
2014-02-06 19:40:36 +00:00
|
|
|
data=dict(repository='simple',
|
2014-03-19 00:32:37 +00:00
|
|
|
visibility='public',
|
|
|
|
description=''),
|
2014-02-01 00:45:44 +00:00
|
|
|
expected_code=400)
|
|
|
|
|
|
|
|
self.assertEquals('Repository already exists', json['message'])
|
|
|
|
|
|
|
|
|
|
|
|
def test_createrepo(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(RepositoryList,
|
2014-02-06 19:40:36 +00:00
|
|
|
data=dict(repository='newrepo',
|
|
|
|
visibility='public',
|
2014-03-19 00:32:37 +00:00
|
|
|
description=''),
|
|
|
|
expected_code=201)
|
2014-02-01 00:45:44 +00:00
|
|
|
|
|
|
|
|
|
|
|
self.assertEquals(ADMIN_ACCESS_USER, json['namespace'])
|
|
|
|
self.assertEquals('newrepo', json['name'])
|
|
|
|
|
|
|
|
|
|
|
|
def test_createrepo_underorg(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(RepositoryList,
|
2014-11-24 21:07:38 +00:00
|
|
|
data=dict(namespace=ORGANIZATION,
|
2014-02-01 00:45:44 +00:00
|
|
|
repository='newrepo',
|
|
|
|
visibility='private',
|
2014-03-19 00:32:37 +00:00
|
|
|
description=''),
|
|
|
|
expected_code=201)
|
2014-02-01 00:45:44 +00:00
|
|
|
|
|
|
|
self.assertEquals(ORGANIZATION, json['namespace'])
|
|
|
|
self.assertEquals('newrepo', json['name'])
|
|
|
|
|
|
|
|
|
|
|
|
class TestFindRepos(ApiTestCase):
|
|
|
|
def test_findrepos_asguest(self):
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(FindRepositories, params=dict(query='p'))
|
2014-02-16 23:59:24 +00:00
|
|
|
self.assertEquals(len(json['repositories']), 1)
|
2014-02-01 00:45:44 +00:00
|
|
|
|
|
|
|
self.assertEquals(json['repositories'][0]['namespace'], 'public')
|
|
|
|
self.assertEquals(json['repositories'][0]['name'], 'publicrepo')
|
|
|
|
|
|
|
|
def test_findrepos_asuser(self):
|
|
|
|
self.login(NO_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(FindRepositories, params=dict(query='p'))
|
2014-02-16 23:59:24 +00:00
|
|
|
self.assertEquals(len(json['repositories']), 1)
|
2014-02-01 00:45:44 +00:00
|
|
|
|
|
|
|
self.assertEquals(json['repositories'][0]['namespace'], 'public')
|
|
|
|
self.assertEquals(json['repositories'][0]['name'], 'publicrepo')
|
|
|
|
|
|
|
|
def test_findrepos_orgmember(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(FindRepositories, params=dict(query='p'))
|
2014-02-16 23:59:24 +00:00
|
|
|
self.assertGreater(len(json['repositories']), 1)
|
2014-02-01 00:45:44 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestListRepos(ApiTestCase):
|
2014-02-19 00:15:14 +00:00
|
|
|
def test_listrepos_asguest(self):
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryList, params=dict(public=True))
|
2014-02-16 23:59:24 +00:00
|
|
|
self.assertEquals(len(json['repositories']), 1)
|
2014-02-01 00:45:44 +00:00
|
|
|
|
2014-02-19 00:15:14 +00:00
|
|
|
def test_listrepos_orgmember(self):
|
2014-02-01 00:45:44 +00:00
|
|
|
self.login(READ_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryList, params=dict(public=True))
|
2014-02-16 23:59:24 +00:00
|
|
|
self.assertGreater(len(json['repositories']), 1)
|
2014-02-01 00:45:44 +00:00
|
|
|
|
2014-02-19 00:15:14 +00:00
|
|
|
def test_listrepos_filter(self):
|
2014-02-01 00:45:44 +00:00
|
|
|
self.login(READ_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryList,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(namespace=ORGANIZATION,
|
|
|
|
public=False))
|
2014-02-01 00:45:44 +00:00
|
|
|
|
|
|
|
for repo in json['repositories']:
|
|
|
|
self.assertEquals(ORGANIZATION, repo['namespace'])
|
|
|
|
|
2014-02-19 00:15:14 +00:00
|
|
|
def test_listrepos_limit(self):
|
2014-02-01 00:45:44 +00:00
|
|
|
self.login(READ_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryList, params=dict(limit=2))
|
2014-02-01 00:45:44 +00:00
|
|
|
|
2014-02-16 23:59:24 +00:00
|
|
|
self.assertEquals(len(json['repositories']), 2)
|
2014-02-01 00:45:44 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestUpdateRepo(ApiTestCase):
|
2014-02-06 19:40:36 +00:00
|
|
|
SIMPLE_REPO = ADMIN_ACCESS_USER + '/simple'
|
|
|
|
def test_updatedescription(self):
|
2014-02-01 00:45:44 +00:00
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
self.putJsonResponse(Repository,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(repository=self.SIMPLE_REPO),
|
2014-02-01 00:45:44 +00:00
|
|
|
data=dict(description='Some cool repo'))
|
|
|
|
|
|
|
|
# Verify the repo description was updated.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Repository,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(repository=self.SIMPLE_REPO))
|
2014-02-01 00:45:44 +00:00
|
|
|
|
|
|
|
self.assertEquals('Some cool repo', json['description'])
|
|
|
|
|
|
|
|
|
|
|
|
class TestChangeRepoVisibility(ApiTestCase):
|
2014-02-06 19:40:36 +00:00
|
|
|
SIMPLE_REPO = ADMIN_ACCESS_USER + '/simple'
|
|
|
|
def test_changevisibility(self):
|
2014-02-01 00:45:44 +00:00
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Make public.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.postJsonResponse(RepositoryVisibility,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(repository=self.SIMPLE_REPO),
|
2014-02-01 00:45:44 +00:00
|
|
|
data=dict(visibility='public'))
|
|
|
|
|
|
|
|
# Verify the visibility.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Repository,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(repository=self.SIMPLE_REPO))
|
2014-02-01 00:45:44 +00:00
|
|
|
|
|
|
|
self.assertEquals(True, json['is_public'])
|
|
|
|
|
|
|
|
# Make private.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.postJsonResponse(RepositoryVisibility,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(repository=self.SIMPLE_REPO),
|
2014-02-01 00:45:44 +00:00
|
|
|
data=dict(visibility='private'))
|
|
|
|
|
|
|
|
# Verify the visibility.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Repository,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(repository=self.SIMPLE_REPO))
|
2014-02-01 00:45:44 +00:00
|
|
|
|
|
|
|
self.assertEquals(False, json['is_public'])
|
|
|
|
|
|
|
|
|
|
|
|
class TestDeleteRepository(ApiTestCase):
|
2014-02-06 19:40:36 +00:00
|
|
|
SIMPLE_REPO = ADMIN_ACCESS_USER + '/simple'
|
2014-11-11 04:05:20 +00:00
|
|
|
COMPLEX_REPO = ADMIN_ACCESS_USER + '/complex'
|
|
|
|
|
2014-02-06 19:40:36 +00:00
|
|
|
def test_deleterepo(self):
|
2014-02-01 00:45:44 +00:00
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(Repository,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(repository=self.SIMPLE_REPO))
|
2014-02-01 00:45:44 +00:00
|
|
|
|
|
|
|
# Verify the repo was deleted.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.getResponse(Repository,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(repository=self.SIMPLE_REPO),
|
2014-02-01 00:45:44 +00:00
|
|
|
expected_code=404)
|
|
|
|
|
2014-11-11 04:05:20 +00:00
|
|
|
def test_deleterepo2(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
self.deleteResponse(Repository,
|
|
|
|
params=dict(repository=self.COMPLEX_REPO))
|
|
|
|
|
|
|
|
# Verify the repo was deleted.
|
|
|
|
self.getResponse(Repository,
|
|
|
|
params=dict(repository=self.COMPLEX_REPO),
|
|
|
|
expected_code=404)
|
|
|
|
|
|
|
|
def test_populate_and_delete_repo(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Make sure the repository has come images and tags.
|
|
|
|
self.assertTrue(len(list(model.get_repository_images(ADMIN_ACCESS_USER, 'complex'))) > 0)
|
|
|
|
self.assertTrue(len(list(model.list_repository_tags(ADMIN_ACCESS_USER, 'complex'))) > 0)
|
|
|
|
|
|
|
|
# Add some data for the repository, in addition to is already existing images and tags.
|
|
|
|
repository = model.get_repository(ADMIN_ACCESS_USER, 'complex')
|
|
|
|
|
|
|
|
# Create some access tokens.
|
|
|
|
access_token = model.create_access_token(repository, 'read')
|
|
|
|
model.create_access_token(repository, 'write')
|
|
|
|
|
|
|
|
delegate_token = model.create_delegate_token(ADMIN_ACCESS_USER, 'complex', 'sometoken', 'read')
|
|
|
|
model.create_delegate_token(ADMIN_ACCESS_USER, 'complex', 'sometoken', 'write')
|
|
|
|
|
|
|
|
# Create some repository builds.
|
|
|
|
model.create_repository_build(repository, access_token, {}, 'someid', 'foobar')
|
|
|
|
model.create_repository_build(repository, delegate_token, {}, 'someid2', 'foobar2')
|
|
|
|
|
|
|
|
# Create some notifications.
|
|
|
|
model.create_repo_notification(repository, 'repo_push', 'hipchat', {})
|
|
|
|
model.create_repo_notification(repository, 'build_queued', 'slack', {})
|
|
|
|
|
|
|
|
# Create some logs.
|
|
|
|
model.log_action('push_repo', ADMIN_ACCESS_USER, repository=repository)
|
|
|
|
model.log_action('push_repo', ADMIN_ACCESS_USER, repository=repository)
|
|
|
|
|
|
|
|
# Create some build triggers.
|
|
|
|
user = model.get_user(ADMIN_ACCESS_USER)
|
|
|
|
model.create_build_trigger(repository, 'github', 'sometoken', user)
|
|
|
|
model.create_build_trigger(repository, 'github', 'anothertoken', user)
|
|
|
|
|
|
|
|
# Create some email authorizations.
|
|
|
|
model.create_email_authorization_for_repo(ADMIN_ACCESS_USER, 'complex', 'a@b.com')
|
|
|
|
model.create_email_authorization_for_repo(ADMIN_ACCESS_USER, 'complex', 'b@c.com')
|
|
|
|
|
|
|
|
# Delete the repository.
|
|
|
|
self.deleteResponse(Repository,
|
|
|
|
params=dict(repository=self.COMPLEX_REPO))
|
|
|
|
|
|
|
|
# Verify the repo was deleted.
|
|
|
|
self.getResponse(Repository,
|
|
|
|
params=dict(repository=self.COMPLEX_REPO),
|
|
|
|
expected_code=404)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-02-06 19:40:36 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
class TestGetRepository(ApiTestCase):
|
2014-02-06 19:40:36 +00:00
|
|
|
PUBLIC_REPO = PUBLIC_USER + '/publicrepo'
|
2014-03-11 17:38:44 +00:00
|
|
|
|
|
|
|
def test_getrepo_badnames(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-11 18:42:53 +00:00
|
|
|
bad_names = ['logs', 'build', 'tokens', 'foo.bar', 'foo-bar', 'foo_bar']
|
2014-03-11 17:38:44 +00:00
|
|
|
|
|
|
|
# For each bad name, create the repo.
|
|
|
|
for bad_name in bad_names:
|
2014-03-19 19:39:44 +00:00
|
|
|
json = self.postJsonResponse(RepositoryList, expected_code=201,
|
|
|
|
data=dict(repository=bad_name, visibility='public',
|
2014-03-11 17:38:44 +00:00
|
|
|
description=''))
|
|
|
|
|
|
|
|
# Make sure we can retrieve its information.
|
2014-03-19 19:39:44 +00:00
|
|
|
json = self.getJsonResponse(Repository,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/' + bad_name))
|
2014-03-11 17:38:44 +00:00
|
|
|
|
|
|
|
self.assertEquals(ADMIN_ACCESS_USER, json['namespace'])
|
|
|
|
self.assertEquals(bad_name, json['name'])
|
|
|
|
self.assertEquals(True, json['is_public'])
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-11 17:38:44 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
def test_getrepo_public_asguest(self):
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Repository,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(repository=self.PUBLIC_REPO))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
self.assertEquals(PUBLIC_USER, json['namespace'])
|
|
|
|
self.assertEquals('publicrepo', json['name'])
|
|
|
|
|
|
|
|
self.assertEquals(True, json['is_public'])
|
|
|
|
self.assertEquals(False, json['is_organization'])
|
|
|
|
self.assertEquals(False, json['is_building'])
|
|
|
|
|
|
|
|
self.assertEquals(False, json['can_write'])
|
|
|
|
self.assertEquals(False, json['can_admin'])
|
|
|
|
|
|
|
|
assert 'latest' in json['tags']
|
|
|
|
|
|
|
|
def test_getrepo_public_asowner(self):
|
|
|
|
self.login(PUBLIC_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Repository,
|
2014-02-06 19:40:36 +00:00
|
|
|
params=dict(repository=self.PUBLIC_REPO))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
self.assertEquals(False, json['is_organization'])
|
|
|
|
self.assertEquals(True, json['can_write'])
|
|
|
|
self.assertEquals(True, json['can_admin'])
|
|
|
|
|
|
|
|
def test_getrepo_building(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Repository,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/building'))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
self.assertEquals(True, json['can_write'])
|
|
|
|
self.assertEquals(True, json['can_admin'])
|
|
|
|
self.assertEquals(True, json['is_building'])
|
|
|
|
self.assertEquals(False, json['is_organization'])
|
|
|
|
|
|
|
|
def test_getrepo_org_asnonmember(self):
|
2014-03-18 23:34:26 +00:00
|
|
|
self.getResponse(Repository,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ORGANIZATION + '/' + ORG_REPO),
|
2014-03-19 17:57:36 +00:00
|
|
|
expected_code=401)
|
2014-02-03 23:18:33 +00:00
|
|
|
|
|
|
|
def test_getrepo_org_asreader(self):
|
|
|
|
self.login(READ_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Repository,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ORGANIZATION + '/' + ORG_REPO))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
self.assertEquals(ORGANIZATION, json['namespace'])
|
|
|
|
self.assertEquals(ORG_REPO, json['name'])
|
|
|
|
|
|
|
|
self.assertEquals(False, json['can_write'])
|
|
|
|
self.assertEquals(False, json['can_admin'])
|
|
|
|
|
|
|
|
self.assertEquals(True, json['is_organization'])
|
|
|
|
|
|
|
|
def test_getrepo_org_asadmin(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(Repository,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ORGANIZATION + '/' + ORG_REPO))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
self.assertEquals(True, json['can_write'])
|
|
|
|
self.assertEquals(True, json['can_admin'])
|
|
|
|
|
|
|
|
self.assertEquals(True, json['is_organization'])
|
|
|
|
|
|
|
|
|
2015-02-13 20:54:01 +00:00
|
|
|
class TestRepositoryBuildResource(ApiTestCase):
|
|
|
|
def test_cancel_invalidbuild(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
self.deleteResponse(RepositoryBuildResource,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', build_uuid='invalid'),
|
|
|
|
expected_code=404)
|
|
|
|
|
|
|
|
def test_cancel_waitingbuild(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Request a (fake) build.
|
|
|
|
json = self.postJsonResponse(RepositoryBuildList,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'),
|
|
|
|
data=dict(file_id='foobarbaz'),
|
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
uuid = json['id']
|
|
|
|
|
|
|
|
# Check for the build.
|
|
|
|
json = self.getJsonResponse(RepositoryBuildList,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
|
|
|
|
|
|
|
|
self.assertEquals(1, len(json['builds']))
|
|
|
|
self.assertEquals(uuid, json['builds'][0]['id'])
|
|
|
|
|
2015-02-23 18:38:01 +00:00
|
|
|
# Find the build's queue item.
|
|
|
|
build_ref = database.RepositoryBuild.get(uuid=uuid)
|
|
|
|
queue_item = database.QueueItem.get(id=build_ref.queue_id)
|
|
|
|
|
|
|
|
self.assertTrue(queue_item.available)
|
|
|
|
self.assertTrue(queue_item.retries_remaining > 0)
|
|
|
|
|
2015-02-13 20:54:01 +00:00
|
|
|
# Cancel the build.
|
|
|
|
self.deleteResponse(RepositoryBuildResource,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', build_uuid=uuid),
|
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
# Check for the build.
|
|
|
|
json = self.getJsonResponse(RepositoryBuildList,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
|
|
|
|
|
|
|
|
self.assertEquals(0, len(json['builds']))
|
|
|
|
|
2015-02-23 18:38:01 +00:00
|
|
|
# Check for the build's queue item.
|
|
|
|
try:
|
|
|
|
database.QueueItem.get(id=build_ref.queue_id)
|
|
|
|
self.fail('QueueItem still exists for build')
|
|
|
|
except database.QueueItem.DoesNotExist:
|
|
|
|
pass
|
2015-02-13 20:54:01 +00:00
|
|
|
|
|
|
|
def test_attemptcancel_scheduledbuild(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Request a (fake) build.
|
|
|
|
json = self.postJsonResponse(RepositoryBuildList,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'),
|
|
|
|
data=dict(file_id='foobarbaz'),
|
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
uuid = json['id']
|
|
|
|
|
|
|
|
# Check for the build.
|
|
|
|
json = self.getJsonResponse(RepositoryBuildList,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
|
|
|
|
|
|
|
|
self.assertEquals(1, len(json['builds']))
|
|
|
|
self.assertEquals(uuid, json['builds'][0]['id'])
|
|
|
|
|
|
|
|
# Set queue item to be picked up.
|
2015-02-23 18:47:21 +00:00
|
|
|
build_ref = database.RepositoryBuild.get(uuid=uuid)
|
|
|
|
qi = database.QueueItem.get(id=build_ref.queue_id)
|
2015-02-13 20:54:01 +00:00
|
|
|
qi.available = False
|
|
|
|
qi.save()
|
|
|
|
|
|
|
|
# Try to cancel the build.
|
|
|
|
self.deleteResponse(RepositoryBuildResource,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', build_uuid=uuid),
|
|
|
|
expected_code=400)
|
|
|
|
|
|
|
|
|
|
|
|
def test_attemptcancel_workingbuild(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Request a (fake) build.
|
|
|
|
json = self.postJsonResponse(RepositoryBuildList,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'),
|
|
|
|
data=dict(file_id='foobarbaz'),
|
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
uuid = json['id']
|
|
|
|
|
|
|
|
# Check for the build.
|
|
|
|
json = self.getJsonResponse(RepositoryBuildList,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
|
|
|
|
|
|
|
|
self.assertEquals(1, len(json['builds']))
|
|
|
|
self.assertEquals(uuid, json['builds'][0]['id'])
|
|
|
|
|
|
|
|
# Set the build to a different phase.
|
|
|
|
rb = database.RepositoryBuild.get(uuid=uuid)
|
|
|
|
rb.phase = database.BUILD_PHASE.BUILDING
|
|
|
|
rb.save()
|
|
|
|
|
|
|
|
# Try to cancel the build.
|
|
|
|
self.deleteResponse(RepositoryBuildResource,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', build_uuid=uuid),
|
|
|
|
expected_code=400)
|
|
|
|
|
|
|
|
|
2014-02-26 20:19:07 +00:00
|
|
|
class TestRepoBuilds(ApiTestCase):
|
2014-02-03 23:18:33 +00:00
|
|
|
def test_getrepo_nobuilds(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryBuildList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
assert len(json['builds']) == 0
|
|
|
|
|
|
|
|
def test_getrepobuilds(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryBuildList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/building'))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
assert len(json['builds']) > 0
|
2014-05-20 22:53:00 +00:00
|
|
|
build = json['builds'][-1]
|
2014-02-03 23:18:33 +00:00
|
|
|
|
|
|
|
assert 'id' in build
|
|
|
|
assert 'status' in build
|
|
|
|
|
2014-02-26 20:19:07 +00:00
|
|
|
# Check the status endpoint.
|
2014-03-18 23:34:26 +00:00
|
|
|
status_json = self.getJsonResponse(RepositoryBuildStatus,
|
2014-02-26 20:19:07 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/building', build_uuid=build['id']))
|
2014-02-03 23:18:33 +00:00
|
|
|
|
2014-11-13 17:51:37 +00:00
|
|
|
self.assertEquals(status_json['id'], build['id'])
|
|
|
|
self.assertEquals(status_json['resource_key'], build['resource_key'])
|
|
|
|
self.assertEquals(status_json['trigger'], build['trigger'])
|
2014-02-26 20:19:07 +00:00
|
|
|
|
2014-02-25 23:22:02 +00:00
|
|
|
class TestRequestRepoBuild(ApiTestCase):
|
2014-02-03 23:18:33 +00:00
|
|
|
def test_requestrepobuild(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-04-02 01:49:06 +00:00
|
|
|
# Ensure we are not yet building.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryBuildList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
assert len(json['builds']) == 0
|
|
|
|
|
|
|
|
# Request a (fake) build.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.postResponse(RepositoryBuildList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'),
|
2014-02-25 23:22:02 +00:00
|
|
|
data=dict(file_id='foobarbaz'),
|
2014-02-03 23:18:33 +00:00
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
# Check for the build.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryBuildList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/building'))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
assert len(json['builds']) > 0
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-04-02 01:49:06 +00:00
|
|
|
def test_requestrepobuild_with_robot(self):
|
2014-03-27 22:33:13 +00:00
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-04-02 01:49:06 +00:00
|
|
|
# Ensure we are not yet building.
|
2014-03-27 22:33:13 +00:00
|
|
|
json = self.getJsonResponse(RepositoryBuildList,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-27 22:33:13 +00:00
|
|
|
assert len(json['builds']) == 0
|
|
|
|
|
|
|
|
# Request a (fake) build.
|
2014-04-02 01:49:06 +00:00
|
|
|
pull_robot = ADMIN_ACCESS_USER + '+dtrobot'
|
2014-03-27 22:33:13 +00:00
|
|
|
self.postResponse(RepositoryBuildList,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'),
|
2014-04-02 01:49:06 +00:00
|
|
|
data=dict(file_id='foobarbaz', pull_robot=pull_robot),
|
2014-03-27 22:33:13 +00:00
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
# Check for the build.
|
|
|
|
json = self.getJsonResponse(RepositoryBuildList,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/building'))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-27 22:33:13 +00:00
|
|
|
assert len(json['builds']) > 0
|
2014-04-02 01:49:06 +00:00
|
|
|
|
|
|
|
|
|
|
|
def test_requestrepobuild_with_invalid_robot(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Request a (fake) build.
|
|
|
|
pull_robot = ADMIN_ACCESS_USER + '+invalidrobot'
|
|
|
|
self.postResponse(RepositoryBuildList,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'),
|
|
|
|
data=dict(file_id='foobarbaz', pull_robot=pull_robot),
|
|
|
|
expected_code=404)
|
|
|
|
|
|
|
|
def test_requestrepobuild_with_unauthorized_robot(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Request a (fake) build.
|
|
|
|
pull_robot = 'freshuser+anotherrobot'
|
|
|
|
self.postResponse(RepositoryBuildList,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'),
|
|
|
|
data=dict(file_id='foobarbaz', pull_robot=pull_robot),
|
|
|
|
expected_code=403)
|
|
|
|
|
2014-03-27 22:33:13 +00:00
|
|
|
|
2014-07-28 18:58:12 +00:00
|
|
|
class TestRepositoryEmail(ApiTestCase):
|
|
|
|
def test_emailnotauthorized(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-07-28 18:58:12 +00:00
|
|
|
# Verify the e-mail address is not authorized.
|
|
|
|
json = self.getResponse(RepositoryAuthorizedEmail,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', email='test@example.com'),
|
|
|
|
expected_code=404)
|
|
|
|
|
|
|
|
def test_emailnotauthorized_butsent(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-07-28 18:58:12 +00:00
|
|
|
# Verify the e-mail address is not authorized.
|
|
|
|
json = self.getJsonResponse(RepositoryAuthorizedEmail,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', email='jschorr+other@devtable.com'))
|
|
|
|
|
|
|
|
self.assertEquals(False, json['confirmed'])
|
|
|
|
self.assertEquals(ADMIN_ACCESS_USER, json['namespace'])
|
|
|
|
self.assertEquals('simple', json['repository'])
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-07-28 18:58:12 +00:00
|
|
|
|
|
|
|
def test_emailauthorized(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-07-28 18:58:12 +00:00
|
|
|
# Verify the e-mail address is authorized.
|
|
|
|
json = self.getJsonResponse(RepositoryAuthorizedEmail,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', email='jschorr@devtable.com'))
|
|
|
|
|
|
|
|
self.assertEquals(True, json['confirmed'])
|
|
|
|
self.assertEquals(ADMIN_ACCESS_USER, json['namespace'])
|
|
|
|
self.assertEquals('simple', json['repository'])
|
|
|
|
|
|
|
|
|
|
|
|
def test_send_email_authorization(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-07-28 18:58:12 +00:00
|
|
|
# Send the email.
|
|
|
|
json = self.postJsonResponse(RepositoryAuthorizedEmail,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', email='jschorr+foo@devtable.com'))
|
|
|
|
|
|
|
|
self.assertEquals(False, json['confirmed'])
|
|
|
|
self.assertEquals(ADMIN_ACCESS_USER, json['namespace'])
|
|
|
|
self.assertEquals('simple', json['repository'])
|
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
|
2014-07-18 02:51:58 +00:00
|
|
|
class TestRepositoryNotifications(ApiTestCase):
|
2014-02-03 23:18:33 +00:00
|
|
|
def test_webhooks(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-07-18 02:51:58 +00:00
|
|
|
# Add a notification.
|
|
|
|
json = self.postJsonResponse(RepositoryNotificationList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'),
|
2014-07-18 02:51:58 +00:00
|
|
|
data=dict(config={'url': 'http://example.com'}, event='repo_push', method='webhook'),
|
2014-03-19 00:32:37 +00:00
|
|
|
expected_code=201)
|
2014-02-03 23:18:33 +00:00
|
|
|
|
2014-07-18 02:51:58 +00:00
|
|
|
self.assertEquals('repo_push', json['event'])
|
|
|
|
self.assertEquals('webhook', json['method'])
|
|
|
|
self.assertEquals('http://example.com', json['config']['url'])
|
|
|
|
wid = json['uuid']
|
2014-02-03 23:18:33 +00:00
|
|
|
|
2014-07-18 02:51:58 +00:00
|
|
|
# Get the notification.
|
|
|
|
json = self.getJsonResponse(RepositoryNotification,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', uuid=wid))
|
2014-02-03 23:18:33 +00:00
|
|
|
|
2014-07-18 02:51:58 +00:00
|
|
|
self.assertEquals(wid, json['uuid'])
|
|
|
|
self.assertEquals('repo_push', json['event'])
|
|
|
|
self.assertEquals('webhook', json['method'])
|
2014-02-03 23:18:33 +00:00
|
|
|
|
2014-07-18 02:51:58 +00:00
|
|
|
# Verify the notification is listed.
|
|
|
|
json = self.getJsonResponse(RepositoryNotificationList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
|
|
|
|
|
2014-07-18 02:51:58 +00:00
|
|
|
ids = [w['uuid'] for w in json['notifications']]
|
2014-02-03 23:18:33 +00:00
|
|
|
assert wid in ids
|
|
|
|
|
2014-07-18 02:51:58 +00:00
|
|
|
# Delete the notification.
|
|
|
|
self.deleteResponse(RepositoryNotification,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', uuid=wid),
|
2014-02-03 23:18:33 +00:00
|
|
|
expected_code=204)
|
|
|
|
|
2014-07-18 02:51:58 +00:00
|
|
|
# Verify the notification is gone.
|
|
|
|
self.getResponse(RepositoryNotification,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', uuid=wid),
|
2014-02-03 23:18:33 +00:00
|
|
|
expected_code=404)
|
|
|
|
|
|
|
|
|
|
|
|
class TestListAndGetImage(ApiTestCase):
|
|
|
|
def test_listandgetimages(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryImageList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
|
|
|
|
|
|
|
|
assert len(json['images']) > 0
|
2014-09-18 21:16:10 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
for image in json['images']:
|
|
|
|
assert 'id' in image
|
|
|
|
assert 'tags' in image
|
|
|
|
assert 'created' in image
|
|
|
|
assert 'comment' in image
|
|
|
|
assert 'command' in image
|
|
|
|
assert 'ancestors' in image
|
|
|
|
assert 'size' in image
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
ijson = self.getJsonResponse(RepositoryImage,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple',
|
|
|
|
image_id=image['id']))
|
|
|
|
|
|
|
|
self.assertEquals(image['id'], ijson['id'])
|
|
|
|
|
2014-02-06 19:40:36 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
class TestGetImageChanges(ApiTestCase):
|
|
|
|
def test_getimagechanges(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Find an image to check.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryImageList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
|
|
|
|
|
|
|
|
image_id = json['images'][0]['id']
|
|
|
|
|
|
|
|
# Lookup the image's changes.
|
|
|
|
# TODO: Fix me once we can get fake changes into the test data
|
2014-03-18 23:34:26 +00:00
|
|
|
#self.getJsonResponse(RepositoryImageChanges,
|
2014-02-03 23:18:33 +00:00
|
|
|
# params=dict(repository=ADMIN_ACCESS_USER + '/simple',
|
|
|
|
# image_id=image_id))
|
|
|
|
|
|
|
|
|
|
|
|
class TestListAndDeleteTag(ApiTestCase):
|
2014-02-28 05:12:09 +00:00
|
|
|
def test_listdeletecreateandmovetag(self):
|
2014-02-03 23:18:33 +00:00
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# List the images for prod.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryTagImages,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/complex', tag='prod'))
|
|
|
|
|
|
|
|
prod_images = json['images']
|
|
|
|
assert len(prod_images) > 0
|
|
|
|
|
|
|
|
# List the images for staging.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryTagImages,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/complex', tag='staging'))
|
|
|
|
|
|
|
|
staging_images = json['images']
|
|
|
|
assert len(prod_images) == len(staging_images) + 1
|
|
|
|
|
|
|
|
# Delete prod.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(RepositoryTag,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/complex', tag='prod'),
|
|
|
|
expected_code=204)
|
|
|
|
|
|
|
|
# Make sure the tag is gone.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.getResponse(RepositoryTagImages,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/complex', tag='prod'),
|
|
|
|
expected_code=404)
|
|
|
|
|
|
|
|
# Make the sure the staging images are still there.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryTagImages,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/complex', tag='staging'))
|
|
|
|
|
|
|
|
self.assertEquals(staging_images, json['images'])
|
|
|
|
|
2014-02-28 05:12:09 +00:00
|
|
|
# Add a new tag to the staging image.
|
2014-03-26 23:42:29 +00:00
|
|
|
self.putResponse(RepositoryTag,
|
2014-02-28 05:12:09 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/complex', tag='sometag'),
|
|
|
|
data=dict(image=staging_images[0]['id']),
|
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
# Make sure the tag is present.
|
2014-03-26 23:42:29 +00:00
|
|
|
json = self.getJsonResponse(RepositoryTagImages,
|
2014-02-28 05:12:09 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/complex', tag='sometag'))
|
|
|
|
|
|
|
|
sometag_images = json['images']
|
|
|
|
self.assertEquals(sometag_images, staging_images)
|
|
|
|
|
|
|
|
# Move the tag.
|
2014-03-26 23:42:29 +00:00
|
|
|
self.putResponse(RepositoryTag,
|
2014-02-28 05:12:09 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/complex', tag='sometag'),
|
|
|
|
data=dict(image=staging_images[-1]['id']),
|
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
# Make sure the tag has moved.
|
2014-03-26 23:42:29 +00:00
|
|
|
json = self.getJsonResponse(RepositoryTagImages,
|
2014-02-28 05:12:09 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/complex', tag='sometag'))
|
|
|
|
|
|
|
|
sometag_new_images = json['images']
|
|
|
|
self.assertEquals(1, len(sometag_new_images))
|
|
|
|
self.assertEquals(staging_images[-1], sometag_new_images[0])
|
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
|
|
|
|
def test_deletesubtag(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# List the images for prod.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryTagImages,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/complex', tag='prod'))
|
|
|
|
|
|
|
|
prod_images = json['images']
|
|
|
|
assert len(prod_images) > 0
|
|
|
|
|
|
|
|
# Delete staging.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(RepositoryTag,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/complex', tag='staging'),
|
|
|
|
expected_code=204)
|
|
|
|
|
|
|
|
# Make sure the prod images are still around.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryTagImages,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/complex', tag='prod'))
|
|
|
|
|
|
|
|
self.assertEquals(prod_images, json['images'])
|
|
|
|
|
|
|
|
|
|
|
|
class TestRepoPermissions(ApiTestCase):
|
2014-11-20 16:33:42 +00:00
|
|
|
def listUserPermissions(self, namespace=ADMIN_ACCESS_USER, repo='simple'):
|
2014-03-18 23:34:26 +00:00
|
|
|
return self.getJsonResponse(RepositoryUserPermissionList,
|
2014-11-20 16:33:42 +00:00
|
|
|
params=dict(repository=namespace + '/' + repo))['permissions']
|
2014-02-03 23:18:33 +00:00
|
|
|
|
|
|
|
def listTeamPermissions(self):
|
2014-03-18 23:34:26 +00:00
|
|
|
return self.getJsonResponse(RepositoryTeamPermissionList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ORGANIZATION + '/' + ORG_REPO))['permissions']
|
|
|
|
|
2014-11-20 16:33:42 +00:00
|
|
|
def test_userpermissions_underorg(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
permissions = self.listUserPermissions(namespace=ORGANIZATION, repo=ORG_REPO)
|
|
|
|
|
|
|
|
self.assertEquals(1, len(permissions))
|
|
|
|
assert 'outsideorg' in permissions
|
|
|
|
self.assertEquals('read', permissions['outsideorg']['role'])
|
|
|
|
self.assertEquals(False, permissions['outsideorg']['is_org_member'])
|
|
|
|
|
|
|
|
# Add another user.
|
|
|
|
self.putJsonResponse(RepositoryUserPermission,
|
|
|
|
params=dict(repository=ORGANIZATION + '/' + ORG_REPO, username=ADMIN_ACCESS_USER),
|
|
|
|
data=dict(role='admin'))
|
|
|
|
|
|
|
|
# Verify the user is present.
|
|
|
|
permissions = self.listUserPermissions(namespace=ORGANIZATION, repo=ORG_REPO)
|
|
|
|
|
|
|
|
self.assertEquals(2, len(permissions))
|
|
|
|
assert ADMIN_ACCESS_USER in permissions
|
|
|
|
self.assertEquals('admin', permissions[ADMIN_ACCESS_USER]['role'])
|
|
|
|
self.assertEquals(True, permissions[ADMIN_ACCESS_USER]['is_org_member'])
|
|
|
|
|
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
def test_userpermissions(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# The repo should start with just the admin as a user perm.
|
|
|
|
permissions = self.listUserPermissions()
|
|
|
|
|
|
|
|
self.assertEquals(1, len(permissions))
|
|
|
|
assert ADMIN_ACCESS_USER in permissions
|
|
|
|
self.assertEquals('admin', permissions[ADMIN_ACCESS_USER]['role'])
|
2014-11-20 16:33:42 +00:00
|
|
|
self.assertFalse('is_org_member' in permissions[ADMIN_ACCESS_USER])
|
2014-02-03 23:18:33 +00:00
|
|
|
|
|
|
|
# Add another user.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.putJsonResponse(RepositoryUserPermission,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', username=NO_ACCESS_USER),
|
|
|
|
data=dict(role='read'))
|
|
|
|
|
|
|
|
# Verify the user is present.
|
|
|
|
permissions = self.listUserPermissions()
|
|
|
|
|
|
|
|
self.assertEquals(2, len(permissions))
|
|
|
|
assert NO_ACCESS_USER in permissions
|
|
|
|
self.assertEquals('read', permissions[NO_ACCESS_USER]['role'])
|
2014-11-20 16:33:42 +00:00
|
|
|
self.assertFalse('is_org_member' in permissions[NO_ACCESS_USER])
|
2014-02-03 23:18:33 +00:00
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryUserPermission,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', username=NO_ACCESS_USER))
|
|
|
|
self.assertEquals('read', json['role'])
|
|
|
|
|
|
|
|
# Change the user's permissions.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.putJsonResponse(RepositoryUserPermission,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', username=NO_ACCESS_USER),
|
|
|
|
data=dict(role='admin'))
|
|
|
|
|
|
|
|
# Verify.
|
|
|
|
permissions = self.listUserPermissions()
|
|
|
|
|
|
|
|
self.assertEquals(2, len(permissions))
|
|
|
|
assert NO_ACCESS_USER in permissions
|
|
|
|
self.assertEquals('admin', permissions[NO_ACCESS_USER]['role'])
|
|
|
|
|
|
|
|
# Delete the user's permission.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(RepositoryUserPermission,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', username=NO_ACCESS_USER))
|
|
|
|
|
|
|
|
# Verify.
|
|
|
|
permissions = self.listUserPermissions()
|
|
|
|
|
|
|
|
self.assertEquals(1, len(permissions))
|
|
|
|
assert not NO_ACCESS_USER in permissions
|
|
|
|
|
|
|
|
|
|
|
|
def test_teampermissions(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# The repo should start with just the readers as a team perm.
|
|
|
|
permissions = self.listTeamPermissions()
|
|
|
|
|
|
|
|
self.assertEquals(1, len(permissions))
|
|
|
|
assert 'readers' in permissions
|
|
|
|
self.assertEquals('read', permissions['readers']['role'])
|
|
|
|
|
|
|
|
# Add another team.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.putJsonResponse(RepositoryTeamPermission,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ORGANIZATION + '/' + ORG_REPO, teamname='owners'),
|
|
|
|
data=dict(role='write'))
|
|
|
|
|
|
|
|
# Verify the team is present.
|
|
|
|
permissions = self.listTeamPermissions()
|
|
|
|
|
|
|
|
self.assertEquals(2, len(permissions))
|
|
|
|
assert 'owners' in permissions
|
|
|
|
self.assertEquals('write', permissions['owners']['role'])
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryTeamPermission,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ORGANIZATION + '/' + ORG_REPO, teamname='owners'))
|
|
|
|
self.assertEquals('write', json['role'])
|
|
|
|
|
|
|
|
# Change the team's permissions.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.putJsonResponse(RepositoryTeamPermission,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ORGANIZATION + '/' + ORG_REPO, teamname='owners'),
|
|
|
|
data=dict(role='admin'))
|
|
|
|
|
|
|
|
# Verify.
|
|
|
|
permissions = self.listTeamPermissions()
|
|
|
|
|
|
|
|
self.assertEquals(2, len(permissions))
|
|
|
|
assert 'owners' in permissions
|
|
|
|
self.assertEquals('admin', permissions['owners']['role'])
|
|
|
|
|
|
|
|
# Delete the team's permission.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(RepositoryTeamPermission,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ORGANIZATION + '/' + ORG_REPO, teamname='owners'))
|
|
|
|
|
|
|
|
# Verify.
|
|
|
|
permissions = self.listTeamPermissions()
|
|
|
|
|
|
|
|
self.assertEquals(1, len(permissions))
|
|
|
|
assert not 'owners' in permissions
|
|
|
|
|
2014-02-06 19:40:36 +00:00
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
class TestApiTokens(ApiTestCase):
|
|
|
|
def listTokens(self):
|
2014-03-18 23:34:26 +00:00
|
|
|
return self.getJsonResponse(RepositoryTokenList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'))['tokens']
|
|
|
|
|
|
|
|
def test_tokens(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Create a new token.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.postJsonResponse(RepositoryTokenList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple'),
|
|
|
|
data=dict(role='read', friendlyName='mytoken'),
|
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
self.assertEquals('mytoken', json['friendlyName'])
|
|
|
|
self.assertEquals('read', json['role'])
|
|
|
|
token_code = json['code']
|
|
|
|
|
|
|
|
# Verify.
|
|
|
|
tokens = self.listTokens()
|
|
|
|
assert token_code in tokens
|
|
|
|
self.assertEquals('mytoken', tokens[token_code]['friendlyName'])
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryToken,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', code=token_code))
|
|
|
|
self.assertEquals(tokens[token_code], json)
|
|
|
|
|
|
|
|
# Change the token's permission.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.putJsonResponse(RepositoryToken,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', code=token_code),
|
|
|
|
data=dict(role='write'))
|
|
|
|
|
|
|
|
# Verify.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(RepositoryToken,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', code=token_code))
|
|
|
|
self.assertEquals('write', json['role'])
|
|
|
|
|
|
|
|
# Delete the token.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(RepositoryToken,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', code=token_code))
|
|
|
|
|
|
|
|
# Verify.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.getResponse(RepositoryToken,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', code=token_code),
|
|
|
|
expected_code=404)
|
|
|
|
|
|
|
|
|
|
|
|
class TestUserCard(ApiTestCase):
|
|
|
|
def test_getusercard(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(UserCard)
|
2014-02-03 23:18:33 +00:00
|
|
|
|
|
|
|
self.assertEquals('4242', json['card']['last4'])
|
|
|
|
self.assertEquals('Visa', json['card']['type'])
|
|
|
|
|
|
|
|
def test_setusercard_error(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-11-24 21:07:38 +00:00
|
|
|
json = self.postJsonResponse(UserCard,
|
2014-02-03 23:18:33 +00:00
|
|
|
data=dict(token='sometoken'),
|
|
|
|
expected_code=402)
|
|
|
|
assert 'carderror' in json
|
|
|
|
|
|
|
|
|
|
|
|
class TestOrgCard(ApiTestCase):
|
|
|
|
def test_getorgcard(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(OrganizationCard,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))
|
|
|
|
|
|
|
|
self.assertEquals('4242', json['card']['last4'])
|
|
|
|
self.assertEquals('Visa', json['card']['type'])
|
|
|
|
|
|
|
|
|
|
|
|
class TestUserSubscription(ApiTestCase):
|
|
|
|
def getSubscription(self):
|
2014-03-18 23:34:26 +00:00
|
|
|
return self.getJsonResponse(UserPlan)
|
2014-02-03 23:18:33 +00:00
|
|
|
|
|
|
|
def test_updateplan(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Change the plan.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.putJsonResponse(UserPlan,
|
2014-02-03 23:18:33 +00:00
|
|
|
data=dict(plan='free'))
|
|
|
|
|
|
|
|
# Verify
|
|
|
|
sub = self.getSubscription()
|
|
|
|
self.assertEquals('free', sub['plan'])
|
|
|
|
|
|
|
|
# Change the plan.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.putJsonResponse(UserPlan,
|
2014-02-03 23:18:33 +00:00
|
|
|
data=dict(plan='bus-large'))
|
|
|
|
|
|
|
|
# Verify
|
|
|
|
sub = self.getSubscription()
|
|
|
|
self.assertEquals('bus-large', sub['plan'])
|
|
|
|
|
|
|
|
|
|
|
|
class TestOrgSubscription(ApiTestCase):
|
|
|
|
def getSubscription(self):
|
2014-03-18 23:34:26 +00:00
|
|
|
return self.getJsonResponse(OrganizationPlan, params=dict(orgname=ORGANIZATION))
|
2014-02-03 23:18:33 +00:00
|
|
|
|
|
|
|
def test_updateplan(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Change the plan.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.putJsonResponse(OrganizationPlan,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(orgname=ORGANIZATION),
|
|
|
|
data=dict(plan='free'))
|
|
|
|
|
|
|
|
# Verify
|
|
|
|
sub = self.getSubscription()
|
|
|
|
self.assertEquals('free', sub['plan'])
|
|
|
|
|
|
|
|
# Change the plan.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.putJsonResponse(OrganizationPlan,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(orgname=ORGANIZATION),
|
|
|
|
data=dict(plan='bus-large'))
|
|
|
|
|
|
|
|
# Verify
|
|
|
|
sub = self.getSubscription()
|
|
|
|
self.assertEquals('bus-large', sub['plan'])
|
|
|
|
|
|
|
|
|
|
|
|
class TestUserRobots(ApiTestCase):
|
|
|
|
def getRobotNames(self):
|
2014-11-24 21:07:38 +00:00
|
|
|
return [r['name'] for r in self.getJsonResponse(UserRobotList)['robots']]
|
2014-02-03 23:18:33 +00:00
|
|
|
|
|
|
|
def test_robots(self):
|
|
|
|
self.login(NO_ACCESS_USER)
|
|
|
|
|
|
|
|
# Create a robot.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.putJsonResponse(UserRobot,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(robot_shortname='bender'),
|
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
self.assertEquals(NO_ACCESS_USER + '+bender', json['name'])
|
|
|
|
|
|
|
|
# Verify.
|
|
|
|
robots = self.getRobotNames()
|
|
|
|
assert NO_ACCESS_USER + '+bender' in robots
|
|
|
|
|
|
|
|
# Delete the robot.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(UserRobot,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(robot_shortname='bender'))
|
|
|
|
|
|
|
|
# Verify.
|
|
|
|
robots = self.getRobotNames()
|
|
|
|
assert not NO_ACCESS_USER + '+bender' in robots
|
|
|
|
|
2014-08-25 21:19:23 +00:00
|
|
|
def test_regenerate(self):
|
|
|
|
self.login(NO_ACCESS_USER)
|
|
|
|
|
|
|
|
# Create a robot.
|
|
|
|
json = self.putJsonResponse(UserRobot,
|
|
|
|
params=dict(robot_shortname='bender'),
|
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
token = json['token']
|
|
|
|
|
|
|
|
# Regenerate the robot.
|
|
|
|
json = self.postJsonResponse(RegenerateUserRobot,
|
|
|
|
params=dict(robot_shortname='bender'),
|
|
|
|
expected_code=200)
|
|
|
|
|
|
|
|
# Verify the token changed.
|
|
|
|
self.assertNotEquals(token, json['token'])
|
|
|
|
|
|
|
|
json2 = self.getJsonResponse(UserRobot,
|
|
|
|
params=dict(robot_shortname='bender'),
|
|
|
|
expected_code=200)
|
|
|
|
|
|
|
|
self.assertEquals(json['token'], json2['token'])
|
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
|
|
|
|
class TestOrgRobots(ApiTestCase):
|
|
|
|
def getRobotNames(self):
|
2014-03-18 23:34:26 +00:00
|
|
|
return [r['name'] for r in self.getJsonResponse(OrgRobotList,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(orgname=ORGANIZATION))['robots']]
|
|
|
|
|
2014-11-07 17:05:21 +00:00
|
|
|
def test_delete_robot_after_use(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Create the robot.
|
|
|
|
self.putJsonResponse(OrgRobot,
|
|
|
|
params=dict(orgname=ORGANIZATION, robot_shortname='bender'),
|
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
# Add the robot to a team.
|
|
|
|
membername = ORGANIZATION + '+bender'
|
|
|
|
self.putJsonResponse(TeamMember,
|
|
|
|
params=dict(orgname=ORGANIZATION, teamname='readers',
|
|
|
|
membername=membername))
|
|
|
|
|
|
|
|
# Add a repository permission.
|
|
|
|
self.putJsonResponse(RepositoryUserPermission,
|
|
|
|
params=dict(repository=ORGANIZATION + '/' + ORG_REPO, username=membername),
|
|
|
|
data=dict(role='read'))
|
|
|
|
|
|
|
|
# Add a permission prototype with the robot as the activating user.
|
|
|
|
self.postJsonResponse(PermissionPrototypeList,
|
|
|
|
params=dict(orgname=ORGANIZATION),
|
|
|
|
data=dict(role='read',
|
|
|
|
activating_user={'name': membername},
|
|
|
|
delegate={'kind': 'user',
|
|
|
|
'name': membername}))
|
|
|
|
|
|
|
|
# Add a permission prototype with the robot as the delegating user.
|
|
|
|
self.postJsonResponse(PermissionPrototypeList,
|
|
|
|
params=dict(orgname=ORGANIZATION),
|
|
|
|
data=dict(role='read',
|
|
|
|
delegate={'kind': 'user',
|
|
|
|
'name': membername}))
|
|
|
|
|
|
|
|
# Add a build trigger with the robot as the pull robot.
|
|
|
|
database.BuildTriggerService.create(name='fakeservice')
|
|
|
|
|
|
|
|
# Add a new fake trigger.
|
|
|
|
repo = model.get_repository(ORGANIZATION, ORG_REPO)
|
|
|
|
user = model.get_user(ADMIN_ACCESS_USER)
|
|
|
|
pull_robot = model.get_user(membername)
|
|
|
|
model.create_build_trigger(repo, 'fakeservice', 'sometoken', user, pull_robot=pull_robot)
|
|
|
|
|
2015-01-14 17:56:06 +00:00
|
|
|
# Add some log entries for the robot.
|
|
|
|
model.log_action('pull_repo', ORGANIZATION, performer=pull_robot, repository=repo)
|
|
|
|
|
2014-11-07 17:05:21 +00:00
|
|
|
# Delete the robot and verify it works.
|
|
|
|
self.deleteResponse(OrgRobot,
|
|
|
|
params=dict(orgname=ORGANIZATION, robot_shortname='bender'))
|
|
|
|
|
|
|
|
# All the above records should now be deleted, along with the robot. We verify a few of the
|
|
|
|
# critical ones below.
|
|
|
|
|
|
|
|
# Check the team.
|
|
|
|
team = model.get_organization_team(ORGANIZATION, 'readers')
|
|
|
|
members = [member.username for member in model.get_organization_team_members(team.id)]
|
2014-11-24 21:07:38 +00:00
|
|
|
self.assertFalse(membername in members)
|
2014-11-07 17:05:21 +00:00
|
|
|
|
|
|
|
# Check the robot itself.
|
|
|
|
self.assertIsNone(model.get_user(membername))
|
|
|
|
|
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
def test_robots(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Create a robot.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.putJsonResponse(OrgRobot,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(orgname=ORGANIZATION, robot_shortname='bender'),
|
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
self.assertEquals(ORGANIZATION + '+bender', json['name'])
|
|
|
|
|
|
|
|
# Verify.
|
|
|
|
robots = self.getRobotNames()
|
|
|
|
assert ORGANIZATION + '+bender' in robots
|
|
|
|
|
|
|
|
# Delete the robot.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(OrgRobot,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(orgname=ORGANIZATION, robot_shortname='bender'))
|
|
|
|
|
|
|
|
# Verify.
|
|
|
|
robots = self.getRobotNames()
|
|
|
|
assert not ORGANIZATION + '+bender' in robots
|
|
|
|
|
|
|
|
|
2014-08-25 21:19:23 +00:00
|
|
|
def test_regenerate(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Create a robot.
|
|
|
|
json = self.putJsonResponse(OrgRobot,
|
|
|
|
params=dict(orgname=ORGANIZATION, robot_shortname='bender'),
|
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
token = json['token']
|
|
|
|
|
|
|
|
# Regenerate the robot.
|
|
|
|
json = self.postJsonResponse(RegenerateOrgRobot,
|
|
|
|
params=dict(orgname=ORGANIZATION, robot_shortname='bender'),
|
|
|
|
expected_code=200)
|
|
|
|
|
|
|
|
# Verify the token changed.
|
|
|
|
self.assertNotEquals(token, json['token'])
|
|
|
|
|
|
|
|
json2 = self.getJsonResponse(OrgRobot,
|
|
|
|
params=dict(orgname=ORGANIZATION, robot_shortname='bender'),
|
|
|
|
expected_code=200)
|
|
|
|
|
|
|
|
self.assertEquals(json['token'], json2['token'])
|
|
|
|
|
|
|
|
|
2014-02-03 23:18:33 +00:00
|
|
|
class TestLogs(ApiTestCase):
|
|
|
|
def test_user_logs(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(UserLogs)
|
2014-02-03 23:18:33 +00:00
|
|
|
assert 'logs' in json
|
|
|
|
assert 'start_time' in json
|
|
|
|
assert 'end_time' in json
|
|
|
|
|
|
|
|
def test_org_logs(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(OrgLogs, params=dict(orgname=ORGANIZATION))
|
2014-02-03 23:18:33 +00:00
|
|
|
assert 'logs' in json
|
|
|
|
assert 'start_time' in json
|
|
|
|
assert 'end_time' in json
|
|
|
|
|
|
|
|
def test_performer(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(OrgLogs, params=dict(orgname=ORGANIZATION))
|
2014-02-03 23:18:33 +00:00
|
|
|
all_logs = json['logs']
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(OrgLogs,
|
2014-02-03 23:18:33 +00:00
|
|
|
params=dict(performer=READ_ACCESS_USER, orgname=ORGANIZATION))
|
|
|
|
|
|
|
|
assert len(json['logs']) < len(all_logs)
|
|
|
|
for log in json['logs']:
|
|
|
|
self.assertEquals(READ_ACCESS_USER, log['performer']['name'])
|
2014-02-01 00:45:44 +00:00
|
|
|
|
2014-02-26 20:19:07 +00:00
|
|
|
|
2014-03-20 19:46:13 +00:00
|
|
|
class TestApplicationInformation(ApiTestCase):
|
|
|
|
def test_get_info(self):
|
|
|
|
json = self.getJsonResponse(ApplicationInformation, params=dict(client_id=FAKE_APPLICATION_CLIENT_ID))
|
|
|
|
assert 'name' in json
|
|
|
|
assert 'uri' in json
|
|
|
|
assert 'organization' in json
|
|
|
|
|
|
|
|
def test_get_invalid_info(self):
|
|
|
|
self.getJsonResponse(ApplicationInformation, params=dict(client_id='invalid-code'),
|
|
|
|
expected_code=404)
|
|
|
|
|
|
|
|
|
|
|
|
class TestOrganizationApplications(ApiTestCase):
|
|
|
|
def test_list_create_applications(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
json = self.getJsonResponse(OrganizationApplications, params=dict(orgname=ORGANIZATION))
|
|
|
|
|
|
|
|
self.assertEquals(2, len(json['applications']))
|
2014-11-13 17:51:37 +00:00
|
|
|
|
|
|
|
found = False
|
|
|
|
for application in json['applications']:
|
|
|
|
if application['client_id'] == FAKE_APPLICATION_CLIENT_ID:
|
|
|
|
found = True
|
|
|
|
break
|
|
|
|
|
|
|
|
self.assertTrue(found)
|
2014-03-20 19:46:13 +00:00
|
|
|
|
|
|
|
# Add a new application.
|
|
|
|
json = self.postJsonResponse(OrganizationApplications, params=dict(orgname=ORGANIZATION),
|
|
|
|
data=dict(name="Some cool app", description="foo"))
|
|
|
|
|
|
|
|
self.assertEquals("Some cool app", json['name'])
|
|
|
|
self.assertEquals("foo", json['description'])
|
|
|
|
|
|
|
|
# Retrieve the apps list again
|
|
|
|
list_json = self.getJsonResponse(OrganizationApplications, params=dict(orgname=ORGANIZATION))
|
|
|
|
self.assertEquals(3, len(list_json['applications']))
|
|
|
|
|
|
|
|
|
|
|
|
class TestOrganizationApplicationResource(ApiTestCase):
|
|
|
|
def test_get_edit_delete_application(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Retrieve the application.
|
|
|
|
json = self.getJsonResponse(OrganizationApplicationResource,
|
|
|
|
params=dict(orgname=ORGANIZATION, client_id=FAKE_APPLICATION_CLIENT_ID))
|
|
|
|
|
|
|
|
self.assertEquals(FAKE_APPLICATION_CLIENT_ID, json['client_id'])
|
|
|
|
|
|
|
|
# Edit the application.
|
|
|
|
edit_json = self.putJsonResponse(OrganizationApplicationResource,
|
|
|
|
params=dict(orgname=ORGANIZATION, client_id=FAKE_APPLICATION_CLIENT_ID),
|
|
|
|
data=dict(name="Some App", description="foo", application_uri="bar",
|
2014-11-25 00:25:13 +00:00
|
|
|
redirect_uri="baz", avatar_email="meh"))
|
2014-03-20 19:46:13 +00:00
|
|
|
|
|
|
|
self.assertEquals(FAKE_APPLICATION_CLIENT_ID, edit_json['client_id'])
|
|
|
|
self.assertEquals("Some App", edit_json['name'])
|
|
|
|
self.assertEquals("foo", edit_json['description'])
|
|
|
|
self.assertEquals("bar", edit_json['application_uri'])
|
|
|
|
self.assertEquals("baz", edit_json['redirect_uri'])
|
2014-11-25 00:25:13 +00:00
|
|
|
self.assertEquals("meh", edit_json['avatar_email'])
|
2014-03-20 19:46:13 +00:00
|
|
|
|
|
|
|
# Retrieve the application again.
|
|
|
|
json = self.getJsonResponse(OrganizationApplicationResource,
|
|
|
|
params=dict(orgname=ORGANIZATION, client_id=FAKE_APPLICATION_CLIENT_ID))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-20 19:46:13 +00:00
|
|
|
self.assertEquals(json, edit_json)
|
|
|
|
|
|
|
|
# Delete the application.
|
|
|
|
self.deleteResponse(OrganizationApplicationResource,
|
|
|
|
params=dict(orgname=ORGANIZATION, client_id=FAKE_APPLICATION_CLIENT_ID))
|
|
|
|
|
|
|
|
# Make sure the application is gone.
|
|
|
|
self.getJsonResponse(OrganizationApplicationResource,
|
|
|
|
params=dict(orgname=ORGANIZATION, client_id=FAKE_APPLICATION_CLIENT_ID),
|
|
|
|
expected_code=404)
|
|
|
|
|
|
|
|
|
|
|
|
class TestOrganizationApplicationResetClientSecret(ApiTestCase):
|
|
|
|
def test_reset_client_secret(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Retrieve the application.
|
|
|
|
json = self.getJsonResponse(OrganizationApplicationResource,
|
|
|
|
params=dict(orgname=ORGANIZATION, client_id=FAKE_APPLICATION_CLIENT_ID))
|
|
|
|
|
|
|
|
self.assertEquals(FAKE_APPLICATION_CLIENT_ID, json['client_id'])
|
|
|
|
|
|
|
|
# Reset the client secret.
|
|
|
|
reset_json = self.postJsonResponse(OrganizationApplicationResetClientSecret,
|
|
|
|
params=dict(orgname=ORGANIZATION, client_id=FAKE_APPLICATION_CLIENT_ID))
|
|
|
|
|
|
|
|
self.assertEquals(FAKE_APPLICATION_CLIENT_ID, reset_json['client_id'])
|
|
|
|
self.assertNotEquals(reset_json['client_secret'], json['client_secret'])
|
|
|
|
|
|
|
|
# Verify it was changed in the DB.
|
|
|
|
json = self.getJsonResponse(OrganizationApplicationResource,
|
|
|
|
params=dict(orgname=ORGANIZATION, client_id=FAKE_APPLICATION_CLIENT_ID))
|
|
|
|
self.assertEquals(reset_json['client_secret'], json['client_secret'])
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-20 19:46:13 +00:00
|
|
|
|
|
|
|
|
2014-03-19 00:32:37 +00:00
|
|
|
class FakeBuildTrigger(BuildTriggerBase):
|
2014-02-26 20:19:07 +00:00
|
|
|
@classmethod
|
|
|
|
def service_name(cls):
|
|
|
|
return 'fakeservice'
|
|
|
|
|
|
|
|
def list_build_sources(self, auth_token):
|
|
|
|
return [{'first': 'source'}, {'second': auth_token}]
|
|
|
|
|
|
|
|
def list_build_subdirs(self, auth_token, config):
|
|
|
|
return [auth_token, 'foo', 'bar', config['somevalue']]
|
|
|
|
|
|
|
|
def handle_trigger_request(self, request, auth_token, config):
|
2015-02-18 19:12:59 +00:00
|
|
|
return ('foo', ['bar'], 'build-name', 'subdir', {'foo': 'bar'})
|
2014-02-26 20:19:07 +00:00
|
|
|
|
|
|
|
def is_active(self, config):
|
|
|
|
return 'active' in config and config['active']
|
|
|
|
|
|
|
|
def activate(self, trigger_uuid, standard_webhook_url, auth_token, config):
|
|
|
|
config['active'] = True
|
|
|
|
return config
|
|
|
|
|
|
|
|
def deactivate(self, auth_token, config):
|
|
|
|
config['active'] = False
|
2014-11-24 21:07:38 +00:00
|
|
|
return config
|
2014-02-26 20:19:07 +00:00
|
|
|
|
2014-09-30 20:29:32 +00:00
|
|
|
def manual_start(self, auth_token, config, run_parameters=None):
|
2015-02-18 19:12:59 +00:00
|
|
|
return ('foo', ['bar'], 'build-name', 'subdir', {'foo': 'bar'})
|
2014-02-26 20:19:07 +00:00
|
|
|
|
2014-04-03 03:33:58 +00:00
|
|
|
def dockerfile_url(self, auth_token, config):
|
|
|
|
return 'http://some/url'
|
|
|
|
|
|
|
|
def load_dockerfile_contents(self, auth_token, config):
|
|
|
|
if not 'dockerfile' in config:
|
|
|
|
return None
|
|
|
|
|
|
|
|
return config['dockerfile']
|
|
|
|
|
2014-09-30 20:29:32 +00:00
|
|
|
def list_field_values(self, auth_token, config, field_name):
|
|
|
|
if field_name == 'test_field':
|
|
|
|
return [1, 2, 3]
|
|
|
|
|
|
|
|
return None
|
|
|
|
|
2014-02-26 20:19:07 +00:00
|
|
|
|
|
|
|
class TestBuildTriggers(ApiTestCase):
|
|
|
|
def test_list_build_triggers(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Check a repo with no known triggers.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(BuildTriggerList, params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
|
2014-02-26 20:19:07 +00:00
|
|
|
self.assertEquals(0, len(json['triggers']))
|
|
|
|
|
|
|
|
# Check a repo with one known trigger.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(BuildTriggerList, params=dict(repository=ADMIN_ACCESS_USER + '/building'))
|
2014-02-26 20:19:07 +00:00
|
|
|
self.assertEquals(1, len(json['triggers']))
|
|
|
|
|
|
|
|
trigger = json['triggers'][0]
|
|
|
|
|
|
|
|
assert 'id' in trigger
|
|
|
|
assert 'is_active' in trigger
|
|
|
|
assert 'config' in trigger
|
|
|
|
assert 'service' in trigger
|
|
|
|
|
|
|
|
# Verify the get trigger method.
|
2014-03-18 23:34:26 +00:00
|
|
|
trigger_json = self.getJsonResponse(BuildTrigger, params=dict(repository=ADMIN_ACCESS_USER + '/building',
|
2014-02-26 20:19:07 +00:00
|
|
|
trigger_uuid=trigger['id']))
|
|
|
|
|
|
|
|
self.assertEquals(trigger, trigger_json)
|
|
|
|
|
|
|
|
# Check the recent builds for the trigger.
|
2014-03-18 23:34:26 +00:00
|
|
|
builds_json = self.getJsonResponse(TriggerBuildList, params=dict(repository=ADMIN_ACCESS_USER + '/building',
|
2014-02-26 20:19:07 +00:00
|
|
|
trigger_uuid=trigger['id']))
|
|
|
|
|
|
|
|
assert 'builds' in builds_json
|
|
|
|
|
|
|
|
def test_delete_build_trigger(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(BuildTriggerList, params=dict(repository=ADMIN_ACCESS_USER + '/building'))
|
2014-02-26 20:19:07 +00:00
|
|
|
self.assertEquals(1, len(json['triggers']))
|
|
|
|
trigger = json['triggers'][0]
|
|
|
|
|
|
|
|
# Delete the trigger.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.deleteResponse(BuildTrigger, params=dict(repository=ADMIN_ACCESS_USER + '/building',
|
2014-02-26 20:19:07 +00:00
|
|
|
trigger_uuid=trigger['id']))
|
|
|
|
|
|
|
|
# Verify it was deleted.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(BuildTriggerList, params=dict(repository=ADMIN_ACCESS_USER + '/building'))
|
2014-02-26 20:19:07 +00:00
|
|
|
self.assertEquals(0, len(json['triggers']))
|
|
|
|
|
|
|
|
|
2014-04-03 03:33:58 +00:00
|
|
|
def test_analyze_fake_trigger(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
database.BuildTriggerService.create(name='fakeservice')
|
|
|
|
|
|
|
|
# Add a new fake trigger.
|
|
|
|
repo = model.get_repository(ADMIN_ACCESS_USER, 'simple')
|
|
|
|
user = model.get_user(ADMIN_ACCESS_USER)
|
|
|
|
trigger = model.create_build_trigger(repo, 'fakeservice', 'sometoken', user)
|
|
|
|
|
|
|
|
# Analyze the trigger's dockerfile: First, no dockerfile.
|
|
|
|
trigger_config = {}
|
|
|
|
analyze_json = self.postJsonResponse(BuildTriggerAnalyze,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
|
|
|
data={'config': trigger_config})
|
|
|
|
|
|
|
|
self.assertEquals('error', analyze_json['status'])
|
|
|
|
self.assertEquals('Could not read the Dockerfile for the trigger', analyze_json['message'])
|
|
|
|
|
|
|
|
# Analyze the trigger's dockerfile: Second, missing FROM in dockerfile.
|
|
|
|
trigger_config = {'dockerfile': 'MAINTAINER me'}
|
|
|
|
analyze_json = self.postJsonResponse(BuildTriggerAnalyze,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
|
|
|
data={'config': trigger_config})
|
|
|
|
|
|
|
|
self.assertEquals('warning', analyze_json['status'])
|
|
|
|
self.assertEquals('No FROM line found in the Dockerfile', analyze_json['message'])
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-04-03 03:33:58 +00:00
|
|
|
# Analyze the trigger's dockerfile: Third, dockerfile with public repo.
|
|
|
|
trigger_config = {'dockerfile': 'FROM somerepo'}
|
|
|
|
analyze_json = self.postJsonResponse(BuildTriggerAnalyze,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
|
|
|
data={'config': trigger_config})
|
|
|
|
|
|
|
|
self.assertEquals('publicbase', analyze_json['status'])
|
|
|
|
|
|
|
|
# Analyze the trigger's dockerfile: Fourth, dockerfile with private repo with an invalid path.
|
|
|
|
trigger_config = {'dockerfile': 'FROM localhost:5000/somepath'}
|
|
|
|
analyze_json = self.postJsonResponse(BuildTriggerAnalyze,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
|
|
|
data={'config': trigger_config})
|
|
|
|
|
|
|
|
self.assertEquals('warning', analyze_json['status'])
|
|
|
|
self.assertEquals('"localhost:5000/somepath" is not a valid Quay repository path', analyze_json['message'])
|
|
|
|
|
|
|
|
# Analyze the trigger's dockerfile: Fifth, dockerfile with private repo that does not exist.
|
|
|
|
trigger_config = {'dockerfile': 'FROM localhost:5000/nothere/randomrepo'}
|
|
|
|
analyze_json = self.postJsonResponse(BuildTriggerAnalyze,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
|
|
|
data={'config': trigger_config})
|
|
|
|
|
|
|
|
self.assertEquals('error', analyze_json['status'])
|
2014-10-14 20:23:01 +00:00
|
|
|
self.assertEquals('Repository "localhost:5000/nothere/randomrepo" referenced by the Dockerfile was not found', analyze_json['message'])
|
2014-04-03 03:33:58 +00:00
|
|
|
|
|
|
|
# Analyze the trigger's dockerfile: Sixth, dockerfile with private repo that the user cannot see.
|
|
|
|
trigger_config = {'dockerfile': 'FROM localhost:5000/randomuser/randomrepo'}
|
|
|
|
analyze_json = self.postJsonResponse(BuildTriggerAnalyze,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
|
|
|
data={'config': trigger_config})
|
|
|
|
|
|
|
|
self.assertEquals('error', analyze_json['status'])
|
2014-10-14 20:23:01 +00:00
|
|
|
self.assertEquals('Repository "localhost:5000/randomuser/randomrepo" referenced by the Dockerfile was not found', analyze_json['message'])
|
2014-04-03 03:33:58 +00:00
|
|
|
|
|
|
|
# Analyze the trigger's dockerfile: Seventh, dockerfile with private repo that the user see.
|
|
|
|
trigger_config = {'dockerfile': 'FROM localhost:5000/devtable/complex'}
|
|
|
|
analyze_json = self.postJsonResponse(BuildTriggerAnalyze,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
|
|
|
data={'config': trigger_config})
|
|
|
|
|
|
|
|
self.assertEquals('analyzed', analyze_json['status'])
|
|
|
|
self.assertEquals('devtable', analyze_json['namespace'])
|
|
|
|
self.assertEquals('complex', analyze_json['name'])
|
|
|
|
self.assertEquals(False, analyze_json['is_public'])
|
|
|
|
self.assertEquals(ADMIN_ACCESS_USER + '+dtrobot', analyze_json['robots'][0]['name'])
|
|
|
|
|
|
|
|
|
2014-02-26 20:19:07 +00:00
|
|
|
def test_fake_trigger(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
database.BuildTriggerService.create(name='fakeservice')
|
|
|
|
|
|
|
|
# Add a new fake trigger.
|
|
|
|
repo = model.get_repository(ADMIN_ACCESS_USER, 'simple')
|
|
|
|
user = model.get_user(ADMIN_ACCESS_USER)
|
|
|
|
trigger = model.create_build_trigger(repo, 'fakeservice', 'sometoken', user)
|
|
|
|
|
|
|
|
# Verify the trigger.
|
2014-03-18 23:34:26 +00:00
|
|
|
json = self.getJsonResponse(BuildTriggerList, params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
|
2014-02-26 20:19:07 +00:00
|
|
|
self.assertEquals(1, len(json['triggers']))
|
|
|
|
self.assertEquals(trigger.uuid, json['triggers'][0]['id'])
|
|
|
|
self.assertEquals(trigger.service.name, json['triggers'][0]['service'])
|
|
|
|
self.assertEquals(False, json['triggers'][0]['is_active'])
|
|
|
|
|
|
|
|
# List the trigger's sources.
|
2014-03-18 23:34:26 +00:00
|
|
|
source_json = self.getJsonResponse(BuildTriggerSources, params=dict(repository=ADMIN_ACCESS_USER + '/simple',
|
2014-11-24 21:07:38 +00:00
|
|
|
trigger_uuid=trigger.uuid))
|
2014-02-26 20:19:07 +00:00
|
|
|
self.assertEquals([{'first': 'source'}, {'second': 'sometoken'}], source_json['sources'])
|
|
|
|
|
|
|
|
# List the trigger's subdirs.
|
2014-03-18 23:34:26 +00:00
|
|
|
subdir_json = self.postJsonResponse(BuildTriggerSubdirs,
|
2014-02-26 20:19:07 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
|
|
|
data={'somevalue': 'meh'})
|
|
|
|
|
|
|
|
self.assertEquals({'status': 'success', 'subdir': ['sometoken', 'foo', 'bar', 'meh']}, subdir_json)
|
|
|
|
|
|
|
|
# Activate the trigger.
|
|
|
|
trigger_config = {}
|
2014-03-18 23:34:26 +00:00
|
|
|
activate_json = self.postJsonResponse(BuildTriggerActivate,
|
2014-02-26 20:19:07 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
2014-03-27 22:33:13 +00:00
|
|
|
data={'config': trigger_config})
|
2014-02-26 20:19:07 +00:00
|
|
|
|
|
|
|
self.assertEquals(True, activate_json['is_active'])
|
|
|
|
|
|
|
|
# Make sure the trigger has a write token.
|
2014-11-19 20:43:28 +00:00
|
|
|
trigger = model.get_build_trigger(trigger.uuid)
|
2014-02-26 20:19:07 +00:00
|
|
|
self.assertNotEquals(None, trigger.write_token)
|
|
|
|
self.assertEquals(True, py_json.loads(trigger.config)['active'])
|
|
|
|
|
|
|
|
# Make sure we cannot activate again.
|
2014-03-18 23:34:26 +00:00
|
|
|
self.postResponse(BuildTriggerActivate,
|
2014-02-26 20:19:07 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
2014-03-27 22:33:13 +00:00
|
|
|
data={'config': trigger_config},
|
2014-02-26 20:19:07 +00:00
|
|
|
expected_code=400)
|
|
|
|
|
2014-09-30 20:29:32 +00:00
|
|
|
# Retrieve values for a field.
|
2014-10-14 20:23:01 +00:00
|
|
|
result = self.postJsonResponse(BuildTriggerFieldValues,
|
2014-11-24 21:07:38 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple',
|
2014-09-30 20:29:32 +00:00
|
|
|
trigger_uuid=trigger.uuid, field_name="test_field"))
|
|
|
|
|
|
|
|
self.assertEquals(result['values'], [1, 2, 3])
|
|
|
|
|
2014-10-14 20:23:01 +00:00
|
|
|
self.postResponse(BuildTriggerFieldValues,
|
2014-11-24 21:07:38 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple',
|
2014-09-30 20:29:32 +00:00
|
|
|
trigger_uuid=trigger.uuid, field_name="another_field"),
|
|
|
|
expected_code = 404)
|
|
|
|
|
2014-02-26 20:19:07 +00:00
|
|
|
# Start a manual build.
|
2014-03-18 23:34:26 +00:00
|
|
|
start_json = self.postJsonResponse(ActivateBuildTrigger,
|
2014-02-26 20:19:07 +00:00
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
2014-09-30 20:29:32 +00:00
|
|
|
data=dict(),
|
2014-02-26 20:19:07 +00:00
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
assert 'id' in start_json
|
|
|
|
self.assertEquals("build-name", start_json['display_name'])
|
|
|
|
self.assertEquals(['bar'], start_json['job_config']['docker_tags'])
|
|
|
|
|
2015-02-18 19:12:59 +00:00
|
|
|
# Verify the metadata was added.
|
|
|
|
build_obj = database.RepositoryBuild.get(database.RepositoryBuild.uuid == start_json['id'])
|
|
|
|
self.assertEquals('bar', py_json.loads(build_obj.job_config)['trigger_metadata']['foo'])
|
2014-03-25 00:57:02 +00:00
|
|
|
|
2014-03-27 22:33:13 +00:00
|
|
|
def test_invalid_robot_account(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
database.BuildTriggerService.create(name='fakeservice')
|
|
|
|
|
|
|
|
# Add a new fake trigger.
|
|
|
|
repo = model.get_repository(ADMIN_ACCESS_USER, 'simple')
|
|
|
|
user = model.get_user(ADMIN_ACCESS_USER)
|
|
|
|
trigger = model.create_build_trigger(repo, 'fakeservice', 'sometoken', user)
|
|
|
|
|
|
|
|
# Try to activate it with an invalid robot account.
|
|
|
|
trigger_config = {}
|
|
|
|
activate_json = self.postJsonResponse(BuildTriggerActivate,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
|
|
|
data={'config': trigger_config, 'pull_robot': 'someinvalidrobot'},
|
|
|
|
expected_code=404)
|
|
|
|
|
|
|
|
def test_unauthorized_robot_account(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
database.BuildTriggerService.create(name='fakeservice')
|
|
|
|
|
|
|
|
# Add a new fake trigger.
|
|
|
|
repo = model.get_repository(ADMIN_ACCESS_USER, 'simple')
|
|
|
|
user = model.get_user(ADMIN_ACCESS_USER)
|
|
|
|
trigger = model.create_build_trigger(repo, 'fakeservice', 'sometoken', user)
|
|
|
|
|
|
|
|
# Try to activate it with a robot account in the wrong namespace.
|
|
|
|
trigger_config = {}
|
|
|
|
activate_json = self.postJsonResponse(BuildTriggerActivate,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
|
|
|
data={'config': trigger_config, 'pull_robot': 'freshuser+anotherrobot'},
|
|
|
|
expected_code=403)
|
|
|
|
|
|
|
|
def test_robot_account(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
database.BuildTriggerService.create(name='fakeservice')
|
|
|
|
|
|
|
|
# Add a new fake trigger.
|
|
|
|
repo = model.get_repository(ADMIN_ACCESS_USER, 'simple')
|
|
|
|
user = model.get_user(ADMIN_ACCESS_USER)
|
|
|
|
trigger = model.create_build_trigger(repo, 'fakeservice', 'sometoken', user)
|
|
|
|
|
|
|
|
# Try to activate it with a robot account.
|
|
|
|
trigger_config = {}
|
|
|
|
activate_json = self.postJsonResponse(BuildTriggerActivate,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
|
|
|
data={'config': trigger_config, 'pull_robot': ADMIN_ACCESS_USER + '+dtrobot'})
|
|
|
|
|
|
|
|
# Verify that the robot was saved.
|
|
|
|
self.assertEquals(True, activate_json['is_active'])
|
2014-04-02 01:49:06 +00:00
|
|
|
self.assertEquals(ADMIN_ACCESS_USER + '+dtrobot', activate_json['pull_robot']['name'])
|
2014-03-27 22:33:13 +00:00
|
|
|
|
|
|
|
# Start a manual build.
|
|
|
|
start_json = self.postJsonResponse(ActivateBuildTrigger,
|
|
|
|
params=dict(repository=ADMIN_ACCESS_USER + '/simple', trigger_uuid=trigger.uuid),
|
2014-09-30 20:29:32 +00:00
|
|
|
data=dict(),
|
2014-03-27 22:33:13 +00:00
|
|
|
expected_code=201)
|
|
|
|
|
|
|
|
assert 'id' in start_json
|
|
|
|
self.assertEquals("build-name", start_json['display_name'])
|
|
|
|
self.assertEquals(['bar'], start_json['job_config']['docker_tags'])
|
|
|
|
|
2014-03-25 00:57:02 +00:00
|
|
|
|
|
|
|
class TestUserAuthorizations(ApiTestCase):
|
|
|
|
def test_list_get_delete_user_authorizations(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
json = self.getJsonResponse(UserAuthorizationList)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-03-25 00:57:02 +00:00
|
|
|
self.assertEquals(1, len(json['authorizations']))
|
|
|
|
|
|
|
|
authorization = json['authorizations'][0]
|
|
|
|
|
|
|
|
assert 'uuid' in authorization
|
|
|
|
assert 'scopes' in authorization
|
|
|
|
assert 'application' in authorization
|
|
|
|
|
|
|
|
# Retrieve the authorization.
|
|
|
|
get_json = self.getJsonResponse(UserAuthorization, params=dict(access_token_uuid = authorization['uuid']))
|
|
|
|
self.assertEquals(authorization, get_json)
|
|
|
|
|
|
|
|
# Delete the authorization.
|
|
|
|
self.deleteResponse(UserAuthorization, params=dict(access_token_uuid = authorization['uuid']))
|
|
|
|
|
|
|
|
# Verify it has been deleted.
|
|
|
|
self.getJsonResponse(UserAuthorization, params=dict(access_token_uuid = authorization['uuid']),
|
|
|
|
expected_code=404)
|
|
|
|
|
2014-05-12 19:22:58 +00:00
|
|
|
|
|
|
|
class TestSuperUserLogs(ApiTestCase):
|
|
|
|
def test_get_logs(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
json = self.getJsonResponse(SuperUserLogs)
|
|
|
|
|
|
|
|
assert 'logs' in json
|
|
|
|
assert len(json['logs']) > 0
|
|
|
|
|
|
|
|
|
|
|
|
class TestSuperUserList(ApiTestCase):
|
|
|
|
def test_get_users(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
json = self.getJsonResponse(SuperUserList)
|
|
|
|
|
|
|
|
assert 'users' in json
|
|
|
|
assert len(json['users']) > 0
|
|
|
|
|
|
|
|
|
2014-10-30 17:26:02 +00:00
|
|
|
class TestUsageInformation(ApiTestCase):
|
|
|
|
def test_get_usage(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
json = self.getJsonResponse(UsageInformation)
|
|
|
|
|
|
|
|
assert 'usage' in json
|
|
|
|
assert 'allowed' in json
|
|
|
|
|
|
|
|
|
2014-05-12 19:22:58 +00:00
|
|
|
class TestSuperUserManagement(ApiTestCase):
|
|
|
|
def test_get_user(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
json = self.getJsonResponse(SuperUserManagement, params=dict(username = 'freshuser'))
|
|
|
|
self.assertEquals('freshuser', json['username'])
|
2014-08-18 21:24:00 +00:00
|
|
|
self.assertEquals('jschorr+test@devtable.com', json['email'])
|
2014-11-24 21:07:38 +00:00
|
|
|
self.assertEquals(False, json['super_user'])
|
2014-05-12 19:22:58 +00:00
|
|
|
|
|
|
|
def test_delete_user(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Verify the user exists.
|
|
|
|
json = self.getJsonResponse(SuperUserManagement, params=dict(username = 'freshuser'))
|
|
|
|
self.assertEquals('freshuser', json['username'])
|
|
|
|
|
|
|
|
# Delete the user.
|
|
|
|
self.deleteResponse(SuperUserManagement, params=dict(username = 'freshuser'), expected_code=204)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-05-12 19:22:58 +00:00
|
|
|
# Verify the user no longer exists.
|
|
|
|
self.getResponse(SuperUserManagement, params=dict(username = 'freshuser'), expected_code=404)
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-05-12 19:22:58 +00:00
|
|
|
|
|
|
|
def test_update_user(self):
|
|
|
|
self.login(ADMIN_ACCESS_USER)
|
|
|
|
|
|
|
|
# Verify the user exists.
|
|
|
|
json = self.getJsonResponse(SuperUserManagement, params=dict(username = 'freshuser'))
|
|
|
|
self.assertEquals('freshuser', json['username'])
|
2014-08-18 21:24:00 +00:00
|
|
|
self.assertEquals('jschorr+test@devtable.com', json['email'])
|
2014-05-12 19:22:58 +00:00
|
|
|
|
|
|
|
# Update the user.
|
|
|
|
self.putJsonResponse(SuperUserManagement, params=dict(username='freshuser'), data=dict(email='foo@bar.com'))
|
2014-11-24 21:07:38 +00:00
|
|
|
|
2014-05-12 19:22:58 +00:00
|
|
|
# Verify the user was updated.
|
|
|
|
json = self.getJsonResponse(SuperUserManagement, params=dict(username = 'freshuser'))
|
|
|
|
self.assertEquals('freshuser', json['username'])
|
|
|
|
self.assertEquals('foo@bar.com', json['email'])
|
|
|
|
|
|
|
|
|
2014-01-31 21:19:29 +00:00
|
|
|
if __name__ == '__main__':
|
|
|
|
unittest.main()
|