From 8981fcab78e3ef04b77e18e79d4e0c47e969d07c Mon Sep 17 00:00:00 2001 From: Joseph Schorr Date: Wed, 19 Apr 2017 12:27:01 -0400 Subject: [PATCH] Make sure we don't internal error when signing is disabled --- endpoints/api/repository.py | 2 +- endpoints/api/test/test_repository.py | 11 ++++++++++- 2 files changed, 11 insertions(+), 2 deletions(-) diff --git a/endpoints/api/repository.py b/endpoints/api/repository.py index 9a3c5cc92..37f22b856 100644 --- a/endpoints/api/repository.py +++ b/endpoints/api/repository.py @@ -378,7 +378,7 @@ class Repository(RepositoryParamResource): 'is_organization': repo.namespace_user.organization, 'is_starred': is_starred, 'status_token': repo.badge_token if not is_public else '', - 'trust_enabled': features.SIGNING and repo.trust_enabled, + 'trust_enabled': bool(features.SIGNING) and repo.trust_enabled, } if stats is not None: diff --git a/endpoints/api/test/test_repository.py b/endpoints/api/test/test_repository.py index f686fd9e4..e3b3050b8 100644 --- a/endpoints/api/test/test_repository.py +++ b/endpoints/api/test/test_repository.py @@ -1,7 +1,8 @@ import pytest from endpoints.api.test.shared import client_with_identity, conduct_api_call -from endpoints.api.repository import RepositoryTrust +from endpoints.api.repository import RepositoryTrust, Repository +from features import FeatureNameValue from test.fixtures import app, appconfig, database_uri, init_db_path, sqlitedb_file from mock import patch, ANY, MagicMock @@ -40,3 +41,11 @@ def test_post_changetrust(trust_enabled, repo_found, expected_body, expected_sta params = {'repository': 'devtable/repo'} request_body = {'trust_enabled': trust_enabled} assert expected_body == conduct_api_call(cl, RepositoryTrust, 'POST', params, request_body, expected_status).json + + +def test_signing_disabled(client): + with patch('features.SIGNING', FeatureNameValue('SIGNING', False)): + with client_with_identity('devtable', client) as cl: + params = {'repository': 'devtable/simple'} + response = conduct_api_call(cl, Repository, 'GET', params).json + assert not response['trust_enabled']