gestioCOF/gestion/tests.py
2017-10-26 15:11:11 +02:00

194 lines
6.8 KiB
Python

# -*- coding: utf-8 -*-
from unittest.mock import patch
from django.contrib.auth import get_user_model
from django.contrib.auth.models import Permission
from django.db.utils import IntegrityError
from django.test import Client, TestCase
from bds.models import get_bds_assoc
from cof.models import get_cof_assoc
from .models import Profile
User = get_user_model()
def create_profile(username):
"""
In order to create a profile, I need to create a User first.
This is annoying in most situations, as I just want a profile.
"""
User.objects.create(username=username,
first_name=username.title(),
last_name=username.title())
p, = Profile.objects.filter(user__username=username)
return p
class SimpleTest(TestCase):
def test_delete_user(self):
u = User(username='foo', first_name='foo', last_name='bar')
# to each user there's a cofprofile associated
u.save()
self.assertTrue(Profile.objects.filter(user__username='foo').exists())
# there's no point in having a cofprofile without a user associated.
u.delete()
self.assertFalse(Profile.objects.filter(user__username='foo').exists())
# there's no point in having a user without a cofprofile associated.
u.save()
Profile.objects.get(user__username='foo').delete()
self.assertFalse(User.objects.filter(username='foo').exists())
def test_create_profiles(self):
from kfet.models import Account
from cof.models import CofProfile
# test that two accounts can be linked to the same profile.
p = create_profile('foo')
pkfet = Account.objects.create(profile=p, trigramme='PIG')
pcof = CofProfile.objects.create(profile=p)
self.assertEqual(pkfet.profile, pcof.profile)
# each profile is linked to at most one account of the same type.
p1 = create_profile('bar')
p2 = create_profile('baz')
Account.objects.create(profile=p1, trigramme='BAR')
CofProfile.objects.create(profile=p2)
Account.objects.create(profile=p2, trigramme='BAZ')
self.assertRaises(IntegrityError,
CofProfile.objects.create, profile=p2)
class TestProfile(TestCase):
@patch('kfet.auth.signals.messages')
def test_profile(self, mock_messages):
# Test that the root user can log in
User.objects.create_superuser('root', 'foo@bar.com', 'root')
c = Client()
c.login(username='root', password='root')
response = c.get('/')
self.assertEqual(response.status_code, 200)
# Test the profile edition
post_data = {
"first_name": "foo",
"last_name": "bar",
"phone": "0123456789",
"departement": "baz",
"occupation": "1A",
}
r = c.post("/profile/edit/", post_data)
self.assertRedirects(r, "/profile/")
user = User.objects.get(username="root")
self.assertEqual(user.first_name, post_data['first_name'])
self.assertEqual(user.last_name, post_data["last_name"])
self.assertEqual(user.profile.phone, post_data["phone"])
self.assertEqual(user.profile.departement, post_data["departement"])
self.assertEqual(user.profile.occupation, post_data["occupation"])
class AuthTest(TestCase):
def test_login(self):
client = Client()
# Setup a regular Django user
user = User.objects.create(username="foo")
user.set_password("bar")
user.save()
# Test the django auth
resp = client.post(
"/outsider/login",
{"username": "foo", "password": "bar"},
follow=True
)
self.assertEqual(resp.status_code, 200)
resp = client.get("/logout")
self.assertEqual(resp.status_code, 200)
# Give the user a clipper login
user.profile.login_clipper = "foo"
user.profile.save()
# Assert that it cannot use the regular auth
resp = client.post(
"/outsider/login",
{"username": "foo", "password": "bar"}
)
self.assertIn("error_type", resp.context)
self.assertEqual(resp.context["error_type"], "use_clipper_login")
# Test the CAS redirect
resp = client.get("/cas/login")
self.assertEqual(resp.status_code, 302)
self.assertEqual(
resp.url.split('?')[0],
"https://cas.eleves.ens.fr/login"
)
class AssociationTests(TestCase):
def setUp(self):
self.custommail_p = Permission.objects.filter(
content_type__app_label="custommail",
codename__in=["add_custommail", "change_custommail"]
)
def assertAllAppPerms(self, group, app_label):
group_p = group.permissions.all()
app_p = Permission.objects.filter(
content_type__app_label=app_label,
)
for perm in app_p:
self.assertIn(perm, group_p)
def test_cof_assoc(self):
cof_assoc = get_cof_assoc()
# Check cof buro group has 'cof.buro' permission.
buro_perm = Permission.objects.get(
content_type__app_label='cof',
codename='buro',
)
self.assertIn(buro_perm, cof_assoc.staff_group.permissions.all())
# Check cof buro group has all permissions of 'gestion' and 'cof' apps.
self.assertAllAppPerms(cof_assoc.staff_group, 'cof')
self.assertAllAppPerms(cof_assoc.staff_group, 'gestion')
# + some permissions in custommail
for p in self.custommail_p:
self.assertIn(p, cof_assoc.staff_group.permissions.all())
# Check cof members group has 'cof.member' permission.
member_perm = Permission.objects.get(
content_type__app_label='cof',
codename='member',
)
self.assertIn(member_perm, cof_assoc.members_group.permissions.all())
def test_bds_assoc(self):
bds_assoc = get_bds_assoc()
# Check cof buro group has 'bds.buro' permission.
buro_perm = Permission.objects.get(
content_type__app_label='bds',
codename='buro',
)
self.assertIn(buro_perm, bds_assoc.staff_group.permissions.all())
# Check bds buro group has all permissions of 'gestion' and 'bds' apps.
self.assertAllAppPerms(bds_assoc.staff_group, 'bds')
self.assertAllAppPerms(bds_assoc.staff_group, 'gestion')
# + some permissions in custommail
for p in self.custommail_p:
self.assertIn(p, bds_assoc.staff_group.permissions.all())
# Check cof members group has 'bds.member' permission.
member_perm = Permission.objects.get(
content_type__app_label='bds',
codename='member',
)
self.assertIn(member_perm, bds_assoc.members_group.permissions.all())