blob: 1b8575b8aca2c126735cd95835a56791825f2f3f [file] [log] [blame]
# Copyright 2016 The Chromium Authors. All rights reserved.
# Use of this source code is govered by a BSD-style
# license that can be found in the LICENSE file or at
# https://developers.google.com/open-source/licenses/bsd
"""Unit test for User Group creation servlet."""
import unittest
import settings
from framework import permissions
from proto import site_pb2
from proto import usergroup_pb2
from services import service_manager
from sitewide import groupcreate
from testing import fake
from testing import testing_helpers
class GroupCreateTest(unittest.TestCase):
"""Tests for the GroupCreate servlet."""
def setUp(self):
self.services = service_manager.Services(
user=fake.UserService(),
usergroup=fake.UserGroupService(),
project=fake.ProjectService())
self.servlet = groupcreate.GroupCreate(
'req', 'res', services=self.services)
self.mr = testing_helpers.MakeMonorailRequest()
def CheckAssertBasePermissions(
self, restriction, expect_admin_ok, expect_nonadmin_ok):
old_group_creation_restriction = settings.group_creation_restriction
settings.group_creation_restriction = restriction
# Anon users can never do it
mr = testing_helpers.MakeMonorailRequest(
perms=permissions.GetPermissions(None, {}, None))
self.assertRaises(
permissions.PermissionException,
self.servlet.AssertBasePermission, mr)
mr = testing_helpers.MakeMonorailRequest()
if expect_admin_ok:
self.servlet.AssertBasePermission(mr)
else:
self.assertRaises(
permissions.PermissionException,
self.servlet.AssertBasePermission, mr)
mr = testing_helpers.MakeMonorailRequest(
perms=permissions.GetPermissions(mr.auth.user_pb, {111L}, None))
if expect_nonadmin_ok:
self.servlet.AssertBasePermission(mr)
else:
self.assertRaises(
permissions.PermissionException,
self.servlet.AssertBasePermission, mr)
settings.group_creation_restriction = old_group_creation_restriction
def testAssertBasePermission(self):
self.CheckAssertBasePermissions(
site_pb2.UserTypeRestriction.ANYONE, True, True)
self.CheckAssertBasePermissions(
site_pb2.UserTypeRestriction.ADMIN_ONLY, True, False)
self.CheckAssertBasePermissions(
site_pb2.UserTypeRestriction.NO_ONE, False, False)
def testGatherPageData(self):
page_data = self.servlet.GatherPageData(self.mr)
self.assertEqual('', page_data['initial_name'])
def testProcessFormData_Normal(self):
post_data = fake.PostData(
groupname=['group@example.com'], visibility='1')
url = self.servlet.ProcessFormData(self.mr, post_data)
self.assertIn('/g/3444127190/', url)
group_id = self.services.user.LookupUserID('cnxn', 'group@example.com')
group_settings = self.services.usergroup.GetGroupSettings('cnxn', group_id)
self.assertIsNotNone(group_settings)
members_after, owners_after = self.services.usergroup.LookupMembers(
'cnxn', [group_id])
self.assertEqual(0, len(members_after[group_id] + owners_after[group_id]))
def testProcessFormData_Import(self):
post_data = fake.PostData(
groupname=['group@example.com'], group_type='1',
import_group=['on'])
self.servlet.ProcessFormData(self.mr, post_data)
group_id = self.services.user.LookupUserID('cnxn', 'group@example.com')
group_settings = self.services.usergroup.GetGroupSettings('cnxn', group_id)
self.assertIsNotNone(group_settings)
self.assertEqual(usergroup_pb2.MemberVisibility.OWNERS,
group_settings.who_can_view_members)
self.assertEqual(usergroup_pb2.GroupType.MDB,
group_settings.ext_group_type)
if __name__ == '__main__':
unittest.main()