OpenDroneMap-WebODM/app/tests/test_api_admin.py

205 wiersze
8.3 KiB
Python

from django.contrib.auth.models import User, Group
from rest_framework import status
from rest_framework.test import APIClient
from rest_framework_jwt.settings import api_settings
from django.contrib.auth.hashers import check_password
from .classes import BootTestCase
from app.api.admin import UserSerializer, GroupSerializer
class TestApi(BootTestCase):
def setUp(self):
pass
def tearDown(self):
pass
def test_user(self):
##
## Super user operation
##
client = APIClient()
super_user_name = 'testsuperuser'
super_user_pass = 'test1234'
# Get token
res = client.post('/api/token-auth/', {
'username': super_user_name,
'password': super_user_pass,
})
self.assertEqual(res.status_code, status.HTTP_200_OK)
super_user_token = res.data['token']
client = APIClient(HTTP_AUTHORIZATION="{0} {1}".format(api_settings.JWT_AUTH_HEADER_PREFIX, super_user_token))
# Can create (active) user
res = client.post('/api/admin/users/', {'username': 'testuser999', 'email': 'testuser999@test.com', 'password': 'test999', 'is_active': True})
self.assertEqual(res.status_code, status.HTTP_201_CREATED)
user = User.objects.get(username='testuser999')
self.assertTrue(user != None)
self.assertFalse(user.is_superuser)
self.assertTrue(user.is_active)
# Can get user
created_user_id = user.id
res = client.get('/api/admin/users/{}/'.format(created_user_id))
self.assertEqual(res.status_code, status.HTTP_200_OK)
self.assertEqual(res.data['username'], user.username)
self.assertEqual(res.data['email'], user.email)
self.assertEqual(res.data['password'], user.password)
self.assertTrue(check_password('test999', user.password))
# Can update user
res = client.put('/api/admin/users/{}/'.format(created_user_id), {'username': 'testuser888', 'email': 'testuser888@test.com', 'password': 'test888'})
self.assertEqual(res.status_code, status.HTTP_200_OK)
user = User.objects.filter(id=created_user_id).first()
self.assertTrue(user != None and (not user.is_superuser))
res = client.get('/api/admin/users/{}/'.format(created_user_id)) # ReGet user
self.assertEqual(res.data['username'], user.username)
self.assertEqual(res.data['email'], user.email)
self.assertEqual(res.data['password'], user.password)
# Can find user by email
res = client.get('/api/admin/users/?email=testuser888@test.com')
self.assertEqual(res.status_code, status.HTTP_200_OK)
self.assertEqual(res.data['count'], 1)
result = res.data['results'][0]
self.assertEqual(result['id'], user.id)
self.assertEqual(result['username'], user.username)
self.assertEqual(result['email'], 'testuser888@test.com')
# Can delete user
res = client.delete('/api/admin/users/{}/'.format(created_user_id))
self.assertEqual(res.status_code, status.HTTP_204_NO_CONTENT)
user = User.objects.filter(id=created_user_id).first()
self.assertTrue(user is None)
##
## user operation
##
client = APIClient()
user_name = 'testuser'
user_pass = 'test1234'
# Get token
res = client.post('/api/token-auth/', {
'username': user_name,
'password': user_pass,
})
self.assertEqual(res.status_code, status.HTTP_200_OK)
user_token = res.data['token']
client = APIClient(HTTP_AUTHORIZATION="{0} {1}".format(api_settings.JWT_AUTH_HEADER_PREFIX, user_token))
# Can't create user
res = client.post('/api/admin/users/', {'username': 'testuser999', 'email': 'testuser999@test.com', 'password': 'test999', 'is_active': True})
self.assertEqual(res.status_code, status.HTTP_403_FORBIDDEN)
user = User.objects.filter(username='testuser999').first()
self.assertTrue(user is None)
user = User.objects.get(username=user_name)
# Can't get user
res = client.get('/api/admin/users/{}/'.format(user.id))
self.assertEqual(res.status_code, status.HTTP_403_FORBIDDEN)
# Can't update user
res = client.put('/api/admin/users/{}/'.format(user.id), {'password': 'changed'})
self.assertEqual(res.status_code, status.HTTP_403_FORBIDDEN)
# Can't delete user
res = client.delete('/api/admin/users/{}/'.format(user.id))
self.assertEqual(res.status_code, status.HTTP_403_FORBIDDEN)
def test_group(self):
##
## Super user operaiton
##
client = APIClient()
super_user_name = 'testsuperuser'
super_user_pass = 'test1234'
# Get token
res = client.post('/api/token-auth/', {
'username': super_user_name,
'password': super_user_pass,
})
self.assertEqual(res.status_code, status.HTTP_200_OK)
super_user_token = res.data['token']
client = APIClient(HTTP_AUTHORIZATION="{0} {1}".format(api_settings.JWT_AUTH_HEADER_PREFIX, super_user_token))
# Can create group
res = client.post('/api/admin/groups/', {'name': 'Test', 'permissions': [53, 54]})
self.assertEqual(res.status_code, status.HTTP_201_CREATED)
group = Group.objects.get(name='Test')
self.assertTrue(group != None)
serializer = GroupSerializer(group)
self.assertEqual([53, 54], serializer.data['permissions'])
# Can get group
created_group_id = group.id
res = client.get('/api/admin/groups/{}/'.format(created_group_id))
self.assertEqual(res.status_code, status.HTTP_200_OK)
self.assertEqual(res.data['name'], group.name)
# Can update group
res = client.put('/api/admin/groups/{}/'.format(created_group_id), {'name': 'TestTest', 'permissions': [37, 38]})
self.assertEqual(res.status_code, status.HTTP_200_OK)
group = Group.objects.filter(id=created_group_id).first()
self.assertTrue(group != None)
serializer = GroupSerializer(group)
res = client.get('/api/admin/groups/{}/'.format(created_group_id)) # ReGet group
self.assertEqual('TestTest', serializer.data['name'])
self.assertEqual([37, 38], serializer.data['permissions'])
# Can find group by name
res = client.get('/api/admin/groups/?name=TestTest')
self.assertEqual(res.status_code, status.HTTP_200_OK)
self.assertEqual(res.data['count'], 1)
result = res.data['results'][0]
self.assertEqual(result['id'], group.id)
self.assertEqual(result['name'], 'TestTest')
# Can delete group
res = client.delete('/api/admin/groups/{}/'.format(created_group_id))
self.assertTrue(res.status_code == status.HTTP_204_NO_CONTENT)
group = Group.objects.filter(id=created_group_id).first()
self.assertTrue(group is None)
##
## user operation
##
client = APIClient()
user_name = 'testuser'
user_pass = 'test1234'
# Get token
res = client.post('/api/token-auth/', {
'username': user_name,
'password': user_pass,
})
self.assertEqual(res.status_code, status.HTTP_200_OK)
user_token = res.data['token']
client = APIClient(HTTP_AUTHORIZATION="{0} {1}".format(api_settings.JWT_AUTH_HEADER_PREFIX, user_token))
# Can't create group
res = client.post('/api/admin/groups/', {'name': 'Test', 'permissions': [53, 54]})
self.assertEqual(res.status_code, status.HTTP_403_FORBIDDEN)
group = Group.objects.filter(name='Test').first()
self.assertTrue(group is None)
group = Group.objects.get(name='Default')
# Can't get group
res = client.get('/api/admin/groups/{}/'.format(group.id))
self.assertEqual(res.status_code, status.HTTP_403_FORBIDDEN)
# Can't update group
res = client.put('/api/admin/groups/{}/'.format(group.id), {'name': 'TestTest', 'permissions': [37, 38]})
self.assertEqual(res.status_code, status.HTTP_403_FORBIDDEN)
# Can't delete group
res = client.delete('/api/admin/groups/{}/'.format(group.id))
self.assertEqual(res.status_code, status.HTTP_403_FORBIDDEN)