mirror of
https://github.com/ae-utbm/sith.git
synced 2024-12-26 01:31:16 +00:00
add tests
This commit is contained in:
parent
191b05c305
commit
043dcfb283
29
sas/api.py
29
sas/api.py
@ -5,13 +5,9 @@ from ninja_extra.exceptions import PermissionDenied
|
||||
from ninja_extra.permissions import IsAuthenticated
|
||||
from pydantic import NonNegativeInt
|
||||
|
||||
from core.api_permissions import IsOldSubscriber
|
||||
from core.models import User
|
||||
from sas.models import PeoplePictureRelation, Picture
|
||||
from sas.schemas import (
|
||||
PictureFilterSchema,
|
||||
PictureSchema,
|
||||
)
|
||||
from sas.schemas import PictureFilterSchema, PictureSchema
|
||||
|
||||
|
||||
@api_controller("/sas/picture")
|
||||
@ -28,11 +24,17 @@ class PicturesController(ControllerBase):
|
||||
A user with an active subscription can see any picture, as long
|
||||
as it has been moderated and not asked for removal.
|
||||
An unsubscribed user can see the pictures he has been identified on
|
||||
(only the moderated ones, too)
|
||||
(only the moderated ones, too).
|
||||
|
||||
Notes:
|
||||
Trying to fetch the pictures of another user with this route
|
||||
while being unsubscribed will just result in an empty response.
|
||||
|
||||
Notes:
|
||||
Unsubscribed users who are identified is not a rare case.
|
||||
They can be UTT students, faluchards from other schools,
|
||||
or even Richard Stallman (that ain't no joke,
|
||||
cf. https://ae.utbm.fr/user/32663/pictures/)
|
||||
"""
|
||||
user: User = self.context.request.user
|
||||
if not user.is_subscribed and filters.users_identified != {user.id}:
|
||||
@ -53,14 +55,17 @@ class PicturesController(ControllerBase):
|
||||
return pictures
|
||||
|
||||
|
||||
@api_controller("/sas/relation")
|
||||
@api_controller("/sas/relation", tags="User identification on SAS pictures")
|
||||
class UsersIdentifiedController(ControllerBase):
|
||||
@route.delete("/{relation_id}", permissions=[IsOldSubscriber])
|
||||
@route.delete("/{relation_id}", permissions=[IsAuthenticated])
|
||||
def delete_relation(self, relation_id: NonNegativeInt):
|
||||
relation: PeoplePictureRelation = self.get_object_or_exception(
|
||||
PeoplePictureRelation, pk=relation_id
|
||||
)
|
||||
user = self.context.request.user
|
||||
"""Untag a user from a SAS picture.
|
||||
|
||||
Root and SAS admins can delete any picture identification.
|
||||
All other users can delete their own identification.
|
||||
"""
|
||||
relation = self.get_object_or_exception(PeoplePictureRelation, pk=relation_id)
|
||||
user: User = self.context.request.user
|
||||
if (
|
||||
relation.user_id != user.id
|
||||
and not user.is_root
|
||||
|
@ -1,10 +1,12 @@
|
||||
from django.conf import settings
|
||||
from django.db import transaction
|
||||
from django.test import TestCase
|
||||
from django.urls import reverse
|
||||
from model_bakery import baker
|
||||
from model_bakery.recipe import Recipe
|
||||
|
||||
from core.baker_recipes import old_subscriber_user, subscriber_user
|
||||
from core.models import User
|
||||
from core.models import RealGroup, User
|
||||
from sas.models import Album, PeoplePictureRelation, Picture
|
||||
|
||||
|
||||
@ -32,6 +34,8 @@ class TestSas(TestCase):
|
||||
baker.make(PeoplePictureRelation, picture=pictures[4], user=cls.user_b)
|
||||
baker.make(PeoplePictureRelation, picture=pictures[4], user=cls.user_c)
|
||||
|
||||
|
||||
class TestPictureSearch(TestSas):
|
||||
def test_anonymous_user_forbidden(self):
|
||||
res = self.client.get(reverse("api:pictures"))
|
||||
assert res.status_code == 403
|
||||
@ -101,3 +105,49 @@ class TestSas(TestCase):
|
||||
+ f"?users_identified={self.user_a.id}&users_identified={self.user_b.id}"
|
||||
)
|
||||
assert res.status_code == 403
|
||||
|
||||
|
||||
class TestPictureRelation(TestSas):
|
||||
def test_delete_relation_route_forbidden(self):
|
||||
"""Test that unauthorized users are properly 403ed"""
|
||||
# take a picture where user_a isn't identified
|
||||
relation = PeoplePictureRelation.objects.exclude(user=self.user_a).first()
|
||||
|
||||
res = self.client.delete(f"/api/sas/relation/{relation.id}")
|
||||
assert res.status_code == 403
|
||||
|
||||
for user in baker.make(User), self.user_a:
|
||||
self.client.force_login(user)
|
||||
res = self.client.delete(f"/api/sas/relation/{relation.id}")
|
||||
assert res.status_code == 403
|
||||
|
||||
def test_delete_relation_with_authorized_users(self):
|
||||
"""Test that deletion works as intended when called by an authorized user."""
|
||||
relation: PeoplePictureRelation = self.user_a.pictures.first()
|
||||
sas_admin_group = RealGroup.objects.get(pk=settings.SITH_GROUP_SAS_ADMIN_ID)
|
||||
sas_admin = baker.make(User, groups=[sas_admin_group])
|
||||
root = baker.make(User, is_superuser=True)
|
||||
for user in sas_admin, root, self.user_a:
|
||||
with transaction.atomic():
|
||||
self.client.force_login(user)
|
||||
res = self.client.delete(f"/api/sas/relation/{relation.id}")
|
||||
assert res.status_code == 200
|
||||
assert not PeoplePictureRelation.objects.filter(pk=relation.id).exists()
|
||||
transaction.set_rollback(True)
|
||||
public = baker.make(User)
|
||||
relation = public.pictures.create(picture=relation.picture)
|
||||
self.client.force_login(public)
|
||||
res = self.client.delete(f"/api/sas/relation/{relation.id}")
|
||||
assert res.status_code == 200
|
||||
assert not PeoplePictureRelation.objects.filter(pk=relation.id).exists()
|
||||
|
||||
def test_delete_twice(self):
|
||||
"""Test a duplicate call on the delete route."""
|
||||
self.client.force_login(baker.make(User, is_superuser=True))
|
||||
relation = PeoplePictureRelation.objects.first()
|
||||
res = self.client.delete(f"/api/sas/relation/{relation.id}")
|
||||
assert res.status_code == 200
|
||||
relation_count = PeoplePictureRelation.objects.count()
|
||||
res = self.client.delete(f"/api/sas/relation/{relation.id}")
|
||||
assert res.status_code == 404
|
||||
assert PeoplePictureRelation.objects.count() == relation_count
|
||||
|
Loading…
Reference in New Issue
Block a user