1
0
mirror of https://github.com/haiwen/seahub.git synced 2025-07-13 15:05:30 +00:00
seahub/tests/api/endpoints/admin/test_logs.py

293 lines
9.2 KiB
Python
Raw Normal View History

2017-03-23 07:05:47 +00:00
import json
import time
import datetime
2017-03-24 10:12:27 +00:00
from mock import patch
2017-03-23 07:05:47 +00:00
from seaserv import ccnet_api
2020-07-27 06:59:18 +00:00
from django.urls import reverse
2017-03-23 07:05:47 +00:00
from seahub.test_utils import BaseTestCase
from tests.common.utils import randstring
2020-07-27 06:59:18 +00:00
from django.urls import reverse
from seahub.test_utils import BaseTestCase
try:
from seahub.settings import LOCAL_PRO_DEV_ENV
except ImportError:
LOCAL_PRO_DEV_ENV = False
2017-03-23 07:05:47 +00:00
class LogsTest(BaseTestCase):
def setUp(self):
self.login_as(self.admin)
self.user_name = self.user.username
self.admin_name = self.admin.username
self.group_id = self.group.id
self.repo_id= self.repo.repo_id
self.new_user = '%s@%s.com' % (randstring(6), randstring(6))
self.library_url = reverse('api-v2.1-admin-library', args=[self.repo_id])
2017-09-09 07:27:04 +00:00
self.admin_log_url = reverse('api-v2.1-admin-admin-operation-logs')
2017-03-23 07:05:47 +00:00
def tearDown(self):
self.remove_group()
self.remove_repo()
2017-03-24 10:12:27 +00:00
@patch('seahub.api2.permissions.IsProVersion.has_permission')
def test_create_group(self, mock_has_permission):
2017-03-23 07:05:47 +00:00
2017-03-24 10:12:27 +00:00
mock_has_permission.return_value = True
2017-03-23 07:05:47 +00:00
# admin create group
url = reverse('api-v2.1-admin-groups')
group_name = randstring(10)
data = {
'group_name': group_name,
'group_owner': self.user.email
}
resp = self.client.post(url, data)
json_resp = json.loads(resp.content)
group_id = json_resp['id']
2017-03-23 07:05:47 +00:00
self.assertEqual(201, resp.status_code)
# get admin log
resp = self.client.get(self.admin_log_url)
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert json_resp['total_count'] == 1
assert json_resp['data'][0]['operation'] == 'group_create'
self.remove_group(group_id)
@patch('seahub.api2.permissions.IsProVersion.has_permission')
def test_transfer_group(self, mock_has_permission):
2017-03-23 07:05:47 +00:00
# admin transfer group
url = reverse('api-v2.1-admin-group', args=[self.group_id])
data = 'new_owner=%s' % self.admin_name
resp = self.client.put(url, data, 'application/x-www-form-urlencoded')
self.assertEqual(200, resp.status_code)
# get admin log
resp = self.client.get(self.admin_log_url)
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert json_resp['total_count'] == 1
assert json_resp['data'][0]['operation'] == 'group_transfer'
@patch('seahub.api2.permissions.IsProVersion.has_permission')
def test_delete_group(self, mock_has_permission):
2017-03-23 07:05:47 +00:00
# admin delete group
url = reverse('api-v2.1-admin-group', args=[self.group_id])
resp = self.client.delete(url)
self.assertEqual(200, resp.status_code)
# get admin log
resp = self.client.get(self.admin_log_url)
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert json_resp['total_count'] == 1
assert json_resp['data'][0]['operation'] == 'group_delete'
@patch('seahub.api2.permissions.IsProVersion.has_permission')
def test_create_user(self, mock_has_permission):
2017-03-23 07:05:47 +00:00
# admin create user
resp = self.client.post(
reverse('user_add',), {
'email': self.new_user,
'password1': '123',
'password2': '123',
}, HTTP_X_REQUESTED_WITH='XMLHttpRequest'
)
self.assertEqual(200, resp.status_code)
# get admin log
resp = self.client.get(self.admin_log_url)
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert json_resp['total_count'] == 1
assert json_resp['data'][0]['operation'] == 'user_add'
@patch('seahub.api2.permissions.IsProVersion.has_permission')
def test_delete_user(self, mock_has_permission):
# create a tmp user first
ccnet_api.add_emailuser(self.new_user, 'password', 0, 1)
2017-03-23 07:05:47 +00:00
# admin delete user
resp = self.client.post(
reverse('user_remove', args=[self.new_user])
)
self.assertEqual(302, resp.status_code)
# get admin log
resp = self.client.get(self.admin_log_url)
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert json_resp['total_count'] == 1
assert json_resp['data'][0]['operation'] == 'user_delete'
@patch('seahub.api2.permissions.IsProVersion.has_permission')
def test_transfer_library(self, mock_has_permission):
2017-03-23 07:05:47 +00:00
# admin transfer library
data = 'owner=%s' % self.admin_name
resp = self.client.put(self.library_url, data, 'application/x-www-form-urlencoded')
self.assertEqual(200, resp.status_code)
# get admin log
resp = self.client.get(self.admin_log_url)
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert json_resp['total_count'] == 1
assert json_resp['data'][0]['operation'] == 'repo_transfer'
@patch('seahub.api2.permissions.IsProVersion.has_permission')
def test_create_library(self, mock_has_permission):
# admin create library
url = reverse('api-v2.1-admin-libraries')
repo_name = randstring(10)
data = {
'name': repo_name,
'owner': self.user.email
}
resp = self.client.post(url, data)
json_resp = json.loads(resp.content)
repo_id = json_resp['id']
self.assertEqual(200, resp.status_code)
# get admin log
resp = self.client.get(self.admin_log_url)
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert json_resp['total_count'] == 1
assert json_resp['data'][0]['operation'] == 'repo_create'
self.remove_repo(repo_id)
@patch('seahub.api2.permissions.IsProVersion.has_permission')
def test_delete_library(self, mock_has_permission):
2017-03-23 07:05:47 +00:00
# admin delete library
resp = self.client.delete(self.library_url)
self.assertEqual(200, resp.status_code)
# get admin log
resp = self.client.get(self.admin_log_url)
2017-03-23 07:05:47 +00:00
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert json_resp['total_count'] == 1
assert json_resp['data'][0]['operation'] == 'repo_delete'
class AdminLogsLoginTest(BaseTestCase):
def test_get_login_logs(self):
if not LOCAL_PRO_DEV_ENV:
return
self.login_as(self.admin)
url = reverse('api-v2.1-admin-logs-login-logs')
resp = self.client.get(url)
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert type(json_resp['login_log_list']) is list
def test_get_login_logs_permision_denied(self):
if not LOCAL_PRO_DEV_ENV:
return
self.login_as(self.user)
url = reverse('api-v2.1-admin-logs-login-logs')
resp = self.client.get(url)
self.assertEqual(403, resp.status_code)
class AdminLogsFileAccessTest(BaseTestCase):
def test_get_file_access_logs(self):
if not LOCAL_PRO_DEV_ENV:
return
self.login_as(self.admin)
url = reverse('api-v2.1-admin-logs-file-access-logs')
resp = self.client.get(url)
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert type(json_resp['file_access_log_list']) is list
def test_get_file_access_logspermision_denied(self):
if not LOCAL_PRO_DEV_ENV:
return
self.login_as(self.user)
url = reverse('api-v2.1-admin-logs-file-access-logs')
resp = self.client.get(url)
self.assertEqual(403, resp.status_code)
class AdminLogsFileUpdateTest(BaseTestCase):
def test_get_file_update_logs(self):
if not LOCAL_PRO_DEV_ENV:
return
self.login_as(self.admin)
url = reverse('api-v2.1-admin-logs-file-update-logs')
resp = self.client.get(url)
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert type(json_resp['file_update_log_list']) is list
def test_get_file_update_logs_permision_denied(self):
if not LOCAL_PRO_DEV_ENV:
return
self.login_as(self.user)
url = reverse('api-v2.1-admin-logs-file-update-logs')
resp = self.client.get(url)
self.assertEqual(403, resp.status_code)
class AdminLogsSharePermissionTest(BaseTestCase):
def test_get_share_permission_logs(self):
if not LOCAL_PRO_DEV_ENV:
return
self.login_as(self.admin)
url = reverse('api-v2.1-admin-logs-share-permission-logs')
resp = self.client.get(url)
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert type(json_resp['share_permission_log_list']) is list
def test_get_share_permission_logs_permision_denied(self):
if not LOCAL_PRO_DEV_ENV:
return
self.login_as(self.user)
url = reverse('api-v2.1-admin-logs-share-permission-logs')
resp = self.client.get(url)
self.assertEqual(403, resp.status_code)