1
0
mirror of https://github.com/haiwen/seahub.git synced 2025-08-02 07:47:32 +00:00
This commit is contained in:
zming 2017-12-22 11:41:07 +08:00
parent d621e79bba
commit 9adadb6e7d
2 changed files with 139 additions and 9 deletions

View File

@ -124,19 +124,15 @@ class InvitationsBatchView(APIView):
try:
User.objects.get(accepter)
user_exists = True
result['failed'].append({
'email': accepter,
'error_msg': _('User %s already exists.') % accepter
})
continue
except User.DoesNotExist:
user_exists = False
i = Invitation.objects.add(inviter=request.user.username,
accepter=accepter)
i.send_to(email=accepter)
result['success'].append(i.to_dict())
except User.DoesNotExist:
i = Invitation.objects.add(inviter=request.user.username,
accepter=accepter)
i.send_to(email=accepter)
result['success'].append(i.to_dict())
return Response(result)

View File

@ -113,3 +113,137 @@ class InvitationsTest(BaseTestCase):
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert len(json_resp) == 2
class BatchInvitationsTest(BaseTestCase):
def setUp(self):
self.login_as(self.user)
self.endpoint = '/api/v2.1/invitations/batch/'
self.username = self.user.username
@patch.object(CanInviteGuest, 'has_permission')
@patch.object(UserPermissions, 'can_invite_guest')
def test_can_add_with_batch(self, mock_can_invite_guest, mock_has_permission):
mock_can_invite_guest.return_val = True
mock_has_permission.return_val = True
assert len(Invitation.objects.all()) == 0
resp = self.client.post(self.endpoint, {
'type': 'guest',
'accepter': ['some_random_user@1.com', 'some_random_user@2.com'],
})
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert self.username == json_resp['success'][0]['inviter']
assert 'some_random_user@1.com' == json_resp['success'][0]['accepter']
assert 'some_random_user@2.com' == json_resp['success'][1]['accepter']
assert json_resp['success'][0]['expire_time'] is not None
assert len(Invitation.objects.all()) == 2
@patch.object(CanInviteGuest, 'has_permission')
@patch.object(UserPermissions, 'can_invite_guest')
def test_can_not_add_same_email_with_batch(self, mock_can_invite_guest, mock_has_permission):
mock_can_invite_guest.return_val = True
mock_has_permission.return_val = True
assert len(Invitation.objects.all()) == 0
resp = self.client.post(self.endpoint, {
'type': 'guest',
'accepter': ['some_random_user@1.com', 'some_random_user@2.com'],
})
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert self.username == json_resp['success'][0]['inviter']
assert 'some_random_user@1.com' == json_resp['success'][0]['accepter']
assert 'some_random_user@2.com' == json_resp['success'][1]['accepter']
assert json_resp['success'][0]['expire_time'] is not None
resp = self.client.post(self.endpoint, {
'type': 'guest',
'accepter': ['some_random_user@1.com', 'some_random_user@2.com'],
})
json_resp = json.loads(resp.content)
assert 'some_random_user@1.com' == json_resp['failed'][0]['email']
assert 'some_random_user@2.com' == json_resp['failed'][1]['email']
assert 'already invited' in json_resp['failed'][0]['error_msg']
assert 'already invited' in json_resp['failed'][1]['error_msg']
@override_settings(INVITATION_ACCEPTER_BLACKLIST=["*@2-1.com", "*@1-1.com", r".*@(foo|bar).com"])
@patch.object(CanInviteGuest, 'has_permission')
@patch.object(UserPermissions, 'can_invite_guest')
def test_can_not_add_blocked_email(self, mock_can_invite_guest, mock_has_permission):
mock_can_invite_guest.return_val = True
mock_has_permission.return_val = True
assert len(Invitation.objects.all()) == 0
resp = self.client.post(self.endpoint, {
'type': 'guest',
'accepter': ['some_random_user@1-1.com', 'some_random_user@2-1.com'],
})
assert len(Invitation.objects.all()) == 0
json_resp = json.loads(resp.content)
assert 'some_random_user@1-1.com' == json_resp['failed'][0]['email']
assert 'some_random_user@2-1.com' == json_resp['failed'][1]['email']
assert 'The email address is not allowed to be invited as a guest.' == json_resp['failed'][0]['error_msg']
assert 'The email address is not allowed to be invited as a guest.' == json_resp['failed'][1]['error_msg']
@patch.object(CanInviteGuest, 'has_permission')
@patch.object(UserPermissions, 'can_invite_guest')
def test_can_send_mail(self, mock_can_invite_guest, mock_has_permission):
mock_can_invite_guest.return_val = True
mock_has_permission.return_val = True
self.assertEqual(len(Email.objects.all()), 0)
resp = self.client.post(self.endpoint, {
'type': 'guest',
'accepter': ['some_random_user@1.com', 'some_random_user@2.com'],
})
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
self.assertEqual(len(Email.objects.all()), 2)
self.assertRegexpMatches(Email.objects.all()[0].html_message,
json_resp['success'][0]['token'])
self.assertRegexpMatches(Email.objects.all()[1].html_message,
json_resp['success'][1]['token'])
assert Email.objects.all()[0].status == 0
assert Email.objects.all()[1].status == 0
def test_without_permission(self):
self.logout()
resp = self.client.post(self.endpoint, {
'type': 'guest',
'accepter': ['some_random_user@1-1.com', 'some_random_user@2-1.com'],
})
json_resp = json.loads(resp.content)
assert len(Invitation.objects.all()) == 0
self.assertEqual(403, resp.status_code)
assert 'Authentication credentials were not provided.' == json_resp['detail']
@patch.object(CanInviteGuest, 'has_permission')
@patch.object(UserPermissions, 'can_invite_guest')
def test_with_invalid_email(self, mock_can_invite_guest, mock_has_permission):
mock_can_invite_guest.return_val = True
mock_has_permission.return_val = True
resp = self.client.post(self.endpoint, {
'type': 'guest',
'accepter': ['some_random _user@1-1.com', 's ome_random_user@2-1.com'],
})
json_resp = json.loads(resp.content)
assert len(Invitation.objects.all()) == 0
assert 'some_random _user@1-1.com' == json_resp['failed'][0]['email']
assert 's ome_random_user@2-1.com' == json_resp['failed'][1]['email']
assert 'invalid.' in json_resp['failed'][0]['error_msg']
assert 'invalid.' in json_resp['failed'][0]['error_msg']