1
0
mirror of https://github.com/haiwen/seahub.git synced 2025-09-01 23:20:51 +00:00

can set sub-path permission with admin (#1962)

* can set sub-path permission with admin

* fixup after rebase
This commit is contained in:
zMingGit
2018-05-18 13:46:43 +08:00
committed by llj
parent 8bf23d9e88
commit e387c92b99
7 changed files with 421 additions and 27 deletions

View File

@@ -22,6 +22,23 @@ class RepoUserFolderPermTest(BaseTestCase):
def tearDown(self):
self.remove_repo()
def share_repo_to_admin_with_admin_permission(self):
# share user's repo to admin with 'admin' permission
self.logout()
self.login_as(self.user)
share_url = reverse('api2-dir-shared-items', kwargs=dict(repo_id=self.repo.id))
data = "share_type=user&permission=admin&username=%s" % self.admin.username
self.client.put(share_url, data, 'application/x-www-form-urlencoded')
self.logout()
def share_repo_to_group_with_admin_permission(self):
self.logout()
self.login_as(self.user)
share_group_url = reverse('api2-dir-shared-items', kwargs=dict(repo_id=self.repo.id))
data = "share_type=group&permission=admin&group_id=%s" % self.group.id
self.client.put(share_group_url, data, 'application/x-www-form-urlencoded')
self.logout()
def test_can_get_folder_perm(self):
if not LOCAL_PRO_DEV_ENV:
@@ -41,6 +58,41 @@ class RepoUserFolderPermTest(BaseTestCase):
assert json_resp[0]['permission'] == self.perm_r
assert json_resp[0]['folder_path'] == self.user_folder_path
def test_can_get_folder_perm_with_admin(self):
if not LOCAL_PRO_DEV_ENV:
return
self.share_repo_to_admin_with_admin_permission()
self.login_as(self.admin)
seafile_api.add_folder_user_perm(self.user_repo_id,
self.user_folder_path, self.perm_r, self.admin_email)
resp = self.client.get(reverse("api2-repo-user-folder-perm", args=[self.user_repo_id]))
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert json_resp[0]['user_email'] == self.admin_email
assert json_resp[0]['repo_id'] == self.user_repo_id
assert json_resp[0]['permission'] == self.perm_r
assert json_resp[0]['folder_path'] == self.user_folder_path
def test_can_get_folder_perm_with_admin_group(self):
if not LOCAL_PRO_DEV_ENV:
return
self.share_repo_to_group_with_admin_permission()
self.add_admin_to_group()
self.login_as(self.admin)
seafile_api.add_folder_user_perm(self.user_repo_id,
self.user_folder_path, self.perm_r, self.admin_email)
resp = self.client.get(reverse("api2-repo-user-folder-perm", args=[self.user_repo_id]))
self.assertEqual(200, resp.status_code)
json_resp = json.loads(resp.content)
assert json_resp[0]['user_email'] == self.admin_email
assert json_resp[0]['repo_id'] == self.user_repo_id
assert json_resp[0]['permission'] == self.perm_r
assert json_resp[0]['folder_path'] == self.user_folder_path
def test_can_not_get_if_not_repo_owner(self):
self.login_as(self.admin)
resp = self.client.get(reverse("api2-repo-user-folder-perm", args=[self.user_repo_id]))
@@ -67,6 +119,41 @@ class RepoUserFolderPermTest(BaseTestCase):
json_resp = json.loads(resp.content)
assert json_resp[0]['permission'] == self.perm_rw
def test_can_modify_folder_perm_with_admin(self):
if not LOCAL_PRO_DEV_ENV:
return
self.share_repo_to_admin_with_admin_permission()
self.login_as(self.admin)
seafile_api.add_folder_user_perm(self.user_repo_id,
self.user_folder_path, self.perm_r, self.admin_email)
url = reverse("api2-repo-user-folder-perm", args=[self.user_repo_id])
data = 'user_email=%s&folder_path=%s&permission=%s' % (self.admin_email,
self.user_folder_path, self.perm_rw)
resp = self.client.put(url, data, 'application/x-www-form-urlencoded')
self.assertEqual(200, resp.status_code)
resp = self.client.get(reverse("api2-repo-user-folder-perm", args=[self.user_repo_id]))
json_resp = json.loads(resp.content)
assert json_resp[0]['permission'] == self.perm_rw
def test_can_modify_folder_perm_with_admin_group(self):
if not LOCAL_PRO_DEV_ENV:
return
self.share_repo_to_group_with_admin_permission()
self.add_admin_to_group()
self.login_as(self.admin)
seafile_api.add_folder_user_perm(self.user_repo_id,
self.user_folder_path, self.perm_r, self.admin_email)
url = reverse("api2-repo-user-folder-perm", args=[self.user_repo_id])
data = 'user_email=%s&folder_path=%s&permission=%s' % (self.admin_email,
self.user_folder_path, self.perm_rw)
resp = self.client.put(url, data, 'application/x-www-form-urlencoded')
self.assertEqual(200, resp.status_code)
resp = self.client.get(reverse("api2-repo-user-folder-perm", args=[self.user_repo_id]))
json_resp = json.loads(resp.content)
assert json_resp[0]['permission'] == self.perm_rw
def test_can_not_modify_if_not_repo_owner(self):
self.login_as(self.admin)
@@ -115,6 +202,53 @@ class RepoUserFolderPermTest(BaseTestCase):
assert json_resp[0]['permission'] == self.perm_rw
assert json_resp[0]['folder_path'] == self.user_folder_path
def test_can_add_folder_perm_with_admin(self):
if not LOCAL_PRO_DEV_ENV:
return
self.share_repo_to_admin_with_admin_permission()
self.login_as(self.admin)
url = reverse("api2-repo-user-folder-perm", args=[self.user_repo_id])
data = {
"user_email": self.admin_email,
"folder_path": self.user_folder_path,
"permission": self.perm_rw
}
resp = self.client.post(url, data)
self.assertEqual(200, resp.status_code)
resp = self.client.get(reverse("api2-repo-user-folder-perm", args=[self.user_repo_id]))
json_resp = json.loads(resp.content)
assert json_resp[0]['user_email'] == self.admin_email
assert json_resp[0]['repo_id'] == self.user_repo_id
assert json_resp[0]['permission'] == self.perm_rw
assert json_resp[0]['folder_path'] == self.user_folder_path
def test_can_add_folder_perm_with_admin_group(self):
if not LOCAL_PRO_DEV_ENV:
return
self.share_repo_to_group_with_admin_permission()
self.add_admin_to_group()
self.login_as(self.admin)
url = reverse("api2-repo-user-folder-perm", args=[self.user_repo_id])
data = {
"user_email": self.admin_email,
"folder_path": self.user_folder_path,
"permission": self.perm_rw
}
resp = self.client.post(url, data)
self.assertEqual(200, resp.status_code)
resp = self.client.get(reverse("api2-repo-user-folder-perm", args=[self.user_repo_id]))
json_resp = json.loads(resp.content)
assert json_resp[0]['user_email'] == self.admin_email
assert json_resp[0]['repo_id'] == self.user_repo_id
assert json_resp[0]['permission'] == self.perm_rw
assert json_resp[0]['folder_path'] == self.user_folder_path
def test_can_not_add_if_not_repo_owner(self):
self.login_as(self.admin)
@@ -174,6 +308,49 @@ class RepoUserFolderPermTest(BaseTestCase):
json_resp = json.loads(resp.content)
assert len(json_resp) == 0
def test_can_delete_folder_perm_with_admin(self):
if not LOCAL_PRO_DEV_ENV:
return
self.share_repo_to_admin_with_admin_permission()
self.login_as(self.admin)
seafile_api.add_folder_user_perm(self.user_repo_id,
self.user_folder_path, self.perm_r, self.admin_email)
resp = self.client.get(reverse("api2-repo-user-folder-perm", args=[self.user_repo_id]))
json_resp = json.loads(resp.content)
assert len(json_resp) == 1
url = reverse("api2-repo-user-folder-perm", args=[self.user_repo_id])
data = 'user_email=%s&folder_path=%s' % (self.admin_email, self.user_folder_path)
resp = self.client.delete(url, data, 'application/x-www-form-urlencoded')
self.assertEqual(200, resp.status_code)
resp = self.client.get(reverse("api2-repo-user-folder-perm", args=[self.user_repo_id]))
json_resp = json.loads(resp.content)
assert len(json_resp) == 0
def test_can_delete_folder_perm_with_admin_group(self):
if not LOCAL_PRO_DEV_ENV:
return
self.share_repo_to_group_with_admin_permission()
self.add_admin_to_group()
self.login_as(self.admin)
seafile_api.add_folder_user_perm(self.user_repo_id,
self.user_folder_path, self.perm_r, self.admin_email)
resp = self.client.get(reverse("api2-repo-user-folder-perm", args=[self.user_repo_id]))
json_resp = json.loads(resp.content)
assert len(json_resp) == 1
url = reverse("api2-repo-user-folder-perm", args=[self.user_repo_id])
data = 'user_email=%s&folder_path=%s' % (self.admin_email, self.user_folder_path)
resp = self.client.delete(url, data, 'application/x-www-form-urlencoded')
self.assertEqual(200, resp.status_code)
resp = self.client.get(reverse("api2-repo-user-folder-perm", args=[self.user_repo_id]))
json_resp = json.loads(resp.content)
assert len(json_resp) == 0
def test_can_not_delete_if_not_repo_owner(self):
self.login_as(self.admin)