# -*- coding: utf-8 -*- import json from mock import patch from django.core.urlresolvers import reverse from seahub.test_utils import BaseTestCase from seahub.share.models import UploadLinkShare from seahub.api2.permissions import CanGenerateUploadLink try: from seahub.settings import LOCAL_PRO_DEV_ENV except ImportError: LOCAL_PRO_DEV_ENV = False class UploadLinksTest(BaseTestCase): def setUp(self): self.repo_id = self.repo.id self.folder_path= self.folder self.url = reverse('api-v2.1-upload-links') def tearDown(self): self.remove_repo() def _add_upload_link(self): upload_link = UploadLinkShare.objects.create_upload_link_share(self.user.username, self.repo.id, self.folder, None, None) return upload_link.token def _remove_upload_link(self, token): link = UploadLinkShare.objects.get(token=token) link.delete() def test_get_upload_link(self): self.login_as(self.user) token = self._add_upload_link() resp = self.client.get(self.url + '?path=' + self.folder_path + '&repo_id=' + self.repo_id) self.assertEqual(200, resp.status_code) json_resp = json.loads(resp.content) assert json_resp[0]['link'] is not None assert json_resp[0]['token'] is not None assert token in json_resp[0]['link'] assert 'u/d' in json_resp[0]['link'] assert token == json_resp[0]['token'] self._remove_upload_link(token) @patch.object(CanGenerateUploadLink, 'has_permission') def test_get_link_with_invalid_user_role_permission(self, mock_has_permission): self.login_as(self.user) mock_has_permission.return_value = False resp = self.client.get(self.url) self.assertEqual(403, resp.status_code) def test_create_upload_link(self): self.login_as(self.user) resp = self.client.post(self.url, {'path': self.folder_path, 'repo_id': self.repo_id}) self.assertEqual(200, resp.status_code) json_resp = json.loads(resp.content) assert json_resp['link'] is not None assert json_resp['token'] is not None assert json_resp['token'] in json_resp['link'] assert 'u/d' in json_resp['link'] self._remove_upload_link(json_resp['token']) @patch.object(CanGenerateUploadLink, 'has_permission') def test_create_link_with_invalid_user_role_permission(self, mock_has_permission): self.login_as(self.user) mock_has_permission.return_value = False resp = self.client.post(self.url, {'path': self.folder_path, 'repo_id': self.repo_id}) self.assertEqual(403, resp.status_code) def test_create_link_with_rw_permission_folder(self): if not LOCAL_PRO_DEV_ENV: return self.set_user_folder_rw_permission_to_admin() # login with admin to create upload link in user's repo self.login_as(self.admin) data = {'path': self.folder_path, 'repo_id': self.repo_id} resp = self.client.post(self.url, data) self.assertEqual(200, resp.status_code) def test_create_link_with_rw_permission_folder_in_group(self): self.share_repo_to_group_with_rw_permission() self.add_admin_to_group() # login with admin to create upload link in user's repo self.login_as(self.admin) data = {'path': self.folder_path, 'repo_id': self.repo_id} resp = self.client.post(self.url, data) self.assertEqual(200, resp.status_code) def test_can_not_create_link_with_r_permission_folder(self): if not LOCAL_PRO_DEV_ENV: return self.set_user_folder_r_permission_to_admin() # login with admin to create upload link in user's repo self.login_as(self.admin) data = {'path': self.folder_path, 'repo_id': self.repo_id} resp = self.client.post(self.url, data) self.assertEqual(403, resp.status_code) def test_can_not_create_link_with_r_permission_folder_in_group(self): self.share_repo_to_group_with_r_permission() self.add_admin_to_group() # login with admin to create upload link in user's repo self.login_as(self.admin) data = {'path': self.folder_path, 'repo_id': self.repo_id} resp = self.client.post(self.url, data) self.assertEqual(403, resp.status_code) def test_delete_upload_link(self): self.login_as(self.user) token = self._add_upload_link() url = reverse('api-v2.1-upload-link', args=[token]) resp = self.client.delete(url, {}, 'application/x-www-form-urlencoded') self.assertEqual(200, resp.status_code) json_resp = json.loads(resp.content) assert json_resp['success'] is True @patch.object(CanGenerateUploadLink, 'has_permission') def test_delete_link_with_invalid_user_role_permission(self, mock_has_permission): token = self._add_upload_link() self.login_as(self.user) mock_has_permission.return_value = False url = reverse('api-v2.1-upload-link', args=[token]) resp = self.client.delete(url, {}, 'application/x-www-form-urlencoded') self.assertEqual(403, resp.status_code) def test_delete_link_if_not_owner(self): self.login_as(self.admin) token = self._add_upload_link() url = reverse('api-v2.1-upload-link', args=[token]) resp = self.client.delete(url, {}, 'application/x-www-form-urlencoded') self.assertEqual(403, resp.status_code)