mirror of
https://github.com/haiwen/seahub.git
synced 2025-07-13 06:55:59 +00:00
293 lines
9.2 KiB
Python
293 lines
9.2 KiB
Python
import json
|
|
import time
|
|
import datetime
|
|
from mock import patch
|
|
|
|
from seaserv import ccnet_api
|
|
from django.urls import reverse
|
|
from seahub.test_utils import BaseTestCase
|
|
from tests.common.utils import randstring
|
|
|
|
|
|
from django.urls import reverse
|
|
from seahub.test_utils import BaseTestCase
|
|
|
|
try:
|
|
from seahub.settings import LOCAL_PRO_DEV_ENV
|
|
except ImportError:
|
|
LOCAL_PRO_DEV_ENV = False
|
|
|
|
class LogsTest(BaseTestCase):
|
|
|
|
def setUp(self):
|
|
self.login_as(self.admin)
|
|
self.user_name = self.user.username
|
|
self.admin_name = self.admin.username
|
|
|
|
self.group_id = self.group.id
|
|
self.repo_id= self.repo.repo_id
|
|
self.new_user = '%s@%s.com' % (randstring(6), randstring(6))
|
|
self.library_url = reverse('api-v2.1-admin-library', args=[self.repo_id])
|
|
self.admin_log_url = reverse('api-v2.1-admin-admin-operation-logs')
|
|
|
|
def tearDown(self):
|
|
self.remove_group()
|
|
self.remove_repo()
|
|
|
|
@patch('seahub.api2.permissions.IsProVersion.has_permission')
|
|
def test_create_group(self, mock_has_permission):
|
|
|
|
mock_has_permission.return_value = True
|
|
|
|
# admin create group
|
|
url = reverse('api-v2.1-admin-groups')
|
|
group_name = randstring(10)
|
|
data = {
|
|
'group_name': group_name,
|
|
'group_owner': self.user.email
|
|
}
|
|
resp = self.client.post(url, data)
|
|
json_resp = json.loads(resp.content)
|
|
group_id = json_resp['id']
|
|
self.assertEqual(201, resp.status_code)
|
|
|
|
# get admin log
|
|
resp = self.client.get(self.admin_log_url)
|
|
self.assertEqual(200, resp.status_code)
|
|
json_resp = json.loads(resp.content)
|
|
|
|
assert json_resp['total_count'] == 1
|
|
assert json_resp['data'][0]['operation'] == 'group_create'
|
|
|
|
self.remove_group(group_id)
|
|
|
|
@patch('seahub.api2.permissions.IsProVersion.has_permission')
|
|
def test_transfer_group(self, mock_has_permission):
|
|
|
|
# admin transfer group
|
|
url = reverse('api-v2.1-admin-group', args=[self.group_id])
|
|
data = 'new_owner=%s' % self.admin_name
|
|
resp = self.client.put(url, data, 'application/x-www-form-urlencoded')
|
|
self.assertEqual(200, resp.status_code)
|
|
|
|
# get admin log
|
|
resp = self.client.get(self.admin_log_url)
|
|
self.assertEqual(200, resp.status_code)
|
|
json_resp = json.loads(resp.content)
|
|
|
|
assert json_resp['total_count'] == 1
|
|
assert json_resp['data'][0]['operation'] == 'group_transfer'
|
|
|
|
@patch('seahub.api2.permissions.IsProVersion.has_permission')
|
|
def test_delete_group(self, mock_has_permission):
|
|
|
|
# admin delete group
|
|
url = reverse('api-v2.1-admin-group', args=[self.group_id])
|
|
resp = self.client.delete(url)
|
|
self.assertEqual(200, resp.status_code)
|
|
|
|
# get admin log
|
|
resp = self.client.get(self.admin_log_url)
|
|
self.assertEqual(200, resp.status_code)
|
|
json_resp = json.loads(resp.content)
|
|
|
|
assert json_resp['total_count'] == 1
|
|
assert json_resp['data'][0]['operation'] == 'group_delete'
|
|
|
|
@patch('seahub.api2.permissions.IsProVersion.has_permission')
|
|
def test_create_user(self, mock_has_permission):
|
|
|
|
# admin create user
|
|
resp = self.client.post(
|
|
reverse('user_add',), {
|
|
'email': self.new_user,
|
|
'password1': '123',
|
|
'password2': '123',
|
|
}, HTTP_X_REQUESTED_WITH='XMLHttpRequest'
|
|
)
|
|
self.assertEqual(200, resp.status_code)
|
|
|
|
# get admin log
|
|
resp = self.client.get(self.admin_log_url)
|
|
self.assertEqual(200, resp.status_code)
|
|
json_resp = json.loads(resp.content)
|
|
|
|
assert json_resp['total_count'] == 1
|
|
assert json_resp['data'][0]['operation'] == 'user_add'
|
|
|
|
@patch('seahub.api2.permissions.IsProVersion.has_permission')
|
|
def test_delete_user(self, mock_has_permission):
|
|
|
|
# create a tmp user first
|
|
ccnet_api.add_emailuser(self.new_user, 'password', 0, 1)
|
|
|
|
# admin delete user
|
|
resp = self.client.post(
|
|
reverse('user_remove', args=[self.new_user])
|
|
)
|
|
self.assertEqual(302, resp.status_code)
|
|
|
|
# get admin log
|
|
resp = self.client.get(self.admin_log_url)
|
|
self.assertEqual(200, resp.status_code)
|
|
json_resp = json.loads(resp.content)
|
|
|
|
assert json_resp['total_count'] == 1
|
|
assert json_resp['data'][0]['operation'] == 'user_delete'
|
|
|
|
@patch('seahub.api2.permissions.IsProVersion.has_permission')
|
|
def test_transfer_library(self, mock_has_permission):
|
|
|
|
# admin transfer library
|
|
data = 'owner=%s' % self.admin_name
|
|
resp = self.client.put(self.library_url, data, 'application/x-www-form-urlencoded')
|
|
self.assertEqual(200, resp.status_code)
|
|
|
|
# get admin log
|
|
resp = self.client.get(self.admin_log_url)
|
|
self.assertEqual(200, resp.status_code)
|
|
json_resp = json.loads(resp.content)
|
|
|
|
assert json_resp['total_count'] == 1
|
|
assert json_resp['data'][0]['operation'] == 'repo_transfer'
|
|
|
|
@patch('seahub.api2.permissions.IsProVersion.has_permission')
|
|
def test_create_library(self, mock_has_permission):
|
|
|
|
# admin create library
|
|
url = reverse('api-v2.1-admin-libraries')
|
|
repo_name = randstring(10)
|
|
data = {
|
|
'name': repo_name,
|
|
'owner': self.user.email
|
|
}
|
|
resp = self.client.post(url, data)
|
|
json_resp = json.loads(resp.content)
|
|
repo_id = json_resp['id']
|
|
self.assertEqual(200, resp.status_code)
|
|
|
|
# get admin log
|
|
resp = self.client.get(self.admin_log_url)
|
|
self.assertEqual(200, resp.status_code)
|
|
json_resp = json.loads(resp.content)
|
|
|
|
assert json_resp['total_count'] == 1
|
|
assert json_resp['data'][0]['operation'] == 'repo_create'
|
|
|
|
self.remove_repo(repo_id)
|
|
|
|
@patch('seahub.api2.permissions.IsProVersion.has_permission')
|
|
def test_delete_library(self, mock_has_permission):
|
|
|
|
# admin delete library
|
|
resp = self.client.delete(self.library_url)
|
|
self.assertEqual(200, resp.status_code)
|
|
|
|
# get admin log
|
|
resp = self.client.get(self.admin_log_url)
|
|
self.assertEqual(200, resp.status_code)
|
|
json_resp = json.loads(resp.content)
|
|
|
|
assert json_resp['total_count'] == 1
|
|
assert json_resp['data'][0]['operation'] == 'repo_delete'
|
|
|
|
|
|
class AdminLogsLoginTest(BaseTestCase):
|
|
|
|
def test_get_login_logs(self):
|
|
|
|
if not LOCAL_PRO_DEV_ENV:
|
|
return
|
|
|
|
self.login_as(self.admin)
|
|
url = reverse('api-v2.1-admin-logs-login-logs')
|
|
resp = self.client.get(url)
|
|
self.assertEqual(200, resp.status_code)
|
|
json_resp = json.loads(resp.content)
|
|
|
|
assert type(json_resp['login_log_list']) is list
|
|
|
|
def test_get_login_logs_permision_denied(self):
|
|
if not LOCAL_PRO_DEV_ENV:
|
|
return
|
|
|
|
self.login_as(self.user)
|
|
url = reverse('api-v2.1-admin-logs-login-logs')
|
|
resp = self.client.get(url)
|
|
self.assertEqual(403, resp.status_code)
|
|
|
|
|
|
class AdminLogsFileAccessTest(BaseTestCase):
|
|
|
|
def test_get_file_access_logs(self):
|
|
|
|
if not LOCAL_PRO_DEV_ENV:
|
|
return
|
|
|
|
self.login_as(self.admin)
|
|
url = reverse('api-v2.1-admin-logs-file-access-logs')
|
|
resp = self.client.get(url)
|
|
self.assertEqual(200, resp.status_code)
|
|
json_resp = json.loads(resp.content)
|
|
|
|
assert type(json_resp['file_access_log_list']) is list
|
|
|
|
def test_get_file_access_logspermision_denied(self):
|
|
if not LOCAL_PRO_DEV_ENV:
|
|
return
|
|
|
|
self.login_as(self.user)
|
|
url = reverse('api-v2.1-admin-logs-file-access-logs')
|
|
resp = self.client.get(url)
|
|
self.assertEqual(403, resp.status_code)
|
|
|
|
|
|
class AdminLogsFileUpdateTest(BaseTestCase):
|
|
|
|
def test_get_file_update_logs(self):
|
|
|
|
if not LOCAL_PRO_DEV_ENV:
|
|
return
|
|
|
|
self.login_as(self.admin)
|
|
url = reverse('api-v2.1-admin-logs-file-update-logs')
|
|
resp = self.client.get(url)
|
|
self.assertEqual(200, resp.status_code)
|
|
json_resp = json.loads(resp.content)
|
|
|
|
assert type(json_resp['file_update_log_list']) is list
|
|
|
|
def test_get_file_update_logs_permision_denied(self):
|
|
if not LOCAL_PRO_DEV_ENV:
|
|
return
|
|
|
|
self.login_as(self.user)
|
|
url = reverse('api-v2.1-admin-logs-file-update-logs')
|
|
resp = self.client.get(url)
|
|
self.assertEqual(403, resp.status_code)
|
|
|
|
|
|
class AdminLogsSharePermissionTest(BaseTestCase):
|
|
|
|
def test_get_share_permission_logs(self):
|
|
|
|
if not LOCAL_PRO_DEV_ENV:
|
|
return
|
|
|
|
self.login_as(self.admin)
|
|
url = reverse('api-v2.1-admin-logs-share-permission-logs')
|
|
resp = self.client.get(url)
|
|
self.assertEqual(200, resp.status_code)
|
|
json_resp = json.loads(resp.content)
|
|
|
|
assert type(json_resp['share_permission_log_list']) is list
|
|
|
|
def test_get_share_permission_logs_permision_denied(self):
|
|
if not LOCAL_PRO_DEV_ENV:
|
|
return
|
|
|
|
self.login_as(self.user)
|
|
url = reverse('api-v2.1-admin-logs-share-permission-logs')
|
|
resp = self.client.get(url)
|
|
self.assertEqual(403, resp.status_code)
|