Basic test structure in place, some authorization tests.

This commit is contained in:
Michael DeHaan 2013-03-19 18:33:01 -04:00
parent 23e685bba8
commit b95f4e0e13
3 changed files with 149 additions and 11 deletions

View File

@ -45,7 +45,7 @@ class Organizations(ExtendedModelResource):
queryset = models.Organization.objects.all()
resource_name = 'organizations'
#authentication = BasicAuthentication()
authentication = BasicAuthentication()
#authorization = AcomAuthorization()
authorization = OrganizationAuthorization()

View File

@ -7,8 +7,152 @@ Replace these with more appropriate tests for your application.
from django.test import TestCase
class SimpleTest(TestCase):
def test_basic_addition(self):
self.failUnlessEqual(1 + 1, 2)
import datetime
from django.contrib.auth.models import User as DjangoUser
from tastypie.test import ResourceTestCase
from lib.main.models import User, Organization, Project
# from entries.models import Entry
#class SimpleTest(TestCase):
# def test_basic_addition(self):
# self.failUnlessEqual(1 + 1, 2)
class BaseResourceTest(ResourceTestCase):
def setUp(self):
super(BaseResourceTest, self).setUp()
self.setup_users()
def make_user(self, username, password, super_user=False):
django_user = None
if super_user:
django_user = DjangoUser.objects.create_superuser(username, "%s@example.com", password)
else:
django_user = DjangoUser.objects.create_user(username, "%s@example.com", password)
acom_user = User.objects.create(name=username, auth_user=django_user)
return (django_user, acom_user)
def setup_users(self):
# Create a user.
self.super_username = 'admin'
self.super_password = 'admin'
self.normal_username = 'normal'
self.normal_password = 'normal'
(self.super_django_user, self.super_acom_user) = self.make_user(self.super_username, self.super_password, super_user=True)
(self.normal_django_user, self.normal_acom_user) = self.make_user(self.normal_username, self.normal_password, super_user=False)
def get_super_credentials():
return self.create_basic(self.super_username, self.super_password)
def get_normal_credentials(self):
return self.create_basic(self.normal_username, self.normal_password)
def get_invalid_credentials(self):
return self.create_basic('random', 'combination')
class OrganizationsResourceTest(BaseResourceTest):
def collection(self):
return '/api/v1/organizations/'
def setUp(self):
super(OrganizationsResourceTest, self).setUp()
# Fetch the ``Entry`` object we'll use in testing.
# Note that we aren't using PKs because they can change depending
# on what other tests are running.
#self.entry_1 = Entry.objects.get(slug='first-post')
# We also build a detail URI, since we will be using it all over.
# DRY, baby. DRY.
#self.detail_url = '/api/v1/entry/{0}/'.format(self.entry_1.pk)
# The data we'll send on POST requests. Again, because we'll use it
# frequently (enough).
#self.post_data = {
# 'user': '/api/v1/user/{0}/'.format(self.user.pk),
# 'title': 'Second Post!',
# 'slug': 'second-post',
# 'created': '2012-05-01T22:05:12'
#}
def test_get_list_unauthorzied(self):
self.assertHttpUnauthorized(self.api_client.get(self.collection(), format='json'))
def test_get_list_invalid_authorization(self):
self.assertHttpUnauthorized(self.api_client.get(self.collection(), format='json', authentication=self.get_invalid_credentials()))
def test_get_list_json(self):
resp = self.api_client.get(self.collection(), format='json', authentication=self.get_normal_credentials())
self.assertValidJSONResponse(resp)
# # Scope out the data for correctness.
# self.assertEqual(len(self.deserialize(resp)['objects']), 12)
# # Here, we're checking an entire structure for the expected data.
# self.assertEqual(self.deserialize(resp)['objects'][0], {
# 'pk': str(self.entry_1.pk),
# 'user': '/api/v1/user/{0}/'.format(self.user.pk),
# 'title': 'First post',
# 'slug': 'first-post',
# 'created': '2012-05-01T19:13:42',
# 'resource_uri': '/api/v1/entry/{0}/'.format(self.entry_1.pk)
# })
#
# def test_get_list_xml(self):
# self.assertValidXMLResponse(self.api_client.get('/api/v1/entries/', format='xml', authentication=self.get_credentials()))
#
# def test_get_detail_unauthenticated(self):
# self.assertHttpUnauthorized(self.api_client.get(self.detail_url, format='json'))
#
# def test_get_detail_json(self):
# resp = self.api_client.get(self.detail_url, format='json', authentication=self.get_credentials())
# self.assertValidJSONResponse(resp)
#
# # We use ``assertKeys`` here to just verify the keys, not all the data.
# self.assertKeys(self.deserialize(resp), ['created', 'slug', 'title', 'user'])
# self.assertEqual(self.deserialize(resp)['name'], 'First post')
#
# def test_get_detail_xml(self):
# self.assertValidXMLResponse(self.api_client.get(self.detail_url, format='xml', authentication=self.get_credentials()))
#
# def test_post_list_unauthenticated(self):
# self.assertHttpUnauthorized(self.api_client.post('/api/v1/entries/', format='json', data=self.post_data))
#
# def test_post_list(self):
# # Check how many are there first.
# self.assertEqual(Entry.objects.count(), 5)
# self.assertHttpCreated(self.api_client.post('/api/v1/entries/', format='json', data=self.post_data, authentication=self.get_credentials()))
# # Verify a new one has been added.
# self.assertEqual(Entry.objects.count(), 6)
#
# def test_put_detail_unauthenticated(self):
# self.assertHttpUnauthorized(self.api_client.put(self.detail_url, format='json', data={}))
#
# def test_put_detail(self):
# # Grab the current data & modify it slightly.
# original_data = self.deserialize(self.api_client.get(self.detail_url, format='json', authentication=self.get_credentials()))
# new_data = original_data.copy()
# new_data['title'] = 'Updated: First Post'
# new_data['created'] = '2012-05-01T20:06:12'
#
# self.assertEqual(Entry.objects.count(), 5)
# self.assertHttpAccepted(self.api_client.put(self.detail_url, format='json', data=new_data, authentication=self.get_credentials()))
# # Make sure the count hasn't changed & we did an update.
# self.assertEqual(Entry.objects.count(), 5)
# # Check for updated data.
# self.assertEqual(Entry.objects.get(pk=25).title, 'Updated: First Post')
# self.assertEqual(Entry.objects.get(pk=25).slug, 'first-post')
# self.assertEqual(Entry.objects.get(pk=25).created, datetime.datetime(2012, 3, 1, 13, 6, 12))
#
# def test_delete_detail_unauthenticated(self):
# self.assertHttpUnauthorized(self.api_client.delete(self.detail_url, format='json'))
#
# def test_delete_detail(self):
# self.assertEqual(Entry.objects.count(), 5)
# self.assertHttpAccepted(self.api_client.delete(self.detail_url, format='json', authentication=self.get_credentials()))
# self.assertEqual(Entry.objects.count(), 4)

View File

@ -367,7 +367,6 @@ class ExtendedModelResource(ModelResource):
"""
Dispatch a request to the nested resource.
"""
print "DISPATCH NESTED=%s" % kwargs
# We don't check for is_authorized here since it will be
# parent_cached_obj_get which will check that we have permissions
# over the parent.
@ -485,7 +484,6 @@ class ExtendedModelResource(ModelResource):
# All clear. Process the request.
request = convert_post_to_put(request)
# MPD: fixup
print "KWARGS: %s" % kwargs
response = method(request, **kwargs)
# Add the throttled request.
@ -603,14 +601,10 @@ class ExtendedModelResource(ModelResource):
else:
# MPD: fixed up
basic_bundle = self.build_bundle(request=request)
#try:
# MPD: wild guess
# MPD: fixup
if 'bundle' in kwargs:
kwargs.pop('bundle')
print "kwargs = %s" % kwargs
obj = self.cached_obj_get(basic_bundle, **self.remove_api_resource_names(kwargs))
#except:
# obj = self.cached_obj_get(request, **self.remove_api_resource_names(kwargs))
except AttributeError:
return http.HttpNotFound()
except ObjectDoesNotExist: