mirror of
https://github.com/ansible/awx.git
synced 2026-02-13 12:24:49 -03:30
pytest-django's documentation indicates that it isn't necessary, and it turns out in Django 2.0+ that this double application of the transaction machinations was causing the Django ContentType table to lose its items.
153 lines
5.9 KiB
Python
153 lines
5.9 KiB
Python
import pytest
|
|
from unittest import mock
|
|
|
|
from django.test import TransactionTestCase
|
|
|
|
from awx.main.access import UserAccess, RoleAccess, TeamAccess
|
|
from awx.main.models import User, Organization, Inventory
|
|
|
|
|
|
class TestSysAuditorTransactional(TransactionTestCase):
|
|
def rando(self):
|
|
return User.objects.create(username='rando', password='rando', email='rando@com.com')
|
|
|
|
def inventory(self):
|
|
org = Organization.objects.create(name='org')
|
|
inv = Inventory.objects.create(name='inv', organization=org)
|
|
return inv
|
|
|
|
def test_auditor_caching(self):
|
|
rando = self.rando()
|
|
with self.assertNumQueries(1):
|
|
v = rando.is_system_auditor
|
|
assert not v
|
|
with self.assertNumQueries(0):
|
|
v = rando.is_system_auditor
|
|
assert not v
|
|
|
|
def test_auditor_setter(self):
|
|
rando = self.rando()
|
|
inventory = self.inventory()
|
|
rando.is_system_auditor = True
|
|
assert rando in inventory.read_role
|
|
|
|
def test_refresh_with_set(self):
|
|
rando = self.rando()
|
|
rando.is_system_auditor = True
|
|
assert rando.is_system_auditor
|
|
rando.is_system_auditor = False
|
|
assert not rando.is_system_auditor
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_system_auditor_is_system_auditor(system_auditor):
|
|
assert system_auditor.is_system_auditor
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_system_auditor_can_modify_self(system_auditor):
|
|
access = UserAccess(system_auditor)
|
|
assert access.can_change(obj=system_auditor, data=dict(is_system_auditor='true'))
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_user_queryset(user):
|
|
u = user('pete', False)
|
|
|
|
access = UserAccess(u)
|
|
qs = access.get_queryset()
|
|
assert qs.count() == 1
|
|
|
|
|
|
@pytest.mark.django_db
|
|
@pytest.mark.parametrize('ext_auth,superuser,expect', [
|
|
(True, True, True),
|
|
(False, True, True), # your setting can't touch me, I'm superuser
|
|
(True, False, True), # org admin, managing my peeps
|
|
(False, False, False), # setting blocks org admin
|
|
], ids=['superuser', 'superuser-off', 'org', 'org-off'])
|
|
def test_manage_org_auth_setting(ext_auth, superuser, expect, organization, rando, user, team):
|
|
u = user('foo-user', is_superuser=superuser)
|
|
if not superuser:
|
|
organization.admin_role.members.add(u)
|
|
|
|
with mock.patch('awx.main.access.settings') as settings_mock:
|
|
settings_mock.MANAGE_ORGANIZATION_AUTH = ext_auth
|
|
assert [
|
|
# use via /api/v2/users/N/roles/
|
|
UserAccess(u).can_attach(rando, organization.admin_role, 'roles'),
|
|
UserAccess(u).can_attach(rando, organization.member_role, 'roles'),
|
|
UserAccess(u).can_attach(rando, team.admin_role, 'roles'),
|
|
UserAccess(u).can_attach(rando, team.member_role, 'roles'),
|
|
# use via /api/v2/roles/N/users/
|
|
RoleAccess(u).can_attach(organization.admin_role, rando, 'members'),
|
|
RoleAccess(u).can_attach(organization.member_role, rando, 'members'),
|
|
RoleAccess(u).can_attach(team.admin_role, rando, 'members'),
|
|
RoleAccess(u).can_attach(team.member_role, rando, 'members'),
|
|
] == [expect for i in range(8)]
|
|
assert [
|
|
# use via /api/v2/users/N/roles/
|
|
UserAccess(u).can_unattach(rando, organization.admin_role, 'roles'),
|
|
UserAccess(u).can_unattach(rando, organization.member_role, 'roles'),
|
|
UserAccess(u).can_unattach(rando, team.admin_role, 'roles'),
|
|
UserAccess(u).can_unattach(rando, team.member_role, 'roles'),
|
|
# use via /api/v2/roles/N/users/
|
|
RoleAccess(u).can_unattach(organization.admin_role, rando, 'members'),
|
|
RoleAccess(u).can_unattach(organization.member_role, rando, 'members'),
|
|
RoleAccess(u).can_unattach(team.admin_role, rando, 'members'),
|
|
RoleAccess(u).can_unattach(team.member_role, rando, 'members'),
|
|
] == [expect for i in range(8)]
|
|
|
|
|
|
@pytest.mark.django_db
|
|
@pytest.mark.parametrize('ext_auth', [True, False])
|
|
def test_team_org_resource_role(ext_auth, organization, rando, org_admin, team):
|
|
with mock.patch('awx.main.access.settings') as settings_mock:
|
|
settings_mock.MANAGE_ORGANIZATION_AUTH = ext_auth
|
|
assert [
|
|
# use via /api/v2/teams/N/roles/
|
|
TeamAccess(org_admin).can_attach(team, organization.workflow_admin_role, 'roles'),
|
|
# use via /api/v2/roles/teams/
|
|
RoleAccess(org_admin).can_attach(organization.workflow_admin_role, team, 'member_role.parents')
|
|
] == [True for i in range(2)]
|
|
assert [
|
|
# use via /api/v2/teams/N/roles/
|
|
TeamAccess(org_admin).can_unattach(team, organization.workflow_admin_role, 'roles'),
|
|
# use via /api/v2/roles/teams/
|
|
RoleAccess(org_admin).can_unattach(organization.workflow_admin_role, team, 'member_role.parents')
|
|
] == [True for i in range(2)]
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_user_accessible_objects(user, organization):
|
|
'''
|
|
We cannot directly use accessible_objects for User model because
|
|
both editing and read permissions are obligated to complex business logic
|
|
'''
|
|
admin = user('admin', False)
|
|
u = user('john', False)
|
|
access = UserAccess(admin)
|
|
assert access.get_queryset().count() == 1 # can only see himself
|
|
|
|
organization.member_role.members.add(u)
|
|
organization.member_role.members.add(admin)
|
|
assert access.get_queryset().count() == 2
|
|
|
|
organization.member_role.members.remove(u)
|
|
assert access.get_queryset().count() == 1
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_org_admin_create_sys_auditor(org_admin):
|
|
access = UserAccess(org_admin)
|
|
assert not access.can_add(data=dict(
|
|
username='new_user', password="pa$$sowrd", email="asdf@redhat.com",
|
|
is_system_auditor='true'))
|
|
|
|
|
|
@pytest.mark.django_db
|
|
def test_org_admin_edit_sys_auditor(org_admin, alice, organization):
|
|
organization.member_role.members.add(alice)
|
|
access = UserAccess(org_admin)
|
|
assert not access.can_change(obj=alice, data=dict(is_system_auditor='true'))
|