
* Adds a dropdown selector for the role you wish to grant a user on the default project during user creation. Fixes bug 999380. * Adds a "roles" column to the "Modify Users" table so you can see which roles users have been granted on a project. Fixes bug 1011919. * General table cleanup for readability. Change-Id: Ic3f36903c78b52c70f66680f3956845e28656fd8
346 lines
13 KiB
Python
346 lines
13 KiB
Python
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
|
|
|
# Copyright 2012 United States Government as represented by the
|
|
# Administrator of the National Aeronautics and Space Administration.
|
|
# All Rights Reserved.
|
|
#
|
|
# Copyright 2012 Nebula, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from django import http
|
|
from django.core.urlresolvers import reverse
|
|
from mox import IgnoreArg, IsA
|
|
|
|
from horizon import api
|
|
from horizon import test
|
|
|
|
|
|
USERS_INDEX_URL = reverse('horizon:syspanel:users:index')
|
|
USER_CREATE_URL = reverse('horizon:syspanel:users:create')
|
|
USER_UPDATE_URL = reverse('horizon:syspanel:users:update', args=[1])
|
|
|
|
|
|
class UsersViewTests(test.BaseAdminViewTests):
|
|
@test.create_stubs({api.keystone: ('user_list',)})
|
|
def test_index(self):
|
|
api.keystone.user_list(IgnoreArg()).AndReturn(self.users.list())
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(USERS_INDEX_URL)
|
|
|
|
self.assertTemplateUsed(res, 'syspanel/users/index.html')
|
|
self.assertItemsEqual(res.context['table'].data, self.users.list())
|
|
|
|
@test.create_stubs({api: ('user_create',
|
|
'tenant_list',
|
|
'add_tenant_user_role'),
|
|
api.keystone: ('get_default_role',
|
|
'role_list')})
|
|
def test_create(self):
|
|
user = self.users.get(id="1")
|
|
role = self.roles.first()
|
|
|
|
api.tenant_list(IgnoreArg(), admin=True).AndReturn(self.tenants.list())
|
|
api.user_create(IgnoreArg(),
|
|
user.name,
|
|
user.email,
|
|
user.password,
|
|
self.tenant.id,
|
|
True).AndReturn(user)
|
|
api.keystone.role_list(IgnoreArg()).AndReturn(self.roles.list())
|
|
api.keystone.get_default_role(IgnoreArg()).AndReturn(role)
|
|
api.add_tenant_user_role(IgnoreArg(), self.tenant.id, user.id, role.id)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
formData = {'method': 'CreateUserForm',
|
|
'name': user.name,
|
|
'email': user.email,
|
|
'password': user.password,
|
|
'tenant_id': self.tenant.id,
|
|
'role_id': self.roles.first().id,
|
|
'confirm_password': user.password}
|
|
res = self.client.post(USER_CREATE_URL, formData)
|
|
|
|
self.assertNoFormErrors(res)
|
|
self.assertMessageCount(success=1)
|
|
|
|
@test.create_stubs({api: ('tenant_list',),
|
|
api.keystone: ('role_list', 'get_default_role')})
|
|
def test_create_with_password_mismatch(self):
|
|
user = self.users.get(id="1")
|
|
|
|
api.tenant_list(IgnoreArg(), admin=True).AndReturn(self.tenants.list())
|
|
api.keystone.role_list(IgnoreArg()).AndReturn(self.roles.list())
|
|
api.keystone.get_default_role(IgnoreArg()) \
|
|
.AndReturn(self.roles.first())
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
formData = {'method': 'CreateUserForm',
|
|
'name': user.name,
|
|
'email': user.email,
|
|
'password': user.password,
|
|
'tenant_id': self.tenant.id,
|
|
'role_id': self.roles.first().id,
|
|
'confirm_password': "doesntmatch"}
|
|
|
|
res = self.client.post(USER_CREATE_URL, formData)
|
|
|
|
self.assertFormError(res, "form", None, ['Passwords do not match.'])
|
|
|
|
@test.create_stubs({api: ('tenant_list',),
|
|
api.keystone: ('role_list', 'get_default_role')})
|
|
def test_create_validation_for_password_too_short(self):
|
|
user = self.users.get(id="1")
|
|
|
|
api.tenant_list(IgnoreArg(), admin=True).AndReturn(self.tenants.list())
|
|
api.keystone.role_list(IgnoreArg()).AndReturn(self.roles.list())
|
|
api.keystone.get_default_role(IgnoreArg()) \
|
|
.AndReturn(self.roles.first())
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
# check password min-len verification
|
|
formData = {'method': 'CreateUserForm',
|
|
'name': user.name,
|
|
'email': user.email,
|
|
'password': 'four',
|
|
'tenant_id': self.tenant.id,
|
|
'role_id': self.roles.first().id,
|
|
'confirm_password': 'four'}
|
|
|
|
res = self.client.post(USER_CREATE_URL, formData)
|
|
|
|
self.assertFormError(
|
|
res, "form", 'password',
|
|
['Password must be between 8 and 18 characters.'])
|
|
|
|
@test.create_stubs({api: ('tenant_list',),
|
|
api.keystone: ('role_list', 'get_default_role')})
|
|
def test_create_validation_for_password_too_long(self):
|
|
user = self.users.get(id="1")
|
|
|
|
api.tenant_list(IgnoreArg(), admin=True).AndReturn(self.tenants.list())
|
|
api.keystone.role_list(IgnoreArg()).AndReturn(self.roles.list())
|
|
api.keystone.get_default_role(IgnoreArg()) \
|
|
.AndReturn(self.roles.first())
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
# check password min-len verification
|
|
formData = {'method': 'CreateUserForm',
|
|
'name': user.name,
|
|
'email': user.email,
|
|
'password': 'MoreThanEighteenChars',
|
|
'tenant_id': self.tenant.id,
|
|
'role_id': self.roles.first().id,
|
|
'confirm_password': 'MoreThanEighteenChars'}
|
|
|
|
res = self.client.post(USER_CREATE_URL, formData)
|
|
|
|
self.assertFormError(
|
|
res, "form", 'password',
|
|
['Password must be between 8 and 18 characters.'])
|
|
|
|
@test.create_stubs({api: ('user_get',
|
|
'tenant_list',
|
|
'user_update_tenant',
|
|
'user_update_password'),
|
|
api.keystone: ('user_update',)})
|
|
def test_update(self):
|
|
user = self.users.get(id="1")
|
|
|
|
api.user_get(IsA(http.HttpRequest), '1',
|
|
admin=True).AndReturn(user)
|
|
api.tenant_list(IgnoreArg(),
|
|
admin=True).AndReturn(self.tenants.list())
|
|
api.keystone.user_update(IsA(http.HttpRequest),
|
|
user.id,
|
|
email=u'test@example.com',
|
|
name=u'test_user').AndReturn(None)
|
|
api.user_update_tenant(IsA(http.HttpRequest),
|
|
user.id,
|
|
self.tenant.id).AndReturn(None)
|
|
api.user_update_password(IsA(http.HttpRequest),
|
|
user.id,
|
|
IgnoreArg()).AndReturn(None)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
formData = {'method': 'UpdateUserForm',
|
|
'id': user.id,
|
|
'name': user.name,
|
|
'email': user.email,
|
|
'password': 'normalpwd',
|
|
'tenant_id': self.tenant.id,
|
|
'confirm_password': 'normalpwd'}
|
|
|
|
res = self.client.post(USER_UPDATE_URL, formData)
|
|
|
|
self.assertNoFormErrors(res)
|
|
|
|
@test.create_stubs({api: ('user_get',
|
|
'tenant_list',
|
|
'user_update_tenant',
|
|
'keystone_can_edit_user')})
|
|
def test_update_with_keystone_can_edit_user_false(self):
|
|
user = self.users.get(id="1")
|
|
|
|
api.user_get(IsA(http.HttpRequest),
|
|
'1',
|
|
admin=True).AndReturn(user)
|
|
api.tenant_list(IgnoreArg(), admin=True).AndReturn(self.tenants.list())
|
|
api.keystone_can_edit_user().AndReturn(False)
|
|
api.keystone_can_edit_user().AndReturn(False)
|
|
api.user_update_tenant(IsA(http.HttpRequest),
|
|
user.id,
|
|
self.tenant.id).AndReturn(None)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
formData = {'method': 'UpdateUserForm',
|
|
'tenant_id': self.tenant.id,
|
|
'id': user.id}
|
|
|
|
res = self.client.post(USER_UPDATE_URL, formData)
|
|
|
|
self.assertNoFormErrors(res)
|
|
|
|
@test.create_stubs({api: ('user_get', 'tenant_list')})
|
|
def test_update_validation_for_password_too_short(self):
|
|
user = self.users.get(id="1")
|
|
|
|
api.user_get(IsA(http.HttpRequest), '1',
|
|
admin=True).AndReturn(user)
|
|
api.tenant_list(IgnoreArg(),
|
|
admin=True).AndReturn(self.tenants.list())
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
formData = {'method': 'UpdateUserForm',
|
|
'id': user.id,
|
|
'name': user.name,
|
|
'email': user.email,
|
|
'password': 't',
|
|
'tenant_id': self.tenant.id,
|
|
'confirm_password': 't'}
|
|
|
|
res = self.client.post(USER_UPDATE_URL, formData)
|
|
|
|
self.assertFormError(
|
|
res, "form", 'password',
|
|
['Password must be between 8 and 18 characters.'])
|
|
|
|
@test.create_stubs({api: ('user_get', 'tenant_list')})
|
|
def test_update_validation_for_password_too_long(self):
|
|
user = self.users.get(id="1")
|
|
|
|
api.user_get(IsA(http.HttpRequest), '1',
|
|
admin=True).AndReturn(user)
|
|
api.tenant_list(IgnoreArg(),
|
|
admin=True).AndReturn(self.tenants.list())
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
formData = {'method': 'UpdateUserForm',
|
|
'id': user.id,
|
|
'name': user.name,
|
|
'email': user.email,
|
|
'password': 'ThisIsASuperLongPassword',
|
|
'tenant_id': self.tenant.id,
|
|
'confirm_password': 'ThisIsASuperLongPassword'}
|
|
|
|
res = self.client.post(USER_UPDATE_URL, formData)
|
|
|
|
self.assertFormError(
|
|
res, "form", 'password',
|
|
['Password must be between 8 and 18 characters.'])
|
|
|
|
@test.create_stubs({api.keystone: ('user_update_enabled', 'user_list')})
|
|
def test_enable_user(self):
|
|
user = self.users.get(id="2")
|
|
user.enabled = False
|
|
api.keystone.user_list(IgnoreArg()).AndReturn(self.users.list())
|
|
api.keystone.user_update_enabled(IgnoreArg(),
|
|
user.id,
|
|
True).AndReturn(user)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
formData = {'action': 'users__enable__%s' % user.id}
|
|
res = self.client.post(USERS_INDEX_URL, formData)
|
|
|
|
self.assertRedirectsNoFollow(res, USERS_INDEX_URL)
|
|
|
|
@test.create_stubs({api.keystone: ('user_update_enabled', 'user_list')})
|
|
def test_disable_user(self):
|
|
user = self.users.get(id="2")
|
|
self.assertTrue(user.enabled)
|
|
|
|
api.keystone.user_list(IgnoreArg()).AndReturn(self.users.list())
|
|
api.keystone.user_update_enabled(IgnoreArg(),
|
|
user.id,
|
|
False).AndReturn(user)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
formData = {'action': 'users__enable__%s' % user.id}
|
|
res = self.client.post(USERS_INDEX_URL, formData)
|
|
|
|
self.assertRedirectsNoFollow(res, USERS_INDEX_URL)
|
|
|
|
@test.create_stubs({api.keystone: ('user_update_enabled', 'user_list')})
|
|
def test_enable_disable_user_exception(self):
|
|
user = self.users.get(id="2")
|
|
user.enabled = False
|
|
api.keystone.user_list(IgnoreArg()).AndReturn(self.users.list())
|
|
api.keystone.user_update_enabled(IgnoreArg(), user.id, True) \
|
|
.AndRaise(self.exceptions.keystone)
|
|
self.mox.ReplayAll()
|
|
|
|
formData = {'action': 'users__enable__%s' % user.id}
|
|
res = self.client.post(USERS_INDEX_URL, formData)
|
|
|
|
self.assertRedirectsNoFollow(res, USERS_INDEX_URL)
|
|
|
|
@test.create_stubs({api.keystone: ('user_list',)})
|
|
def test_disabling_current_user(self):
|
|
for i in range(0, 2):
|
|
api.keystone.user_list(IgnoreArg()).AndReturn(self.users.list())
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
formData = {'action': 'users__enable__%s' % self.request.user.id}
|
|
res = self.client.post(USERS_INDEX_URL, formData, follow=True)
|
|
|
|
self.assertEqual(list(res.context['messages'])[0].message,
|
|
u'You cannot disable the user you are currently '
|
|
u'logged in as.')
|
|
|
|
@test.create_stubs({api.keystone: ('user_list',)})
|
|
def test_delete_user_with_improper_permissions(self):
|
|
for i in range(0, 2):
|
|
api.keystone.user_list(IgnoreArg()).AndReturn(self.users.list())
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
formData = {'action': 'users__delete__%s' % self.request.user.id}
|
|
res = self.client.post(USERS_INDEX_URL, formData, follow=True)
|
|
|
|
self.assertEqual(list(res.context['messages'])[0].message,
|
|
u'You do not have permission to delete user: %s'
|
|
% self.request.user.username)
|