Blob Blame Raw
# -*- coding: utf-8 -*-

"""
 (c) 2017 - Copyright Red Hat Inc

 Authors:
   Pierre-Yves Chibon <pingou@pingoured.fr>

"""

__requires__ = ['SQLAlchemy >= 0.8']
import pkg_resources

import sys
import os

from mock import patch, MagicMock

sys.path.insert(0, os.path.join(os.path.dirname(
    os.path.abspath(__file__)), '..'))

import pagure
import pagure.lib
import tests


class PagureFlaskDeleteRepotests(tests.Modeltests):
    """ Tests for deleting a project in pagure """

    def setUp(self):
        """ Set up the environnment, ran before every tests. """
        super(PagureFlaskDeleteRepotests, self).setUp()

        # Create some projects
        tests.create_projects(self.session)
        tests.create_projects_git(os.path.join(self.path, 'repos'))
        self.session.commit()

        # Create all the git repos
        tests.create_projects_git(os.path.join(self.path, 'repos'))
        tests.create_projects_git(os.path.join(self.path, 'docs'))
        tests.create_projects_git(
            os.path.join(self.path, 'tickets'), bare=True)
        tests.create_projects_git(
            os.path.join(self.path, 'requests'), bare=True)

        project = pagure.lib.get_authorized_project(
            self.session, project_name='test')
        self.assertIsNotNone(project)
        # Ensure the project isn't read-only
        project.read_only = False
        self.session.add(project)
        self.session.commit()

        # Create a fork
        task_id = pagure.lib.fork_project(
            session=self.session,
            user='pingou',
            repo=project,
            gitfolder=os.path.join(self.path, 'repos'),
            docfolder=os.path.join(self.path, 'docs'),
            ticketfolder=os.path.join(self.path, 'tickets'),
            requestfolder=os.path.join(self.path, 'requests'),
        )
        pagure.lib.tasks.get_result(task_id).get()

        # Ensure everything was correctly created
        projects = pagure.lib.search_projects(self.session)
        self.assertEqual(len(projects), 4)

    @patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
    @patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
    @patch('pagure.ui.repo.admin_session_timedout',
           MagicMock(return_value=False))
    def test_delete_repo_when_turned_off(self):
        """ Test the delete_repo endpoint for a fork when only deleting main
        project is forbidden.
        """

        user = tests.FakeUser(username='pingou')
        with tests.user_set(self.app.application, user):
            output = self.app.post('/test/delete', follow_redirects=True)
            self.assertEqual(output.status_code, 404)

        projects = pagure.lib.search_projects(self.session)
        self.assertEqual(len(projects), 4)

    @patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
    @patch('pagure.ui.repo.admin_session_timedout',
           MagicMock(return_value=False))
    def test_delete_button_present(self):
        """ Test that the delete button is present when deletions are
        allowed.
        """

        user = tests.FakeUser(username='pingou')
        with tests.user_set(self.app.application, user):
            output = self.app.get('/test/settings')
            self.assertEqual(output.status_code, 200)
            self.assertIn('<form action="/test/delete"', output.data)
            self.assertIn('&nbsp; Delete the test project', output.data)

        projects = pagure.lib.search_projects(self.session)
        self.assertEqual(len(projects), 4)

    @patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
    @patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
    @patch('pagure.ui.repo.admin_session_timedout',
           MagicMock(return_value=False))
    def test_delete_button_absent(self):
        """ Test that the delete button is absent when deletions are not
        allowed.
        """

        user = tests.FakeUser(username='pingou')
        with tests.user_set(self.app.application, user):
            output = self.app.get('/test/settings')
            self.assertEqual(output.status_code, 200)
            self.assertNotIn('<form action="/test/delete"', output.data)
            self.assertNotIn('&nbsp; Delete the test project', output.data)

        projects = pagure.lib.search_projects(self.session)
        self.assertEqual(len(projects), 4)

    @patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
    @patch.dict('pagure.config.config', {'ENABLE_DEL_FORKS': True})
    @patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
    @patch('pagure.ui.repo.admin_session_timedout',
           MagicMock(return_value=False))
    def test_delete_fork_when_project_off_refreshing(self):
        """ Test the delete_repo endpoint for a fork when only deleting main
        project is forbidden but the fork is being refreshed in the backend
        """
        project = pagure.lib.get_authorized_project(
            self.session, project_name='test', user='pingou')
        self.assertIsNotNone(project)
        # Ensure the project isn't read-only
        project.read_only = True
        self.session.add(project)
        self.session.commit()

        user = tests.FakeUser(username='pingou')
        with tests.user_set(self.app.application, user):
            output = self.app.post(
                '/fork/pingou/test/delete', follow_redirects=True)
            self.assertEqual(output.status_code, 200)
            self.assertIn(
                '</button>\n                      The ACLs of this project '
                'are being refreshed in the backend this prevents the '
                'project from being deleted. Please wait for this task to '
                'finish before trying again. Thanks!', output.data)

        projects = pagure.lib.search_projects(self.session)
        self.assertEqual(len(projects), 4)

    @patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
    @patch.dict('pagure.config.config', {'ENABLE_DEL_FORKS': True})
    @patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
    @patch('pagure.ui.repo.admin_session_timedout',
           MagicMock(return_value=False))
    def test_delete_fork_when_project_off(self):
        """ Test the delete_repo endpoint for a fork when only deleting main
        project is forbidden.
        """
        project = pagure.lib.get_authorized_project(
            self.session, project_name='test', user='pingou')
        self.assertIsNotNone(project)
        # Ensure the project isn't read-only
        project.read_only = False
        self.session.add(project)
        self.session.commit()

        user = tests.FakeUser(username='pingou')
        with tests.user_set(self.app.application, user):
            output = self.app.post(
                '/fork/pingou/test/delete', follow_redirects=True)
            self.assertEqual(output.status_code, 200)

        projects = pagure.lib.search_projects(self.session)
        self.assertEqual(len(projects), 3)

    @patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
    @patch.dict('pagure.config.config', {'ENABLE_DEL_FORKS': False})
    @patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
    @patch('pagure.ui.repo.admin_session_timedout',
           MagicMock(return_value=False))
    def test_delete_fork_when_fork_and_project_off(self):
        """ Test the delete_repo endpoint for a fork when deleting fork and
        project is forbidden.
        """

        user = tests.FakeUser(username='pingou')
        with tests.user_set(self.app.application, user):
            output = self.app.post(
                '/fork/pingou/test/delete', follow_redirects=True)
            self.assertEqual(output.status_code, 404)

        projects = pagure.lib.search_projects(self.session)
        self.assertEqual(len(projects), 4)

    @patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
    @patch.dict('pagure.config.config', {'ENABLE_DEL_FORKS': False})
    @patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
    @patch('pagure.ui.repo.admin_session_timedout',
           MagicMock(return_value=False))
    def test_delete_fork_button_absent(self):
        """ Test that the delete button is absent when deletions are not
        allowed.
        """

        user = tests.FakeUser(username='pingou')
        with tests.user_set(self.app.application, user):
            output = self.app.get('/fork/pingou/test/settings')
            self.assertEqual(output.status_code, 200)
            self.assertNotIn(
                '<form action="/fork/pingou/test/delete"', output.data)
            self.assertNotIn(
                '&nbsp; Delete the forks/pingou/test project', output.data)

        projects = pagure.lib.search_projects(self.session)
        self.assertEqual(len(projects), 4)

    @patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
    @patch.dict('pagure.config.config', {'ENABLE_DEL_FORKS': True})
    @patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
    @patch('pagure.ui.repo.admin_session_timedout',
           MagicMock(return_value=False))
    def test_delete_fork_button_fork_del_allowed(self):
        """ Test that the delete button is present when deletions of projects
        is not allowed but deletions of forks is.
        """

        project = pagure.lib.get_authorized_project(
            self.session, project_name='test', user='pingou')
        self.assertIsNotNone(project)
        # Ensure the project isn't read-only
        project.read_only = False
        self.session.add(project)
        self.session.commit()

        user = tests.FakeUser(username='pingou')
        with tests.user_set(self.app.application, user):
            output = self.app.get('/fork/pingou/test/settings')
            self.assertEqual(output.status_code, 200)
            self.assertIn(
                '<form action="/fork/pingou/test/delete"', output.data)
            self.assertIn(
                '&nbsp; Delete the forks/pingou/test project', output.data)

        projects = pagure.lib.search_projects(self.session)
        self.assertEqual(len(projects), 4)

    @patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
    @patch.dict('pagure.config.config', {'ENABLE_DEL_FORKS': True})
    @patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
    @patch('pagure.ui.repo.admin_session_timedout',
           MagicMock(return_value=False))
    def test_delete_fork_button_fork_del_allowed_read_only(self):
        """ Test that the delete button is absent when deletions of projects
        is not allowed but deletions of forks is but fork is still being
        processed.
        """

        project = pagure.lib.get_authorized_project(
            self.session, project_name='test', user='pingou')
        self.assertIsNotNone(project)
        # Ensure the project is read-only
        project.read_only = True
        self.session.add(project)
        self.session.commit()

        user = tests.FakeUser(username='pingou')
        with tests.user_set(self.app.application, user):
            output = self.app.get('/fork/pingou/test/settings')
            self.assertEqual(output.status_code, 200)
            self.assertNotIn(
                '<form action="/fork/pingou/test/delete"', output.data)
            self.assertIn(
                'title="Action disabled while project\'s ACLs are being '
                'refreshed">', output.data)
            self.assertIn(
                '&nbsp; Delete the forks/pingou/test project', output.data)