# -*- coding: utf-8 -*-
"""
(c) 2017 - Copyright Red Hat Inc
Authors:
Pierre-Yves Chibon <pingou@pingoured.fr>
"""
from __future__ import unicode_literals, absolute_import
import sys
import os
from mock import patch, MagicMock
sys.path.insert(0, os.path.join(os.path.dirname(
os.path.abspath(__file__)), '..'))
import pagure.lib.query
import tests
class PagureFlaskDeleteRepotests(tests.Modeltests):
""" Tests for deleting a project in pagure """
def setUp(self):
""" Set up the environnment, ran before every tests. """
super(PagureFlaskDeleteRepotests, self).setUp()
# Create some projects
tests.create_projects(self.session)
tests.create_projects_git(os.path.join(self.path, 'repos'))
self.session.commit()
# Create all the git repos
tests.create_projects_git(os.path.join(self.path, 'repos'))
tests.create_projects_git(os.path.join(self.path, 'repos', 'docs'))
tests.create_projects_git(
os.path.join(self.path, 'repos', 'tickets'), bare=True)
tests.create_projects_git(
os.path.join(self.path, 'repos', 'requests'), bare=True)
project = pagure.lib.query.get_authorized_project(
self.session, project_name='test')
self.assertIsNotNone(project)
# Ensure the project isn't read-only
project.read_only = False
self.session.add(project)
self.session.commit()
# Create a fork
task = pagure.lib.query.fork_project(
session=self.session,
user='pingou',
repo=project,
)
task.get()
# Ensure everything was correctly created
projects = pagure.lib.query.search_projects(self.session)
self.assertEqual(len(projects), 4)
@patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
@patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
@patch('pagure.decorators.admin_session_timedout',
MagicMock(return_value=False))
def test_delete_repo_when_turned_off(self):
""" Test the delete_repo endpoint for a fork when only deleting main
project is forbidden.
"""
user = tests.FakeUser(username='pingou')
with tests.user_set(self.app.application, user):
output = self.app.post('/test/delete', follow_redirects=True)
self.assertEqual(output.status_code, 404)
projects = pagure.lib.query.search_projects(self.session)
self.assertEqual(len(projects), 4)
@patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
@patch('pagure.decorators.admin_session_timedout',
MagicMock(return_value=False))
def test_delete_button_present(self):
""" Test that the delete button is present when deletions are
allowed.
"""
user = tests.FakeUser(username='pingou')
with tests.user_set(self.app.application, user):
output = self.app.get('/test/settings')
self.assertEqual(output.status_code, 200)
self.assertIn('<form action="/test/delete"', output.get_data(as_text=True))
self.assertIn(' Delete the test project', output.get_data(as_text=True))
projects = pagure.lib.query.search_projects(self.session)
self.assertEqual(len(projects), 4)
@patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
@patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
@patch('pagure.decorators.admin_session_timedout',
MagicMock(return_value=False))
def test_delete_button_absent(self):
""" Test that the delete button is absent when deletions are not
allowed.
"""
user = tests.FakeUser(username='pingou')
with tests.user_set(self.app.application, user):
output = self.app.get('/test/settings')
self.assertEqual(output.status_code, 200)
self.assertNotIn('<form action="/test/delete"', output.get_data(as_text=True))
self.assertNotIn(' Delete the test project', output.get_data(as_text=True))
projects = pagure.lib.query.search_projects(self.session)
self.assertEqual(len(projects), 4)
@patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
@patch.dict('pagure.config.config', {'ENABLE_DEL_FORKS': True})
@patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
@patch('pagure.decorators.admin_session_timedout',
MagicMock(return_value=False))
def test_delete_fork_when_project_off_refreshing(self):
""" Test the delete_repo endpoint for a fork when only deleting main
project is forbidden but the fork is being refreshed in the backend
"""
project = pagure.lib.query.get_authorized_project(
self.session, project_name='test', user='pingou')
self.assertIsNotNone(project)
# Ensure the project isn't read-only
project.read_only = True
self.session.add(project)
self.session.commit()
user = tests.FakeUser(username='pingou')
with tests.user_set(self.app.application, user):
output = self.app.post(
'/fork/pingou/test/delete', follow_redirects=True)
self.assertEqual(output.status_code, 200)
self.assertIn(
'The ACLs of this project '
'are being refreshed in the backend this prevents the '
'project from being deleted. Please wait for this task to '
'finish before trying again. Thanks!', output.get_data(as_text=True))
projects = pagure.lib.query.search_projects(self.session)
self.assertEqual(len(projects), 4)
@patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
@patch.dict('pagure.config.config', {'ENABLE_DEL_FORKS': True})
@patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
@patch('pagure.decorators.admin_session_timedout',
MagicMock(return_value=False))
def test_delete_fork_when_project_off(self):
""" Test the delete_repo endpoint for a fork when only deleting main
project is forbidden.
"""
project = pagure.lib.query.get_authorized_project(
self.session, project_name='test', user='pingou')
self.assertIsNotNone(project)
# Ensure the project isn't read-only
project.read_only = False
self.session.add(project)
self.session.commit()
user = tests.FakeUser(username='pingou')
with tests.user_set(self.app.application, user):
output = self.app.post(
'/fork/pingou/test/delete', follow_redirects=True)
self.assertEqual(output.status_code, 200)
projects = pagure.lib.query.search_projects(self.session)
self.assertEqual(len(projects), 3)
@patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
@patch.dict('pagure.config.config', {'ENABLE_DEL_FORKS': False})
@patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
@patch('pagure.decorators.admin_session_timedout',
MagicMock(return_value=False))
def test_delete_fork_when_fork_and_project_off(self):
""" Test the delete_repo endpoint for a fork when deleting fork and
project is forbidden.
"""
user = tests.FakeUser(username='pingou')
with tests.user_set(self.app.application, user):
output = self.app.post(
'/fork/pingou/test/delete', follow_redirects=True)
self.assertEqual(output.status_code, 404)
projects = pagure.lib.query.search_projects(self.session)
self.assertEqual(len(projects), 4)
@patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
@patch.dict('pagure.config.config', {'ENABLE_DEL_FORKS': False})
@patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
@patch('pagure.decorators.admin_session_timedout',
MagicMock(return_value=False))
def test_delete_fork_button_absent(self):
""" Test that the delete button is absent when deletions are not
allowed.
"""
user = tests.FakeUser(username='pingou')
with tests.user_set(self.app.application, user):
output = self.app.get('/fork/pingou/test/settings')
self.assertEqual(output.status_code, 200)
self.assertNotIn(
'<form action="/fork/pingou/test/delete"', output.get_data(as_text=True))
self.assertNotIn(
' Delete the forks/pingou/test project', output.get_data(as_text=True))
projects = pagure.lib.query.search_projects(self.session)
self.assertEqual(len(projects), 4)
@patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
@patch.dict('pagure.config.config', {'ENABLE_DEL_FORKS': True})
@patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
@patch('pagure.decorators.admin_session_timedout',
MagicMock(return_value=False))
def test_delete_fork_button_fork_del_allowed(self):
""" Test that the delete button is present when deletions of projects
is not allowed but deletions of forks is.
"""
project = pagure.lib.query.get_authorized_project(
self.session, project_name='test', user='pingou')
self.assertIsNotNone(project)
# Ensure the project isn't read-only
project.read_only = False
self.session.add(project)
self.session.commit()
user = tests.FakeUser(username='pingou')
with tests.user_set(self.app.application, user):
output = self.app.get('/fork/pingou/test/settings')
self.assertEqual(output.status_code, 200)
self.assertIn(
'<form action="/fork/pingou/test/delete"', output.get_data(as_text=True))
self.assertIn(
' Delete the forks/pingou/test project', output.get_data(as_text=True))
projects = pagure.lib.query.search_projects(self.session)
self.assertEqual(len(projects), 4)
@patch.dict('pagure.config.config', {'ENABLE_DEL_PROJECTS': False})
@patch.dict('pagure.config.config', {'ENABLE_DEL_FORKS': True})
@patch('pagure.lib.notify.send_email', MagicMock(return_value=True))
@patch('pagure.decorators.admin_session_timedout',
MagicMock(return_value=False))
def test_delete_fork_button_fork_del_allowed_read_only(self):
""" Test that the delete button is absent when deletions of projects
is not allowed but deletions of forks is but fork is still being
processed.
"""
project = pagure.lib.query.get_authorized_project(
self.session, project_name='test', user='pingou')
self.assertIsNotNone(project)
# Ensure the project is read-only
project.read_only = True
self.session.add(project)
self.session.commit()
user = tests.FakeUser(username='pingou')
with tests.user_set(self.app.application, user):
output = self.app.get('/fork/pingou/test/settings')
self.assertEqual(output.status_code, 200)
self.assertNotIn(
'<form action="/fork/pingou/test/delete"', output.get_data(as_text=True))
self.assertIn(
'title="Action disabled while project\'s ACLs are being '
'refreshed">', output.get_data(as_text=True))
self.assertIn(
' Delete the forks/pingou/test project', output.get_data(as_text=True))