comparison rhodecode/tests/models/test_permissions.py @ 3053:d7e10699513b beta

fixed some tests after recent changes on default group permissions
author Marcin Kuzminski <marcin@python-works.com>
date Sat, 01 Dec 2012 00:14:47 +0100
parents 5c1ad3b410e5
children b8f929bff7e3
comparison
equal deleted inserted replaced
3052:d3200c58764e 3053:d7e10699513b
353 u1_auth = AuthUser(user_id=self.u1.user_id) 353 u1_auth = AuthUser(user_id=self.u1.user_id)
354 # this user will have inherited permissions from default user 354 # this user will have inherited permissions from default user
355 self.assertEqual(u1_auth.permissions['global'], 355 self.assertEqual(u1_auth.permissions['global'],
356 set(['hg.create.repository', 'hg.fork.repository', 356 set(['hg.create.repository', 'hg.fork.repository',
357 'hg.register.manual_activate', 357 'hg.register.manual_activate',
358 'repository.read'])) 358 'repository.read', 'group.read']))
359 359
360 def test_inherited_permissions_from_default_on_user_disabled(self): 360 def test_inherited_permissions_from_default_on_user_disabled(self):
361 user_model = UserModel() 361 user_model = UserModel()
362 # disable fork and create on default user 362 # disable fork and create on default user
363 usr = 'default' 363 usr = 'default'
371 u1_auth = AuthUser(user_id=self.u1.user_id) 371 u1_auth = AuthUser(user_id=self.u1.user_id)
372 # this user will have inherited permissions from default user 372 # this user will have inherited permissions from default user
373 self.assertEqual(u1_auth.permissions['global'], 373 self.assertEqual(u1_auth.permissions['global'],
374 set(['hg.create.none', 'hg.fork.none', 374 set(['hg.create.none', 'hg.fork.none',
375 'hg.register.manual_activate', 375 'hg.register.manual_activate',
376 'repository.read'])) 376 'repository.read', 'group.read']))
377 377
378 def test_non_inherited_permissions_from_default_on_user_enabled(self): 378 def test_non_inherited_permissions_from_default_on_user_enabled(self):
379 user_model = UserModel() 379 user_model = UserModel()
380 # enable fork and create on default user 380 # enable fork and create on default user
381 usr = 'default' 381 usr = 'default'
397 # this user will have non inherited permissions from he's 397 # this user will have non inherited permissions from he's
398 # explicitly set permissions 398 # explicitly set permissions
399 self.assertEqual(u1_auth.permissions['global'], 399 self.assertEqual(u1_auth.permissions['global'],
400 set(['hg.create.none', 'hg.fork.none', 400 set(['hg.create.none', 'hg.fork.none',
401 'hg.register.manual_activate', 401 'hg.register.manual_activate',
402 'repository.read'])) 402 'repository.read', 'group.read']))
403 403
404 def test_non_inherited_permissions_from_default_on_user_disabled(self): 404 def test_non_inherited_permissions_from_default_on_user_disabled(self):
405 user_model = UserModel() 405 user_model = UserModel()
406 # disable fork and create on default user 406 # disable fork and create on default user
407 usr = 'default' 407 usr = 'default'
423 # this user will have non inherited permissions from he's 423 # this user will have non inherited permissions from he's
424 # explicitly set permissions 424 # explicitly set permissions
425 self.assertEqual(u1_auth.permissions['global'], 425 self.assertEqual(u1_auth.permissions['global'],
426 set(['hg.create.repository', 'hg.fork.repository', 426 set(['hg.create.repository', 'hg.fork.repository',
427 'hg.register.manual_activate', 427 'hg.register.manual_activate',
428 'repository.read'])) 428 'repository.read', 'group.read']))
429 429
430 def test_owner_permissions_doesnot_get_overwritten_by_group(self): 430 def test_owner_permissions_doesnot_get_overwritten_by_group(self):
431 #create repo as USER, 431 #create repo as USER,
432 self.test_repo = repo = RepoModel().create_repo(repo_name='myownrepo', 432 self.test_repo = repo = RepoModel().create_repo(repo_name='myownrepo',
433 repo_type='hg', 433 repo_type='hg',