# HG changeset patch # User Marcin Kuzminski # Date 1365644199 -7200 # Node ID 752a57988a48e6c1333522bf311233c59631977f # Parent 46b17730ca32ff960d0052cf0ff94da302b909f7 fixed tests for usersgroups diff -r 46b17730ca32 -r 752a57988a48 rhodecode/tests/functional/test_admin_users_groups.py --- a/rhodecode/tests/functional/test_admin_users_groups.py Wed Apr 10 23:45:04 2013 +0200 +++ b/rhodecode/tests/functional/test_admin_users_groups.py Thu Apr 11 03:36:39 2013 +0200 @@ -78,16 +78,18 @@ response.follow() ug = UserGroup.get_by_group_name(users_group_name) p = Permission.get_by_key('hg.create.repository') - p2 = Permission.get_by_key('hg.fork.none') + p2 = Permission.get_by_key('hg.usergroup.create.false') + p3 = Permission.get_by_key('hg.fork.none') # check if user has this perms, they should be here since # defaults are on perms = UserGroupToPerm.query()\ .filter(UserGroupToPerm.users_group == ug).all() self.assertEqual( - [[x.users_group_id, x.permission_id, ] for x in perms], - [[ug.users_group_id, p.permission_id], - [ug.users_group_id, p2.permission_id]] + sorted([[x.users_group_id, x.permission_id, ] for x in perms]), + sorted([[ug.users_group_id, p.permission_id], + [ug.users_group_id, p2.permission_id], + [ug.users_group_id, p3.permission_id]]) ) ## DISABLE REPO CREATE ON A GROUP @@ -97,7 +99,9 @@ response.follow() ug = UserGroup.get_by_group_name(users_group_name) p = Permission.get_by_key('hg.create.none') - p2 = Permission.get_by_key('hg.fork.none') + p2 = Permission.get_by_key('hg.usergroup.create.false') + p3 = Permission.get_by_key('hg.fork.none') + # check if user has this perms, they should be here since # defaults are on perms = UserGroupToPerm.query()\ @@ -106,7 +110,8 @@ self.assertEqual( sorted([[x.users_group_id, x.permission_id, ] for x in perms]), sorted([[ug.users_group_id, p.permission_id], - [ug.users_group_id, p2.permission_id]]) + [ug.users_group_id, p2.permission_id], + [ug.users_group_id, p3.permission_id]]) ) # DELETE ! @@ -147,16 +152,18 @@ response.follow() ug = UserGroup.get_by_group_name(users_group_name) p = Permission.get_by_key('hg.create.none') - p2 = Permission.get_by_key('hg.fork.repository') + p2 = Permission.get_by_key('hg.usergroup.create.false') + p3 = Permission.get_by_key('hg.fork.repository') # check if user has this perms, they should be here since # defaults are on perms = UserGroupToPerm.query()\ .filter(UserGroupToPerm.users_group == ug).all() self.assertEqual( - [[x.users_group_id, x.permission_id, ] for x in perms], - [[ug.users_group_id, p.permission_id], - [ug.users_group_id, p2.permission_id]] + sorted([[x.users_group_id, x.permission_id, ] for x in perms]), + sorted([[ug.users_group_id, p.permission_id], + [ug.users_group_id, p2.permission_id], + [ug.users_group_id, p3.permission_id]]) ) ## DISABLE REPO CREATE ON A GROUP @@ -166,16 +173,18 @@ response.follow() ug = UserGroup.get_by_group_name(users_group_name) p = Permission.get_by_key('hg.create.none') - p2 = Permission.get_by_key('hg.fork.none') + p2 = Permission.get_by_key('hg.usergroup.create.false') + p3 = Permission.get_by_key('hg.fork.none') # check if user has this perms, they should be here since # defaults are on perms = UserGroupToPerm.query()\ .filter(UserGroupToPerm.users_group == ug).all() self.assertEqual( - [[x.users_group_id, x.permission_id, ] for x in perms], - [[ug.users_group_id, p.permission_id], - [ug.users_group_id, p2.permission_id]] + sorted([[x.users_group_id, x.permission_id, ] for x in perms]), + sorted([[ug.users_group_id, p.permission_id], + [ug.users_group_id, p2.permission_id], + [ug.users_group_id, p3.permission_id]]) ) # DELETE !