test_user_signature_api.py 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110
  1. from misago.acl.testutils import override_acl
  2. from misago.users.testutils import AuthenticatedUserTestCase
  3. class UserSignatureTests(AuthenticatedUserTestCase):
  4. """
  5. tests for user signature RPC (POST to /api/users/1/signature/)
  6. """
  7. def setUp(self):
  8. super(UserSignatureTests, self).setUp()
  9. self.link = '/api/users/%s/signature/' % self.user.pk
  10. def test_signature_no_permission(self):
  11. """edit signature api with no ACL returns 403"""
  12. override_acl(self.user, {
  13. 'can_have_signature': 0,
  14. })
  15. response = self.client.get(self.link)
  16. self.assertContains(response, "You don't have permission to change", status_code=403)
  17. def test_signature_locked(self):
  18. """locked edit signature returns 403"""
  19. override_acl(self.user, {
  20. 'can_have_signature': 1,
  21. })
  22. self.user.is_signature_locked = True
  23. self.user.signature_lock_user_message = 'Your siggy is banned.'
  24. self.user.save()
  25. response = self.client.get(self.link)
  26. self.assertContains(response, 'Your siggy is banned', status_code=403)
  27. def test_get_signature(self):
  28. """GET to api returns json with no signature"""
  29. override_acl(self.user, {
  30. 'can_have_signature': 1,
  31. })
  32. self.user.is_signature_locked = False
  33. self.user.save()
  34. response = self.client.get(self.link)
  35. self.assertEqual(response.status_code, 200)
  36. self.assertFalse(response.json()['signature'])
  37. def test_post_empty_signature(self):
  38. """empty POST empties user signature"""
  39. override_acl(self.user, {
  40. 'can_have_signature': 1,
  41. })
  42. self.user.is_signature_locked = False
  43. self.user.save()
  44. response = self.client.post(
  45. self.link,
  46. data={
  47. 'signature': '',
  48. },
  49. )
  50. self.assertEqual(response.status_code, 200)
  51. self.assertFalse(response.json()['signature'])
  52. def test_post_too_long_signature(self):
  53. """too long new signature errors"""
  54. override_acl(self.user, {
  55. 'can_have_signature': 1,
  56. })
  57. self.user.is_signature_locked = False
  58. self.user.save()
  59. response = self.client.post(
  60. self.link,
  61. data={
  62. 'signature': 'abcd' * 1000,
  63. },
  64. )
  65. self.assertContains(response, 'too long', status_code=400)
  66. def test_post_good_signature(self):
  67. """POST with good signature changes user signature"""
  68. override_acl(self.user, {
  69. 'can_have_signature': 1,
  70. })
  71. self.user.is_signature_locked = False
  72. self.user.save()
  73. response = self.client.post(
  74. self.link,
  75. data={
  76. 'signature': 'Hello, **bros**!',
  77. },
  78. )
  79. self.assertEqual(response.status_code, 200)
  80. self.assertEqual(
  81. response.json()['signature']['html'], '<p>Hello, <strong>bros</strong>!</p>'
  82. )
  83. self.assertEqual(response.json()['signature']['plain'], 'Hello, **bros**!')
  84. self.reload_user()
  85. self.assertEqual(self.user.signature_parsed, '<p>Hello, <strong>bros</strong>!</p>')