test_user_signature_api.py 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122
  1. from misago.acl.test import patch_user_acl
  2. from misago.users.testutils import AuthenticatedUserTestCase
  3. class UserSignatureTests(AuthenticatedUserTestCase):
  4. """tests for user signature RPC (POST to /api/users/1/signature/)"""
  5. def setUp(self):
  6. super().setUp()
  7. self.link = '/api/users/%s/signature/' % self.user.pk
  8. @patch_user_acl
  9. def test_signature_no_permission(self, patch_user_acl):
  10. """edit signature api with no ACL returns 403"""
  11. patch_user_acl(self.user, {
  12. 'can_have_signature': 0,
  13. })
  14. response = self.client.get(self.link)
  15. self.assertEqual(response.status_code, 403)
  16. self.assertEqual(response.json(), {
  17. "detail": "You don't have permission to change signature.",
  18. })
  19. @patch_user_acl
  20. def test_signature_locked(self, patch_user_acl):
  21. """locked edit signature returns 403"""
  22. patch_user_acl(self.user, {
  23. 'can_have_signature': 1,
  24. })
  25. self.user.is_signature_locked = True
  26. self.user.signature_lock_user_message = 'Your siggy is banned.'
  27. self.user.save()
  28. response = self.client.get(self.link)
  29. self.assertEqual(response.status_code, 403)
  30. self.assertEqual(response.json(), {
  31. "detail": "Your signature is locked. You can't change it.",
  32. "reason": "<p>Your siggy is banned.</p>",
  33. })
  34. @patch_user_acl
  35. def test_get_signature(self, patch_user_acl):
  36. """GET to api returns json with no signature"""
  37. patch_user_acl(self.user, {
  38. 'can_have_signature': 1,
  39. })
  40. self.user.is_signature_locked = False
  41. self.user.save()
  42. response = self.client.get(self.link)
  43. self.assertEqual(response.status_code, 200)
  44. self.assertFalse(response.json()['signature'])
  45. @patch_user_acl
  46. def test_post_empty_signature(self, patch_user_acl):
  47. """empty POST empties user signature"""
  48. patch_user_acl(self.user, {
  49. 'can_have_signature': 1,
  50. })
  51. self.user.is_signature_locked = False
  52. self.user.save()
  53. response = self.client.post(
  54. self.link,
  55. data={
  56. 'signature': '',
  57. },
  58. )
  59. self.assertEqual(response.status_code, 200)
  60. self.assertFalse(response.json()['signature'])
  61. @patch_user_acl
  62. def test_post_too_long_signature(self, patch_user_acl):
  63. """too long new signature errors"""
  64. patch_user_acl(self.user, {
  65. 'can_have_signature': 1,
  66. })
  67. self.user.is_signature_locked = False
  68. self.user.save()
  69. response = self.client.post(
  70. self.link,
  71. data={
  72. 'signature': 'abcd' * 1000,
  73. },
  74. )
  75. self.assertEqual(response.status_code, 400)
  76. self.assertEqual(response.json(), {
  77. "detail": "Signature is too long.",
  78. })
  79. @patch_user_acl
  80. def test_post_good_signature(self, patch_user_acl):
  81. """POST with good signature changes user signature"""
  82. patch_user_acl(self.user, {
  83. 'can_have_signature': 1,
  84. })
  85. self.user.is_signature_locked = False
  86. self.user.save()
  87. response = self.client.post(
  88. self.link,
  89. data={
  90. 'signature': 'Hello, **bros**!',
  91. },
  92. )
  93. self.assertEqual(response.status_code, 200)
  94. self.assertEqual(
  95. response.json()['signature']['html'], '<p>Hello, <strong>bros</strong>!</p>'
  96. )
  97. self.assertEqual(response.json()['signature']['plain'], 'Hello, **bros**!')
  98. self.reload_user()
  99. self.assertEqual(self.user.signature_parsed, '<p>Hello, <strong>bros</strong>!</p>')