test_usernamechanges_api.py 2.8 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071
  1. from misago.acl.test import patch_user_acl
  2. from misago.users.testutils import AuthenticatedUserTestCase
  3. class UsernameChangesApiTests(AuthenticatedUserTestCase):
  4. def setUp(self):
  5. super().setUp()
  6. self.link = '/api/username-changes/'
  7. @patch_user_acl
  8. def test_user_can_always_see_his_name_changes(self, patch_user_acl):
  9. """list returns own username changes"""
  10. self.user.set_username('NewUsername', self.user)
  11. patch_user_acl(self.user, {'can_see_users_name_history': False})
  12. response = self.client.get('%s?user=%s' % (self.link, self.user.pk))
  13. self.assertEqual(response.status_code, 200)
  14. self.assertContains(response, self.user.username)
  15. @patch_user_acl
  16. def test_list_handles_invalid_filter(self, patch_user_acl):
  17. """list raises 404 for invalid filter"""
  18. self.user.set_username('NewUsername', self.user)
  19. patch_user_acl(self.user, {'can_see_users_name_history': True})
  20. response = self.client.get('%s?user=abcd' % self.link)
  21. self.assertEqual(response.status_code, 404)
  22. @patch_user_acl
  23. def test_list_handles_nonexisting_user(self, patch_user_acl):
  24. """list raises 404 for invalid user id"""
  25. self.user.set_username('NewUsername', self.user)
  26. patch_user_acl(self.user, {'can_see_users_name_history': True})
  27. response = self.client.get('%s?user=142141' % self.link)
  28. self.assertEqual(response.status_code, 404)
  29. @patch_user_acl
  30. def test_list_handles_search(self, patch_user_acl):
  31. """list returns found username changes"""
  32. self.user.set_username('NewUsername', self.user)
  33. patch_user_acl(self.user, {'can_see_users_name_history': False})
  34. response = self.client.get('%s?user=%s&search=new' % (self.link, self.user.pk))
  35. self.assertEqual(response.status_code, 200)
  36. self.assertContains(response, self.user.username)
  37. response = self.client.get('%s?user=%s&search=usernew' % (self.link, self.user.pk))
  38. self.assertEqual(response.status_code, 200)
  39. self.assertEqual(response.json()["count"], 0)
  40. @patch_user_acl
  41. def test_list_denies_permission(self, patch_user_acl):
  42. """list denies permission for other user (or all) if no access"""
  43. patch_user_acl(self.user, {'can_see_users_name_history': False})
  44. response = self.client.get('%s?user=%s' % (self.link, self.user.pk + 1))
  45. self.assertEqual(response.status_code, 403)
  46. self.assertEqual(response.json(), {
  47. "detail": "You don't have permission to see other users name history."
  48. })
  49. response = self.client.get(self.link)
  50. self.assertEqual(response.status_code, 403)
  51. self.assertEqual(response.json(), {
  52. "detail": "You don't have permission to see other users name history."
  53. })