test_user_signature_api.py 3.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. from misago.acl.test import patch_user_acl
  2. from misago.users.testutils import AuthenticatedUserTestCase
  3. class UserSignatureTests(AuthenticatedUserTestCase):
  4. """tests for user signature RPC (POST to /api/users/1/signature/)"""
  5. def setUp(self):
  6. super().setUp()
  7. self.link = '/api/users/%s/signature/' % self.user.pk
  8. @patch_user_acl({'can_have_signature': 0})
  9. def test_signature_no_permission(self):
  10. """edit signature api with no ACL returns 403"""
  11. response = self.client.get(self.link)
  12. self.assertEqual(response.status_code, 403)
  13. self.assertEqual(response.json(), {
  14. "detail": "You don't have permission to change signature.",
  15. })
  16. @patch_user_acl({'can_have_signature': 1})
  17. def test_signature_locked(self):
  18. """locked edit signature returns 403"""
  19. self.user.is_signature_locked = True
  20. self.user.signature_lock_user_message = 'Your siggy is banned.'
  21. self.user.save()
  22. response = self.client.get(self.link)
  23. self.assertEqual(response.status_code, 403)
  24. self.assertEqual(response.json(), {
  25. "detail": "Your signature is locked. You can't change it.",
  26. "reason": "<p>Your siggy is banned.</p>",
  27. })
  28. @patch_user_acl({'can_have_signature': 1})
  29. def test_get_signature(self):
  30. """GET to api returns json with no signature"""
  31. self.user.is_signature_locked = False
  32. self.user.save()
  33. response = self.client.get(self.link)
  34. self.assertEqual(response.status_code, 200)
  35. self.assertFalse(response.json()['signature'])
  36. @patch_user_acl({'can_have_signature': 1})
  37. def test_post_empty_signature(self):
  38. """empty POST empties user signature"""
  39. self.user.is_signature_locked = False
  40. self.user.save()
  41. response = self.client.post(
  42. self.link,
  43. data={
  44. 'signature': '',
  45. },
  46. )
  47. self.assertEqual(response.status_code, 200)
  48. self.assertFalse(response.json()['signature'])
  49. @patch_user_acl({'can_have_signature': 1})
  50. def test_post_too_long_signature(self):
  51. """too long new signature errors"""
  52. self.user.is_signature_locked = False
  53. self.user.save()
  54. response = self.client.post(
  55. self.link,
  56. data={
  57. 'signature': 'abcd' * 1000,
  58. },
  59. )
  60. self.assertEqual(response.status_code, 400)
  61. self.assertEqual(response.json(), {
  62. "detail": "Signature is too long.",
  63. })
  64. @patch_user_acl({'can_have_signature': 1})
  65. def test_post_good_signature(self):
  66. """POST with good signature changes user signature"""
  67. self.user.is_signature_locked = False
  68. self.user.save()
  69. response = self.client.post(
  70. self.link,
  71. data={
  72. 'signature': 'Hello, **bros**!',
  73. },
  74. )
  75. self.assertEqual(response.status_code, 200)
  76. self.assertEqual(
  77. response.json()['signature']['html'], '<p>Hello, <strong>bros</strong>!</p>'
  78. )
  79. self.assertEqual(response.json()['signature']['plain'], 'Hello, **bros**!')
  80. self.reload_user()
  81. self.assertEqual(self.user.signature_parsed, '<p>Hello, <strong>bros</strong>!</p>')