test_user_signature_api.py 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108
  1. from misago.acl.testutils import override_acl
  2. from misago.users.testutils import AuthenticatedUserTestCase
  3. class UserSignatureTests(AuthenticatedUserTestCase):
  4. """tests for user signature RPC (POST to /api/users/1/signature/)"""
  5. def setUp(self):
  6. super().setUp()
  7. self.link = '/api/users/%s/signature/' % self.user.pk
  8. def test_signature_no_permission(self):
  9. """edit signature api with no ACL returns 403"""
  10. override_acl(self.user, {
  11. 'can_have_signature': 0,
  12. })
  13. response = self.client.get(self.link)
  14. self.assertContains(response, "You don't have permission to change", status_code=403)
  15. def test_signature_locked(self):
  16. """locked edit signature returns 403"""
  17. override_acl(self.user, {
  18. 'can_have_signature': 1,
  19. })
  20. self.user.is_signature_locked = True
  21. self.user.signature_lock_user_message = 'Your siggy is banned.'
  22. self.user.save()
  23. response = self.client.get(self.link)
  24. self.assertContains(response, 'Your siggy is banned', status_code=403)
  25. def test_get_signature(self):
  26. """GET to api returns json with no signature"""
  27. override_acl(self.user, {
  28. 'can_have_signature': 1,
  29. })
  30. self.user.is_signature_locked = False
  31. self.user.save()
  32. response = self.client.get(self.link)
  33. self.assertEqual(response.status_code, 200)
  34. self.assertFalse(response.json()['signature'])
  35. def test_post_empty_signature(self):
  36. """empty POST empties user signature"""
  37. override_acl(self.user, {
  38. 'can_have_signature': 1,
  39. })
  40. self.user.is_signature_locked = False
  41. self.user.save()
  42. response = self.client.post(
  43. self.link,
  44. data={
  45. 'signature': '',
  46. },
  47. )
  48. self.assertEqual(response.status_code, 200)
  49. self.assertFalse(response.json()['signature'])
  50. def test_post_too_long_signature(self):
  51. """too long new signature errors"""
  52. override_acl(self.user, {
  53. 'can_have_signature': 1,
  54. })
  55. self.user.is_signature_locked = False
  56. self.user.save()
  57. response = self.client.post(
  58. self.link,
  59. data={
  60. 'signature': 'abcd' * 1000,
  61. },
  62. )
  63. self.assertContains(response, 'too long', status_code=400)
  64. def test_post_good_signature(self):
  65. """POST with good signature changes user signature"""
  66. override_acl(self.user, {
  67. 'can_have_signature': 1,
  68. })
  69. self.user.is_signature_locked = False
  70. self.user.save()
  71. response = self.client.post(
  72. self.link,
  73. data={
  74. 'signature': 'Hello, **bros**!',
  75. },
  76. )
  77. self.assertEqual(response.status_code, 200)
  78. self.assertEqual(
  79. response.json()['signature']['html'], '<p>Hello, <strong>bros</strong>!</p>'
  80. )
  81. self.assertEqual(response.json()['signature']['plain'], 'Hello, **bros**!')
  82. self.reload_user()
  83. self.assertEqual(self.user.signature_parsed, '<p>Hello, <strong>bros</strong>!</p>')