test_user_signature_api.py 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124
  1. from misago.acl.testutils import override_acl
  2. from misago.users.testutils import AuthenticatedUserTestCase
  3. class UserSignatureTests(AuthenticatedUserTestCase):
  4. """tests for user signature RPC (POST to /api/users/1/signature/)"""
  5. def setUp(self):
  6. super(UserSignatureTests, self).setUp()
  7. self.link = '/api/users/%s/signature/' % self.user.pk
  8. def test_signature_no_permission(self):
  9. """edit signature api with no ACL returns 403"""
  10. override_acl(self.user, {
  11. 'can_have_signature': 0,
  12. })
  13. response = self.client.get(self.link)
  14. self.assertEqual(response.status_code, 403)
  15. self.assertEqual(response.json(), {
  16. 'detail': "You don't have permission to change signature.",
  17. })
  18. def test_signature_locked(self):
  19. """locked edit signature returns 403"""
  20. override_acl(self.user, {
  21. 'can_have_signature': 1,
  22. })
  23. self.user.is_signature_locked = True
  24. self.user.signature_lock_user_message = 'Your siggy is banned.'
  25. self.user.save()
  26. response = self.client.get(self.link)
  27. self.assertEqual(response.status_code, 403)
  28. self.assertEqual(response.json(), {
  29. 'detail': "Your signature is locked. You can't change it.",
  30. 'extra': "<p>Your siggy is banned.</p>",
  31. })
  32. def test_get_signature(self):
  33. """GET to api returns json with no signature"""
  34. override_acl(self.user, {
  35. 'can_have_signature': 1,
  36. })
  37. self.user.is_signature_locked = False
  38. self.user.save()
  39. response = self.client.get(self.link)
  40. self.assertEqual(response.status_code, 200)
  41. self.assertEqual(response.json(), {
  42. 'signature': None,
  43. 'limit': 256,
  44. })
  45. def test_post_empty_signature(self):
  46. """empty POST empties user signature"""
  47. override_acl(self.user, {
  48. 'can_have_signature': 1,
  49. })
  50. self.user.is_signature_locked = False
  51. self.user.save()
  52. response = self.client.post(
  53. self.link,
  54. data={
  55. 'signature': '',
  56. },
  57. )
  58. self.assertEqual(response.status_code, 200)
  59. self.assertEqual(response.json(), {
  60. 'signature': None,
  61. 'limit': 256,
  62. })
  63. def test_post_too_long_signature(self):
  64. """too long new signature errors"""
  65. override_acl(self.user, {
  66. 'can_have_signature': 1,
  67. })
  68. self.user.is_signature_locked = False
  69. self.user.save()
  70. response = self.client.post(
  71. self.link,
  72. data={
  73. 'signature': 'abcd' * 1000,
  74. },
  75. )
  76. self.assertEqual(response.status_code, 400)
  77. self.assertEqual(response.json(), {
  78. 'non_field_errors': ["Signature is too long."],
  79. })
  80. def test_post_good_signature(self):
  81. """POST with good signature changes user signature"""
  82. override_acl(self.user, {
  83. 'can_have_signature': 1,
  84. })
  85. self.user.is_signature_locked = False
  86. self.user.save()
  87. response = self.client.post(
  88. self.link,
  89. data={
  90. 'signature': 'Hello, **bros**!',
  91. },
  92. )
  93. self.assertEqual(response.status_code, 200)
  94. self.assertEqual(response.json(), {
  95. 'signature': {
  96. 'html': '<p>Hello, <strong>bros</strong>!</p>',
  97. 'plain': 'Hello, **bros**!',
  98. },
  99. 'limit': 256,
  100. })
  101. # API updates user in database
  102. self.reload_user()
  103. self.assertEqual(self.user.signature_parsed, '<p>Hello, <strong>bros</strong>!</p>')