test_user_signature_api.py 3.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110
  1. import json
  2. from django.contrib.auth import get_user_model
  3. from misago.acl.testutils import override_acl
  4. from misago.conf import settings
  5. from misago.users.testutils import AuthenticatedUserTestCase
  6. class UserSignatureTests(AuthenticatedUserTestCase):
  7. """
  8. tests for user signature RPC (POST to /api/users/1/signature/)
  9. """
  10. def setUp(self):
  11. super(UserSignatureTests, self).setUp()
  12. self.link = '/api/users/%s/signature/' % self.user.pk
  13. def test_signature_no_permission(self):
  14. """edit signature api with no ACL returns 403"""
  15. override_acl(self.user, {
  16. 'can_have_signature': 0,
  17. })
  18. response = self.client.get(self.link)
  19. self.assertEqual(response.status_code, 403)
  20. self.assertIn("You don't have permission to change", response.content)
  21. def test_signature_locked(self):
  22. """locked edit signature returns 403"""
  23. override_acl(self.user, {
  24. 'can_have_signature': 1,
  25. })
  26. self.user.is_signature_locked = True
  27. self.user.signature_lock_user_message = 'Your siggy is banned.'
  28. self.user.save()
  29. response = self.client.get(self.link)
  30. self.assertEqual(response.status_code, 403)
  31. self.assertIn('Your siggy is banned', response.content)
  32. def test_get_signature(self):
  33. """GET to api returns json with no signature"""
  34. override_acl(self.user, {
  35. 'can_have_signature': 1,
  36. })
  37. self.user.is_signature_locked = False
  38. self.user.save()
  39. response = self.client.get(self.link)
  40. self.assertEqual(response.status_code, 200)
  41. response_json = json.loads(response.content)
  42. self.assertFalse(response_json['signature'])
  43. def test_post_empty_signature(self):
  44. """empty POST empties user signature"""
  45. override_acl(self.user, {
  46. 'can_have_signature': 1,
  47. })
  48. self.user.is_signature_locked = False
  49. self.user.save()
  50. response = self.client.post(self.link, data={'signature': ''})
  51. self.assertEqual(response.status_code, 200)
  52. response_json = json.loads(response.content)
  53. self.assertFalse(response_json['signature'])
  54. def test_post_too_long_signature(self):
  55. """too long new signature errors"""
  56. override_acl(self.user, {
  57. 'can_have_signature': 1,
  58. })
  59. self.user.is_signature_locked = False
  60. self.user.save()
  61. response = self.client.post(self.link, data={
  62. 'signature': 'abcd' * 1000
  63. })
  64. self.assertEqual(response.status_code, 400)
  65. self.assertIn('too long', response.content)
  66. def test_post_good_signature(self):
  67. """POST with good signature changes user signature"""
  68. override_acl(self.user, {
  69. 'can_have_signature': 1,
  70. })
  71. self.user.is_signature_locked = False
  72. self.user.save()
  73. response = self.client.post(self.link, data={
  74. 'signature': 'Hello, **bros**!'
  75. })
  76. self.assertEqual(response.status_code, 200)
  77. response_json = json.loads(response.content)
  78. self.assertEqual(response_json['signature']['html'],
  79. '<p>Hello, <strong>bros</strong>!</p>')
  80. self.assertEqual(response_json['signature']['plain'],
  81. 'Hello, **bros**!')
  82. self.reload_user()
  83. self.assertEqual(self.user.signature_parsed,
  84. '<p>Hello, <strong>bros</strong>!</p>')