test_usernamechanges_api.py 2.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162
  1. from ...acl.test import patch_user_acl
  2. from ..test import AuthenticatedUserTestCase
  3. class UsernameChangesApiTests(AuthenticatedUserTestCase):
  4. def setUp(self):
  5. super().setUp()
  6. self.link = "/api/username-changes/"
  7. @patch_user_acl({"can_see_users_name_history": False})
  8. def test_user_can_always_see_his_name_changes(self):
  9. """list returns own username changes"""
  10. self.user.set_username("NewUsername", self.user)
  11. response = self.client.get("%s?user=%s" % (self.link, self.user.pk))
  12. self.assertEqual(response.status_code, 200)
  13. self.assertContains(response, self.user.username)
  14. @patch_user_acl({"can_see_users_name_history": True})
  15. def test_list_handles_invalid_filter(self):
  16. """list raises 404 for invalid filter"""
  17. self.user.set_username("NewUsername", self.user)
  18. response = self.client.get("%s?user=abcd" % self.link)
  19. self.assertEqual(response.status_code, 404)
  20. @patch_user_acl({"can_see_users_name_history": True})
  21. def test_list_handles_nonexisting_user(self):
  22. """list raises 404 for invalid user id"""
  23. self.user.set_username("NewUsername", self.user)
  24. response = self.client.get("%s?user=142141" % self.link)
  25. self.assertEqual(response.status_code, 404)
  26. @patch_user_acl({"can_see_users_name_history": False})
  27. def test_list_handles_search(self):
  28. """list returns found username changes"""
  29. self.user.set_username("NewUsername", self.user)
  30. response = self.client.get("%s?user=%s&search=new" % (self.link, self.user.pk))
  31. self.assertEqual(response.status_code, 200)
  32. self.assertContains(response, self.user.username)
  33. response = self.client.get(
  34. "%s?user=%s&search=usernew" % (self.link, self.user.pk)
  35. )
  36. self.assertEqual(response.status_code, 200)
  37. self.assertEqual(response.json()["count"], 0)
  38. @patch_user_acl({"can_see_users_name_history": False})
  39. def test_list_denies_permission(self):
  40. """list denies permission for other user (or all) if no access"""
  41. response = self.client.get("%s?user=%s" % (self.link, self.user.pk + 1))
  42. self.assertEqual(response.status_code, 403)
  43. self.assertEqual(
  44. response.json(),
  45. {"detail": "You don't have permission to see other users name history."},
  46. )
  47. response = self.client.get(self.link)
  48. self.assertEqual(response.status_code, 403)
  49. self.assertEqual(
  50. response.json(),
  51. {"detail": "You don't have permission to see other users name history."},
  52. )