test_user_signature_api.py 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109
  1. import json
  2. from django.contrib.auth import get_user_model
  3. from django.utils.encoding import smart_str
  4. from misago.acl.testutils import override_acl
  5. from misago.conf import settings
  6. from ..testutils import AuthenticatedUserTestCase
  7. class UserSignatureTests(AuthenticatedUserTestCase):
  8. """
  9. tests for user signature RPC (POST to /api/users/1/signature/)
  10. """
  11. def setUp(self):
  12. super(UserSignatureTests, self).setUp()
  13. self.link = '/api/users/%s/signature/' % self.user.pk
  14. def test_signature_no_permission(self):
  15. """edit signature api with no ACL returns 403"""
  16. override_acl(self.user, {
  17. 'can_have_signature': 0,
  18. })
  19. response = self.client.get(self.link)
  20. self.assertContains(response, "You don't have permission to change", status_code=403)
  21. def test_signature_locked(self):
  22. """locked edit signature returns 403"""
  23. override_acl(self.user, {
  24. 'can_have_signature': 1,
  25. })
  26. self.user.is_signature_locked = True
  27. self.user.signature_lock_user_message = 'Your siggy is banned.'
  28. self.user.save()
  29. response = self.client.get(self.link)
  30. self.assertContains(response, 'Your siggy is banned', status_code=403)
  31. def test_get_signature(self):
  32. """GET to api returns json with no signature"""
  33. override_acl(self.user, {
  34. 'can_have_signature': 1,
  35. })
  36. self.user.is_signature_locked = False
  37. self.user.save()
  38. response = self.client.get(self.link)
  39. self.assertEqual(response.status_code, 200)
  40. response_json = json.loads(smart_str(response.content))
  41. self.assertFalse(response_json['signature'])
  42. def test_post_empty_signature(self):
  43. """empty POST empties user signature"""
  44. override_acl(self.user, {
  45. 'can_have_signature': 1,
  46. })
  47. self.user.is_signature_locked = False
  48. self.user.save()
  49. response = self.client.post(self.link, data={'signature': ''})
  50. self.assertEqual(response.status_code, 200)
  51. response_json = json.loads(smart_str(response.content))
  52. self.assertFalse(response_json['signature'])
  53. def test_post_too_long_signature(self):
  54. """too long new signature errors"""
  55. override_acl(self.user, {
  56. 'can_have_signature': 1,
  57. })
  58. self.user.is_signature_locked = False
  59. self.user.save()
  60. response = self.client.post(self.link, data={
  61. 'signature': 'abcd' * 1000
  62. })
  63. self.assertContains(response, 'too long', status_code=400)
  64. def test_post_good_signature(self):
  65. """POST with good signature changes user signature"""
  66. override_acl(self.user, {
  67. 'can_have_signature': 1,
  68. })
  69. self.user.is_signature_locked = False
  70. self.user.save()
  71. response = self.client.post(self.link, data={
  72. 'signature': 'Hello, **bros**!'
  73. })
  74. self.assertEqual(response.status_code, 200)
  75. response_json = json.loads(smart_str(response.content))
  76. self.assertEqual(response_json['signature']['html'],
  77. '<p>Hello, <strong>bros</strong>!</p>')
  78. self.assertEqual(response_json['signature']['plain'],
  79. 'Hello, **bros**!')
  80. self.reload_user()
  81. self.assertEqual(self.user.signature_parsed,
  82. '<p>Hello, <strong>bros</strong>!</p>')