fix: format all code with black
and from now on should not deviate from that...
This commit is contained in:
parent
8a09fb1a3c
commit
4d0693862d
68 changed files with 6693 additions and 5659 deletions
|
@ -12,13 +12,13 @@ class TestAuthView(WebTestCase):
|
|||
|
||||
def setUp(self):
|
||||
self.setup_web()
|
||||
self.pyramid_config.include('wuttaweb.views.common')
|
||||
self.pyramid_config.include("wuttaweb.views.common")
|
||||
|
||||
def make_view(self):
|
||||
return mod.AuthView(self.request)
|
||||
|
||||
def test_includeme(self):
|
||||
self.pyramid_config.include('wuttaweb.views.auth')
|
||||
self.pyramid_config.include("wuttaweb.views.auth")
|
||||
|
||||
def test_login(self):
|
||||
model = self.app.model
|
||||
|
@ -31,37 +31,37 @@ class TestAuthView(WebTestCase):
|
|||
self.assertEqual(response.status_code, 302)
|
||||
|
||||
# make a user
|
||||
barney = model.User(username='barney')
|
||||
auth.set_user_password(barney, 'testpass')
|
||||
barney = model.User(username="barney")
|
||||
auth.set_user_password(barney, "testpass")
|
||||
self.session.add(barney)
|
||||
self.session.commit()
|
||||
|
||||
# now since user exists, form will display
|
||||
context = view.login(session=self.session)
|
||||
self.assertIn('form', context)
|
||||
self.assertIn("form", context)
|
||||
|
||||
# redirect if user already logged in
|
||||
with patch.object(self.request, 'user', new=barney):
|
||||
with patch.object(self.request, "user", new=barney):
|
||||
view = self.make_view()
|
||||
response = view.login(session=self.session)
|
||||
self.assertEqual(response.status_code, 302)
|
||||
|
||||
# login fails w/ wrong password
|
||||
self.request.method = 'POST'
|
||||
self.request.POST = {'username': 'barney', 'password': 'WRONG'}
|
||||
self.request.method = "POST"
|
||||
self.request.POST = {"username": "barney", "password": "WRONG"}
|
||||
view = self.make_view()
|
||||
context = view.login(session=self.session)
|
||||
self.assertIn('form', context)
|
||||
self.assertIn("form", context)
|
||||
|
||||
# redirect if login succeeds
|
||||
self.request.method = 'POST'
|
||||
self.request.POST = {'username': 'barney', 'password': 'testpass'}
|
||||
self.request.method = "POST"
|
||||
self.request.POST = {"username": "barney", "password": "testpass"}
|
||||
view = self.make_view()
|
||||
response = view.login(session=self.session)
|
||||
self.assertEqual(response.status_code, 302)
|
||||
|
||||
def test_logout(self):
|
||||
self.pyramid_config.add_route('login', '/login')
|
||||
self.pyramid_config.add_route("login", "/login")
|
||||
view = self.make_view()
|
||||
self.request.session.delete = MagicMock()
|
||||
response = view.logout()
|
||||
|
@ -71,7 +71,7 @@ class TestAuthView(WebTestCase):
|
|||
def test_change_password(self):
|
||||
model = self.app.model
|
||||
auth = self.app.get_auth_handler()
|
||||
barney = model.User(username='barney')
|
||||
barney = model.User(username="barney")
|
||||
self.session.add(barney)
|
||||
self.session.commit()
|
||||
view = self.make_view()
|
||||
|
@ -81,7 +81,7 @@ class TestAuthView(WebTestCase):
|
|||
self.assertIsInstance(redirect, HTTPFound)
|
||||
|
||||
# set initial password
|
||||
auth.set_user_password(barney, 'foo')
|
||||
auth.set_user_password(barney, "foo")
|
||||
self.session.commit()
|
||||
|
||||
# forbidden if prevent_edit is set for user
|
||||
|
@ -94,24 +94,24 @@ class TestAuthView(WebTestCase):
|
|||
|
||||
# view should now return context w/ form
|
||||
context = view.change_password()
|
||||
self.assertIn('form', context)
|
||||
self.assertIn("form", context)
|
||||
|
||||
# submit valid form, ensure password is changed
|
||||
# (nb. this also would redirect user to home page)
|
||||
self.request.method = 'POST'
|
||||
self.request.method = "POST"
|
||||
self.request.POST = {
|
||||
'current_password': 'foo',
|
||||
"current_password": "foo",
|
||||
# nb. new_password requires colander mapping structure
|
||||
'__start__': 'new_password:mapping',
|
||||
'new_password': 'bar',
|
||||
'new_password-confirm': 'bar',
|
||||
'__end__': 'new_password:mapping',
|
||||
"__start__": "new_password:mapping",
|
||||
"new_password": "bar",
|
||||
"new_password-confirm": "bar",
|
||||
"__end__": "new_password:mapping",
|
||||
}
|
||||
redirect = view.change_password()
|
||||
self.assertIsInstance(redirect, HTTPFound)
|
||||
self.session.commit()
|
||||
self.assertFalse(auth.check_user_password(barney, 'foo'))
|
||||
self.assertTrue(auth.check_user_password(barney, 'bar'))
|
||||
self.assertFalse(auth.check_user_password(barney, "foo"))
|
||||
self.assertTrue(auth.check_user_password(barney, "bar"))
|
||||
|
||||
# at this point 'foo' is the password, now let's submit some
|
||||
# invalid forms and make sure we get back a context w/ form
|
||||
|
@ -119,72 +119,77 @@ class TestAuthView(WebTestCase):
|
|||
# first try empty data
|
||||
self.request.POST = {}
|
||||
context = view.change_password()
|
||||
self.assertIn('form', context)
|
||||
dform = context['form'].get_deform()
|
||||
self.assertEqual(dform['current_password'].errormsg, "Required")
|
||||
self.assertEqual(dform['new_password'].errormsg, "Required")
|
||||
self.assertIn("form", context)
|
||||
dform = context["form"].get_deform()
|
||||
self.assertEqual(dform["current_password"].errormsg, "Required")
|
||||
self.assertEqual(dform["new_password"].errormsg, "Required")
|
||||
|
||||
# now try bad current password
|
||||
self.request.POST = {
|
||||
'current_password': 'blahblah',
|
||||
'__start__': 'new_password:mapping',
|
||||
'new_password': 'baz',
|
||||
'new_password-confirm': 'baz',
|
||||
'__end__': 'new_password:mapping',
|
||||
"current_password": "blahblah",
|
||||
"__start__": "new_password:mapping",
|
||||
"new_password": "baz",
|
||||
"new_password-confirm": "baz",
|
||||
"__end__": "new_password:mapping",
|
||||
}
|
||||
context = view.change_password()
|
||||
self.assertIn('form', context)
|
||||
dform = context['form'].get_deform()
|
||||
self.assertEqual(dform['current_password'].errormsg, "Current password is incorrect.")
|
||||
self.assertIn("form", context)
|
||||
dform = context["form"].get_deform()
|
||||
self.assertEqual(
|
||||
dform["current_password"].errormsg, "Current password is incorrect."
|
||||
)
|
||||
|
||||
# now try bad new password
|
||||
self.request.POST = {
|
||||
'current_password': 'bar',
|
||||
'__start__': 'new_password:mapping',
|
||||
'new_password': 'bar',
|
||||
'new_password-confirm': 'bar',
|
||||
'__end__': 'new_password:mapping',
|
||||
"current_password": "bar",
|
||||
"__start__": "new_password:mapping",
|
||||
"new_password": "bar",
|
||||
"new_password-confirm": "bar",
|
||||
"__end__": "new_password:mapping",
|
||||
}
|
||||
context = view.change_password()
|
||||
self.assertIn('form', context)
|
||||
dform = context['form'].get_deform()
|
||||
self.assertEqual(dform['new_password'].errormsg, "New password must be different from old password.")
|
||||
self.assertIn("form", context)
|
||||
dform = context["form"].get_deform()
|
||||
self.assertEqual(
|
||||
dform["new_password"].errormsg,
|
||||
"New password must be different from old password.",
|
||||
)
|
||||
|
||||
def test_become_root(self):
|
||||
view = mod.AuthView(self.request)
|
||||
|
||||
# GET not allowed
|
||||
self.request.method = 'GET'
|
||||
self.request.method = "GET"
|
||||
self.assertRaises(HTTPForbidden, view.become_root)
|
||||
|
||||
# non-admin users also not allowed
|
||||
self.request.method = 'POST'
|
||||
self.request.method = "POST"
|
||||
self.request.is_admin = False
|
||||
self.assertRaises(HTTPForbidden, view.become_root)
|
||||
|
||||
# but admin users can become root
|
||||
self.request.is_admin = True
|
||||
self.assertNotIn('is_root', self.request.session)
|
||||
self.assertNotIn("is_root", self.request.session)
|
||||
redirect = view.become_root()
|
||||
self.assertIsInstance(redirect, HTTPFound)
|
||||
self.assertTrue(self.request.session['is_root'])
|
||||
self.assertTrue(self.request.session["is_root"])
|
||||
|
||||
def test_stop_root(self):
|
||||
view = mod.AuthView(self.request)
|
||||
|
||||
# GET not allowed
|
||||
self.request.method = 'GET'
|
||||
self.request.method = "GET"
|
||||
self.assertRaises(HTTPForbidden, view.stop_root)
|
||||
|
||||
# non-admin users also not allowed
|
||||
self.request.method = 'POST'
|
||||
self.request.method = "POST"
|
||||
self.request.is_admin = False
|
||||
self.assertRaises(HTTPForbidden, view.stop_root)
|
||||
|
||||
# but admin users can stop being root
|
||||
# (nb. there is no check whether user is currently root)
|
||||
self.request.is_admin = True
|
||||
self.assertNotIn('is_root', self.request.session)
|
||||
self.assertNotIn("is_root", self.request.session)
|
||||
redirect = view.stop_root()
|
||||
self.assertIsInstance(redirect, HTTPFound)
|
||||
self.assertFalse(self.request.session['is_root'])
|
||||
self.assertFalse(self.request.session["is_root"])
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue