312 lines
12 KiB
Python
312 lines
12 KiB
Python
import json
|
|
|
|
import ddt
|
|
from django.conf import settings
|
|
from django.contrib.auth.models import User
|
|
from django.test import TestCase
|
|
from django.test.client import Client
|
|
from mock import patch, Mock
|
|
from opaque_keys.edx.locator import CourseLocator
|
|
|
|
from django_comment_common.models import (
|
|
Role, FORUM_ROLE_ADMINISTRATOR, FORUM_ROLE_MODERATOR, FORUM_ROLE_STUDENT
|
|
)
|
|
from django_comment_common.utils import seed_permissions_roles
|
|
from student.models import anonymous_id_for_user, CourseAccessRole, CourseEnrollment, UserProfile
|
|
from util.testing import UrlResetMixin
|
|
|
|
|
|
class AutoAuthTestCase(UrlResetMixin, TestCase):
|
|
"""
|
|
Base class for AutoAuth Tests that properly resets the urls.py
|
|
"""
|
|
URLCONF_MODULES = ['student.urls']
|
|
|
|
|
|
@ddt.ddt
|
|
class AutoAuthEnabledTestCase(AutoAuthTestCase):
|
|
"""
|
|
Tests for the Auto auth view that we have for load testing.
|
|
"""
|
|
COURSE_ID_MONGO = 'edX/Test101/2014_Spring'
|
|
COURSE_ID_SPLIT = 'course-v1:edX+Test101+2014_Spring'
|
|
COURSE_IDS_DDT = (
|
|
(COURSE_ID_MONGO, CourseLocator.from_string(COURSE_ID_MONGO)),
|
|
(COURSE_ID_SPLIT, CourseLocator.from_string(COURSE_ID_SPLIT)),
|
|
)
|
|
|
|
@patch.dict("django.conf.settings.FEATURES", {"AUTOMATIC_AUTH_FOR_TESTING": True})
|
|
def setUp(self):
|
|
# Patching the settings.FEATURES['AUTOMATIC_AUTH_FOR_TESTING']
|
|
# value affects the contents of urls.py,
|
|
# so we need to call super.setUp() which reloads urls.py (because
|
|
# of the UrlResetMixin)
|
|
super(AutoAuthEnabledTestCase, self).setUp()
|
|
self.url = '/auto_auth'
|
|
self.client = Client()
|
|
|
|
def test_create_user(self):
|
|
"""
|
|
Test that user gets created when visiting the page.
|
|
"""
|
|
self._auto_auth()
|
|
self.assertEqual(User.objects.count(), 1)
|
|
user = User.objects.all()[0]
|
|
self.assertTrue(user.is_active)
|
|
self.assertFalse(user.profile.requires_parental_consent())
|
|
|
|
def test_create_same_user(self):
|
|
self._auto_auth({'username': 'test'})
|
|
self._auto_auth({'username': 'test'})
|
|
self.assertEqual(User.objects.count(), 1)
|
|
|
|
def test_create_multiple_users(self):
|
|
"""
|
|
Test to make sure multiple users are created.
|
|
"""
|
|
self._auto_auth()
|
|
self.client.logout()
|
|
self._auto_auth()
|
|
self.assertEqual(User.objects.all().count(), 2)
|
|
|
|
def test_create_defined_user(self):
|
|
"""
|
|
Test that the user gets created with the correct attributes
|
|
when they are passed as parameters on the auto-auth page.
|
|
"""
|
|
self._auto_auth({
|
|
'username': 'robot', 'password': 'test',
|
|
'email': 'robot@edx.org', 'full_name': "Robot Name"
|
|
})
|
|
|
|
# Check that the user has the correct info
|
|
user = User.objects.get(username='robot')
|
|
self.assertEqual(user.username, 'robot')
|
|
self.assertTrue(user.check_password('test'))
|
|
self.assertEqual(user.email, 'robot@edx.org')
|
|
|
|
# Check that the user has a profile
|
|
user_profile = UserProfile.objects.get(user=user)
|
|
self.assertEqual(user_profile.name, "Robot Name")
|
|
|
|
# By default, the user should not be global staff
|
|
self.assertFalse(user.is_staff)
|
|
|
|
def test_create_staff_user(self):
|
|
|
|
# Create a staff user
|
|
self._auto_auth({'username': 'test', 'staff': 'true'})
|
|
user = User.objects.get(username='test')
|
|
self.assertTrue(user.is_staff)
|
|
|
|
# Revoke staff privileges
|
|
self._auto_auth({'username': 'test', 'staff': 'false'})
|
|
user = User.objects.get(username='test')
|
|
self.assertFalse(user.is_staff)
|
|
|
|
@ddt.data(*COURSE_IDS_DDT)
|
|
@ddt.unpack
|
|
def test_course_enrollment(self, course_id, course_key):
|
|
|
|
# Create a user and enroll in a course
|
|
self._auto_auth({'username': 'test', 'course_id': course_id})
|
|
|
|
# Check that a course enrollment was created for the user
|
|
self.assertEqual(CourseEnrollment.objects.count(), 1)
|
|
enrollment = CourseEnrollment.objects.get(course_id=course_key)
|
|
self.assertEqual(enrollment.user.username, "test")
|
|
|
|
@ddt.data(*COURSE_IDS_DDT)
|
|
@ddt.unpack
|
|
def test_double_enrollment(self, course_id, course_key):
|
|
|
|
# Create a user and enroll in a course
|
|
self._auto_auth({'username': 'test', 'course_id': course_id})
|
|
|
|
# Make the same call again, re-enrolling the student in the same course
|
|
self._auto_auth({'username': 'test', 'course_id': course_id})
|
|
|
|
# Check that only one course enrollment was created for the user
|
|
self.assertEqual(CourseEnrollment.objects.count(), 1)
|
|
enrollment = CourseEnrollment.objects.get(course_id=course_key)
|
|
self.assertEqual(enrollment.user.username, "test")
|
|
|
|
@ddt.data(*COURSE_IDS_DDT)
|
|
@ddt.unpack
|
|
def test_set_roles(self, course_id, course_key):
|
|
seed_permissions_roles(course_key)
|
|
course_roles = dict((r.name, r) for r in Role.objects.filter(course_id=course_key))
|
|
self.assertEqual(len(course_roles), 5) # sanity check
|
|
|
|
# Student role is assigned by default on course enrollment.
|
|
self._auto_auth({'username': 'a_student', 'course_id': course_id})
|
|
user = User.objects.get(username='a_student')
|
|
user_roles = user.roles.all()
|
|
self.assertEqual(len(user_roles), 1)
|
|
self.assertEqual(user_roles[0], course_roles[FORUM_ROLE_STUDENT])
|
|
|
|
self.client.logout()
|
|
self._auto_auth({'username': 'a_moderator', 'course_id': course_id, 'roles': 'Moderator'})
|
|
user = User.objects.get(username='a_moderator')
|
|
user_roles = user.roles.all()
|
|
self.assertEqual(
|
|
set(user_roles),
|
|
set([course_roles[FORUM_ROLE_STUDENT],
|
|
course_roles[FORUM_ROLE_MODERATOR]]))
|
|
|
|
# check multiple roles work.
|
|
self.client.logout()
|
|
self._auto_auth({
|
|
'username': 'an_admin', 'course_id': course_id,
|
|
'roles': '{},{}'.format(FORUM_ROLE_MODERATOR, FORUM_ROLE_ADMINISTRATOR)
|
|
})
|
|
user = User.objects.get(username='an_admin')
|
|
user_roles = user.roles.all()
|
|
self.assertEqual(
|
|
set(user_roles),
|
|
set([course_roles[FORUM_ROLE_STUDENT],
|
|
course_roles[FORUM_ROLE_MODERATOR],
|
|
course_roles[FORUM_ROLE_ADMINISTRATOR]]))
|
|
|
|
def test_json_response(self):
|
|
""" The view should return JSON. """
|
|
response = self._auto_auth()
|
|
response_data = json.loads(response.content)
|
|
for key in ['created_status', 'username', 'email', 'password', 'user_id', 'anonymous_id']:
|
|
self.assertIn(key, response_data)
|
|
user = User.objects.get(username=response_data['username'])
|
|
self.assertDictContainsSubset(
|
|
{
|
|
'created_status': 'Logged in',
|
|
'anonymous_id': anonymous_id_for_user(user, None),
|
|
},
|
|
response_data
|
|
)
|
|
|
|
@ddt.data(*COURSE_IDS_DDT)
|
|
@ddt.unpack
|
|
def test_redirect_to_course(self, course_id, course_key):
|
|
# Create a user and enroll in a course
|
|
response = self._auto_auth({
|
|
'username': 'test',
|
|
'course_id': course_id,
|
|
'redirect': True,
|
|
'staff': 'true',
|
|
}, status_code=302)
|
|
|
|
# Check that a course enrollment was created for the user
|
|
self.assertEqual(CourseEnrollment.objects.count(), 1)
|
|
enrollment = CourseEnrollment.objects.get(course_id=course_key)
|
|
self.assertEqual(enrollment.user.username, "test")
|
|
|
|
# Check that the redirect was to the course info/outline page
|
|
if settings.ROOT_URLCONF == 'lms.urls':
|
|
url_pattern = '/course/'
|
|
else:
|
|
url_pattern = '/course/{}'.format(unicode(course_key))
|
|
|
|
self.assertTrue(response.url.endswith(url_pattern)) # pylint: disable=no-member
|
|
|
|
def test_redirect_to_main(self):
|
|
# Create user and redirect to 'home' (cms) or 'dashboard' (lms)
|
|
response = self._auto_auth({
|
|
'username': 'test',
|
|
'redirect': True,
|
|
'staff': 'true',
|
|
}, status_code=302)
|
|
|
|
# Check that the redirect was to either /dashboard or /home
|
|
if settings.ROOT_URLCONF == 'lms.urls':
|
|
url_pattern = '/dashboard'
|
|
else:
|
|
url_pattern = '/home'
|
|
|
|
self.assertTrue(response.url.endswith(url_pattern)) # pylint: disable=no-member
|
|
|
|
def test_redirect_to_specified(self):
|
|
# Create user and redirect to specified url
|
|
url_pattern = '/u/test#about_me'
|
|
response = self._auto_auth({
|
|
'username': 'test',
|
|
'redirect_to': url_pattern,
|
|
'staff': 'true',
|
|
}, status_code=302)
|
|
|
|
self.assertTrue(response.url.endswith(url_pattern)) # pylint: disable=no-member
|
|
|
|
def _auto_auth(self, params=None, status_code=200, **kwargs):
|
|
"""
|
|
Make a request to the auto-auth end-point and check
|
|
that the response is successful.
|
|
|
|
Arguments:
|
|
params (dict): Dict of params to pass to the auto_auth view
|
|
status_code (int): Expected response status code
|
|
kwargs: Passed directly to the test client's get method.
|
|
|
|
Returns:
|
|
Response: The response object for the auto_auth page.
|
|
"""
|
|
params = params or {}
|
|
response = self.client.get(self.url, params, **kwargs)
|
|
|
|
self.assertEqual(response.status_code, status_code)
|
|
|
|
# Check that session and CSRF are set in the response
|
|
for cookie in ['csrftoken', 'sessionid']:
|
|
self.assertIn(cookie, response.cookies) # pylint: disable=maybe-no-member
|
|
self.assertTrue(response.cookies[cookie].value) # pylint: disable=maybe-no-member
|
|
|
|
return response
|
|
|
|
@patch("openedx.core.djangoapps.site_configuration.helpers.get_value", Mock(return_value=False))
|
|
def test_create_account_not_allowed(self):
|
|
"""
|
|
Test case to check user creation is forbidden when ALLOW_PUBLIC_ACCOUNT_CREATION feature flag is turned off
|
|
"""
|
|
response = self.client.get(self.url)
|
|
self.assertEqual(response.status_code, 403)
|
|
|
|
def test_course_access_roles(self):
|
|
""" Passing role names via the course_access_roles query string parameter should create CourseAccessRole
|
|
objects associated with the user.
|
|
"""
|
|
expected_roles = ['finance_admin', 'sales_admin']
|
|
course_key = CourseLocator.from_string(self.COURSE_ID_SPLIT)
|
|
params = {
|
|
'course_id': str(course_key),
|
|
'course_access_roles': ','.join(expected_roles)
|
|
}
|
|
response = self._auto_auth(params)
|
|
user_info = json.loads(response.content)
|
|
|
|
for role in expected_roles:
|
|
self.assertTrue(
|
|
CourseAccessRole.objects.filter(
|
|
user__id=user_info['user_id'], course_id=course_key, org=course_key.org, role=role
|
|
).exists()
|
|
)
|
|
|
|
|
|
class AutoAuthDisabledTestCase(AutoAuthTestCase):
|
|
"""
|
|
Test that the page is inaccessible with default settings
|
|
"""
|
|
|
|
@patch.dict("django.conf.settings.FEATURES", {"AUTOMATIC_AUTH_FOR_TESTING": False})
|
|
def setUp(self):
|
|
# Patching the settings.FEATURES['AUTOMATIC_AUTH_FOR_TESTING']
|
|
# value affects the contents of urls.py,
|
|
# so we need to call super.setUp() which reloads urls.py (because
|
|
# of the UrlResetMixin)
|
|
super(AutoAuthDisabledTestCase, self).setUp()
|
|
self.url = '/auto_auth'
|
|
self.client = Client()
|
|
|
|
def test_auto_auth_disabled(self):
|
|
"""
|
|
Make sure automatic authentication is disabled.
|
|
"""
|
|
response = self.client.get(self.url)
|
|
self.assertEqual(response.status_code, 404)
|