diff options
| author | Arthur Rio <arthurio@users.noreply.github.com> | 2019-01-16 16:07:28 +0100 |
|---|---|---|
| committer | Tim Graham <timograham@gmail.com> | 2019-01-16 10:07:28 -0500 |
| commit | 181fb60159e54d442d3610f4afba6f066a6dac05 (patch) | |
| tree | 087646be10e537b2a9808e5351d30bd489e76273 /tests | |
| parent | dbcf2ffa77af24642c035c58199e6058d91d8e35 (diff) | |
Fixed #11154, #22270 -- Made proxy model permissions use correct content type.
Co-Authored-By: Simon Charette <charette.s@gmail.com>
Co-Authored-By: Antoine Catton <acatton@fusionbox.com>
Diffstat (limited to 'tests')
| -rw-r--r-- | tests/admin_views/admin.py | 4 | ||||
| -rw-r--r-- | tests/admin_views/models.py | 6 | ||||
| -rw-r--r-- | tests/admin_views/tests.py | 84 | ||||
| -rw-r--r-- | tests/auth_tests/models/__init__.py | 10 | ||||
| -rw-r--r-- | tests/auth_tests/models/proxy.py | 22 | ||||
| -rw-r--r-- | tests/auth_tests/test_management.py | 18 | ||||
| -rw-r--r-- | tests/auth_tests/test_migrations.py | 154 |
7 files changed, 288 insertions, 10 deletions
diff --git a/tests/admin_views/admin.py b/tests/admin_views/admin.py index d09e7fa084..0b0ad41e2e 100644 --- a/tests/admin_views/admin.py +++ b/tests/admin_views/admin.py @@ -43,7 +43,8 @@ from .models import ( Restaurant, RowLevelChangePermissionModel, Section, ShortMessage, Simple, Sketch, State, Story, StumpJoke, Subscriber, SuperVillain, Telegram, Thing, Topping, UnchangeableObject, UndeletableObject, UnorderedObject, - UserMessenger, Villain, Vodcast, Whatsit, Widget, Worker, WorkHour, + UserMessenger, UserProxy, Villain, Vodcast, Whatsit, Widget, Worker, + WorkHour, ) @@ -1075,6 +1076,7 @@ site.register(Ingredient) site.register(NotReferenced) site.register(ExplicitlyProvidedPK, GetFormsetsArgumentCheckingAdmin) site.register(ImplicitlyGeneratedPK, GetFormsetsArgumentCheckingAdmin) +site.register(UserProxy) # Register core models we need in our tests site.register(User, UserAdmin) diff --git a/tests/admin_views/models.py b/tests/admin_views/models.py index eef8106df4..d134b34923 100644 --- a/tests/admin_views/models.py +++ b/tests/admin_views/models.py @@ -976,3 +976,9 @@ class Author(models.Model): class Authorship(models.Model): book = models.ForeignKey(Book, models.CASCADE) author = models.ForeignKey(Author, models.CASCADE) + + +class UserProxy(User): + """Proxy a model with a different app_label.""" + class Meta: + proxy = True diff --git a/tests/admin_views/tests.py b/tests/admin_views/tests.py index 93a93454d9..0cc16509ff 100644 --- a/tests/admin_views/tests.py +++ b/tests/admin_views/tests.py @@ -52,7 +52,8 @@ from .models import ( Report, Restaurant, RowLevelChangePermissionModel, SecretHideout, Section, ShortMessage, Simple, State, Story, SuperSecretHideout, SuperVillain, Telegram, TitleTranslation, Topping, UnchangeableObject, UndeletableObject, - UnorderedObject, Villain, Vodcast, Whatsit, Widget, Worker, WorkHour, + UnorderedObject, UserProxy, Villain, Vodcast, Whatsit, Widget, Worker, + WorkHour, ) ERROR_MESSAGE = "Please enter the correct username and password \ @@ -1362,10 +1363,10 @@ class CustomModelAdminTest(AdminViewBasicTestCase): self.assertEqual(response.status_code, 200) -def get_perm(Model, perm): +def get_perm(Model, codename): """Return the permission object, for the Model""" - ct = ContentType.objects.get_for_model(Model) - return Permission.objects.get(content_type=ct, codename=perm) + ct = ContentType.objects.get_for_model(Model, for_concrete_model=False) + return Permission.objects.get(content_type=ct, codename=codename) @override_settings( @@ -2384,6 +2385,81 @@ class AdminViewPermissionsTest(TestCase): ) +@override_settings( + ROOT_URLCONF='admin_views.urls', + TEMPLATES=[{ + 'BACKEND': 'django.template.backends.django.DjangoTemplates', + 'APP_DIRS': True, + 'OPTIONS': { + 'context_processors': [ + 'django.contrib.auth.context_processors.auth', + 'django.contrib.messages.context_processors.messages', + ], + }, + }], +) +class AdminViewProxyModelPermissionsTests(TestCase): + """Tests for proxy models permissions in the admin.""" + + @classmethod + def setUpTestData(cls): + cls.viewuser = User.objects.create_user(username='viewuser', password='secret', is_staff=True) + cls.adduser = User.objects.create_user(username='adduser', password='secret', is_staff=True) + cls.changeuser = User.objects.create_user(username='changeuser', password='secret', is_staff=True) + cls.deleteuser = User.objects.create_user(username='deleteuser', password='secret', is_staff=True) + # Setup permissions. + opts = UserProxy._meta + cls.viewuser.user_permissions.add(get_perm(UserProxy, get_permission_codename('view', opts))) + cls.adduser.user_permissions.add(get_perm(UserProxy, get_permission_codename('add', opts))) + cls.changeuser.user_permissions.add(get_perm(UserProxy, get_permission_codename('change', opts))) + cls.deleteuser.user_permissions.add(get_perm(UserProxy, get_permission_codename('delete', opts))) + # UserProxy instances. + cls.user_proxy = UserProxy.objects.create(username='user_proxy', password='secret') + + def test_add(self): + self.client.force_login(self.adduser) + url = reverse('admin:admin_views_userproxy_add') + data = { + 'username': 'can_add', + 'password': 'secret', + 'date_joined_0': '2019-01-15', + 'date_joined_1': '16:59:10', + } + response = self.client.post(url, data, follow=True) + self.assertEqual(response.status_code, 200) + self.assertTrue(UserProxy.objects.filter(username='can_add').exists()) + + def test_view(self): + self.client.force_login(self.viewuser) + response = self.client.get(reverse('admin:admin_views_userproxy_changelist')) + self.assertContains(response, '<h1>Select user proxy to view</h1>') + self.assertEqual(response.status_code, 200) + response = self.client.get(reverse('admin:admin_views_userproxy_change', args=(self.user_proxy.pk,))) + self.assertContains(response, '<h1>View user proxy</h1>') + self.assertContains(response, '<div class="readonly">user_proxy</div>') + + def test_change(self): + self.client.force_login(self.changeuser) + data = { + 'password': self.user_proxy.password, + 'username': self.user_proxy.username, + 'date_joined_0': self.user_proxy.date_joined.strftime('%Y-%m-%d'), + 'date_joined_1': self.user_proxy.date_joined.strftime('%H:%M:%S'), + 'first_name': 'first_name', + } + url = reverse('admin:admin_views_userproxy_change', args=(self.user_proxy.pk,)) + response = self.client.post(url, data) + self.assertRedirects(response, reverse('admin:admin_views_userproxy_changelist')) + self.assertEqual(UserProxy.objects.get(pk=self.user_proxy.pk).first_name, 'first_name') + + def test_delete(self): + self.client.force_login(self.deleteuser) + url = reverse('admin:admin_views_userproxy_delete', args=(self.user_proxy.pk,)) + response = self.client.post(url, {'post': 'yes'}, follow=True) + self.assertEqual(response.status_code, 200) + self.assertFalse(UserProxy.objects.filter(pk=self.user_proxy.pk).exists()) + + @override_settings(ROOT_URLCONF='admin_views.urls') class AdminViewsNoUrlTest(TestCase): """Regression test for #17333""" diff --git a/tests/auth_tests/models/__init__.py b/tests/auth_tests/models/__init__.py index 3422255d33..785e6953ff 100644 --- a/tests/auth_tests/models/__init__.py +++ b/tests/auth_tests/models/__init__.py @@ -6,14 +6,16 @@ from .invalid_models import CustomUserNonUniqueUsername from .is_active import IsActiveTestUser1 from .minimal import MinimalUser from .no_password import NoPasswordUser +from .proxy import Proxy, UserProxy from .uuid_pk import UUIDUser from .with_foreign_key import CustomUserWithFK, Email from .with_integer_username import IntegerUsernameUser from .with_last_login_attr import UserWithDisabledLastLoginField __all__ = ( - 'CustomUser', 'CustomUserWithoutIsActiveField', 'CustomPermissionsUser', - 'CustomUserWithFK', 'Email', 'ExtensionUser', 'IsActiveTestUser1', - 'MinimalUser', 'NoPasswordUser', 'UUIDUser', 'CustomUserNonUniqueUsername', - 'IntegerUsernameUser', 'UserWithDisabledLastLoginField', + 'CustomPermissionsUser', 'CustomUser', 'CustomUserNonUniqueUsername', + 'CustomUserWithFK', 'CustomUserWithoutIsActiveField', 'Email', + 'ExtensionUser', 'IntegerUsernameUser', 'IsActiveTestUser1', 'MinimalUser', + 'NoPasswordUser', 'Proxy', 'UUIDUser', 'UserProxy', + 'UserWithDisabledLastLoginField', ) diff --git a/tests/auth_tests/models/proxy.py b/tests/auth_tests/models/proxy.py new file mode 100644 index 0000000000..9e82a398c2 --- /dev/null +++ b/tests/auth_tests/models/proxy.py @@ -0,0 +1,22 @@ +from django.contrib.auth.models import User +from django.db import models + + +class Concrete(models.Model): + pass + + +class Proxy(Concrete): + class Meta: + proxy = True + permissions = ( + ('display_proxys', 'May display proxys information'), + ) + + +class UserProxy(User): + class Meta: + proxy = True + permissions = ( + ('use_different_app_label', 'May use a different app label'), + ) diff --git a/tests/auth_tests/test_management.py b/tests/auth_tests/test_management.py index 87f2ae1790..d0a91f3261 100644 --- a/tests/auth_tests/test_management.py +++ b/tests/auth_tests/test_management.py @@ -6,7 +6,7 @@ from io import StringIO from unittest import mock from django.apps import apps -from django.contrib.auth import management +from django.contrib.auth import get_permission_codename, management from django.contrib.auth.management import ( create_permissions, get_default_username, ) @@ -23,6 +23,7 @@ from django.utils.translation import gettext_lazy as _ from .models import ( CustomUser, CustomUserNonUniqueUsername, CustomUserWithFK, Email, + UserProxy, ) MOCK_INPUT_KEY_TO_PROMPTS = { @@ -985,3 +986,18 @@ class CreatePermissionsTests(TestCase): ContentType.objects.filter(app_label='auth', model='group').delete() # This fails with a foreign key constraint without the fix. create_permissions(apps.get_app_config('auth'), interactive=False, verbosity=0) + + def test_permission_with_proxy_content_type_created(self): + """ + A proxy model's permissions use its own content type rather than the + content type of the concrete model. + """ + opts = UserProxy._meta + codename = get_permission_codename('add', opts) + self.assertTrue( + Permission.objects.filter( + content_type__model=opts.model_name, + content_type__app_label=opts.app_label, + codename=codename, + ).exists() + ) diff --git a/tests/auth_tests/test_migrations.py b/tests/auth_tests/test_migrations.py new file mode 100644 index 0000000000..5ff2f6b4b3 --- /dev/null +++ b/tests/auth_tests/test_migrations.py @@ -0,0 +1,154 @@ +from importlib import import_module + +from django.apps import apps +from django.contrib.auth.models import Permission, User +from django.contrib.contenttypes.models import ContentType +from django.test import TestCase + +from .models import Proxy, UserProxy + +update_proxy_permissions = import_module('django.contrib.auth.migrations.0011_update_proxy_permissions') + + +class ProxyModelWithDifferentAppLabelTests(TestCase): + available_apps = [ + 'auth_tests', + 'django.contrib.auth', + 'django.contrib.contenttypes', + ] + + def setUp(self): + """ + Create proxy permissions with content_type to the concrete model + rather than the proxy model (as they were before Django 2.2 and + migration 11). + """ + Permission.objects.all().delete() + self.concrete_content_type = ContentType.objects.get_for_model(UserProxy) + self.default_permission = Permission.objects.create( + content_type=self.concrete_content_type, + codename='add_userproxy', + name='Can add userproxy', + ) + self.custom_permission = Permission.objects.create( + content_type=self.concrete_content_type, + codename='use_different_app_label', + name='May use a different app label', + ) + + def test_proxy_model_permissions_contenttype(self): + proxy_model_content_type = ContentType.objects.get_for_model(UserProxy, for_concrete_model=False) + self.assertEqual(self.default_permission.content_type, self.concrete_content_type) + self.assertEqual(self.custom_permission.content_type, self.concrete_content_type) + update_proxy_permissions.update_proxy_model_permissions(apps, None) + self.default_permission.refresh_from_db() + self.assertEqual(self.default_permission.content_type, proxy_model_content_type) + self.custom_permission.refresh_from_db() + self.assertEqual(self.custom_permission.content_type, proxy_model_content_type) + + def test_user_has_now_proxy_model_permissions(self): + user = User.objects.create() + user.user_permissions.add(self.default_permission) + user.user_permissions.add(self.custom_permission) + for permission in [self.default_permission, self.custom_permission]: + self.assertTrue(user.has_perm('auth.' + permission.codename)) + self.assertFalse(user.has_perm('auth_tests.' + permission.codename)) + update_proxy_permissions.update_proxy_model_permissions(apps, None) + # Reload user to purge the _perm_cache. + user = User._default_manager.get(pk=user.pk) + for permission in [self.default_permission, self.custom_permission]: + self.assertFalse(user.has_perm('auth.' + permission.codename)) + self.assertTrue(user.has_perm('auth_tests.' + permission.codename)) + + def test_migrate_backwards(self): + update_proxy_permissions.update_proxy_model_permissions(apps, None) + update_proxy_permissions.revert_proxy_model_permissions(apps, None) + self.default_permission.refresh_from_db() + self.assertEqual(self.default_permission.content_type, self.concrete_content_type) + self.custom_permission.refresh_from_db() + self.assertEqual(self.custom_permission.content_type, self.concrete_content_type) + + def test_user_keeps_same_permissions_after_migrating_backward(self): + user = User.objects.create() + user.user_permissions.add(self.default_permission) + user.user_permissions.add(self.custom_permission) + for permission in [self.default_permission, self.custom_permission]: + self.assertTrue(user.has_perm('auth.' + permission.codename)) + self.assertFalse(user.has_perm('auth_tests.' + permission.codename)) + update_proxy_permissions.update_proxy_model_permissions(apps, None) + update_proxy_permissions.revert_proxy_model_permissions(apps, None) + # Reload user to purge the _perm_cache. + user = User._default_manager.get(pk=user.pk) + for permission in [self.default_permission, self.custom_permission]: + self.assertTrue(user.has_perm('auth.' + permission.codename)) + self.assertFalse(user.has_perm('auth_tests.' + permission.codename)) + + +class ProxyModelWithSameAppLabelTests(TestCase): + available_apps = [ + 'auth_tests', + 'django.contrib.auth', + 'django.contrib.contenttypes', + ] + + def setUp(self): + """ + Create proxy permissions with content_type to the concrete model + rather than the proxy model (as they were before Django 2.2 and + migration 11). + """ + Permission.objects.all().delete() + self.concrete_content_type = ContentType.objects.get_for_model(Proxy) + self.default_permission = Permission.objects.create( + content_type=self.concrete_content_type, + codename='add_proxy', + name='Can add proxy', + ) + self.custom_permission = Permission.objects.create( + content_type=self.concrete_content_type, + codename='display_proxys', + name='May display proxys information', + ) + + def test_proxy_model_permissions_contenttype(self): + proxy_model_content_type = ContentType.objects.get_for_model(Proxy, for_concrete_model=False) + self.assertEqual(self.default_permission.content_type, self.concrete_content_type) + self.assertEqual(self.custom_permission.content_type, self.concrete_content_type) + update_proxy_permissions.update_proxy_model_permissions(apps, None) + self.default_permission.refresh_from_db() + self.custom_permission.refresh_from_db() + self.assertEqual(self.default_permission.content_type, proxy_model_content_type) + self.assertEqual(self.custom_permission.content_type, proxy_model_content_type) + + def test_user_still_has_proxy_model_permissions(self): + user = User.objects.create() + user.user_permissions.add(self.default_permission) + user.user_permissions.add(self.custom_permission) + for permission in [self.default_permission, self.custom_permission]: + self.assertTrue(user.has_perm('auth_tests.' + permission.codename)) + update_proxy_permissions.update_proxy_model_permissions(apps, None) + # Reload user to purge the _perm_cache. + user = User._default_manager.get(pk=user.pk) + for permission in [self.default_permission, self.custom_permission]: + self.assertTrue(user.has_perm('auth_tests.' + permission.codename)) + + def test_migrate_backwards(self): + update_proxy_permissions.update_proxy_model_permissions(apps, None) + update_proxy_permissions.revert_proxy_model_permissions(apps, None) + self.default_permission.refresh_from_db() + self.assertEqual(self.default_permission.content_type, self.concrete_content_type) + self.custom_permission.refresh_from_db() + self.assertEqual(self.custom_permission.content_type, self.concrete_content_type) + + def test_user_keeps_same_permissions_after_migrating_backward(self): + user = User.objects.create() + user.user_permissions.add(self.default_permission) + user.user_permissions.add(self.custom_permission) + for permission in [self.default_permission, self.custom_permission]: + self.assertTrue(user.has_perm('auth_tests.' + permission.codename)) + update_proxy_permissions.update_proxy_model_permissions(apps, None) + update_proxy_permissions.revert_proxy_model_permissions(apps, None) + # Reload user to purge the _perm_cache. + user = User._default_manager.get(pk=user.pk) + for permission in [self.default_permission, self.custom_permission]: + self.assertTrue(user.has_perm('auth_tests.' + permission.codename)) |
