summaryrefslogtreecommitdiff
path: root/tests/admin_views
diff options
context:
space:
mode:
Diffstat (limited to 'tests/admin_views')
-rw-r--r--tests/admin_views/tests.py90
1 files changed, 90 insertions, 0 deletions
diff --git a/tests/admin_views/tests.py b/tests/admin_views/tests.py
index 2d1e58aa26..a94bbbccfc 100644
--- a/tests/admin_views/tests.py
+++ b/tests/admin_views/tests.py
@@ -1918,6 +1918,96 @@ class AdminViewPermissionsTest(TestCase):
new_article = Article.objects.latest('id')
self.assertRedirects(post, reverse('admin:admin_views_article_change', args=(new_article.pk,)))
+ def test_change_view_with_view_only_inlines(self):
+ """
+ User with change permission to a section but view-only for inlines.
+ """
+ self.viewuser.user_permissions.add(get_perm(Section, get_permission_codename('change', Section._meta)))
+ self.client.force_login(self.viewuser)
+ # GET shows inlines.
+ response = self.client.get(reverse('admin:admin_views_section_change', args=(self.s1.pk,)))
+ self.assertEqual(len(response.context['inline_admin_formsets']), 1)
+ formset = response.context['inline_admin_formsets'][0]
+ self.assertEqual(len(formset.forms), 3)
+ # Valid POST changes the name.
+ data = {
+ 'name': 'Can edit name with view-only inlines',
+ 'article_set-TOTAL_FORMS': 3,
+ 'article_set-INITIAL_FORMS': 3
+ }
+ response = self.client.post(reverse('admin:admin_views_section_change', args=(self.s1.pk,)), data)
+ self.assertRedirects(response, reverse('admin:admin_views_section_changelist'))
+ self.assertEqual(Section.objects.get(pk=self.s1.pk).name, data['name'])
+ # Invalid POST reshows inlines.
+ del data['name']
+ response = self.client.post(reverse('admin:admin_views_section_change', args=(self.s1.pk,)), data)
+ self.assertEqual(response.status_code, 200)
+ self.assertEqual(len(response.context['inline_admin_formsets']), 1)
+ formset = response.context['inline_admin_formsets'][0]
+ self.assertEqual(len(formset.forms), 3)
+
+ def test_change_view_with_view_and_add_inlines(self):
+ """User has view and add permissions on the inline model."""
+ self.viewuser.user_permissions.add(get_perm(Section, get_permission_codename('change', Section._meta)))
+ self.viewuser.user_permissions.add(get_perm(Article, get_permission_codename('add', Article._meta)))
+ self.client.force_login(self.viewuser)
+ # GET shows inlines.
+ response = self.client.get(reverse('admin:admin_views_section_change', args=(self.s1.pk,)))
+ self.assertEqual(len(response.context['inline_admin_formsets']), 1)
+ formset = response.context['inline_admin_formsets'][0]
+ self.assertEqual(len(formset.forms), 6)
+ # Valid POST creates a new article.
+ data = {
+ 'name': 'Can edit name with view-only inlines',
+ 'article_set-TOTAL_FORMS': 6,
+ 'article_set-INITIAL_FORMS': 3,
+ 'article_set-3-id': [''],
+ 'article_set-3-title': ['A title'],
+ 'article_set-3-content': ['Added content'],
+ 'article_set-3-date_0': ['2008-3-18'],
+ 'article_set-3-date_1': ['11:54:58'],
+ 'article_set-3-section': [str(self.s1.pk)],
+ }
+ response = self.client.post(reverse('admin:admin_views_section_change', args=(self.s1.pk,)), data)
+ self.assertRedirects(response, reverse('admin:admin_views_section_changelist'))
+ self.assertEqual(Section.objects.get(pk=self.s1.pk).name, data['name'])
+ self.assertEqual(Article.objects.count(), 4)
+ # Invalid POST reshows inlines.
+ del data['name']
+ response = self.client.post(reverse('admin:admin_views_section_change', args=(self.s1.pk,)), data)
+ self.assertEqual(response.status_code, 200)
+ self.assertEqual(len(response.context['inline_admin_formsets']), 1)
+ formset = response.context['inline_admin_formsets'][0]
+ self.assertEqual(len(formset.forms), 6)
+
+ def test_change_view_with_view_and_delete_inlines(self):
+ """User has view and delete permissions on the inline model."""
+ self.viewuser.user_permissions.add(get_perm(Section, get_permission_codename('change', Section._meta)))
+ self.client.force_login(self.viewuser)
+ data = {
+ 'name': 'Name is required.',
+ 'article_set-TOTAL_FORMS': 6,
+ 'article_set-INITIAL_FORMS': 3,
+ 'article_set-0-id': [str(self.a1.pk)],
+ 'article_set-0-DELETE': ['on'],
+ }
+ # Inline POST details are ignored without delete permission.
+ response = self.client.post(reverse('admin:admin_views_section_change', args=(self.s1.pk,)), data)
+ self.assertRedirects(response, reverse('admin:admin_views_section_changelist'))
+ self.assertEqual(Article.objects.count(), 3)
+ # Deletion successful when delete permission is added.
+ self.viewuser.user_permissions.add(get_perm(Article, get_permission_codename('delete', Article._meta)))
+ data = {
+ 'name': 'Name is required.',
+ 'article_set-TOTAL_FORMS': 6,
+ 'article_set-INITIAL_FORMS': 3,
+ 'article_set-0-id': [str(self.a1.pk)],
+ 'article_set-0-DELETE': ['on'],
+ }
+ response = self.client.post(reverse('admin:admin_views_section_change', args=(self.s1.pk,)), data)
+ self.assertRedirects(response, reverse('admin:admin_views_section_changelist'))
+ self.assertEqual(Article.objects.count(), 2)
+
def test_delete_view(self):
"""Delete view should restrict access and actually delete items."""
delete_dict = {'post': 'yes'}