mirror of
https://github.com/OCA/server-backend.git
synced 2025-02-18 09:52:42 +02:00
120 lines
4.1 KiB
Python
120 lines
4.1 KiB
Python
# Copyright 2018 Therp BV <https://therp.nl>
|
|
# Copyright 2019-2020 initOS GmbH <https://initos.com>
|
|
# License AGPL-3.0 or later (https://www.gnu.org/licenses/agpl.html).
|
|
|
|
from base64 import b64encode
|
|
from unittest import mock
|
|
from urllib.parse import urlparse
|
|
|
|
from odoo.tests.common import TransactionCase
|
|
from odoo.tools import mute_logger
|
|
|
|
from ..controllers.main import PREFIX
|
|
from ..controllers.main import Main as Controller
|
|
|
|
MODULE_PATH = "odoo.addons.base_dav"
|
|
CONTROLLER_PATH = MODULE_PATH + ".controllers.main"
|
|
RADICALE_PATH = MODULE_PATH + ".radicale"
|
|
|
|
ADMIN_PASSWORD = "RadicalePa$$word"
|
|
|
|
|
|
@mute_logger("radicale")
|
|
@mock.patch(CONTROLLER_PATH + ".request")
|
|
@mock.patch(RADICALE_PATH + ".auth.request")
|
|
@mock.patch(RADICALE_PATH + ".collection.request")
|
|
class TestBaseDav(TransactionCase):
|
|
def setUp(self):
|
|
super().setUp()
|
|
|
|
self.collection = self.env["dav.collection"].create({
|
|
"name": "Test Collection",
|
|
"dav_type": "calendar",
|
|
"model_id": self.env.ref("base.model_res_users").id,
|
|
"domain": "[]",
|
|
})
|
|
|
|
self.dav_path = urlparse(self.collection.url).path.replace(PREFIX, '')
|
|
|
|
self.controller = Controller()
|
|
self.env.user.password_crypt = ADMIN_PASSWORD
|
|
|
|
self.test_user = self.env["res.users"].create({
|
|
"login": "tester",
|
|
"name": "tester",
|
|
})
|
|
|
|
self.auth_owner = self.auth_string(self.env.user, ADMIN_PASSWORD)
|
|
self.auth_tester = self.auth_string(self.test_user, ADMIN_PASSWORD)
|
|
|
|
patcher = mock.patch('odoo.http.request')
|
|
self.addCleanup(patcher.stop)
|
|
patcher.start()
|
|
|
|
def auth_string(self, user, password):
|
|
return b64encode(
|
|
("%s:%s" % (user.login, password)).encode()
|
|
).decode()
|
|
|
|
def init_mocks(self, coll_mock, auth_mock, req_mock):
|
|
req_mock.env = self.env
|
|
req_mock.httprequest.environ = {
|
|
"HTTP_AUTHORIZATION": "Basic %s" % self.auth_owner,
|
|
"REQUEST_METHOD": "PROPFIND",
|
|
"HTTP_X_SCRIPT_NAME": PREFIX,
|
|
}
|
|
|
|
auth_mock.env["res.users"]._login.return_value = self.env.uid
|
|
coll_mock.env = self.env
|
|
|
|
def check_status_code(self, response, forbidden):
|
|
if forbidden:
|
|
self.assertNotEqual(response.status_code, 403)
|
|
else:
|
|
self.assertEqual(response.status_code, 403)
|
|
|
|
def check_access(self, environ, auth_string, read, write):
|
|
environ.update({
|
|
"REQUEST_METHOD": "PROPFIND",
|
|
"HTTP_AUTHORIZATION": "Basic %s" % auth_string,
|
|
})
|
|
response = self.controller.handle_dav_request(self.dav_path)
|
|
self.check_status_code(response, read)
|
|
|
|
environ["REQUEST_METHOD"] = "PUT"
|
|
response = self.controller.handle_dav_request(self.dav_path)
|
|
self.check_status_code(response, write)
|
|
|
|
def test_well_known(self, coll_mock, auth_mock, req_mock):
|
|
req_mock.env = self.env
|
|
|
|
response = self.controller.handle_well_known_request()
|
|
self.assertEqual(response.status_code, 301)
|
|
|
|
def test_authenticated(self, coll_mock, auth_mock, req_mock):
|
|
self.init_mocks(coll_mock, auth_mock, req_mock)
|
|
environ = req_mock.httprequest.environ
|
|
|
|
self.collection.rights = "authenticated"
|
|
|
|
self.check_access(environ, self.auth_owner, read=True, write=True)
|
|
self.check_access(environ, self.auth_tester, read=True, write=True)
|
|
|
|
def test_owner_only(self, coll_mock, auth_mock, req_mock):
|
|
self.init_mocks(coll_mock, auth_mock, req_mock)
|
|
environ = req_mock.httprequest.environ
|
|
|
|
self.collection.rights = "owner_only"
|
|
|
|
self.check_access(environ, self.auth_owner, read=True, write=True)
|
|
self.check_access(environ, self.auth_tester, read=False, write=False)
|
|
|
|
def test_owner_write_only(self, coll_mock, auth_mock, req_mock):
|
|
self.init_mocks(coll_mock, auth_mock, req_mock)
|
|
environ = req_mock.httprequest.environ
|
|
|
|
self.collection.rights = "owner_write_only"
|
|
|
|
self.check_access(environ, self.auth_owner, read=True, write=True)
|
|
self.check_access(environ, self.auth_tester, read=True, write=False)
|