Statistics
| Branch: | Tag: | Revision:

root / snf-astakos-app / astakos / im / tests / projects.py @ 5f28aa14

History | View | Annotate | Download (9.9 kB)

1
# Copyright 2011, 2012, 2013 GRNET S.A. All rights reserved.
2
#
3
# Redistribution and use in source and binary forms, with or
4
# without modification, are permitted provided that the following
5
# conditions are met:
6
#
7
#   1. Redistributions of source code must retain the above
8
#      copyright notice, this list of conditions and the following
9
#      disclaimer.
10
#
11
#   2. Redistributions in binary form must reproduce the above
12
#      copyright notice, this list of conditions and the following
13
#      disclaimer in the documentation and/or other materials
14
#      provided with the distribution.
15
#
16
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27
# POSSIBILITY OF SUCH DAMAGE.
28
#
29
# The views and conclusions contained in the software and
30
# documentation are those of the authors and should not be
31
# interpreted as representing official policies, either expressed
32
# or implied, of GRNET S.A.
33

    
34
from astakos.im.tests.common import *
35

    
36

    
37
class TestProjects(TestCase):
38
    """
39
    Test projects.
40
    """
41
    def setUp(self):
42
        # astakos resources
43
        self.resource = Resource.objects.create(name="astakos.pending_app",
44
                                                uplimit=0,
45
                                                allow_in_projects=False,
46
                                                service_type="astakos")
47

    
48
        # custom service resources
49
        self.resource = Resource.objects.create(name="service1.resource",
50
                                                uplimit=100,
51
                                                service_type="service1")
52
        self.admin = get_local_user("projects-admin@synnefo.org")
53
        self.admin.uuid = 'uuid1'
54
        self.admin.save()
55

    
56
        self.user = get_local_user("user@synnefo.org")
57
        self.member = get_local_user("member@synnefo.org")
58
        self.member2 = get_local_user("member2@synnefo.org")
59

    
60
        self.admin_client = get_user_client("projects-admin@synnefo.org")
61
        self.user_client = get_user_client("user@synnefo.org")
62
        self.member_client = get_user_client("member@synnefo.org")
63
        self.member2_client = get_user_client("member2@synnefo.org")
64

    
65
        quotas.qh_sync_users(AstakosUser.objects.all())
66

    
67
    def tearDown(self):
68
        Service.objects.all().delete()
69
        ProjectApplication.objects.all().delete()
70

    
71
    @im_settings(PROJECT_ADMINS=['uuid1'])
72
    def test_application_limit(self):
73
        # user cannot create a project
74
        r = self.user_client.get(reverse('project_add'), follow=True)
75
        self.assertRedirects(r, reverse('project_list'))
76
        self.assertContains(r, "You are not allowed to create a new project")
77

    
78
        # but admin can
79
        r = self.admin_client.get(reverse('project_add'), follow=True)
80
        self.assertRedirects(r, reverse('project_add'))
81

    
82
    @im_settings(PROJECT_ADMINS=['uuid1'])
83
    def test_allow_in_project(self):
84
        dfrom = datetime.now()
85
        dto = datetime.now() + timedelta(days=30)
86

    
87
        # astakos.pending_uplimit allow_in_project flag is False
88
        # we shouldn't be able to create a project application using this
89
        # resource.
90
        application_data = {
91
            'name': 'project.synnefo.org',
92
            'homepage': 'https://www.synnefo.org',
93
            'start_date': dfrom.strftime("%Y-%m-%d"),
94
            'end_date': dto.strftime("%Y-%m-%d"),
95
            'member_join_policy': 2,
96
            'member_leave_policy': 1,
97
            'service1.resource_uplimit': 100,
98
            'is_selected_service1.resource': "1",
99
            'astakos.pending_app_uplimit': 100,
100
            'is_selected_accounts': "1",
101
            'user': self.user.pk
102
        }
103
        form = forms.ProjectApplicationForm(data=application_data)
104
        # form is invalid
105
        self.assertEqual(form.is_valid(), False)
106

    
107
        del application_data['astakos.pending_app_uplimit']
108
        del application_data['is_selected_accounts']
109
        form = forms.ProjectApplicationForm(data=application_data)
110
        self.assertEqual(form.is_valid(), True)
111

    
112
    @im_settings(PROJECT_ADMINS=['uuid1'])
113
    def test_applications(self):
114
        # let user have 2 pending applications
115
        quotas.add_base_quota(self.user, 'astakos.pending_app', 2)
116

    
117
        r = self.user_client.get(reverse('project_add'), follow=True)
118
        self.assertRedirects(r, reverse('project_add'))
119

    
120
        # user fills the project application form
121
        post_url = reverse('project_add') + '?verify=1'
122
        dfrom = datetime.now()
123
        dto = datetime.now() + timedelta(days=30)
124
        application_data = {
125
            'name': 'project.synnefo.org',
126
            'homepage': 'https://www.synnefo.org',
127
            'start_date': dfrom.strftime("%Y-%m-%d"),
128
            'end_date': dto.strftime("%Y-%m-%d"),
129
            'member_join_policy': 2,
130
            'member_leave_policy': 1,
131
            'service1.resource_uplimit': 100,
132
            'is_selected_service1.resource': "1",
133
            'user': self.user.pk
134
        }
135
        r = self.user_client.post(post_url, data=application_data, follow=True)
136
        self.assertEqual(r.status_code, 200)
137
        self.assertEqual(r.context['form'].is_valid(), True)
138

    
139
        # confirm request
140
        post_url = reverse('project_add') + '?verify=0&edit=0'
141
        r = self.user_client.post(post_url, data=application_data, follow=True)
142
        self.assertContains(r, "The project application has been received")
143
        self.assertRedirects(r, reverse('project_list'))
144
        self.assertEqual(ProjectApplication.objects.count(), 1)
145
        app1_id = ProjectApplication.objects.filter().order_by('pk')[0].pk
146

    
147
        # create another one
148
        application_data['name'] = 'project2.synnefo.org'
149
        r = self.user_client.post(post_url, data=application_data, follow=True)
150
        app2_id = ProjectApplication.objects.filter().order_by('pk')[1].pk
151

    
152
        # no more applications (LIMIT is 2)
153
        r = self.user_client.get(reverse('project_add'), follow=True)
154
        self.assertRedirects(r, reverse('project_list'))
155
        self.assertContains(r, "You are not allowed to create a new project")
156

    
157
        # login
158
        self.admin_client.get(reverse("edit_profile"))
159
        # admin approves
160
        r = self.admin_client.post(reverse('project_app_approve',
161
                                           kwargs={'application_id': app1_id}),
162
                                   follow=True)
163
        self.assertEqual(r.status_code, 200)
164

    
165
        # project created
166
        self.assertEqual(Project.objects.count(), 1)
167

    
168
        # login
169
        self.member_client.get(reverse("edit_profile"))
170
        # cannot join app2 (not approved yet)
171
        join_url = reverse("project_join", kwargs={'chain_id': app2_id})
172
        r = self.member_client.post(join_url, follow=True)
173
        self.assertEqual(r.status_code, 403)
174

    
175
        # can join app1
176
        self.member_client.get(reverse("edit_profile"))
177
        join_url = reverse("project_join", kwargs={'chain_id': app1_id})
178
        r = self.member_client.post(join_url, follow=True)
179
        self.assertEqual(r.status_code, 200)
180

    
181
        memberships = ProjectMembership.objects.all()
182
        self.assertEqual(len(memberships), 1)
183
        memb_id = memberships[0].id
184

    
185
        reject_member_url = reverse('project_reject_member',
186
                                    kwargs={'chain_id': app1_id, 'memb_id':
187
                                            memb_id})
188
        accept_member_url = reverse('project_accept_member',
189
                                    kwargs={'chain_id': app1_id, 'memb_id':
190
                                            memb_id})
191

    
192
        # only project owner is allowed to reject
193
        r = self.member_client.post(reject_member_url, follow=True)
194
        self.assertContains(r, "You do not have the permissions")
195
        self.assertEqual(r.status_code, 200)
196

    
197
        # user (owns project) rejects membership
198
        r = self.user_client.post(reject_member_url, follow=True)
199
        self.assertEqual(ProjectMembership.objects.count(), 0)
200

    
201
        # user rejoins
202
        self.member_client.get(reverse("edit_profile"))
203
        join_url = reverse("project_join", kwargs={'chain_id': app1_id})
204
        r = self.member_client.post(join_url, follow=True)
205
        self.assertEqual(r.status_code, 200)
206
        self.assertEqual(ProjectMembership.objects.count(), 1)
207

    
208
        # user (owns project) accepts membership
209
        r = self.user_client.post(accept_member_url, follow=True)
210
        self.assertEqual(ProjectMembership.objects.count(), 1)
211
        membership = ProjectMembership.objects.get()
212
        self.assertEqual(membership.state, ProjectMembership.ACCEPTED)
213

    
214
        user_quotas = quotas.get_users_quotas([self.member])
215
        resource = 'service1.resource'
216
        newlimit = user_quotas[self.member.uuid]['system'][resource]['limit']
217
        # 100 from initial uplimit + 100 from project
218
        self.assertEqual(newlimit, 200)
219

    
220
        remove_member_url = reverse('project_remove_member',
221
                                    kwargs={'chain_id': app1_id, 'memb_id':
222
                                            membership.id})
223
        r = self.user_client.post(remove_member_url, follow=True)
224
        self.assertEqual(r.status_code, 200)
225

    
226
        user_quotas = quotas.get_users_quotas([self.member])
227
        resource = 'service1.resource'
228
        newlimit = user_quotas[self.member.uuid]['system'][resource]['limit']
229
        # 200 - 100 from project
230
        self.assertEqual(newlimit, 100)