##############################################################################
#
# Copyright (c) 2001 Zope Corporation and Contributors. All Rights Reserved.
#
# This software is subject to the provisions of the Zope Public License,
# Version 2.0 (ZPL). A copy of the ZPL should accompany this distribution.
# THIS SOFTWARE IS PROVIDED "AS IS" AND ANY AND ALL EXPRESS OR IMPLIED
# WARRANTIES ARE DISCLAIMED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
# WARRANTIES OF TITLE, MERCHANTABILITY, AGAINST INFRINGEMENT, AND FITNESS
# FOR A PARTICULAR PURPOSE
#
##############################################################################
"""Tests of PermissionRole
"""
__rcs_id__='$Id: testPermissionRole.py,v 1.3 2002/08/14 21:28:08 mj Exp $'
__version__='$Revision: 1.3 $'[11:-2]
import os, sys, unittest
from AccessControl.PermissionRole import PermissionRole
from Acquisition import Implicit,Explicit,aq_base
ViewPermission = 'View'
EditThingsPermission = 'Edit Things!'
DeletePermission = 'Delete'
class AppRoot(Explicit):
_View_Permission = None
_Edit_Things__Permission = ('Manager', 'Owner')
# No default for delete permission.
class ImplicitContainer(Implicit):
pass
class ExplicitContainer(Explicit):
pass
class RestrictiveObject(Implicit):
_View_Permission = ('Manager',)
_Delete_Permission = () # Nobody
class PermissiveObject(Explicit):
_Edit_Things__Permission = ['Anonymous']
class ZClassMethodish(Implicit):
# Think of this as a method that should only be visible to users
# who have the edit permission.
_View_Permission = '_Edit_Things__Permission'
_Edit_Things__Permission = ''
_Delete_Permission = ''
def assertPRoles(ob, permission, expect):
"""
Asserts that in the context of ob, the given permission maps to
the given roles.
"""
pr = PermissionRole(permission)
roles = pr.__of__(ob)
roles2 = aq_base(pr).__of__(ob)
assert roles == roles2 or tuple(roles) == tuple(roles2), (
'Different methods of checking roles computed unequal results')
same = 0
if roles is None or expect is None:
if (roles is None or tuple(roles) == ('Anonymous',)) and (
expect is None or tuple(expect) == ('Anonymous',)):
same = 1
else:
got = {}
for r in roles: got[r] = 1
expected = {}
for r in expect: expected[r] = 1
if got == expected: # Dict compare does the Right Thing.
same = 1
assert same, 'Expected roles: %s, got: %s' % (`expect`, `roles`)
class PermissionRoleTests (unittest.TestCase):
def testRestrictive(self, explicit=0):
app = AppRoot()
if explicit:
app.c = ExplicitContainer()
else:
app.c = ImplicitContainer()
app.c.o = RestrictiveObject()
o = app.c.o
assertPRoles(o, ViewPermission, ('Manager',))
assertPRoles(o, EditThingsPermission, ('Manager','Owner',))
assertPRoles(o, DeletePermission, ())
def testPermissive(self, explicit=0):
app = AppRoot()
if explicit:
app.c = ExplicitContainer()
else:
app.c = ImplicitContainer()
app.c.o = PermissiveObject()
o = app.c.o
assertPRoles(o, ViewPermission, ('Anonymous',))
assertPRoles(o, EditThingsPermission, ('Anonymous','Manager','Owner',))
assertPRoles(o, DeletePermission, ('Manager',))
def testExplicit(self):
self.testRestrictive(1)
self.testPermissive(1)
def testAppDefaults(self):
o = AppRoot()
assertPRoles(o, ViewPermission, ('Anonymous',))
assertPRoles(o, EditThingsPermission, ('Manager','Owner',))
assertPRoles(o, DeletePermission, ('Manager',))
def testPermissionMapping(self):
app = AppRoot()
app.c = ImplicitContainer()
app.c.o = ZClassMethodish()
o = app.c.o
assertPRoles(o, ViewPermission, ('Manager','Owner',))
assertPRoles(o, EditThingsPermission, ())
assertPRoles(o, DeletePermission, ())
def test_suite():
suite = unittest.TestSuite()
suite.addTest(unittest.makeSuite(PermissionRoleTests))
return suite
def main():
unittest.TextTestRunner().run(test_suite())
if __name__ == '__main__':
main()
|