summaryrefslogtreecommitdiff
path: root/service/test/unit
diff options
context:
space:
mode:
authorNavaL <ayoyo@thoughtworks.com>2016-06-24 18:37:25 +0200
committerNavaL <ayoyo@thoughtworks.com>2016-06-24 18:37:55 +0200
commit64c54186eff000762c291758973ca8e5db28f606 (patch)
treeca90b7c74583cfa170e90838b5722b96ba7138da /service/test/unit
parent12706c25ef02974ff54d1f42caac268f6eaa3a0c (diff)
Issue #694 add an admin restricted resource for user stats
Diffstat (limited to 'service/test/unit')
-rw-r--r--service/test/unit/bitmask_libraries/test_smtp_client_certificate.py2
-rw-r--r--service/test/unit/config/test_services.py12
-rw-r--r--service/test/unit/resources/test_users_resource.py70
3 files changed, 82 insertions, 2 deletions
diff --git a/service/test/unit/bitmask_libraries/test_smtp_client_certificate.py b/service/test/unit/bitmask_libraries/test_smtp_client_certificate.py
index 58a7525f..e938d6f5 100644
--- a/service/test/unit/bitmask_libraries/test_smtp_client_certificate.py
+++ b/service/test/unit/bitmask_libraries/test_smtp_client_certificate.py
@@ -30,7 +30,7 @@ class TestSmtpClientCertificate(unittest.TestCase):
self.tmp_dir = tempdir.TempDir()
self.provider = mock()
self.provider.domain = 'some-provider.tld'
- self.auth = SRPSession('username', 'token', 'uuid', 'session_id')
+ self.auth = SRPSession('username', 'token', 'uuid', 'session_id', {})
self.pem_path = os.path.join(self.tmp_dir.name, 'providers', 'some-provider.tld', 'keys', 'client', 'smtp.pem')
self.downloader = mock()
when(session).SmtpCertDownloader(self.provider, self.auth).thenReturn(self.downloader)
diff --git a/service/test/unit/config/test_services.py b/service/test/unit/config/test_services.py
index 71765d19..8277c919 100644
--- a/service/test/unit/config/test_services.py
+++ b/service/test/unit/config/test_services.py
@@ -17,7 +17,7 @@ import unittest
from mockito import mock, verify
-from pixelated.config.services import Services
+from pixelated.config.services import Services, ServicesFactory
class ServicesTest(unittest.TestCase):
@@ -32,3 +32,13 @@ class ServicesTest(unittest.TestCase):
def test_close_services_closes_the_underlying_leap_session(self):
self.services.close()
verify(self.leap_session).close()
+
+
+class ServicesFactoryTest(unittest.TestCase):
+
+ def test_online_sessions_counts_logged_in_users(self):
+ service_factory = ServicesFactory(mock())
+ service_factory.add_session('some_id1', mock())
+ service_factory.add_session('some_id2', mock())
+
+ self.assertEqual(2, service_factory.online_sessions())
diff --git a/service/test/unit/resources/test_users_resource.py b/service/test/unit/resources/test_users_resource.py
new file mode 100644
index 00000000..bfd61022
--- /dev/null
+++ b/service/test/unit/resources/test_users_resource.py
@@ -0,0 +1,70 @@
+import os
+
+import test.support.mockito
+
+from leap.exceptions import SRPAuthenticationError
+from mock import patch
+from mockito import mock, when, any as ANY, verify, verifyZeroInteractions, verifyNoMoreInteractions
+from twisted.trial import unittest
+from twisted.web.resource import IResource
+from twisted.web.test.requesthelper import DummyRequest
+
+from pixelated.bitmask_libraries.session import LeapSession, LeapSessionFactory
+from pixelated.config.services import Services, ServicesFactory
+from pixelated.resources.login_resource import LoginResource
+from pixelated.resources.users import UsersResource
+from test.unit.resources import DummySite
+
+
+class TestUsersResource(unittest.TestCase):
+
+ def setUp(self):
+ self.services_factory = mock()
+ self.resource = UsersResource(self.services_factory)
+ self.web = DummySite(self.resource)
+
+ def test_numbers_of_users_online(self):
+ number_of_users_online = 6
+ self.services_factory.online_sessions = lambda: number_of_users_online
+ self.resource.is_admin = lambda _: True
+ request = DummyRequest([''])
+
+ d = self.web.get(request)
+
+ def assert_users_count(_):
+ self.assertEqual(200, request.code)
+ self.assertEqual('{"count": %d}' % number_of_users_online, request.written[0])
+
+ d.addCallback(assert_users_count)
+ return d
+
+ def test_numbers_of_users_online_is_only_available_only_for_admin(self):
+ self.resource.is_admin = lambda _: False
+ request = DummyRequest([''])
+ d = self.web.get(request)
+
+ def assert_is_forbidden(_):
+ self.assertEqual(401, request.responseCode)
+ self.assertEqual('Unauthorized!', request.written[0])
+
+ d.addCallback(assert_is_forbidden)
+ return d
+
+ def test_is_admin_is_queried_from_leap_auth(self):
+ leap_session = mock()
+ auth = mock()
+ auth.uuid = 'some_id1'
+ leap_session.user_auth = auth
+ leap_session.config = mock()
+ services = Services(leap_session)
+ service_factory = ServicesFactory(mock())
+ service_factory.add_session('some_id1', services)
+
+ when(auth).is_admin().thenReturn(True)
+ request = mock()
+ resource = UsersResource(service_factory)
+
+ when(resource)._get_user_id_from_request(request).thenReturn('some_id1')
+
+ self.assertTrue(resource.is_admin(request))
+ verify(auth).is_admin()