From 64c54186eff000762c291758973ca8e5db28f606 Mon Sep 17 00:00:00 2001 From: NavaL Date: Fri, 24 Jun 2016 18:37:25 +0200 Subject: Issue #694 add an admin restricted resource for user stats --- .../test_smtp_client_certificate.py | 2 +- service/test/unit/config/test_services.py | 12 +++- service/test/unit/resources/test_users_resource.py | 70 ++++++++++++++++++++++ 3 files changed, 82 insertions(+), 2 deletions(-) create mode 100644 service/test/unit/resources/test_users_resource.py (limited to 'service/test/unit') diff --git a/service/test/unit/bitmask_libraries/test_smtp_client_certificate.py b/service/test/unit/bitmask_libraries/test_smtp_client_certificate.py index 58a7525f..e938d6f5 100644 --- a/service/test/unit/bitmask_libraries/test_smtp_client_certificate.py +++ b/service/test/unit/bitmask_libraries/test_smtp_client_certificate.py @@ -30,7 +30,7 @@ class TestSmtpClientCertificate(unittest.TestCase): self.tmp_dir = tempdir.TempDir() self.provider = mock() self.provider.domain = 'some-provider.tld' - self.auth = SRPSession('username', 'token', 'uuid', 'session_id') + self.auth = SRPSession('username', 'token', 'uuid', 'session_id', {}) self.pem_path = os.path.join(self.tmp_dir.name, 'providers', 'some-provider.tld', 'keys', 'client', 'smtp.pem') self.downloader = mock() when(session).SmtpCertDownloader(self.provider, self.auth).thenReturn(self.downloader) diff --git a/service/test/unit/config/test_services.py b/service/test/unit/config/test_services.py index 71765d19..8277c919 100644 --- a/service/test/unit/config/test_services.py +++ b/service/test/unit/config/test_services.py @@ -17,7 +17,7 @@ import unittest from mockito import mock, verify -from pixelated.config.services import Services +from pixelated.config.services import Services, ServicesFactory class ServicesTest(unittest.TestCase): @@ -32,3 +32,13 @@ class ServicesTest(unittest.TestCase): def test_close_services_closes_the_underlying_leap_session(self): self.services.close() verify(self.leap_session).close() + + +class ServicesFactoryTest(unittest.TestCase): + + def test_online_sessions_counts_logged_in_users(self): + service_factory = ServicesFactory(mock()) + service_factory.add_session('some_id1', mock()) + service_factory.add_session('some_id2', mock()) + + self.assertEqual(2, service_factory.online_sessions()) diff --git a/service/test/unit/resources/test_users_resource.py b/service/test/unit/resources/test_users_resource.py new file mode 100644 index 00000000..bfd61022 --- /dev/null +++ b/service/test/unit/resources/test_users_resource.py @@ -0,0 +1,70 @@ +import os + +import test.support.mockito + +from leap.exceptions import SRPAuthenticationError +from mock import patch +from mockito import mock, when, any as ANY, verify, verifyZeroInteractions, verifyNoMoreInteractions +from twisted.trial import unittest +from twisted.web.resource import IResource +from twisted.web.test.requesthelper import DummyRequest + +from pixelated.bitmask_libraries.session import LeapSession, LeapSessionFactory +from pixelated.config.services import Services, ServicesFactory +from pixelated.resources.login_resource import LoginResource +from pixelated.resources.users import UsersResource +from test.unit.resources import DummySite + + +class TestUsersResource(unittest.TestCase): + + def setUp(self): + self.services_factory = mock() + self.resource = UsersResource(self.services_factory) + self.web = DummySite(self.resource) + + def test_numbers_of_users_online(self): + number_of_users_online = 6 + self.services_factory.online_sessions = lambda: number_of_users_online + self.resource.is_admin = lambda _: True + request = DummyRequest(['']) + + d = self.web.get(request) + + def assert_users_count(_): + self.assertEqual(200, request.code) + self.assertEqual('{"count": %d}' % number_of_users_online, request.written[0]) + + d.addCallback(assert_users_count) + return d + + def test_numbers_of_users_online_is_only_available_only_for_admin(self): + self.resource.is_admin = lambda _: False + request = DummyRequest(['']) + d = self.web.get(request) + + def assert_is_forbidden(_): + self.assertEqual(401, request.responseCode) + self.assertEqual('Unauthorized!', request.written[0]) + + d.addCallback(assert_is_forbidden) + return d + + def test_is_admin_is_queried_from_leap_auth(self): + leap_session = mock() + auth = mock() + auth.uuid = 'some_id1' + leap_session.user_auth = auth + leap_session.config = mock() + services = Services(leap_session) + service_factory = ServicesFactory(mock()) + service_factory.add_session('some_id1', services) + + when(auth).is_admin().thenReturn(True) + request = mock() + resource = UsersResource(service_factory) + + when(resource)._get_user_id_from_request(request).thenReturn('some_id1') + + self.assertTrue(resource.is_admin(request)) + verify(auth).is_admin() -- cgit v1.2.3