mirror of https://github.com/doccano/doccano.git
pythondatasetsactive-learningtext-annotationdatasetnatural-language-processingdata-labelingmachine-learningannotation-tool
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
155 lines
6.2 KiB
155 lines
6.2 KiB
from django.conf import settings
|
|
from django.core.exceptions import ValidationError
|
|
from django.test import TestCase
|
|
from model_mommy import mommy
|
|
from rest_framework import status
|
|
from rest_framework.reverse import reverse
|
|
|
|
from api.tests.utils import CRUDMixin
|
|
from projects.models import Member
|
|
from projects.tests.utils import prepare_project
|
|
from roles.models import Role
|
|
from users.tests.utils import make_user
|
|
|
|
|
|
class TestMemberListAPI(CRUDMixin):
|
|
def setUp(self):
|
|
self.project = prepare_project()
|
|
self.non_member = make_user()
|
|
admin_role = Role.objects.get(name=settings.ROLE_PROJECT_ADMIN)
|
|
self.data = {"user": self.non_member.id, "role": admin_role.id, "project": self.project.item.id}
|
|
self.url = reverse(viewname="member_list", args=[self.project.item.id])
|
|
|
|
def test_allows_project_admin_to_know_members(self):
|
|
self.assert_fetch(self.project.admin, status.HTTP_200_OK)
|
|
|
|
def test_denies_project_staff_to_know_members(self):
|
|
for member in self.project.staffs:
|
|
self.assert_fetch(member, status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_denies_non_project_member_to_know_members(self):
|
|
self.assert_fetch(self.non_member, status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_denies_unauthenticated_user_to_known_members(self):
|
|
self.assert_fetch(expected=status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_allows_project_admin_to_add_member(self):
|
|
self.assert_create(self.project.admin, status.HTTP_201_CREATED)
|
|
|
|
def test_denies_project_staff_to_add_member(self):
|
|
for member in self.project.staffs:
|
|
self.assert_create(member, status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_denies_non_project_member_to_add_member(self):
|
|
self.assert_create(self.non_member, status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_denies_unauthenticated_user_to_add_member(self):
|
|
self.assert_create(expected=status.HTTP_403_FORBIDDEN)
|
|
|
|
def assert_bulk_delete(self, user=None, expected=status.HTTP_403_FORBIDDEN):
|
|
if user:
|
|
self.client.force_login(user)
|
|
ids = [item.id for item in self.project.item.role_mappings.all()]
|
|
response = self.client.delete(self.url, data={"ids": ids}, format="json")
|
|
self.assertEqual(response.status_code, expected)
|
|
|
|
def test_allows_project_admin_to_remove_members(self):
|
|
self.assert_bulk_delete(self.project.admin, status.HTTP_204_NO_CONTENT)
|
|
response = self.client.get(self.url)
|
|
self.assertEqual(len(response.data), 1)
|
|
|
|
def test_denies_project_staff_to_remove_members(self):
|
|
for member in self.project.staffs:
|
|
self.assert_bulk_delete(member, status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_denies_non_project_member_to_remove_members(self):
|
|
self.assert_bulk_delete(self.non_member, status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_denies_unauthenticated_user_to_remove_members(self):
|
|
self.assert_bulk_delete(expected=status.HTTP_403_FORBIDDEN)
|
|
|
|
|
|
class TestMemberRoleDetailAPI(CRUDMixin):
|
|
def setUp(self):
|
|
self.project = prepare_project()
|
|
self.non_member = make_user()
|
|
admin_role = Role.objects.get(name=settings.ROLE_PROJECT_ADMIN)
|
|
member = Member.objects.get(user=self.project.approver)
|
|
self.url = reverse(viewname="member_detail", args=[self.project.item.id, member.id])
|
|
self.data = {"role": admin_role.id}
|
|
|
|
def test_allows_project_admin_to_known_member(self):
|
|
self.assert_fetch(self.project.admin, status.HTTP_200_OK)
|
|
|
|
def test_denies_project_staff_to_know_member(self):
|
|
for member in self.project.staffs:
|
|
self.assert_fetch(member, status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_denies_non_project_member_to_know_member(self):
|
|
self.assert_fetch(self.non_member, status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_denies_unauthenticated_user_to_know_member(self):
|
|
self.assert_fetch(expected=status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_allows_project_admin_to_change_member_role(self):
|
|
self.assert_update(self.project.admin, status.HTTP_200_OK)
|
|
|
|
def test_denies_project_staff_to_change_member_role(self):
|
|
for member in self.project.staffs:
|
|
self.assert_update(member, status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_denies_non_project_member_to_change_member_role(self):
|
|
self.assert_update(self.non_member, status.HTTP_403_FORBIDDEN)
|
|
|
|
def test_denies_unauthenticated_user_to_change_member_role(self):
|
|
self.assert_update(expected=status.HTTP_403_FORBIDDEN)
|
|
|
|
|
|
class TestMemberFilter(CRUDMixin):
|
|
def setUp(self):
|
|
self.project = prepare_project()
|
|
self.url = reverse(viewname="member_list", args=[self.project.item.id])
|
|
self.url += f"?user={self.project.admin.id}"
|
|
|
|
def test_filter_role_by_user_id(self):
|
|
response = self.assert_fetch(self.project.admin, status.HTTP_200_OK)
|
|
self.assertEqual(len(response.data), 1)
|
|
|
|
|
|
class TestMyRole(CRUDMixin):
|
|
def setUp(self):
|
|
self.project = prepare_project()
|
|
self.url = reverse(viewname="my_role", args=[self.project.item.id])
|
|
|
|
def test_admin(self):
|
|
response = self.assert_fetch(self.project.admin, status.HTTP_200_OK)
|
|
self.assertEqual(response.data["rolename"], settings.ROLE_PROJECT_ADMIN)
|
|
|
|
def test_approver(self):
|
|
response = self.assert_fetch(self.project.approver, status.HTTP_200_OK)
|
|
self.assertEqual(response.data["rolename"], settings.ROLE_ANNOTATION_APPROVER)
|
|
|
|
def test_annotator(self):
|
|
response = self.assert_fetch(self.project.annotator, status.HTTP_200_OK)
|
|
self.assertEqual(response.data["rolename"], settings.ROLE_ANNOTATOR)
|
|
|
|
|
|
class TestMemberManager(CRUDMixin):
|
|
def test_has_role(self):
|
|
project = prepare_project()
|
|
admin = project.admin
|
|
expected = [
|
|
(settings.ROLE_PROJECT_ADMIN, True),
|
|
(settings.ROLE_ANNOTATION_APPROVER, False),
|
|
(settings.ROLE_ANNOTATOR, False),
|
|
]
|
|
for role, expect in expected:
|
|
self.assertEqual(Member.objects.has_role(project.item, admin, role), expect)
|
|
|
|
|
|
class TestMember(TestCase):
|
|
def test_clean(self):
|
|
member = mommy.make("Member")
|
|
same_user = Member(project=member.project, user=member.user, role=member.role)
|
|
with self.assertRaises(ValidationError):
|
|
same_user.clean()
|