|
5 | 5 | import warnings
|
6 | 6 |
|
7 | 7 | import django
|
| 8 | +import pytest |
8 | 9 | from django.contrib.auth.models import AnonymousUser, Group, Permission, User
|
9 | 10 | from django.db import models
|
10 | 11 | from django.test import TestCase
|
|
14 | 15 | HTTP_HEADER_ENCODING, authentication, generics, permissions, serializers,
|
15 | 16 | status, views
|
16 | 17 | )
|
17 |
| -from rest_framework.compat import is_guardian_installed |
| 18 | +from rest_framework.compat import PY36, is_guardian_installed, mock |
18 | 19 | from rest_framework.filters import DjangoObjectPermissionsFilter
|
19 | 20 | from rest_framework.routers import DefaultRouter
|
20 | 21 | from rest_framework.test import APIRequestFactory
|
@@ -600,3 +601,87 @@ def test_several_levels_and_precedence(self):
|
600 | 601 | permissions.IsAuthenticated
|
601 | 602 | )
|
602 | 603 | assert composed_perm().has_permission(request, None) is True
|
| 604 | + |
| 605 | + @pytest.mark.skipif(not PY36, reason="assert_called_once() not available") |
| 606 | + def test_or_lazyness(self): |
| 607 | + request = factory.get('/1', format='json') |
| 608 | + request.user = AnonymousUser() |
| 609 | + |
| 610 | + with mock.patch.object(permissions.AllowAny, 'has_permission', return_value=True) as mock_allow: |
| 611 | + with mock.patch.object(permissions.IsAuthenticated, 'has_permission', return_value=False) as mock_deny: |
| 612 | + composed_perm = (permissions.AllowAny | permissions.IsAuthenticated) |
| 613 | + hasperm = composed_perm().has_permission(request, None) |
| 614 | + self.assertIs(hasperm, True) |
| 615 | + mock_allow.assert_called_once() |
| 616 | + mock_deny.assert_not_called() |
| 617 | + |
| 618 | + with mock.patch.object(permissions.AllowAny, 'has_permission', return_value=True) as mock_allow: |
| 619 | + with mock.patch.object(permissions.IsAuthenticated, 'has_permission', return_value=False) as mock_deny: |
| 620 | + composed_perm = (permissions.IsAuthenticated | permissions.AllowAny) |
| 621 | + hasperm = composed_perm().has_permission(request, None) |
| 622 | + self.assertIs(hasperm, True) |
| 623 | + mock_deny.assert_called_once() |
| 624 | + mock_allow.assert_called_once() |
| 625 | + |
| 626 | + @pytest.mark.skipif(not PY36, reason="assert_called_once() not available") |
| 627 | + def test_object_or_lazyness(self): |
| 628 | + request = factory.get('/1', format='json') |
| 629 | + request.user = AnonymousUser() |
| 630 | + |
| 631 | + with mock.patch.object(permissions.AllowAny, 'has_object_permission', return_value=True) as mock_allow: |
| 632 | + with mock.patch.object(permissions.IsAuthenticated, 'has_object_permission', return_value=False) as mock_deny: |
| 633 | + composed_perm = (permissions.AllowAny | permissions.IsAuthenticated) |
| 634 | + hasperm = composed_perm().has_object_permission(request, None, None) |
| 635 | + self.assertIs(hasperm, True) |
| 636 | + mock_allow.assert_called_once() |
| 637 | + mock_deny.assert_not_called() |
| 638 | + |
| 639 | + with mock.patch.object(permissions.AllowAny, 'has_object_permission', return_value=True) as mock_allow: |
| 640 | + with mock.patch.object(permissions.IsAuthenticated, 'has_object_permission', return_value=False) as mock_deny: |
| 641 | + composed_perm = (permissions.IsAuthenticated | permissions.AllowAny) |
| 642 | + hasperm = composed_perm().has_object_permission(request, None, None) |
| 643 | + self.assertIs(hasperm, True) |
| 644 | + mock_deny.assert_called_once() |
| 645 | + mock_allow.assert_called_once() |
| 646 | + |
| 647 | + @pytest.mark.skipif(not PY36, reason="assert_called_once() not available") |
| 648 | + def test_and_lazyness(self): |
| 649 | + request = factory.get('/1', format='json') |
| 650 | + request.user = AnonymousUser() |
| 651 | + |
| 652 | + with mock.patch.object(permissions.AllowAny, 'has_permission', return_value=True) as mock_allow: |
| 653 | + with mock.patch.object(permissions.IsAuthenticated, 'has_permission', return_value=False) as mock_deny: |
| 654 | + composed_perm = (permissions.AllowAny & permissions.IsAuthenticated) |
| 655 | + hasperm = composed_perm().has_permission(request, None) |
| 656 | + self.assertIs(hasperm, False) |
| 657 | + mock_allow.assert_called_once() |
| 658 | + mock_deny.assert_called_once() |
| 659 | + |
| 660 | + with mock.patch.object(permissions.AllowAny, 'has_permission', return_value=True) as mock_allow: |
| 661 | + with mock.patch.object(permissions.IsAuthenticated, 'has_permission', return_value=False) as mock_deny: |
| 662 | + composed_perm = (permissions.IsAuthenticated & permissions.AllowAny) |
| 663 | + hasperm = composed_perm().has_permission(request, None) |
| 664 | + self.assertIs(hasperm, False) |
| 665 | + mock_allow.assert_not_called() |
| 666 | + mock_deny.assert_called_once() |
| 667 | + |
| 668 | + @pytest.mark.skipif(not PY36, reason="assert_called_once() not available") |
| 669 | + def test_object_and_lazyness(self): |
| 670 | + request = factory.get('/1', format='json') |
| 671 | + request.user = AnonymousUser() |
| 672 | + |
| 673 | + with mock.patch.object(permissions.AllowAny, 'has_object_permission', return_value=True) as mock_allow: |
| 674 | + with mock.patch.object(permissions.IsAuthenticated, 'has_object_permission', return_value=False) as mock_deny: |
| 675 | + composed_perm = (permissions.AllowAny & permissions.IsAuthenticated) |
| 676 | + hasperm = composed_perm().has_object_permission(request, None, None) |
| 677 | + self.assertIs(hasperm, False) |
| 678 | + mock_allow.assert_called_once() |
| 679 | + mock_deny.assert_called_once() |
| 680 | + |
| 681 | + with mock.patch.object(permissions.AllowAny, 'has_object_permission', return_value=True) as mock_allow: |
| 682 | + with mock.patch.object(permissions.IsAuthenticated, 'has_object_permission', return_value=False) as mock_deny: |
| 683 | + composed_perm = (permissions.IsAuthenticated & permissions.AllowAny) |
| 684 | + hasperm = composed_perm().has_object_permission(request, None, None) |
| 685 | + self.assertIs(hasperm, False) |
| 686 | + mock_allow.assert_not_called() |
| 687 | + mock_deny.assert_called_once() |
0 commit comments