[Zope3-checkins] CVS: Zope3/src/zope/app/security/registries/tests - __init__.py:1.2 test_permissionregistry.py:1.2 test_principalregistry.py:1.2 test_roleregistry.py:1.2
Jim Fulton
jim@zope.com
Wed, 25 Dec 2002 09:13:49 -0500
Update of /cvs-repository/Zope3/src/zope/app/security/registries/tests
In directory cvs.zope.org:/tmp/cvs-serv15352/src/zope/app/security/registries/tests
Added Files:
__init__.py test_permissionregistry.py
test_principalregistry.py test_roleregistry.py
Log Message:
Grand renaming:
- Renamed most files (especially python modules) to lower case.
- Moved views and interfaces into separate hierarchies within each
project, where each top-level directory under the zope package
is a separate project.
- Moved everything to src from lib/python.
lib/python will eventually go away. I need access to the cvs
repository to make this happen, however.
There are probably some bits that are broken. All tests pass
and zope runs, but I haven't tried everything. There are a number
of cleanups I'll work on tomorrow.
=== Zope3/src/zope/app/security/registries/tests/__init__.py 1.1 => 1.2 ===
--- /dev/null Wed Dec 25 09:13:49 2002
+++ Zope3/src/zope/app/security/registries/tests/__init__.py Wed Dec 25 09:13:18 2002
@@ -0,0 +1,2 @@
+#
+# This file is necessary to make this directory a package.
=== Zope3/src/zope/app/security/registries/tests/test_permissionregistry.py 1.1 => 1.2 ===
--- /dev/null Wed Dec 25 09:13:49 2002
+++ Zope3/src/zope/app/security/registries/tests/test_permissionregistry.py Wed Dec 25 09:13:18 2002
@@ -0,0 +1,81 @@
+##############################################################################
+#
+# Copyright (c) 2001, 2002 Zope Corporation and Contributors.
+# All Rights Reserved.
+#
+# This software is subject to the provisions of the Zope Public License,
+# Version 2.0 (ZPL). A copy of the ZPL should accompany this distribution.
+# THIS SOFTWARE IS PROVIDED "AS IS" AND ANY AND ALL EXPRESS OR IMPLIED
+# WARRANTIES ARE DISCLAIMED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+# WARRANTIES OF TITLE, MERCHANTABILITY, AGAINST INFRINGEMENT, AND FITNESS
+# FOR A PARTICULAR PURPOSE.
+#
+##############################################################################
+""" Test handler for 'definePermission' directive
+
+$Id$
+"""
+
+
+import unittest, sys
+
+from zope.app.security.registries.permissionregistry import permissionRegistry
+from zope.app.security.exceptions import UndefinedPermissionError
+from zope.app.interfaces.security import IPermission
+from zope.interface.verify import verifyObject
+from zope.testing.cleanup import CleanUp # Base class w registry cleanup
+
+class Test(CleanUp, unittest.TestCase):
+
+ def testEmptyPermissions(self):
+ self.assertEqual(None, permissionRegistry.getPermission('Foo'))
+ self.failIf(permissionRegistry.definedPermission('Foo'))
+
+ def testPermissionStartsWithDot(self):
+ self.assertRaises(ValueError, permissionRegistry.definePermission,
+ '.Foo', 'dot foo title')
+
+ def testPermissionIsAnIPermission(self):
+ permissionRegistry.definePermission('Foo', 'foo title')
+ permission = permissionRegistry.getPermission('Foo')
+ self.assertEqual(verifyObject(IPermission, permission), 1)
+
+ def testDefinePermission(self):
+ perm = permissionRegistry.definePermission('Foo', 'foo title')
+ self.failUnless(verifyObject(IPermission, perm))
+ self.failUnless(permissionRegistry.definedPermission('Foo'))
+ permission = permissionRegistry.getPermission('Foo')
+ self.assertEquals(permission.getTitle(), 'foo title')
+
+ def testDefinePermissionWithTitle(self):
+ eq = self.assertEqual
+ permissionRegistry.definePermission('Foo', 'Foo-able')
+ permission = permissionRegistry.getPermission('Foo')
+ eq(permission.getTitle(), 'Foo-able')
+ eq(permission.getDescription(), '')
+
+ def testDefinePermissionWithTitleAndDescription(self):
+ eq = self.assertEqual
+ permissionRegistry.definePermission('Foo', 'Foo-able',
+ 'A foo-worthy permission')
+ permission = permissionRegistry.getPermission('Foo')
+ eq(permission.getTitle(), 'Foo-able')
+ eq(permission.getDescription(), 'A foo-worthy permission')
+
+ def testEnsurePermissionDefined(self):
+ permissionRegistry.definePermission('Foo', 'Foo-able',
+ 'A foo-worthy permission')
+ self.assertEqual(None,
+ permissionRegistry.ensurePermissionDefined('Foo'))
+ self.assertRaises(UndefinedPermissionError,
+ permissionRegistry.ensurePermissionDefined,
+ 'Foo.Bar.Spam.Undefined')
+
+
+def test_suite():
+ loader=unittest.TestLoader()
+ return loader.loadTestsFromTestCase(Test)
+
+
+if __name__=='__main__':
+ unittest.TextTestRunner().run(test_suite())
=== Zope3/src/zope/app/security/registries/tests/test_principalregistry.py 1.1 => 1.2 ===
--- /dev/null Wed Dec 25 09:13:49 2002
+++ Zope3/src/zope/app/security/registries/tests/test_principalregistry.py Wed Dec 25 09:13:18 2002
@@ -0,0 +1,148 @@
+##############################################################################
+#
+# Copyright (c) 2001, 2002 Zope Corporation and Contributors.
+# All Rights Reserved.
+#
+# This software is subject to the provisions of the Zope Public License,
+# Version 2.0 (ZPL). A copy of the ZPL should accompany this distribution.
+# THIS SOFTWARE IS PROVIDED "AS IS" AND ANY AND ALL EXPRESS OR IMPLIED
+# WARRANTIES ARE DISCLAIMED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+# WARRANTIES OF TITLE, MERCHANTABILITY, AGAINST INFRINGEMENT, AND FITNESS
+# FOR A PARTICULAR PURPOSE.
+#
+##############################################################################
+import unittest, sys
+
+from zope.app.security.registries.principalregistry import PrincipalRegistry
+from zope.app.security.registries.principalregistry \
+ import DuplicateLogin, DuplicateId
+from zope.exceptions import NotFoundError
+from zope.publisher.interfaces.http import IHTTPCredentials
+from zope.app.services.tests.placefulsetup \
+ import PlacefulSetup
+
+class Request:
+
+ __implements__ = IHTTPCredentials
+
+ def __init__(self, lpw):
+ self.__lpw = lpw
+
+ def _authUserPW(self):
+ return self.__lpw
+
+ challenge = None
+ def unauthorized(self, challenge):
+ self.challenge = challenge
+
+
+class Test(PlacefulSetup, unittest.TestCase):
+
+ def setUp(self):
+ PlacefulSetup.setUp(self)
+
+ from zope.component import getService
+ from zope.app.security.basicauthadapter import BasicAuthAdapter
+ from zope.app.interfaces.security import ILoginPassword
+ getService(None,"Adapters").provideAdapter(
+ IHTTPCredentials, ILoginPassword, BasicAuthAdapter)
+
+ self.reg = PrincipalRegistry()
+
+ self.reg.definePrincipal('1', 'Tim Peters', 'Sir Tim Peters',
+ 'tim', '123')
+ self.reg.definePrincipal('2', 'Jim Fulton', 'Sir Jim Fulton',
+ 'jim', '456')
+
+ def testRegistered(self):
+ p = self.reg.getPrincipal('1')
+ self.assertEqual(p.getId(), '1')
+ self.assertEqual(p.getTitle(), 'Tim Peters')
+ self.assertEqual(p.getDescription(), 'Sir Tim Peters')
+ p = self.reg.getPrincipal('2')
+ self.assertEqual(p.getId(), '2')
+ self.assertEqual(p.getTitle(), 'Jim Fulton')
+ self.assertEqual(p.getDescription(), 'Sir Jim Fulton')
+
+ self.assertEqual(len(self.reg.getPrincipals('')), 2)
+
+ def testUnRegistered(self):
+ self.assertRaises(NotFoundError, self.reg.getPrincipal, '3')
+
+ def testDup(self):
+ self.assertRaises(DuplicateId,
+ self.reg.definePrincipal,
+ '1', 'Tim Peters', 'Sir Tim Peters',
+ 'tim2', '123')
+ self.assertRaises(DuplicateLogin,
+ self.reg.definePrincipal,
+ '3', 'Tim Peters', 'Sir Tim Peters',
+ 'tim', '123')
+ self.assertRaises(NotFoundError, self.reg.getPrincipal, '3')
+ self.assertEqual(len(self.reg.getPrincipals('')), 2)
+
+ def testSearch(self):
+ r = self.reg.getPrincipals('J')
+ self.assertEquals(len(r), 1)
+ self.failUnless(r[0] is self.reg.getPrincipal('2'))
+
+ def testByLogin(self):
+ tim = self.reg.getPrincipalByLogin('tim')
+ self.assertEquals(tim.getLogin(), 'tim')
+ jim = self.reg.getPrincipalByLogin('jim')
+ self.assertEquals(jim.getLogin(), 'jim')
+ self.assertRaises(NotFoundError,
+ self.reg.getPrincipalByLogin, 'kim')
+
+ def testValidation(self):
+ tim = self.reg.getPrincipalByLogin('tim')
+ self.assert_(tim.validate('123'))
+ self.failIf(tim.validate('456'))
+ self.failIf(tim.validate(''))
+ self.failIf(tim.validate('1234'))
+ self.failIf(tim.validate('12'))
+
+ def testAuthenticate(self):
+ req = Request(('tim', '123'))
+ pid = self.reg.authenticate(req).getId()
+ self.assertEquals(pid, '1')
+ req = Request(('tim', '1234'))
+ p = self.reg.authenticate(req)
+ self.assertEquals(p, None)
+ req = Request(('kim', '123'))
+ p = self.reg.authenticate(req)
+ self.assertEquals(p, None)
+
+ def testUnauthorized(self):
+ request = Request(None)
+ self.reg.unauthorized(self.reg.unauthenticatedPrincipal(), request)
+ self.assertEquals(request.challenge, "basic realm=zope")
+ request = Request(None)
+ self.reg.unauthorized(None, request)
+ self.assertEquals(request.challenge, "basic realm=zope")
+ request = Request(None)
+ self.reg.unauthorized("1", request)
+ self.assertEquals(request.challenge, None)
+
+ def testDefaultPrincipal(self):
+ self.assertEquals(self.reg.unauthenticatedPrincipal(), None)
+ self.assertRaises(DuplicateId, self.reg.defineDefaultPrincipal,
+ "1", "tim")
+ self.reg.defineDefaultPrincipal("everybody", "Default Principal")
+ self.assertEquals(self.reg.unauthenticatedPrincipal().getId(), "everybody")
+ self.reg.defineDefaultPrincipal("anybody", "Default Principal",
+ "This is the default headmaster")
+ self.assertEquals(self.reg.unauthenticatedPrincipal().getId(), "anybody")
+ self.assertRaises(NotFoundError, self.reg.getPrincipal, "everybody")
+ p = self.reg.getPrincipal("anybody")
+ self.assertEquals(p.getId(), "anybody")
+ self.assertEquals(p.getTitle(), "Default Principal")
+ self.assertRaises(DuplicateId, self.reg.definePrincipal,
+ "anybody", "title")
+
+def test_suite():
+ loader=unittest.TestLoader()
+ return loader.loadTestsFromTestCase(Test)
+
+if __name__=='__main__':
+ unittest.TextTestRunner().run(test_suite())
=== Zope3/src/zope/app/security/registries/tests/test_roleregistry.py 1.1 => 1.2 ===
--- /dev/null Wed Dec 25 09:13:49 2002
+++ Zope3/src/zope/app/security/registries/tests/test_roleregistry.py Wed Dec 25 09:13:18 2002
@@ -0,0 +1,62 @@
+##############################################################################
+#
+# Copyright (c) 2001, 2002 Zope Corporation and Contributors.
+# All Rights Reserved.
+#
+# This software is subject to the provisions of the Zope Public License,
+# Version 2.0 (ZPL). A copy of the ZPL should accompany this distribution.
+# THIS SOFTWARE IS PROVIDED "AS IS" AND ANY AND ALL EXPRESS OR IMPLIED
+# WARRANTIES ARE DISCLAIMED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+# WARRANTIES OF TITLE, MERCHANTABILITY, AGAINST INFRINGEMENT, AND FITNESS
+# FOR A PARTICULAR PURPOSE.
+#
+##############################################################################
+""" Test handler for 'defineRole' directive """
+
+import unittest, sys
+
+from zope.app.security.registries.roleregistry import roleRegistry
+from zope.app.interfaces.security import IRole
+from zope.interface.verify import verifyObject
+from zope.testing.cleanup import CleanUp # Base class w registry cleanup
+
+class Test(CleanUp, unittest.TestCase):
+
+ def testEmptyRoles(self):
+ self.assertEqual(None, roleRegistry.getRole('Foo'))
+ self.failIf(roleRegistry.definedRole('Foo'))
+
+ def testRoleIsAnIRole(self):
+ r = roleRegistry.defineRole('Foo', 'Foo role')
+ role = roleRegistry.getRole(r.getId())
+ self.assertEqual(verifyObject(IRole, role), 1)
+
+ def testDefineRole(self):
+ role = roleRegistry.defineRole('Foo', 'foo role')
+ self.failUnless(verifyObject(IRole, role))
+ self.failUnless(roleRegistry.definedRole(role.getId()))
+ role = roleRegistry.getRole(role.getId())
+ self.assertEquals(role.getTitle(), 'foo role')
+
+ def testDefineRoleWithTitle(self):
+ eq = self.assertEqual
+ r = roleRegistry.defineRole('Foo', 'Foo-able')
+ role = roleRegistry.getRole(r.getId())
+ eq(role.getTitle(), 'Foo-able')
+ eq(role.getDescription(), '')
+
+ def testDefineRoleWithTitleAndDescription(self):
+ eq = self.assertEqual
+ r = roleRegistry.defineRole('Foo', 'Foo-able', 'A foo-worthy role')
+ role = roleRegistry.getRole(r.getId())
+ eq(role.getTitle(), 'Foo-able')
+ eq(role.getDescription(), 'A foo-worthy role')
+
+
+def test_suite():
+ loader=unittest.TestLoader()
+ return loader.loadTestsFromTestCase(Test)
+
+
+if __name__=='__main__':
+ unittest.TextTestRunner().run(test_suite())