mirror of
https://github.com/cisagov/manage.get.gov.git
synced 2025-05-29 08:50:01 +02:00
Linting
This commit is contained in:
parent
9e1643edf0
commit
a362c2ef6c
7 changed files with 90 additions and 36 deletions
|
@ -66,7 +66,9 @@ def portfolio_permissions(request):
|
||||||
return {
|
return {
|
||||||
"has_base_portfolio_permission": request.user.has_base_portfolio_permission(portfolio),
|
"has_base_portfolio_permission": request.user.has_base_portfolio_permission(portfolio),
|
||||||
"has_domains_portfolio_permission": request.user.has_domains_portfolio_permission(portfolio),
|
"has_domains_portfolio_permission": request.user.has_domains_portfolio_permission(portfolio),
|
||||||
"has_domain_requests_portfolio_permission": request.user.has_domain_requests_portfolio_permission(portfolio),
|
"has_domain_requests_portfolio_permission": request.user.has_domain_requests_portfolio_permission(
|
||||||
|
portfolio
|
||||||
|
),
|
||||||
"has_view_suborganization": request.user.has_view_suborganization(portfolio),
|
"has_view_suborganization": request.user.has_view_suborganization(portfolio),
|
||||||
"has_edit_suborganization": request.user.has_edit_suborganization(portfolio),
|
"has_edit_suborganization": request.user.has_edit_suborganization(portfolio),
|
||||||
"portfolio": portfolio,
|
"portfolio": portfolio,
|
||||||
|
@ -81,7 +83,7 @@ def portfolio_permissions(request):
|
||||||
"portfolio": None,
|
"portfolio": None,
|
||||||
"has_organization_feature_flag": False,
|
"has_organization_feature_flag": False,
|
||||||
}
|
}
|
||||||
|
|
||||||
except AttributeError:
|
except AttributeError:
|
||||||
# Handles cases where request.user might not exist
|
# Handles cases where request.user might not exist
|
||||||
return {
|
return {
|
||||||
|
|
|
@ -217,13 +217,13 @@ class User(AbstractUser):
|
||||||
return self._has_portfolio_permission(portfolio, UserPortfolioPermissionChoices.EDIT_PORTFOLIO)
|
return self._has_portfolio_permission(portfolio, UserPortfolioPermissionChoices.EDIT_PORTFOLIO)
|
||||||
|
|
||||||
def has_domains_portfolio_permission(self, portfolio):
|
def has_domains_portfolio_permission(self, portfolio):
|
||||||
return self._has_portfolio_permission(portfolio,
|
return self._has_portfolio_permission(
|
||||||
UserPortfolioPermissionChoices.VIEW_ALL_DOMAINS
|
portfolio, UserPortfolioPermissionChoices.VIEW_ALL_DOMAINS
|
||||||
) or self._has_portfolio_permission(portfolio, UserPortfolioPermissionChoices.VIEW_MANAGED_DOMAINS)
|
) or self._has_portfolio_permission(portfolio, UserPortfolioPermissionChoices.VIEW_MANAGED_DOMAINS)
|
||||||
|
|
||||||
def has_domain_requests_portfolio_permission(self, portfolio):
|
def has_domain_requests_portfolio_permission(self, portfolio):
|
||||||
return self._has_portfolio_permission(portfolio,
|
return self._has_portfolio_permission(
|
||||||
UserPortfolioPermissionChoices.VIEW_ALL_REQUESTS
|
portfolio, UserPortfolioPermissionChoices.VIEW_ALL_REQUESTS
|
||||||
) or self._has_portfolio_permission(portfolio, UserPortfolioPermissionChoices.VIEW_CREATED_REQUESTS)
|
) or self._has_portfolio_permission(portfolio, UserPortfolioPermissionChoices.VIEW_CREATED_REQUESTS)
|
||||||
|
|
||||||
def has_view_all_domains_permission(self, portfolio):
|
def has_view_all_domains_permission(self, portfolio):
|
||||||
|
|
|
@ -75,11 +75,7 @@ class UserPortfolioPermission(TimeStampedModel):
|
||||||
)
|
)
|
||||||
|
|
||||||
def __str__(self):
|
def __str__(self):
|
||||||
return (
|
return f"User '{self.user}' on Portfolio '{self.portfolio}' " f"<Roles: {self.roles}>" if self.roles else ""
|
||||||
f"User '{self.user}' on Portfolio '{self.portfolio}' " f"<Roles: {self.roles}>"
|
|
||||||
if self.roles
|
|
||||||
else ""
|
|
||||||
)
|
|
||||||
|
|
||||||
def _get_portfolio_permissions(self):
|
def _get_portfolio_permissions(self):
|
||||||
"""
|
"""
|
||||||
|
@ -107,7 +103,7 @@ class UserPortfolioPermission(TimeStampedModel):
|
||||||
raise ValidationError(
|
raise ValidationError(
|
||||||
"Only one portfolio permission is allowed per user when multiple portfolios are disabled."
|
"Only one portfolio permission is allowed per user when multiple portfolios are disabled."
|
||||||
)
|
)
|
||||||
|
|
||||||
if self.portfolio is None and self._get_portfolio_permissions():
|
if self.portfolio is None and self._get_portfolio_permissions():
|
||||||
raise ValidationError("When portfolio roles or additional permissions are assigned, portfolio is required.")
|
raise ValidationError("When portfolio roles or additional permissions are assigned, portfolio is required.")
|
||||||
|
|
||||||
|
|
|
@ -1412,9 +1412,7 @@ class TestUser(TestCase):
|
||||||
self.assertTrue(user_can_view_all_domains)
|
self.assertTrue(user_can_view_all_domains)
|
||||||
self.assertTrue(user_can_view_all_requests)
|
self.assertTrue(user_can_view_all_requests)
|
||||||
|
|
||||||
UserDomainRole.objects.get_or_create(
|
UserDomainRole.objects.get_or_create(user=self.user, domain=self.domain, role=UserDomainRole.Roles.MANAGER)
|
||||||
user=self.user, domain=self.domain, role=UserDomainRole.Roles.MANAGER
|
|
||||||
)
|
|
||||||
|
|
||||||
# Create a dummy request
|
# Create a dummy request
|
||||||
request = self.factory.get("/")
|
request = self.factory.get("/")
|
||||||
|
@ -1451,7 +1449,9 @@ class TestUser(TestCase):
|
||||||
@less_console_noise_decorator
|
@less_console_noise_decorator
|
||||||
def test_user_with_portfolio_roles_but_no_portfolio(self):
|
def test_user_with_portfolio_roles_but_no_portfolio(self):
|
||||||
portfolio, _ = Portfolio.objects.get_or_create(creator=self.user, organization_name="Hotel California")
|
portfolio, _ = Portfolio.objects.get_or_create(creator=self.user, organization_name="Hotel California")
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(portfolio=portfolio, user=self.user, roles=[UserPortfolioRoleChoices.ORGANIZATION_ADMIN])
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
portfolio=portfolio, user=self.user, roles=[UserPortfolioRoleChoices.ORGANIZATION_ADMIN]
|
||||||
|
)
|
||||||
|
|
||||||
# Try to remove the portfolio
|
# Try to remove the portfolio
|
||||||
portfolio_permission.portfolio = None
|
portfolio_permission.portfolio = None
|
||||||
|
|
|
@ -330,7 +330,9 @@ class TestDomainDetail(TestDomainOverview):
|
||||||
phone="8003111234",
|
phone="8003111234",
|
||||||
title="test title",
|
title="test title",
|
||||||
)
|
)
|
||||||
UserPortfolioPermission.objects.get_or_create(user=user, portfolio=portfolio, roles=[UserPortfolioRoleChoices.ORGANIZATION_ADMIN])
|
UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=user, portfolio=portfolio, roles=[UserPortfolioRoleChoices.ORGANIZATION_ADMIN]
|
||||||
|
)
|
||||||
domain, _ = Domain.objects.get_or_create(name="bogusdomain.gov")
|
domain, _ = Domain.objects.get_or_create(name="bogusdomain.gov")
|
||||||
DomainInformation.objects.get_or_create(creator=user, domain=domain, portfolio=portfolio)
|
DomainInformation.objects.get_or_create(creator=user, domain=domain, portfolio=portfolio)
|
||||||
self.client.force_login(user)
|
self.client.force_login(user)
|
||||||
|
@ -1477,7 +1479,9 @@ class TestDomainSuborganization(TestDomainOverview):
|
||||||
self.domain_information.refresh_from_db()
|
self.domain_information.refresh_from_db()
|
||||||
|
|
||||||
# Add portfolio perms to the user object
|
# Add portfolio perms to the user object
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=portfolio, roles=[UserPortfolioRoleChoices.ORGANIZATION_ADMIN])
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=portfolio, roles=[UserPortfolioRoleChoices.ORGANIZATION_ADMIN]
|
||||||
|
)
|
||||||
|
|
||||||
self.assertEqual(self.domain_information.sub_organization, suborg)
|
self.assertEqual(self.domain_information.sub_organization, suborg)
|
||||||
|
|
||||||
|
@ -1533,7 +1537,9 @@ class TestDomainSuborganization(TestDomainOverview):
|
||||||
self.domain_information.refresh_from_db()
|
self.domain_information.refresh_from_db()
|
||||||
|
|
||||||
# Add portfolio perms to the user object
|
# Add portfolio perms to the user object
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=portfolio, roles=[UserPortfolioRoleChoices.ORGANIZATION_ADMIN_READ_ONLY])
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=portfolio, roles=[UserPortfolioRoleChoices.ORGANIZATION_ADMIN_READ_ONLY]
|
||||||
|
)
|
||||||
|
|
||||||
self.assertEqual(self.domain_information.sub_organization, suborg)
|
self.assertEqual(self.domain_information.sub_organization, suborg)
|
||||||
|
|
||||||
|
@ -1571,7 +1577,9 @@ class TestDomainSuborganization(TestDomainOverview):
|
||||||
self.domain_information.refresh_from_db()
|
self.domain_information.refresh_from_db()
|
||||||
|
|
||||||
# Add portfolio perms to the user object
|
# Add portfolio perms to the user object
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=portfolio, additional_permissions=[UserPortfolioPermissionChoices.VIEW_PORTFOLIO])
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=portfolio, additional_permissions=[UserPortfolioPermissionChoices.VIEW_PORTFOLIO]
|
||||||
|
)
|
||||||
|
|
||||||
# Navigate to the domain overview page
|
# Navigate to the domain overview page
|
||||||
page = self.app.get(reverse("domain", kwargs={"pk": self.domain.id}))
|
page = self.app.get(reverse("domain", kwargs={"pk": self.domain.id}))
|
||||||
|
|
|
@ -54,7 +54,11 @@ class TestPortfolio(WebTest):
|
||||||
self.portfolio.save()
|
self.portfolio.save()
|
||||||
self.portfolio.refresh_from_db()
|
self.portfolio.refresh_from_db()
|
||||||
|
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=[UserPortfolioPermissionChoices.VIEW_PORTFOLIO])
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user,
|
||||||
|
portfolio=self.portfolio,
|
||||||
|
additional_permissions=[UserPortfolioPermissionChoices.VIEW_PORTFOLIO],
|
||||||
|
)
|
||||||
|
|
||||||
so_portfolio_page = self.app.get(reverse("senior-official"))
|
so_portfolio_page = self.app.get(reverse("senior-official"))
|
||||||
# Assert that we're on the right page
|
# Assert that we're on the right page
|
||||||
|
@ -71,7 +75,9 @@ class TestPortfolio(WebTest):
|
||||||
def test_middleware_does_not_redirect_if_no_permission(self):
|
def test_middleware_does_not_redirect_if_no_permission(self):
|
||||||
"""Test that user with no portfolio permission is not redirected when attempting to access home"""
|
"""Test that user with no portfolio permission is not redirected when attempting to access home"""
|
||||||
self.app.set_user(self.user.username)
|
self.app.set_user(self.user.username)
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=[])
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=self.portfolio, additional_permissions=[]
|
||||||
|
)
|
||||||
self.user.portfolio = self.portfolio
|
self.user.portfolio = self.portfolio
|
||||||
self.user.save()
|
self.user.save()
|
||||||
self.user.refresh_from_db()
|
self.user.refresh_from_db()
|
||||||
|
@ -97,7 +103,11 @@ class TestPortfolio(WebTest):
|
||||||
def test_middleware_redirects_to_portfolio_organization_page(self):
|
def test_middleware_redirects_to_portfolio_organization_page(self):
|
||||||
"""Test that user with a portfolio and VIEW_PORTFOLIO is redirected to portfolio organization page"""
|
"""Test that user with a portfolio and VIEW_PORTFOLIO is redirected to portfolio organization page"""
|
||||||
self.app.set_user(self.user.username)
|
self.app.set_user(self.user.username)
|
||||||
UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=[UserPortfolioPermissionChoices.VIEW_PORTFOLIO])
|
UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user,
|
||||||
|
portfolio=self.portfolio,
|
||||||
|
additional_permissions=[UserPortfolioPermissionChoices.VIEW_PORTFOLIO],
|
||||||
|
)
|
||||||
with override_flag("organization_feature", active=True):
|
with override_flag("organization_feature", active=True):
|
||||||
# This will redirect the user to the portfolio page.
|
# This will redirect the user to the portfolio page.
|
||||||
# Follow implicity checks if our redirect is working.
|
# Follow implicity checks if our redirect is working.
|
||||||
|
@ -111,7 +121,14 @@ class TestPortfolio(WebTest):
|
||||||
"""Test that user with a portfolio, VIEW_PORTFOLIO, VIEW_ALL_DOMAINS
|
"""Test that user with a portfolio, VIEW_PORTFOLIO, VIEW_ALL_DOMAINS
|
||||||
is redirected to portfolio domains page"""
|
is redirected to portfolio domains page"""
|
||||||
self.app.set_user(self.user.username)
|
self.app.set_user(self.user.username)
|
||||||
UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=[UserPortfolioPermissionChoices.VIEW_PORTFOLIO, UserPortfolioPermissionChoices.VIEW_ALL_DOMAINS])
|
UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user,
|
||||||
|
portfolio=self.portfolio,
|
||||||
|
additional_permissions=[
|
||||||
|
UserPortfolioPermissionChoices.VIEW_PORTFOLIO,
|
||||||
|
UserPortfolioPermissionChoices.VIEW_ALL_DOMAINS,
|
||||||
|
],
|
||||||
|
)
|
||||||
with override_flag("organization_feature", active=True):
|
with override_flag("organization_feature", active=True):
|
||||||
# This will redirect the user to the portfolio page.
|
# This will redirect the user to the portfolio page.
|
||||||
# Follow implicity checks if our redirect is working.
|
# Follow implicity checks if our redirect is working.
|
||||||
|
@ -125,7 +142,9 @@ class TestPortfolio(WebTest):
|
||||||
def test_portfolio_domains_page_403_when_user_not_have_permission(self):
|
def test_portfolio_domains_page_403_when_user_not_have_permission(self):
|
||||||
"""Test that user without proper permission is denied access to portfolio domain view"""
|
"""Test that user without proper permission is denied access to portfolio domain view"""
|
||||||
self.app.set_user(self.user.username)
|
self.app.set_user(self.user.username)
|
||||||
UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=[])
|
UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=self.portfolio, additional_permissions=[]
|
||||||
|
)
|
||||||
with override_flag("organization_feature", active=True):
|
with override_flag("organization_feature", active=True):
|
||||||
# This will redirect the user to the portfolio page.
|
# This will redirect the user to the portfolio page.
|
||||||
# Follow implicity checks if our redirect is working.
|
# Follow implicity checks if our redirect is working.
|
||||||
|
@ -137,7 +156,9 @@ class TestPortfolio(WebTest):
|
||||||
def test_portfolio_domain_requests_page_403_when_user_not_have_permission(self):
|
def test_portfolio_domain_requests_page_403_when_user_not_have_permission(self):
|
||||||
"""Test that user without proper permission is denied access to portfolio domain view"""
|
"""Test that user without proper permission is denied access to portfolio domain view"""
|
||||||
self.app.set_user(self.user.username)
|
self.app.set_user(self.user.username)
|
||||||
UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=[])
|
UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=self.portfolio, additional_permissions=[]
|
||||||
|
)
|
||||||
with override_flag("organization_feature", active=True):
|
with override_flag("organization_feature", active=True):
|
||||||
# This will redirect the user to the portfolio page.
|
# This will redirect the user to the portfolio page.
|
||||||
# Follow implicity checks if our redirect is working.
|
# Follow implicity checks if our redirect is working.
|
||||||
|
@ -149,7 +170,9 @@ class TestPortfolio(WebTest):
|
||||||
def test_portfolio_organization_page_403_when_user_not_have_permission(self):
|
def test_portfolio_organization_page_403_when_user_not_have_permission(self):
|
||||||
"""Test that user without proper permission is not allowed access to portfolio organization page"""
|
"""Test that user without proper permission is not allowed access to portfolio organization page"""
|
||||||
self.app.set_user(self.user.username)
|
self.app.set_user(self.user.username)
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=[])
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=self.portfolio, additional_permissions=[]
|
||||||
|
)
|
||||||
with override_flag("organization_feature", active=True):
|
with override_flag("organization_feature", active=True):
|
||||||
# This will redirect the user to the portfolio page.
|
# This will redirect the user to the portfolio page.
|
||||||
# Follow implicity checks if our redirect is working.
|
# Follow implicity checks if our redirect is working.
|
||||||
|
@ -161,7 +184,11 @@ class TestPortfolio(WebTest):
|
||||||
def test_portfolio_organization_page_read_only(self):
|
def test_portfolio_organization_page_read_only(self):
|
||||||
"""Test that user with a portfolio can access the portfolio organization page, read only"""
|
"""Test that user with a portfolio can access the portfolio organization page, read only"""
|
||||||
self.app.set_user(self.user.username)
|
self.app.set_user(self.user.username)
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=[UserPortfolioPermissionChoices.VIEW_PORTFOLIO])
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user,
|
||||||
|
portfolio=self.portfolio,
|
||||||
|
additional_permissions=[UserPortfolioPermissionChoices.VIEW_PORTFOLIO],
|
||||||
|
)
|
||||||
self.portfolio.city = "Los Angeles"
|
self.portfolio.city = "Los Angeles"
|
||||||
self.portfolio.save()
|
self.portfolio.save()
|
||||||
with override_flag("organization_feature", active=True):
|
with override_flag("organization_feature", active=True):
|
||||||
|
@ -179,7 +206,14 @@ class TestPortfolio(WebTest):
|
||||||
def test_portfolio_organization_page_edit_access(self):
|
def test_portfolio_organization_page_edit_access(self):
|
||||||
"""Test that user with a portfolio can access the portfolio organization page, read only"""
|
"""Test that user with a portfolio can access the portfolio organization page, read only"""
|
||||||
self.app.set_user(self.user.username)
|
self.app.set_user(self.user.username)
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=[UserPortfolioPermissionChoices.VIEW_PORTFOLIO, UserPortfolioPermissionChoices.EDIT_PORTFOLIO])
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user,
|
||||||
|
portfolio=self.portfolio,
|
||||||
|
additional_permissions=[
|
||||||
|
UserPortfolioPermissionChoices.VIEW_PORTFOLIO,
|
||||||
|
UserPortfolioPermissionChoices.EDIT_PORTFOLIO,
|
||||||
|
],
|
||||||
|
)
|
||||||
self.portfolio.city = "Los Angeles"
|
self.portfolio.city = "Los Angeles"
|
||||||
self.portfolio.save()
|
self.portfolio.save()
|
||||||
with override_flag("organization_feature", active=True):
|
with override_flag("organization_feature", active=True):
|
||||||
|
@ -202,7 +236,9 @@ class TestPortfolio(WebTest):
|
||||||
UserPortfolioPermissionChoices.VIEW_ALL_DOMAINS,
|
UserPortfolioPermissionChoices.VIEW_ALL_DOMAINS,
|
||||||
UserPortfolioPermissionChoices.VIEW_ALL_REQUESTS,
|
UserPortfolioPermissionChoices.VIEW_ALL_REQUESTS,
|
||||||
]
|
]
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=portfolio_additional_permissions)
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=self.portfolio, additional_permissions=portfolio_additional_permissions
|
||||||
|
)
|
||||||
with override_flag("organization_feature", active=True):
|
with override_flag("organization_feature", active=True):
|
||||||
# This will redirect the user to the portfolio page.
|
# This will redirect the user to the portfolio page.
|
||||||
# Follow implicity checks if our redirect is working.
|
# Follow implicity checks if our redirect is working.
|
||||||
|
@ -217,7 +253,9 @@ class TestPortfolio(WebTest):
|
||||||
# removing non-basic portfolio perms, which should remove domains
|
# removing non-basic portfolio perms, which should remove domains
|
||||||
# and domain requests from nav
|
# and domain requests from nav
|
||||||
portfolio_additional_permissions = [UserPortfolioPermissionChoices.VIEW_PORTFOLIO]
|
portfolio_additional_permissions = [UserPortfolioPermissionChoices.VIEW_PORTFOLIO]
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=portfolio_additional_permissions)
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=self.portfolio, additional_permissions=portfolio_additional_permissions
|
||||||
|
)
|
||||||
self.user.save()
|
self.user.save()
|
||||||
self.user.refresh_from_db()
|
self.user.refresh_from_db()
|
||||||
|
|
||||||
|
@ -234,7 +272,9 @@ class TestPortfolio(WebTest):
|
||||||
"""Test that admin / memmber roles are associated with the right access"""
|
"""Test that admin / memmber roles are associated with the right access"""
|
||||||
self.app.set_user(self.user.username)
|
self.app.set_user(self.user.username)
|
||||||
portfolio_roles = [UserPortfolioRoleChoices.ORGANIZATION_ADMIN]
|
portfolio_roles = [UserPortfolioRoleChoices.ORGANIZATION_ADMIN]
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, roles=portfolio_roles)
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=self.portfolio, roles=portfolio_roles
|
||||||
|
)
|
||||||
with override_flag("organization_feature", active=True):
|
with override_flag("organization_feature", active=True):
|
||||||
# This will redirect the user to the portfolio page.
|
# This will redirect the user to the portfolio page.
|
||||||
# Follow implicity checks if our redirect is working.
|
# Follow implicity checks if our redirect is working.
|
||||||
|
@ -269,7 +309,9 @@ class TestPortfolio(WebTest):
|
||||||
UserPortfolioPermissionChoices.VIEW_PORTFOLIO,
|
UserPortfolioPermissionChoices.VIEW_PORTFOLIO,
|
||||||
UserPortfolioPermissionChoices.EDIT_PORTFOLIO,
|
UserPortfolioPermissionChoices.EDIT_PORTFOLIO,
|
||||||
]
|
]
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=portfolio_additional_permissions)
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=self.portfolio, additional_permissions=portfolio_additional_permissions
|
||||||
|
)
|
||||||
page = self.app.get(reverse("organization"))
|
page = self.app.get(reverse("organization"))
|
||||||
self.assertContains(
|
self.assertContains(
|
||||||
page, "The name of your federal agency will be publicly listed as the domain registrant."
|
page, "The name of your federal agency will be publicly listed as the domain registrant."
|
||||||
|
@ -284,7 +326,9 @@ class TestPortfolio(WebTest):
|
||||||
UserPortfolioPermissionChoices.VIEW_PORTFOLIO,
|
UserPortfolioPermissionChoices.VIEW_PORTFOLIO,
|
||||||
UserPortfolioPermissionChoices.EDIT_PORTFOLIO,
|
UserPortfolioPermissionChoices.EDIT_PORTFOLIO,
|
||||||
]
|
]
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=portfolio_additional_permissions)
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=self.portfolio, additional_permissions=portfolio_additional_permissions
|
||||||
|
)
|
||||||
|
|
||||||
self.portfolio.organization_name = "Hotel California"
|
self.portfolio.organization_name = "Hotel California"
|
||||||
self.portfolio.save()
|
self.portfolio.save()
|
||||||
|
@ -302,7 +346,9 @@ class TestPortfolio(WebTest):
|
||||||
UserPortfolioPermissionChoices.VIEW_PORTFOLIO,
|
UserPortfolioPermissionChoices.VIEW_PORTFOLIO,
|
||||||
UserPortfolioPermissionChoices.EDIT_PORTFOLIO,
|
UserPortfolioPermissionChoices.EDIT_PORTFOLIO,
|
||||||
]
|
]
|
||||||
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(user=self.user, portfolio=self.portfolio, additional_permissions=portfolio_additional_permissions)
|
portfolio_permission, _ = UserPortfolioPermission.objects.get_or_create(
|
||||||
|
user=self.user, portfolio=self.portfolio, additional_permissions=portfolio_additional_permissions
|
||||||
|
)
|
||||||
|
|
||||||
self.portfolio.address_line1 = "1600 Penn Ave"
|
self.portfolio.address_line1 = "1600 Penn Ave"
|
||||||
self.portfolio.save()
|
self.portfolio.save()
|
||||||
|
|
|
@ -51,7 +51,9 @@ class PortfolioOrganizationView(PortfolioBasePermissionView, FormMixin):
|
||||||
def get_context_data(self, **kwargs):
|
def get_context_data(self, **kwargs):
|
||||||
"""Add additional context data to the template."""
|
"""Add additional context data to the template."""
|
||||||
context = super().get_context_data(**kwargs)
|
context = super().get_context_data(**kwargs)
|
||||||
context["has_edit_org_portfolio_permission"] = self.request.user.has_edit_org_portfolio_permission(self.request.session["portfolio"])
|
context["has_edit_org_portfolio_permission"] = self.request.user.has_edit_org_portfolio_permission(
|
||||||
|
self.request.session["portfolio"]
|
||||||
|
)
|
||||||
return context
|
return context
|
||||||
|
|
||||||
def get_object(self, queryset=None):
|
def get_object(self, queryset=None):
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue