2022-05-04 23:12:03 +02:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
|
|
|
"""Test permissions
|
|
|
|
|
|
|
|
On a deux utilisateurs dans la base test API:
|
2022-07-27 16:03:14 +02:00
|
|
|
- "test", avec le rôle LecteurAPI qui a la permission ScoView,
|
2022-05-04 23:12:03 +02:00
|
|
|
- et "other", qui n'a aucune permission.
|
|
|
|
|
|
|
|
|
|
|
|
Lancer :
|
|
|
|
pytest tests/api/test_api_permissions.py
|
|
|
|
"""
|
|
|
|
|
|
|
|
import requests
|
|
|
|
|
|
|
|
from tests.api.setup_test_api import API_URL, SCODOC_URL, CHECK_CERTIFICATE, api_headers
|
|
|
|
|
|
|
|
from app import create_app
|
|
|
|
from config import RunningConfig
|
|
|
|
|
|
|
|
|
|
|
|
def test_permissions(api_headers):
|
|
|
|
"""
|
2022-07-27 16:03:14 +02:00
|
|
|
vérification de la permissions ScoView et du non accès sans role
|
2022-05-04 23:12:03 +02:00
|
|
|
de toutes les routes de l'API
|
|
|
|
"""
|
|
|
|
# Ce test va récupérer toutes les routes de l'API
|
|
|
|
app = create_app(RunningConfig)
|
|
|
|
assert app
|
2022-05-06 16:05:34 +02:00
|
|
|
# Les routes de l'API avec GET, excluant les logos pour le moment XXX
|
2022-05-04 23:12:03 +02:00
|
|
|
api_rules = [
|
|
|
|
r
|
|
|
|
for r in app.url_map.iter_rules()
|
|
|
|
if str(r).startswith("/ScoDoc/api")
|
2022-11-27 23:31:48 +01:00
|
|
|
and "logo" not in str(r) # ignore logos
|
|
|
|
and "absence" not in str(r) # ignore absences
|
2022-05-04 23:12:03 +02:00
|
|
|
and "GET" in r.methods
|
|
|
|
]
|
|
|
|
assert len(api_rules) > 0
|
|
|
|
args = {
|
2022-08-08 10:06:42 +02:00
|
|
|
"acronym": "TAPI",
|
2022-11-27 23:31:48 +01:00
|
|
|
"code_type": "etudid",
|
|
|
|
"code": 1,
|
2022-05-09 16:26:23 +02:00
|
|
|
"dept_id": 1,
|
2022-08-08 10:06:42 +02:00
|
|
|
"dept_ident": "TAPI",
|
|
|
|
"dept": "TAPI",
|
2022-05-04 23:12:03 +02:00
|
|
|
"etape_apo": "???",
|
|
|
|
"etat": "I",
|
2022-08-08 10:06:42 +02:00
|
|
|
"etudid": 1,
|
2022-05-04 23:12:03 +02:00
|
|
|
"evaluation_id": 1,
|
|
|
|
"formation_id": 1,
|
|
|
|
"formsemestre_id": 1,
|
|
|
|
"group_id": 1,
|
2022-07-29 16:19:40 +02:00
|
|
|
"ine": "INE1",
|
2022-05-04 23:12:03 +02:00
|
|
|
"module_id": 1,
|
|
|
|
"moduleimpl_id": 1,
|
|
|
|
"nip": 1,
|
|
|
|
"partition_id": 1,
|
2022-08-08 10:06:42 +02:00
|
|
|
"role_name": "Ens",
|
|
|
|
"uid": 1,
|
2022-11-27 23:31:48 +01:00
|
|
|
"version": "long",
|
2022-05-04 23:12:03 +02:00
|
|
|
}
|
|
|
|
for rule in api_rules:
|
|
|
|
path = rule.build(args)[1]
|
|
|
|
if not "GET" in rule.methods:
|
|
|
|
# skip all POST routes
|
|
|
|
continue
|
|
|
|
r = requests.get(
|
|
|
|
SCODOC_URL + path,
|
|
|
|
headers=api_headers,
|
|
|
|
verify=CHECK_CERTIFICATE,
|
|
|
|
)
|
|
|
|
assert r.status_code == 200
|
|
|
|
|
|
|
|
# Même chose sans le jeton:
|
|
|
|
for rule in api_rules:
|
|
|
|
path = rule.build(args)[1]
|
|
|
|
if not "GET" in rule.methods:
|
|
|
|
# skip all POST routes
|
|
|
|
continue
|
|
|
|
r = requests.get(
|
|
|
|
SCODOC_URL + path,
|
|
|
|
verify=CHECK_CERTIFICATE,
|
|
|
|
)
|
|
|
|
assert r.status_code == 401
|
|
|
|
|
|
|
|
# Demande un jeton pour "other"
|
|
|
|
r = requests.post(API_URL + "/tokens", auth=("other", "other"))
|
|
|
|
assert r.status_code == 200
|
|
|
|
token = r.json()["token"]
|
|
|
|
headers = {"Authorization": f"Bearer {token}"}
|
|
|
|
# Vérifie que tout est interdit
|
|
|
|
for rule in api_rules:
|
|
|
|
path = rule.build(args)[1]
|
|
|
|
if not "GET" in rule.methods:
|
|
|
|
# skip all POST routes
|
|
|
|
continue
|
|
|
|
r = requests.get(
|
|
|
|
SCODOC_URL + path,
|
|
|
|
headers=headers,
|
|
|
|
verify=CHECK_CERTIFICATE,
|
|
|
|
)
|
2022-08-08 10:06:42 +02:00
|
|
|
assert r.status_code == 401
|