forked from openedx/edx-platform
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: move progress related apis permissions to standard permission f…
…ile so can be override later
- Loading branch information
1 parent
0630c65
commit e4c6a85
Showing
4 changed files
with
88 additions
and
6 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
""" | ||
Permissions for the course home apis and associated actions | ||
""" | ||
from bridgekeeper import perms | ||
from lms.djangoapps.courseware.rules import HasAccessRule | ||
|
||
|
||
CAN_MASQUARADE_LEARNER_PROGRESS = 'course_home_api.can_masquarade_progress' | ||
|
||
perms[CAN_MASQUARADE_LEARNER_PROGRESS] = HasAccessRule('staff') |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,70 @@ | ||
""" | ||
Tests for permissions defined in courseware.rules | ||
""" | ||
import ddt | ||
|
||
from common.djangoapps.student.roles import OrgStaffRole, CourseStaffRole | ||
from common.djangoapps.student.tests.factories import UserFactory | ||
from xmodule.modulestore.tests.django_utils import ModuleStoreTestCase # lint-amnesty, pylint: disable=wrong-import-order | ||
from xmodule.modulestore.tests.factories import CourseFactory # lint-amnesty, pylint: disable=wrong-import-order | ||
from lms.djangoapps.course_home_api.permissions import CAN_MASQUARADE_LEARNER_PROGRESS | ||
|
||
|
||
@ddt.ddt | ||
class PermissionTests(ModuleStoreTestCase): | ||
""" | ||
Tests for permissions defined in courseware.rules | ||
""" | ||
def setUp(self): | ||
super().setUp() | ||
self.user = UserFactory() | ||
self.course = CourseFactory(org='org') | ||
self.another_course = CourseFactory(org='org') | ||
|
||
def tearDown(self): | ||
super().tearDown() | ||
self.user.delete() | ||
|
||
@ddt.data( | ||
( | ||
True, None, None, True, | ||
"Global staff users should have masquerade access", | ||
), | ||
( | ||
False, None, None, False, | ||
"Non-staff users shouldn't have masquerade access", | ||
), | ||
( | ||
False, 'another_org', None, False, | ||
"User with staff access on another org shouldn't have masquerade access", | ||
), | ||
( | ||
False, 'org', None, True, | ||
"User with org-wide staff access should have masquerade access", | ||
), | ||
( | ||
False, None, 'another_course', False, | ||
"User with staff access on another course shouldn't have masquerade access", | ||
), | ||
( | ||
False, None, 'course', True, | ||
"User with staff access on the course should have masquerade access", | ||
), | ||
) | ||
@ddt.unpack | ||
def test_can_masquerade_return_value(self, is_staff, org_role, course_role, expected_permission, description): | ||
""" | ||
Test that only authorized users have masquerade access | ||
""" | ||
self.user.is_staff = is_staff | ||
self.user.save() | ||
assert self.user.is_staff == is_staff | ||
|
||
if org_role: | ||
OrgStaffRole(org_role).add_users(self.user) | ||
|
||
if course_role: | ||
CourseStaffRole(getattr(self, course_role).id).add_users(self.user) | ||
|
||
has_perm = self.user.has_perm(CAN_MASQUARADE_LEARNER_PROGRESS, self.course.id) | ||
assert has_perm == expected_permission, description |