mirror of
https://gitlab.crans.org/bde/nk20
synced 2024-12-03 13:46:58 +00:00
Remove dead code, don't try to cover unnecessary things
Signed-off-by: Yohann D'ANELLO <yohann.danello@gmail.com>
This commit is contained in:
parent
7866ab7ec0
commit
016ab5a9c9
@ -5,7 +5,6 @@ from django.contrib.auth.models import AnonymousUser
|
|||||||
from django.contrib.contenttypes.models import ContentType
|
from django.contrib.contenttypes.models import ContentType
|
||||||
from django.template.defaultfilters import stringfilter
|
from django.template.defaultfilters import stringfilter
|
||||||
from django import template
|
from django import template
|
||||||
from note.models import Transaction
|
|
||||||
from note_kfet.middlewares import get_current_authenticated_user, get_current_session
|
from note_kfet.middlewares import get_current_authenticated_user, get_current_session
|
||||||
from permission.backends import PermissionBackend
|
from permission.backends import PermissionBackend
|
||||||
|
|
||||||
@ -25,21 +24,6 @@ def not_empty_model_list(model_name):
|
|||||||
return qs.exists()
|
return qs.exists()
|
||||||
|
|
||||||
|
|
||||||
@stringfilter
|
|
||||||
def not_empty_model_change_list(model_name):
|
|
||||||
"""
|
|
||||||
Return True if and only if the current user has right to change any object of the given model.
|
|
||||||
"""
|
|
||||||
user = get_current_authenticated_user()
|
|
||||||
session = get_current_session()
|
|
||||||
if user is None or isinstance(user, AnonymousUser):
|
|
||||||
return False
|
|
||||||
elif user.is_superuser and session.get("permission_mask", -1) >= 42:
|
|
||||||
return True
|
|
||||||
qs = model_list(model_name, "change")
|
|
||||||
return qs.exists()
|
|
||||||
|
|
||||||
|
|
||||||
@stringfilter
|
@stringfilter
|
||||||
def model_list(model_name, t="view", fetch=True):
|
def model_list(model_name, t="view", fetch=True):
|
||||||
"""
|
"""
|
||||||
@ -68,33 +52,8 @@ def has_perm(perm, obj):
|
|||||||
return PermissionBackend.check_perm(get_current_authenticated_user(), perm, obj)
|
return PermissionBackend.check_perm(get_current_authenticated_user(), perm, obj)
|
||||||
|
|
||||||
|
|
||||||
def can_create_transaction():
|
|
||||||
"""
|
|
||||||
:return: True iff the authenticated user can create a transaction.
|
|
||||||
"""
|
|
||||||
user = get_current_authenticated_user()
|
|
||||||
session = get_current_session()
|
|
||||||
if user is None or isinstance(user, AnonymousUser):
|
|
||||||
return False
|
|
||||||
elif user.is_superuser and session.get("permission_mask", -1) >= 42:
|
|
||||||
return True
|
|
||||||
if session.get("can_create_transaction", None):
|
|
||||||
return session.get("can_create_transaction", None) == 1
|
|
||||||
|
|
||||||
empty_transaction = Transaction(
|
|
||||||
source=user.note,
|
|
||||||
destination=user.note,
|
|
||||||
quantity=1,
|
|
||||||
amount=0,
|
|
||||||
reason="Check permissions",
|
|
||||||
)
|
|
||||||
session["can_create_transaction"] = PermissionBackend.check_perm(user, "note.add_transaction", empty_transaction)
|
|
||||||
return session.get("can_create_transaction") == 1
|
|
||||||
|
|
||||||
|
|
||||||
register = template.Library()
|
register = template.Library()
|
||||||
register.filter('not_empty_model_list', not_empty_model_list)
|
register.filter('not_empty_model_list', not_empty_model_list)
|
||||||
register.filter('not_empty_model_change_list', not_empty_model_change_list)
|
|
||||||
register.filter('model_list', model_list)
|
register.filter('model_list', model_list)
|
||||||
register.filter('model_list_length', model_list_length)
|
register.filter('model_list_length', model_list_length)
|
||||||
register.filter('has_perm', has_perm)
|
register.filter('has_perm', has_perm)
|
||||||
|
@ -78,7 +78,7 @@ class PermissionQueryTestCase(TestCase):
|
|||||||
query = instanced.query
|
query = instanced.query
|
||||||
model = perm.model.model_class()
|
model = perm.model.model_class()
|
||||||
model.objects.filter(query).all()
|
model.objects.filter(query).all()
|
||||||
except (FieldError, AttributeError, ValueError, TypeError, JSONDecodeError):
|
except (FieldError, AttributeError, ValueError, TypeError, JSONDecodeError): # pragma: no cover
|
||||||
print("Query error for permission", perm)
|
print("Query error for permission", perm)
|
||||||
print("Query:", perm.query)
|
print("Query:", perm.query)
|
||||||
if instanced.query:
|
if instanced.query:
|
||||||
|
@ -85,7 +85,7 @@ class ProtectedCreateView(LoginRequiredMixin, CreateView):
|
|||||||
If not, a 403 error is displayed.
|
If not, a 403 error is displayed.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
def get_sample_object(self):
|
def get_sample_object(self): # pragma: no cover
|
||||||
"""
|
"""
|
||||||
return a sample instance of the Model.
|
return a sample instance of the Model.
|
||||||
It should be valid (can be stored properly in database), but must not collide with existing data.
|
It should be valid (can be stored properly in database), but must not collide with existing data.
|
||||||
|
@ -109,9 +109,6 @@ class SpecialTransactionTable(tables.Table):
|
|||||||
'a': {'class': 'btn btn-primary btn-danger'}
|
'a': {'class': 'btn btn-primary btn-danger'}
|
||||||
}, )
|
}, )
|
||||||
|
|
||||||
def render_id(self, record):
|
|
||||||
return record.specialtransactionproxy.pk
|
|
||||||
|
|
||||||
def render_amount(self, value):
|
def render_amount(self, value):
|
||||||
return pretty_money(value)
|
return pretty_money(value)
|
||||||
|
|
||||||
|
@ -370,11 +370,8 @@ class TestSogeCredits(TestCase):
|
|||||||
response = self.client.get(reverse("treasury:manage_soge_credit", args=(soge_credit.pk,)))
|
response = self.client.get(reverse("treasury:manage_soge_credit", args=(soge_credit.pk,)))
|
||||||
self.assertEqual(response.status_code, 200)
|
self.assertEqual(response.status_code, 200)
|
||||||
|
|
||||||
try:
|
self.assertRaises(ValidationError, self.client.post,
|
||||||
self.client.post(reverse("treasury:manage_soge_credit", args=(soge_credit.pk,)), data=dict(delete=True))
|
reverse("treasury:manage_soge_credit", args=(soge_credit.pk,)), data=dict(delete=True))
|
||||||
raise AssertionError("It is not possible to delete the soge credit until the note is not credited.")
|
|
||||||
except ValidationError:
|
|
||||||
pass
|
|
||||||
|
|
||||||
SpecialTransaction.objects.create(
|
SpecialTransaction.objects.create(
|
||||||
source=NoteSpecial.objects.get(special_type="Carte bancaire"),
|
source=NoteSpecial.objects.get(special_type="Carte bancaire"),
|
||||||
|
@ -1,12 +1,13 @@
|
|||||||
# Copyright (C) 2018-2020 by BDE ENS Paris-Saclay
|
# Copyright (C) 2018-2020 by BDE ENS Paris-Saclay
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||||
|
|
||||||
# CAS
|
|
||||||
OPTIONAL_APPS = [
|
OPTIONAL_APPS = [
|
||||||
# 'debug_toolbar'
|
# 'cas_server',
|
||||||
|
# 'debug_toolbar',
|
||||||
|
# 'django_extensions',
|
||||||
]
|
]
|
||||||
|
|
||||||
# When a server error occured, send an email to these addresses
|
# When a server error occurred, send an email to these addresses
|
||||||
ADMINS = (
|
ADMINS = (
|
||||||
('Note Kfet', 'notekfet@example.com'),
|
('Note Kfet', 'notekfet@example.com'),
|
||||||
)
|
)
|
||||||
|
2
tox.ini
2
tox.ini
@ -15,7 +15,7 @@ deps =
|
|||||||
-r{toxinidir}/requirements.txt
|
-r{toxinidir}/requirements.txt
|
||||||
coverage
|
coverage
|
||||||
commands =
|
commands =
|
||||||
coverage run --omit='*migrations*,apps/scripts*' --source=apps,note_kfet ./manage.py test apps/
|
coverage run --omit='apps/scripts*,*_example.py,note_kfet/wsgi.py' --source=apps,note_kfet ./manage.py test apps/
|
||||||
coverage report -m
|
coverage report -m
|
||||||
|
|
||||||
[testenv:linters]
|
[testenv:linters]
|
||||||
|
Loading…
Reference in New Issue
Block a user