launchpad-reviewers team mailing list archive
-
launchpad-reviewers team
-
Mailing list archive
-
Message #26648
[Merge] ~pappacena/launchpad:testfix-snap-admin-permission-regression into launchpad:master
Thiago F. Pappacena has proposed merging ~pappacena/launchpad:testfix-snap-admin-permission-regression into launchpad:master.
Commit message:
Using admin (instead of commercial admin) when testing special snap permissions
Requested reviews:
Launchpad code reviewers (launchpad-reviewers)
For more details, see:
https://code.launchpad.net/~pappacena/launchpad/+git/launchpad/+merge/399614
--
Your team Launchpad code reviewers is requested to review the proposed merge of ~pappacena/launchpad:testfix-snap-admin-permission-regression into launchpad:master.
diff --git a/lib/lp/snappy/browser/tests/test_snap.py b/lib/lp/snappy/browser/tests/test_snap.py
index d763dae..c57f412 100644
--- a/lib/lp/snappy/browser/tests/test_snap.py
+++ b/lib/lp/snappy/browser/tests/test_snap.py
@@ -717,8 +717,8 @@ class TestSnapAdminView(BaseTestSnapView):
def test_admin_snap(self):
# Admins can change require_virtualized, privacy, and allow_internet.
login("admin@xxxxxxxxxxxxx")
- commercial_admin = self.factory.makePerson(
- member_of=[getUtility(ILaunchpadCelebrities).commercial_admin])
+ admin = self.factory.makePerson(
+ member_of=[getUtility(ILaunchpadCelebrities).admin])
login_person(self.person)
project = self.factory.makeProduct(name="my-project")
with person_logged_in(project.owner):
@@ -732,7 +732,7 @@ class TestSnapAdminView(BaseTestSnapView):
self.factory.makeAccessPolicy(
pillar=project, type=InformationType.PRIVATESECURITY)
private = InformationType.PRIVATESECURITY.name
- browser = self.getViewBrowser(snap, user=commercial_admin)
+ browser = self.getViewBrowser(snap, user=admin)
browser.getLink("Administer snap package").click()
browser.getControl(name='field.project').value = "my-project"
browser.getControl("Require virtualized builders").selected = False
@@ -750,10 +750,10 @@ class TestSnapAdminView(BaseTestSnapView):
# Cannot make snap private if it doesn't have a project associated.
login_person(self.person)
snap = self.factory.makeSnap(registrant=self.person)
- commercial_admin = self.factory.makePerson(
- member_of=[getUtility(ILaunchpadCelebrities).commercial_admin])
+ admin = self.factory.makePerson(
+ member_of=[getUtility(ILaunchpadCelebrities).admin])
private = InformationType.PRIVATESECURITY.name
- browser = self.getViewBrowser(snap, user=commercial_admin)
+ browser = self.getViewBrowser(snap, user=admin)
browser.getLink("Administer snap package").click()
browser.getControl(name='field.project').value = ''
browser.getControl(name="field.information_type").value = private
@@ -776,10 +776,10 @@ class TestSnapAdminView(BaseTestSnapView):
information_type=InformationType.PRIVATESECURITY)
# Note that only LP admins or, in this case, commercial_admins
# can reach this snap because it's owned by a private team.
- commercial_admin = self.factory.makePerson(
- member_of=[getUtility(ILaunchpadCelebrities).commercial_admin])
+ admin = self.factory.makePerson(
+ member_of=[getUtility(ILaunchpadCelebrities).admin])
public = InformationType.PUBLIC.name
- browser = self.getViewBrowser(snap, user=commercial_admin)
+ browser = self.getViewBrowser(snap, user=admin)
browser.getLink("Administer snap package").click()
browser.getControl(name="field.information_type").value = public
browser.getControl("Update snap package").click()
diff --git a/lib/lp/snappy/tests/test_snap.py b/lib/lp/snappy/tests/test_snap.py
index 2a522f5..0c6f68e 100644
--- a/lib/lp/snappy/tests/test_snap.py
+++ b/lib/lp/snappy/tests/test_snap.py
@@ -3029,8 +3029,7 @@ class TestSnapWebservice(TestCaseWithFactory):
ws_snaps = [
self.webservice.getAbsoluteUrl(api_url(snap))
for snap in snaps]
- commercial_admin = (
- getUtility(ILaunchpadCelebrities).commercial_admin.teamowner)
+ admin = getUtility(ILaunchpadCelebrities).admin.teamowner
logout()
# Anonymous requests can only see public snaps.
@@ -3063,16 +3062,16 @@ class TestSnapWebservice(TestCaseWithFactory):
[entry["self_link"] for entry in response.jsonBody()["entries"]])
# Admins can see all snaps.
- commercial_admin_webservice = webservice_for_person(
- commercial_admin, permission=OAuthPermission.READ_PRIVATE)
- response = commercial_admin_webservice.named_get(
+ admin_webservice = webservice_for_person(
+ admin, permission=OAuthPermission.READ_PRIVATE)
+ response = webservice.named_get(
"/+snaps", "findByOwner", owner=person_urls[0],
api_version="devel")
self.assertEqual(200, response.status)
self.assertContentEqual(
ws_snaps[:2],
[entry["self_link"] for entry in response.jsonBody()["entries"]])
- response = commercial_admin_webservice.named_get(
+ response = admin_webservice.named_get(
"/+snaps", "findByOwner", owner=person_urls[1],
api_version="devel")
self.assertEqual(200, response.status)
Follow ups