comparison test/test_xmlrpc.py @ 5199:1f72b73d7770

Still trying to figure out why travis ci fails without a call to self.db.security.set_props_only_default(props_only=False) Trying a call to new function get_props.... in the instance init routine to see if the class prop is misconfigured or something.
author John Rouillard <rouilj@ieee.org>
date Sat, 18 Mar 2017 14:42:05 -0400
parents f070841dee95
children 198b6e810c67
comparison
equal deleted inserted replaced
5198:f070841dee95 5199:1f72b73d7770
28 # set up and open a tracker 28 # set up and open a tracker
29 self.instance = db_test_base.setupTracker(self.dirname, self.backend) 29 self.instance = db_test_base.setupTracker(self.dirname, self.backend)
30 30
31 # open the database 31 # open the database
32 self.db = self.instance.open('admin') 32 self.db = self.instance.open('admin')
33
34 print "props_only default", self.db.security.get_props_only_default()
33 35
34 # Get user id (user4 maybe). Used later to get data from db. 36 # Get user id (user4 maybe). Used later to get data from db.
35 self.joeid = 'user' + self.db.user.create(username='joe', 37 self.joeid = 'user' + self.db.user.create(username='joe',
36 password=password.Password('random'), address='random@home.org', 38 password=password.Password('random'), address='random@home.org',
37 realname='Joe Random', roles='User') 39 realname='Joe Random', roles='User')
195 self.db.setCurrentUser('joe') 197 self.db.setCurrentUser('joe')
196 198
197 def testAuthFilter(self): 199 def testAuthFilter(self):
198 # this checks if we properly check for search permissions 200 # this checks if we properly check for search permissions
199 self.db.security.permissions = {} 201 self.db.security.permissions = {}
200 self.db.security.set_props_only_default(props_only=False) 202 # self.db.security.set_props_only_default(props_only=False)
201 self.db.security.addRole(name='User') 203 self.db.security.addRole(name='User')
202 self.db.security.addRole(name='Project') 204 self.db.security.addRole(name='Project')
203 self.db.security.addPermissionToRole('User', 'Web Access') 205 self.db.security.addPermissionToRole('User', 'Web Access')
204 self.db.security.addPermissionToRole('Project', 'Web Access') 206 self.db.security.addPermissionToRole('Project', 'Web Access')
205 # Allow viewing keyword 207 # Allow viewing keyword

Roundup Issue Tracker: http://roundup-tracker.org/