comparison test/test_cgi.py @ 8472:224ccb8b49ca

refactor: change some classes to use __slots__ Speed up access to and reduce size of some low level classes. A few classes in security.py, rest.py are heavily used. But for all, it prevents adding random properties to lower level classes that people shouldn't be mucking with. While doing this I found some test cases accessing an invalid property name and this change caused the cases to crash. admin.py: Use new method Role.props_dict() and Permission.props_dict() where original code just referenced __dict__ when printing Role/Permission. mlink_expr.py: Add slots to multiple classes. Classes Binary and Unary set real properties/attributes. Classes that inherit from them (Equals, Empty, Not, Or, And) define empty slots tuple to eliminate need for __dict__. Class Expression also gets a slot. rate_limit.py: RateLimit and Gcra classes get slots. A couple of pep8 fixes: sort imports, remove trailing spaces on a line, remove unused noqa comment. rest.py: Add slots to class SimulateFieldStorageFromJson and FsValue classes. The memory savings from this could be useful as well as speedier access to the attributes. security.py: Add slots to Permission class. To prevent conflict between slot limit_perm_to_props_only and the class variable of the same name, rename the class variable to limit_perm_to_props_only_default. Also define method props_dict() to allow other code to get a dict to iterate over when checking permissions. Add slots to class Role along with props_dict() method. Add slots to class Security. Also have to add explicit __dict__ slot to support test override of the hasPermission() method. Add props_dict() method, currently unused, but added for symmetry. support.py: TruthDict and PrioList gets slots. test/test_cgi.py: Fix incorrect setting of permission property. Was setting permissions. So testing may not have been doing what we thought it was. Multiple places found with this typo. Remove setting of permissions in some places where it should have no effect on the test and looks like it was just copypasta. test/test_xmlrpc.py Remove setting of permissions in some places where it should have no effect on the test and looks like it was just copypasta.
author John Rouillard <rouilj@ieee.org>
date Mon, 03 Nov 2025 00:13:04 -0500
parents b07165add61b
children 166cb2632315
comparison
equal deleted inserted replaced
8471:8e72dc7b7f2f 8472:224ccb8b49ca
1971 cl.nodeid = '1' 1971 cl.nodeid = '1'
1972 self.assertRaises(exceptions.Unauthorised, 1972 self.assertRaises(exceptions.Unauthorised,
1973 actions.EditItemAction(cl).handle) 1973 actions.EditItemAction(cl).handle)
1974 1974
1975 def testCheckAndPropertyPermission(self): 1975 def testCheckAndPropertyPermission(self):
1976 self.db.security.permissions = {} 1976 self.db.security.permission = {}
1977 def own_record(db, userid, itemid): 1977 def own_record(db, userid, itemid):
1978 return userid == itemid 1978 return userid == itemid
1979 p = self.db.security.addPermission(name='Edit', klass='user', 1979 p = self.db.security.addPermission(name='Edit', klass='user',
1980 check=own_record, properties=("password", )) 1980 check=own_record, properties=("password", ))
1981 self.db.security.addPermissionToRole('User', p) 1981 self.db.security.addPermissionToRole('User', p)
2002 actions.EditItemAction(cl).handle) 2002 actions.EditItemAction(cl).handle)
2003 2003
2004 def testCreatePermission(self): 2004 def testCreatePermission(self):
2005 # this checks if we properly differentiate between create and 2005 # this checks if we properly differentiate between create and
2006 # edit permissions 2006 # edit permissions
2007 self.db.security.permissions = {} 2007 self.db.security.permission = {}
2008 self.db.security.addRole(name='UserAdd') 2008 self.db.security.addRole(name='UserAdd')
2009 # Don't allow roles 2009 # Don't allow roles
2010 p = self.db.security.addPermission(name='Create', klass='user', 2010 p = self.db.security.addPermission(name='Create', klass='user',
2011 properties=("username", "password", "address", 2011 properties=("username", "password", "address",
2012 "alternate_address", "realname", "phone", "organisation", 2012 "alternate_address", "realname", "phone", "organisation",
2059 self.assertRaises(exceptions.Unauthorised, 2059 self.assertRaises(exceptions.Unauthorised,
2060 actions.EditItemAction(cl).handle) 2060 actions.EditItemAction(cl).handle)
2061 2061
2062 def testSearchPermission(self): 2062 def testSearchPermission(self):
2063 # this checks if we properly check for search permissions 2063 # this checks if we properly check for search permissions
2064 self.db.security.permissions = {}
2065 self.db.security.addRole(name='User') 2064 self.db.security.addRole(name='User')
2066 self.db.security.addRole(name='Project') 2065 self.db.security.addRole(name='Project')
2067 self.db.security.addPermissionToRole('User', 'Web Access') 2066 self.db.security.addPermissionToRole('User', 'Web Access')
2068 self.db.security.addPermissionToRole('Project', 'Web Access') 2067 self.db.security.addPermissionToRole('Project', 'Web Access')
2069 # Allow viewing department 2068 # Allow viewing department

Roundup Issue Tracker: http://roundup-tracker.org/