|
1 | | -# Copyright The IETF Trust 2015-2020, All Rights Reserved |
| 1 | +# Copyright The IETF Trust 2015-2024, All Rights Reserved |
2 | 2 | # -*- coding: utf-8 -*- |
3 | 3 | import base64 |
4 | 4 | import datetime |
@@ -222,6 +222,70 @@ def test_api_set_session_video_url(self): |
222 | 222 | event = doc.latest_event() |
223 | 223 | self.assertEqual(event.by, recman) |
224 | 224 |
|
| 225 | + def test_api_set_meetecho_recording_name(self): |
| 226 | + url = urlreverse("ietf.meeting.views.api_set_meetecho_recording_name") |
| 227 | + recmanrole = RoleFactory(group__type_id="ietf", name_id="recman") |
| 228 | + recman = recmanrole.person |
| 229 | + meeting = MeetingFactory(type_id="ietf") |
| 230 | + session = SessionFactory(group__type_id="wg", meeting=meeting) |
| 231 | + apikey = PersonalApiKey.objects.create(endpoint=url, person=recman) |
| 232 | + name = "testname" |
| 233 | + |
| 234 | + # error cases |
| 235 | + r = self.client.post(url, {}) |
| 236 | + self.assertContains(r, "Missing apikey parameter", status_code=400) |
| 237 | + |
| 238 | + badrole = RoleFactory(group__type_id="ietf", name_id="ad") |
| 239 | + badapikey = PersonalApiKey.objects.create(endpoint=url, person=badrole.person) |
| 240 | + badrole.person.user.last_login = timezone.now() |
| 241 | + badrole.person.user.save() |
| 242 | + r = self.client.post(url, {"apikey": badapikey.hash()}) |
| 243 | + self.assertContains(r, "Restricted to role: Recording Manager", status_code=403) |
| 244 | + |
| 245 | + r = self.client.post(url, {"apikey": apikey.hash()}) |
| 246 | + self.assertContains(r, "Too long since last regular login", status_code=400) |
| 247 | + recman.user.last_login = timezone.now() |
| 248 | + recman.user.save() |
| 249 | + |
| 250 | + r = self.client.get(url, {"apikey": apikey.hash()}) |
| 251 | + self.assertContains(r, "Method not allowed", status_code=405) |
| 252 | + |
| 253 | + r = self.client.post(url, {"apikey": apikey.hash()}) |
| 254 | + self.assertContains(r, "Missing session_id parameter", status_code=400) |
| 255 | + |
| 256 | + r = self.client.post(url, {"apikey": apikey.hash(), "session_id": session.pk}) |
| 257 | + self.assertContains(r, "Missing name parameter", status_code=400) |
| 258 | + |
| 259 | + bad_pk = int(Session.objects.order_by("-pk").first().pk) + 1 |
| 260 | + r = self.client.post( |
| 261 | + url, |
| 262 | + { |
| 263 | + "apikey": apikey.hash(), |
| 264 | + "session_id": bad_pk, |
| 265 | + "name": name, |
| 266 | + }, |
| 267 | + ) |
| 268 | + self.assertContains(r, "Session not found", status_code=400) |
| 269 | + |
| 270 | + r = self.client.post( |
| 271 | + url, |
| 272 | + { |
| 273 | + "apikey": apikey.hash(), |
| 274 | + "session_id": "foo", |
| 275 | + "name": name, |
| 276 | + }, |
| 277 | + ) |
| 278 | + self.assertContains(r, "Invalid session_id", status_code=400) |
| 279 | + |
| 280 | + r = self.client.post( |
| 281 | + url, {"apikey": apikey.hash(), "session_id": session.pk, "name": name} |
| 282 | + ) |
| 283 | + self.assertContains(r, "Done", status_code=200) |
| 284 | + |
| 285 | + session.refresh_from_db() |
| 286 | + self.assertEqual(session.meetecho_recording_name, name) |
| 287 | + |
| 288 | + |
225 | 289 | def test_api_add_session_attendees_deprecated(self): |
226 | 290 | # Deprecated test - should be removed when we stop accepting a simple list of user PKs in |
227 | 291 | # the add_session_attendees() view |
|
0 commit comments