[Zope-Checkins] CVS: Zope3/lib/python/Zope/App/Security/Grants/Views/Browser/tests - testRolePermissionView.py:1.4

Florent Guillaume fg@nuxeo.com
Tue, 25 Jun 2002 07:36:40 -0400


Update of /cvs-repository/Zope3/lib/python/Zope/App/Security/Grants/Views/Browser/tests
In directory cvs.zope.org:/tmp/cvs-serv3516/Views/Browser/tests

Modified Files:
	testRolePermissionView.py 
Log Message:
Remove explicit REQUEST passing in the view.

For some reason Zope.App.PageTemplate.ViewPageTemplateFile.BoundPageTemplate
still accepts REQUEST=None as an optional argument... why ?



=== Zope3/lib/python/Zope/App/Security/Grants/Views/Browser/tests/testRolePermissionView.py 1.3 => 1.4 ===
 # Copyright (c) 2001, 2002 Zope Corporation and Contributors.
 # All Rights Reserved.
-# 
+#
 # This software is subject to the provisions of the Zope Public License,
 # Version 2.0 (ZPL).  A copy of the ZPL should accompany this distribution.
 # THIS SOFTWARE IS PROVIDED "AS IS" AND ANY AND ALL EXPRESS OR IMPLIED
 # WARRANTIES ARE DISCLAIMED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
 # WARRANTIES OF TITLE, MERCHANTABILITY, AGAINST INFRINGEMENT, AND FITNESS
 # FOR A PARTICULAR PURPOSE.
-# 
+#
 ##############################################################################
 import unittest, sys
 from Zope.App.OFS.Services.ServiceManager.tests.PlacefulSetup\
@@ -66,13 +66,14 @@
         #         manager  member
         # read       +
         # write      .       -
-        self.view.action({
+        REQ = {
             'p0': 'read', 'p1': 'write',
             'r0': 'manager', 'r1': 'member',
             'p0r0': 'Allow',
             'p1r0': 'Unset', 'p1r1': 'Deny',
-            },
-                         testing=1)
+            }
+        self.view.request = REQ # XXX yuck
+        self.view.action(testing=1)
         permissionRoles = self.view.permissionRoles()
         for ip in range(len(permissionRoles)):
             permissionRole = permissionRoles[ip]
@@ -91,13 +92,14 @@
         #         manager  member
         # read       -
         # write      +
-        self.view.action({
+        REQ = {
             'p0': 'read', 'p1': 'write',
             'r0': 'manager', 'r1': 'member',
             'p0r0': 'Deny',
             'p1r0': 'Allow', 'p1r1': 'Unset'
-            },
-                         testing=1)
+            }
+        self.view.request = REQ # XXX yuck
+        self.view.action(testing=1)
         permissionRoles = self.view.permissionRoles()
         for ip in range(len(permissionRoles)):
             permissionRole = permissionRoles[ip]
@@ -114,8 +116,7 @@
                     self.failUnless(setting == 'Unset')
 
     def testPermissionRoles(self):
-        self.view.update_permission(REQUEST=None,
-                                    permission_id='write',
+        self.view.update_permission(permission_id='write',
                                     settings=['Allow', 'Unset'],
                                     testing=1)
         permission = self.view.permissionForID('write')
@@ -123,8 +124,7 @@
         self.assertEquals(settings, ['Allow', 'Unset'])
 
 
-        self.view.update_permission(REQUEST=None,
-                                    permission_id='write',
+        self.view.update_permission(permission_id='write',
                                     settings=['Unset', 'Deny'],
                                     testing=1)
         permission = self.view.permissionForID('write')
@@ -133,7 +133,6 @@
 
         self.assertRaises(ValueError,
                           self.view.update_permission,
-                          REQUEST=None,
                           permission_id='write',
                           settings=['Unset', 'foo'],
                           testing=1)
@@ -141,8 +140,8 @@
     def testRolePermissions(self):
         REQ={'Allow': ['read'],
              'Deny': ['write']}
-        self.view.update_role(REQUEST=REQ,
-                              role_id='member',
+        self.view.request = REQ # XXX yuck
+        self.view.update_role(role_id='member',
                               testing=1)
         role = self.view.roleForID('member')
         pinfos = role.permissionsInfo()
@@ -155,8 +154,8 @@
 
         REQ={'Allow': [],
              'Deny': ['read']}
-        self.view.update_role(REQUEST=REQ,
-                              role_id='member',
+        self.view.request = REQ # XXX yuck
+        self.view.update_role(role_id='member',
                               testing=1)
         role = self.view.roleForID('member')
         pinfos = role.permissionsInfo()