7676
7777from geonode .base .populate_test_data import all_public , create_models , remove_models , create_single_dataset
7878from geonode .layers .download_handler import DatasetDownloadHandler
79+ from geonode .security .registry import permissions_registry
7980
8081logger = logging .getLogger (__name__ )
8182
@@ -641,7 +642,7 @@ def test_assign_change_dataset_data_perm(self):
641642 layer = Dataset .objects .first ()
642643 user = get_anonymous_user ()
643644 layer .set_permissions ({"users" : {user .username : ["change_dataset_data" ]}})
644- perms = layer . get_all_level_info ( )
645+ perms = permissions_registry . get_perms ( instance = layer )
645646 self .assertNotIn (user , perms ["users" ])
646647 self .assertNotIn (user .username , perms ["users" ])
647648
@@ -736,13 +737,13 @@ def test_surrogate_escape_string(self):
736737 def test_assign_remove_permissions (self ):
737738 # Assing
738739 layer = Dataset .objects .all ().first ()
739- perm_spec = layer . get_all_level_info ( )
740+ perm_spec = permissions_registry . get_perms ( instance = layer )
740741 self .assertNotIn (get_user_model ().objects .get (username = "norman" ), perm_spec ["users" ])
741742
742743 utils .set_datasets_permissions (
743744 "edit" , resources_names = [layer .name ], users_usernames = ["norman" ], delete_flag = False , verbose = True
744745 )
745- perm_spec = layer . get_all_level_info ( )
746+ perm_spec = permissions_registry . get_perms ( instance = layer )
746747 _c = 0
747748 if "users" in perm_spec :
748749 for _u in perm_spec ["users" ]:
@@ -755,7 +756,7 @@ def test_assign_remove_permissions(self):
755756 utils .set_datasets_permissions (
756757 "read" , resources_names = [layer .name ], users_usernames = ["norman" ], delete_flag = True , verbose = True
757758 )
758- perm_spec = layer . get_all_level_info ( )
759+ perm_spec = permissions_registry . get_perms ( instance = layer )
759760 _c = 0
760761 if "users" in perm_spec :
761762 for _u in perm_spec ["users" ]:
@@ -768,15 +769,15 @@ def test_assign_remove_permissions(self):
768769 def test_assign_remove_permissions_for_groups (self ):
769770 # Assing
770771 layer = Dataset .objects .all ().first ()
771- perm_spec = layer . get_all_level_info ( )
772+ perm_spec = permissions_registry . get_perms ( instance = layer )
772773 group_profile = GroupProfile .objects .create (slug = "group1" , title = "group1" , access = "public" )
773774 self .assertNotIn (group_profile , perm_spec ["groups" ])
774775
775776 # giving manage permissions to the group
776777 utils .set_datasets_permissions (
777778 "manage" , resources_names = [layer .name ], groups_names = ["group1" ], delete_flag = False , verbose = True
778779 )
779- perm_spec = layer . get_all_level_info ( )
780+ perm_spec = permissions_registry . get_perms ( instance = layer )
780781 expected = {
781782 "change_dataset_data" ,
782783 "change_dataset_style" ,
@@ -795,7 +796,7 @@ def test_assign_remove_permissions_for_groups(self):
795796 utils .set_datasets_permissions (
796797 "view" , resources_names = [layer .name ], groups_names = ["group1" ], delete_flag = False , verbose = True
797798 )
798- perm_spec = layer . get_all_level_info ( )
799+ perm_spec = permissions_registry . get_perms ( instance = layer )
799800 expected = {"view_resourcebase" }
800801 # checking the perms list
801802 self .assertSetEqual (expected , set (perm_spec ["groups" ][group_profile .group ]))
@@ -804,7 +805,7 @@ def test_assign_remove_permissions_for_groups(self):
804805 utils .set_datasets_permissions (
805806 "view" , resources_names = [layer .name ], groups_names = ["group1" ], delete_flag = True , verbose = True
806807 )
807- perm_spec = layer . get_all_level_info ( )
808+ perm_spec = permissions_registry . get_perms ( instance = layer )
808809 # checking the perms list
809810 self .assertTrue (group_profile .group not in perm_spec ["groups" ])
810811
@@ -1851,7 +1852,7 @@ def _create_arguments(self, perms_type, mode="set"):
18511852 def _assert_perms (self , expected_perms , dataset , username , assertion = True ):
18521853 dataset .refresh_from_db ()
18531854
1854- perms = dataset . get_all_level_info ( )
1855+ perms = permissions_registry . get_perms ( instance = dataset )
18551856 if assertion :
18561857 self .assertTrue (username in [user .username for user in perms ["users" ]])
18571858 actual = set (
0 commit comments