Files
smoothschedule/smoothschedule/schedule/tests/test_calendar_sync_permissions.py
poduck e4ad7fca87 feat: Plan-based feature permissions and quota enforcement
Backend:
- Add HasQuota() permission factory for quota limits (resources, users, services, appointments, email templates, automated tasks)
- Add HasFeaturePermission() factory for feature-based permissions (SMS, masked calling, custom domains, white label, plugins, webhooks, calendar sync, analytics)
- Add has_feature() method to Tenant model for flexible permission checking
- Add new tenant permission fields: can_create_plugins, can_use_webhooks, can_use_calendar_sync, can_export_data
- Create Data Export API with CSV/JSON support for appointments, customers, resources, services
- Create Analytics API with dashboard, appointments, revenue endpoints
- Add calendar sync views and URL configuration

Frontend:
- Add usePlanFeatures hook for checking feature availability
- Add UpgradePrompt components (inline, banner, overlay variants)
- Add LockedSection wrapper and LockedButton for feature gating
- Update settings pages with permission checks

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-12-02 11:21:11 -05:00

381 lines
12 KiB
Python

"""
Tests for Calendar Sync Feature Permission
Tests the can_use_calendar_sync permission checking throughout the calendar sync system.
Includes tests for:
- Permission denied when feature is disabled
- Permission granted when feature is enabled
- OAuth view permission checks
- Calendar sync view permission checks
"""
from django.test import TestCase
from rest_framework.test import APITestCase, APIClient
from rest_framework import status
from core.models import Tenant, OAuthCredential
from smoothschedule.users.models import User
class CalendarSyncPermissionTests(APITestCase):
"""
Test suite for calendar sync feature permissions.
Verifies that the can_use_calendar_sync permission is properly enforced
across all calendar sync operations.
"""
def setUp(self):
"""Set up test fixtures"""
# Create a tenant without calendar sync enabled
self.tenant = Tenant.objects.create(
schema_name='test_tenant',
name='Test Tenant',
can_use_calendar_sync=False
)
# Create a user in this tenant
self.user = User.objects.create_user(
email='user@test.com',
password='testpass123',
tenant=self.tenant
)
# Initialize API client
self.client = APIClient()
def test_calendar_status_without_permission(self):
"""
Test that users without can_use_calendar_sync cannot access calendar status.
Expected: 403 Forbidden with upgrade message
"""
self.client.force_authenticate(user=self.user)
response = self.client.get('/api/calendar/status/')
# Should be able to check status (it's informational)
self.assertEqual(response.status_code, 200)
self.assertFalse(response.data['can_use_calendar_sync'])
self.assertEqual(response.data['total_connected'], 0)
def test_calendar_list_without_permission(self):
"""
Test that users without can_use_calendar_sync cannot list calendars.
Expected: 403 Forbidden
"""
self.client.force_authenticate(user=self.user)
response = self.client.get('/api/calendar/list/')
# Should return 403 Forbidden
self.assertEqual(response.status_code, 403)
self.assertIn('upgrade', response.data['error'].lower())
def test_calendar_sync_without_permission(self):
"""
Test that users without can_use_calendar_sync cannot sync calendars.
Expected: 403 Forbidden
"""
self.client.force_authenticate(user=self.user)
response = self.client.post(
'/api/calendar/sync/',
{'credential_id': 1},
format='json'
)
# Should return 403 Forbidden
self.assertEqual(response.status_code, 403)
self.assertIn('upgrade', response.data['error'].lower())
def test_calendar_disconnect_without_permission(self):
"""
Test that users without can_use_calendar_sync cannot disconnect calendars.
Expected: 403 Forbidden
"""
self.client.force_authenticate(user=self.user)
response = self.client.delete(
'/api/calendar/disconnect/',
{'credential_id': 1},
format='json'
)
# Should return 403 Forbidden
self.assertEqual(response.status_code, 403)
self.assertIn('upgrade', response.data['error'].lower())
def test_oauth_calendar_initiate_without_permission(self):
"""
Test that OAuth calendar initiation checks permission.
Expected: 403 Forbidden when trying to initiate calendar OAuth
"""
self.client.force_authenticate(user=self.user)
response = self.client.post(
'/api/oauth/google/initiate/',
{'purpose': 'calendar'},
format='json'
)
# Should return 403 Forbidden for calendar purpose
self.assertEqual(response.status_code, 403)
self.assertIn('Calendar Sync', response.data['error'])
def test_oauth_email_initiate_without_permission(self):
"""
Test that OAuth email initiation does NOT require calendar sync permission.
Note: Email integration may have different permission checks,
this test documents that calendar and email are separate.
"""
self.client.force_authenticate(user=self.user)
# Email purpose should be allowed without calendar sync permission
# (assuming different permission for email)
response = self.client.post(
'/api/oauth/google/initiate/',
{'purpose': 'email'},
format='json'
)
# Should not be blocked by calendar sync permission
# (Response may be 400 if OAuth not configured, but not 403 for this reason)
self.assertNotEqual(response.status_code, 403)
def test_calendar_list_with_permission(self):
"""
Test that users WITH can_use_calendar_sync can list calendars.
Expected: 200 OK with empty calendar list
"""
# Enable calendar sync for tenant
self.tenant.can_use_calendar_sync = True
self.tenant.save()
self.client.force_authenticate(user=self.user)
response = self.client.get('/api/calendar/list/')
# Should return 200 OK
self.assertEqual(response.status_code, 200)
self.assertTrue(response.data['success'])
self.assertEqual(response.data['calendars'], [])
def test_calendar_with_connected_credential(self):
"""
Test calendar list with an actual OAuth credential.
Expected: 200 OK with credential in the list
"""
# Enable calendar sync
self.tenant.can_use_calendar_sync = True
self.tenant.save()
# Create a calendar OAuth credential
credential = OAuthCredential.objects.create(
tenant=self.tenant,
provider='google',
purpose='calendar',
email='user@gmail.com',
access_token='fake_token_123',
refresh_token='fake_refresh_123',
is_valid=True,
authorized_by=self.user,
)
self.client.force_authenticate(user=self.user)
response = self.client.get('/api/calendar/list/')
# Should return 200 OK with the credential
self.assertEqual(response.status_code, 200)
self.assertTrue(response.data['success'])
self.assertEqual(len(response.data['calendars']), 1)
calendar = response.data['calendars'][0]
self.assertEqual(calendar['email'], 'user@gmail.com')
self.assertEqual(calendar['provider'], 'Google')
self.assertTrue(calendar['is_valid'])
def test_calendar_status_with_permission(self):
"""
Test calendar status check when permission is granted.
Expected: 200 OK with feature enabled
"""
# Enable calendar sync
self.tenant.can_use_calendar_sync = True
self.tenant.save()
self.client.force_authenticate(user=self.user)
response = self.client.get('/api/calendar/status/')
# Should return 200 OK with feature enabled
self.assertEqual(response.status_code, 200)
self.assertTrue(response.data['success'])
self.assertTrue(response.data['can_use_calendar_sync'])
self.assertTrue(response.data['feature_enabled'])
def test_unauthenticated_calendar_access(self):
"""
Test that unauthenticated users cannot access calendar endpoints.
Expected: 401 Unauthorized
"""
# Don't authenticate
response = self.client.get('/api/calendar/list/')
# Should return 401 Unauthorized
self.assertEqual(response.status_code, 401)
def test_tenant_has_feature_method(self):
"""
Test the Tenant.has_feature() method for calendar sync.
Expected: Method returns correct boolean based on field
"""
# Initially disabled
self.assertFalse(self.tenant.has_feature('can_use_calendar_sync'))
# Enable it
self.tenant.can_use_calendar_sync = True
self.tenant.save()
# Check again
self.assertTrue(self.tenant.has_feature('can_use_calendar_sync'))
class CalendarSyncIntegrationTests(APITestCase):
"""
Integration tests for calendar sync with permission checks.
Tests realistic workflows of connecting and syncing calendars.
"""
def setUp(self):
"""Set up test fixtures"""
# Create a tenant WITH calendar sync enabled
self.tenant = Tenant.objects.create(
schema_name='pro_tenant',
name='Professional Tenant',
can_use_calendar_sync=True # Premium feature enabled
)
# Create a user
self.user = User.objects.create_user(
email='pro@example.com',
password='testpass123',
tenant=self.tenant
)
self.client = APIClient()
self.client.force_authenticate(user=self.user)
def test_full_calendar_workflow(self):
"""
Test complete workflow: Check status -> List -> Add -> Sync -> Remove
Expected: All steps succeed with permission checks passing
"""
# Step 1: Check status
response = self.client.get('/api/calendar/status/')
self.assertEqual(response.status_code, 200)
self.assertTrue(response.data['can_use_calendar_sync'])
# Step 2: List calendars (empty initially)
response = self.client.get('/api/calendar/list/')
self.assertEqual(response.status_code, 200)
self.assertEqual(len(response.data['calendars']), 0)
# Step 3: Create credential (simulating OAuth completion)
credential = OAuthCredential.objects.create(
tenant=self.tenant,
provider='google',
purpose='calendar',
email='calendar@gmail.com',
access_token='token_123',
is_valid=True,
authorized_by=self.user,
)
# Step 4: List again (should see the credential)
response = self.client.get('/api/calendar/list/')
self.assertEqual(response.status_code, 200)
self.assertEqual(len(response.data['calendars']), 1)
# Step 5: Sync from the calendar
response = self.client.post(
'/api/calendar/sync/',
{
'credential_id': credential.id,
'calendar_id': 'primary',
'start_date': '2025-01-01',
'end_date': '2025-12-31',
},
format='json'
)
self.assertEqual(response.status_code, 200)
self.assertTrue(response.data['success'])
# Step 6: Disconnect the calendar
response = self.client.delete(
'/api/calendar/disconnect/',
{'credential_id': credential.id},
format='json'
)
self.assertEqual(response.status_code, 200)
self.assertTrue(response.data['success'])
# Step 7: Verify it's deleted
response = self.client.get('/api/calendar/list/')
self.assertEqual(response.status_code, 200)
self.assertEqual(len(response.data['calendars']), 0)
class TenantPermissionModelTests(TestCase):
"""
Unit tests for the Tenant model's calendar sync permission field.
"""
def test_tenant_can_use_calendar_sync_default(self):
"""Test that can_use_calendar_sync defaults to False"""
tenant = Tenant.objects.create(
schema_name='test',
name='Test'
)
self.assertFalse(tenant.can_use_calendar_sync)
def test_tenant_can_use_calendar_sync_enable(self):
"""Test enabling calendar sync on a tenant"""
tenant = Tenant.objects.create(
schema_name='test',
name='Test',
can_use_calendar_sync=False
)
tenant.can_use_calendar_sync = True
tenant.save()
refreshed = Tenant.objects.get(pk=tenant.pk)
self.assertTrue(refreshed.can_use_calendar_sync)
def test_has_feature_with_other_permissions(self):
"""Test that has_feature correctly checks other permissions too"""
tenant = Tenant.objects.create(
schema_name='test',
name='Test',
can_use_calendar_sync=True,
can_use_webhooks=False,
)
self.assertTrue(tenant.has_feature('can_use_calendar_sync'))
self.assertFalse(tenant.has_feature('can_use_webhooks'))