@@ -197,20 +197,21 @@ def testAuthAllowedCreate(self):
197197 def testAuthFilter (self ):
198198 # this checks if we properly check for search permissions
199199 self .db .security .permissions = {}
200+ self .db .security .set_props_only_default (props_only = False )
200201 self .db .security .addRole (name = 'User' )
201202 self .db .security .addRole (name = 'Project' )
202203 self .db .security .addPermissionToRole ('User' , 'Web Access' )
203204 self .db .security .addPermissionToRole ('Project' , 'Web Access' )
204205 # Allow viewing keyword
205206 p = self .db .security .addPermission (name = 'View' , klass = 'keyword' )
206- print "View keyword class: %r" p
207+ print "View keyword class: %r" % p
207208 self .db .security .addPermissionToRole ('User' , p )
208209 # Allow viewing interesting things (but not keyword) on issue
209210 # But users might only view issues where they are on nosy
210211 # (so in the real world the check method would be better)
211212 p = self .db .security .addPermission (name = 'View' , klass = 'issue' ,
212213 properties = ("title" , "status" ), check = lambda x ,y ,z : True )
213- print "View keyword class w/ props: %r" p
214+ print "View keyword class w/ props: %r" % p
214215 self .db .security .addPermissionToRole ('User' , p )
215216 # Allow role "Project" access to whole issue
216217 p = self .db .security .addPermission (name = 'View' , klass = 'issue' )
@@ -239,12 +240,12 @@ def testAuthFilter(self):
239240 # this might check for keyword owner in the real world)
240241 p = self .db .security .addPermission (name = 'View' , klass = 'issue' ,
241242 check = lambda x ,y ,z : False )
242- print "View issue class: %r" p
243+ print "View issue class: %r" % p
243244 self .db .security .addPermissionToRole ('User' , p )
244245 # Allow user to search for issue.status
245246 p = self .db .security .addPermission (name = 'Search' , klass = 'issue' ,
246247 properties = ("status" ,))
247- print "View Search class w/ props: %r" p
248+ print "View Search class w/ props: %r" % p
248249 self .db .security .addPermissionToRole ('User' , p )
249250
250251 keyw = {'keyword' :self .db .keyword .lookup ('d1' )}
0 commit comments