1
0
mirror of https://github.com/peeringdb/peeringdb.git synced 2024-05-11 05:55:09 +00:00
Files
peeringdb-peeringdb/tests/test_entity_view.py

191 lines
5.9 KiB
Python
Raw Normal View History

2018-11-08 19:45:21 +00:00
import json
import uuid
import pytest
Support 202102 (#950) * install django-grainy * nsp to grainy first iteration * nsp to grainy second iteration * grainy and django-grainy pinned to latest releases * Fix typo * Update djangorestframework, peeringdb, django-ratelimit * Rewrite login view ratelimit decorator * Relock pipfile * add list() to make copy of dictionaries before iterating * relock pipfile with python3.9 change docker to use python3.9 * add ordering to admin search queryset for deskproticket and email * add org api key and begin to write tests * additional key tests * add drf-api-keys to pipfile * Wire orgapikey to modelviewsetpermissions * Update api key helper functions * add put test * Add Org API key tab to frontend * Add user api key model * Update user key handling and tests * Update APIPermissionsApplicator to make it work w requests * Add org api key perm panel * add org key permissions * Add user api key views * Add templates for handling user api key (adding, not revoking) * relock pipfile * assorted fixes and tweaks * Add general user group permissions and org user group perms * refactor org api key perms * Add tests for api keys * Add docstrings to permissions helpers * Add api key examples * squash migrations * remove custom api key header config * Change api key test setup * Update permissions for grainy change * Bump up pipfile and pipfile.lock * Add API Key to Verification Queue Item * Delete travis * Add workaround to Dockerfile * update pipfile and sort out migrations * Add comment to Dockerfile * Re-add API Key migrations * Add locale to .gitignore * remove suggest functionality from ix * Update test to recognize that IX api no longer has suggest function * Add test to outlaw POSTing an IX w its org equal to the suggest entity org * Add meta information geowarning * Add alert to demonstrate UI * Add error to fac update * Add template warning for geovalidation * Add geowarning meta js * cover absent meta_response test case * Update styles for geowarning * refactor geotag warning implementation * null lat and long on unsuccessful geo locate * modify geovalidation frontend update * Add deskproticket model email field * Add missing span * add email to org keys * Add email to org key tests * update serializer with rdap validation wrapper * update admin for api keys * Enable writing an email as part of org key creation * Add email validation to org api key form * fix css style on perm row * Add suggested info to api response * display suggested address on frontend * add needs geocode to serializer * save lat long on forward geonormalization * add address suggestion submit button * Add suggested address popin to ADD facility form * Fix css * add lat and long rounding to geocodenabled model clean method * add migration and regression test for lat long decimal db constraint * Add another regression test for model decimal places * Get deskpro functions passing isort and flake * Update ticket_queue_deletion_prevented * update ticket_queue_deletion_prevented for use with org api key * add template for org key dpt from asnauto skipvq * Update deskproticket for rdap error * add facility aka * add aka to serializer and views * black and isort test api keys * fix typo in org key deskpro template * skip or rewrite unapplicable org key tests, and add as_set tests * adjust api key test comments * Add vqi_notify to signals * Add reversion comments for api keys and helper function * update how org keys are added to verification queue items * rename verification queue item fk from api_key to org_key * fix group id error * update key tests with correct http header info * check both user and key, not just user * templates fiex * adapt deskpro integration to work with email only * make org api keys editable for desc and email * pipfile relock * edit test setupdata settings for groups * Change comment to signify we don't need to remove code * address untranslated accept button * Add docstrings to the serializer functions * Add loading shim * Add migration for all longname and aka * Add aka and long name to views and serializers * delete migration w decimals * standardize serializer lat and long fields * Add clean rounding for lat and long * fix serializer error * api key admin improvements * fix linebreak in user api key form * remove debug prints * Add rounding util * Add rounding to lat and long fields * remove 'clean' from geocode method (logic now in admin form) * remove erroneous tests * revert serializer changes * Fix migrations * Add long name and aka to admin models * Update API key docs * Add documentation for api keys * fix typo * fix org api key revoke broken by editable api keys * doc tweaks * doc tweaks * doc tweaks * black format * fix migration hierarchy * docs * docs * api key permissions screenshot * formatting * formatting * padding fixed * remove one image * fix get_user_from_request type checking take out POST only valdiator for entity suggest * didnt mean to commit the django-peeringdb mount * fix suggest on PUT net fix tests * black formatting * update org key permission template * install rust for cryptography * pipfile relock (django-peeringdb to 2.6) Co-authored-by: Stefan Pratter <stefan@20c.com> Co-authored-by: Elliot Frank <elliot@20c.com>
2021-03-09 13:30:30 -06:00
from django.conf import settings
2018-11-08 19:45:21 +00:00
from django.contrib.auth import get_user
from django.contrib.auth.models import AnonymousUser, Group
from django.test import Client, RequestFactory, TestCase
from django_grainy.models import GroupPermission, UserPermission
2018-11-08 19:45:21 +00:00
import peeringdb_server.models as models
import peeringdb_server.views as views
from .util import ClientCase
2018-11-08 19:45:21 +00:00
class ViewTestCase(ClientCase):
2018-11-08 19:45:21 +00:00
entities = ["ix", "net", "fac"]
@classmethod
def setUpTestData(cls):
super().setUpTestData()
2018-11-08 19:45:21 +00:00
# create test users
for name in [
2019-12-05 16:57:52 +00:00
"org_admin",
"user_a",
"user_b",
"user_c",
"user_d",
"user_e",
"user_f",
2018-11-08 19:45:21 +00:00
]:
2019-12-05 16:57:52 +00:00
setattr(
cls,
name,
models.User.objects.create_user(name, "%s@localhost" % name, name),
)
2018-11-08 19:45:21 +00:00
getattr(cls, name).set_password(name)
cls.user_group.user_set.add(getattr(cls, name))
2018-11-08 19:45:21 +00:00
# create test org
2019-12-05 16:57:52 +00:00
cls.org = models.Organization.objects.create(name="Test org", status="ok")
2018-11-08 19:45:21 +00:00
cls.org_other = models.Organization.objects.create(
2019-12-05 16:57:52 +00:00
name="Test org other", status="ok"
)
2018-11-08 19:45:21 +00:00
# create test entities
for tag in cls.entities:
kwargs = {"name": "Test %s" % tag, "status": "ok", "org": cls.org}
if tag == "net":
kwargs.update(asn=1)
setattr(cls, tag, models.REFTAG_MAP[tag].objects.create(**kwargs))
# add org_admin user to org as admin
cls.org.admin_usergroup.user_set.add(cls.org_admin)
# add user_a user to org as member
cls.org.usergroup.user_set.add(cls.user_a)
cls.org_other.usergroup.user_set.add(cls.user_b)
def setUp(self):
self.factory = RequestFactory()
def run_view_test(self, reftag):
id = getattr(self, reftag).id
# test #1 - not logged in
c = Client()
resp = c.get("/%s/%d" % (reftag, id), follow=True)
self.assertEqual(resp.status_code, 200)
# test #2 - guest logged in (not affiliated to any org)
c = Client()
c.login(username="guest", password="guest")
resp = c.get("/%s/%d" % (reftag, id), follow=True)
self.assertEqual(resp.status_code, 200)
# test #3 - user logged in
c = Client()
c.login(username="user_a", password="user_a")
resp = c.get("/%s/%d" % (reftag, id), follow=True)
self.assertEqual(resp.status_code, 200)
class TestExchangeView(ViewTestCase):
def test_view(self):
self.run_view_test("ix")
class TestFacilityView(ViewTestCase):
def test_view(self):
self.run_view_test("fac")
class TestOrgView(ViewTestCase):
def test_view(self):
self.run_view_test("org")
class TestNetworkView(ViewTestCase):
@classmethod
def setUpTestData(cls):
ViewTestCase.setUpTestData()
# Create PoCs
models.NetworkContact.objects.create(
2019-12-05 16:57:52 +00:00
network=cls.net,
visible="Users",
name="Contact Users",
phone="12345",
email="a@a.a",
status="ok",
)
2018-11-08 19:45:21 +00:00
models.NetworkContact.objects.create(
2019-12-05 16:57:52 +00:00
network=cls.net,
visible="Public",
name="Contact Public",
phone="12345",
email="a@a.a",
status="ok",
)
2018-11-08 19:45:21 +00:00
models.NetworkContact.objects.create(
2019-12-05 16:57:52 +00:00
network=cls.net,
visible="Private",
name="Contact Private",
phone="12345",
email="a@a.a",
status="ok",
)
2018-11-08 19:45:21 +00:00
def test_view(self):
self.run_view_test("net")
def test_poc_notify(self):
"""
Test that viewers are notified if PoCs are hidden from them
"""
TEXT_NOT_LOGGED_IN = "Some of this network's contacts are hidden because they are only visible to authenticated users and you are currently not logged in."
TEXT_NOT_VERIFIED = "Some of this network's contacts are hidden because your user account is not affiliated with any organization."
self.assertEqual(models.NetworkContact.objects.all().count(), 3)
# test #1 - not logged in
c = Client()
resp = c.get("/net/%d" % self.net.id, follow=True)
content = resp.content.decode("utf-8")
2018-11-08 19:45:21 +00:00
self.assertEqual(resp.status_code, 200)
assert resp.status_code == 200
assert TEXT_NOT_LOGGED_IN in content
assert "Contact Public" in content
assert "Contact Private" not in content
assert "Contact Users" not in content
2018-11-08 19:45:21 +00:00
# test #2 - guest logged in (not affiliated to any org)
c = Client()
c.login(username="guest", password="guest")
resp = c.get("/net/%d" % self.net.id)
content = resp.content.decode("utf-8")
assert resp.status_code == 200
assert TEXT_NOT_VERIFIED in content
assert "Contact Public" in content
assert "Contact Private" not in content
assert "Contact Users" not in content
2018-11-08 19:45:21 +00:00
# test #3 - user logged in
c = Client()
c.login(username="user_a", password="user_a")
resp = c.get("/net/%d" % self.net.id)
content = resp.content.decode("utf-8")
assert resp.status_code == 200
assert TEXT_NOT_LOGGED_IN not in content
assert TEXT_NOT_VERIFIED not in content
assert "Contact Public" in content
assert "Contact Private" in content
assert "Contact Users" in content
2018-11-08 19:45:21 +00:00
def test_search_asn_redirect(self):
"""
When the user types AS*** or ASN*** and hits enter, if
2018-11-08 19:45:21 +00:00
a result is found it should redirect directly to the result
"""
c = Client()
for q in ["as1", "asn1", "AS1", "ASN1"]:
July updates (#762) * Change label from primary ASN to ASN * Raise validation error when trying to update ASN * first steps for dotf importer procotol (#697) * migrations (#697) * Add translation to error meessage * Make ASN readonly in table * Add test now that ASN should not be able to update * Set fac.rencode to '' for all entries and make it readonly in serializer * Add unique constraints to network ixlan ip addresses * Add migration to null out duplicate ipaddresses for deleted netixlans * Add unique constraints to network ixlan ip addresses * Add migration to null out duplicate ipaddresses for deleted netixlans * remove old migrations (#697) * fix netixlan ipaddr dedupe migration (#268) add netixlan ipaddr unique constraint migration (#268) * ixf_member_data migrations (#697) * fix table name (#697) * importer protocol (#697) * fix netixlan ipaddr dedupe migration (#268) add netixlan ipaddr unique constraint migration (#268) * ixf proposed changes notifications (#697) * Delete repeated query * Add a test to show rencode is readonly * Blank out rencode when mocking data * Remove validator now that constraint exists * Add back unique field validator w Check Deleted true * conflict resolving (#697) * UniqueFieldValidator raise error with code "unique" (#268) * conflict resolution (#697) * Add fixme comment to tests * conflict resolution (#697) * Remove now invalid undelete tests * UniqueFieldValidator raise error with code "unique" (#268) * delete admin tools for duplicate ip addresses * Make migration to delete duplicateipnetworkixlan * Add ixlan-ixpfx status matching validation, add corresponding test * delete redundant checking in test * resolve conflict ui (#697) * fix migrations hierarchy * squash migrations for ixf member data * clean up preview and post-mortem tools * remove non-sensical permission check when undeleting soft-deleted objects through unique integrity error handling * only include the ix-f data url in notifications to admincom (#697) * resolve on --skip-import (#697) * ac conflict resolution (#697) * Define more accurately the incompatible statuses for ixlan and ixpfx * Add another status test * Preventing disrupting changes (#697) * fix tests (#697) * Stop allow_ixp_update from being write only and add a global stat for automated networks * Add tests for global stats that appear in footer * Change how timezone is called with datetime, to get test_stats.py/test_generate_for_current_date to pass * test for protected entities (#697) * admincom conflict resolution refine readonly fields (#697) network notifications only if the problem is actually actionable by the network (#697) * ixp / ac notifcation when ix-f source cannot be parsed (#697) fix issue with ixlan prefix protection (#697) * migrations (#697) * code documentation (#697) * ux tweaks (#697) * UX tweaks (#697) * Fix typo * fix netixlan returned in IXFMemberData.apply when adding a new one (#697) * fix import log incosistencies (#697) * Add IXFMemberData to test * Update test data * Add protocol tests * Add tests for views * always persist changes to remote data on set_conflict (#697) * More tests * always persist changes to remote data on set_conflict (#697) * suggest-add test * net_present_at_ix should check status (#697) * Add more protocol tests * Edit language of some tests * django-peeringdb to 2.1.1 relock pipfile, pin django-ratelimit to <3 as it breaks stuff * Add net_count_ixf field to ix object (#683) * Add the IX-F Member Export URL to the ixlan API endpoint (#249) * Lock some objects from being deleted by the owner (#696) * regenerate api docs (#249) * always persist changes to remote data on set_add and set_update (#697) * IXFMemberData: always persist remote data changes during set_add and set_update, also allow for saving without touching the updated field * always persist changes to remote data on set_add and set_update (#697) * Fix suggest-add tests * IXFMemberData: always persist remote data changes during set_add and set_update, also allow for saving without touching the updated field * IXFMemberData: always persist remote data changes during set_add and set_update, also allow for saving without touching the updated field * fix issue with deletion when ixfmemberdata for entry existed previously (#697) * fix test_suggest_delete_local_ixf_no_flag (#697 tests) * fix issue with deletion when ixfmemberdata for entry existed previously (#697) * invalid ips get logged and notified to the ix via notify_error (#697) * Fix more tests * issue with previous_data when running without save (#697) properly track speed errors (#697) * reset errors on ixfmemberdata that go into pending_save (#697) * add remote_data to admin view (#697) * fix error reset inconsistency (#697) * Refine invalid data tests * remove debug output * for notifications to ac include contact points for net and ix in the message (#697) * settings to toggle ix-f tickets / emails (#697) * allow turning off ix-f notifications for net and ix separately (#697) * add jsonschema test * Add idempotent tests to updater * remove old ixf member tests * Invalid data tests when ixp_updates are enabled * fix speed error validation (#697) * fix issue with rollback (#697) * fix migration hierarchy * fix ixfmemberdata _email * django-peeringdb to 2.2 and relock * add ixf rollback tests * ixf email notifications off by default * black formatted * pyupgrade Co-authored-by: egfrank <egfrank@20c.com> Co-authored-by: Stefan Pratter <stefan@20c.com>
2020-07-15 02:07:01 -05:00
resp = c.get(f"/search?q={q}", follow=True)
2018-11-08 19:45:21 +00:00
self.assertEqual(resp.status_code, 200)
self.assertEqual(resp.redirect_chain, [(f"/net/{self.net.id}", 302)])