1
0
mirror of https://github.com/peeringdb/peeringdb.git synced 2024-05-11 05:55:09 +00:00
* django3, py39, lgtm, linting (#715)

* IX-F Importer: ticket status change when posting re-occuring conflict to existing resolved ticket (#920)

* fix recaptcha requirement for user creation in django-admin (#715)

* IX-F Importer: fix command output buffering #967

* Drop dot1q_support field #903

* fix test (#967)

* Add name, city, country to ixfac (GET operation) #166

* additional tests fir #166

* Allow IXP to trigger ix-f importer for their exchange #779

* add docker compose for dev

* add selinux labels for mountpoints

* fixes #1013: The process to permanently remove old soft-deleted network contacts pdb_delete_pocs raises a false ProtectedAction

* fix api test

* relock poetry

* remove django_namespace_perms from installed apps

* fix user permissios ui

* remove remaining references to django namespace perms

* linting

* copy tox.ini

* comment flake8 check until we figure out why it ignores configs from tox.ini

* black format

* poetry lock

Co-authored-by: Stefan Pratter <stefan@20c.com>
This commit is contained in:
Matt Griswold
2021-08-18 08:21:22 -05:00
committed by GitHub
parent 63aab93f04
commit 77282c4b66
81 changed files with 1281 additions and 633 deletions

View File

@@ -182,6 +182,39 @@ def test_tech_poc_protection(role, deletable):
poc.delete()
@pytest.mark.django_db
@pytest.mark.parametrize(
"role",
[
"Technical",
"Policy",
"NOC",
"Abuse",
"Maintenance",
"Public Relations",
"Sales",
],
)
def test_tech_poc_hard_delete_1013(role):
"""
Test that already soft-deleted pocs dont raise
a protected action error when hard-deleting (#1013)
"""
call_command("pdb_generate_test_data", limit=2, commit=True)
net = Network.objects.first()
net.poc_set.all().delete()
poc_a = NetworkContact.objects.create(status="ok", role="Technical", network=net)
poc_b = NetworkContact.objects.create(status="deleted", role=role, network=net)
poc_b.delete(hard=True)
poc_a.delete(force=True)
poc_a.delete(hard=True)
@pytest.mark.django_db
def test_org_protection_sponsor(db):