1
0
mirror of https://github.com/peeringdb/peeringdb.git synced 2024-05-11 05:55:09 +00:00
Files
peeringdb-peeringdb/tests/test_entity_view.py
Matt Griswold b07baf3092 Support 202011 (#917)
* install django-grainy

* nsp to grainy first iteration

* Fix validation error message overflow

* Add migration, update views.py and template to add help_text to UI

* nsp to grainy second iteration

* grainy and django-grainy pinned to latest releases

* deskpro ticket cc (#875)

* black formatting

* move ac link to bottom for ticket body

* Fix typo

* Update djangorestframework, peeringdb, django-ratelimit

* Rewrite login view ratelimit decorator

* Relock pipfile

* add list() to make copy of dictionaries before iterating

* respect ix-f url visibilty in ix-f conflict emails

* Add type coercion to settings taken from environment variables

* Add bool handling

* relock pipfile with python3.9
change docker to use python3.9

* Check bool via isinstance

* add ordering to admin search queryset for deskproticket and email

* update settings with envvar_type option

* Add tooltips to add ix and add exchange views (in org)

* Add tooltip to suggest fac view

* get phone information in view

* add missing migration

* add migration and make org a geo model

* Wire normalization to put/create requests for Facility

* Update admin with new address fields

* Refactor serializer using mixin

* Add floor and suite to address API

* Write command to geonormalize existing entries

* Remove unnecessary method from model

* Add floor and suite to views

* Add ignore geo status

* Force refresh for fac and org updates

* adjust frontend typo

* add checking if update needs geosync

* redo error handling for geosync

* remove save keyword from geonormalize command script

* change raw_id_fields

* alternate autocomplete lookup field depending on where inline is called

* remove unnecessary error handling

* Add  csv option

* Fix bug
 with None vs empty string

* add regex parsing for suite and floor conversion

* Add migration that removes geo error as a field

* add geostatus update to command

* Ignore suite floor and address2 changes for api normalization

* update geomodel by removing geo_error

* Black models.py

* Black serializers.py

* remove geocode error from admin

* Add function for reversing pretty speed

* add conversion to export method

* fix typo

* fix speed value feedback after submit

* remove conditional

* Add error handling to create endpoint

* Refine floor and suite parsing regex

* Add geocoding tests

* Add json for tests

* IX-F Importer: Bogus output of "Preview" tool #896

* remove cruft

* black formatting

* IX-F Importer: history of changes per ixlan & netixlan #893

* 6 add geocode to org view

* 4 update geocode without refresh

* Update error display

* Fix bug with formatting translated string

* Add DateTimeFields to model

* Add update signals

* add last updated fields to views and serializers

* Add last updated model migration

* Add the data migration for last updated fields

* add test that tests a normal org user with create org permissions

* grainy to 1.7
django grainy to 1.9.1

* Fix formatting issues

* Adjust var names

* Refactor signals

* Temporary: save override from network model

* Empty vlan lists no longer cause error

* typo in ixf.py

* typo in admin

* Typos in model verbose names

* Add serializer IXLAN validation for ixf_ixp_import_enabled

* Add model validation to IXLan

* relock pipfile

* relock pipfile

* begin signal test file

* Remove full clean from save in ixlan

* use post_reversion_commit signal instead

* remove redundant save override

* remove cruft / debug code

* Add signal tests

* exclude organizations with city missing from commandline geosync

* Skip geosync if the only address information we have is a country

* initial commit for vlan matcher in importer

* Add more tests and remove unused imports

* update tests

* Actually add vlan matching to importer

* Add type checking for speed list and state

* Change how we register connection.state

* add bootstrap options

* add rdap cache command

* remove outdated perm docs

* rdap from master and relock

* propagate rdap settings to peeringdb.settings

* add loaddata for initial fixtures

* user friendly error message on RdapNotFound errors (#497)

* update rdap errors

* django-peeringdb to 2.5.0 and relock

* rdap to 1.2.0 and relock

* fix migration hierarchy

* add ignore_recurse_errors option

* add missing fields to mock
remove cruft missed during merge

* rdap to 1.2.1

* dont geo validate during api tests

* fix tests

* Add test file

* fix merge

* RDAP_SELF_BOOTSTRAP to False while running tests

* black formatted

* run black

* add github actions

* add runs on

Co-authored-by: Stefan Pratter <stefan@20c.com>
Co-authored-by: Elliot Frank <elliot@20c.com>
2021-01-13 14:35:07 -06:00

180 lines
5.5 KiB
Python

import pytest
import json
import uuid
from django.test import Client, TestCase, RequestFactory
from django.contrib.auth.models import Group, AnonymousUser
from django.contrib.auth import get_user
from .util import ClientCase
from django_grainy.models import UserPermission, GroupPermission
import peeringdb_server.views as views
import peeringdb_server.models as models
class ViewTestCase(ClientCase):
entities = ["ix", "net", "fac"]
@classmethod
def setUpTestData(cls):
super(ViewTestCase, cls).setUpTestData()
# create test users
for name in [
"org_admin",
"user_a",
"user_b",
"user_c",
"user_d",
"user_e",
"user_f",
]:
setattr(
cls,
name,
models.User.objects.create_user(name, "%s@localhost" % name, name),
)
getattr(cls, name).set_password(name)
cls.user_group.user_set.add(getattr(cls, name))
# create test org
cls.org = models.Organization.objects.create(name="Test org", status="ok")
cls.org_other = models.Organization.objects.create(
name="Test org other", status="ok"
)
# create test entities
for tag in cls.entities:
kwargs = {"name": "Test %s" % tag, "status": "ok", "org": cls.org}
if tag == "net":
kwargs.update(asn=1)
setattr(cls, tag, models.REFTAG_MAP[tag].objects.create(**kwargs))
# add org_admin user to org as admin
cls.org.admin_usergroup.user_set.add(cls.org_admin)
# add user_a user to org as member
cls.org.usergroup.user_set.add(cls.user_a)
cls.org_other.usergroup.user_set.add(cls.user_b)
def setUp(self):
self.factory = RequestFactory()
def run_view_test(self, reftag):
id = getattr(self, reftag).id
# test #1 - not logged in
c = Client()
resp = c.get("/%s/%d" % (reftag, id), follow=True)
self.assertEqual(resp.status_code, 200)
# test #2 - guest logged in (not affiliated to any org)
c = Client()
c.login(username="guest", password="guest")
resp = c.get("/%s/%d" % (reftag, id), follow=True)
self.assertEqual(resp.status_code, 200)
# test #3 - user logged in
c = Client()
c.login(username="user_a", password="user_a")
resp = c.get("/%s/%d" % (reftag, id), follow=True)
self.assertEqual(resp.status_code, 200)
class TestExchangeView(ViewTestCase):
def test_view(self):
self.run_view_test("ix")
class TestFacilityView(ViewTestCase):
def test_view(self):
self.run_view_test("fac")
class TestOrgView(ViewTestCase):
def test_view(self):
self.run_view_test("org")
class TestNetworkView(ViewTestCase):
@classmethod
def setUpTestData(cls):
ViewTestCase.setUpTestData()
# Create PoCs
models.NetworkContact.objects.create(
network=cls.net,
visible="Users",
name="Contact Users",
phone="12345",
email="a@a.a",
status="ok",
)
models.NetworkContact.objects.create(
network=cls.net,
visible="Public",
name="Contact Public",
phone="12345",
email="a@a.a",
status="ok",
)
models.NetworkContact.objects.create(
network=cls.net,
visible="Private",
name="Contact Private",
phone="12345",
email="a@a.a",
status="ok",
)
def test_view(self):
self.run_view_test("net")
def test_poc_notify(self):
"""
Test that viewers are notified if PoCs are hidden from them
"""
TEXT_NOT_LOGGED_IN = "Some of this network's contacts are hidden because they are only visible to authenticated users and you are currently not logged in."
TEXT_NOT_VERIFIED = "Some of this network's contacts are hidden because your user account is not affiliated with any organization."
self.assertEqual(models.NetworkContact.objects.all().count(), 3)
# test #1 - not logged in
c = Client()
resp = c.get("/net/%d" % self.net.id, follow=True)
self.assertEqual(resp.status_code, 200)
assert resp.status_code == 200
assert TEXT_NOT_LOGGED_IN in resp.content.decode("utf-8")
# test #2 - guest logged in (not affiliated to any org)
c = Client()
c.login(username="guest", password="guest")
resp = c.get("/net/%d" % self.net.id)
assert resp.status_code == 200
assert TEXT_NOT_VERIFIED in resp.content.decode("utf-8")
# test #3 - user logged in
c = Client()
c.login(username="user_a", password="user_a")
resp = c.get("/net/%d" % self.net.id)
assert resp.status_code == 200
assert TEXT_NOT_LOGGED_IN not in resp.content.decode("utf-8")
assert TEXT_NOT_VERIFIED not in resp.content.decode("utf-8")
def test_search_asn_redirect(self):
"""
When the user types AS*** or ASN*** and hits enter, if
a result is found it should redirect directly to the result
"""
c = Client()
for q in ["as1", "asn1", "AS1", "ASN1"]:
resp = c.get(f"/search?q={q}", follow=True)
self.assertEqual(resp.status_code, 200)
self.assertEqual(
resp.redirect_chain, [("/net/{}".format(self.net.id), 302)]
)