mirror of
https://github.com/peeringdb/peeringdb.git
synced 2024-05-11 05:55:09 +00:00
* install django-grainy * nsp to grainy first iteration * Fix validation error message overflow * Add migration, update views.py and template to add help_text to UI * nsp to grainy second iteration * grainy and django-grainy pinned to latest releases * deskpro ticket cc (#875) * black formatting * move ac link to bottom for ticket body * Fix typo * Update djangorestframework, peeringdb, django-ratelimit * Rewrite login view ratelimit decorator * Relock pipfile * add list() to make copy of dictionaries before iterating * respect ix-f url visibilty in ix-f conflict emails * Add type coercion to settings taken from environment variables * Add bool handling * relock pipfile with python3.9 change docker to use python3.9 * Check bool via isinstance * add ordering to admin search queryset for deskproticket and email * update settings with envvar_type option * Add tooltips to add ix and add exchange views (in org) * Add tooltip to suggest fac view * get phone information in view * add missing migration * add migration and make org a geo model * Wire normalization to put/create requests for Facility * Update admin with new address fields * Refactor serializer using mixin * Add floor and suite to address API * Write command to geonormalize existing entries * Remove unnecessary method from model * Add floor and suite to views * Add ignore geo status * Force refresh for fac and org updates * adjust frontend typo * add checking if update needs geosync * redo error handling for geosync * remove save keyword from geonormalize command script * change raw_id_fields * alternate autocomplete lookup field depending on where inline is called * remove unnecessary error handling * Add csv option * Fix bug with None vs empty string * add regex parsing for suite and floor conversion * Add migration that removes geo error as a field * add geostatus update to command * Ignore suite floor and address2 changes for api normalization * update geomodel by removing geo_error * Black models.py * Black serializers.py * remove geocode error from admin * Add function for reversing pretty speed * add conversion to export method * fix typo * fix speed value feedback after submit * remove conditional * Add error handling to create endpoint * Refine floor and suite parsing regex * Add geocoding tests * Add json for tests * IX-F Importer: Bogus output of "Preview" tool #896 * remove cruft * black formatting * IX-F Importer: history of changes per ixlan & netixlan #893 * 6 add geocode to org view * 4 update geocode without refresh * Update error display * Fix bug with formatting translated string * Add DateTimeFields to model * Add update signals * add last updated fields to views and serializers * Add last updated model migration * Add the data migration for last updated fields * add test that tests a normal org user with create org permissions * grainy to 1.7 django grainy to 1.9.1 * Fix formatting issues * Adjust var names * Refactor signals * Temporary: save override from network model * Empty vlan lists no longer cause error * typo in ixf.py * typo in admin * Typos in model verbose names * Add serializer IXLAN validation for ixf_ixp_import_enabled * Add model validation to IXLan * relock pipfile * relock pipfile * begin signal test file * Remove full clean from save in ixlan * use post_reversion_commit signal instead * remove redundant save override * remove cruft / debug code * Add signal tests * exclude organizations with city missing from commandline geosync * Skip geosync if the only address information we have is a country * initial commit for vlan matcher in importer * Add more tests and remove unused imports * update tests * Actually add vlan matching to importer * Add type checking for speed list and state * Change how we register connection.state * add bootstrap options * add rdap cache command * remove outdated perm docs * rdap from master and relock * propagate rdap settings to peeringdb.settings * add loaddata for initial fixtures * user friendly error message on RdapNotFound errors (#497) * update rdap errors * django-peeringdb to 2.5.0 and relock * rdap to 1.2.0 and relock * fix migration hierarchy * add ignore_recurse_errors option * add missing fields to mock remove cruft missed during merge * rdap to 1.2.1 * dont geo validate during api tests * fix tests * Add test file * fix merge * RDAP_SELF_BOOTSTRAP to False while running tests * black formatted * run black * add github actions * add runs on Co-authored-by: Stefan Pratter <stefan@20c.com> Co-authored-by: Elliot Frank <elliot@20c.com>
180 lines
5.5 KiB
Python
180 lines
5.5 KiB
Python
import pytest
|
|
import json
|
|
import uuid
|
|
|
|
from django.test import Client, TestCase, RequestFactory
|
|
from django.contrib.auth.models import Group, AnonymousUser
|
|
from django.contrib.auth import get_user
|
|
|
|
from .util import ClientCase
|
|
|
|
from django_grainy.models import UserPermission, GroupPermission
|
|
|
|
import peeringdb_server.views as views
|
|
import peeringdb_server.models as models
|
|
|
|
|
|
class ViewTestCase(ClientCase):
|
|
|
|
entities = ["ix", "net", "fac"]
|
|
|
|
@classmethod
|
|
def setUpTestData(cls):
|
|
super(ViewTestCase, cls).setUpTestData()
|
|
|
|
# create test users
|
|
for name in [
|
|
"org_admin",
|
|
"user_a",
|
|
"user_b",
|
|
"user_c",
|
|
"user_d",
|
|
"user_e",
|
|
"user_f",
|
|
]:
|
|
setattr(
|
|
cls,
|
|
name,
|
|
models.User.objects.create_user(name, "%s@localhost" % name, name),
|
|
)
|
|
getattr(cls, name).set_password(name)
|
|
cls.user_group.user_set.add(getattr(cls, name))
|
|
|
|
# create test org
|
|
cls.org = models.Organization.objects.create(name="Test org", status="ok")
|
|
cls.org_other = models.Organization.objects.create(
|
|
name="Test org other", status="ok"
|
|
)
|
|
|
|
# create test entities
|
|
for tag in cls.entities:
|
|
kwargs = {"name": "Test %s" % tag, "status": "ok", "org": cls.org}
|
|
if tag == "net":
|
|
kwargs.update(asn=1)
|
|
setattr(cls, tag, models.REFTAG_MAP[tag].objects.create(**kwargs))
|
|
|
|
# add org_admin user to org as admin
|
|
cls.org.admin_usergroup.user_set.add(cls.org_admin)
|
|
|
|
# add user_a user to org as member
|
|
cls.org.usergroup.user_set.add(cls.user_a)
|
|
cls.org_other.usergroup.user_set.add(cls.user_b)
|
|
|
|
def setUp(self):
|
|
self.factory = RequestFactory()
|
|
|
|
def run_view_test(self, reftag):
|
|
id = getattr(self, reftag).id
|
|
# test #1 - not logged in
|
|
c = Client()
|
|
resp = c.get("/%s/%d" % (reftag, id), follow=True)
|
|
self.assertEqual(resp.status_code, 200)
|
|
|
|
# test #2 - guest logged in (not affiliated to any org)
|
|
c = Client()
|
|
c.login(username="guest", password="guest")
|
|
resp = c.get("/%s/%d" % (reftag, id), follow=True)
|
|
self.assertEqual(resp.status_code, 200)
|
|
|
|
# test #3 - user logged in
|
|
c = Client()
|
|
c.login(username="user_a", password="user_a")
|
|
resp = c.get("/%s/%d" % (reftag, id), follow=True)
|
|
self.assertEqual(resp.status_code, 200)
|
|
|
|
|
|
class TestExchangeView(ViewTestCase):
|
|
def test_view(self):
|
|
self.run_view_test("ix")
|
|
|
|
|
|
class TestFacilityView(ViewTestCase):
|
|
def test_view(self):
|
|
self.run_view_test("fac")
|
|
|
|
|
|
class TestOrgView(ViewTestCase):
|
|
def test_view(self):
|
|
self.run_view_test("org")
|
|
|
|
|
|
class TestNetworkView(ViewTestCase):
|
|
@classmethod
|
|
def setUpTestData(cls):
|
|
ViewTestCase.setUpTestData()
|
|
# Create PoCs
|
|
models.NetworkContact.objects.create(
|
|
network=cls.net,
|
|
visible="Users",
|
|
name="Contact Users",
|
|
phone="12345",
|
|
email="a@a.a",
|
|
status="ok",
|
|
)
|
|
models.NetworkContact.objects.create(
|
|
network=cls.net,
|
|
visible="Public",
|
|
name="Contact Public",
|
|
phone="12345",
|
|
email="a@a.a",
|
|
status="ok",
|
|
)
|
|
models.NetworkContact.objects.create(
|
|
network=cls.net,
|
|
visible="Private",
|
|
name="Contact Private",
|
|
phone="12345",
|
|
email="a@a.a",
|
|
status="ok",
|
|
)
|
|
|
|
def test_view(self):
|
|
self.run_view_test("net")
|
|
|
|
def test_poc_notify(self):
|
|
"""
|
|
Test that viewers are notified if PoCs are hidden from them
|
|
"""
|
|
|
|
TEXT_NOT_LOGGED_IN = "Some of this network's contacts are hidden because they are only visible to authenticated users and you are currently not logged in."
|
|
TEXT_NOT_VERIFIED = "Some of this network's contacts are hidden because your user account is not affiliated with any organization."
|
|
|
|
self.assertEqual(models.NetworkContact.objects.all().count(), 3)
|
|
|
|
# test #1 - not logged in
|
|
c = Client()
|
|
resp = c.get("/net/%d" % self.net.id, follow=True)
|
|
self.assertEqual(resp.status_code, 200)
|
|
assert resp.status_code == 200
|
|
assert TEXT_NOT_LOGGED_IN in resp.content.decode("utf-8")
|
|
|
|
# test #2 - guest logged in (not affiliated to any org)
|
|
c = Client()
|
|
c.login(username="guest", password="guest")
|
|
resp = c.get("/net/%d" % self.net.id)
|
|
assert resp.status_code == 200
|
|
assert TEXT_NOT_VERIFIED in resp.content.decode("utf-8")
|
|
|
|
# test #3 - user logged in
|
|
c = Client()
|
|
c.login(username="user_a", password="user_a")
|
|
resp = c.get("/net/%d" % self.net.id)
|
|
assert resp.status_code == 200
|
|
assert TEXT_NOT_LOGGED_IN not in resp.content.decode("utf-8")
|
|
assert TEXT_NOT_VERIFIED not in resp.content.decode("utf-8")
|
|
|
|
def test_search_asn_redirect(self):
|
|
"""
|
|
When the user types AS*** or ASN*** and hits enter, if
|
|
a result is found it should redirect directly to the result
|
|
"""
|
|
|
|
c = Client()
|
|
|
|
for q in ["as1", "asn1", "AS1", "ASN1"]:
|
|
resp = c.get(f"/search?q={q}", follow=True)
|
|
self.assertEqual(resp.status_code, 200)
|
|
self.assertEqual(
|
|
resp.redirect_chain, [("/net/{}".format(self.net.id), 302)]
|
|
)
|