mirror of
https://github.com/peeringdb/peeringdb.git
synced 2024-05-11 05:55:09 +00:00
* install django-grainy * nsp to grainy first iteration * Fix validation error message overflow * Add migration, update views.py and template to add help_text to UI * nsp to grainy second iteration * grainy and django-grainy pinned to latest releases * deskpro ticket cc (#875) * black formatting * move ac link to bottom for ticket body * Fix typo * Update djangorestframework, peeringdb, django-ratelimit * Rewrite login view ratelimit decorator * Relock pipfile * add list() to make copy of dictionaries before iterating * respect ix-f url visibilty in ix-f conflict emails * Add type coercion to settings taken from environment variables * Add bool handling * relock pipfile with python3.9 change docker to use python3.9 * Check bool via isinstance * add ordering to admin search queryset for deskproticket and email * update settings with envvar_type option * Add tooltips to add ix and add exchange views (in org) * Add tooltip to suggest fac view * get phone information in view * add missing migration * add migration and make org a geo model * Wire normalization to put/create requests for Facility * Update admin with new address fields * Refactor serializer using mixin * Add floor and suite to address API * Write command to geonormalize existing entries * Remove unnecessary method from model * Add floor and suite to views * Add ignore geo status * Force refresh for fac and org updates * adjust frontend typo * add checking if update needs geosync * redo error handling for geosync * remove save keyword from geonormalize command script * change raw_id_fields * alternate autocomplete lookup field depending on where inline is called * remove unnecessary error handling * Add csv option * Fix bug with None vs empty string * add regex parsing for suite and floor conversion * Add migration that removes geo error as a field * add geostatus update to command * Ignore suite floor and address2 changes for api normalization * update geomodel by removing geo_error * Black models.py * Black serializers.py * remove geocode error from admin * Add function for reversing pretty speed * add conversion to export method * fix typo * fix speed value feedback after submit * remove conditional * Add error handling to create endpoint * Refine floor and suite parsing regex * Add geocoding tests * Add json for tests * IX-F Importer: Bogus output of "Preview" tool #896 * remove cruft * black formatting * IX-F Importer: history of changes per ixlan & netixlan #893 * 6 add geocode to org view * 4 update geocode without refresh * Update error display * Fix bug with formatting translated string * Add DateTimeFields to model * Add update signals * add last updated fields to views and serializers * Add last updated model migration * Add the data migration for last updated fields * add test that tests a normal org user with create org permissions * grainy to 1.7 django grainy to 1.9.1 * Fix formatting issues * Adjust var names * Refactor signals * Temporary: save override from network model * Empty vlan lists no longer cause error * typo in ixf.py * typo in admin * Typos in model verbose names * Add serializer IXLAN validation for ixf_ixp_import_enabled * Add model validation to IXLan * relock pipfile * relock pipfile * begin signal test file * Remove full clean from save in ixlan * use post_reversion_commit signal instead * remove redundant save override * remove cruft / debug code * Add signal tests * exclude organizations with city missing from commandline geosync * Skip geosync if the only address information we have is a country * initial commit for vlan matcher in importer * Add more tests and remove unused imports * update tests * Actually add vlan matching to importer * Add type checking for speed list and state * Change how we register connection.state * add bootstrap options * add rdap cache command * remove outdated perm docs * rdap from master and relock * propagate rdap settings to peeringdb.settings * add loaddata for initial fixtures * user friendly error message on RdapNotFound errors (#497) * update rdap errors * django-peeringdb to 2.5.0 and relock * rdap to 1.2.0 and relock * fix migration hierarchy * add ignore_recurse_errors option * add missing fields to mock remove cruft missed during merge * rdap to 1.2.1 * dont geo validate during api tests * fix tests * Add test file * fix merge * RDAP_SELF_BOOTSTRAP to False while running tests * black formatted * run black * add github actions * add runs on Co-authored-by: Stefan Pratter <stefan@20c.com> Co-authored-by: Elliot Frank <elliot@20c.com>
163 lines
4.9 KiB
Python
163 lines
4.9 KiB
Python
import json
|
|
import pytest
|
|
|
|
from django.test import TestCase
|
|
from django.contrib.auth.models import Group
|
|
from django.db import IntegrityError
|
|
from django.conf import settings
|
|
|
|
import peeringdb_server.models as models
|
|
|
|
import reversion
|
|
|
|
|
|
class VeriQueueTests(TestCase):
|
|
"""
|
|
Test VerificationQueue creation and resolve
|
|
"""
|
|
|
|
@classmethod
|
|
def setUpTestData(cls):
|
|
"""
|
|
Test that verification queue items are created for all entities
|
|
for which it is enabled
|
|
"""
|
|
|
|
cls.guest_group = Group.objects.create(name="guest", id=settings.GUEST_GROUP_ID)
|
|
cls.user_group = Group.objects.create(name="user", id=settings.USER_GROUP_ID)
|
|
|
|
settings.USER_GROUP_ID = cls.user_group.id
|
|
settings.GUEST_GROUP_ID = cls.guest_group.id
|
|
|
|
cls.inst = {}
|
|
org = models.Organization.objects.create(name="Test", status="pending")
|
|
for model in models.QUEUE_ENABLED:
|
|
if model == models.Organization:
|
|
continue
|
|
if model == models.User:
|
|
cls.inst["user"] = model.objects.create_user(
|
|
"test", "test@localhost", "test"
|
|
)
|
|
cls.inst["user"].set_unverified()
|
|
else:
|
|
kwargs = {
|
|
"org": org,
|
|
"name": "Test %s" % model.handleref.tag,
|
|
"status": "pending",
|
|
}
|
|
if model.handleref.tag == "net":
|
|
kwargs.update(asn=1)
|
|
cls.inst[model.handleref.tag] = model.objects.create(**kwargs)
|
|
|
|
def test_get_for_entity(self):
|
|
"""
|
|
Test VerificationQueueItem.get_for_entity
|
|
"""
|
|
|
|
# test verification queue items were created for all queue enabled
|
|
# entities
|
|
for k, v in list(self.inst.items()):
|
|
vqi = models.VerificationQueueItem.get_for_entity(v)
|
|
self.assertEqual(vqi.item, v)
|
|
|
|
def test_deskpro_tickets(self):
|
|
"""
|
|
Test that tickets were created for the facility, ix and network
|
|
"""
|
|
user = self.inst["user"]
|
|
qs = models.DeskProTicket.objects
|
|
|
|
for tag in ["fac", "net", "ix"]:
|
|
inst = self.inst[tag]
|
|
vqi = models.VerificationQueueItem.get_for_entity(inst)
|
|
vqi.user = user
|
|
vqi.save()
|
|
self.assertEqual(
|
|
qs.filter(
|
|
subject=f"[{settings.RELEASE_ENV}] {vqi.content_type} - {inst}"
|
|
).exists(),
|
|
True,
|
|
)
|
|
|
|
def test_approve(self):
|
|
"""
|
|
Test VerificationqueueItem.approve
|
|
"""
|
|
|
|
ix = self.inst.get("ix")
|
|
vqi = models.VerificationQueueItem.get_for_entity(ix)
|
|
|
|
vqi.approve()
|
|
|
|
# after approval ix should be status 'ok'
|
|
ix.refresh_from_db()
|
|
self.assertEqual(ix.status, "ok")
|
|
|
|
# check that the status in the archive is correct (#558)
|
|
|
|
version = (
|
|
reversion.models.Version.objects.get_for_object(ix)
|
|
.order_by("-revision_id")
|
|
.first()
|
|
)
|
|
self.assertEqual(
|
|
json.loads(version.serialized_data)[0]["fields"]["status"], "ok"
|
|
)
|
|
|
|
# after approval vqi should no longer exist
|
|
with pytest.raises(models.VerificationQueueItem.DoesNotExist):
|
|
vqi.refresh_from_db()
|
|
|
|
def test_user_approve(self):
|
|
"""
|
|
Test VerificationqueueItem.approve when approving users
|
|
"""
|
|
|
|
# test that approving a user also moves them in the correct usergroup
|
|
|
|
user = self.inst.get("user")
|
|
vqi = models.VerificationQueueItem.get_for_entity(user)
|
|
|
|
vqi.approve()
|
|
|
|
# after approval user should be status 'ok'
|
|
|
|
user.refresh_from_db()
|
|
self.assertEqual(user.status, "ok")
|
|
|
|
# after approval user should be in 'users' group
|
|
self.assertEqual(user.groups.filter(name="user").exists(), True)
|
|
self.assertEqual(user.groups.filter(name="guest").exists(), False)
|
|
|
|
def test_deny(self):
|
|
"""
|
|
Test VerificationqueueItem.deny
|
|
"""
|
|
|
|
fac = self.inst.get("fac")
|
|
vqi = models.VerificationQueueItem.get_for_entity(fac)
|
|
|
|
vqi.deny()
|
|
|
|
# after denial fac should no longer exist
|
|
with pytest.raises(models.Facility.DoesNotExist):
|
|
fac.refresh_from_db()
|
|
|
|
# after denial vqi should no longer exist
|
|
with pytest.raises(models.VerificationQueueItem.DoesNotExist):
|
|
vqi.refresh_from_db()
|
|
|
|
def test_unique(self):
|
|
"""
|
|
Test that only one verification queue item can exist for an entity
|
|
"""
|
|
|
|
fac = self.inst.get("fac")
|
|
vqi = models.VerificationQueueItem.get_for_entity(fac)
|
|
|
|
with pytest.raises(IntegrityError):
|
|
models.VerificationQueueItem.objects.create(
|
|
content_type=models.ContentType.objects.get_for_model(type(fac)),
|
|
object_id=fac.id,
|
|
)
|