arthexis 0.1.12__py3-none-any.whl → 0.1.14__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of arthexis might be problematic. Click here for more details.

Files changed (107) hide show
  1. {arthexis-0.1.12.dist-info → arthexis-0.1.14.dist-info}/METADATA +222 -221
  2. arthexis-0.1.14.dist-info/RECORD +109 -0
  3. {arthexis-0.1.12.dist-info → arthexis-0.1.14.dist-info}/licenses/LICENSE +674 -674
  4. config/__init__.py +5 -5
  5. config/active_app.py +15 -15
  6. config/asgi.py +43 -29
  7. config/auth_app.py +7 -7
  8. config/celery.py +32 -25
  9. config/context_processors.py +67 -69
  10. config/horologia_app.py +7 -7
  11. config/loadenv.py +11 -11
  12. config/logging.py +59 -48
  13. config/middleware.py +25 -25
  14. config/offline.py +49 -49
  15. config/settings.py +691 -716
  16. config/settings_helpers.py +109 -0
  17. config/urls.py +171 -166
  18. config/wsgi.py +17 -17
  19. core/admin.py +3771 -2772
  20. core/admin_history.py +50 -50
  21. core/admindocs.py +151 -151
  22. core/apps.py +356 -272
  23. core/auto_upgrade.py +57 -57
  24. core/backends.py +265 -236
  25. core/changelog.py +342 -0
  26. core/entity.py +133 -133
  27. core/environment.py +61 -61
  28. core/fields.py +168 -168
  29. core/form_fields.py +75 -0
  30. core/github_helper.py +188 -25
  31. core/github_issues.py +178 -172
  32. core/github_repos.py +72 -0
  33. core/lcd_screen.py +78 -78
  34. core/liveupdate.py +25 -25
  35. core/log_paths.py +100 -100
  36. core/mailer.py +85 -85
  37. core/middleware.py +91 -91
  38. core/models.py +3609 -2672
  39. core/notifications.py +105 -105
  40. core/public_wifi.py +267 -227
  41. core/reference_utils.py +108 -108
  42. core/release.py +721 -350
  43. core/rfid_import_export.py +113 -0
  44. core/sigil_builder.py +149 -149
  45. core/sigil_context.py +20 -20
  46. core/sigil_resolver.py +315 -315
  47. core/system.py +752 -493
  48. core/tasks.py +408 -394
  49. core/temp_passwords.py +181 -181
  50. core/test_system_info.py +186 -139
  51. core/tests.py +2095 -1511
  52. core/tests_liveupdate.py +17 -17
  53. core/urls.py +11 -11
  54. core/user_data.py +641 -633
  55. core/views.py +2175 -1382
  56. core/widgets.py +213 -51
  57. core/workgroup_urls.py +17 -17
  58. core/workgroup_views.py +94 -94
  59. nodes/admin.py +1720 -898
  60. nodes/apps.py +87 -70
  61. nodes/backends.py +160 -160
  62. nodes/dns.py +203 -203
  63. nodes/feature_checks.py +133 -133
  64. nodes/lcd.py +165 -165
  65. nodes/models.py +1737 -1416
  66. nodes/reports.py +411 -411
  67. nodes/rfid_sync.py +195 -0
  68. nodes/signals.py +18 -0
  69. nodes/tasks.py +46 -46
  70. nodes/tests.py +3810 -2497
  71. nodes/urls.py +15 -13
  72. nodes/utils.py +121 -105
  73. nodes/views.py +683 -451
  74. ocpp/admin.py +948 -804
  75. ocpp/apps.py +25 -25
  76. ocpp/consumers.py +1565 -1342
  77. ocpp/evcs.py +844 -931
  78. ocpp/evcs_discovery.py +158 -158
  79. ocpp/models.py +917 -915
  80. ocpp/reference_utils.py +42 -42
  81. ocpp/routing.py +11 -9
  82. ocpp/simulator.py +745 -724
  83. ocpp/status_display.py +26 -0
  84. ocpp/store.py +601 -541
  85. ocpp/tasks.py +31 -31
  86. ocpp/test_export_import.py +130 -130
  87. ocpp/test_rfid.py +913 -702
  88. ocpp/tests.py +4445 -3485
  89. ocpp/transactions_io.py +189 -179
  90. ocpp/urls.py +50 -50
  91. ocpp/views.py +1479 -1151
  92. pages/admin.py +708 -536
  93. pages/apps.py +10 -10
  94. pages/checks.py +40 -40
  95. pages/context_processors.py +127 -119
  96. pages/defaults.py +13 -13
  97. pages/forms.py +198 -169
  98. pages/middleware.py +205 -153
  99. pages/models.py +607 -426
  100. pages/tests.py +2612 -2083
  101. pages/urls.py +25 -25
  102. pages/utils.py +12 -12
  103. pages/views.py +1165 -1120
  104. arthexis-0.1.12.dist-info/RECORD +0 -102
  105. nodes/actions.py +0 -70
  106. {arthexis-0.1.12.dist-info → arthexis-0.1.14.dist-info}/WHEEL +0 -0
  107. {arthexis-0.1.12.dist-info → arthexis-0.1.14.dist-info}/top_level.txt +0 -0
core/tests.py CHANGED
@@ -1,1511 +1,2095 @@
1
- import os
2
-
3
- os.environ.setdefault("DJANGO_SETTINGS_MODULE", "config.settings")
4
- import django
5
-
6
- django.setup()
7
-
8
- from django.test import Client, TestCase, RequestFactory, override_settings
9
- from django.urls import reverse
10
- from django.http import HttpRequest
11
- import json
12
- from decimal import Decimal
13
- from unittest import mock
14
- from unittest.mock import patch
15
- from pathlib import Path
16
- import subprocess
17
- from glob import glob
18
- from datetime import datetime, timedelta, timezone as datetime_timezone
19
- import tempfile
20
- from urllib.parse import quote
21
-
22
- from django.utils import timezone
23
- from django.contrib.auth.models import Permission
24
- from django.contrib.messages import get_messages
25
- from .models import (
26
- User,
27
- UserPhoneNumber,
28
- EnergyAccount,
29
- ElectricVehicle,
30
- EnergyCredit,
31
- Product,
32
- Brand,
33
- EVModel,
34
- RFID,
35
- SecurityGroup,
36
- Package,
37
- PackageRelease,
38
- ReleaseManager,
39
- Todo,
40
- PublicWifiAccess,
41
- )
42
- from django.contrib.admin.sites import AdminSite
43
- from core.admin import (
44
- PackageReleaseAdmin,
45
- PackageAdmin,
46
- UserAdmin,
47
- USER_PROFILE_INLINES,
48
- )
49
- from ocpp.models import Transaction, Charger
50
-
51
- from django.core.exceptions import ValidationError
52
- from django.core.management import call_command
53
- from django.db import IntegrityError
54
- from .backends import LocalhostAdminBackend
55
- from core.views import _step_check_version, _step_promote_build, _step_publish
56
- from core import views as core_views
57
- from core import public_wifi
58
-
59
-
60
- class DefaultAdminTests(TestCase):
61
- def test_arthexis_is_default_user(self):
62
- self.assertTrue(User.objects.filter(username="arthexis").exists())
63
- self.assertFalse(User.all_objects.filter(username="admin").exists())
64
-
65
- def test_admin_created_and_local_only(self):
66
- backend = LocalhostAdminBackend()
67
- req = HttpRequest()
68
- req.META["REMOTE_ADDR"] = "127.0.0.1"
69
- user = backend.authenticate(req, username="admin", password="admin")
70
- self.assertIsNotNone(user)
71
- self.assertEqual(user.pk, 2)
72
-
73
- remote = HttpRequest()
74
- remote.META["REMOTE_ADDR"] = "10.0.0.1"
75
- self.assertIsNone(
76
- backend.authenticate(remote, username="admin", password="admin")
77
- )
78
-
79
- def test_admin_respects_forwarded_for(self):
80
- backend = LocalhostAdminBackend()
81
-
82
- req = HttpRequest()
83
- req.META["REMOTE_ADDR"] = "10.0.0.1"
84
- req.META["HTTP_X_FORWARDED_FOR"] = "127.0.0.1"
85
- self.assertIsNotNone(
86
- backend.authenticate(req, username="admin", password="admin"),
87
- "X-Forwarded-For should permit allowed IP",
88
- )
89
-
90
- blocked = HttpRequest()
91
- blocked.META["REMOTE_ADDR"] = "10.0.0.1"
92
- blocked.META["HTTP_X_FORWARDED_FOR"] = "8.8.8.8"
93
- self.assertIsNone(
94
- backend.authenticate(blocked, username="admin", password="admin")
95
- )
96
-
97
-
98
- class UserOperateAsTests(TestCase):
99
- @classmethod
100
- def setUpTestData(cls):
101
- cls.permission = Permission.objects.get(codename="view_todo")
102
-
103
- def test_staff_user_delegates_permissions(self):
104
- delegate = User.objects.create_user(username="delegate", password="secret")
105
- delegate.user_permissions.add(self.permission)
106
- operator = User.objects.create_user(
107
- username="operator", password="secret", is_staff=True
108
- )
109
- self.assertFalse(operator.has_perm("core.view_todo"))
110
- operator.operate_as = delegate
111
- operator.full_clean()
112
- operator.save()
113
- operator.refresh_from_db()
114
- self.assertTrue(operator.has_perm("core.view_todo"))
115
-
116
- def test_only_staff_may_operate_as(self):
117
- delegate = User.objects.create_user(username="delegate", password="secret")
118
- operator = User.objects.create_user(username="operator", password="secret")
119
- operator.operate_as = delegate
120
- with self.assertRaises(ValidationError):
121
- operator.full_clean()
122
-
123
- def test_non_superuser_cannot_operate_as_staff(self):
124
- staff_delegate = User.objects.create_user(
125
- username="delegate", password="secret", is_staff=True
126
- )
127
- operator = User.objects.create_user(
128
- username="operator", password="secret", is_staff=True
129
- )
130
- operator.operate_as = staff_delegate
131
- with self.assertRaises(ValidationError):
132
- operator.full_clean()
133
-
134
- def test_recursive_chain_and_cycle_detection(self):
135
- base = User.objects.create_user(username="base", password="secret")
136
- base.user_permissions.add(self.permission)
137
- middle = User.objects.create_user(
138
- username="middle", password="secret", is_staff=True
139
- )
140
- middle.operate_as = base
141
- middle.full_clean()
142
- middle.save()
143
- top = User.objects.create_superuser(
144
- username="top", email="top@example.com", password="secret"
145
- )
146
- top.operate_as = middle
147
- top.full_clean()
148
- top.save()
149
- top.refresh_from_db()
150
- self.assertTrue(top.has_perm("core.view_todo"))
151
-
152
- first = User.objects.create_superuser(
153
- username="first", email="first@example.com", password="secret"
154
- )
155
- second = User.objects.create_superuser(
156
- username="second", email="second@example.com", password="secret"
157
- )
158
- first.operate_as = second
159
- first.full_clean()
160
- first.save()
161
- second.operate_as = first
162
- second.full_clean()
163
- second.save()
164
- self.assertFalse(first._check_operate_as_chain(lambda user: False))
165
-
166
- def test_module_permissions_fall_back(self):
167
- delegate = User.objects.create_user(username="helper", password="secret")
168
- delegate.user_permissions.add(self.permission)
169
- operator = User.objects.create_user(
170
- username="mod", password="secret", is_staff=True
171
- )
172
- operator.operate_as = delegate
173
- operator.full_clean()
174
- operator.save()
175
- self.assertTrue(operator.has_module_perms("core"))
176
-
177
- def test_has_profile_via_delegate(self):
178
- delegate = User.objects.create_user(
179
- username="delegate", password="secret", is_staff=True
180
- )
181
- ReleaseManager.objects.create(user=delegate)
182
- operator = User.objects.create_superuser(
183
- username="operator",
184
- email="operator@example.com",
185
- password="secret",
186
- )
187
- operator.operate_as = delegate
188
- operator.full_clean()
189
- operator.save()
190
- profile = operator.get_profile(ReleaseManager)
191
- self.assertIsNotNone(profile)
192
- self.assertEqual(profile.user, delegate)
193
- self.assertTrue(operator.has_profile(ReleaseManager))
194
-
195
- def test_has_profile_via_group_membership(self):
196
- member = User.objects.create_user(username="member", password="secret")
197
- group = SecurityGroup.objects.create(name="Managers")
198
- group.user_set.add(member)
199
- profile = ReleaseManager.objects.create(group=group)
200
- self.assertEqual(member.get_profile(ReleaseManager), profile)
201
- self.assertTrue(member.has_profile(ReleaseManager))
202
-
203
- def test_release_manager_property_uses_delegate_profile(self):
204
- delegate = User.objects.create_user(
205
- username="delegate-property", password="secret", is_staff=True
206
- )
207
- profile = ReleaseManager.objects.create(user=delegate)
208
- operator = User.objects.create_superuser(
209
- username="operator-property",
210
- email="operator-property@example.com",
211
- password="secret",
212
- )
213
- operator.operate_as = delegate
214
- operator.full_clean()
215
- operator.save()
216
- self.assertEqual(operator.release_manager, profile)
217
-
218
-
219
- class UserPhoneNumberTests(TestCase):
220
- def test_get_phone_numbers_by_priority(self):
221
- user = User.objects.create_user(username="phone-user", password="secret")
222
- later = UserPhoneNumber.objects.create(
223
- user=user, number="+15555550101", priority=10
224
- )
225
- earlier = UserPhoneNumber.objects.create(
226
- user=user, number="+15555550100", priority=1
227
- )
228
- immediate = UserPhoneNumber.objects.create(
229
- user=user, number="+15555550099", priority=0
230
- )
231
-
232
- phones = user.get_phones_by_priority()
233
- self.assertEqual(phones, [immediate, earlier, later])
234
-
235
- def test_get_phone_numbers_by_priority_orders_by_id_when_equal(self):
236
- user = User.objects.create_user(username="phone-order", password="secret")
237
- first = UserPhoneNumber.objects.create(
238
- user=user, number="+19995550000", priority=0
239
- )
240
- second = UserPhoneNumber.objects.create(
241
- user=user, number="+19995550001", priority=0
242
- )
243
-
244
- phones = user.get_phones_by_priority()
245
- self.assertEqual(phones, [first, second])
246
-
247
- def test_get_phone_numbers_by_priority_alias(self):
248
- user = User.objects.create_user(username="phone-alias", password="secret")
249
- phone = UserPhoneNumber.objects.create(
250
- user=user, number="+14445550000", priority=3
251
- )
252
-
253
- self.assertEqual(user.get_phone_numbers_by_priority(), [phone])
254
-
255
-
256
- class ProfileValidationTests(TestCase):
257
- def test_system_user_cannot_receive_profiles(self):
258
- system_user = User.objects.get(username=User.SYSTEM_USERNAME)
259
- profile = ReleaseManager(user=system_user)
260
- with self.assertRaises(ValidationError) as exc:
261
- profile.full_clean()
262
- self.assertIn("user", exc.exception.error_dict)
263
-
264
-
265
- class UserAdminInlineTests(TestCase):
266
- def setUp(self):
267
- self.site = AdminSite()
268
- self.factory = RequestFactory()
269
- self.admin = UserAdmin(User, self.site)
270
- self.system_user = User.objects.get(username=User.SYSTEM_USERNAME)
271
- self.superuser = User.objects.create_superuser(
272
- username="inline-super",
273
- email="inline-super@example.com",
274
- password="secret",
275
- )
276
-
277
- def test_profile_inlines_hidden_for_system_user(self):
278
- request = self.factory.get("/")
279
- request.user = self.superuser
280
- system_inlines = self.admin.get_inline_instances(request, self.system_user)
281
- system_profiles = [
282
- inline
283
- for inline in system_inlines
284
- if inline.__class__ in USER_PROFILE_INLINES
285
- ]
286
- self.assertFalse(system_profiles)
287
-
288
- other_inlines = self.admin.get_inline_instances(request, self.superuser)
289
- other_profiles = [
290
- inline
291
- for inline in other_inlines
292
- if inline.__class__ in USER_PROFILE_INLINES
293
- ]
294
- self.assertEqual(len(other_profiles), len(USER_PROFILE_INLINES))
295
-
296
-
297
- class RFIDLoginTests(TestCase):
298
- def setUp(self):
299
- self.client = Client()
300
- self.user = User.objects.create_user(username="alice", password="secret")
301
- self.account = EnergyAccount.objects.create(user=self.user, name="ALICE")
302
- tag = RFID.objects.create(rfid="CARD123")
303
- self.account.rfids.add(tag)
304
-
305
- def test_rfid_login_success(self):
306
- response = self.client.post(
307
- reverse("rfid-login"),
308
- data={"rfid": "CARD123"},
309
- content_type="application/json",
310
- )
311
- self.assertEqual(response.status_code, 200)
312
- self.assertEqual(response.json()["username"], "alice")
313
-
314
- def test_rfid_login_invalid(self):
315
- response = self.client.post(
316
- reverse("rfid-login"),
317
- data={"rfid": "UNKNOWN"},
318
- content_type="application/json",
319
- )
320
- self.assertEqual(response.status_code, 401)
321
-
322
-
323
- class RFIDBatchApiTests(TestCase):
324
- def setUp(self):
325
- self.client = Client()
326
- self.user = User.objects.create_user(username="bob", password="secret")
327
- self.account = EnergyAccount.objects.create(user=self.user, name="BOB")
328
- self.client.force_login(self.user)
329
-
330
- def test_export_rfids(self):
331
- tag_black = RFID.objects.create(rfid="CARD999", custom_label="Main Tag")
332
- tag_white = RFID.objects.create(rfid="CARD998", color=RFID.WHITE)
333
- self.account.rfids.add(tag_black, tag_white)
334
- response = self.client.get(reverse("rfid-batch"))
335
- self.assertEqual(response.status_code, 200)
336
- self.assertEqual(
337
- response.json(),
338
- {
339
- "rfids": [
340
- {
341
- "rfid": "CARD999",
342
- "custom_label": "Main Tag",
343
- "energy_accounts": [self.account.id],
344
- "allowed": True,
345
- "color": "B",
346
- "released": False,
347
- }
348
- ]
349
- },
350
- )
351
-
352
- def test_export_rfids_color_filter(self):
353
- RFID.objects.create(rfid="CARD111", color=RFID.WHITE)
354
- response = self.client.get(reverse("rfid-batch"), {"color": "W"})
355
- self.assertEqual(
356
- response.json(),
357
- {
358
- "rfids": [
359
- {
360
- "rfid": "CARD111",
361
- "custom_label": "",
362
- "energy_accounts": [],
363
- "allowed": True,
364
- "color": "W",
365
- "released": False,
366
- }
367
- ]
368
- },
369
- )
370
-
371
- def test_export_rfids_released_filter(self):
372
- RFID.objects.create(rfid="CARD112", released=True)
373
- RFID.objects.create(rfid="CARD113", released=False)
374
- response = self.client.get(reverse("rfid-batch"), {"released": "true"})
375
- self.assertEqual(
376
- response.json(),
377
- {
378
- "rfids": [
379
- {
380
- "rfid": "CARD112",
381
- "custom_label": "",
382
- "energy_accounts": [],
383
- "allowed": True,
384
- "color": "B",
385
- "released": True,
386
- }
387
- ]
388
- },
389
- )
390
-
391
- def test_import_rfids(self):
392
- data = {
393
- "rfids": [
394
- {
395
- "rfid": "A1B2C3D4",
396
- "custom_label": "Imported Tag",
397
- "energy_accounts": [self.account.id],
398
- "allowed": True,
399
- "color": "W",
400
- "released": True,
401
- }
402
- ]
403
- }
404
- response = self.client.post(
405
- reverse("rfid-batch"),
406
- data=json.dumps(data),
407
- content_type="application/json",
408
- )
409
- self.assertEqual(response.status_code, 200)
410
- self.assertEqual(response.json()["imported"], 1)
411
- self.assertTrue(
412
- RFID.objects.filter(
413
- rfid="A1B2C3D4",
414
- custom_label="Imported Tag",
415
- energy_accounts=self.account,
416
- color=RFID.WHITE,
417
- released=True,
418
- ).exists()
419
- )
420
-
421
-
422
- class AllowedRFIDTests(TestCase):
423
- def setUp(self):
424
- self.user = User.objects.create_user(username="eve", password="secret")
425
- self.account = EnergyAccount.objects.create(user=self.user, name="EVE")
426
- self.rfid = RFID.objects.create(rfid="BAD123")
427
- self.account.rfids.add(self.rfid)
428
-
429
- def test_disallow_removes_and_blocks(self):
430
- self.rfid.allowed = False
431
- self.rfid.save()
432
- self.account.refresh_from_db()
433
- self.assertFalse(self.account.rfids.exists())
434
-
435
- with self.assertRaises(IntegrityError):
436
- RFID.objects.create(rfid="BAD123")
437
-
438
-
439
- class RFIDValidationTests(TestCase):
440
- def test_invalid_format_raises(self):
441
- tag = RFID(rfid="xyz")
442
- with self.assertRaises(ValidationError):
443
- tag.full_clean()
444
-
445
- def test_lowercase_saved_uppercase(self):
446
- tag = RFID.objects.create(rfid="deadbeef")
447
- self.assertEqual(tag.rfid, "DEADBEEF")
448
-
449
- def test_long_rfid_allowed(self):
450
- tag = RFID.objects.create(rfid="DEADBEEF10")
451
- self.assertEqual(tag.rfid, "DEADBEEF10")
452
-
453
- def test_find_user_by_rfid(self):
454
- user = User.objects.create_user(username="finder", password="pwd")
455
- acc = EnergyAccount.objects.create(user=user, name="FINDER")
456
- tag = RFID.objects.create(rfid="ABCD1234")
457
- acc.rfids.add(tag)
458
- found = RFID.get_account_by_rfid("abcd1234")
459
- self.assertEqual(found, acc)
460
-
461
- def test_custom_label_length(self):
462
- tag = RFID(rfid="FACE1234", custom_label="x" * 33)
463
- with self.assertRaises(ValidationError):
464
- tag.full_clean()
465
-
466
-
467
- class RFIDAssignmentTests(TestCase):
468
- def setUp(self):
469
- self.user1 = User.objects.create_user(username="user1", password="x")
470
- self.user2 = User.objects.create_user(username="user2", password="x")
471
- self.acc1 = EnergyAccount.objects.create(user=self.user1, name="USER1")
472
- self.acc2 = EnergyAccount.objects.create(user=self.user2, name="USER2")
473
- self.tag = RFID.objects.create(rfid="ABCDEF12")
474
-
475
- def test_rfid_can_only_attach_to_one_account(self):
476
- self.acc1.rfids.add(self.tag)
477
- with self.assertRaises(ValidationError):
478
- self.acc2.rfids.add(self.tag)
479
-
480
-
481
- class EnergyAccountTests(TestCase):
482
- def test_balance_calculation(self):
483
- user = User.objects.create_user(username="balance", password="x")
484
- acc = EnergyAccount.objects.create(user=user, name="BALANCE")
485
- EnergyCredit.objects.create(account=acc, amount_kw=50)
486
- charger = Charger.objects.create(charger_id="T1")
487
- Transaction.objects.create(
488
- charger=charger,
489
- account=acc,
490
- meter_start=0,
491
- meter_stop=20,
492
- start_time=timezone.now(),
493
- stop_time=timezone.now(),
494
- )
495
- self.assertEqual(acc.total_kw_spent, 20)
496
- self.assertEqual(acc.balance_kw, 30)
497
-
498
- def test_authorization_requires_positive_balance(self):
499
- user = User.objects.create_user(username="auth", password="x")
500
- acc = EnergyAccount.objects.create(user=user, name="AUTH")
501
- self.assertFalse(acc.can_authorize())
502
-
503
- EnergyCredit.objects.create(account=acc, amount_kw=5)
504
- self.assertTrue(acc.can_authorize())
505
-
506
- def test_service_account_ignores_balance(self):
507
- user = User.objects.create_user(username="service", password="x")
508
- acc = EnergyAccount.objects.create(
509
- user=user, service_account=True, name="SERVICE"
510
- )
511
- self.assertTrue(acc.can_authorize())
512
-
513
- def test_account_without_user(self):
514
- acc = EnergyAccount.objects.create(name="NOUSER")
515
- tag = RFID.objects.create(rfid="NOUSER1")
516
- acc.rfids.add(tag)
517
- self.assertIsNone(acc.user)
518
- self.assertTrue(acc.rfids.filter(rfid="NOUSER1").exists())
519
-
520
-
521
- class ElectricVehicleTests(TestCase):
522
- def test_account_can_have_multiple_vehicles(self):
523
- user = User.objects.create_user(username="cars", password="x")
524
- acc = EnergyAccount.objects.create(user=user, name="CARS")
525
- tesla = Brand.objects.create(name="Tesla")
526
- nissan = Brand.objects.create(name="Nissan")
527
- model_s = EVModel.objects.create(brand=tesla, name="Model S")
528
- leaf = EVModel.objects.create(brand=nissan, name="Leaf")
529
- ElectricVehicle.objects.create(
530
- account=acc, brand=tesla, model=model_s, vin="VIN12345678901234"
531
- )
532
- ElectricVehicle.objects.create(
533
- account=acc, brand=nissan, model=leaf, vin="VIN23456789012345"
534
- )
535
- self.assertEqual(acc.vehicles.count(), 2)
536
-
537
-
538
- class AddressTests(TestCase):
539
- def test_invalid_municipality_state(self):
540
- addr = Address(
541
- street="Main",
542
- number="1",
543
- municipality="Monterrey",
544
- state=Address.State.COAHUILA,
545
- postal_code="00000",
546
- )
547
- with self.assertRaises(ValidationError):
548
- addr.full_clean()
549
-
550
- def test_user_link(self):
551
- addr = Address.objects.create(
552
- street="Main",
553
- number="2",
554
- municipality="Monterrey",
555
- state=Address.State.NUEVO_LEON,
556
- postal_code="64000",
557
- )
558
- user = User.objects.create_user(username="addr", password="pwd", address=addr)
559
- self.assertEqual(user.address, addr)
560
-
561
-
562
- class PublicWifiUtilitiesTests(TestCase):
563
- def setUp(self):
564
- self.user = User.objects.create_user(username="wifi", password="pwd")
565
-
566
- def test_grant_public_access_records_allowlist(self):
567
- with tempfile.TemporaryDirectory() as tmp:
568
- base = Path(tmp)
569
- allow_file = base / "locks" / "public_wifi_allow.list"
570
- with override_settings(BASE_DIR=base):
571
- with patch("core.public_wifi._iptables_available", return_value=False):
572
- public_wifi.grant_public_access(self.user, "AA:BB:CC:DD:EE:FF")
573
- self.assertTrue(allow_file.exists())
574
- content = allow_file.read_text()
575
- self.assertIn("aa:bb:cc:dd:ee:ff", content)
576
- self.assertTrue(
577
- PublicWifiAccess.objects.filter(
578
- user=self.user, mac_address="aa:bb:cc:dd:ee:ff"
579
- ).exists()
580
- )
581
-
582
- def test_revoke_public_access_for_user_updates_allowlist(self):
583
- with tempfile.TemporaryDirectory() as tmp:
584
- base = Path(tmp)
585
- allow_file = base / "locks" / "public_wifi_allow.list"
586
- with override_settings(BASE_DIR=base):
587
- with patch("core.public_wifi._iptables_available", return_value=False):
588
- access = public_wifi.grant_public_access(
589
- self.user, "AA:BB:CC:DD:EE:FF"
590
- )
591
- public_wifi.revoke_public_access_for_user(self.user)
592
- access.refresh_from_db()
593
- self.assertIsNotNone(access.revoked_on)
594
- if allow_file.exists():
595
- self.assertNotIn("aa:bb:cc:dd:ee:ff", allow_file.read_text())
596
-
597
-
598
- class LiveSubscriptionTests(TestCase):
599
- def setUp(self):
600
- self.client = Client()
601
- self.user = User.objects.create_user(username="bob", password="pwd")
602
- self.account = EnergyAccount.objects.create(user=self.user, name="SUBSCRIBER")
603
- self.product = Product.objects.create(name="Gold", renewal_period=30)
604
- self.client.force_login(self.user)
605
-
606
- def test_create_and_list_live_subscription(self):
607
- response = self.client.post(
608
- reverse("add-live-subscription"),
609
- data={"account_id": self.account.id, "product_id": self.product.id},
610
- content_type="application/json",
611
- )
612
- self.assertEqual(response.status_code, 200)
613
- self.account.refresh_from_db()
614
- self.assertEqual(
615
- self.account.live_subscription_product,
616
- self.product,
617
- )
618
- self.assertIsNotNone(self.account.live_subscription_start_date)
619
- self.assertEqual(
620
- self.account.live_subscription_start_date,
621
- timezone.localdate(),
622
- )
623
- self.assertEqual(
624
- self.account.live_subscription_next_renewal,
625
- self.account.live_subscription_start_date
626
- + timedelta(days=self.product.renewal_period),
627
- )
628
-
629
- list_resp = self.client.get(
630
- reverse("live-subscription-list"), {"account_id": self.account.id}
631
- )
632
- self.assertEqual(list_resp.status_code, 200)
633
- data = list_resp.json()
634
- self.assertEqual(len(data["live_subscriptions"]), 1)
635
- self.assertEqual(data["live_subscriptions"][0]["product__name"], "Gold")
636
- self.assertEqual(data["live_subscriptions"][0]["id"], self.account.id)
637
- self.assertEqual(
638
- data["live_subscriptions"][0]["next_renewal"],
639
- str(self.account.live_subscription_next_renewal),
640
- )
641
-
642
- def test_product_list(self):
643
- response = self.client.get(reverse("product-list"))
644
- self.assertEqual(response.status_code, 200)
645
- data = response.json()
646
- self.assertEqual(len(data["products"]), 1)
647
- self.assertEqual(data["products"][0]["name"], "Gold")
648
-
649
-
650
- class OnboardingWizardTests(TestCase):
651
- def setUp(self):
652
- self.client = Client()
653
- User.objects.create_superuser("super", "super@example.com", "pwd")
654
- self.client.force_login(User.objects.get(username="super"))
655
-
656
- def test_onboarding_flow_creates_account(self):
657
- details_url = reverse("admin:core_energyaccount_onboard_details")
658
- response = self.client.get(details_url)
659
- self.assertEqual(response.status_code, 200)
660
- data = {
661
- "first_name": "John",
662
- "last_name": "Doe",
663
- "rfid": "ABCD1234",
664
- "vehicle_id": "VIN12345678901234",
665
- }
666
- resp = self.client.post(details_url, data)
667
- self.assertEqual(resp.status_code, 302)
668
- self.assertEqual(resp.url, reverse("admin:core_energyaccount_changelist"))
669
- user = User.objects.get(first_name="John", last_name="Doe")
670
- self.assertFalse(user.is_active)
671
- account = EnergyAccount.objects.get(user=user)
672
- self.assertTrue(account.rfids.filter(rfid="ABCD1234").exists())
673
- self.assertTrue(account.vehicles.filter(vin="VIN12345678901234").exists())
674
-
675
-
676
- class EVBrandFixtureTests(TestCase):
677
- def test_ev_brand_fixture_loads(self):
678
- call_command(
679
- "loaddata",
680
- *sorted(glob("core/fixtures/ev_brands__*.json")),
681
- *sorted(glob("core/fixtures/ev_models__*.json")),
682
- verbosity=0,
683
- )
684
- porsche = Brand.objects.get(name="Porsche")
685
- audi = Brand.objects.get(name="Audi")
686
- self.assertTrue(
687
- {"WP0", "WP1"} <= set(porsche.wmi_codes.values_list("code", flat=True))
688
- )
689
- self.assertTrue(
690
- set(audi.wmi_codes.values_list("code", flat=True)) >= {"WAU", "TRU"}
691
- )
692
- self.assertTrue(EVModel.objects.filter(brand=porsche, name="Taycan").exists())
693
- self.assertTrue(EVModel.objects.filter(brand=audi, name="e-tron GT").exists())
694
- self.assertTrue(EVModel.objects.filter(brand=porsche, name="Macan").exists())
695
- model3 = EVModel.objects.get(brand__name="Tesla", name="Model 3 RWD")
696
- self.assertEqual(model3.est_battery_kwh, Decimal("57.50"))
697
-
698
- def test_brand_from_vin(self):
699
- call_command(
700
- "loaddata",
701
- *sorted(glob("core/fixtures/ev_brands__*.json")),
702
- verbosity=0,
703
- )
704
- self.assertEqual(Brand.from_vin("WP0ZZZ12345678901").name, "Porsche")
705
- self.assertEqual(Brand.from_vin("WAUZZZ12345678901").name, "Audi")
706
- self.assertIsNone(Brand.from_vin("XYZ12345678901234"))
707
-
708
-
709
- class RFIDFixtureTests(TestCase):
710
- def test_fixture_assigns_gelectriic_rfid(self):
711
- call_command(
712
- "loaddata",
713
- "core/fixtures/users__arthexis.json",
714
- "core/fixtures/energy_accounts__gelectriic.json",
715
- "core/fixtures/rfids__ffffffff.json",
716
- verbosity=0,
717
- )
718
- account = EnergyAccount.objects.get(name="GELECTRIIC")
719
- tag = RFID.objects.get(rfid="FFFFFFFF")
720
- self.assertIn(account, tag.energy_accounts.all())
721
- self.assertEqual(tag.energy_accounts.count(), 1)
722
-
723
-
724
- class RFIDKeyVerificationFlagTests(TestCase):
725
- def test_flags_reset_on_key_change(self):
726
- tag = RFID.objects.create(
727
- rfid="ABC12345", key_a_verified=True, key_b_verified=True
728
- )
729
- tag.key_a = "A1A1A1A1A1A1"
730
- tag.save()
731
- self.assertFalse(tag.key_a_verified)
732
- tag.key_b = "B1B1B1B1B1B1"
733
- tag.save()
734
- self.assertFalse(tag.key_b_verified)
735
-
736
-
737
- class SecurityGroupTests(TestCase):
738
- def test_parent_and_user_assignment(self):
739
- parent = SecurityGroup.objects.create(name="Parents")
740
- child = SecurityGroup.objects.create(name="Children", parent=parent)
741
- user = User.objects.create_user(username="sg_user", password="secret")
742
- child.user_set.add(user)
743
- self.assertEqual(child.parent, parent)
744
- self.assertIn(user, child.user_set.all())
745
-
746
-
747
- class ReleaseProcessTests(TestCase):
748
- def setUp(self):
749
- self.package = Package.objects.create(name="pkg")
750
- self.release = PackageRelease.objects.create(
751
- package=self.package, version="1.0.0"
752
- )
753
-
754
- @mock.patch("core.views.release_utils._git_clean", return_value=False)
755
- def test_step_check_requires_clean_repo(self, git_clean):
756
- with self.assertRaises(Exception):
757
- _step_check_version(self.release, {}, Path("rel.log"))
758
-
759
- @mock.patch("core.views.release_utils._git_clean", return_value=True)
760
- @mock.patch("core.views.release_utils.network_available", return_value=False)
761
- def test_step_check_keeps_repo_clean(self, network_available, git_clean):
762
- version_path = Path("VERSION")
763
- original = version_path.read_text(encoding="utf-8")
764
- _step_check_version(self.release, {}, Path("rel.log"))
765
- proc = subprocess.run(
766
- ["git", "status", "--porcelain", str(version_path)],
767
- capture_output=True,
768
- text=True,
769
- )
770
- self.assertFalse(proc.stdout.strip())
771
- self.assertEqual(version_path.read_text(encoding="utf-8"), original)
772
-
773
- @mock.patch("core.views.requests.get")
774
- @mock.patch("core.views.release_utils.network_available", return_value=True)
775
- @mock.patch("core.views.release_utils._git_clean", return_value=True)
776
- def test_step_check_ignores_yanked_release(
777
- self, git_clean, network_available, requests_get
778
- ):
779
- response = mock.Mock()
780
- response.ok = True
781
- response.json.return_value = {
782
- "releases": {
783
- "0.1.12": [
784
- {"filename": "pkg.whl", "yanked": True},
785
- {"filename": "pkg.tar.gz", "yanked": True},
786
- ]
787
- }
788
- }
789
- requests_get.return_value = response
790
- self.release.version = "0.1.12"
791
- _step_check_version(self.release, {}, Path("rel.log"))
792
- requests_get.assert_called_once()
793
-
794
- @mock.patch("core.views.requests.get")
795
- @mock.patch("core.views.release_utils.network_available", return_value=True)
796
- @mock.patch("core.views.release_utils._git_clean", return_value=True)
797
- def test_step_check_blocks_available_release(
798
- self, git_clean, network_available, requests_get
799
- ):
800
- response = mock.Mock()
801
- response.ok = True
802
- response.json.return_value = {
803
- "releases": {
804
- "0.1.12": [
805
- {"filename": "pkg.whl", "yanked": False},
806
- {"filename": "pkg.tar.gz"},
807
- ]
808
- }
809
- }
810
- requests_get.return_value = response
811
- self.release.version = "0.1.12"
812
- with self.assertRaises(Exception) as exc:
813
- _step_check_version(self.release, {}, Path("rel.log"))
814
- self.assertIn("already on PyPI", str(exc.exception))
815
- requests_get.assert_called_once()
816
-
817
- @mock.patch("core.models.PackageRelease.dump_fixture")
818
- def test_save_does_not_dump_fixture(self, dump):
819
- self.release.pypi_url = "https://example.com"
820
- self.release.save()
821
- dump.assert_not_called()
822
-
823
- @mock.patch("core.views.subprocess.run")
824
- @mock.patch("core.views.PackageRelease.dump_fixture")
825
- @mock.patch("core.views.release_utils.promote", side_effect=Exception("boom"))
826
- def test_promote_cleans_repo_on_failure(self, promote, dump_fixture, run):
827
- with self.assertRaises(Exception):
828
- _step_promote_build(self.release, {}, Path("rel.log"))
829
- dump_fixture.assert_not_called()
830
- run.assert_any_call(["git", "reset", "--hard"], check=False)
831
- run.assert_any_call(["git", "clean", "-fd"], check=False)
832
-
833
- @mock.patch("core.views.subprocess.run")
834
- @mock.patch("core.views.PackageRelease.dump_fixture")
835
- @mock.patch("core.views.release_utils.promote")
836
- def test_promote_rebases_and_pushes_main(self, promote, dump_fixture, run):
837
- import subprocess as sp
838
-
839
- def fake_run(cmd, check=True, capture_output=False, text=False):
840
- if capture_output:
841
- return sp.CompletedProcess(cmd, 0, stdout="", stderr="")
842
- return sp.CompletedProcess(cmd, 0)
843
-
844
- run.side_effect = fake_run
845
- _step_promote_build(self.release, {}, Path("rel.log"))
846
- run.assert_any_call(["git", "fetch", "origin", "main"], check=True)
847
- run.assert_any_call(["git", "rebase", "origin/main"], check=True)
848
- run.assert_any_call(["git", "push"], check=True)
849
-
850
- @mock.patch("core.views.subprocess.run")
851
- @mock.patch("core.views.PackageRelease.dump_fixture")
852
- def test_promote_advances_version(self, dump_fixture, run):
853
- import subprocess as sp
854
-
855
- def fake_run(cmd, check=True, capture_output=False, text=False):
856
- if capture_output:
857
- return sp.CompletedProcess(cmd, 0, stdout="", stderr="")
858
- return sp.CompletedProcess(cmd, 0)
859
-
860
- run.side_effect = fake_run
861
-
862
- version_path = Path("VERSION")
863
- original = version_path.read_text(encoding="utf-8")
864
- version_path.write_text("0.0.1\n", encoding="utf-8")
865
-
866
- def fake_promote(*args, **kwargs):
867
- version_path.write_text(self.release.version + "\n", encoding="utf-8")
868
-
869
- with mock.patch("core.views.release_utils.promote", side_effect=fake_promote):
870
- _step_promote_build(self.release, {}, Path("rel.log"))
871
-
872
- self.assertEqual(
873
- version_path.read_text(encoding="utf-8"),
874
- self.release.version + "\n",
875
- )
876
- version_path.write_text(original, encoding="utf-8")
877
-
878
- @mock.patch("core.views.timezone.now")
879
- @mock.patch("core.views.PackageRelease.dump_fixture")
880
- @mock.patch("core.views.release_utils.publish")
881
- def test_publish_sets_pypi_url(self, publish, dump_fixture, now):
882
- now.return_value = datetime(2025, 3, 4, 5, 6, tzinfo=datetime_timezone.utc)
883
- _step_publish(self.release, {}, Path("rel.log"))
884
- self.release.refresh_from_db()
885
- self.assertEqual(
886
- self.release.pypi_url,
887
- f"https://pypi.org/project/{self.package.name}/{self.release.version}/",
888
- )
889
- self.assertEqual(
890
- self.release.release_on,
891
- datetime(2025, 3, 4, 5, 6, tzinfo=datetime_timezone.utc),
892
- )
893
- dump_fixture.assert_called_once()
894
-
895
- @mock.patch("core.views.PackageRelease.dump_fixture")
896
- @mock.patch("core.views.release_utils.publish", side_effect=Exception("boom"))
897
- def test_publish_failure_keeps_url_blank(self, publish, dump_fixture):
898
- with self.assertRaises(Exception):
899
- _step_publish(self.release, {}, Path("rel.log"))
900
- self.release.refresh_from_db()
901
- self.assertEqual(self.release.pypi_url, "")
902
- self.assertIsNone(self.release.release_on)
903
- dump_fixture.assert_not_called()
904
-
905
- def test_new_todo_does_not_reset_pending_flow(self):
906
- user = User.objects.create_superuser("admin", "admin@example.com", "pw")
907
- url = reverse("release-progress", args=[self.release.pk, "publish"])
908
- Todo.objects.create(request="Initial checklist item")
909
- steps = [("Confirm release TODO completion", core_views._step_check_todos)]
910
- with mock.patch("core.views.PUBLISH_STEPS", steps):
911
- self.client.force_login(user)
912
- response = self.client.get(url)
913
- self.assertTrue(response.context["has_pending_todos"])
914
- self.client.get(f"{url}?ack_todos=1")
915
- self.client.get(f"{url}?start=1")
916
- self.client.get(f"{url}?step=0")
917
- Todo.objects.create(request="Follow-up checklist item")
918
- response = self.client.get(url)
919
- self.assertEqual(
920
- Todo.objects.filter(is_deleted=False, done_on__isnull=True).count(),
921
- 1,
922
- )
923
- self.assertIsNone(response.context["todos"])
924
- self.assertFalse(response.context["has_pending_todos"])
925
- session = self.client.session
926
- ctx = session.get(f"release_publish_{self.release.pk}")
927
- self.assertTrue(ctx.get("todos_ack"))
928
-
929
- def test_release_progress_uses_lockfile(self):
930
- run = []
931
-
932
- def step1(release, ctx, log_path):
933
- run.append("step1")
934
-
935
- def step2(release, ctx, log_path):
936
- run.append("step2")
937
-
938
- steps = [("One", step1), ("Two", step2)]
939
- user = User.objects.create_superuser("admin", "admin@example.com", "pw")
940
- url = reverse("release-progress", args=[self.release.pk, "publish"])
941
- with mock.patch("core.views.PUBLISH_STEPS", steps):
942
- self.client.force_login(user)
943
- self.client.get(f"{url}?step=0")
944
- self.assertEqual(run, ["step1"])
945
- client2 = Client()
946
- client2.force_login(user)
947
- client2.get(f"{url}?step=1")
948
- self.assertEqual(run, ["step1", "step2"])
949
- lock_file = Path("locks") / f"release_publish_{self.release.pk}.json"
950
- self.assertFalse(lock_file.exists())
951
-
952
- def test_release_progress_restart(self):
953
- run = []
954
-
955
- def step_fail(release, ctx, log_path):
956
- run.append("step")
957
- raise Exception("boom")
958
-
959
- steps = [("Fail", step_fail)]
960
- user = User.objects.create_superuser("admin", "admin@example.com", "pw")
961
- url = reverse("release-progress", args=[self.release.pk, "publish"])
962
- count_file = Path("locks") / f"release_publish_{self.release.pk}.restarts"
963
- if count_file.exists():
964
- count_file.unlink()
965
- with mock.patch("core.views.PUBLISH_STEPS", steps):
966
- self.client.force_login(user)
967
- self.assertFalse(count_file.exists())
968
- self.client.get(f"{url}?step=0")
969
- self.client.get(f"{url}?step=0")
970
- self.assertEqual(run, ["step"])
971
- self.assertFalse(count_file.exists())
972
- self.client.get(f"{url}?restart=1")
973
- self.assertTrue(count_file.exists())
974
- self.assertEqual(count_file.read_text(), "1")
975
- self.client.get(f"{url}?step=0")
976
- self.assertEqual(run, ["step", "step"])
977
- self.client.get(f"{url}?restart=1")
978
- # Restart counter resets after running a step
979
- self.assertEqual(count_file.read_text(), "1")
980
-
981
-
982
- class ReleaseProgressSyncTests(TestCase):
983
- def setUp(self):
984
- self.client = Client()
985
- self.user = User.objects.create_superuser("admin", "admin@example.com", "pw")
986
- self.client.force_login(self.user)
987
- self.package = Package.objects.get(name="arthexis")
988
- self.version_path = Path("VERSION")
989
- self.original_version = self.version_path.read_text(encoding="utf-8")
990
- self.version_path.write_text("1.2.3", encoding="utf-8")
991
-
992
- def tearDown(self):
993
- self.version_path.write_text(self.original_version, encoding="utf-8")
994
-
995
- @mock.patch("core.views.PackageRelease.dump_fixture")
996
- @mock.patch("core.views.revision.get_revision", return_value="abc123")
997
- def test_unpublished_release_syncs_version_and_revision(
998
- self, get_revision, dump_fixture
999
- ):
1000
- release = PackageRelease.objects.create(
1001
- package=self.package,
1002
- version="1.0.0",
1003
- )
1004
- release.revision = "oldrev"
1005
- release.save(update_fields=["revision"])
1006
-
1007
- url = reverse("release-progress", args=[release.pk, "publish"])
1008
- response = self.client.get(url)
1009
-
1010
- self.assertEqual(response.status_code, 200)
1011
- release.refresh_from_db()
1012
- self.assertEqual(release.version, "1.2.4")
1013
- self.assertEqual(release.revision, "abc123")
1014
- dump_fixture.assert_called_once()
1015
-
1016
- def test_published_release_not_current_returns_404(self):
1017
- release = PackageRelease.objects.create(
1018
- package=self.package,
1019
- version="1.2.4",
1020
- pypi_url="https://example.com",
1021
- )
1022
-
1023
- url = reverse("release-progress", args=[release.pk, "publish"])
1024
- response = self.client.get(url)
1025
-
1026
- self.assertEqual(response.status_code, 404)
1027
-
1028
-
1029
- class ReleaseProgressFixtureVisibilityTests(TestCase):
1030
- def setUp(self):
1031
- self.client = Client()
1032
- self.user = User.objects.create_superuser(
1033
- "fixture-check", "fixture@example.com", "pw"
1034
- )
1035
- self.client.force_login(self.user)
1036
- current_version = Path("VERSION").read_text(encoding="utf-8").strip()
1037
- package = Package.objects.filter(is_active=True).first()
1038
- if package is None:
1039
- package = Package.objects.create(name="fixturepkg", is_active=True)
1040
- try:
1041
- self.release = PackageRelease.objects.get(
1042
- package=package, version=current_version
1043
- )
1044
- except PackageRelease.DoesNotExist:
1045
- self.release = PackageRelease.objects.create(
1046
- package=package, version=current_version
1047
- )
1048
- self.session_key = f"release_publish_{self.release.pk}"
1049
- self.log_name = f"{self.release.package.name}-{self.release.version}.log"
1050
- self.lock_path = Path("locks") / f"{self.session_key}.json"
1051
- self.restart_path = Path("locks") / f"{self.session_key}.restarts"
1052
- self.log_path = Path("logs") / self.log_name
1053
- for path in (self.lock_path, self.restart_path, self.log_path):
1054
- if path.exists():
1055
- path.unlink()
1056
- try:
1057
- self.fixture_step_index = next(
1058
- idx
1059
- for idx, (name, _) in enumerate(core_views.PUBLISH_STEPS)
1060
- if name == core_views.FIXTURE_REVIEW_STEP_NAME
1061
- )
1062
- except StopIteration: # pragma: no cover - defensive guard
1063
- self.fail("Fixture review step not configured in publish steps")
1064
- self.url = reverse("release-progress", args=[self.release.pk, "publish"])
1065
-
1066
- def tearDown(self):
1067
- session = self.client.session
1068
- if self.session_key in session:
1069
- session.pop(self.session_key)
1070
- session.save()
1071
- for path in (self.lock_path, self.restart_path, self.log_path):
1072
- if path.exists():
1073
- path.unlink()
1074
- super().tearDown()
1075
-
1076
- def _set_session(self, step: int, fixtures: list[dict]):
1077
- session = self.client.session
1078
- session[self.session_key] = {
1079
- "step": step,
1080
- "fixtures": fixtures,
1081
- "log": self.log_name,
1082
- "started": True,
1083
- }
1084
- session.save()
1085
-
1086
- def test_fixture_summary_visible_until_migration_step(self):
1087
- fixtures = [
1088
- {
1089
- "path": "core/fixtures/example.json",
1090
- "count": 2,
1091
- "models": ["core.Model"],
1092
- }
1093
- ]
1094
- self._set_session(self.fixture_step_index, fixtures)
1095
- response = self.client.get(self.url)
1096
- self.assertEqual(response.status_code, 200)
1097
- self.assertEqual(response.context["fixtures"], fixtures)
1098
- self.assertContains(response, "Fixture changes")
1099
-
1100
- def test_fixture_summary_hidden_after_migration_step(self):
1101
- fixtures = [
1102
- {
1103
- "path": "core/fixtures/example.json",
1104
- "count": 2,
1105
- "models": ["core.Model"],
1106
- }
1107
- ]
1108
- self._set_session(self.fixture_step_index + 1, fixtures)
1109
- response = self.client.get(self.url)
1110
- self.assertEqual(response.status_code, 200)
1111
- self.assertIsNone(response.context["fixtures"])
1112
- self.assertNotContains(response, "Fixture changes")
1113
-
1114
-
1115
- class PackageReleaseAdminActionTests(TestCase):
1116
- def setUp(self):
1117
- self.factory = RequestFactory()
1118
- self.site = AdminSite()
1119
- self.admin = PackageReleaseAdmin(PackageRelease, self.site)
1120
- self.admin.message_user = lambda *args, **kwargs: None
1121
- self.package = Package.objects.create(name="pkg")
1122
- self.package.is_active = True
1123
- self.package.save(update_fields=["is_active"])
1124
- self.release = PackageRelease.objects.create(
1125
- package=self.package,
1126
- version="1.0.0",
1127
- pypi_url="https://pypi.org/project/pkg/1.0.0/",
1128
- )
1129
- self.request = self.factory.get("/")
1130
-
1131
- @mock.patch("core.admin.PackageRelease.dump_fixture")
1132
- @mock.patch("core.admin.requests.get")
1133
- def test_validate_deletes_missing_release(self, mock_get, dump):
1134
- mock_get.return_value.status_code = 404
1135
- self.admin.validate_releases(self.request, PackageRelease.objects.all())
1136
- self.assertEqual(PackageRelease.objects.count(), 0)
1137
- dump.assert_called_once()
1138
-
1139
- @mock.patch("core.admin.PackageRelease.dump_fixture")
1140
- @mock.patch("core.admin.requests.get")
1141
- def test_validate_keeps_existing_release(self, mock_get, dump):
1142
- mock_get.return_value.status_code = 200
1143
- self.admin.validate_releases(self.request, PackageRelease.objects.all())
1144
- self.assertEqual(PackageRelease.objects.count(), 1)
1145
- dump.assert_not_called()
1146
-
1147
- @mock.patch("core.admin.PackageRelease.dump_fixture")
1148
- @mock.patch("core.admin.requests.get")
1149
- def test_refresh_from_pypi_creates_releases(self, mock_get, dump):
1150
- mock_get.return_value.raise_for_status.return_value = None
1151
- mock_get.return_value.json.return_value = {
1152
- "releases": {
1153
- "1.0.0": [
1154
- {"upload_time_iso_8601": "2024-01-01T12:30:00.000000Z"}
1155
- ],
1156
- "1.1.0": [
1157
- {"upload_time_iso_8601": "2024-02-02T15:45:00.000000Z"}
1158
- ],
1159
- }
1160
- }
1161
- self.admin.refresh_from_pypi(self.request, PackageRelease.objects.none())
1162
- new_release = PackageRelease.objects.get(version="1.1.0")
1163
- self.assertEqual(new_release.revision, "")
1164
- self.assertEqual(
1165
- new_release.release_on,
1166
- datetime(2024, 2, 2, 15, 45, tzinfo=datetime_timezone.utc),
1167
- )
1168
- dump.assert_called_once()
1169
-
1170
- @mock.patch("core.admin.PackageRelease.dump_fixture")
1171
- @mock.patch("core.admin.requests.get")
1172
- def test_refresh_from_pypi_updates_release_date(self, mock_get, dump):
1173
- self.release.release_on = None
1174
- self.release.save(update_fields=["release_on"])
1175
- mock_get.return_value.raise_for_status.return_value = None
1176
- mock_get.return_value.json.return_value = {
1177
- "releases": {
1178
- "1.0.0": [
1179
- {"upload_time_iso_8601": "2024-01-01T12:30:00.000000Z"}
1180
- ]
1181
- }
1182
- }
1183
- self.admin.refresh_from_pypi(self.request, PackageRelease.objects.none())
1184
- self.release.refresh_from_db()
1185
- self.assertEqual(
1186
- self.release.release_on,
1187
- datetime(2024, 1, 1, 12, 30, tzinfo=datetime_timezone.utc),
1188
- )
1189
- dump.assert_called_once()
1190
-
1191
- @mock.patch("core.admin.PackageRelease.dump_fixture")
1192
- @mock.patch("core.admin.requests.get")
1193
- def test_refresh_from_pypi_restores_deleted_release(self, mock_get, dump):
1194
- self.release.is_deleted = True
1195
- self.release.save(update_fields=["is_deleted"])
1196
- mock_get.return_value.raise_for_status.return_value = None
1197
- mock_get.return_value.json.return_value = {
1198
- "releases": {
1199
- "1.0.0": [
1200
- {"upload_time_iso_8601": "2024-01-01T12:30:00.000000Z"}
1201
- ]
1202
- }
1203
- }
1204
-
1205
- self.admin.refresh_from_pypi(self.request, PackageRelease.objects.none())
1206
-
1207
- self.assertTrue(
1208
- PackageRelease.objects.filter(version="1.0.0").exists()
1209
- )
1210
- dump.assert_called_once()
1211
-
1212
-
1213
- class PackageActiveTests(TestCase):
1214
- def test_only_one_active_package(self):
1215
- default = Package.objects.get(name="arthexis")
1216
- self.assertTrue(default.is_active)
1217
- other = Package.objects.create(name="pkg", is_active=True)
1218
- default.refresh_from_db()
1219
- other.refresh_from_db()
1220
- self.assertFalse(default.is_active)
1221
- self.assertTrue(other.is_active)
1222
-
1223
-
1224
- class PackageReleaseCurrentTests(TestCase):
1225
- def setUp(self):
1226
- self.package = Package.objects.get(name="arthexis")
1227
- self.version_path = Path("VERSION")
1228
- self.original = self.version_path.read_text()
1229
- self.version_path.write_text("1.0.0")
1230
- self.release = PackageRelease.objects.create(
1231
- package=self.package, version="1.0.0"
1232
- )
1233
-
1234
- def tearDown(self):
1235
- self.version_path.write_text(self.original)
1236
-
1237
- def test_is_current_true_when_version_matches_and_package_active(self):
1238
- self.assertTrue(self.release.is_current)
1239
-
1240
- def test_is_current_false_when_package_inactive(self):
1241
- self.package.is_active = False
1242
- self.package.save()
1243
- self.assertFalse(self.release.is_current)
1244
-
1245
- def test_is_current_false_when_version_differs(self):
1246
- self.release.version = "2.0.0"
1247
- self.release.save()
1248
- self.assertFalse(self.release.is_current)
1249
-
1250
-
1251
- class PackageReleaseChangelistTests(TestCase):
1252
- def setUp(self):
1253
- self.client = Client()
1254
- User.objects.create_superuser("admin", "admin@example.com", "pw")
1255
- self.client.force_login(User.objects.get(username="admin"))
1256
-
1257
- def test_prepare_next_release_button_present(self):
1258
- response = self.client.get(reverse("admin:core_packagerelease_changelist"))
1259
- prepare_url = reverse(
1260
- "admin:core_packagerelease_actions", args=["prepare_next_release"]
1261
- )
1262
- self.assertContains(response, prepare_url, html=False)
1263
-
1264
- def test_refresh_from_pypi_button_present(self):
1265
- response = self.client.get(reverse("admin:core_packagerelease_changelist"))
1266
- refresh_url = reverse(
1267
- "admin:core_packagerelease_actions", args=["refresh_from_pypi"]
1268
- )
1269
- self.assertContains(response, refresh_url, html=False)
1270
-
1271
- def test_prepare_next_release_action_creates_release(self):
1272
- package = Package.objects.get(name="arthexis")
1273
- PackageRelease.all_objects.filter(package=package).delete()
1274
- response = self.client.post(
1275
- reverse(
1276
- "admin:core_packagerelease_actions", args=["prepare_next_release"]
1277
- )
1278
- )
1279
- self.assertEqual(response.status_code, 302)
1280
- self.assertTrue(
1281
- PackageRelease.all_objects.filter(package=package).exists()
1282
- )
1283
-
1284
-
1285
- class PackageAdminPrepareNextReleaseTests(TestCase):
1286
- def setUp(self):
1287
- self.factory = RequestFactory()
1288
- self.site = AdminSite()
1289
- self.admin = PackageAdmin(Package, self.site)
1290
- self.admin.message_user = lambda *args, **kwargs: None
1291
- self.package = Package.objects.get(name="arthexis")
1292
-
1293
- def test_prepare_next_release_active_creates_release(self):
1294
- PackageRelease.all_objects.filter(package=self.package).delete()
1295
- request = self.factory.get("/admin/core/package/prepare-next-release/")
1296
- response = self.admin.prepare_next_release_active(request)
1297
- self.assertEqual(response.status_code, 302)
1298
- self.assertEqual(
1299
- PackageRelease.all_objects.filter(package=self.package).count(), 1
1300
- )
1301
-
1302
-
1303
- class PackageAdminChangeViewTests(TestCase):
1304
- def setUp(self):
1305
- self.client = Client()
1306
- User.objects.create_superuser("admin", "admin@example.com", "pw")
1307
- self.client.force_login(User.objects.get(username="admin"))
1308
- self.package = Package.objects.get(name="arthexis")
1309
-
1310
- def test_prepare_next_release_button_visible_on_change_view(self):
1311
- response = self.client.get(
1312
- reverse("admin:core_package_change", args=[self.package.pk])
1313
- )
1314
- self.assertContains(response, "Prepare next Release")
1315
-
1316
-
1317
- class TodoDoneTests(TestCase):
1318
- def setUp(self):
1319
- self.client = Client()
1320
- User.objects.create_superuser("admin", "admin@example.com", "pw")
1321
- self.client.force_login(User.objects.get(username="admin"))
1322
-
1323
- def test_mark_done_sets_timestamp(self):
1324
- todo = Todo.objects.create(request="Task", is_seed_data=True)
1325
- resp = self.client.post(reverse("todo-done", args=[todo.pk]))
1326
- self.assertRedirects(resp, reverse("admin:index"))
1327
- todo.refresh_from_db()
1328
- self.assertIsNotNone(todo.done_on)
1329
- self.assertFalse(todo.is_deleted)
1330
-
1331
- def test_mark_done_condition_failure_shows_message(self):
1332
- todo = Todo.objects.create(
1333
- request="Task",
1334
- on_done_condition="1 = 0",
1335
- )
1336
- resp = self.client.post(reverse("todo-done", args=[todo.pk]))
1337
- self.assertRedirects(resp, reverse("admin:index"))
1338
- messages = [m.message for m in get_messages(resp.wsgi_request)]
1339
- self.assertTrue(messages)
1340
- self.assertIn("1 = 0", messages[0])
1341
- todo.refresh_from_db()
1342
- self.assertIsNone(todo.done_on)
1343
-
1344
- def test_mark_done_condition_invalid_expression(self):
1345
- todo = Todo.objects.create(
1346
- request="Task",
1347
- on_done_condition="1; SELECT 1",
1348
- )
1349
- resp = self.client.post(reverse("todo-done", args=[todo.pk]))
1350
- self.assertRedirects(resp, reverse("admin:index"))
1351
- messages = [m.message for m in get_messages(resp.wsgi_request)]
1352
- self.assertTrue(messages)
1353
- self.assertIn("Semicolons", messages[0])
1354
- todo.refresh_from_db()
1355
- self.assertIsNone(todo.done_on)
1356
-
1357
- def test_mark_done_condition_resolves_sigils(self):
1358
- todo = Todo.objects.create(
1359
- request="Task",
1360
- on_done_condition="[TEST]",
1361
- )
1362
- with mock.patch.object(Todo, "resolve_sigils", return_value="1 = 1") as resolver:
1363
- resp = self.client.post(reverse("todo-done", args=[todo.pk]))
1364
- self.assertRedirects(resp, reverse("admin:index"))
1365
- resolver.assert_called_once_with("on_done_condition")
1366
- todo.refresh_from_db()
1367
- self.assertIsNotNone(todo.done_on)
1368
-
1369
- def test_mark_done_respects_next_parameter(self):
1370
- todo = Todo.objects.create(request="Task")
1371
- next_url = reverse("admin:index") + "?section=todos"
1372
- resp = self.client.post(
1373
- reverse("todo-done", args=[todo.pk]),
1374
- {"next": next_url},
1375
- )
1376
- self.assertRedirects(resp, next_url, target_status_code=200)
1377
- todo.refresh_from_db()
1378
- self.assertIsNotNone(todo.done_on)
1379
-
1380
- def test_mark_done_rejects_external_next(self):
1381
- todo = Todo.objects.create(request="Task")
1382
- resp = self.client.post(
1383
- reverse("todo-done", args=[todo.pk]),
1384
- {"next": "https://example.com/"},
1385
- )
1386
- self.assertRedirects(resp, reverse("admin:index"))
1387
- todo.refresh_from_db()
1388
- self.assertIsNotNone(todo.done_on)
1389
-
1390
-
1391
- class TodoFocusViewTests(TestCase):
1392
- def setUp(self):
1393
- self.client = Client()
1394
- User.objects.create_superuser("admin", "admin@example.com", "pw")
1395
- self.client.force_login(User.objects.get(username="admin"))
1396
-
1397
- def test_focus_view_renders_requested_page(self):
1398
- todo = Todo.objects.create(request="Task", url="/docs/")
1399
- next_url = reverse("admin:index")
1400
- resp = self.client.get(
1401
- f"{reverse('todo-focus', args=[todo.pk])}?next={quote(next_url)}"
1402
- )
1403
- self.assertEqual(resp.status_code, 200)
1404
- self.assertContains(resp, todo.request)
1405
- self.assertEqual(resp["X-Frame-Options"], "SAMEORIGIN")
1406
- self.assertContains(resp, f'src="{todo.url}"')
1407
- self.assertContains(resp, "Done")
1408
- self.assertContains(resp, "Back")
1409
-
1410
- def test_focus_view_uses_admin_change_when_no_url(self):
1411
- todo = Todo.objects.create(request="Task")
1412
- resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
1413
- change_url = reverse("admin:core_todo_change", args=[todo.pk])
1414
- self.assertContains(resp, f'src="{change_url}"')
1415
-
1416
- def test_focus_view_includes_open_target_button(self):
1417
- todo = Todo.objects.create(request="Task", url="/docs/")
1418
- resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
1419
- self.assertContains(resp, 'class="todo-button todo-button-open"')
1420
- self.assertContains(resp, 'target="_blank"')
1421
- self.assertContains(resp, 'href="/docs/"')
1422
-
1423
- def test_focus_view_sanitizes_loopback_absolute_url(self):
1424
- todo = Todo.objects.create(
1425
- request="Task",
1426
- url="http://127.0.0.1:8000/docs/?section=chart",
1427
- )
1428
- resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
1429
- self.assertContains(resp, 'src="/docs/?section=chart"')
1430
-
1431
- def test_focus_view_rejects_external_absolute_url(self):
1432
- todo = Todo.objects.create(
1433
- request="Task",
1434
- url="https://outside.invalid/external/",
1435
- )
1436
- resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
1437
- change_url = reverse("admin:core_todo_change", args=[todo.pk])
1438
- self.assertContains(resp, f'src="{change_url}"')
1439
-
1440
- def test_focus_view_avoids_recursive_focus_url(self):
1441
- todo = Todo.objects.create(request="Task")
1442
- focus_url = reverse("todo-focus", args=[todo.pk])
1443
- Todo.objects.filter(pk=todo.pk).update(url=focus_url)
1444
- resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
1445
- change_url = reverse("admin:core_todo_change", args=[todo.pk])
1446
- self.assertContains(resp, f'src="{change_url}"')
1447
-
1448
- def test_focus_view_avoids_recursive_focus_absolute_url(self):
1449
- todo = Todo.objects.create(request="Task")
1450
- focus_url = reverse("todo-focus", args=[todo.pk])
1451
- Todo.objects.filter(pk=todo.pk).update(url=f"http://testserver{focus_url}")
1452
- resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
1453
- change_url = reverse("admin:core_todo_change", args=[todo.pk])
1454
- self.assertContains(resp, f'src="{change_url}"')
1455
-
1456
- def test_focus_view_parses_auth_directives(self):
1457
- todo = Todo.objects.create(
1458
- request="Task",
1459
- url="/docs/?section=chart&_todo_auth=logout&_todo_auth=user:demo&_todo_auth=perm:core.view_user&_todo_auth=extra",
1460
- )
1461
- resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
1462
- self.assertContains(resp, 'src="/docs/?section=chart"')
1463
- self.assertContains(resp, 'href="/docs/?section=chart"')
1464
- self.assertContains(resp, "logged out")
1465
- self.assertContains(resp, "Sign in using: demo")
1466
- self.assertContains(resp, "Required permissions: core.view_user")
1467
- self.assertContains(resp, "Additional authentication notes: extra")
1468
-
1469
- def test_focus_view_redirects_if_todo_completed(self):
1470
- todo = Todo.objects.create(request="Task")
1471
- todo.done_on = timezone.now()
1472
- todo.save(update_fields=["done_on"])
1473
- next_url = reverse("admin:index")
1474
- resp = self.client.get(
1475
- f"{reverse('todo-focus', args=[todo.pk])}?next={quote(next_url)}"
1476
- )
1477
- self.assertRedirects(resp, next_url, target_status_code=200)
1478
-
1479
-
1480
- class TodoUrlValidationTests(TestCase):
1481
- def test_relative_url_valid(self):
1482
- todo = Todo(request="Task", url="/path")
1483
- todo.full_clean() # should not raise
1484
-
1485
- def test_absolute_url_invalid(self):
1486
- todo = Todo(request="Task", url="https://example.com/path")
1487
- with self.assertRaises(ValidationError):
1488
- todo.full_clean()
1489
-
1490
-
1491
- class TodoUniqueTests(TestCase):
1492
- def test_request_unique_case_insensitive(self):
1493
- Todo.objects.create(request="Task")
1494
- with self.assertRaises(IntegrityError):
1495
- Todo.objects.create(request="task")
1496
-
1497
-
1498
- class TodoAdminPermissionTests(TestCase):
1499
- def setUp(self):
1500
- self.client = Client()
1501
- User.objects.create_superuser("admin", "admin@example.com", "pw")
1502
- self.client.force_login(User.objects.get(username="admin"))
1503
-
1504
- def test_add_view_disallowed(self):
1505
- resp = self.client.get(reverse("admin:core_todo_add"))
1506
- self.assertEqual(resp.status_code, 403)
1507
-
1508
- def test_change_form_loads(self):
1509
- todo = Todo.objects.create(request="Task")
1510
- resp = self.client.get(reverse("admin:core_todo_change", args=[todo.pk]))
1511
- self.assertEqual(resp.status_code, 200)
1
+ import os
2
+
3
+ os.environ.setdefault("DJANGO_SETTINGS_MODULE", "config.settings")
4
+ import django
5
+
6
+ django.setup()
7
+
8
+ from django.test import Client, TestCase, RequestFactory, override_settings
9
+ from django.urls import reverse
10
+ from django.http import HttpRequest
11
+ import csv
12
+ import json
13
+ from decimal import Decimal
14
+ from unittest import mock
15
+ from unittest.mock import patch
16
+ from pathlib import Path
17
+ import subprocess
18
+ import types
19
+ from glob import glob
20
+ from datetime import datetime, timedelta, timezone as datetime_timezone
21
+ import tempfile
22
+ from urllib.parse import quote
23
+
24
+ from django.utils import timezone
25
+ from django.contrib.auth.models import Permission
26
+ from django.contrib.messages import get_messages
27
+ from tablib import Dataset
28
+ from .models import (
29
+ User,
30
+ UserPhoneNumber,
31
+ EnergyAccount,
32
+ ElectricVehicle,
33
+ EnergyCredit,
34
+ Product,
35
+ Brand,
36
+ EVModel,
37
+ RFID,
38
+ SecurityGroup,
39
+ Package,
40
+ PackageRelease,
41
+ ReleaseManager,
42
+ Todo,
43
+ PublicWifiAccess,
44
+ )
45
+ from django.contrib.admin.sites import AdminSite
46
+ from core.admin import (
47
+ PackageReleaseAdmin,
48
+ PackageAdmin,
49
+ RFIDResource,
50
+ UserAdmin,
51
+ USER_PROFILE_INLINES,
52
+ )
53
+ from ocpp.models import Transaction, Charger
54
+
55
+ from django.core.exceptions import ValidationError
56
+ from django.core.management import call_command
57
+ from django.db import IntegrityError
58
+ from .backends import LocalhostAdminBackend
59
+ from core.views import (
60
+ _step_check_version,
61
+ _step_pre_release_actions,
62
+ _step_promote_build,
63
+ _step_publish,
64
+ )
65
+ from core import views as core_views
66
+ from core import public_wifi
67
+
68
+
69
+ class DefaultAdminTests(TestCase):
70
+ def test_arthexis_is_default_user(self):
71
+ self.assertTrue(User.objects.filter(username="arthexis").exists())
72
+ self.assertFalse(User.all_objects.filter(username="admin").exists())
73
+
74
+ def test_admin_created_and_local_only(self):
75
+ backend = LocalhostAdminBackend()
76
+ req = HttpRequest()
77
+ req.META["REMOTE_ADDR"] = "127.0.0.1"
78
+ user = backend.authenticate(req, username="admin", password="admin")
79
+ self.assertIsNotNone(user)
80
+ self.assertEqual(user.pk, 2)
81
+
82
+ remote = HttpRequest()
83
+ remote.META["REMOTE_ADDR"] = "10.0.0.1"
84
+ self.assertIsNone(
85
+ backend.authenticate(remote, username="admin", password="admin")
86
+ )
87
+
88
+ def test_admin_respects_forwarded_for(self):
89
+ backend = LocalhostAdminBackend()
90
+
91
+ req = HttpRequest()
92
+ req.META["REMOTE_ADDR"] = "10.0.0.1"
93
+ req.META["HTTP_X_FORWARDED_FOR"] = "127.0.0.1"
94
+ self.assertIsNotNone(
95
+ backend.authenticate(req, username="admin", password="admin"),
96
+ "X-Forwarded-For should permit allowed IP",
97
+ )
98
+
99
+ blocked = HttpRequest()
100
+ blocked.META["REMOTE_ADDR"] = "10.0.0.1"
101
+ blocked.META["HTTP_X_FORWARDED_FOR"] = "8.8.8.8"
102
+ self.assertIsNone(
103
+ backend.authenticate(blocked, username="admin", password="admin")
104
+ )
105
+
106
+
107
+ class UserOperateAsTests(TestCase):
108
+ @classmethod
109
+ def setUpTestData(cls):
110
+ cls.permission = Permission.objects.get(codename="view_todo")
111
+
112
+ def test_staff_user_delegates_permissions(self):
113
+ delegate = User.objects.create_user(username="delegate", password="secret")
114
+ delegate.user_permissions.add(self.permission)
115
+ operator = User.objects.create_user(
116
+ username="operator", password="secret", is_staff=True
117
+ )
118
+ self.assertFalse(operator.has_perm("core.view_todo"))
119
+ operator.operate_as = delegate
120
+ operator.full_clean()
121
+ operator.save()
122
+ operator.refresh_from_db()
123
+ self.assertTrue(operator.has_perm("core.view_todo"))
124
+
125
+ def test_only_staff_may_operate_as(self):
126
+ delegate = User.objects.create_user(username="delegate", password="secret")
127
+ operator = User.objects.create_user(username="operator", password="secret")
128
+ operator.operate_as = delegate
129
+ with self.assertRaises(ValidationError):
130
+ operator.full_clean()
131
+
132
+ def test_non_superuser_cannot_operate_as_staff(self):
133
+ staff_delegate = User.objects.create_user(
134
+ username="delegate", password="secret", is_staff=True
135
+ )
136
+ operator = User.objects.create_user(
137
+ username="operator", password="secret", is_staff=True
138
+ )
139
+ operator.operate_as = staff_delegate
140
+ with self.assertRaises(ValidationError):
141
+ operator.full_clean()
142
+
143
+ def test_recursive_chain_and_cycle_detection(self):
144
+ base = User.objects.create_user(username="base", password="secret")
145
+ base.user_permissions.add(self.permission)
146
+ middle = User.objects.create_user(
147
+ username="middle", password="secret", is_staff=True
148
+ )
149
+ middle.operate_as = base
150
+ middle.full_clean()
151
+ middle.save()
152
+ top = User.objects.create_superuser(
153
+ username="top", email="top@example.com", password="secret"
154
+ )
155
+ top.operate_as = middle
156
+ top.full_clean()
157
+ top.save()
158
+ top.refresh_from_db()
159
+ self.assertTrue(top.has_perm("core.view_todo"))
160
+
161
+ first = User.objects.create_superuser(
162
+ username="first", email="first@example.com", password="secret"
163
+ )
164
+ second = User.objects.create_superuser(
165
+ username="second", email="second@example.com", password="secret"
166
+ )
167
+ first.operate_as = second
168
+ first.full_clean()
169
+ first.save()
170
+ second.operate_as = first
171
+ second.full_clean()
172
+ second.save()
173
+ self.assertFalse(first._check_operate_as_chain(lambda user: False))
174
+
175
+ def test_module_permissions_fall_back(self):
176
+ delegate = User.objects.create_user(username="helper", password="secret")
177
+ delegate.user_permissions.add(self.permission)
178
+ operator = User.objects.create_user(
179
+ username="mod", password="secret", is_staff=True
180
+ )
181
+ operator.operate_as = delegate
182
+ operator.full_clean()
183
+ operator.save()
184
+ self.assertTrue(operator.has_module_perms("core"))
185
+
186
+ def test_has_profile_via_delegate(self):
187
+ delegate = User.objects.create_user(
188
+ username="delegate", password="secret", is_staff=True
189
+ )
190
+ ReleaseManager.objects.create(user=delegate)
191
+ operator = User.objects.create_superuser(
192
+ username="operator",
193
+ email="operator@example.com",
194
+ password="secret",
195
+ )
196
+ operator.operate_as = delegate
197
+ operator.full_clean()
198
+ operator.save()
199
+ profile = operator.get_profile(ReleaseManager)
200
+ self.assertIsNotNone(profile)
201
+ self.assertEqual(profile.user, delegate)
202
+ self.assertTrue(operator.has_profile(ReleaseManager))
203
+
204
+ def test_has_profile_via_group_membership(self):
205
+ member = User.objects.create_user(username="member", password="secret")
206
+ group = SecurityGroup.objects.create(name="Managers")
207
+ group.user_set.add(member)
208
+ profile = ReleaseManager.objects.create(group=group)
209
+ self.assertEqual(member.get_profile(ReleaseManager), profile)
210
+ self.assertTrue(member.has_profile(ReleaseManager))
211
+
212
+ def test_release_manager_property_uses_delegate_profile(self):
213
+ delegate = User.objects.create_user(
214
+ username="delegate-property", password="secret", is_staff=True
215
+ )
216
+ profile = ReleaseManager.objects.create(user=delegate)
217
+ operator = User.objects.create_superuser(
218
+ username="operator-property",
219
+ email="operator-property@example.com",
220
+ password="secret",
221
+ )
222
+ operator.operate_as = delegate
223
+ operator.full_clean()
224
+ operator.save()
225
+ self.assertEqual(operator.release_manager, profile)
226
+
227
+
228
+ class UserPhoneNumberTests(TestCase):
229
+ def test_get_phone_numbers_by_priority(self):
230
+ user = User.objects.create_user(username="phone-user", password="secret")
231
+ later = UserPhoneNumber.objects.create(
232
+ user=user, number="+15555550101", priority=10
233
+ )
234
+ earlier = UserPhoneNumber.objects.create(
235
+ user=user, number="+15555550100", priority=1
236
+ )
237
+ immediate = UserPhoneNumber.objects.create(
238
+ user=user, number="+15555550099", priority=0
239
+ )
240
+
241
+ phones = user.get_phones_by_priority()
242
+ self.assertEqual(phones, [immediate, earlier, later])
243
+
244
+ def test_get_phone_numbers_by_priority_orders_by_id_when_equal(self):
245
+ user = User.objects.create_user(username="phone-order", password="secret")
246
+ first = UserPhoneNumber.objects.create(
247
+ user=user, number="+19995550000", priority=0
248
+ )
249
+ second = UserPhoneNumber.objects.create(
250
+ user=user, number="+19995550001", priority=0
251
+ )
252
+
253
+ phones = user.get_phones_by_priority()
254
+ self.assertEqual(phones, [first, second])
255
+
256
+ def test_get_phone_numbers_by_priority_alias(self):
257
+ user = User.objects.create_user(username="phone-alias", password="secret")
258
+ phone = UserPhoneNumber.objects.create(
259
+ user=user, number="+14445550000", priority=3
260
+ )
261
+
262
+ self.assertEqual(user.get_phone_numbers_by_priority(), [phone])
263
+
264
+
265
+ class ProfileValidationTests(TestCase):
266
+ def test_system_user_cannot_receive_profiles(self):
267
+ system_user = User.objects.get(username=User.SYSTEM_USERNAME)
268
+ profile = ReleaseManager(user=system_user)
269
+ with self.assertRaises(ValidationError) as exc:
270
+ profile.full_clean()
271
+ self.assertIn("user", exc.exception.error_dict)
272
+
273
+
274
+ class UserAdminInlineTests(TestCase):
275
+ def setUp(self):
276
+ self.site = AdminSite()
277
+ self.factory = RequestFactory()
278
+ self.admin = UserAdmin(User, self.site)
279
+ self.system_user = User.objects.get(username=User.SYSTEM_USERNAME)
280
+ self.superuser = User.objects.create_superuser(
281
+ username="inline-super",
282
+ email="inline-super@example.com",
283
+ password="secret",
284
+ )
285
+
286
+ def test_profile_inlines_hidden_for_system_user(self):
287
+ request = self.factory.get("/")
288
+ request.user = self.superuser
289
+ system_inlines = self.admin.get_inline_instances(request, self.system_user)
290
+ system_profiles = [
291
+ inline
292
+ for inline in system_inlines
293
+ if inline.__class__ in USER_PROFILE_INLINES
294
+ ]
295
+ self.assertFalse(system_profiles)
296
+
297
+ other_inlines = self.admin.get_inline_instances(request, self.superuser)
298
+ other_profiles = [
299
+ inline
300
+ for inline in other_inlines
301
+ if inline.__class__ in USER_PROFILE_INLINES
302
+ ]
303
+ self.assertEqual(len(other_profiles), len(USER_PROFILE_INLINES))
304
+
305
+
306
+ class RFIDLoginTests(TestCase):
307
+ def setUp(self):
308
+ self.client = Client()
309
+ self.user = User.objects.create_user(username="alice", password="secret")
310
+ self.account = EnergyAccount.objects.create(user=self.user, name="ALICE")
311
+ tag = RFID.objects.create(rfid="CARD123")
312
+ self.account.rfids.add(tag)
313
+
314
+ def test_rfid_login_success(self):
315
+ response = self.client.post(
316
+ reverse("rfid-login"),
317
+ data={"rfid": "CARD123"},
318
+ content_type="application/json",
319
+ )
320
+ self.assertEqual(response.status_code, 200)
321
+ self.assertEqual(response.json()["username"], "alice")
322
+
323
+ def test_rfid_login_invalid(self):
324
+ response = self.client.post(
325
+ reverse("rfid-login"),
326
+ data={"rfid": "UNKNOWN"},
327
+ content_type="application/json",
328
+ )
329
+ self.assertEqual(response.status_code, 401)
330
+
331
+ @patch("core.backends.subprocess.run")
332
+ def test_rfid_login_external_command_success(self, mock_run):
333
+ tag = self.account.rfids.first()
334
+ tag.external_command = "echo ok"
335
+ tag.save(update_fields=["external_command"])
336
+ mock_run.return_value = types.SimpleNamespace(returncode=0)
337
+
338
+ response = self.client.post(
339
+ reverse("rfid-login"),
340
+ data={"rfid": "CARD123"},
341
+ content_type="application/json",
342
+ )
343
+
344
+ self.assertEqual(response.status_code, 200)
345
+ run_args, run_kwargs = mock_run.call_args
346
+ self.assertEqual(run_args[0], "echo ok")
347
+ self.assertTrue(run_kwargs.get("shell"))
348
+ env = run_kwargs.get("env", {})
349
+ self.assertEqual(env.get("RFID_VALUE"), "CARD123")
350
+ self.assertEqual(env.get("RFID_LABEL_ID"), str(tag.pk))
351
+
352
+ @patch("core.backends.subprocess.run")
353
+ def test_rfid_login_external_command_failure(self, mock_run):
354
+ tag = self.account.rfids.first()
355
+ tag.external_command = "exit 1"
356
+ tag.save(update_fields=["external_command"])
357
+ mock_run.return_value = types.SimpleNamespace(returncode=1)
358
+
359
+ response = self.client.post(
360
+ reverse("rfid-login"),
361
+ data={"rfid": "CARD123"},
362
+ content_type="application/json",
363
+ )
364
+
365
+ self.assertEqual(response.status_code, 401)
366
+ mock_run.assert_called_once()
367
+
368
+
369
+ class RFIDBatchApiTests(TestCase):
370
+ def setUp(self):
371
+ self.client = Client()
372
+ self.user = User.objects.create_user(username="bob", password="secret")
373
+ self.account = EnergyAccount.objects.create(user=self.user, name="BOB")
374
+ self.client.force_login(self.user)
375
+
376
+ def test_export_rfids(self):
377
+ tag_black = RFID.objects.create(rfid="CARD999", custom_label="Main Tag")
378
+ tag_white = RFID.objects.create(rfid="CARD998", color=RFID.WHITE)
379
+ self.account.rfids.add(tag_black, tag_white)
380
+ response = self.client.get(reverse("rfid-batch"))
381
+ self.assertEqual(response.status_code, 200)
382
+ self.assertEqual(
383
+ response.json(),
384
+ {
385
+ "rfids": [
386
+ {
387
+ "rfid": "CARD999",
388
+ "custom_label": "Main Tag",
389
+ "energy_accounts": [self.account.id],
390
+ "allowed": True,
391
+ "color": "B",
392
+ "released": False,
393
+ }
394
+ ]
395
+ },
396
+ )
397
+
398
+ def test_export_rfids_color_filter(self):
399
+ RFID.objects.create(rfid="CARD111", color=RFID.WHITE)
400
+ response = self.client.get(reverse("rfid-batch"), {"color": "W"})
401
+ self.assertEqual(
402
+ response.json(),
403
+ {
404
+ "rfids": [
405
+ {
406
+ "rfid": "CARD111",
407
+ "custom_label": "",
408
+ "energy_accounts": [],
409
+ "allowed": True,
410
+ "color": "W",
411
+ "released": False,
412
+ }
413
+ ]
414
+ },
415
+ )
416
+
417
+ def test_export_rfids_released_filter(self):
418
+ RFID.objects.create(rfid="CARD112", released=True)
419
+ RFID.objects.create(rfid="CARD113", released=False)
420
+ response = self.client.get(reverse("rfid-batch"), {"released": "true"})
421
+ self.assertEqual(
422
+ response.json(),
423
+ {
424
+ "rfids": [
425
+ {
426
+ "rfid": "CARD112",
427
+ "custom_label": "",
428
+ "energy_accounts": [],
429
+ "allowed": True,
430
+ "color": "B",
431
+ "released": True,
432
+ }
433
+ ]
434
+ },
435
+ )
436
+
437
+ def test_import_rfids(self):
438
+ data = {
439
+ "rfids": [
440
+ {
441
+ "rfid": "A1B2C3D4",
442
+ "custom_label": "Imported Tag",
443
+ "energy_accounts": [self.account.id],
444
+ "allowed": True,
445
+ "color": "W",
446
+ "released": True,
447
+ }
448
+ ]
449
+ }
450
+ response = self.client.post(
451
+ reverse("rfid-batch"),
452
+ data=json.dumps(data),
453
+ content_type="application/json",
454
+ )
455
+ self.assertEqual(response.status_code, 200)
456
+ self.assertEqual(response.json()["imported"], 1)
457
+ self.assertTrue(
458
+ RFID.objects.filter(
459
+ rfid="A1B2C3D4",
460
+ custom_label="Imported Tag",
461
+ energy_accounts=self.account,
462
+ color=RFID.WHITE,
463
+ released=True,
464
+ ).exists()
465
+ )
466
+
467
+
468
+ class AllowedRFIDTests(TestCase):
469
+ def setUp(self):
470
+ self.user = User.objects.create_user(username="eve", password="secret")
471
+ self.account = EnergyAccount.objects.create(user=self.user, name="EVE")
472
+ self.rfid = RFID.objects.create(rfid="BAD123")
473
+ self.account.rfids.add(self.rfid)
474
+
475
+ def test_disallow_removes_and_blocks(self):
476
+ self.rfid.allowed = False
477
+ self.rfid.save()
478
+ self.account.refresh_from_db()
479
+ self.assertFalse(self.account.rfids.exists())
480
+
481
+ with self.assertRaises(IntegrityError):
482
+ RFID.objects.create(rfid="BAD123")
483
+
484
+
485
+ class RFIDValidationTests(TestCase):
486
+ def test_invalid_format_raises(self):
487
+ tag = RFID(rfid="xyz")
488
+ with self.assertRaises(ValidationError):
489
+ tag.full_clean()
490
+
491
+ def test_lowercase_saved_uppercase(self):
492
+ tag = RFID.objects.create(rfid="deadbeef")
493
+ self.assertEqual(tag.rfid, "DEADBEEF")
494
+
495
+ def test_long_rfid_allowed(self):
496
+ tag = RFID.objects.create(rfid="DEADBEEF10")
497
+ self.assertEqual(tag.rfid, "DEADBEEF10")
498
+
499
+ def test_find_user_by_rfid(self):
500
+ user = User.objects.create_user(username="finder", password="pwd")
501
+ acc = EnergyAccount.objects.create(user=user, name="FINDER")
502
+ tag = RFID.objects.create(rfid="ABCD1234")
503
+ acc.rfids.add(tag)
504
+ found = RFID.get_account_by_rfid("abcd1234")
505
+ self.assertEqual(found, acc)
506
+
507
+ def test_custom_label_length(self):
508
+ tag = RFID(rfid="FACE1234", custom_label="x" * 33)
509
+ with self.assertRaises(ValidationError):
510
+ tag.full_clean()
511
+
512
+
513
+ class RFIDLabelSequenceTests(TestCase):
514
+ def test_next_scan_label_starts_at_ten(self):
515
+ self.assertEqual(RFID.next_scan_label(), 10)
516
+
517
+ def test_next_scan_label_skips_non_multiples(self):
518
+ RFID.objects.create(label_id=21, rfid="SEQTEST21")
519
+
520
+ self.assertEqual(RFID.next_scan_label(), 30)
521
+
522
+ def test_next_copy_label_increments_by_one(self):
523
+ source = RFID.objects.create(label_id=40, rfid="SEQTEST40")
524
+
525
+ self.assertEqual(RFID.next_copy_label(source), 41)
526
+
527
+ def test_next_copy_label_skips_existing(self):
528
+ source = RFID.objects.create(label_id=50, rfid="SEQTEST50")
529
+ RFID.objects.create(label_id=51, rfid="SEQTEST51")
530
+
531
+ self.assertEqual(RFID.next_copy_label(source), 52)
532
+
533
+
534
+ class RFIDAssignmentTests(TestCase):
535
+ def setUp(self):
536
+ self.user1 = User.objects.create_user(username="user1", password="x")
537
+ self.user2 = User.objects.create_user(username="user2", password="x")
538
+ self.acc1 = EnergyAccount.objects.create(user=self.user1, name="USER1")
539
+ self.acc2 = EnergyAccount.objects.create(user=self.user2, name="USER2")
540
+ self.tag = RFID.objects.create(rfid="ABCDEF12")
541
+
542
+ def test_rfid_can_only_attach_to_one_account(self):
543
+ self.acc1.rfids.add(self.tag)
544
+ with self.assertRaises(ValidationError):
545
+ self.acc2.rfids.add(self.tag)
546
+
547
+
548
+ class EnergyAccountTests(TestCase):
549
+ def test_balance_calculation(self):
550
+ user = User.objects.create_user(username="balance", password="x")
551
+ acc = EnergyAccount.objects.create(user=user, name="BALANCE")
552
+ EnergyCredit.objects.create(account=acc, amount_kw=50)
553
+ charger = Charger.objects.create(charger_id="T1")
554
+ Transaction.objects.create(
555
+ charger=charger,
556
+ account=acc,
557
+ meter_start=0,
558
+ meter_stop=20,
559
+ start_time=timezone.now(),
560
+ stop_time=timezone.now(),
561
+ )
562
+ self.assertEqual(acc.total_kw_spent, 20)
563
+ self.assertEqual(acc.balance_kw, 30)
564
+
565
+ def test_authorization_requires_positive_balance(self):
566
+ user = User.objects.create_user(username="auth", password="x")
567
+ acc = EnergyAccount.objects.create(user=user, name="AUTH")
568
+ self.assertFalse(acc.can_authorize())
569
+
570
+ EnergyCredit.objects.create(account=acc, amount_kw=5)
571
+ self.assertTrue(acc.can_authorize())
572
+
573
+ def test_service_account_ignores_balance(self):
574
+ user = User.objects.create_user(username="service", password="x")
575
+ acc = EnergyAccount.objects.create(
576
+ user=user, service_account=True, name="SERVICE"
577
+ )
578
+ self.assertTrue(acc.can_authorize())
579
+
580
+ def test_account_without_user(self):
581
+ acc = EnergyAccount.objects.create(name="NOUSER")
582
+ tag = RFID.objects.create(rfid="NOUSER1")
583
+ acc.rfids.add(tag)
584
+ self.assertIsNone(acc.user)
585
+ self.assertTrue(acc.rfids.filter(rfid="NOUSER1").exists())
586
+
587
+
588
+ class ElectricVehicleTests(TestCase):
589
+ def test_account_can_have_multiple_vehicles(self):
590
+ user = User.objects.create_user(username="cars", password="x")
591
+ acc = EnergyAccount.objects.create(user=user, name="CARS")
592
+ tesla = Brand.objects.create(name="Tesla")
593
+ nissan = Brand.objects.create(name="Nissan")
594
+ model_s = EVModel.objects.create(brand=tesla, name="Model S")
595
+ leaf = EVModel.objects.create(brand=nissan, name="Leaf")
596
+ ElectricVehicle.objects.create(
597
+ account=acc, brand=tesla, model=model_s, vin="VIN12345678901234"
598
+ )
599
+ ElectricVehicle.objects.create(
600
+ account=acc, brand=nissan, model=leaf, vin="VIN23456789012345"
601
+ )
602
+ self.assertEqual(acc.vehicles.count(), 2)
603
+
604
+
605
+ class AddressTests(TestCase):
606
+ def test_invalid_municipality_state(self):
607
+ addr = Address(
608
+ street="Main",
609
+ number="1",
610
+ municipality="Monterrey",
611
+ state=Address.State.COAHUILA,
612
+ postal_code="00000",
613
+ )
614
+ with self.assertRaises(ValidationError):
615
+ addr.full_clean()
616
+
617
+ def test_user_link(self):
618
+ addr = Address.objects.create(
619
+ street="Main",
620
+ number="2",
621
+ municipality="Monterrey",
622
+ state=Address.State.NUEVO_LEON,
623
+ postal_code="64000",
624
+ )
625
+ user = User.objects.create_user(username="addr", password="pwd", address=addr)
626
+ self.assertEqual(user.address, addr)
627
+
628
+
629
+ class PublicWifiUtilitiesTests(TestCase):
630
+ def setUp(self):
631
+ self.user = User.objects.create_user(username="wifi", password="pwd")
632
+
633
+ def test_grant_public_access_records_allowlist(self):
634
+ with tempfile.TemporaryDirectory() as tmp:
635
+ base = Path(tmp)
636
+ allow_file = base / "locks" / "public_wifi_allow.list"
637
+ with override_settings(BASE_DIR=base):
638
+ with patch("core.public_wifi._iptables_available", return_value=False):
639
+ public_wifi.grant_public_access(self.user, "AA:BB:CC:DD:EE:FF")
640
+ self.assertTrue(allow_file.exists())
641
+ content = allow_file.read_text()
642
+ self.assertIn("aa:bb:cc:dd:ee:ff", content)
643
+ self.assertTrue(
644
+ PublicWifiAccess.objects.filter(
645
+ user=self.user, mac_address="aa:bb:cc:dd:ee:ff"
646
+ ).exists()
647
+ )
648
+
649
+ def test_revoke_public_access_for_user_updates_allowlist(self):
650
+ with tempfile.TemporaryDirectory() as tmp:
651
+ base = Path(tmp)
652
+ allow_file = base / "locks" / "public_wifi_allow.list"
653
+ with override_settings(BASE_DIR=base):
654
+ with patch("core.public_wifi._iptables_available", return_value=False):
655
+ access = public_wifi.grant_public_access(
656
+ self.user, "AA:BB:CC:DD:EE:FF"
657
+ )
658
+ public_wifi.revoke_public_access_for_user(self.user)
659
+ access.refresh_from_db()
660
+ self.assertIsNotNone(access.revoked_on)
661
+ if allow_file.exists():
662
+ self.assertNotIn("aa:bb:cc:dd:ee:ff", allow_file.read_text())
663
+
664
+ def test_allow_mac_configures_drop_rule(self):
665
+ with tempfile.TemporaryDirectory() as tmp:
666
+ base = Path(tmp)
667
+ executed_rules = []
668
+
669
+ def fake_run(args, **kwargs):
670
+ from types import SimpleNamespace
671
+
672
+ if args[0] != "iptables":
673
+ return subprocess.run(args, **kwargs)
674
+ command = args[1:]
675
+ if command[:2] == ["-C", "FORWARD"] and "--mac-source" in command:
676
+ return SimpleNamespace(returncode=1, stdout="")
677
+ if command[:2] == ["-C", "FORWARD"] and "-o" in command and "DROP" in command:
678
+ return SimpleNamespace(returncode=1, stdout="")
679
+ if command[0] in {"-A", "-I", "-D"}:
680
+ executed_rules.append(command)
681
+ return SimpleNamespace(returncode=0, stdout="")
682
+ return SimpleNamespace(returncode=0, stdout="")
683
+
684
+ with override_settings(BASE_DIR=base):
685
+ with patch("core.public_wifi._iptables_available", return_value=True):
686
+ with patch("core.public_wifi.subprocess.run", side_effect=fake_run):
687
+ public_wifi.grant_public_access(self.user, "AA:BB:CC:DD:EE:FF")
688
+
689
+ self.assertIn(
690
+ ["-A", "FORWARD", "-i", "wlan0", "-o", "wlan1", "-j", "DROP"],
691
+ executed_rules,
692
+ )
693
+ self.assertIn(
694
+ [
695
+ "-I",
696
+ "FORWARD",
697
+ "1",
698
+ "-i",
699
+ "wlan0",
700
+ "-m",
701
+ "mac",
702
+ "--mac-source",
703
+ "aa:bb:cc:dd:ee:ff",
704
+ "-j",
705
+ "ACCEPT",
706
+ ],
707
+ executed_rules,
708
+ )
709
+
710
+
711
+ class LiveSubscriptionTests(TestCase):
712
+ def setUp(self):
713
+ self.client = Client()
714
+ self.user = User.objects.create_user(username="bob", password="pwd")
715
+ self.account = EnergyAccount.objects.create(user=self.user, name="SUBSCRIBER")
716
+ self.product = Product.objects.create(name="Gold", renewal_period=30)
717
+ self.client.force_login(self.user)
718
+
719
+ def test_create_and_list_live_subscription(self):
720
+ response = self.client.post(
721
+ reverse("add-live-subscription"),
722
+ data={"account_id": self.account.id, "product_id": self.product.id},
723
+ content_type="application/json",
724
+ )
725
+ self.assertEqual(response.status_code, 200)
726
+ self.account.refresh_from_db()
727
+ self.assertEqual(
728
+ self.account.live_subscription_product,
729
+ self.product,
730
+ )
731
+ self.assertIsNotNone(self.account.live_subscription_start_date)
732
+ self.assertEqual(
733
+ self.account.live_subscription_start_date,
734
+ timezone.localdate(),
735
+ )
736
+ self.assertEqual(
737
+ self.account.live_subscription_next_renewal,
738
+ self.account.live_subscription_start_date
739
+ + timedelta(days=self.product.renewal_period),
740
+ )
741
+
742
+ list_resp = self.client.get(
743
+ reverse("live-subscription-list"), {"account_id": self.account.id}
744
+ )
745
+ self.assertEqual(list_resp.status_code, 200)
746
+ data = list_resp.json()
747
+ self.assertEqual(len(data["live_subscriptions"]), 1)
748
+ self.assertEqual(data["live_subscriptions"][0]["product__name"], "Gold")
749
+ self.assertEqual(data["live_subscriptions"][0]["id"], self.account.id)
750
+ self.assertEqual(
751
+ data["live_subscriptions"][0]["next_renewal"],
752
+ str(self.account.live_subscription_next_renewal),
753
+ )
754
+
755
+ def test_product_list(self):
756
+ response = self.client.get(reverse("product-list"))
757
+ self.assertEqual(response.status_code, 200)
758
+ data = response.json()
759
+ self.assertEqual(len(data["products"]), 1)
760
+ self.assertEqual(data["products"][0]["name"], "Gold")
761
+
762
+
763
+ class OnboardingWizardTests(TestCase):
764
+ def setUp(self):
765
+ self.client = Client()
766
+ User.objects.create_superuser("super", "super@example.com", "pwd")
767
+ self.client.force_login(User.objects.get(username="super"))
768
+
769
+ def test_onboarding_flow_creates_account(self):
770
+ details_url = reverse("admin:core_energyaccount_onboard_details")
771
+ response = self.client.get(details_url)
772
+ self.assertEqual(response.status_code, 200)
773
+ data = {
774
+ "first_name": "John",
775
+ "last_name": "Doe",
776
+ "rfid": "ABCD1234",
777
+ "vehicle_id": "VIN12345678901234",
778
+ }
779
+ resp = self.client.post(details_url, data)
780
+ self.assertEqual(resp.status_code, 302)
781
+ self.assertEqual(resp.url, reverse("admin:core_energyaccount_changelist"))
782
+ user = User.objects.get(first_name="John", last_name="Doe")
783
+ self.assertFalse(user.is_active)
784
+ account = EnergyAccount.objects.get(user=user)
785
+ self.assertTrue(account.rfids.filter(rfid="ABCD1234").exists())
786
+ self.assertTrue(account.vehicles.filter(vin="VIN12345678901234").exists())
787
+
788
+
789
+ class EVBrandFixtureTests(TestCase):
790
+ def test_ev_brand_fixture_loads(self):
791
+ call_command(
792
+ "loaddata",
793
+ *sorted(glob("core/fixtures/ev_brands__*.json")),
794
+ *sorted(glob("core/fixtures/ev_models__*.json")),
795
+ verbosity=0,
796
+ )
797
+ porsche = Brand.objects.get(name="Porsche")
798
+ audi = Brand.objects.get(name="Audi")
799
+ self.assertTrue(
800
+ {"WP0", "WP1"} <= set(porsche.wmi_codes.values_list("code", flat=True))
801
+ )
802
+ self.assertTrue(
803
+ set(audi.wmi_codes.values_list("code", flat=True)) >= {"WAU", "TRU"}
804
+ )
805
+ self.assertTrue(EVModel.objects.filter(brand=porsche, name="Taycan").exists())
806
+ self.assertTrue(EVModel.objects.filter(brand=audi, name="e-tron GT").exists())
807
+ self.assertTrue(EVModel.objects.filter(brand=porsche, name="Macan").exists())
808
+ model3 = EVModel.objects.get(brand__name="Tesla", name="Model 3 RWD")
809
+ self.assertEqual(model3.est_battery_kwh, Decimal("57.50"))
810
+
811
+ def test_brand_from_vin(self):
812
+ call_command(
813
+ "loaddata",
814
+ *sorted(glob("core/fixtures/ev_brands__*.json")),
815
+ verbosity=0,
816
+ )
817
+ self.assertEqual(Brand.from_vin("WP0ZZZ12345678901").name, "Porsche")
818
+ self.assertEqual(Brand.from_vin("WAUZZZ12345678901").name, "Audi")
819
+ self.assertIsNone(Brand.from_vin("XYZ12345678901234"))
820
+
821
+
822
+ class RFIDFixtureTests(TestCase):
823
+ def test_fixture_assigns_gelectriic_rfid(self):
824
+ call_command(
825
+ "loaddata",
826
+ "core/fixtures/users__arthexis.json",
827
+ "core/fixtures/energy_accounts__gelectriic.json",
828
+ "core/fixtures/rfids__ffffffff.json",
829
+ verbosity=0,
830
+ )
831
+ account = EnergyAccount.objects.get(name="GELECTRIIC")
832
+ tag = RFID.objects.get(rfid="FFFFFFFF")
833
+ self.assertIn(account, tag.energy_accounts.all())
834
+ self.assertEqual(tag.energy_accounts.count(), 1)
835
+
836
+
837
+ class RFIDImportExportCommandTests(TestCase):
838
+ def test_export_supports_account_names(self):
839
+ account = EnergyAccount.objects.create(name="PRIMARY")
840
+ tag = RFID.objects.create(rfid="CARD500")
841
+ tag.energy_accounts.add(account)
842
+
843
+ temp_file = tempfile.NamedTemporaryFile(delete=False)
844
+ temp_file.close()
845
+ rows = []
846
+ try:
847
+ call_command("export_rfids", temp_file.name, account_field="name")
848
+ with open(temp_file.name, newline="", encoding="utf-8") as fh:
849
+ reader = csv.DictReader(fh)
850
+ rows = list(reader)
851
+ finally:
852
+ os.unlink(temp_file.name)
853
+
854
+ self.assertEqual(len(rows), 1)
855
+ self.assertEqual(rows[0]["energy_account_names"], "PRIMARY")
856
+
857
+ def test_import_creates_missing_account_by_name(self):
858
+ temp_file = tempfile.NamedTemporaryFile("w", newline="", delete=False)
859
+ try:
860
+ writer = csv.writer(temp_file)
861
+ writer.writerow(
862
+ [
863
+ "rfid",
864
+ "custom_label",
865
+ "energy_account_names",
866
+ "allowed",
867
+ "color",
868
+ "released",
869
+ ]
870
+ )
871
+ writer.writerow(
872
+ [
873
+ "NAMETAG001",
874
+ "",
875
+ "Imported Account",
876
+ "true",
877
+ RFID.WHITE,
878
+ "true",
879
+ ]
880
+ )
881
+ temp_file.flush()
882
+ finally:
883
+ temp_file.close()
884
+
885
+ try:
886
+ call_command("import_rfids", temp_file.name, account_field="name")
887
+ finally:
888
+ os.unlink(temp_file.name)
889
+
890
+ account = EnergyAccount.objects.get(name="IMPORTED ACCOUNT")
891
+ tag = RFID.objects.get(rfid="NAMETAG001")
892
+ self.assertIsNone(account.user)
893
+ self.assertTrue(tag.energy_accounts.filter(pk=account.pk).exists())
894
+
895
+ def test_admin_export_supports_account_names(self):
896
+ account = EnergyAccount.objects.create(name="PRIMARY")
897
+ tag = RFID.objects.create(rfid="CARD501")
898
+ tag.energy_accounts.add(account)
899
+
900
+ resource = RFIDResource(account_field="name")
901
+ dataset = resource.export(queryset=RFID.objects.order_by("rfid"))
902
+
903
+ self.assertIn("energy_account_names", dataset.headers)
904
+ self.assertEqual(dataset.dict[0]["energy_account_names"], "PRIMARY")
905
+
906
+ def test_admin_import_creates_missing_account_by_name(self):
907
+ resource = RFIDResource(account_field="name")
908
+ headers = resource.get_export_headers()
909
+ dataset = Dataset()
910
+ dataset.headers = headers
911
+ row = {header: "" for header in headers}
912
+ row.update(
913
+ {
914
+ "label_id": "200",
915
+ "rfid": "NAMETAG002",
916
+ "custom_label": "",
917
+ "energy_account_names": "Imported Admin Account",
918
+ "allowed": "true",
919
+ "color": RFID.BLACK,
920
+ "kind": RFID.CLASSIC,
921
+ "released": "false",
922
+ }
923
+ )
924
+ dataset.append([row[h] for h in headers])
925
+
926
+ result = resource.import_data(dataset, dry_run=False)
927
+ self.assertFalse(result.has_errors())
928
+
929
+ account = EnergyAccount.objects.get(name="IMPORTED ADMIN ACCOUNT")
930
+ tag = RFID.objects.get(rfid="NAMETAG002")
931
+ self.assertTrue(tag.energy_accounts.filter(pk=account.pk).exists())
932
+
933
+
934
+ class RFIDKeyVerificationFlagTests(TestCase):
935
+ def test_flags_reset_on_key_change(self):
936
+ tag = RFID.objects.create(
937
+ rfid="ABC12345", key_a_verified=True, key_b_verified=True
938
+ )
939
+ tag.key_a = "A1A1A1A1A1A1"
940
+ tag.save()
941
+ self.assertFalse(tag.key_a_verified)
942
+ tag.key_b = "B1B1B1B1B1B1"
943
+ tag.save()
944
+ self.assertFalse(tag.key_b_verified)
945
+
946
+
947
+ class SecurityGroupTests(TestCase):
948
+ def test_parent_and_user_assignment(self):
949
+ parent = SecurityGroup.objects.create(name="Parents")
950
+ child = SecurityGroup.objects.create(name="Children", parent=parent)
951
+ user = User.objects.create_user(username="sg_user", password="secret")
952
+ child.user_set.add(user)
953
+ self.assertEqual(child.parent, parent)
954
+ self.assertIn(user, child.user_set.all())
955
+
956
+
957
+ class ReleaseProcessTests(TestCase):
958
+ def setUp(self):
959
+ self.package = Package.objects.create(name="pkg")
960
+ self.release = PackageRelease.objects.create(
961
+ package=self.package, version="1.0.0"
962
+ )
963
+
964
+ @mock.patch("core.views._collect_dirty_files")
965
+ @mock.patch("core.views._sync_with_origin_main")
966
+ @mock.patch("core.views.release_utils._git_clean", return_value=False)
967
+ def test_step_check_requires_clean_repo(
968
+ self, git_clean, sync_main, collect_dirty
969
+ ):
970
+ collect_dirty.return_value = [
971
+ {"path": "core/models.py", "status": "M", "status_label": "Modified"}
972
+ ]
973
+ ctx: dict = {}
974
+ with self.assertRaises(core_views.DirtyRepository):
975
+ _step_check_version(self.release, ctx, Path("rel.log"))
976
+ self.assertEqual(
977
+ ctx["dirty_files"],
978
+ [
979
+ {
980
+ "path": "core/models.py",
981
+ "status": "M",
982
+ "status_label": "Modified",
983
+ }
984
+ ],
985
+ )
986
+ sync_main.assert_called_once_with(Path("rel.log"))
987
+
988
+ @mock.patch("core.views._sync_with_origin_main")
989
+ @mock.patch("core.views.release_utils._git_clean", return_value=True)
990
+ @mock.patch("core.views.release_utils.network_available", return_value=False)
991
+ def test_step_check_keeps_repo_clean(
992
+ self, network_available, git_clean, sync_main
993
+ ):
994
+ version_path = Path("VERSION")
995
+ original = version_path.read_text(encoding="utf-8")
996
+ _step_check_version(self.release, {}, Path("rel.log"))
997
+ proc = subprocess.run(
998
+ ["git", "status", "--porcelain", str(version_path)],
999
+ capture_output=True,
1000
+ text=True,
1001
+ )
1002
+ self.assertFalse(proc.stdout.strip())
1003
+ self.assertEqual(version_path.read_text(encoding="utf-8"), original)
1004
+ sync_main.assert_called_once_with(Path("rel.log"))
1005
+
1006
+ @mock.patch("core.views.requests.get")
1007
+ @mock.patch("core.views._sync_with_origin_main")
1008
+ @mock.patch("core.views.release_utils.network_available", return_value=True)
1009
+ @mock.patch("core.views.release_utils._git_clean", return_value=True)
1010
+ def test_step_check_ignores_yanked_release(
1011
+ self, git_clean, network_available, sync_main, requests_get
1012
+ ):
1013
+ response = mock.Mock()
1014
+ response.ok = True
1015
+ response.json.return_value = {
1016
+ "releases": {
1017
+ "0.1.12": [
1018
+ {"filename": "pkg.whl", "yanked": True},
1019
+ {"filename": "pkg.tar.gz", "yanked": True},
1020
+ ]
1021
+ }
1022
+ }
1023
+ requests_get.return_value = response
1024
+ self.release.version = "0.1.12"
1025
+ _step_check_version(self.release, {}, Path("rel.log"))
1026
+ requests_get.assert_called_once()
1027
+ sync_main.assert_called_once_with(Path("rel.log"))
1028
+
1029
+ @mock.patch("core.views.requests.get")
1030
+ @mock.patch("core.views._sync_with_origin_main")
1031
+ @mock.patch("core.views.release_utils.network_available", return_value=True)
1032
+ @mock.patch("core.views.release_utils._git_clean", return_value=True)
1033
+ def test_step_check_blocks_available_release(
1034
+ self, git_clean, network_available, sync_main, requests_get
1035
+ ):
1036
+ response = mock.Mock()
1037
+ response.ok = True
1038
+ response.json.return_value = {
1039
+ "releases": {
1040
+ "0.1.12": [
1041
+ {"filename": "pkg.whl", "yanked": False},
1042
+ {"filename": "pkg.tar.gz"},
1043
+ ]
1044
+ }
1045
+ }
1046
+ requests_get.return_value = response
1047
+ self.release.version = "0.1.12"
1048
+ with self.assertRaises(Exception) as exc:
1049
+ _step_check_version(self.release, {}, Path("rel.log"))
1050
+ self.assertIn("already on PyPI", str(exc.exception))
1051
+ requests_get.assert_called_once()
1052
+ sync_main.assert_called_once_with(Path("rel.log"))
1053
+
1054
+ @mock.patch("core.models.PackageRelease.dump_fixture")
1055
+ def test_save_does_not_dump_fixture(self, dump):
1056
+ self.release.pypi_url = "https://example.com"
1057
+ self.release.save()
1058
+ dump.assert_not_called()
1059
+
1060
+ @mock.patch("core.views.subprocess.run")
1061
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1062
+ @mock.patch("core.views.release_utils.promote", side_effect=Exception("boom"))
1063
+ def test_promote_cleans_repo_on_failure(self, promote, dump_fixture, run):
1064
+ import subprocess as sp
1065
+
1066
+ def fake_run(cmd, check=True, capture_output=False, text=False):
1067
+ if capture_output:
1068
+ stdout = ""
1069
+ if cmd[:3] == ["git", "rev-parse", "origin/main"]:
1070
+ stdout = "abc123\n"
1071
+ elif cmd[:4] == ["git", "merge-base", "HEAD", "origin/main"]:
1072
+ stdout = "abc123\n"
1073
+ return sp.CompletedProcess(cmd, 0, stdout=stdout, stderr="")
1074
+ return sp.CompletedProcess(cmd, 0)
1075
+
1076
+ run.side_effect = fake_run
1077
+ with self.assertRaises(Exception):
1078
+ _step_promote_build(self.release, {}, Path("rel.log"))
1079
+ dump_fixture.assert_not_called()
1080
+ run.assert_any_call(["git", "reset", "--hard"], check=False)
1081
+ run.assert_any_call(["git", "clean", "-fd"], check=False)
1082
+
1083
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1084
+ @mock.patch("core.views._ensure_release_todo")
1085
+ @mock.patch("core.views._sync_with_origin_main")
1086
+ @mock.patch("core.views.subprocess.run")
1087
+ def test_pre_release_syncs_with_main(
1088
+ self, run, sync_main, ensure_todo, dump_fixture
1089
+ ):
1090
+ import subprocess as sp
1091
+
1092
+ def fake_run(cmd, check=True, capture_output=False, text=False):
1093
+ if capture_output:
1094
+ return sp.CompletedProcess(cmd, 0, stdout="", stderr="")
1095
+ if cmd[:2] == ["git", "diff"]:
1096
+ return sp.CompletedProcess(cmd, 1)
1097
+ return sp.CompletedProcess(cmd, 0)
1098
+
1099
+ run.side_effect = fake_run
1100
+ ensure_todo.return_value = (
1101
+ mock.Mock(request="Create release pkg 1.0.1", url="", request_details=""),
1102
+ Path("core/fixtures/todos__next_release.json"),
1103
+ )
1104
+
1105
+ version_path = Path("VERSION")
1106
+ original_version = version_path.read_text(encoding="utf-8")
1107
+
1108
+ try:
1109
+ _step_pre_release_actions(self.release, {}, Path("rel.log"))
1110
+ finally:
1111
+ version_path.write_text(original_version, encoding="utf-8")
1112
+
1113
+ sync_main.assert_called_once_with(Path("rel.log"))
1114
+ release_fixtures = sorted(
1115
+ str(path) for path in Path("core/fixtures").glob("releases__*.json")
1116
+ )
1117
+ if release_fixtures:
1118
+ run.assert_any_call(["git", "add", *release_fixtures], check=True)
1119
+ run.assert_any_call(["git", "add", "CHANGELOG.rst"], check=True)
1120
+ run.assert_any_call(["git", "add", "VERSION"], check=True)
1121
+ run.assert_any_call(["git", "diff", "--cached", "--quiet"], check=False)
1122
+ ensure_todo.assert_called_once_with(self.release, previous_version=mock.ANY)
1123
+
1124
+ @mock.patch("core.views.subprocess.run")
1125
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1126
+ @mock.patch("core.views.release_utils.promote")
1127
+ def test_promote_verifies_origin_and_pushes_main(self, promote, dump_fixture, run):
1128
+ import subprocess as sp
1129
+
1130
+ def fake_run(cmd, check=True, capture_output=False, text=False):
1131
+ if capture_output:
1132
+ stdout = ""
1133
+ if cmd[:3] == ["git", "rev-parse", "origin/main"]:
1134
+ stdout = "abc123\n"
1135
+ elif cmd[:4] == ["git", "merge-base", "HEAD", "origin/main"]:
1136
+ stdout = "abc123\n"
1137
+ return sp.CompletedProcess(cmd, 0, stdout=stdout, stderr="")
1138
+ return sp.CompletedProcess(cmd, 0)
1139
+
1140
+ run.side_effect = fake_run
1141
+ _step_promote_build(self.release, {}, Path("rel.log"))
1142
+ run.assert_any_call(["git", "fetch", "origin", "main"], check=True)
1143
+ run.assert_any_call(
1144
+ ["git", "rev-parse", "origin/main"],
1145
+ check=True,
1146
+ capture_output=True,
1147
+ text=True,
1148
+ )
1149
+ run.assert_any_call(
1150
+ ["git", "merge-base", "HEAD", "origin/main"],
1151
+ check=True,
1152
+ capture_output=True,
1153
+ text=True,
1154
+ )
1155
+ run.assert_any_call(["git", "push"], check=True)
1156
+
1157
+ @mock.patch("core.views.subprocess.run")
1158
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1159
+ @mock.patch("core.views.release_utils.promote")
1160
+ def test_promote_aborts_if_origin_advances(self, promote, dump_fixture, run):
1161
+ import subprocess as sp
1162
+
1163
+ def fake_run(cmd, check=True, capture_output=False, text=False):
1164
+ if capture_output:
1165
+ if cmd[:3] == ["git", "rev-parse", "origin/main"]:
1166
+ return sp.CompletedProcess(cmd, 0, stdout="new\n", stderr="")
1167
+ if cmd[:4] == ["git", "merge-base", "HEAD", "origin/main"]:
1168
+ return sp.CompletedProcess(cmd, 0, stdout="old\n", stderr="")
1169
+ return sp.CompletedProcess(cmd, 0, stdout="", stderr="")
1170
+ return sp.CompletedProcess(cmd, 0)
1171
+
1172
+ run.side_effect = fake_run
1173
+
1174
+ with self.assertRaises(Exception):
1175
+ _step_promote_build(self.release, {}, Path("rel.log"))
1176
+
1177
+ promote.assert_not_called()
1178
+ run.assert_any_call(["git", "reset", "--hard"], check=False)
1179
+ run.assert_any_call(["git", "clean", "-fd"], check=False)
1180
+
1181
+ @mock.patch("core.views.subprocess.run")
1182
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1183
+ def test_promote_advances_version(self, dump_fixture, run):
1184
+ import subprocess as sp
1185
+
1186
+ def fake_run(cmd, check=True, capture_output=False, text=False):
1187
+ if capture_output:
1188
+ stdout = ""
1189
+ if cmd[:3] == ["git", "rev-parse", "origin/main"]:
1190
+ stdout = "abc123\n"
1191
+ elif cmd[:4] == ["git", "merge-base", "HEAD", "origin/main"]:
1192
+ stdout = "abc123\n"
1193
+ return sp.CompletedProcess(cmd, 0, stdout=stdout, stderr="")
1194
+ return sp.CompletedProcess(cmd, 0)
1195
+
1196
+ run.side_effect = fake_run
1197
+
1198
+ version_path = Path("VERSION")
1199
+ original = version_path.read_text(encoding="utf-8")
1200
+ version_path.write_text("0.0.1\n", encoding="utf-8")
1201
+
1202
+ def fake_promote(*args, **kwargs):
1203
+ version_path.write_text(self.release.version + "\n", encoding="utf-8")
1204
+
1205
+ with mock.patch("core.views.release_utils.promote", side_effect=fake_promote):
1206
+ _step_promote_build(self.release, {}, Path("rel.log"))
1207
+
1208
+ self.assertEqual(
1209
+ version_path.read_text(encoding="utf-8"),
1210
+ self.release.version + "\n",
1211
+ )
1212
+ version_path.write_text(original, encoding="utf-8")
1213
+
1214
+ @mock.patch("core.views.timezone.now")
1215
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1216
+ @mock.patch("core.views.release_utils.publish")
1217
+ def test_publish_sets_pypi_url(self, publish, dump_fixture, now):
1218
+ now.return_value = datetime(2025, 3, 4, 5, 6, tzinfo=datetime_timezone.utc)
1219
+ publish.return_value = ["PyPI"]
1220
+ _step_publish(self.release, {}, Path("rel.log"))
1221
+ self.release.refresh_from_db()
1222
+ self.assertEqual(
1223
+ self.release.pypi_url,
1224
+ f"https://pypi.org/project/{self.package.name}/{self.release.version}/",
1225
+ )
1226
+ self.assertEqual(self.release.github_url, "")
1227
+ self.assertEqual(
1228
+ self.release.release_on,
1229
+ datetime(2025, 3, 4, 5, 6, tzinfo=datetime_timezone.utc),
1230
+ )
1231
+ dump_fixture.assert_called_once()
1232
+ publish.assert_called_once()
1233
+ kwargs = publish.call_args.kwargs
1234
+ self.assertIn("repositories", kwargs)
1235
+ repositories = kwargs["repositories"]
1236
+ self.assertEqual(len(repositories), 1)
1237
+ self.assertEqual(repositories[0].name, "PyPI")
1238
+
1239
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1240
+ @mock.patch("core.views.release_utils.publish", side_effect=Exception("boom"))
1241
+ def test_publish_failure_keeps_url_blank(self, publish, dump_fixture):
1242
+ with self.assertRaises(Exception):
1243
+ _step_publish(self.release, {}, Path("rel.log"))
1244
+ self.release.refresh_from_db()
1245
+ self.assertEqual(self.release.pypi_url, "")
1246
+ self.assertEqual(self.release.github_url, "")
1247
+ self.assertIsNone(self.release.release_on)
1248
+ dump_fixture.assert_not_called()
1249
+
1250
+ @mock.patch("core.views.timezone.now")
1251
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1252
+ @mock.patch("core.views.release_utils.publish")
1253
+ def test_publish_records_github_url_when_configured(
1254
+ self, publish, dump_fixture, now
1255
+ ):
1256
+ now.return_value = datetime(2025, 3, 4, 6, 7, tzinfo=datetime_timezone.utc)
1257
+ user = User.objects.create_superuser("release-owner", "owner@example.com", "pw")
1258
+ manager = ReleaseManager.objects.create(
1259
+ user=user,
1260
+ pypi_username="octocat",
1261
+ pypi_token="primary-token",
1262
+ github_token="gh-token",
1263
+ secondary_pypi_url="https://upload.github.com/pypi/",
1264
+ )
1265
+ self.release.release_manager = manager
1266
+ self.release.save(update_fields=["release_manager"])
1267
+ self.package.repository_url = "https://github.com/example/project"
1268
+ self.package.save(update_fields=["repository_url"])
1269
+ publish.return_value = ["PyPI", "GitHub Packages"]
1270
+
1271
+ _step_publish(self.release, {}, Path("rel.log"))
1272
+
1273
+ self.release.refresh_from_db()
1274
+ self.assertTrue(self.release.github_url)
1275
+ self.assertIn("github.com/example/project", self.release.github_url)
1276
+ args, kwargs = publish.call_args
1277
+ repositories = kwargs.get("repositories")
1278
+ self.assertEqual(len(repositories), 2)
1279
+ self.assertEqual(repositories[0].name, "PyPI")
1280
+ self.assertEqual(repositories[1].name, "GitHub Packages")
1281
+
1282
+ @mock.patch("core.views.subprocess.run")
1283
+ @mock.patch("core.views._sync_with_origin_main")
1284
+ def test_pre_release_actions_skipped_in_dry_run(self, sync_main, run):
1285
+ log_path = Path("rel.log")
1286
+ if log_path.exists():
1287
+ log_path.unlink()
1288
+
1289
+ try:
1290
+ _step_pre_release_actions(self.release, {"dry_run": True}, log_path)
1291
+ self.assertTrue(log_path.exists())
1292
+ contents = log_path.read_text(encoding="utf-8")
1293
+ self.assertIn("Dry run: skipping pre-release actions", contents)
1294
+ finally:
1295
+ if log_path.exists():
1296
+ log_path.unlink()
1297
+
1298
+ sync_main.assert_not_called()
1299
+ run.assert_not_called()
1300
+
1301
+ @mock.patch("core.views.release_utils.promote")
1302
+ def test_promote_build_skipped_in_dry_run(self, promote):
1303
+ log_path = Path("rel.log")
1304
+ if log_path.exists():
1305
+ log_path.unlink()
1306
+
1307
+ try:
1308
+ _step_promote_build(self.release, {"dry_run": True}, log_path)
1309
+ self.assertTrue(log_path.exists())
1310
+ contents = log_path.read_text(encoding="utf-8")
1311
+ self.assertIn("Dry run: skipping build promotion", contents)
1312
+ finally:
1313
+ if log_path.exists():
1314
+ log_path.unlink()
1315
+
1316
+ promote.assert_not_called()
1317
+
1318
+ @mock.patch("core.views.release_utils.publish")
1319
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1320
+ def test_publish_uses_test_repository_in_dry_run(self, dump_fixture, publish):
1321
+ log_path = Path("rel.log")
1322
+ if log_path.exists():
1323
+ log_path.unlink()
1324
+
1325
+ publish.return_value = ["Test PyPI"]
1326
+ env = {
1327
+ "PYPI_TEST_REPOSITORY_URL": "https://test.example/simple/",
1328
+ "PYPI_TEST_API_TOKEN": "token",
1329
+ }
1330
+
1331
+ with mock.patch.dict(os.environ, env, clear=False):
1332
+ _step_publish(self.release, {"dry_run": True}, log_path)
1333
+
1334
+ self.release.refresh_from_db()
1335
+ self.assertEqual(self.release.pypi_url, "")
1336
+ self.assertEqual(self.release.github_url, "")
1337
+ self.assertIsNone(self.release.release_on)
1338
+ dump_fixture.assert_not_called()
1339
+ publish.assert_called_once()
1340
+ repositories = publish.call_args.kwargs["repositories"]
1341
+ self.assertEqual(len(repositories), 1)
1342
+ target = repositories[0]
1343
+ self.assertEqual(target.name, "Test PyPI")
1344
+ self.assertEqual(target.repository_url, "https://test.example/simple/")
1345
+ self.assertFalse(target.verify_availability)
1346
+ self.assertTrue(log_path.exists())
1347
+ contents = log_path.read_text(encoding="utf-8")
1348
+ self.assertIn("Dry run: uploading distribution", contents)
1349
+ self.assertIn("Dry run: skipped release metadata updates", contents)
1350
+ log_path.unlink(missing_ok=True)
1351
+
1352
+ def test_release_progress_toggle_dry_run_before_start(self):
1353
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1354
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1355
+ self.client.force_login(user)
1356
+
1357
+ response = self.client.get(f"{url}?set_dry_run=1&dry_run=1", follow=True)
1358
+
1359
+ self.assertEqual(response.status_code, 200)
1360
+ context = response.context
1361
+ if isinstance(context, list):
1362
+ context = context[-1]
1363
+ self.assertTrue(context["dry_run"])
1364
+ self.assertTrue(context["dry_run_toggle_enabled"])
1365
+ session = self.client.session
1366
+ ctx = session.get(f"release_publish_{self.release.pk}")
1367
+ self.assertTrue(ctx.get("dry_run"))
1368
+
1369
+ def test_release_progress_toggle_blocked_while_running(self):
1370
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1371
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1372
+ self.client.force_login(user)
1373
+ session = self.client.session
1374
+ session[f"release_publish_{self.release.pk}"] = {
1375
+ "step": 0,
1376
+ "started": True,
1377
+ "paused": False,
1378
+ }
1379
+ session.save()
1380
+
1381
+ response = self.client.get(f"{url}?set_dry_run=1&dry_run=1")
1382
+ self.assertEqual(response.status_code, 302)
1383
+ session = self.client.session
1384
+ ctx = session.get(f"release_publish_{self.release.pk}")
1385
+ self.assertFalse(ctx.get("dry_run"))
1386
+
1387
+ follow = self.client.get(url)
1388
+ follow_context = follow.context
1389
+ if isinstance(follow_context, list):
1390
+ follow_context = follow_context[-1]
1391
+ self.assertFalse(follow_context["dry_run"])
1392
+ self.assertFalse(follow_context["dry_run_toggle_enabled"])
1393
+
1394
+ def test_start_request_sets_dry_run_flag(self):
1395
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1396
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1397
+ self.client.force_login(user)
1398
+
1399
+ self.client.get(f"{url}?start=1&dry_run=1")
1400
+
1401
+ session = self.client.session
1402
+ ctx = session.get(f"release_publish_{self.release.pk}")
1403
+ self.assertTrue(ctx.get("dry_run"))
1404
+
1405
+ def test_new_todo_does_not_reset_pending_flow(self):
1406
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1407
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1408
+ Todo.objects.create(request="Initial checklist item")
1409
+ steps = [("Confirm release TODO completion", core_views._step_check_todos)]
1410
+ with mock.patch("core.views.PUBLISH_STEPS", steps):
1411
+ self.client.force_login(user)
1412
+ response = self.client.get(url)
1413
+ self.assertTrue(response.context["has_pending_todos"])
1414
+ self.client.get(f"{url}?ack_todos=1")
1415
+ self.client.get(f"{url}?start=1")
1416
+ self.client.get(f"{url}?step=0")
1417
+ Todo.objects.create(request="Follow-up checklist item")
1418
+ response = self.client.get(url)
1419
+ self.assertEqual(
1420
+ Todo.objects.filter(is_deleted=False, done_on__isnull=True).count(),
1421
+ 1,
1422
+ )
1423
+ self.assertIsNone(response.context["todos"])
1424
+ self.assertFalse(response.context["has_pending_todos"])
1425
+ session = self.client.session
1426
+ ctx = session.get(f"release_publish_{self.release.pk}")
1427
+ self.assertTrue(ctx.get("todos_ack"))
1428
+
1429
+ def test_release_progress_uses_lockfile(self):
1430
+ run = []
1431
+
1432
+ def step1(release, ctx, log_path):
1433
+ run.append("step1")
1434
+
1435
+ def step2(release, ctx, log_path):
1436
+ run.append("step2")
1437
+
1438
+ steps = [("One", step1), ("Two", step2)]
1439
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1440
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1441
+ with mock.patch("core.views.PUBLISH_STEPS", steps):
1442
+ self.client.force_login(user)
1443
+ self.client.get(f"{url}?step=0")
1444
+ self.assertEqual(run, ["step1"])
1445
+ client2 = Client()
1446
+ client2.force_login(user)
1447
+ client2.get(f"{url}?step=1")
1448
+ self.assertEqual(run, ["step1", "step2"])
1449
+ lock_file = Path("locks") / f"release_publish_{self.release.pk}.json"
1450
+ self.assertFalse(lock_file.exists())
1451
+
1452
+ def test_release_progress_restart(self):
1453
+ run = []
1454
+
1455
+ def step_fail(release, ctx, log_path):
1456
+ run.append("step")
1457
+ raise Exception("boom")
1458
+
1459
+ steps = [("Fail", step_fail)]
1460
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1461
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1462
+ count_file = Path("locks") / f"release_publish_{self.release.pk}.restarts"
1463
+ if count_file.exists():
1464
+ count_file.unlink()
1465
+ with mock.patch("core.views.PUBLISH_STEPS", steps):
1466
+ self.client.force_login(user)
1467
+ self.assertFalse(count_file.exists())
1468
+ self.client.get(f"{url}?step=0")
1469
+ self.client.get(f"{url}?step=0")
1470
+ self.assertEqual(run, ["step"])
1471
+ self.assertFalse(count_file.exists())
1472
+ self.client.get(f"{url}?restart=1")
1473
+ self.assertTrue(count_file.exists())
1474
+ self.assertEqual(count_file.read_text(), "1")
1475
+ self.client.get(f"{url}?step=0")
1476
+ self.assertEqual(run, ["step", "step"])
1477
+ self.client.get(f"{url}?restart=1")
1478
+ # Restart counter resets after running a step
1479
+ self.assertEqual(count_file.read_text(), "1")
1480
+
1481
+
1482
+ class ReleaseProgressSyncTests(TestCase):
1483
+ def setUp(self):
1484
+ self.client = Client()
1485
+ self.user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1486
+ self.client.force_login(self.user)
1487
+ self.package = Package.objects.get(name="arthexis")
1488
+ self.version_path = Path("VERSION")
1489
+ self.original_version = self.version_path.read_text(encoding="utf-8")
1490
+ self.version_path.write_text("1.2.3", encoding="utf-8")
1491
+
1492
+ def tearDown(self):
1493
+ self.version_path.write_text(self.original_version, encoding="utf-8")
1494
+
1495
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1496
+ @mock.patch("core.views.revision.get_revision", return_value="abc123")
1497
+ def test_unpublished_release_syncs_version_and_revision(
1498
+ self, get_revision, dump_fixture
1499
+ ):
1500
+ release = PackageRelease.objects.create(
1501
+ package=self.package,
1502
+ version="1.0.0",
1503
+ )
1504
+ release.revision = "oldrev"
1505
+ release.save(update_fields=["revision"])
1506
+
1507
+ url = reverse("release-progress", args=[release.pk, "publish"])
1508
+ response = self.client.get(url)
1509
+
1510
+ self.assertEqual(response.status_code, 200)
1511
+ release.refresh_from_db()
1512
+ self.assertEqual(release.version, "1.2.4")
1513
+ self.assertEqual(release.revision, "abc123")
1514
+ dump_fixture.assert_called_once()
1515
+
1516
+ def test_published_release_not_current_returns_404(self):
1517
+ release = PackageRelease.objects.create(
1518
+ package=self.package,
1519
+ version="1.2.4",
1520
+ pypi_url="https://example.com",
1521
+ )
1522
+
1523
+ url = reverse("release-progress", args=[release.pk, "publish"])
1524
+ response = self.client.get(url)
1525
+
1526
+ self.assertEqual(response.status_code, 404)
1527
+
1528
+
1529
+ class ReleaseProgressFixtureVisibilityTests(TestCase):
1530
+ def setUp(self):
1531
+ self.client = Client()
1532
+ self.user = User.objects.create_superuser(
1533
+ "fixture-check", "fixture@example.com", "pw"
1534
+ )
1535
+ self.client.force_login(self.user)
1536
+ current_version = Path("VERSION").read_text(encoding="utf-8").strip()
1537
+ package = Package.objects.filter(is_active=True).first()
1538
+ if package is None:
1539
+ package = Package.objects.create(name="fixturepkg", is_active=True)
1540
+ try:
1541
+ self.release = PackageRelease.objects.get(
1542
+ package=package, version=current_version
1543
+ )
1544
+ except PackageRelease.DoesNotExist:
1545
+ self.release = PackageRelease.objects.create(
1546
+ package=package, version=current_version
1547
+ )
1548
+ self.session_key = f"release_publish_{self.release.pk}"
1549
+ self.log_name = core_views._release_log_name(
1550
+ self.release.package.name, self.release.version
1551
+ )
1552
+ self.lock_path = Path("locks") / f"{self.session_key}.json"
1553
+ self.restart_path = Path("locks") / f"{self.session_key}.restarts"
1554
+ self.log_path = Path("logs") / self.log_name
1555
+ for path in (self.lock_path, self.restart_path, self.log_path):
1556
+ if path.exists():
1557
+ path.unlink()
1558
+ try:
1559
+ self.fixture_step_index = next(
1560
+ idx
1561
+ for idx, (name, _) in enumerate(core_views.PUBLISH_STEPS)
1562
+ if name == core_views.FIXTURE_REVIEW_STEP_NAME
1563
+ )
1564
+ except StopIteration: # pragma: no cover - defensive guard
1565
+ self.fail("Fixture review step not configured in publish steps")
1566
+ self.url = reverse("release-progress", args=[self.release.pk, "publish"])
1567
+
1568
+ def tearDown(self):
1569
+ session = self.client.session
1570
+ if self.session_key in session:
1571
+ session.pop(self.session_key)
1572
+ session.save()
1573
+ for path in (self.lock_path, self.restart_path, self.log_path):
1574
+ if path.exists():
1575
+ path.unlink()
1576
+ super().tearDown()
1577
+
1578
+ def _set_session(self, step: int, fixtures: list[dict]):
1579
+ session = self.client.session
1580
+ session[self.session_key] = {
1581
+ "step": step,
1582
+ "fixtures": fixtures,
1583
+ "log": self.log_name,
1584
+ "started": True,
1585
+ }
1586
+ session.save()
1587
+
1588
+ def test_fixture_summary_visible_until_migration_step(self):
1589
+ fixtures = [
1590
+ {
1591
+ "path": "core/fixtures/example.json",
1592
+ "count": 2,
1593
+ "models": ["core.Model"],
1594
+ }
1595
+ ]
1596
+ self._set_session(self.fixture_step_index, fixtures)
1597
+ response = self.client.get(self.url)
1598
+ self.assertEqual(response.status_code, 200)
1599
+ self.assertEqual(response.context["fixtures"], fixtures)
1600
+ self.assertContains(response, "Fixture changes")
1601
+
1602
+ def test_fixture_summary_hidden_after_migration_step(self):
1603
+ fixtures = [
1604
+ {
1605
+ "path": "core/fixtures/example.json",
1606
+ "count": 2,
1607
+ "models": ["core.Model"],
1608
+ }
1609
+ ]
1610
+ self._set_session(self.fixture_step_index + 1, fixtures)
1611
+ response = self.client.get(self.url)
1612
+ self.assertEqual(response.status_code, 200)
1613
+ self.assertIsNone(response.context["fixtures"])
1614
+ self.assertNotContains(response, "Fixture changes")
1615
+
1616
+
1617
+ class PackageReleaseAdminActionTests(TestCase):
1618
+ def setUp(self):
1619
+ self.factory = RequestFactory()
1620
+ self.site = AdminSite()
1621
+ self.admin = PackageReleaseAdmin(PackageRelease, self.site)
1622
+ self.messages = []
1623
+
1624
+ def _capture_message(request, message, level=messages.INFO):
1625
+ self.messages.append((message, level))
1626
+
1627
+ self.admin.message_user = _capture_message
1628
+ self.package = Package.objects.create(name="pkg")
1629
+ self.package.is_active = True
1630
+ self.package.save(update_fields=["is_active"])
1631
+ self.release = PackageRelease.objects.create(
1632
+ package=self.package,
1633
+ version="1.0.0",
1634
+ pypi_url="https://pypi.org/project/pkg/1.0.0/",
1635
+ )
1636
+ self.request = self.factory.get("/")
1637
+
1638
+ @mock.patch("core.admin.PackageRelease.dump_fixture")
1639
+ @mock.patch("core.admin.requests.get")
1640
+ def test_validate_deletes_missing_release(self, mock_get, dump):
1641
+ mock_get.return_value.status_code = 404
1642
+ self.admin.validate_releases(self.request, PackageRelease.objects.all())
1643
+ self.assertEqual(PackageRelease.objects.count(), 0)
1644
+ dump.assert_called_once()
1645
+
1646
+ @mock.patch("core.admin.PackageRelease.dump_fixture")
1647
+ @mock.patch("core.admin.requests.get")
1648
+ def test_validate_keeps_existing_release(self, mock_get, dump):
1649
+ mock_get.return_value.status_code = 200
1650
+ self.admin.validate_releases(self.request, PackageRelease.objects.all())
1651
+ self.assertEqual(PackageRelease.objects.count(), 1)
1652
+ dump.assert_not_called()
1653
+
1654
+ @mock.patch("core.admin.PackageRelease.dump_fixture")
1655
+ @mock.patch("core.admin.requests.get")
1656
+ def test_refresh_from_pypi_creates_releases(self, mock_get, dump):
1657
+ mock_get.return_value.raise_for_status.return_value = None
1658
+ mock_get.return_value.json.return_value = {
1659
+ "releases": {
1660
+ "1.0.0": [
1661
+ {"upload_time_iso_8601": "2024-01-01T12:30:00.000000Z"}
1662
+ ],
1663
+ "1.1.0": [
1664
+ {"upload_time_iso_8601": "2024-02-02T15:45:00.000000Z"}
1665
+ ],
1666
+ }
1667
+ }
1668
+ self.admin.refresh_from_pypi(self.request, PackageRelease.objects.none())
1669
+ new_release = PackageRelease.objects.get(version="1.1.0")
1670
+ self.assertEqual(new_release.revision, "")
1671
+ self.assertEqual(
1672
+ new_release.release_on,
1673
+ datetime(2024, 2, 2, 15, 45, tzinfo=datetime_timezone.utc),
1674
+ )
1675
+ dump.assert_called_once()
1676
+
1677
+ @mock.patch("core.admin.PackageRelease.dump_fixture")
1678
+ @mock.patch("core.admin.requests.get")
1679
+ def test_refresh_from_pypi_updates_release_date(self, mock_get, dump):
1680
+ self.release.release_on = None
1681
+ self.release.save(update_fields=["release_on"])
1682
+ mock_get.return_value.raise_for_status.return_value = None
1683
+ mock_get.return_value.json.return_value = {
1684
+ "releases": {
1685
+ "1.0.0": [
1686
+ {"upload_time_iso_8601": "2024-01-01T12:30:00.000000Z"}
1687
+ ]
1688
+ }
1689
+ }
1690
+ self.admin.refresh_from_pypi(self.request, PackageRelease.objects.none())
1691
+ self.release.refresh_from_db()
1692
+ self.assertEqual(
1693
+ self.release.release_on,
1694
+ datetime(2024, 1, 1, 12, 30, tzinfo=datetime_timezone.utc),
1695
+ )
1696
+ dump.assert_called_once()
1697
+
1698
+ @mock.patch("core.admin.PackageRelease.dump_fixture")
1699
+ @mock.patch("core.admin.requests.get")
1700
+ def test_refresh_from_pypi_restores_deleted_release(self, mock_get, dump):
1701
+ self.release.is_deleted = True
1702
+ self.release.save(update_fields=["is_deleted"])
1703
+ mock_get.return_value.raise_for_status.return_value = None
1704
+ mock_get.return_value.json.return_value = {
1705
+ "releases": {
1706
+ "1.0.0": [
1707
+ {"upload_time_iso_8601": "2024-01-01T12:30:00.000000Z"}
1708
+ ]
1709
+ }
1710
+ }
1711
+
1712
+ self.admin.refresh_from_pypi(self.request, PackageRelease.objects.none())
1713
+
1714
+ self.assertTrue(
1715
+ PackageRelease.objects.filter(version="1.0.0").exists()
1716
+ )
1717
+ dump.assert_called_once()
1718
+
1719
+ @mock.patch("core.admin.release_utils.check_pypi_readiness")
1720
+ def test_test_pypi_connection_action_reports_messages(self, check):
1721
+ check.return_value = types.SimpleNamespace(
1722
+ ok=True,
1723
+ messages=[
1724
+ ("success", "Twine available"),
1725
+ ("warning", "Offline mode enabled; skipping network connectivity checks"),
1726
+ ],
1727
+ )
1728
+
1729
+ self.admin.test_pypi_connection(
1730
+ self.request, PackageRelease.objects.filter(pk=self.release.pk)
1731
+ )
1732
+
1733
+ self.assertIn(
1734
+ (f"{self.release}: Twine available", messages.SUCCESS),
1735
+ self.messages,
1736
+ )
1737
+ self.assertIn(
1738
+ (
1739
+ f"{self.release}: Offline mode enabled; skipping network connectivity checks",
1740
+ messages.WARNING,
1741
+ ),
1742
+ self.messages,
1743
+ )
1744
+ self.assertIn(
1745
+ (f"{self.release}: PyPI connectivity check passed", messages.SUCCESS),
1746
+ self.messages,
1747
+ )
1748
+
1749
+ @mock.patch("core.admin.release_utils.check_pypi_readiness")
1750
+ def test_test_pypi_connection_handles_errors(self, check):
1751
+ check.return_value = types.SimpleNamespace(
1752
+ ok=False, messages=[("error", "Missing PyPI credentials")]
1753
+ )
1754
+
1755
+ self.admin.test_pypi_connection(
1756
+ self.request, PackageRelease.objects.filter(pk=self.release.pk)
1757
+ )
1758
+
1759
+ self.assertIn(
1760
+ (f"{self.release}: Missing PyPI credentials", messages.ERROR),
1761
+ self.messages,
1762
+ )
1763
+ self.assertNotIn(
1764
+ (f"{self.release}: PyPI connectivity check passed", messages.SUCCESS),
1765
+ self.messages,
1766
+ )
1767
+
1768
+ @mock.patch("core.admin.release_utils.check_pypi_readiness")
1769
+ def test_test_pypi_connection_action_button(self, check):
1770
+ check.return_value = types.SimpleNamespace(
1771
+ ok=True, messages=[("success", "Twine available")]
1772
+ )
1773
+
1774
+ self.admin.test_pypi_connection_action(self.request, self.release)
1775
+
1776
+ self.assertIn(
1777
+ (f"{self.release}: PyPI connectivity check passed", messages.SUCCESS),
1778
+ self.messages,
1779
+ )
1780
+
1781
+ def test_test_pypi_connection_requires_selection(self):
1782
+ self.admin.test_pypi_connection(self.request, PackageRelease.objects.none())
1783
+
1784
+ self.assertIn(
1785
+ ("Select at least one release to test", messages.ERROR), self.messages
1786
+ )
1787
+
1788
+
1789
+ class PackageActiveTests(TestCase):
1790
+ def test_only_one_active_package(self):
1791
+ default = Package.objects.get(name="arthexis")
1792
+ self.assertTrue(default.is_active)
1793
+ other = Package.objects.create(name="pkg", is_active=True)
1794
+ default.refresh_from_db()
1795
+ other.refresh_from_db()
1796
+ self.assertFalse(default.is_active)
1797
+ self.assertTrue(other.is_active)
1798
+
1799
+
1800
+ class PackageReleaseCurrentTests(TestCase):
1801
+ def setUp(self):
1802
+ self.package = Package.objects.get(name="arthexis")
1803
+ self.version_path = Path("VERSION")
1804
+ self.original = self.version_path.read_text()
1805
+ self.version_path.write_text("1.0.0")
1806
+ self.release = PackageRelease.objects.create(
1807
+ package=self.package, version="1.0.0"
1808
+ )
1809
+
1810
+ def tearDown(self):
1811
+ self.version_path.write_text(self.original)
1812
+
1813
+ def test_is_current_true_when_version_matches_and_package_active(self):
1814
+ self.assertTrue(self.release.is_current)
1815
+
1816
+ def test_is_current_false_when_package_inactive(self):
1817
+ self.package.is_active = False
1818
+ self.package.save()
1819
+ self.assertFalse(self.release.is_current)
1820
+
1821
+ def test_is_current_false_when_version_differs(self):
1822
+ self.release.version = "2.0.0"
1823
+ self.release.save()
1824
+ self.assertFalse(self.release.is_current)
1825
+
1826
+
1827
+ class PackageReleaseChangelistTests(TestCase):
1828
+ def setUp(self):
1829
+ self.client = Client()
1830
+ User.objects.create_superuser("admin", "admin@example.com", "pw")
1831
+ self.client.force_login(User.objects.get(username="admin"))
1832
+
1833
+ def test_prepare_next_release_button_present(self):
1834
+ response = self.client.get(reverse("admin:core_packagerelease_changelist"))
1835
+ prepare_url = reverse(
1836
+ "admin:core_packagerelease_actions", args=["prepare_next_release"]
1837
+ )
1838
+ self.assertContains(response, prepare_url, html=False)
1839
+
1840
+ def test_refresh_from_pypi_button_present(self):
1841
+ response = self.client.get(reverse("admin:core_packagerelease_changelist"))
1842
+ refresh_url = reverse(
1843
+ "admin:core_packagerelease_actions", args=["refresh_from_pypi"]
1844
+ )
1845
+ self.assertContains(response, refresh_url, html=False)
1846
+
1847
+ def test_prepare_next_release_action_creates_release(self):
1848
+ package = Package.objects.get(name="arthexis")
1849
+ PackageRelease.all_objects.filter(package=package).delete()
1850
+ response = self.client.post(
1851
+ reverse(
1852
+ "admin:core_packagerelease_actions", args=["prepare_next_release"]
1853
+ )
1854
+ )
1855
+ self.assertEqual(response.status_code, 302)
1856
+ self.assertTrue(
1857
+ PackageRelease.all_objects.filter(package=package).exists()
1858
+ )
1859
+
1860
+
1861
+ class PackageAdminPrepareNextReleaseTests(TestCase):
1862
+ def setUp(self):
1863
+ self.factory = RequestFactory()
1864
+ self.site = AdminSite()
1865
+ self.admin = PackageAdmin(Package, self.site)
1866
+ self.admin.message_user = lambda *args, **kwargs: None
1867
+ self.package = Package.objects.get(name="arthexis")
1868
+
1869
+ def test_prepare_next_release_active_creates_release(self):
1870
+ PackageRelease.all_objects.filter(package=self.package).delete()
1871
+ request = self.factory.get("/admin/core/package/prepare-next-release/")
1872
+ response = self.admin.prepare_next_release_active(request)
1873
+ self.assertEqual(response.status_code, 302)
1874
+ self.assertEqual(
1875
+ PackageRelease.all_objects.filter(package=self.package).count(), 1
1876
+ )
1877
+
1878
+
1879
+ class PackageAdminChangeViewTests(TestCase):
1880
+ def setUp(self):
1881
+ self.client = Client()
1882
+ User.objects.create_superuser("admin", "admin@example.com", "pw")
1883
+ self.client.force_login(User.objects.get(username="admin"))
1884
+ self.package = Package.objects.get(name="arthexis")
1885
+
1886
+ def test_prepare_next_release_button_visible_on_change_view(self):
1887
+ response = self.client.get(
1888
+ reverse("admin:core_package_change", args=[self.package.pk])
1889
+ )
1890
+ self.assertContains(response, "Prepare next Release")
1891
+
1892
+
1893
+ class TodoDoneTests(TestCase):
1894
+ def setUp(self):
1895
+ self.client = Client()
1896
+ User.objects.create_superuser("admin", "admin@example.com", "pw")
1897
+ self.client.force_login(User.objects.get(username="admin"))
1898
+
1899
+ def test_mark_done_sets_timestamp(self):
1900
+ todo = Todo.objects.create(request="Task", is_seed_data=True)
1901
+ resp = self.client.post(reverse("todo-done", args=[todo.pk]))
1902
+ self.assertRedirects(resp, reverse("admin:index"))
1903
+ todo.refresh_from_db()
1904
+ self.assertIsNotNone(todo.done_on)
1905
+ self.assertFalse(todo.is_deleted)
1906
+
1907
+ def test_mark_done_missing_task_refreshes(self):
1908
+ todo = Todo.objects.create(request="Task", is_seed_data=True)
1909
+ todo.delete()
1910
+ resp = self.client.post(reverse("todo-done", args=[todo.pk]))
1911
+ self.assertRedirects(resp, reverse("admin:index"))
1912
+ messages = [m.message for m in get_messages(resp.wsgi_request)]
1913
+ self.assertFalse(messages)
1914
+
1915
+ def test_mark_done_condition_failure_shows_message(self):
1916
+ todo = Todo.objects.create(
1917
+ request="Task",
1918
+ on_done_condition="1 = 0",
1919
+ )
1920
+ resp = self.client.post(reverse("todo-done", args=[todo.pk]))
1921
+ self.assertRedirects(resp, reverse("admin:index"))
1922
+ messages = [m.message for m in get_messages(resp.wsgi_request)]
1923
+ self.assertTrue(messages)
1924
+ self.assertIn("1 = 0", messages[0])
1925
+ todo.refresh_from_db()
1926
+ self.assertIsNone(todo.done_on)
1927
+
1928
+ def test_mark_done_condition_invalid_expression(self):
1929
+ todo = Todo.objects.create(
1930
+ request="Task",
1931
+ on_done_condition="1; SELECT 1",
1932
+ )
1933
+ resp = self.client.post(reverse("todo-done", args=[todo.pk]))
1934
+ self.assertRedirects(resp, reverse("admin:index"))
1935
+ messages = [m.message for m in get_messages(resp.wsgi_request)]
1936
+ self.assertTrue(messages)
1937
+ self.assertIn("Semicolons", messages[0])
1938
+ todo.refresh_from_db()
1939
+ self.assertIsNone(todo.done_on)
1940
+
1941
+ def test_mark_done_condition_resolves_sigils(self):
1942
+ todo = Todo.objects.create(
1943
+ request="Task",
1944
+ on_done_condition="[TEST]",
1945
+ )
1946
+ with mock.patch.object(Todo, "resolve_sigils", return_value="1 = 1") as resolver:
1947
+ resp = self.client.post(reverse("todo-done", args=[todo.pk]))
1948
+ self.assertRedirects(resp, reverse("admin:index"))
1949
+ resolver.assert_called_once_with("on_done_condition")
1950
+ todo.refresh_from_db()
1951
+ self.assertIsNotNone(todo.done_on)
1952
+
1953
+ def test_mark_done_respects_next_parameter(self):
1954
+ todo = Todo.objects.create(request="Task")
1955
+ next_url = reverse("admin:index") + "?section=todos"
1956
+ resp = self.client.post(
1957
+ reverse("todo-done", args=[todo.pk]),
1958
+ {"next": next_url},
1959
+ )
1960
+ self.assertRedirects(resp, next_url, target_status_code=200)
1961
+ todo.refresh_from_db()
1962
+ self.assertIsNotNone(todo.done_on)
1963
+
1964
+ def test_mark_done_rejects_external_next(self):
1965
+ todo = Todo.objects.create(request="Task")
1966
+ resp = self.client.post(
1967
+ reverse("todo-done", args=[todo.pk]),
1968
+ {"next": "https://example.com/"},
1969
+ )
1970
+ self.assertRedirects(resp, reverse("admin:index"))
1971
+ todo.refresh_from_db()
1972
+ self.assertIsNotNone(todo.done_on)
1973
+
1974
+
1975
+ class TodoFocusViewTests(TestCase):
1976
+ def setUp(self):
1977
+ self.client = Client()
1978
+ User.objects.create_superuser("admin", "admin@example.com", "pw")
1979
+ self.client.force_login(User.objects.get(username="admin"))
1980
+
1981
+ def test_focus_view_renders_requested_page(self):
1982
+ todo = Todo.objects.create(request="Task", url="/docs/")
1983
+ next_url = reverse("admin:index")
1984
+ resp = self.client.get(
1985
+ f"{reverse('todo-focus', args=[todo.pk])}?next={quote(next_url)}"
1986
+ )
1987
+ self.assertEqual(resp.status_code, 200)
1988
+ self.assertContains(resp, todo.request)
1989
+ self.assertEqual(resp["X-Frame-Options"], "SAMEORIGIN")
1990
+ self.assertContains(resp, f'src="{todo.url}"')
1991
+ self.assertContains(resp, "Done")
1992
+ self.assertContains(resp, "Back")
1993
+
1994
+ def test_focus_view_uses_admin_change_when_no_url(self):
1995
+ todo = Todo.objects.create(request="Task")
1996
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
1997
+ change_url = reverse("admin:core_todo_change", args=[todo.pk])
1998
+ self.assertContains(resp, f'src="{change_url}"')
1999
+
2000
+ def test_focus_view_includes_open_target_button(self):
2001
+ todo = Todo.objects.create(request="Task", url="/docs/")
2002
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2003
+ self.assertContains(resp, 'class="todo-button todo-button-open"')
2004
+ self.assertContains(resp, 'target="_blank"')
2005
+ self.assertContains(resp, 'href="/docs/"')
2006
+
2007
+ def test_focus_view_sanitizes_loopback_absolute_url(self):
2008
+ todo = Todo.objects.create(
2009
+ request="Task",
2010
+ url="http://127.0.0.1:8000/docs/?section=chart",
2011
+ )
2012
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2013
+ self.assertContains(resp, 'src="/docs/?section=chart"')
2014
+
2015
+ def test_focus_view_rejects_external_absolute_url(self):
2016
+ todo = Todo.objects.create(
2017
+ request="Task",
2018
+ url="https://outside.invalid/external/",
2019
+ )
2020
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2021
+ change_url = reverse("admin:core_todo_change", args=[todo.pk])
2022
+ self.assertContains(resp, f'src="{change_url}"')
2023
+
2024
+ def test_focus_view_avoids_recursive_focus_url(self):
2025
+ todo = Todo.objects.create(request="Task")
2026
+ focus_url = reverse("todo-focus", args=[todo.pk])
2027
+ Todo.objects.filter(pk=todo.pk).update(url=focus_url)
2028
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2029
+ change_url = reverse("admin:core_todo_change", args=[todo.pk])
2030
+ self.assertContains(resp, f'src="{change_url}"')
2031
+
2032
+ def test_focus_view_avoids_recursive_focus_absolute_url(self):
2033
+ todo = Todo.objects.create(request="Task")
2034
+ focus_url = reverse("todo-focus", args=[todo.pk])
2035
+ Todo.objects.filter(pk=todo.pk).update(url=f"http://testserver{focus_url}")
2036
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2037
+ change_url = reverse("admin:core_todo_change", args=[todo.pk])
2038
+ self.assertContains(resp, f'src="{change_url}"')
2039
+
2040
+ def test_focus_view_parses_auth_directives(self):
2041
+ todo = Todo.objects.create(
2042
+ request="Task",
2043
+ url="/docs/?section=chart&_todo_auth=logout&_todo_auth=user:demo&_todo_auth=perm:core.view_user&_todo_auth=extra",
2044
+ )
2045
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2046
+ self.assertContains(resp, 'src="/docs/?section=chart"')
2047
+ self.assertContains(resp, 'href="/docs/?section=chart"')
2048
+ self.assertContains(resp, "logged out")
2049
+ self.assertContains(resp, "Sign in using: demo")
2050
+ self.assertContains(resp, "Required permissions: core.view_user")
2051
+ self.assertContains(resp, "Additional authentication notes: extra")
2052
+
2053
+ def test_focus_view_redirects_if_todo_completed(self):
2054
+ todo = Todo.objects.create(request="Task")
2055
+ todo.done_on = timezone.now()
2056
+ todo.save(update_fields=["done_on"])
2057
+ next_url = reverse("admin:index")
2058
+ resp = self.client.get(
2059
+ f"{reverse('todo-focus', args=[todo.pk])}?next={quote(next_url)}"
2060
+ )
2061
+ self.assertRedirects(resp, next_url, target_status_code=200)
2062
+
2063
+
2064
+ class TodoUrlValidationTests(TestCase):
2065
+ def test_relative_url_valid(self):
2066
+ todo = Todo(request="Task", url="/path")
2067
+ todo.full_clean() # should not raise
2068
+
2069
+ def test_absolute_url_invalid(self):
2070
+ todo = Todo(request="Task", url="https://example.com/path")
2071
+ with self.assertRaises(ValidationError):
2072
+ todo.full_clean()
2073
+
2074
+
2075
+ class TodoUniqueTests(TestCase):
2076
+ def test_request_unique_case_insensitive(self):
2077
+ Todo.objects.create(request="Task")
2078
+ with self.assertRaises(IntegrityError):
2079
+ Todo.objects.create(request="task")
2080
+
2081
+
2082
+ class TodoAdminPermissionTests(TestCase):
2083
+ def setUp(self):
2084
+ self.client = Client()
2085
+ User.objects.create_superuser("admin", "admin@example.com", "pw")
2086
+ self.client.force_login(User.objects.get(username="admin"))
2087
+
2088
+ def test_add_view_disallowed(self):
2089
+ resp = self.client.get(reverse("admin:core_todo_add"))
2090
+ self.assertEqual(resp.status_code, 403)
2091
+
2092
+ def test_change_form_loads(self):
2093
+ todo = Todo.objects.create(request="Task")
2094
+ resp = self.client.get(reverse("admin:core_todo_change", args=[todo.pk]))
2095
+ self.assertEqual(resp.status_code, 200)