arthexis 0.1.9__py3-none-any.whl → 0.1.26__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of arthexis might be problematic. Click here for more details.

Files changed (112) hide show
  1. arthexis-0.1.26.dist-info/METADATA +272 -0
  2. arthexis-0.1.26.dist-info/RECORD +111 -0
  3. {arthexis-0.1.9.dist-info → arthexis-0.1.26.dist-info}/licenses/LICENSE +674 -674
  4. config/__init__.py +5 -5
  5. config/active_app.py +15 -15
  6. config/asgi.py +29 -29
  7. config/auth_app.py +7 -7
  8. config/celery.py +32 -25
  9. config/context_processors.py +67 -68
  10. config/horologia_app.py +7 -7
  11. config/loadenv.py +11 -11
  12. config/logging.py +59 -48
  13. config/middleware.py +71 -25
  14. config/offline.py +49 -49
  15. config/settings.py +676 -492
  16. config/settings_helpers.py +109 -0
  17. config/urls.py +228 -159
  18. config/wsgi.py +17 -17
  19. core/admin.py +4052 -2066
  20. core/admin_history.py +50 -50
  21. core/admindocs.py +192 -151
  22. core/apps.py +350 -223
  23. core/auto_upgrade.py +72 -0
  24. core/backends.py +311 -124
  25. core/changelog.py +403 -0
  26. core/entity.py +149 -133
  27. core/environment.py +60 -43
  28. core/fields.py +168 -75
  29. core/form_fields.py +75 -0
  30. core/github_helper.py +188 -25
  31. core/github_issues.py +183 -172
  32. core/github_repos.py +72 -0
  33. core/lcd_screen.py +78 -78
  34. core/liveupdate.py +25 -25
  35. core/log_paths.py +114 -100
  36. core/mailer.py +89 -83
  37. core/middleware.py +91 -91
  38. core/models.py +5041 -2195
  39. core/notifications.py +105 -105
  40. core/public_wifi.py +267 -227
  41. core/reference_utils.py +107 -0
  42. core/release.py +940 -346
  43. core/rfid_import_export.py +113 -0
  44. core/sigil_builder.py +149 -131
  45. core/sigil_context.py +20 -20
  46. core/sigil_resolver.py +250 -284
  47. core/system.py +1425 -230
  48. core/tasks.py +538 -199
  49. core/temp_passwords.py +181 -0
  50. core/test_system_info.py +202 -43
  51. core/tests.py +2673 -1069
  52. core/tests_liveupdate.py +17 -17
  53. core/urls.py +11 -11
  54. core/user_data.py +681 -495
  55. core/views.py +2484 -789
  56. core/widgets.py +213 -51
  57. nodes/admin.py +2236 -445
  58. nodes/apps.py +98 -70
  59. nodes/backends.py +160 -53
  60. nodes/dns.py +203 -0
  61. nodes/feature_checks.py +133 -0
  62. nodes/lcd.py +165 -165
  63. nodes/models.py +2375 -870
  64. nodes/reports.py +411 -0
  65. nodes/rfid_sync.py +210 -0
  66. nodes/signals.py +18 -0
  67. nodes/tasks.py +141 -46
  68. nodes/tests.py +5045 -1489
  69. nodes/urls.py +29 -13
  70. nodes/utils.py +172 -73
  71. nodes/views.py +1768 -304
  72. ocpp/admin.py +1775 -481
  73. ocpp/apps.py +25 -25
  74. ocpp/consumers.py +1843 -630
  75. ocpp/evcs.py +844 -928
  76. ocpp/evcs_discovery.py +158 -0
  77. ocpp/models.py +1417 -640
  78. ocpp/network.py +398 -0
  79. ocpp/reference_utils.py +42 -0
  80. ocpp/routing.py +11 -9
  81. ocpp/simulator.py +745 -368
  82. ocpp/status_display.py +26 -0
  83. ocpp/store.py +603 -403
  84. ocpp/tasks.py +479 -31
  85. ocpp/test_export_import.py +131 -130
  86. ocpp/test_rfid.py +1072 -540
  87. ocpp/tests.py +5494 -2296
  88. ocpp/transactions_io.py +197 -165
  89. ocpp/urls.py +50 -50
  90. ocpp/views.py +2024 -912
  91. pages/admin.py +1123 -396
  92. pages/apps.py +45 -10
  93. pages/checks.py +40 -40
  94. pages/context_processors.py +151 -85
  95. pages/defaults.py +13 -0
  96. pages/forms.py +221 -0
  97. pages/middleware.py +213 -153
  98. pages/models.py +720 -252
  99. pages/module_defaults.py +156 -0
  100. pages/site_config.py +137 -0
  101. pages/tasks.py +74 -0
  102. pages/tests.py +4009 -1389
  103. pages/urls.py +38 -20
  104. pages/utils.py +93 -12
  105. pages/views.py +1736 -762
  106. arthexis-0.1.9.dist-info/METADATA +0 -168
  107. arthexis-0.1.9.dist-info/RECORD +0 -92
  108. core/workgroup_urls.py +0 -17
  109. core/workgroup_views.py +0 -94
  110. nodes/actions.py +0 -70
  111. {arthexis-0.1.9.dist-info → arthexis-0.1.26.dist-info}/WHEEL +0 -0
  112. {arthexis-0.1.9.dist-info → arthexis-0.1.26.dist-info}/top_level.txt +0 -0
core/tests.py CHANGED
@@ -1,1069 +1,2673 @@
1
- import os
2
-
3
- os.environ.setdefault("DJANGO_SETTINGS_MODULE", "config.settings")
4
- import django
5
-
6
- django.setup()
7
-
8
- from django.test import Client, TestCase, RequestFactory, override_settings
9
- from django.urls import reverse
10
- from django.http import HttpRequest
11
- import json
12
- from decimal import Decimal
13
- from unittest import mock
14
- from unittest.mock import patch
15
- from pathlib import Path
16
- import subprocess
17
- from glob import glob
18
- from datetime import timedelta
19
- import tempfile
20
-
21
- from django.utils import timezone
22
- from django.contrib.auth.models import Permission
23
- from .models import (
24
- User,
25
- UserPhoneNumber,
26
- EnergyAccount,
27
- ElectricVehicle,
28
- EnergyCredit,
29
- Product,
30
- Brand,
31
- EVModel,
32
- RFID,
33
- SecurityGroup,
34
- Package,
35
- PackageRelease,
36
- ReleaseManager,
37
- Todo,
38
- PublicWifiAccess,
39
- )
40
- from django.contrib.admin.sites import AdminSite
41
- from core.admin import (
42
- PackageReleaseAdmin,
43
- PackageAdmin,
44
- UserAdmin,
45
- USER_PROFILE_INLINES,
46
- )
47
- from ocpp.models import Transaction, Charger
48
-
49
- from django.core.exceptions import ValidationError
50
- from django.core.management import call_command
51
- from django.db import IntegrityError
52
- from .backends import LocalhostAdminBackend
53
- from core.views import _step_check_version, _step_promote_build, _step_publish
54
- from core import public_wifi
55
-
56
-
57
- class DefaultAdminTests(TestCase):
58
- def test_arthexis_is_default_user(self):
59
- self.assertTrue(User.objects.filter(username="arthexis").exists())
60
- self.assertFalse(User.all_objects.filter(username="admin").exists())
61
-
62
- def test_admin_created_and_local_only(self):
63
- backend = LocalhostAdminBackend()
64
- req = HttpRequest()
65
- req.META["REMOTE_ADDR"] = "127.0.0.1"
66
- user = backend.authenticate(req, username="admin", password="admin")
67
- self.assertIsNotNone(user)
68
- self.assertEqual(user.pk, 2)
69
-
70
- remote = HttpRequest()
71
- remote.META["REMOTE_ADDR"] = "10.0.0.1"
72
- self.assertIsNone(
73
- backend.authenticate(remote, username="admin", password="admin")
74
- )
75
-
76
- def test_admin_respects_forwarded_for(self):
77
- backend = LocalhostAdminBackend()
78
-
79
- req = HttpRequest()
80
- req.META["REMOTE_ADDR"] = "10.0.0.1"
81
- req.META["HTTP_X_FORWARDED_FOR"] = "127.0.0.1"
82
- self.assertIsNotNone(
83
- backend.authenticate(req, username="admin", password="admin"),
84
- "X-Forwarded-For should permit allowed IP",
85
- )
86
-
87
- blocked = HttpRequest()
88
- blocked.META["REMOTE_ADDR"] = "10.0.0.1"
89
- blocked.META["HTTP_X_FORWARDED_FOR"] = "8.8.8.8"
90
- self.assertIsNone(
91
- backend.authenticate(blocked, username="admin", password="admin")
92
- )
93
-
94
-
95
- class UserOperateAsTests(TestCase):
96
- @classmethod
97
- def setUpTestData(cls):
98
- cls.permission = Permission.objects.get(codename="view_todo")
99
-
100
- def test_staff_user_delegates_permissions(self):
101
- delegate = User.objects.create_user(username="delegate", password="secret")
102
- delegate.user_permissions.add(self.permission)
103
- operator = User.objects.create_user(
104
- username="operator", password="secret", is_staff=True
105
- )
106
- self.assertFalse(operator.has_perm("core.view_todo"))
107
- operator.operate_as = delegate
108
- operator.full_clean()
109
- operator.save()
110
- operator.refresh_from_db()
111
- self.assertTrue(operator.has_perm("core.view_todo"))
112
-
113
- def test_only_staff_may_operate_as(self):
114
- delegate = User.objects.create_user(username="delegate", password="secret")
115
- operator = User.objects.create_user(username="operator", password="secret")
116
- operator.operate_as = delegate
117
- with self.assertRaises(ValidationError):
118
- operator.full_clean()
119
-
120
- def test_non_superuser_cannot_operate_as_staff(self):
121
- staff_delegate = User.objects.create_user(
122
- username="delegate", password="secret", is_staff=True
123
- )
124
- operator = User.objects.create_user(
125
- username="operator", password="secret", is_staff=True
126
- )
127
- operator.operate_as = staff_delegate
128
- with self.assertRaises(ValidationError):
129
- operator.full_clean()
130
-
131
- def test_recursive_chain_and_cycle_detection(self):
132
- base = User.objects.create_user(username="base", password="secret")
133
- base.user_permissions.add(self.permission)
134
- middle = User.objects.create_user(
135
- username="middle", password="secret", is_staff=True
136
- )
137
- middle.operate_as = base
138
- middle.full_clean()
139
- middle.save()
140
- top = User.objects.create_superuser(
141
- username="top", email="top@example.com", password="secret"
142
- )
143
- top.operate_as = middle
144
- top.full_clean()
145
- top.save()
146
- top.refresh_from_db()
147
- self.assertTrue(top.has_perm("core.view_todo"))
148
-
149
- first = User.objects.create_superuser(
150
- username="first", email="first@example.com", password="secret"
151
- )
152
- second = User.objects.create_superuser(
153
- username="second", email="second@example.com", password="secret"
154
- )
155
- first.operate_as = second
156
- first.full_clean()
157
- first.save()
158
- second.operate_as = first
159
- second.full_clean()
160
- second.save()
161
- self.assertFalse(first._check_operate_as_chain(lambda user: False))
162
-
163
- def test_module_permissions_fall_back(self):
164
- delegate = User.objects.create_user(username="helper", password="secret")
165
- delegate.user_permissions.add(self.permission)
166
- operator = User.objects.create_user(
167
- username="mod", password="secret", is_staff=True
168
- )
169
- operator.operate_as = delegate
170
- operator.full_clean()
171
- operator.save()
172
- self.assertTrue(operator.has_module_perms("core"))
173
-
174
- def test_has_profile_via_delegate(self):
175
- delegate = User.objects.create_user(
176
- username="delegate", password="secret", is_staff=True
177
- )
178
- ReleaseManager.objects.create(user=delegate)
179
- operator = User.objects.create_superuser(
180
- username="operator",
181
- email="operator@example.com",
182
- password="secret",
183
- )
184
- operator.operate_as = delegate
185
- operator.full_clean()
186
- operator.save()
187
- profile = operator.get_profile(ReleaseManager)
188
- self.assertIsNotNone(profile)
189
- self.assertEqual(profile.user, delegate)
190
- self.assertTrue(operator.has_profile(ReleaseManager))
191
-
192
- def test_has_profile_via_group_membership(self):
193
- member = User.objects.create_user(username="member", password="secret")
194
- group = SecurityGroup.objects.create(name="Managers")
195
- group.user_set.add(member)
196
- profile = ReleaseManager.objects.create(group=group)
197
- self.assertEqual(member.get_profile(ReleaseManager), profile)
198
- self.assertTrue(member.has_profile(ReleaseManager))
199
-
200
- def test_release_manager_property_uses_delegate_profile(self):
201
- delegate = User.objects.create_user(
202
- username="delegate-property", password="secret", is_staff=True
203
- )
204
- profile = ReleaseManager.objects.create(user=delegate)
205
- operator = User.objects.create_superuser(
206
- username="operator-property",
207
- email="operator-property@example.com",
208
- password="secret",
209
- )
210
- operator.operate_as = delegate
211
- operator.full_clean()
212
- operator.save()
213
- self.assertEqual(operator.release_manager, profile)
214
-
215
-
216
- class UserPhoneNumberTests(TestCase):
217
- def test_get_phone_numbers_by_priority(self):
218
- user = User.objects.create_user(username="phone-user", password="secret")
219
- later = UserPhoneNumber.objects.create(
220
- user=user, number="+15555550101", priority=10
221
- )
222
- earlier = UserPhoneNumber.objects.create(
223
- user=user, number="+15555550100", priority=1
224
- )
225
- immediate = UserPhoneNumber.objects.create(
226
- user=user, number="+15555550099", priority=0
227
- )
228
-
229
- phones = user.get_phones_by_priority()
230
- self.assertEqual(phones, [immediate, earlier, later])
231
-
232
- def test_get_phone_numbers_by_priority_orders_by_id_when_equal(self):
233
- user = User.objects.create_user(username="phone-order", password="secret")
234
- first = UserPhoneNumber.objects.create(
235
- user=user, number="+19995550000", priority=0
236
- )
237
- second = UserPhoneNumber.objects.create(
238
- user=user, number="+19995550001", priority=0
239
- )
240
-
241
- phones = user.get_phones_by_priority()
242
- self.assertEqual(phones, [first, second])
243
-
244
- def test_get_phone_numbers_by_priority_alias(self):
245
- user = User.objects.create_user(username="phone-alias", password="secret")
246
- phone = UserPhoneNumber.objects.create(
247
- user=user, number="+14445550000", priority=3
248
- )
249
-
250
- self.assertEqual(user.get_phone_numbers_by_priority(), [phone])
251
-
252
-
253
- class ProfileValidationTests(TestCase):
254
- def test_system_user_cannot_receive_profiles(self):
255
- system_user = User.objects.get(username=User.SYSTEM_USERNAME)
256
- profile = ReleaseManager(user=system_user)
257
- with self.assertRaises(ValidationError) as exc:
258
- profile.full_clean()
259
- self.assertIn("user", exc.exception.error_dict)
260
-
261
-
262
- class UserAdminInlineTests(TestCase):
263
- def setUp(self):
264
- self.site = AdminSite()
265
- self.factory = RequestFactory()
266
- self.admin = UserAdmin(User, self.site)
267
- self.system_user = User.objects.get(username=User.SYSTEM_USERNAME)
268
- self.superuser = User.objects.create_superuser(
269
- username="inline-super",
270
- email="inline-super@example.com",
271
- password="secret",
272
- )
273
-
274
- def test_profile_inlines_hidden_for_system_user(self):
275
- request = self.factory.get("/")
276
- request.user = self.superuser
277
- system_inlines = self.admin.get_inline_instances(request, self.system_user)
278
- system_profiles = [
279
- inline
280
- for inline in system_inlines
281
- if inline.__class__ in USER_PROFILE_INLINES
282
- ]
283
- self.assertFalse(system_profiles)
284
-
285
- other_inlines = self.admin.get_inline_instances(request, self.superuser)
286
- other_profiles = [
287
- inline
288
- for inline in other_inlines
289
- if inline.__class__ in USER_PROFILE_INLINES
290
- ]
291
- self.assertEqual(len(other_profiles), len(USER_PROFILE_INLINES))
292
-
293
-
294
- class RFIDLoginTests(TestCase):
295
- def setUp(self):
296
- self.client = Client()
297
- self.user = User.objects.create_user(username="alice", password="secret")
298
- self.account = EnergyAccount.objects.create(user=self.user, name="ALICE")
299
- tag = RFID.objects.create(rfid="CARD123")
300
- self.account.rfids.add(tag)
301
-
302
- def test_rfid_login_success(self):
303
- response = self.client.post(
304
- reverse("rfid-login"),
305
- data={"rfid": "CARD123"},
306
- content_type="application/json",
307
- )
308
- self.assertEqual(response.status_code, 200)
309
- self.assertEqual(response.json()["username"], "alice")
310
-
311
- def test_rfid_login_invalid(self):
312
- response = self.client.post(
313
- reverse("rfid-login"),
314
- data={"rfid": "UNKNOWN"},
315
- content_type="application/json",
316
- )
317
- self.assertEqual(response.status_code, 401)
318
-
319
-
320
- class RFIDBatchApiTests(TestCase):
321
- def setUp(self):
322
- self.client = Client()
323
- self.user = User.objects.create_user(username="bob", password="secret")
324
- self.account = EnergyAccount.objects.create(user=self.user, name="BOB")
325
- self.client.force_login(self.user)
326
-
327
- def test_export_rfids(self):
328
- tag_black = RFID.objects.create(rfid="CARD999", custom_label="Main Tag")
329
- tag_white = RFID.objects.create(rfid="CARD998", color=RFID.WHITE)
330
- self.account.rfids.add(tag_black, tag_white)
331
- response = self.client.get(reverse("rfid-batch"))
332
- self.assertEqual(response.status_code, 200)
333
- self.assertEqual(
334
- response.json(),
335
- {
336
- "rfids": [
337
- {
338
- "rfid": "CARD999",
339
- "custom_label": "Main Tag",
340
- "energy_accounts": [self.account.id],
341
- "allowed": True,
342
- "color": "B",
343
- "released": False,
344
- }
345
- ]
346
- },
347
- )
348
-
349
- def test_export_rfids_color_filter(self):
350
- RFID.objects.create(rfid="CARD111", color=RFID.WHITE)
351
- response = self.client.get(reverse("rfid-batch"), {"color": "W"})
352
- self.assertEqual(
353
- response.json(),
354
- {
355
- "rfids": [
356
- {
357
- "rfid": "CARD111",
358
- "custom_label": "",
359
- "energy_accounts": [],
360
- "allowed": True,
361
- "color": "W",
362
- "released": False,
363
- }
364
- ]
365
- },
366
- )
367
-
368
- def test_export_rfids_released_filter(self):
369
- RFID.objects.create(rfid="CARD112", released=True)
370
- RFID.objects.create(rfid="CARD113", released=False)
371
- response = self.client.get(reverse("rfid-batch"), {"released": "true"})
372
- self.assertEqual(
373
- response.json(),
374
- {
375
- "rfids": [
376
- {
377
- "rfid": "CARD112",
378
- "custom_label": "",
379
- "energy_accounts": [],
380
- "allowed": True,
381
- "color": "B",
382
- "released": True,
383
- }
384
- ]
385
- },
386
- )
387
-
388
- def test_import_rfids(self):
389
- data = {
390
- "rfids": [
391
- {
392
- "rfid": "A1B2C3D4",
393
- "custom_label": "Imported Tag",
394
- "energy_accounts": [self.account.id],
395
- "allowed": True,
396
- "color": "W",
397
- "released": True,
398
- }
399
- ]
400
- }
401
- response = self.client.post(
402
- reverse("rfid-batch"),
403
- data=json.dumps(data),
404
- content_type="application/json",
405
- )
406
- self.assertEqual(response.status_code, 200)
407
- self.assertEqual(response.json()["imported"], 1)
408
- self.assertTrue(
409
- RFID.objects.filter(
410
- rfid="A1B2C3D4",
411
- custom_label="Imported Tag",
412
- energy_accounts=self.account,
413
- color=RFID.WHITE,
414
- released=True,
415
- ).exists()
416
- )
417
-
418
-
419
- class AllowedRFIDTests(TestCase):
420
- def setUp(self):
421
- self.user = User.objects.create_user(username="eve", password="secret")
422
- self.account = EnergyAccount.objects.create(user=self.user, name="EVE")
423
- self.rfid = RFID.objects.create(rfid="BAD123")
424
- self.account.rfids.add(self.rfid)
425
-
426
- def test_disallow_removes_and_blocks(self):
427
- self.rfid.allowed = False
428
- self.rfid.save()
429
- self.account.refresh_from_db()
430
- self.assertFalse(self.account.rfids.exists())
431
-
432
- with self.assertRaises(IntegrityError):
433
- RFID.objects.create(rfid="BAD123")
434
-
435
-
436
- class RFIDValidationTests(TestCase):
437
- def test_invalid_format_raises(self):
438
- tag = RFID(rfid="xyz")
439
- with self.assertRaises(ValidationError):
440
- tag.full_clean()
441
-
442
- def test_lowercase_saved_uppercase(self):
443
- tag = RFID.objects.create(rfid="deadbeef")
444
- self.assertEqual(tag.rfid, "DEADBEEF")
445
-
446
- def test_long_rfid_allowed(self):
447
- tag = RFID.objects.create(rfid="DEADBEEF10")
448
- self.assertEqual(tag.rfid, "DEADBEEF10")
449
-
450
- def test_find_user_by_rfid(self):
451
- user = User.objects.create_user(username="finder", password="pwd")
452
- acc = EnergyAccount.objects.create(user=user, name="FINDER")
453
- tag = RFID.objects.create(rfid="ABCD1234")
454
- acc.rfids.add(tag)
455
- found = RFID.get_account_by_rfid("abcd1234")
456
- self.assertEqual(found, acc)
457
-
458
- def test_custom_label_length(self):
459
- tag = RFID(rfid="FACE1234", custom_label="x" * 33)
460
- with self.assertRaises(ValidationError):
461
- tag.full_clean()
462
-
463
-
464
- class RFIDAssignmentTests(TestCase):
465
- def setUp(self):
466
- self.user1 = User.objects.create_user(username="user1", password="x")
467
- self.user2 = User.objects.create_user(username="user2", password="x")
468
- self.acc1 = EnergyAccount.objects.create(user=self.user1, name="USER1")
469
- self.acc2 = EnergyAccount.objects.create(user=self.user2, name="USER2")
470
- self.tag = RFID.objects.create(rfid="ABCDEF12")
471
-
472
- def test_rfid_can_only_attach_to_one_account(self):
473
- self.acc1.rfids.add(self.tag)
474
- with self.assertRaises(ValidationError):
475
- self.acc2.rfids.add(self.tag)
476
-
477
-
478
- class EnergyAccountTests(TestCase):
479
- def test_balance_calculation(self):
480
- user = User.objects.create_user(username="balance", password="x")
481
- acc = EnergyAccount.objects.create(user=user, name="BALANCE")
482
- EnergyCredit.objects.create(account=acc, amount_kw=50)
483
- charger = Charger.objects.create(charger_id="T1")
484
- Transaction.objects.create(
485
- charger=charger,
486
- account=acc,
487
- meter_start=0,
488
- meter_stop=20,
489
- start_time=timezone.now(),
490
- stop_time=timezone.now(),
491
- )
492
- self.assertEqual(acc.total_kw_spent, 20)
493
- self.assertEqual(acc.balance_kw, 30)
494
-
495
- def test_authorization_requires_positive_balance(self):
496
- user = User.objects.create_user(username="auth", password="x")
497
- acc = EnergyAccount.objects.create(user=user, name="AUTH")
498
- self.assertFalse(acc.can_authorize())
499
-
500
- EnergyCredit.objects.create(account=acc, amount_kw=5)
501
- self.assertTrue(acc.can_authorize())
502
-
503
- def test_service_account_ignores_balance(self):
504
- user = User.objects.create_user(username="service", password="x")
505
- acc = EnergyAccount.objects.create(
506
- user=user, service_account=True, name="SERVICE"
507
- )
508
- self.assertTrue(acc.can_authorize())
509
-
510
- def test_account_without_user(self):
511
- acc = EnergyAccount.objects.create(name="NOUSER")
512
- tag = RFID.objects.create(rfid="NOUSER1")
513
- acc.rfids.add(tag)
514
- self.assertIsNone(acc.user)
515
- self.assertTrue(acc.rfids.filter(rfid="NOUSER1").exists())
516
-
517
-
518
- class ElectricVehicleTests(TestCase):
519
- def test_account_can_have_multiple_vehicles(self):
520
- user = User.objects.create_user(username="cars", password="x")
521
- acc = EnergyAccount.objects.create(user=user, name="CARS")
522
- tesla = Brand.objects.create(name="Tesla")
523
- nissan = Brand.objects.create(name="Nissan")
524
- model_s = EVModel.objects.create(brand=tesla, name="Model S")
525
- leaf = EVModel.objects.create(brand=nissan, name="Leaf")
526
- ElectricVehicle.objects.create(
527
- account=acc, brand=tesla, model=model_s, vin="VIN12345678901234"
528
- )
529
- ElectricVehicle.objects.create(
530
- account=acc, brand=nissan, model=leaf, vin="VIN23456789012345"
531
- )
532
- self.assertEqual(acc.vehicles.count(), 2)
533
-
534
-
535
- class AddressTests(TestCase):
536
- def test_invalid_municipality_state(self):
537
- addr = Address(
538
- street="Main",
539
- number="1",
540
- municipality="Monterrey",
541
- state=Address.State.COAHUILA,
542
- postal_code="00000",
543
- )
544
- with self.assertRaises(ValidationError):
545
- addr.full_clean()
546
-
547
- def test_user_link(self):
548
- addr = Address.objects.create(
549
- street="Main",
550
- number="2",
551
- municipality="Monterrey",
552
- state=Address.State.NUEVO_LEON,
553
- postal_code="64000",
554
- )
555
- user = User.objects.create_user(username="addr", password="pwd", address=addr)
556
- self.assertEqual(user.address, addr)
557
-
558
-
559
- class PublicWifiUtilitiesTests(TestCase):
560
- def setUp(self):
561
- self.user = User.objects.create_user(username="wifi", password="pwd")
562
-
563
- def test_grant_public_access_records_allowlist(self):
564
- with tempfile.TemporaryDirectory() as tmp:
565
- base = Path(tmp)
566
- allow_file = base / "locks" / "public_wifi_allow.list"
567
- with override_settings(BASE_DIR=base):
568
- with patch("core.public_wifi._iptables_available", return_value=False):
569
- public_wifi.grant_public_access(self.user, "AA:BB:CC:DD:EE:FF")
570
- self.assertTrue(allow_file.exists())
571
- content = allow_file.read_text()
572
- self.assertIn("aa:bb:cc:dd:ee:ff", content)
573
- self.assertTrue(
574
- PublicWifiAccess.objects.filter(
575
- user=self.user, mac_address="aa:bb:cc:dd:ee:ff"
576
- ).exists()
577
- )
578
-
579
- def test_revoke_public_access_for_user_updates_allowlist(self):
580
- with tempfile.TemporaryDirectory() as tmp:
581
- base = Path(tmp)
582
- allow_file = base / "locks" / "public_wifi_allow.list"
583
- with override_settings(BASE_DIR=base):
584
- with patch("core.public_wifi._iptables_available", return_value=False):
585
- access = public_wifi.grant_public_access(
586
- self.user, "AA:BB:CC:DD:EE:FF"
587
- )
588
- public_wifi.revoke_public_access_for_user(self.user)
589
- access.refresh_from_db()
590
- self.assertIsNotNone(access.revoked_on)
591
- if allow_file.exists():
592
- self.assertNotIn("aa:bb:cc:dd:ee:ff", allow_file.read_text())
593
-
594
-
595
- class LiveSubscriptionTests(TestCase):
596
- def setUp(self):
597
- self.client = Client()
598
- self.user = User.objects.create_user(username="bob", password="pwd")
599
- self.account = EnergyAccount.objects.create(user=self.user, name="SUBSCRIBER")
600
- self.product = Product.objects.create(name="Gold", renewal_period=30)
601
- self.client.force_login(self.user)
602
-
603
- def test_create_and_list_live_subscription(self):
604
- response = self.client.post(
605
- reverse("add-live-subscription"),
606
- data={"account_id": self.account.id, "product_id": self.product.id},
607
- content_type="application/json",
608
- )
609
- self.assertEqual(response.status_code, 200)
610
- self.account.refresh_from_db()
611
- self.assertEqual(
612
- self.account.live_subscription_product,
613
- self.product,
614
- )
615
- self.assertIsNotNone(self.account.live_subscription_start_date)
616
- self.assertEqual(
617
- self.account.live_subscription_start_date,
618
- timezone.localdate(),
619
- )
620
- self.assertEqual(
621
- self.account.live_subscription_next_renewal,
622
- self.account.live_subscription_start_date
623
- + timedelta(days=self.product.renewal_period),
624
- )
625
-
626
- list_resp = self.client.get(
627
- reverse("live-subscription-list"), {"account_id": self.account.id}
628
- )
629
- self.assertEqual(list_resp.status_code, 200)
630
- data = list_resp.json()
631
- self.assertEqual(len(data["live_subscriptions"]), 1)
632
- self.assertEqual(data["live_subscriptions"][0]["product__name"], "Gold")
633
- self.assertEqual(data["live_subscriptions"][0]["id"], self.account.id)
634
- self.assertEqual(
635
- data["live_subscriptions"][0]["next_renewal"],
636
- str(self.account.live_subscription_next_renewal),
637
- )
638
-
639
- def test_product_list(self):
640
- response = self.client.get(reverse("product-list"))
641
- self.assertEqual(response.status_code, 200)
642
- data = response.json()
643
- self.assertEqual(len(data["products"]), 1)
644
- self.assertEqual(data["products"][0]["name"], "Gold")
645
-
646
-
647
- class OnboardingWizardTests(TestCase):
648
- def setUp(self):
649
- self.client = Client()
650
- User.objects.create_superuser("super", "super@example.com", "pwd")
651
- self.client.force_login(User.objects.get(username="super"))
652
-
653
- def test_onboarding_flow_creates_account(self):
654
- details_url = reverse("admin:core_energyaccount_onboard_details")
655
- response = self.client.get(details_url)
656
- self.assertEqual(response.status_code, 200)
657
- data = {
658
- "first_name": "John",
659
- "last_name": "Doe",
660
- "rfid": "ABCD1234",
661
- "vehicle_id": "VIN12345678901234",
662
- }
663
- resp = self.client.post(details_url, data)
664
- self.assertEqual(resp.status_code, 302)
665
- self.assertEqual(resp.url, reverse("admin:core_energyaccount_changelist"))
666
- user = User.objects.get(first_name="John", last_name="Doe")
667
- self.assertFalse(user.is_active)
668
- account = EnergyAccount.objects.get(user=user)
669
- self.assertTrue(account.rfids.filter(rfid="ABCD1234").exists())
670
- self.assertTrue(account.vehicles.filter(vin="VIN12345678901234").exists())
671
-
672
-
673
- class EVBrandFixtureTests(TestCase):
674
- def test_ev_brand_fixture_loads(self):
675
- call_command(
676
- "loaddata",
677
- *sorted(glob("core/fixtures/ev_brands__*.json")),
678
- *sorted(glob("core/fixtures/ev_models__*.json")),
679
- verbosity=0,
680
- )
681
- porsche = Brand.objects.get(name="Porsche")
682
- audi = Brand.objects.get(name="Audi")
683
- self.assertTrue(
684
- {"WP0", "WP1"} <= set(porsche.wmi_codes.values_list("code", flat=True))
685
- )
686
- self.assertTrue(
687
- set(audi.wmi_codes.values_list("code", flat=True)) >= {"WAU", "TRU"}
688
- )
689
- self.assertTrue(EVModel.objects.filter(brand=porsche, name="Taycan").exists())
690
- self.assertTrue(EVModel.objects.filter(brand=audi, name="e-tron GT").exists())
691
- self.assertTrue(EVModel.objects.filter(brand=porsche, name="Macan").exists())
692
- model3 = EVModel.objects.get(brand__name="Tesla", name="Model 3 RWD")
693
- self.assertEqual(model3.est_battery_kwh, Decimal("57.50"))
694
-
695
- def test_brand_from_vin(self):
696
- call_command(
697
- "loaddata",
698
- *sorted(glob("core/fixtures/ev_brands__*.json")),
699
- verbosity=0,
700
- )
701
- self.assertEqual(Brand.from_vin("WP0ZZZ12345678901").name, "Porsche")
702
- self.assertEqual(Brand.from_vin("WAUZZZ12345678901").name, "Audi")
703
- self.assertIsNone(Brand.from_vin("XYZ12345678901234"))
704
-
705
-
706
- class RFIDFixtureTests(TestCase):
707
- def test_fixture_assigns_gelectriic_rfid(self):
708
- call_command(
709
- "loaddata",
710
- "core/fixtures/users__arthexis.json",
711
- "core/fixtures/energy_accounts__gelectriic.json",
712
- "core/fixtures/rfids__ffffffff.json",
713
- verbosity=0,
714
- )
715
- account = EnergyAccount.objects.get(name="GELECTRIIC")
716
- tag = RFID.objects.get(rfid="FFFFFFFF")
717
- self.assertIn(account, tag.energy_accounts.all())
718
- self.assertEqual(tag.energy_accounts.count(), 1)
719
-
720
-
721
- class RFIDKeyVerificationFlagTests(TestCase):
722
- def test_flags_reset_on_key_change(self):
723
- tag = RFID.objects.create(
724
- rfid="ABC12345", key_a_verified=True, key_b_verified=True
725
- )
726
- tag.key_a = "A1A1A1A1A1A1"
727
- tag.save()
728
- self.assertFalse(tag.key_a_verified)
729
- tag.key_b = "B1B1B1B1B1B1"
730
- tag.save()
731
- self.assertFalse(tag.key_b_verified)
732
-
733
-
734
- class SecurityGroupTests(TestCase):
735
- def test_parent_and_user_assignment(self):
736
- parent = SecurityGroup.objects.create(name="Parents")
737
- child = SecurityGroup.objects.create(name="Children", parent=parent)
738
- user = User.objects.create_user(username="sg_user", password="secret")
739
- child.user_set.add(user)
740
- self.assertEqual(child.parent, parent)
741
- self.assertIn(user, child.user_set.all())
742
-
743
-
744
- class ReleaseProcessTests(TestCase):
745
- def setUp(self):
746
- self.package = Package.objects.create(name="pkg")
747
- self.release = PackageRelease.objects.create(
748
- package=self.package, version="1.0.0"
749
- )
750
-
751
- @mock.patch("core.views.release_utils._git_clean", return_value=False)
752
- def test_step_check_requires_clean_repo(self, git_clean):
753
- with self.assertRaises(Exception):
754
- _step_check_version(self.release, {}, Path("rel.log"))
755
-
756
- @mock.patch("core.views.release_utils._git_clean", return_value=True)
757
- @mock.patch("core.views.release_utils.network_available", return_value=False)
758
- def test_step_check_keeps_repo_clean(self, network_available, git_clean):
759
- version_path = Path("VERSION")
760
- original = version_path.read_text(encoding="utf-8")
761
- _step_check_version(self.release, {}, Path("rel.log"))
762
- proc = subprocess.run(
763
- ["git", "status", "--porcelain", str(version_path)],
764
- capture_output=True,
765
- text=True,
766
- )
767
- self.assertFalse(proc.stdout.strip())
768
- self.assertEqual(version_path.read_text(encoding="utf-8"), original)
769
-
770
- @mock.patch("core.models.PackageRelease.dump_fixture")
771
- def test_save_does_not_dump_fixture(self, dump):
772
- self.release.pypi_url = "https://example.com"
773
- self.release.save()
774
- dump.assert_not_called()
775
-
776
- @mock.patch("core.views.subprocess.run")
777
- @mock.patch("core.views.PackageRelease.dump_fixture")
778
- @mock.patch("core.views.release_utils.promote", side_effect=Exception("boom"))
779
- def test_promote_cleans_repo_on_failure(self, promote, dump_fixture, run):
780
- with self.assertRaises(Exception):
781
- _step_promote_build(self.release, {}, Path("rel.log"))
782
- dump_fixture.assert_not_called()
783
- run.assert_any_call(["git", "reset", "--hard"], check=False)
784
- run.assert_any_call(["git", "clean", "-fd"], check=False)
785
-
786
- @mock.patch("core.views.subprocess.run")
787
- @mock.patch("core.views.PackageRelease.dump_fixture")
788
- @mock.patch("core.views.release_utils.promote")
789
- def test_promote_rebases_and_pushes_main(self, promote, dump_fixture, run):
790
- import subprocess as sp
791
-
792
- def fake_run(cmd, check=True, capture_output=False, text=False):
793
- if capture_output:
794
- return sp.CompletedProcess(cmd, 0, stdout="", stderr="")
795
- return sp.CompletedProcess(cmd, 0)
796
-
797
- run.side_effect = fake_run
798
- _step_promote_build(self.release, {}, Path("rel.log"))
799
- run.assert_any_call(["git", "fetch", "origin", "main"], check=True)
800
- run.assert_any_call(["git", "rebase", "origin/main"], check=True)
801
- run.assert_any_call(["git", "push"], check=True)
802
-
803
- @mock.patch("core.views.subprocess.run")
804
- @mock.patch("core.views.PackageRelease.dump_fixture")
805
- def test_promote_advances_version(self, dump_fixture, run):
806
- import subprocess as sp
807
-
808
- def fake_run(cmd, check=True, capture_output=False, text=False):
809
- if capture_output:
810
- return sp.CompletedProcess(cmd, 0, stdout="", stderr="")
811
- return sp.CompletedProcess(cmd, 0)
812
-
813
- run.side_effect = fake_run
814
-
815
- version_path = Path("VERSION")
816
- original = version_path.read_text(encoding="utf-8")
817
- version_path.write_text("0.0.1\n", encoding="utf-8")
818
-
819
- def fake_promote(*args, **kwargs):
820
- version_path.write_text(self.release.version + "\n", encoding="utf-8")
821
-
822
- with mock.patch("core.views.release_utils.promote", side_effect=fake_promote):
823
- _step_promote_build(self.release, {}, Path("rel.log"))
824
-
825
- self.assertEqual(
826
- version_path.read_text(encoding="utf-8"),
827
- self.release.version + "\n",
828
- )
829
- version_path.write_text(original, encoding="utf-8")
830
-
831
- @mock.patch("core.views.PackageRelease.dump_fixture")
832
- @mock.patch("core.views.release_utils.publish")
833
- def test_publish_sets_pypi_url(self, publish, dump_fixture):
834
- _step_publish(self.release, {}, Path("rel.log"))
835
- self.release.refresh_from_db()
836
- self.assertEqual(
837
- self.release.pypi_url,
838
- f"https://pypi.org/project/{self.package.name}/{self.release.version}/",
839
- )
840
- dump_fixture.assert_called_once()
841
-
842
- @mock.patch("core.views.PackageRelease.dump_fixture")
843
- @mock.patch("core.views.release_utils.publish", side_effect=Exception("boom"))
844
- def test_publish_failure_keeps_url_blank(self, publish, dump_fixture):
845
- with self.assertRaises(Exception):
846
- _step_publish(self.release, {}, Path("rel.log"))
847
- self.release.refresh_from_db()
848
- self.assertEqual(self.release.pypi_url, "")
849
- dump_fixture.assert_not_called()
850
-
851
- def test_release_progress_uses_lockfile(self):
852
- run = []
853
-
854
- def step1(release, ctx, log_path):
855
- run.append("step1")
856
-
857
- def step2(release, ctx, log_path):
858
- run.append("step2")
859
-
860
- steps = [("One", step1), ("Two", step2)]
861
- user = User.objects.create_superuser("admin", "admin@example.com", "pw")
862
- url = reverse("release-progress", args=[self.release.pk, "publish"])
863
- with mock.patch("core.views.PUBLISH_STEPS", steps):
864
- self.client.force_login(user)
865
- self.client.get(f"{url}?step=0")
866
- self.assertEqual(run, ["step1"])
867
- client2 = Client()
868
- client2.force_login(user)
869
- client2.get(f"{url}?step=1")
870
- self.assertEqual(run, ["step1", "step2"])
871
- lock_file = Path("locks") / f"release_publish_{self.release.pk}.json"
872
- self.assertFalse(lock_file.exists())
873
-
874
- def test_release_progress_restart(self):
875
- run = []
876
-
877
- def step_fail(release, ctx, log_path):
878
- run.append("step")
879
- raise Exception("boom")
880
-
881
- steps = [("Fail", step_fail)]
882
- user = User.objects.create_superuser("admin", "admin@example.com", "pw")
883
- url = reverse("release-progress", args=[self.release.pk, "publish"])
884
- count_file = Path("locks") / f"release_publish_{self.release.pk}.restarts"
885
- if count_file.exists():
886
- count_file.unlink()
887
- with mock.patch("core.views.PUBLISH_STEPS", steps):
888
- self.client.force_login(user)
889
- self.assertFalse(count_file.exists())
890
- self.client.get(f"{url}?step=0")
891
- self.client.get(f"{url}?step=0")
892
- self.assertEqual(run, ["step"])
893
- self.assertFalse(count_file.exists())
894
- self.client.get(f"{url}?restart=1")
895
- self.assertTrue(count_file.exists())
896
- self.assertEqual(count_file.read_text(), "1")
897
- self.client.get(f"{url}?step=0")
898
- self.assertEqual(run, ["step", "step"])
899
- self.client.get(f"{url}?restart=1")
900
- # Restart counter resets after running a step
901
- self.assertEqual(count_file.read_text(), "1")
902
-
903
-
904
- class PackageReleaseAdminActionTests(TestCase):
905
- def setUp(self):
906
- self.factory = RequestFactory()
907
- self.site = AdminSite()
908
- self.admin = PackageReleaseAdmin(PackageRelease, self.site)
909
- self.admin.message_user = lambda *args, **kwargs: None
910
- self.package = Package.objects.create(name="pkg")
911
- self.release = PackageRelease.objects.create(
912
- package=self.package,
913
- version="1.0.0",
914
- pypi_url="https://pypi.org/project/pkg/1.0.0/",
915
- )
916
- self.request = self.factory.get("/")
917
-
918
- @mock.patch("core.admin.PackageRelease.dump_fixture")
919
- @mock.patch("core.admin.requests.get")
920
- def test_validate_deletes_missing_release(self, mock_get, dump):
921
- mock_get.return_value.status_code = 404
922
- self.admin.validate_releases(self.request, PackageRelease.objects.all())
923
- self.assertEqual(PackageRelease.objects.count(), 0)
924
- dump.assert_called_once()
925
-
926
- @mock.patch("core.admin.PackageRelease.dump_fixture")
927
- @mock.patch("core.admin.requests.get")
928
- def test_validate_keeps_existing_release(self, mock_get, dump):
929
- mock_get.return_value.status_code = 200
930
- self.admin.validate_releases(self.request, PackageRelease.objects.all())
931
- self.assertEqual(PackageRelease.objects.count(), 1)
932
- dump.assert_not_called()
933
-
934
- @mock.patch("core.admin.PackageRelease.dump_fixture")
935
- @mock.patch("core.admin.requests.get")
936
- def test_refresh_from_pypi_creates_releases(self, mock_get, dump):
937
- mock_get.return_value.raise_for_status.return_value = None
938
- mock_get.return_value.json.return_value = {
939
- "releases": {"1.0.0": [], "1.1.0": []}
940
- }
941
- self.admin.refresh_from_pypi(self.request, PackageRelease.objects.none())
942
- new_release = PackageRelease.objects.get(version="1.1.0")
943
- self.assertEqual(new_release.revision, "")
944
- dump.assert_called_once()
945
-
946
-
947
- class PackageActiveTests(TestCase):
948
- def test_only_one_active_package(self):
949
- default = Package.objects.get(name="arthexis")
950
- self.assertTrue(default.is_active)
951
- other = Package.objects.create(name="pkg", is_active=True)
952
- default.refresh_from_db()
953
- other.refresh_from_db()
954
- self.assertFalse(default.is_active)
955
- self.assertTrue(other.is_active)
956
-
957
-
958
- class PackageReleaseCurrentTests(TestCase):
959
- def setUp(self):
960
- self.package = Package.objects.get(name="arthexis")
961
- self.version_path = Path("VERSION")
962
- self.original = self.version_path.read_text()
963
- self.version_path.write_text("1.0.0")
964
- self.release = PackageRelease.objects.create(
965
- package=self.package, version="1.0.0"
966
- )
967
-
968
- def tearDown(self):
969
- self.version_path.write_text(self.original)
970
-
971
- def test_is_current_true_when_version_matches_and_package_active(self):
972
- self.assertTrue(self.release.is_current)
973
-
974
- def test_is_current_false_when_package_inactive(self):
975
- self.package.is_active = False
976
- self.package.save()
977
- self.assertFalse(self.release.is_current)
978
-
979
- def test_is_current_false_when_version_differs(self):
980
- self.release.version = "2.0.0"
981
- self.release.save()
982
- self.assertFalse(self.release.is_current)
983
-
984
-
985
- class PackageAdminPrepareNextReleaseTests(TestCase):
986
- def setUp(self):
987
- self.factory = RequestFactory()
988
- self.site = AdminSite()
989
- self.admin = PackageAdmin(Package, self.site)
990
- self.admin.message_user = lambda *args, **kwargs: None
991
- self.package = Package.objects.get(name="arthexis")
992
-
993
- def test_prepare_next_release_active_creates_release(self):
994
- PackageRelease.all_objects.filter(package=self.package).delete()
995
- request = self.factory.get("/admin/core/package/prepare-next-release/")
996
- response = self.admin.prepare_next_release_active(request)
997
- self.assertEqual(response.status_code, 302)
998
- self.assertEqual(
999
- PackageRelease.all_objects.filter(package=self.package).count(), 1
1000
- )
1001
-
1002
-
1003
- class PackageReleaseChangelistTests(TestCase):
1004
- def setUp(self):
1005
- self.client = Client()
1006
- User.objects.create_superuser("admin", "admin@example.com", "pw")
1007
- self.client.force_login(User.objects.get(username="admin"))
1008
-
1009
- def test_prepare_next_release_button_present(self):
1010
- response = self.client.get(reverse("admin:core_packagerelease_changelist"))
1011
- self.assertContains(
1012
- response, reverse("admin:core_package_prepare_next_release"), html=False
1013
- )
1014
-
1015
- def test_refresh_from_pypi_button_present(self):
1016
- response = self.client.get(reverse("admin:core_packagerelease_changelist"))
1017
- refresh_url = reverse(
1018
- "admin:core_packagerelease_actions", args=["refresh_from_pypi"]
1019
- )
1020
- self.assertContains(response, refresh_url, html=False)
1021
-
1022
-
1023
- class TodoDoneTests(TestCase):
1024
- def setUp(self):
1025
- self.client = Client()
1026
- User.objects.create_superuser("admin", "admin@example.com", "pw")
1027
- self.client.force_login(User.objects.get(username="admin"))
1028
-
1029
- def test_mark_done_sets_timestamp(self):
1030
- todo = Todo.objects.create(request="Task", is_seed_data=True)
1031
- resp = self.client.post(reverse("todo-done", args=[todo.pk]))
1032
- self.assertRedirects(resp, reverse("admin:index"))
1033
- todo.refresh_from_db()
1034
- self.assertIsNotNone(todo.done_on)
1035
- self.assertFalse(todo.is_deleted)
1036
-
1037
-
1038
- class TodoUrlValidationTests(TestCase):
1039
- def test_relative_url_valid(self):
1040
- todo = Todo(request="Task", url="/path")
1041
- todo.full_clean() # should not raise
1042
-
1043
- def test_absolute_url_invalid(self):
1044
- todo = Todo(request="Task", url="https://example.com/path")
1045
- with self.assertRaises(ValidationError):
1046
- todo.full_clean()
1047
-
1048
-
1049
- class TodoUniqueTests(TestCase):
1050
- def test_request_unique_case_insensitive(self):
1051
- Todo.objects.create(request="Task")
1052
- with self.assertRaises(IntegrityError):
1053
- Todo.objects.create(request="task")
1054
-
1055
-
1056
- class TodoAdminPermissionTests(TestCase):
1057
- def setUp(self):
1058
- self.client = Client()
1059
- User.objects.create_superuser("admin", "admin@example.com", "pw")
1060
- self.client.force_login(User.objects.get(username="admin"))
1061
-
1062
- def test_add_view_disallowed(self):
1063
- resp = self.client.get(reverse("admin:core_todo_add"))
1064
- self.assertEqual(resp.status_code, 403)
1065
-
1066
- def test_change_form_loads(self):
1067
- todo = Todo.objects.create(request="Task")
1068
- resp = self.client.get(reverse("admin:core_todo_change", args=[todo.pk]))
1069
- self.assertEqual(resp.status_code, 200)
1
+ import os
2
+
3
+ os.environ.setdefault("DJANGO_SETTINGS_MODULE", "config.settings")
4
+ import django
5
+
6
+ django.setup()
7
+
8
+ from django.test import Client, TestCase, RequestFactory, override_settings
9
+ from django.urls import reverse
10
+ from django.http import HttpRequest
11
+ from django.contrib import messages
12
+ import csv
13
+ import json
14
+ import importlib.util
15
+ from decimal import Decimal
16
+ from unittest import mock
17
+ from unittest.mock import patch
18
+ from pathlib import Path
19
+ import subprocess
20
+ import types
21
+ from glob import glob
22
+ from datetime import datetime, timedelta, timezone as datetime_timezone
23
+ import tempfile
24
+ from io import StringIO
25
+ from urllib.parse import quote
26
+
27
+ from django.utils import timezone
28
+ from django.conf import settings
29
+ from django.contrib.auth.models import Permission
30
+ from django.contrib.messages import get_messages
31
+ from tablib import Dataset
32
+ from .models import (
33
+ User,
34
+ UserPhoneNumber,
35
+ EnergyAccount,
36
+ ElectricVehicle,
37
+ EnergyCredit,
38
+ Product,
39
+ Brand,
40
+ EVModel,
41
+ RFID,
42
+ SecurityGroup,
43
+ Package,
44
+ PackageRelease,
45
+ ReleaseManager,
46
+ Todo,
47
+ PublicWifiAccess,
48
+ )
49
+ from django.contrib.admin.sites import AdminSite
50
+ from core.admin import (
51
+ PackageReleaseAdmin,
52
+ PackageAdmin,
53
+ RFIDResource,
54
+ UserAdmin,
55
+ USER_PROFILE_INLINES,
56
+ )
57
+ from ocpp.models import Transaction, Charger
58
+ from nodes.models import ContentSample
59
+
60
+ from django.core.exceptions import ValidationError
61
+ from django.core.management import call_command
62
+ from django.core.management.base import CommandError
63
+ from django.db import IntegrityError
64
+ from .backends import LocalhostAdminBackend
65
+ from core.views import (
66
+ _step_check_version,
67
+ _step_pre_release_actions,
68
+ _step_promote_build,
69
+ _step_publish,
70
+ )
71
+ from core import views as core_views
72
+ from core import public_wifi
73
+
74
+
75
+ class DefaultAdminTests(TestCase):
76
+ def test_arthexis_is_default_user(self):
77
+ self.assertTrue(User.objects.filter(username="arthexis").exists())
78
+ self.assertFalse(User.all_objects.filter(username="admin").exists())
79
+
80
+ def test_admin_created_and_local_only(self):
81
+ backend = LocalhostAdminBackend()
82
+ req = HttpRequest()
83
+ req.META["REMOTE_ADDR"] = "127.0.0.1"
84
+ user = backend.authenticate(req, username="admin", password="admin")
85
+ self.assertIsNotNone(user)
86
+ self.assertEqual(user.pk, 2)
87
+
88
+ remote = HttpRequest()
89
+ remote.META["REMOTE_ADDR"] = "10.0.0.1"
90
+ self.assertIsNone(
91
+ backend.authenticate(remote, username="admin", password="admin")
92
+ )
93
+
94
+ def test_admin_respects_forwarded_for(self):
95
+ backend = LocalhostAdminBackend()
96
+
97
+ req = HttpRequest()
98
+ req.META["REMOTE_ADDR"] = "10.0.0.1"
99
+ req.META["HTTP_X_FORWARDED_FOR"] = "127.0.0.1"
100
+ self.assertIsNotNone(
101
+ backend.authenticate(req, username="admin", password="admin"),
102
+ "X-Forwarded-For should permit allowed IP",
103
+ )
104
+
105
+ blocked = HttpRequest()
106
+ blocked.META["REMOTE_ADDR"] = "10.0.0.1"
107
+ blocked.META["HTTP_X_FORWARDED_FOR"] = "8.8.8.8"
108
+ self.assertIsNone(
109
+ backend.authenticate(blocked, username="admin", password="admin")
110
+ )
111
+
112
+
113
+ class UserOperateAsTests(TestCase):
114
+ @classmethod
115
+ def setUpTestData(cls):
116
+ cls.permission = Permission.objects.get(codename="view_todo")
117
+
118
+ def test_staff_user_delegates_permissions(self):
119
+ delegate = User.objects.create_user(username="delegate", password="secret")
120
+ delegate.user_permissions.add(self.permission)
121
+ operator = User.objects.create_user(
122
+ username="operator", password="secret", is_staff=True
123
+ )
124
+ self.assertFalse(operator.has_perm("core.view_todo"))
125
+ operator.operate_as = delegate
126
+ operator.full_clean()
127
+ operator.save()
128
+ operator.refresh_from_db()
129
+ self.assertTrue(operator.has_perm("core.view_todo"))
130
+
131
+ def test_only_staff_may_operate_as(self):
132
+ delegate = User.objects.create_user(username="delegate", password="secret")
133
+ operator = User.objects.create_user(username="operator", password="secret")
134
+ operator.operate_as = delegate
135
+ with self.assertRaises(ValidationError):
136
+ operator.full_clean()
137
+
138
+ def test_non_superuser_cannot_operate_as_staff(self):
139
+ staff_delegate = User.objects.create_user(
140
+ username="delegate", password="secret", is_staff=True
141
+ )
142
+ operator = User.objects.create_user(
143
+ username="operator", password="secret", is_staff=True
144
+ )
145
+ operator.operate_as = staff_delegate
146
+ with self.assertRaises(ValidationError):
147
+ operator.full_clean()
148
+
149
+ def test_recursive_chain_and_cycle_detection(self):
150
+ base = User.objects.create_user(username="base", password="secret")
151
+ base.user_permissions.add(self.permission)
152
+ middle = User.objects.create_user(
153
+ username="middle", password="secret", is_staff=True
154
+ )
155
+ middle.operate_as = base
156
+ middle.full_clean()
157
+ middle.save()
158
+ top = User.objects.create_superuser(
159
+ username="top", email="top@example.com", password="secret"
160
+ )
161
+ top.operate_as = middle
162
+ top.full_clean()
163
+ top.save()
164
+ top.refresh_from_db()
165
+ self.assertTrue(top.has_perm("core.view_todo"))
166
+
167
+ first = User.objects.create_superuser(
168
+ username="first", email="first@example.com", password="secret"
169
+ )
170
+ second = User.objects.create_superuser(
171
+ username="second", email="second@example.com", password="secret"
172
+ )
173
+ first.operate_as = second
174
+ first.full_clean()
175
+ first.save()
176
+ second.operate_as = first
177
+ second.full_clean()
178
+ second.save()
179
+ self.assertFalse(first._check_operate_as_chain(lambda user: False))
180
+
181
+ def test_module_permissions_fall_back(self):
182
+ delegate = User.objects.create_user(username="helper", password="secret")
183
+ delegate.user_permissions.add(self.permission)
184
+ operator = User.objects.create_user(
185
+ username="mod", password="secret", is_staff=True
186
+ )
187
+ operator.operate_as = delegate
188
+ operator.full_clean()
189
+ operator.save()
190
+ self.assertTrue(operator.has_module_perms("core"))
191
+
192
+ def test_has_profile_via_delegate(self):
193
+ delegate = User.objects.create_user(
194
+ username="delegate", password="secret", is_staff=True
195
+ )
196
+ ReleaseManager.objects.create(user=delegate)
197
+ operator = User.objects.create_superuser(
198
+ username="operator",
199
+ email="operator@example.com",
200
+ password="secret",
201
+ )
202
+ operator.operate_as = delegate
203
+ operator.full_clean()
204
+ operator.save()
205
+ profile = operator.get_profile(ReleaseManager)
206
+ self.assertIsNotNone(profile)
207
+ self.assertEqual(profile.user, delegate)
208
+ self.assertTrue(operator.has_profile(ReleaseManager))
209
+
210
+ def test_has_profile_via_group_membership(self):
211
+ member = User.objects.create_user(username="member", password="secret")
212
+ group = SecurityGroup.objects.create(name="Managers")
213
+ group.user_set.add(member)
214
+ profile = ReleaseManager.objects.create(group=group)
215
+ self.assertEqual(member.get_profile(ReleaseManager), profile)
216
+ self.assertTrue(member.has_profile(ReleaseManager))
217
+
218
+ def test_release_manager_property_uses_delegate_profile(self):
219
+ delegate = User.objects.create_user(
220
+ username="delegate-property", password="secret", is_staff=True
221
+ )
222
+ profile = ReleaseManager.objects.create(user=delegate)
223
+ operator = User.objects.create_superuser(
224
+ username="operator-property",
225
+ email="operator-property@example.com",
226
+ password="secret",
227
+ )
228
+ operator.operate_as = delegate
229
+ operator.full_clean()
230
+ operator.save()
231
+ self.assertEqual(operator.release_manager, profile)
232
+
233
+
234
+ class UserPhoneNumberTests(TestCase):
235
+ def test_get_phone_numbers_by_priority(self):
236
+ user = User.objects.create_user(username="phone-user", password="secret")
237
+ later = UserPhoneNumber.objects.create(
238
+ user=user, number="+15555550101", priority=10
239
+ )
240
+ earlier = UserPhoneNumber.objects.create(
241
+ user=user, number="+15555550100", priority=1
242
+ )
243
+ immediate = UserPhoneNumber.objects.create(
244
+ user=user, number="+15555550099", priority=0
245
+ )
246
+
247
+ phones = user.get_phones_by_priority()
248
+ self.assertEqual(phones, [immediate, earlier, later])
249
+
250
+ def test_get_phone_numbers_by_priority_orders_by_id_when_equal(self):
251
+ user = User.objects.create_user(username="phone-order", password="secret")
252
+ first = UserPhoneNumber.objects.create(
253
+ user=user, number="+19995550000", priority=0
254
+ )
255
+ second = UserPhoneNumber.objects.create(
256
+ user=user, number="+19995550001", priority=0
257
+ )
258
+
259
+ phones = user.get_phones_by_priority()
260
+ self.assertEqual(phones, [first, second])
261
+
262
+ def test_get_phone_numbers_by_priority_alias(self):
263
+ user = User.objects.create_user(username="phone-alias", password="secret")
264
+ phone = UserPhoneNumber.objects.create(
265
+ user=user, number="+14445550000", priority=3
266
+ )
267
+
268
+ self.assertEqual(user.get_phone_numbers_by_priority(), [phone])
269
+
270
+
271
+ class ProfileValidationTests(TestCase):
272
+ def test_system_user_cannot_receive_profiles(self):
273
+ system_user = User.objects.get(username=User.SYSTEM_USERNAME)
274
+ profile = ReleaseManager(user=system_user)
275
+ with self.assertRaises(ValidationError) as exc:
276
+ profile.full_clean()
277
+ self.assertIn("user", exc.exception.error_dict)
278
+
279
+
280
+ class UserAdminInlineTests(TestCase):
281
+ def setUp(self):
282
+ self.site = AdminSite()
283
+ self.factory = RequestFactory()
284
+ self.admin = UserAdmin(User, self.site)
285
+ self.system_user = User.objects.get(username=User.SYSTEM_USERNAME)
286
+ self.superuser = User.objects.create_superuser(
287
+ username="inline-super",
288
+ email="inline-super@example.com",
289
+ password="secret",
290
+ )
291
+
292
+ def test_profile_inlines_hidden_for_system_user(self):
293
+ request = self.factory.get("/")
294
+ request.user = self.superuser
295
+ system_inlines = self.admin.get_inline_instances(request, self.system_user)
296
+ system_profiles = [
297
+ inline
298
+ for inline in system_inlines
299
+ if inline.__class__ in USER_PROFILE_INLINES
300
+ ]
301
+ self.assertFalse(system_profiles)
302
+
303
+ other_inlines = self.admin.get_inline_instances(request, self.superuser)
304
+ other_profiles = [
305
+ inline
306
+ for inline in other_inlines
307
+ if inline.__class__ in USER_PROFILE_INLINES
308
+ ]
309
+ self.assertEqual(len(other_profiles), len(USER_PROFILE_INLINES))
310
+
311
+
312
+ class RFIDLoginTests(TestCase):
313
+ def setUp(self):
314
+ self.client = Client()
315
+ self.user = User.objects.create_user(username="alice", password="secret")
316
+ self.account = EnergyAccount.objects.create(user=self.user, name="ALICE")
317
+ tag = RFID.objects.create(rfid="CARD123")
318
+ self.account.rfids.add(tag)
319
+
320
+ def test_rfid_login_success(self):
321
+ response = self.client.post(
322
+ reverse("rfid-login"),
323
+ data={"rfid": "CARD123"},
324
+ content_type="application/json",
325
+ )
326
+ self.assertEqual(response.status_code, 200)
327
+ self.assertEqual(response.json()["username"], "alice")
328
+
329
+ def test_rfid_login_invalid(self):
330
+ response = self.client.post(
331
+ reverse("rfid-login"),
332
+ data={"rfid": "UNKNOWN"},
333
+ content_type="application/json",
334
+ )
335
+ self.assertEqual(response.status_code, 401)
336
+
337
+ @patch("core.backends.subprocess.run")
338
+ def test_rfid_login_external_command_success(self, mock_run):
339
+ tag = self.account.rfids.first()
340
+ tag.external_command = "echo ok"
341
+ tag.save(update_fields=["external_command"])
342
+ mock_run.return_value = types.SimpleNamespace(returncode=0)
343
+
344
+ response = self.client.post(
345
+ reverse("rfid-login"),
346
+ data={"rfid": "CARD123"},
347
+ content_type="application/json",
348
+ )
349
+
350
+ self.assertEqual(response.status_code, 200)
351
+ run_args, run_kwargs = mock_run.call_args
352
+ self.assertEqual(run_args[0], "echo ok")
353
+ self.assertTrue(run_kwargs.get("shell"))
354
+ env = run_kwargs.get("env", {})
355
+ self.assertEqual(env.get("RFID_VALUE"), "CARD123")
356
+ self.assertEqual(env.get("RFID_LABEL_ID"), str(tag.pk))
357
+
358
+ @patch("core.backends.subprocess.run")
359
+ def test_rfid_login_external_command_failure(self, mock_run):
360
+ tag = self.account.rfids.first()
361
+ tag.external_command = "exit 1"
362
+ tag.save(update_fields=["external_command"])
363
+ mock_run.return_value = types.SimpleNamespace(returncode=1)
364
+
365
+ response = self.client.post(
366
+ reverse("rfid-login"),
367
+ data={"rfid": "CARD123"},
368
+ content_type="application/json",
369
+ )
370
+
371
+ self.assertEqual(response.status_code, 401)
372
+ mock_run.assert_called_once()
373
+
374
+ @patch("core.backends.subprocess.Popen")
375
+ def test_rfid_login_post_command_runs_after_success(self, mock_popen):
376
+ tag = self.account.rfids.first()
377
+ tag.post_auth_command = "echo welcome"
378
+ tag.save(update_fields=["post_auth_command"])
379
+
380
+ response = self.client.post(
381
+ reverse("rfid-login"),
382
+ data={"rfid": "CARD123"},
383
+ content_type="application/json",
384
+ )
385
+
386
+ self.assertEqual(response.status_code, 200)
387
+ mock_popen.assert_called_once()
388
+ args, kwargs = mock_popen.call_args
389
+ self.assertEqual(args[0], "echo welcome")
390
+ self.assertTrue(kwargs.get("shell"))
391
+ env = kwargs.get("env", {})
392
+ self.assertEqual(env.get("RFID_VALUE"), "CARD123")
393
+ self.assertEqual(env.get("RFID_LABEL_ID"), str(tag.pk))
394
+ self.assertIs(kwargs.get("stdout"), subprocess.DEVNULL)
395
+ self.assertIs(kwargs.get("stderr"), subprocess.DEVNULL)
396
+
397
+ @patch("core.backends.subprocess.Popen")
398
+ def test_rfid_login_post_command_skipped_on_failure(self, mock_popen):
399
+ tag = self.account.rfids.first()
400
+ tag.post_auth_command = "echo welcome"
401
+ tag.allowed = False
402
+ tag.save(update_fields=["post_auth_command", "allowed"])
403
+
404
+ response = self.client.post(
405
+ reverse("rfid-login"),
406
+ data={"rfid": "CARD123"},
407
+ content_type="application/json",
408
+ )
409
+
410
+ self.assertEqual(response.status_code, 401)
411
+ mock_popen.assert_not_called()
412
+
413
+
414
+ class RFIDBatchApiTests(TestCase):
415
+ def setUp(self):
416
+ self.client = Client()
417
+ self.user = User.objects.create_user(username="bob", password="secret")
418
+ self.account = EnergyAccount.objects.create(user=self.user, name="BOB")
419
+ self.client.force_login(self.user)
420
+
421
+ def test_export_rfids(self):
422
+ tag_black = RFID.objects.create(rfid="CARD999", custom_label="Main Tag")
423
+ tag_white = RFID.objects.create(rfid="CARD998", color=RFID.WHITE)
424
+ self.account.rfids.add(tag_black, tag_white)
425
+ response = self.client.get(reverse("rfid-batch"))
426
+ self.assertEqual(response.status_code, 200)
427
+ self.assertEqual(
428
+ response.json(),
429
+ {
430
+ "rfids": [
431
+ {
432
+ "rfid": "CARD999",
433
+ "custom_label": "Main Tag",
434
+ "energy_accounts": [self.account.id],
435
+ "external_command": "",
436
+ "post_auth_command": "",
437
+ "allowed": True,
438
+ "color": "B",
439
+ "released": False,
440
+ }
441
+ ]
442
+ },
443
+ )
444
+
445
+ def test_export_rfids_color_filter(self):
446
+ RFID.objects.create(rfid="CARD111", color=RFID.WHITE)
447
+ response = self.client.get(reverse("rfid-batch"), {"color": "W"})
448
+ self.assertEqual(
449
+ response.json(),
450
+ {
451
+ "rfids": [
452
+ {
453
+ "rfid": "CARD111",
454
+ "custom_label": "",
455
+ "energy_accounts": [],
456
+ "external_command": "",
457
+ "post_auth_command": "",
458
+ "allowed": True,
459
+ "color": "W",
460
+ "released": False,
461
+ }
462
+ ]
463
+ },
464
+ )
465
+
466
+ def test_export_rfids_released_filter(self):
467
+ RFID.objects.create(rfid="CARD112", released=True)
468
+ RFID.objects.create(rfid="CARD113", released=False)
469
+ response = self.client.get(reverse("rfid-batch"), {"released": "true"})
470
+ self.assertEqual(
471
+ response.json(),
472
+ {
473
+ "rfids": [
474
+ {
475
+ "rfid": "CARD112",
476
+ "custom_label": "",
477
+ "energy_accounts": [],
478
+ "external_command": "",
479
+ "post_auth_command": "",
480
+ "allowed": True,
481
+ "color": "B",
482
+ "released": True,
483
+ }
484
+ ]
485
+ },
486
+ )
487
+
488
+ def test_import_rfids(self):
489
+ data = {
490
+ "rfids": [
491
+ {
492
+ "rfid": "A1B2C3D4",
493
+ "custom_label": "Imported Tag",
494
+ "energy_accounts": [self.account.id],
495
+ "external_command": "echo pre",
496
+ "post_auth_command": "echo post",
497
+ "allowed": True,
498
+ "color": "W",
499
+ "released": True,
500
+ }
501
+ ]
502
+ }
503
+ response = self.client.post(
504
+ reverse("rfid-batch"),
505
+ data=json.dumps(data),
506
+ content_type="application/json",
507
+ )
508
+ self.assertEqual(response.status_code, 200)
509
+ self.assertEqual(response.json()["imported"], 1)
510
+ self.assertTrue(
511
+ RFID.objects.filter(
512
+ rfid="A1B2C3D4",
513
+ custom_label="Imported Tag",
514
+ energy_accounts=self.account,
515
+ external_command="echo pre",
516
+ post_auth_command="echo post",
517
+ color=RFID.WHITE,
518
+ released=True,
519
+ ).exists()
520
+ )
521
+
522
+
523
+ class AllowedRFIDTests(TestCase):
524
+ def setUp(self):
525
+ self.user = User.objects.create_user(username="eve", password="secret")
526
+ self.account = EnergyAccount.objects.create(user=self.user, name="EVE")
527
+ self.rfid = RFID.objects.create(rfid="BAD123")
528
+ self.account.rfids.add(self.rfid)
529
+
530
+ def test_disallow_removes_and_blocks(self):
531
+ self.rfid.allowed = False
532
+ self.rfid.save()
533
+ self.account.refresh_from_db()
534
+ self.assertFalse(self.account.rfids.exists())
535
+
536
+ with self.assertRaises(IntegrityError):
537
+ RFID.objects.create(rfid="BAD123")
538
+
539
+
540
+ class RFIDValidationTests(TestCase):
541
+ def test_invalid_format_raises(self):
542
+ tag = RFID(rfid="xyz")
543
+ with self.assertRaises(ValidationError):
544
+ tag.full_clean()
545
+
546
+ def test_lowercase_saved_uppercase(self):
547
+ tag = RFID.objects.create(rfid="deadbeef")
548
+ self.assertEqual(tag.rfid, "DEADBEEF")
549
+
550
+ def test_long_rfid_allowed(self):
551
+ tag = RFID.objects.create(rfid="DEADBEEF10")
552
+ self.assertEqual(tag.rfid, "DEADBEEF10")
553
+
554
+ def test_reversed_uid_updates_with_rfid(self):
555
+ tag = RFID.objects.create(rfid="A1B2C3D4")
556
+ self.assertEqual(tag.reversed_uid, "D4C3B2A1")
557
+
558
+ tag.rfid = "112233"
559
+ tag.save(update_fields=["rfid"])
560
+ tag.refresh_from_db()
561
+ self.assertEqual(tag.reversed_uid, "332211")
562
+
563
+ def test_find_user_by_rfid(self):
564
+ user = User.objects.create_user(username="finder", password="pwd")
565
+ acc = EnergyAccount.objects.create(user=user, name="FINDER")
566
+ tag = RFID.objects.create(rfid="ABCD1234")
567
+ acc.rfids.add(tag)
568
+ found = RFID.get_account_by_rfid("abcd1234")
569
+ self.assertEqual(found, acc)
570
+
571
+ def test_custom_label_length(self):
572
+ tag = RFID(rfid="FACE1234", custom_label="x" * 33)
573
+ with self.assertRaises(ValidationError):
574
+ tag.full_clean()
575
+
576
+
577
+ class RFIDLabelSequenceTests(TestCase):
578
+ def test_next_scan_label_starts_at_ten(self):
579
+ self.assertEqual(RFID.next_scan_label(), 10)
580
+
581
+ def test_next_scan_label_skips_non_multiples(self):
582
+ RFID.objects.create(label_id=21, rfid="SEQTEST21")
583
+
584
+ self.assertEqual(RFID.next_scan_label(), 30)
585
+
586
+ def test_next_copy_label_increments_by_one(self):
587
+ source = RFID.objects.create(label_id=40, rfid="SEQTEST40")
588
+
589
+ self.assertEqual(RFID.next_copy_label(source), 41)
590
+
591
+ def test_next_copy_label_skips_existing(self):
592
+ source = RFID.objects.create(label_id=50, rfid="SEQTEST50")
593
+ RFID.objects.create(label_id=51, rfid="SEQTEST51")
594
+
595
+ self.assertEqual(RFID.next_copy_label(source), 52)
596
+
597
+
598
+ class RFIDAssignmentTests(TestCase):
599
+ def setUp(self):
600
+ self.user1 = User.objects.create_user(username="user1", password="x")
601
+ self.user2 = User.objects.create_user(username="user2", password="x")
602
+ self.acc1 = EnergyAccount.objects.create(user=self.user1, name="USER1")
603
+ self.acc2 = EnergyAccount.objects.create(user=self.user2, name="USER2")
604
+ self.tag = RFID.objects.create(rfid="ABCDEF12")
605
+
606
+ def test_rfid_can_only_attach_to_one_account(self):
607
+ self.acc1.rfids.add(self.tag)
608
+ with self.assertRaises(ValidationError):
609
+ self.acc2.rfids.add(self.tag)
610
+
611
+
612
+ class EnergyAccountTests(TestCase):
613
+ def test_balance_calculation(self):
614
+ user = User.objects.create_user(username="balance", password="x")
615
+ acc = EnergyAccount.objects.create(user=user, name="BALANCE")
616
+ EnergyCredit.objects.create(account=acc, amount_kw=50)
617
+ charger = Charger.objects.create(charger_id="T1")
618
+ Transaction.objects.create(
619
+ charger=charger,
620
+ account=acc,
621
+ meter_start=0,
622
+ meter_stop=20,
623
+ start_time=timezone.now(),
624
+ stop_time=timezone.now(),
625
+ )
626
+ self.assertEqual(acc.total_kw_spent, 20)
627
+ self.assertEqual(acc.balance_kw, 30)
628
+
629
+ def test_authorization_requires_positive_balance(self):
630
+ user = User.objects.create_user(username="auth", password="x")
631
+ acc = EnergyAccount.objects.create(user=user, name="AUTH")
632
+ self.assertFalse(acc.can_authorize())
633
+
634
+ EnergyCredit.objects.create(account=acc, amount_kw=5)
635
+ self.assertTrue(acc.can_authorize())
636
+
637
+ def test_service_account_ignores_balance(self):
638
+ user = User.objects.create_user(username="service", password="x")
639
+ acc = EnergyAccount.objects.create(
640
+ user=user, service_account=True, name="SERVICE"
641
+ )
642
+ self.assertTrue(acc.can_authorize())
643
+
644
+ def test_account_without_user(self):
645
+ acc = EnergyAccount.objects.create(name="NOUSER")
646
+ tag = RFID.objects.create(rfid="NOUSER1")
647
+ acc.rfids.add(tag)
648
+ self.assertIsNone(acc.user)
649
+ self.assertTrue(acc.rfids.filter(rfid="NOUSER1").exists())
650
+
651
+
652
+ class ElectricVehicleTests(TestCase):
653
+ def test_account_can_have_multiple_vehicles(self):
654
+ user = User.objects.create_user(username="cars", password="x")
655
+ acc = EnergyAccount.objects.create(user=user, name="CARS")
656
+ tesla = Brand.objects.create(name="Tesla")
657
+ nissan = Brand.objects.create(name="Nissan")
658
+ model_s = EVModel.objects.create(brand=tesla, name="Model S")
659
+ leaf = EVModel.objects.create(brand=nissan, name="Leaf")
660
+ ElectricVehicle.objects.create(
661
+ account=acc, brand=tesla, model=model_s, vin="VIN12345678901234"
662
+ )
663
+ ElectricVehicle.objects.create(
664
+ account=acc, brand=nissan, model=leaf, vin="VIN23456789012345"
665
+ )
666
+ self.assertEqual(acc.vehicles.count(), 2)
667
+
668
+
669
+ class AddressTests(TestCase):
670
+ def test_invalid_municipality_state(self):
671
+ addr = Address(
672
+ street="Main",
673
+ number="1",
674
+ municipality="Monterrey",
675
+ state=Address.State.COAHUILA,
676
+ postal_code="00000",
677
+ )
678
+ with self.assertRaises(ValidationError):
679
+ addr.full_clean()
680
+
681
+ def test_user_link(self):
682
+ addr = Address.objects.create(
683
+ street="Main",
684
+ number="2",
685
+ municipality="Monterrey",
686
+ state=Address.State.NUEVO_LEON,
687
+ postal_code="64000",
688
+ )
689
+ user = User.objects.create_user(username="addr", password="pwd", address=addr)
690
+ self.assertEqual(user.address, addr)
691
+
692
+
693
+ class PublicWifiUtilitiesTests(TestCase):
694
+ def setUp(self):
695
+ self.user = User.objects.create_user(username="wifi", password="pwd")
696
+
697
+ def test_grant_public_access_records_allowlist(self):
698
+ with tempfile.TemporaryDirectory() as tmp:
699
+ base = Path(tmp)
700
+ allow_file = base / "locks" / "public_wifi_allow.list"
701
+ with override_settings(BASE_DIR=base):
702
+ with patch("core.public_wifi._iptables_available", return_value=False):
703
+ public_wifi.grant_public_access(self.user, "AA:BB:CC:DD:EE:FF")
704
+ self.assertTrue(allow_file.exists())
705
+ content = allow_file.read_text()
706
+ self.assertIn("aa:bb:cc:dd:ee:ff", content)
707
+ self.assertTrue(
708
+ PublicWifiAccess.objects.filter(
709
+ user=self.user, mac_address="aa:bb:cc:dd:ee:ff"
710
+ ).exists()
711
+ )
712
+
713
+ def test_revoke_public_access_for_user_updates_allowlist(self):
714
+ with tempfile.TemporaryDirectory() as tmp:
715
+ base = Path(tmp)
716
+ allow_file = base / "locks" / "public_wifi_allow.list"
717
+ with override_settings(BASE_DIR=base):
718
+ with patch("core.public_wifi._iptables_available", return_value=False):
719
+ access = public_wifi.grant_public_access(
720
+ self.user, "AA:BB:CC:DD:EE:FF"
721
+ )
722
+ public_wifi.revoke_public_access_for_user(self.user)
723
+ access.refresh_from_db()
724
+ self.assertIsNotNone(access.revoked_on)
725
+ if allow_file.exists():
726
+ self.assertNotIn("aa:bb:cc:dd:ee:ff", allow_file.read_text())
727
+
728
+ def test_allow_mac_configures_drop_rule(self):
729
+ with tempfile.TemporaryDirectory() as tmp:
730
+ base = Path(tmp)
731
+ executed_rules = []
732
+
733
+ def fake_run(args, **kwargs):
734
+ from types import SimpleNamespace
735
+
736
+ if args[0] != "iptables":
737
+ return subprocess.run(args, **kwargs)
738
+ command = args[1:]
739
+ if command[:2] == ["-C", "FORWARD"] and "--mac-source" in command:
740
+ return SimpleNamespace(returncode=1, stdout="")
741
+ if command[:2] == ["-C", "FORWARD"] and "-o" in command and "DROP" in command:
742
+ return SimpleNamespace(returncode=1, stdout="")
743
+ if command[0] in {"-A", "-I", "-D"}:
744
+ executed_rules.append(command)
745
+ return SimpleNamespace(returncode=0, stdout="")
746
+ return SimpleNamespace(returncode=0, stdout="")
747
+
748
+ with override_settings(BASE_DIR=base):
749
+ with patch("core.public_wifi._iptables_available", return_value=True):
750
+ with patch("core.public_wifi.subprocess.run", side_effect=fake_run):
751
+ public_wifi.grant_public_access(self.user, "AA:BB:CC:DD:EE:FF")
752
+
753
+ self.assertIn(
754
+ ["-A", "FORWARD", "-i", "wlan0", "-o", "wlan1", "-j", "DROP"],
755
+ executed_rules,
756
+ )
757
+ self.assertIn(
758
+ [
759
+ "-I",
760
+ "FORWARD",
761
+ "1",
762
+ "-i",
763
+ "wlan0",
764
+ "-m",
765
+ "mac",
766
+ "--mac-source",
767
+ "aa:bb:cc:dd:ee:ff",
768
+ "-j",
769
+ "ACCEPT",
770
+ ],
771
+ executed_rules,
772
+ )
773
+
774
+
775
+ class LiveSubscriptionTests(TestCase):
776
+ def setUp(self):
777
+ self.client = Client()
778
+ self.user = User.objects.create_user(username="bob", password="pwd")
779
+ self.account = EnergyAccount.objects.create(user=self.user, name="SUBSCRIBER")
780
+ self.product = Product.objects.create(name="Gold", renewal_period=30)
781
+ self.client.force_login(self.user)
782
+
783
+ def test_create_and_list_live_subscription(self):
784
+ response = self.client.post(
785
+ reverse("add-live-subscription"),
786
+ data={"account_id": self.account.id, "product_id": self.product.id},
787
+ content_type="application/json",
788
+ )
789
+ self.assertEqual(response.status_code, 200)
790
+ self.account.refresh_from_db()
791
+ self.assertEqual(
792
+ self.account.live_subscription_product,
793
+ self.product,
794
+ )
795
+ self.assertIsNotNone(self.account.live_subscription_start_date)
796
+ self.assertEqual(
797
+ self.account.live_subscription_start_date,
798
+ timezone.localdate(),
799
+ )
800
+ self.assertEqual(
801
+ self.account.live_subscription_next_renewal,
802
+ self.account.live_subscription_start_date
803
+ + timedelta(days=self.product.renewal_period),
804
+ )
805
+
806
+ list_resp = self.client.get(
807
+ reverse("live-subscription-list"), {"account_id": self.account.id}
808
+ )
809
+ self.assertEqual(list_resp.status_code, 200)
810
+ data = list_resp.json()
811
+ self.assertEqual(len(data["live_subscriptions"]), 1)
812
+ self.assertEqual(data["live_subscriptions"][0]["product__name"], "Gold")
813
+ self.assertEqual(data["live_subscriptions"][0]["id"], self.account.id)
814
+ self.assertEqual(
815
+ data["live_subscriptions"][0]["next_renewal"],
816
+ str(self.account.live_subscription_next_renewal),
817
+ )
818
+
819
+ def test_product_list(self):
820
+ response = self.client.get(reverse("product-list"))
821
+ self.assertEqual(response.status_code, 200)
822
+ data = response.json()
823
+ self.assertEqual(len(data["products"]), 1)
824
+ self.assertEqual(data["products"][0]["name"], "Gold")
825
+
826
+
827
+ class OnboardingWizardTests(TestCase):
828
+ def setUp(self):
829
+ self.client = Client()
830
+ User.objects.create_superuser("super", "super@example.com", "pwd")
831
+ self.client.force_login(User.objects.get(username="super"))
832
+
833
+ def test_onboarding_flow_creates_account(self):
834
+ details_url = reverse("admin:core_energyaccount_onboard_details")
835
+ response = self.client.get(details_url)
836
+ self.assertEqual(response.status_code, 200)
837
+ data = {
838
+ "first_name": "John",
839
+ "last_name": "Doe",
840
+ "rfid": "ABCD1234",
841
+ "vehicle_id": "VIN12345678901234",
842
+ }
843
+ resp = self.client.post(details_url, data)
844
+ self.assertEqual(resp.status_code, 302)
845
+ self.assertEqual(resp.url, reverse("admin:core_energyaccount_changelist"))
846
+ user = User.objects.get(first_name="John", last_name="Doe")
847
+ self.assertFalse(user.is_active)
848
+ account = EnergyAccount.objects.get(user=user)
849
+ self.assertTrue(account.rfids.filter(rfid="ABCD1234").exists())
850
+ self.assertTrue(account.vehicles.filter(vin="VIN12345678901234").exists())
851
+
852
+
853
+ class EVBrandFixtureTests(TestCase):
854
+ def test_ev_brand_fixture_loads(self):
855
+ call_command(
856
+ "loaddata",
857
+ *sorted(glob("core/fixtures/ev_brands__*.json")),
858
+ *sorted(glob("core/fixtures/ev_models__*.json")),
859
+ verbosity=0,
860
+ )
861
+ porsche = Brand.objects.get(name="Porsche")
862
+ audi = Brand.objects.get(name="Audi")
863
+ self.assertTrue(
864
+ {"WP0", "WP1"} <= set(porsche.wmi_codes.values_list("code", flat=True))
865
+ )
866
+ self.assertTrue(
867
+ set(audi.wmi_codes.values_list("code", flat=True)) >= {"WAU", "TRU"}
868
+ )
869
+ self.assertTrue(EVModel.objects.filter(brand=porsche, name="Taycan").exists())
870
+ self.assertTrue(EVModel.objects.filter(brand=audi, name="e-tron GT").exists())
871
+ self.assertTrue(EVModel.objects.filter(brand=porsche, name="Macan").exists())
872
+ model3 = EVModel.objects.get(brand__name="Tesla", name="Model 3 RWD")
873
+ self.assertEqual(model3.est_battery_kwh, Decimal("57.50"))
874
+
875
+ def test_brand_from_vin(self):
876
+ call_command(
877
+ "loaddata",
878
+ *sorted(glob("core/fixtures/ev_brands__*.json")),
879
+ verbosity=0,
880
+ )
881
+ self.assertEqual(Brand.from_vin("WP0ZZZ12345678901").name, "Porsche")
882
+ self.assertEqual(Brand.from_vin("WAUZZZ12345678901").name, "Audi")
883
+ self.assertIsNone(Brand.from_vin("XYZ12345678901234"))
884
+
885
+
886
+ class RFIDFixtureTests(TestCase):
887
+ def test_fixture_assigns_gelectriic_rfid(self):
888
+ call_command(
889
+ "loaddata",
890
+ "core/fixtures/users__arthexis.json",
891
+ "core/fixtures/energy_accounts__gelectriic.json",
892
+ "core/fixtures/rfids__ffffffff.json",
893
+ verbosity=0,
894
+ )
895
+ account = EnergyAccount.objects.get(name="GELECTRIIC")
896
+ tag = RFID.objects.get(rfid="FFFFFFFF")
897
+ self.assertIn(account, tag.energy_accounts.all())
898
+ self.assertEqual(tag.energy_accounts.count(), 1)
899
+
900
+
901
+ class RFIDImportExportCommandTests(TestCase):
902
+ def test_export_supports_account_names(self):
903
+ account = EnergyAccount.objects.create(name="PRIMARY")
904
+ tag = RFID.objects.create(rfid="CARD500")
905
+ tag.energy_accounts.add(account)
906
+
907
+ temp_file = tempfile.NamedTemporaryFile(delete=False)
908
+ temp_file.close()
909
+ rows = []
910
+ try:
911
+ call_command("export_rfids", temp_file.name, account_field="name")
912
+ with open(temp_file.name, newline="", encoding="utf-8") as fh:
913
+ reader = csv.DictReader(fh)
914
+ rows = list(reader)
915
+ finally:
916
+ os.unlink(temp_file.name)
917
+
918
+ self.assertEqual(len(rows), 1)
919
+ self.assertEqual(rows[0]["energy_account_names"], "PRIMARY")
920
+
921
+ def test_import_creates_missing_account_by_name(self):
922
+ temp_file = tempfile.NamedTemporaryFile("w", newline="", delete=False)
923
+ try:
924
+ writer = csv.writer(temp_file)
925
+ writer.writerow(
926
+ [
927
+ "rfid",
928
+ "custom_label",
929
+ "energy_account_names",
930
+ "allowed",
931
+ "color",
932
+ "released",
933
+ ]
934
+ )
935
+ writer.writerow(
936
+ [
937
+ "NAMETAG001",
938
+ "",
939
+ "Imported Account",
940
+ "true",
941
+ RFID.WHITE,
942
+ "true",
943
+ ]
944
+ )
945
+ temp_file.flush()
946
+ finally:
947
+ temp_file.close()
948
+
949
+ try:
950
+ call_command("import_rfids", temp_file.name, account_field="name")
951
+ finally:
952
+ os.unlink(temp_file.name)
953
+
954
+ account = EnergyAccount.objects.get(name="IMPORTED ACCOUNT")
955
+ tag = RFID.objects.get(rfid="NAMETAG001")
956
+ self.assertIsNone(account.user)
957
+ self.assertTrue(tag.energy_accounts.filter(pk=account.pk).exists())
958
+
959
+ def test_admin_export_supports_account_names(self):
960
+ account = EnergyAccount.objects.create(name="PRIMARY")
961
+ tag = RFID.objects.create(rfid="CARD501")
962
+ tag.energy_accounts.add(account)
963
+
964
+ resource = RFIDResource(account_field="name")
965
+ dataset = resource.export(queryset=RFID.objects.order_by("rfid"))
966
+
967
+ self.assertIn("energy_account_names", dataset.headers)
968
+ self.assertEqual(dataset.dict[0]["energy_account_names"], "PRIMARY")
969
+
970
+ def test_admin_import_creates_missing_account_by_name(self):
971
+ resource = RFIDResource(account_field="name")
972
+ headers = resource.get_export_headers()
973
+ dataset = Dataset()
974
+ dataset.headers = headers
975
+ row = {header: "" for header in headers}
976
+ row.update(
977
+ {
978
+ "label_id": "200",
979
+ "rfid": "NAMETAG002",
980
+ "custom_label": "",
981
+ "energy_account_names": "Imported Admin Account",
982
+ "allowed": "true",
983
+ "color": RFID.BLACK,
984
+ "kind": RFID.CLASSIC,
985
+ "released": "false",
986
+ }
987
+ )
988
+ dataset.append([row[h] for h in headers])
989
+
990
+ result = resource.import_data(dataset, dry_run=False)
991
+ self.assertFalse(result.has_errors())
992
+
993
+ account = EnergyAccount.objects.get(name="IMPORTED ADMIN ACCOUNT")
994
+ tag = RFID.objects.get(rfid="NAMETAG002")
995
+ self.assertTrue(tag.energy_accounts.filter(pk=account.pk).exists())
996
+
997
+
998
+ class CheckRFIDCommandTests(TestCase):
999
+ def test_successful_validation_outputs_json(self):
1000
+ out = StringIO()
1001
+
1002
+ call_command("check_rfid", "abcd1234", stdout=out)
1003
+
1004
+ payload = json.loads(out.getvalue())
1005
+ self.assertEqual(payload["rfid"], "ABCD1234")
1006
+ self.assertTrue(payload["created"])
1007
+ self.assertTrue(RFID.objects.filter(rfid="ABCD1234").exists())
1008
+
1009
+ def test_invalid_value_raises_error(self):
1010
+ with self.assertRaises(CommandError):
1011
+ call_command("check_rfid", "invalid!")
1012
+
1013
+ def test_kind_option_updates_existing_tag(self):
1014
+ tag = RFID.objects.create(rfid="EXISTING", allowed=False, kind=RFID.CLASSIC)
1015
+ out = StringIO()
1016
+
1017
+ call_command(
1018
+ "check_rfid",
1019
+ "existing",
1020
+ "--kind",
1021
+ RFID.NTAG215,
1022
+ stdout=out,
1023
+ )
1024
+
1025
+ payload = json.loads(out.getvalue())
1026
+ tag.refresh_from_db()
1027
+ self.assertFalse(payload["created"])
1028
+ self.assertEqual(payload["kind"], RFID.NTAG215)
1029
+ self.assertEqual(tag.kind, RFID.NTAG215)
1030
+
1031
+
1032
+ class RFIDKeyVerificationFlagTests(TestCase):
1033
+ def test_flags_reset_on_key_change(self):
1034
+ tag = RFID.objects.create(
1035
+ rfid="ABC12345", key_a_verified=True, key_b_verified=True
1036
+ )
1037
+ tag.key_a = "A1A1A1A1A1A1"
1038
+ tag.save()
1039
+ self.assertFalse(tag.key_a_verified)
1040
+ tag.key_b = "B1B1B1B1B1B1"
1041
+ tag.save()
1042
+ self.assertFalse(tag.key_b_verified)
1043
+
1044
+
1045
+ class SecurityGroupTests(TestCase):
1046
+ def test_parent_and_user_assignment(self):
1047
+ parent = SecurityGroup.objects.create(name="Parents")
1048
+ child = SecurityGroup.objects.create(name="Children", parent=parent)
1049
+ user = User.objects.create_user(username="sg_user", password="secret")
1050
+ child.user_set.add(user)
1051
+ self.assertEqual(child.parent, parent)
1052
+ self.assertIn(user, child.user_set.all())
1053
+
1054
+
1055
+ class ReleaseProcessTests(TestCase):
1056
+ def setUp(self):
1057
+ self.package = Package.objects.create(name="pkg")
1058
+ self.release = PackageRelease.objects.create(
1059
+ package=self.package, version="1.0.0"
1060
+ )
1061
+
1062
+ @mock.patch("core.views._collect_dirty_files")
1063
+ @mock.patch("core.views._sync_with_origin_main")
1064
+ @mock.patch("core.views.release_utils._git_clean", return_value=False)
1065
+ def test_step_check_requires_clean_repo(
1066
+ self, git_clean, sync_main, collect_dirty
1067
+ ):
1068
+ collect_dirty.return_value = [
1069
+ {"path": "core/models.py", "status": "M", "status_label": "Modified"}
1070
+ ]
1071
+ ctx: dict = {}
1072
+ with self.assertRaises(core_views.DirtyRepository):
1073
+ _step_check_version(self.release, ctx, Path("rel.log"))
1074
+ self.assertEqual(
1075
+ ctx["dirty_files"],
1076
+ [
1077
+ {
1078
+ "path": "core/models.py",
1079
+ "status": "M",
1080
+ "status_label": "Modified",
1081
+ }
1082
+ ],
1083
+ )
1084
+ sync_main.assert_called_once_with(Path("rel.log"))
1085
+
1086
+ def test_step_check_todos_logs_instruction_when_pending(self):
1087
+ log_path = Path("rel.log")
1088
+ log_path.unlink(missing_ok=True)
1089
+ Todo.objects.create(request="Review checklist")
1090
+ ctx: dict[str, object] = {}
1091
+
1092
+ try:
1093
+ with self.assertRaises(core_views.PendingTodos):
1094
+ core_views._step_check_todos(self.release, ctx, log_path)
1095
+
1096
+ contents = log_path.read_text(encoding="utf-8")
1097
+ message = "Release checklist requires acknowledgment before continuing."
1098
+ self.assertIn(message, contents)
1099
+ self.assertIn("Review outstanding TODO items", contents)
1100
+
1101
+ with self.assertRaises(core_views.PendingTodos):
1102
+ core_views._step_check_todos(self.release, ctx, log_path)
1103
+
1104
+ contents = log_path.read_text(encoding="utf-8")
1105
+ self.assertEqual(contents.count(message), 1)
1106
+ finally:
1107
+ log_path.unlink(missing_ok=True)
1108
+
1109
+ def test_step_check_todos_auto_ack_when_no_pending(self):
1110
+ log_path = Path("rel.log")
1111
+ log_path.unlink(missing_ok=True)
1112
+ ctx: dict[str, object] = {}
1113
+
1114
+ try:
1115
+ with mock.patch("core.views._refresh_changelog_once"):
1116
+ core_views._step_check_todos(self.release, ctx, log_path)
1117
+ finally:
1118
+ log_path.unlink(missing_ok=True)
1119
+
1120
+ self.assertTrue(ctx.get("todos_ack"))
1121
+ self.assertNotIn("todos_required", ctx)
1122
+ self.assertIsNone(ctx.get("todos"))
1123
+
1124
+ @mock.patch("core.views._sync_with_origin_main")
1125
+ @mock.patch("core.views.release_utils._git_clean", return_value=True)
1126
+ @mock.patch("core.views.release_utils.network_available", return_value=False)
1127
+ def test_step_check_keeps_repo_clean(
1128
+ self, network_available, git_clean, sync_main
1129
+ ):
1130
+ version_path = Path("VERSION")
1131
+ original = version_path.read_text(encoding="utf-8")
1132
+ _step_check_version(self.release, {}, Path("rel.log"))
1133
+ proc = subprocess.run(
1134
+ ["git", "status", "--porcelain", str(version_path)],
1135
+ capture_output=True,
1136
+ text=True,
1137
+ )
1138
+ self.assertFalse(proc.stdout.strip())
1139
+ self.assertEqual(version_path.read_text(encoding="utf-8"), original)
1140
+ sync_main.assert_called_once_with(Path("rel.log"))
1141
+
1142
+ @mock.patch("core.views.requests.get")
1143
+ @mock.patch("core.views._sync_with_origin_main")
1144
+ @mock.patch("core.views.release_utils.network_available", return_value=True)
1145
+ @mock.patch("core.views.release_utils._git_clean", return_value=True)
1146
+ def test_step_check_ignores_yanked_release(
1147
+ self, git_clean, network_available, sync_main, requests_get
1148
+ ):
1149
+ response = mock.Mock()
1150
+ response.ok = True
1151
+ response.json.return_value = {
1152
+ "releases": {
1153
+ "0.1.12": [
1154
+ {"filename": "pkg.whl", "yanked": True},
1155
+ {"filename": "pkg.tar.gz", "yanked": True},
1156
+ ]
1157
+ }
1158
+ }
1159
+ requests_get.return_value = response
1160
+ self.release.version = "0.1.12"
1161
+ _step_check_version(self.release, {}, Path("rel.log"))
1162
+ requests_get.assert_called_once()
1163
+ sync_main.assert_called_once_with(Path("rel.log"))
1164
+
1165
+ @mock.patch("core.views.requests.get")
1166
+ @mock.patch("core.views._sync_with_origin_main")
1167
+ @mock.patch("core.views.release_utils.network_available", return_value=True)
1168
+ @mock.patch("core.views.release_utils._git_clean", return_value=True)
1169
+ def test_step_check_blocks_available_release(
1170
+ self, git_clean, network_available, sync_main, requests_get
1171
+ ):
1172
+ response = mock.Mock()
1173
+ response.ok = True
1174
+ response.json.return_value = {
1175
+ "releases": {
1176
+ "0.1.12": [
1177
+ {"filename": "pkg.whl", "yanked": False},
1178
+ {"filename": "pkg.tar.gz"},
1179
+ ]
1180
+ }
1181
+ }
1182
+ requests_get.return_value = response
1183
+ self.release.version = "0.1.12"
1184
+ with self.assertRaises(Exception) as exc:
1185
+ _step_check_version(self.release, {}, Path("rel.log"))
1186
+ self.assertIn("already on PyPI", str(exc.exception))
1187
+ requests_get.assert_called_once()
1188
+ sync_main.assert_called_once_with(Path("rel.log"))
1189
+
1190
+ @mock.patch("core.views.release_utils.network_available", return_value=False)
1191
+ @mock.patch("core.views._collect_dirty_files")
1192
+ @mock.patch("core.views._sync_with_origin_main")
1193
+ @mock.patch("core.views.subprocess.run")
1194
+ @mock.patch("core.views.release_utils._git_clean", return_value=False)
1195
+ def test_step_check_commits_release_prep_changes(
1196
+ self,
1197
+ git_clean,
1198
+ subprocess_run,
1199
+ sync_main,
1200
+ collect_dirty,
1201
+ network_available,
1202
+ ):
1203
+ fixture_path = next(Path("core/fixtures").glob("releases__*.json"))
1204
+ collect_dirty.return_value = [
1205
+ {
1206
+ "path": str(fixture_path),
1207
+ "status": "M",
1208
+ "status_label": "Modified",
1209
+ },
1210
+ {"path": "CHANGELOG.rst", "status": "M", "status_label": "Modified"},
1211
+ ]
1212
+ subprocess_run.return_value = mock.Mock(returncode=0, stdout="", stderr="")
1213
+
1214
+ ctx: dict[str, object] = {}
1215
+ _step_check_version(self.release, ctx, Path("rel.log"))
1216
+
1217
+ add_call = mock.call(
1218
+ ["git", "add", str(fixture_path), "CHANGELOG.rst"],
1219
+ check=True,
1220
+ )
1221
+ commit_call = mock.call(
1222
+ [
1223
+ "git",
1224
+ "commit",
1225
+ "-m",
1226
+ "chore: sync release fixtures and changelog",
1227
+ ],
1228
+ check=True,
1229
+ )
1230
+ self.assertIn(add_call, subprocess_run.call_args_list)
1231
+ self.assertIn(commit_call, subprocess_run.call_args_list)
1232
+ self.assertNotIn("dirty_files", ctx)
1233
+
1234
+ @mock.patch("core.views.release_utils.network_available", return_value=False)
1235
+ @mock.patch("core.views._collect_dirty_files")
1236
+ @mock.patch("core.views._sync_with_origin_main")
1237
+ @mock.patch("core.views.subprocess.run")
1238
+ @mock.patch("core.views.release_utils._git_clean", return_value=False)
1239
+ def test_step_check_commits_changelog_only(
1240
+ self,
1241
+ git_clean,
1242
+ subprocess_run,
1243
+ sync_main,
1244
+ collect_dirty,
1245
+ network_available,
1246
+ ):
1247
+ collect_dirty.return_value = [
1248
+ {"path": "CHANGELOG.rst", "status": "M", "status_label": "Modified"}
1249
+ ]
1250
+ subprocess_run.return_value = mock.Mock(returncode=0, stdout="", stderr="")
1251
+
1252
+ ctx: dict[str, object] = {}
1253
+ _step_check_version(self.release, ctx, Path("rel.log"))
1254
+
1255
+ subprocess_run.assert_any_call(
1256
+ ["git", "add", "CHANGELOG.rst"], check=True
1257
+ )
1258
+ subprocess_run.assert_any_call(
1259
+ ["git", "commit", "-m", "docs: refresh changelog"], check=True
1260
+ )
1261
+ self.assertNotIn("dirty_files", ctx)
1262
+
1263
+ @mock.patch("core.models.PackageRelease.dump_fixture")
1264
+ def test_save_does_not_dump_fixture(self, dump):
1265
+ self.release.pypi_url = "https://example.com"
1266
+ self.release.save()
1267
+ dump.assert_not_called()
1268
+
1269
+ @mock.patch("core.views.subprocess.run")
1270
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1271
+ @mock.patch("core.views.release_utils.promote", side_effect=Exception("boom"))
1272
+ def test_promote_cleans_repo_on_failure(self, promote, dump_fixture, run):
1273
+ import subprocess as sp
1274
+
1275
+ def fake_run(cmd, check=True, capture_output=False, text=False):
1276
+ if capture_output:
1277
+ stdout = ""
1278
+ if cmd[:3] == ["git", "rev-parse", "origin/main"]:
1279
+ stdout = "abc123\n"
1280
+ elif cmd[:4] == ["git", "merge-base", "HEAD", "origin/main"]:
1281
+ stdout = "abc123\n"
1282
+ return sp.CompletedProcess(cmd, 0, stdout=stdout, stderr="")
1283
+ return sp.CompletedProcess(cmd, 0)
1284
+
1285
+ run.side_effect = fake_run
1286
+ with self.assertRaises(Exception):
1287
+ _step_promote_build(self.release, {}, Path("rel.log"))
1288
+ dump_fixture.assert_not_called()
1289
+ run.assert_any_call(["git", "reset", "--hard"], check=False)
1290
+ run.assert_any_call(["git", "clean", "-fd"], check=False)
1291
+
1292
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1293
+ @mock.patch("core.views._sync_with_origin_main")
1294
+ @mock.patch("core.views.subprocess.run")
1295
+ def test_pre_release_syncs_with_main(
1296
+ self, run, sync_main, dump_fixture
1297
+ ):
1298
+ import subprocess as sp
1299
+
1300
+ def fake_run(cmd, check=True, capture_output=False, text=False):
1301
+ if capture_output:
1302
+ return sp.CompletedProcess(cmd, 0, stdout="", stderr="")
1303
+ if cmd[:2] == ["git", "diff"]:
1304
+ return sp.CompletedProcess(cmd, 1)
1305
+ return sp.CompletedProcess(cmd, 0)
1306
+
1307
+ run.side_effect = fake_run
1308
+ version_path = Path("VERSION")
1309
+ original_version = version_path.read_text(encoding="utf-8")
1310
+
1311
+ try:
1312
+ _step_pre_release_actions(self.release, {}, Path("rel.log"))
1313
+ finally:
1314
+ version_path.write_text(original_version, encoding="utf-8")
1315
+
1316
+ sync_main.assert_called_once_with(Path("rel.log"))
1317
+ release_fixtures = sorted(
1318
+ str(path) for path in Path("core/fixtures").glob("releases__*.json")
1319
+ )
1320
+ if release_fixtures:
1321
+ run.assert_any_call(["git", "add", *release_fixtures], check=True)
1322
+ run.assert_any_call(["git", "add", "CHANGELOG.rst"], check=True)
1323
+ run.assert_any_call(["git", "add", "VERSION"], check=True)
1324
+ run.assert_any_call(["git", "diff", "--cached", "--quiet"], check=False)
1325
+ ensure_todo.assert_called_once_with(self.release, previous_version=mock.ANY)
1326
+
1327
+ @mock.patch("core.views.subprocess.run")
1328
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1329
+ @mock.patch("core.views.release_utils.promote")
1330
+ def test_promote_verifies_origin_and_pushes_main(self, promote, dump_fixture, run):
1331
+ import subprocess as sp
1332
+
1333
+ def fake_run(cmd, check=True, capture_output=False, text=False):
1334
+ if capture_output:
1335
+ stdout = ""
1336
+ if cmd[:3] == ["git", "rev-parse", "origin/main"]:
1337
+ stdout = "abc123\n"
1338
+ elif cmd[:4] == ["git", "merge-base", "HEAD", "origin/main"]:
1339
+ stdout = "abc123\n"
1340
+ return sp.CompletedProcess(cmd, 0, stdout=stdout, stderr="")
1341
+ return sp.CompletedProcess(cmd, 0)
1342
+
1343
+ run.side_effect = fake_run
1344
+ _step_promote_build(self.release, {}, Path("rel.log"))
1345
+ run.assert_any_call(["git", "fetch", "origin", "main"], check=True)
1346
+ run.assert_any_call(
1347
+ ["git", "rev-parse", "origin/main"],
1348
+ check=True,
1349
+ capture_output=True,
1350
+ text=True,
1351
+ )
1352
+ run.assert_any_call(
1353
+ ["git", "merge-base", "HEAD", "origin/main"],
1354
+ check=True,
1355
+ capture_output=True,
1356
+ text=True,
1357
+ )
1358
+ run.assert_any_call(["git", "push"], check=True)
1359
+
1360
+ @mock.patch("core.views.subprocess.run")
1361
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1362
+ @mock.patch("core.views.release_utils.promote")
1363
+ def test_promote_aborts_if_origin_advances(self, promote, dump_fixture, run):
1364
+ import subprocess as sp
1365
+
1366
+ def fake_run(cmd, check=True, capture_output=False, text=False):
1367
+ if capture_output:
1368
+ if cmd[:3] == ["git", "rev-parse", "origin/main"]:
1369
+ return sp.CompletedProcess(cmd, 0, stdout="new\n", stderr="")
1370
+ if cmd[:4] == ["git", "merge-base", "HEAD", "origin/main"]:
1371
+ return sp.CompletedProcess(cmd, 0, stdout="old\n", stderr="")
1372
+ return sp.CompletedProcess(cmd, 0, stdout="", stderr="")
1373
+ return sp.CompletedProcess(cmd, 0)
1374
+
1375
+ run.side_effect = fake_run
1376
+
1377
+ with self.assertRaises(Exception):
1378
+ _step_promote_build(self.release, {}, Path("rel.log"))
1379
+
1380
+ promote.assert_not_called()
1381
+ run.assert_any_call(["git", "reset", "--hard"], check=False)
1382
+ run.assert_any_call(["git", "clean", "-fd"], check=False)
1383
+
1384
+ @mock.patch("core.views.subprocess.run")
1385
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1386
+ def test_promote_advances_version(self, dump_fixture, run):
1387
+ import subprocess as sp
1388
+
1389
+ def fake_run(cmd, check=True, capture_output=False, text=False):
1390
+ if capture_output:
1391
+ stdout = ""
1392
+ if cmd[:3] == ["git", "rev-parse", "origin/main"]:
1393
+ stdout = "abc123\n"
1394
+ elif cmd[:4] == ["git", "merge-base", "HEAD", "origin/main"]:
1395
+ stdout = "abc123\n"
1396
+ return sp.CompletedProcess(cmd, 0, stdout=stdout, stderr="")
1397
+ return sp.CompletedProcess(cmd, 0)
1398
+
1399
+ run.side_effect = fake_run
1400
+
1401
+ version_path = Path("VERSION")
1402
+ original = version_path.read_text(encoding="utf-8")
1403
+ version_path.write_text("0.0.1\n", encoding="utf-8")
1404
+
1405
+ def fake_promote(*args, **kwargs):
1406
+ version_path.write_text(self.release.version + "\n", encoding="utf-8")
1407
+
1408
+ with mock.patch("core.views.release_utils.promote", side_effect=fake_promote):
1409
+ _step_promote_build(self.release, {}, Path("rel.log"))
1410
+
1411
+ self.assertEqual(
1412
+ version_path.read_text(encoding="utf-8"),
1413
+ self.release.version + "\n",
1414
+ )
1415
+ version_path.write_text(original, encoding="utf-8")
1416
+
1417
+ @mock.patch("core.views.timezone.now")
1418
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1419
+ @mock.patch("core.views.release_utils.publish")
1420
+ def test_publish_sets_pypi_url(self, publish, dump_fixture, now):
1421
+ now.return_value = datetime(2025, 3, 4, 5, 6, tzinfo=datetime_timezone.utc)
1422
+ publish.return_value = ["PyPI"]
1423
+ _step_publish(self.release, {}, Path("rel.log"))
1424
+ self.release.refresh_from_db()
1425
+ self.assertEqual(
1426
+ self.release.pypi_url,
1427
+ f"https://pypi.org/project/{self.package.name}/{self.release.version}/",
1428
+ )
1429
+ self.assertEqual(self.release.github_url, "")
1430
+ self.assertEqual(
1431
+ self.release.release_on,
1432
+ datetime(2025, 3, 4, 5, 6, tzinfo=datetime_timezone.utc),
1433
+ )
1434
+ dump_fixture.assert_called_once()
1435
+ publish.assert_called_once()
1436
+ kwargs = publish.call_args.kwargs
1437
+ self.assertIn("repositories", kwargs)
1438
+ repositories = kwargs["repositories"]
1439
+ self.assertEqual(len(repositories), 1)
1440
+ self.assertEqual(repositories[0].name, "PyPI")
1441
+
1442
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1443
+ @mock.patch("core.views.release_utils.publish", side_effect=Exception("boom"))
1444
+ def test_publish_failure_keeps_url_blank(self, publish, dump_fixture):
1445
+ with self.assertRaises(Exception):
1446
+ _step_publish(self.release, {}, Path("rel.log"))
1447
+ self.release.refresh_from_db()
1448
+ self.assertEqual(self.release.pypi_url, "")
1449
+ self.assertEqual(self.release.github_url, "")
1450
+ self.assertIsNone(self.release.release_on)
1451
+ dump_fixture.assert_not_called()
1452
+
1453
+ @mock.patch("core.views.timezone.now")
1454
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1455
+ @mock.patch("core.views.release_utils.publish")
1456
+ def test_publish_records_github_url_when_configured(
1457
+ self, publish, dump_fixture, now
1458
+ ):
1459
+ now.return_value = datetime(2025, 3, 4, 6, 7, tzinfo=datetime_timezone.utc)
1460
+ user = User.objects.create_superuser("release-owner", "owner@example.com", "pw")
1461
+ manager = ReleaseManager.objects.create(
1462
+ user=user,
1463
+ pypi_username="octocat",
1464
+ pypi_token="primary-token",
1465
+ github_token="gh-token",
1466
+ secondary_pypi_url="https://upload.github.com/pypi/",
1467
+ )
1468
+ self.release.release_manager = manager
1469
+ self.release.save(update_fields=["release_manager"])
1470
+ self.package.repository_url = "https://github.com/example/project"
1471
+ self.package.save(update_fields=["repository_url"])
1472
+ publish.return_value = ["PyPI", "GitHub Packages"]
1473
+
1474
+ _step_publish(self.release, {}, Path("rel.log"))
1475
+
1476
+ self.release.refresh_from_db()
1477
+ self.assertTrue(self.release.github_url)
1478
+ self.assertIn("github.com/example/project", self.release.github_url)
1479
+ args, kwargs = publish.call_args
1480
+ repositories = kwargs.get("repositories")
1481
+ self.assertEqual(len(repositories), 2)
1482
+ self.assertEqual(repositories[0].name, "PyPI")
1483
+ self.assertEqual(repositories[1].name, "GitHub Packages")
1484
+
1485
+ @mock.patch("core.views.subprocess.run")
1486
+ @mock.patch("core.views._sync_with_origin_main")
1487
+ def test_pre_release_actions_skipped_in_dry_run(self, sync_main, run):
1488
+ log_path = Path("rel.log")
1489
+ if log_path.exists():
1490
+ log_path.unlink()
1491
+
1492
+ try:
1493
+ _step_pre_release_actions(self.release, {"dry_run": True}, log_path)
1494
+ self.assertTrue(log_path.exists())
1495
+ contents = log_path.read_text(encoding="utf-8")
1496
+ self.assertIn("Dry run: skipping pre-release actions", contents)
1497
+ finally:
1498
+ if log_path.exists():
1499
+ log_path.unlink()
1500
+
1501
+ sync_main.assert_not_called()
1502
+ run.assert_not_called()
1503
+
1504
+ @mock.patch("core.views.release_utils.promote")
1505
+ def test_promote_build_skipped_in_dry_run(self, promote):
1506
+ log_path = Path("rel.log")
1507
+ if log_path.exists():
1508
+ log_path.unlink()
1509
+
1510
+ try:
1511
+ _step_promote_build(self.release, {"dry_run": True}, log_path)
1512
+ self.assertTrue(log_path.exists())
1513
+ contents = log_path.read_text(encoding="utf-8")
1514
+ self.assertIn("Dry run: skipping build promotion", contents)
1515
+ finally:
1516
+ if log_path.exists():
1517
+ log_path.unlink()
1518
+
1519
+ promote.assert_not_called()
1520
+
1521
+ @mock.patch("core.views.release_utils.publish")
1522
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1523
+ def test_publish_uses_test_repository_in_dry_run(self, dump_fixture, publish):
1524
+ log_path = Path("rel.log")
1525
+ if log_path.exists():
1526
+ log_path.unlink()
1527
+
1528
+ publish.return_value = ["Test PyPI"]
1529
+ env = {
1530
+ "PYPI_TEST_REPOSITORY_URL": "https://test.example/simple/",
1531
+ "PYPI_TEST_API_TOKEN": "token",
1532
+ }
1533
+
1534
+ with mock.patch.dict(os.environ, env, clear=False):
1535
+ _step_publish(self.release, {"dry_run": True}, log_path)
1536
+
1537
+ self.release.refresh_from_db()
1538
+ self.assertEqual(self.release.pypi_url, "")
1539
+ self.assertEqual(self.release.github_url, "")
1540
+ self.assertIsNone(self.release.release_on)
1541
+ dump_fixture.assert_not_called()
1542
+ publish.assert_called_once()
1543
+ repositories = publish.call_args.kwargs["repositories"]
1544
+ self.assertEqual(len(repositories), 1)
1545
+ target = repositories[0]
1546
+ self.assertEqual(target.name, "Test PyPI")
1547
+ self.assertEqual(target.repository_url, "https://test.example/simple/")
1548
+ self.assertFalse(target.verify_availability)
1549
+ self.assertTrue(log_path.exists())
1550
+ contents = log_path.read_text(encoding="utf-8")
1551
+ self.assertIn("Dry run: uploading distribution", contents)
1552
+ self.assertIn("Dry run: skipped release metadata updates", contents)
1553
+ log_path.unlink(missing_ok=True)
1554
+
1555
+ def test_release_progress_toggle_dry_run_before_start(self):
1556
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1557
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1558
+ self.client.force_login(user)
1559
+
1560
+ response = self.client.get(f"{url}?set_dry_run=1&dry_run=1", follow=True)
1561
+
1562
+ self.assertEqual(response.status_code, 200)
1563
+ context = response.context
1564
+ if isinstance(context, list):
1565
+ context = context[-1]
1566
+ self.assertTrue(context["dry_run"])
1567
+ self.assertTrue(context["dry_run_toggle_enabled"])
1568
+ session = self.client.session
1569
+ ctx = session.get(f"release_publish_{self.release.pk}")
1570
+ self.assertTrue(ctx.get("dry_run"))
1571
+
1572
+ def test_release_progress_toggle_blocked_while_running(self):
1573
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1574
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1575
+ self.client.force_login(user)
1576
+ session = self.client.session
1577
+ session[f"release_publish_{self.release.pk}"] = {
1578
+ "step": 0,
1579
+ "started": True,
1580
+ "paused": False,
1581
+ }
1582
+ session.save()
1583
+
1584
+ response = self.client.get(f"{url}?set_dry_run=1&dry_run=1")
1585
+ self.assertEqual(response.status_code, 302)
1586
+ session = self.client.session
1587
+ ctx = session.get(f"release_publish_{self.release.pk}")
1588
+ self.assertFalse(ctx.get("dry_run"))
1589
+
1590
+ follow = self.client.get(url)
1591
+ follow_context = follow.context
1592
+ if isinstance(follow_context, list):
1593
+ follow_context = follow_context[-1]
1594
+ self.assertFalse(follow_context["dry_run"])
1595
+ self.assertFalse(follow_context["dry_run_toggle_enabled"])
1596
+
1597
+ def test_start_request_sets_dry_run_flag(self):
1598
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1599
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1600
+ self.client.force_login(user)
1601
+
1602
+ self.client.get(f"{url}?start=1&dry_run=1")
1603
+
1604
+ session = self.client.session
1605
+ ctx = session.get(f"release_publish_{self.release.pk}")
1606
+ self.assertTrue(ctx.get("dry_run"))
1607
+
1608
+ def test_resume_button_shown_when_credentials_missing(self):
1609
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1610
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1611
+ self.client.force_login(user)
1612
+
1613
+ self.client.get(f"{url}?start=1")
1614
+
1615
+ session = self.client.session
1616
+ ctx = session.get(f"release_publish_{self.release.pk}") or {}
1617
+ ctx.update({"step": 7, "started": True, "paused": False})
1618
+ session[f"release_publish_{self.release.pk}"] = ctx
1619
+ session.save()
1620
+
1621
+ response = self.client.get(f"{url}?step=7")
1622
+ self.assertEqual(response.status_code, 200)
1623
+ context = response.context
1624
+ if isinstance(context, list):
1625
+ context = context[-1]
1626
+ self.assertTrue(context["resume_available"])
1627
+ self.assertIn(b"Resume Publish", response.content)
1628
+
1629
+ def test_resume_without_step_parameter_defaults_to_current_progress(self):
1630
+ run: list[str] = []
1631
+
1632
+ def step_fn(release, ctx, log_path):
1633
+ run.append("step")
1634
+
1635
+ steps = [("Only step", step_fn)]
1636
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1637
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1638
+ with mock.patch("core.views.PUBLISH_STEPS", steps):
1639
+ self.client.force_login(user)
1640
+ session = self.client.session
1641
+ session[f"release_publish_{self.release.pk}"] = {
1642
+ "step": 0,
1643
+ "started": True,
1644
+ "paused": False,
1645
+ }
1646
+ session.save()
1647
+
1648
+ response = self.client.get(f"{url}?resume=1")
1649
+ self.assertEqual(response.status_code, 200)
1650
+ self.assertEqual(run, ["step"])
1651
+
1652
+ session = self.client.session
1653
+ ctx = session.get(f"release_publish_{self.release.pk}")
1654
+ self.assertEqual(ctx.get("step"), 1)
1655
+
1656
+ def test_new_todo_does_not_reset_pending_flow(self):
1657
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1658
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1659
+ Todo.objects.create(request="Initial checklist item")
1660
+ steps = [("Confirm release TODO completion", core_views._step_check_todos)]
1661
+ with mock.patch("core.views.PUBLISH_STEPS", steps):
1662
+ self.client.force_login(user)
1663
+ response = self.client.get(url)
1664
+ self.assertTrue(response.context["has_pending_todos"])
1665
+ self.client.get(f"{url}?ack_todos=1")
1666
+ self.client.get(f"{url}?start=1")
1667
+ self.client.get(f"{url}?step=0")
1668
+ Todo.objects.create(request="Follow-up checklist item")
1669
+ response = self.client.get(url)
1670
+ self.assertEqual(
1671
+ Todo.objects.filter(is_deleted=False, done_on__isnull=True).count(),
1672
+ 1,
1673
+ )
1674
+ self.assertIsNone(response.context["todos"])
1675
+ self.assertFalse(response.context["has_pending_todos"])
1676
+ session = self.client.session
1677
+ ctx = session.get(f"release_publish_{self.release.pk}")
1678
+ self.assertTrue(ctx.get("todos_ack"))
1679
+
1680
+ def test_release_progress_uses_lockfile(self):
1681
+ run = []
1682
+
1683
+ def step1(release, ctx, log_path):
1684
+ run.append("step1")
1685
+
1686
+ def step2(release, ctx, log_path):
1687
+ run.append("step2")
1688
+
1689
+ steps = [("One", step1), ("Two", step2)]
1690
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1691
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1692
+ with mock.patch("core.views.PUBLISH_STEPS", steps):
1693
+ self.client.force_login(user)
1694
+ self.client.get(f"{url}?step=0")
1695
+ self.assertEqual(run, ["step1"])
1696
+ client2 = Client()
1697
+ client2.force_login(user)
1698
+ client2.get(f"{url}?step=1")
1699
+ self.assertEqual(run, ["step1", "step2"])
1700
+ lock_file = Path("locks") / f"release_publish_{self.release.pk}.json"
1701
+ self.assertFalse(lock_file.exists())
1702
+
1703
+ def test_release_progress_restart(self):
1704
+ run = []
1705
+
1706
+ def step_fail(release, ctx, log_path):
1707
+ run.append("step")
1708
+ raise Exception("boom")
1709
+
1710
+ steps = [("Fail", step_fail)]
1711
+ user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1712
+ url = reverse("release-progress", args=[self.release.pk, "publish"])
1713
+ count_file = Path("locks") / f"release_publish_{self.release.pk}.restarts"
1714
+ if count_file.exists():
1715
+ count_file.unlink()
1716
+ with mock.patch("core.views.PUBLISH_STEPS", steps):
1717
+ self.client.force_login(user)
1718
+ self.assertFalse(count_file.exists())
1719
+ self.client.get(f"{url}?step=0")
1720
+ self.client.get(f"{url}?step=0")
1721
+ self.assertEqual(run, ["step"])
1722
+ self.assertFalse(count_file.exists())
1723
+ self.client.get(f"{url}?restart=1")
1724
+ self.assertTrue(count_file.exists())
1725
+ self.assertEqual(count_file.read_text(), "1")
1726
+ self.client.get(f"{url}?step=0")
1727
+ self.assertEqual(run, ["step", "step"])
1728
+ self.client.get(f"{url}?restart=1")
1729
+ # Restart counter resets after running a step
1730
+ self.assertEqual(count_file.read_text(), "1")
1731
+
1732
+
1733
+ class PackageReleaseFixtureTests(TestCase):
1734
+ def setUp(self):
1735
+ self.base = Path("core/fixtures")
1736
+ self.existing_fixtures = {
1737
+ path: path.read_text(encoding="utf-8")
1738
+ for path in self.base.glob("releases__*.json")
1739
+ }
1740
+ self.addCleanup(self._restore_fixtures)
1741
+
1742
+ self.package = Package.objects.create(name="fixture-pkg")
1743
+ self.release_one = PackageRelease.objects.create(
1744
+ package=self.package,
1745
+ version="9.9.9",
1746
+ )
1747
+ self.release_two = PackageRelease.objects.create(
1748
+ package=self.package,
1749
+ version="9.9.10",
1750
+ )
1751
+
1752
+ def _restore_fixtures(self):
1753
+ current_paths = set(self.base.glob("releases__*.json"))
1754
+ for path in current_paths:
1755
+ if path not in self.existing_fixtures:
1756
+ path.unlink()
1757
+ for path, content in self.existing_fixtures.items():
1758
+ path.write_text(content, encoding="utf-8")
1759
+
1760
+ def test_dump_fixture_only_writes_changed_releases(self):
1761
+ PackageRelease.dump_fixture()
1762
+ target_one = self.base / "releases__packagerelease_9_9_9.json"
1763
+ target_two = self.base / "releases__packagerelease_9_9_10.json"
1764
+
1765
+ self.assertTrue(target_one.exists())
1766
+ self.assertTrue(target_two.exists())
1767
+
1768
+ self.release_two.changelog = "updated notes"
1769
+ self.release_two.save(update_fields=["changelog"])
1770
+
1771
+ original_write = Path.write_text
1772
+ written_paths: list[Path] = []
1773
+
1774
+ def tracking_write_text(path_obj, data, *args, **kwargs):
1775
+ written_paths.append(path_obj)
1776
+ return original_write(path_obj, data, *args, **kwargs)
1777
+
1778
+ with mock.patch("pathlib.Path.write_text", tracking_write_text):
1779
+ PackageRelease.dump_fixture()
1780
+
1781
+ written_set = set(written_paths)
1782
+ self.assertNotIn(target_one, written_set)
1783
+ self.assertIn(target_two, written_set)
1784
+ self.assertIn("updated notes", target_two.read_text(encoding="utf-8"))
1785
+
1786
+ def test_dump_fixture_removes_missing_release_files(self):
1787
+ PackageRelease.dump_fixture()
1788
+ target_two = self.base / "releases__packagerelease_9_9_10.json"
1789
+ self.assertTrue(target_two.exists())
1790
+
1791
+ self.release_two.delete()
1792
+
1793
+ PackageRelease.dump_fixture()
1794
+
1795
+ self.assertFalse(target_two.exists())
1796
+
1797
+
1798
+ class ReleaseProgressSyncTests(TestCase):
1799
+ def setUp(self):
1800
+ self.client = Client()
1801
+ self.user = User.objects.create_superuser("admin", "admin@example.com", "pw")
1802
+ self.client.force_login(self.user)
1803
+ self.package = Package.objects.get(name="arthexis")
1804
+ self.version_path = Path("VERSION")
1805
+ self.original_version = self.version_path.read_text(encoding="utf-8")
1806
+ self.version_path.write_text("1.2.3", encoding="utf-8")
1807
+
1808
+ def tearDown(self):
1809
+ self.version_path.write_text(self.original_version, encoding="utf-8")
1810
+
1811
+ @mock.patch("core.views.PackageRelease.dump_fixture")
1812
+ @mock.patch("core.views.revision.get_revision", return_value="abc123")
1813
+ def test_unpublished_release_syncs_version_and_revision(
1814
+ self, get_revision, dump_fixture
1815
+ ):
1816
+ release = PackageRelease.objects.create(
1817
+ package=self.package,
1818
+ version="1.0.0",
1819
+ )
1820
+ release.revision = "oldrev"
1821
+ release.save(update_fields=["revision"])
1822
+
1823
+ url = reverse("release-progress", args=[release.pk, "publish"])
1824
+ response = self.client.get(url)
1825
+
1826
+ self.assertEqual(response.status_code, 200)
1827
+ release.refresh_from_db()
1828
+ self.assertEqual(release.version, "1.2.4")
1829
+ self.assertEqual(release.revision, "abc123")
1830
+ dump_fixture.assert_called_once()
1831
+
1832
+ def test_published_release_not_current_returns_404(self):
1833
+ release = PackageRelease.objects.create(
1834
+ package=self.package,
1835
+ version="1.2.4",
1836
+ pypi_url="https://example.com",
1837
+ )
1838
+
1839
+ url = reverse("release-progress", args=[release.pk, "publish"])
1840
+ response = self.client.get(url)
1841
+
1842
+ self.assertEqual(response.status_code, 404)
1843
+
1844
+
1845
+ class ReleaseProgressFixtureVisibilityTests(TestCase):
1846
+ def setUp(self):
1847
+ self.client = Client()
1848
+ self.user = User.objects.create_superuser(
1849
+ "fixture-check", "fixture@example.com", "pw"
1850
+ )
1851
+ self.client.force_login(self.user)
1852
+ current_version = Path("VERSION").read_text(encoding="utf-8").strip()
1853
+ package = Package.objects.filter(is_active=True).first()
1854
+ if package is None:
1855
+ package = Package.objects.create(name="fixturepkg", is_active=True)
1856
+ try:
1857
+ self.release = PackageRelease.objects.get(
1858
+ package=package, version=current_version
1859
+ )
1860
+ except PackageRelease.DoesNotExist:
1861
+ self.release = PackageRelease.objects.create(
1862
+ package=package, version=current_version
1863
+ )
1864
+ self.session_key = f"release_publish_{self.release.pk}"
1865
+ self.log_name = core_views._release_log_name(
1866
+ self.release.package.name, self.release.version
1867
+ )
1868
+ self.lock_path = Path("locks") / f"{self.session_key}.json"
1869
+ self.restart_path = Path("locks") / f"{self.session_key}.restarts"
1870
+ self.log_path = Path("logs") / self.log_name
1871
+ for path in (self.lock_path, self.restart_path, self.log_path):
1872
+ if path.exists():
1873
+ path.unlink()
1874
+ try:
1875
+ self.fixture_step_index = next(
1876
+ idx
1877
+ for idx, (name, _) in enumerate(core_views.PUBLISH_STEPS)
1878
+ if name == core_views.FIXTURE_REVIEW_STEP_NAME
1879
+ )
1880
+ except StopIteration: # pragma: no cover - defensive guard
1881
+ self.fail("Fixture review step not configured in publish steps")
1882
+ self.url = reverse("release-progress", args=[self.release.pk, "publish"])
1883
+
1884
+ def tearDown(self):
1885
+ session = self.client.session
1886
+ if self.session_key in session:
1887
+ session.pop(self.session_key)
1888
+ session.save()
1889
+ for path in (self.lock_path, self.restart_path, self.log_path):
1890
+ if path.exists():
1891
+ path.unlink()
1892
+ super().tearDown()
1893
+
1894
+ def _set_session(self, step: int, fixtures: list[dict]):
1895
+ session = self.client.session
1896
+ session[self.session_key] = {
1897
+ "step": step,
1898
+ "fixtures": fixtures,
1899
+ "log": self.log_name,
1900
+ "started": True,
1901
+ }
1902
+ session.save()
1903
+
1904
+ def test_fixture_summary_visible_until_migration_step(self):
1905
+ fixtures = [
1906
+ {
1907
+ "path": "core/fixtures/example.json",
1908
+ "count": 2,
1909
+ "models": ["core.Model"],
1910
+ }
1911
+ ]
1912
+ self._set_session(self.fixture_step_index, fixtures)
1913
+ response = self.client.get(self.url)
1914
+ self.assertEqual(response.status_code, 200)
1915
+ self.assertEqual(response.context["fixtures"], fixtures)
1916
+ self.assertContains(response, "Fixture changes")
1917
+
1918
+ def test_fixture_summary_hidden_after_migration_step(self):
1919
+ fixtures = [
1920
+ {
1921
+ "path": "core/fixtures/example.json",
1922
+ "count": 2,
1923
+ "models": ["core.Model"],
1924
+ }
1925
+ ]
1926
+ self._set_session(self.fixture_step_index + 1, fixtures)
1927
+ response = self.client.get(self.url)
1928
+ self.assertEqual(response.status_code, 200)
1929
+ self.assertIsNone(response.context["fixtures"])
1930
+ self.assertNotContains(response, "Fixture changes")
1931
+
1932
+
1933
+ class PackageReleaseAdminActionTests(TestCase):
1934
+ def setUp(self):
1935
+ self.factory = RequestFactory()
1936
+ self.site = AdminSite()
1937
+ self.admin = PackageReleaseAdmin(PackageRelease, self.site)
1938
+ self.messages = []
1939
+
1940
+ def _capture_message(request, message, level=messages.INFO):
1941
+ self.messages.append((message, level))
1942
+
1943
+ self.admin.message_user = _capture_message
1944
+ self.package = Package.objects.create(name="pkg")
1945
+ self.package.is_active = True
1946
+ self.package.save(update_fields=["is_active"])
1947
+ self.release = PackageRelease.objects.create(
1948
+ package=self.package,
1949
+ version="1.0.0",
1950
+ pypi_url="https://pypi.org/project/pkg/1.0.0/",
1951
+ )
1952
+ self.request = self.factory.get("/")
1953
+
1954
+ @mock.patch("core.admin.PackageRelease.dump_fixture")
1955
+ @mock.patch("core.admin.requests.get")
1956
+ def test_validate_deletes_missing_release(self, mock_get, dump):
1957
+ mock_get.return_value.status_code = 404
1958
+ self.admin.validate_releases(self.request, PackageRelease.objects.all())
1959
+ self.assertEqual(PackageRelease.objects.count(), 0)
1960
+ dump.assert_called_once()
1961
+
1962
+ @mock.patch("core.admin.PackageRelease.dump_fixture")
1963
+ @mock.patch("core.admin.requests.get")
1964
+ def test_validate_keeps_existing_release(self, mock_get, dump):
1965
+ mock_get.return_value.status_code = 200
1966
+ self.admin.validate_releases(self.request, PackageRelease.objects.all())
1967
+ self.assertEqual(PackageRelease.objects.count(), 1)
1968
+ dump.assert_not_called()
1969
+
1970
+ @mock.patch("core.admin.PackageRelease.dump_fixture")
1971
+ @mock.patch("core.admin.requests.get")
1972
+ def test_refresh_from_pypi_reports_missing_releases(self, mock_get, dump):
1973
+ mock_get.return_value.raise_for_status.return_value = None
1974
+ mock_get.return_value.json.return_value = {
1975
+ "releases": {
1976
+ "1.0.0": [
1977
+ {"upload_time_iso_8601": "2024-01-01T12:30:00.000000Z"}
1978
+ ],
1979
+ "1.1.0": [
1980
+ {"upload_time_iso_8601": "2024-02-02T15:45:00.000000Z"}
1981
+ ],
1982
+ }
1983
+ }
1984
+ self.admin.refresh_from_pypi(self.request, PackageRelease.objects.none())
1985
+ self.assertFalse(
1986
+ PackageRelease.objects.filter(version="1.1.0").exists()
1987
+ )
1988
+ dump.assert_not_called()
1989
+ self.assertIn(
1990
+ (
1991
+ "Manual creation required for 1 release: 1.1.0",
1992
+ messages.WARNING,
1993
+ ),
1994
+ self.messages,
1995
+ )
1996
+
1997
+ @mock.patch("core.admin.PackageRelease.dump_fixture")
1998
+ @mock.patch("core.admin.requests.get")
1999
+ def test_refresh_from_pypi_updates_release_date(self, mock_get, dump):
2000
+ self.release.release_on = None
2001
+ self.release.save(update_fields=["release_on"])
2002
+ mock_get.return_value.raise_for_status.return_value = None
2003
+ mock_get.return_value.json.return_value = {
2004
+ "releases": {
2005
+ "1.0.0": [
2006
+ {"upload_time_iso_8601": "2024-01-01T12:30:00.000000Z"}
2007
+ ]
2008
+ }
2009
+ }
2010
+ self.admin.refresh_from_pypi(self.request, PackageRelease.objects.none())
2011
+ self.release.refresh_from_db()
2012
+ self.assertEqual(
2013
+ self.release.release_on,
2014
+ datetime(2024, 1, 1, 12, 30, tzinfo=datetime_timezone.utc),
2015
+ )
2016
+ dump.assert_called_once()
2017
+
2018
+ @mock.patch("core.admin.PackageRelease.dump_fixture")
2019
+ @mock.patch("core.admin.requests.get")
2020
+ def test_refresh_from_pypi_restores_deleted_release(self, mock_get, dump):
2021
+ self.release.is_deleted = True
2022
+ self.release.save(update_fields=["is_deleted"])
2023
+ mock_get.return_value.raise_for_status.return_value = None
2024
+ mock_get.return_value.json.return_value = {
2025
+ "releases": {
2026
+ "1.0.0": [
2027
+ {"upload_time_iso_8601": "2024-01-01T12:30:00.000000Z"}
2028
+ ]
2029
+ }
2030
+ }
2031
+
2032
+ self.admin.refresh_from_pypi(self.request, PackageRelease.objects.none())
2033
+
2034
+ self.assertTrue(
2035
+ PackageRelease.objects.filter(version="1.0.0").exists()
2036
+ )
2037
+ dump.assert_called_once()
2038
+
2039
+ @mock.patch("core.admin.release_utils.check_pypi_readiness")
2040
+ def test_test_pypi_connection_action_reports_messages(self, check):
2041
+ check.return_value = types.SimpleNamespace(
2042
+ ok=True,
2043
+ messages=[
2044
+ ("success", "Twine available"),
2045
+ ("warning", "Offline mode enabled; skipping network connectivity checks"),
2046
+ ],
2047
+ )
2048
+
2049
+ self.admin.test_pypi_connection(
2050
+ self.request, PackageRelease.objects.filter(pk=self.release.pk)
2051
+ )
2052
+
2053
+ self.assertIn(
2054
+ (f"{self.release}: Twine available", messages.SUCCESS),
2055
+ self.messages,
2056
+ )
2057
+ self.assertIn(
2058
+ (
2059
+ f"{self.release}: Offline mode enabled; skipping network connectivity checks",
2060
+ messages.WARNING,
2061
+ ),
2062
+ self.messages,
2063
+ )
2064
+ self.assertIn(
2065
+ (f"{self.release}: PyPI connectivity check passed", messages.SUCCESS),
2066
+ self.messages,
2067
+ )
2068
+
2069
+ @mock.patch("core.admin.release_utils.check_pypi_readiness")
2070
+ def test_test_pypi_connection_handles_errors(self, check):
2071
+ check.return_value = types.SimpleNamespace(
2072
+ ok=False, messages=[("error", "Missing PyPI credentials")]
2073
+ )
2074
+
2075
+ self.admin.test_pypi_connection(
2076
+ self.request, PackageRelease.objects.filter(pk=self.release.pk)
2077
+ )
2078
+
2079
+ self.assertIn(
2080
+ (f"{self.release}: Missing PyPI credentials", messages.ERROR),
2081
+ self.messages,
2082
+ )
2083
+ self.assertNotIn(
2084
+ (f"{self.release}: PyPI connectivity check passed", messages.SUCCESS),
2085
+ self.messages,
2086
+ )
2087
+
2088
+ @mock.patch("core.admin.release_utils.check_pypi_readiness")
2089
+ def test_test_pypi_connection_action_button(self, check):
2090
+ check.return_value = types.SimpleNamespace(
2091
+ ok=True, messages=[("success", "Twine available")]
2092
+ )
2093
+
2094
+ self.admin.test_pypi_connection_action(self.request, self.release)
2095
+
2096
+ self.assertIn(
2097
+ (f"{self.release}: PyPI connectivity check passed", messages.SUCCESS),
2098
+ self.messages,
2099
+ )
2100
+
2101
+ def test_test_pypi_connection_requires_selection(self):
2102
+ self.admin.test_pypi_connection(self.request, PackageRelease.objects.none())
2103
+
2104
+ self.assertIn(
2105
+ ("Select at least one release to test", messages.ERROR), self.messages
2106
+ )
2107
+
2108
+
2109
+ class PackageActiveTests(TestCase):
2110
+ def test_only_one_active_package(self):
2111
+ default = Package.objects.get(name="arthexis")
2112
+ self.assertTrue(default.is_active)
2113
+ other = Package.objects.create(name="pkg", is_active=True)
2114
+ default.refresh_from_db()
2115
+ other.refresh_from_db()
2116
+ self.assertFalse(default.is_active)
2117
+ self.assertTrue(other.is_active)
2118
+
2119
+
2120
+ class PackageReleaseCurrentTests(TestCase):
2121
+ def setUp(self):
2122
+ self.package = Package.objects.get(name="arthexis")
2123
+ self.version_path = Path("VERSION")
2124
+ self.original = self.version_path.read_text()
2125
+ self.version_path.write_text("1.0.0")
2126
+ self.release = PackageRelease.objects.create(
2127
+ package=self.package, version="1.0.0"
2128
+ )
2129
+
2130
+ def tearDown(self):
2131
+ self.version_path.write_text(self.original)
2132
+
2133
+ def test_is_current_true_when_version_matches_and_package_active(self):
2134
+ self.assertTrue(self.release.is_current)
2135
+
2136
+ def test_is_current_false_when_package_inactive(self):
2137
+ self.package.is_active = False
2138
+ self.package.save()
2139
+ self.assertFalse(self.release.is_current)
2140
+
2141
+ def test_is_current_false_when_version_has_plus(self):
2142
+ self.version_path.write_text("1.0.0+")
2143
+ self.assertFalse(self.release.is_current)
2144
+
2145
+
2146
+ class PackageReleaseRevisionTests(TestCase):
2147
+ def setUp(self):
2148
+ self.package = Package.objects.get(name="arthexis")
2149
+ self.release = PackageRelease.objects.create(
2150
+ package=self.package,
2151
+ version="1.0.0",
2152
+ revision="abcdef123456",
2153
+ )
2154
+
2155
+ def test_matches_revision_ignores_plus_suffix(self):
2156
+ self.assertTrue(
2157
+ PackageRelease.matches_revision("1.0.0+", "abcdef123456")
2158
+ )
2159
+
2160
+ def test_is_current_false_when_version_differs(self):
2161
+ self.release.version = "2.0.0"
2162
+ self.release.save()
2163
+ self.assertFalse(self.release.is_current)
2164
+
2165
+
2166
+ class PackageReleaseChangelistTests(TestCase):
2167
+ def setUp(self):
2168
+ self.client = Client()
2169
+ User.objects.create_superuser("admin", "admin@example.com", "pw")
2170
+ self.client.force_login(User.objects.get(username="admin"))
2171
+
2172
+ def test_prepare_next_release_button_present(self):
2173
+ response = self.client.get(reverse("admin:core_packagerelease_changelist"))
2174
+ prepare_url = reverse(
2175
+ "admin:core_packagerelease_actions", args=["prepare_next_release"]
2176
+ )
2177
+ self.assertContains(response, prepare_url, html=False)
2178
+
2179
+ def test_refresh_from_pypi_button_present(self):
2180
+ response = self.client.get(reverse("admin:core_packagerelease_changelist"))
2181
+ refresh_url = reverse(
2182
+ "admin:core_packagerelease_actions", args=["refresh_from_pypi"]
2183
+ )
2184
+ self.assertContains(response, refresh_url, html=False)
2185
+
2186
+ def test_prepare_next_release_action_creates_release(self):
2187
+ package = Package.objects.get(name="arthexis")
2188
+ PackageRelease.all_objects.filter(package=package).delete()
2189
+ response = self.client.post(
2190
+ reverse(
2191
+ "admin:core_packagerelease_actions", args=["prepare_next_release"]
2192
+ )
2193
+ )
2194
+ self.assertEqual(response.status_code, 302)
2195
+ self.assertTrue(
2196
+ PackageRelease.all_objects.filter(package=package).exists()
2197
+ )
2198
+
2199
+
2200
+ class PackageAdminPrepareNextReleaseTests(TestCase):
2201
+ def setUp(self):
2202
+ self.factory = RequestFactory()
2203
+ self.site = AdminSite()
2204
+ self.admin = PackageAdmin(Package, self.site)
2205
+ self.admin.message_user = lambda *args, **kwargs: None
2206
+ self.package = Package.objects.get(name="arthexis")
2207
+
2208
+ def test_prepare_next_release_active_creates_release(self):
2209
+ PackageRelease.all_objects.filter(package=self.package).delete()
2210
+ request = self.factory.post("/admin/core/package/prepare-next-release/")
2211
+ response = self.admin.prepare_next_release_active(request)
2212
+ self.assertEqual(response.status_code, 302)
2213
+ self.assertEqual(
2214
+ PackageRelease.all_objects.filter(package=self.package).count(), 1
2215
+ )
2216
+
2217
+ def test_prepare_next_release_active_get_creates_release(self):
2218
+ PackageRelease.all_objects.filter(package=self.package).delete()
2219
+ request = self.factory.get("/admin/core/package/prepare-next-release/")
2220
+ response = self.admin.prepare_next_release_active(request)
2221
+ self.assertEqual(response.status_code, 302)
2222
+ self.assertTrue(
2223
+ PackageRelease.all_objects.filter(package=self.package).exists()
2224
+ )
2225
+
2226
+
2227
+ class PackageAdminChangeViewTests(TestCase):
2228
+ def setUp(self):
2229
+ self.client = Client()
2230
+ User.objects.create_superuser("admin", "admin@example.com", "pw")
2231
+ self.client.force_login(User.objects.get(username="admin"))
2232
+ self.package = Package.objects.get(name="arthexis")
2233
+
2234
+ def test_prepare_next_release_button_visible_on_change_view(self):
2235
+ response = self.client.get(
2236
+ reverse("admin:core_package_change", args=[self.package.pk])
2237
+ )
2238
+ self.assertContains(response, "Prepare next Release")
2239
+
2240
+
2241
+ class TodoDoneTests(TestCase):
2242
+ def setUp(self):
2243
+ self.client = Client()
2244
+ User.objects.create_superuser("admin", "admin@example.com", "pw")
2245
+ self.client.force_login(User.objects.get(username="admin"))
2246
+
2247
+ @mock.patch("core.models.revision_utils.get_revision", return_value="rev123")
2248
+ def test_mark_done_sets_timestamp(self, _get_revision):
2249
+ todo = Todo.objects.create(request="Task", is_seed_data=True)
2250
+ resp = self.client.post(reverse("todo-done", args=[todo.pk]))
2251
+ self.assertRedirects(resp, reverse("admin:index"))
2252
+ todo.refresh_from_db()
2253
+ self.assertIsNotNone(todo.done_on)
2254
+ self.assertFalse(todo.is_deleted)
2255
+ self.assertIsNone(todo.done_node)
2256
+ version_path = Path(settings.BASE_DIR) / "VERSION"
2257
+ expected_version = ""
2258
+ if version_path.exists():
2259
+ expected_version = version_path.read_text(encoding="utf-8").strip()
2260
+ self.assertEqual(todo.done_version, expected_version)
2261
+ self.assertEqual(todo.done_revision, "rev123")
2262
+ self.assertEqual(todo.done_username, "admin")
2263
+
2264
+ def test_mark_done_updates_seed_fixture(self):
2265
+ todo = Todo.objects.create(request="Task", is_seed_data=True)
2266
+ with tempfile.TemporaryDirectory() as tmp:
2267
+ base = Path(tmp)
2268
+ fixture_dir = base / "core" / "fixtures"
2269
+ fixture_dir.mkdir(parents=True)
2270
+ fixture_path = fixture_dir / "todo__task.json"
2271
+ fixture_path.write_text(
2272
+ json.dumps(
2273
+ [
2274
+ {
2275
+ "model": "core.todo",
2276
+ "fields": {
2277
+ "request": "Task",
2278
+ "url": "",
2279
+ "request_details": "",
2280
+ },
2281
+ }
2282
+ ],
2283
+ indent=2,
2284
+ )
2285
+ + "\n",
2286
+ encoding="utf-8",
2287
+ )
2288
+
2289
+ with override_settings(BASE_DIR=base):
2290
+ with mock.patch(
2291
+ "core.models.revision_utils.get_revision", return_value="rev456"
2292
+ ):
2293
+ resp = self.client.post(reverse("todo-done", args=[todo.pk]))
2294
+
2295
+ self.assertRedirects(resp, reverse("admin:index"))
2296
+ data = json.loads(fixture_path.read_text(encoding="utf-8"))
2297
+ self.assertEqual(len(data), 1)
2298
+ fields = data[0]["fields"]
2299
+ self.assertIn("done_on", fields)
2300
+ self.assertTrue(fields["done_on"])
2301
+ self.assertFalse(fields.get("is_deleted", False))
2302
+ self.assertIn("done_version", fields)
2303
+ self.assertEqual(fields.get("done_revision"), "rev456")
2304
+ self.assertEqual(fields.get("done_username"), "admin")
2305
+
2306
+ def test_soft_delete_updates_seed_fixture(self):
2307
+ todo = Todo.objects.create(request="Task", is_seed_data=True)
2308
+ with tempfile.TemporaryDirectory() as tmp:
2309
+ base = Path(tmp)
2310
+ fixture_dir = base / "core" / "fixtures"
2311
+ fixture_dir.mkdir(parents=True)
2312
+ fixture_path = fixture_dir / "todo__task.json"
2313
+ fixture_path.write_text(
2314
+ json.dumps(
2315
+ [
2316
+ {
2317
+ "model": "core.todo",
2318
+ "fields": {
2319
+ "request": "Task",
2320
+ "url": "",
2321
+ "request_details": "",
2322
+ },
2323
+ }
2324
+ ],
2325
+ indent=2,
2326
+ )
2327
+ + "\n",
2328
+ encoding="utf-8",
2329
+ )
2330
+
2331
+ with override_settings(BASE_DIR=base):
2332
+ todo.delete()
2333
+
2334
+ data = json.loads(fixture_path.read_text(encoding="utf-8"))
2335
+ self.assertEqual(len(data), 1)
2336
+ fields = data[0]["fields"]
2337
+ self.assertTrue(fields.get("is_deleted"))
2338
+
2339
+ def test_mark_done_missing_task_refreshes(self):
2340
+ todo = Todo.objects.create(request="Task", is_seed_data=True)
2341
+ todo.delete()
2342
+ resp = self.client.post(reverse("todo-done", args=[todo.pk]))
2343
+ self.assertRedirects(resp, reverse("admin:index"))
2344
+ messages = [m.message for m in get_messages(resp.wsgi_request)]
2345
+ self.assertFalse(messages)
2346
+
2347
+ def test_mark_done_condition_failure_shows_message(self):
2348
+ todo = Todo.objects.create(
2349
+ request="Task",
2350
+ on_done_condition="1 = 0",
2351
+ )
2352
+ resp = self.client.post(reverse("todo-done", args=[todo.pk]))
2353
+ self.assertRedirects(resp, reverse("admin:index"))
2354
+ messages = [m.message for m in get_messages(resp.wsgi_request)]
2355
+ self.assertTrue(messages)
2356
+ self.assertIn("1 = 0", messages[0])
2357
+ todo.refresh_from_db()
2358
+ self.assertIsNone(todo.done_on)
2359
+
2360
+ def test_mark_done_condition_invalid_expression(self):
2361
+ todo = Todo.objects.create(
2362
+ request="Task",
2363
+ on_done_condition="1; SELECT 1",
2364
+ )
2365
+ resp = self.client.post(reverse("todo-done", args=[todo.pk]))
2366
+ self.assertRedirects(resp, reverse("admin:index"))
2367
+ messages = [m.message for m in get_messages(resp.wsgi_request)]
2368
+ self.assertTrue(messages)
2369
+ self.assertIn("Semicolons", messages[0])
2370
+ todo.refresh_from_db()
2371
+ self.assertIsNone(todo.done_on)
2372
+
2373
+ def test_mark_done_condition_resolves_sigils(self):
2374
+ todo = Todo.objects.create(
2375
+ request="Task",
2376
+ on_done_condition="[TEST]",
2377
+ )
2378
+ with mock.patch.object(Todo, "resolve_sigils", return_value="1 = 1") as resolver:
2379
+ resp = self.client.post(reverse("todo-done", args=[todo.pk]))
2380
+ self.assertRedirects(resp, reverse("admin:index"))
2381
+ resolver.assert_called_once_with("on_done_condition")
2382
+ todo.refresh_from_db()
2383
+ self.assertIsNotNone(todo.done_on)
2384
+
2385
+ def test_mark_done_respects_next_parameter(self):
2386
+ todo = Todo.objects.create(request="Task")
2387
+ next_url = reverse("admin:index") + "?section=todos"
2388
+ resp = self.client.post(
2389
+ reverse("todo-done", args=[todo.pk]),
2390
+ {"next": next_url},
2391
+ )
2392
+ self.assertRedirects(resp, next_url, target_status_code=200)
2393
+ todo.refresh_from_db()
2394
+ self.assertIsNotNone(todo.done_on)
2395
+
2396
+ def test_mark_done_rejects_external_next(self):
2397
+ todo = Todo.objects.create(request="Task")
2398
+ resp = self.client.post(
2399
+ reverse("todo-done", args=[todo.pk]),
2400
+ {"next": "https://example.com/"},
2401
+ )
2402
+ self.assertRedirects(resp, reverse("admin:index"))
2403
+ todo.refresh_from_db()
2404
+ self.assertIsNotNone(todo.done_on)
2405
+
2406
+ def test_env_refresh_preserves_completed_fixture_todo(self):
2407
+ base_dir = Path(settings.BASE_DIR)
2408
+ fixture_path = base_dir / "core" / "fixtures" / "todo__validate_screen_system_reports.json"
2409
+ spec = importlib.util.spec_from_file_location(
2410
+ "env_refresh_todo", base_dir / "env-refresh.py"
2411
+ )
2412
+ env_refresh = importlib.util.module_from_spec(spec)
2413
+ spec.loader.exec_module(env_refresh)
2414
+ fixture_rel_path = str(fixture_path.relative_to(base_dir))
2415
+ env_refresh._fixture_files = lambda: [fixture_rel_path]
2416
+
2417
+ from django.core.management import call_command as django_call
2418
+
2419
+ def fake_call_command(name, *args, **kwargs):
2420
+ if name == "loaddata":
2421
+ return django_call(name, *args, **kwargs)
2422
+ return None
2423
+
2424
+ env_refresh.call_command = fake_call_command
2425
+ env_refresh.load_shared_user_fixtures = lambda *args, **kwargs: None
2426
+ env_refresh.load_user_fixtures = lambda *args, **kwargs: None
2427
+ env_refresh.generate_model_sigils = lambda: None
2428
+
2429
+ env_refresh.run_database_tasks()
2430
+
2431
+ todo = Todo.objects.get(request="Validate screen System Reports")
2432
+ self.assertTrue(todo.is_seed_data)
2433
+ todo.done_on = timezone.now()
2434
+ todo.save(update_fields=["done_on"])
2435
+
2436
+ env_refresh.run_database_tasks()
2437
+
2438
+ todo.refresh_from_db()
2439
+ self.assertIsNotNone(todo.done_on)
2440
+ self.assertTrue(todo.is_seed_data)
2441
+
2442
+
2443
+ class TodoDeleteTests(TestCase):
2444
+ def setUp(self):
2445
+ self.client = Client()
2446
+ User.objects.create_superuser("admin", "admin@example.com", "pw")
2447
+ self.client.force_login(User.objects.get(username="admin"))
2448
+
2449
+ def test_delete_marks_task_deleted(self):
2450
+ todo = Todo.objects.create(request="Task", is_seed_data=True)
2451
+ resp = self.client.post(reverse("todo-delete", args=[todo.pk]))
2452
+ self.assertRedirects(resp, reverse("admin:index"))
2453
+ todo.refresh_from_db()
2454
+ self.assertTrue(todo.is_deleted)
2455
+ self.assertIsNone(todo.done_on)
2456
+
2457
+ def test_delete_updates_seed_fixture(self):
2458
+ todo = Todo.objects.create(request="Task", is_seed_data=True)
2459
+ with tempfile.TemporaryDirectory() as tmp:
2460
+ base = Path(tmp)
2461
+ fixture_dir = base / "core" / "fixtures"
2462
+ fixture_dir.mkdir(parents=True)
2463
+ fixture_path = fixture_dir / "todo__task.json"
2464
+ fixture_path.write_text(
2465
+ json.dumps(
2466
+ [
2467
+ {
2468
+ "model": "core.todo",
2469
+ "fields": {
2470
+ "request": "Task",
2471
+ "url": "",
2472
+ "request_details": "",
2473
+ },
2474
+ }
2475
+ ],
2476
+ indent=2,
2477
+ )
2478
+ + "\n",
2479
+ encoding="utf-8",
2480
+ )
2481
+
2482
+ with override_settings(BASE_DIR=base):
2483
+ resp = self.client.post(reverse("todo-delete", args=[todo.pk]))
2484
+ self.assertRedirects(resp, reverse("admin:index"))
2485
+ data = json.loads(fixture_path.read_text(encoding="utf-8"))
2486
+ self.assertEqual(len(data), 1)
2487
+ fields = data[0]["fields"]
2488
+ self.assertTrue(fields.get("is_deleted"))
2489
+
2490
+ def test_delete_missing_task_redirects(self):
2491
+ todo = Todo.objects.create(request="Task")
2492
+ todo.is_deleted = True
2493
+ todo.save(update_fields=["is_deleted"])
2494
+ resp = self.client.post(reverse("todo-delete", args=[todo.pk]))
2495
+ self.assertRedirects(resp, reverse("admin:index"))
2496
+
2497
+
2498
+ class TodoFocusViewTests(TestCase):
2499
+ def setUp(self):
2500
+ self.client = Client()
2501
+ User.objects.create_superuser("admin", "admin@example.com", "pw")
2502
+ self.client.force_login(User.objects.get(username="admin"))
2503
+
2504
+ def test_focus_view_renders_requested_page(self):
2505
+ todo = Todo.objects.create(request="Task", url="/docs/")
2506
+ next_url = reverse("admin:index")
2507
+ resp = self.client.get(
2508
+ f"{reverse('todo-focus', args=[todo.pk])}?next={quote(next_url)}"
2509
+ )
2510
+ self.assertEqual(resp.status_code, 200)
2511
+ self.assertContains(resp, todo.request)
2512
+ self.assertEqual(resp["X-Frame-Options"], "SAMEORIGIN")
2513
+ self.assertContains(resp, f'src="{todo.url}"')
2514
+ self.assertContains(resp, "Done")
2515
+ self.assertContains(resp, "Delete")
2516
+ self.assertContains(resp, "Back")
2517
+ self.assertContains(resp, "Take Snapshot")
2518
+ snapshot_url = reverse("todo-snapshot", args=[todo.pk])
2519
+ self.assertContains(resp, snapshot_url)
2520
+
2521
+ def test_focus_view_uses_admin_change_when_no_url(self):
2522
+ todo = Todo.objects.create(request="Task")
2523
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2524
+ change_url = reverse("admin:core_todo_change", args=[todo.pk])
2525
+ self.assertContains(resp, f'src="{change_url}"')
2526
+
2527
+ def test_focus_view_includes_open_target_button(self):
2528
+ todo = Todo.objects.create(request="Task", url="/docs/")
2529
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2530
+ self.assertContains(resp, 'class="todo-button todo-button-open"')
2531
+ self.assertContains(resp, 'target="_blank"')
2532
+ self.assertContains(resp, 'href="/docs/"')
2533
+
2534
+ def test_focus_view_sanitizes_loopback_absolute_url(self):
2535
+ todo = Todo.objects.create(
2536
+ request="Task",
2537
+ url="http://127.0.0.1:8000/docs/?section=chart",
2538
+ )
2539
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2540
+ self.assertContains(resp, 'src="/docs/?section=chart"')
2541
+
2542
+ def test_focus_view_rejects_external_absolute_url(self):
2543
+ todo = Todo.objects.create(
2544
+ request="Task",
2545
+ url="https://outside.invalid/external/",
2546
+ )
2547
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2548
+ change_url = reverse("admin:core_todo_change", args=[todo.pk])
2549
+ self.assertContains(resp, f'src="{change_url}"')
2550
+
2551
+ def test_focus_view_avoids_recursive_focus_url(self):
2552
+ todo = Todo.objects.create(request="Task")
2553
+ focus_url = reverse("todo-focus", args=[todo.pk])
2554
+ Todo.objects.filter(pk=todo.pk).update(url=focus_url)
2555
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2556
+ change_url = reverse("admin:core_todo_change", args=[todo.pk])
2557
+ self.assertContains(resp, f'src="{change_url}"')
2558
+
2559
+ def test_focus_view_avoids_recursive_focus_absolute_url(self):
2560
+ todo = Todo.objects.create(request="Task")
2561
+ focus_url = reverse("todo-focus", args=[todo.pk])
2562
+ Todo.objects.filter(pk=todo.pk).update(url=f"http://testserver{focus_url}")
2563
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2564
+ change_url = reverse("admin:core_todo_change", args=[todo.pk])
2565
+ self.assertContains(resp, f'src="{change_url}"')
2566
+
2567
+ def test_focus_view_parses_auth_directives(self):
2568
+ todo = Todo.objects.create(
2569
+ request="Task",
2570
+ url="/docs/?section=chart&_todo_auth=logout&_todo_auth=user:demo&_todo_auth=perm:core.view_user&_todo_auth=extra",
2571
+ )
2572
+ resp = self.client.get(reverse("todo-focus", args=[todo.pk]))
2573
+ self.assertContains(resp, 'src="/docs/?section=chart"')
2574
+ self.assertContains(resp, 'href="/docs/?section=chart"')
2575
+ self.assertContains(resp, "logged out")
2576
+ self.assertContains(resp, "Sign in using: demo")
2577
+ self.assertContains(resp, "Required permissions: core.view_user")
2578
+ self.assertContains(resp, "Additional authentication notes: extra")
2579
+
2580
+ def test_focus_view_redirects_if_todo_completed(self):
2581
+ todo = Todo.objects.create(request="Task")
2582
+ todo.done_on = timezone.now()
2583
+ todo.save(update_fields=["done_on"])
2584
+ next_url = reverse("admin:index")
2585
+ resp = self.client.get(
2586
+ f"{reverse('todo-focus', args=[todo.pk])}?next={quote(next_url)}"
2587
+ )
2588
+ self.assertRedirects(resp, next_url, target_status_code=200)
2589
+
2590
+
2591
+ class TodoSnapshotViewTests(TestCase):
2592
+ PNG_PIXEL = (
2593
+ "data:image/png;base64," "iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAAAAAA6fptVAAAACklEQVR42mP8/5+hHgAFgwJ/lSdX6QAAAABJRU5ErkJggg=="
2594
+ )
2595
+
2596
+ def setUp(self):
2597
+ self.user = User.objects.create_user(
2598
+ username="manager", password="secret", is_staff=True
2599
+ )
2600
+ self.client.force_login(self.user)
2601
+ self.todo = Todo.objects.create(
2602
+ request="QA release notes", request_details="Verify layout"
2603
+ )
2604
+
2605
+ def test_snapshot_creates_content_sample(self):
2606
+ tmpdir = tempfile.TemporaryDirectory()
2607
+ self.addCleanup(tmpdir.cleanup)
2608
+ with override_settings(LOG_DIR=Path(tmpdir.name)):
2609
+ response = self.client.post(
2610
+ reverse("todo-snapshot", args=[self.todo.pk]),
2611
+ data=json.dumps({"image": self.PNG_PIXEL}),
2612
+ content_type="application/json",
2613
+ )
2614
+ self.assertEqual(response.status_code, 200)
2615
+ payload = response.json()
2616
+ self.assertIn("sample", payload)
2617
+ self.assertEqual(ContentSample.objects.filter(kind=ContentSample.IMAGE).count(), 1)
2618
+ sample = ContentSample.objects.get(pk=payload["sample"])
2619
+ self.assertEqual(sample.method, "TODO_QA")
2620
+ self.assertEqual(sample.user, self.user)
2621
+ self.assertEqual(sample.content, "QA release notes — Verify layout")
2622
+ rel_path = Path(sample.path)
2623
+ self.assertTrue(rel_path.parts)
2624
+ self.assertEqual(rel_path.parts[0], "screenshots")
2625
+ self.assertTrue((Path(tmpdir.name) / rel_path).exists())
2626
+
2627
+ def test_snapshot_rejects_completed_todo(self):
2628
+ self.todo.done_on = timezone.now()
2629
+ self.todo.save(update_fields=["done_on"])
2630
+ tmpdir = tempfile.TemporaryDirectory()
2631
+ self.addCleanup(tmpdir.cleanup)
2632
+ with override_settings(LOG_DIR=Path(tmpdir.name)):
2633
+ response = self.client.post(
2634
+ reverse("todo-snapshot", args=[self.todo.pk]),
2635
+ data=json.dumps({"image": self.PNG_PIXEL}),
2636
+ content_type="application/json",
2637
+ )
2638
+ self.assertEqual(response.status_code, 400)
2639
+ self.assertEqual(ContentSample.objects.count(), 0)
2640
+
2641
+
2642
+ class TodoUrlValidationTests(TestCase):
2643
+ def test_relative_url_valid(self):
2644
+ todo = Todo(request="Task", url="/path")
2645
+ todo.full_clean() # should not raise
2646
+
2647
+ def test_absolute_url_invalid(self):
2648
+ todo = Todo(request="Task", url="https://example.com/path")
2649
+ with self.assertRaises(ValidationError):
2650
+ todo.full_clean()
2651
+
2652
+
2653
+ class TodoUniqueTests(TestCase):
2654
+ def test_request_unique_case_insensitive(self):
2655
+ Todo.objects.create(request="Task")
2656
+ with self.assertRaises(IntegrityError):
2657
+ Todo.objects.create(request="task")
2658
+
2659
+
2660
+ class TodoAdminPermissionTests(TestCase):
2661
+ def setUp(self):
2662
+ self.client = Client()
2663
+ User.objects.create_superuser("admin", "admin@example.com", "pw")
2664
+ self.client.force_login(User.objects.get(username="admin"))
2665
+
2666
+ def test_add_view_disallowed(self):
2667
+ resp = self.client.get(reverse("admin:core_todo_add"))
2668
+ self.assertEqual(resp.status_code, 403)
2669
+
2670
+ def test_change_form_loads(self):
2671
+ todo = Todo.objects.create(request="Task")
2672
+ resp = self.client.get(reverse("admin:core_todo_change", args=[todo.pk]))
2673
+ self.assertEqual(resp.status_code, 200)