mirror of
https://github.com/nottinghamtec/PyRIGS.git
synced 2026-01-17 13:32:15 +00:00
* Upgrade to heroku-20 stack * Move some gulp deps to dev rather than prod * npm upgrade * Fix audit time check in asset audit test * Attempt at parallelising tests where possible * Add basic calendar button test Mainly to pickup on FullCalendar loading errors * Upgrade python deps * Tends to help if I push valid yaml * You valid now? * Fix whoops in requirements.txt * Change python ver * Define service in coveralls task * Run parallelised RIGS tests as one matrix job * Update python version in tests * Cache python dependencies Should majorly speedup parallelillelelised testing * Purge old vagrant config * No Ruby compass bodge, no need for rubocop! * Purge old .idea config * Switch to gh-a artifact uploading instead of imgur 'hack' For test failure screenshots. Happy now @mattysmith22? ;p * Oops, remove unused import * Exclude tests from the coverage stats Seems to be artifically deflating our stats * Refactor asset audit tests with better selectors Also fixed a silly title error with the modal * Add title checking to the slightly insane assets test * Fix unauth test to not just immediately pass out * Upload failure screenshots as individual artifacts not a zip Turns out I can't unzip things from my phone, which is a pain * Should fix asset test on CI * What about this? * What about this? Swear I spend my life jiggerypokerying the damn test suite... * Does this help the coverage be less weird? * Revert "Does this help the coverage be less weird?" This reverts commit39ab9df836. * Use pytest as our test runner for better parallelism Also rewrote some asset tests to be in the pytest style. May do some more. Some warnings cleaned up in the process. * Bah, codestyle * Oops, remove obsolete if check * Fix screenshot uploading on CI (again) * Try this way of parallel coverage * Add codeclimate maintainability badge * Remove some unused gulp dependencies * Run asset building serverside * Still helps if I commit valid YAML * See below * Different approach to CI dependencies * Exclude node_modules from codestyle * Does this work? * Parallel parallel builds were giving me a headache, try this * Update codeclimate settings, purge some config files * Well the YAML was *syntactically* valid.... * Switch back to old coveralls method * Fix codeclimate config, mark 2 * Attempt to bodge asset test * Oops, again Probably bedtime.. * Might fix heroku building * Attempt #2 at fixing heroku * Belt and braces approach to coverage * Github, you need a Actions YAML validator! * Might fix actions? * Try ignoring some third party deprecation warnings * Another go at making coverage show up * Some template cleanup * Minor python cleanup * Import optimisation * Revert "Minor python cleanup" This reverts commit6a4620a2e5. * Add format arg to coverage command * Ignore test directories from Heroku slug * Maybe this works to purge deps postbuild * Bunch of test refactoring * Restore signals import, screw you import optimisation * Further template refactoring * Add support for running tests with geckodriver, do this on CI * Screw you codestyle * Disable firefox tests for now That was way more errors than I expected * Run cleanup script from the right location * Plausibly fix tests * Helps if I don't delete the pipeline folder prior to collectstatic * Enable whitenoise * Can I delete pipeline here? * Allow seconds difference in assert_times_equal * Disable codeclimate * Remove not working rm command * Maybe this fixes coverage? * Try different coverage reporter * Fix search_help to need login * Made versioning magic a bit less expansive We have more apps than I thought... * Fix IDI0T error in Assets URLS * Refactor 'no access to unauthed' test to cover all of PyRIGS * Add RAs/Checklists to sample data generator * Fix some HTML errors in templates Which apparently only Django's HTML parser cares about, browsers DGAF... * Port title test to project level * Fix more HTML * Fix cable type detail
460 lines
20 KiB
Python
460 lines
20 KiB
Python
from datetime import date
|
|
|
|
from django.core.exceptions import ObjectDoesNotExist
|
|
from django.core.management import call_command
|
|
from django.test import TestCase
|
|
from django.test.utils import override_settings
|
|
from django.urls import reverse, reverse_lazy
|
|
from django.utils import timezone
|
|
from pytest_django.asserts import assertRedirects, assertNotContains, assertContains
|
|
|
|
from PyRIGS.tests.base import assert_times_equal
|
|
from RIGS import models
|
|
|
|
|
|
class TestAdminMergeObjects(TestCase):
|
|
@classmethod
|
|
def setUpTestData(cls):
|
|
cls.profile = models.Profile.objects.create(username="testuser1", email="1@test.com", is_superuser=True,
|
|
is_active=True, is_staff=True)
|
|
|
|
cls.persons = {
|
|
1: models.Person.objects.create(name="Person 1"),
|
|
2: models.Person.objects.create(name="Person 2"),
|
|
3: models.Person.objects.create(name="Person 3"),
|
|
}
|
|
|
|
cls.organisations = {
|
|
1: models.Organisation.objects.create(name="Organisation 1"),
|
|
2: models.Organisation.objects.create(name="Organisation 2"),
|
|
3: models.Organisation.objects.create(name="Organisation 3"),
|
|
}
|
|
|
|
cls.venues = {
|
|
1: models.Venue.objects.create(name="Venue 1"),
|
|
2: models.Venue.objects.create(name="Venue 2"),
|
|
3: models.Venue.objects.create(name="Venue 3"),
|
|
}
|
|
|
|
cls.events = {
|
|
1: models.Event.objects.create(name="TE E1", start_date=date.today(), person=cls.persons[1],
|
|
organisation=cls.organisations[3], venue=cls.venues[2]),
|
|
2: models.Event.objects.create(name="TE E2", start_date=date.today(), person=cls.persons[2],
|
|
organisation=cls.organisations[2], venue=cls.venues[3]),
|
|
3: models.Event.objects.create(name="TE E3", start_date=date.today(), person=cls.persons[3],
|
|
organisation=cls.organisations[1], venue=cls.venues[1]),
|
|
4: models.Event.objects.create(name="TE E4", start_date=date.today(), person=cls.persons[3],
|
|
organisation=cls.organisations[3], venue=cls.venues[3]),
|
|
}
|
|
|
|
def setUp(self):
|
|
self.profile.set_password('testuser')
|
|
self.profile.save()
|
|
self.assertTrue(self.client.login(username=self.profile.username, password='testuser'))
|
|
|
|
def test_merge_confirmation(self):
|
|
change_url = reverse('admin:RIGS_venue_changelist')
|
|
data = {
|
|
'action': 'merge',
|
|
'_selected_action': [str(val.pk) for key, val in self.venues.items()]
|
|
|
|
}
|
|
response = self.client.post(change_url, data, follow=True)
|
|
|
|
self.assertContains(response, "The following objects will be merged")
|
|
for key, venue in self.venues.items():
|
|
self.assertContains(response, venue.name)
|
|
|
|
def test_merge_no_master(self):
|
|
change_url = reverse('admin:RIGS_venue_changelist')
|
|
data = {'action': 'merge',
|
|
'_selected_action': [str(val.pk) for key, val in self.venues.items()],
|
|
'post': 'yes',
|
|
}
|
|
response = self.client.post(change_url, data, follow=True)
|
|
|
|
self.assertContains(response, "An error occured")
|
|
|
|
def test_venue_merge(self):
|
|
change_url = reverse('admin:RIGS_venue_changelist')
|
|
|
|
data = {'action': 'merge',
|
|
'_selected_action': [str(self.venues[1].pk), str(self.venues[2].pk)],
|
|
'post': 'yes',
|
|
'master': self.venues[1].pk
|
|
}
|
|
|
|
response = self.client.post(change_url, data, follow=True)
|
|
self.assertContains(response, "Objects successfully merged")
|
|
self.assertContains(response, self.venues[1].name)
|
|
|
|
# Check the master copy still exists
|
|
self.assertTrue(models.Venue.objects.get(pk=self.venues[1].pk))
|
|
|
|
# Check the un-needed venue has been disposed of
|
|
self.assertRaises(ObjectDoesNotExist, models.Venue.objects.get, pk=self.venues[2].pk)
|
|
|
|
# Check the one we didn't delete is still there
|
|
self.assertEqual(models.Venue.objects.get(pk=self.venues[3].pk), self.venues[3])
|
|
|
|
# Check the events have been moved to the master venue
|
|
for key, event in self.events.items():
|
|
updatedEvent = models.Event.objects.get(pk=event.pk)
|
|
if event.venue == self.venues[3]: # The one we left in place
|
|
continue
|
|
self.assertEqual(updatedEvent.venue, self.venues[1])
|
|
|
|
def test_person_merge(self):
|
|
change_url = reverse('admin:RIGS_person_changelist')
|
|
|
|
data = {'action': 'merge',
|
|
'_selected_action': [str(self.persons[1].pk), str(self.persons[2].pk)],
|
|
'post': 'yes',
|
|
'master': self.persons[1].pk
|
|
}
|
|
|
|
response = self.client.post(change_url, data, follow=True)
|
|
self.assertContains(response, "Objects successfully merged")
|
|
self.assertContains(response, self.persons[1].name)
|
|
|
|
# Check the master copy still exists
|
|
self.assertTrue(models.Person.objects.get(pk=self.persons[1].pk))
|
|
|
|
# Check the un-needed people have been disposed of
|
|
self.assertRaises(ObjectDoesNotExist, models.Person.objects.get, pk=self.persons[2].pk)
|
|
|
|
# Check the one we didn't delete is still there
|
|
self.assertEqual(models.Person.objects.get(pk=self.persons[3].pk), self.persons[3])
|
|
|
|
# Check the events have been moved to the master person
|
|
for key, event in self.events.items():
|
|
updatedEvent = models.Event.objects.get(pk=event.pk)
|
|
if event.person == self.persons[3]: # The one we left in place
|
|
continue
|
|
self.assertEqual(updatedEvent.person, self.persons[1])
|
|
|
|
def test_organisation_merge(self):
|
|
change_url = reverse('admin:RIGS_organisation_changelist')
|
|
|
|
data = {'action': 'merge',
|
|
'_selected_action': [str(self.organisations[1].pk), str(self.organisations[2].pk)],
|
|
'post': 'yes',
|
|
'master': self.organisations[1].pk
|
|
}
|
|
|
|
response = self.client.post(change_url, data, follow=True)
|
|
self.assertContains(response, "Objects successfully merged")
|
|
self.assertContains(response, self.organisations[1].name)
|
|
|
|
# Check the master copy still exists
|
|
self.assertTrue(models.Organisation.objects.get(pk=self.organisations[1].pk))
|
|
|
|
# Check the un-needed organisations have been disposed of
|
|
self.assertRaises(ObjectDoesNotExist, models.Organisation.objects.get, pk=self.organisations[2].pk)
|
|
|
|
# Check the one we didn't delete is still there
|
|
self.assertEqual(models.Organisation.objects.get(pk=self.organisations[3].pk), self.organisations[3])
|
|
|
|
# Check the events have been moved to the master organisation
|
|
for key, event in self.events.items():
|
|
updatedEvent = models.Event.objects.get(pk=event.pk)
|
|
if event.organisation == self.organisations[3]: # The one we left in place
|
|
continue
|
|
self.assertEqual(updatedEvent.organisation, self.organisations[1])
|
|
|
|
|
|
class TestInvoiceDelete(TestCase):
|
|
@classmethod
|
|
def setUpTestData(cls):
|
|
cls.profile = models.Profile.objects.create(username="testuser1", email="1@test.com", is_superuser=True,
|
|
is_active=True, is_staff=True)
|
|
|
|
cls.vatrate = models.VatRate.objects.create(start_at='2014-03-05', rate=0.20, comment='test1')
|
|
|
|
cls.events = {
|
|
1: models.Event.objects.create(name="TE E1", start_date=date.today()),
|
|
2: models.Event.objects.create(name="TE E2", start_date=date.today())
|
|
}
|
|
|
|
cls.invoices = {
|
|
1: models.Invoice.objects.create(event=cls.events[1]),
|
|
2: models.Invoice.objects.create(event=cls.events[2])
|
|
}
|
|
|
|
cls.payments = {
|
|
1: models.Payment.objects.create(invoice=cls.invoices[1], date=date.today(), amount=12.34,
|
|
method=models.Payment.CASH)
|
|
}
|
|
|
|
def setUp(self):
|
|
self.profile.set_password('testuser')
|
|
self.profile.save()
|
|
self.assertTrue(self.client.login(username=self.profile.username, password='testuser'))
|
|
|
|
def test_invoice_delete_allowed(self):
|
|
request_url = reverse('invoice_delete', kwargs={'pk': self.invoices[2].pk})
|
|
|
|
response = self.client.get(request_url, follow=True)
|
|
self.assertContains(response, "Are you sure")
|
|
|
|
# Check the invoice still exists
|
|
self.assertTrue(models.Invoice.objects.get(pk=self.invoices[2].pk))
|
|
|
|
# Actually delete it
|
|
response = self.client.post(request_url, follow=True)
|
|
|
|
# Check the invoice is deleted
|
|
self.assertRaises(ObjectDoesNotExist, models.Invoice.objects.get, pk=self.invoices[2].pk)
|
|
|
|
def test_invoice_delete_not_allowed(self):
|
|
request_url = reverse('invoice_delete', kwargs={'pk': self.invoices[1].pk})
|
|
|
|
response = self.client.get(request_url, follow=True)
|
|
self.assertContains(response, "To delete an invoice, delete the payments first.")
|
|
|
|
# Check the invoice still exists
|
|
self.assertTrue(models.Invoice.objects.get(pk=self.invoices[1].pk))
|
|
|
|
# Try to actually delete it
|
|
response = self.client.post(request_url, follow=True)
|
|
|
|
# Check this didn't work
|
|
self.assertTrue(models.Invoice.objects.get(pk=self.invoices[1].pk))
|
|
|
|
|
|
class TestPrintPaperwork(TestCase):
|
|
@classmethod
|
|
def setUpTestData(cls):
|
|
cls.profile = models.Profile.objects.create(username="testuser1", email="1@test.com", is_superuser=True,
|
|
is_active=True, is_staff=True)
|
|
|
|
cls.vatrate = models.VatRate.objects.create(start_at='2014-03-05', rate=0.20, comment='test1')
|
|
|
|
cls.events = {
|
|
1: models.Event.objects.create(name="TE E1", start_date=date.today(),
|
|
description="This is an event description\nthat for a very specific reason spans two lines."),
|
|
}
|
|
|
|
cls.invoices = {
|
|
1: models.Invoice.objects.create(event=cls.events[1]),
|
|
}
|
|
|
|
def setUp(self):
|
|
self.profile.set_password('testuser')
|
|
self.profile.save()
|
|
self.assertTrue(self.client.login(username=self.profile.username, password='testuser'))
|
|
|
|
def test_print_paperwork_success(self):
|
|
request_url = reverse('event_print', kwargs={'pk': self.events[1].pk})
|
|
|
|
response = self.client.get(request_url, follow=True)
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
def test_print_invoice_success(self):
|
|
request_url = reverse('invoice_print', kwargs={'pk': self.invoices[1].pk})
|
|
|
|
response = self.client.get(request_url, follow=True)
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
|
|
class TestEmbeddedViews(TestCase):
|
|
@classmethod
|
|
def setUpTestData(cls):
|
|
cls.profile = models.Profile.objects.create(username="testuser1", email="1@test.com", is_superuser=True,
|
|
is_active=True, is_staff=True)
|
|
|
|
cls.events = {
|
|
1: models.Event.objects.create(name="TE E1", start_date=date.today()),
|
|
2: models.Event.objects.create(name="TE E2", start_date=date.today())
|
|
}
|
|
|
|
cls.invoices = {
|
|
1: models.Invoice.objects.create(event=cls.events[1]),
|
|
2: models.Invoice.objects.create(event=cls.events[2])
|
|
}
|
|
|
|
cls.payments = {
|
|
1: models.Payment.objects.create(invoice=cls.invoices[1], date=date.today(), amount=12.34,
|
|
method=models.Payment.CASH)
|
|
}
|
|
|
|
def setUp(self):
|
|
self.profile.set_password('testuser')
|
|
self.profile.save()
|
|
|
|
def testLoginRedirect(self):
|
|
request_url = reverse('event_embed', kwargs={'pk': 1})
|
|
expected_url = "{0}?next={1}".format(reverse('login_embed'), request_url)
|
|
|
|
# Request the page and check it redirects
|
|
response = self.client.get(request_url, follow=True)
|
|
self.assertRedirects(response, expected_url, status_code=302, target_status_code=200)
|
|
|
|
# Now login
|
|
self.assertTrue(self.client.login(username=self.profile.username, password='testuser'))
|
|
|
|
# And check that it no longer redirects
|
|
response = self.client.get(request_url, follow=True)
|
|
self.assertEqual(len(response.redirect_chain), 0)
|
|
|
|
def testLoginCookieWarning(self):
|
|
login_url = reverse('login_embed')
|
|
response = self.client.post(login_url, follow=True)
|
|
self.assertContains(response, "Cookies do not seem to be enabled")
|
|
|
|
def testXFrameHeaders(self):
|
|
event_url = reverse('event_embed', kwargs={'pk': 1})
|
|
login_url = reverse('login_embed')
|
|
|
|
self.assertTrue(self.client.login(username=self.profile.username, password='testuser'))
|
|
|
|
response = self.client.get(event_url, follow=True)
|
|
with self.assertRaises(KeyError):
|
|
response._headers["X-Frame-Options"]
|
|
|
|
response = self.client.get(login_url, follow=True)
|
|
with self.assertRaises(KeyError):
|
|
response._headers["X-Frame-Options"]
|
|
|
|
def testOEmbed(self):
|
|
event_url = reverse('event_detail', kwargs={'pk': 1})
|
|
event_embed_url = reverse('event_embed', kwargs={'pk': 1})
|
|
oembed_url = reverse('event_oembed', kwargs={'pk': 1})
|
|
|
|
alt_oembed_url = reverse('event_oembed', kwargs={'pk': 999})
|
|
alt_event_embed_url = reverse('event_embed', kwargs={'pk': 999})
|
|
|
|
# Test the meta tag is in place
|
|
response = self.client.get(event_url, follow=True, HTTP_HOST='example.com')
|
|
self.assertContains(response, '<link rel="alternate" type="application/json+oembed"')
|
|
self.assertContains(response, oembed_url)
|
|
|
|
# Test that the JSON exists
|
|
response = self.client.get(oembed_url, follow=True, HTTP_HOST='example.com')
|
|
self.assertEqual(response.status_code, 200)
|
|
self.assertContains(response, event_embed_url)
|
|
|
|
# Should also work for non-existant events
|
|
response = self.client.get(alt_oembed_url, follow=True, HTTP_HOST='example.com')
|
|
self.assertEqual(response.status_code, 200)
|
|
self.assertContains(response, alt_event_embed_url)
|
|
|
|
|
|
class TestSampleDataGenerator(TestCase):
|
|
@override_settings(DEBUG=True)
|
|
def test_generate_sample_data(self):
|
|
# Run the management command and check there are no exceptions
|
|
call_command('generateSampleRIGSData')
|
|
|
|
# Check there are lots of events
|
|
self.assertTrue(models.Event.objects.all().count() > 100)
|
|
|
|
def test_production_exception(self):
|
|
from django.core.management.base import CommandError
|
|
|
|
self.assertRaisesRegex(CommandError, ".*production", call_command, 'generateSampleRIGSData')
|
|
|
|
|
|
def search(client, url, found, notfound, arguments):
|
|
for argument in arguments:
|
|
query = getattr(found, argument)
|
|
request_url = "%s?q=%s" % (reverse_lazy(url), query)
|
|
response = client.get(request_url, follow=True)
|
|
assertContains(response, getattr(found, 'name'))
|
|
assertNotContains(response, getattr(notfound, 'name'))
|
|
|
|
|
|
def test_search(admin_client):
|
|
persons = {
|
|
1: models.Person.objects.create(name="Right Person", phone="1234"),
|
|
2: models.Person.objects.create(name="Wrong Person", phone="5678"),
|
|
}
|
|
organisations = {
|
|
1: models.Organisation.objects.create(name="Right Organisation", email="test@example.com"),
|
|
2: models.Organisation.objects.create(name="Wrong Organisation", email="check@fake.co.uk"),
|
|
}
|
|
venues = {
|
|
1: models.Venue.objects.create(name="Right Venue", address="1 Test Street, EX1"),
|
|
2: models.Venue.objects.create(name="Wrong Venue", address="2 Check Way, TS2"),
|
|
}
|
|
events = {
|
|
1: models.Event.objects.create(name="Right Event", start_date=date.today(), venue=venues[1], person=persons[1],
|
|
organisation=organisations[1]),
|
|
2: models.Event.objects.create(name="Wrong Event", start_date=date.today(), venue=venues[2], person=persons[2],
|
|
organisation=organisations[2]),
|
|
}
|
|
search(admin_client, 'event_archive', events[1], events[2], ['name', 'id'])
|
|
search(admin_client, 'person_list', persons[1], persons[2], ['name', 'id', 'phone'])
|
|
search(admin_client, 'organisation_list', organisations[1], organisations[2],
|
|
['name', 'id', 'email'])
|
|
search(admin_client, 'venue_list', venues[1], venues[2],
|
|
['name', 'id', 'address'])
|
|
|
|
|
|
def setup_for_hs():
|
|
models.VatRate.objects.create(start_at='2014-03-05', rate=0.20, comment='test1')
|
|
venue = models.Venue.objects.create(name="Venue 1")
|
|
return venue, {
|
|
1: models.Event.objects.create(name="TE E1", start_date=date.today(),
|
|
description="This is an event description\nthat for a very specific reason spans two lines.",
|
|
venue=venue),
|
|
2: models.Event.objects.create(name="TE E2", start_date=date.today()),
|
|
}
|
|
|
|
|
|
def create_ra(usr):
|
|
venue, events = setup_for_hs()
|
|
return models.RiskAssessment.objects.create(event=events[1], nonstandard_equipment=False, nonstandard_use=False,
|
|
contractors=False, other_companies=False, crew_fatigue=False,
|
|
big_power=False, power_mic=usr, generators=False,
|
|
other_companies_power=False, nonstandard_equipment_power=False,
|
|
multiple_electrical_environments=False, noise_monitoring=False,
|
|
known_venue=True, safe_loading=True, safe_storage=True,
|
|
area_outside_of_control=True, barrier_required=True,
|
|
nonstandard_emergency_procedure=True, special_structures=False,
|
|
suspended_structures=False, outside=False)
|
|
|
|
|
|
def create_checklist(usr):
|
|
venue, events = setup_for_hs()
|
|
return models.EventChecklist.objects.create(event=events[1], power_mic=usr, safe_parking=False,
|
|
safe_packing=False, exits=False, trip_hazard=False, warning_signs=False,
|
|
ear_plugs=False, hs_location="Locked away safely",
|
|
extinguishers_location="Somewhere, I forgot", earthing=False, pat=False,
|
|
date=timezone.now(), venue=venue)
|
|
|
|
|
|
def test_list(admin_client):
|
|
venue, events = setup_for_hs()
|
|
request_url = reverse('hs_list')
|
|
response = admin_client.get(request_url, follow=True)
|
|
assertContains(response, events[1].name)
|
|
assertContains(response, events[2].name)
|
|
assertContains(response, 'Create')
|
|
|
|
|
|
def review(client, profile, obj, request_url):
|
|
time = timezone.now()
|
|
response = client.get(reverse(request_url, kwargs={'pk': obj.pk}), follow=True)
|
|
obj.refresh_from_db()
|
|
assertContains(response, 'Reviewed by')
|
|
assertContains(response, profile.name)
|
|
assert_times_equal(time, obj.reviewed_at)
|
|
|
|
|
|
def test_ra_review(admin_client, admin_user):
|
|
review(admin_client, admin_user, create_ra(admin_user), 'ra_review')
|
|
|
|
|
|
def test_checklist_review(admin_client, admin_user):
|
|
review(admin_client, admin_user, create_checklist(admin_user), 'ec_review')
|
|
|
|
|
|
def test_ra_redirect(admin_client, admin_user):
|
|
ra = create_ra(admin_user)
|
|
request_url = reverse('event_ra', kwargs={'pk': ra.event.pk})
|
|
expected_url = reverse('ra_edit', kwargs={'pk': ra.pk})
|
|
|
|
response = admin_client.get(request_url, follow=True)
|
|
assertRedirects(response, expected_url, status_code=302, target_status_code=200)
|