test(core): Remove old history model viewset tests

ref: #602 #605
This commit is contained in:
2025-02-16 03:02:02 +09:30
parent 7cd4cb965b
commit 507db1051c

View File

@ -1,427 +1,427 @@
import pytest
# import unittest
# import requests
# import pytest
# # import unittest
# # import requests
# from django.contrib.auth import get_user_model
from django.contrib.auth.models import User
from django.contrib.contenttypes.models import ContentType
from django.shortcuts import reverse
from django.test import Client, TestCase
# # from django.contrib.auth import get_user_model
# from django.contrib.auth.models import User
# from django.contrib.contenttypes.models import ContentType
# from django.shortcuts import reverse
# from django.test import Client, TestCase
from access.models import Organization, Team, TeamUsers, Permission
# from access.models import Organization, Team, TeamUsers, Permission
from api.tests.abstract.api_permissions_viewset import APIPermissionView
from api.tests.abstract.test_metadata_functional import (
MetadataAttributesFunctionalBase,
MetadataAttributesFunctionalEndpoint,
)
# from api.tests.abstract.api_permissions_viewset import APIPermissionView
# from api.tests.abstract.test_metadata_functional import (
# MetadataAttributesFunctionalBase,
# MetadataAttributesFunctionalEndpoint,
# )
from core.models.history import History
# from core.models.history import History
from itam.models.device import Device
# from itam.models.device import Device
class ViewSetBase:
# class ViewSetBase:
model = History
# model = History
app_namespace = 'v2'
# app_namespace = 'v2'
url_name = '_api_v2_model_history'
# url_name = '_api_v2_model_history'
change_data = {'name': 'device'}
# change_data = {'name': 'device'}
delete_data = {}
# delete_data = {}
@classmethod
def setUpTestData(self):
"""Setup Test
# @classmethod
# def setUpTestData(self):
# """Setup Test
1. Create an organization for user and item
. create an organization that is different to item
2. Create a team
3. create teams with each permission: view, add, change, delete
4. create a user per team
"""
# 1. Create an organization for user and item
# . create an organization that is different to item
# 2. Create a team
# 3. create teams with each permission: view, add, change, delete
# 4. create a user per team
# """
organization = Organization.objects.create(name='test_org')
# organization = Organization.objects.create(name='test_org')
self.organization = organization
# self.organization = organization
different_organization = Organization.objects.create(name='test_different_organization')
# different_organization = Organization.objects.create(name='test_different_organization')
view_permissions = Permission.objects.get(
codename = 'view_' + self.model._meta.model_name,
content_type = ContentType.objects.get(
app_label = self.model._meta.app_label,
model = self.model._meta.model_name,
)
)
# view_permissions = Permission.objects.get(
# codename = 'view_' + self.model._meta.model_name,
# content_type = ContentType.objects.get(
# app_label = self.model._meta.app_label,
# model = self.model._meta.model_name,
# )
# )
view_team = Team.objects.create(
team_name = 'view_team',
organization = organization,
)
# view_team = Team.objects.create(
# team_name = 'view_team',
# organization = organization,
# )
view_team.permissions.set([view_permissions])
# view_team.permissions.set([view_permissions])
add_permissions = Permission.objects.get(
codename = 'add_' + self.model._meta.model_name,
content_type = ContentType.objects.get(
app_label = self.model._meta.app_label,
model = self.model._meta.model_name,
)
)
# add_permissions = Permission.objects.get(
# codename = 'add_' + self.model._meta.model_name,
# content_type = ContentType.objects.get(
# app_label = self.model._meta.app_label,
# model = self.model._meta.model_name,
# )
# )
add_team = Team.objects.create(
team_name = 'add_team',
organization = organization,
)
# add_team = Team.objects.create(
# team_name = 'add_team',
# organization = organization,
# )
add_team.permissions.set([add_permissions])
# add_team.permissions.set([add_permissions])
change_permissions = Permission.objects.get(
codename = 'change_' + self.model._meta.model_name,
content_type = ContentType.objects.get(
app_label = self.model._meta.app_label,
model = self.model._meta.model_name,
)
)
# change_permissions = Permission.objects.get(
# codename = 'change_' + self.model._meta.model_name,
# content_type = ContentType.objects.get(
# app_label = self.model._meta.app_label,
# model = self.model._meta.model_name,
# )
# )
change_team = Team.objects.create(
team_name = 'change_team',
organization = organization,
)
# change_team = Team.objects.create(
# team_name = 'change_team',
# organization = organization,
# )
change_team.permissions.set([change_permissions])
# change_team.permissions.set([change_permissions])
delete_permissions = Permission.objects.get(
codename = 'delete_' + self.model._meta.model_name,
content_type = ContentType.objects.get(
app_label = self.model._meta.app_label,
model = self.model._meta.model_name,
)
)
# delete_permissions = Permission.objects.get(
# codename = 'delete_' + self.model._meta.model_name,
# content_type = ContentType.objects.get(
# app_label = self.model._meta.app_label,
# model = self.model._meta.model_name,
# )
# )
delete_team = Team.objects.create(
team_name = 'delete_team',
organization = organization,
)
# delete_team = Team.objects.create(
# team_name = 'delete_team',
# organization = organization,
# )
delete_team.permissions.set([delete_permissions])
# delete_team.permissions.set([delete_permissions])
self.no_permissions_user = User.objects.create_user(username="test_no_permissions", password="password")
# self.no_permissions_user = User.objects.create_user(username="test_no_permissions", password="password")
self.view_user = User.objects.create_user(username="test_user_view", password="password")
teamuser = TeamUsers.objects.create(
team = view_team,
user = self.view_user
)
# self.view_user = User.objects.create_user(username="test_user_view", password="password")
# teamuser = TeamUsers.objects.create(
# team = view_team,
# user = self.view_user
# )
# self.config_group = ConfigGroups.objects.create(
# organization = self.organization,
# name = 'one'
# )
# # self.config_group = ConfigGroups.objects.create(
# # organization = self.organization,
# # name = 'one'
# # )
# self.software = Software.objects.create(
# organization = self.organization,
# name = 'random name'
# )
# # self.software = Software.objects.create(
# # organization = self.organization,
# # name = 'random name'
# # )
# self.software_two = Software.objects.create(
# organization = self.organization,
# name = 'random name two'
# )
# # self.software_two = Software.objects.create(
# # organization = self.organization,
# # name = 'random name two'
# # )
# self.software_version = SoftwareVersion.objects.create(
# organization = self.organization,
# software = self.software,
# name = '1.1.1'
# )
# # self.software_version = SoftwareVersion.objects.create(
# # organization = self.organization,
# # software = self.software,
# # name = '1.1.1'
# # )
# self.software_version_two = SoftwareVersion.objects.create(
# organization = self.organization,
# software = self.software_two,
# name = '2.2.2'
# )
# # self.software_version_two = SoftwareVersion.objects.create(
# # organization = self.organization,
# # software = self.software_two,
# # name = '2.2.2'
# # )
self.device = Device.objects.create(
organization = self.organization,
name = 'history-device'
)
# self.device = Device.objects.create(
# organization = self.organization,
# name = 'history-device'
# )
# self.item = self.model.objects.create(
# organization = self.organization,
# config_group = self.config_group,
# software = self.software,
# version = self.software_version
# )
# # self.item = self.model.objects.create(
# # organization = self.organization,
# # config_group = self.config_group,
# # software = self.software,
# # version = self.software_version
# # )
self.item = History.objects.get(item_class = 'device', item_pk = self.device.id)
# self.item = History.objects.get(item_class = 'device', item_pk = self.device.id)
self.url_kwargs = {'model_class': 'device', 'model_id': self.device.id}
# self.url_kwargs = {'model_class': 'device', 'model_id': self.device.id}
self.url_view_kwargs = {'model_class': 'device', 'model_id': self.device.id, 'pk': self.item.pk }
# self.url_view_kwargs = {'model_class': 'device', 'model_id': self.device.id, 'pk': self.item.pk }
self.add_data = {}
# self.add_data = {}
self.add_user = User.objects.create_user(username="test_user_add", password="password")
teamuser = TeamUsers.objects.create(
team = add_team,
user = self.add_user
)
# self.add_user = User.objects.create_user(username="test_user_add", password="password")
# teamuser = TeamUsers.objects.create(
# team = add_team,
# user = self.add_user
# )
self.change_user = User.objects.create_user(username="test_user_change", password="password")
teamuser = TeamUsers.objects.create(
team = change_team,
user = self.change_user
)
# self.change_user = User.objects.create_user(username="test_user_change", password="password")
# teamuser = TeamUsers.objects.create(
# team = change_team,
# user = self.change_user
# )
self.delete_user = User.objects.create_user(username="test_user_delete", password="password")
teamuser = TeamUsers.objects.create(
team = delete_team,
user = self.delete_user
)
# self.delete_user = User.objects.create_user(username="test_user_delete", password="password")
# teamuser = TeamUsers.objects.create(
# team = delete_team,
# user = self.delete_user
# )
self.different_organization_user = User.objects.create_user(username="test_different_organization_user", password="password")
# self.different_organization_user = User.objects.create_user(username="test_different_organization_user", password="password")
different_organization_team = Team.objects.create(
team_name = 'different_organization_team',
organization = different_organization,
)
# different_organization_team = Team.objects.create(
# team_name = 'different_organization_team',
# organization = different_organization,
# )
different_organization_team.permissions.set([
view_permissions,
add_permissions,
change_permissions,
delete_permissions,
])
# different_organization_team.permissions.set([
# view_permissions,
# add_permissions,
# change_permissions,
# delete_permissions,
# ])
TeamUsers.objects.create(
team = different_organization_team,
user = self.different_organization_user
)
# TeamUsers.objects.create(
# team = different_organization_team,
# user = self.different_organization_user
# )
class HistoryPermissionsAPI(
ViewSetBase,
APIPermissionView,
TestCase
):
# class HistoryPermissionsAPI(
# ViewSetBase,
# APIPermissionView,
# TestCase
# ):
def test_returned_data_from_user_and_global_organizations_only(self):
"""Check items returned
# def test_returned_data_from_user_and_global_organizations_only(self):
# """Check items returned
This test case is a over-ride of a test case with the same name.
This model is not a tenancy model making this test not-applicable.
# This test case is a over-ride of a test case with the same name.
# This model is not a tenancy model making this test not-applicable.
Items returned from the query Must be from the users organization and
global ONLY!
"""
pass
# Items returned from the query Must be from the users organization and
# global ONLY!
# """
# pass
def test_view_list_has_permission(self):
""" Check correct permission for view
# def test_view_list_has_permission(self):
# """ Check correct permission for view
Attempt to view as user with view permission
"""
# Attempt to view as user with view permission
# """
client = Client()
url = reverse(self.app_namespace + ':' + self.url_name + '-list', kwargs=self.url_kwargs)
# client = Client()
# url = reverse(self.app_namespace + ':' + self.url_name + '-list', kwargs=self.url_kwargs)
client.force_login(self.view_user)
response = client.get(url)
# client.force_login(self.view_user)
# response = client.get(url)
assert response.status_code == 200
# assert response.status_code == 200
def test_view_has_permission(self):
""" Check correct permission for view
# def test_view_has_permission(self):
# """ Check correct permission for view
Custom permission of test case with same name.
This test ensures that the user is denied
# Custom permission of test case with same name.
# This test ensures that the user is denied
Attempt to view as user with view permission
"""
# Attempt to view as user with view permission
# """
client = Client()
url = reverse(self.app_namespace + ':' + self.url_name + '-detail', kwargs=self.url_view_kwargs)
# client = Client()
# url = reverse(self.app_namespace + ':' + self.url_name + '-detail', kwargs=self.url_view_kwargs)
client.force_login(self.view_user)
response = client.get(url)
# client.force_login(self.view_user)
# response = client.get(url)
assert response.status_code == 200
# assert response.status_code == 200
def test_add_has_permission_method_not_allowed(self):
""" Check correct permission for add
# def test_add_has_permission_method_not_allowed(self):
# """ Check correct permission for add
Custom permission of test case with same name.
This test ensures that the user is denied
# Custom permission of test case with same name.
# This test ensures that the user is denied
Attempt to add as user with permission
"""
# Attempt to add as user with permission
# """
client = Client()
if self.url_kwargs:
# client = Client()
# if self.url_kwargs:
url = reverse(self.app_namespace + ':' + self.url_name + '-list', kwargs = self.url_kwargs)
# url = reverse(self.app_namespace + ':' + self.url_name + '-list', kwargs = self.url_kwargs)
else:
# else:
url = reverse(self.app_namespace + ':' + self.url_name + '-list')
# url = reverse(self.app_namespace + ':' + self.url_name + '-list')
client.force_login(self.add_user)
response = client.post(url, data=self.add_data)
# client.force_login(self.add_user)
# response = client.post(url, data=self.add_data)
assert response.status_code == 405
# assert response.status_code == 405
def test_change_has_permission_method_not_allowed(self):
""" Check correct permission for change
# def test_change_has_permission_method_not_allowed(self):
# """ Check correct permission for change
Custom permission of test case with same name.
This test ensures that the user is denied
# Custom permission of test case with same name.
# This test ensures that the user is denied
Make change with user who has change permission
"""
# Make change with user who has change permission
# """
client = Client()
url = reverse(self.app_namespace + ':' + self.url_name + '-detail', kwargs=self.url_view_kwargs)
# client = Client()
# url = reverse(self.app_namespace + ':' + self.url_name + '-detail', kwargs=self.url_view_kwargs)
client.force_login(self.change_user)
response = client.patch(url, data=self.change_data, content_type='application/json')
# client.force_login(self.change_user)
# response = client.patch(url, data=self.change_data, content_type='application/json')
assert response.status_code == 405
# assert response.status_code == 405
def test_delete_has_permission_method_not_allowed(self):
""" Check correct permission for delete
# def test_delete_has_permission_method_not_allowed(self):
# """ Check correct permission for delete
Custom permission of test case with same name.
This test ensures that the user is denied
# Custom permission of test case with same name.
# This test ensures that the user is denied
Delete item as user with delete permission
"""
# Delete item as user with delete permission
# """
client = Client()
url = reverse(self.app_namespace + ':' + self.url_name + '-detail', kwargs=self.url_view_kwargs)
# client = Client()
# url = reverse(self.app_namespace + ':' + self.url_name + '-detail', kwargs=self.url_view_kwargs)
client.force_login(self.delete_user)
response = client.delete(url, data=self.delete_data)
# client.force_login(self.delete_user)
# response = client.delete(url, data=self.delete_data)
assert response.status_code == 405
# assert response.status_code == 405
def test_returned_results_only_user_orgs(self):
"""Test not required
# def test_returned_results_only_user_orgs(self):
# """Test not required
this test is not required as a history item obtains it's
organization from the object changed.
"""
# this test is not required as a history item obtains it's
# organization from the object changed.
# """
pass
# pass
# item is not tenancy object
def test_view_different_organizaiton_denied(self):
""" Check correct permission for view
# # item is not tenancy object
# def test_view_different_organizaiton_denied(self):
# """ Check correct permission for view
This test case is a duplicate of a test case with the same name. This
test is not required as currently the history model is not a tenancy
model.
# This test case is a duplicate of a test case with the same name. This
# test is not required as currently the history model is not a tenancy
# model.
see https://github.com/nofusscomputing/centurion_erp/issues/455 for
more details.
# see https://github.com/nofusscomputing/centurion_erp/issues/455 for
# more details.
Attempt to view with user from different organization
"""
# Attempt to view with user from different organization
# """
pass
# pass
class HistoryMetadata(
ViewSetBase,
MetadataAttributesFunctionalEndpoint,
MetadataAttributesFunctionalBase,
TestCase
):
# class HistoryMetadata(
# ViewSetBase,
# MetadataAttributesFunctionalEndpoint,
# MetadataAttributesFunctionalBase,
# TestCase
# ):
def test_method_options_request_detail_data_has_key_urls_self(self):
"""Test HTTP/Options Method
# def test_method_options_request_detail_data_has_key_urls_self(self):
# """Test HTTP/Options Method
This is a custom test of a test with the same name.
history view has no detail view, due to using a custom
view "history",
# This is a custom test of a test with the same name.
# history view has no detail view, due to using a custom
# view "history",
Ensure the request data returned has key `urls.self`
"""
# Ensure the request data returned has key `urls.self`
# """
client = Client()
client.force_login(self.view_user)
# client = Client()
# client.force_login(self.view_user)
response = client.options(
reverse(
self.app_namespace + ':' + self.url_name + '-list',
kwargs=self.url_kwargs
),
content_type='application/json'
)
# response = client.options(
# reverse(
# self.app_namespace + ':' + self.url_name + '-list',
# kwargs=self.url_kwargs
# ),
# content_type='application/json'
# )
assert 'urls' in response.data
# assert 'urls' in response.data
def test_method_options_request_detail_data_key_urls_self_is_str(self):
"""Test HTTP/Options Method
# def test_method_options_request_detail_data_key_urls_self_is_str(self):
# """Test HTTP/Options Method
This is a custom test of a test with the same name.
history view has no detail view, due to using a custom
view "history",
# This is a custom test of a test with the same name.
# history view has no detail view, due to using a custom
# view "history",
Ensure the request data key `urls.self` is a string
"""
# Ensure the request data key `urls.self` is a string
# """
client = Client()
client.force_login(self.view_user)
# client = Client()
# client.force_login(self.view_user)
response = client.options(
reverse(
self.app_namespace + ':' + self.url_name + '-list',
kwargs=self.url_kwargs
),
content_type='application/json'
)
# response = client.options(
# reverse(
# self.app_namespace + ':' + self.url_name + '-list',
# kwargs=self.url_kwargs
# ),
# content_type='application/json'
# )
assert type(response.data['urls']['self']) is str
# assert type(response.data['urls']['self']) is str