source: main/waeup.ikoba/trunk/src/waeup/ikoba/mandates/tests.py @ 14220

Last change on this file since 14220 was 12816, checked in by Henrik Bettermann, 10 years ago

Ticket #11 compromise

Redirect to CustomerChangePasswordPage? if PasswordMandate? was used so that customers are reminded of changing the password. But we do not require a password change. Maybe customers feel comfortable with the generated password.

  • Property svn:keywords set to Id
File size: 7.0 KB
Line 
1## $Id: tests.py 12816 2015-03-23 16:47:58Z henrik $
2##
3## Copyright (C) 2012 Uli Fouquet & Henrik Bettermann
4## This program is free software; you can redistribute it and/or modify
5## it under the terms of the GNU General Public License as published by
6## the Free Software Foundation; either version 2 of the License, or
7## (at your option) any later version.
8##
9## This program is distributed in the hope that it will be useful,
10## but WITHOUT ANY WARRANTY; without even the implied warranty of
11## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12## GNU General Public License for more details.
13##
14## You should have received a copy of the GNU General Public License
15## along with this program; if not, write to the Free Software
16## Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
17##
18"""
19Tests for mandates.
20"""
21import tempfile
22import shutil
23import os
24from zope.testbrowser.testing import Browser
25from datetime import datetime, timedelta
26from zope.interface.verify import verifyClass, verifyObject
27from zope.component import createObject
28from zope.component.hooks import setSite, clearSite
29from waeup.ikoba.app import Company
30from waeup.ikoba.interfaces import IUserAccount
31from waeup.ikoba.mandates.interfaces import (
32    IMandatesContainer, IMandate)
33from waeup.ikoba.mandates.container import MandatesContainer
34from waeup.ikoba.mandates.mandate import PasswordMandate
35from waeup.ikoba.testing import (FunctionalLayer, FunctionalTestCase)
36
37class MandatesContainerTestCase(FunctionalTestCase):
38
39    layer = FunctionalLayer
40
41    def test_interfaces(self):
42        # Make sure the correct interfaces are implemented.
43        self.assertTrue(
44            verifyClass(
45                IMandatesContainer, MandatesContainer)
46            )
47        self.assertTrue(
48            verifyObject(
49                IMandatesContainer, MandatesContainer())
50            )
51        self.assertTrue(
52            verifyClass(
53                IMandate, PasswordMandate)
54            )
55        self.assertTrue(
56            verifyObject(
57                IMandate, PasswordMandate())
58            )
59        return
60
61    def setUp(self):
62        super(MandatesContainerTestCase, self).setUp()
63
64        # Setup a sample site for each test
65        app = Company()
66        self.dc_root = tempfile.mkdtemp()
67        app['datacenter'].setStoragePath(self.dc_root)
68
69        # Prepopulate the ZODB...
70        self.getRootFolder()['app'] = app
71        # we add the site immediately after creation to the
72        # ZODB. Catalogs and other local utilities are not setup
73        # before that step.
74        self.app = self.getRootFolder()['app']
75        # Set site here. Some of the following setup code might need
76        # to access grok.getSite() and should get our new app then
77        setSite(app)
78
79        self.browser = Browser()
80        self.browser.handleErrors = False
81
82    def tearDown(self):
83        super(MandatesContainerTestCase, self).tearDown()
84        clearSite()
85        shutil.rmtree(self.dc_root)
86
87    def test_set_customer_password(self):
88        customer = createObject('waeup.Customer')
89        # Add and execute a mandate with missing parameters.
90        mandate = PasswordMandate()
91        self.app['mandates'].addMandate(mandate)
92        msg = mandate.execute()
93        self.assertEqual(msg, u'Wrong mandate parameters.')
94        # Add and execute an expired mandate.
95        mandate = PasswordMandate(days=0)
96        self.app['mandates'].addMandate(mandate)
97        msg = mandate.execute()
98        self.assertEqual(msg, u'Mandate expired.')
99        # Add and execute a perfect mandate
100        mandate = PasswordMandate()
101        mandate.params['user'] = customer
102        mandate.params['password'] = 'mypwd1'
103        self.app['mandates'].addMandate(mandate)
104        msg = mandate.execute()
105        # Password has been set.
106        self.assertEqual(msg, 'Password has been successfully set. Login with your new password.')
107        self.assertTrue(IUserAccount(customer).checkPassword('mypwd1'))
108        # All mandates have been removed.
109        self.assertEqual(len(self.app['mandates'].keys()), 0)
110        logfile = os.path.join(
111            self.app['datacenter'].storage, 'logs', 'main.log')
112        logcontent = open(logfile).read()
113        self.assertTrue('system - PasswordMandate used: K1000000' in logcontent)
114
115    def test_set_officer_password(self):
116        self.app['users'].addUser('bob', 'bobssecret')
117        officer = self.app['users']['bob']
118        mandate = PasswordMandate()
119        mandate.params['user'] = officer
120        mandate.params['password'] = 'mypwd1'
121        self.app['mandates'].addMandate(mandate)
122        msg = mandate.execute()
123        # Password has been set.
124        self.assertEqual(msg, 'Password has been successfully set. Login with your new password.')
125        self.assertTrue(IUserAccount(officer).checkPassword('mypwd1'))
126        logfile = os.path.join(
127            self.app['datacenter'].storage, 'logs', 'main.log')
128        logcontent = open(logfile).read()
129        self.assertTrue('system - PasswordMandate used: bob' in logcontent)
130
131    def test_remove_expired(self):
132        # mandate1 is an old mandate which just expired.
133        mandate1 = PasswordMandate(days=0)
134        self.app['mandates'].addMandate(mandate1)
135        # mandate2 is a new mandate with default time delta.
136        mandate2 = PasswordMandate(mandate_id='23456')
137        self.app['mandates'].addMandate(mandate2)
138        self.assertEqual(len(self.app['mandates'].keys()), 2)
139        num_deleted = self.app['mandates'].removeExpired()
140        self.assertEqual(num_deleted, 1)
141        # Only the new mandate remains in the container.
142        self.assertEqual(len(self.app['mandates'].keys()), 1)
143        self.assertEqual([i for i in self.app['mandates'].keys()], [u'23456'])
144
145    def test_browser(self):
146        customer = createObject('waeup.Customer')
147        self.app['customers'].addCustomer(customer)
148        mandate = PasswordMandate()
149        mandate.params['user'] = customer
150        mandate.params['password'] = 'mypwd1'
151        self.app['mandates'].addMandate(mandate)
152        self.browser.open('http://localhost/app/mandate?mandate_id=%s'
153            % mandate.mandate_id)
154        # Password has been set.
155        self.assertTrue(
156            'Password has been successfully set. Login with your new password.'
157            in self.browser.contents)
158        self.assertTrue(IUserAccount(customer).checkPassword('mypwd1'))
159        # All mandates have been removed.
160        self.assertEqual(len(self.app['mandates'].keys()), 0)
161        # We redirect to login page not to the frontpage.
162        self.assertEqual(
163            self.browser.url,
164            'http://localhost/app/login?camefrom=PasswordMandate')
165        # After login we redirect to the changepassword page.
166        self.browser.getControl(name="form.login").value = customer.customer_id
167        self.browser.getControl(name="form.password").value = 'mypwd1'
168        self.browser.getControl("Login").click()
169        self.assertEqual(
170            self.browser.url,
171            'http://localhost/app/customers/%s/changepassword'
172            % customer.customer_id)
Note: See TracBrowser for help on using the repository browser.