diff -r 000000000000 -r b97547f5f1fa web/test/unittest_views_basecontrollers.py --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/web/test/unittest_views_basecontrollers.py Wed Nov 05 15:52:50 2008 +0100 @@ -0,0 +1,646 @@ +"""cubicweb.web.views.basecontrollers unit tests""" +import simplejson + +from logilab.common.testlib import unittest_main + +from cubicweb import Binary, Unauthorized +from cubicweb.devtools._apptest import TestEnvironment +from cubicweb.devtools.apptest import EnvBasedTC, ControllerTC + +from cubicweb.common import ValidationError +from cubicweb.common.uilib import rql_for_eid + +from cubicweb.web import INTERNAL_FIELD_VALUE, Redirect, RequestError +from cubicweb.web.views.basecontrollers import xmlize + +from cubicweb.entities.authobjs import EUser + + +class EditControllerTC(ControllerTC): + def setUp(self): + ControllerTC.setUp(self) + self.failUnless('users' in self.schema.eschema('EGroup').get_groups('read')) + + def tearDown(self): + ControllerTC.tearDown(self) + self.failUnless('users' in self.schema.eschema('EGroup').get_groups('read')) + + def test_noparam_edit(self): + """check behaviour of this controller without any form parameter + """ + + self.req.form = {} + self.assertRaises(ValidationError, self.publish, self.req) + + def test_validation_unique(self): + """test creation of two linked entities + """ + user = self.user() + self.req.form = {'eid': 'X', '__type:X': 'EUser', + 'login:X': u'admin', 'edits-login:X': u'', + 'upassword:X': u'toto', 'upassword-confirm:X': u'toto', 'edits-upassword:X': u'', + } + self.assertRaises(ValidationError, self.publish, self.req) + + + def test_user_editing_itself(self): + """checking that a manager user can edit itself + """ + user = self.user() + basegroups = [str(eid) for eid, in self.execute('EGroup G WHERE X in_group G, X eid %(x)s', {'x': user.eid})] + groupeids = [eid for eid, in self.execute('EGroup G WHERE G name in ("managers", "users")')] + groups = [str(eid) for eid in groupeids] + stateeid = [eid for eid, in self.execute('State S WHERE S name "activated"')][0] + self.req.form = { + 'eid': `user.eid`, + '__type:'+`user.eid`: 'EUser', + 'login:'+`user.eid`: unicode(user.login), + 'firstname:'+`user.eid`: u'Th\xe9nault', + 'surname:'+`user.eid`: u'Sylvain', + 'in_group:'+`user.eid`: groups, + 'in_state:'+`user.eid`: `stateeid`, + # + 'edits-login:'+`user.eid`: unicode(user.login), + 'edits-firstname:'+`user.eid`: u'', + 'edits-surname:'+`user.eid`: u'', + 'edits-in_group:'+`user.eid`: basegroups, + 'edits-in_state:'+`user.eid`: `stateeid`, + } + path, params = self.expect_redirect_publish() + e = self.execute('Any X WHERE X eid %(x)s', {'x': user.eid}, 'x').get_entity(0, 0) + self.assertEquals(e.firstname, u'Th\xe9nault') + self.assertEquals(e.surname, u'Sylvain') + self.assertEquals(e.login, user.login) + self.assertEquals([g.eid for g in e.in_group], groupeids) + self.assertEquals(e.in_state[0].eid, stateeid) + + def test_user_can_change_its_password(self): + user = self.create_user('user') + cnx = self.login('user') + req = self.request() + #self.assertEquals(self.ctrl.schema['EUser']._groups['read'], + # ('managers', 'users')) + req.form = { + 'eid': `user.eid`, '__type:'+`user.eid`: 'EUser', + '__maineid' : str(user.eid), + 'upassword:'+`user.eid`: 'tournicoton', + 'upassword-confirm:'+`user.eid`: 'tournicoton', + 'edits-upassword:'+`user.eid`: '', + } + path, params = self.expect_redirect_publish(req) + cnx.commit() # commit to check we don't get late validation error for instance + self.assertEquals(path, 'euser/user') + self.failIf('vid' in params) + + def testr_user_editing_itself_no_relation(self): + """checking we can edit an entity without specifying some required + relations (meaning no changes) + """ + user = self.user() + groupeids = [eid for eid, in self.execute('EGroup G WHERE X in_group G, X eid %(x)s', {'x': user.eid})] + self.req.form = { + 'eid': `user.eid`, + '__type:'+`user.eid`: 'EUser', + 'login:'+`user.eid`: unicode(user.login), + 'firstname:'+`user.eid`: u'Th\xe9nault', + 'surname:'+`user.eid`: u'Sylvain', + # + 'edits-login:'+`user.eid`: unicode(user.login), + 'edits-firstname:'+`user.eid`: u'', + 'edits-surname:'+`user.eid`: u'', + } + path, params = self.expect_redirect_publish() + e = self.execute('Any X WHERE X eid %(x)s', {'x': user.eid}, 'x').get_entity(0, 0) + self.assertEquals(e.login, user.login) + self.assertEquals(e.firstname, u'Th\xe9nault') + self.assertEquals(e.surname, u'Sylvain') + self.assertEquals([g.eid for g in e.in_group], groupeids) + stateeids = [eid for eid, in self.execute('State S WHERE S name "activated"')] + self.assertEquals([s.eid for s in e.in_state], stateeids) + + + def test_create_multiple_linked(self): + gueid = self.execute('EGroup G WHERE G name "users"')[0][0] + self.req.form = {'eid': ['X', 'Y'], + + '__type:X': 'EUser', + '__maineid' : 'X', + 'login:X': u'adim', 'edits-login:X': u'', + 'upassword:X': u'toto', 'upassword-confirm:X': u'toto', 'edits-upassword:X': u'', + 'surname:X': u'Di Mascio', 'edits-surname:X': '', + + 'in_group:X': `gueid`, 'edits-in_group:X': INTERNAL_FIELD_VALUE, + + '__type:Y': 'EmailAddress', + 'address:Y': u'dima@logilab.fr', 'edits-address:Y': '', + 'use_email:X': 'Y', 'edits-use_email:X': INTERNAL_FIELD_VALUE, + } + path, params = self.expect_redirect_publish() + # should be redirected on the created person + self.assertEquals(path, 'euser/adim') + e = self.execute('Any P WHERE P surname "Di Mascio"').get_entity(0, 0) + self.assertEquals(e.surname, 'Di Mascio') + email = e.use_email[0] + self.assertEquals(email.address, 'dima@logilab.fr') + + def test_edit_multiple_linked(self): + peid = self.create_user('adim').eid + self.req.form = {'eid': [`peid`, 'Y'], + '__type:%s'%peid: 'EUser', + 'surname:%s'%peid: u'Di Masci', 'edits-surname:%s'%peid: '', + + '__type:Y': 'EmailAddress', + 'address:Y': u'dima@logilab.fr', 'edits-address:Y': '', + 'use_email:%s'%peid: 'Y', 'edits-use_email:%s'%peid: INTERNAL_FIELD_VALUE, + + '__redirectrql': 'Any X WHERE X eid %s'%peid, + } + path, params = self.expect_redirect_publish() + # should be redirected on the created person + eid = params['rql'].split()[-1] + e = self.execute('Any X WHERE X eid %(x)s', {'x': eid}, 'x').get_entity(0, 0) + self.assertEquals(e.surname, 'Di Masci') + email = e.use_email[0] + self.assertEquals(email.address, 'dima@logilab.fr') + + emaileid = email.eid + self.req.form = {'eid': [`peid`, `emaileid`], + '__type:%s'%peid: 'EUser', + 'surname:%s'%peid: u'Di Masci', 'edits-surname:%s'%peid: 'Di Masci', + '__type:%s'%emaileid: 'EmailAddress', + 'address:%s'%emaileid: u'adim@logilab.fr', 'edits-address:%s'%emaileid: 'dima@logilab.fr', + 'use_email:%s'%peid: `emaileid`, 'edits-use_email:%s'%peid: `emaileid`, + '__redirectrql': 'Any X WHERE X eid %s'%peid, + } + path, params = self.expect_redirect_publish() + # should be redirected on the created person + eid = params['rql'].split()[-1] + e = self.execute('Any X WHERE X eid %(x)s', {'x': eid}, 'x').get_entity(0, 0) + self.assertEquals(e.surname, 'Di Masci') + email = e.use_email[0] + self.assertEquals(email.address, 'adim@logilab.fr') + + + def test_password_confirm(self): + """test creation of two linked entities + """ + user = self.user() + self.req.form = {'__cloned_eid:X': user.eid, + 'eid': 'X', '__type:X': 'EUser', + 'login:X': u'toto', 'edits-login:X': u'', + 'upassword:X': u'toto', 'edits-upassword:X': u'', + } + self.assertRaises(ValidationError, self.publish, self.req) + self.req.form = {'__cloned_eid:X': user.eid, + 'eid': 'X', '__type:X': 'EUser', + 'login:X': u'toto', 'edits-login:X': u'', + 'upassword:X': u'toto', 'upassword-confirm:X': u'tutu', 'edits-upassword:X': u'', + } + self.assertRaises(ValidationError, self.publish, self.req) + + + def test_interval_bound_constraint_success(self): + feid = self.execute('INSERT File X: X name "toto.txt", X data %(data)s', + {'data': Binary('yo')})[0][0] + self.req.form = {'eid': ['X'], + '__type:X': 'Salesterm', + 'amount:X': u'-10', 'edits-amount:X': '', + 'described_by_test:X': str(feid), 'edits-described_by_test:X': INTERNAL_FIELD_VALUE, + } + self.assertRaises(ValidationError, self.publish, self.req) + self.req.form = {'eid': ['X'], + '__type:X': 'Salesterm', + 'amount:X': u'110', 'edits-amount:X': '', + 'described_by_test:X': str(feid), 'edits-described_by_test:X': INTERNAL_FIELD_VALUE, + } + self.assertRaises(ValidationError, self.publish, self.req) + self.req.form = {'eid': ['X'], + '__type:X': 'Salesterm', + 'amount:X': u'10', 'edits-amount:X': '', + 'described_by_test:X': str(feid), 'edits-described_by_test:X': INTERNAL_FIELD_VALUE, + } + self.expect_redirect_publish() + # should be redirected on the created + #eid = params['rql'].split()[-1] + e = self.execute('Salesterm X').get_entity(0, 0) + self.assertEquals(e.amount, 10) + + def test_req_pending_insert(self): + """make sure req's pending insertions are taken into account""" + tmpgroup = self.add_entity('EGroup', name=u"test") + user = self.user() + self.req.set_session_data('pending_insert', set([(user.eid, 'in_group', tmpgroup.eid)])) + path, params = self.expect_redirect_publish() + usergroups = [gname for gname, in + self.execute('Any N WHERE G name N, U in_group G, U eid %(u)s', {'u': user.eid})] + self.assertUnorderedIterableEquals(usergroups, ['managers', 'test']) + self.assertEquals(self.req.get_pending_inserts(), []) + + + def test_req_pending_delete(self): + """make sure req's pending deletions are taken into account""" + user = self.user() + groupeid = self.execute('INSERT EGroup G: G name "test", U in_group G WHERE U eid %(x)s', + {'x': user.eid})[0][0] + usergroups = [gname for gname, in + self.execute('Any N WHERE G name N, U in_group G, U eid %(u)s', {'u': user.eid})] + # just make sure everything was set correctly + self.assertUnorderedIterableEquals(usergroups, ['managers', 'test']) + # now try to delete the relation + self.req.set_session_data('pending_delete', set([(user.eid, 'in_group', groupeid)])) + path, params = self.expect_redirect_publish() + usergroups = [gname for gname, in + self.execute('Any N WHERE G name N, U in_group G, U eid %(u)s', {'u': user.eid})] + self.assertUnorderedIterableEquals(usergroups, ['managers']) + self.assertEquals(self.req.get_pending_deletes(), []) + + def test_custom_attribute_handler(self): + def custom_login_edit(self, formparams, value, relations): + formparams['login'] = value.upper() + relations.append('X login %(login)s') + EUser.custom_login_edit = custom_login_edit + try: + user = self.user() + eid = repr(user.eid) + self.req.form = { + 'eid': eid, + '__type:'+eid: 'EUser', + 'login:'+eid: u'foo', + 'edits-login:'+eid: unicode(user.login), + } + path, params = self.expect_redirect_publish() + rset = self.execute('Any L WHERE X eid %(x)s, X login L', {'x': user.eid}, 'x') + self.assertEquals(rset[0][0], 'FOO') + finally: + del EUser.custom_login_edit + + def test_redirect_apply_button(self): + redirectrql = rql_for_eid(4012) # whatever + self.req.form = { + 'eid': 'A', '__type:A': 'BlogEntry', + '__maineid' : 'A', + 'content:A': u'"13:03:43"', 'edits-content:A': '', + 'title:A': u'huuu', 'edits-title:A': '', + '__redirectrql': redirectrql, + '__redirectvid': 'primary', + '__redirectparams': 'toto=tutu&tata=titi', + '__form_id': 'edition', + '__action_apply': '', + } + path, params = self.expect_redirect_publish() + self.failUnless(path.startswith('blogentry/')) + eid = path.split('/')[1] + self.assertEquals(params['vid'], 'edition') + self.assertNotEquals(int(eid), 4012) + self.assertEquals(params['__redirectrql'], redirectrql) + self.assertEquals(params['__redirectvid'], 'primary') + self.assertEquals(params['__redirectparams'], 'toto=tutu&tata=titi') + + def test_redirect_ok_button(self): + redirectrql = rql_for_eid(4012) # whatever + self.req.form = { + 'eid': 'A', '__type:A': 'BlogEntry', + '__maineid' : 'A', + 'content:A': u'"13:03:43"', 'edits-content:A': '', + 'title:A': u'huuu', 'edits-title:A': '', + '__redirectrql': redirectrql, + '__redirectvid': 'primary', + '__redirectparams': 'toto=tutu&tata=titi', + '__form_id': 'edition', + } + path, params = self.expect_redirect_publish() + self.assertEquals(path, 'view') + self.assertEquals(params['rql'], redirectrql) + self.assertEquals(params['vid'], 'primary') + self.assertEquals(params['tata'], 'titi') + self.assertEquals(params['toto'], 'tutu') + + def test_redirect_delete_button(self): + eid = self.add_entity('BlogEntry', title=u'hop', content=u'hop').eid + self.req.form = {'eid': str(eid), '__type:%s'%eid: 'BlogEntry', + '__action_delete': ''} + path, params = self.expect_redirect_publish() + self.assertEquals(path, 'blogentry') + self.assertEquals(params, {u'__message': u'entity deleted'}) + eid = self.add_entity('EmailAddress', address=u'hop@logilab.fr').eid + self.execute('SET X use_email E WHERE E eid %(e)s, X eid %(x)s', + {'x': self.session().user.eid, 'e': eid}, 'x') + self.commit() + self.req.form = {'eid': str(eid), '__type:%s'%eid: 'EmailAddress', + '__action_delete': ''} + path, params = self.expect_redirect_publish() + self.assertEquals(path, 'euser/admin') + self.assertEquals(params, {u'__message': u'entity deleted'}) + eid1 = self.add_entity('BlogEntry', title=u'hop', content=u'hop').eid + eid2 = self.add_entity('EmailAddress', address=u'hop@logilab.fr').eid + self.req.form = {'eid': [str(eid1), str(eid2)], + '__type:%s'%eid1: 'BlogEntry', + '__type:%s'%eid2: 'EmailAddress', + '__action_delete': ''} + path, params = self.expect_redirect_publish() + self.assertEquals(path, 'view') + self.assertEquals(params, {u'__message': u'entities deleted'}) + + def test_nonregr_egroup_etype_editing(self): + """non-regression test checking that a manager user can edit a EEType entity (EGroup) + """ + groupeids = [eid for eid, in self.execute('EGroup G WHERE G name "managers"')] + groups = [str(eid) for eid in groupeids] + eeetypeeid = self.execute('EEType X WHERE X name "EGroup"')[0][0] + basegroups = [str(eid) for eid, in self.execute('EGroup G WHERE X read_permission G, X eid %(x)s', {'x': eeetypeeid})] + self.req.form = { + 'eid': `eeetypeeid`, + '__type:'+`eeetypeeid`: 'EEType', + 'name:'+`eeetypeeid`: u'EGroup', + 'final:'+`eeetypeeid`: False, + 'meta:'+`eeetypeeid`: True, + 'description:'+`eeetypeeid`: u'users group', + 'read_permission:'+`eeetypeeid`: groups, + # + 'edits-name:'+`eeetypeeid`: u'EGroup', + 'edits-final:'+`eeetypeeid`: False, + 'edits-meta:'+`eeetypeeid`: True, + 'edits-description:'+`eeetypeeid`: u'users group', + 'edits-read_permission:'+`eeetypeeid`: basegroups, + } + try: + path, params = self.expect_redirect_publish() + e = self.execute('Any X WHERE X eid %(x)s', {'x': eeetypeeid}, 'x').get_entity(0, 0) + self.assertEquals(e.name, 'EGroup') + self.assertEquals([g.eid for g in e.read_permission], groupeids) + finally: + # restore + self.execute('SET X read_permission Y WHERE X name "EGroup", Y eid IN (%s), NOT X read_permission Y' % (','.join(basegroups))) + self.commit() + + def test_nonregr_eetype_etype_editing(self): + """non-regression test checking that a manager user can edit a EEType entity (EEType) + """ + groupeids = sorted(eid for eid, in self.execute('EGroup G WHERE G name in ("managers", "users")')) + groups = [str(eid) for eid in groupeids] + eeetypeeid = self.execute('EEType X WHERE X name "EEType"')[0][0] + basegroups = [str(eid) for eid, in self.execute('EGroup G WHERE X read_permission G, X eid %(x)s', {'x': eeetypeeid})] + self.req.form = { + 'eid': `eeetypeeid`, + '__type:'+`eeetypeeid`: 'EEType', + 'name:'+`eeetypeeid`: u'EEType', + 'final:'+`eeetypeeid`: False, + 'meta:'+`eeetypeeid`: True, + 'description:'+`eeetypeeid`: u'users group', + 'read_permission:'+`eeetypeeid`: groups, + + 'edits-name:'+`eeetypeeid`: u'EEType', + 'edits-final:'+`eeetypeeid`: False, + 'edits-meta:'+`eeetypeeid`: True, + 'edits-description:'+`eeetypeeid`: u'users group', + 'edits-read_permission:'+`eeetypeeid`: basegroups, + } + try: + path, params = self.expect_redirect_publish() + e = self.execute('Any X WHERE X eid %(x)s', {'x': eeetypeeid}, 'x').get_entity(0, 0) + self.assertEquals(e.name, 'EEType') + self.assertEquals(sorted(g.eid for g in e.read_permission), groupeids) + finally: + # restore + self.execute('SET X read_permission Y WHERE X name "EEType", Y eid IN (%s), NOT X read_permission Y' % (','.join(basegroups))) + self.commit() + + def test_nonregr_strange_text_input(self): + """non-regression test checking text input containing "13:03:43" + + this seems to be postgres (tsearch?) specific + """ + self.req.form = { + 'eid': 'A', '__type:A': 'BlogEntry', + '__maineid' : 'A', + 'title:A': u'"13:03:40"', 'edits-title:A': '', + 'content:A': u'"13:03:43"', 'edits-content:A': ''} + path, params = self.expect_redirect_publish() + self.failUnless(path.startswith('blogentry/')) + eid = path.split('/')[1] + e = self.execute('Any C, T WHERE C eid %(x)s, C content T', {'x': eid}, 'x').get_entity(0, 0) + self.assertEquals(e.title, '"13:03:40"') + self.assertEquals(e.content, '"13:03:43"') + + + def test_nonregr_multiple_empty_email_addr(self): + gueid = self.execute('EGroup G WHERE G name "users"')[0][0] + self.req.form = {'eid': ['X', 'Y'], + + '__type:X': 'EUser', + 'login:X': u'adim', 'edits-login:X': u'', + 'upassword:X': u'toto', 'upassword-confirm:X': u'toto', 'edits-upassword:X': u'', + 'in_group:X': `gueid`, 'edits-in_group:X': INTERNAL_FIELD_VALUE, + + '__type:Y': 'EmailAddress', + 'address:Y': u'', 'edits-address:Y': '', + 'alias:Y': u'', 'edits-alias:Y': '', + 'use_email:X': 'Y', 'edits-use_email:X': INTERNAL_FIELD_VALUE, + } + self.assertRaises(ValidationError, self.publish, self.req) + + def test_nonregr_copy(self): + user = self.user() + self.req.form = {'__cloned_eid:X': user.eid, + 'eid': 'X', '__type:X': 'EUser', + '__maineid' : 'X', + 'login:X': u'toto', 'edits-login:X': u'', + 'upassword:X': u'toto', 'upassword-confirm:X': u'toto', 'edits-upassword:X': u'', + } + path, params = self.expect_redirect_publish() + self.assertEquals(path, 'euser/toto') + e = self.execute('Any X WHERE X is EUser, X login "toto"').get_entity(0, 0) + self.assertEquals(e.login, 'toto') + self.assertEquals(e.in_group[0].name, 'managers') + + + def test_nonregr_rollback_on_validation_error(self): + p = self.create_user("doe") + # do not try to skip 'primary_email' for this test + old_skips = p.__class__.skip_copy_for + p.__class__.skip_copy_for = () + try: + e = self.add_entity('EmailAddress', address=u'doe@doe.com') + self.execute('SET P use_email E, P primary_email E WHERE P eid %(p)s, E eid %(e)s', + {'p' : p.eid, 'e' : e.eid}) + self.req.form = {'__cloned_eid:X': p.eid, + 'eid': 'X', '__type:X': 'EUser', + 'login': u'dodo', 'edits-login': u'dodo', + 'surname:X': u'Boom', 'edits-surname:X': u'', + '__errorurl' : "whatever but required", + } + # try to emulate what really happens in the web application + # 1/ validate form => EditController.publish raises a ValidationError + # which fires a Redirect + # 2/ When re-publishing the copy form, the publisher implicitly commits + try: + self.env.app.publish('edit', self.req) + except Redirect: + self.req.form['rql'] = 'Any X WHERE X eid %s' % p.eid + self.req.form['vid'] = 'copy' + self.env.app.publish('view', self.req) + rset = self.execute('EUser P WHERE P surname "Boom"') + self.assertEquals(len(rset), 0) + finally: + p.__class__.skip_copy_for = old_skips + + +class EmbedControllerTC(EnvBasedTC): + + def test_nonregr_embed_publish(self): + # This test looks a bit stupid but at least it will probably + # fail if the controller API changes and if EmbedController is not + # updated (which is what happened before this test) + req = self.request() + req.form['url'] = 'http://intranet.logilab.fr/' + controller = self.env.app.select_controller('embed', req) + result = controller.publish(rset=None) + + +class ReportBugControllerTC(EnvBasedTC): + + def test_usable_by_guets(self): + req = self.request() + self.env.app.select_controller('reportbug', req) + + +class SendMailControllerTC(EnvBasedTC): + + def test_not_usable_by_guets(self): + self.login('anon') + req = self.request() + self.assertRaises(Unauthorized, self.env.app.select_controller, 'sendmail', req) + + + +class JSONControllerTC(EnvBasedTC): + + def ctrl(self, req=None): + req = req or self.request(url='http://whatever.fr/') + return self.env.app.select_controller('json', req) + + def setup_database(self): + self.pytag = self.add_entity('Tag', name=u'python') + self.cubicwebtag = self.add_entity('Tag', name=u'cubicweb') + self.john = self.create_user(u'John') + + + ## tests ################################################################## + def test_simple_exec(self): + ctrl = self.ctrl(self.request(rql='EUser P WHERE P login "John"', + pageid='123')) + self.assertTextEquals(ctrl.publish(), + xmlize(self.john.view('primary'))) + + def test_json_exec(self): + rql = 'Any T,N WHERE T is Tag, T name N' + ctrl = self.ctrl(self.request(mode='json', rql=rql, pageid='123')) + self.assertEquals(ctrl.publish(), + simplejson.dumps(self.execute(rql).rows)) + + def test_remote_add_existing_tag(self): + self.remote_call('tag_entity', self.john.eid, ['python']) + self.assertUnorderedIterableEquals([tname for tname, in self.execute('Any N WHERE T is Tag, T name N')], + ['python', 'cubicweb']) + self.assertEquals(self.execute('Any N WHERE T tags P, P is EUser, T name N').rows, + [['python']]) + + def test_remote_add_new_tag(self): + self.remote_call('tag_entity', self.john.eid, ['javascript']) + self.assertUnorderedIterableEquals([tname for tname, in self.execute('Any N WHERE T is Tag, T name N')], + ['python', 'cubicweb', 'javascript']) + self.assertEquals(self.execute('Any N WHERE T tags P, P is EUser, T name N').rows, + [['javascript']]) + + def test_edit_field(self): + nbusers = len(self.execute('EUser P')) + eid = self.john.eid + self.remote_call('edit_field', 'apply', + ('eid', 'firstname:%s' % eid, '__maineid', '__type:%s'% eid, 'edits-firstname:%s' % eid ), + (str(eid), u'Remi', str(eid), 'EUser', self.john.firstname), + 'firstname', + eid) + self.commit() + rset = self.execute('EUser P') + # make sure we did not insert a new euser here + self.assertEquals(len(rset), nbusers) + john = self.execute('Any X WHERE X eid %(x)s', {'x': self.john.eid}, 'x').get_entity(0, 0) + self.assertEquals(john.eid, self.john.eid) + self.assertEquals(john.firstname, 'Remi') + + + def test_pending_insertion(self): + res, req = self.remote_call('add_pending_insert', ['12', 'tags', '13']) + deletes = req.get_pending_deletes() + self.assertEquals(deletes, []) + inserts = req.get_pending_inserts() + self.assertEquals(inserts, ['12:tags:13']) + res, req = self.remote_call('add_pending_insert', ['12', 'tags', '14']) + deletes = req.get_pending_deletes() + self.assertEquals(deletes, []) + inserts = req.get_pending_inserts() + self.assertEquals(inserts, ['12:tags:13', '12:tags:14']) + inserts = req.get_pending_inserts(12) + self.assertEquals(inserts, ['12:tags:13', '12:tags:14']) + inserts = req.get_pending_inserts(13) + self.assertEquals(inserts, ['12:tags:13']) + inserts = req.get_pending_inserts(14) + self.assertEquals(inserts, ['12:tags:14']) + req.remove_pending_operations() + + def test_pending_deletion(self): + res, req = self.remote_call('add_pending_delete', ['12', 'tags', '13']) + inserts = req.get_pending_inserts() + self.assertEquals(inserts, []) + deletes = req.get_pending_deletes() + self.assertEquals(deletes, ['12:tags:13']) + res, req = self.remote_call('add_pending_delete', ['12', 'tags', '14']) + inserts = req.get_pending_inserts() + self.assertEquals(inserts, []) + deletes = req.get_pending_deletes() + self.assertEquals(deletes, ['12:tags:13', '12:tags:14']) + deletes = req.get_pending_deletes(12) + self.assertEquals(deletes, ['12:tags:13', '12:tags:14']) + deletes = req.get_pending_deletes(13) + self.assertEquals(deletes, ['12:tags:13']) + deletes = req.get_pending_deletes(14) + self.assertEquals(deletes, ['12:tags:14']) + req.remove_pending_operations() + + def test_remove_pending_operations(self): + self.remote_call('add_pending_delete', ['12', 'tags', '13']) + _, req = self.remote_call('add_pending_insert', ['12', 'tags', '14']) + inserts = req.get_pending_inserts() + self.assertEquals(inserts, ['12:tags:14']) + deletes = req.get_pending_deletes() + self.assertEquals(deletes, ['12:tags:13']) + req.remove_pending_operations() + self.assertEquals(req.get_pending_deletes(), []) + self.assertEquals(req.get_pending_inserts(), []) + + + def test_add_inserts(self): + res, req = self.remote_call('add_pending_inserts', + [('12', 'tags', '13'), ('12', 'tags', '14')]) + inserts = req.get_pending_inserts() + self.assertEquals(inserts, ['12:tags:13', '12:tags:14']) + req.remove_pending_operations() + + + # silly tests + def test_external_resource(self): + self.assertEquals(self.remote_call('external_resource', 'RSS_LOGO')[0], + simplejson.dumps(self.request().external_resource('RSS_LOGO'))) + def test_i18n(self): + self.assertEquals(self.remote_call('i18n', ['bimboom'])[0], + simplejson.dumps(['bimboom'])) + + def test_format_date(self): + self.assertEquals(self.remote_call('format_date', '"2007-01-01 12:00:00"')[0], + simplejson.dumps('2007/01/01')) + + + + +if __name__ == '__main__': + unittest_main()