# coding: utf-8
# Part of Odoo. See LICENSE file for full copyright and licensing details.
import random
from contextlib import contextmanager
from datetime import datetime, timedelta
from unittest.mock import patch
from odoo.addons.base.tests.common import HttpCaseWithUserDemo
from odoo.addons.website.models.website_visitor import WebsiteVisitor
from odoo.tests import common, tagged, HttpCase
class MockVisitor(common.BaseCase):
@contextmanager
def mock_visitor_from_request(self, force_visitor=False):
def _get_visitor_from_request(model, *args, **kwargs):
return force_visitor
with patch.object(WebsiteVisitor, '_get_visitor_from_request',
autospec=True, wraps=WebsiteVisitor,
side_effect=_get_visitor_from_request) as _get_visitor_from_request_mock:
yield
@tagged('-at_install', 'post_install', 'website_visitor')
class WebsiteVisitorTests(MockVisitor, HttpCaseWithUserDemo):
def setUp(self):
super(WebsiteVisitorTests, self).setUp()
self.website = self.env['website'].search([
('company_id', '=', self.env.user.company_id.id)
], limit=1)
untracked_view = self.env['ir.ui.view'].create({
'name': 'UntackedView',
'type': 'qweb',
'arch': '''
I am a generic pageĀ²
''',
'key': 'test.base_view',
'track': False,
})
tracked_view = self.env['ir.ui.view'].create({
'name': 'TrackedView',
'type': 'qweb',
'arch': '''
I am a generic page
''',
'key': 'test.base_view',
'track': True,
})
tracked_view_2 = self.env['ir.ui.view'].create({
'name': 'TrackedView2',
'type': 'qweb',
'arch': '''
I am a generic second page
''',
'key': 'test.base_view',
'track': True,
})
[self.untracked_page, self.tracked_page, self.tracked_page_2] = self.env['website.page'].create([
{
'view_id': untracked_view.id,
'url': '/untracked_view',
'website_published': True,
},
{
'view_id': tracked_view.id,
'url': '/tracked_view',
'website_published': True,
},
{
'view_id': tracked_view_2.id,
'url': '/tracked_view_2',
'website_published': True,
},
])
self.user_portal = self.env['res.users'].search([('login', '=', 'portal')])
self.partner_portal = self.user_portal.partner_id
if not self.user_portal:
self.env['ir.config_parameter'].sudo().set_param('auth_password_policy.minlength', 4)
self.partner_portal = self.env['res.partner'].create({
'name': 'Joel Willis',
'email': 'joel.willis63@example.com',
})
self.user_portal = self.env['res.users'].create({
'login': 'portal',
'password': 'portal',
'partner_id': self.partner_portal.id,
'groups_id': [(6, 0, [self.env.ref('base.group_portal').id])],
})
# Partner with no user associated, to test partner merge that forbids merging partners with more than 1 user
self.partner_admin_duplicate = self.env['res.partner'].create({'name': 'Mitchell'})
def _get_last_visitor(self):
return self.env['website.visitor'].search([], limit=1, order="id DESC")
def assertPageTracked(self, visitor, page):
""" Check a page is in visitor tracking data """
self.assertIn(page, visitor.website_track_ids.page_id)
self.assertIn(page, visitor.page_ids)
def assertVisitorTracking(self, visitor, pages):
""" Check the whole tracking history of a visitor """
for page in pages:
self.assertPageTracked(visitor, page)
self.assertEqual(
len(visitor.website_track_ids),
len(pages)
)
def assertVisitorDeactivated(self, visitor, main_visitor):
""" Method that checks that a visitor has been de-activated / merged
with other visitor, notably in case of login (see User.authenticate() as
well as Visitor._merge_visitor() ). """
self.assertFalse(visitor.exists(), "The anonymous visitor should be deleted")
self.assertTrue(visitor.website_track_ids < main_visitor.website_track_ids)
def test_visitor_creation_on_tracked_page(self):
""" Test various flows involving visitor creation and update. """
def authenticate(login, pwd):
# We can't call `self.authenticate` because that tour util is
# regenerating a new session.id before calling the real
# `authenticate` method.
# But we need the session id in the `authenticate` method because
# we need to retrieve the visitor before the authentication, which
# require the session id.
res = self.url_open('/web/login')
csrf_anchor = ' The ``access_token`` value should also be updated from 1 to 2.
2. There is a visitor for both partners and partner 1 is merged into
partner 2.
-> Both visitor should be merged too, so data are aggregated into a
single visitor.
Case 1 is tested here.
Cade 2 is tested in :meth:`test_merge_partner_with_visitor_both`.
"""
# Setup a visitor for admin_duplicate and none for admin
Visitor = self.env['website.visitor']
(self.partner_admin_duplicate + self.partner_admin).visitor_ids.unlink()
visitor_admin_duplicate = Visitor.create({
'partner_id': self.partner_admin_duplicate.id,
'access_token': self.partner_admin_duplicate.id,
})
# | id | access_token | partner_id |
# | -- | ---------------------- | --------------------- |
# | 1 | admin_duplicate_id | admin_duplicate_id |
# | | 1062141 | 1062141 |
self.assertTrue(visitor_admin_duplicate.partner_id.id ==
int(visitor_admin_duplicate.access_token) ==
self.partner_admin_duplicate.id)
# Merge admin_duplicate partner (no user associated) in admin partner
self.env['base.partner.merge.automatic.wizard']._merge(
(self.partner_admin + self.partner_admin_duplicate).ids,
self.partner_admin
)
# This should not happen..
# | id | access_token | partner_id |
# | -- | ---------------------- | ---------- |
# | 1 | admin_duplicate_id | admin_id | <-- Mismatch
# | | 1062141 | 5013266 |
# .. it should be:
# | id | access_token | partner_id |
# | -- | ------------ | ---------- |
# | 1 | admin_id | admin_id | <-- No mismatch, became admin_id
# | | 5013266 | 5013266 |
self.assertTrue(visitor_admin_duplicate.partner_id.id ==
int(visitor_admin_duplicate.access_token) ==
self.partner_admin.id,
"The admin_duplicate visitor should now be linked to the admin partner.")
self.assertFalse(Visitor.search_count([('partner_id', '=', self.partner_admin_duplicate.id)]),
"The admin_duplicate visitor should've been merged (and deleted) with the admin one.")
@tagged('-at_install', 'post_install')
class TestPortalWizardMultiWebsites(HttpCase):
def setUp(self):
super().setUp()
self.website = self.env['website'].create({
'name': 'website_specific_user_account',
'specific_user_account': True,
})
self.other_website = self.env['website'].create({
'name': 'other_website_specific_user_account',
'specific_user_account': True,
})
self.email_address = 'email_address@example.com'
partner_specific = self.env['res.partner'].create({
'name': 'partner_specific',
'email': self.email_address,
'website_id': self.website.id,
})
partner_all_websites = self.env['res.partner'].create({
'name': 'partner_all_websites',
'email': self.email_address,
})
self.portal_user_specific = self._create_portal_user(partner_specific)
self.portal_user_specific.action_grant_access()
self.assertTrue(self.portal_user_specific.is_portal)
self.portal_user_all_websites = self._create_portal_user(partner_all_websites)
def test_portal_wizard_multi_websites_1(self):
# 1)
# It should be possible to grant portal access for two partners that
# have the same email address but are linked to different websites that
# have the "specific user account" characteristic.
partner_specific_other_website = self.env['res.partner'].create({
'name': 'partner_specific_other_website',
'email': self.email_address,
'website_id': self.other_website.id,
})
portal_user_specific_other_website = self._create_portal_user(partner_specific_other_website)
self.assertEqual(portal_user_specific_other_website.email_state, 'ok')
def test_portal_wizard_multi_websites_2(self):
# 2)
# It should not be possible to grant portal access for two partners that
# have the same email address and are linked to the same website that
# has the "specific user account" characteristic.
partner_specific_same_website = self.env['res.partner'].create({
'name': 'partner_specific_same_website',
'email': self.email_address,
'website_id': self.website.id,
})
portal_user_specific_same_website = self._create_portal_user(partner_specific_same_website)
self.assertEqual(portal_user_specific_same_website.email_state, 'exist')
def test_portal_wizard_multi_websites_3(self):
# 3)
# In this situation, there are two partners with the same email address.
# One is linked to a website that has the "specific_user_account"
# characteristic and the other is not linked to a website. In this
# situation, it should be possible to grant portal access for the second
# partner even if the first one is already a portal user.
self.assertEqual(self.portal_user_all_websites.email_state, 'ok')
def test_portal_wizard_multi_websites_4(self):
# 4)
# In 3), the partner that is linked to a website that has the
# "specific_user_account" setting was the first to have the portal
# access. This situation is testing the same case than 3) but when the
# partner that is not linked to a website is the first to receive the
# portal access.
other_email_address = 'other_email_address@example.com'
partner_specific_other_website = self.env['res.partner'].create({
'name': 'partner_specific_other_website',
'email': other_email_address,
'website_id': self.other_website.id,
})
portal_user_specific_other_website = self._create_portal_user(partner_specific_other_website)
partner_all_websites = self.env['res.partner'].create({
'name': 'partner_all_websites',
'email': other_email_address,
})
portal_user_all_websites_other_address = self._create_portal_user(partner_all_websites)
portal_user_all_websites_other_address.action_grant_access()
self.assertTrue(portal_user_all_websites_other_address.is_portal)
self.assertEqual(portal_user_specific_other_website.email_state, 'ok')
def test_portal_wizard_multi_websites_5(self):
# 5)
# It should not be possible to grant portal access for two partners that
# have the same email address and are not linked to a website.
partner_all_websites_second = self.env['res.partner'].create({
'name': 'partner_all_websites_second',
'email': self.email_address,
})
portal_user_all_websites_second = self._create_portal_user(partner_all_websites_second)
self.portal_user_all_websites.action_grant_access()
self.assertTrue(self.portal_user_all_websites.is_portal)
self.assertEqual(portal_user_all_websites_second.email_state, 'exist')
def test_portal_wizard_multi_websites_6(self):
# 6)
# It should not be possible to grant portal access for a partner that is
# not linked to a website if it exists a user with the same email
# address that is linked to the current website.
partner_specific_current_website = self.env['res.partner'].create({
'name': 'partner_specific_current_website',
'email': self.email_address,
'website_id': self.env['website'].get_current_website().id,
})
portal_user_specific_current_website = self._create_portal_user(partner_specific_current_website)
portal_user_specific_current_website.action_grant_access()
self.assertTrue(portal_user_specific_current_website.is_portal)
self.assertEqual(self.portal_user_all_websites.email_state, 'exist')
def _create_portal_user(self, partner):
""" Return a portal wizard user from a partner
:param partner: the partner from which a portal wizard user has to be
created
"""
portal_wizard = self.env['portal.wizard'].with_context(
active_ids=[partner.id]).create({})
return portal_wizard.user_ids