# coding: utf-8 # Part of Odoo. See LICENSE file for full copyright and licensing details. import random from contextlib import contextmanager from datetime import datetime, timedelta from unittest.mock import patch from odoo.addons.base.tests.common import HttpCaseWithUserDemo from odoo.addons.website.models.website_visitor import WebsiteVisitor from odoo.tests import common, tagged class MockVisitor(common.BaseCase): @contextmanager def mock_visitor_from_request(self, force_visitor=False): def _get_visitor_from_request(model, *args, **kwargs): return force_visitor with patch.object(WebsiteVisitor, '_get_visitor_from_request', autospec=True, wraps=WebsiteVisitor, side_effect=_get_visitor_from_request) as _get_visitor_from_request_mock: yield @tagged('-at_install', 'post_install', 'website_visitor') class WebsiteVisitorTests(MockVisitor, HttpCaseWithUserDemo): def setUp(self): super(WebsiteVisitorTests, self).setUp() self.website = self.env['website'].search([ ('company_id', '=', self.env.user.company_id.id) ], limit=1) untracked_view = self.env['ir.ui.view'].create({ 'name': 'UntackedView', 'type': 'qweb', 'arch': ''' I am a generic pageĀ² ''', 'key': 'test.base_view', 'track': False, }) tracked_view = self.env['ir.ui.view'].create({ 'name': 'TrackedView', 'type': 'qweb', 'arch': ''' I am a generic page ''', 'key': 'test.base_view', 'track': True, }) tracked_view_2 = self.env['ir.ui.view'].create({ 'name': 'TrackedView2', 'type': 'qweb', 'arch': ''' I am a generic second page ''', 'key': 'test.base_view', 'track': True, }) [self.untracked_page, self.tracked_page, self.tracked_page_2] = self.env['website.page'].create([ { 'view_id': untracked_view.id, 'url': '/untracked_view', 'website_published': True, }, { 'view_id': tracked_view.id, 'url': '/tracked_view', 'website_published': True, }, { 'view_id': tracked_view_2.id, 'url': '/tracked_view_2', 'website_published': True, }, ]) self.user_portal = self.env['res.users'].search([('login', '=', 'portal')]) self.partner_portal = self.user_portal.partner_id if not self.user_portal: self.env['ir.config_parameter'].sudo().set_param('auth_password_policy.minlength', 4) self.partner_portal = self.env['res.partner'].create({ 'name': 'Joel Willis', 'email': 'joel.willis63@example.com', }) self.user_portal = self.env['res.users'].create({ 'login': 'portal', 'password': 'portal', 'partner_id': self.partner_portal.id, 'groups_id': [(6, 0, [self.env.ref('base.group_portal').id])], }) # Partner with no user associated, to test partner merge that forbids merging partners with more than 1 user self.partner_admin_duplicate = self.env['res.partner'].create({'name': 'Mitchell'}) def _get_last_visitor(self): return self.env['website.visitor'].search([], limit=1, order="id DESC") def assertPageTracked(self, visitor, page): """ Check a page is in visitor tracking data """ self.assertIn(page, visitor.website_track_ids.page_id) self.assertIn(page, visitor.page_ids) def assertVisitorTracking(self, visitor, pages): """ Check the whole tracking history of a visitor """ for page in pages: self.assertPageTracked(visitor, page) self.assertEqual( len(visitor.website_track_ids), len(pages) ) def assertVisitorDeactivated(self, visitor, main_visitor): """ Method that checks that a visitor has been de-activated / merged with other visitor, notably in case of login (see User.authenticate() as well as Visitor._merge_visitor() ). """ self.assertFalse(visitor.exists(), "The anonymous visitor should be deleted") self.assertTrue(visitor.website_track_ids < main_visitor.website_track_ids) def test_visitor_creation_on_tracked_page(self): """ Test various flows involving visitor creation and update. """ def authenticate(login, pwd): # We can't call `self.authenticate` because that tour util is # regenerating a new session.id before calling the real # `authenticate` method. # But we need the session id in the `authenticate` method because # we need to retrieve the visitor before the authentication, which # require the session id. res = self.url_open('/web/login') csrf_anchor = ' The ``access_token`` value should also be updated from 1 to 2. 2. There is a visitor for both partners and partner 1 is merged into partner 2. -> Both visitor should be merged too, so data are aggregated into a single visitor. Case 1 is tested here. Cade 2 is tested in :meth:`test_merge_partner_with_visitor_both`. """ # Setup a visitor for admin_duplicate and none for admin Visitor = self.env['website.visitor'] (self.partner_admin_duplicate + self.partner_admin).visitor_ids.unlink() visitor_admin_duplicate = Visitor.create({ 'partner_id': self.partner_admin_duplicate.id, 'access_token': self.partner_admin_duplicate.id, }) # | id | access_token | partner_id | # | -- | ---------------------- | --------------------- | # | 1 | admin_duplicate_id | admin_duplicate_id | # | | 1062141 | 1062141 | self.assertTrue(visitor_admin_duplicate.partner_id.id == int(visitor_admin_duplicate.access_token) == self.partner_admin_duplicate.id) # Merge admin_duplicate partner (no user associated) in admin partner self.env['base.partner.merge.automatic.wizard']._merge( (self.partner_admin + self.partner_admin_duplicate).ids, self.partner_admin ) # This should not happen.. # | id | access_token | partner_id | # | -- | ---------------------- | ---------- | # | 1 | admin_duplicate_id | admin_id | <-- Mismatch # | | 1062141 | 5013266 | # .. it should be: # | id | access_token | partner_id | # | -- | ------------ | ---------- | # | 1 | admin_id | admin_id | <-- No mismatch, became admin_id # | | 5013266 | 5013266 | self.assertTrue(visitor_admin_duplicate.partner_id.id == int(visitor_admin_duplicate.access_token) == self.partner_admin.id, "The admin_duplicate visitor should now be linked to the admin partner.") self.assertFalse(Visitor.search_count([('partner_id', '=', self.partner_admin_duplicate.id)]), "The admin_duplicate visitor should've been merged (and deleted) with the admin one.")