2929from shared .plan .constants import (
3030 ENTERPRISE_CLOUD_USER_PLAN_REPRESENTATIONS ,
3131 PlanName ,
32+ TierName ,
3233)
3334
3435from codecov .commands .exceptions import ValidationError
@@ -60,6 +61,17 @@ def setUp(self):
6061 admin_site .register (OrganizationLevelToken )
6162 self .owner_admin = OwnerAdmin (Owner , admin_site )
6263
64+ self .basic_tier = TierFactory (tier_name = TierName .BASIC .value )
65+ self .basic_plan = PlanFactory (
66+ tier = self .basic_tier , name = PlanName .BASIC_PLAN_NAME .value
67+ )
68+
69+ self .enterprise_tier = TierFactory (tier_name = TierName .ENTERPRISE .value )
70+ self .enterprise_plan = PlanFactory (
71+ tier = self .enterprise_tier ,
72+ name = PlanName .ENTERPRISE_CLOUD_YEARLY .value ,
73+ )
74+
6375 def test_owner_admin_detail_page (self ):
6476 owner = OwnerFactory ()
6577 response = self .client .get (
@@ -68,8 +80,10 @@ def test_owner_admin_detail_page(self):
6880 self .assertEqual (response .status_code , 200 )
6981
7082 def test_owner_admin_impersonate_owner (self ):
71- owner_to_impersonate = OwnerFactory (service = "bitbucket" )
72- other_owner = OwnerFactory ()
83+ owner_to_impersonate = OwnerFactory (
84+ service = "bitbucket" , plan = self .basic_plan .name
85+ )
86+ other_owner = OwnerFactory (plan = self .basic_plan .name )
7387
7488 with self .subTest ("more than one user selected" ):
7589 response = self .client .post (
@@ -103,7 +117,7 @@ def test_owner_admin_impersonate_owner(self):
103117
104118 @patch ("codecov_auth.admin.TaskService.delete_owner" )
105119 def test_delete_queryset (self , delete_mock ):
106- user_to_delete = OwnerFactory ()
120+ user_to_delete = OwnerFactory (plan = self . basic_plan . name )
107121 ownerid = user_to_delete .ownerid
108122 queryset = MagicMock ()
109123 queryset .__iter__ .return_value = [user_to_delete ]
@@ -114,14 +128,14 @@ def test_delete_queryset(self, delete_mock):
114128
115129 @patch ("codecov_auth.admin.TaskService.delete_owner" )
116130 def test_delete_model (self , delete_mock ):
117- user_to_delete = OwnerFactory ()
131+ user_to_delete = OwnerFactory (plan = self . basic_plan . name )
118132 ownerid = user_to_delete .ownerid
119133 self .owner_admin .delete_model (MagicMock (), user_to_delete )
120134 delete_mock .assert_called_once_with (ownerid = ownerid )
121135
122136 @patch ("codecov_auth.admin.admin.ModelAdmin.get_deleted_objects" )
123137 def test_confirmation_deleted_objects (self , mocked_deleted_objs ):
124- user_to_delete = OwnerFactory ()
138+ user_to_delete = OwnerFactory (plan = self . basic_plan . name )
125139 deleted_objs = [
126140 'Owner: <a href="/admin/codecov_auth/owner/{}/change/">{};</a>' .format (
127141 user_to_delete .ownerid , user_to_delete
@@ -141,7 +155,7 @@ def test_confirmation_deleted_objects(self, mocked_deleted_objs):
141155
142156 @patch ("codecov_auth.admin.admin.ModelAdmin.log_change" )
143157 def test_prev_and_new_values_in_log_entry (self , mocked_super_log_change ):
144- owner = OwnerFactory (staff = True )
158+ owner = OwnerFactory (staff = True , plan = self . basic_plan . name )
145159 owner .save ()
146160 owner .staff = False
147161 form = MagicMock ()
@@ -161,7 +175,7 @@ def test_prev_and_new_values_in_log_entry(self, mocked_super_log_change):
161175 ]
162176
163177 def test_inline_orgwide_tokens_display (self ):
164- owner = OwnerFactory ()
178+ owner = OwnerFactory (plan = self . basic_plan . name )
165179 request_url = reverse ("admin:codecov_auth_owner_change" , args = [owner .ownerid ])
166180 request = RequestFactory ().get (request_url )
167181 request .user = self .staff_user
@@ -170,7 +184,7 @@ def test_inline_orgwide_tokens_display(self):
170184 assert isinstance (inlines [0 ], OrgUploadTokenInline )
171185
172186 def test_inline_orgwide_permissions (self ):
173- owner_in_cloud_plan = OwnerFactory (plan = "users-enterprisey" )
187+ owner_in_cloud_plan = OwnerFactory (plan = self . enterprise_plan . name )
174188 org_token = OrganizationLevelTokenFactory (owner = owner_in_cloud_plan )
175189 owner_in_cloud_plan .save ()
176190 org_token .save ()
@@ -194,7 +208,7 @@ def test_inline_orgwide_permissions(self):
194208 def test_inline_orgwide_add_token_permission_no_token_and_user_in_enterprise_cloud_plan (
195209 self ,
196210 ):
197- owner = OwnerFactory ()
211+ owner = OwnerFactory (plan = self . basic_plan . name )
198212 assert owner .plan not in ENTERPRISE_CLOUD_USER_PLAN_REPRESENTATIONS
199213 assert OrganizationLevelToken .objects .filter (owner = owner ).count () == 0
200214 request_url = reverse ("admin:codecov_auth_owner_change" , args = [owner .ownerid ])
@@ -207,7 +221,7 @@ def test_inline_orgwide_add_token_permission_no_token_and_user_in_enterprise_clo
207221 def test_inline_orgwide_add_token_permission_no_token_user_not_in_enterprise_cloud_plan (
208222 self ,
209223 ):
210- owner_in_cloud_plan = OwnerFactory (plan = "users-enterprisey" )
224+ owner_in_cloud_plan = OwnerFactory (plan = self . enterprise_plan . name )
211225 assert (
212226 OrganizationLevelToken .objects .filter (owner = owner_in_cloud_plan ).count ()
213227 == 0
@@ -227,7 +241,7 @@ def test_inline_orgwide_add_token_permission_no_token_user_not_in_enterprise_clo
227241 def test_org_token_refresh_request_calls_service_to_refresh_token (
228242 self , mock_refresh
229243 ):
230- owner_in_cloud_plan = OwnerFactory (plan = "users-enterprisey" )
244+ owner_in_cloud_plan = OwnerFactory (plan = self . enterprise_plan . name )
231245 org_token = OrganizationLevelTokenFactory (owner = owner_in_cloud_plan )
232246 owner_in_cloud_plan .save ()
233247 org_token .save ()
@@ -264,7 +278,7 @@ def test_org_token_refresh_request_calls_service_to_refresh_token(
264278 "codecov_auth.services.org_level_token_service.OrgLevelTokenService.refresh_token"
265279 )
266280 def test_org_token_request_doesnt_call_service_to_refresh_token (self , mock_refresh ):
267- owner_in_cloud_plan = OwnerFactory (plan = "users-enterprisey" )
281+ owner_in_cloud_plan = OwnerFactory (plan = self . enterprise_plan . name )
268282 org_token = OrganizationLevelTokenFactory (owner = owner_in_cloud_plan )
269283 owner_in_cloud_plan .save ()
270284 org_token .save ()
@@ -297,7 +311,7 @@ def test_org_token_request_doesnt_call_service_to_refresh_token(self, mock_refre
297311 mock_refresh .assert_not_called ()
298312
299313 def test_start_trial_ui_display (self ):
300- owner = OwnerFactory ()
314+ owner = OwnerFactory (plan = self . basic_plan . name )
301315
302316 res = self .client .post (
303317 reverse ("admin:codecov_auth_owner_changelist" ),
@@ -312,7 +326,7 @@ def test_start_trial_ui_display(self):
312326 @patch ("shared.plan.service.PlanService.start_trial_manually" )
313327 def test_start_trial_action (self , mock_start_trial_service ):
314328 mock_start_trial_service .return_value = None
315- org_to_be_trialed = OwnerFactory ()
329+ org_to_be_trialed = OwnerFactory (plan = self . basic_plan . name )
316330
317331 res = self .client .post (
318332 reverse ("admin:codecov_auth_owner_changelist" ),
@@ -329,7 +343,7 @@ def test_start_trial_action(self, mock_start_trial_service):
329343 @patch ("shared.plan.service.PlanService._start_trial_helper" )
330344 def test_extend_trial_action (self , mock_start_trial_service ):
331345 mock_start_trial_service .return_value = None
332- org_to_be_trialed = OwnerFactory ()
346+ org_to_be_trialed = OwnerFactory (plan = self . basic_plan . name )
333347 org_to_be_trialed .plan = PlanName .TRIAL_PLAN_NAME .value
334348 org_to_be_trialed .save ()
335349
@@ -352,7 +366,7 @@ def test_start_trial_paid_plan(self, mock_start_trial_service):
352366 "Cannot trial from a paid plan"
353367 )
354368
355- org_to_be_trialed = OwnerFactory ()
369+ org_to_be_trialed = OwnerFactory (plan = self . basic_plan . name )
356370
357371 res = self .client .post (
358372 reverse ("admin:codecov_auth_owner_changelist" ),
@@ -367,7 +381,7 @@ def test_start_trial_paid_plan(self, mock_start_trial_service):
367381 assert mock_start_trial_service .called
368382
369383 def test_account_widget (self ):
370- owner = OwnerFactory (user = UserFactory (), plan = "users-enterprisey" )
384+ owner = OwnerFactory (user = UserFactory (), plan = self . enterprise_plan . name )
371385 rf = RequestFactory ()
372386 get_request = rf .get (f"/admin/codecov_auth/owner/{ owner .ownerid } /change/" )
373387 get_request .user = self .staff_user
0 commit comments