{ "info": { "author": "mylan at quintagroup.com", "author_email": "support@quintagroup.com", "bugtrack_url": null, "classifiers": [ "Framework :: Plone", "Intended Audience :: Developers", "License :: OSI Approved :: GNU General Public License (GPL)" ], "description": ".. contents::\n\nChange history\n**************\n\nChangelog\n=========\n\n0.1 (2011-05-13)\n----------------\n\n- Clean up and release\n [aclark]\n\n- Initial functionality\n [mylan at quintagroup.com]\n\n- Created recipe with ZopeSkel\n [mylan at quintagroup.com]\n\n\nDetailed Documentation\n**********************\n\nIntroduction\n============\n\nThis is a full-blown functional test. The emphasis here is on testing what\nthe user may input and see, and the system is largely tested as a black box.\nWe use PloneTestCase to set up this test as well, so we have a full Plone site\nto play with. We *can* inspect the state of the portal, e.g. using \nself.portal and self.folder, but it is often frowned upon since you are not\ntreating the system as a black box. Also, if you, for example, log in or set\nroles using calls like self.setRoles(), these are not reflected in the test\nbrowser, which runs as a separate session.\n\nBeing a doctest, we can tell a story here.\n\nFirst, we must perform some setup. We use the testbrowser that is shipped\nwith Five, as this provides proper Zope 2 integration. Most of the \ndocumentation, though, is in the underlying zope.testbrower package.\n\n >>> from Products.Five.testbrowser import Browser\n >>> browser = Browser()\n >>> portal_url = self.portal.absolute_url()\n\nThe following is useful when writing and debugging testbrowser tests. It lets\nus see all error messages in the error_log.\n\n >>> self.portal.error_log._ignored_exceptions = ()\n\nWith that in place, we can go to the portal front page and log in. We will\ndo this using the default user from PloneTestCase:\n\n >>> from Products.PloneTestCase.setup import portal_owner, default_password\n\nBecause add-on themes or products may remove or hide the login portlet, this test will use the login form that comes with plone. \n\n >>> browser.open(portal_url + '/login_form')\n >>> browser.getControl(name='__ac_name').value = portal_owner\n >>> browser.getControl(name='__ac_password').value = default_password\n >>> browser.getControl(name='submit').click()\n\nHere, we set the value of the fields on the login form and then simulate a\nsubmit click. We then ensure that we get the friendly logged-in message:\n\n >>> \"You are now logged in\" in browser.contents\n True\n\nFinally, let's return to the front page of our site before continuing\n\n >>> browser.open(portal_url)\n\n-*- extra stuff goes here -*-\n\nThe Bounty Program Submission content type\n==========================================\n\nIn this section we are tesing the Bounty Program Submission content type by performing\nbasic operations like adding, updadating and deleting Bounty Program Submission content\nitems.\n\nAdding a new Bounty Program Submission content item\n---------------------------------------------------\n\nWe use the 'Add new' menu to add a new content item.\n\n >>> browser.getLink('Add new').click()\n\nThen we select the type of item we want to add. In this case we select\n'Bounty Program Submission' and click the 'Add' button to get to the add form.\n\n >>> browser.getControl('Bounty Program Submission').click()\n >>> browser.getControl(name='form.button.Add').click()\n >>> 'Bounty Program Submission' in browser.contents\n True\n\nNow we fill the form and submit it.\n\n >>> browser.getControl(name='title').value = 'Bounty Program Submission Sample'\n >>> browser.getControl('Save').click()\n >>> 'Changes saved' in browser.contents\n True\n\nAnd we are done! We added a new 'Bounty Program Submission' content item to the portal.\n\nUpdating an existing Bounty Program Submission content item\n-----------------------------------------------------------\n\nLet's click on the 'edit' tab and update the object attribute values.\n\n >>> browser.getLink('Edit').click()\n >>> browser.getControl(name='title').value = 'New Bounty Program Submission Sample'\n >>> browser.getControl('Save').click()\n\nWe check that the changes were applied.\n\n >>> 'Changes saved' in browser.contents\n True\n >>> 'New Bounty Program Submission Sample' in browser.contents\n True\n\nRemoving a/an Bounty Program Submission content item\n----------------------------------------------------\n\nIf we go to the home page, we can see a tab with the 'New Bounty Program Submission\nSample' title in the global navigation tabs.\n\n >>> browser.open(portal_url)\n >>> 'New Bounty Program Submission Sample' in browser.contents\n True\n\nNow we are going to delete the 'New Bounty Program Submission Sample' object. First we\ngo to the contents tab and select the 'New Bounty Program Submission Sample' for\ndeletion.\n\n >>> browser.getLink('Contents').click()\n >>> browser.getControl('New Bounty Program Submission Sample').click()\n\nWe click on the 'Delete' button.\n\n >>> browser.getControl('Delete').click()\n >>> 'Item(s) deleted' in browser.contents\n True\n\nSo, if we go back to the home page, there is no longer a 'New Bounty Program Submission\nSample' tab.\n\n >>> browser.open(portal_url)\n >>> 'New Bounty Program Submission Sample' in browser.contents\n False\n\nAdding a new Bounty Program Submission content item as contributor\n------------------------------------------------------------------\n\nNot only site managers are allowed to add Bounty Program Submission content items, but\nalso site contributors.\n\nLet's logout and then login as 'contributor', a portal member that has the\ncontributor role assigned.\n\n >>> browser.getLink('Log out').click()\n >>> browser.open(portal_url + '/login_form')\n >>> browser.getControl(name='__ac_name').value = 'contributor'\n >>> browser.getControl(name='__ac_password').value = default_password\n >>> browser.getControl(name='submit').click()\n >>> browser.open(portal_url)\n\nWe use the 'Add new' menu to add a new content item.\n\n >>> browser.getLink('Add new').click()\n\nWe select 'Bounty Program Submission' and click the 'Add' button to get to the add form.\n\n >>> browser.getControl('Bounty Program Submission').click()\n >>> browser.getControl(name='form.button.Add').click()\n >>> 'Bounty Program Submission' in browser.contents\n True\n\nNow we fill the form and submit it.\n\n >>> browser.getControl(name='title').value = 'Bounty Program Submission Sample'\n >>> browser.getControl('Save').click()\n >>> 'Changes saved' in browser.contents\n True\n\nDone! We added a new Bounty Program Submission content item logged in as contributor.\n\nFinally, let's login back as manager.\n\n >>> browser.getLink('Log out').click()\n >>> browser.open(portal_url + '/login_form')\n >>> browser.getControl(name='__ac_name').value = portal_owner\n >>> browser.getControl(name='__ac_password').value = default_password\n >>> browser.getControl(name='submit').click()\n >>> browser.open(portal_url)\n\n\n\n\nContributors\n************\n\n- mylan at quintagroup.com, Author\n- aclark at aclark.net, Maintainer\n\nDownload\n********", "description_content_type": null, "docs_url": null, "download_url": "UNKNOWN", "downloads": { "last_day": -1, "last_month": -1, "last_week": -1 }, "home_page": "http://svn.quintagroup.com/products/", "keywords": "", "license": "GPL", "maintainer": null, "maintainer_email": null, "name": "ploneorg.kudobounty", "package_url": "https://pypi.org/project/ploneorg.kudobounty/", "platform": "UNKNOWN", "project_url": "https://pypi.org/project/ploneorg.kudobounty/", "project_urls": { "Download": "UNKNOWN", "Homepage": "http://svn.quintagroup.com/products/" }, "release_url": "https://pypi.org/project/ploneorg.kudobounty/0.1/", "requires_dist": null, "requires_python": null, "summary": "Bounty Program logo display mechanism for the plone.org", "version": "0.1" }, "last_serial": 796442, "releases": { "0.1": [ { "comment_text": "", "digests": { "md5": "3cb6af8c631993b27604eeddcdae2404", "sha256": "4793b5aa93425f4e9ef03df71903c544e33b31f7478a84e02d0ac7cc9c04a734" }, "downloads": -1, "filename": "ploneorg.kudobounty-0.1.zip", "has_sig": false, "md5_digest": "3cb6af8c631993b27604eeddcdae2404", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 41717, "upload_time": "2011-05-14T02:32:12", "url": "https://files.pythonhosted.org/packages/0f/52/2b6c6b432d564461cdf0f621bb7754908acc086fe62280d3d9374a3744bf/ploneorg.kudobounty-0.1.zip" } ] }, "urls": [ { "comment_text": "", "digests": { "md5": "3cb6af8c631993b27604eeddcdae2404", "sha256": "4793b5aa93425f4e9ef03df71903c544e33b31f7478a84e02d0ac7cc9c04a734" }, "downloads": -1, "filename": "ploneorg.kudobounty-0.1.zip", "has_sig": false, "md5_digest": "3cb6af8c631993b27604eeddcdae2404", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 41717, "upload_time": "2011-05-14T02:32:12", "url": "https://files.pythonhosted.org/packages/0f/52/2b6c6b432d564461cdf0f621bb7754908acc086fe62280d3d9374a3744bf/ploneorg.kudobounty-0.1.zip" } ] }