2018-03-31 04:13:44 +02:00
|
|
|
import mock
|
|
|
|
import os
|
|
|
|
from typing import Any
|
|
|
|
import ujson
|
|
|
|
|
2018-07-13 17:34:39 +02:00
|
|
|
from django.core import signing
|
|
|
|
|
2018-03-31 04:13:44 +02:00
|
|
|
import stripe
|
|
|
|
from stripe.api_resources.list_object import ListObject
|
|
|
|
|
2018-06-28 00:48:51 +02:00
|
|
|
from zerver.lib.actions import do_deactivate_user, do_create_user, \
|
|
|
|
do_activate_user, do_reactivate_user, activity_change_requires_seat_update
|
2018-03-31 04:13:44 +02:00
|
|
|
from zerver.lib.test_classes import ZulipTestCase
|
2018-06-28 00:48:51 +02:00
|
|
|
from zerver.lib.timestamp import timestamp_to_datetime
|
|
|
|
from zerver.models import Realm, UserProfile, get_realm, RealmAuditLog
|
2018-03-31 04:13:44 +02:00
|
|
|
from zilencer.lib.stripe import StripeError, catch_stripe_errors, \
|
|
|
|
do_create_customer_with_payment_source, do_subscribe_customer_to_plan, \
|
2018-07-13 17:34:39 +02:00
|
|
|
get_seat_count, extract_current_subscription, sign_string, unsign_string
|
2018-03-31 04:13:44 +02:00
|
|
|
from zilencer.models import Customer, Plan
|
|
|
|
|
|
|
|
fixture_data_file = open(os.path.join(os.path.dirname(__file__), 'stripe_fixtures.json'), 'r')
|
|
|
|
fixture_data = ujson.load(fixture_data_file)
|
|
|
|
|
|
|
|
def mock_create_customer(*args: Any, **kwargs: Any) -> ListObject:
|
|
|
|
return stripe.util.convert_to_stripe_object(fixture_data["create_customer"])
|
|
|
|
|
|
|
|
def mock_create_subscription(*args: Any, **kwargs: Any) -> ListObject:
|
|
|
|
return stripe.util.convert_to_stripe_object(fixture_data["create_subscription"])
|
|
|
|
|
|
|
|
def mock_retrieve_customer(*args: Any, **kwargs: Any) -> ListObject:
|
|
|
|
return stripe.util.convert_to_stripe_object(fixture_data["retrieve_customer"])
|
|
|
|
|
|
|
|
def mock_upcoming_invoice(*args: Any, **kwargs: Any) -> ListObject:
|
|
|
|
return stripe.util.convert_to_stripe_object(fixture_data["upcoming_invoice"])
|
|
|
|
|
|
|
|
class StripeTest(ZulipTestCase):
|
|
|
|
def setUp(self) -> None:
|
|
|
|
self.token = 'token'
|
|
|
|
# The values below should be copied from stripe_fixtures.json
|
|
|
|
self.stripe_customer_id = 'cus_D7OT2jf5YAtZQL'
|
2018-06-28 00:48:51 +02:00
|
|
|
self.customer_created = 1529990750
|
2018-03-31 04:13:44 +02:00
|
|
|
self.stripe_plan_id = 'plan_D7Nh2BtpTvIzYp'
|
2018-06-28 00:48:51 +02:00
|
|
|
self.subscription_created = 1529990751
|
2018-03-31 04:13:44 +02:00
|
|
|
self.quantity = 8
|
2018-07-13 13:33:05 +02:00
|
|
|
|
|
|
|
self.signed_seat_count, self.salt = sign_string(str(self.quantity))
|
2018-03-31 04:13:44 +02:00
|
|
|
Plan.objects.create(nickname=Plan.CLOUD_ANNUAL, stripe_plan_id=self.stripe_plan_id)
|
|
|
|
|
|
|
|
@mock.patch("zilencer.lib.stripe.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
@mock.patch("zilencer.lib.stripe.billing_logger.error")
|
|
|
|
def test_errors(self, mock_billing_logger_error: mock.Mock) -> None:
|
|
|
|
@catch_stripe_errors
|
|
|
|
def raise_invalid_request_error() -> None:
|
|
|
|
raise stripe.error.InvalidRequestError("Request req_oJU621i6H6X4Ez: No such token: x",
|
|
|
|
None)
|
|
|
|
with self.assertRaisesRegex(StripeError, "Something went wrong. Please try again or "):
|
|
|
|
raise_invalid_request_error()
|
|
|
|
mock_billing_logger_error.assert_called()
|
|
|
|
|
|
|
|
@catch_stripe_errors
|
|
|
|
def raise_card_error() -> None:
|
|
|
|
error_message = "The card number is not a valid credit card number."
|
|
|
|
json_body = {"error": {"message": error_message}}
|
|
|
|
raise stripe.error.CardError(error_message, "number", "invalid_number",
|
|
|
|
json_body=json_body)
|
|
|
|
with self.assertRaisesRegex(StripeError,
|
|
|
|
"The card number is not a valid credit card number."):
|
|
|
|
raise_card_error()
|
|
|
|
mock_billing_logger_error.assert_called()
|
|
|
|
|
|
|
|
@catch_stripe_errors
|
|
|
|
def raise_exception() -> None:
|
|
|
|
raise Exception
|
|
|
|
with self.assertRaises(Exception):
|
|
|
|
raise_exception()
|
|
|
|
mock_billing_logger_error.assert_called()
|
|
|
|
|
|
|
|
@mock.patch("zilencer.lib.stripe.STRIPE_PUBLISHABLE_KEY", None)
|
|
|
|
def test_no_stripe_keys(self) -> None:
|
|
|
|
@catch_stripe_errors
|
|
|
|
def foo() -> None:
|
|
|
|
pass # nocoverage
|
|
|
|
with self.assertRaisesRegex(StripeError, "Missing Stripe config."):
|
|
|
|
foo()
|
|
|
|
|
|
|
|
@mock.patch("zilencer.lib.stripe.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
@mock.patch("zilencer.views.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
@mock.patch("stripe.Customer.create", side_effect=mock_create_customer)
|
|
|
|
@mock.patch("stripe.Subscription.create", side_effect=mock_create_subscription)
|
|
|
|
def test_initial_upgrade(self, mock_create_subscription: mock.Mock,
|
|
|
|
mock_create_customer: mock.Mock) -> None:
|
2018-07-25 16:37:07 +02:00
|
|
|
user = self.example_user("hamlet")
|
|
|
|
self.login(user.email)
|
2018-03-31 04:13:44 +02:00
|
|
|
response = self.client_get("/upgrade/")
|
|
|
|
self.assert_in_success_response(['We can also bill by invoice'], response)
|
2018-07-25 16:37:07 +02:00
|
|
|
self.assertFalse(user.realm.has_seat_based_plan)
|
2018-03-31 04:13:44 +02:00
|
|
|
# Click "Make payment" in Stripe Checkout
|
|
|
|
response = self.client_post("/upgrade/", {
|
|
|
|
'stripeToken': self.token,
|
2018-07-13 13:33:05 +02:00
|
|
|
# TODO: get these values from the response
|
|
|
|
'signed_seat_count': self.signed_seat_count,
|
|
|
|
'salt': self.salt,
|
2018-03-31 04:13:44 +02:00
|
|
|
'plan': Plan.CLOUD_ANNUAL})
|
2018-06-28 00:48:51 +02:00
|
|
|
# Check that we created a customer and subscription in stripe
|
2018-03-31 04:13:44 +02:00
|
|
|
mock_create_customer.assert_called_once_with(
|
|
|
|
description="zulip (Zulip Dev)",
|
2018-07-25 16:37:07 +02:00
|
|
|
metadata={'realm_id': user.realm.id, 'realm_str': 'zulip'},
|
2018-03-31 04:13:44 +02:00
|
|
|
source=self.token)
|
|
|
|
mock_create_subscription.assert_called_once_with(
|
|
|
|
customer=self.stripe_customer_id,
|
|
|
|
billing='charge_automatically',
|
|
|
|
items=[{
|
|
|
|
'plan': self.stripe_plan_id,
|
|
|
|
'quantity': self.quantity,
|
|
|
|
}],
|
|
|
|
prorate=True,
|
|
|
|
tax_percent=0)
|
2018-06-28 00:48:51 +02:00
|
|
|
# Check that we correctly populated Customer and RealmAuditLog in Zulip
|
2018-07-25 16:37:07 +02:00
|
|
|
self.assertEqual(1, Customer.objects.filter(realm=user.realm,
|
2018-03-31 04:13:44 +02:00
|
|
|
stripe_customer_id=self.stripe_customer_id,
|
2018-07-25 16:37:07 +02:00
|
|
|
billing_user=user).count())
|
|
|
|
audit_log_entries = list(RealmAuditLog.objects.filter(acting_user=user)
|
2018-06-28 00:48:51 +02:00
|
|
|
.values_list('event_type', 'event_time').order_by('id'))
|
|
|
|
self.assertEqual(audit_log_entries, [
|
2018-07-22 18:06:36 +02:00
|
|
|
(RealmAuditLog.REALM_STRIPE_INITIALIZED, timestamp_to_datetime(self.customer_created)),
|
|
|
|
(RealmAuditLog.REALM_CARD_ADDED, timestamp_to_datetime(self.customer_created)),
|
|
|
|
(RealmAuditLog.REALM_PLAN_STARTED, timestamp_to_datetime(self.subscription_created)),
|
2018-06-28 00:48:51 +02:00
|
|
|
])
|
|
|
|
# Check that we correctly updated Realm
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
self.assertTrue(realm.has_seat_based_plan)
|
2018-03-31 04:13:44 +02:00
|
|
|
# Check that we can no longer access /upgrade
|
|
|
|
response = self.client_get("/upgrade/")
|
|
|
|
self.assertEqual(response.status_code, 302)
|
|
|
|
self.assertEqual('/billing/', response.url)
|
|
|
|
|
2018-07-11 16:36:52 +02:00
|
|
|
@mock.patch("zilencer.lib.stripe.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
@mock.patch("zilencer.views.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
@mock.patch("stripe.Invoice.upcoming", side_effect=mock_upcoming_invoice)
|
|
|
|
@mock.patch("stripe.Customer.retrieve", side_effect=mock_retrieve_customer)
|
|
|
|
@mock.patch("stripe.Customer.create", side_effect=mock_create_customer)
|
|
|
|
@mock.patch("stripe.Subscription.create", side_effect=mock_create_subscription)
|
|
|
|
def test_billing_page_permissions(self, mock_create_subscription: mock.Mock,
|
|
|
|
mock_create_customer: mock.Mock,
|
|
|
|
mock_retrieve_customer: mock.Mock,
|
|
|
|
mock_upcoming_invoice: mock.Mock) -> None:
|
|
|
|
# Check that non-admins can access /upgrade via /billing, when there is no Customer object
|
|
|
|
self.login(self.example_email('hamlet'))
|
|
|
|
response = self.client_get("/billing/")
|
|
|
|
self.assertEqual(response.status_code, 302)
|
|
|
|
self.assertEqual('/upgrade/', response.url)
|
|
|
|
# Check that non-admins can sign up and pay
|
|
|
|
self.client_post("/upgrade/", {'stripeToken': self.token,
|
2018-07-13 13:33:05 +02:00
|
|
|
'signed_seat_count': self.signed_seat_count,
|
|
|
|
'salt': self.salt,
|
2018-07-11 16:36:52 +02:00
|
|
|
'plan': Plan.CLOUD_ANNUAL})
|
|
|
|
# Check that the non-admin hamlet can still access /billing
|
|
|
|
response = self.client_get("/billing/")
|
2018-06-29 16:51:36 +02:00
|
|
|
self.assert_in_success_response(["for billing history or to make changes"], response)
|
2018-07-11 16:36:52 +02:00
|
|
|
# Check admins can access billing, even though they are not the billing_user
|
|
|
|
self.login(self.example_email('iago'))
|
|
|
|
response = self.client_get("/billing/")
|
2018-06-29 16:51:36 +02:00
|
|
|
self.assert_in_success_response(["for billing history or to make changes"], response)
|
2018-07-11 16:36:52 +02:00
|
|
|
# Check that non-admin, non-billing_user does not have access
|
|
|
|
self.login(self.example_email("cordelia"))
|
|
|
|
response = self.client_get("/billing/")
|
|
|
|
self.assert_in_success_response(["You must be an organization administrator"], response)
|
|
|
|
|
2018-06-28 00:48:51 +02:00
|
|
|
@mock.patch("zilencer.lib.stripe.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
@mock.patch("zilencer.views.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
@mock.patch("stripe.Customer.create", side_effect=mock_create_customer)
|
|
|
|
@mock.patch("stripe.Subscription.create", side_effect=mock_create_subscription)
|
|
|
|
def test_upgrade_with_outdated_seat_count(self, mock_create_subscription: mock.Mock,
|
|
|
|
mock_create_customer: mock.Mock) -> None:
|
2018-07-25 16:37:07 +02:00
|
|
|
self.login(self.example_email("hamlet"))
|
2018-06-28 00:48:51 +02:00
|
|
|
new_seat_count = 123
|
|
|
|
# Change the seat count while the user is going through the upgrade flow
|
|
|
|
with mock.patch('zilencer.lib.stripe.get_seat_count', return_value=new_seat_count):
|
|
|
|
self.client_post("/upgrade/", {'stripeToken': self.token,
|
2018-07-13 13:33:05 +02:00
|
|
|
'signed_seat_count': self.signed_seat_count,
|
|
|
|
'salt': self.salt,
|
2018-06-28 00:48:51 +02:00
|
|
|
'plan': Plan.CLOUD_ANNUAL})
|
|
|
|
# Check that the subscription call used the old quantity, not new_seat_count
|
|
|
|
mock_create_subscription.assert_called_once_with(
|
|
|
|
customer=self.stripe_customer_id,
|
|
|
|
billing='charge_automatically',
|
|
|
|
items=[{
|
|
|
|
'plan': self.stripe_plan_id,
|
|
|
|
'quantity': self.quantity,
|
|
|
|
}],
|
|
|
|
prorate=True,
|
|
|
|
tax_percent=0)
|
2018-07-22 18:06:36 +02:00
|
|
|
# Check that we have the PLAN_QUANTITY_UPDATED entry, and that we
|
2018-06-28 00:48:51 +02:00
|
|
|
# correctly handled the requires_billing_update field
|
|
|
|
audit_log_entries = list(RealmAuditLog.objects.order_by('-id')
|
|
|
|
.values_list('event_type', 'event_time',
|
|
|
|
'requires_billing_update')[:4])[::-1]
|
|
|
|
self.assertEqual(audit_log_entries, [
|
2018-07-22 18:06:36 +02:00
|
|
|
(RealmAuditLog.REALM_STRIPE_INITIALIZED, timestamp_to_datetime(self.customer_created), False),
|
|
|
|
(RealmAuditLog.REALM_CARD_ADDED, timestamp_to_datetime(self.customer_created), False),
|
|
|
|
(RealmAuditLog.REALM_PLAN_STARTED, timestamp_to_datetime(self.subscription_created), False),
|
|
|
|
(RealmAuditLog.PLAN_QUANTITY_UPDATED, timestamp_to_datetime(self.subscription_created), True),
|
2018-06-28 00:48:51 +02:00
|
|
|
])
|
|
|
|
self.assertEqual(ujson.loads(RealmAuditLog.objects.filter(
|
2018-07-22 18:06:36 +02:00
|
|
|
event_type=RealmAuditLog.PLAN_QUANTITY_UPDATED).values_list('extra_data', flat=True).first()),
|
2018-06-28 00:48:51 +02:00
|
|
|
{'quantity': new_seat_count})
|
|
|
|
|
2018-07-13 13:33:05 +02:00
|
|
|
@mock.patch("zilencer.lib.stripe.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
@mock.patch("zilencer.views.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
def test_upgrade_with_tampered_seat_count(self) -> None:
|
2018-07-25 16:37:07 +02:00
|
|
|
self.login(self.example_email("hamlet"))
|
2018-07-13 13:33:05 +02:00
|
|
|
result = self.client_post("/upgrade/", {
|
|
|
|
'stripeToken': self.token,
|
|
|
|
'signed_seat_count': "randomsalt",
|
|
|
|
'salt': self.salt,
|
|
|
|
'plan': Plan.CLOUD_ANNUAL
|
|
|
|
})
|
|
|
|
self.assert_in_success_response(["Something went wrong. Please contact"], result)
|
|
|
|
|
2018-07-22 17:23:57 +02:00
|
|
|
@mock.patch("zilencer.lib.stripe.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
@mock.patch("zilencer.views.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
def test_upgrade_with_tampered_plan(self) -> None:
|
2018-07-25 16:37:07 +02:00
|
|
|
self.login(self.example_email("hamlet"))
|
2018-07-22 17:23:57 +02:00
|
|
|
result = self.client_post("/upgrade/", {
|
|
|
|
'stripeToken': self.token,
|
|
|
|
'signed_seat_count': self.signed_seat_count,
|
|
|
|
'salt': self.salt,
|
|
|
|
'plan': "invalid"
|
|
|
|
})
|
|
|
|
self.assert_in_success_response(["Something went wrong. Please contact"], result)
|
|
|
|
|
2018-03-31 04:13:44 +02:00
|
|
|
@mock.patch("zilencer.lib.stripe.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
@mock.patch("zilencer.views.STRIPE_PUBLISHABLE_KEY", "stripe_publishable_key")
|
|
|
|
@mock.patch("stripe.Customer.retrieve", side_effect=mock_retrieve_customer)
|
|
|
|
@mock.patch("stripe.Invoice.upcoming", side_effect=mock_upcoming_invoice)
|
|
|
|
def test_billing_home(self, mock_upcoming_invoice: mock.Mock,
|
|
|
|
mock_retrieve_customer: mock.Mock) -> None:
|
2018-07-25 16:37:07 +02:00
|
|
|
user = self.example_user("hamlet")
|
|
|
|
self.login(user.email)
|
2018-03-31 04:13:44 +02:00
|
|
|
# No Customer yet; check that we are redirected to /upgrade
|
|
|
|
response = self.client_get("/billing/")
|
|
|
|
self.assertEqual(response.status_code, 302)
|
|
|
|
self.assertEqual('/upgrade/', response.url)
|
|
|
|
|
|
|
|
Customer.objects.create(
|
2018-07-25 16:37:07 +02:00
|
|
|
realm=user.realm, stripe_customer_id=self.stripe_customer_id, billing_user=user)
|
2018-03-31 04:13:44 +02:00
|
|
|
response = self.client_get("/billing/")
|
|
|
|
self.assert_not_in_success_response(['We can also bill by invoice'], response)
|
2018-06-29 16:51:36 +02:00
|
|
|
for substring in ['Your plan will renew on', '$%s.00' % (80 * self.quantity,),
|
2018-03-31 04:13:44 +02:00
|
|
|
'Card ending in 4242']:
|
|
|
|
self.assert_in_response(substring, response)
|
|
|
|
|
|
|
|
def test_get_seat_count(self) -> None:
|
2018-07-25 16:37:07 +02:00
|
|
|
realm = get_realm("zulip")
|
|
|
|
initial_count = get_seat_count(realm)
|
|
|
|
user1 = UserProfile.objects.create(realm=realm, email='user1@zulip.com', pointer=-1)
|
|
|
|
user2 = UserProfile.objects.create(realm=realm, email='user2@zulip.com', pointer=-1)
|
|
|
|
self.assertEqual(get_seat_count(realm), initial_count + 2)
|
2018-03-31 04:13:44 +02:00
|
|
|
|
|
|
|
# Test that bots aren't counted
|
|
|
|
user1.is_bot = True
|
|
|
|
user1.save(update_fields=['is_bot'])
|
2018-07-25 16:37:07 +02:00
|
|
|
self.assertEqual(get_seat_count(realm), initial_count + 1)
|
2018-03-31 04:13:44 +02:00
|
|
|
|
|
|
|
# Test that inactive users aren't counted
|
|
|
|
do_deactivate_user(user2)
|
2018-07-25 16:37:07 +02:00
|
|
|
self.assertEqual(get_seat_count(realm), initial_count)
|
2018-06-28 00:48:51 +02:00
|
|
|
|
2018-07-10 10:56:21 +02:00
|
|
|
@mock.patch("stripe.Customer.retrieve", side_effect=mock_retrieve_customer)
|
|
|
|
@mock.patch("stripe.Customer.create", side_effect=mock_create_customer)
|
|
|
|
def test_extract_current_subscription(self, mock_create_customer: mock.Mock,
|
|
|
|
mock_retrieve_customer: mock.Mock) -> None:
|
|
|
|
# Only the most basic test. In particular, doesn't include testing with a
|
|
|
|
# canceled subscription, because we don't have a fixture for it.
|
|
|
|
customer_without_subscription = stripe.Customer.create()
|
|
|
|
self.assertIsNone(extract_current_subscription(customer_without_subscription))
|
|
|
|
|
|
|
|
customer_with_subscription = stripe.Customer.retrieve()
|
|
|
|
subscription = extract_current_subscription(customer_with_subscription)
|
|
|
|
self.assertEqual(subscription["id"][:4], "sub_")
|
|
|
|
|
2018-07-13 17:34:39 +02:00
|
|
|
def test_sign_string(self) -> None:
|
|
|
|
string = "abc"
|
|
|
|
signed_string, salt = sign_string(string)
|
|
|
|
self.assertEqual(string, unsign_string(signed_string, salt))
|
|
|
|
|
|
|
|
with self.assertRaises(signing.BadSignature):
|
|
|
|
unsign_string(signed_string, "randomsalt")
|
|
|
|
|
2018-06-28 00:48:51 +02:00
|
|
|
class BillingUpdateTest(ZulipTestCase):
|
|
|
|
def test_activity_change_requires_seat_update(self) -> None:
|
|
|
|
# Realm doesn't have a seat based plan
|
2018-07-25 16:37:07 +02:00
|
|
|
self.assertFalse(activity_change_requires_seat_update(self.example_user("hamlet")))
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
realm.has_seat_based_plan = True
|
|
|
|
realm.save(update_fields=['has_seat_based_plan'])
|
2018-06-28 00:48:51 +02:00
|
|
|
# seat based plan + user not a bot
|
2018-07-25 16:37:07 +02:00
|
|
|
user = self.example_user("hamlet")
|
|
|
|
self.assertTrue(activity_change_requires_seat_update(user))
|
|
|
|
user.is_bot = True
|
|
|
|
user.save(update_fields=['is_bot'])
|
2018-06-28 00:48:51 +02:00
|
|
|
# seat based plan but user is a bot
|
2018-07-25 16:37:07 +02:00
|
|
|
self.assertFalse(activity_change_requires_seat_update(user))
|
2018-06-28 00:48:51 +02:00
|
|
|
|
|
|
|
def test_requires_billing_update_for_is_active_changes(self) -> None:
|
|
|
|
count = RealmAuditLog.objects.count()
|
2018-07-25 16:37:07 +02:00
|
|
|
realm = get_realm("zulip")
|
|
|
|
user1 = do_create_user('user1@zulip.com', 'password', realm, 'full name', 'short name')
|
2018-06-28 00:48:51 +02:00
|
|
|
do_deactivate_user(user1)
|
|
|
|
do_reactivate_user(user1)
|
|
|
|
# Not a proper use of do_activate_user, but it's fine to call it like this for this test
|
|
|
|
do_activate_user(user1)
|
|
|
|
self.assertEqual(count + 4,
|
|
|
|
RealmAuditLog.objects.filter(requires_billing_update=False).count())
|
|
|
|
|
2018-07-25 16:37:07 +02:00
|
|
|
realm.has_seat_based_plan = True
|
|
|
|
realm.save(update_fields=['has_seat_based_plan'])
|
|
|
|
user2 = do_create_user('user2@zulip.com', 'password', realm, 'full name', 'short name')
|
2018-06-28 00:48:51 +02:00
|
|
|
do_deactivate_user(user2)
|
|
|
|
do_reactivate_user(user2)
|
|
|
|
do_activate_user(user2)
|
|
|
|
self.assertEqual(4, RealmAuditLog.objects.filter(requires_billing_update=True).count())
|