-- PostgreSQL database dump
--
--- Dumped from database version 9.5.3
--- Dumped by pg_dump version 9.5.3
+-- Dumped from database version 9.5.4
+-- Dumped by pg_dump version 9.5.4
SET statement_timeout = 0;
SET lock_timeout = 0;
ALTER SEQUENCE diary_entries_id_seq OWNED BY diary_entries.id;
+
+--
-- Name: diary_entry_subscriptions; Type: TABLE; Schema: public; Owner: -
--
CREATE UNIQUE INDEX index_client_applications_on_key ON client_applications USING btree (key);
+--
-- Name: index_diary_entry_subscriptions_on_diary_entry_id; Type: INDEX; Schema: public; Owner: -
--
CREATE INDEX index_diary_entry_subscriptions_on_diary_entry_id ON diary_entry_subscriptions USING btree (diary_entry_id);
+
--
-- Name: index_note_comments_on_body; Type: INDEX; Schema: public; Owner: -
--
ADD CONSTRAINT diary_entries_user_id_fkey FOREIGN KEY (user_id) REFERENCES users(id);
--- Name: diary_entry_subscriptions_diary_entry_id_fkey; Type: FK CONSTRAINT; Schema: public; Owner: -
--
+-- Name: diary_entry_subscriptions_diary_entry_id_fkey; Type: FK CONSTRAINT; Schema: public; Owner: -
--
ALTER TABLE ONLY diary_entry_subscriptions
INSERT INTO schema_migrations (version) VALUES ('20130328184137');
-INSERT INTO schema_migrations (version) VALUES ('20131029121300');
-
INSERT INTO schema_migrations (version) VALUES ('20131212124700');
INSERT INTO schema_migrations (version) VALUES ('20140115192822');
INSERT INTO schema_migrations (version) VALUES ('20150818224516');
+INSERT INTO schema_migrations (version) VALUES ('20161002153425');
+
+INSERT INTO schema_migrations (version) VALUES ('20161011010929');
+
INSERT INTO schema_migrations (version) VALUES ('21');
INSERT INTO schema_migrations (version) VALUES ('22');
INSERT INTO schema_migrations (version) VALUES ('8');
INSERT INTO schema_migrations (version) VALUES ('9');
+
assert_equal -1, result[0]
assert_match /must be logged in/, result[1]
+ create(:user_block, :user => users(:blocked_user))
amf_content "findgpx", "/1", [1, "blocked@openstreetmap.org:test"]
post :amf_read
assert_response :success
end
def test_edit
- entry = create(:diary_entry, :user_id => users(:normal_user).id)
+ entry = create(:diary_entry, :user => users(:normal_user))
# Make sure that you are redirected to the login page when you are
# not logged in, without and with the id of the entry you want to edit
end
def test_comment
- entry = create(:diary_entry, :user_id => users(:normal_user).id)
+ entry = create(:diary_entry, :user => users(:normal_user))
# Make sure that you are denied when you are not logged in
post :comment, :display_name => entry.user.display_name, :id => entry.id
def test_comment_spammy
# Find the entry to comment on
- entry = create(:diary_entry, :user_id => users(:normal_user).id)
+ entry = create(:diary_entry, :user => users(:normal_user))
post :subscribe, { :id => entry.id, :display_name => entry.user.display_name }, { :user => users(:normal_user).id }
# Generate some spammy content
def test_list_all
diary_entry = create(:diary_entry)
geo_entry = create(:diary_entry, :latitude => 51.50763, :longitude => -0.10781)
- public_entry = create(:diary_entry, :user_id => users(:public_user).id)
+ public_entry = create(:diary_entry, :user => users(:public_user))
# Try a list of all diary entries
get :list
end
def test_list_user
- diary_entry = create(:diary_entry, :user_id => users(:normal_user).id)
- geo_entry = create(:diary_entry, :user_id => users(:normal_user).id, :latitude => 51.50763, :longitude => -0.10781)
- _other_entry = create(:diary_entry, :user_id => users(:public_user).id)
+ diary_entry = create(:diary_entry, :user => users(:normal_user))
+ geo_entry = create(:diary_entry, :user => users(:normal_user), :latitude => 51.50763, :longitude => -0.10781)
+ _other_entry = create(:diary_entry, :user => users(:public_user))
# Try a list of diary entries for a valid user
get :list, :display_name => users(:normal_user).display_name
end
def test_list_friends
- friend = create(:friend, :user_id => users(:normal_user).id)
- diary_entry = create(:diary_entry, :user_id => friend.friend_user_id)
- _other_entry = create(:diary_entry, :user_id => users(:second_public_user).id)
+ friend = create(:friend, :befriender => users(:normal_user))
+ diary_entry = create(:diary_entry, :user => friend.befriendee)
+ _other_entry = create(:diary_entry, :user => users(:second_public_user))
# Try a list of diary entries for your friends when not logged in
get :list, :friends => true
end
def test_list_nearby
- diary_entry = create(:diary_entry, :user_id => users(:public_user).id)
+ diary_entry = create(:diary_entry, :user => users(:public_user))
# Try a list of diary entries for nearby users when not logged in
get :list, :nearby => true
end
def test_rss_user
- create(:diary_entry, :user_id => users(:normal_user).id)
- create(:diary_entry, :user_id => users(:normal_user).id)
- create(:diary_entry, :user_id => users(:public_user).id)
+ create(:diary_entry, :user => users(:normal_user))
+ create(:diary_entry, :user => users(:normal_user))
+ create(:diary_entry, :user => users(:public_user))
get :rss, :display_name => users(:normal_user).display_name, :format => :rss
assert_response :success, "Should be able to get a specific users diary RSS"
def test_view
# Try a normal entry that should work
- diary_entry = create(:diary_entry, :user_id => users(:normal_user).id)
+ diary_entry = create(:diary_entry, :user => users(:normal_user))
get :view, :display_name => users(:normal_user).display_name, :id => diary_entry.id
assert_response :success
assert_template :view
# Try a deleted entry
- diary_entry_deleted = create(:diary_entry, :user_id => users(:normal_user).id, :visible => false)
+ diary_entry_deleted = create(:diary_entry, :user => users(:normal_user), :visible => false)
get :view, :display_name => users(:normal_user).display_name, :id => diary_entry_deleted.id
assert_response :not_found
# Try an entry by a suspended user
- diary_entry_suspended = create(:diary_entry, :user_id => users(:suspended_user).id)
+ diary_entry_suspended = create(:diary_entry, :user => users(:suspended_user))
get :view, :display_name => users(:suspended_user).display_name, :id => diary_entry_suspended.id
assert_response :not_found
# Try an entry by a deleted user
- diary_entry_deleted = create(:diary_entry, :user_id => users(:deleted_user).id)
+ diary_entry_deleted = create(:diary_entry, :user => users(:deleted_user))
get :view, :display_name => users(:deleted_user).display_name, :id => diary_entry_deleted.id
assert_response :not_found
end
# Get a diary entry that has hidden comments
diary_entry = create(:diary_entry)
visible_comment = create(:diary_comment, :diary_entry => diary_entry)
- suspended_user_comment = create(:diary_comment, :diary_entry => diary_entry, :user_id => users(:suspended_user).id)
- deleted_user_comment = create(:diary_comment, :diary_entry => diary_entry, :user_id => users(:deleted_user).id)
+ suspended_user_comment = create(:diary_comment, :diary_entry => diary_entry, :user => users(:suspended_user))
+ deleted_user_comment = create(:diary_comment, :diary_entry => diary_entry, :user => users(:deleted_user))
hidden_comment = create(:diary_comment, :diary_entry => diary_entry, :visible => false)
get :view, :display_name => users(:normal_user).display_name, :id => diary_entry.id
end
def test_hidecomment
- diary_entry = create(:diary_entry, :user_id => users(:normal_user).id)
+ diary_entry = create(:diary_entry, :user => users(:normal_user))
diary_comment = create(:diary_comment, :diary_entry => diary_entry)
# Try without logging in
post :hidecomment, :display_name => users(:normal_user).display_name, :id => diary_entry.id, :comment => diary_comment.id
end
# Test a user with a comment
- create(:diary_comment, :user_id => users(:public_user).id)
+ create(:diary_comment, :user => users(:public_user))
get :comments, :display_name => users(:public_user).display_name
assert_response :success
end
def test_subscribe_success
- diary_entry = create(:diary_entry, :user_id => users(:normal_user).id)
+ diary_entry = create(:diary_entry, :user => users(:normal_user))
assert_difference "diary_entry.subscribers.count", 1 do
post :subscribe, { :id => diary_entry.id, :display_name => diary_entry.user.display_name }, { :user => users(:public_user).id }
end
def test_subscribe_fail
- diary_entry = create(:diary_entry, :user_id => users(:normal_user).id)
+ diary_entry = create(:diary_entry, :user => users(:normal_user))
# not signed in
assert_no_difference "diary_entry.subscribers.count" do
end
def test_unsubscribe_success
- diary_entry = create(:diary_entry, :user_id => users(:normal_user).id)
+ diary_entry = create(:diary_entry, :user => users(:normal_user))
post :subscribe, { :id => diary_entry.id, :display_name => diary_entry.user.display_name }, { :user => users(:public_user).id }
assert_difference "diary_entry.subscribers.count", -1 do
end
def test_unsubscribe_fail
- diary_entry = create(:diary_entry, :user_id => users(:normal_user).id)
+ diary_entry = create(:diary_entry, :user => users(:normal_user))
# not signed in
assert_no_difference "diary_entry.subscribers.count" do
# Ensure that emails are sent to users
note_with_comments_by_users = create(:note) do |note|
- create(:note_comment, :note => note, :author_id => users(:normal_user).id)
- create(:note_comment, :note => note, :author_id => users(:second_public_user).id)
+ create(:note_comment, :note => note, :author => users(:normal_user))
+ create(:note_comment, :note => note, :author => users(:second_public_user))
end
assert_difference "NoteComment.count", 1 do
assert_difference "ActionMailer::Base.deliveries.size", 2 do
def test_mine_success
create(:note) do |note|
- create(:note_comment, :note => note, :author_id => users(:normal_user).id)
+ create(:note_comment, :note => note, :author => users(:normal_user))
end
create(:note) do |note|
- create(:note_comment, :note => note, :author_id => users(:second_public_user).id)
+ create(:note_comment, :note => note, :author => users(:second_public_user))
end
create(:note, :status => "hidden") do |note|
- create(:note_comment, :note => note, :author_id => users(:second_public_user).id)
+ create(:note_comment, :note => note, :author => users(:second_public_user))
end
# Note that the table rows include a header row
require "test_helper"
class UserBlocksControllerTest < ActionController::TestCase
- fixtures :users, :user_roles, :user_blocks
+ fixtures :users, :user_roles
##
# test all routes which lead to this controller
##
# test the index action
def test_index
- # The list of blocks should load
+ active_block = create(:user_block)
+ expired_block = create(:user_block, :expired)
+ revoked_block = create(:user_block, :revoked)
+
get :index
assert_response :success
assert_select "table#block_list", :count => 1 do
assert_select "tr", 4
- assert_select "a[href='#{user_block_path(user_blocks(:active_block))}']", 1
- assert_select "a[href='#{user_block_path(user_blocks(:expired_block))}']", 1
- assert_select "a[href='#{user_block_path(user_blocks(:revoked_block))}']", 1
+ assert_select "a[href='#{user_block_path(active_block)}']", 1
+ assert_select "a[href='#{user_block_path(expired_block)}']", 1
+ assert_select "a[href='#{user_block_path(revoked_block)}']", 1
end
end
##
# test the show action
def test_show
+ active_block = create(:user_block, :needs_view)
+ expired_block = create(:user_block, :expired)
+ revoked_block = create(:user_block, :revoked)
+
# Viewing a block should fail when no ID is given
assert_raise ActionController::UrlGenerationError do
get :show
assert_select "p", "Sorry, the user block with ID 99999 could not be found."
# Viewing an expired block should work
- get :show, :id => user_blocks(:expired_block)
+ get :show, :id => expired_block.id
assert_response :success
# Viewing a revoked block should work
- get :show, :id => user_blocks(:revoked_block)
+ get :show, :id => revoked_block.id
assert_response :success
# Viewing an active block should work, but shouldn't mark it as seen
- get :show, :id => user_blocks(:active_block)
+ get :show, :id => active_block.id
assert_response :success
- assert_equal true, UserBlock.find(user_blocks(:active_block).id).needs_view
+ assert_equal true, UserBlock.find(active_block.id).needs_view
# Login as the blocked user
- session[:user] = users(:blocked_user).id
+ session[:user] = active_block.user.id
# Now viewing it should mark it as seen
- get :show, :id => user_blocks(:active_block)
+ get :show, :id => active_block.id
assert_response :success
- assert_equal false, UserBlock.find(user_blocks(:active_block).id).needs_view
+ assert_equal false, UserBlock.find(active_block.id).needs_view
end
##
##
# test the edit action
def test_edit
+ active_block = create(:user_block)
+
# Check that the block edit page requires us to login
- get :edit, :id => user_blocks(:active_block).id
- assert_redirected_to login_path(:referer => edit_user_block_path(:id => user_blocks(:active_block).id))
+ get :edit, :id => active_block.id
+ assert_redirected_to login_path(:referer => edit_user_block_path(:id => active_block.id))
# Login as a normal user
session[:user] = users(:public_user).id
# Check that normal users can't load the block edit page
- get :edit, :id => user_blocks(:active_block).id
+ get :edit, :id => active_block.id
assert_redirected_to user_blocks_path
assert_equal "You need to be a moderator to perform that action.", flash[:error]
session[:user] = users(:moderator_user).id
# Check that the block edit page loads for moderators
- get :edit, :id => user_blocks(:active_block).id
+ get :edit, :id => active_block.id
assert_response :success
- assert_select "form#edit_user_block_#{user_blocks(:active_block).id}", :count => 1 do
+ assert_select "form#edit_user_block_#{active_block.id}", :count => 1 do
assert_select "textarea#user_block_reason", :count => 1
assert_select "select#user_block_period", :count => 1
assert_select "input#user_block_needs_view[type='checkbox']", :count => 1
##
# test the update action
def test_update
+ active_block = create(:user_block, :creator => users(:moderator_user))
+
# Not logged in yet, so updating a block should fail
- put :update, :id => user_blocks(:active_block).id
+ put :update, :id => active_block.id
assert_response :forbidden
# Login as a normal user
session[:user] = users(:public_user).id
# Check that normal users can't update blocks
- put :update, :id => user_blocks(:active_block).id
+ put :update, :id => active_block.id
assert_response :forbidden
# Login as the wrong moderator
# Check that only the person who created a block can update it
assert_no_difference "UserBlock.count" do
put :update,
- :id => user_blocks(:active_block).id,
+ :id => active_block.id,
:user_block_period => "12",
:user_block => { :needs_view => true, :reason => "Vandalism" }
end
- assert_redirected_to edit_user_block_path(:id => user_blocks(:active_block).id)
+ assert_redirected_to edit_user_block_path(:id => active_block.id)
assert_equal "Only the moderator who created this block can edit it.", flash[:error]
# Login as the correct moderator
# A bogus block period should result in an error
assert_no_difference "UserBlock.count" do
put :update,
- :id => user_blocks(:active_block).id,
+ :id => active_block.id,
:user_block_period => "99"
end
- assert_redirected_to edit_user_block_path(:id => user_blocks(:active_block).id)
+ assert_redirected_to edit_user_block_path(:id => active_block.id)
assert_equal "The blocking period must be one of the values selectable in the drop-down list.", flash[:error]
# Check that updating a block works
assert_no_difference "UserBlock.count" do
put :update,
- :id => user_blocks(:active_block).id,
+ :id => active_block.id,
:user_block_period => "12",
:user_block => { :needs_view => true, :reason => "Vandalism" }
end
- assert_redirected_to user_block_path(:id => user_blocks(:active_block).id)
+ assert_redirected_to user_block_path(:id => active_block.id)
assert_equal "Block updated.", flash[:notice]
- b = UserBlock.find(user_blocks(:active_block).id)
+ b = UserBlock.find(active_block.id)
assert_in_delta Time.now, b.updated_at, 1
assert_equal true, b.needs_view
assert_equal "Vandalism", b.reason
##
# test the revoke action
def test_revoke
+ active_block = create(:user_block)
+
# Check that the block revoke page requires us to login
- get :revoke, :id => user_blocks(:active_block).id
- assert_redirected_to login_path(:referer => revoke_user_block_path(:id => user_blocks(:active_block).id))
+ get :revoke, :id => active_block.id
+ assert_redirected_to login_path(:referer => revoke_user_block_path(:id => active_block.id))
# Login as a normal user
session[:user] = users(:public_user).id
# Check that normal users can't load the block revoke page
- get :revoke, :id => user_blocks(:active_block).id
+ get :revoke, :id => active_block.id
assert_redirected_to user_blocks_path
assert_equal "You need to be a moderator to perform that action.", flash[:error]
session[:user] = users(:moderator_user).id
# Check that the block revoke page loads for moderators
- get :revoke, :id => user_blocks(:active_block).id
+ get :revoke, :id => active_block.id
assert_response :success
assert_template "revoke"
assert_select "form", :count => 1 do
end
# Check that revoking a block works
- post :revoke, :id => user_blocks(:active_block).id, :confirm => true
- assert_redirected_to user_block_path(:id => user_blocks(:active_block).id)
- b = UserBlock.find(user_blocks(:active_block).id)
+ post :revoke, :id => active_block.id, :confirm => true
+ assert_redirected_to user_block_path(:id => active_block.id)
+ b = UserBlock.find(active_block.id)
assert_in_delta Time.now, b.ends_at, 1
# We should get an error if no block ID is specified
##
# test the blocks_on action
def test_blocks_on
+ active_block = create(:user_block, :user => users(:blocked_user))
+ revoked_block = create(:user_block, :revoked, :user => users(:blocked_user))
+ expired_block = create(:user_block, :expired, :user => users(:unblocked_user))
+
# Asking for a list of blocks with no user name should fail
assert_raise ActionController::UrlGenerationError do
get :blocks_on
assert_response :success
assert_select "table#block_list", :count => 1 do
assert_select "tr", 3
- assert_select "a[href='#{user_block_path(user_blocks(:active_block))}']", 1
- assert_select "a[href='#{user_block_path(user_blocks(:revoked_block))}']", 1
+ assert_select "a[href='#{user_block_path(active_block)}']", 1
+ assert_select "a[href='#{user_block_path(revoked_block)}']", 1
end
# Check the list of blocks for a user that has previously been blocked
assert_response :success
assert_select "table#block_list", :count => 1 do
assert_select "tr", 2
- assert_select "a[href='#{user_block_path(user_blocks(:expired_block))}']", 1
+ assert_select "a[href='#{user_block_path(expired_block)}']", 1
end
end
##
# test the blocks_by action
def test_blocks_by
+ active_block = create(:user_block, :creator => users(:moderator_user))
+ expired_block = create(:user_block, :expired, :creator => users(:second_moderator_user))
+ revoked_block = create(:user_block, :revoked, :creator => users(:second_moderator_user))
+
# Asking for a list of blocks with no user name should fail
assert_raise ActionController::UrlGenerationError do
get :blocks_by
assert_response :success
assert_select "table#block_list", :count => 1 do
assert_select "tr", 2
- assert_select "a[href='#{user_block_path(user_blocks(:active_block))}']", 1
+ assert_select "a[href='#{user_block_path(active_block)}']", 1
end
# Check the list of blocks given by a different moderator
assert_response :success
assert_select "table#block_list", :count => 1 do
assert_select "tr", 3
- assert_select "a[href='#{user_block_path(user_blocks(:expired_block))}']", 1
- assert_select "a[href='#{user_block_path(user_blocks(:revoked_block))}']", 1
+ assert_select "a[href='#{user_block_path(expired_block)}']", 1
+ assert_select "a[href='#{user_block_path(revoked_block)}']", 1
end
# Check the list of blocks (not) given by a normal user
end
# Test a user who has been blocked
+ create(:user_block, :user => users(:blocked_user))
get :view, :display_name => "blocked"
assert_response :success
assert_select "div#userinformation" do
end
# Test a moderator who has applied blocks
+ create(:user_block, :creator => users(:moderator_user))
get :view, :display_name => "moderator"
assert_response :success
assert_select "div#userinformation" do
# Get users to work with
user = users(:normal_user)
friend = users(:public_user)
- create(:friend, :user_id => user.id, :friend_user_id => friend.id)
+ create(:friend, :befriender => user, :befriendee => friend)
# Check that the users are friends
assert Friend.where(:user_id => user.id, :friend_user_id => friend.id).first
--- /dev/null
+FactoryGirl.define do
+ factory :user_block do
+ sequence(:reason) { |n| "User Block #{n}" }
+ ends_at Time.now + 1.day
+
+ # FIXME: requires User factory
+ user_id 13
+
+ # FIXME: requires User factory
+ creator_id 15
+
+ trait :needs_view do
+ needs_view true
+ end
+
+ trait :expired do
+ ends_at Time.now - 1.day
+ end
+
+ trait :revoked do
+ # FIXME: requires User factory
+ revoker_id 5
+ end
+ end
+end
+++ /dev/null
-active_block:
- id: 1
- user_id: 13
- creator_id: 5
- reason: "Active block"
- reason_format: "markdown"
- ends_at: "2032-05-01 11:22:33"
- needs_view: true
- revoker_id:
-
-expired_block:
- id: 2
- user_id: 14
- creator_id: 15
- reason: "Expired block"
- reason_format: "markdown"
- ends_at: "2012-05-01 11:22:33"
- needs_view: false
- revoker_id:
-
-revoked_block:
- id: 3
- user_id: 13
- creator_id: 15
- reason: "Revoked block"
- reason_format: "markdown"
- ends_at: "2012-05-01 11:22:33"
- needs_view: false
- revoker_id: 1
require "test_helper"
class UserBlocksTest < ActionDispatch::IntegrationTest
- fixtures :users, :user_blocks, :user_roles
+ fixtures :users, :user_roles
def auth_header(user, pass)
{ "HTTP_AUTHORIZATION" => format("Basic %s", Base64.encode64("#{user}:#{pass}")) }
require "test_helper"
class UserLoginTest < ActionDispatch::IntegrationTest
- fixtures :users, :user_blocks
+ fixtures :users
def setup
OmniAuth.config.test_mode = true
def test_login_email_password_blocked
user = users(:blocked_user)
+ create(:user_block, :needs_view, :user => user)
try_password_login user.email, "test"
def test_login_email_password_blocked_upcase
user = users(:blocked_user)
+ create(:user_block, :needs_view, :user => user)
try_password_login user.email.upcase, "test"
def test_login_email_password_blocked_titlecase
user = users(:blocked_user)
+ create(:user_block, :needs_view, :user => user)
try_password_login user.email.titlecase, "test"
def test_login_username_password_blocked
user = users(:blocked_user)
+ create(:user_block, :needs_view, :user => user)
try_password_login user.display_name.upcase, "test"
def test_login_username_password_blocked_upcase
user = users(:blocked_user)
+ create(:user_block, :needs_view, :user => user)
try_password_login user.display_name, "test"
def test_login_username_password_blocked_titlecase
user = users(:blocked_user)
+ create(:user_block, :needs_view, :user => user)
try_password_login user.display_name.titlecase, "test"
require "test_helper"
class DiaryCommentTest < ActiveSupport::TestCase
+ fixtures :users, :languages
+
test "body must be present" do
comment = build(:diary_comment, :body => "")
assert_not comment.valid?
require "test_helper"
class DiaryEntryTest < ActiveSupport::TestCase
+ fixtures :users, :languages
+
def test_diary_entry_validations
diary_entry_valid({})
diary_entry_valid({ :title => "" }, false)
comment = create(:note_comment)
assert_nil comment.note.author
- comment = create(:note_comment, :author_id => users(:normal_user).id)
+ comment = create(:note_comment, :author => users(:normal_user))
assert_equal users(:normal_user), comment.note.author
end
end
def test_friend_with
- create(:friend, :user_id => users(:normal_user).id, :friend_user_id => users(:public_user).id)
+ create(:friend, :befriender => users(:normal_user), :befriendee => users(:public_user))
assert users(:normal_user).is_friends_with?(users(:public_user))
assert !users(:normal_user).is_friends_with?(users(:inactive_user))
assert !users(:public_user).is_friends_with?(users(:normal_user))
# it should be a one way friend associatation
norm = users(:normal_user)
sec = users(:public_user)
- create(:friend, :user_id => norm.id, :friend_user_id => sec.id)
+ create(:friend, :befriender => norm, :befriendee => sec)
assert_equal 1, Friend.count
assert_equal [sec], norm.friend_users
assert_equal 1, norm.friend_users.size
# Load standard fixtures needed to test API methods
def self.api_fixtures
# print "setting up the api_fixtures"
- fixtures :users, :user_roles, :user_blocks
+ fixtures :users, :user_roles
fixtures :changesets, :changeset_tags
fixtures :current_nodes, :nodes