|
4 | 4 | from django.urls import reverse |
5 | 5 | from httmock import all_requests, HTTMock |
6 | 6 | from oauth2_provider.models import get_access_token_model |
| 7 | +from waffle.testutils import override_switch |
7 | 8 |
|
8 | 9 | from apps.test import BaseApiTest |
9 | 10 |
|
@@ -154,6 +155,67 @@ def catchall(url, req): |
154 | 155 | for r in response.json()['entry']: |
155 | 156 | self._assertHasC4BBIdentifier(r['resource'], C4BB_SYSTEM_TYPES['IDTYPE'], v2) |
156 | 157 |
|
| 158 | + @override_switch('bfd_v3_connectathon', active=True) |
| 159 | + def test_search_eob_by_parameter_tag(self): |
| 160 | + self._search_eob_by_parameter_tag(False) |
| 161 | + |
| 162 | + @override_switch('bfd_v3_connectathon', active=True) |
| 163 | + def test_search_eob_by_parameter_tag_v2(self): |
| 164 | + self._search_eob_by_parameter_tag(True) |
| 165 | + |
| 166 | + @override_switch('bfd_v3_connectathon', active=True) |
| 167 | + def _search_eob_by_parameter_tag(self, v2=False): |
| 168 | + # create the user |
| 169 | + first_access_token = self.create_token('John', 'Smith') |
| 170 | + ac = AccessToken.objects.get(token=first_access_token) |
| 171 | + ac.scope = 'patient/ExplanationOfBenefit.read' |
| 172 | + ac.save() |
| 173 | + ver = 'v1' if not v2 else 'v2' |
| 174 | + |
| 175 | + @all_requests |
| 176 | + def catchall_w_tag_qparam(url, req): |
| 177 | + # this is called in case EOB search with good tag |
| 178 | + self.assertIn("https://fhir.backend.bluebutton.hhsdevcloud.us/{}/fhir/ExplanationOfBenefit/".format(ver), req.url) |
| 179 | + self.assertIn("_format=application%2Fjson%2Bfhir", req.url) |
| 180 | + # parameters encoded in prepared request's body |
| 181 | + self.assertTrue(("_tag=Adjudicated" in req.body) or ("_tag=PartiallyAdjudicated" in req.body)) |
| 182 | + |
| 183 | + return { |
| 184 | + 'status_code': 200, |
| 185 | + 'content': get_response_json("eob_search_pt_{}".format(ver)), |
| 186 | + } |
| 187 | + |
| 188 | + @all_requests |
| 189 | + def catchall(url, req): |
| 190 | + self.assertIn("https://fhir.backend.bluebutton.hhsdevcloud.us/{}/fhir/ExplanationOfBenefit/".format(ver), req.url) |
| 191 | + self.assertIn("_format=application%2Fjson%2Bfhir", req.url) |
| 192 | + |
| 193 | + return { |
| 194 | + 'status_code': 200, |
| 195 | + 'content': get_response_json("eob_search_pt_{}".format(ver)), |
| 196 | + } |
| 197 | + # Test _tag with valid parameter value e.g. Adjudicated, PartiallyAdjudicated |
| 198 | + with HTTMock(catchall_w_tag_qparam): |
| 199 | + response = self.client.get( |
| 200 | + reverse('bb_oauth_fhir_eob_search' if not v2 else 'bb_oauth_fhir_eob_search_v2'), |
| 201 | + {'_tag': 'Adjudicated'}, |
| 202 | + Authorization="Bearer %s" % (first_access_token)) |
| 203 | + # just check for 200 is sufficient |
| 204 | + self.assertEqual(response.status_code, 200) |
| 205 | + |
| 206 | + # Test _tag with invalid parameter value e.g.: Adjudiacted-Typo |
| 207 | + with HTTMock(catchall): |
| 208 | + response = self.client.get( |
| 209 | + reverse('bb_oauth_fhir_eob_search' if not v2 else 'bb_oauth_fhir_eob_search_v2'), |
| 210 | + {'_tag': 'Adjudiacted-Typo'}, |
| 211 | + Authorization="Bearer %s" % (first_access_token)) |
| 212 | + |
| 213 | + content = json.loads(response.content.decode("utf-8")) |
| 214 | + self.assertTrue(content['detail'].startswith("Invalid _tag value (")) |
| 215 | + self.assertTrue(content['detail'].endswith("'PartiallyAdjudicated' or 'Adjudicated' expected.")) |
| 216 | + self.assertTrue('Adjudiacted-Typo' in content['detail']) |
| 217 | + self.assertEqual(response.status_code, 400) |
| 218 | + |
157 | 219 | def test_search_eob_by_parameters_request(self): |
158 | 220 | self._search_eob_by_parameters_request(False) |
159 | 221 |
|
|
0 commit comments