@@ -272,9 +272,8 @@ def test_device_checksum_requested_signal_is_emitted(self):
272272
273273 def test_device_checksum_bad_uuid (self ):
274274 d = self ._create_device_config ()
275- pk = "{}-wrong" .format (d .pk )
276- valid = reverse ("controller:device_checksum" , args = [pk ])
277- bad = valid + "junk/"
275+ valid = reverse ("controller:device_checksum" , args = [d .pk ])
276+ bad = valid .replace (str (d .pk ), f"{ d .pk } -wrong" )
278277 resp = self .client .get (bad , {"key" : d .key })
279278 self .assertEqual (resp .status_code , 404 )
280279
@@ -338,9 +337,9 @@ def test_deactivated_device_download_config(self):
338337
339338 def test_device_download_config_bad_uuid (self ):
340339 d = self ._create_device_config ()
341- pk = "{}-wrong" . format ( d .pk )
342- bad_path = f"/controller/device/download-config/ { pk } /"
343- response = self .client .get (bad_path , {"key" : d .key })
340+ valid = reverse ( "controller:device_download_config" , args = [ d .pk ] )
341+ bad = valid . replace ( str ( d . pk ), f" { d . pk } -wrong" )
342+ response = self .client .get (bad , {"key" : d .key })
344343 self .assertEqual (response .status_code , 404 )
345344
346345 def test_vpn_checksum_requested_signal_is_emitted (self ):
@@ -397,9 +396,9 @@ def test_vpn_checksum(self):
397396
398397 def test_vpn_checksum_bad_uuid (self ):
399398 v = self ._create_vpn ()
400- pk = "{}-wrong" . format ( v .pk )
401- bad_path = f"/controller/vpn/checksum/ { pk } /"
402- response = self .client .get (bad_path , {"key" : v .key })
399+ valid = reverse ( "controller:vpn_checksum" , args = [ v .pk ] )
400+ bad = valid . replace ( str ( v . pk ), f" { v . pk } -wrong" )
401+ response = self .client .get (bad , {"key" : v .key })
403402 self .assertEqual (response .status_code , 404 )
404403
405404 @capture_any_output ()
@@ -513,9 +512,9 @@ def test_vpn_download_config(self):
513512
514513 def test_vpn_download_config_bad_uuid (self ):
515514 v = self ._create_vpn ()
516- pk = "{}-wrong" . format ( v .pk )
517- bad_path = f"/controller/vpn/download-config/ { pk } /"
518- response = self .client .get (bad_path , {"key" : v .key })
515+ valid_url = reverse ( "controller:vpn_download_config" , args = [ v .pk ] )
516+ bad_url = valid_url . replace ( str ( v . pk ), f" { v . pk } -wrong" )
517+ response = self .client .get (bad_url , {"key" : v .key })
519518 self .assertEqual (response .status_code , 404 )
520519
521520 @capture_any_output ()
@@ -970,9 +969,9 @@ def test_deactivated_device_report_status(self):
970969
971970 def test_device_report_status_bad_uuid (self ):
972971 d = self ._create_device_config ()
973- pk = "{}-wrong" . format ( d .pk )
974- bad_path = f"/controller/device/report-status/ { pk } /"
975- response = self .client .post (bad_path , {"key" : d .key })
972+ valid_url = reverse ( "controller:device_report_status" , args = [ d .pk ] )
973+ bad_url = valid_url . replace ( str ( d . pk ), f" { d . pk } -wrong" )
974+ response = self .client .post (bad_url , {"key" : d .key })
976975 self .assertEqual (response .status_code , 404 )
977976
978977 @capture_any_output ()
@@ -1080,15 +1079,15 @@ def test_deactivated_device_update_info(self):
10801079
10811080 def test_device_update_info_bad_uuid (self ):
10821081 d = self ._create_device_config ()
1083- pk = "{}-wrong" .format (d .pk )
10841082 params = {
10851083 "key" : d .key ,
10861084 "model" : "TP-Link TL-WDR4300 v2" ,
10871085 "os" : "OpenWrt 18.06-SNAPSHOT r7312-e60be11330" ,
10881086 "system" : "Atheros AR9344 rev 3" ,
10891087 }
1090- bad_path = f"/controller/device/update-info/{ pk } /"
1091- response = self .client .post (bad_path , params )
1088+ valid_url = reverse ("controller:device_update_info" , args = [d .pk ])
1089+ bad_url = valid_url .replace (str (d .pk ), f"{ d .pk } -wrong" )
1090+ response = self .client .post (bad_url , params )
10921091 self .assertEqual (response .status_code , 404 )
10931092
10941093 def test_device_update_info_400 (self ):
0 commit comments