test_auth_api.py 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649
  1. from django.core import mail
  2. from django.test import TestCase
  3. from django.urls import reverse
  4. from ...conf.test import override_dynamic_settings
  5. from ..models import Ban
  6. from ..test import create_test_user
  7. from ..tokens import make_password_change_token
  8. class GatewayTests(TestCase):
  9. def test_api_invalid_credentials(self):
  10. """login api returns 400 on invalid POST"""
  11. response = self.client.post(
  12. "/api/auth/", data={"username": "nope", "password": "nope"}
  13. )
  14. self.assertEqual(response.status_code, 400)
  15. self.assertEqual(
  16. response.json(),
  17. {"code": "invalid_login", "detail": "Login or password is incorrect."},
  18. )
  19. response = self.client.get("/api/auth/")
  20. self.assertEqual(response.status_code, 200)
  21. user_json = response.json()
  22. self.assertIsNone(user_json["id"])
  23. def test_login(self):
  24. """api signs user in"""
  25. user = create_test_user("User", "user@example.com", "password")
  26. response = self.client.post(
  27. "/api/auth/", data={"username": "User", "password": "password"}
  28. )
  29. self.assertEqual(response.status_code, 200)
  30. response = self.client.get("/api/auth/")
  31. self.assertEqual(response.status_code, 200)
  32. user_json = response.json()
  33. self.assertEqual(user_json["id"], user.id)
  34. self.assertEqual(user_json["username"], user.username)
  35. def test_login_whitespaces_password(self):
  36. """api signs user in with password left untouched"""
  37. user = create_test_user("User", "user@example.com", " password ")
  38. response = self.client.post(
  39. "/api/auth/", data={"username": "User", "password": "password"}
  40. )
  41. self.assertEqual(response.status_code, 400)
  42. response = self.client.post(
  43. "/api/auth/", data={"username": "User", "password": " password "}
  44. )
  45. self.assertEqual(response.status_code, 200)
  46. response = self.client.get("/api/auth/")
  47. self.assertEqual(response.status_code, 200)
  48. user_json = response.json()
  49. self.assertEqual(user_json["id"], user.id)
  50. self.assertEqual(user_json["username"], user.username)
  51. def test_submit_empty(self):
  52. """login api errors for no body"""
  53. response = self.client.post("/api/auth/")
  54. self.assertEqual(response.status_code, 400)
  55. self.assertEqual(
  56. response.json(), {"code": "empty_data", "detail": "Fill out both fields."}
  57. )
  58. def test_submit_invalid(self):
  59. """login api errors for invalid data"""
  60. response = self.client.post(
  61. "/api/auth/", "false", content_type="application/json"
  62. )
  63. self.assertEqual(response.status_code, 400)
  64. self.assertEqual(
  65. response.json(),
  66. {
  67. "non_field_errors": [
  68. "Invalid data. Expected a dictionary, but got bool."
  69. ]
  70. },
  71. )
  72. def test_login_not_usable_password(self):
  73. """login api fails to sign user with not-usable password in"""
  74. create_test_user("User", "user@example.com")
  75. response = self.client.post(
  76. "/api/auth/", data={"username": "User", "password": "password"}
  77. )
  78. self.assertEqual(response.status_code, 400)
  79. self.assertEqual(
  80. response.json(),
  81. {"code": "invalid_login", "detail": "Login or password is incorrect."},
  82. )
  83. def test_login_banned(self):
  84. """login api fails to sign banned user in"""
  85. create_test_user("User", "user@example.com", "password")
  86. ban = Ban.objects.create(
  87. check_type=Ban.USERNAME,
  88. banned_value="user",
  89. user_message="You are tragically banned.",
  90. )
  91. response = self.client.post(
  92. "/api/auth/", data={"username": "User", "password": "password"}
  93. )
  94. self.assertEqual(response.status_code, 400)
  95. response_json = response.json()
  96. self.assertEqual(response_json["code"], "banned")
  97. self.assertEqual(response_json["detail"]["message"]["plain"], ban.user_message)
  98. self.assertEqual(
  99. response_json["detail"]["message"]["html"], "<p>%s</p>" % ban.user_message
  100. )
  101. response = self.client.get("/api/auth/")
  102. self.assertEqual(response.status_code, 200)
  103. user_json = response.json()
  104. self.assertIsNone(user_json["id"])
  105. def test_login_banned_staff(self):
  106. """login api signs banned staff member in"""
  107. user = create_test_user("User", "user@example.com", "password")
  108. user.is_staff = True
  109. user.save()
  110. Ban.objects.create(
  111. check_type=Ban.USERNAME,
  112. banned_value="user",
  113. user_message="You are tragically banned.",
  114. )
  115. response = self.client.post(
  116. "/api/auth/", data={"username": "User", "password": "password"}
  117. )
  118. self.assertEqual(response.status_code, 200)
  119. response = self.client.get("/api/auth/")
  120. self.assertEqual(response.status_code, 200)
  121. user_json = response.json()
  122. self.assertEqual(user_json["id"], user.id)
  123. self.assertEqual(user_json["username"], user.username)
  124. def test_login_ban_registration_only(self):
  125. """login api ignores registration-only bans"""
  126. user = create_test_user("User", "user@example.com", "password")
  127. Ban.objects.create(
  128. check_type=Ban.USERNAME, banned_value="user", registration_only=True
  129. )
  130. response = self.client.post(
  131. "/api/auth/", data={"username": "User", "password": "password"}
  132. )
  133. self.assertEqual(response.status_code, 200)
  134. response = self.client.get("/api/auth/")
  135. self.assertEqual(response.status_code, 200)
  136. user_json = response.json()
  137. self.assertEqual(user_json["id"], user.id)
  138. self.assertEqual(user_json["username"], user.username)
  139. def test_login_inactive_admin(self):
  140. """login api fails to sign admin-activated user in"""
  141. create_test_user("User", "user@example.com", "password", requires_activation=1)
  142. response = self.client.post(
  143. "/api/auth/", data={"username": "User", "password": "password"}
  144. )
  145. self.assertEqual(response.status_code, 400)
  146. response_json = response.json()
  147. self.assertEqual(response_json["code"], "inactive_user")
  148. response = self.client.get("/api/auth/")
  149. self.assertEqual(response.status_code, 200)
  150. user_json = response.json()
  151. self.assertIsNone(user_json["id"])
  152. def test_login_inactive_user(self):
  153. """login api fails to sign user-activated user in"""
  154. create_test_user("User", "user@example.com", "password", requires_activation=2)
  155. response = self.client.post(
  156. "/api/auth/", data={"username": "User", "password": "password"}
  157. )
  158. self.assertEqual(response.status_code, 400)
  159. response_json = response.json()
  160. self.assertEqual(response_json["code"], "inactive_admin")
  161. response = self.client.get("/api/auth/")
  162. self.assertEqual(response.status_code, 200)
  163. user_json = response.json()
  164. self.assertIsNone(user_json["id"])
  165. def test_login_disabled_user(self):
  166. """its impossible to sign in to disabled account"""
  167. user = create_test_user("User", "user@example.com", "password", is_active=False)
  168. user.is_staff = True
  169. user.save()
  170. response = self.client.post(
  171. "/api/auth/", data={"username": "User", "password": "password"}
  172. )
  173. self.assertEqual(response.status_code, 400)
  174. self.assertEqual(
  175. response.json(),
  176. {"code": "invalid_login", "detail": "Login or password is incorrect."},
  177. )
  178. response = self.client.get("/api/auth/")
  179. self.assertEqual(response.status_code, 200)
  180. user_json = response.json()
  181. self.assertIsNone(user_json["id"])
  182. @override_dynamic_settings(
  183. enable_oauth2_client=True,
  184. oauth2_provider="Lorem",
  185. )
  186. def test_login_api_returns_403_if_oauth_is_enabled(user, user_password, client):
  187. response = client.post(
  188. reverse("misago:api:auth"),
  189. {"username": user.username, "password": user_password},
  190. )
  191. assert response.status_code == 403
  192. @override_dynamic_settings(
  193. enable_oauth2_client=True,
  194. oauth2_provider="Lorem",
  195. )
  196. def test_auth_api_returns_user_if_oauth_is_enabled(user_client):
  197. response = user_client.get(reverse("misago:api:auth"))
  198. assert response.status_code == 200
  199. class UserCredentialsTests(TestCase):
  200. def test_edge_returns_response(self):
  201. """api edge has no showstoppers"""
  202. response = self.client.get("/api/auth/criteria/")
  203. self.assertEqual(response.status_code, 200)
  204. class SendActivationApiTests(TestCase):
  205. def setUp(self):
  206. self.user = create_test_user("User", "user@example.com", "password")
  207. self.user.requires_activation = 1
  208. self.user.save()
  209. self.link = "/api/auth/send-activation/"
  210. def test_submit_valid(self):
  211. """request activation link api sends reset link mail"""
  212. response = self.client.post(self.link, data={"email": self.user.email})
  213. self.assertEqual(response.status_code, 200)
  214. self.assertIn("Activate User", mail.outbox[0].subject)
  215. def test_submit_banned(self):
  216. """request activation link api passes for banned users"""
  217. Ban.objects.create(
  218. check_type=Ban.USERNAME,
  219. banned_value=self.user.username,
  220. user_message="Nope!",
  221. )
  222. response = self.client.post(self.link, data={"email": self.user.email})
  223. self.assertEqual(response.status_code, 200)
  224. self.assertIn("Activate User", mail.outbox[0].subject)
  225. def test_submit_disabled(self):
  226. """request activation link api fails disabled users"""
  227. self.user.is_active = False
  228. self.user.save()
  229. response = self.client.post(self.link, data={"email": self.user.email})
  230. self.assertEqual(response.status_code, 400)
  231. self.assertEqual(
  232. response.json(),
  233. {"code": "not_found", "detail": "No user with this e-mail exists."},
  234. )
  235. self.assertTrue(not mail.outbox)
  236. def test_submit_empty(self):
  237. """request activation link api errors for no body"""
  238. response = self.client.post(self.link)
  239. self.assertEqual(response.status_code, 400)
  240. self.assertEqual(
  241. response.json(), {"code": "empty_email", "detail": "Enter e-mail address."}
  242. )
  243. self.assertTrue(not mail.outbox)
  244. def test_submit_invalid_data(self):
  245. """login api errors for invalid data"""
  246. response = self.client.post(self.link, "false", content_type="application/json")
  247. self.assertEqual(response.status_code, 400)
  248. self.assertEqual(
  249. response.json(),
  250. {
  251. "non_field_errors": [
  252. "Invalid data. Expected a dictionary, but got bool."
  253. ]
  254. },
  255. )
  256. def test_submit_invalid_email(self):
  257. """request activation link api errors for invalid email"""
  258. response = self.client.post(self.link, data={"email": "fake@mail.com"})
  259. self.assertEqual(response.status_code, 400)
  260. self.assertEqual(
  261. response.json(),
  262. {"code": "not_found", "detail": "No user with this e-mail exists."},
  263. )
  264. self.assertTrue(not mail.outbox)
  265. def test_submit_active_user(self):
  266. """request activation link api errors for active user"""
  267. self.user.requires_activation = 0
  268. self.user.save()
  269. response = self.client.post(self.link, data={"email": self.user.email})
  270. self.assertEqual(response.status_code, 400)
  271. self.assertEqual(
  272. response.json(),
  273. {
  274. "code": "already_active",
  275. "detail": "User, your account is already active.",
  276. },
  277. )
  278. def test_submit_inactive_user(self):
  279. """request activation link api errors for admin-activated users"""
  280. self.user.requires_activation = 2
  281. self.user.save()
  282. response = self.client.post(self.link, data={"email": self.user.email})
  283. self.assertEqual(response.status_code, 400)
  284. self.assertEqual(
  285. response.json(),
  286. {
  287. "code": "inactive_admin",
  288. "detail": "User, only administrator may activate your account.",
  289. },
  290. )
  291. self.assertTrue(not mail.outbox)
  292. # but succeed for user-activated
  293. self.user.requires_activation = 1
  294. self.user.save()
  295. response = self.client.post(self.link, data={"email": self.user.email})
  296. self.assertEqual(response.status_code, 200)
  297. self.assertTrue(mail.outbox)
  298. @override_dynamic_settings(
  299. enable_oauth2_client=True,
  300. oauth2_provider="Lorem",
  301. )
  302. def test_send_activation_api_returns_403_if_oauth_is_enabled(user, client):
  303. response = client.post(
  304. reverse("misago:api:send-activation"),
  305. {"email": user.email},
  306. )
  307. assert response.status_code == 403
  308. class SendPasswordFormApiTests(TestCase):
  309. def setUp(self):
  310. self.user = create_test_user("User", "user@example.com", "password")
  311. self.link = "/api/auth/send-password-form/"
  312. def test_submit_valid(self):
  313. """request change password form link api sends reset link mail"""
  314. response = self.client.post(self.link, data={"email": self.user.email})
  315. self.assertEqual(response.status_code, 200)
  316. self.assertIn("Change User password", mail.outbox[0].subject)
  317. def test_submit_banned(self):
  318. """request change password form link api sends reset link mail"""
  319. Ban.objects.create(
  320. check_type=Ban.USERNAME,
  321. banned_value=self.user.username,
  322. user_message="Nope!",
  323. )
  324. response = self.client.post(self.link, data={"email": self.user.email})
  325. self.assertEqual(response.status_code, 200)
  326. self.assertIn("Change User password", mail.outbox[0].subject)
  327. def test_submit_disabled(self):
  328. """request change password form api fails disabled users"""
  329. self.user.is_active = False
  330. self.user.save()
  331. response = self.client.post(self.link, data={"email": self.user.email})
  332. self.assertEqual(response.status_code, 400)
  333. self.assertEqual(
  334. response.json(),
  335. {"code": "not_found", "detail": "No user with this e-mail exists."},
  336. )
  337. self.assertTrue(not mail.outbox)
  338. def test_submit_empty(self):
  339. """request change password form link api errors for no body"""
  340. response = self.client.post(self.link)
  341. self.assertEqual(response.status_code, 400)
  342. self.assertEqual(
  343. response.json(), {"code": "empty_email", "detail": "Enter e-mail address."}
  344. )
  345. self.assertTrue(not mail.outbox)
  346. def test_submit_invalid(self):
  347. """request change password form link api errors for invalid email"""
  348. response = self.client.post(self.link, data={"email": "fake@mail.com"})
  349. self.assertEqual(response.status_code, 400)
  350. self.assertEqual(
  351. response.json(),
  352. {"code": "not_found", "detail": "No user with this e-mail exists."},
  353. )
  354. self.assertTrue(not mail.outbox)
  355. def test_submit_invalid_data(self):
  356. """login api errors for invalid data"""
  357. response = self.client.post(self.link, "false", content_type="application/json")
  358. self.assertEqual(response.status_code, 400)
  359. self.assertEqual(
  360. response.json(),
  361. {
  362. "non_field_errors": [
  363. "Invalid data. Expected a dictionary, but got bool."
  364. ]
  365. },
  366. )
  367. def test_submit_inactive_user(self):
  368. """request change password form link api errors for inactive users"""
  369. self.user.requires_activation = 1
  370. self.user.save()
  371. response = self.client.post(self.link, data={"email": self.user.email})
  372. self.assertEqual(response.status_code, 400)
  373. self.assertEqual(
  374. response.json(),
  375. {
  376. "code": "inactive_user",
  377. "detail": (
  378. "You have to activate your account before you "
  379. "will be able to request new password."
  380. ),
  381. },
  382. )
  383. self.user.requires_activation = 2
  384. self.user.save()
  385. response = self.client.post(self.link, data={"email": self.user.email})
  386. self.assertEqual(response.status_code, 400)
  387. self.assertEqual(
  388. response.json(),
  389. {
  390. "code": "inactive_admin",
  391. "detail": (
  392. "Administrator has to activate your account before you "
  393. "will be able to request new password."
  394. ),
  395. },
  396. )
  397. self.assertTrue(not mail.outbox)
  398. @override_dynamic_settings(
  399. enable_oauth2_client=True,
  400. oauth2_provider="Lorem",
  401. )
  402. def test_send_password_reset_api_returns_403_if_oauth_is_enabled(user, client):
  403. response = client.post(
  404. reverse("misago:api:send-password-form"),
  405. {"email": user.email},
  406. )
  407. assert response.status_code == 403
  408. class ChangePasswordApiTests(TestCase):
  409. def setUp(self):
  410. self.user = create_test_user("User", "user@example.com", "password")
  411. self.link = "/api/auth/change-password/%s/%s/"
  412. def test_submit_valid(self):
  413. """submit change password form api changes password"""
  414. response = self.client.post(
  415. self.link % (self.user.pk, make_password_change_token(self.user)),
  416. data={"password": "n3wp4ss!"},
  417. )
  418. self.assertEqual(response.status_code, 200)
  419. self.user.refresh_from_db()
  420. self.assertTrue(self.user.check_password("n3wp4ss!"))
  421. def test_submit_with_whitespaces(self):
  422. """submit change password form api changes password with whitespaces"""
  423. response = self.client.post(
  424. self.link % (self.user.pk, make_password_change_token(self.user)),
  425. data={"password": " n3wp4ss! "},
  426. )
  427. self.assertEqual(response.status_code, 200)
  428. self.user.refresh_from_db()
  429. self.assertTrue(self.user.check_password(" n3wp4ss! "))
  430. def test_submit_invalid_data(self):
  431. """login api errors for invalid data"""
  432. response = self.client.post(
  433. self.link % (self.user.pk, make_password_change_token(self.user)),
  434. "false",
  435. content_type="application/json",
  436. )
  437. self.assertEqual(response.status_code, 400)
  438. self.assertEqual(
  439. response.json(),
  440. {
  441. "non_field_errors": [
  442. "Invalid data. Expected a dictionary, but got bool."
  443. ]
  444. },
  445. )
  446. def test_invalid_token_link(self):
  447. """api errors on invalid user id link"""
  448. response = self.client.post(self.link % (self.user.pk, "asda7ad89sa7d9s789as"))
  449. self.assertEqual(response.status_code, 400)
  450. self.assertEqual(
  451. response.json(), {"detail": "Form link is invalid. Please try again."}
  452. )
  453. def test_banned_user_link(self):
  454. """request errors because user is banned"""
  455. Ban.objects.create(
  456. check_type=Ban.USERNAME,
  457. banned_value=self.user.username,
  458. user_message="Nope!",
  459. )
  460. response = self.client.post(
  461. self.link % (self.user.pk, make_password_change_token(self.user))
  462. )
  463. self.assertEqual(response.status_code, 400)
  464. self.assertEqual(
  465. response.json(),
  466. {"detail": "Your link has expired. Please request new one."},
  467. )
  468. def test_inactive_user(self):
  469. """change password api errors for inactive users"""
  470. self.user.requires_activation = 1
  471. self.user.save()
  472. response = self.client.post(
  473. self.link % (self.user.pk, make_password_change_token(self.user))
  474. )
  475. self.assertEqual(response.status_code, 400)
  476. self.assertEqual(
  477. response.json(),
  478. {"detail": "Your link has expired. Please request new one."},
  479. )
  480. self.user.requires_activation = 2
  481. self.user.save()
  482. response = self.client.post(
  483. self.link % (self.user.pk, make_password_change_token(self.user))
  484. )
  485. self.assertEqual(response.status_code, 400)
  486. self.assertEqual(
  487. response.json(),
  488. {"detail": "Your link has expired. Please request new one."},
  489. )
  490. def test_disabled_user(self):
  491. """change password api errors for disabled users"""
  492. self.user.is_active = False
  493. self.user.save()
  494. response = self.client.post(
  495. self.link % (self.user.pk, make_password_change_token(self.user))
  496. )
  497. self.assertEqual(response.status_code, 400)
  498. self.assertEqual(
  499. response.json(), {"detail": "Form link is invalid. Please try again."}
  500. )
  501. def test_submit_empty(self):
  502. """change password api errors for empty body"""
  503. response = self.client.post(
  504. self.link % (self.user.pk, make_password_change_token(self.user))
  505. )
  506. self.assertEqual(response.status_code, 400)
  507. self.assertEqual(
  508. response.json(),
  509. {
  510. "detail": (
  511. "This password is too short. It must contain at least 7 characters."
  512. )
  513. },
  514. )
  515. @override_dynamic_settings(
  516. enable_oauth2_client=True,
  517. oauth2_provider="Lorem",
  518. )
  519. def test_reset_password_api_returns_403_if_oauth_is_enabled(user, client):
  520. token = make_password_change_token(user)
  521. response = client.post(
  522. reverse("misago:api:change-forgotten-password", args=[user.pk, token]),
  523. {"password": "n33wP4SSW00ird!!"},
  524. )
  525. assert response.status_code == 403