test_auth_api.py 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613
  1. from django.core import mail
  2. from django.test import TestCase
  3. from ...conf.test import override_dynamic_settings
  4. from ..models import Ban
  5. from ..test import create_test_user
  6. from ..tokens import make_password_change_token
  7. class GatewayTests(TestCase):
  8. def test_api_invalid_credentials(self):
  9. """login api returns 400 on invalid POST"""
  10. response = self.client.post(
  11. "/api/auth/", data={"username": "nope", "password": "nope"}
  12. )
  13. self.assertEqual(response.status_code, 400)
  14. self.assertEqual(
  15. response.json(),
  16. {"code": "invalid_login", "detail": "Login or password is incorrect."},
  17. )
  18. response = self.client.get("/api/auth/")
  19. self.assertEqual(response.status_code, 200)
  20. user_json = response.json()
  21. self.assertIsNone(user_json["id"])
  22. def test_login(self):
  23. """api signs user in"""
  24. user = create_test_user("User", "user@example.com", "password")
  25. response = self.client.post(
  26. "/api/auth/", data={"username": "User", "password": "password"}
  27. )
  28. self.assertEqual(response.status_code, 200)
  29. response = self.client.get("/api/auth/")
  30. self.assertEqual(response.status_code, 200)
  31. user_json = response.json()
  32. self.assertEqual(user_json["id"], user.id)
  33. self.assertEqual(user_json["username"], user.username)
  34. def test_login_whitespaces_password(self):
  35. """api signs user in with password left untouched"""
  36. user = create_test_user("User", "user@example.com", " password ")
  37. response = self.client.post(
  38. "/api/auth/", data={"username": "User", "password": "password"}
  39. )
  40. self.assertEqual(response.status_code, 400)
  41. response = self.client.post(
  42. "/api/auth/", data={"username": "User", "password": " password "}
  43. )
  44. self.assertEqual(response.status_code, 200)
  45. response = self.client.get("/api/auth/")
  46. self.assertEqual(response.status_code, 200)
  47. user_json = response.json()
  48. self.assertEqual(user_json["id"], user.id)
  49. self.assertEqual(user_json["username"], user.username)
  50. def test_submit_empty(self):
  51. """login api errors for no body"""
  52. response = self.client.post("/api/auth/")
  53. self.assertEqual(response.status_code, 400)
  54. self.assertEqual(
  55. response.json(), {"code": "empty_data", "detail": "Fill out both fields."}
  56. )
  57. def test_submit_invalid(self):
  58. """login api errors for invalid data"""
  59. response = self.client.post(
  60. "/api/auth/", "false", content_type="application/json"
  61. )
  62. self.assertEqual(response.status_code, 400)
  63. self.assertEqual(
  64. response.json(),
  65. {
  66. "non_field_errors": [
  67. "Invalid data. Expected a dictionary, but got bool."
  68. ]
  69. },
  70. )
  71. def test_login_not_usable_password(self):
  72. """login api fails to sign user with not-usable password in"""
  73. create_test_user("User", "user@example.com")
  74. response = self.client.post(
  75. "/api/auth/", data={"username": "User", "password": "password"}
  76. )
  77. self.assertEqual(response.status_code, 400)
  78. self.assertEqual(
  79. response.json(),
  80. {"code": "invalid_login", "detail": "Login or password is incorrect."},
  81. )
  82. def test_login_banned(self):
  83. """login api fails to sign banned user in"""
  84. create_test_user("User", "user@example.com", "password")
  85. ban = Ban.objects.create(
  86. check_type=Ban.USERNAME,
  87. banned_value="user",
  88. user_message="You are tragically banned.",
  89. )
  90. response = self.client.post(
  91. "/api/auth/", data={"username": "User", "password": "password"}
  92. )
  93. self.assertEqual(response.status_code, 400)
  94. response_json = response.json()
  95. self.assertEqual(response_json["code"], "banned")
  96. self.assertEqual(response_json["detail"]["message"]["plain"], ban.user_message)
  97. self.assertEqual(
  98. response_json["detail"]["message"]["html"], "<p>%s</p>" % ban.user_message
  99. )
  100. response = self.client.get("/api/auth/")
  101. self.assertEqual(response.status_code, 200)
  102. user_json = response.json()
  103. self.assertIsNone(user_json["id"])
  104. def test_login_banned_staff(self):
  105. """login api signs banned staff member in"""
  106. user = create_test_user("User", "user@example.com", "password")
  107. user.is_staff = True
  108. user.save()
  109. Ban.objects.create(
  110. check_type=Ban.USERNAME,
  111. banned_value="user",
  112. user_message="You are tragically banned.",
  113. )
  114. response = self.client.post(
  115. "/api/auth/", data={"username": "User", "password": "password"}
  116. )
  117. self.assertEqual(response.status_code, 200)
  118. response = self.client.get("/api/auth/")
  119. self.assertEqual(response.status_code, 200)
  120. user_json = response.json()
  121. self.assertEqual(user_json["id"], user.id)
  122. self.assertEqual(user_json["username"], user.username)
  123. def test_login_ban_registration_only(self):
  124. """login api ignores registration-only bans"""
  125. user = create_test_user("User", "user@example.com", "password")
  126. Ban.objects.create(
  127. check_type=Ban.USERNAME, banned_value="user", registration_only=True
  128. )
  129. response = self.client.post(
  130. "/api/auth/", data={"username": "User", "password": "password"}
  131. )
  132. self.assertEqual(response.status_code, 200)
  133. response = self.client.get("/api/auth/")
  134. self.assertEqual(response.status_code, 200)
  135. user_json = response.json()
  136. self.assertEqual(user_json["id"], user.id)
  137. self.assertEqual(user_json["username"], user.username)
  138. def test_login_inactive_admin(self):
  139. """login api fails to sign admin-activated user in"""
  140. create_test_user("User", "user@example.com", "password", requires_activation=1)
  141. response = self.client.post(
  142. "/api/auth/", data={"username": "User", "password": "password"}
  143. )
  144. self.assertEqual(response.status_code, 400)
  145. response_json = response.json()
  146. self.assertEqual(response_json["code"], "inactive_user")
  147. response = self.client.get("/api/auth/")
  148. self.assertEqual(response.status_code, 200)
  149. user_json = response.json()
  150. self.assertIsNone(user_json["id"])
  151. def test_login_inactive_user(self):
  152. """login api fails to sign user-activated user in"""
  153. create_test_user("User", "user@example.com", "password", requires_activation=2)
  154. response = self.client.post(
  155. "/api/auth/", data={"username": "User", "password": "password"}
  156. )
  157. self.assertEqual(response.status_code, 400)
  158. response_json = response.json()
  159. self.assertEqual(response_json["code"], "inactive_admin")
  160. response = self.client.get("/api/auth/")
  161. self.assertEqual(response.status_code, 200)
  162. user_json = response.json()
  163. self.assertIsNone(user_json["id"])
  164. def test_login_disabled_user(self):
  165. """its impossible to sign in to disabled account"""
  166. user = create_test_user("User", "user@example.com", "password", is_active=False)
  167. user.is_staff = True
  168. user.save()
  169. response = self.client.post(
  170. "/api/auth/", data={"username": "User", "password": "password"}
  171. )
  172. self.assertEqual(response.status_code, 400)
  173. self.assertEqual(
  174. response.json(),
  175. {"code": "invalid_login", "detail": "Login or password is incorrect."},
  176. )
  177. response = self.client.get("/api/auth/")
  178. self.assertEqual(response.status_code, 200)
  179. user_json = response.json()
  180. self.assertIsNone(user_json["id"])
  181. @override_dynamic_settings(enable_sso=True)
  182. def test_login_api_is_disabled_when_sso_is_enabled(self):
  183. user = create_test_user("User", "user@example.com", "password")
  184. response = self.client.post(
  185. "/api/auth/", data={"username": "User", "password": "password"}
  186. )
  187. self.assertEqual(response.status_code, 403)
  188. class UserCredentialsTests(TestCase):
  189. def test_edge_returns_response(self):
  190. """api edge has no showstoppers"""
  191. response = self.client.get("/api/auth/criteria/")
  192. self.assertEqual(response.status_code, 200)
  193. class SendActivationApiTests(TestCase):
  194. def setUp(self):
  195. self.user = create_test_user("User", "user@example.com", "password")
  196. self.user.requires_activation = 1
  197. self.user.save()
  198. self.link = "/api/auth/send-activation/"
  199. def test_submit_valid(self):
  200. """request activation link api sends reset link mail"""
  201. response = self.client.post(self.link, data={"email": self.user.email})
  202. self.assertEqual(response.status_code, 200)
  203. self.assertIn("Activate User", mail.outbox[0].subject)
  204. def test_submit_banned(self):
  205. """request activation link api passes for banned users"""
  206. Ban.objects.create(
  207. check_type=Ban.USERNAME,
  208. banned_value=self.user.username,
  209. user_message="Nope!",
  210. )
  211. response = self.client.post(self.link, data={"email": self.user.email})
  212. self.assertEqual(response.status_code, 200)
  213. self.assertIn("Activate User", mail.outbox[0].subject)
  214. def test_submit_disabled(self):
  215. """request activation link api fails disabled users"""
  216. self.user.is_active = False
  217. self.user.save()
  218. response = self.client.post(self.link, data={"email": self.user.email})
  219. self.assertEqual(response.status_code, 400)
  220. self.assertEqual(
  221. response.json(),
  222. {"code": "not_found", "detail": "No user with this e-mail exists."},
  223. )
  224. self.assertTrue(not mail.outbox)
  225. def test_submit_empty(self):
  226. """request activation link api errors for no body"""
  227. response = self.client.post(self.link)
  228. self.assertEqual(response.status_code, 400)
  229. self.assertEqual(
  230. response.json(), {"code": "empty_email", "detail": "Enter e-mail address."}
  231. )
  232. self.assertTrue(not mail.outbox)
  233. def test_submit_invalid_data(self):
  234. """login api errors for invalid data"""
  235. response = self.client.post(self.link, "false", content_type="application/json")
  236. self.assertEqual(response.status_code, 400)
  237. self.assertEqual(
  238. response.json(),
  239. {
  240. "non_field_errors": [
  241. "Invalid data. Expected a dictionary, but got bool."
  242. ]
  243. },
  244. )
  245. def test_submit_invalid_email(self):
  246. """request activation link api errors for invalid email"""
  247. response = self.client.post(self.link, data={"email": "fake@mail.com"})
  248. self.assertEqual(response.status_code, 400)
  249. self.assertEqual(
  250. response.json(),
  251. {"code": "not_found", "detail": "No user with this e-mail exists."},
  252. )
  253. self.assertTrue(not mail.outbox)
  254. def test_submit_active_user(self):
  255. """request activation link api errors for active user"""
  256. self.user.requires_activation = 0
  257. self.user.save()
  258. response = self.client.post(self.link, data={"email": self.user.email})
  259. self.assertEqual(response.status_code, 400)
  260. self.assertEqual(
  261. response.json(),
  262. {
  263. "code": "already_active",
  264. "detail": "User, your account is already active.",
  265. },
  266. )
  267. def test_submit_inactive_user(self):
  268. """request activation link api errors for admin-activated users"""
  269. self.user.requires_activation = 2
  270. self.user.save()
  271. response = self.client.post(self.link, data={"email": self.user.email})
  272. self.assertEqual(response.status_code, 400)
  273. self.assertEqual(
  274. response.json(),
  275. {
  276. "code": "inactive_admin",
  277. "detail": "User, only administrator may activate your account.",
  278. },
  279. )
  280. self.assertTrue(not mail.outbox)
  281. # but succeed for user-activated
  282. self.user.requires_activation = 1
  283. self.user.save()
  284. response = self.client.post(self.link, data={"email": self.user.email})
  285. self.assertEqual(response.status_code, 200)
  286. self.assertTrue(mail.outbox)
  287. @override_dynamic_settings(enable_sso=True)
  288. def test_send_activation_api_is_disabled_when_sso_is_enabled(self):
  289. response = self.client.post(self.link, data={"email": self.user.email})
  290. self.assertEqual(response.status_code, 403)
  291. class SendPasswordFormApiTests(TestCase):
  292. def setUp(self):
  293. self.user = create_test_user("User", "user@example.com", "password")
  294. self.link = "/api/auth/send-password-form/"
  295. def test_submit_valid(self):
  296. """request change password form link api sends reset link mail"""
  297. response = self.client.post(self.link, data={"email": self.user.email})
  298. self.assertEqual(response.status_code, 200)
  299. self.assertIn("Change User password", mail.outbox[0].subject)
  300. def test_submit_banned(self):
  301. """request change password form link api sends reset link mail"""
  302. Ban.objects.create(
  303. check_type=Ban.USERNAME,
  304. banned_value=self.user.username,
  305. user_message="Nope!",
  306. )
  307. response = self.client.post(self.link, data={"email": self.user.email})
  308. self.assertEqual(response.status_code, 200)
  309. self.assertIn("Change User password", mail.outbox[0].subject)
  310. def test_submit_disabled(self):
  311. """request change password form api fails disabled users"""
  312. self.user.is_active = False
  313. self.user.save()
  314. response = self.client.post(self.link, data={"email": self.user.email})
  315. self.assertEqual(response.status_code, 400)
  316. self.assertEqual(
  317. response.json(),
  318. {"code": "not_found", "detail": "No user with this e-mail exists."},
  319. )
  320. self.assertTrue(not mail.outbox)
  321. def test_submit_empty(self):
  322. """request change password form link api errors for no body"""
  323. response = self.client.post(self.link)
  324. self.assertEqual(response.status_code, 400)
  325. self.assertEqual(
  326. response.json(), {"code": "empty_email", "detail": "Enter e-mail address."}
  327. )
  328. self.assertTrue(not mail.outbox)
  329. def test_submit_invalid(self):
  330. """request change password form link api errors for invalid email"""
  331. response = self.client.post(self.link, data={"email": "fake@mail.com"})
  332. self.assertEqual(response.status_code, 400)
  333. self.assertEqual(
  334. response.json(),
  335. {"code": "not_found", "detail": "No user with this e-mail exists."},
  336. )
  337. self.assertTrue(not mail.outbox)
  338. def test_submit_invalid_data(self):
  339. """login api errors for invalid data"""
  340. response = self.client.post(self.link, "false", content_type="application/json")
  341. self.assertEqual(response.status_code, 400)
  342. self.assertEqual(
  343. response.json(),
  344. {
  345. "non_field_errors": [
  346. "Invalid data. Expected a dictionary, but got bool."
  347. ]
  348. },
  349. )
  350. def test_submit_inactive_user(self):
  351. """request change password form link api errors for inactive users"""
  352. self.user.requires_activation = 1
  353. self.user.save()
  354. response = self.client.post(self.link, data={"email": self.user.email})
  355. self.assertEqual(response.status_code, 400)
  356. self.assertEqual(
  357. response.json(),
  358. {
  359. "code": "inactive_user",
  360. "detail": (
  361. "You have to activate your account before you "
  362. "will be able to request new password."
  363. ),
  364. },
  365. )
  366. self.user.requires_activation = 2
  367. self.user.save()
  368. response = self.client.post(self.link, data={"email": self.user.email})
  369. self.assertEqual(response.status_code, 400)
  370. self.assertEqual(
  371. response.json(),
  372. {
  373. "code": "inactive_admin",
  374. "detail": (
  375. "Administrator has to activate your account before you "
  376. "will be able to request new password."
  377. ),
  378. },
  379. )
  380. self.assertTrue(not mail.outbox)
  381. @override_dynamic_settings(enable_sso=True)
  382. def test_send_password_change_link_api_is_disabled_when_sso_is_enabled(self):
  383. response = self.client.post(self.link, data={"email": self.user.email})
  384. self.assertEqual(response.status_code, 403)
  385. class ChangePasswordApiTests(TestCase):
  386. def setUp(self):
  387. self.user = create_test_user("User", "user@example.com", "password")
  388. self.link = "/api/auth/change-password/%s/%s/"
  389. def test_submit_valid(self):
  390. """submit change password form api changes password"""
  391. response = self.client.post(
  392. self.link % (self.user.pk, make_password_change_token(self.user)),
  393. data={"password": "n3wp4ss!"},
  394. )
  395. self.assertEqual(response.status_code, 200)
  396. self.user.refresh_from_db()
  397. self.assertTrue(self.user.check_password("n3wp4ss!"))
  398. def test_submit_with_whitespaces(self):
  399. """submit change password form api changes password with whitespaces"""
  400. response = self.client.post(
  401. self.link % (self.user.pk, make_password_change_token(self.user)),
  402. data={"password": " n3wp4ss! "},
  403. )
  404. self.assertEqual(response.status_code, 200)
  405. self.user.refresh_from_db()
  406. self.assertTrue(self.user.check_password(" n3wp4ss! "))
  407. def test_submit_invalid_data(self):
  408. """login api errors for invalid data"""
  409. response = self.client.post(
  410. self.link % (self.user.pk, make_password_change_token(self.user)),
  411. "false",
  412. content_type="application/json",
  413. )
  414. self.assertEqual(response.status_code, 400)
  415. self.assertEqual(
  416. response.json(),
  417. {
  418. "non_field_errors": [
  419. "Invalid data. Expected a dictionary, but got bool."
  420. ]
  421. },
  422. )
  423. def test_invalid_token_link(self):
  424. """api errors on invalid user id link"""
  425. response = self.client.post(self.link % (self.user.pk, "asda7ad89sa7d9s789as"))
  426. self.assertEqual(response.status_code, 400)
  427. self.assertEqual(
  428. response.json(), {"detail": "Form link is invalid. Please try again."}
  429. )
  430. def test_banned_user_link(self):
  431. """request errors because user is banned"""
  432. Ban.objects.create(
  433. check_type=Ban.USERNAME,
  434. banned_value=self.user.username,
  435. user_message="Nope!",
  436. )
  437. response = self.client.post(
  438. self.link % (self.user.pk, make_password_change_token(self.user))
  439. )
  440. self.assertEqual(response.status_code, 400)
  441. self.assertEqual(
  442. response.json(),
  443. {"detail": "Your link has expired. Please request new one."},
  444. )
  445. def test_inactive_user(self):
  446. """change password api errors for inactive users"""
  447. self.user.requires_activation = 1
  448. self.user.save()
  449. response = self.client.post(
  450. self.link % (self.user.pk, make_password_change_token(self.user))
  451. )
  452. self.assertEqual(response.status_code, 400)
  453. self.assertEqual(
  454. response.json(),
  455. {"detail": "Your link has expired. Please request new one."},
  456. )
  457. self.user.requires_activation = 2
  458. self.user.save()
  459. response = self.client.post(
  460. self.link % (self.user.pk, make_password_change_token(self.user))
  461. )
  462. self.assertEqual(response.status_code, 400)
  463. self.assertEqual(
  464. response.json(),
  465. {"detail": "Your link has expired. Please request new one."},
  466. )
  467. def test_disabled_user(self):
  468. """change password api errors for disabled users"""
  469. self.user.is_active = False
  470. self.user.save()
  471. response = self.client.post(
  472. self.link % (self.user.pk, make_password_change_token(self.user))
  473. )
  474. self.assertEqual(response.status_code, 400)
  475. self.assertEqual(
  476. response.json(), {"detail": "Form link is invalid. Please try again."}
  477. )
  478. def test_submit_empty(self):
  479. """change password api errors for empty body"""
  480. response = self.client.post(
  481. self.link % (self.user.pk, make_password_change_token(self.user))
  482. )
  483. self.assertEqual(response.status_code, 400)
  484. self.assertEqual(
  485. response.json(),
  486. {
  487. "detail": (
  488. "This password is too short. It must contain at least 7 characters."
  489. )
  490. },
  491. )
  492. @override_dynamic_settings(enable_sso=True)
  493. def test_password_change_api_is_disabled_when_sso_is_enabled(self):
  494. response = self.client.post(self.link % (self.user.pk, "asda7ad89sa7d9s789as"))
  495. self.assertEqual(response.status_code, 403)