test_social_pipeline.py 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793
  1. import json
  2. from django.contrib.auth import get_user_model
  3. from django.core import mail
  4. from django.test import RequestFactory, override_settings
  5. from social_core.backends.github import GithubOAuth2
  6. from social_django.utils import load_strategy
  7. from misago.core.exceptions import SocialAuthFailed, SocialAuthBanned
  8. from misago.legal.models import Agreement
  9. from misago.users.constants import BANS_CACHE
  10. from misago.users.models import AnonymousUser, Ban, BanCache
  11. from misago.users.social.pipeline import (
  12. associate_by_email, create_user, create_user_with_form, get_username, require_activation,
  13. validate_ip_not_banned, validate_user_not_banned
  14. )
  15. from misago.users.testutils import UserTestCase
  16. UserModel = get_user_model()
  17. def create_request(user_ip='0.0.0.0', data=None):
  18. factory = RequestFactory()
  19. if data is None:
  20. request = factory.get('/')
  21. else:
  22. request = factory.post('/', data=json.dumps(data), content_type='application/json')
  23. request.include_frontend_context = True
  24. request.cache_versions = {BANS_CACHE: "abcdefgh"}
  25. request.frontend_context = {}
  26. request.session = {}
  27. request.user = AnonymousUser()
  28. request.user_ip = user_ip
  29. return request
  30. class MockStrategy(object):
  31. def __init__(self, user_ip='0.0.0.0'):
  32. self.cleaned_partial_token = None
  33. self.request = create_request(user_ip)
  34. def clean_partial_pipeline(self, token):
  35. self.cleaned_partial_token = token
  36. class PipelineTestCase(UserTestCase):
  37. def get_initial_user(self):
  38. self.user = self.get_authenticated_user()
  39. def assertNewUserIsCorrect(
  40. self, new_user, form_data=None, activation=None, email_verified=False):
  41. self.assertFalse(new_user.has_usable_password())
  42. self.assertIn('Welcome', mail.outbox[0].subject)
  43. if form_data:
  44. self.assertEqual(new_user.email, form_data['email'])
  45. self.assertEqual(new_user.username, form_data['username'])
  46. if activation == 'none':
  47. self.assertEqual(new_user.requires_activation, UserModel.ACTIVATION_NONE)
  48. if activation == 'user':
  49. if email_verified:
  50. self.assertEqual(new_user.requires_activation, UserModel.ACTIVATION_NONE)
  51. else:
  52. self.assertEqual(new_user.requires_activation, UserModel.ACTIVATION_USER)
  53. if activation == 'admin':
  54. self.assertEqual(new_user.requires_activation, UserModel.ACTIVATION_ADMIN)
  55. self.assertEqual(new_user.audittrail_set.count(), 1)
  56. def assertJsonResponseEquals(self, response, value):
  57. response_content = response.content.decode("utf-8")
  58. response_json = json.loads(response_content)
  59. self.assertEqual(response_json, value)
  60. class AssociateByEmailTests(PipelineTestCase):
  61. def test_skip_if_user_is_already_set(self):
  62. """pipeline step is skipped if user was found by previous step"""
  63. result = associate_by_email(None, {}, GithubOAuth2, self.user)
  64. self.assertIsNone(result)
  65. def test_skip_if_no_email_passed(self):
  66. """pipeline step is skipped if no email was passed"""
  67. result = associate_by_email(None, {}, GithubOAuth2)
  68. self.assertIsNone(result)
  69. def test_skip_if_user_with_email_not_found(self):
  70. """pipeline step is skipped if no email was passed"""
  71. result = associate_by_email(None, {'email': 'not@found.com'}, GithubOAuth2)
  72. self.assertIsNone(result)
  73. def test_raise_if_user_is_inactive(self):
  74. """pipeline raises if user was inactive"""
  75. self.user.is_active = False
  76. self.user.save()
  77. try:
  78. associate_by_email(None, {'email': self.user.email}, GithubOAuth2)
  79. self.fail("associate_by_email should raise SocialAuthFailed")
  80. except SocialAuthFailed as e:
  81. self.assertEqual(
  82. e.message,
  83. (
  84. "The e-mail address associated with your GitHub account is not available for "
  85. "use on this site."
  86. ),
  87. )
  88. def test_raise_if_user_needs_admin_activation(self):
  89. """pipeline raises if user needs admin activation"""
  90. self.user.requires_activation = UserModel.ACTIVATION_ADMIN
  91. self.user.save()
  92. try:
  93. associate_by_email(None, {'email': self.user.email}, GithubOAuth2)
  94. self.fail("associate_by_email should raise SocialAuthFailed")
  95. except SocialAuthFailed as e:
  96. self.assertEqual(
  97. e.message,
  98. (
  99. "Your account has to be activated by site administrator before you will be "
  100. "able to sign in with GitHub."
  101. ),
  102. )
  103. def test_return_user(self):
  104. """pipeline returns user if email was found"""
  105. result = associate_by_email(None, {'email': self.user.email}, GithubOAuth2)
  106. self.assertEqual(result, {'user': self.user, 'is_new': False})
  107. def test_return_user_email_inactive(self):
  108. """pipeline returns user even if they didn't activate their account manually"""
  109. self.user.requires_activation = UserModel.ACTIVATION_USER
  110. self.user.save()
  111. result = associate_by_email(None, {'email': self.user.email}, GithubOAuth2)
  112. self.assertEqual(result, {'user': self.user, 'is_new': False})
  113. class CreateUser(PipelineTestCase):
  114. def test_skip_if_user_is_set(self):
  115. """pipeline step is skipped if user was passed"""
  116. result = create_user(MockStrategy(), {}, GithubOAuth2(), user=self.user)
  117. self.assertIsNone(result)
  118. def test_skip_if_no_email_passed(self):
  119. """pipeline step is skipped if no email was passed"""
  120. result = create_user(
  121. MockStrategy(),
  122. {},
  123. GithubOAuth2(),
  124. clean_username='TestBob',
  125. )
  126. self.assertIsNone(result)
  127. def test_skip_if_no_clean_username_passed(self):
  128. """pipeline step is skipped if cleaned username wasnt passed"""
  129. result = create_user(
  130. MockStrategy(),
  131. {'email': 'hello@example.com'},
  132. GithubOAuth2(),
  133. )
  134. self.assertIsNone(result)
  135. def test_skip_if_email_is_taken(self):
  136. """pipeline step is skipped if email was taken"""
  137. result = create_user(
  138. MockStrategy(),
  139. {'email': self.user.email},
  140. GithubOAuth2(),
  141. clean_username='NewUser',
  142. )
  143. self.assertIsNone(result)
  144. @override_settings(account_activation='none')
  145. def test_user_created_no_activation(self):
  146. """pipeline step creates active user for valid data and disabled activation"""
  147. result = create_user(
  148. MockStrategy(),
  149. {'email': 'new@example.com'},
  150. GithubOAuth2(),
  151. clean_username='NewUser',
  152. )
  153. new_user = UserModel.objects.get(email='new@example.com')
  154. self.assertEqual(result, {
  155. 'user': new_user,
  156. 'is_new': True,
  157. })
  158. self.assertEqual(new_user.username, 'NewUser')
  159. self.assertNewUserIsCorrect(new_user, email_verified=True, activation='none')
  160. @override_settings(account_activation='user')
  161. def test_user_created_activation_by_user(self):
  162. """pipeline step creates active user for valid data and user activation"""
  163. result = create_user(
  164. MockStrategy(),
  165. {'email': 'new@example.com'},
  166. GithubOAuth2(),
  167. clean_username='NewUser',
  168. )
  169. new_user = UserModel.objects.get(email='new@example.com')
  170. self.assertEqual(result, {
  171. 'user': new_user,
  172. 'is_new': True,
  173. })
  174. self.assertEqual(new_user.username, 'NewUser')
  175. self.assertNewUserIsCorrect(new_user, email_verified=True, activation='user')
  176. @override_settings(account_activation='admin')
  177. def test_user_created_activation_by_admin(self):
  178. """pipeline step creates in user for valid data and admin activation"""
  179. result = create_user(
  180. MockStrategy(),
  181. {'email': 'new@example.com'},
  182. GithubOAuth2(),
  183. clean_username='NewUser',
  184. )
  185. new_user = UserModel.objects.get(email='new@example.com')
  186. self.assertEqual(result, {
  187. 'user': new_user,
  188. 'is_new': True,
  189. })
  190. self.assertEqual(new_user.username, 'NewUser')
  191. self.assertNewUserIsCorrect(new_user, email_verified=True, activation='admin')
  192. class CreateUserWithFormTests(PipelineTestCase):
  193. def setUp(self):
  194. super().setUp()
  195. Agreement.objects.invalidate_cache()
  196. def tearDown(self):
  197. super().tearDown()
  198. Agreement.objects.invalidate_cache()
  199. def test_skip_if_user_is_set(self):
  200. """pipeline step is skipped if user was passed"""
  201. request = create_request()
  202. strategy = load_strategy(request=request)
  203. backend = GithubOAuth2(strategy, '/')
  204. result = create_user_with_form(
  205. strategy=strategy,
  206. details={},
  207. backend=backend,
  208. user=self.user,
  209. pipeline_index=1,
  210. )
  211. self.assertEqual(result, {})
  212. def test_renders_form_if_not_post(self):
  213. """pipeline step renders form if not POST"""
  214. request = create_request()
  215. strategy = load_strategy(request=request)
  216. backend = GithubOAuth2(strategy, '/')
  217. response = create_user_with_form(
  218. strategy=strategy,
  219. details={},
  220. backend=backend,
  221. user=None,
  222. pipeline_index=1,
  223. )
  224. self.assertContains(response, "GitHub")
  225. def test_empty_data_rejected(self):
  226. """form rejects empty data"""
  227. request = create_request(data={})
  228. strategy = load_strategy(request=request)
  229. backend = GithubOAuth2(strategy, '/')
  230. response = create_user_with_form(
  231. strategy=strategy,
  232. details={},
  233. backend=backend,
  234. user=None,
  235. pipeline_index=1,
  236. )
  237. self.assertEqual(response.status_code, 400)
  238. self.assertJsonResponseEquals(response, {
  239. 'email': ["This field is required."],
  240. 'username': ["This field is required."],
  241. })
  242. def test_taken_data_rejected(self):
  243. """form rejects taken data"""
  244. request = create_request(data={
  245. 'email': self.user.email,
  246. 'username': self.user.username,
  247. })
  248. strategy = load_strategy(request=request)
  249. backend = GithubOAuth2(strategy, '/')
  250. response = create_user_with_form(
  251. strategy=strategy,
  252. details={},
  253. backend=backend,
  254. user=None,
  255. pipeline_index=1,
  256. )
  257. self.assertEqual(response.status_code, 400)
  258. self.assertJsonResponseEquals(response, {
  259. 'email': ["This e-mail address is not available."],
  260. 'username': ["This username is not available."],
  261. })
  262. @override_settings(account_activation='none')
  263. def test_user_created_no_activation_verified_email(self):
  264. """active user is created for verified email and activation disabled"""
  265. form_data = {
  266. 'email': 'social@auth.com',
  267. 'username': 'SocialUser',
  268. }
  269. request = create_request(data=form_data)
  270. strategy = load_strategy(request=request)
  271. backend = GithubOAuth2(strategy, '/')
  272. result = create_user_with_form(
  273. strategy=strategy,
  274. details={'email': form_data['email']},
  275. backend=backend,
  276. user=None,
  277. pipeline_index=1,
  278. )
  279. new_user = UserModel.objects.get(email='social@auth.com')
  280. self.assertEqual(result, {'user': new_user, 'is_new': True})
  281. self.assertNewUserIsCorrect(new_user, form_data, activation='none', email_verified=True)
  282. @override_settings(account_activation='none')
  283. def test_user_created_no_activation_nonverified_email(self):
  284. """active user is created for non-verified email and activation disabled"""
  285. form_data = {
  286. 'email': 'social@auth.com',
  287. 'username': 'SocialUser',
  288. }
  289. request = create_request(data=form_data)
  290. strategy = load_strategy(request=request)
  291. backend = GithubOAuth2(strategy, '/')
  292. result = create_user_with_form(
  293. strategy=strategy,
  294. details={'email': ''},
  295. backend=backend,
  296. user=None,
  297. pipeline_index=1,
  298. )
  299. new_user = UserModel.objects.get(email='social@auth.com')
  300. self.assertEqual(result, {'user': new_user, 'is_new': True})
  301. self.assertNewUserIsCorrect(new_user, form_data, activation='none', email_verified=False)
  302. @override_settings(account_activation='user')
  303. def test_user_created_activation_by_user_verified_email(self):
  304. """active user is created for verified email and activation by user"""
  305. form_data = {
  306. 'email': 'social@auth.com',
  307. 'username': 'SocialUser',
  308. }
  309. request = create_request(data=form_data)
  310. strategy = load_strategy(request=request)
  311. backend = GithubOAuth2(strategy, '/')
  312. result = create_user_with_form(
  313. strategy=strategy,
  314. details={'email': form_data['email']},
  315. backend=backend,
  316. user=None,
  317. pipeline_index=1,
  318. )
  319. new_user = UserModel.objects.get(email='social@auth.com')
  320. self.assertEqual(result, {'user': new_user, 'is_new': True})
  321. self.assertNewUserIsCorrect(new_user, form_data, activation='user', email_verified=True)
  322. @override_settings(account_activation='user')
  323. def test_user_created_activation_by_user_nonverified_email(self):
  324. """inactive user is created for non-verified email and activation by user"""
  325. form_data = {
  326. 'email': 'social@auth.com',
  327. 'username': 'SocialUser',
  328. }
  329. request = create_request(data=form_data)
  330. strategy = load_strategy(request=request)
  331. backend = GithubOAuth2(strategy, '/')
  332. result = create_user_with_form(
  333. strategy=strategy,
  334. details={'email': ''},
  335. backend=backend,
  336. user=None,
  337. pipeline_index=1,
  338. )
  339. new_user = UserModel.objects.get(email='social@auth.com')
  340. self.assertEqual(result, {'user': new_user, 'is_new': True})
  341. self.assertNewUserIsCorrect(new_user, form_data, activation='user', email_verified=False)
  342. @override_settings(account_activation='admin')
  343. def test_user_created_activation_by_admin_verified_email(self):
  344. """inactive user is created for verified email and activation by admin"""
  345. form_data = {
  346. 'email': 'social@auth.com',
  347. 'username': 'SocialUser',
  348. }
  349. request = create_request(data=form_data)
  350. strategy = load_strategy(request=request)
  351. backend = GithubOAuth2(strategy, '/')
  352. result = create_user_with_form(
  353. strategy=strategy,
  354. details={'email': form_data['email']},
  355. backend=backend,
  356. user=None,
  357. pipeline_index=1,
  358. )
  359. new_user = UserModel.objects.get(email='social@auth.com')
  360. self.assertEqual(result, {'user': new_user, 'is_new': True})
  361. self.assertNewUserIsCorrect(new_user, form_data, activation='admin', email_verified=True)
  362. @override_settings(account_activation='admin')
  363. def test_user_created_activation_by_admin_nonverified_email(self):
  364. """inactive user is created for non-verified email and activation by admin"""
  365. form_data = {
  366. 'email': 'social@auth.com',
  367. 'username': 'SocialUser',
  368. }
  369. request = create_request(data=form_data)
  370. strategy = load_strategy(request=request)
  371. backend = GithubOAuth2(strategy, '/')
  372. result = create_user_with_form(
  373. strategy=strategy,
  374. details={'email': ''},
  375. backend=backend,
  376. user=None,
  377. pipeline_index=1,
  378. )
  379. new_user = UserModel.objects.get(email='social@auth.com')
  380. self.assertEqual(result, {'user': new_user, 'is_new': True})
  381. self.assertNewUserIsCorrect(new_user, form_data, activation='admin', email_verified=False)
  382. def test_form_check_agreement(self):
  383. """social register checks agreement"""
  384. form_data = {
  385. 'email': 'social@auth.com',
  386. 'username': 'SocialUser',
  387. }
  388. request = create_request(data=form_data)
  389. strategy = load_strategy(request=request)
  390. backend = GithubOAuth2(strategy, '/')
  391. agreement = Agreement.objects.create(
  392. type=Agreement.TYPE_TOS,
  393. text="Lorem ipsum",
  394. is_active=True,
  395. )
  396. response = create_user_with_form(
  397. strategy=strategy,
  398. details={'email': form_data['email']},
  399. backend=backend,
  400. user=None,
  401. pipeline_index=1,
  402. )
  403. self.assertEqual(response.status_code, 400)
  404. self.assertJsonResponseEquals(response, {
  405. 'terms_of_service': ['This agreement is required.'],
  406. })
  407. # invalid agreement id
  408. form_data = {
  409. 'email': 'social@auth.com',
  410. 'username': 'SocialUser',
  411. 'terms_of_service': agreement.id + 1,
  412. }
  413. request = create_request(data=form_data)
  414. strategy = load_strategy(request=request)
  415. backend = GithubOAuth2(strategy, '/')
  416. response = create_user_with_form(
  417. strategy=strategy,
  418. details={'email': form_data['email']},
  419. backend=backend,
  420. user=None,
  421. pipeline_index=1,
  422. )
  423. self.assertEqual(response.status_code, 400)
  424. self.assertJsonResponseEquals(response, {
  425. 'terms_of_service': ['This agreement is required.'],
  426. })
  427. # valid agreement id
  428. form_data = {
  429. 'email': 'social@auth.com',
  430. 'username': 'SocialUser',
  431. 'terms_of_service': agreement.id,
  432. }
  433. request = create_request(data=form_data)
  434. strategy = load_strategy(request=request)
  435. backend = GithubOAuth2(strategy, '/')
  436. result = create_user_with_form(
  437. strategy=strategy,
  438. details={'email': form_data['email']},
  439. backend=backend,
  440. user=None,
  441. pipeline_index=1,
  442. )
  443. new_user = UserModel.objects.get(email='social@auth.com')
  444. self.assertEqual(result, {'user': new_user, 'is_new': True})
  445. self.assertEqual(new_user.agreements, [agreement.id])
  446. self.assertEqual(new_user.useragreement_set.count(), 1)
  447. def test_form_ignore_inactive_agreement(self):
  448. """social register ignores inactive agreement"""
  449. form_data = {
  450. 'email': 'social@auth.com',
  451. 'username': 'SocialUser',
  452. 'terms_of_service': None,
  453. }
  454. request = create_request(data=form_data)
  455. strategy = load_strategy(request=request)
  456. backend = GithubOAuth2(strategy, '/')
  457. Agreement.objects.create(
  458. type=Agreement.TYPE_TOS,
  459. text="Lorem ipsum",
  460. is_active=False,
  461. )
  462. result = create_user_with_form(
  463. strategy=strategy,
  464. details={'email': form_data['email']},
  465. backend=backend,
  466. user=None,
  467. pipeline_index=1,
  468. )
  469. new_user = UserModel.objects.get(email='social@auth.com')
  470. self.assertEqual(result, {'user': new_user, 'is_new': True})
  471. self.assertEqual(new_user.agreements, [])
  472. self.assertEqual(new_user.useragreement_set.count(), 0)
  473. class GetUsernameTests(PipelineTestCase):
  474. def test_skip_if_user_is_set(self):
  475. """pipeline step is skipped if user was passed"""
  476. result = get_username(None, {}, None, user=self.user)
  477. self.assertIsNone(result)
  478. def test_skip_if_no_names(self):
  479. """pipeline step is skipped if API returned no names"""
  480. result = get_username(None, {}, None)
  481. self.assertIsNone(result)
  482. def test_resolve_to_username(self):
  483. """pipeline step resolves username"""
  484. result = get_username(None, {'username': 'BobBoberson'}, None)
  485. self.assertEqual(result, {'clean_username': 'BobBoberson'})
  486. def test_normalize_username(self):
  487. """pipeline step normalizes username"""
  488. result = get_username(None, {'username': 'Błop Błoperson'}, None)
  489. self.assertEqual(result, {'clean_username': 'BlopBloperson'})
  490. def test_resolve_to_first_name(self):
  491. """pipeline attempts to use first name because username is taken"""
  492. details = {
  493. 'username': self.user.username,
  494. 'first_name': 'Błob',
  495. }
  496. result = get_username(None, details, None)
  497. self.assertEqual(result, {'clean_username': 'Blob'})
  498. def test_dont_resolve_to_last_name(self):
  499. """pipeline will not fallback to last name because username is taken"""
  500. details = {
  501. 'username': self.user.username,
  502. 'last_name': 'Błob',
  503. }
  504. result = get_username(None, details, None)
  505. self.assertIsNone(result)
  506. def test_resolve_to_first_last_name_first_char(self):
  507. """pipeline will construct username from first name and first char of surname"""
  508. details = {
  509. 'first_name': self.user.username,
  510. 'last_name': 'Błob',
  511. }
  512. result = get_username(None, details, None)
  513. self.assertEqual(result, {'clean_username': self.user.username + 'B'})
  514. def test_dont_resolve_to_banned_name(self):
  515. """pipeline will not resolve to banned name"""
  516. Ban.objects.create(banned_value='*Admin*', check_type=Ban.USERNAME)
  517. details = {
  518. 'username': 'Misago Admin',
  519. 'first_name': 'Błob',
  520. }
  521. result = get_username(None, details, None)
  522. self.assertEqual(result, {'clean_username': 'Blob'})
  523. def test_resolve_full_name(self):
  524. """pipeline will resolve to full name"""
  525. Ban.objects.create(banned_value='*Admin*', check_type=Ban.USERNAME)
  526. details = {
  527. 'username': 'Misago Admin',
  528. 'full_name': 'Błob Błopo',
  529. }
  530. result = get_username(None, details, None)
  531. self.assertEqual(result, {'clean_username': 'BlobBlopo'})
  532. def test_resolve_to_cut_name(self):
  533. """pipeline will resolve cut too long name on second pass"""
  534. details = {
  535. 'username': 'Abrakadabrapokuskonstantynopolitańczykowianeczkatrzy',
  536. }
  537. result = get_username(None, details, None)
  538. self.assertEqual(result, {'clean_username': 'Abrakadabrapok'})
  539. class RequireActivationTests(PipelineTestCase):
  540. def setUp(self):
  541. super().setUp()
  542. self.user.requires_activation = UserModel.ACTIVATION_ADMIN
  543. self.user.save()
  544. def test_skip_if_user_not_set(self):
  545. """pipeline step is skipped if user is not set"""
  546. request = create_request()
  547. strategy = load_strategy(request=request)
  548. backend = GithubOAuth2(strategy, '/')
  549. result = require_activation(
  550. strategy=strategy,
  551. details={},
  552. backend=backend,
  553. user=None,
  554. pipeline_index=1,
  555. )
  556. self.assertEqual(result, {})
  557. def test_partial_token_if_user_not_set_no_showstopper(self):
  558. """pipeline step handles set session token if user is not set"""
  559. request = create_request()
  560. strategy = load_strategy(request=request)
  561. strategy.request.session['partial_pipeline_token'] = 'test-token'
  562. backend = GithubOAuth2(strategy, '/')
  563. require_activation(
  564. strategy=strategy,
  565. details={},
  566. backend=backend,
  567. user=None,
  568. pipeline_index=1,
  569. )
  570. def test_skip_if_user_is_active(self):
  571. """pipeline step is skipped if user is active"""
  572. self.user.requires_activation = UserModel.ACTIVATION_NONE
  573. self.user.save()
  574. self.assertFalse(self.user.requires_activation)
  575. request = create_request()
  576. strategy = load_strategy(request=request)
  577. backend = GithubOAuth2(strategy, '/')
  578. result = require_activation(
  579. strategy=strategy,
  580. details={},
  581. backend=backend,
  582. user=self.user,
  583. pipeline_index=1,
  584. )
  585. self.assertEqual(result, {})
  586. def test_pipeline_returns_html_responseon_get(self):
  587. """pipeline step renders http response for GET request and inactive user"""
  588. request = create_request()
  589. strategy = load_strategy(request=request)
  590. backend = GithubOAuth2(strategy, '/')
  591. response = require_activation(
  592. strategy=strategy,
  593. details={},
  594. backend=backend,
  595. user=self.user,
  596. pipeline_index=1,
  597. )
  598. self.assertEqual(response.status_code, 200)
  599. self.assertEqual(response['content-type'], 'text/html; charset=utf-8')
  600. def test_pipeline_returns_json_response_on_post(self):
  601. """pipeline step renders json response for POST request and inactive user"""
  602. request = create_request(data={'username': 'anything'})
  603. strategy = load_strategy(request=request)
  604. backend = GithubOAuth2(strategy, '/')
  605. response = require_activation(
  606. strategy=strategy,
  607. details={},
  608. backend=backend,
  609. user=self.user,
  610. pipeline_index=1,
  611. )
  612. self.assertEqual(response.status_code, 200)
  613. self.assertEqual(response['content-type'], 'application/json')
  614. self.assertJsonResponseEquals(response, {
  615. 'step': 'done',
  616. 'backend_name': 'GitHub',
  617. 'activation': 'admin',
  618. 'email': 'test@user.com',
  619. 'username': 'TestUser',
  620. })
  621. class ValidateIpNotBannedTests(PipelineTestCase):
  622. def test_skip_if_user_not_set(self):
  623. """pipeline step is skipped if no user was passed"""
  624. result = validate_ip_not_banned(None, {}, GithubOAuth2)
  625. self.assertIsNone(result)
  626. def test_raise_if_banned(self):
  627. """pipeline raises if user's IP is banned"""
  628. Ban.objects.create(banned_value='188.*', check_type=Ban.IP)
  629. try:
  630. validate_ip_not_banned(MockStrategy(user_ip='188.1.2.3'), {}, GithubOAuth2, self.user)
  631. self.fail("validate_ip_not_banned should raise SocialAuthBanned")
  632. except SocialAuthBanned as e:
  633. self.assertTrue(isinstance(e.ban, Ban))
  634. def test_exclude_staff(self):
  635. """pipeline excludes staff from bans"""
  636. self.user.is_staff = True
  637. self.user.save()
  638. Ban.objects.create(banned_value='188.*', check_type=Ban.IP)
  639. result = validate_ip_not_banned(
  640. MockStrategy(user_ip='188.1.2.3'), {}, GithubOAuth2, self.user)
  641. self.assertIsNone(result)
  642. class ValidateUserNotBannedTests(PipelineTestCase):
  643. def test_skip_if_user_not_set(self):
  644. """pipeline step is skipped if no user was passed"""
  645. result = validate_user_not_banned(None, {}, GithubOAuth2)
  646. self.assertIsNone(result)
  647. def test_raise_if_banned(self):
  648. """pipeline raises if user's IP is banned"""
  649. Ban.objects.create(banned_value=self.user.username, check_type=Ban.USERNAME)
  650. try:
  651. validate_user_not_banned(MockStrategy(), {}, GithubOAuth2, self.user)
  652. self.fail("validate_ip_not_banned should raise SocialAuthBanned")
  653. except SocialAuthBanned as e:
  654. self.assertEqual(e.ban.user, self.user)
  655. self.assertTrue(isinstance(e.ban, BanCache))
  656. def test_exclude_staff(self):
  657. """pipeline excludes staff from bans"""
  658. self.user.is_staff = True
  659. self.user.save()
  660. Ban.objects.create(banned_value=self.user.username, check_type=Ban.USERNAME)
  661. result = validate_user_not_banned(MockStrategy(), {}, GithubOAuth2, self.user)
  662. self.assertIsNone(result)