613 lines
21 KiB
Python
613 lines
21 KiB
Python
import pytest
|
|
from django.core import mail
|
|
from django.urls import reverse
|
|
from rest_framework import status
|
|
from rest_framework.test import APIClient
|
|
|
|
from openslides.core.config import config
|
|
from openslides.users.models import Group, PersonalNote, User
|
|
from openslides.users.serializers import UserFullSerializer
|
|
from openslides.utils.autoupdate import inform_changed_data
|
|
from openslides.utils.test import TestCase
|
|
|
|
from ..helpers import count_queries
|
|
|
|
|
|
@pytest.mark.django_db(transaction=False)
|
|
def test_user_db_queries():
|
|
"""
|
|
Tests that only the following db queries are done:
|
|
* 2 requests to get the list of all users and
|
|
* 1 requests to get the list of all groups.
|
|
"""
|
|
for index in range(10):
|
|
User.objects.create(username=f"user{index}")
|
|
|
|
assert count_queries(User.get_elements) == 3
|
|
|
|
|
|
@pytest.mark.django_db(transaction=False)
|
|
def test_group_db_queries():
|
|
"""
|
|
Tests that only the following db queries are done:
|
|
* 1 request to get the list of all groups.
|
|
* 1 request to get the permissions
|
|
"""
|
|
for index in range(10):
|
|
Group.objects.create(name=f"group{index}")
|
|
|
|
assert count_queries(Group.get_elements) == 2
|
|
|
|
|
|
class UserGetTest(TestCase):
|
|
"""
|
|
Tests to receive a users via REST API.
|
|
"""
|
|
|
|
def test_get_with_user_who_is_in_group_with_pk_1(self):
|
|
"""
|
|
It is invalid, that a user is in the group with the pk 1. But if the
|
|
database is invalid, the user should nevertheless be received.
|
|
"""
|
|
admin = User.objects.get(username="admin")
|
|
group1 = Group.objects.get(pk=1)
|
|
admin.groups.add(group1)
|
|
self.client.login(username="admin", password="admin")
|
|
|
|
response = self.client.get("/rest/users/user/1/")
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
def test_get_with_user_without_permissions(self):
|
|
group = Group.objects.get(pk=1)
|
|
permission_string = "users.can_see_name"
|
|
app_label, codename = permission_string.split(".")
|
|
permission = group.permissions.get(
|
|
content_type__app_label=app_label, codename=codename
|
|
)
|
|
group.permissions.remove(permission)
|
|
inform_changed_data(group)
|
|
config["general_system_enable_anonymous"] = True
|
|
guest_client = APIClient()
|
|
|
|
response = guest_client.get("/rest/users/user/1/")
|
|
|
|
self.assertEqual(response.status_code, 404)
|
|
|
|
|
|
class UserCreate(TestCase):
|
|
"""
|
|
Tests creation of users via REST API.
|
|
"""
|
|
|
|
def test_simple_creation(self):
|
|
self.client.login(username="admin", password="admin")
|
|
|
|
response = self.client.post(
|
|
reverse("user-list"), {"last_name": "Test name keimeiShieX4Aekoe3do"}
|
|
)
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_201_CREATED)
|
|
new_user = User.objects.get(username="Test name keimeiShieX4Aekoe3do")
|
|
self.assertEqual(response.data["id"], new_user.id)
|
|
|
|
def test_creation_with_group(self):
|
|
self.client.login(username="admin", password="admin")
|
|
# These are the builtin groups 'Delegates' and 'Staff'. The pks are valid.
|
|
group_pks = (2, 3)
|
|
|
|
self.client.post(
|
|
reverse("user-list"),
|
|
{"last_name": "Test name aedah1iequoof0Ashed4", "groups_id": group_pks},
|
|
)
|
|
|
|
user = User.objects.get(username="Test name aedah1iequoof0Ashed4")
|
|
self.assertTrue(user.groups.filter(pk=group_pks[0]).exists())
|
|
self.assertTrue(user.groups.filter(pk=group_pks[1]).exists())
|
|
|
|
def test_creation_with_default_group(self):
|
|
self.client.login(username="admin", password="admin")
|
|
# This is the builtin groups 'default'.
|
|
# The pk is valid. But this group can not be added to users.
|
|
group_pk = (1,)
|
|
|
|
response = self.client.post(
|
|
reverse("user-list"),
|
|
{"last_name": "Test name aedah1iequoof0Ashed4", "groups_id": group_pk},
|
|
)
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_400_BAD_REQUEST)
|
|
self.assertEqual(
|
|
response.data,
|
|
{"groups_id": ['Invalid pk "%d" - object does not exist.' % group_pk]},
|
|
)
|
|
|
|
|
|
class UserUpdate(TestCase):
|
|
"""
|
|
Tests update of users via REST API.
|
|
"""
|
|
|
|
def test_simple_update_via_patch(self):
|
|
"""
|
|
Test to only update the last_name with a patch request.
|
|
|
|
The field username *should not* be changed by the request.
|
|
"""
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
# This is the builtin user 'Administrator' with username 'admin'. The pk is valid.
|
|
user_pk = User.objects.get(username="admin").pk
|
|
|
|
response = admin_client.patch(
|
|
reverse("user-detail", args=[user_pk]),
|
|
{"last_name": "New name tu3ooh5Iez5Aec2laefo"},
|
|
)
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_200_OK)
|
|
user = User.objects.get(pk=user_pk)
|
|
self.assertEqual(user.last_name, "New name tu3ooh5Iez5Aec2laefo")
|
|
self.assertEqual(user.username, "admin")
|
|
|
|
def test_simple_update_via_put(self):
|
|
"""
|
|
Test to only update the last_name with a put request.
|
|
|
|
The field username *should* be changed by the request.
|
|
"""
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
# This is the builtin user 'Administrator'. The pk is valid.
|
|
user_pk = User.objects.get(username="admin").pk
|
|
|
|
response = admin_client.put(
|
|
reverse("user-detail", args=[user_pk]), {"last_name": "New name Ohy4eeyei5"}
|
|
)
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
self.assertEqual(User.objects.get(pk=user_pk).username, "New name Ohy4eeyei5")
|
|
|
|
def test_update_deactivate_yourselfself(self):
|
|
"""
|
|
Tests that an user can not deactivate himself.
|
|
"""
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
# This is the builtin user 'Administrator'. The pk is valid.
|
|
user_pk = User.objects.get(username="admin").pk
|
|
|
|
response = admin_client.patch(
|
|
reverse("user-detail", args=[user_pk]),
|
|
{"username": "admin", "is_active": False},
|
|
format="json",
|
|
)
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_400_BAD_REQUEST)
|
|
|
|
def test_update_yourself_non_manager(self):
|
|
"""
|
|
Tests that an user can update himself even if he is not a manager.
|
|
"""
|
|
user = User.objects.create_user(
|
|
username="non-admin zeiyeGhaoXoh4awe3xai",
|
|
password="non-admin chah1hoshohN5Oh7zouj",
|
|
)
|
|
client = APIClient()
|
|
client.login(
|
|
username="non-admin zeiyeGhaoXoh4awe3xai",
|
|
password="non-admin chah1hoshohN5Oh7zouj",
|
|
)
|
|
|
|
response = client.put(
|
|
reverse("user-detail", args=[user.pk]),
|
|
{
|
|
"username": "New username IeWeipee5mahpi4quupo",
|
|
"last_name": "New name fae1Bu1Eyeis9eRox4xu",
|
|
"about_me": "New profile text Faemahphi3Hilokangei",
|
|
},
|
|
)
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
user = User.objects.get(pk=user.pk)
|
|
self.assertEqual(user.username, "New username IeWeipee5mahpi4quupo")
|
|
self.assertEqual(user.about_me, "New profile text Faemahphi3Hilokangei")
|
|
# The user is not allowed to change some other fields (like last_name).
|
|
self.assertNotEqual(user.last_name, "New name fae1Bu1Eyeis9eRox4xu")
|
|
|
|
|
|
class UserDelete(TestCase):
|
|
"""
|
|
Tests delete of users via REST API.
|
|
"""
|
|
|
|
def test_delete(self):
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
User.objects.create(username="Test name bo3zieT3iefahng0ahqu")
|
|
|
|
response = admin_client.delete(reverse("user-detail", args=["2"]))
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_204_NO_CONTENT)
|
|
self.assertFalse(
|
|
User.objects.filter(username="Test name bo3zieT3iefahng0ahqu").exists()
|
|
)
|
|
|
|
def test_delete_yourself(self):
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
# This is the builtin user 'Administrator'. The pk is valid.
|
|
admin_user_pk = 1
|
|
|
|
response = admin_client.delete(reverse("user-detail", args=[admin_user_pk]))
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_400_BAD_REQUEST)
|
|
|
|
|
|
class UserResetPassword(TestCase):
|
|
"""
|
|
Tests resetting users password via REST API by a manager.
|
|
"""
|
|
|
|
def test_reset(self):
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
user = User.objects.create(username="Test name ooMoa4ou4mohn2eo1ree")
|
|
user.default_password = "new_password_Yuuh8OoQueePahngohy3"
|
|
user.save()
|
|
response = admin_client.post(
|
|
reverse("user-reset-password", args=[user.pk]),
|
|
{"password": "new_password_Yuuh8OoQueePahngohy3_new"},
|
|
)
|
|
self.assertEqual(response.status_code, status.HTTP_200_OK)
|
|
self.assertTrue(
|
|
User.objects.get(pk=user.pk).check_password(
|
|
"new_password_Yuuh8OoQueePahngohy3_new"
|
|
)
|
|
)
|
|
|
|
"""
|
|
Tests whether a random password is set as default and actual password
|
|
if no default password is provided.
|
|
"""
|
|
|
|
def test_set_random_initial_password(self):
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
|
|
serializer = UserFullSerializer()
|
|
user = serializer.create({"username": "Test name 9gt043qwvnj2d0cr"})
|
|
user.save()
|
|
|
|
default_password = User.objects.get(pk=user.pk).default_password
|
|
self.assertIsNotNone(default_password)
|
|
self.assertEqual(len(default_password), 8)
|
|
self.assertTrue(User.objects.get(pk=user.pk).check_password(default_password))
|
|
|
|
|
|
class UserMassImport(TestCase):
|
|
"""
|
|
Tests mass import of users.
|
|
"""
|
|
|
|
def setUp(self):
|
|
self.client = APIClient()
|
|
self.client.login(username="admin", password="admin")
|
|
|
|
def test_mass_import(self):
|
|
user_1 = {
|
|
"first_name": "first_name_kafaith3woh3thie7Ciy",
|
|
"last_name": "last_name_phah0jaeph9ThoongaeL",
|
|
"groups_id": [],
|
|
}
|
|
user_2 = {
|
|
"first_name": "first_name_kohdao7Eibouwee8ma2O",
|
|
"last_name": "last_name_kafaith3woh3thie7Ciy",
|
|
"groups_id": [],
|
|
}
|
|
response = self.client.post(
|
|
reverse("user-mass-import"), {"users": [user_1, user_2]}, format="json"
|
|
)
|
|
self.assertEqual(response.status_code, 200)
|
|
self.assertEqual(User.objects.count(), 3)
|
|
|
|
|
|
class UserSendIntivationEmail(TestCase):
|
|
"""
|
|
Tests sending an email to the user.
|
|
"""
|
|
|
|
email = "admin@test-domain.com"
|
|
|
|
def setUp(self):
|
|
self.client = APIClient()
|
|
self.client.login(username="admin", password="admin")
|
|
self.admin = User.objects.get()
|
|
self.admin.email = self.email
|
|
self.admin.save()
|
|
|
|
def test_email_sending(self):
|
|
data = {
|
|
"user_ids": [self.admin.pk],
|
|
"subject": config["users_email_subject"],
|
|
"message": config["users_email_body"],
|
|
}
|
|
response = self.client.post(
|
|
reverse("user-mass-invite-email"), data, format="json"
|
|
)
|
|
self.assertEqual(response.status_code, 200)
|
|
self.assertEqual(response.data["count"], 1)
|
|
self.assertEqual(len(mail.outbox), 1)
|
|
self.assertEqual(mail.outbox[0].to[0], self.email)
|
|
|
|
|
|
class GroupMetadata(TestCase):
|
|
def test_options_request_as_anonymous_user_activated(self):
|
|
config["general_system_enable_anonymous"] = True
|
|
|
|
response = self.client.options("/rest/users/group/")
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
self.assertEqual(response.data["name"], "Group List")
|
|
perm_list = response.data["actions"]["POST"]["permissions"]["choices"]
|
|
self.assertEqual(type(perm_list), list)
|
|
for item in perm_list:
|
|
self.assertEqual(type(item), dict)
|
|
self.assertTrue(item.get("display_name") is not None)
|
|
self.assertTrue(item.get("value") is not None)
|
|
|
|
|
|
class GroupReceive(TestCase):
|
|
def test_get_groups_as_anonymous_deactivated(self):
|
|
"""
|
|
Test to get the groups with an anonymous user, when they are deactivated.
|
|
"""
|
|
response = self.client.get("/rest/users/group/")
|
|
|
|
self.assertEqual(response.status_code, 403)
|
|
|
|
def test_get_groups_as_anonymous_user_activated(self):
|
|
"""
|
|
Test to get the groups with an anonymous user, when they are activated.
|
|
"""
|
|
config["general_system_enable_anonymous"] = True
|
|
|
|
response = self.client.get("/rest/users/group/")
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
def test_logged_in_user_with_no_permission(self):
|
|
"""
|
|
Test to get the groups with an logged in user with no permissions.
|
|
"""
|
|
user = User(username="test")
|
|
user.set_password("test")
|
|
user.save()
|
|
default_group = Group.objects.get(pk=1)
|
|
default_group.permissions.all().delete()
|
|
self.client.login(username="test", password="test")
|
|
|
|
response = self.client.get("/rest/users/group/")
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
|
|
class GroupCreate(TestCase):
|
|
"""
|
|
Tests creation of groups via REST API.
|
|
"""
|
|
|
|
def test_creation(self):
|
|
self.client.login(username="admin", password="admin")
|
|
# This contains two valid permissions of the users app.
|
|
permissions = ("users.can_see_name", "users.can_see_extra_data")
|
|
|
|
response = self.client.post(
|
|
reverse("group-list"),
|
|
{"name": "Test name la8eephu9vaecheiKeif", "permissions": permissions},
|
|
)
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_201_CREATED)
|
|
group = Group.objects.get(name="Test name la8eephu9vaecheiKeif")
|
|
for permission in permissions:
|
|
app_label, codename = permission.split(".")
|
|
self.assertTrue(
|
|
group.permissions.get(
|
|
content_type__app_label=app_label, codename=codename
|
|
)
|
|
)
|
|
|
|
def test_failed_creation_invalid_value(self):
|
|
self.client.login(username="admin", password="admin")
|
|
permissions = ("invalid_permission",)
|
|
|
|
response = self.client.post(
|
|
reverse("group-list"),
|
|
{"name": "Test name ool5aeb6Rai2aiLaith1", "permissions": permissions},
|
|
)
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_400_BAD_REQUEST)
|
|
self.assertEqual(
|
|
response.data,
|
|
{
|
|
"permissions": [
|
|
'Incorrect value "invalid_permission". Expected app_label.codename string.'
|
|
]
|
|
},
|
|
)
|
|
|
|
def test_failed_creation_invalid_permission(self):
|
|
self.client.login(username="admin", password="admin")
|
|
permissions = ("invalid_app.invalid_permission",)
|
|
|
|
response = self.client.post(
|
|
reverse("group-list"),
|
|
{"name": "Test name wei2go2aiV3eophi9Ohg", "permissions": permissions},
|
|
)
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_400_BAD_REQUEST)
|
|
self.assertEqual(
|
|
response.data,
|
|
{
|
|
"permissions": [
|
|
'Invalid permission "invalid_app.invalid_permission". Object does not exist.'
|
|
]
|
|
},
|
|
)
|
|
|
|
|
|
class GroupUpdate(TestCase):
|
|
"""
|
|
Tests update of groups via REST API.
|
|
"""
|
|
|
|
def test_simple_update_via_patch(self):
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
# This is the builtin group 'Delegates'. The pk is valid.
|
|
group_pk = 2
|
|
# This contains one valid permission of the users app.
|
|
permissions = ("users.can_see_name",)
|
|
|
|
response = admin_client.patch(
|
|
reverse("group-detail", args=[group_pk]), {"permissions": permissions}
|
|
)
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_200_OK)
|
|
group = Group.objects.get(pk=group_pk)
|
|
for permission in permissions:
|
|
app_label, codename = permission.split(".")
|
|
self.assertTrue(
|
|
group.permissions.get(
|
|
content_type__app_label=app_label, codename=codename
|
|
)
|
|
)
|
|
|
|
def test_simple_update_via_put(self):
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
# This is the builtin group 'Delegates'. The pk is valid.
|
|
group_pk = 2
|
|
# This contains one valid permission of the users app.
|
|
permissions = ("users.can_see_name",)
|
|
|
|
response = admin_client.put(
|
|
reverse("group-detail", args=[group_pk]), {"permissions": permissions}
|
|
)
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_400_BAD_REQUEST)
|
|
self.assertEqual(response.data, {"name": ["This field is required."]})
|
|
|
|
def test_update_via_put_with_new_permissions(self):
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
group = Group.objects.create(name="group_name_inooThe3dii4mahWeeSe")
|
|
# This contains all permissions.
|
|
permissions = [
|
|
"agenda.can_be_speaker",
|
|
"agenda.can_manage",
|
|
"agenda.can_see",
|
|
"agenda.can_see_internal_items",
|
|
"assignments.can_manage",
|
|
"assignments.can_nominate_other",
|
|
"assignments.can_nominate_self",
|
|
"assignments.can_see",
|
|
"core.can_manage_config",
|
|
"core.can_manage_projector",
|
|
"core.can_manage_tags",
|
|
"core.can_manage_chat",
|
|
"core.can_see_frontpage",
|
|
"core.can_see_projector",
|
|
"core.can_use_chat",
|
|
"mediafiles.can_manage",
|
|
"mediafiles.can_see",
|
|
"mediafiles.can_see_hidden",
|
|
"mediafiles.can_upload",
|
|
"motions.can_create",
|
|
"motions.can_manage",
|
|
"motions.can_see",
|
|
"motions.can_support",
|
|
"users.can_manage",
|
|
"users.can_see_extra_data",
|
|
"users.can_see_name",
|
|
]
|
|
|
|
response = admin_client.put(
|
|
reverse("group-detail", args=[group.pk]),
|
|
{"name": "new_group_name_Chie6duwaepoo8aech7r", "permissions": permissions},
|
|
format="json",
|
|
)
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_200_OK)
|
|
group = Group.objects.get(pk=group.pk)
|
|
for permission in permissions:
|
|
app_label, codename = permission.split(".")
|
|
self.assertTrue(
|
|
group.permissions.get(
|
|
content_type__app_label=app_label, codename=codename
|
|
)
|
|
)
|
|
|
|
|
|
class GroupDelete(TestCase):
|
|
"""
|
|
Tests delete of groups via REST API.
|
|
"""
|
|
|
|
def test_delete(self):
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
group = Group.objects.create(name="Test name Koh4lohlaewoog9Ahsh5")
|
|
|
|
response = admin_client.delete(reverse("group-detail", args=[group.pk]))
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_204_NO_CONTENT)
|
|
self.assertFalse(
|
|
Group.objects.filter(name="Test name Koh4lohlaewoog9Ahsh5").exists()
|
|
)
|
|
|
|
def test_delete_builtin_groups(self):
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
# The pk of builtin group 'Default'
|
|
group_pk = 1
|
|
|
|
response = admin_client.delete(reverse("group-detail", args=[group_pk]))
|
|
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
|
|
|
|
|
|
class PersonalNoteTest(TestCase):
|
|
"""
|
|
Tests for PersonalNote model.
|
|
"""
|
|
|
|
def test_anonymous_without_personal_notes(self):
|
|
admin = User.objects.get(username="admin")
|
|
personal_note = PersonalNote.objects.create(
|
|
user=admin, notes='["admin_personal_note_OoGh8choro0oosh0roob"]'
|
|
)
|
|
config["general_system_enable_anonymous"] = True
|
|
guest_client = APIClient()
|
|
response = guest_client.get(
|
|
reverse("personalnote-detail", args=[personal_note.pk])
|
|
)
|
|
self.assertEqual(response.status_code, 404)
|
|
|
|
def test_admin_send_JSON(self):
|
|
admin_client = APIClient()
|
|
admin_client.login(username="admin", password="admin")
|
|
response = admin_client.post(
|
|
reverse("personalnote-list"),
|
|
{
|
|
"notes": {
|
|
"example-model": {
|
|
"1": {
|
|
"note": "note for the example.model with id 1 Oohae1JeuSedooyeeviH",
|
|
"star": True,
|
|
}
|
|
}
|
|
}
|
|
},
|
|
format="json",
|
|
)
|
|
self.assertEqual(response.status_code, status.HTTP_201_CREATED)
|