/
test_user.py
919 lines (747 loc) · 31.9 KB
/
test_user.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
# encoding: utf-8
import unittest.mock as mock
import pytest
from bs4 import BeautifulSoup
import ckan.tests.factories as factories
import ckan.tests.helpers as helpers
from ckan import model
from ckan.lib.helpers import url_for
from ckan.lib.mailer import create_reset_key, MailerException
@pytest.mark.usefixtures("clean_db")
class TestUserListings:
def test_user_page_lists_users(self, app):
"""/users/ lists registered users"""
factories.User(fullname="User One")
factories.User(fullname="User Two")
factories.User(fullname="User Three")
user_url = url_for("user.index")
user_response = app.get(user_url, status=200)
user_response_html = BeautifulSoup(user_response.data)
user_list = user_response_html.select("ul.user-list li")
assert len(user_list) == 3
user_names = [u.text.strip() for u in user_list]
assert "User One" in user_names
assert "User Two" in user_names
assert "User Three" in user_names
def test_user_page_doesnot_list_deleted_users(self, app):
"""/users/ doesn't list deleted users"""
factories.User(fullname="User One", state="deleted")
factories.User(fullname="User Two")
factories.User(fullname="User Three")
user_url = url_for("user.index")
user_response = app.get(user_url, status=200)
user_response_html = BeautifulSoup(user_response.data)
user_list = user_response_html.select("ul.user-list li")
assert len(user_list) == 2
user_names = [u.text.strip() for u in user_list]
assert "User One" not in user_names
assert "User Two" in user_names
assert "User Three" in user_names
def test_user_page_anon_search(self, app):
"""Anon users can search for users by username."""
factories.User(fullname="User One")
factories.User(fullname="Person Two")
factories.User(fullname="Person Three")
user_url = url_for("user.index")
search_response = app.get(user_url, query_string={"q": "Person"})
search_response_html = BeautifulSoup(search_response.data)
user_list = search_response_html.select("ul.user-list li")
assert len(user_list) == 2
user_names = [u.text.strip() for u in user_list]
assert "Person Two" in user_names
assert "Person Three" in user_names
assert "User One" not in user_names
def test_user_page_anon_search_not_by_email(self, app):
"""Anon users can not search for users by email."""
stub = factories.User.stub()
factories.User(fullname="User One", email=stub.email)
factories.User(fullname="Person Two")
factories.User(fullname="Person Three")
user_url = url_for("user.index")
search_response = app.get(
user_url, query_string={"q": stub.email}
)
search_response_html = BeautifulSoup(search_response.data)
user_list = search_response_html.select("ul.user-list li")
assert len(user_list) == 0
def test_user_page_sysadmin_user(self, app):
"""Sysadmin can search for users by email."""
# sysadmin = factories.Sysadmin()
stub = factories.User.stub()
factories.User(fullname="User One", email=stub.email)
factories.User(fullname="Person Two")
factories.User(fullname="Person Three")
@pytest.fixture
def user():
user = factories.UserWithToken()
return user
@pytest.fixture
def sysadmin():
user = factories.SysadminWithToken()
return user
@pytest.mark.usefixtures("clean_db")
class TestUser(object):
@pytest.mark.ckan_config("ckan.auth.create_user_via_web", True)
def test_register_a_user(self, app):
url = url_for("user.register")
stub = factories.User.stub()
response = app.post(
url=url,
data={
"save": "",
"name": stub.name,
"fullname": "New User",
"email": stub.email,
"password1": "TestPassword1",
"password2": "TestPassword1",
},
)
assert 200 == response.status_code
user = helpers.call_action("user_show", id=stub.name)
assert user["name"] == stub.name
assert user["fullname"] == "New User"
assert not (user["sysadmin"])
@pytest.mark.ckan_config("ckan.auth.create_user_via_web", True)
def test_register_user_bad_password(self, app):
stub = factories.User.stub()
response = app.post(
url_for("user.register"),
data={
"save": "",
"name": stub.name,
"fullname": "New User",
"email": stub.email,
"password1": "TestPassword1",
"password2": "",
},
)
assert "The passwords you entered do not match" in response
def test_create_user_as_sysadmin(self, app):
admin_pass = "RandomPassword123"
sysadmin = factories.Sysadmin(password=admin_pass)
sysadmin_token = factories.APIToken(user=sysadmin["name"])
headers = {"Authorization": sysadmin_token["token"]}
stub = factories.User.stub()
app.post(
url_for("user.register"),
data={
"name": stub.name,
"fullname": "Newest User",
"email": stub.email,
"password1": "NewPassword1",
"password2": "NewPassword1",
"save": "",
},
headers=headers,
follow_redirects=False,
)
# assert "/user/activity" in response.headers["location"]
def test_registered_user_login(self, app):
"""
Registered user can submit valid login details at /user/login and
be returned to appropriate place.
"""
# make a user
password = "RandomPassword123"
user = factories.User(password=password)
# get the form
response = app.post(
url_for("user.login"),
data={
"login": user["name"],
"password": password
},
)
# the response is the user dashboard, right?
assert '<a href="/dashboard/datasets">Dashboard</a>' in response
assert (
'<span class="username">{0}</span>'.format(user["fullname"])
in response
)
# and we're definitely not back on the login page.
assert '<h1 class="page-heading">Login</h1>' not in response
def test_registered_user_login_bad_password(self, app):
"""
Registered user is redirected to appropriate place if they submit
invalid login details at /user/login.
"""
# make a user
user = factories.User()
# get the form
response = app.post(
url_for("user.login"),
data={"login": user["name"], "password": "BadPass1", "save": ""},
)
# the response is the login page again
assert '<h1 class="page-heading">Login</h1>' in response
assert "Login failed. Bad username or password." in response
# and we're definitely not on the dashboard.
assert '<a href="/dashboard">Dashboard</a>' not in response
assert (
'<span class="username">{0}</span>'.format(user["fullname"])
not in response
)
def test_user_logout_url_redirect(self, app, user):
"""_logout url redirects to logged out page.
"""
headers = {"Authorization": user["token"]}
logout_url = url_for("user.logout")
final_response = app.get(logout_url, headers=headers)
assert "You are now logged out." in final_response
@pytest.mark.ckan_config("ckan.root_path", "/my/prefix")
def test_non_root_user_logout_url_redirect(self, app, user):
"""
_logout url redirects to logged out page with `ckan.root_path`
prefixed.
"""
headers = {"Authorization": user["token"]}
logout_url = url_for("user.logout")
# Remove the prefix otherwise the test app won't find the correct route
logout_url = logout_url.replace("/my/prefix", "")
logout_response = app.get(logout_url, headers=headers, follow_redirects=False)
assert logout_response.status_code == 302
assert "/my/prefix/user/logged_out_redirect" in logout_response.headers["location"]
def test_not_logged_in_dashboard(self, app):
for route in ["organizations", "datasets", "groups"]:
response = app.get(
url=url_for(u"dashboard.{}".format(route)),
follow_redirects=False,
)
assert response.status_code == 302
assert "user/login" in response.headers["location"]
def test_own_datasets_show_up_on_user_dashboard(self, app, user):
headers = {"Authorization": user["token"]}
dataset_title = "My very own dataset"
factories.Dataset(
user=user, name="my-own-dataset", title=dataset_title
)
response = app.get(url=url_for("dashboard.datasets"), headers=headers)
assert dataset_title in response
def test_other_datasets_dont_show_up_on_user_dashboard(self, app, user):
headers = {"Authorization": user["token"]}
user1 = factories.User()
dataset_title = "Someone else's dataset"
factories.Dataset(
user=user1, title=dataset_title
)
response = app.get(url=url_for("dashboard.datasets"), headers=headers)
assert dataset_title not in response
def test_user_edit_no_user(self, app):
response = app.get(url_for("user.edit", id=None), status=400)
assert "No user specified" in response
def test_user_edit_unknown_user(self, app):
"""Attempt to read edit user for an unknown user redirects to login
page."""
url = url_for("user.edit", id=factories.User.stub().name)
app.get(url, status=403)
def test_user_edit_not_logged_in(self, app):
"""Attempt to read edit user for an existing, not-logged in user
redirects to login page."""
user = factories.User()
username = user["name"]
url = url_for("user.edit", id=username)
app.get(url, status=403)
def test_edit_user(self, app, user):
headers = {"Authorization": user["token"]}
app.post(
url=url_for("user.edit"),
data={
"save": "",
"name": user["name"],
"fullname": "new full name",
"email": 'user@ckan.org',
"about": "new about",
"activity_streams_email_notifications": True,
"old_password": "correct123",
"password1": "NewPass1",
"password2": "NewPass1",
},
headers=headers
)
user = model.Session.query(model.User).get(user["id"])
assert user.fullname == "new full name"
assert user.email == 'user@ckan.org'
assert user.about == "new about"
assert user.activity_streams_email_notifications
def test_edit_user_as_wrong_user(self, app, user):
user_one = factories.User(password="TestPassword1")
headers = {"Authorization": user["token"]}
app.get(url_for("user.edit", id=user_one["name"]), headers=headers, status=403)
def test_email_change_without_password(self, app, user):
headers = {"Authorization": user["token"]}
response = app.post(
url=url_for("user.edit"),
data={
"email": factories.User.stub().email,
"save": "",
"old_password": "Wrong-pass1",
"password1": "",
"password2": "",
},
headers=headers
)
assert "Old Password: incorrect password" in response
def test_email_change_with_password(self, app, user):
headers = {"Authorization": user["token"]}
response = app.post(
url=url_for("user.edit"),
data={
"email": factories.User.stub().email,
"save": "",
"old_password": "correct123",
"password1": "",
"password2": "",
"name": user["name"],
},
headers=headers
)
assert "Profile updated" in response
def test_email_change_on_existed_email(self, app, user):
user2 = factories.User(email="existed@email.com")
headers = {"Authorization": user["token"]}
response = app.post(
url=url_for("user.edit"),
data={
"email": user2["email"],
"save": "",
"old_password": "correct123",
"password1": "",
"password2": "",
"name": user["name"],
},
headers=headers
)
assert "belongs to a registered user" in response
def test_edit_user_logged_in_username_change(self, app, user):
headers = {"Authorization": user["token"]}
response = app.post(
url=url_for("user.edit"),
data={
"email": user["email"],
"save": "",
"password1": "",
"password2": "",
"name": factories.User.stub().name,
},
headers=headers
)
assert "That login name can not be modified" in response
def test_edit_user_logged_in_username_change_by_name(self, app, user):
headers = {"Authorization": user["token"]}
response = app.post(
url=url_for("user.edit", id=user["name"]),
data={
"email": user["email"],
"save": "",
"password1": "",
"password2": "",
"name": factories.User.stub().name,
},
headers=headers
)
assert "That login name can not be modified" in response
def test_edit_user_logged_in_username_change_by_id(self, app, user):
headers = {"Authorization": user["token"]}
response = app.post(
url=url_for("user.edit", id=user["id"]),
data={
"email": user["email"],
"save": "",
"password1": "",
"password2": "",
"name": factories.User.stub().name,
},
headers=headers
)
assert "That login name can not be modified" in response
def test_edit_user_logged_in_username_change_by_sysadmin(
self, app, user, sysadmin):
headers = {"Authorization": sysadmin["token"]}
response = app.post(
url=url_for("user.edit", id=user["id"]),
data={
"email": user["email"],
"save": "",
"password1": "",
"password2": "",
"name": factories.User.stub().name,
},
headers=headers
)
assert 'Profile updated' in response
def test_perform_reset_for_key_change(self, app):
password = "TestPassword1"
params = {"password1": password, "password2": password}
user = factories.User()
user_obj = helpers.model.User.by_name(user["name"])
create_reset_key(user_obj)
key = user_obj.reset_key
offset = url_for(
"user.perform_reset",
id=user_obj.id,
key=user_obj.reset_key,
)
app.post(offset, data=params)
user_obj = helpers.model.User.by_name(user["name"]) # Update user_obj
assert key != user_obj.reset_key
def test_password_reset_correct_password(self, app, user):
"""
user password reset attempted with correct old password
"""
headers = {"Authorization": user["token"]}
response = app.post(
url=url_for("user.edit"),
data={
"save": "",
"old_password": "correct123",
"password1": "NewPassword1",
"password2": "NewPassword1",
"name": user["name"],
"email": user["email"],
},
headers=headers
)
assert "Profile updated" in response
def test_password_reset_incorrect_password(self, app, user):
"""
user password reset attempted with invalid old password
"""
headers = {"Authorization": user["token"]}
response = app.post(
url=url_for("user.edit"),
data={
"save": "",
"old_password": "Wrong-Pass1",
"password1": "NewPassword1",
"password2": "NewPassword1",
"name": user["name"],
"email": user["email"],
},
headers=headers
)
assert "Old Password: incorrect password" in response
def test_user_follow(self, app, user):
user_two = factories.User()
headers = {"Authorization": user["token"]}
follow_url = url_for("user.follow", id=user_two["id"])
response = app.post(follow_url, headers=headers)
assert "<dt>Followers</dt>\n <dd><span>1</span>" in response
assert 'Unfollow</a>' in response
def test_user_follow_not_exist(self, app, user):
"""Pass an id for a user that doesn't exist"""
headers = {"Authorization": user["token"]}
follow_url = url_for("user.follow", id="not-here")
response = app.post(follow_url, headers=headers)
assert response.status_code == 404
def test_user_unfollow(self, app, user):
user_two = factories.User()
headers = {"Authorization": user["token"]}
follow_url = url_for("user.follow", id=user_two["id"])
app.post(follow_url, headers=headers)
unfollow_url = url_for("user.unfollow", id=user_two["id"])
unfollow_response = app.post(unfollow_url, headers=headers)
assert "<dt>Followers</dt>\n <dd><span>0</span>" in unfollow_response
assert 'Follow</a>' in unfollow_response
def test_user_unfollow_not_following(self, app, user):
"""It will just return the snippet to follow them."""
user_two = factories.User()
headers = {"Authorization": user["token"]}
unfollow_url = url_for("user.unfollow", id=user_two["id"])
unfollow_response = app.post(unfollow_url, headers=headers)
assert "<dt>Followers</dt>\n <dd><span>0</span>" in unfollow_response
assert 'Follow</a>' in unfollow_response
def test_user_unfollow_not_exist(self, app, user):
"""Unfollow a user that doesn't exist."""
headers = {"Authorization": user["token"]}
unfollow_url = url_for("user.unfollow", id="not-here")
response = app.post(unfollow_url, headers=headers)
assert response.status_code == 404
def test_user_follower_list(self, app, sysadmin):
"""Following users appear on followers list page."""
headers = {"Authorization": sysadmin["token"]}
user_two = factories.User()
follow_url = url_for("user.follow", id=user_two["id"])
app.post(follow_url, headers=headers)
followers_url = url_for("user.followers", id=user_two["id"])
# Only sysadmins can view the followers list pages
followers_response = app.get(followers_url, headers=headers, status=200)
assert sysadmin["display_name"] in followers_response
def test_user_page_anon_access(self, app):
"""Anon users can access the user list page"""
user_url = url_for("user.index")
user_response = app.get(user_url, status=200)
assert "<title>All Users - CKAN</title>" in user_response
@mock.patch("ckan.lib.mailer.send_reset_link")
def test_request_reset_by_email(self, send_reset_link, app):
user = factories.User()
offset = url_for("user.request_reset")
response = app.post(offset, data=dict(user=user["email"]))
assert "A reset link has been emailed to you" in response
assert send_reset_link.call_args[0][0].id == user["id"]
@mock.patch("ckan.lib.mailer.send_reset_link")
def test_request_reset_by_name(self, send_reset_link, app):
user = factories.User()
offset = url_for("user.request_reset")
response = app.post(offset, data=dict(user=user["name"]))
assert "A reset link has been emailed to you" in response
assert send_reset_link.call_args[0][0].id == user["id"]
def test_request_reset_without_param(self, app):
offset = url_for("user.request_reset")
response = app.post(offset)
assert "Email is required" in response
@mock.patch("ckan.lib.mailer.send_reset_link")
def test_request_reset_for_unknown_username(self, send_reset_link, app):
offset = url_for("user.request_reset")
response = app.post(offset, data=dict(user="unknown"))
# doesn't reveal account does or doesn't exist
assert "A reset link has been emailed to you" in response
send_reset_link.assert_not_called()
@mock.patch("ckan.lib.mailer.send_reset_link")
def test_request_reset_for_unknown_email(self, send_reset_link, app):
offset = url_for("user.request_reset")
response = app.post(offset, data=dict(user=factories.User.stub().email))
# doesn't reveal account does or doesn't exist
assert "A reset link has been emailed to you" in response
send_reset_link.assert_not_called()
@mock.patch("ckan.lib.mailer.send_reset_link")
def test_request_reset_but_mailer_not_configured(
self, send_reset_link, app
):
user = factories.User()
offset = url_for("user.request_reset")
# This is the exception when the mailer is not configured:
send_reset_link.side_effect = MailerException(
'SMTP server could not be connected to: "localhost" '
"[Errno 111] Connection refused"
)
response = app.post(offset, data=dict(user=user["name"]))
assert "Error sending the email" in response
def test_sysadmin_not_authorized(self, app):
user = factories.UserWithToken()
app.post(
url_for("user.sysadmin"),
data={"username": user["name"], "status": "1"},
headers={"Authorization": user["token"]},
status=403
)
def test_sysadmin_invalid_user(self, app, sysadmin):
headers = {"Authorization": sysadmin["token"]}
resp = app.post(
url_for("user.sysadmin"),
data={"username": "fred", "status": "1"},
headers=headers,
status=200,
)
assert helpers.body_contains(resp, "User not found")
def test_sysadmin_promote_success(self, app):
sysadmin = factories.SysadminWithToken()
# create a normal user
user = factories.User(fullname="Alice")
# promote them
resp = app.post(
url_for("user.sysadmin"),
data={"username": user["name"], "status": "1"},
headers={"Authorization": sysadmin["token"]},
status=200,
)
assert "Promoted Alice to sysadmin" in resp.body
# now they are a sysadmin
userobj = model.User.get(user["id"])
assert userobj.sysadmin
def test_sysadmin_revoke_success(self, app):
sysadmin = factories.SysadminWithToken()
# create another sysadmin
user = factories.Sysadmin(fullname="Bob")
# revoke their status
resp = app.post(
url_for("user.sysadmin"),
data={"username": user["name"], "status": "0"},
headers={"Authorization": sysadmin["token"]},
status=200,
)
assert "Revoked sysadmin permission from Bob" in resp.body
# now they are not a sysadmin any more
userobj = model.User.get(user["id"])
assert not userobj.sysadmin
def test_user_delete_redirects_to_user_index(self, app, sysadmin):
headers = {"Authorization": sysadmin["token"]}
user = factories.User()
url = url_for("user.delete", id=user["id"])
redirect_url = url_for("user.index", qualified=True)
res = app.post(url, headers=headers, follow_redirects=False)
user = helpers.call_action("user_show", id=user["id"])
assert user["state"] == "deleted"
assert res.headers["Location"].startswith(redirect_url)
def test_user_delete_by_unauthorized_user(self, app, user):
user_one = factories.User()
url = url_for("user.delete", id=user_one["id"])
headers = {"Authorization": user["token"]}
app.post(url, headers=headers, status=403)
def test_user_read_without_id(self, app):
app.get("/user", status=200)
def test_user_read_me_without_id(self, app):
app.get("/user/me", status=302, follow_redirects=False)
def test_perform_reset_user_password_link_key_incorrect(self, app, user):
headers = {"Authorization": user["token"]}
url = url_for("user.perform_reset", id=user["id"], key="randomness")
app.get(url, headers=headers, status=403)
def test_perform_reset_user_password_link_key_missing(self, app, user):
headers = {"Authorization": user["token"]}
url = url_for("user.perform_reset", id=user["id"])
app.get(url, headers=headers, status=403)
def test_perform_reset_user_password_link_user_incorrect(self, app):
factories.User()
url = url_for(
"user.perform_reset",
id="randomness",
key="randomness",
)
app.get(url, status=404)
def test_perform_reset_activates_pending_user(self, app):
password = "TestPassword1"
params = {"password1": password, "password2": password}
user = factories.User(state="pending")
userobj = model.User.get(user["name"])
create_reset_key(userobj)
assert userobj.is_pending(), userobj.state
url = url_for(
"user.perform_reset",
id=userobj.id,
key=userobj.reset_key,
)
app.post(url, params=params)
userobj = model.User.get(userobj.id)
assert userobj.is_active
def test_perform_reset_doesnt_activate_deleted_user(self, app):
password = "TestPassword1"
params = {"password1": password, "password2": password}
user = factories.User()
userobj = model.User.get(user["id"])
userobj.delete()
create_reset_key(userobj)
assert userobj.is_deleted(), userobj.state
url = url_for(
"user.perform_reset",
id=userobj.id,
key=userobj.reset_key,
)
app.post(url, params=params, status=403)
userobj = model.User.get(userobj.id)
assert userobj.is_deleted(), userobj
def test_deleted_user_reactivated_by_sysadmin_ui(self, app):
sysadmin = factories.SysadminWithToken(password="correct123")
deleted_user = factories.User(state="deleted")
headers = {"Authorization": sysadmin["token"]}
data = {
"name": deleted_user["name"],
"id": deleted_user["id"],
"activate_user": True,
"email": deleted_user["email"],
"old_password": "correct123",
"password1": "",
"password2": "",
"save": ""
}
url = url_for("user.edit", id=deleted_user["name"])
app.post(url, headers=headers, data=data)
user = model.User.get(deleted_user["name"])
assert user.state == "active"
@pytest.mark.usefixtures("non_clean_db")
class TestUserImage(object):
def test_image_url_is_shown(self, app):
user = factories.User(
image_url="https://example.com/mypic.png", password="correct123")
url = url_for("user.read", id=user["name"])
user_token = factories.APIToken(user=user["name"])
headers = {"Authorization": user_token["token"]}
res = app.get(url, headers=headers)
res_html = BeautifulSoup(res.data)
user_images = res_html.select("img.user-image")
assert len(user_images) == 2 # Logged in header + profile pic
for img in user_images:
assert img.attrs["src"] == "https://example.com/mypic.png"
def test_fallback_to_gravatar(self, app):
user = factories.User(image_url=None, password="correct123")
url = url_for("user.read", id=user["name"])
user_token = factories.APIToken(user=user["name"])
headers = {"Authorization": user_token["token"]}
res = app.get(url, headers=headers)
res_html = BeautifulSoup(res.data)
user_images = res_html.select("img.user-image")
assert len(user_images) == 2 # Logged in header + profile pic
for img in user_images:
assert img.attrs["src"].startswith("//gravatar")
@pytest.mark.ckan_config("ckan.gravatar_default", "disabled")
def test_fallback_to_placeholder_if_gravatar_disabled(self, app):
user = factories.User(image_url=None, password="correct123")
url = url_for("user.read", id=user["name"])
user_token = factories.APIToken(user=user["name"])
headers = {"Authorization": user_token["token"]}
res = app.get(url, headers=headers)
res_html = BeautifulSoup(res.data)
user_images = res_html.select("img.user-image")
assert len(user_images) == 2 # Logged in header + profile pic
for img in user_images:
assert img.attrs["src"] == "/base/images/placeholder-user.png"
@pytest.mark.usefixtures("clean_db")
class TestCSRFToken:
def test_csrf_token_tags_get_render(self, app):
response = app.get(url_for("home.index"))
assert '<meta name="csrf_field_name"' in response.body
assert '<meta name="_csrf_token"' in response.body
def test_csrf_tags_contains_values(self, app):
response = app.get(url_for("home.index"))
res_html = BeautifulSoup(response.data)
# Using the same selector as CKAN client.js
csrf_field_name = res_html.select_one("meta[name=csrf_field_name]")
assert csrf_field_name.attrs["content"] == "_csrf_token"
csrf_token = res_html.select_one("meta[name=_csrf_token]")
assert csrf_token.attrs["content"] is not None
@pytest.mark.ckan_config("WTF_CSRF_FIELD_NAME", "new_name")
def test_csrf_config_option_contains_values(self, app):
response = app.get(url_for("home.index"))
res_html = BeautifulSoup(response.data)
csrf_field_name = res_html.select_one("meta[name=csrf_field_name]")
assert csrf_field_name.attrs["content"] == "new_name"
csrf_token = res_html.select_one("meta[name=new_name]")
assert csrf_token.attrs["content"] is not None
def test_csrf_token_in_g_object(self, app):
password = "RandomPassword123"
user = factories.User(password=password)
with app.flask_app.app_context() as ctx:
app.post(
url_for("user.login"),
data={
"login": user["name"],
"password": password
},
)
assert ctx.g._csrf_token is not None
assert ctx.g.csrf_field_name == "_csrf_token"
def test_csrf_token_are_different_for_different_users(self, app):
password = "RandomPassword123"
user1 = factories.User(password=password)
token_user1 = ""
with app.flask_app.app_context() as ctx:
app.post(
url_for("user.login"),
data={
"login": user1["name"],
"password": password
},
)
assert ctx.g._csrf_token is not None
token_user1 = ctx.g._csrf_token
user2 = factories.User(password=password)
token_user2 = ""
with app.flask_app.app_context() as ctx:
app.post(
url_for("user.login"),
data={
"login": user2["name"],
"password": password
},
)
assert ctx.g._csrf_token is not None
token_user2 = ctx.g._csrf_token
assert token_user1 != token_user2