django-rest-auth/rest_auth/tests.py

417 lines
14 KiB
Python
Raw Normal View History

2014-04-30 23:52:05 +04:00
import json
from datetime import datetime, date, time
2014-05-03 01:47:28 +04:00
2014-04-30 23:52:05 +04:00
from django.conf import settings
2014-05-03 01:47:28 +04:00
from django.core.urlresolvers import reverse
2014-04-30 23:52:05 +04:00
from django.test.client import Client, MULTIPART_CONTENT
from django.test import TestCase
from django.contrib.auth.models import User
2014-05-02 00:32:30 +04:00
from django.contrib.auth import get_user_model
2014-05-06 02:53:06 +04:00
from django.core import mail
from django.test.utils import override_settings
from django.contrib.sites.models import Site
from allauth.socialaccount.models import SocialApp
import responses
2014-05-02 00:32:30 +04:00
from rest_framework import status
2014-04-30 23:52:05 +04:00
class APIClient(Client):
2014-04-30 23:52:05 +04:00
def patch(self, path, data='', content_type=MULTIPART_CONTENT, follow=False, **extra):
return self.generic('PATCH', path, data, content_type, **extra)
def options(self, path, data='', content_type=MULTIPART_CONTENT, follow=False, **extra):
return self.generic('OPTIONS', path, data, content_type, **extra)
# class CustomJSONEncoder(json.JSONEncoder):
# """
# Convert datetime/date objects into isoformat
# """
2014-04-30 23:52:05 +04:00
# def default(self, obj):
# if isinstance(obj, (datetime, date, time)):
# return obj.isoformat()
# else:
# return super(CustomJSONEncoder, self).default(obj)
2014-04-30 23:52:05 +04:00
class BaseAPITestCase(object):
2014-04-30 23:52:05 +04:00
"""
base for API tests:
* easy request calls, f.e.: self.post(url, data), self.get(url)
* easy status check, f.e.: self.post(url, data, status_code=200)
"""
def send_request(self, request_method, *args, **kwargs):
request_func = getattr(self.client, request_method)
status_code = None
if not 'content_type' in kwargs and request_method != 'get':
kwargs['content_type'] = 'application/json'
if 'data' in kwargs and request_method != 'get' and kwargs['content_type'] == 'application/json':
data = kwargs.get('data', '')
kwargs['data'] = json.dumps(data) # , cls=CustomJSONEncoder
2014-04-30 23:52:05 +04:00
if 'status_code' in kwargs:
status_code = kwargs.pop('status_code')
# check_headers = kwargs.pop('check_headers', True)
if hasattr(self, 'token'):
kwargs['HTTP_AUTHORIZATION'] = 'Token %s' % self.token
self.response = request_func(*args, **kwargs)
is_json = bool(
filter(lambda x: 'json' in x, self.response._headers['content-type']))
2014-04-30 23:52:05 +04:00
if is_json and self.response.content:
self.response.json = json.loads(self.response.content)
else:
self.response.json = {}
if status_code:
self.assertEqual(self.response.status_code, status_code)
return self.response
def post(self, *args, **kwargs):
return self.send_request('post', *args, **kwargs)
def get(self, *args, **kwargs):
return self.send_request('get', *args, **kwargs)
def patch(self, *args, **kwargs):
return self.send_request('patch', *args, **kwargs)
# def put(self, *args, **kwargs):
# return self.send_request('put', *args, **kwargs)
2014-04-30 23:52:05 +04:00
# def delete(self, *args, **kwargs):
# return self.send_request('delete', *args, **kwargs)
2014-04-30 23:52:05 +04:00
# def options(self, *args, **kwargs):
# return self.send_request('options', *args, **kwargs)
2014-04-30 23:52:05 +04:00
# def post_file(self, *args, **kwargs):
# kwargs['content_type'] = MULTIPART_CONTENT
# return self.send_request('post', *args, **kwargs)
2014-04-30 23:52:05 +04:00
# def get_file(self, *args, **kwargs):
# content_type = None
# if 'content_type' in kwargs:
# content_type = kwargs.pop('content_type')
# response = self.send_request('get', *args, **kwargs)
# if content_type:
# self.assertEqual(
# bool(filter(lambda x: content_type in x, response._headers['content-type'])), True)
# return response
2014-04-30 23:52:05 +04:00
def init(self):
settings.DEBUG = True
self.client = APIClient()
# -----------------------
# T E S T H E R E
# -----------------------
2014-05-02 00:32:30 +04:00
class APITestCase1(TestCase, BaseAPITestCase):
2014-04-30 23:52:05 +04:00
"""
Case #1:
- user profile: defined
- custom registration: backend defined
2014-04-30 23:52:05 +04:00
"""
urls = 'rest_auth.test_urls'
2014-04-30 23:52:05 +04:00
USERNAME = 'person'
PASS = 'person'
2014-05-06 02:53:06 +04:00
EMAIL = "person1@world.com"
NEW_PASS = 'new-test-pass'
REGISTRATION_VIEW = 'rest_auth.runtests.RegistrationView'
# data without user profile
REGISTRATION_DATA = {
"username": USERNAME,
"password1": PASS,
"password2": PASS
}
REGISTRATION_DATA_WITH_EMAIL = REGISTRATION_DATA.copy()
REGISTRATION_DATA_WITH_EMAIL['email'] = EMAIL
BASIC_USER_DATA = {
'first_name': "John",
'last_name': 'Smith',
'email': EMAIL
}
USER_DATA = BASIC_USER_DATA.copy()
USER_DATA['newsletter_subscribe'] = True
2014-05-02 00:32:30 +04:00
2014-04-30 23:52:05 +04:00
def setUp(self):
self.init()
self.login_url = reverse('rest_login')
2014-10-02 13:40:07 +04:00
self.logout_url = reverse('rest_logout')
2014-05-02 00:32:30 +04:00
self.password_change_url = reverse('rest_password_change')
self.register_url = reverse('rest_register')
2014-05-06 02:53:06 +04:00
self.password_reset_url = reverse('rest_password_reset')
self.user_url = reverse('rest_user_details')
2014-10-15 19:36:21 +04:00
self.veirfy_email_url = reverse('rest_verify_email')
2014-10-02 13:40:07 +04:00
def _login(self):
payload = {
"username": self.USERNAME,
"password": self.PASS
}
self.post(self.login_url, data=payload, status_code=status.HTTP_200_OK)
2014-10-02 13:40:07 +04:00
def _logout(self):
self.post(self.logout_url, status=status.HTTP_200_OK)
def _generate_uid_and_token(self, user):
result = {}
from django.utils.encoding import force_bytes
from django.contrib.auth.tokens import default_token_generator
from django import VERSION
2014-10-02 14:39:47 +04:00
if VERSION[1] == 5:
2014-10-02 13:40:07 +04:00
from django.utils.http import int_to_base36
result['uid'] = int_to_base36(user.pk)
2014-10-02 14:39:47 +04:00
else:
from django.utils.http import urlsafe_base64_encode
result['uid'] = urlsafe_base64_encode(force_bytes(user.pk))
2014-10-02 13:40:07 +04:00
result['token'] = default_token_generator.make_token(user)
return result
2014-04-30 23:52:05 +04:00
def test_login(self):
payload = {
"username": self.USERNAME,
"password": self.PASS
}
# there is no users in db so it should throw error (400)
self.post(self.login_url, data=payload, status_code=400)
2014-04-30 23:52:05 +04:00
2014-05-02 00:32:30 +04:00
self.post(self.password_change_url, status_code=403)
2014-04-30 23:52:05 +04:00
# create user
user = User.objects.create_user(self.USERNAME, '', self.PASS)
self.post(self.login_url, data=payload, status_code=200)
self.assertEqual('key' in self.response.json.keys(), True)
2014-05-02 00:32:30 +04:00
self.token = self.response.json['key']
self.post(self.password_change_url, status_code=400)
# test inactive user
user.is_active = False
user.save()
self.post(self.login_url, data=payload, status_code=400)
2014-05-02 00:32:30 +04:00
# test wrong username/password
payload = {
"username": self.USERNAME + '?',
2014-05-02 00:32:30 +04:00
"password": self.PASS
}
self.post(self.login_url, data=payload, status_code=400)
2014-05-02 00:32:30 +04:00
# test empty payload
self.post(self.login_url, data={}, status_code=400)
2014-04-30 23:52:05 +04:00
2014-05-02 00:32:30 +04:00
def test_password_change(self):
login_payload = {
"username": self.USERNAME,
"password": self.PASS
}
User.objects.create_user(self.USERNAME, '', self.PASS)
2014-05-02 00:32:30 +04:00
self.post(self.login_url, data=login_payload, status_code=200)
2014-04-30 23:52:05 +04:00
self.token = self.response.json['key']
2014-05-02 00:32:30 +04:00
new_password_payload = {
"new_password1": "new_person",
"new_password2": "new_person"
}
self.post(self.password_change_url, data=new_password_payload,
status_code=200)
# user should not be able to login using old password
self.post(self.login_url, data=login_payload, status_code=400)
2014-05-02 00:32:30 +04:00
# new password should work
login_payload['password'] = new_password_payload['new_password1']
self.post(self.login_url, data=login_payload, status_code=200)
# pass1 and pass2 are not equal
new_password_payload = {
"new_password1": "new_person1",
"new_password2": "new_person"
}
self.post(self.password_change_url, data=new_password_payload,
status_code=400)
# send empty payload
self.post(self.password_change_url, data={}, status_code=400)
@override_settings(OLD_PASSWORD_FIELD_ENABLED=True)
def test_password_change_with_old_password(self):
login_payload = {
"username": self.USERNAME,
"password": self.PASS
}
User.objects.create_user(self.USERNAME, '', self.PASS)
self.post(self.login_url, data=login_payload, status_code=200)
self.token = self.response.json['key']
new_password_payload = {
"old_password": "%s!" % self.PASS, # wrong password
"new_password1": "new_person",
"new_password2": "new_person"
}
self.post(self.password_change_url, data=new_password_payload,
status_code=400)
new_password_payload = {
"old_password": self.PASS,
"new_password1": "new_person",
"new_password2": "new_person"
}
self.post(self.password_change_url, data=new_password_payload,
status_code=200)
# user should not be able to login using old password
self.post(self.login_url, data=login_payload, status_code=400)
# new password should work
login_payload['password'] = new_password_payload['new_password1']
self.post(self.login_url, data=login_payload, status_code=200)
2014-05-06 02:53:06 +04:00
def test_password_reset(self):
user = User.objects.create_user(self.USERNAME, self.EMAIL, self.PASS)
# call password reset
mail_count = len(mail.outbox)
payload = {'email': self.EMAIL}
self.post(self.password_reset_url, data=payload, status_code=200)
self.assertEqual(len(mail.outbox), mail_count + 1)
2014-05-06 02:53:06 +04:00
2014-10-02 13:40:07 +04:00
url_kwargs = self._generate_uid_and_token(user)
2014-05-06 02:53:06 +04:00
data = {
'new_password1': self.NEW_PASS,
'new_password2': self.NEW_PASS,
'uid': url_kwargs['uid'],
'token': url_kwargs['token']
2014-05-06 02:53:06 +04:00
}
url = reverse('rest_password_reset_confirm')
2014-05-06 02:53:06 +04:00
self.post(url, data=data, status_code=200)
payload = {
"username": self.USERNAME,
"password": self.NEW_PASS
}
self.post(self.login_url, data=payload, status_code=200)
def test_user_details(self):
user = User.objects.create_user(self.USERNAME, self.EMAIL, self.PASS)
payload = {
"username": self.USERNAME,
"password": self.PASS
}
self.post(self.login_url, data=payload, status_code=200)
self.token = self.response.json['key']
self.get(self.user_url, status_code=200)
2014-10-02 13:18:23 +04:00
self.patch(self.user_url, data=self.BASIC_USER_DATA, status_code=200)
user = User.objects.get(pk=user.pk)
2014-10-02 13:40:07 +04:00
self.assertEqual(user.first_name, self.response.json['first_name'])
self.assertEqual(user.last_name, self.response.json['last_name'])
self.assertEqual(user.email, self.response.json['email'])
2014-05-06 02:53:06 +04:00
def test_registration(self):
user_count = User.objects.all().count()
# test empty payload
self.post(self.register_url, data={}, status_code=400)
self.post(self.register_url, data=self.REGISTRATION_DATA, status_code=201)
self.assertEqual(User.objects.all().count(), user_count + 1)
new_user = get_user_model().objects.latest('id')
self.assertEqual(new_user.username, self.REGISTRATION_DATA['username'])
2014-10-02 13:40:07 +04:00
self._login()
self._logout()
@override_settings(
ACCOUNT_EMAIL_VERIFICATION='mandatory',
ACCOUNT_EMAIL_REQUIRED=True
)
def test_registration_with_email_verification(self):
user_count = User.objects.all().count()
mail_count = len(mail.outbox)
# test empty payload
2014-10-01 18:34:51 +04:00
self.post(self.register_url, data={},
status_code=status.HTTP_400_BAD_REQUEST)
2014-10-01 18:34:51 +04:00
self.post(self.register_url, data=self.REGISTRATION_DATA_WITH_EMAIL,
2014-10-01 18:36:34 +04:00
status_code=status.HTTP_201_CREATED)
self.assertEqual(User.objects.all().count(), user_count + 1)
self.assertEqual(len(mail.outbox), mail_count + 1)
new_user = get_user_model().objects.latest('id')
self.assertEqual(new_user.username, self.REGISTRATION_DATA['username'])
# email is not verified yet
payload = {
"username": self.USERNAME,
"password": self.PASS
}
2014-10-01 18:34:51 +04:00
self.post(self.login_url, data=payload,
status=status.HTTP_400_BAD_REQUEST)
# veirfy email
email_confirmation = new_user.emailaddress_set.get(email=self.EMAIL)\
2014-10-02 13:23:52 +04:00
.emailconfirmation_set.order_by('-created')[0]
2014-10-01 18:34:51 +04:00
self.post(self.veirfy_email_url, data={"key": email_confirmation.key},
status_code=status.HTTP_200_OK)
# try to login again
2014-10-02 13:40:07 +04:00
self._login()
self._logout()
class TestSocialAuth(TestCase, BaseAPITestCase):
urls = 'rest_auth.test_urls'
def setUp(self):
social_app = SocialApp.objects.create(
provider='facebook',
name='Facebook',
client_id='123123123',
secret='321321321',
)
site = Site.objects.get_current()
social_app.sites.add(site)
self.fb_login_url = reverse('fb_login')
@responses.activate
def test_failed_social_auth(self):
# fake response
responses.add(responses.GET, 'https://graph.facebook.com/me',
body='', status=400, content_type='application/json')
payload = {
'access_token': 'abc123'
}
self.post(self.fb_login_url, data=payload, status_code=400)
@responses.activate
def test_social_auth(self):
# fake response for facebook call
resp_body = '{"id":"123123123123","first_name":"John","gender":"male","last_name":"Smith","link":"https:\\/\\/www.facebook.com\\/john.smith","locale":"en_US","name":"John Smith","timezone":2,"updated_time":"2014-08-13T10:14:38+0000","username":"john.smith","verified":true}'
responses.add(responses.GET, 'https://graph.facebook.com/me',
body=resp_body, status=200, content_type='application/json')
payload = {
'access_token': 'abc123'
}
self.post(self.fb_login_url, data=payload, status_code=200)
self.assertIn('key', self.response.json.keys())