2020-04-02 17:01:07 +03:00
|
|
|
import json
|
|
|
|
|
2020-03-01 08:56:21 +03:00
|
|
|
from allauth.account import app_settings as account_app_settings
|
|
|
|
from django.conf import settings
|
2014-05-02 00:32:30 +04:00
|
|
|
from django.contrib.auth import get_user_model
|
2014-05-06 02:53:06 +04:00
|
|
|
from django.core import mail
|
2020-03-01 08:56:21 +03:00
|
|
|
from django.test import TestCase, override_settings
|
2015-11-19 11:38:57 +03:00
|
|
|
from django.utils.encoding import force_text
|
2017-10-02 22:38:06 +03:00
|
|
|
from rest_framework import status
|
|
|
|
from rest_framework.test import APIRequestFactory
|
|
|
|
|
2020-04-02 17:01:07 +03:00
|
|
|
from dj_rest_auth.registration.app_settings import register_permission_classes
|
|
|
|
from dj_rest_auth.registration.views import RegisterView
|
2020-03-01 08:56:21 +03:00
|
|
|
from .mixins import CustomPermissionClass, TestsMixin
|
2014-05-02 00:32:30 +04:00
|
|
|
|
2017-12-04 16:52:58 +03:00
|
|
|
try:
|
|
|
|
from django.urls import reverse
|
|
|
|
except ImportError:
|
|
|
|
from django.core.urlresolvers import reverse
|
|
|
|
|
2014-05-02 00:32:30 +04:00
|
|
|
|
2016-06-28 21:14:05 +03:00
|
|
|
@override_settings(ROOT_URLCONF="tests.urls")
|
2017-10-02 22:38:06 +03:00
|
|
|
class APIBasicTests(TestsMixin, TestCase):
|
2014-04-30 23:52:05 +04:00
|
|
|
"""
|
2014-07-08 13:36:59 +04:00
|
|
|
Case #1:
|
|
|
|
- user profile: defined
|
|
|
|
- custom registration: backend defined
|
2014-04-30 23:52:05 +04:00
|
|
|
"""
|
|
|
|
|
2016-06-28 21:14:05 +03:00
|
|
|
# urls = 'tests.urls'
|
2014-10-08 14:19:15 +04:00
|
|
|
|
2014-04-30 23:52:05 +04:00
|
|
|
USERNAME = 'person'
|
|
|
|
PASS = 'person'
|
2014-05-06 02:53:06 +04:00
|
|
|
EMAIL = "person1@world.com"
|
|
|
|
NEW_PASS = 'new-test-pass'
|
2014-07-08 13:36:59 +04:00
|
|
|
REGISTRATION_VIEW = 'rest_auth.runtests.RegistrationView'
|
|
|
|
|
|
|
|
# data without user profile
|
2014-10-01 16:13:21 +04:00
|
|
|
REGISTRATION_DATA = {
|
2014-07-08 13:36:59 +04:00
|
|
|
"username": USERNAME,
|
2014-10-01 16:13:21 +04:00
|
|
|
"password1": PASS,
|
|
|
|
"password2": PASS
|
2014-07-08 13:36:59 +04:00
|
|
|
}
|
|
|
|
|
2014-10-01 17:31:10 +04:00
|
|
|
REGISTRATION_DATA_WITH_EMAIL = REGISTRATION_DATA.copy()
|
|
|
|
REGISTRATION_DATA_WITH_EMAIL['email'] = EMAIL
|
|
|
|
|
2014-07-08 13:36:59 +04:00
|
|
|
BASIC_USER_DATA = {
|
|
|
|
'first_name': "John",
|
|
|
|
'last_name': 'Smith',
|
|
|
|
'email': EMAIL
|
|
|
|
}
|
|
|
|
USER_DATA = BASIC_USER_DATA.copy()
|
|
|
|
USER_DATA['newsletter_subscribe'] = True
|
2014-05-02 00:32:30 +04:00
|
|
|
|
2014-04-30 23:52:05 +04:00
|
|
|
def setUp(self):
|
|
|
|
self.init()
|
2014-10-02 13:40:07 +04:00
|
|
|
|
|
|
|
def _generate_uid_and_token(self, user):
|
|
|
|
result = {}
|
|
|
|
from django.utils.encoding import force_bytes
|
|
|
|
from django.contrib.auth.tokens import default_token_generator
|
2015-11-24 00:17:32 +03:00
|
|
|
from django.utils.http import urlsafe_base64_encode
|
|
|
|
|
|
|
|
result['uid'] = urlsafe_base64_encode(force_bytes(user.pk))
|
2014-10-02 13:40:07 +04:00
|
|
|
result['token'] = default_token_generator.make_token(user)
|
|
|
|
return result
|
2014-04-30 23:52:05 +04:00
|
|
|
|
2016-06-28 21:14:05 +03:00
|
|
|
@override_settings(ACCOUNT_AUTHENTICATION_METHOD=account_app_settings.AuthenticationMethod.EMAIL)
|
|
|
|
def test_login_failed_email_validation(self):
|
|
|
|
payload = {
|
|
|
|
"email": '',
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = self.post(self.login_url, data=payload, status_code=400)
|
|
|
|
self.assertEqual(resp.json['non_field_errors'][0], u'Must include "email" and "password".')
|
|
|
|
|
|
|
|
@override_settings(ACCOUNT_AUTHENTICATION_METHOD=account_app_settings.AuthenticationMethod.USERNAME)
|
|
|
|
def test_login_failed_username_validation(self):
|
|
|
|
payload = {
|
|
|
|
"username": '',
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = self.post(self.login_url, data=payload, status_code=400)
|
|
|
|
self.assertEqual(resp.json['non_field_errors'][0], u'Must include "username" and "password".')
|
|
|
|
|
|
|
|
@override_settings(ACCOUNT_AUTHENTICATION_METHOD=account_app_settings.AuthenticationMethod.USERNAME_EMAIL)
|
|
|
|
def test_login_failed_username_email_validation(self):
|
|
|
|
payload = {
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = self.post(self.login_url, data=payload, status_code=400)
|
|
|
|
self.assertEqual(resp.json['non_field_errors'][0], u'Must include either "username" or "email" and "password".')
|
|
|
|
|
|
|
|
def test_allauth_login_with_username(self):
|
2014-04-30 23:52:05 +04:00
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
2014-10-01 17:31:10 +04:00
|
|
|
# there is no users in db so it should throw error (400)
|
|
|
|
self.post(self.login_url, data=payload, status_code=400)
|
2014-04-30 23:52:05 +04:00
|
|
|
|
2014-05-02 00:32:30 +04:00
|
|
|
self.post(self.password_change_url, status_code=403)
|
2014-04-30 23:52:05 +04:00
|
|
|
|
|
|
|
# create user
|
2015-04-13 16:19:54 +03:00
|
|
|
user = get_user_model().objects.create_user(self.USERNAME, '', self.PASS)
|
2014-04-30 23:52:05 +04:00
|
|
|
|
|
|
|
self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
self.assertEqual('key' in self.response.json.keys(), True)
|
2014-05-02 00:32:30 +04:00
|
|
|
self.token = self.response.json['key']
|
|
|
|
|
|
|
|
self.post(self.password_change_url, status_code=400)
|
|
|
|
|
|
|
|
# test inactive user
|
|
|
|
user.is_active = False
|
|
|
|
user.save()
|
2014-10-01 17:31:10 +04:00
|
|
|
self.post(self.login_url, data=payload, status_code=400)
|
2014-05-02 00:32:30 +04:00
|
|
|
|
|
|
|
# test wrong username/password
|
|
|
|
payload = {
|
2014-10-01 16:13:21 +04:00
|
|
|
"username": self.USERNAME + '?',
|
2014-05-02 00:32:30 +04:00
|
|
|
"password": self.PASS
|
|
|
|
}
|
2014-10-01 17:31:10 +04:00
|
|
|
self.post(self.login_url, data=payload, status_code=400)
|
2014-05-02 00:32:30 +04:00
|
|
|
|
|
|
|
# test empty payload
|
|
|
|
self.post(self.login_url, data={}, status_code=400)
|
2014-04-30 23:52:05 +04:00
|
|
|
|
2016-06-28 21:14:05 +03:00
|
|
|
@override_settings(ACCOUNT_AUTHENTICATION_METHOD=account_app_settings.AuthenticationMethod.EMAIL)
|
|
|
|
def test_allauth_login_with_email(self):
|
|
|
|
payload = {
|
|
|
|
"email": self.EMAIL,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
# there is no users in db so it should throw error (400)
|
|
|
|
self.post(self.login_url, data=payload, status_code=400)
|
|
|
|
|
|
|
|
self.post(self.password_change_url, status_code=403)
|
|
|
|
|
|
|
|
# create user
|
2016-06-28 21:20:53 +03:00
|
|
|
get_user_model().objects.create_user(self.EMAIL, email=self.EMAIL, password=self.PASS)
|
2016-06-28 21:14:05 +03:00
|
|
|
|
|
|
|
self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
|
2016-02-16 08:42:18 +03:00
|
|
|
@override_settings(REST_USE_JWT=True)
|
2020-03-22 13:52:26 +03:00
|
|
|
def test_login_jwt(self):
|
2016-02-16 08:42:18 +03:00
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
2016-03-01 14:51:01 +03:00
|
|
|
get_user_model().objects.create_user(self.USERNAME, '', self.PASS)
|
2016-02-16 08:42:18 +03:00
|
|
|
|
2020-03-22 13:52:26 +03:00
|
|
|
self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
self.assertEqual('access_token' in self.response.json.keys(), True)
|
|
|
|
self.token = self.response.json['access_token']
|
|
|
|
|
|
|
|
def test_login_by_email(self):
|
|
|
|
# starting test without allauth app
|
|
|
|
settings.INSTALLED_APPS.remove('allauth')
|
|
|
|
|
|
|
|
payload = {
|
|
|
|
"email": self.EMAIL.lower(),
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
# there is no users in db so it should throw error (400)
|
|
|
|
self.post(self.login_url, data=payload, status_code=400)
|
|
|
|
|
|
|
|
self.post(self.password_change_url, status_code=403)
|
|
|
|
|
|
|
|
# create user
|
|
|
|
user = get_user_model().objects.create_user(self.USERNAME, self.EMAIL, self.PASS)
|
|
|
|
|
|
|
|
# test auth by email
|
|
|
|
self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
self.assertEqual('key' in self.response.json.keys(), True)
|
|
|
|
self.token = self.response.json['key']
|
|
|
|
|
|
|
|
# test auth by email in different case
|
2015-12-13 23:43:33 +03:00
|
|
|
payload = {
|
2020-03-22 13:52:26 +03:00
|
|
|
"email": self.EMAIL.upper(),
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
self.assertEqual('key' in self.response.json.keys(), True)
|
|
|
|
self.token = self.response.json['key']
|
|
|
|
|
|
|
|
# test inactive user
|
|
|
|
user.is_active = False
|
|
|
|
user.save()
|
|
|
|
self.post(self.login_url, data=payload, status_code=400)
|
|
|
|
|
|
|
|
# test wrong email/password
|
|
|
|
payload = {
|
|
|
|
"email": 't' + self.EMAIL,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
self.post(self.login_url, data=payload, status_code=400)
|
|
|
|
|
|
|
|
# test empty payload
|
|
|
|
self.post(self.login_url, data={}, status_code=400)
|
|
|
|
|
|
|
|
# bring back allauth
|
|
|
|
settings.INSTALLED_APPS.append('allauth')
|
|
|
|
|
|
|
|
def test_password_change(self):
|
|
|
|
login_payload = {
|
2014-11-12 13:51:22 +03:00
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
2015-04-13 16:19:54 +03:00
|
|
|
get_user_model().objects.create_user(self.USERNAME, '', self.PASS)
|
2020-03-22 13:52:26 +03:00
|
|
|
self.post(self.login_url, data=login_payload, status_code=200)
|
|
|
|
self.token = self.response.json['key']
|
|
|
|
|
|
|
|
new_password_payload = {
|
|
|
|
"new_password1": "new_person",
|
|
|
|
"new_password2": "new_person"
|
|
|
|
}
|
|
|
|
self.post(
|
|
|
|
self.password_change_url,
|
|
|
|
data=new_password_payload,
|
|
|
|
status_code=200
|
|
|
|
)
|
|
|
|
|
|
|
|
# user should not be able to login using old password
|
|
|
|
self.post(self.login_url, data=login_payload, status_code=400)
|
|
|
|
|
|
|
|
# new password should work
|
|
|
|
login_payload['password'] = new_password_payload['new_password1']
|
|
|
|
self.post(self.login_url, data=login_payload, status_code=200)
|
|
|
|
|
|
|
|
# pass1 and pass2 are not equal
|
|
|
|
new_password_payload = {
|
|
|
|
"new_password1": "new_person1",
|
|
|
|
"new_password2": "new_person"
|
|
|
|
}
|
|
|
|
self.post(
|
|
|
|
self.password_change_url,
|
|
|
|
data=new_password_payload,
|
|
|
|
status_code=400
|
|
|
|
)
|
|
|
|
|
|
|
|
# send empty payload
|
|
|
|
self.post(self.password_change_url, data={}, status_code=400)
|
|
|
|
|
|
|
|
@override_settings(OLD_PASSWORD_FIELD_ENABLED=True)
|
|
|
|
def test_password_change_with_old_password(self):
|
|
|
|
login_payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
get_user_model().objects.create_user(self.USERNAME, '', self.PASS)
|
|
|
|
self.post(self.login_url, data=login_payload, status_code=200)
|
|
|
|
self.token = self.response.json['key']
|
|
|
|
|
|
|
|
new_password_payload = {
|
|
|
|
"old_password": "%s!" % self.PASS, # wrong password
|
|
|
|
"new_password1": "new_person",
|
|
|
|
"new_password2": "new_person"
|
|
|
|
}
|
|
|
|
self.post(
|
|
|
|
self.password_change_url,
|
|
|
|
data=new_password_payload,
|
|
|
|
status_code=400
|
|
|
|
)
|
|
|
|
|
|
|
|
new_password_payload = {
|
|
|
|
"old_password": self.PASS,
|
|
|
|
"new_password1": "new_person",
|
|
|
|
"new_password2": "new_person"
|
|
|
|
}
|
|
|
|
self.post(
|
|
|
|
self.password_change_url,
|
|
|
|
data=new_password_payload,
|
|
|
|
status_code=200
|
|
|
|
)
|
|
|
|
|
|
|
|
# user should not be able to login using old password
|
|
|
|
self.post(self.login_url, data=login_payload, status_code=400)
|
|
|
|
|
|
|
|
# new password should work
|
|
|
|
login_payload['password'] = new_password_payload['new_password1']
|
|
|
|
self.post(self.login_url, data=login_payload, status_code=200)
|
|
|
|
|
|
|
|
def test_password_reset(self):
|
|
|
|
user = get_user_model().objects.create_user(self.USERNAME, self.EMAIL, self.PASS)
|
|
|
|
|
|
|
|
# call password reset
|
|
|
|
mail_count = len(mail.outbox)
|
|
|
|
payload = {'email': self.EMAIL}
|
|
|
|
self.post(self.password_reset_url, data=payload, status_code=200)
|
|
|
|
self.assertEqual(len(mail.outbox), mail_count + 1)
|
|
|
|
|
|
|
|
url_kwargs = self._generate_uid_and_token(user)
|
|
|
|
url = reverse('rest_password_reset_confirm')
|
|
|
|
|
|
|
|
# wrong token
|
|
|
|
data = {
|
|
|
|
'new_password1': self.NEW_PASS,
|
|
|
|
'new_password2': self.NEW_PASS,
|
|
|
|
'uid': force_text(url_kwargs['uid']),
|
|
|
|
'token': '-wrong-token-'
|
|
|
|
}
|
|
|
|
self.post(url, data=data, status_code=400)
|
|
|
|
|
|
|
|
# wrong uid
|
|
|
|
data = {
|
|
|
|
'new_password1': self.NEW_PASS,
|
|
|
|
'new_password2': self.NEW_PASS,
|
|
|
|
'uid': '-wrong-uid-',
|
|
|
|
'token': url_kwargs['token']
|
|
|
|
}
|
|
|
|
self.post(url, data=data, status_code=400)
|
|
|
|
|
|
|
|
# wrong token and uid
|
|
|
|
data = {
|
|
|
|
'new_password1': self.NEW_PASS,
|
|
|
|
'new_password2': self.NEW_PASS,
|
|
|
|
'uid': '-wrong-uid-',
|
|
|
|
'token': '-wrong-token-'
|
|
|
|
}
|
|
|
|
self.post(url, data=data, status_code=400)
|
|
|
|
|
|
|
|
# valid payload
|
|
|
|
data = {
|
|
|
|
'new_password1': self.NEW_PASS,
|
|
|
|
'new_password2': self.NEW_PASS,
|
|
|
|
'uid': force_text(url_kwargs['uid']),
|
|
|
|
'token': url_kwargs['token']
|
|
|
|
}
|
|
|
|
url = reverse('rest_password_reset_confirm')
|
|
|
|
self.post(url, data=data, status_code=200)
|
|
|
|
|
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.NEW_PASS
|
|
|
|
}
|
2014-05-06 02:53:06 +04:00
|
|
|
self.post(self.login_url, data=payload, status_code=200)
|
2020-03-22 13:52:26 +03:00
|
|
|
|
|
|
|
def test_password_reset_with_email_in_different_case(self):
|
|
|
|
get_user_model().objects.create_user(self.USERNAME, self.EMAIL.lower(), self.PASS)
|
|
|
|
|
|
|
|
# call password reset in upper case
|
|
|
|
mail_count = len(mail.outbox)
|
|
|
|
payload = {'email': self.EMAIL.upper()}
|
|
|
|
self.post(self.password_reset_url, data=payload, status_code=200)
|
|
|
|
self.assertEqual(len(mail.outbox), mail_count + 1)
|
|
|
|
|
|
|
|
def test_password_reset_with_invalid_email(self):
|
|
|
|
"""
|
|
|
|
Invalid email should not raise error, as this would leak users
|
|
|
|
"""
|
|
|
|
get_user_model().objects.create_user(self.USERNAME, self.EMAIL, self.PASS)
|
|
|
|
|
|
|
|
# call password reset
|
|
|
|
mail_count = len(mail.outbox)
|
|
|
|
payload = {'email': 'nonexisting@email.com'}
|
|
|
|
self.post(self.password_reset_url, data=payload, status_code=200)
|
|
|
|
self.assertEqual(len(mail.outbox), mail_count)
|
|
|
|
|
|
|
|
def test_user_details(self):
|
|
|
|
user = get_user_model().objects.create_user(self.USERNAME, self.EMAIL, self.PASS)
|
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
self.token = self.response.json['key']
|
|
|
|
self.get(self.user_url, status_code=200)
|
|
|
|
|
|
|
|
self.patch(self.user_url, data=self.BASIC_USER_DATA, status_code=200)
|
|
|
|
user = get_user_model().objects.get(pk=user.pk)
|
|
|
|
self.assertEqual(user.first_name, self.response.json['first_name'])
|
|
|
|
self.assertEqual(user.last_name, self.response.json['last_name'])
|
|
|
|
self.assertEqual(user.email, self.response.json['email'])
|
2014-05-06 02:53:06 +04:00
|
|
|
|
2016-02-16 08:42:18 +03:00
|
|
|
@override_settings(REST_USE_JWT=True)
|
2020-03-22 13:52:26 +03:00
|
|
|
def test_user_details_using_jwt(self):
|
|
|
|
user = get_user_model().objects.create_user(self.USERNAME, self.EMAIL, self.PASS)
|
2016-02-16 08:42:18 +03:00
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
2020-03-22 13:52:26 +03:00
|
|
|
self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
self.token = self.response.json['access_token']
|
|
|
|
self.get(self.user_url, status_code=200)
|
|
|
|
|
|
|
|
self.patch(self.user_url, data=self.BASIC_USER_DATA, status_code=200)
|
|
|
|
user = get_user_model().objects.get(pk=user.pk)
|
|
|
|
self.assertEqual(user.email, self.response.json['email'])
|
|
|
|
|
|
|
|
def test_registration(self):
|
|
|
|
user_count = get_user_model().objects.all().count()
|
|
|
|
|
|
|
|
# test empty payload
|
|
|
|
self.post(self.register_url, data={}, status_code=400)
|
|
|
|
|
|
|
|
result = self.post(self.register_url, data=self.REGISTRATION_DATA, status_code=201)
|
|
|
|
self.assertIn('key', result.data)
|
|
|
|
self.assertEqual(get_user_model().objects.all().count(), user_count + 1)
|
|
|
|
|
|
|
|
new_user = get_user_model().objects.latest('id')
|
|
|
|
self.assertEqual(new_user.username, self.REGISTRATION_DATA['username'])
|
|
|
|
|
|
|
|
self._login()
|
|
|
|
self._logout()
|
|
|
|
|
|
|
|
@override_settings(REST_AUTH_REGISTER_PERMISSION_CLASSES=(CustomPermissionClass,))
|
|
|
|
def test_registration_with_custom_permission_class(self):
|
|
|
|
class CustomRegisterView(RegisterView):
|
|
|
|
permission_classes = register_permission_classes()
|
|
|
|
authentication_classes = ()
|
|
|
|
|
|
|
|
factory = APIRequestFactory()
|
|
|
|
request = factory.post('/customer/details', self.REGISTRATION_DATA, format='json')
|
|
|
|
|
|
|
|
response = CustomRegisterView.as_view()(request)
|
|
|
|
self.assertEqual(response.data['detail'], CustomPermissionClass.message)
|
|
|
|
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
|
|
|
|
|
|
|
|
@override_settings(REST_USE_JWT=True)
|
|
|
|
def test_registration_with_jwt(self):
|
|
|
|
user_count = get_user_model().objects.all().count()
|
|
|
|
|
|
|
|
self.post(self.register_url, data={}, status_code=400)
|
|
|
|
|
|
|
|
result = self.post(self.register_url, data=self.REGISTRATION_DATA, status_code=201)
|
|
|
|
self.assertIn('access_token', result.data)
|
|
|
|
self.assertEqual(get_user_model().objects.all().count(), user_count + 1)
|
|
|
|
|
|
|
|
self._login()
|
|
|
|
self._logout()
|
2016-02-16 08:42:18 +03:00
|
|
|
|
2016-01-05 16:56:11 +03:00
|
|
|
def test_registration_with_invalid_password(self):
|
|
|
|
data = self.REGISTRATION_DATA.copy()
|
|
|
|
data['password2'] = 'foobar'
|
|
|
|
|
|
|
|
self.post(self.register_url, data=data, status_code=400)
|
|
|
|
|
2014-10-01 17:31:10 +04:00
|
|
|
@override_settings(
|
|
|
|
ACCOUNT_EMAIL_VERIFICATION='mandatory',
|
2016-07-28 21:14:26 +03:00
|
|
|
ACCOUNT_EMAIL_REQUIRED=True,
|
|
|
|
ACCOUNT_EMAIL_CONFIRMATION_HMAC=False
|
2014-10-01 17:31:10 +04:00
|
|
|
)
|
|
|
|
def test_registration_with_email_verification(self):
|
2015-04-13 16:19:54 +03:00
|
|
|
user_count = get_user_model().objects.all().count()
|
2014-10-01 17:31:10 +04:00
|
|
|
mail_count = len(mail.outbox)
|
|
|
|
|
|
|
|
# test empty payload
|
2015-04-28 11:22:08 +03:00
|
|
|
self.post(
|
|
|
|
self.register_url,
|
|
|
|
data={},
|
|
|
|
status_code=status.HTTP_400_BAD_REQUEST
|
|
|
|
)
|
2014-10-01 17:31:10 +04:00
|
|
|
|
2016-01-12 00:33:14 +03:00
|
|
|
result = self.post(
|
2015-04-28 11:22:08 +03:00
|
|
|
self.register_url,
|
|
|
|
data=self.REGISTRATION_DATA_WITH_EMAIL,
|
|
|
|
status_code=status.HTTP_201_CREATED
|
|
|
|
)
|
2016-01-12 00:33:14 +03:00
|
|
|
self.assertNotIn('key', result.data)
|
2015-04-13 16:19:54 +03:00
|
|
|
self.assertEqual(get_user_model().objects.all().count(), user_count + 1)
|
2014-10-01 17:31:10 +04:00
|
|
|
self.assertEqual(len(mail.outbox), mail_count + 1)
|
|
|
|
new_user = get_user_model().objects.latest('id')
|
|
|
|
self.assertEqual(new_user.username, self.REGISTRATION_DATA['username'])
|
|
|
|
|
2020-06-02 19:25:00 +03:00
|
|
|
# test browsable endpoint
|
|
|
|
result = self.get(
|
|
|
|
self.verify_email_url
|
|
|
|
)
|
|
|
|
self.assertEqual(result.status_code, 405)
|
|
|
|
self.assertEqual(result.json['detail'], 'Method "GET" not allowed.')
|
|
|
|
|
2014-10-01 17:31:10 +04:00
|
|
|
# email is not verified yet
|
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
2015-04-28 11:22:08 +03:00
|
|
|
self.post(
|
|
|
|
self.login_url,
|
|
|
|
data=payload,
|
|
|
|
status=status.HTTP_400_BAD_REQUEST
|
|
|
|
)
|
2014-10-01 18:34:51 +04:00
|
|
|
|
2015-04-28 11:22:08 +03:00
|
|
|
# verify email
|
2020-03-28 19:09:07 +03:00
|
|
|
email_confirmation = new_user.emailaddress_set.get(email=self.EMAIL) \
|
2014-10-02 13:23:52 +04:00
|
|
|
.emailconfirmation_set.order_by('-created')[0]
|
2015-04-28 11:22:08 +03:00
|
|
|
self.post(
|
2017-01-29 18:17:33 +03:00
|
|
|
self.verify_email_url,
|
2015-04-28 11:22:08 +03:00
|
|
|
data={"key": email_confirmation.key},
|
|
|
|
status_code=status.HTTP_200_OK
|
|
|
|
)
|
2014-10-01 18:34:51 +04:00
|
|
|
|
|
|
|
# try to login again
|
2014-10-02 13:40:07 +04:00
|
|
|
self._login()
|
|
|
|
self._logout()
|
2016-01-09 06:11:35 +03:00
|
|
|
|
|
|
|
@override_settings(ACCOUNT_LOGOUT_ON_GET=True)
|
|
|
|
def test_logout_on_get(self):
|
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
|
|
|
|
# create user
|
2016-03-01 14:51:01 +03:00
|
|
|
get_user_model().objects.create_user(self.USERNAME, '', self.PASS)
|
2016-01-09 06:11:35 +03:00
|
|
|
|
|
|
|
self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
self.get(self.logout_url, status=status.HTTP_200_OK)
|
|
|
|
|
|
|
|
@override_settings(ACCOUNT_LOGOUT_ON_GET=False)
|
|
|
|
def test_logout_on_post_only(self):
|
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
|
|
|
|
# create user
|
2016-03-01 14:51:01 +03:00
|
|
|
get_user_model().objects.create_user(self.USERNAME, '', self.PASS)
|
2016-01-09 06:11:35 +03:00
|
|
|
|
|
|
|
self.post(self.login_url, data=payload, status_code=status.HTTP_200_OK)
|
|
|
|
self.get(self.logout_url, status_code=status.HTTP_405_METHOD_NOT_ALLOWED)
|
2020-03-22 13:52:26 +03:00
|
|
|
|
|
|
|
@override_settings(REST_USE_JWT=True)
|
|
|
|
@override_settings(JWT_AUTH_COOKIE='jwt-auth')
|
|
|
|
def test_login_jwt_sets_cookie(self):
|
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
get_user_model().objects.create_user(self.USERNAME, '', self.PASS)
|
|
|
|
resp = self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
self.assertTrue('jwt-auth' in resp.cookies.keys())
|
|
|
|
|
|
|
|
@override_settings(REST_USE_JWT=True)
|
|
|
|
@override_settings(JWT_AUTH_COOKIE='jwt-auth')
|
|
|
|
def test_logout_jwt_deletes_cookie(self):
|
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
get_user_model().objects.create_user(self.USERNAME, '', self.PASS)
|
|
|
|
self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
resp = self.post(self.logout_url, status=200)
|
|
|
|
self.assertEqual('', resp.cookies.get('jwt-auth').value)
|
|
|
|
|
|
|
|
@override_settings(REST_USE_JWT=True)
|
|
|
|
@override_settings(JWT_AUTH_COOKIE='jwt-auth')
|
|
|
|
@override_settings(REST_FRAMEWORK=dict(
|
|
|
|
DEFAULT_AUTHENTICATION_CLASSES=[
|
|
|
|
'dj_rest_auth.utils.JWTCookieAuthentication'
|
|
|
|
]
|
|
|
|
))
|
|
|
|
@override_settings(REST_SESSION_LOGIN=False)
|
|
|
|
def test_cookie_authentication(self):
|
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
get_user_model().objects.create_user(self.USERNAME, '', self.PASS)
|
|
|
|
resp = self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
self.assertEqual(['jwt-auth'], list(resp.cookies.keys()))
|
|
|
|
resp = self.get('/protected-view/')
|
2020-03-28 19:09:07 +03:00
|
|
|
self.assertEquals(resp.status_code, 200)
|
2020-04-02 04:28:02 +03:00
|
|
|
|
2020-04-02 17:01:07 +03:00
|
|
|
@override_settings(REST_USE_JWT=True)
|
2020-04-10 03:53:04 +03:00
|
|
|
def test_blacklisting_not_installed(self):
|
|
|
|
settings.INSTALLED_APPS.remove('rest_framework_simplejwt.token_blacklist')
|
2020-04-02 17:01:07 +03:00
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
get_user_model().objects.create_user(self.USERNAME, '', self.PASS)
|
|
|
|
resp = self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
token = resp.data['refresh_token']
|
|
|
|
resp = self.post(self.logout_url, status=200, data={'refresh': token})
|
2020-04-10 03:53:04 +03:00
|
|
|
self.assertEqual(resp.status_code, 200)
|
|
|
|
self.assertEqual(resp.data["detail"],
|
|
|
|
"Neither cookies or blacklist are enabled, so the token has not been deleted server side. "
|
|
|
|
"Please make sure the token is deleted client side.")
|
2020-04-02 17:01:07 +03:00
|
|
|
|
2020-04-02 04:28:02 +03:00
|
|
|
@override_settings(REST_USE_JWT=True)
|
|
|
|
def test_blacklisting(self):
|
|
|
|
payload = {
|
|
|
|
"username": self.USERNAME,
|
|
|
|
"password": self.PASS
|
|
|
|
}
|
|
|
|
get_user_model().objects.create_user(self.USERNAME, '', self.PASS)
|
2020-04-02 17:01:07 +03:00
|
|
|
resp = self.post(self.login_url, data=payload, status_code=200)
|
|
|
|
token = resp.data['refresh_token']
|
2020-04-10 04:00:48 +03:00
|
|
|
# test refresh token not included in request data
|
2020-04-02 04:28:02 +03:00
|
|
|
resp = self.post(self.logout_url, status=200)
|
2020-04-02 17:01:07 +03:00
|
|
|
self.assertEqual(resp.status_code, 401)
|
2020-04-10 04:00:48 +03:00
|
|
|
# test token is invalid or expired
|
2020-04-02 17:01:07 +03:00
|
|
|
resp = self.post(self.logout_url, status=200, data={'refresh': '1'})
|
2020-04-10 04:00:48 +03:00
|
|
|
self.assertEqual(resp.status_code, 401)
|
|
|
|
# test successful logout
|
2020-04-02 17:01:07 +03:00
|
|
|
resp = self.post(self.logout_url, status=200, data={'refresh': token})
|
|
|
|
self.assertEqual(resp.status_code, 200)
|
2020-04-10 04:00:48 +03:00
|
|
|
# test token is blacklisted
|
2020-04-02 17:01:07 +03:00
|
|
|
resp = self.post(self.logout_url, status=200, data={'refresh': token})
|
2020-04-10 04:00:48 +03:00
|
|
|
self.assertEqual(resp.status_code, 401)
|
|
|
|
# test other TokenError, AttributeError, TypeError (invalid format)
|
2020-04-02 17:01:07 +03:00
|
|
|
resp = self.post(self.logout_url, status=200, data=json.dumps({'refresh': token}))
|
|
|
|
self.assertEqual(resp.status_code, 500)
|