2013-04-09 09:05:55 +04:00
# Copyright (c) 2013 AnsibleWorks, Inc.
2013-03-26 03:02:52 +04:00
#
2013-04-09 09:05:55 +04:00
# This file is part of Ansible Commander.
#
2013-03-26 03:02:52 +04:00
# Ansible Commander is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
2013-04-09 09:05:55 +04:00
# the Free Software Foundation, version 3 of the License.
2013-03-26 03:02:52 +04:00
#
# Ansible Commander is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
2013-04-09 09:05:55 +04:00
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
2013-03-26 03:02:52 +04:00
# GNU General Public License for more details.
2013-04-09 09:05:55 +04:00
#
2013-03-26 03:02:52 +04:00
# You should have received a copy of the GNU General Public License
2013-04-09 09:05:55 +04:00
# along with Ansible Commander. If not, see <http://www.gnu.org/licenses/>.
2013-03-24 02:36:28 +04:00
import json
from django . contrib . auth . models import User as DjangoUser
import django . test
from django . test . client import Client
from lib . main . models import *
from lib . main . tests . base import BaseTest
class UsersTest ( BaseTest ) :
def collection ( self ) :
return ' /api/v1/users/ '
def setUp ( self ) :
2013-03-24 21:31:46 +04:00
super ( UsersTest , self ) . setUp ( )
2013-03-24 20:36:42 +04:00
self . setup_users ( )
2013-03-24 21:31:46 +04:00
self . organizations = self . make_organizations ( self . super_django_user , 1 )
self . organizations [ 0 ] . admins . add ( self . normal_django_user )
self . organizations [ 0 ] . users . add ( self . other_django_user )
2013-03-24 23:00:01 +04:00
self . organizations [ 0 ] . users . add ( self . normal_django_user )
2013-03-24 02:36:28 +04:00
2013-03-24 21:31:46 +04:00
def test_only_super_user_or_org_admin_can_add_users ( self ) :
2013-03-24 20:36:42 +04:00
url = ' /api/v1/users/ '
new_user = dict ( username = ' blippy ' )
2013-03-24 21:31:46 +04:00
new_user2 = dict ( username = ' blippy2 ' )
2013-03-24 20:36:42 +04:00
self . post ( url , expect = 401 , data = new_user , auth = None )
self . post ( url , expect = 401 , data = new_user , auth = self . get_invalid_credentials ( ) )
self . post ( url , expect = 403 , data = new_user , auth = self . get_other_credentials ( ) )
self . post ( url , expect = 201 , data = new_user , auth = self . get_super_credentials ( ) )
self . post ( url , expect = 400 , data = new_user , auth = self . get_super_credentials ( ) )
2013-03-24 21:31:46 +04:00
self . post ( url , expect = 201 , data = new_user2 , auth = self . get_normal_credentials ( ) )
self . post ( url , expect = 400 , data = new_user2 , auth = self . get_normal_credentials ( ) )
2013-03-24 20:36:42 +04:00
def test_ordinary_user_can_modify_some_fields_about_himself_but_not_all_and_passwords_work ( self ) :
detail_url = ' /api/v1/users/ %s / ' % self . other_django_user . pk
data = self . get ( detail_url , expect = 200 , auth = self . get_other_credentials ( ) )
# can't change first_name, last_name, etc
data [ ' last_name ' ] = " NewLastName "
self . put ( detail_url , data , expect = 403 , auth = self . get_other_credentials ( ) )
# can't change username
data [ ' username ' ] = ' newUsername '
self . put ( detail_url , data , expect = 403 , auth = self . get_other_credentials ( ) )
# if superuser, CAN change lastname and username and such
self . put ( detail_url , data , expect = 200 , auth = self . get_super_credentials ( ) )
# and user can still login
creds = self . get_other_credentials ( )
creds = ( ' newUsername ' , creds [ 1 ] )
data = self . get ( detail_url , expect = 200 , auth = creds )
# user can change their password (submit as text) and can still login
# and password is not stored as plaintext
data [ ' password ' ] = ' newPassWord1234Changed '
changed = self . put ( detail_url , data , expect = 200 , auth = creds )
creds = ( creds [ 0 ] , data [ ' password ' ] )
self . get ( detail_url , expect = 200 , auth = creds )
# make another nobody user, and make sure they can't send any edits
obj = User . objects . create ( username = ' new_user ' )
obj . set_password ( ' new_user ' )
obj . save ( )
hacked = dict ( password = ' asdf ' )
changed = self . put ( detail_url , hacked , expect = 403 , auth = ( ' new_user ' , ' new_user ' ) )
hacked = dict ( username = ' asdf ' )
changed = self . put ( detail_url , hacked , expect = 403 , auth = ( ' new_user ' , ' new_user ' ) )
# password is not stored in plaintext
self . assertTrue ( User . objects . get ( pk = self . normal_django_user . pk ) . password != data [ ' password ' ] )
def test_user_created_with_password_can_login ( self ) :
2013-03-24 02:36:28 +04:00
2013-03-24 21:31:46 +04:00
# this is something an org admin can do...
url = ' /api/v1/users/ '
data = dict ( username = ' username ' , password = ' password ' )
data2 = dict ( username = ' username2 ' , password = ' password2 ' )
data = self . post ( url , expect = 201 , data = data , auth = self . get_normal_credentials ( ) )
2013-03-24 02:36:28 +04:00
2013-03-24 21:31:46 +04:00
# verify that the login works...
self . get ( url , expect = 200 , auth = ( ' username ' , ' password ' ) )
2013-03-24 02:36:28 +04:00
2013-03-24 21:31:46 +04:00
# but a regular user cannot
data = self . post ( url , expect = 403 , data = data2 , auth = self . get_other_credentials ( ) )
# a super user can also create new users
data = self . post ( url , expect = 201 , data = data2 , auth = self . get_super_credentials ( ) )
# verify that the login works
self . get ( url , expect = 200 , auth = ( ' username2 ' , ' password2 ' ) )
# verify that if you post a user with a pk, you do not alter that user's password info
mod = dict ( id = 1 , username = ' change ' , password = ' change ' )
data = self . post ( url , expect = 201 , data = mod , auth = self . get_super_credentials ( ) )
orig = User . objects . get ( pk = 1 )
self . assertTrue ( orig . username != ' change ' )
def test_password_not_shown_in_get_operations_for_list_or_detail ( self ) :
url = ' /api/v1/users/1/ '
data = self . get ( url , expect = 200 , auth = self . get_super_credentials ( ) )
self . assertTrue ( ' password ' not in data )
url = ' /api/v1/users/ '
data = self . get ( url , expect = 200 , auth = self . get_super_credentials ( ) )
self . assertTrue ( ' password ' not in data [ ' results ' ] [ 0 ] )
2013-03-24 02:36:28 +04:00
2013-03-24 20:36:42 +04:00
def test_user_list_filtered ( self ) :
2013-03-24 22:14:59 +04:00
url = ' /api/v1/users/ '
data3 = self . get ( url , expect = 200 , auth = self . get_super_credentials ( ) )
self . assertEquals ( data3 [ ' count ' ] , 3 )
data2 = self . get ( url , expect = 200 , auth = self . get_normal_credentials ( ) )
self . assertEquals ( data2 [ ' count ' ] , 2 )
data1 = self . get ( url , expect = 200 , auth = self . get_other_credentials ( ) )
self . assertEquals ( data1 [ ' count ' ] , 1 )
2013-03-24 02:36:28 +04:00
def test_super_user_can_delete_a_user_but_only_marked_inactive ( self ) :
2013-03-24 22:14:59 +04:00
url = ' /api/v1/users/2/ '
data = self . delete ( url , expect = 204 , auth = self . get_super_credentials ( ) )
data = self . get ( url , expect = 404 , auth = self . get_super_credentials ( ) )
url = ' /api/v1/users/2/ '
obj = User . objects . get ( pk = 2 )
self . assertEquals ( obj . is_active , False )
2013-03-24 02:36:28 +04:00
2013-03-24 21:31:46 +04:00
def test_non_org_admin_user_cannot_delete_any_user_including_himself ( self ) :
2013-03-24 22:14:59 +04:00
url1 = ' /api/v1/users/1/ '
url2 = ' /api/v1/users/2/ '
url3 = ' /api/v1/users/3/ '
data = self . delete ( url1 , expect = 403 , auth = self . get_other_credentials ( ) )
data = self . delete ( url2 , expect = 403 , auth = self . get_other_credentials ( ) )
data = self . delete ( url3 , expect = 403 , auth = self . get_other_credentials ( ) )
2013-03-24 02:36:28 +04:00
def test_there_exists_an_obvious_url_where_a_user_may_find_his_user_record ( self ) :
2013-03-24 22:23:37 +04:00
url = ' /api/v1/me/ '
data = self . get ( url , expect = 401 , auth = None )
data = self . get ( url , expect = 401 , auth = self . get_invalid_credentials ( ) )
data = self . get ( url , expect = 200 , auth = self . get_normal_credentials ( ) )
self . assertEquals ( data [ ' results ' ] [ 0 ] [ ' username ' ] , ' normal ' )
self . assertEquals ( data [ ' count ' ] , 1 )
data = self . get ( url , expect = 200 , auth = self . get_other_credentials ( ) )
self . assertEquals ( data [ ' results ' ] [ 0 ] [ ' username ' ] , ' other ' )
self . assertEquals ( data [ ' count ' ] , 1 )
data = self . get ( url , expect = 200 , auth = self . get_super_credentials ( ) )
self . assertEquals ( data [ ' results ' ] [ 0 ] [ ' username ' ] , ' admin ' )
self . assertEquals ( data [ ' count ' ] , 1 )
2013-03-24 23:00:01 +04:00
def test_user_related_resources ( self ) :
2013-03-24 02:36:28 +04:00
2013-03-24 23:00:01 +04:00
# organizations the user is a member of, should be 1
url = ' /api/v1/users/2/organizations/ '
data = self . get ( url , expect = 200 , auth = self . get_normal_credentials ( ) )
self . assertEquals ( data [ ' count ' ] , 1 )
# also accessible via superuser
data = self . get ( url , expect = 200 , auth = self . get_super_credentials ( ) )
self . assertEquals ( data [ ' count ' ] , 1 )
# but not by other user
data = self . get ( url , expect = 403 , auth = self . get_other_credentials ( ) )
# organizations the user is an admin of, should be 1
url = ' /api/v1/users/2/admin_of_organizations/ '
data = self . get ( url , expect = 200 , auth = self . get_normal_credentials ( ) )
self . assertEquals ( data [ ' count ' ] , 1 )
# also accessible via superuser
data = self . get ( url , expect = 200 , auth = self . get_super_credentials ( ) )
self . assertEquals ( data [ ' count ' ] , 1 )
# but not by other user
data = self . get ( url , expect = 403 , auth = self . get_other_credentials ( ) )
# teams the user is on, should be 0
url = ' /api/v1/users/2/teams/ '
data = self . get ( url , expect = 200 , auth = self . get_normal_credentials ( ) )
self . assertEquals ( data [ ' count ' ] , 0 )
# also accessible via superuser
data = self . get ( url , expect = 200 , auth = self . get_super_credentials ( ) )
self . assertEquals ( data [ ' count ' ] , 0 )
# but not by other user
data = self . get ( url , expect = 403 , auth = self . get_other_credentials ( ) )
# verify org admin can still read other user data too
url = ' /api/v1/users/3/organizations/ '
data = self . get ( url , expect = 200 , auth = self . get_normal_credentials ( ) )
self . assertEquals ( data [ ' count ' ] , 1 )
url = ' /api/v1/users/3/admin_of_organizations/ '
data = self . get ( url , expect = 200 , auth = self . get_normal_credentials ( ) )
self . assertEquals ( data [ ' count ' ] , 0 )
url = ' /api/v1/users/3/teams/ '
data = self . get ( url , expect = 200 , auth = self . get_normal_credentials ( ) )
self . assertEquals ( data [ ' count ' ] , 0 )
2013-03-24 02:36:28 +04:00
2013-03-27 02:26:40 +04:00
# FIXME: add test that shows posting a user w/o id to /organizations/2/users/ can create a new one & associate
# FIXME: add test that shows posting a user w/o id to /organizations/2/admins/ can create a new one & associate
# FIXME: add test that shows posting a projects w/o id to /organizations/2/projects/ can create a new one & associate
2013-03-24 02:36:28 +04:00