""" Test code for ansible commander. (C) 2013 AnsibleWorks """ import datetime import json from django.contrib.auth.models import User as DjangoUser import django.test from django.test.client import Client from lib.main.models import * from lib.main.tests.base import BaseTest class UsersTest(BaseTest): def collection(self): return '/api/v1/users/' def setUp(self): super(UsersTest, self).setUp() self.setup_users() self.organizations = self.make_organizations(self.super_django_user, 1) self.organizations[0].admins.add(self.normal_django_user) self.organizations[0].users.add(self.other_django_user) def test_only_super_user_or_org_admin_can_add_users(self): url = '/api/v1/users/' new_user = dict(username='blippy') new_user2 = dict(username='blippy2') self.post(url, expect=401, data=new_user, auth=None) self.post(url, expect=401, data=new_user, auth=self.get_invalid_credentials()) self.post(url, expect=403, data=new_user, auth=self.get_other_credentials()) self.post(url, expect=201, data=new_user, auth=self.get_super_credentials()) self.post(url, expect=400, data=new_user, auth=self.get_super_credentials()) self.post(url, expect=201, data=new_user2, auth=self.get_normal_credentials()) self.post(url, expect=400, data=new_user2, auth=self.get_normal_credentials()) def test_ordinary_user_can_modify_some_fields_about_himself_but_not_all_and_passwords_work(self): detail_url = '/api/v1/users/%s/' % self.other_django_user.pk data = self.get(detail_url, expect=200, auth=self.get_other_credentials()) # can't change first_name, last_name, etc data['last_name'] = "NewLastName" self.put(detail_url, data, expect=403, auth=self.get_other_credentials()) # can't change username data['username'] = 'newUsername' self.put(detail_url, data, expect=403, auth=self.get_other_credentials()) # if superuser, CAN change lastname and username and such self.put(detail_url, data, expect=200, auth=self.get_super_credentials()) # and user can still login creds = self.get_other_credentials() creds = ('newUsername', creds[1]) data = self.get(detail_url, expect=200, auth=creds) # user can change their password (submit as text) and can still login # and password is not stored as plaintext data['password'] = 'newPassWord1234Changed' changed = self.put(detail_url, data, expect=200, auth=creds) creds = (creds[0], data['password']) self.get(detail_url, expect=200, auth=creds) # make another nobody user, and make sure they can't send any edits obj = User.objects.create(username='new_user') obj.set_password('new_user') obj.save() hacked = dict(password='asdf') changed = self.put(detail_url, hacked, expect=403, auth=('new_user', 'new_user')) hacked = dict(username='asdf') changed = self.put(detail_url, hacked, expect=403, auth=('new_user', 'new_user')) # password is not stored in plaintext self.assertTrue(User.objects.get(pk=self.normal_django_user.pk).password != data['password']) def test_user_created_with_password_can_login(self): # this is something an org admin can do... url = '/api/v1/users/' data = dict(username='username', password='password') data2 = dict(username='username2', password='password2') data = self.post(url, expect=201, data=data, auth=self.get_normal_credentials()) # verify that the login works... self.get(url, expect=200, auth=('username', 'password')) # but a regular user cannot data = self.post(url, expect=403, data=data2, auth=self.get_other_credentials()) # a super user can also create new users data = self.post(url, expect=201, data=data2, auth=self.get_super_credentials()) # verify that the login works self.get(url, expect=200, auth=('username2', 'password2')) # verify that if you post a user with a pk, you do not alter that user's password info mod = dict(id=1, username='change', password='change') data = self.post(url, expect=201, data=mod, auth=self.get_super_credentials()) orig = User.objects.get(pk=1) self.assertTrue(orig.username != 'change') def test_password_not_shown_in_get_operations_for_list_or_detail(self): url = '/api/v1/users/1/' data = self.get(url, expect=200, auth=self.get_super_credentials()) self.assertTrue('password' not in data) url = '/api/v1/users/' data = self.get(url, expect=200, auth=self.get_super_credentials()) self.assertTrue('password' not in data['results'][0]) def test_user_list_filtered(self): url = '/api/v1/users/' data3 = self.get(url, expect=200, auth=self.get_super_credentials()) self.assertEquals(data3['count'], 3) data2 = self.get(url, expect=200, auth=self.get_normal_credentials()) self.assertEquals(data2['count'], 2) data1 = self.get(url, expect=200, auth=self.get_other_credentials()) self.assertEquals(data1['count'], 1) def test_super_user_can_delete_a_user_but_only_marked_inactive(self): url = '/api/v1/users/2/' data = self.delete(url, expect=204, auth=self.get_super_credentials()) data = self.get(url, expect=404, auth=self.get_super_credentials()) url = '/api/v1/users/2/' obj = User.objects.get(pk=2) self.assertEquals(obj.is_active, False) def test_non_org_admin_user_cannot_delete_any_user_including_himself(self): url1 = '/api/v1/users/1/' url2 = '/api/v1/users/2/' url3 = '/api/v1/users/3/' data = self.delete(url1, expect=403, auth=self.get_other_credentials()) data = self.delete(url2, expect=403, auth=self.get_other_credentials()) data = self.delete(url3, expect=403, auth=self.get_other_credentials()) def test_there_exists_an_obvious_url_where_a_user_may_find_his_user_record(self): #self.assertTrue(False) pass