test_tokens.py 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159
  1. from rest_framework import status
  2. from desecapi.models import Token
  3. from desecapi.tests.base import DomainOwnerTestCase
  4. class TokenPermittedTestCase(DomainOwnerTestCase):
  5. def setUp(self):
  6. super().setUp()
  7. self.token.perm_manage_tokens = True
  8. self.token.save()
  9. self.token2 = self.create_token(self.owner, name='testtoken')
  10. self.other_token = self.create_token(self.user)
  11. def test_token_last_used(self):
  12. self.assertIsNone(Token.objects.get(pk=self.token.id).last_used)
  13. self.client.get(self.reverse('v1:root'))
  14. self.assertIsNotNone(Token.objects.get(pk=self.token.id).last_used)
  15. def test_list_tokens(self):
  16. response = self.client.get(self.reverse('v1:token-list'))
  17. self.assertStatus(response, status.HTTP_200_OK)
  18. self.assertEqual(len(response.data), 2)
  19. self.assertIn('id', response.data[0])
  20. self.assertFalse(any(field in response.data[0] for field in ['token', 'key', 'value']))
  21. self.assertFalse(any(token.encode() in response.content for token in [self.token.plain, self.token2.plain]))
  22. self.assertNotContains(response, self.token.plain)
  23. def test_delete_my_token(self):
  24. token_id = Token.objects.get(user=self.owner, name='testtoken').id
  25. url = self.reverse('v1:token-detail', pk=token_id)
  26. response = self.client.delete(url)
  27. self.assertStatus(response, status.HTTP_204_NO_CONTENT)
  28. self.assertFalse(Token.objects.filter(pk=token_id).exists())
  29. response = self.client.get(url)
  30. self.assertStatus(response, status.HTTP_404_NOT_FOUND)
  31. def test_retrieve_my_token(self):
  32. token_id = Token.objects.get(user=self.owner, name='testtoken').id
  33. url = self.reverse('v1:token-detail', pk=token_id)
  34. response = self.client.get(url)
  35. self.assertStatus(response, status.HTTP_200_OK)
  36. self.assertEqual(
  37. set(response.data.keys()),
  38. {'id', 'created', 'last_used', 'max_age', 'max_unused_period', 'name', 'perm_manage_tokens',
  39. 'allowed_subnets', 'is_valid'}
  40. )
  41. self.assertFalse(any(token.encode() in response.content for token in [self.token.plain, self.token2.plain]))
  42. def test_retrieve_other_token(self):
  43. token_id = Token.objects.get(user=self.user).id
  44. url = self.reverse('v1:token-detail', pk=token_id)
  45. response = self.client.get(url)
  46. self.assertStatus(response, status.HTTP_404_NOT_FOUND)
  47. def test_update_my_token(self):
  48. url = self.reverse('v1:token-detail', pk=self.token.id)
  49. for method in [self.client.patch, self.client.put]:
  50. datas = [
  51. {'name': method.__name__},
  52. {'allowed_subnets': ['127.0.0.0/8']},
  53. {'allowed_subnets': ['127.0.0.0/8', '::/0']},
  54. {'max_age': '365 00:10:33.123456'},
  55. {'max_age': None},
  56. {'max_unused_period': '365 00:10:33.123456'},
  57. {'max_unused_period': None},
  58. ]
  59. for data in datas:
  60. response = method(url, data=data)
  61. self.assertStatus(response, status.HTTP_200_OK)
  62. for k, v in data.items():
  63. self.assertEqual(response.data[k], v)
  64. # Revoke token management permission
  65. response = self.client.patch(url, data={'perm_manage_tokens': False})
  66. self.assertStatus(response, status.HTTP_200_OK)
  67. # Verify that the change cannot be undone
  68. response = self.client.patch(url, data={'perm_manage_tokens': True})
  69. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  70. def test_create_token(self):
  71. n = len(Token.objects.filter(user=self.owner).all())
  72. datas = [
  73. {},
  74. {'name': '', 'perm_manage_tokens': True},
  75. {'name': 'foobar'},
  76. {'allowed_subnets': ['1.2.3.32/28', 'bade::affe/128']},
  77. ]
  78. for data in datas:
  79. response = self.client.post(self.reverse('v1:token-list'), data=data)
  80. self.assertStatus(response, status.HTTP_201_CREATED)
  81. self.assertEqual(
  82. set(response.data.keys()),
  83. {'id', 'created', 'last_used', 'max_age', 'max_unused_period', 'name', 'perm_manage_tokens',
  84. 'allowed_subnets', 'is_valid', 'token'}
  85. )
  86. self.assertEqual(response.data['name'], data.get('name', ''))
  87. self.assertEqual(response.data['allowed_subnets'], data.get('allowed_subnets', ['0.0.0.0/0', '::/0']))
  88. self.assertEqual(response.data['perm_manage_tokens'], data.get('perm_manage_tokens', False))
  89. self.assertIsNone(response.data['last_used'])
  90. self.assertEqual(len(Token.objects.filter(user=self.owner).all()), n + len(datas))
  91. class TokenForbiddenTestCase(DomainOwnerTestCase):
  92. def setUp(self):
  93. super().setUp()
  94. self.token2 = self.create_token(self.owner, name='testtoken')
  95. self.other_token = self.create_token(self.user)
  96. def test_token_last_used(self):
  97. self.assertIsNone(Token.objects.get(pk=self.token.id).last_used)
  98. self.client.get(self.reverse('v1:root'))
  99. self.assertIsNotNone(Token.objects.get(pk=self.token.id).last_used)
  100. def test_list_tokens(self):
  101. response = self.client.get(self.reverse('v1:token-list'))
  102. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  103. def test_delete_my_token(self):
  104. for token_id in [Token.objects.get(user=self.owner, name='testtoken').id, self.token.id]:
  105. url = self.reverse('v1:token-detail', pk=token_id)
  106. response = self.client.delete(url)
  107. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  108. def test_retrieve_my_token(self):
  109. for token_id in [Token.objects.get(user=self.owner, name='testtoken').id, self.token.id]:
  110. url = self.reverse('v1:token-detail', pk=token_id)
  111. response = self.client.get(url)
  112. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  113. def test_retrieve_other_token(self):
  114. token_id = Token.objects.get(user=self.user).id
  115. url = self.reverse('v1:token-detail', pk=token_id)
  116. response = self.client.get(url)
  117. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  118. def test_update_my_token(self):
  119. url = self.reverse('v1:token-detail', pk=self.token.id)
  120. for method in [self.client.patch, self.client.put]:
  121. datas = [{'name': method.__name__}, {'allowed_subnets': ['127.0.0.0/8']}]
  122. for data in datas:
  123. response = method(url, data=data)
  124. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  125. def test_create_token(self):
  126. datas = [{}, {'name': ''}, {'name': 'foobar'}]
  127. for data in datas:
  128. response = self.client.post(self.reverse('v1:token-list'), data=data)
  129. self.assertStatus(response, status.HTTP_403_FORBIDDEN)