test_tokens.py 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202
  1. from rest_framework import status
  2. from desecapi.models import Token
  3. from desecapi.tests.base import DomainOwnerTestCase
  4. class TokenPermittedTestCase(DomainOwnerTestCase):
  5. def setUp(self):
  6. super().setUp()
  7. self.token.perm_manage_tokens = True
  8. self.token.save()
  9. self.token2 = self.create_token(self.owner, name="testtoken")
  10. self.other_token = self.create_token(self.user)
  11. def test_token_last_used(self):
  12. self.assertIsNone(Token.objects.get(pk=self.token.id).last_used)
  13. self.client.get(self.reverse("v1:root"))
  14. self.assertIsNotNone(Token.objects.get(pk=self.token.id).last_used)
  15. def test_list_tokens(self):
  16. response = self.client.get(self.reverse("v1:token-list"))
  17. self.assertStatus(response, status.HTTP_200_OK)
  18. self.assertEqual(len(response.data), 2)
  19. self.assertIn("id", response.data[0])
  20. self.assertFalse(
  21. any(field in response.data[0] for field in ["token", "key", "value"])
  22. )
  23. self.assertFalse(
  24. any(
  25. token.encode() in response.content
  26. for token in [self.token.plain, self.token2.plain]
  27. )
  28. )
  29. self.assertNotContains(response, self.token.plain)
  30. def test_delete_my_token(self):
  31. token_id = Token.objects.get(user=self.owner, name="testtoken").id
  32. url = self.reverse("v1:token-detail", pk=token_id)
  33. response = self.client.delete(url)
  34. self.assertStatus(response, status.HTTP_204_NO_CONTENT)
  35. self.assertFalse(Token.objects.filter(pk=token_id).exists())
  36. response = self.client.get(url)
  37. self.assertStatus(response, status.HTTP_404_NOT_FOUND)
  38. def test_retrieve_my_token(self):
  39. token_id = Token.objects.get(user=self.owner, name="testtoken").id
  40. url = self.reverse("v1:token-detail", pk=token_id)
  41. response = self.client.get(url)
  42. self.assertStatus(response, status.HTTP_200_OK)
  43. self.assertEqual(
  44. set(response.data.keys()),
  45. {
  46. "id",
  47. "created",
  48. "last_used",
  49. "max_age",
  50. "max_unused_period",
  51. "name",
  52. "perm_manage_tokens",
  53. "allowed_subnets",
  54. "is_valid",
  55. },
  56. )
  57. self.assertFalse(
  58. any(
  59. token.encode() in response.content
  60. for token in [self.token.plain, self.token2.plain]
  61. )
  62. )
  63. def test_retrieve_other_token(self):
  64. token_id = Token.objects.get(user=self.user).id
  65. url = self.reverse("v1:token-detail", pk=token_id)
  66. response = self.client.get(url)
  67. self.assertStatus(response, status.HTTP_404_NOT_FOUND)
  68. def test_update_my_token(self):
  69. url = self.reverse("v1:token-detail", pk=self.token.id)
  70. for method in [self.client.patch, self.client.put]:
  71. datas = [
  72. {"name": method.__name__},
  73. {"allowed_subnets": ["127.0.0.0/8"]},
  74. {"allowed_subnets": ["127.0.0.0/8", "::/0"]},
  75. {"max_age": "365 00:10:33.123456"},
  76. {"max_age": None},
  77. {"max_unused_period": "365 00:10:33.123456"},
  78. {"max_unused_period": None},
  79. ]
  80. for data in datas:
  81. response = method(url, data=data)
  82. self.assertStatus(response, status.HTTP_200_OK)
  83. for k, v in data.items():
  84. self.assertEqual(response.data[k], v)
  85. # Revoke token management permission
  86. response = self.client.patch(url, data={"perm_manage_tokens": False})
  87. self.assertStatus(response, status.HTTP_200_OK)
  88. # Verify that the change cannot be undone
  89. response = self.client.patch(url, data={"perm_manage_tokens": True})
  90. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  91. def test_create_token(self):
  92. n = len(Token.objects.filter(user=self.owner).all())
  93. datas = [
  94. {},
  95. {"name": "", "perm_manage_tokens": True},
  96. {"name": "foobar"},
  97. {"allowed_subnets": ["1.2.3.32/28", "bade::affe/128"]},
  98. ]
  99. for data in datas:
  100. response = self.client.post(self.reverse("v1:token-list"), data=data)
  101. self.assertStatus(response, status.HTTP_201_CREATED)
  102. self.assertEqual(
  103. set(response.data.keys()),
  104. {
  105. "id",
  106. "created",
  107. "last_used",
  108. "max_age",
  109. "max_unused_period",
  110. "name",
  111. "perm_manage_tokens",
  112. "allowed_subnets",
  113. "is_valid",
  114. "token",
  115. },
  116. )
  117. self.assertEqual(response.data["name"], data.get("name", ""))
  118. self.assertEqual(
  119. response.data["allowed_subnets"],
  120. data.get("allowed_subnets", ["0.0.0.0/0", "::/0"]),
  121. )
  122. self.assertEqual(
  123. response.data["perm_manage_tokens"],
  124. data.get("perm_manage_tokens", False),
  125. )
  126. self.assertIsNone(response.data["last_used"])
  127. self.assertEqual(
  128. len(Token.objects.filter(user=self.owner).all()), n + len(datas)
  129. )
  130. class TokenForbiddenTestCase(DomainOwnerTestCase):
  131. def setUp(self):
  132. super().setUp()
  133. self.token2 = self.create_token(self.owner, name="testtoken")
  134. self.other_token = self.create_token(self.user)
  135. def test_token_last_used(self):
  136. self.assertIsNone(Token.objects.get(pk=self.token.id).last_used)
  137. self.client.get(self.reverse("v1:root"))
  138. self.assertIsNotNone(Token.objects.get(pk=self.token.id).last_used)
  139. def test_list_tokens(self):
  140. response = self.client.get(self.reverse("v1:token-list"))
  141. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  142. def test_delete_my_token(self):
  143. for token_id in [
  144. Token.objects.get(user=self.owner, name="testtoken").id,
  145. self.token.id,
  146. ]:
  147. url = self.reverse("v1:token-detail", pk=token_id)
  148. response = self.client.delete(url)
  149. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  150. def test_retrieve_my_token(self):
  151. for token_id in [
  152. Token.objects.get(user=self.owner, name="testtoken").id,
  153. self.token.id,
  154. ]:
  155. url = self.reverse("v1:token-detail", pk=token_id)
  156. response = self.client.get(url)
  157. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  158. def test_retrieve_other_token(self):
  159. token_id = Token.objects.get(user=self.user).id
  160. url = self.reverse("v1:token-detail", pk=token_id)
  161. response = self.client.get(url)
  162. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  163. def test_update_my_token(self):
  164. url = self.reverse("v1:token-detail", pk=self.token.id)
  165. for method in [self.client.patch, self.client.put]:
  166. datas = [{"name": method.__name__}, {"allowed_subnets": ["127.0.0.0/8"]}]
  167. for data in datas:
  168. response = method(url, data=data)
  169. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  170. def test_create_token(self):
  171. datas = [{}, {"name": ""}, {"name": "foobar"}]
  172. for data in datas:
  173. response = self.client.post(self.reverse("v1:token-list"), data=data)
  174. self.assertStatus(response, status.HTTP_403_FORBIDDEN)