123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131 |
- from rest_framework import status
- from desecapi.models import Token
- from desecapi.tests.base import DomainOwnerTestCase
- class TokenPermittedTestCase(DomainOwnerTestCase):
- def setUp(self):
- super().setUp()
- self.token.perm_manage_tokens = True
- self.token.save()
- self.token2 = self.create_token(self.owner, name='testtoken')
- self.other_token = self.create_token(self.user)
- def test_token_last_used(self):
- self.assertIsNone(Token.objects.get(pk=self.token.id).last_used)
- self.client.get(self.reverse('v1:root'))
- self.assertIsNotNone(Token.objects.get(pk=self.token.id).last_used)
- def test_list_tokens(self):
- response = self.client.get(self.reverse('v1:token-list'))
- self.assertStatus(response, status.HTTP_200_OK)
- self.assertEqual(len(response.data), 2)
- self.assertIn('id', response.data[0])
- self.assertFalse(any(field in response.data[0] for field in ['token', 'key', 'value']))
- self.assertNotContains(response, self.token.plain)
- def test_delete_my_token(self):
- token_id = Token.objects.get(user=self.owner, name='testtoken').id
- url = self.reverse('v1:token-detail', pk=token_id)
- response = self.client.delete(url)
- self.assertStatus(response, status.HTTP_204_NO_CONTENT)
- self.assertFalse(Token.objects.filter(pk=token_id).exists())
- response = self.client.get(url)
- self.assertStatus(response, status.HTTP_404_NOT_FOUND)
- def test_retrieve_my_token(self):
- token_id = Token.objects.get(user=self.owner, name='testtoken').id
- url = self.reverse('v1:token-detail', pk=token_id)
- response = self.client.get(url)
- self.assertStatus(response, status.HTTP_200_OK)
- self.assertTrue(all(field in response.data for field in ['created', 'id', 'last_used', 'name',
- 'perm_manage_tokens']))
- self.assertFalse(any(field in response.data for field in ['token', 'key', 'value']))
- def test_retrieve_other_token(self):
- token_id = Token.objects.get(user=self.user).id
- url = self.reverse('v1:token-detail', pk=token_id)
- response = self.client.get(url)
- self.assertStatus(response, status.HTTP_404_NOT_FOUND)
- def test_update_my_token(self):
- url = self.reverse('v1:token-detail', pk=self.token.id)
- for method in [self.client.patch, self.client.put]:
- response = method(url, data={'name': method.__name__})
- self.assertStatus(response, status.HTTP_200_OK)
- self.assertEqual(Token.objects.get(pk=self.token.id).name, method.__name__)
- # Revoke token management permission
- response = self.client.patch(url, data={'perm_manage_tokens': False})
- self.assertStatus(response, status.HTTP_200_OK)
- # Verify that the change cannot be undone
- response = self.client.patch(url, data={'perm_manage_tokens': True})
- self.assertStatus(response, status.HTTP_403_FORBIDDEN)
- def test_create_token(self):
- n = len(Token.objects.filter(user=self.owner).all())
- datas = [{}, {'name': ''}, {'name': 'foobar'}]
- for data in datas:
- response = self.client.post(self.reverse('v1:token-list'), data=data)
- self.assertStatus(response, status.HTTP_201_CREATED)
- self.assertTrue(all(field in response.data for field in ['id', 'created', 'token', 'name']))
- self.assertEqual(response.data['name'], data.get('name', ''))
- self.assertIsNone(response.data['last_used'])
- self.assertEqual(len(Token.objects.filter(user=self.owner).all()), n + len(datas))
- class TokenForbiddenTestCase(DomainOwnerTestCase):
- def setUp(self):
- super().setUp()
- self.token2 = self.create_token(self.owner, name='testtoken')
- self.other_token = self.create_token(self.user)
- def test_token_last_used(self):
- self.assertIsNone(Token.objects.get(pk=self.token.id).last_used)
- self.client.get(self.reverse('v1:root'))
- self.assertIsNotNone(Token.objects.get(pk=self.token.id).last_used)
- def test_list_tokens(self):
- response = self.client.get(self.reverse('v1:token-list'))
- self.assertStatus(response, status.HTTP_403_FORBIDDEN)
- def test_delete_my_token(self):
- for token_id in [Token.objects.get(user=self.owner, name='testtoken').id, self.token.id]:
- url = self.reverse('v1:token-detail', pk=token_id)
- response = self.client.delete(url)
- self.assertStatus(response, status.HTTP_403_FORBIDDEN)
- def test_retrieve_my_token(self):
- for token_id in [Token.objects.get(user=self.owner, name='testtoken').id, self.token.id]:
- url = self.reverse('v1:token-detail', pk=token_id)
- response = self.client.get(url)
- self.assertStatus(response, status.HTTP_403_FORBIDDEN)
- def test_retrieve_other_token(self):
- token_id = Token.objects.get(user=self.user).id
- url = self.reverse('v1:token-detail', pk=token_id)
- response = self.client.get(url)
- self.assertStatus(response, status.HTTP_403_FORBIDDEN)
- def test_update_my_token(self):
- url = self.reverse('v1:token-detail', pk=self.token.id)
- for method in [self.client.patch, self.client.put]:
- response = method(url, data={'name': method.__name__})
- self.assertStatus(response, status.HTTP_403_FORBIDDEN)
- def test_create_token(self):
- datas = [{}, {'name': ''}, {'name': 'foobar'}]
- for data in datas:
- response = self.client.post(self.reverse('v1:token-list'), data=data)
- self.assertStatus(response, status.HTTP_403_FORBIDDEN)
|