Files @ 5d8cda8e63dc
Branch filter:

Location: kallithea/rhodecode/tests/functional/test_login.py - annotation

Marcin Kuzminski
fixed login tests
f1629c0c28cc
1e757ac98988
8321b3d19b1f
8ecfed1d8f8b
1e757ac98988
4419551b2915
4419551b2915
1e757ac98988
8ecfed1d8f8b
1e757ac98988
1e757ac98988
8321b3d19b1f
8321b3d19b1f
40b3a54391f9
8321b3d19b1f
40b3a54391f9
8321b3d19b1f
8321b3d19b1f
1e757ac98988
1e757ac98988
b097c4e328a2
1e757ac98988
1e757ac98988
1e757ac98988
1e757ac98988
4419551b2915
4419551b2915
b097c4e328a2
4419551b2915
b097c4e328a2
1e757ac98988
5d8cda8e63dc
758f64f3fbda
1e757ac98988
1e757ac98988
4419551b2915
4419551b2915
b097c4e328a2
b097c4e328a2
4419551b2915
b097c4e328a2
1e757ac98988
5d8cda8e63dc
758f64f3fbda
1e757ac98988
1e757ac98988
b097c4e328a2
b097c4e328a2
4419551b2915
4419551b2915
b097c4e328a2
1e757ac98988
758f64f3fbda
b097c4e328a2
5d8cda8e63dc
758f64f3fbda
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
dffb92224edf
1e757ac98988
1e757ac98988
4419551b2915
4419551b2915
9c0f5d558789
b097c4e328a2
5d8cda8e63dc
1e757ac98988
1e757ac98988
1e757ac98988
4419551b2915
4419551b2915
758f64f3fbda
5d8cda8e63dc
5d8cda8e63dc
758f64f3fbda
bf26b46e82d6
bf26b46e82d6
bf26b46e82d6
1e757ac98988
1e757ac98988
5d8cda8e63dc
758f64f3fbda
1e757ac98988
4419551b2915
1e757ac98988
4419551b2915
4419551b2915
4419551b2915
4419551b2915
6c83dc0226d2
4419551b2915
758f64f3fbda
4419551b2915
4419551b2915
4419551b2915
758f64f3fbda
c366b237c91d
c366b237c91d
4419551b2915
4419551b2915
4419551b2915
4419551b2915
6c83dc0226d2
4419551b2915
c366b237c91d
4419551b2915
4419551b2915
c366b237c91d
c366b237c91d
c366b237c91d
4419551b2915
4419551b2915
4419551b2915
4419551b2915
6c83dc0226d2
4419551b2915
4419551b2915
4419551b2915
c366b237c91d
1e757ac98988
1e757ac98988
4419551b2915
4419551b2915
4419551b2915
4419551b2915
6c83dc0226d2
4419551b2915
4419551b2915
72542dc597be
72542dc597be
758f64f3fbda
c366b237c91d
c366b237c91d
4419551b2915
4419551b2915
4419551b2915
4419551b2915
6c83dc0226d2
4419551b2915
c366b237c91d
72542dc597be
72542dc597be
0ea8eca2d63e
0ea8eca2d63e
72542dc597be
c366b237c91d
c366b237c91d
4419551b2915
c366b237c91d
4419551b2915
4419551b2915
4419551b2915
4419551b2915
6c83dc0226d2
4419551b2915
c366b237c91d
4419551b2915
4419551b2915
4419551b2915
4419551b2915
c366b237c91d
bf26b46e82d6
bf26b46e82d6
4419551b2915
4419551b2915
4419551b2915
4419551b2915
6c83dc0226d2
4419551b2915
bf26b46e82d6
4419551b2915
4419551b2915
bf26b46e82d6
bf26b46e82d6
bf26b46e82d6
4419551b2915
4419551b2915
4419551b2915
4419551b2915
6c83dc0226d2
4419551b2915
4419551b2915
4419551b2915
758f64f3fbda
1e757ac98988
1e757ac98988
1e757ac98988
1e757ac98988
1e757ac98988
1e757ac98988
758f64f3fbda
1e757ac98988
4419551b2915
4419551b2915
4419551b2915
4419551b2915
6c83dc0226d2
4419551b2915
4419551b2915
72542dc597be
7d3d0a96e083
758f64f3fbda
40b3a54391f9
72542dc597be
72542dc597be
72542dc597be
72542dc597be
72542dc597be
72542dc597be
72542dc597be
758f64f3fbda
758f64f3fbda
4419551b2915
72542dc597be
72542dc597be
4419551b2915
72542dc597be
758f64f3fbda
4419551b2915
4419551b2915
4419551b2915
758f64f3fbda
1e757ac98988
b097c4e328a2
b097c4e328a2
72542dc597be
1e757ac98988
1e757ac98988
1e757ac98988
1e757ac98988
1e757ac98988
1e757ac98988
758f64f3fbda
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
40b3a54391f9
40b3a54391f9
b097c4e328a2
b097c4e328a2
b097c4e328a2
4419551b2915
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
04027bdb876c
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
b097c4e328a2
# -*- coding: utf-8 -*-
from rhodecode.tests import *
from rhodecode.model.db import User, Notification
from rhodecode.lib.utils2 import generate_api_key
from rhodecode.lib.auth import check_password
from rhodecode.lib import helpers as h
from rhodecode.model import validators


class TestLoginController(TestController):

    def tearDown(self):
        for n in Notification.query().all():
            self.Session().delete(n)

        self.Session().commit()
        self.assertEqual(Notification.query().all(), [])

    def test_index(self):
        response = self.app.get(url(controller='login', action='index'))
        self.assertEqual(response.status, '200 OK')
        # Test response...

    def test_login_admin_ok(self):
        response = self.app.post(url(controller='login', action='index'),
                                 {'username': 'test_admin',
                                  'password': 'test12'})
        self.assertEqual(response.status, '302 Found')
        self.assertEqual(response.session['rhodecode_user'].get('username'),
                         'test_admin')
        response = response.follow()
        response.mustcontain('/%s' % HG_REPO)

    def test_login_regular_ok(self):
        response = self.app.post(url(controller='login', action='index'),
                                 {'username': 'test_regular',
                                  'password': 'test12'})

        self.assertEqual(response.status, '302 Found')
        self.assertEqual(response.session['rhodecode_user'].get('username'),
                         'test_regular')
        response = response.follow()
        response.mustcontain('/%s' % HG_REPO)

    def test_login_ok_came_from(self):
        test_came_from = '/_admin/users'
        response = self.app.post(url(controller='login', action='index',
                                     came_from=test_came_from),
                                 {'username': 'test_admin',
                                  'password': 'test12'})
        self.assertEqual(response.status, '302 Found')
        response = response.follow()

        self.assertEqual(response.status, '200 OK')
        response.mustcontain('Users administration')

    @parameterized.expand([
          ('data:text/html,<script>window.alert("xss")</script>',),
          ('mailto:test@rhodecode.org',),
          ('file:///etc/passwd',),
          ('ftp://some.ftp.server',),
          ('http://other.domain',),
    ])
    def test_login_bad_came_froms(self, url_came_from):
        response = self.app.post(url(controller='login', action='index',
                                     came_from=url_came_from),
                                 {'username': 'test_admin',
                                  'password': 'test12'})
        self.assertEqual(response.status, '302 Found')
        self.assertEqual(response._environ['paste.testing_variables']
                         ['tmpl_context'].came_from, '/')
        response = response.follow()

        self.assertEqual(response.status, '200 OK')

    def test_login_short_password(self):
        response = self.app.post(url(controller='login', action='index'),
                                 {'username': 'test_admin',
                                  'password': 'as'})
        self.assertEqual(response.status, '200 OK')

        response.mustcontain('Enter 3 characters or more')

    def test_login_wrong_username_password(self):
        response = self.app.post(url(controller='login', action='index'),
                                 {'username': 'error',
                                  'password': 'test12'})

        response.mustcontain('invalid user name')
        response.mustcontain('invalid password')

    #==========================================================================
    # REGISTRATIONS
    #==========================================================================
    def test_register(self):
        response = self.app.get(url(controller='login', action='register'))
        response.mustcontain('Sign Up to RhodeCode')

    def test_register_err_same_username(self):
        uname = 'test_admin'
        response = self.app.post(url(controller='login', action='register'),
                                            {'username': uname,
                                             'password': 'test12',
                                             'password_confirmation': 'test12',
                                             'email': 'goodmail@domain.com',
                                             'firstname': 'test',
                                             'lastname': 'test'})

        msg = validators.ValidUsername()._messages['username_exists']
        msg = h.html_escape(msg % {'username': uname})
        response.mustcontain(msg)

    def test_register_err_same_email(self):
        response = self.app.post(url(controller='login', action='register'),
                                            {'username': 'test_admin_0',
                                             'password': 'test12',
                                             'password_confirmation': 'test12',
                                             'email': 'test_admin@mail.com',
                                             'firstname': 'test',
                                             'lastname': 'test'})

        msg = validators.UniqSystemEmail()()._messages['email_taken']
        response.mustcontain(msg)

    def test_register_err_same_email_case_sensitive(self):
        response = self.app.post(url(controller='login', action='register'),
                                            {'username': 'test_admin_1',
                                             'password': 'test12',
                                             'password_confirmation': 'test12',
                                             'email': 'TesT_Admin@mail.COM',
                                             'firstname': 'test',
                                             'lastname': 'test'})
        msg = validators.UniqSystemEmail()()._messages['email_taken']
        response.mustcontain(msg)

    def test_register_err_wrong_data(self):
        response = self.app.post(url(controller='login', action='register'),
                                            {'username': 'xs',
                                             'password': 'test',
                                             'password_confirmation': 'test',
                                             'email': 'goodmailm',
                                             'firstname': 'test',
                                             'lastname': 'test'})
        self.assertEqual(response.status, '200 OK')
        response.mustcontain('An email address must contain a single @')
        response.mustcontain('Enter a value 6 characters long or more')

    def test_register_err_username(self):
        response = self.app.post(url(controller='login', action='register'),
                                            {'username': 'error user',
                                             'password': 'test12',
                                             'password_confirmation': 'test12',
                                             'email': 'goodmailm',
                                             'firstname': 'test',
                                             'lastname': 'test'})

        response.mustcontain('An email address must contain a single @')
        response.mustcontain('Username may only contain '
                'alphanumeric characters underscores, '
                'periods or dashes and must begin with '
                'alphanumeric character')

    def test_register_err_case_sensitive(self):
        usr = 'Test_Admin'
        response = self.app.post(url(controller='login', action='register'),
                                            {'username': usr,
                                             'password': 'test12',
                                             'password_confirmation': 'test12',
                                             'email': 'goodmailm',
                                             'firstname': 'test',
                                             'lastname': 'test'})

        response.mustcontain('An email address must contain a single @')
        msg = validators.ValidUsername()._messages['username_exists']
        msg = h.html_escape(msg % {'username': usr})
        response.mustcontain(msg)

    def test_register_special_chars(self):
        response = self.app.post(url(controller='login', action='register'),
                                        {'username': 'xxxaxn',
                                         'password': 'ąćźżąśśśś',
                                         'password_confirmation': 'ąćźżąśśśś',
                                         'email': 'goodmailm@test.plx',
                                         'firstname': 'test',
                                         'lastname': 'test'})

        msg = validators.ValidPassword()._messages['invalid_password']
        response.mustcontain(msg)

    def test_register_password_mismatch(self):
        response = self.app.post(url(controller='login', action='register'),
                                            {'username': 'xs',
                                             'password': '123qwe',
                                             'password_confirmation': 'qwe123',
                                             'email': 'goodmailm@test.plxa',
                                             'firstname': 'test',
                                             'lastname': 'test'})
        msg = validators.ValidPasswordsMatch()._messages['password_mismatch']
        response.mustcontain(msg)

    def test_register_ok(self):
        username = 'test_regular4'
        password = 'qweqwe'
        email = 'marcin@test.com'
        name = 'testname'
        lastname = 'testlastname'

        response = self.app.post(url(controller='login', action='register'),
                                            {'username': username,
                                             'password': password,
                                             'password_confirmation': password,
                                             'email': email,
                                             'firstname': name,
                                             'lastname': lastname,
                                             'admin': True})  # This should be overriden
        self.assertEqual(response.status, '302 Found')
        self.checkSessionFlash(response, 'You have successfully registered into RhodeCode')

        ret = self.Session().query(User).filter(User.username == 'test_regular4').one()
        self.assertEqual(ret.username, username)
        self.assertEqual(check_password(password, ret.password), True)
        self.assertEqual(ret.email, email)
        self.assertEqual(ret.name, name)
        self.assertEqual(ret.lastname, lastname)
        self.assertNotEqual(ret.api_key, None)
        self.assertEqual(ret.admin, False)

    def test_forgot_password_wrong_mail(self):
        bad_email = 'marcin@wrongmail.org'
        response = self.app.post(
                        url(controller='login', action='password_reset'),
                            {'email': bad_email, }
        )

        msg = validators.ValidSystemEmail()._messages['non_existing_email']
        msg = h.html_escape(msg % {'email': bad_email})
        response.mustcontain()

    def test_forgot_password(self):
        response = self.app.get(url(controller='login',
                                    action='password_reset'))
        self.assertEqual(response.status, '200 OK')

        username = 'test_password_reset_1'
        password = 'qweqwe'
        email = 'marcin@python-works.com'
        name = 'passwd'
        lastname = 'reset'

        new = User()
        new.username = username
        new.password = password
        new.email = email
        new.name = name
        new.lastname = lastname
        new.api_key = generate_api_key(username)
        self.Session().add(new)
        self.Session().commit()

        response = self.app.post(url(controller='login',
                                     action='password_reset'),
                                 {'email': email, })

        self.checkSessionFlash(response, 'Your password reset link was sent')

        response = response.follow()

        # BAD KEY

        key = "bad"
        response = self.app.get(url(controller='login',
                                    action='password_reset_confirmation',
                                    key=key))
        self.assertEqual(response.status, '302 Found')
        self.assertTrue(response.location.endswith(url('reset_password')))

        # GOOD KEY

        key = User.get_by_username(username).api_key
        response = self.app.get(url(controller='login',
                                    action='password_reset_confirmation',
                                    key=key))
        self.assertEqual(response.status, '302 Found')
        self.assertTrue(response.location.endswith(url('login_home')))

        self.checkSessionFlash(response,
                               ('Your password reset was successful, '
                                'new password has been sent to your email'))

        response = response.follow()