2016-12-01 08:54:21 +01:00
|
|
|
import datetime
|
2020-06-11 00:54:34 +02:00
|
|
|
import re
|
|
|
|
import time
|
|
|
|
import urllib
|
2021-06-24 09:23:39 +02:00
|
|
|
from typing import Any, Dict, List, Optional, Sequence, Union
|
2020-06-11 00:54:34 +02:00
|
|
|
from unittest.mock import MagicMock, patch
|
2020-09-13 00:37:41 +02:00
|
|
|
from urllib.parse import urlencode
|
2018-06-19 14:50:36 +02:00
|
|
|
|
2020-08-07 01:09:47 +02:00
|
|
|
import orjson
|
2014-07-03 18:18:00 +02:00
|
|
|
from django.conf import settings
|
2020-12-19 20:04:57 +01:00
|
|
|
from django.contrib.auth.views import PasswordResetConfirmView
|
2017-03-31 08:41:14 +02:00
|
|
|
from django.contrib.contenttypes.models import ContentType
|
2020-06-11 00:54:34 +02:00
|
|
|
from django.core.exceptions import ValidationError
|
2019-02-02 23:53:44 +01:00
|
|
|
from django.http import HttpResponse
|
2021-04-29 00:34:05 +02:00
|
|
|
from django.test import Client, override_settings
|
2020-05-01 01:52:45 +02:00
|
|
|
from django.urls import reverse
|
2020-06-11 00:54:34 +02:00
|
|
|
from django.utils.timezone import now as timezone_now
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2017-10-21 03:15:12 +02:00
|
|
|
from confirmation import settings as confirmation_settings
|
2020-06-11 00:54:34 +02:00
|
|
|
from confirmation.models import (
|
|
|
|
Confirmation,
|
|
|
|
ConfirmationKeyException,
|
|
|
|
create_confirmation_link,
|
|
|
|
get_object_from_key,
|
|
|
|
one_click_unsubscribe_link,
|
2014-01-31 21:08:40 +01:00
|
|
|
)
|
2021-05-28 15:57:08 +02:00
|
|
|
from corporate.lib.stripe import get_latest_seat_count
|
2020-06-11 00:54:34 +02:00
|
|
|
from zerver.context_processors import common_context
|
|
|
|
from zerver.decorator import do_two_factor_login
|
|
|
|
from zerver.forms import HomepageForm, check_subdomain_available
|
2014-01-31 21:08:40 +01:00
|
|
|
from zerver.lib.actions import (
|
2020-06-11 00:54:34 +02:00
|
|
|
add_new_user_history,
|
2021-02-14 00:03:40 +01:00
|
|
|
change_user_is_active,
|
2020-06-11 00:54:34 +02:00
|
|
|
do_add_default_stream,
|
|
|
|
do_change_full_name,
|
2020-12-18 20:17:20 +01:00
|
|
|
do_change_realm_subdomain,
|
2020-05-21 00:13:06 +02:00
|
|
|
do_change_user_role,
|
2017-11-16 23:00:04 +01:00
|
|
|
do_create_default_stream_group,
|
2021-04-05 18:42:45 +02:00
|
|
|
do_create_multiuse_invite_link,
|
2019-03-04 13:16:00 +01:00
|
|
|
do_create_realm,
|
2020-06-11 00:54:34 +02:00
|
|
|
do_create_user,
|
2017-03-21 18:08:40 +01:00
|
|
|
do_deactivate_realm,
|
2017-08-25 08:14:55 +02:00
|
|
|
do_deactivate_user,
|
2020-06-11 00:54:34 +02:00
|
|
|
do_get_user_invites,
|
|
|
|
do_invite_users,
|
2017-03-21 18:08:40 +01:00
|
|
|
do_set_realm_property,
|
2021-09-17 18:11:37 +02:00
|
|
|
do_set_realm_user_default_setting,
|
2020-06-11 00:54:34 +02:00
|
|
|
get_default_streams_for_realm,
|
|
|
|
)
|
|
|
|
from zerver.lib.email_notifications import enqueue_welcome_emails, followup_day2_email_delay
|
|
|
|
from zerver.lib.initial_password import initial_password
|
|
|
|
from zerver.lib.mobile_auth_otp import (
|
|
|
|
ascii_to_hex,
|
|
|
|
hex_to_ascii,
|
|
|
|
is_valid_otp,
|
|
|
|
otp_decrypt_api_key,
|
|
|
|
otp_encrypt_api_key,
|
|
|
|
xor_hex_strings,
|
2017-03-21 18:08:40 +01:00
|
|
|
)
|
2020-06-11 00:54:34 +02:00
|
|
|
from zerver.lib.name_restrictions import is_disposable_domain
|
2019-12-30 02:21:51 +01:00
|
|
|
from zerver.lib.rate_limiter import add_ratelimit_rule, remove_ratelimit_rule
|
2021-04-03 12:14:01 +02:00
|
|
|
from zerver.lib.send_email import (
|
|
|
|
EmailNotDeliveredException,
|
|
|
|
FromAddress,
|
2021-05-11 03:32:31 +02:00
|
|
|
deliver_scheduled_emails,
|
2021-04-03 12:14:01 +02:00
|
|
|
send_future_email,
|
|
|
|
)
|
2019-01-16 09:59:01 +01:00
|
|
|
from zerver.lib.stream_subscription import get_stream_subscriptions_for_user
|
2020-03-24 14:47:41 +01:00
|
|
|
from zerver.lib.streams import create_stream_if_needed
|
2020-06-11 00:54:34 +02:00
|
|
|
from zerver.lib.subdomains import is_root_domain_available
|
|
|
|
from zerver.lib.test_classes import ZulipTestCase
|
|
|
|
from zerver.lib.test_helpers import (
|
|
|
|
avatar_disk_path,
|
tests: Fix queries_captured to clear cache up front.
Before this change we were clearing the cache on
every SQL usage.
The code to do this was added in February 2017
in 6db4879f9c9fd6941d3aa2af6138ea75aa6675a6.
Now we clear the cache just one time, but before
the action/request under test.
Tests that want to count queries with a warm
cache now specify keep_cache_warm=True. Those
tests were particularly flawed before this change.
In general, the old code both over-counted and
under-counted queries.
It under-counted SQL usage for requests that were
able to pull some data out of a warm cache before
they did any SQL. Typically this would have bypassed
the initial query to get UserProfile, so you
will see several off-by-one fixes.
The old code over-counted SQL usage to the extent
that it's a rather extreme assumption that during
an action itself, the entries that you put into
the cache will get thrown away. And that's essentially
what the prior code simulated.
Now, it's still bad if an action keeps hitting the
cache for no reason, but it's not as bad as hitting
the database. There doesn't appear to be any evidence
of us doing something silly like fetching the same
data from the cache in a loop, but there are
opportunities to prevent second or third round
trips to the cache for the same object, if we
can re-structure the code so that the same caller
doesn't have two callees get the same data.
Note that for invites, we have some cache hits
that are due to the nature of how we serialize
data to our queue processor--we generally just
serialize ids, and then re-fetch objects when
we pop them off the queue.
2020-11-04 12:02:00 +01:00
|
|
|
cache_tries_captured,
|
2020-06-11 00:54:34 +02:00
|
|
|
find_key_by_email,
|
|
|
|
get_test_image_file,
|
|
|
|
load_subdomain_token,
|
2020-07-08 02:22:52 +02:00
|
|
|
message_stream_count,
|
|
|
|
most_recent_message,
|
|
|
|
most_recent_usermessage,
|
2020-06-11 00:54:34 +02:00
|
|
|
queries_captured,
|
|
|
|
reset_emails_in_zulip_realm,
|
2016-11-10 19:30:09 +01:00
|
|
|
)
|
2020-06-11 00:54:34 +02:00
|
|
|
from zerver.models import (
|
|
|
|
CustomProfileField,
|
|
|
|
CustomProfileFieldValue,
|
|
|
|
DefaultStream,
|
|
|
|
Message,
|
2021-07-16 22:11:10 +02:00
|
|
|
MultiuseInvite,
|
2020-06-11 00:54:34 +02:00
|
|
|
PreregistrationUser,
|
|
|
|
Realm,
|
2021-04-20 12:29:19 +02:00
|
|
|
RealmAuditLog,
|
2021-09-17 18:11:37 +02:00
|
|
|
RealmUserDefault,
|
2020-06-11 00:54:34 +02:00
|
|
|
Recipient,
|
|
|
|
ScheduledEmail,
|
|
|
|
Stream,
|
|
|
|
Subscription,
|
|
|
|
UserMessage,
|
|
|
|
UserProfile,
|
|
|
|
flush_per_request_caches,
|
|
|
|
get_realm,
|
2021-07-16 22:11:10 +02:00
|
|
|
get_stream,
|
2020-06-11 00:54:34 +02:00
|
|
|
get_system_bot,
|
|
|
|
get_user,
|
|
|
|
get_user_by_delivery_email,
|
|
|
|
)
|
|
|
|
from zerver.views.auth import redirect_and_log_into_subdomain, start_two_factor_auth
|
|
|
|
from zerver.views.development.registration import confirmation_key
|
|
|
|
from zerver.views.invite import get_invitee_emails_set
|
|
|
|
from zproject.backends import ExternalAuthDataDict, ExternalAuthResult
|
2017-02-12 21:21:31 +01:00
|
|
|
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2017-04-20 08:30:50 +02:00
|
|
|
class RedirectAndLogIntoSubdomainTestCase(ZulipTestCase):
|
2020-02-23 18:58:08 +01:00
|
|
|
def test_data(self) -> None:
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
user_profile = self.example_user("hamlet")
|
|
|
|
name = user_profile.full_name
|
|
|
|
email = user_profile.delivery_email
|
|
|
|
response = redirect_and_log_into_subdomain(ExternalAuthResult(user_profile=user_profile))
|
2017-10-27 02:45:38 +02:00
|
|
|
data = load_subdomain_token(response)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertDictEqual(
|
|
|
|
data,
|
2021-02-12 08:20:45 +01:00
|
|
|
{"full_name": name, "email": email, "subdomain": realm.subdomain, "is_signup": False},
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-04-20 08:30:50 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
data_dict = ExternalAuthDataDict(is_signup=True, multiuse_object_key="key")
|
2021-02-12 08:19:30 +01:00
|
|
|
response = redirect_and_log_into_subdomain(
|
|
|
|
ExternalAuthResult(user_profile=user_profile, data_dict=data_dict)
|
|
|
|
)
|
2017-10-27 02:45:38 +02:00
|
|
|
data = load_subdomain_token(response)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertDictEqual(
|
|
|
|
data,
|
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"full_name": name,
|
|
|
|
"email": email,
|
|
|
|
"subdomain": realm.subdomain,
|
2021-02-12 08:19:30 +01:00
|
|
|
# the email has an account at the subdomain,
|
|
|
|
# so is_signup get overridden to False:
|
2021-02-12 08:20:45 +01:00
|
|
|
"is_signup": False,
|
|
|
|
"multiuse_object_key": "key",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
data_dict = ExternalAuthDataDict(
|
|
|
|
email=self.nonreg_email("alice"),
|
|
|
|
full_name="Alice",
|
|
|
|
subdomain=realm.subdomain,
|
|
|
|
is_signup=True,
|
|
|
|
full_name_validated=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
multiuse_object_key="key",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-02-23 18:58:08 +01:00
|
|
|
response = redirect_and_log_into_subdomain(ExternalAuthResult(data_dict=data_dict))
|
2019-11-01 00:00:36 +01:00
|
|
|
data = load_subdomain_token(response)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertDictEqual(
|
|
|
|
data,
|
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"full_name": "Alice",
|
|
|
|
"email": self.nonreg_email("alice"),
|
|
|
|
"full_name_validated": True,
|
|
|
|
"subdomain": realm.subdomain,
|
|
|
|
"is_signup": True,
|
|
|
|
"multiuse_object_key": "key",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
)
|
|
|
|
|
2017-04-20 08:30:50 +02:00
|
|
|
|
2017-08-25 06:32:57 +02:00
|
|
|
class DeactivationNoticeTestCase(ZulipTestCase):
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_redirection_for_deactivated_realm(self) -> None:
|
2017-08-25 06:32:57 +02:00
|
|
|
realm = get_realm("zulip")
|
|
|
|
realm.deactivated = True
|
|
|
|
realm.save(update_fields=["deactivated"])
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
for url in ("/register/", "/login/"):
|
2017-10-02 22:43:43 +02:00
|
|
|
result = self.client_get(url)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertIn("deactivated", result.url)
|
2017-08-25 06:32:57 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_redirection_for_active_realm(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
for url in ("/register/", "/login/"):
|
2017-10-02 22:43:43 +02:00
|
|
|
result = self.client_get(url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2017-08-25 06:32:57 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_deactivation_notice_when_realm_is_active(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/deactivated/")
|
2017-08-25 06:32:57 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertIn("login", result.url)
|
2017-08-25 06:32:57 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_deactivation_notice_when_deactivated(self) -> None:
|
2017-08-25 06:32:57 +02:00
|
|
|
realm = get_realm("zulip")
|
|
|
|
realm.deactivated = True
|
|
|
|
realm.save(update_fields=["deactivated"])
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/deactivated/")
|
2017-10-02 22:43:43 +02:00
|
|
|
self.assertIn("Zulip Dev, has been deactivated.", result.content.decode())
|
2020-12-12 12:23:48 +01:00
|
|
|
self.assertNotIn("It has moved to", result.content.decode())
|
|
|
|
|
|
|
|
def test_deactivation_notice_when_deactivated_and_deactivated_redirect_is_set(self) -> None:
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
realm.deactivated = True
|
|
|
|
realm.deactivated_redirect = "http://example.zulipchat.com"
|
|
|
|
realm.save(update_fields=["deactivated", "deactivated_redirect"])
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/deactivated/")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertIn(
|
|
|
|
'It has moved to <a href="http://example.zulipchat.com">http://example.zulipchat.com</a>.',
|
|
|
|
result.content.decode(),
|
|
|
|
)
|
2017-08-25 06:32:57 +02:00
|
|
|
|
2020-12-18 20:17:20 +01:00
|
|
|
def test_deactivation_notice_when_realm_subdomain_is_changed(self) -> None:
|
|
|
|
realm = get_realm("zulip")
|
2020-12-06 20:04:33 +01:00
|
|
|
do_change_realm_subdomain(realm, "new-subdomain-name", acting_user=None)
|
2020-12-18 20:17:20 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/deactivated/")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertIn(
|
|
|
|
'It has moved to <a href="http://new-subdomain-name.testserver">http://new-subdomain-name.testserver</a>.',
|
|
|
|
result.content.decode(),
|
|
|
|
)
|
2020-12-18 20:17:20 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
def test_deactivated_redirect_field_of_placeholder_realms_are_modified_on_changing_subdomain_multiple_times(
|
|
|
|
self,
|
|
|
|
) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
2020-12-06 20:04:33 +01:00
|
|
|
do_change_realm_subdomain(realm, "new-name-1", acting_user=None)
|
2020-12-18 20:17:20 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/deactivated/")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertIn(
|
|
|
|
'It has moved to <a href="http://new-name-1.testserver">http://new-name-1.testserver</a>.',
|
|
|
|
result.content.decode(),
|
|
|
|
)
|
2020-12-18 20:17:20 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("new-name-1")
|
2020-12-06 20:04:33 +01:00
|
|
|
do_change_realm_subdomain(realm, "new-name-2", acting_user=None)
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/deactivated/")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertIn(
|
|
|
|
'It has moved to <a href="http://new-name-2.testserver">http://new-name-2.testserver</a>.',
|
|
|
|
result.content.decode(),
|
|
|
|
)
|
|
|
|
|
2020-12-18 20:17:20 +01:00
|
|
|
|
2016-11-11 05:33:30 +01:00
|
|
|
class AddNewUserHistoryTest(ZulipTestCase):
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_add_new_user_history_race(self) -> None:
|
2016-11-11 05:33:30 +01:00
|
|
|
"""Sends a message during user creation"""
|
|
|
|
# Create a user who hasn't had historical messages added
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
|
|
|
stream = Stream.objects.get(realm=realm, name="Denmark")
|
2019-02-24 04:40:44 +01:00
|
|
|
DefaultStream.objects.create(stream=stream, realm=realm)
|
2019-08-26 22:39:33 +02:00
|
|
|
# Make sure at least 3 messages are sent to Denmark and it's a default stream.
|
2021-02-12 08:20:45 +01:00
|
|
|
message_id = self.send_stream_message(self.example_user("hamlet"), stream.name, "test 1")
|
|
|
|
self.send_stream_message(self.example_user("hamlet"), stream.name, "test 2")
|
|
|
|
self.send_stream_message(self.example_user("hamlet"), stream.name, "test 3")
|
2019-08-26 22:39:33 +02:00
|
|
|
|
2016-11-11 05:33:30 +01:00
|
|
|
with patch("zerver.lib.actions.add_new_user_history"):
|
2021-02-12 08:20:45 +01:00
|
|
|
self.register(self.nonreg_email("test"), "test")
|
|
|
|
user_profile = self.nonreg_user("test")
|
2016-11-11 05:33:30 +01:00
|
|
|
subs = Subscription.objects.select_related("recipient").filter(
|
2021-02-12 08:19:30 +01:00
|
|
|
user_profile=user_profile, recipient__type=Recipient.STREAM
|
|
|
|
)
|
2016-11-11 05:33:30 +01:00
|
|
|
streams = Stream.objects.filter(id__in=[sub.recipient.type_id for sub in subs])
|
2019-08-26 22:39:33 +02:00
|
|
|
|
|
|
|
# Sent a message afterwards to trigger a race between message
|
|
|
|
# sending and `add_new_user_history`.
|
2021-02-12 08:19:30 +01:00
|
|
|
race_message_id = self.send_stream_message(
|
2021-02-12 08:20:45 +01:00
|
|
|
self.example_user("hamlet"), streams[0].name, "test"
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2019-08-26 22:39:33 +02:00
|
|
|
|
|
|
|
# Overwrite ONBOARDING_UNREAD_MESSAGES to 2
|
|
|
|
ONBOARDING_UNREAD_MESSAGES = 2
|
2021-02-12 08:19:30 +01:00
|
|
|
with patch("zerver.lib.actions.ONBOARDING_UNREAD_MESSAGES", ONBOARDING_UNREAD_MESSAGES):
|
2019-08-26 22:39:33 +02:00
|
|
|
add_new_user_history(user_profile, streams)
|
|
|
|
|
|
|
|
# Our first message is in the user's history
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(
|
|
|
|
UserMessage.objects.filter(user_profile=user_profile, message_id=message_id).exists()
|
|
|
|
)
|
2019-08-26 22:39:33 +02:00
|
|
|
# The race message is in the user's history and marked unread.
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(
|
|
|
|
UserMessage.objects.filter(
|
|
|
|
user_profile=user_profile, message_id=race_message_id
|
|
|
|
).exists()
|
|
|
|
)
|
|
|
|
self.assertFalse(
|
|
|
|
UserMessage.objects.get(
|
|
|
|
user_profile=user_profile, message_id=race_message_id
|
|
|
|
).flags.read.is_set
|
|
|
|
)
|
2019-08-26 22:39:33 +02:00
|
|
|
|
|
|
|
# Verify that the ONBOARDING_UNREAD_MESSAGES latest messages
|
|
|
|
# that weren't the race message are marked as unread.
|
2021-02-12 08:19:30 +01:00
|
|
|
latest_messages = (
|
|
|
|
UserMessage.objects.filter(
|
|
|
|
user_profile=user_profile,
|
|
|
|
message__recipient__type=Recipient.STREAM,
|
|
|
|
)
|
|
|
|
.exclude(message_id=race_message_id)
|
2021-02-12 08:20:45 +01:00
|
|
|
.order_by("-message_id")[0:ONBOARDING_UNREAD_MESSAGES]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(latest_messages, 2)
|
2019-08-26 22:39:33 +02:00
|
|
|
for msg in latest_messages:
|
|
|
|
self.assertFalse(msg.flags.read.is_set)
|
|
|
|
|
|
|
|
# Verify that older messages are correctly marked as read.
|
2021-02-12 08:19:30 +01:00
|
|
|
older_messages = (
|
|
|
|
UserMessage.objects.filter(
|
|
|
|
user_profile=user_profile,
|
|
|
|
message__recipient__type=Recipient.STREAM,
|
|
|
|
)
|
|
|
|
.exclude(message_id=race_message_id)
|
2021-02-12 08:20:45 +01:00
|
|
|
.order_by("-message_id")[ONBOARDING_UNREAD_MESSAGES : ONBOARDING_UNREAD_MESSAGES + 1]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-07-13 19:42:37 +02:00
|
|
|
self.assertGreater(len(older_messages), 0)
|
2019-08-26 22:39:33 +02:00
|
|
|
for msg in older_messages:
|
|
|
|
self.assertTrue(msg.flags.read.is_set)
|
2016-11-11 05:33:30 +01:00
|
|
|
|
2020-07-08 02:22:52 +02:00
|
|
|
def test_auto_subbed_to_personals(self) -> None:
|
|
|
|
"""
|
|
|
|
Newly created users are auto-subbed to the ability to receive
|
|
|
|
personals.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
test_email = self.nonreg_email("test")
|
2020-07-08 02:22:52 +02:00
|
|
|
self.register(test_email, "test")
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.nonreg_user("test")
|
2020-07-08 02:22:52 +02:00
|
|
|
old_messages_count = message_stream_count(user_profile)
|
|
|
|
self.send_personal_message(user_profile, user_profile)
|
|
|
|
new_messages_count = message_stream_count(user_profile)
|
|
|
|
self.assertEqual(new_messages_count, old_messages_count + 1)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
recipient = Recipient.objects.get(type_id=user_profile.id, type=Recipient.PERSONAL)
|
2020-07-08 02:22:52 +02:00
|
|
|
message = most_recent_message(user_profile)
|
|
|
|
self.assertEqual(message.recipient, recipient)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.models.get_display_recipient", return_value="recip"):
|
2020-07-08 02:22:52 +02:00
|
|
|
self.assertEqual(
|
|
|
|
str(message),
|
2021-02-12 08:20:45 +01:00
|
|
|
"<Message: recip / / "
|
|
|
|
"<UserProfile: {} {}>>".format(user_profile.email, user_profile.realm),
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-07-08 02:22:52 +02:00
|
|
|
|
|
|
|
user_message = most_recent_usermessage(user_profile)
|
|
|
|
self.assertEqual(
|
|
|
|
str(user_message),
|
2021-02-12 08:20:45 +01:00
|
|
|
f"<UserMessage: recip / {user_profile.email} ([])>",
|
2020-07-08 02:22:52 +02:00
|
|
|
)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2018-03-18 20:56:00 +01:00
|
|
|
class InitialPasswordTest(ZulipTestCase):
|
|
|
|
def test_none_initial_password_salt(self) -> None:
|
|
|
|
with self.settings(INITIAL_PASSWORD_SALT=None):
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertIsNone(initial_password("test@test.com"))
|
2018-03-18 20:56:00 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2016-09-13 22:49:03 +02:00
|
|
|
class PasswordResetTest(ZulipTestCase):
|
|
|
|
"""
|
|
|
|
Log in, reset password, log out, log in with new password.
|
|
|
|
"""
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
def get_reset_mail_body(self, subdomain: str = "zulip") -> str:
|
2020-06-05 23:26:35 +02:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2020-06-05 23:26:35 +02:00
|
|
|
[message] = outbox
|
2021-01-26 04:20:36 +01:00
|
|
|
self.assertEqual(self.email_envelope_from(message), settings.NOREPLY_EMAIL_ADDRESS)
|
2020-06-05 23:26:35 +02:00
|
|
|
self.assertRegex(
|
2021-01-26 04:20:36 +01:00
|
|
|
self.email_display_from(message),
|
2020-06-05 23:26:35 +02:00
|
|
|
fr"^Zulip Account Security <{self.TOKENIZED_NOREPLY_REGEX}>\Z",
|
|
|
|
)
|
2020-06-14 13:32:38 +02:00
|
|
|
self.assertIn(f"{subdomain}.testserver", message.extra_headers["List-Id"])
|
|
|
|
|
2020-06-05 23:26:35 +02:00
|
|
|
return message.body
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_password_reset(self) -> None:
|
2020-03-06 18:40:46 +01:00
|
|
|
user = self.example_user("hamlet")
|
2020-03-12 14:17:25 +01:00
|
|
|
email = user.delivery_email
|
2016-09-13 22:49:03 +02:00
|
|
|
old_password = initial_password(email)
|
2020-07-05 01:38:05 +02:00
|
|
|
assert old_password is not None
|
2016-09-13 22:49:03 +02:00
|
|
|
|
2020-03-06 18:40:46 +01:00
|
|
|
self.login_user(user)
|
2016-09-13 22:49:03 +02:00
|
|
|
|
2016-12-01 08:54:21 +01:00
|
|
|
# test password reset template
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/password/reset/")
|
|
|
|
self.assert_in_response("Reset your password", result)
|
2016-12-01 08:54:21 +01:00
|
|
|
|
2016-09-13 22:49:03 +02:00
|
|
|
# start the password reset process by supplying an email address
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/password/reset/", {"email": email})
|
2016-09-13 22:49:03 +02:00
|
|
|
|
|
|
|
# check the redirect link telling you to check mail for password reset link
|
2016-12-16 02:01:34 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith("/accounts/password/reset/done/"))
|
2016-09-13 22:49:03 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
|
2018-09-16 02:34:57 +02:00
|
|
|
self.assert_in_response("Check your email in a few minutes to finish the process.", result)
|
2016-09-13 22:49:03 +02:00
|
|
|
|
2017-07-05 21:29:27 +02:00
|
|
|
# Check that the password reset email is from a noreply address.
|
2020-06-05 23:26:35 +02:00
|
|
|
body = self.get_reset_mail_body()
|
|
|
|
self.assertIn("reset your password", body)
|
2017-07-05 21:29:27 +02:00
|
|
|
|
2016-09-23 04:23:48 +02:00
|
|
|
# Visit the password reset link.
|
2017-10-30 22:56:14 +01:00
|
|
|
password_reset_url = self.get_confirmation_url_from_outbox(
|
2021-02-12 08:19:30 +01:00
|
|
|
email, url_pattern=settings.EXTERNAL_HOST + r"(\S\S+)"
|
|
|
|
)
|
2016-09-13 22:49:03 +02:00
|
|
|
result = self.client_get(password_reset_url)
|
2020-02-02 13:51:39 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertTrue(result.url.endswith(f"/{PasswordResetConfirmView.reset_url_token}/"))
|
2020-02-02 13:51:39 +01:00
|
|
|
|
|
|
|
final_reset_url = result.url
|
|
|
|
result = self.client_get(final_reset_url)
|
2016-12-16 02:01:34 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2016-09-13 22:49:03 +02:00
|
|
|
|
|
|
|
# Reset your password
|
auth: Use zxcvbn to ensure password strength on server side.
For a long time, we've been only doing the zxcvbn password strength
checks on the browser, which is helpful, but means users could through
hackery (or a bug in the frontend validation code) manage to set a
too-weak password. We fix this by running our password strength
validation on the backend as well, using python-zxcvbn.
In theory, a bug in python-zxcvbn could result in it producing a
different opinion than the frontend version; if so, it'd be a pretty
bad bug in the library, and hopefully we'd hear about it from users,
report upstream, and get it fixed that way. Alternatively, we can
switch to shelling out to node like we do for KaTeX.
Fixes #6880.
2019-11-18 08:11:03 +01:00
|
|
|
with self.settings(PASSWORD_MIN_LENGTH=3, PASSWORD_MIN_GUESSES=1000):
|
|
|
|
# Verify weak passwords don't work.
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
final_reset_url, {"new_password1": "easy", "new_password2": "easy"}
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
self.assert_in_response("The password is too weak.", result)
|
|
|
|
|
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
final_reset_url, {"new_password1": "f657gdGGk9", "new_password2": "f657gdGGk9"}
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
auth: Use zxcvbn to ensure password strength on server side.
For a long time, we've been only doing the zxcvbn password strength
checks on the browser, which is helpful, but means users could through
hackery (or a bug in the frontend validation code) manage to set a
too-weak password. We fix this by running our password strength
validation on the backend as well, using python-zxcvbn.
In theory, a bug in python-zxcvbn could result in it producing a
different opinion than the frontend version; if so, it'd be a pretty
bad bug in the library, and hopefully we'd hear about it from users,
report upstream, and get it fixed that way. Alternatively, we can
switch to shelling out to node like we do for KaTeX.
Fixes #6880.
2019-11-18 08:11:03 +01:00
|
|
|
# password reset succeeded
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertTrue(result["Location"].endswith("/password/done/"))
|
2016-09-13 22:49:03 +02:00
|
|
|
|
auth: Use zxcvbn to ensure password strength on server side.
For a long time, we've been only doing the zxcvbn password strength
checks on the browser, which is helpful, but means users could through
hackery (or a bug in the frontend validation code) manage to set a
too-weak password. We fix this by running our password strength
validation on the backend as well, using python-zxcvbn.
In theory, a bug in python-zxcvbn could result in it producing a
different opinion than the frontend version; if so, it'd be a pretty
bad bug in the library, and hopefully we'd hear about it from users,
report upstream, and get it fixed that way. Alternatively, we can
switch to shelling out to node like we do for KaTeX.
Fixes #6880.
2019-11-18 08:11:03 +01:00
|
|
|
# log back in with new password
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login_by_email(email, password="f657gdGGk9")
|
|
|
|
user_profile = self.example_user("hamlet")
|
auth: Use zxcvbn to ensure password strength on server side.
For a long time, we've been only doing the zxcvbn password strength
checks on the browser, which is helpful, but means users could through
hackery (or a bug in the frontend validation code) manage to set a
too-weak password. We fix this by running our password strength
validation on the backend as well, using python-zxcvbn.
In theory, a bug in python-zxcvbn could result in it producing a
different opinion than the frontend version; if so, it'd be a pretty
bad bug in the library, and hopefully we'd hear about it from users,
report upstream, and get it fixed that way. Alternatively, we can
switch to shelling out to node like we do for KaTeX.
Fixes #6880.
2019-11-18 08:11:03 +01:00
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
2016-09-13 22:49:03 +02:00
|
|
|
|
auth: Use zxcvbn to ensure password strength on server side.
For a long time, we've been only doing the zxcvbn password strength
checks on the browser, which is helpful, but means users could through
hackery (or a bug in the frontend validation code) manage to set a
too-weak password. We fix this by running our password strength
validation on the backend as well, using python-zxcvbn.
In theory, a bug in python-zxcvbn could result in it producing a
different opinion than the frontend version; if so, it'd be a pretty
bad bug in the library, and hopefully we'd hear about it from users,
report upstream, and get it fixed that way. Alternatively, we can
switch to shelling out to node like we do for KaTeX.
Fixes #6880.
2019-11-18 08:11:03 +01:00
|
|
|
# make sure old password no longer works
|
2020-03-06 18:40:46 +01:00
|
|
|
self.assert_login_failure(email, password=old_password)
|
2016-09-13 22:49:03 +02:00
|
|
|
|
2021-08-19 09:55:54 +02:00
|
|
|
@patch("django.http.HttpRequest.get_host")
|
|
|
|
def test_password_reset_page_redirects_for_root_alias_when_root_domain_landing_page_is_enabled(
|
|
|
|
self, mock_get_host: MagicMock
|
|
|
|
) -> None:
|
|
|
|
mock_get_host.return_value = "alias.testserver"
|
|
|
|
with self.settings(ROOT_DOMAIN_LANDING_PAGE=True, ROOT_SUBDOMAIN_ALIASES=["alias"]):
|
|
|
|
result = self.client_get("/accounts/password/reset/")
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result.url, "/accounts/go/?next=%2Faccounts%2Fpassword%2Freset%2F")
|
|
|
|
|
|
|
|
mock_get_host.return_value = "www.testserver"
|
|
|
|
with self.settings(
|
|
|
|
ROOT_DOMAIN_LANDING_PAGE=True,
|
|
|
|
):
|
|
|
|
result = self.client_get("/accounts/password/reset/")
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result.url, "/accounts/go/?next=%2Faccounts%2Fpassword%2Freset%2F")
|
|
|
|
|
|
|
|
@patch("django.http.HttpRequest.get_host")
|
|
|
|
def test_password_reset_page_redirects_for_root_domain_when_root_domain_landing_page_is_enabled(
|
|
|
|
self, mock_get_host: MagicMock
|
|
|
|
) -> None:
|
|
|
|
mock_get_host.return_value = "testserver"
|
|
|
|
with self.settings(ROOT_DOMAIN_LANDING_PAGE=True):
|
|
|
|
result = self.client_get("/accounts/password/reset/")
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result.url, "/accounts/go/?next=%2Faccounts%2Fpassword%2Freset%2F")
|
|
|
|
|
|
|
|
mock_get_host.return_value = "www.testserver.com"
|
|
|
|
with self.settings(
|
|
|
|
ROOT_DOMAIN_LANDING_PAGE=True,
|
|
|
|
EXTERNAL_HOST="www.testserver.com",
|
|
|
|
):
|
|
|
|
result = self.client_get("/accounts/password/reset/")
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result.url, "/accounts/go/?next=%2Faccounts%2Fpassword%2Freset%2F")
|
|
|
|
|
|
|
|
@patch("django.http.HttpRequest.get_host")
|
|
|
|
def test_password_reset_page_works_for_root_alias_when_root_domain_landing_page_is_not_enabled(
|
|
|
|
self, mock_get_host: MagicMock
|
|
|
|
) -> None:
|
|
|
|
mock_get_host.return_value = "alias.testserver"
|
|
|
|
with self.settings(ROOT_SUBDOMAIN_ALIASES=["alias"]):
|
|
|
|
result = self.client_get("/accounts/password/reset/")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
mock_get_host.return_value = "www.testserver"
|
|
|
|
result = self.client_get("/accounts/password/reset/")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
@patch("django.http.HttpRequest.get_host")
|
|
|
|
def test_password_reset_page_works_for_root_domain_when_root_domain_landing_page_is_not_enabled(
|
|
|
|
self, mock_get_host: MagicMock
|
|
|
|
) -> None:
|
|
|
|
mock_get_host.return_value = "testserver"
|
|
|
|
result = self.client_get("/accounts/password/reset/")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
mock_get_host.return_value = "www.testserver.com"
|
|
|
|
with self.settings(EXTERNAL_HOST="www.testserver.com", ROOT_SUBDOMAIN_ALIASES=[]):
|
|
|
|
result = self.client_get("/accounts/password/reset/")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
@patch("django.http.HttpRequest.get_host")
|
|
|
|
def test_password_reset_page_works_always_for_subdomains(
|
|
|
|
self, mock_get_host: MagicMock
|
|
|
|
) -> None:
|
|
|
|
mock_get_host.return_value = "lear.testserver"
|
|
|
|
with self.settings(ROOT_DOMAIN_LANDING_PAGE=True):
|
|
|
|
result = self.client_get("/accounts/password/reset/")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
result = self.client_get("/accounts/password/reset/")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_password_reset_for_non_existent_user(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
email = "nonexisting@mars.com"
|
2017-08-11 07:55:51 +02:00
|
|
|
|
2017-11-18 03:17:50 +01:00
|
|
|
# start the password reset process by supplying an email address
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/password/reset/", {"email": email})
|
2017-08-11 07:55:51 +02:00
|
|
|
|
|
|
|
# check the redirect link telling you to check mail for password reset link
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith("/accounts/password/reset/done/"))
|
2017-08-11 07:55:51 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
|
2018-09-16 02:34:57 +02:00
|
|
|
self.assert_in_response("Check your email in a few minutes to finish the process.", result)
|
2017-08-11 07:55:51 +02:00
|
|
|
|
|
|
|
# Check that the password reset email is from a noreply address.
|
2020-06-05 23:26:35 +02:00
|
|
|
body = self.get_reset_mail_body()
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertIn("Somebody (possibly you) requested a new password", body)
|
|
|
|
self.assertIn("You do not have an account", body)
|
|
|
|
self.assertIn("safely ignore", body)
|
|
|
|
self.assertNotIn("reset your password", body)
|
|
|
|
self.assertNotIn("deactivated", body)
|
2017-08-11 07:55:51 +02:00
|
|
|
|
2018-05-21 05:02:27 +02:00
|
|
|
def test_password_reset_for_deactivated_user(self) -> None:
|
|
|
|
user_profile = self.example_user("hamlet")
|
2020-03-12 14:17:25 +01:00
|
|
|
email = user_profile.delivery_email
|
2021-03-27 06:02:12 +01:00
|
|
|
do_deactivate_user(user_profile, acting_user=None)
|
2018-05-21 05:02:27 +02:00
|
|
|
|
|
|
|
# start the password reset process by supplying an email address
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/password/reset/", {"email": email})
|
2018-05-21 05:02:27 +02:00
|
|
|
|
|
|
|
# check the redirect link telling you to check mail for password reset link
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith("/accounts/password/reset/done/"))
|
2018-05-21 05:02:27 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
|
2018-09-16 02:34:57 +02:00
|
|
|
self.assert_in_response("Check your email in a few minutes to finish the process.", result)
|
2018-05-21 05:02:27 +02:00
|
|
|
|
|
|
|
# Check that the password reset email is from a noreply address.
|
2020-06-05 23:26:35 +02:00
|
|
|
body = self.get_reset_mail_body()
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertIn("Somebody (possibly you) requested a new password", body)
|
|
|
|
self.assertIn("has been deactivated", body)
|
|
|
|
self.assertIn("safely ignore", body)
|
|
|
|
self.assertNotIn("reset your password", body)
|
|
|
|
self.assertNotIn("not have an account", body)
|
2018-05-21 05:02:27 +02:00
|
|
|
|
|
|
|
def test_password_reset_with_deactivated_realm(self) -> None:
|
|
|
|
user_profile = self.example_user("hamlet")
|
2020-03-12 14:17:25 +01:00
|
|
|
email = user_profile.delivery_email
|
2021-04-02 17:11:25 +02:00
|
|
|
do_deactivate_realm(user_profile.realm, acting_user=None)
|
2018-05-21 05:02:27 +02:00
|
|
|
|
|
|
|
# start the password reset process by supplying an email address
|
2020-12-23 21:45:16 +01:00
|
|
|
with self.assertLogs(level="INFO") as m:
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/password/reset/", {"email": email})
|
2020-12-23 21:45:16 +01:00
|
|
|
self.assertEqual(m.output, ["INFO:root:Realm is deactivated"])
|
2018-05-21 05:02:27 +02:00
|
|
|
|
|
|
|
# check the redirect link telling you to check mail for password reset link
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith("/accounts/password/reset/done/"))
|
2018-05-21 05:02:27 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
|
2018-09-16 02:34:57 +02:00
|
|
|
self.assert_in_response("Check your email in a few minutes to finish the process.", result)
|
2018-05-21 05:02:27 +02:00
|
|
|
|
|
|
|
# Check that the password reset email is from a noreply address.
|
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, 0)
|
2018-05-21 05:02:27 +02:00
|
|
|
|
2019-12-30 21:13:02 +01:00
|
|
|
@override_settings(RATE_LIMITING=True)
|
|
|
|
def test_rate_limiting(self) -> None:
|
|
|
|
user_profile = self.example_user("hamlet")
|
2020-03-12 14:17:25 +01:00
|
|
|
email = user_profile.delivery_email
|
2019-12-30 21:13:02 +01:00
|
|
|
from django.core.mail import outbox
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
add_ratelimit_rule(10, 2, domain="password_reset_form_by_email")
|
2019-12-30 21:13:02 +01:00
|
|
|
start_time = time.time()
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("time.time", return_value=start_time):
|
|
|
|
self.client_post("/accounts/password/reset/", {"email": email})
|
|
|
|
self.client_post("/accounts/password/reset/", {"email": email})
|
2019-12-30 21:13:02 +01:00
|
|
|
self.assert_length(outbox, 2)
|
|
|
|
|
|
|
|
# Too many password reset emails sent to the address, we won't send more.
|
2021-02-12 08:20:45 +01:00
|
|
|
with self.assertLogs(level="INFO") as info_logs:
|
|
|
|
self.client_post("/accounts/password/reset/", {"email": email})
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
info_logs.output,
|
2021-02-12 08:20:45 +01:00
|
|
|
["INFO:root:Too many password reset attempts for email hamlet@zulip.com"],
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2019-12-30 21:13:02 +01:00
|
|
|
self.assert_length(outbox, 2)
|
|
|
|
|
|
|
|
# Resetting for a different address works though.
|
2021-02-12 08:20:45 +01:00
|
|
|
self.client_post("/accounts/password/reset/", {"email": self.example_email("othello")})
|
2019-12-30 21:13:02 +01:00
|
|
|
self.assert_length(outbox, 3)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.client_post("/accounts/password/reset/", {"email": self.example_email("othello")})
|
2019-12-30 21:13:02 +01:00
|
|
|
self.assert_length(outbox, 4)
|
|
|
|
|
|
|
|
# After time, password reset emails can be sent again.
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("time.time", return_value=start_time + 11):
|
|
|
|
self.client_post("/accounts/password/reset/", {"email": email})
|
|
|
|
self.client_post("/accounts/password/reset/", {"email": email})
|
2019-12-30 21:13:02 +01:00
|
|
|
self.assert_length(outbox, 6)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
remove_ratelimit_rule(10, 2, domain="password_reset_form_by_email")
|
2019-12-30 21:13:02 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_wrong_subdomain(self) -> None:
|
2017-05-25 01:40:26 +02:00
|
|
|
email = self.example_email("hamlet")
|
2017-11-18 03:30:07 +01:00
|
|
|
|
|
|
|
# start the password reset process by supplying an email address
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/password/reset/", {"email": email}, subdomain="zephyr")
|
2017-04-24 12:19:54 +02:00
|
|
|
|
|
|
|
# check the redirect link telling you to check mail for password reset link
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith("/accounts/password/reset/done/"))
|
2017-04-24 12:19:54 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
|
2018-09-16 02:34:57 +02:00
|
|
|
self.assert_in_response("Check your email in a few minutes to finish the process.", result)
|
2017-04-24 12:19:54 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
body = self.get_reset_mail_body("zephyr")
|
|
|
|
self.assertIn("Somebody (possibly you) requested a new password", body)
|
|
|
|
self.assertIn("You do not have an account", body)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertIn(
|
|
|
|
"active accounts in the following organization(s).\nhttp://zulip.testserver", body
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertIn("safely ignore", body)
|
|
|
|
self.assertNotIn("reset your password", body)
|
|
|
|
self.assertNotIn("deactivated", body)
|
2017-04-24 12:19:54 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invalid_subdomain(self) -> None:
|
2017-05-25 01:40:26 +02:00
|
|
|
email = self.example_email("hamlet")
|
2017-04-24 12:19:54 +02:00
|
|
|
|
2017-11-18 03:30:07 +01:00
|
|
|
# start the password reset process by supplying an email address
|
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/accounts/password/reset/", {"email": email}, subdomain="invalid"
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-04-24 12:19:54 +02:00
|
|
|
|
|
|
|
# check the redirect link telling you to check mail for password reset link
|
2019-03-12 01:56:52 +01:00
|
|
|
self.assertEqual(result.status_code, 404)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_in_response("There is no Zulip organization hosted at this subdomain.", result)
|
2017-04-24 12:19:54 +02:00
|
|
|
|
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, 0)
|
2017-04-24 12:19:54 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.ZulipLDAPAuthBackend",
|
|
|
|
"zproject.backends.ZulipDummyBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_ldap_auth_only(self) -> None:
|
2017-10-24 20:44:01 +02:00
|
|
|
"""If the email auth backend is not enabled, password reset should do nothing"""
|
|
|
|
email = self.example_email("hamlet")
|
2020-12-23 21:45:16 +01:00
|
|
|
with self.assertLogs(level="INFO") as m:
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/password/reset/", {"email": email})
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
m.output,
|
|
|
|
[
|
|
|
|
"INFO:root:Password reset attempted for hamlet@zulip.com even though password auth is disabled."
|
|
|
|
],
|
|
|
|
)
|
2017-10-24 20:44:01 +02:00
|
|
|
|
|
|
|
# check the redirect link telling you to check mail for password reset link
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith("/accounts/password/reset/done/"))
|
2017-10-24 20:44:01 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
|
2018-09-16 02:34:57 +02:00
|
|
|
self.assert_in_response("Check your email in a few minutes to finish the process.", result)
|
2017-10-24 20:44:01 +02:00
|
|
|
|
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, 0)
|
2017-10-24 20:44:01 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.ZulipLDAPAuthBackend",
|
|
|
|
"zproject.backends.EmailAuthBackend",
|
|
|
|
"zproject.backends.ZulipDummyBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2018-05-29 07:09:48 +02:00
|
|
|
def test_ldap_and_email_auth(self) -> None:
|
2020-10-23 02:43:28 +02:00
|
|
|
"""If both email and LDAP auth backends are enabled, limit password
|
2021-02-12 08:19:30 +01:00
|
|
|
reset to users outside the LDAP domain"""
|
2018-05-29 07:09:48 +02:00
|
|
|
# If the domain matches, we don't generate an email
|
|
|
|
with self.settings(LDAP_APPEND_DOMAIN="zulip.com"):
|
|
|
|
email = self.example_email("hamlet")
|
2020-12-23 21:45:16 +01:00
|
|
|
with self.assertLogs(level="INFO") as m:
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/password/reset/", {"email": email})
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
m.output, ["INFO:root:Password reset not allowed for user in LDAP domain"]
|
|
|
|
)
|
2018-05-29 07:09:48 +02:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, 0)
|
2018-05-29 07:09:48 +02:00
|
|
|
|
|
|
|
# If the domain doesn't match, we do generate an email
|
|
|
|
with self.settings(LDAP_APPEND_DOMAIN="example.com"):
|
|
|
|
email = self.example_email("hamlet")
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/password/reset/", {"email": email})
|
2020-12-08 09:25:42 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith("/accounts/password/reset/done/"))
|
2020-12-08 09:25:42 +01:00
|
|
|
result = self.client_get(result["Location"])
|
2018-05-29 07:09:48 +02:00
|
|
|
|
2020-06-05 23:26:35 +02:00
|
|
|
body = self.get_reset_mail_body()
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertIn("reset your password", body)
|
2018-05-29 07:09:48 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_redirect_endpoints(self) -> None:
|
2021-02-12 08:19:30 +01:00
|
|
|
"""
|
2016-11-14 19:13:59 +01:00
|
|
|
These tests are mostly designed to give us 100% URL coverage
|
|
|
|
in our URL coverage reports. Our mechanism for finding URL
|
|
|
|
coverage doesn't handle redirects, so we just have a few quick
|
|
|
|
tests here.
|
2021-02-12 08:19:30 +01:00
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/password/reset/done/")
|
2016-11-19 21:54:00 +01:00
|
|
|
self.assert_in_success_response(["Check your email"], result)
|
2016-11-14 19:13:59 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/password/done/")
|
2016-11-19 21:54:00 +01:00
|
|
|
self.assert_in_success_response(["We've reset your password!"], result)
|
2016-11-14 19:13:59 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/send_confirm/alice@example.com")
|
2018-08-24 10:22:11 +02:00
|
|
|
self.assert_in_success_response(["/accounts/home/"], result)
|
2016-11-14 19:13:59 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/new/send_confirm/alice@example.com")
|
2018-08-24 10:22:11 +02:00
|
|
|
self.assert_in_success_response(["/new/"], result)
|
2018-08-24 10:01:42 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2016-08-23 02:08:42 +02:00
|
|
|
class LoginTest(ZulipTestCase):
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
|
|
|
Logging in, registration, and logging out.
|
|
|
|
"""
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_login(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
|
|
|
user_profile = self.example_user("hamlet")
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_login_deactivated_user(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.example_user("hamlet")
|
2021-03-27 06:02:12 +01:00
|
|
|
do_deactivate_user(user_profile, acting_user=None)
|
2021-08-23 15:14:05 +02:00
|
|
|
result = self.login_with_return(user_profile.delivery_email, "xxx")
|
2017-11-18 02:23:03 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-08-23 15:14:05 +02:00
|
|
|
self.assert_in_response(
|
2021-08-23 15:14:05 +02:00
|
|
|
f"Your account {user_profile.delivery_email} has been deactivated.", result
|
2021-08-23 15:14:05 +02:00
|
|
|
)
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(None)
|
2017-11-18 02:23:03 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_login_bad_password(self) -> None:
|
2020-03-12 14:17:25 +01:00
|
|
|
user = self.example_user("hamlet")
|
2020-07-05 01:38:05 +02:00
|
|
|
password: Optional[str] = "wrongpassword"
|
2020-03-12 14:17:25 +01:00
|
|
|
result = self.login_with_return(user.delivery_email, password=password)
|
|
|
|
self.assert_in_success_response([user.delivery_email], result)
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(None)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2020-03-12 14:17:25 +01:00
|
|
|
# Parallel test to confirm that the right password works using the
|
|
|
|
# same login code, which verifies our failing test isn't broken
|
|
|
|
# for some other reason.
|
|
|
|
password = initial_password(user.delivery_email)
|
|
|
|
result = self.login_with_return(user.delivery_email, password=password)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assert_logged_in_user_id(user.id)
|
|
|
|
|
2019-12-30 02:21:51 +01:00
|
|
|
@override_settings(RATE_LIMITING_AUTHENTICATE=True)
|
|
|
|
def test_login_bad_password_rate_limiter(self) -> None:
|
|
|
|
user_profile = self.example_user("hamlet")
|
2020-03-12 14:17:25 +01:00
|
|
|
email = user_profile.delivery_email
|
2021-02-12 08:20:45 +01:00
|
|
|
add_ratelimit_rule(10, 2, domain="authenticate_by_username")
|
2019-12-30 02:21:51 +01:00
|
|
|
|
|
|
|
start_time = time.time()
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("time.time", return_value=start_time):
|
2019-12-30 02:21:51 +01:00
|
|
|
self.login_with_return(email, password="wrongpassword")
|
|
|
|
self.assert_logged_in_user_id(None)
|
|
|
|
self.login_with_return(email, password="wrongpassword")
|
|
|
|
self.assert_logged_in_user_id(None)
|
|
|
|
|
|
|
|
# We're over the allowed limit, so the next attempt, even with the correct
|
|
|
|
# password, will get blocked.
|
|
|
|
result = self.login_with_return(email)
|
|
|
|
self.assert_in_success_response(["Try again in 10 seconds"], result)
|
|
|
|
|
|
|
|
# After time passes, we should be able to log in.
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("time.time", return_value=start_time + 11):
|
2019-12-30 02:21:51 +01:00
|
|
|
self.login_with_return(email)
|
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
remove_ratelimit_rule(10, 2, domain="authenticate_by_username")
|
2019-12-30 02:21:51 +01:00
|
|
|
|
2021-05-07 15:10:35 +02:00
|
|
|
def test_login_with_old_weak_password_after_hasher_change(self) -> None:
|
|
|
|
user_profile = self.example_user("hamlet")
|
|
|
|
password = "a_password_of_22_chars"
|
|
|
|
|
2021-05-07 15:14:24 +02:00
|
|
|
with self.settings(PASSWORD_HASHERS=("django.contrib.auth.hashers.SHA1PasswordHasher",)):
|
2021-05-07 15:10:35 +02:00
|
|
|
user_profile.set_password(password)
|
|
|
|
user_profile.save()
|
|
|
|
|
|
|
|
with self.settings(
|
|
|
|
PASSWORD_HASHERS=(
|
2021-05-07 15:14:24 +02:00
|
|
|
"django.contrib.auth.hashers.MD5PasswordHasher",
|
|
|
|
"django.contrib.auth.hashers.SHA1PasswordHasher",
|
2021-05-07 15:10:35 +02:00
|
|
|
),
|
|
|
|
PASSWORD_MIN_LENGTH=30,
|
|
|
|
), self.assertLogs("zulip.auth.email", level="INFO"):
|
|
|
|
result = self.login_with_return(self.example_email("hamlet"), password)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
self.assert_in_response(
|
|
|
|
"Your password has been disabled because it is too weak.", result
|
|
|
|
)
|
|
|
|
self.assert_logged_in_user_id(None)
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_login_nonexist_user(self) -> None:
|
2016-06-27 20:36:04 +02:00
|
|
|
result = self.login_with_return("xxx@zulip.com", "xxx")
|
2017-11-18 02:23:03 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2016-07-12 15:41:45 +02:00
|
|
|
self.assert_in_response("Please enter a correct email and password", result)
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(None)
|
2017-11-18 02:23:03 +01:00
|
|
|
|
2017-11-17 10:47:43 +01:00
|
|
|
def test_login_wrong_subdomain(self) -> None:
|
2021-08-23 15:14:05 +02:00
|
|
|
email = self.mit_email("sipbtest")
|
2020-12-23 21:45:16 +01:00
|
|
|
with self.assertLogs(level="WARNING") as m:
|
2021-08-23 15:14:05 +02:00
|
|
|
result = self.login_with_return(email, "xxx")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
m.output,
|
|
|
|
[
|
|
|
|
"WARNING:root:User sipbtest@mit.edu attempted password login to wrong subdomain zulip"
|
|
|
|
],
|
|
|
|
)
|
2017-11-18 02:23:03 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-08-23 15:14:05 +02:00
|
|
|
expected_error = (
|
|
|
|
f"Your Zulip account {email} is not a member of the "
|
|
|
|
+ "organization associated with this subdomain."
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-08-23 15:14:05 +02:00
|
|
|
self.assert_in_response(expected_error, result)
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(None)
|
2017-11-18 02:23:03 +01:00
|
|
|
|
2017-11-17 10:47:43 +01:00
|
|
|
def test_login_invalid_subdomain(self) -> None:
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.login_with_return(self.example_email("hamlet"), "xxx", subdomain="invalid")
|
2019-03-12 01:56:52 +01:00
|
|
|
self.assertEqual(result.status_code, 404)
|
2017-11-18 02:23:03 +01:00
|
|
|
self.assert_in_response("There is no Zulip organization hosted at this subdomain.", result)
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(None)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_register(self) -> None:
|
2020-03-12 14:17:25 +01:00
|
|
|
reset_emails_in_zulip_realm()
|
|
|
|
|
2017-01-04 05:30:48 +01:00
|
|
|
realm = get_realm("zulip")
|
2020-06-09 00:25:09 +02:00
|
|
|
stream_names = [f"stream_{i}" for i in range(40)]
|
2019-02-24 04:40:44 +01:00
|
|
|
for stream_name in stream_names:
|
|
|
|
stream = self.make_stream(stream_name, realm=realm)
|
|
|
|
DefaultStream.objects.create(stream=stream, realm=realm)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2017-03-31 08:41:14 +02:00
|
|
|
# Clear all the caches.
|
|
|
|
flush_per_request_caches()
|
|
|
|
ContentType.objects.clear_cache()
|
|
|
|
|
tests: Fix queries_captured to clear cache up front.
Before this change we were clearing the cache on
every SQL usage.
The code to do this was added in February 2017
in 6db4879f9c9fd6941d3aa2af6138ea75aa6675a6.
Now we clear the cache just one time, but before
the action/request under test.
Tests that want to count queries with a warm
cache now specify keep_cache_warm=True. Those
tests were particularly flawed before this change.
In general, the old code both over-counted and
under-counted queries.
It under-counted SQL usage for requests that were
able to pull some data out of a warm cache before
they did any SQL. Typically this would have bypassed
the initial query to get UserProfile, so you
will see several off-by-one fixes.
The old code over-counted SQL usage to the extent
that it's a rather extreme assumption that during
an action itself, the entries that you put into
the cache will get thrown away. And that's essentially
what the prior code simulated.
Now, it's still bad if an action keeps hitting the
cache for no reason, but it's not as bad as hitting
the database. There doesn't appear to be any evidence
of us doing something silly like fetching the same
data from the cache in a loop, but there are
opportunities to prevent second or third round
trips to the cache for the same object, if we
can re-structure the code so that the same caller
doesn't have two callees get the same data.
Note that for invites, we have some cache hits
that are due to the nature of how we serialize
data to our queue processor--we generally just
serialize ids, and then re-fetch objects when
we pop them off the queue.
2020-11-04 12:02:00 +01:00
|
|
|
with queries_captured() as queries, cache_tries_captured() as cache_tries:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.register(self.nonreg_email("test"), "test")
|
2014-01-31 21:08:40 +01:00
|
|
|
# Ensure the number of queries we make is not O(streams)
|
2021-06-29 18:08:42 +02:00
|
|
|
self.assert_length(queries, 89)
|
tests: Fix queries_captured to clear cache up front.
Before this change we were clearing the cache on
every SQL usage.
The code to do this was added in February 2017
in 6db4879f9c9fd6941d3aa2af6138ea75aa6675a6.
Now we clear the cache just one time, but before
the action/request under test.
Tests that want to count queries with a warm
cache now specify keep_cache_warm=True. Those
tests were particularly flawed before this change.
In general, the old code both over-counted and
under-counted queries.
It under-counted SQL usage for requests that were
able to pull some data out of a warm cache before
they did any SQL. Typically this would have bypassed
the initial query to get UserProfile, so you
will see several off-by-one fixes.
The old code over-counted SQL usage to the extent
that it's a rather extreme assumption that during
an action itself, the entries that you put into
the cache will get thrown away. And that's essentially
what the prior code simulated.
Now, it's still bad if an action keeps hitting the
cache for no reason, but it's not as bad as hitting
the database. There doesn't appear to be any evidence
of us doing something silly like fetching the same
data from the cache in a loop, but there are
opportunities to prevent second or third round
trips to the cache for the same object, if we
can re-structure the code so that the same caller
doesn't have two callees get the same data.
Note that for invites, we have some cache hits
that are due to the nature of how we serialize
data to our queue processor--we generally just
serialize ids, and then re-fetch objects when
we pop them off the queue.
2020-11-04 12:02:00 +01:00
|
|
|
|
|
|
|
# We can probably avoid a couple cache hits here, but there doesn't
|
|
|
|
# seem to be any O(N) behavior. Some of the cache hits are related
|
|
|
|
# to sending messages, such as getting the welcome bot, looking up
|
|
|
|
# the alert words for a realm, etc.
|
2021-03-08 11:48:14 +01:00
|
|
|
self.assert_length(cache_tries, 21)
|
tests: Fix queries_captured to clear cache up front.
Before this change we were clearing the cache on
every SQL usage.
The code to do this was added in February 2017
in 6db4879f9c9fd6941d3aa2af6138ea75aa6675a6.
Now we clear the cache just one time, but before
the action/request under test.
Tests that want to count queries with a warm
cache now specify keep_cache_warm=True. Those
tests were particularly flawed before this change.
In general, the old code both over-counted and
under-counted queries.
It under-counted SQL usage for requests that were
able to pull some data out of a warm cache before
they did any SQL. Typically this would have bypassed
the initial query to get UserProfile, so you
will see several off-by-one fixes.
The old code over-counted SQL usage to the extent
that it's a rather extreme assumption that during
an action itself, the entries that you put into
the cache will get thrown away. And that's essentially
what the prior code simulated.
Now, it's still bad if an action keeps hitting the
cache for no reason, but it's not as bad as hitting
the database. There doesn't appear to be any evidence
of us doing something silly like fetching the same
data from the cache in a loop, but there are
opportunities to prevent second or third round
trips to the cache for the same object, if we
can re-structure the code so that the same caller
doesn't have two callees get the same data.
Note that for invites, we have some cache hits
that are due to the nature of how we serialize
data to our queue processor--we generally just
serialize ids, and then re-fetch objects when
we pop them off the queue.
2020-11-04 12:02:00 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.nonreg_user("test")
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
2016-11-08 16:45:48 +01:00
|
|
|
self.assertFalse(user_profile.enable_stream_desktop_notifications)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_register_deactivated(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
|
|
|
If you try to register for a deactivated realm, you get a clear error
|
|
|
|
page.
|
|
|
|
"""
|
2017-01-04 05:30:48 +01:00
|
|
|
realm = get_realm("zulip")
|
2014-01-31 21:08:40 +01:00
|
|
|
realm.deactivated = True
|
|
|
|
realm.save(update_fields=["deactivated"])
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/accounts/home/", {"email": self.nonreg_email("test")}, subdomain="zulip"
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-08-25 08:16:36 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual("/accounts/deactivated/", result.url)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
with self.assertRaises(UserProfile.DoesNotExist):
|
2021-02-12 08:20:45 +01:00
|
|
|
self.nonreg_user("test")
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2021-01-06 18:41:44 +01:00
|
|
|
def test_register_with_invalid_email(self) -> None:
|
|
|
|
"""
|
|
|
|
If you try to register with invalid email, you get an invalid email
|
|
|
|
page
|
|
|
|
"""
|
|
|
|
invalid_email = "foo\x00bar"
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": invalid_email}, subdomain="zulip")
|
2021-01-06 18:41:44 +01:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
self.assertContains(result, "Enter a valid email address")
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_register_deactivated_partway_through(self) -> None:
|
2017-10-02 08:41:00 +02:00
|
|
|
"""
|
|
|
|
If you try to register for a deactivated realm, you get a clear error
|
|
|
|
page.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("test")
|
|
|
|
result = self.client_post("/accounts/home/", {"email": email}, subdomain="zulip")
|
2017-10-02 08:41:00 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertNotIn("deactivated", result.url)
|
2017-10-02 08:41:00 +02:00
|
|
|
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
realm.deactivated = True
|
|
|
|
realm.save(update_fields=["deactivated"])
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user(email, "abcd1234", subdomain="zulip")
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual("/accounts/deactivated/", result.url)
|
2017-10-02 08:41:00 +02:00
|
|
|
|
|
|
|
with self.assertRaises(UserProfile.DoesNotExist):
|
2021-02-12 08:20:45 +01:00
|
|
|
self.nonreg_user("test")
|
2017-10-02 08:41:00 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_login_deactivated_realm(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
|
|
|
If you try to log in to a deactivated realm, you get a clear error page.
|
|
|
|
"""
|
2017-01-04 05:30:48 +01:00
|
|
|
realm = get_realm("zulip")
|
2014-01-31 21:08:40 +01:00
|
|
|
realm.deactivated = True
|
|
|
|
realm.save(update_fields=["deactivated"])
|
|
|
|
|
2017-10-02 08:41:00 +02:00
|
|
|
result = self.login_with_return(self.example_email("hamlet"), subdomain="zulip")
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual("/accounts/deactivated/", result.url)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_logout(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2017-04-18 03:23:32 +02:00
|
|
|
# We use the logout API, not self.logout, to make sure we test
|
|
|
|
# the actual logout code path.
|
2021-02-12 08:20:45 +01:00
|
|
|
self.client_post("/accounts/logout/")
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(None)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_non_ascii_login(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
|
|
|
You can log in even if your password contain non-ASCII characters.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("test")
|
2020-04-09 21:51:58 +02:00
|
|
|
password = "hümbüǵ"
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
# Registering succeeds.
|
2017-05-24 02:42:31 +02:00
|
|
|
self.register(email, password)
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.nonreg_user("test")
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
2017-04-18 03:23:32 +02:00
|
|
|
self.logout()
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(None)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
# Logging in succeeds.
|
2017-04-18 03:23:32 +02:00
|
|
|
self.logout()
|
2020-03-06 18:40:46 +01:00
|
|
|
self.login_by_email(email, password)
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2017-07-13 13:42:57 +02:00
|
|
|
@override_settings(TWO_FACTOR_AUTHENTICATION_ENABLED=False)
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_login_page_redirects_logged_in_user(self) -> None:
|
2017-01-28 20:28:17 +01:00
|
|
|
"""You will be redirected to the app's main page if you land on the
|
|
|
|
login page when already logged in.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("cordelia")
|
2017-01-28 20:28:17 +01:00
|
|
|
response = self.client_get("/login/")
|
2017-10-06 08:36:23 +02:00
|
|
|
self.assertEqual(response["Location"], "http://zulip.testserver")
|
2017-01-28 20:28:17 +01:00
|
|
|
|
2018-05-21 06:40:18 +02:00
|
|
|
def test_options_request_to_login_page(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
response = self.client_options("/login/")
|
2018-05-21 06:40:18 +02:00
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
|
2017-07-13 13:42:57 +02:00
|
|
|
@override_settings(TWO_FACTOR_AUTHENTICATION_ENABLED=True)
|
|
|
|
def test_login_page_redirects_logged_in_user_under_2fa(self) -> None:
|
|
|
|
"""You will be redirected to the app's main page if you land on the
|
|
|
|
login page when already logged in.
|
|
|
|
"""
|
|
|
|
user_profile = self.example_user("cordelia")
|
|
|
|
self.create_default_device(user_profile)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("cordelia")
|
2017-07-13 13:42:57 +02:00
|
|
|
self.login_2fa(user_profile)
|
|
|
|
|
|
|
|
response = self.client_get("/login/")
|
|
|
|
self.assertEqual(response["Location"], "http://zulip.testserver")
|
|
|
|
|
|
|
|
def test_start_two_factor_auth(self) -> None:
|
2020-09-02 08:14:51 +02:00
|
|
|
request = MagicMock(POST={})
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.auth.TwoFactorLoginView") as mock_view:
|
2017-07-13 13:42:57 +02:00
|
|
|
mock_view.as_view.return_value = lambda *a, **k: HttpResponse()
|
|
|
|
response = start_two_factor_auth(request)
|
|
|
|
self.assertTrue(isinstance(response, HttpResponse))
|
|
|
|
|
|
|
|
def test_do_two_factor_login(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.example_user("hamlet")
|
2017-07-13 13:42:57 +02:00
|
|
|
self.create_default_device(user_profile)
|
|
|
|
request = MagicMock()
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.decorator.django_otp.login") as mock_login:
|
2017-07-13 13:42:57 +02:00
|
|
|
do_two_factor_login(request, user_profile)
|
|
|
|
mock_login.assert_called_once()
|
|
|
|
|
2019-03-15 09:54:25 +01:00
|
|
|
def test_zulip_default_context_does_not_load_inline_previews(self) -> None:
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
description = "https://www.google.com/images/srpr/logo4w.png"
|
|
|
|
realm.description = description
|
|
|
|
realm.save(update_fields=["description"])
|
|
|
|
response = self.client_get("/login/")
|
2020-05-09 03:44:56 +02:00
|
|
|
expected_response = """<p><a href="https://www.google.com/images/srpr/logo4w.png">\
|
2019-03-15 09:54:25 +01:00
|
|
|
https://www.google.com/images/srpr/logo4w.png</a></p>"""
|
|
|
|
self.assertEqual(response.context_data["realm_description"], expected_response)
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-10-21 03:14:21 +02:00
|
|
|
class InviteUserBase(ZulipTestCase):
|
2021-05-25 08:46:06 +02:00
|
|
|
def check_sent_emails(self, correct_recipients: List[str]) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, len(correct_recipients))
|
2014-01-31 21:08:40 +01:00
|
|
|
email_recipients = [email.recipients()[0] for email in outbox]
|
2016-07-10 20:43:58 +02:00
|
|
|
self.assertEqual(sorted(email_recipients), sorted(correct_recipients))
|
2017-02-12 21:21:31 +01:00
|
|
|
if len(outbox) == 0:
|
|
|
|
return
|
|
|
|
|
2021-05-25 08:46:06 +02:00
|
|
|
self.assertIn("Zulip", self.email_display_from(outbox[0]))
|
2017-07-11 20:25:50 +02:00
|
|
|
|
2021-01-26 04:20:36 +01:00
|
|
|
self.assertEqual(self.email_envelope_from(outbox[0]), settings.NOREPLY_EMAIL_ADDRESS)
|
|
|
|
self.assertRegex(
|
|
|
|
self.email_display_from(outbox[0]), fr" <{self.TOKENIZED_NOREPLY_REGEX}>\Z"
|
|
|
|
)
|
2017-07-05 21:29:27 +02:00
|
|
|
|
2020-06-14 13:32:38 +02:00
|
|
|
self.assertEqual(outbox[0].extra_headers["List-Id"], "Zulip Dev <zulip.testserver>")
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
def invite(
|
|
|
|
self,
|
|
|
|
invitee_emails: str,
|
|
|
|
stream_names: Sequence[str],
|
2021-04-05 18:42:45 +02:00
|
|
|
invite_expires_in_days: int = settings.INVITATION_LINK_VALIDITY_DAYS,
|
2021-02-12 08:20:45 +01:00
|
|
|
body: str = "",
|
|
|
|
invite_as: int = PreregistrationUser.INVITE_AS["MEMBER"],
|
2021-02-12 08:19:30 +01:00
|
|
|
) -> HttpResponse:
|
2017-10-21 03:14:21 +02:00
|
|
|
"""
|
|
|
|
Invites the specified users to Zulip with the specified streams.
|
|
|
|
|
|
|
|
users should be a string containing the users to invite, comma or
|
|
|
|
newline separated.
|
|
|
|
|
|
|
|
streams should be a list of strings.
|
|
|
|
"""
|
2018-12-22 05:41:54 +01:00
|
|
|
stream_ids = []
|
|
|
|
for stream_name in stream_names:
|
|
|
|
stream_ids.append(self.get_stream_id(stream_name))
|
2021-02-12 08:19:30 +01:00
|
|
|
return self.client_post(
|
|
|
|
"/json/invites",
|
|
|
|
{
|
|
|
|
"invitee_emails": invitee_emails,
|
2021-04-05 18:42:45 +02:00
|
|
|
"invite_expires_in_days": invite_expires_in_days,
|
2021-02-12 08:19:30 +01:00
|
|
|
"stream_ids": orjson.dumps(stream_ids).decode(),
|
|
|
|
"invite_as": invite_as,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
2017-10-21 03:14:21 +02:00
|
|
|
|
2017-10-21 03:15:12 +02:00
|
|
|
class InviteUserTest(InviteUserBase):
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_successful_invite_user(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
2017-07-31 20:55:57 +02:00
|
|
|
A call to /json/invites with valid parameters causes an invitation
|
2014-01-31 21:08:40 +01:00
|
|
|
email to be sent.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2014-01-31 21:08:40 +01:00
|
|
|
invitee = "alice-test@zulip.com"
|
|
|
|
self.assert_json_success(self.invite(invitee, ["Denmark"]))
|
|
|
|
self.assertTrue(find_key_by_email(invitee))
|
2021-05-25 08:46:06 +02:00
|
|
|
self.check_sent_emails([invitee])
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2018-08-16 21:17:40 +02:00
|
|
|
def test_newbie_restrictions(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.example_user("hamlet")
|
2018-08-16 21:17:40 +02:00
|
|
|
invitee = "alice-test@zulip.com"
|
2021-02-12 08:20:45 +01:00
|
|
|
stream_name = "Denmark"
|
2018-08-16 21:17:40 +02:00
|
|
|
|
2020-03-06 18:40:46 +01:00
|
|
|
self.login_user(user_profile)
|
2018-08-16 21:17:40 +02:00
|
|
|
|
|
|
|
result = self.invite(invitee, [stream_name])
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
user_profile.date_joined = timezone_now() - datetime.timedelta(days=10)
|
|
|
|
user_profile.save()
|
|
|
|
|
|
|
|
with self.settings(INVITES_MIN_USER_AGE_DAYS=5):
|
|
|
|
result = self.invite(invitee, [stream_name])
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
with self.settings(INVITES_MIN_USER_AGE_DAYS=15):
|
|
|
|
result = self.invite(invitee, [stream_name])
|
|
|
|
self.assert_json_error_contains(result, "Your account is too new")
|
|
|
|
|
2018-08-21 21:40:53 +02:00
|
|
|
def test_invite_limits(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.example_user("hamlet")
|
2018-08-21 21:40:53 +02:00
|
|
|
realm = user_profile.realm
|
2021-02-12 08:20:45 +01:00
|
|
|
stream_name = "Denmark"
|
2018-08-21 21:40:53 +02:00
|
|
|
|
|
|
|
# These constants only need to be in descending order
|
|
|
|
# for this test to trigger an InvitationError based
|
|
|
|
# on max daily counts.
|
|
|
|
site_max = 50
|
|
|
|
realm_max = 40
|
|
|
|
num_invitees = 30
|
|
|
|
max_daily_count = 20
|
|
|
|
|
|
|
|
daily_counts = [(1, max_daily_count)]
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
invite_emails = [f"foo-{i:02}@zulip.com" for i in range(num_invitees)]
|
|
|
|
invitees = ",".join(invite_emails)
|
2018-08-21 21:40:53 +02:00
|
|
|
|
2020-03-06 18:40:46 +01:00
|
|
|
self.login_user(user_profile)
|
2018-08-21 21:40:53 +02:00
|
|
|
|
|
|
|
realm.max_invites = realm_max
|
|
|
|
realm.date_created = timezone_now()
|
|
|
|
realm.save()
|
|
|
|
|
|
|
|
def try_invite() -> HttpResponse:
|
2021-02-12 08:19:30 +01:00
|
|
|
with self.settings(
|
|
|
|
OPEN_REALM_CREATION=True,
|
|
|
|
INVITES_DEFAULT_REALM_DAILY_MAX=site_max,
|
|
|
|
INVITES_NEW_REALM_LIMIT_DAYS=daily_counts,
|
|
|
|
):
|
2018-08-21 21:40:53 +02:00
|
|
|
result = self.invite(invitees, [stream_name])
|
|
|
|
return result
|
|
|
|
|
|
|
|
result = try_invite()
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_json_error_contains(result, "enough remaining invites")
|
2018-08-21 21:40:53 +02:00
|
|
|
|
|
|
|
# Next show that aggregate limits expire once the realm is old
|
|
|
|
# enough.
|
|
|
|
|
|
|
|
realm.date_created = timezone_now() - datetime.timedelta(days=8)
|
|
|
|
realm.save()
|
|
|
|
|
2020-03-02 12:16:54 +01:00
|
|
|
with queries_captured() as queries:
|
tests: Fix queries_captured to clear cache up front.
Before this change we were clearing the cache on
every SQL usage.
The code to do this was added in February 2017
in 6db4879f9c9fd6941d3aa2af6138ea75aa6675a6.
Now we clear the cache just one time, but before
the action/request under test.
Tests that want to count queries with a warm
cache now specify keep_cache_warm=True. Those
tests were particularly flawed before this change.
In general, the old code both over-counted and
under-counted queries.
It under-counted SQL usage for requests that were
able to pull some data out of a warm cache before
they did any SQL. Typically this would have bypassed
the initial query to get UserProfile, so you
will see several off-by-one fixes.
The old code over-counted SQL usage to the extent
that it's a rather extreme assumption that during
an action itself, the entries that you put into
the cache will get thrown away. And that's essentially
what the prior code simulated.
Now, it's still bad if an action keeps hitting the
cache for no reason, but it's not as bad as hitting
the database. There doesn't appear to be any evidence
of us doing something silly like fetching the same
data from the cache in a loop, but there are
opportunities to prevent second or third round
trips to the cache for the same object, if we
can re-structure the code so that the same caller
doesn't have two callees get the same data.
Note that for invites, we have some cache hits
that are due to the nature of how we serialize
data to our queue processor--we generally just
serialize ids, and then re-fetch objects when
we pop them off the queue.
2020-11-04 12:02:00 +01:00
|
|
|
with cache_tries_captured() as cache_tries:
|
|
|
|
result = try_invite()
|
|
|
|
|
|
|
|
self.assert_json_success(result)
|
2020-03-02 12:16:54 +01:00
|
|
|
|
|
|
|
# TODO: Fix large query count here.
|
|
|
|
#
|
|
|
|
# TODO: There is some test OTHER than this one
|
|
|
|
# that is leaking some kind of state change
|
|
|
|
# that throws off the query count here. It
|
|
|
|
# is hard to investigate currently (due to
|
|
|
|
# the large number of queries), so I just
|
|
|
|
# use an approximate equality check.
|
|
|
|
actual_count = len(queries)
|
2020-12-19 20:04:57 +01:00
|
|
|
expected_count = 251
|
2020-03-02 12:16:54 +01:00
|
|
|
if abs(actual_count - expected_count) > 1:
|
2021-02-12 08:19:30 +01:00
|
|
|
raise AssertionError(
|
2021-02-12 08:20:45 +01:00
|
|
|
f"""
|
2020-03-02 12:16:54 +01:00
|
|
|
Unexpected number of queries:
|
|
|
|
|
2020-06-13 08:57:35 +02:00
|
|
|
expected query count: {expected_count}
|
|
|
|
actual: {actual_count}
|
2021-02-12 08:20:45 +01:00
|
|
|
"""
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-03-02 12:16:54 +01:00
|
|
|
|
tests: Fix queries_captured to clear cache up front.
Before this change we were clearing the cache on
every SQL usage.
The code to do this was added in February 2017
in 6db4879f9c9fd6941d3aa2af6138ea75aa6675a6.
Now we clear the cache just one time, but before
the action/request under test.
Tests that want to count queries with a warm
cache now specify keep_cache_warm=True. Those
tests were particularly flawed before this change.
In general, the old code both over-counted and
under-counted queries.
It under-counted SQL usage for requests that were
able to pull some data out of a warm cache before
they did any SQL. Typically this would have bypassed
the initial query to get UserProfile, so you
will see several off-by-one fixes.
The old code over-counted SQL usage to the extent
that it's a rather extreme assumption that during
an action itself, the entries that you put into
the cache will get thrown away. And that's essentially
what the prior code simulated.
Now, it's still bad if an action keeps hitting the
cache for no reason, but it's not as bad as hitting
the database. There doesn't appear to be any evidence
of us doing something silly like fetching the same
data from the cache in a loop, but there are
opportunities to prevent second or third round
trips to the cache for the same object, if we
can re-structure the code so that the same caller
doesn't have two callees get the same data.
Note that for invites, we have some cache hits
that are due to the nature of how we serialize
data to our queue processor--we generally just
serialize ids, and then re-fetch objects when
we pop them off the queue.
2020-11-04 12:02:00 +01:00
|
|
|
# Almost all of these cache hits are to re-fetch each one of the
|
|
|
|
# invitees. These happen inside our queue processor for sending
|
|
|
|
# confirmation emails, so they are somewhat difficult to avoid.
|
|
|
|
#
|
|
|
|
# TODO: Mock the call to queue_json_publish, so we can measure the
|
|
|
|
# queue impact separately from the user-perceived impact.
|
|
|
|
self.assert_length(cache_tries, 32)
|
2018-08-21 21:40:53 +02:00
|
|
|
|
|
|
|
# Next get line coverage on bumping a realm's max_invites.
|
|
|
|
realm.date_created = timezone_now()
|
|
|
|
realm.max_invites = site_max + 10
|
|
|
|
realm.save()
|
|
|
|
|
|
|
|
result = try_invite()
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
# Finally get coverage on the case that OPEN_REALM_CREATION is False.
|
|
|
|
|
|
|
|
with self.settings(OPEN_REALM_CREATION=False):
|
|
|
|
result = self.invite(invitees, [stream_name])
|
|
|
|
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
2021-05-28 15:57:08 +02:00
|
|
|
def test_invite_user_to_realm_on_manual_license_plan(self) -> None:
|
|
|
|
user = self.example_user("hamlet")
|
|
|
|
self.login_user(user)
|
|
|
|
_, ledger = self.subscribe_realm_to_monthly_plan_on_manual_license_management(
|
|
|
|
user.realm, 50, 50
|
|
|
|
)
|
|
|
|
|
|
|
|
with self.settings(BILLING_ENABLED=True):
|
|
|
|
result = self.invite(self.nonreg_email("alice"), ["Denmark"])
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
ledger.licenses_at_next_renewal = 5
|
|
|
|
ledger.save(update_fields=["licenses_at_next_renewal"])
|
|
|
|
with self.settings(BILLING_ENABLED=True):
|
|
|
|
result = self.invite(self.nonreg_email("bob"), ["Denmark"])
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
ledger.licenses = get_latest_seat_count(user.realm) + 1
|
|
|
|
ledger.save(update_fields=["licenses"])
|
|
|
|
with self.settings(BILLING_ENABLED=True):
|
|
|
|
invitee_emails = self.nonreg_email("bob") + "," + self.nonreg_email("alice")
|
|
|
|
result = self.invite(invitee_emails, ["Denmark"])
|
|
|
|
self.assert_json_error_contains(
|
|
|
|
result, "Your organization does not have enough unused Zulip licenses to invite 2 users"
|
|
|
|
)
|
|
|
|
|
|
|
|
ledger.licenses = get_latest_seat_count(user.realm)
|
|
|
|
ledger.save(update_fields=["licenses"])
|
|
|
|
with self.settings(BILLING_ENABLED=True):
|
|
|
|
result = self.invite(self.nonreg_email("bob"), ["Denmark"])
|
|
|
|
self.assert_json_error_contains(
|
|
|
|
result, "All Zulip licenses for this organization are currently in use"
|
|
|
|
)
|
|
|
|
|
invites: Fix bug with inviting cross realm bots.
Without the fix here, you will get an exception
similar to below if you try to invite one of the
cross realm bots. (The actual exception is
a bit different due to some rebasing on my branch.)
File "/home/zulipdev/zulip/zerver/lib/request.py", line 368, in _wrapped_view_func
return view_func(request, *args, **kwargs)
File "/home/zulipdev/zulip/zerver/views/invite.py", line 49, in invite_users_backend
do_invite_users(user_profile, invitee_emails, streams, invite_as)
File "/home/zulipdev/zulip/zerver/lib/actions.py", line 5153, in do_invite_users
email_error, email_skipped, deactivated = validate_email(user_profile, email)
File "/home/zulipdev/zulip/zerver/lib/actions.py", line 5069, in validate_email
return None, (error.code), (error.params['deactivated'])
TypeError: 'NoneType' object is not subscriptable
Obviously, you shouldn't try to invite a cross
realm bot to your realm, but we want a reasonable
error message.
RESOLUTION:
Populate the `code` parameter for `ValidationError`.
BACKGROUND:
Most callers to `validate_email_for_realm` simply catch
the `ValidationError` and then report a more generic error.
That's also what `do_invite_users` does, but it has the
somewhat convoluted codepath through `validate_email`
that triggers this code:
try:
validate_email_for_realm(user_profile.realm, email)
except ValidationError as error:
return None, (error.code), (error.params['deactivated'])
The way that we're using the `code` parameter for
`ValidationError` feels hacky to me. The intention
behind `code` is to provide a descriptive error to
calling code, and it's not intended for humans, and
it feels strange that we actually translate this in
other places. Here are the Django docs:
https://docs.djangoproject.com/en/3.0/ref/forms/validation/
And then here's an example of us actually translating
a code (not part of this commit, just providing context):
raise ValidationError(_('%s already has an account') %
(email,), code = _("Already has an account."),
params={'deactivated': False})
Those codes eventually get put into InvitationError, which
inherits from JsonableError, and we do actually display
these errors in the webapp:
if skipped and len(skipped) == len(invitee_emails):
# All e-mails were skipped, so we didn't actually invite anyone.
raise InvitationError(_("We weren't able to invite anyone."),
skipped, sent_invitations=False)
I will try to untangle this somewhat in upcoming commits.
2020-03-03 15:13:01 +01:00
|
|
|
def test_cross_realm_bot(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
inviter = self.example_user("hamlet")
|
2020-03-06 18:40:46 +01:00
|
|
|
self.login_user(inviter)
|
invites: Fix bug with inviting cross realm bots.
Without the fix here, you will get an exception
similar to below if you try to invite one of the
cross realm bots. (The actual exception is
a bit different due to some rebasing on my branch.)
File "/home/zulipdev/zulip/zerver/lib/request.py", line 368, in _wrapped_view_func
return view_func(request, *args, **kwargs)
File "/home/zulipdev/zulip/zerver/views/invite.py", line 49, in invite_users_backend
do_invite_users(user_profile, invitee_emails, streams, invite_as)
File "/home/zulipdev/zulip/zerver/lib/actions.py", line 5153, in do_invite_users
email_error, email_skipped, deactivated = validate_email(user_profile, email)
File "/home/zulipdev/zulip/zerver/lib/actions.py", line 5069, in validate_email
return None, (error.code), (error.params['deactivated'])
TypeError: 'NoneType' object is not subscriptable
Obviously, you shouldn't try to invite a cross
realm bot to your realm, but we want a reasonable
error message.
RESOLUTION:
Populate the `code` parameter for `ValidationError`.
BACKGROUND:
Most callers to `validate_email_for_realm` simply catch
the `ValidationError` and then report a more generic error.
That's also what `do_invite_users` does, but it has the
somewhat convoluted codepath through `validate_email`
that triggers this code:
try:
validate_email_for_realm(user_profile.realm, email)
except ValidationError as error:
return None, (error.code), (error.params['deactivated'])
The way that we're using the `code` parameter for
`ValidationError` feels hacky to me. The intention
behind `code` is to provide a descriptive error to
calling code, and it's not intended for humans, and
it feels strange that we actually translate this in
other places. Here are the Django docs:
https://docs.djangoproject.com/en/3.0/ref/forms/validation/
And then here's an example of us actually translating
a code (not part of this commit, just providing context):
raise ValidationError(_('%s already has an account') %
(email,), code = _("Already has an account."),
params={'deactivated': False})
Those codes eventually get put into InvitationError, which
inherits from JsonableError, and we do actually display
these errors in the webapp:
if skipped and len(skipped) == len(invitee_emails):
# All e-mails were skipped, so we didn't actually invite anyone.
raise InvitationError(_("We weren't able to invite anyone."),
skipped, sent_invitations=False)
I will try to untangle this somewhat in upcoming commits.
2020-03-03 15:13:01 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
cross_realm_bot_email = "emailgateway@zulip.com"
|
|
|
|
legit_new_email = "fred@zulip.com"
|
|
|
|
invitee_emails = ",".join([cross_realm_bot_email, legit_new_email])
|
invites: Fix bug with inviting cross realm bots.
Without the fix here, you will get an exception
similar to below if you try to invite one of the
cross realm bots. (The actual exception is
a bit different due to some rebasing on my branch.)
File "/home/zulipdev/zulip/zerver/lib/request.py", line 368, in _wrapped_view_func
return view_func(request, *args, **kwargs)
File "/home/zulipdev/zulip/zerver/views/invite.py", line 49, in invite_users_backend
do_invite_users(user_profile, invitee_emails, streams, invite_as)
File "/home/zulipdev/zulip/zerver/lib/actions.py", line 5153, in do_invite_users
email_error, email_skipped, deactivated = validate_email(user_profile, email)
File "/home/zulipdev/zulip/zerver/lib/actions.py", line 5069, in validate_email
return None, (error.code), (error.params['deactivated'])
TypeError: 'NoneType' object is not subscriptable
Obviously, you shouldn't try to invite a cross
realm bot to your realm, but we want a reasonable
error message.
RESOLUTION:
Populate the `code` parameter for `ValidationError`.
BACKGROUND:
Most callers to `validate_email_for_realm` simply catch
the `ValidationError` and then report a more generic error.
That's also what `do_invite_users` does, but it has the
somewhat convoluted codepath through `validate_email`
that triggers this code:
try:
validate_email_for_realm(user_profile.realm, email)
except ValidationError as error:
return None, (error.code), (error.params['deactivated'])
The way that we're using the `code` parameter for
`ValidationError` feels hacky to me. The intention
behind `code` is to provide a descriptive error to
calling code, and it's not intended for humans, and
it feels strange that we actually translate this in
other places. Here are the Django docs:
https://docs.djangoproject.com/en/3.0/ref/forms/validation/
And then here's an example of us actually translating
a code (not part of this commit, just providing context):
raise ValidationError(_('%s already has an account') %
(email,), code = _("Already has an account."),
params={'deactivated': False})
Those codes eventually get put into InvitationError, which
inherits from JsonableError, and we do actually display
these errors in the webapp:
if skipped and len(skipped) == len(invitee_emails):
# All e-mails were skipped, so we didn't actually invite anyone.
raise InvitationError(_("We weren't able to invite anyone."),
skipped, sent_invitations=False)
I will try to untangle this somewhat in upcoming commits.
2020-03-03 15:13:01 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.invite(invitee_emails, ["Denmark"])
|
invites: Fix bug with inviting cross realm bots.
Without the fix here, you will get an exception
similar to below if you try to invite one of the
cross realm bots. (The actual exception is
a bit different due to some rebasing on my branch.)
File "/home/zulipdev/zulip/zerver/lib/request.py", line 368, in _wrapped_view_func
return view_func(request, *args, **kwargs)
File "/home/zulipdev/zulip/zerver/views/invite.py", line 49, in invite_users_backend
do_invite_users(user_profile, invitee_emails, streams, invite_as)
File "/home/zulipdev/zulip/zerver/lib/actions.py", line 5153, in do_invite_users
email_error, email_skipped, deactivated = validate_email(user_profile, email)
File "/home/zulipdev/zulip/zerver/lib/actions.py", line 5069, in validate_email
return None, (error.code), (error.params['deactivated'])
TypeError: 'NoneType' object is not subscriptable
Obviously, you shouldn't try to invite a cross
realm bot to your realm, but we want a reasonable
error message.
RESOLUTION:
Populate the `code` parameter for `ValidationError`.
BACKGROUND:
Most callers to `validate_email_for_realm` simply catch
the `ValidationError` and then report a more generic error.
That's also what `do_invite_users` does, but it has the
somewhat convoluted codepath through `validate_email`
that triggers this code:
try:
validate_email_for_realm(user_profile.realm, email)
except ValidationError as error:
return None, (error.code), (error.params['deactivated'])
The way that we're using the `code` parameter for
`ValidationError` feels hacky to me. The intention
behind `code` is to provide a descriptive error to
calling code, and it's not intended for humans, and
it feels strange that we actually translate this in
other places. Here are the Django docs:
https://docs.djangoproject.com/en/3.0/ref/forms/validation/
And then here's an example of us actually translating
a code (not part of this commit, just providing context):
raise ValidationError(_('%s already has an account') %
(email,), code = _("Already has an account."),
params={'deactivated': False})
Those codes eventually get put into InvitationError, which
inherits from JsonableError, and we do actually display
these errors in the webapp:
if skipped and len(skipped) == len(invitee_emails):
# All e-mails were skipped, so we didn't actually invite anyone.
raise InvitationError(_("We weren't able to invite anyone."),
skipped, sent_invitations=False)
I will try to untangle this somewhat in upcoming commits.
2020-03-03 15:13:01 +01:00
|
|
|
self.assert_json_error(
|
|
|
|
result,
|
2021-02-12 08:19:30 +01:00
|
|
|
"Some of those addresses are already using Zulip,"
|
|
|
|
+ " so we didn't send them an invitation."
|
|
|
|
+ " We did send invitations to everyone else!",
|
|
|
|
)
|
invites: Fix bug with inviting cross realm bots.
Without the fix here, you will get an exception
similar to below if you try to invite one of the
cross realm bots. (The actual exception is
a bit different due to some rebasing on my branch.)
File "/home/zulipdev/zulip/zerver/lib/request.py", line 368, in _wrapped_view_func
return view_func(request, *args, **kwargs)
File "/home/zulipdev/zulip/zerver/views/invite.py", line 49, in invite_users_backend
do_invite_users(user_profile, invitee_emails, streams, invite_as)
File "/home/zulipdev/zulip/zerver/lib/actions.py", line 5153, in do_invite_users
email_error, email_skipped, deactivated = validate_email(user_profile, email)
File "/home/zulipdev/zulip/zerver/lib/actions.py", line 5069, in validate_email
return None, (error.code), (error.params['deactivated'])
TypeError: 'NoneType' object is not subscriptable
Obviously, you shouldn't try to invite a cross
realm bot to your realm, but we want a reasonable
error message.
RESOLUTION:
Populate the `code` parameter for `ValidationError`.
BACKGROUND:
Most callers to `validate_email_for_realm` simply catch
the `ValidationError` and then report a more generic error.
That's also what `do_invite_users` does, but it has the
somewhat convoluted codepath through `validate_email`
that triggers this code:
try:
validate_email_for_realm(user_profile.realm, email)
except ValidationError as error:
return None, (error.code), (error.params['deactivated'])
The way that we're using the `code` parameter for
`ValidationError` feels hacky to me. The intention
behind `code` is to provide a descriptive error to
calling code, and it's not intended for humans, and
it feels strange that we actually translate this in
other places. Here are the Django docs:
https://docs.djangoproject.com/en/3.0/ref/forms/validation/
And then here's an example of us actually translating
a code (not part of this commit, just providing context):
raise ValidationError(_('%s already has an account') %
(email,), code = _("Already has an account."),
params={'deactivated': False})
Those codes eventually get put into InvitationError, which
inherits from JsonableError, and we do actually display
these errors in the webapp:
if skipped and len(skipped) == len(invitee_emails):
# All e-mails were skipped, so we didn't actually invite anyone.
raise InvitationError(_("We weren't able to invite anyone."),
skipped, sent_invitations=False)
I will try to untangle this somewhat in upcoming commits.
2020-03-03 15:13:01 +01:00
|
|
|
|
2020-03-03 14:41:24 +01:00
|
|
|
def test_invite_mirror_dummy_user(self) -> None:
|
2021-02-12 08:19:30 +01:00
|
|
|
"""
|
2020-03-03 14:41:24 +01:00
|
|
|
A mirror dummy account is a temporary account
|
|
|
|
that we keep in our system if we are mirroring
|
|
|
|
data from something like Zephyr or IRC.
|
|
|
|
|
|
|
|
We want users to eventually just sign up or
|
|
|
|
register for Zulip, in which case we will just
|
|
|
|
fully "activate" the account.
|
|
|
|
|
|
|
|
Here we test that you can invite a person who
|
|
|
|
has a mirror dummy account.
|
2021-02-12 08:19:30 +01:00
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
inviter = self.example_user("hamlet")
|
2020-03-06 18:40:46 +01:00
|
|
|
self.login_user(inviter)
|
2020-03-03 14:41:24 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
mirror_user = self.example_user("cordelia")
|
2020-03-03 14:41:24 +01:00
|
|
|
mirror_user.is_mirror_dummy = True
|
|
|
|
mirror_user.save()
|
2021-02-14 00:03:40 +01:00
|
|
|
change_user_is_active(mirror_user, False)
|
2020-03-03 14:41:24 +01:00
|
|
|
|
|
|
|
self.assertEqual(
|
|
|
|
PreregistrationUser.objects.filter(email=mirror_user.email).count(),
|
|
|
|
0,
|
|
|
|
)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.invite(mirror_user.email, ["Denmark"])
|
2020-03-03 14:41:24 +01:00
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
prereg_user = PreregistrationUser.objects.get(email=mirror_user.email)
|
2021-07-24 16:56:39 +02:00
|
|
|
assert prereg_user.referred_by is not None and inviter is not None
|
2020-03-03 14:41:24 +01:00
|
|
|
self.assertEqual(
|
|
|
|
prereg_user.referred_by.email,
|
|
|
|
inviter.email,
|
|
|
|
)
|
|
|
|
|
2020-06-18 13:03:06 +02:00
|
|
|
def test_successful_invite_user_as_owner_from_owner_account(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("desdemona")
|
|
|
|
invitee = self.nonreg_email("alice")
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.invite(
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee, ["Denmark"], invite_as=PreregistrationUser.INVITE_AS["REALM_OWNER"]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-06-18 13:03:06 +02:00
|
|
|
self.assert_json_success(result)
|
|
|
|
self.assertTrue(find_key_by_email(invitee))
|
|
|
|
|
|
|
|
self.submit_reg_form_for_user(invitee, "password")
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee_profile = self.nonreg_user("alice")
|
2020-06-18 13:03:06 +02:00
|
|
|
self.assertTrue(invitee_profile.is_realm_owner)
|
|
|
|
self.assertFalse(invitee_profile.is_guest)
|
|
|
|
|
|
|
|
def test_invite_user_as_owner_from_admin_account(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
|
|
|
invitee = self.nonreg_email("alice")
|
2021-02-12 08:19:30 +01:00
|
|
|
response = self.invite(
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee, ["Denmark"], invite_as=PreregistrationUser.INVITE_AS["REALM_OWNER"]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-06-18 13:03:06 +02:00
|
|
|
self.assert_json_error(response, "Must be an organization owner")
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_successful_invite_user_as_admin_from_admin_account(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
|
|
|
invitee = self.nonreg_email("alice")
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.invite(
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee, ["Denmark"], invite_as=PreregistrationUser.INVITE_AS["REALM_ADMIN"]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2018-12-30 11:06:12 +01:00
|
|
|
self.assert_json_success(result)
|
2017-10-15 18:34:47 +02:00
|
|
|
self.assertTrue(find_key_by_email(invitee))
|
|
|
|
|
|
|
|
self.submit_reg_form_for_user(invitee, "password")
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee_profile = self.nonreg_user("alice")
|
2017-10-15 18:34:47 +02:00
|
|
|
self.assertTrue(invitee_profile.is_realm_admin)
|
2020-06-18 13:03:06 +02:00
|
|
|
self.assertFalse(invitee_profile.is_realm_owner)
|
2018-12-30 11:08:07 +01:00
|
|
|
self.assertFalse(invitee_profile.is_guest)
|
2017-10-15 18:34:47 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invite_user_as_admin_from_normal_account(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
|
|
|
invitee = self.nonreg_email("alice")
|
2021-02-12 08:19:30 +01:00
|
|
|
response = self.invite(
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee, ["Denmark"], invite_as=PreregistrationUser.INVITE_AS["REALM_ADMIN"]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2018-03-08 01:47:17 +01:00
|
|
|
self.assert_json_error(response, "Must be an organization administrator")
|
2017-10-15 18:34:47 +02:00
|
|
|
|
2021-04-30 15:19:47 +02:00
|
|
|
def test_successful_invite_user_as_moderator_from_admin_account(self) -> None:
|
|
|
|
self.login("iago")
|
|
|
|
invitee = self.nonreg_email("alice")
|
|
|
|
result = self.invite(
|
|
|
|
invitee, ["Denmark"], invite_as=PreregistrationUser.INVITE_AS["MODERATOR"]
|
|
|
|
)
|
|
|
|
self.assert_json_success(result)
|
|
|
|
self.assertTrue(find_key_by_email(invitee))
|
|
|
|
|
|
|
|
self.submit_reg_form_for_user(invitee, "password")
|
|
|
|
invitee_profile = self.nonreg_user("alice")
|
|
|
|
self.assertFalse(invitee_profile.is_realm_admin)
|
|
|
|
self.assertTrue(invitee_profile.is_moderator)
|
|
|
|
self.assertFalse(invitee_profile.is_guest)
|
|
|
|
|
|
|
|
def test_invite_user_as_moderator_from_normal_account(self) -> None:
|
|
|
|
self.login("hamlet")
|
|
|
|
invitee = self.nonreg_email("alice")
|
|
|
|
response = self.invite(
|
|
|
|
invitee, ["Denmark"], invite_as=PreregistrationUser.INVITE_AS["MODERATOR"]
|
|
|
|
)
|
|
|
|
self.assert_json_error(response, "Must be an organization administrator")
|
|
|
|
|
|
|
|
def test_invite_user_as_moderator_from_moderator_account(self) -> None:
|
|
|
|
self.login("shiva")
|
|
|
|
invitee = self.nonreg_email("alice")
|
|
|
|
response = self.invite(
|
|
|
|
invitee, ["Denmark"], invite_as=PreregistrationUser.INVITE_AS["MODERATOR"]
|
|
|
|
)
|
|
|
|
self.assert_json_error(response, "Must be an organization administrator")
|
|
|
|
|
2018-12-30 11:06:12 +01:00
|
|
|
def test_invite_user_as_invalid_type(self) -> None:
|
|
|
|
"""
|
|
|
|
Test inviting a user as invalid type of user i.e. type of invite_as
|
|
|
|
is not in PreregistrationUser.INVITE_AS
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
|
|
|
invitee = self.nonreg_email("alice")
|
2020-06-21 21:55:48 +02:00
|
|
|
response = self.invite(invitee, ["Denmark"], invite_as=10)
|
2018-12-30 11:06:12 +01:00
|
|
|
self.assert_json_error(response, "Must be invited as an valid type of user")
|
|
|
|
|
2018-12-30 11:08:07 +01:00
|
|
|
def test_successful_invite_user_as_guest_from_normal_account(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
|
|
|
invitee = self.nonreg_email("alice")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_json_success(
|
2021-02-12 08:20:45 +01:00
|
|
|
self.invite(invitee, ["Denmark"], invite_as=PreregistrationUser.INVITE_AS["GUEST_USER"])
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2018-12-30 11:08:07 +01:00
|
|
|
self.assertTrue(find_key_by_email(invitee))
|
|
|
|
|
|
|
|
self.submit_reg_form_for_user(invitee, "password")
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee_profile = self.nonreg_user("alice")
|
2018-12-30 11:08:07 +01:00
|
|
|
self.assertFalse(invitee_profile.is_realm_admin)
|
|
|
|
self.assertTrue(invitee_profile.is_guest)
|
|
|
|
|
|
|
|
def test_successful_invite_user_as_guest_from_admin_account(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
|
|
|
invitee = self.nonreg_email("alice")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_json_success(
|
2021-02-12 08:20:45 +01:00
|
|
|
self.invite(invitee, ["Denmark"], invite_as=PreregistrationUser.INVITE_AS["GUEST_USER"])
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2018-12-30 11:08:07 +01:00
|
|
|
self.assertTrue(find_key_by_email(invitee))
|
|
|
|
|
|
|
|
self.submit_reg_form_for_user(invitee, "password")
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee_profile = self.nonreg_user("alice")
|
2018-12-30 11:08:07 +01:00
|
|
|
self.assertFalse(invitee_profile.is_realm_admin)
|
|
|
|
self.assertTrue(invitee_profile.is_guest)
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_successful_invite_user_with_name(self) -> None:
|
2016-07-29 18:16:54 +02:00
|
|
|
"""
|
2017-07-31 20:55:57 +02:00
|
|
|
A call to /json/invites with valid parameters causes an invitation
|
2016-07-29 18:16:54 +02:00
|
|
|
email to be sent.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2016-07-29 18:16:54 +02:00
|
|
|
email = "alice-test@zulip.com"
|
2020-06-09 00:25:09 +02:00
|
|
|
invitee = f"Alice Test <{email}>"
|
2016-07-29 18:16:54 +02:00
|
|
|
self.assert_json_success(self.invite(invitee, ["Denmark"]))
|
|
|
|
self.assertTrue(find_key_by_email(email))
|
2021-05-25 08:46:06 +02:00
|
|
|
self.check_sent_emails([email])
|
2016-07-29 18:16:54 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_successful_invite_user_with_name_and_normal_one(self) -> None:
|
2016-07-29 18:16:54 +02:00
|
|
|
"""
|
2017-07-31 20:55:57 +02:00
|
|
|
A call to /json/invites with valid parameters causes an invitation
|
2016-07-29 18:16:54 +02:00
|
|
|
email to be sent.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2016-07-29 18:16:54 +02:00
|
|
|
email = "alice-test@zulip.com"
|
|
|
|
email2 = "bob-test@zulip.com"
|
2020-06-09 00:25:09 +02:00
|
|
|
invitee = f"Alice Test <{email}>, {email2}"
|
2016-07-29 18:16:54 +02:00
|
|
|
self.assert_json_success(self.invite(invitee, ["Denmark"]))
|
|
|
|
self.assertTrue(find_key_by_email(email))
|
|
|
|
self.assertTrue(find_key_by_email(email2))
|
2021-05-25 08:46:06 +02:00
|
|
|
self.check_sent_emails([email, email2])
|
2016-07-29 18:16:54 +02:00
|
|
|
|
2021-04-03 18:05:20 +02:00
|
|
|
def test_can_invite_others_to_realm(self) -> None:
|
2021-04-13 16:01:40 +02:00
|
|
|
def validation_func(user_profile: UserProfile) -> bool:
|
|
|
|
user_profile.refresh_from_db()
|
|
|
|
return user_profile.can_invite_others_to_realm()
|
2021-04-03 18:05:20 +02:00
|
|
|
|
2021-07-18 10:11:58 +02:00
|
|
|
realm = get_realm("zulip")
|
|
|
|
do_set_realm_property(
|
|
|
|
realm, "invite_to_realm_policy", Realm.POLICY_NOBODY, acting_user=None
|
|
|
|
)
|
|
|
|
desdemona = self.example_user("desdemona")
|
|
|
|
self.assertFalse(validation_func(desdemona))
|
|
|
|
|
2021-04-13 16:01:40 +02:00
|
|
|
self.check_has_permission_policies("invite_to_realm_policy", validation_func)
|
2021-04-03 18:05:20 +02:00
|
|
|
|
2021-04-03 20:31:48 +02:00
|
|
|
def test_invite_others_to_realm_setting(self) -> None:
|
2017-05-18 02:45:20 +02:00
|
|
|
"""
|
2021-04-02 18:47:08 +02:00
|
|
|
The invite_to_realm_policy realm setting works properly.
|
2017-05-18 02:45:20 +02:00
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
2021-04-03 20:31:48 +02:00
|
|
|
do_set_realm_property(
|
2021-07-18 10:11:58 +02:00
|
|
|
realm, "invite_to_realm_policy", Realm.POLICY_NOBODY, acting_user=None
|
2021-04-03 20:31:48 +02:00
|
|
|
)
|
2021-07-18 10:11:58 +02:00
|
|
|
self.login("desdemona")
|
2017-05-18 02:45:20 +02:00
|
|
|
email = "alice-test@zulip.com"
|
|
|
|
email2 = "bob-test@zulip.com"
|
2020-06-09 00:25:09 +02:00
|
|
|
invitee = f"Alice Test <{email}>, {email2}"
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_json_error(
|
2021-04-03 20:31:48 +02:00
|
|
|
self.invite(invitee, ["Denmark"]),
|
2021-07-18 10:11:58 +02:00
|
|
|
"Insufficient permission",
|
|
|
|
)
|
|
|
|
|
|
|
|
do_set_realm_property(
|
|
|
|
realm, "invite_to_realm_policy", Realm.POLICY_ADMINS_ONLY, acting_user=None
|
|
|
|
)
|
|
|
|
|
|
|
|
self.login("shiva")
|
|
|
|
self.assert_json_error(
|
|
|
|
self.invite(invitee, ["Denmark"]),
|
2021-04-07 21:09:43 +02:00
|
|
|
"Insufficient permission",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-05-18 02:45:20 +02:00
|
|
|
|
|
|
|
# Now verify an administrator can do it
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2021-04-03 20:31:48 +02:00
|
|
|
self.assert_json_success(self.invite(invitee, ["Denmark"]))
|
|
|
|
self.assertTrue(find_key_by_email(email))
|
|
|
|
self.assertTrue(find_key_by_email(email2))
|
|
|
|
|
|
|
|
self.check_sent_emails([email, email2])
|
|
|
|
|
|
|
|
from django.core import mail
|
|
|
|
|
|
|
|
mail.outbox = []
|
|
|
|
|
|
|
|
do_set_realm_property(
|
|
|
|
realm, "invite_to_realm_policy", Realm.POLICY_MODERATORS_ONLY, acting_user=None
|
|
|
|
)
|
|
|
|
self.login("hamlet")
|
|
|
|
email = "carol-test@zulip.com"
|
|
|
|
email2 = "earl-test@zulip.com"
|
|
|
|
invitee = f"Carol Test <{email}>, {email2}"
|
|
|
|
self.assert_json_error(
|
|
|
|
self.invite(invitee, ["Denmark"]),
|
2021-04-07 21:09:43 +02:00
|
|
|
"Insufficient permission",
|
2021-04-03 20:31:48 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
self.login("shiva")
|
|
|
|
self.assert_json_success(self.invite(invitee, ["Denmark"]))
|
|
|
|
self.assertTrue(find_key_by_email(email))
|
|
|
|
self.assertTrue(find_key_by_email(email2))
|
|
|
|
self.check_sent_emails([email, email2])
|
|
|
|
|
|
|
|
mail.outbox = []
|
|
|
|
|
|
|
|
do_set_realm_property(
|
|
|
|
realm, "invite_to_realm_policy", Realm.POLICY_MEMBERS_ONLY, acting_user=None
|
|
|
|
)
|
|
|
|
|
|
|
|
self.login("polonius")
|
|
|
|
email = "dave-test@zulip.com"
|
|
|
|
email2 = "mark-test@zulip.com"
|
|
|
|
invitee = f"Dave Test <{email}>, {email2}"
|
|
|
|
self.assert_json_error(self.invite(invitee, ["Denmark"]), "Not allowed for guest users")
|
|
|
|
|
|
|
|
self.login("hamlet")
|
|
|
|
self.assert_json_success(self.invite(invitee, ["Denmark"]))
|
|
|
|
self.assertTrue(find_key_by_email(email))
|
|
|
|
self.assertTrue(find_key_by_email(email2))
|
|
|
|
self.check_sent_emails([email, email2])
|
|
|
|
|
|
|
|
mail.outbox = []
|
|
|
|
|
|
|
|
do_set_realm_property(
|
|
|
|
realm, "invite_to_realm_policy", Realm.POLICY_FULL_MEMBERS_ONLY, acting_user=None
|
|
|
|
)
|
|
|
|
do_set_realm_property(realm, "waiting_period_threshold", 1000, acting_user=None)
|
|
|
|
|
|
|
|
hamlet = self.example_user("hamlet")
|
|
|
|
hamlet.date_joined = timezone_now() - datetime.timedelta(
|
|
|
|
days=(realm.waiting_period_threshold - 1)
|
|
|
|
)
|
|
|
|
|
|
|
|
email = "issac-test@zulip.com"
|
|
|
|
email2 = "steven-test@zulip.com"
|
|
|
|
invitee = f"Issac Test <{email}>, {email2}"
|
|
|
|
self.assert_json_error(
|
|
|
|
self.invite(invitee, ["Denmark"]),
|
2021-04-07 21:09:43 +02:00
|
|
|
"Insufficient permission",
|
2021-04-03 20:31:48 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
do_set_realm_property(realm, "waiting_period_threshold", 0, acting_user=None)
|
|
|
|
|
2017-05-18 02:45:20 +02:00
|
|
|
self.assert_json_success(self.invite(invitee, ["Denmark"]))
|
|
|
|
self.assertTrue(find_key_by_email(email))
|
|
|
|
self.assertTrue(find_key_by_email(email2))
|
|
|
|
self.check_sent_emails([email, email2])
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invite_user_signup_initial_history(self) -> None:
|
2015-10-26 16:49:22 +01:00
|
|
|
"""
|
|
|
|
Test that a new user invited to a stream receives some initial
|
|
|
|
history but only from public streams.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
|
|
|
user_profile = self.example_user("hamlet")
|
2015-10-26 16:49:22 +01:00
|
|
|
private_stream_name = "Secret"
|
2016-10-21 23:08:52 +02:00
|
|
|
self.make_stream(private_stream_name, invite_only=True)
|
2017-08-25 06:01:29 +02:00
|
|
|
self.subscribe(user_profile, private_stream_name)
|
2017-10-28 18:10:38 +02:00
|
|
|
public_msg_id = self.send_stream_message(
|
2020-03-07 11:43:05 +01:00
|
|
|
self.example_user("hamlet"),
|
2017-10-28 18:10:38 +02:00
|
|
|
"Denmark",
|
|
|
|
topic_name="Public topic",
|
|
|
|
content="Public message",
|
|
|
|
)
|
|
|
|
secret_msg_id = self.send_stream_message(
|
2020-03-07 11:43:05 +01:00
|
|
|
self.example_user("hamlet"),
|
2017-10-28 18:10:38 +02:00
|
|
|
private_stream_name,
|
|
|
|
topic_name="Secret topic",
|
|
|
|
content="Secret message",
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee = self.nonreg_email("alice")
|
2015-10-26 16:49:22 +01:00
|
|
|
self.assert_json_success(self.invite(invitee, [private_stream_name, "Denmark"]))
|
|
|
|
self.assertTrue(find_key_by_email(invitee))
|
|
|
|
|
2017-05-24 02:42:31 +02:00
|
|
|
self.submit_reg_form_for_user(invitee, "password")
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee_profile = self.nonreg_user("alice")
|
2021-02-12 08:19:30 +01:00
|
|
|
invitee_msg_ids = [
|
|
|
|
um.message_id for um in UserMessage.objects.filter(user_profile=invitee_profile)
|
|
|
|
]
|
2015-10-26 16:49:22 +01:00
|
|
|
self.assertTrue(public_msg_id in invitee_msg_ids)
|
|
|
|
self.assertFalse(secret_msg_id in invitee_msg_ids)
|
2017-10-15 18:34:47 +02:00
|
|
|
self.assertFalse(invitee_profile.is_realm_admin)
|
2021-04-29 17:22:48 +02:00
|
|
|
|
|
|
|
invitee_msg, signups_stream_msg, inviter_msg, secret_msg = Message.objects.all().order_by(
|
|
|
|
"-id"
|
|
|
|
)[0:4]
|
|
|
|
|
|
|
|
self.assertEqual(secret_msg.id, secret_msg_id)
|
|
|
|
|
|
|
|
self.assertEqual(inviter_msg.sender.email, "notification-bot@zulip.com")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(
|
2021-04-29 17:22:48 +02:00
|
|
|
inviter_msg.content.startswith(
|
2021-02-12 08:19:30 +01:00
|
|
|
f"alice_zulip.com <`{invitee_profile.email}`> accepted your",
|
|
|
|
)
|
|
|
|
)
|
2017-09-25 22:53:07 +02:00
|
|
|
|
2021-04-29 17:22:48 +02:00
|
|
|
self.assertEqual(signups_stream_msg.sender.email, "notification-bot@zulip.com")
|
|
|
|
self.assertTrue(
|
|
|
|
signups_stream_msg.content.startswith(
|
|
|
|
f"@_**alice_zulip.com|{invitee_profile.id}** just signed up",
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
self.assertEqual(invitee_msg.sender.email, "welcome-bot@zulip.com")
|
|
|
|
self.assertTrue(invitee_msg.content.startswith("Hello, and welcome to Zulip!"))
|
2021-09-09 06:50:40 +02:00
|
|
|
self.assertNotIn("demo organization", invitee_msg.content)
|
2017-09-25 22:53:07 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_multi_user_invite(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
|
|
|
Invites multiple users with a variety of delimiters.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2014-01-31 21:08:40 +01:00
|
|
|
# Intentionally use a weird string.
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_json_success(
|
|
|
|
self.invite(
|
|
|
|
"""bob-test@zulip.com, carol-test@zulip.com,
|
2016-12-02 08:15:16 +01:00
|
|
|
dave-test@zulip.com
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
earl-test@zulip.com""",
|
|
|
|
["Denmark"],
|
|
|
|
)
|
|
|
|
)
|
2014-01-31 21:08:40 +01:00
|
|
|
for user in ("bob", "carol", "dave", "earl"):
|
2020-06-10 06:41:04 +02:00
|
|
|
self.assertTrue(find_key_by_email(f"{user}-test@zulip.com"))
|
2021-02-12 08:19:30 +01:00
|
|
|
self.check_sent_emails(
|
|
|
|
[
|
|
|
|
"bob-test@zulip.com",
|
|
|
|
"carol-test@zulip.com",
|
|
|
|
"dave-test@zulip.com",
|
|
|
|
"earl-test@zulip.com",
|
|
|
|
]
|
|
|
|
)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2017-12-07 06:24:40 +01:00
|
|
|
def test_max_invites_model(self) -> None:
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
self.assertEqual(realm.max_invites, settings.INVITES_DEFAULT_REALM_DAILY_MAX)
|
|
|
|
realm.max_invites = 3
|
|
|
|
realm.save()
|
|
|
|
self.assertEqual(get_realm("zulip").max_invites, 3)
|
|
|
|
realm.max_invites = settings.INVITES_DEFAULT_REALM_DAILY_MAX
|
|
|
|
realm.save()
|
|
|
|
|
2017-11-30 01:53:09 +01:00
|
|
|
def test_invite_too_many_users(self) -> None:
|
|
|
|
# Only a light test of this pathway; e.g. doesn't test that
|
|
|
|
# the limit gets reset after 24 hours
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2018-12-22 05:41:54 +01:00
|
|
|
invitee_emails = "1@zulip.com, 2@zulip.com"
|
|
|
|
self.invite(invitee_emails, ["Denmark"])
|
2020-09-02 06:20:26 +02:00
|
|
|
invitee_emails = ", ".join(str(i) for i in range(get_realm("zulip").max_invites - 1))
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_json_error(
|
|
|
|
self.invite(invitee_emails, ["Denmark"]),
|
|
|
|
"You do not have enough remaining invites for today. "
|
|
|
|
"Please contact desdemona+admin@zulip.com to have your limit raised. "
|
|
|
|
"No invitations were sent.",
|
|
|
|
)
|
2017-11-30 01:53:09 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_missing_or_invalid_params(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
|
|
|
Tests inviting with various missing or invalid parameters.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
2021-03-01 11:33:24 +01:00
|
|
|
do_set_realm_property(realm, "emails_restricted_to_domains", True, acting_user=None)
|
2020-03-06 16:22:23 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2018-12-22 05:41:54 +01:00
|
|
|
invitee_emails = "foo@zulip.com"
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_json_error(
|
|
|
|
self.invite(invitee_emails, []),
|
|
|
|
"You must specify at least one stream for invitees to join.",
|
|
|
|
)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
for address in ("noatsign.com", "outsideyourdomain@example.net"):
|
|
|
|
self.assert_json_error(
|
|
|
|
self.invite(address, ["Denmark"]),
|
2021-02-12 08:19:30 +01:00
|
|
|
"Some emails did not validate, so we didn't send any invitations.",
|
|
|
|
)
|
2014-01-31 21:08:40 +01:00
|
|
|
self.check_sent_emails([])
|
|
|
|
|
2017-02-27 00:29:33 +01:00
|
|
|
self.assert_json_error(
|
2021-02-12 08:19:30 +01:00
|
|
|
self.invite("", ["Denmark"]), "You must specify at least one email address."
|
|
|
|
)
|
2017-02-27 00:29:33 +01:00
|
|
|
self.check_sent_emails([])
|
|
|
|
|
2018-06-08 14:43:27 +02:00
|
|
|
def test_guest_user_invitation(self) -> None:
|
|
|
|
"""
|
|
|
|
Guest user can't invite new users
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("polonius")
|
2018-06-08 14:43:27 +02:00
|
|
|
invitee = "alice-test@zulip.com"
|
|
|
|
self.assert_json_error(self.invite(invitee, ["Denmark"]), "Not allowed for guest users")
|
|
|
|
self.assertEqual(find_key_by_email(invitee), None)
|
|
|
|
self.check_sent_emails([])
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invalid_stream(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
|
|
|
Tests inviting to a non-existent stream.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_json_error(
|
|
|
|
self.invite("iago-test@zulip.com", ["NotARealStream"]),
|
|
|
|
f"Stream does not exist with id: {self.INVALID_STREAM_ID}. No invites were sent.",
|
|
|
|
)
|
2014-01-31 21:08:40 +01:00
|
|
|
self.check_sent_emails([])
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invite_existing_user(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
|
|
|
If you invite an address already using Zulip, no invitation is sent.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2020-03-06 11:33:29 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
hamlet_email = "hAmLeT@zUlIp.com"
|
2020-03-06 11:33:29 +01:00
|
|
|
result = self.invite(hamlet_email, ["Denmark"])
|
|
|
|
self.assert_json_error(result, "We weren't able to invite anyone.")
|
|
|
|
|
|
|
|
self.assertFalse(
|
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
|
|
|
PreregistrationUser.objects.filter(email__iexact=hamlet_email).exists(),
|
2020-03-06 11:33:29 +01:00
|
|
|
)
|
2014-01-31 21:08:40 +01:00
|
|
|
self.check_sent_emails([])
|
|
|
|
|
2020-05-08 23:02:41 +02:00
|
|
|
def normalize_string(self, s: str) -> str:
|
|
|
|
s = s.strip()
|
2021-02-12 08:20:45 +01:00
|
|
|
return re.sub(r"\s+", " ", s)
|
2020-05-08 23:02:41 +02:00
|
|
|
|
|
|
|
def test_invite_links_in_name(self) -> None:
|
|
|
|
"""
|
|
|
|
If you invite an address already using Zulip, no invitation is sent.
|
|
|
|
"""
|
|
|
|
hamlet = self.example_user("hamlet")
|
|
|
|
self.login_user(hamlet)
|
|
|
|
# Test we properly handle links in user full names
|
|
|
|
do_change_full_name(hamlet, "</a> https://www.google.com", hamlet)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.invite("newuser@zulip.com", ["Denmark"])
|
2020-05-08 23:02:41 +02:00
|
|
|
self.assert_json_success(result)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.check_sent_emails(["newuser@zulip.com"])
|
2020-05-08 23:02:41 +02:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2020-05-08 23:02:41 +02:00
|
|
|
body = self.normalize_string(outbox[0].alternatives[0][0])
|
|
|
|
|
|
|
|
# Verify that one can't get Zulip to send invitation emails
|
|
|
|
# that third-party products will linkify using the full_name
|
|
|
|
# field, because we've included that field inside the mailto:
|
|
|
|
# link for the sender.
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertIn(
|
2021-07-30 15:10:02 +02:00
|
|
|
'<a href="mailto:hamlet@zulip.com" style="color:#5f5ec7; text-decoration:underline"></a> https://www.google.com (hamlet@zulip.com)</a> wants',
|
2021-02-12 08:19:30 +01:00
|
|
|
body,
|
|
|
|
)
|
2020-05-08 23:02:41 +02:00
|
|
|
|
|
|
|
# TODO: Ideally, this test would also test the Invitation
|
|
|
|
# Reminder email generated, but the test setup for that is
|
|
|
|
# annoying.
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invite_some_existing_some_new(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
|
|
|
If you invite a mix of already existing and new users, invitations are
|
|
|
|
only sent to the new users.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2020-04-09 21:51:58 +02:00
|
|
|
existing = [self.example_email("hamlet"), "othello@zulip.com"]
|
|
|
|
new = ["foo-test@zulip.com", "bar-test@zulip.com"]
|
2018-12-22 05:41:54 +01:00
|
|
|
invitee_emails = "\n".join(existing + new)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_json_error(
|
|
|
|
self.invite(invitee_emails, ["Denmark"]),
|
|
|
|
"Some of those addresses are already using Zulip, \
|
|
|
|
so we didn't send them an invitation. We did send invitations to everyone else!",
|
|
|
|
)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
# We only created accounts for the new users.
|
|
|
|
for email in existing:
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertRaises(
|
|
|
|
PreregistrationUser.DoesNotExist,
|
|
|
|
lambda: PreregistrationUser.objects.get(email=email),
|
|
|
|
)
|
2014-01-31 21:08:40 +01:00
|
|
|
for email in new:
|
|
|
|
self.assertTrue(PreregistrationUser.objects.get(email=email))
|
|
|
|
|
|
|
|
# We only sent emails to the new users.
|
|
|
|
self.check_sent_emails(new)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
prereg_user = PreregistrationUser.objects.get(email="foo-test@zulip.com")
|
|
|
|
self.assertEqual(prereg_user.email, "foo-test@zulip.com")
|
2016-10-04 01:15:24 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invite_outside_domain_in_closed_realm(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
2018-07-27 23:26:29 +02:00
|
|
|
In a realm with `emails_restricted_to_domains = True`, you can't invite people
|
2014-01-31 21:08:40 +01:00
|
|
|
with a different domain from that of the realm or your e-mail address.
|
|
|
|
"""
|
2017-01-04 05:30:48 +01:00
|
|
|
zulip_realm = get_realm("zulip")
|
2018-07-27 23:26:29 +02:00
|
|
|
zulip_realm.emails_restricted_to_domains = True
|
2014-01-31 21:08:40 +01:00
|
|
|
zulip_realm.save()
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2014-01-31 21:08:40 +01:00
|
|
|
external_address = "foo@example.com"
|
|
|
|
|
|
|
|
self.assert_json_error(
|
|
|
|
self.invite(external_address, ["Denmark"]),
|
2021-02-12 08:19:30 +01:00
|
|
|
"Some emails did not validate, so we didn't send any invitations.",
|
|
|
|
)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2018-05-04 18:15:54 +02:00
|
|
|
def test_invite_using_disposable_email(self) -> None:
|
|
|
|
"""
|
2018-08-12 03:37:04 +02:00
|
|
|
In a realm with `disallow_disposable_email_addresses = True`, you can't invite
|
|
|
|
people with a disposable domain.
|
2018-05-04 18:15:54 +02:00
|
|
|
"""
|
|
|
|
zulip_realm = get_realm("zulip")
|
2018-07-27 23:26:29 +02:00
|
|
|
zulip_realm.emails_restricted_to_domains = False
|
2018-05-04 18:15:54 +02:00
|
|
|
zulip_realm.disallow_disposable_email_addresses = True
|
|
|
|
zulip_realm.save()
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2018-05-04 18:15:54 +02:00
|
|
|
external_address = "foo@mailnator.com"
|
|
|
|
|
|
|
|
self.assert_json_error(
|
|
|
|
self.invite(external_address, ["Denmark"]),
|
2021-02-12 08:19:30 +01:00
|
|
|
"Some emails did not validate, so we didn't send any invitations.",
|
|
|
|
)
|
2018-05-04 18:15:54 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invite_outside_domain_in_open_realm(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
2018-07-27 23:26:29 +02:00
|
|
|
In a realm with `emails_restricted_to_domains = False`, you can invite people
|
2014-01-31 21:08:40 +01:00
|
|
|
with a different domain from that of the realm or your e-mail address.
|
|
|
|
"""
|
2017-01-04 05:30:48 +01:00
|
|
|
zulip_realm = get_realm("zulip")
|
2018-07-27 23:26:29 +02:00
|
|
|
zulip_realm.emails_restricted_to_domains = False
|
2014-01-31 21:08:40 +01:00
|
|
|
zulip_realm.save()
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2014-01-31 21:08:40 +01:00
|
|
|
external_address = "foo@example.com"
|
|
|
|
|
|
|
|
self.assert_json_success(self.invite(external_address, ["Denmark"]))
|
|
|
|
self.check_sent_emails([external_address])
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invite_outside_domain_before_closing(self) -> None:
|
2017-03-18 20:36:40 +01:00
|
|
|
"""
|
|
|
|
If you invite someone with a different domain from that of the realm
|
2018-07-27 23:26:29 +02:00
|
|
|
when `emails_restricted_to_domains = False`, but `emails_restricted_to_domains` later
|
2017-03-18 20:36:40 +01:00
|
|
|
changes to true, the invitation should succeed but the invitee's signup
|
|
|
|
attempt should fail.
|
|
|
|
"""
|
|
|
|
zulip_realm = get_realm("zulip")
|
2018-07-27 23:26:29 +02:00
|
|
|
zulip_realm.emails_restricted_to_domains = False
|
2017-03-18 20:36:40 +01:00
|
|
|
zulip_realm.save()
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2017-03-18 20:36:40 +01:00
|
|
|
external_address = "foo@example.com"
|
|
|
|
|
|
|
|
self.assert_json_success(self.invite(external_address, ["Denmark"]))
|
|
|
|
self.check_sent_emails([external_address])
|
|
|
|
|
2018-07-27 23:26:29 +02:00
|
|
|
zulip_realm.emails_restricted_to_domains = True
|
2017-03-18 20:36:40 +01:00
|
|
|
zulip_realm.save()
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user("foo@example.com", "password")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2018-03-05 20:19:07 +01:00
|
|
|
self.assert_in_response("only allows users with email addresses", result)
|
|
|
|
|
|
|
|
def test_disposable_emails_before_closing(self) -> None:
|
|
|
|
"""
|
|
|
|
If you invite someone with a disposable email when
|
|
|
|
`disallow_disposable_email_addresses = False`, but
|
|
|
|
later changes to true, the invitation should succeed
|
|
|
|
but the invitee's signup attempt should fail.
|
|
|
|
"""
|
|
|
|
zulip_realm = get_realm("zulip")
|
2018-07-27 23:26:29 +02:00
|
|
|
zulip_realm.emails_restricted_to_domains = False
|
2018-03-05 20:19:07 +01:00
|
|
|
zulip_realm.disallow_disposable_email_addresses = False
|
|
|
|
zulip_realm.save()
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2018-03-05 20:19:07 +01:00
|
|
|
external_address = "foo@mailnator.com"
|
|
|
|
|
|
|
|
self.assert_json_success(self.invite(external_address, ["Denmark"]))
|
|
|
|
self.check_sent_emails([external_address])
|
|
|
|
|
|
|
|
zulip_realm.disallow_disposable_email_addresses = True
|
|
|
|
zulip_realm.save()
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user("foo@mailnator.com", "password")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
self.assert_in_response("Please sign up using a real email address.", result)
|
2017-03-18 20:36:40 +01:00
|
|
|
|
2018-06-20 13:08:07 +02:00
|
|
|
def test_invite_with_email_containing_plus_before_closing(self) -> None:
|
|
|
|
"""
|
|
|
|
If you invite someone with an email containing plus when
|
2018-07-27 23:26:29 +02:00
|
|
|
`emails_restricted_to_domains = False`, but later change
|
|
|
|
`emails_restricted_to_domains = True`, the invitation should
|
2018-06-20 13:08:07 +02:00
|
|
|
succeed but the invitee's signup attempt should fail as
|
docs: Add missing space to compound verbs “log in”, “set up”, etc.
Noun: backup, checkout, cleanup, login, logout, setup, shutdown, signup,
timeout.
Verb: back up, check out, clean up, log in, log out, set up, shut
down, sign up, time out.
Signed-off-by: Anders Kaseorg <anders@zulip.com>
2021-04-25 23:05:38 +02:00
|
|
|
users are not allowed to sign up using email containing +
|
2018-06-20 13:08:07 +02:00
|
|
|
when the realm is restricted to domain.
|
|
|
|
"""
|
|
|
|
zulip_realm = get_realm("zulip")
|
2018-07-27 23:26:29 +02:00
|
|
|
zulip_realm.emails_restricted_to_domains = False
|
2018-06-20 13:08:07 +02:00
|
|
|
zulip_realm.save()
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2018-06-20 13:08:07 +02:00
|
|
|
external_address = "foo+label@zulip.com"
|
|
|
|
|
|
|
|
self.assert_json_success(self.invite(external_address, ["Denmark"]))
|
|
|
|
self.check_sent_emails([external_address])
|
|
|
|
|
2018-07-27 23:26:29 +02:00
|
|
|
zulip_realm.emails_restricted_to_domains = True
|
2018-06-20 13:08:07 +02:00
|
|
|
zulip_realm.save()
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user(external_address, "password")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_in_response(
|
|
|
|
"Zulip Dev, does not allow signups using emails\n that contains +", result
|
|
|
|
)
|
2018-06-20 13:08:07 +02:00
|
|
|
|
2018-04-06 19:33:02 +02:00
|
|
|
def test_invalid_email_check_after_confirming_email(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2018-04-06 19:33:02 +02:00
|
|
|
email = "test@zulip.com"
|
|
|
|
|
|
|
|
self.assert_json_success(self.invite(email, ["Denmark"]))
|
|
|
|
|
|
|
|
obj = Confirmation.objects.get(confirmation_key=find_key_by_email(email))
|
|
|
|
prereg_user = obj.content_object
|
2021-07-24 16:56:39 +02:00
|
|
|
assert prereg_user is not None
|
2018-04-06 19:33:02 +02:00
|
|
|
prereg_user.email = "invalid.email"
|
|
|
|
prereg_user.save()
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user(email, "password")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_in_response(
|
|
|
|
"The email address you are trying to sign up with is not valid", result
|
|
|
|
)
|
2018-04-06 19:33:02 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invite_with_non_ascii_streams(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
|
|
|
Inviting someone to streams with non-ASCII characters succeeds.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2014-01-31 21:08:40 +01:00
|
|
|
invitee = "alice-test@zulip.com"
|
|
|
|
|
2020-04-09 21:51:58 +02:00
|
|
|
stream_name = "hümbüǵ"
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
# Make sure we're subscribed before inviting someone.
|
2017-08-25 06:01:29 +02:00
|
|
|
self.subscribe(self.example_user("hamlet"), stream_name)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
self.assert_json_success(self.invite(invitee, [stream_name]))
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invitation_reminder_email(self) -> None:
|
2016-12-01 08:54:21 +01:00
|
|
|
from django.core.mail import outbox
|
2017-05-24 02:42:31 +02:00
|
|
|
|
|
|
|
# All users belong to zulip realm
|
2021-02-12 08:20:45 +01:00
|
|
|
referrer_name = "hamlet"
|
2020-03-06 18:40:46 +01:00
|
|
|
current_user = self.example_user(referrer_name)
|
|
|
|
self.login_user(current_user)
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee_email = self.nonreg_email("alice")
|
2017-09-21 15:11:20 +02:00
|
|
|
self.assert_json_success(self.invite(invitee_email, ["Denmark"]))
|
|
|
|
self.assertTrue(find_key_by_email(invitee_email))
|
|
|
|
self.check_sent_emails([invitee_email])
|
2016-12-01 08:54:21 +01:00
|
|
|
|
2020-03-06 18:40:46 +01:00
|
|
|
data = {"email": invitee_email, "referrer_email": current_user.email}
|
2017-12-05 09:01:41 +01:00
|
|
|
invitee = PreregistrationUser.objects.get(email=data["email"])
|
2020-03-06 18:40:46 +01:00
|
|
|
referrer = self.example_user(referrer_name)
|
2021-08-02 20:45:55 +02:00
|
|
|
validity_in_days = 2
|
2021-07-31 22:08:54 +02:00
|
|
|
link = create_confirmation_link(
|
|
|
|
invitee, Confirmation.INVITATION, validity_in_days=validity_in_days
|
|
|
|
)
|
2016-12-01 08:54:21 +01:00
|
|
|
context = common_context(referrer)
|
2020-09-03 05:32:15 +02:00
|
|
|
context.update(
|
|
|
|
activate_url=link,
|
|
|
|
referrer_name=referrer.full_name,
|
|
|
|
referrer_email=referrer.email,
|
|
|
|
referrer_realm_name=referrer.realm.name,
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
with self.settings(EMAIL_BACKEND="django.core.mail.backends.console.EmailBackend"):
|
2018-12-03 23:26:51 +01:00
|
|
|
email = data["email"]
|
2017-05-03 18:20:16 +02:00
|
|
|
send_future_email(
|
2021-02-12 08:19:30 +01:00
|
|
|
"zerver/emails/invitation_reminder",
|
|
|
|
referrer.realm,
|
|
|
|
to_emails=[email],
|
|
|
|
from_address=FromAddress.no_reply_placeholder,
|
|
|
|
context=context,
|
|
|
|
)
|
2017-07-02 21:10:41 +02:00
|
|
|
email_jobs_to_deliver = ScheduledEmail.objects.filter(
|
2021-02-12 08:19:30 +01:00
|
|
|
scheduled_timestamp__lte=timezone_now()
|
|
|
|
)
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(email_jobs_to_deliver, 1)
|
2016-12-01 08:54:21 +01:00
|
|
|
email_count = len(outbox)
|
|
|
|
for job in email_jobs_to_deliver:
|
2021-05-11 03:32:31 +02:00
|
|
|
deliver_scheduled_emails(job)
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, email_count + 1)
|
2021-01-26 04:20:36 +01:00
|
|
|
self.assertEqual(self.email_envelope_from(outbox[-1]), settings.NOREPLY_EMAIL_ADDRESS)
|
|
|
|
self.assertIn(FromAddress.NOREPLY, self.email_display_from(outbox[-1]))
|
2016-12-01 08:54:21 +01:00
|
|
|
|
2017-09-21 15:11:20 +02:00
|
|
|
# Now verify that signing up clears invite_reminder emails
|
2021-02-12 08:20:45 +01:00
|
|
|
with self.settings(EMAIL_BACKEND="django.core.mail.backends.console.EmailBackend"):
|
2019-03-16 02:32:43 +01:00
|
|
|
email = data["email"]
|
|
|
|
send_future_email(
|
2021-02-12 08:19:30 +01:00
|
|
|
"zerver/emails/invitation_reminder",
|
|
|
|
referrer.realm,
|
|
|
|
to_emails=[email],
|
|
|
|
from_address=FromAddress.no_reply_placeholder,
|
|
|
|
context=context,
|
|
|
|
)
|
2019-03-16 02:32:43 +01:00
|
|
|
|
2017-09-21 15:11:20 +02:00
|
|
|
email_jobs_to_deliver = ScheduledEmail.objects.filter(
|
2021-02-12 08:19:30 +01:00
|
|
|
scheduled_timestamp__lte=timezone_now(), type=ScheduledEmail.INVITATION_REMINDER
|
|
|
|
)
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(email_jobs_to_deliver, 1)
|
2017-09-21 15:11:20 +02:00
|
|
|
|
|
|
|
self.register(invitee_email, "test")
|
|
|
|
email_jobs_to_deliver = ScheduledEmail.objects.filter(
|
2021-02-12 08:19:30 +01:00
|
|
|
scheduled_timestamp__lte=timezone_now(), type=ScheduledEmail.INVITATION_REMINDER
|
|
|
|
)
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(email_jobs_to_deliver, 0)
|
2017-09-21 15:11:20 +02:00
|
|
|
|
2019-08-23 03:32:22 +02:00
|
|
|
def test_no_invitation_reminder_when_link_expires_quickly(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
2019-08-23 03:32:22 +02:00
|
|
|
# Check invitation reminder email is scheduled with 4 day link expiry
|
2021-04-05 18:42:45 +02:00
|
|
|
self.invite("alice@zulip.com", ["Denmark"], invite_expires_in_days=4)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
ScheduledEmail.objects.filter(type=ScheduledEmail.INVITATION_REMINDER).count(), 1
|
|
|
|
)
|
2019-08-23 03:32:22 +02:00
|
|
|
# Check invitation reminder email is not scheduled with 3 day link expiry
|
2021-04-05 18:42:45 +02:00
|
|
|
self.invite("bob@zulip.com", ["Denmark"], invite_expires_in_days=3)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
ScheduledEmail.objects.filter(type=ScheduledEmail.INVITATION_REMINDER).count(), 1
|
|
|
|
)
|
2019-08-23 03:32:22 +02:00
|
|
|
|
2017-11-01 21:07:39 +01:00
|
|
|
# make sure users can't take a valid confirmation key from another
|
2020-10-23 02:43:28 +02:00
|
|
|
# pathway and use it with the invitation URL route
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_confirmation_key_of_wrong_type(self) -> None:
|
2020-05-01 00:57:18 +02:00
|
|
|
email = self.nonreg_email("alice")
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
|
|
|
inviter = self.example_user("iago")
|
2020-05-01 00:57:18 +02:00
|
|
|
prereg_user = PreregistrationUser.objects.create(
|
2021-02-12 08:19:30 +01:00
|
|
|
email=email, referred_by=inviter, realm=realm
|
|
|
|
)
|
2020-06-14 01:36:12 +02:00
|
|
|
url = create_confirmation_link(prereg_user, Confirmation.USER_REGISTRATION)
|
2021-02-12 08:20:45 +01:00
|
|
|
registration_key = url.split("/")[-1]
|
2017-11-30 07:17:06 +01:00
|
|
|
|
|
|
|
# Mainly a test of get_object_from_key, rather than of the invitation pathway
|
2017-11-01 21:16:23 +01:00
|
|
|
with self.assertRaises(ConfirmationKeyException) as cm:
|
2017-11-01 21:07:39 +01:00
|
|
|
get_object_from_key(registration_key, Confirmation.INVITATION)
|
2017-11-01 21:16:23 +01:00
|
|
|
self.assertEqual(cm.exception.error_type, ConfirmationKeyException.DOES_NOT_EXIST)
|
2017-11-01 21:07:39 +01:00
|
|
|
|
2017-11-30 07:17:06 +01:00
|
|
|
# Verify that using the wrong type doesn't work in the main confirm code path
|
2020-06-14 01:36:12 +02:00
|
|
|
email_change_url = create_confirmation_link(prereg_user, Confirmation.EMAIL_CHANGE)
|
2021-02-12 08:20:45 +01:00
|
|
|
email_change_key = email_change_url.split("/")[-1]
|
|
|
|
url = "/accounts/do_confirm/" + email_change_key
|
2017-11-30 07:17:06 +01:00
|
|
|
result = self.client_get(url)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_in_success_response(
|
|
|
|
["Whoops. We couldn't find your confirmation link in the system."], result
|
|
|
|
)
|
2017-11-30 07:17:06 +01:00
|
|
|
|
|
|
|
def test_confirmation_expired(self) -> None:
|
2020-05-01 00:57:18 +02:00
|
|
|
email = self.nonreg_email("alice")
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
|
|
|
inviter = self.example_user("iago")
|
2020-05-01 00:57:18 +02:00
|
|
|
prereg_user = PreregistrationUser.objects.create(
|
2021-02-12 08:19:30 +01:00
|
|
|
email=email, referred_by=inviter, realm=realm
|
|
|
|
)
|
2021-08-02 20:45:55 +02:00
|
|
|
date_sent = timezone_now() - datetime.timedelta(weeks=3)
|
|
|
|
with patch("confirmation.models.timezone_now", return_value=date_sent):
|
|
|
|
url = create_confirmation_link(prereg_user, Confirmation.USER_REGISTRATION)
|
2017-11-30 07:17:06 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
target_url = "/" + url.split("/", 3)[3]
|
2017-11-30 07:17:06 +01:00
|
|
|
result = self.client_get(target_url)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_in_success_response(
|
|
|
|
["Whoops. The confirmation link has expired or been deactivated."], result
|
|
|
|
)
|
2017-11-30 07:17:06 +01:00
|
|
|
|
2020-05-01 01:52:45 +02:00
|
|
|
def test_send_more_than_one_invite_to_same_user(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.user_profile = self.example_user("iago")
|
2020-05-01 01:52:45 +02:00
|
|
|
streams = []
|
|
|
|
for stream_name in ["Denmark", "Scotland"]:
|
|
|
|
streams.append(get_stream(stream_name, self.user_profile.realm))
|
|
|
|
|
2021-04-05 18:42:45 +02:00
|
|
|
invite_expires_in_days = 2
|
2021-08-01 20:02:06 +02:00
|
|
|
do_invite_users(
|
|
|
|
self.user_profile,
|
|
|
|
["foo@zulip.com"],
|
|
|
|
streams,
|
|
|
|
invite_expires_in_days=invite_expires_in_days,
|
|
|
|
)
|
2020-05-01 01:52:45 +02:00
|
|
|
prereg_user = PreregistrationUser.objects.get(email="foo@zulip.com")
|
2021-08-01 20:02:06 +02:00
|
|
|
do_invite_users(
|
|
|
|
self.user_profile,
|
|
|
|
["foo@zulip.com"],
|
|
|
|
streams,
|
|
|
|
invite_expires_in_days=invite_expires_in_days,
|
|
|
|
)
|
|
|
|
do_invite_users(
|
|
|
|
self.user_profile,
|
|
|
|
["foo@zulip.com"],
|
|
|
|
streams,
|
|
|
|
invite_expires_in_days=invite_expires_in_days,
|
|
|
|
)
|
2020-05-01 01:52:45 +02:00
|
|
|
|
2021-02-11 17:52:59 +01:00
|
|
|
# Also send an invite from a different realm.
|
|
|
|
lear = get_realm("lear")
|
|
|
|
lear_user = self.lear_user("cordelia")
|
2021-08-01 20:02:06 +02:00
|
|
|
do_invite_users(
|
|
|
|
lear_user, ["foo@zulip.com"], [], invite_expires_in_days=invite_expires_in_days
|
|
|
|
)
|
2021-02-11 17:52:59 +01:00
|
|
|
|
2020-05-01 01:52:45 +02:00
|
|
|
invites = PreregistrationUser.objects.filter(email__iexact="foo@zulip.com")
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(invites, 4)
|
2020-05-01 01:52:45 +02:00
|
|
|
|
|
|
|
do_create_user(
|
2021-02-12 08:20:45 +01:00
|
|
|
"foo@zulip.com",
|
|
|
|
"password",
|
2020-05-01 01:52:45 +02:00
|
|
|
self.user_profile.realm,
|
2021-02-12 08:20:45 +01:00
|
|
|
"full name",
|
2020-05-01 01:52:45 +02:00
|
|
|
prereg_user=prereg_user,
|
2021-02-06 14:27:06 +01:00
|
|
|
acting_user=None,
|
2020-05-01 01:52:45 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
accepted_invite = PreregistrationUser.objects.filter(
|
2021-02-12 08:19:30 +01:00
|
|
|
email__iexact="foo@zulip.com", status=confirmation_settings.STATUS_ACTIVE
|
|
|
|
)
|
2020-05-01 01:52:45 +02:00
|
|
|
revoked_invites = PreregistrationUser.objects.filter(
|
2021-02-12 08:19:30 +01:00
|
|
|
email__iexact="foo@zulip.com", status=confirmation_settings.STATUS_REVOKED
|
|
|
|
)
|
2020-05-01 01:52:45 +02:00
|
|
|
# If a user was invited more than once, when it accepts one invite and register
|
|
|
|
# the others must be canceled.
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(accepted_invite, 1)
|
2020-05-01 01:52:45 +02:00
|
|
|
self.assertEqual(accepted_invite[0].id, prereg_user.id)
|
|
|
|
|
2021-02-11 17:52:59 +01:00
|
|
|
expected_revoked_invites = set(invites.exclude(id=prereg_user.id).exclude(realm=lear))
|
2020-05-01 01:52:45 +02:00
|
|
|
self.assertEqual(set(revoked_invites), expected_revoked_invites)
|
|
|
|
|
2021-02-11 17:52:59 +01:00
|
|
|
self.assertEqual(
|
|
|
|
PreregistrationUser.objects.get(email__iexact="foo@zulip.com", realm=lear).status, 0
|
|
|
|
)
|
|
|
|
|
2020-05-02 00:23:19 +02:00
|
|
|
def test_confirmation_obj_not_exist_error(self) -> None:
|
2021-02-12 08:19:30 +01:00
|
|
|
"""Since the key is a param input by the user to the registration endpoint,
|
2020-05-02 00:23:19 +02:00
|
|
|
if it inserts an invalid value, the confirmation object won't be found. This
|
|
|
|
tests if, in that scenario, we handle the exception by redirecting the user to
|
|
|
|
the confirmation_link_expired_error page.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("alice")
|
|
|
|
password = "password"
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
inviter = self.example_user("iago")
|
2020-05-02 00:23:19 +02:00
|
|
|
prereg_user = PreregistrationUser.objects.create(
|
2021-02-12 08:19:30 +01:00
|
|
|
email=email, referred_by=inviter, realm=realm
|
|
|
|
)
|
2020-06-14 01:36:12 +02:00
|
|
|
confirmation_link = create_confirmation_link(prereg_user, Confirmation.USER_REGISTRATION)
|
2020-05-02 00:23:19 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
registration_key = "invalid_confirmation_key"
|
|
|
|
url = "/accounts/register/"
|
2021-02-12 08:19:30 +01:00
|
|
|
response = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
url, {"key": registration_key, "from_confirmation": 1, "full_nme": "alice"}
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-05-21 00:10:00 +02:00
|
|
|
self.assertEqual(response.status_code, 404)
|
|
|
|
self.assert_in_response("The registration link has expired or is not valid.", response)
|
2020-05-02 00:23:19 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
registration_key = confirmation_link.split("/")[-1]
|
2021-02-12 08:19:30 +01:00
|
|
|
response = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
url, {"key": registration_key, "from_confirmation": 1, "full_nme": "alice"}
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_in_success_response(["We just need you to do one last thing."], response)
|
2020-05-02 00:23:19 +02:00
|
|
|
response = self.submit_reg_form_for_user(email, password, key=registration_key)
|
|
|
|
self.assertEqual(response.status_code, 302)
|
|
|
|
|
2020-05-01 01:39:17 +02:00
|
|
|
def test_validate_email_not_already_in_realm(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("alice")
|
|
|
|
password = "password"
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
inviter = self.example_user("iago")
|
2020-05-01 01:39:17 +02:00
|
|
|
prereg_user = PreregistrationUser.objects.create(
|
2021-02-12 08:19:30 +01:00
|
|
|
email=email, referred_by=inviter, realm=realm
|
|
|
|
)
|
2020-05-01 01:39:17 +02:00
|
|
|
|
2020-06-14 01:36:12 +02:00
|
|
|
confirmation_link = create_confirmation_link(prereg_user, Confirmation.USER_REGISTRATION)
|
2021-02-12 08:20:45 +01:00
|
|
|
registration_key = confirmation_link.split("/")[-1]
|
2020-05-01 01:39:17 +02:00
|
|
|
|
|
|
|
url = "/accounts/register/"
|
2021-02-12 08:19:30 +01:00
|
|
|
self.client_post(
|
|
|
|
url, {"key": registration_key, "from_confirmation": 1, "full_name": "alice"}
|
|
|
|
)
|
2020-05-01 01:39:17 +02:00
|
|
|
self.submit_reg_form_for_user(email, password, key=registration_key)
|
|
|
|
|
|
|
|
url = "/accounts/register/"
|
2021-02-12 08:19:30 +01:00
|
|
|
response = self.client_post(
|
|
|
|
url, {"key": registration_key, "from_confirmation": 1, "full_name": "alice"}
|
|
|
|
)
|
2020-05-01 01:39:17 +02:00
|
|
|
self.assertEqual(response.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
response.url,
|
2021-02-12 08:20:45 +01:00
|
|
|
reverse("login") + "?" + urlencode({"email": email, "already_registered": 1}),
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
|
2021-05-28 15:57:08 +02:00
|
|
|
def test_confirmation_link_in_manual_license_plan(self) -> None:
|
|
|
|
inviter = self.example_user("iago")
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
|
|
|
|
email = self.nonreg_email("alice")
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
prereg_user = PreregistrationUser.objects.create(
|
|
|
|
email=email, referred_by=inviter, realm=realm
|
|
|
|
)
|
|
|
|
confirmation_link = create_confirmation_link(prereg_user, Confirmation.USER_REGISTRATION)
|
|
|
|
registration_key = confirmation_link.split("/")[-1]
|
|
|
|
url = "/accounts/register/"
|
|
|
|
self.client_post(
|
|
|
|
url, {"key": registration_key, "from_confirmation": 1, "full_name": "alice"}
|
|
|
|
)
|
|
|
|
response = self.submit_reg_form_for_user(email, "password", key=registration_key)
|
|
|
|
self.assertEqual(response.status_code, 302)
|
|
|
|
self.assertEqual(response.url, "http://zulip.testserver/")
|
|
|
|
|
|
|
|
self.subscribe_realm_to_monthly_plan_on_manual_license_management(realm, 5, 5)
|
|
|
|
|
|
|
|
email = self.nonreg_email("bob")
|
|
|
|
prereg_user = PreregistrationUser.objects.create(
|
|
|
|
email=email, referred_by=inviter, realm=realm
|
|
|
|
)
|
|
|
|
confirmation_link = create_confirmation_link(prereg_user, Confirmation.USER_REGISTRATION)
|
|
|
|
registration_key = confirmation_link.split("/")[-1]
|
|
|
|
url = "/accounts/register/"
|
|
|
|
self.client_post(url, {"key": registration_key, "from_confirmation": 1, "full_name": "bob"})
|
|
|
|
response = self.submit_reg_form_for_user(email, "password", key=registration_key)
|
|
|
|
self.assert_in_success_response(
|
|
|
|
["New members cannot join this organization because all Zulip licenses are"], response
|
|
|
|
)
|
|
|
|
|
2020-05-01 01:39:17 +02:00
|
|
|
|
2017-10-21 03:15:12 +02:00
|
|
|
class InvitationsTestCase(InviteUserBase):
|
2020-04-30 21:41:21 +02:00
|
|
|
def test_do_get_user_invites(self) -> None:
|
|
|
|
user_profile = self.example_user("iago")
|
2021-02-12 08:20:45 +01:00
|
|
|
hamlet = self.example_user("hamlet")
|
|
|
|
othello = self.example_user("othello")
|
2021-04-05 18:42:45 +02:00
|
|
|
|
|
|
|
streams = []
|
|
|
|
for stream_name in ["Denmark", "Scotland"]:
|
|
|
|
streams.append(get_stream(stream_name, user_profile.realm))
|
|
|
|
|
|
|
|
invite_expires_in_days = 2
|
2021-08-01 20:02:06 +02:00
|
|
|
do_invite_users(
|
|
|
|
user_profile,
|
|
|
|
["TestOne@zulip.com"],
|
|
|
|
streams,
|
|
|
|
invite_expires_in_days=invite_expires_in_days,
|
|
|
|
)
|
|
|
|
do_invite_users(
|
|
|
|
user_profile,
|
|
|
|
["TestTwo@zulip.com"],
|
|
|
|
streams,
|
|
|
|
invite_expires_in_days=invite_expires_in_days,
|
|
|
|
)
|
|
|
|
do_invite_users(
|
|
|
|
hamlet, ["TestThree@zulip.com"], streams, invite_expires_in_days=invite_expires_in_days
|
|
|
|
)
|
|
|
|
do_invite_users(
|
|
|
|
othello, ["TestFour@zulip.com"], streams, invite_expires_in_days=invite_expires_in_days
|
|
|
|
)
|
|
|
|
do_invite_users(
|
|
|
|
self.mit_user("sipbtest"),
|
|
|
|
["TestOne@mit.edu"],
|
|
|
|
[],
|
|
|
|
invite_expires_in_days=invite_expires_in_days,
|
|
|
|
)
|
2021-04-05 18:42:45 +02:00
|
|
|
do_create_multiuse_invite_link(
|
|
|
|
user_profile, PreregistrationUser.INVITE_AS["MEMBER"], invite_expires_in_days
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(do_get_user_invites(user_profile), 5)
|
|
|
|
self.assert_length(do_get_user_invites(hamlet), 1)
|
|
|
|
self.assert_length(do_get_user_invites(othello), 1)
|
2020-04-30 21:41:21 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_successful_get_open_invitations(self) -> None:
|
2017-10-21 03:15:12 +02:00
|
|
|
"""
|
|
|
|
A GET call to /json/invites returns all unexpired invitations.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
active_value = getattr(confirmation_settings, "STATUS_ACTIVE", "Wrong")
|
2017-10-21 03:15:12 +02:00
|
|
|
self.assertNotEqual(active_value, "Wrong")
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2017-10-21 03:15:12 +02:00
|
|
|
user_profile = self.example_user("iago")
|
2021-04-05 18:42:45 +02:00
|
|
|
self.login_user(user_profile)
|
|
|
|
|
|
|
|
hamlet = self.example_user("hamlet")
|
|
|
|
othello = self.example_user("othello")
|
|
|
|
|
|
|
|
streams = []
|
|
|
|
for stream_name in ["Denmark", "Scotland"]:
|
|
|
|
streams.append(get_stream(stream_name, user_profile.realm))
|
|
|
|
|
|
|
|
invite_expires_in_days = 2
|
2021-08-01 20:02:06 +02:00
|
|
|
do_invite_users(
|
|
|
|
user_profile,
|
|
|
|
["TestOne@zulip.com"],
|
|
|
|
streams,
|
|
|
|
invite_expires_in_days=invite_expires_in_days,
|
|
|
|
)
|
2021-04-05 18:42:45 +02:00
|
|
|
|
|
|
|
with patch(
|
|
|
|
"confirmation.models.timezone_now",
|
|
|
|
return_value=timezone_now() - datetime.timedelta(days=invite_expires_in_days + 1),
|
|
|
|
):
|
2021-08-01 20:02:06 +02:00
|
|
|
do_invite_users(
|
|
|
|
user_profile,
|
|
|
|
["TestTwo@zulip.com"],
|
|
|
|
streams,
|
|
|
|
invite_expires_in_days=invite_expires_in_days,
|
|
|
|
)
|
2021-04-05 18:42:45 +02:00
|
|
|
do_create_multiuse_invite_link(
|
|
|
|
othello, PreregistrationUser.INVITE_AS["MEMBER"], invite_expires_in_days
|
|
|
|
)
|
2017-10-21 03:15:12 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
prereg_user_three = PreregistrationUser(
|
|
|
|
email="TestThree@zulip.com", referred_by=user_profile, status=active_value
|
|
|
|
)
|
2017-10-21 03:15:12 +02:00
|
|
|
prereg_user_three.save()
|
2021-07-31 22:08:54 +02:00
|
|
|
create_confirmation_link(
|
|
|
|
prereg_user_three, Confirmation.INVITATION, validity_in_days=invite_expires_in_days
|
|
|
|
)
|
2017-10-21 03:15:12 +02:00
|
|
|
|
2021-04-05 18:42:45 +02:00
|
|
|
do_create_multiuse_invite_link(
|
|
|
|
hamlet, PreregistrationUser.INVITE_AS["MEMBER"], invite_expires_in_days
|
|
|
|
)
|
2019-02-15 19:09:25 +01:00
|
|
|
|
2017-10-21 03:15:12 +02:00
|
|
|
result = self.client_get("/json/invites")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2020-08-07 01:09:47 +02:00
|
|
|
invites = orjson.loads(result.content)["invites"]
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(invites, 2)
|
2020-06-26 21:26:57 +02:00
|
|
|
|
|
|
|
self.assertFalse(invites[0]["is_multiuse"])
|
|
|
|
self.assertEqual(invites[0]["email"], "TestOne@zulip.com")
|
|
|
|
self.assertTrue(invites[1]["is_multiuse"])
|
|
|
|
self.assertEqual(invites[1]["invited_by_user_id"], hamlet.id)
|
2017-10-21 03:15:12 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_successful_delete_invitation(self) -> None:
|
2017-10-21 03:15:12 +02:00
|
|
|
"""
|
|
|
|
A DELETE call to /json/invites/<ID> should delete the invite and
|
|
|
|
any scheduled invitation reminder emails.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2017-10-21 03:15:12 +02:00
|
|
|
|
|
|
|
invitee = "DeleteMe@zulip.com"
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_json_success(self.invite(invitee, ["Denmark"]))
|
2017-10-21 03:15:12 +02:00
|
|
|
prereg_user = PreregistrationUser.objects.get(email=invitee)
|
|
|
|
|
|
|
|
# Verify that the scheduled email exists.
|
2021-02-12 08:19:30 +01:00
|
|
|
ScheduledEmail.objects.get(address__iexact=invitee, type=ScheduledEmail.INVITATION_REMINDER)
|
2017-10-21 03:15:12 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_delete("/json/invites/" + str(prereg_user.id))
|
2017-10-21 03:15:12 +02:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-02-12 08:20:45 +01:00
|
|
|
error_result = self.client_delete("/json/invites/" + str(prereg_user.id))
|
2017-12-05 20:05:17 +01:00
|
|
|
self.assert_json_error(error_result, "No such invitation")
|
2017-10-21 03:15:12 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertRaises(
|
|
|
|
ScheduledEmail.DoesNotExist,
|
|
|
|
lambda: ScheduledEmail.objects.get(
|
|
|
|
address__iexact=invitee, type=ScheduledEmail.INVITATION_REMINDER
|
|
|
|
),
|
|
|
|
)
|
2017-10-21 03:15:12 +02:00
|
|
|
|
2020-04-30 21:41:21 +02:00
|
|
|
def test_successful_member_delete_invitation(self) -> None:
|
|
|
|
"""
|
|
|
|
A DELETE call from member account to /json/invites/<ID> should delete the invite and
|
|
|
|
any scheduled invitation reminder emails.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.example_user("hamlet")
|
2020-04-30 21:41:21 +02:00
|
|
|
self.login_user(user_profile)
|
|
|
|
invitee = "DeleteMe@zulip.com"
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_json_success(self.invite(invitee, ["Denmark"]))
|
2020-04-30 21:41:21 +02:00
|
|
|
|
|
|
|
# Verify that the scheduled email exists.
|
2021-02-12 08:19:30 +01:00
|
|
|
prereg_user = PreregistrationUser.objects.get(email=invitee, referred_by=user_profile)
|
|
|
|
ScheduledEmail.objects.get(address__iexact=invitee, type=ScheduledEmail.INVITATION_REMINDER)
|
2020-04-30 21:41:21 +02:00
|
|
|
|
|
|
|
# Verify another non-admin can't delete
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.api_delete(
|
2021-02-12 08:20:45 +01:00
|
|
|
self.example_user("othello"), "/api/v1/invites/" + str(prereg_user.id)
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-04-30 21:41:21 +02:00
|
|
|
self.assert_json_error(result, "Must be an organization administrator")
|
|
|
|
|
|
|
|
# Verify that the scheduled email still exists.
|
2021-02-12 08:19:30 +01:00
|
|
|
prereg_user = PreregistrationUser.objects.get(email=invitee, referred_by=user_profile)
|
|
|
|
ScheduledEmail.objects.get(address__iexact=invitee, type=ScheduledEmail.INVITATION_REMINDER)
|
2020-04-30 21:41:21 +02:00
|
|
|
|
|
|
|
# Verify deletion works.
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.api_delete(user_profile, "/api/v1/invites/" + str(prereg_user.id))
|
2020-04-30 21:41:21 +02:00
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.api_delete(user_profile, "/api/v1/invites/" + str(prereg_user.id))
|
2020-04-30 21:41:21 +02:00
|
|
|
self.assert_json_error(result, "No such invitation")
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertRaises(
|
|
|
|
ScheduledEmail.DoesNotExist,
|
|
|
|
lambda: ScheduledEmail.objects.get(
|
|
|
|
address__iexact=invitee, type=ScheduledEmail.INVITATION_REMINDER
|
|
|
|
),
|
|
|
|
)
|
2020-04-30 21:41:21 +02:00
|
|
|
|
2020-06-18 13:03:06 +02:00
|
|
|
def test_delete_owner_invitation(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("desdemona")
|
|
|
|
owner = self.example_user("desdemona")
|
2020-06-18 13:03:06 +02:00
|
|
|
|
|
|
|
invitee = "DeleteMe@zulip.com"
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_json_success(
|
|
|
|
self.invite(
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee, ["Denmark"], invite_as=PreregistrationUser.INVITE_AS["REALM_OWNER"]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2020-06-18 13:03:06 +02:00
|
|
|
prereg_user = PreregistrationUser.objects.get(email=invitee)
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.api_delete(
|
2021-02-12 08:20:45 +01:00
|
|
|
self.example_user("iago"), "/api/v1/invites/" + str(prereg_user.id)
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-06-18 13:03:06 +02:00
|
|
|
self.assert_json_error(result, "Must be an organization owner")
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.api_delete(owner, "/api/v1/invites/" + str(prereg_user.id))
|
2020-06-18 13:03:06 +02:00
|
|
|
self.assert_json_success(result)
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.api_delete(owner, "/api/v1/invites/" + str(prereg_user.id))
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_json_error(result, "No such invitation")
|
|
|
|
self.assertRaises(
|
|
|
|
ScheduledEmail.DoesNotExist,
|
|
|
|
lambda: ScheduledEmail.objects.get(
|
|
|
|
address__iexact=invitee, type=ScheduledEmail.INVITATION_REMINDER
|
|
|
|
),
|
|
|
|
)
|
2020-06-18 13:03:06 +02:00
|
|
|
|
2019-02-15 19:09:25 +01:00
|
|
|
def test_delete_multiuse_invite(self) -> None:
|
|
|
|
"""
|
|
|
|
A DELETE call to /json/invites/multiuse<ID> should delete the
|
|
|
|
multiuse_invite.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2019-02-15 19:09:25 +01:00
|
|
|
|
|
|
|
zulip_realm = get_realm("zulip")
|
2021-02-12 08:19:30 +01:00
|
|
|
multiuse_invite = MultiuseInvite.objects.create(
|
|
|
|
referred_by=self.example_user("hamlet"), realm=zulip_realm
|
|
|
|
)
|
2021-08-02 20:45:55 +02:00
|
|
|
validity_in_days = 2
|
2021-07-31 22:08:54 +02:00
|
|
|
create_confirmation_link(
|
|
|
|
multiuse_invite, Confirmation.MULTIUSE_INVITE, validity_in_days=validity_in_days
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_delete("/json/invites/multiuse/" + str(multiuse_invite.id))
|
2019-02-15 19:09:25 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
self.assertIsNone(MultiuseInvite.objects.filter(id=multiuse_invite.id).first())
|
|
|
|
# Test that trying to double-delete fails
|
2021-02-12 08:20:45 +01:00
|
|
|
error_result = self.client_delete("/json/invites/multiuse/" + str(multiuse_invite.id))
|
2019-02-15 19:09:25 +01:00
|
|
|
self.assert_json_error(error_result, "No such invitation")
|
|
|
|
|
2020-06-18 13:03:06 +02:00
|
|
|
# Test deleting owner mutiuse_invite.
|
2021-02-12 08:19:30 +01:00
|
|
|
multiuse_invite = MultiuseInvite.objects.create(
|
|
|
|
referred_by=self.example_user("desdemona"),
|
|
|
|
realm=zulip_realm,
|
2021-02-12 08:20:45 +01:00
|
|
|
invited_as=PreregistrationUser.INVITE_AS["REALM_OWNER"],
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-08-02 20:45:55 +02:00
|
|
|
validity_in_days = 2
|
2021-07-31 22:08:54 +02:00
|
|
|
create_confirmation_link(
|
|
|
|
multiuse_invite, Confirmation.MULTIUSE_INVITE, validity_in_days=validity_in_days
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
error_result = self.client_delete("/json/invites/multiuse/" + str(multiuse_invite.id))
|
|
|
|
self.assert_json_error(error_result, "Must be an organization owner")
|
2020-06-18 13:03:06 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("desdemona")
|
|
|
|
result = self.client_delete("/json/invites/multiuse/" + str(multiuse_invite.id))
|
2020-06-18 13:03:06 +02:00
|
|
|
self.assert_json_success(result)
|
|
|
|
self.assertIsNone(MultiuseInvite.objects.filter(id=multiuse_invite.id).first())
|
|
|
|
|
2019-02-15 19:09:25 +01:00
|
|
|
# Test deleting multiuse invite from another realm
|
|
|
|
mit_realm = get_realm("zephyr")
|
2021-02-12 08:19:30 +01:00
|
|
|
multiuse_invite_in_mit = MultiuseInvite.objects.create(
|
|
|
|
referred_by=self.mit_user("sipbtest"), realm=mit_realm
|
|
|
|
)
|
2021-08-02 20:45:55 +02:00
|
|
|
validity_in_days = 2
|
|
|
|
create_confirmation_link(
|
2021-07-31 22:08:54 +02:00
|
|
|
multiuse_invite_in_mit, Confirmation.MULTIUSE_INVITE, validity_in_days=validity_in_days
|
2021-08-02 20:45:55 +02:00
|
|
|
)
|
2021-02-12 08:19:30 +01:00
|
|
|
error_result = self.client_delete(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/json/invites/multiuse/" + str(multiuse_invite_in_mit.id)
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2019-02-15 19:09:25 +01:00
|
|
|
self.assert_json_error(error_result, "No such invitation")
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_successful_resend_invitation(self) -> None:
|
2017-10-21 03:15:12 +02:00
|
|
|
"""
|
|
|
|
A POST call to /json/invites/<ID>/resend should send an invitation reminder email
|
|
|
|
and delete any scheduled invitation reminder email.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2017-12-05 07:51:25 +01:00
|
|
|
invitee = "resend_me@zulip.com"
|
2017-10-21 03:15:12 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_json_success(self.invite(invitee, ["Denmark"]))
|
2017-10-21 03:15:12 +02:00
|
|
|
prereg_user = PreregistrationUser.objects.get(email=invitee)
|
|
|
|
|
|
|
|
# Verify and then clear from the outbox the original invite email
|
2021-05-25 08:46:06 +02:00
|
|
|
self.check_sent_emails([invitee])
|
2017-10-21 03:15:12 +02:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-10-21 03:15:12 +02:00
|
|
|
outbox.pop()
|
|
|
|
|
|
|
|
# Verify that the scheduled email exists.
|
2017-12-05 07:51:25 +01:00
|
|
|
scheduledemail_filter = ScheduledEmail.objects.filter(
|
2021-02-12 08:19:30 +01:00
|
|
|
address__iexact=invitee, type=ScheduledEmail.INVITATION_REMINDER
|
|
|
|
)
|
2017-12-05 07:51:25 +01:00
|
|
|
self.assertEqual(scheduledemail_filter.count(), 1)
|
2021-02-12 08:20:45 +01:00
|
|
|
original_timestamp = scheduledemail_filter.values_list("scheduled_timestamp", flat=True)
|
2017-12-05 07:51:25 +01:00
|
|
|
|
|
|
|
# Resend invite
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/json/invites/" + str(prereg_user.id) + "/resend")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
ScheduledEmail.objects.filter(
|
|
|
|
address__iexact=invitee, type=ScheduledEmail.INVITATION_REMINDER
|
|
|
|
).count(),
|
|
|
|
1,
|
|
|
|
)
|
2017-12-05 07:51:25 +01:00
|
|
|
|
|
|
|
# Check that we have exactly one scheduled email, and that it is different
|
|
|
|
self.assertEqual(scheduledemail_filter.count(), 1)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertNotEqual(
|
2021-02-12 08:20:45 +01:00
|
|
|
original_timestamp, scheduledemail_filter.values_list("scheduled_timestamp", flat=True)
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-10-21 03:15:12 +02:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-02-12 08:20:45 +01:00
|
|
|
error_result = self.client_post("/json/invites/" + str(9999) + "/resend")
|
2017-12-05 20:05:17 +01:00
|
|
|
self.assert_json_error(error_result, "No such invitation")
|
2017-10-21 03:15:12 +02:00
|
|
|
|
2021-05-25 08:46:06 +02:00
|
|
|
self.check_sent_emails([invitee])
|
2017-10-21 03:15:12 +02:00
|
|
|
|
2020-04-30 21:41:21 +02:00
|
|
|
def test_successful_member_resend_invitation(self) -> None:
|
|
|
|
"""A POST call from member a account to /json/invites/<ID>/resend
|
|
|
|
should send an invitation reminder email and delete any
|
|
|
|
scheduled invitation reminder email if they send the invite.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
|
|
|
user_profile = self.example_user("hamlet")
|
2020-04-30 21:41:21 +02:00
|
|
|
invitee = "resend_me@zulip.com"
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_json_success(self.invite(invitee, ["Denmark"]))
|
2020-04-30 21:41:21 +02:00
|
|
|
# Verify hamlet has only one invitation (Member can resend invitations only sent by him).
|
|
|
|
invitation = PreregistrationUser.objects.filter(referred_by=user_profile)
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(invitation, 1)
|
2020-04-30 21:41:21 +02:00
|
|
|
prereg_user = PreregistrationUser.objects.get(email=invitee)
|
|
|
|
|
|
|
|
# Verify and then clear from the outbox the original invite email
|
2021-05-25 08:46:06 +02:00
|
|
|
self.check_sent_emails([invitee])
|
2020-04-30 21:41:21 +02:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2020-04-30 21:41:21 +02:00
|
|
|
outbox.pop()
|
|
|
|
|
|
|
|
# Verify that the scheduled email exists.
|
|
|
|
scheduledemail_filter = ScheduledEmail.objects.filter(
|
2021-02-12 08:19:30 +01:00
|
|
|
address__iexact=invitee, type=ScheduledEmail.INVITATION_REMINDER
|
|
|
|
)
|
2020-04-30 21:41:21 +02:00
|
|
|
self.assertEqual(scheduledemail_filter.count(), 1)
|
2021-02-12 08:20:45 +01:00
|
|
|
original_timestamp = scheduledemail_filter.values_list("scheduled_timestamp", flat=True)
|
2020-04-30 21:41:21 +02:00
|
|
|
|
|
|
|
# Resend invite
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/json/invites/" + str(prereg_user.id) + "/resend")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
ScheduledEmail.objects.filter(
|
|
|
|
address__iexact=invitee, type=ScheduledEmail.INVITATION_REMINDER
|
|
|
|
).count(),
|
|
|
|
1,
|
|
|
|
)
|
2020-04-30 21:41:21 +02:00
|
|
|
|
|
|
|
# Check that we have exactly one scheduled email, and that it is different
|
|
|
|
self.assertEqual(scheduledemail_filter.count(), 1)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertNotEqual(
|
2021-02-12 08:20:45 +01:00
|
|
|
original_timestamp, scheduledemail_filter.values_list("scheduled_timestamp", flat=True)
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-04-30 21:41:21 +02:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-02-12 08:20:45 +01:00
|
|
|
error_result = self.client_post("/json/invites/" + str(9999) + "/resend")
|
2020-04-30 21:41:21 +02:00
|
|
|
self.assert_json_error(error_result, "No such invitation")
|
|
|
|
|
2021-05-25 08:46:06 +02:00
|
|
|
self.check_sent_emails([invitee])
|
2020-04-30 21:41:21 +02:00
|
|
|
|
|
|
|
self.logout()
|
|
|
|
self.login("othello")
|
|
|
|
invitee = "TestOne@zulip.com"
|
|
|
|
prereg_user_one = PreregistrationUser(email=invitee, referred_by=user_profile)
|
|
|
|
prereg_user_one.save()
|
|
|
|
prereg_user = PreregistrationUser.objects.get(email=invitee)
|
2021-02-12 08:20:45 +01:00
|
|
|
error_result = self.client_post("/json/invites/" + str(prereg_user.id) + "/resend")
|
2020-04-30 21:41:21 +02:00
|
|
|
self.assert_json_error(error_result, "Must be an organization administrator")
|
|
|
|
|
2020-06-18 13:03:06 +02:00
|
|
|
def test_resend_owner_invitation(self) -> None:
|
|
|
|
self.login("desdemona")
|
|
|
|
|
|
|
|
invitee = "resend_owner@zulip.com"
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_json_success(
|
|
|
|
self.invite(
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee, ["Denmark"], invite_as=PreregistrationUser.INVITE_AS["REALM_OWNER"]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2021-05-25 08:46:06 +02:00
|
|
|
self.check_sent_emails([invitee])
|
2020-06-18 13:03:06 +02:00
|
|
|
scheduledemail_filter = ScheduledEmail.objects.filter(
|
2021-02-12 08:19:30 +01:00
|
|
|
address__iexact=invitee, type=ScheduledEmail.INVITATION_REMINDER
|
|
|
|
)
|
2020-06-18 13:03:06 +02:00
|
|
|
self.assertEqual(scheduledemail_filter.count(), 1)
|
2021-02-12 08:20:45 +01:00
|
|
|
original_timestamp = scheduledemail_filter.values_list("scheduled_timestamp", flat=True)
|
2020-06-18 13:03:06 +02:00
|
|
|
|
|
|
|
# Test only organization owners can resend owner invitation.
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2020-06-18 13:03:06 +02:00
|
|
|
prereg_user = PreregistrationUser.objects.get(email=invitee)
|
2021-02-12 08:20:45 +01:00
|
|
|
error_result = self.client_post("/json/invites/" + str(prereg_user.id) + "/resend")
|
2020-06-18 13:03:06 +02:00
|
|
|
self.assert_json_error(error_result, "Must be an organization owner")
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("desdemona")
|
|
|
|
result = self.client_post("/json/invites/" + str(prereg_user.id) + "/resend")
|
2020-06-18 13:03:06 +02:00
|
|
|
self.assert_json_success(result)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
ScheduledEmail.objects.filter(
|
|
|
|
address__iexact=invitee, type=ScheduledEmail.INVITATION_REMINDER
|
|
|
|
).count(),
|
|
|
|
1,
|
|
|
|
)
|
2020-06-18 13:03:06 +02:00
|
|
|
|
|
|
|
# Check that we have exactly one scheduled email, and that it is different
|
|
|
|
self.assertEqual(scheduledemail_filter.count(), 1)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertNotEqual(
|
2021-02-12 08:20:45 +01:00
|
|
|
original_timestamp, scheduledemail_filter.values_list("scheduled_timestamp", flat=True)
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-06-18 13:03:06 +02:00
|
|
|
|
2017-12-05 20:01:55 +01:00
|
|
|
def test_accessing_invites_in_another_realm(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
inviter = UserProfile.objects.exclude(realm=get_realm("zulip")).first()
|
2021-07-24 16:56:39 +02:00
|
|
|
assert inviter is not None
|
2017-12-05 20:01:55 +01:00
|
|
|
prereg_user = PreregistrationUser.objects.create(
|
2021-02-12 08:20:45 +01:00
|
|
|
email="email", referred_by=inviter, realm=inviter.realm
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
|
|
|
error_result = self.client_post("/json/invites/" + str(prereg_user.id) + "/resend")
|
2017-12-05 20:05:17 +01:00
|
|
|
self.assert_json_error(error_result, "No such invitation")
|
2021-02-12 08:20:45 +01:00
|
|
|
error_result = self.client_delete("/json/invites/" + str(prereg_user.id))
|
2017-12-05 20:05:17 +01:00
|
|
|
self.assert_json_error(error_result, "No such invitation")
|
2017-12-05 20:01:55 +01:00
|
|
|
|
2020-02-15 07:06:48 +01:00
|
|
|
def test_prereg_user_status(self) -> None:
|
|
|
|
email = self.nonreg_email("alice")
|
|
|
|
password = "password"
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
2020-02-15 07:06:48 +01:00
|
|
|
|
2021-02-19 15:47:12 +01:00
|
|
|
inviter = UserProfile.objects.filter(realm=realm).first()
|
2020-02-15 07:06:48 +01:00
|
|
|
prereg_user = PreregistrationUser.objects.create(
|
2021-02-12 08:19:30 +01:00
|
|
|
email=email, referred_by=inviter, realm=realm
|
|
|
|
)
|
2020-02-15 07:06:48 +01:00
|
|
|
|
2020-06-14 01:36:12 +02:00
|
|
|
confirmation_link = create_confirmation_link(prereg_user, Confirmation.USER_REGISTRATION)
|
2021-02-12 08:20:45 +01:00
|
|
|
registration_key = confirmation_link.split("/")[-1]
|
2020-02-15 07:06:48 +01:00
|
|
|
|
|
|
|
result = self.client_post(
|
|
|
|
"/accounts/register/",
|
2021-02-12 08:19:30 +01:00
|
|
|
{"key": registration_key, "from_confirmation": "1", "full_name": "alice"},
|
|
|
|
)
|
2020-02-15 07:06:48 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
confirmation = Confirmation.objects.get(confirmation_key=registration_key)
|
2021-07-24 16:56:39 +02:00
|
|
|
assert confirmation.content_object is not None
|
2020-02-15 07:06:48 +01:00
|
|
|
prereg_user = confirmation.content_object
|
|
|
|
self.assertEqual(prereg_user.status, 0)
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user(email, password, key=registration_key)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
prereg_user = PreregistrationUser.objects.get(email=email, referred_by=inviter, realm=realm)
|
2020-02-15 07:06:48 +01:00
|
|
|
self.assertEqual(prereg_user.status, confirmation_settings.STATUS_ACTIVE)
|
|
|
|
user = get_user_by_delivery_email(email, realm)
|
|
|
|
self.assertIsNotNone(user)
|
|
|
|
self.assertEqual(user.delivery_email, email)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2020-07-01 04:19:54 +02:00
|
|
|
class InviteeEmailsParserTests(ZulipTestCase):
|
2017-11-05 10:51:25 +01:00
|
|
|
def setUp(self) -> None:
|
2019-10-19 20:47:00 +02:00
|
|
|
super().setUp()
|
2016-07-29 18:16:54 +02:00
|
|
|
self.email1 = "email1@zulip.com"
|
|
|
|
self.email2 = "email2@zulip.com"
|
|
|
|
self.email3 = "email3@zulip.com"
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_if_emails_separated_by_commas_are_parsed_and_striped_correctly(self) -> None:
|
2020-06-09 00:25:09 +02:00
|
|
|
emails_raw = f"{self.email1} ,{self.email2}, {self.email3}"
|
2016-07-29 18:16:54 +02:00
|
|
|
expected_set = {self.email1, self.email2, self.email3}
|
|
|
|
self.assertEqual(get_invitee_emails_set(emails_raw), expected_set)
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_if_emails_separated_by_newlines_are_parsed_and_striped_correctly(self) -> None:
|
2020-06-09 00:25:09 +02:00
|
|
|
emails_raw = f"{self.email1}\n {self.email2}\n {self.email3} "
|
2016-07-29 18:16:54 +02:00
|
|
|
expected_set = {self.email1, self.email2, self.email3}
|
|
|
|
self.assertEqual(get_invitee_emails_set(emails_raw), expected_set)
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_if_emails_from_email_client_separated_by_newlines_are_parsed_correctly(self) -> None:
|
2021-02-12 08:19:30 +01:00
|
|
|
emails_raw = (
|
|
|
|
f"Email One <{self.email1}>\nEmailTwo<{self.email2}>\nEmail Three<{self.email3}>"
|
|
|
|
)
|
2016-07-29 18:16:54 +02:00
|
|
|
expected_set = {self.email1, self.email2, self.email3}
|
|
|
|
self.assertEqual(get_invitee_emails_set(emails_raw), expected_set)
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_if_emails_in_mixed_style_are_parsed_correctly(self) -> None:
|
2020-06-09 00:25:09 +02:00
|
|
|
emails_raw = f"Email One <{self.email1}>,EmailTwo<{self.email2}>\n{self.email3}"
|
2016-07-29 18:16:54 +02:00
|
|
|
expected_set = {self.email1, self.email2, self.email3}
|
|
|
|
self.assertEqual(get_invitee_emails_set(emails_raw), expected_set)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-08-10 22:34:17 +02:00
|
|
|
class MultiuseInviteTest(ZulipTestCase):
|
2017-11-05 10:51:25 +01:00
|
|
|
def setUp(self) -> None:
|
2019-10-19 20:47:00 +02:00
|
|
|
super().setUp()
|
2021-02-12 08:20:45 +01:00
|
|
|
self.realm = get_realm("zulip")
|
2017-08-10 22:34:17 +02:00
|
|
|
self.realm.invite_required = True
|
|
|
|
self.realm.save()
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
def generate_multiuse_invite_link(
|
|
|
|
self, streams: Optional[List[Stream]] = None, date_sent: Optional[datetime.datetime] = None
|
|
|
|
) -> str:
|
2017-08-10 22:34:17 +02:00
|
|
|
invite = MultiuseInvite(realm=self.realm, referred_by=self.example_user("iago"))
|
|
|
|
invite.save()
|
|
|
|
|
|
|
|
if streams is not None:
|
2018-01-31 08:22:07 +01:00
|
|
|
invite.streams.set(streams)
|
2017-08-10 22:34:17 +02:00
|
|
|
|
|
|
|
if date_sent is None:
|
|
|
|
date_sent = timezone_now()
|
2021-08-02 20:45:55 +02:00
|
|
|
validity_in_days = 2
|
|
|
|
with patch("confirmation.models.timezone_now", return_value=date_sent):
|
2021-07-31 22:08:54 +02:00
|
|
|
return create_confirmation_link(
|
|
|
|
invite, Confirmation.MULTIUSE_INVITE, validity_in_days=validity_in_days
|
|
|
|
)
|
2017-08-10 22:34:17 +02:00
|
|
|
|
2018-05-11 01:39:38 +02:00
|
|
|
def check_user_able_to_register(self, email: str, invite_link: str) -> None:
|
2017-08-10 22:34:17 +02:00
|
|
|
password = "password"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post(invite_link, {"email": email})
|
2017-08-10 22:34:17 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2017-08-10 22:34:17 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user(email, password)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
|
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-08-10 22:34:17 +02:00
|
|
|
outbox.pop()
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_valid_multiuse_link(self) -> None:
|
2017-08-10 22:34:17 +02:00
|
|
|
email1 = self.nonreg_email("test")
|
|
|
|
email2 = self.nonreg_email("test1")
|
|
|
|
email3 = self.nonreg_email("alice")
|
|
|
|
|
2021-08-02 20:45:55 +02:00
|
|
|
validity_in_days = 2
|
|
|
|
date_sent = timezone_now() - datetime.timedelta(days=validity_in_days - 1)
|
2017-08-10 22:34:17 +02:00
|
|
|
invite_link = self.generate_multiuse_invite_link(date_sent=date_sent)
|
|
|
|
|
|
|
|
self.check_user_able_to_register(email1, invite_link)
|
|
|
|
self.check_user_able_to_register(email2, invite_link)
|
|
|
|
self.check_user_able_to_register(email3, invite_link)
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_expired_multiuse_link(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("newuser")
|
2021-09-07 02:54:47 +02:00
|
|
|
date_sent = timezone_now() - datetime.timedelta(
|
|
|
|
days=settings.INVITATION_LINK_VALIDITY_DAYS + 1
|
|
|
|
)
|
2017-08-10 22:34:17 +02:00
|
|
|
invite_link = self.generate_multiuse_invite_link(date_sent=date_sent)
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post(invite_link, {"email": email})
|
2017-08-10 22:34:17 +02:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2017-11-08 23:02:50 +01:00
|
|
|
self.assert_in_response("The confirmation link has expired or been deactivated.", result)
|
2017-08-10 22:34:17 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invalid_multiuse_link(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("newuser")
|
2017-08-10 22:34:17 +02:00
|
|
|
invite_link = "/join/invalid_key/"
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post(invite_link, {"email": email})
|
2017-08-10 22:34:17 +02:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
self.assert_in_response("Whoops. The confirmation link is malformed.", result)
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_invalid_multiuse_link_in_open_realm(self) -> None:
|
2017-08-10 22:34:17 +02:00
|
|
|
self.realm.invite_required = False
|
|
|
|
self.realm.save()
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("newuser")
|
2017-08-10 22:34:17 +02:00
|
|
|
invite_link = "/join/invalid_key/"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.get_realm_from_request", return_value=self.realm):
|
|
|
|
with patch("zerver.views.registration.get_realm", return_value=self.realm):
|
2017-10-02 22:43:43 +02:00
|
|
|
self.check_user_able_to_register(email, invite_link)
|
2017-08-10 22:34:17 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_multiuse_link_with_specified_streams(self) -> None:
|
2017-08-10 22:34:17 +02:00
|
|
|
name1 = "newuser"
|
|
|
|
name2 = "bob"
|
|
|
|
email1 = self.nonreg_email(name1)
|
|
|
|
email2 = self.nonreg_email(name2)
|
|
|
|
|
|
|
|
stream_names = ["Rome", "Scotland", "Venice"]
|
|
|
|
streams = [get_stream(stream_name, self.realm) for stream_name in stream_names]
|
|
|
|
invite_link = self.generate_multiuse_invite_link(streams=streams)
|
|
|
|
self.check_user_able_to_register(email1, invite_link)
|
|
|
|
self.check_user_subscribed_only_to_streams(name1, streams)
|
|
|
|
|
|
|
|
stream_names = ["Rome", "Verona"]
|
|
|
|
streams = [get_stream(stream_name, self.realm) for stream_name in stream_names]
|
|
|
|
invite_link = self.generate_multiuse_invite_link(streams=streams)
|
|
|
|
self.check_user_able_to_register(email2, invite_link)
|
|
|
|
self.check_user_subscribed_only_to_streams(name2, streams)
|
2016-07-29 18:16:54 +02:00
|
|
|
|
2018-03-02 12:27:57 +01:00
|
|
|
def test_create_multiuse_link_api_call(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2018-03-02 12:27:57 +01:00
|
|
|
|
2021-04-05 18:42:45 +02:00
|
|
|
result = self.client_post("/json/invites/multiuse", {"invite_expires_in_days": 2})
|
2018-03-02 12:27:57 +01:00
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
invite_link = result.json()["invite_link"]
|
|
|
|
self.check_user_able_to_register(self.nonreg_email("test"), invite_link)
|
|
|
|
|
|
|
|
def test_create_multiuse_link_with_specified_streams_api_call(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2018-03-02 12:27:57 +01:00
|
|
|
stream_names = ["Rome", "Scotland", "Venice"]
|
|
|
|
streams = [get_stream(stream_name, self.realm) for stream_name in stream_names]
|
|
|
|
stream_ids = [stream.id for stream in streams]
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.client_post(
|
2021-04-05 18:42:45 +02:00
|
|
|
"/json/invites/multiuse",
|
|
|
|
{"stream_ids": orjson.dumps(stream_ids).decode(), "invite_expires_in_days": 2},
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2018-03-02 12:27:57 +01:00
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
invite_link = result.json()["invite_link"]
|
|
|
|
self.check_user_able_to_register(self.nonreg_email("test"), invite_link)
|
|
|
|
self.check_user_subscribed_only_to_streams("test", streams)
|
|
|
|
|
|
|
|
def test_only_admin_can_create_multiuse_link_api_call(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2018-03-02 18:16:08 +01:00
|
|
|
# Only admins should be able to create multiuse invites even if
|
2021-04-03 20:31:48 +02:00
|
|
|
# invite_to_realm_policy is set to Realm.POLICY_MEMBERS_ONLY.
|
|
|
|
self.realm.invite_to_realm_policy = Realm.POLICY_MEMBERS_ONLY
|
2018-03-02 12:27:57 +01:00
|
|
|
self.realm.save()
|
|
|
|
|
2021-04-05 18:42:45 +02:00
|
|
|
result = self.client_post("/json/invites/multiuse", {"invite_expires_in_days": 2})
|
2018-03-02 12:27:57 +01:00
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
invite_link = result.json()["invite_link"]
|
|
|
|
self.check_user_able_to_register(self.nonreg_email("test"), invite_link)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
|
|
|
result = self.client_post("/json/invites/multiuse")
|
2018-03-08 01:47:17 +01:00
|
|
|
self.assert_json_error(result, "Must be an organization administrator")
|
2018-03-02 12:27:57 +01:00
|
|
|
|
2020-06-18 13:03:06 +02:00
|
|
|
def test_multiuse_link_for_inviting_as_owner(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/json/invites/multiuse",
|
2021-04-05 18:42:45 +02:00
|
|
|
{
|
|
|
|
"invite_as": orjson.dumps(PreregistrationUser.INVITE_AS["REALM_OWNER"]).decode(),
|
|
|
|
"invite_expires_in_days": 2,
|
|
|
|
},
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-06-18 13:03:06 +02:00
|
|
|
self.assert_json_error(result, "Must be an organization owner")
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("desdemona")
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/json/invites/multiuse",
|
2021-04-05 18:42:45 +02:00
|
|
|
{
|
|
|
|
"invite_as": orjson.dumps(PreregistrationUser.INVITE_AS["REALM_OWNER"]).decode(),
|
|
|
|
"invite_expires_in_days": 2,
|
|
|
|
},
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-06-18 13:03:06 +02:00
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
invite_link = result.json()["invite_link"]
|
|
|
|
self.check_user_able_to_register(self.nonreg_email("test"), invite_link)
|
|
|
|
|
2018-03-02 12:27:57 +01:00
|
|
|
def test_create_multiuse_link_invalid_stream_api_call(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.client_post(
|
2021-04-05 18:42:45 +02:00
|
|
|
"/json/invites/multiuse",
|
|
|
|
{"stream_ids": orjson.dumps([54321]).decode(), "invite_expires_in_days": 2},
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2018-03-02 12:27:57 +01:00
|
|
|
self.assert_json_error(result, "Invalid stream id 54321. No invites were sent.")
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2016-08-23 02:08:42 +02:00
|
|
|
class EmailUnsubscribeTests(ZulipTestCase):
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_error_unsubscribe(self) -> None:
|
2017-02-26 21:48:38 +01:00
|
|
|
|
2017-11-07 20:29:37 +01:00
|
|
|
# An invalid unsubscribe token "test123" produces an error.
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/unsubscribe/missed_messages/test123")
|
|
|
|
self.assert_in_response("Unknown email unsubscribe request", result)
|
2016-12-01 08:54:21 +01:00
|
|
|
|
2017-02-26 21:48:38 +01:00
|
|
|
# An unknown message type "fake" produces an error.
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.example_user("hamlet")
|
2017-02-26 21:48:38 +01:00
|
|
|
unsubscribe_link = one_click_unsubscribe_link(user_profile, "fake")
|
|
|
|
result = self.client_get(urllib.parse.urlparse(unsubscribe_link).path)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_in_response("Unknown email unsubscribe request", result)
|
2017-02-26 21:48:38 +01:00
|
|
|
|
2021-04-20 23:27:25 +02:00
|
|
|
def test_message_notification_emails_unsubscribe(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
2021-04-20 23:27:25 +02:00
|
|
|
We provide one-click unsubscribe links in message notification emails
|
|
|
|
that you can click even when logged out to update your
|
2014-01-31 21:08:40 +01:00
|
|
|
email notification settings.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.example_user("hamlet")
|
2014-01-31 21:08:40 +01:00
|
|
|
user_profile.enable_offline_email_notifications = True
|
|
|
|
user_profile.save()
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
unsubscribe_link = one_click_unsubscribe_link(user_profile, "missed_messages")
|
2016-07-28 00:38:45 +02:00
|
|
|
result = self.client_get(urllib.parse.urlparse(unsubscribe_link).path)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2017-08-15 21:52:23 +02:00
|
|
|
|
|
|
|
user_profile.refresh_from_db()
|
2014-01-31 21:08:40 +01:00
|
|
|
self.assertFalse(user_profile.enable_offline_email_notifications)
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_welcome_unsubscribe(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
|
|
|
We provide one-click unsubscribe links in welcome e-mails that you can
|
|
|
|
click even when logged out to stop receiving them.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.example_user("hamlet")
|
2014-01-31 21:08:40 +01:00
|
|
|
# Simulate a new user signing up, which enqueues 2 welcome e-mails.
|
2017-09-22 04:29:01 +02:00
|
|
|
enqueue_welcome_emails(user_profile)
|
2019-01-04 01:50:21 +01:00
|
|
|
self.assertEqual(2, ScheduledEmail.objects.filter(users=user_profile).count())
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
# Simulate unsubscribing from the welcome e-mails.
|
|
|
|
unsubscribe_link = one_click_unsubscribe_link(user_profile, "welcome")
|
2016-07-28 00:38:45 +02:00
|
|
|
result = self.client_get(urllib.parse.urlparse(unsubscribe_link).path)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
# The welcome email jobs are no longer scheduled.
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2019-01-04 01:50:21 +01:00
|
|
|
self.assertEqual(0, ScheduledEmail.objects.filter(users=user_profile).count())
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_digest_unsubscribe(self) -> None:
|
2014-01-31 21:08:40 +01:00
|
|
|
"""
|
|
|
|
We provide one-click unsubscribe links in digest e-mails that you can
|
|
|
|
click even when logged out to stop receiving them.
|
|
|
|
|
|
|
|
Unsubscribing from these emails also dequeues any digest email jobs that
|
|
|
|
have been queued.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.example_user("hamlet")
|
2014-01-31 21:08:40 +01:00
|
|
|
self.assertTrue(user_profile.enable_digest_emails)
|
|
|
|
|
|
|
|
# Enqueue a fake digest email.
|
2021-02-12 08:19:30 +01:00
|
|
|
context = {
|
2021-02-12 08:20:45 +01:00
|
|
|
"name": "",
|
|
|
|
"realm_uri": "",
|
|
|
|
"unread_pms": [],
|
|
|
|
"hot_conversations": [],
|
|
|
|
"new_users": [],
|
|
|
|
"new_streams": {"plain": []},
|
|
|
|
"unsubscribe_link": "",
|
2021-02-12 08:19:30 +01:00
|
|
|
}
|
|
|
|
send_future_email(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver/emails/digest",
|
2021-02-12 08:19:30 +01:00
|
|
|
user_profile.realm,
|
|
|
|
to_user_ids=[user_profile.id],
|
|
|
|
context=context,
|
|
|
|
)
|
2017-05-02 02:07:01 +02:00
|
|
|
|
2019-01-04 01:50:21 +01:00
|
|
|
self.assertEqual(1, ScheduledEmail.objects.filter(users=user_profile).count())
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
# Simulate unsubscribing from digest e-mails.
|
|
|
|
unsubscribe_link = one_click_unsubscribe_link(user_profile, "digest")
|
2016-07-28 00:38:45 +02:00
|
|
|
result = self.client_get(urllib.parse.urlparse(unsubscribe_link).path)
|
2014-01-31 21:08:40 +01:00
|
|
|
|
|
|
|
# The setting is toggled off, and scheduled jobs have been removed.
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
# Circumvent user_profile caching.
|
2017-08-15 21:52:23 +02:00
|
|
|
|
|
|
|
user_profile.refresh_from_db()
|
2014-01-31 21:08:40 +01:00
|
|
|
self.assertFalse(user_profile.enable_digest_emails)
|
2019-01-04 01:50:21 +01:00
|
|
|
self.assertEqual(0, ScheduledEmail.objects.filter(users=user_profile).count())
|
2014-01-31 21:08:40 +01:00
|
|
|
|
2018-11-07 16:54:23 +01:00
|
|
|
def test_login_unsubscribe(self) -> None:
|
|
|
|
"""
|
|
|
|
We provide one-click unsubscribe links in login
|
|
|
|
e-mails that you can click even when logged out to update your
|
|
|
|
email notification settings.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.example_user("hamlet")
|
2018-11-07 16:54:23 +01:00
|
|
|
user_profile.enable_login_emails = True
|
|
|
|
user_profile.save()
|
|
|
|
|
|
|
|
unsubscribe_link = one_click_unsubscribe_link(user_profile, "login")
|
|
|
|
result = self.client_get(urllib.parse.urlparse(unsubscribe_link).path)
|
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
user_profile.refresh_from_db()
|
|
|
|
self.assertFalse(user_profile.enable_login_emails)
|
|
|
|
|
2021-04-28 00:25:27 +02:00
|
|
|
def test_marketing_unsubscribe(self) -> None:
|
|
|
|
"""
|
|
|
|
We provide one-click unsubscribe links in marketing e-mails that you can
|
|
|
|
click even when logged out to stop receiving them.
|
|
|
|
"""
|
|
|
|
user_profile = self.example_user("hamlet")
|
|
|
|
self.assertTrue(user_profile.enable_marketing_emails)
|
|
|
|
|
2021-04-29 01:12:28 +02:00
|
|
|
# Simulate unsubscribing from marketing e-mails.
|
2021-04-28 00:25:27 +02:00
|
|
|
unsubscribe_link = one_click_unsubscribe_link(user_profile, "marketing")
|
|
|
|
result = self.client_get(urllib.parse.urlparse(unsubscribe_link).path)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
# Circumvent user_profile caching.
|
|
|
|
user_profile.refresh_from_db()
|
|
|
|
self.assertFalse(user_profile.enable_marketing_emails)
|
|
|
|
|
2021-04-29 00:34:05 +02:00
|
|
|
def test_marketing_unsubscribe_post(self) -> None:
|
|
|
|
"""
|
|
|
|
The List-Unsubscribe-Post header lets email clients trigger an
|
|
|
|
automatic unsubscription request via POST (see RFC 8058), so
|
|
|
|
test that too.
|
|
|
|
"""
|
|
|
|
user_profile = self.example_user("hamlet")
|
|
|
|
self.assertTrue(user_profile.enable_marketing_emails)
|
|
|
|
|
|
|
|
# Simulate unsubscribing from marketing e-mails.
|
|
|
|
unsubscribe_link = one_click_unsubscribe_link(user_profile, "marketing")
|
|
|
|
client = Client(enforce_csrf_checks=True)
|
|
|
|
result = client.post(
|
|
|
|
urllib.parse.urlparse(unsubscribe_link).path, {"List-Unsubscribe": "One-Click"}
|
|
|
|
)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
# Circumvent user_profile caching.
|
|
|
|
user_profile.refresh_from_db()
|
|
|
|
self.assertFalse(user_profile.enable_marketing_emails)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2016-08-23 02:08:42 +02:00
|
|
|
class RealmCreationTest(ZulipTestCase):
|
2017-11-25 00:00:26 +01:00
|
|
|
@override_settings(OPEN_REALM_CREATION=True)
|
2021-02-12 08:19:30 +01:00
|
|
|
def check_able_to_create_realm(self, email: str, password: str = "test") -> None:
|
2021-03-08 11:54:39 +01:00
|
|
|
internal_realm = get_realm(settings.SYSTEM_BOT_REALM)
|
|
|
|
notification_bot = get_system_bot(settings.NOTIFICATION_BOT, internal_realm.id)
|
2021-02-12 08:20:45 +01:00
|
|
|
signups_stream, _ = create_stream_if_needed(notification_bot.realm, "signups")
|
2020-02-10 17:37:57 +01:00
|
|
|
|
2016-10-31 23:28:20 +01:00
|
|
|
string_id = "zuliptest"
|
2016-06-03 01:02:58 +02:00
|
|
|
# Make sure the realm does not exist
|
2019-05-04 04:47:44 +02:00
|
|
|
with self.assertRaises(Realm.DoesNotExist):
|
|
|
|
get_realm(string_id)
|
2016-06-03 01:02:58 +02:00
|
|
|
|
2017-11-25 00:00:26 +01:00
|
|
|
# Create new realm with the email
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/new/", {"email": email})
|
2017-11-25 00:00:26 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/new/send_confirm/{email}"))
|
2017-11-25 00:00:26 +01:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
2016-06-03 01:02:58 +02:00
|
|
|
|
2021-05-26 19:40:12 +02:00
|
|
|
# Check confirmation email has the correct subject and body, extract
|
|
|
|
# confirmation link and visit it
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(
|
|
|
|
email,
|
|
|
|
email_subject_contains="Create your Zulip organization",
|
|
|
|
email_body_contains="You have requested a new Zulip organization",
|
|
|
|
)
|
2017-11-25 00:00:26 +01:00
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user(email, password, realm_subdomain=string_id)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(
|
2021-02-12 08:20:45 +01:00
|
|
|
result["Location"].startswith("http://zuliptest.testserver/accounts/login/subdomain/")
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-11-25 00:00:26 +01:00
|
|
|
|
|
|
|
# Make sure the realm is created
|
|
|
|
realm = get_realm(string_id)
|
|
|
|
self.assertEqual(realm.string_id, string_id)
|
2019-11-07 05:11:51 +01:00
|
|
|
user = get_user(email, realm)
|
|
|
|
self.assertEqual(user.realm, realm)
|
|
|
|
|
2020-05-16 20:50:57 +02:00
|
|
|
# Check that user is the owner.
|
|
|
|
self.assertEqual(user.role, UserProfile.ROLE_REALM_OWNER)
|
2017-11-25 00:00:26 +01:00
|
|
|
|
|
|
|
# Check defaults
|
2021-06-24 20:05:06 +02:00
|
|
|
self.assertEqual(realm.org_type, Realm.ORG_TYPES["business"]["id"])
|
2018-07-27 23:26:29 +02:00
|
|
|
self.assertEqual(realm.emails_restricted_to_domains, False)
|
2017-11-25 00:00:26 +01:00
|
|
|
self.assertEqual(realm.invite_required, True)
|
|
|
|
|
|
|
|
# Check welcome messages
|
|
|
|
for stream_name, text, message_count in [
|
2021-02-12 08:20:45 +01:00
|
|
|
(Realm.DEFAULT_NOTIFICATION_STREAM_NAME, "with the topic", 3),
|
|
|
|
(Realm.INITIAL_PRIVATE_STREAM_NAME, "private stream", 1),
|
2021-02-12 08:19:30 +01:00
|
|
|
]:
|
2017-11-25 00:00:26 +01:00
|
|
|
stream = get_stream(stream_name, realm)
|
2020-02-18 17:25:43 +01:00
|
|
|
recipient = stream.recipient
|
2021-02-12 08:20:45 +01:00
|
|
|
messages = Message.objects.filter(recipient=recipient).order_by("date_sent")
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(messages, message_count)
|
2017-11-25 00:00:26 +01:00
|
|
|
self.assertIn(text, messages[0].content)
|
|
|
|
|
2020-02-10 17:37:57 +01:00
|
|
|
# Check signup messages
|
2020-02-18 17:25:43 +01:00
|
|
|
recipient = signups_stream.recipient
|
2021-02-12 08:20:45 +01:00
|
|
|
messages = Message.objects.filter(recipient=recipient).order_by("id")
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(messages, 2)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertIn("Signups enabled", messages[0].content)
|
|
|
|
self.assertIn("signed up", messages[1].content)
|
|
|
|
self.assertEqual("zuliptest", messages[1].topic_name())
|
2020-02-10 17:37:57 +01:00
|
|
|
|
2021-04-20 12:29:19 +02:00
|
|
|
realm_creation_audit_log = RealmAuditLog.objects.get(
|
|
|
|
realm=realm, event_type=RealmAuditLog.REALM_CREATED
|
|
|
|
)
|
|
|
|
self.assertEqual(realm_creation_audit_log.acting_user, user)
|
|
|
|
self.assertEqual(realm_creation_audit_log.event_time, realm.date_created)
|
|
|
|
|
2020-02-10 17:37:57 +01:00
|
|
|
# Piggyback a little check for how we handle
|
|
|
|
# empty string_ids.
|
2021-02-12 08:20:45 +01:00
|
|
|
realm.string_id = ""
|
|
|
|
self.assertEqual(realm.display_subdomain, ".")
|
2020-02-10 17:37:57 +01:00
|
|
|
|
2017-11-25 00:00:26 +01:00
|
|
|
def test_create_realm_non_existing_email(self) -> None:
|
|
|
|
self.check_able_to_create_realm("user1@test.com")
|
2017-05-08 20:25:03 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_create_realm_existing_email(self) -> None:
|
2017-11-22 20:22:11 +01:00
|
|
|
self.check_able_to_create_realm("hamlet@zulip.com")
|
2017-11-22 20:05:53 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
@override_settings(AUTHENTICATION_BACKENDS=("zproject.backends.ZulipLDAPAuthBackend",))
|
2019-11-07 05:13:08 +01:00
|
|
|
def test_create_realm_ldap_email(self) -> None:
|
|
|
|
self.init_default_ldap_database()
|
|
|
|
|
|
|
|
with self.settings(LDAP_EMAIL_ATTR="mail"):
|
2021-02-12 08:19:30 +01:00
|
|
|
self.check_able_to_create_realm(
|
|
|
|
"newuser_email@zulip.com", self.ldap_password("newuser_with_email")
|
|
|
|
)
|
2019-11-07 05:13:08 +01:00
|
|
|
|
2017-11-22 20:05:53 +01:00
|
|
|
def test_create_realm_as_system_bot(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/new/", {"email": "notification-bot@zulip.com"})
|
2017-11-22 20:05:53 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_in_response("notification-bot@zulip.com is reserved for system bots", result)
|
2017-03-11 20:12:01 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_create_realm_no_creation_key(self) -> None:
|
2017-03-11 20:12:01 +01:00
|
|
|
"""
|
|
|
|
Trying to create a realm without a creation_key should fail when
|
|
|
|
OPEN_REALM_CREATION is false.
|
|
|
|
"""
|
|
|
|
email = "user1@test.com"
|
|
|
|
|
|
|
|
with self.settings(OPEN_REALM_CREATION=False):
|
|
|
|
# Create new realm with the email, but no creation key.
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/new/", {"email": email})
|
2017-03-11 20:12:01 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_in_response("New organization creation disabled", result)
|
2017-03-11 20:12:01 +01:00
|
|
|
|
2017-10-02 22:43:43 +02:00
|
|
|
@override_settings(OPEN_REALM_CREATION=True)
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_create_realm_with_subdomain(self) -> None:
|
2016-07-19 14:35:08 +02:00
|
|
|
password = "test"
|
2016-10-31 23:28:20 +01:00
|
|
|
string_id = "zuliptest"
|
2016-07-19 14:35:08 +02:00
|
|
|
email = "user1@test.com"
|
|
|
|
realm_name = "Test"
|
|
|
|
|
|
|
|
# Make sure the realm does not exist
|
2019-05-04 04:47:44 +02:00
|
|
|
with self.assertRaises(Realm.DoesNotExist):
|
|
|
|
get_realm(string_id)
|
2016-11-04 01:33:46 +01:00
|
|
|
|
2017-10-02 22:43:43 +02:00
|
|
|
# Create new realm with the email
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/new/", {"email": email})
|
2017-10-02 22:43:43 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/new/send_confirm/{email}"))
|
2017-10-02 22:43:43 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
2016-07-19 14:35:08 +02:00
|
|
|
|
2017-10-02 22:43:43 +02:00
|
|
|
# Visit the confirmation link.
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2016-07-19 14:35:08 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email, password, realm_subdomain=string_id, realm_name=realm_name
|
|
|
|
)
|
2017-10-02 22:43:43 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2016-07-19 14:35:08 +02:00
|
|
|
|
2020-05-22 15:42:46 +02:00
|
|
|
result = self.client_get(result.url, subdomain=string_id)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result.url, "http://zuliptest.testserver")
|
2020-05-22 15:42:46 +02:00
|
|
|
|
2017-10-02 22:43:43 +02:00
|
|
|
# Make sure the realm is created
|
|
|
|
realm = get_realm(string_id)
|
|
|
|
self.assertEqual(realm.string_id, string_id)
|
|
|
|
self.assertEqual(get_user(email, realm).realm, realm)
|
2016-10-13 20:09:32 +02:00
|
|
|
|
2017-10-02 22:43:43 +02:00
|
|
|
self.assertEqual(realm.name, realm_name)
|
|
|
|
self.assertEqual(realm.subdomain, string_id)
|
2016-11-04 01:33:46 +01:00
|
|
|
|
2021-08-16 21:03:33 +02:00
|
|
|
@override_settings(OPEN_REALM_CREATION=True)
|
|
|
|
def test_create_realm_with_marketing_emails_enabled(self) -> None:
|
|
|
|
password = "test"
|
|
|
|
string_id = "zuliptest"
|
|
|
|
email = "user1@test.com"
|
|
|
|
realm_name = "Test"
|
|
|
|
|
|
|
|
# Make sure the realm does not exist
|
|
|
|
with self.assertRaises(Realm.DoesNotExist):
|
|
|
|
get_realm(string_id)
|
|
|
|
|
|
|
|
# Create new realm with the email
|
|
|
|
result = self.client_post("/new/", {"email": email})
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/new/send_confirm/{email}"))
|
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
# Visit the confirmation link.
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
realm_subdomain=string_id,
|
|
|
|
realm_name=realm_name,
|
|
|
|
enable_marketing_emails=True,
|
|
|
|
)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
|
|
|
|
result = self.client_get(result.url, subdomain=string_id)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result.url, "http://zuliptest.testserver")
|
|
|
|
|
|
|
|
# Make sure the realm is created
|
|
|
|
realm = get_realm(string_id)
|
|
|
|
self.assertEqual(realm.string_id, string_id)
|
|
|
|
user = get_user(email, realm)
|
|
|
|
self.assertEqual(user.realm, realm)
|
|
|
|
self.assertTrue(user.enable_marketing_emails)
|
|
|
|
|
|
|
|
@override_settings(OPEN_REALM_CREATION=True)
|
|
|
|
def test_create_realm_with_marketing_emails_disabled(self) -> None:
|
|
|
|
password = "test"
|
|
|
|
string_id = "zuliptest"
|
|
|
|
email = "user1@test.com"
|
|
|
|
realm_name = "Test"
|
|
|
|
|
|
|
|
# Make sure the realm does not exist
|
|
|
|
with self.assertRaises(Realm.DoesNotExist):
|
|
|
|
get_realm(string_id)
|
|
|
|
|
|
|
|
# Create new realm with the email
|
|
|
|
result = self.client_post("/new/", {"email": email})
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/new/send_confirm/{email}"))
|
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
# Visit the confirmation link.
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
realm_subdomain=string_id,
|
|
|
|
realm_name=realm_name,
|
|
|
|
enable_marketing_emails=False,
|
|
|
|
)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
|
|
|
|
result = self.client_get(result.url, subdomain=string_id)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result.url, "http://zuliptest.testserver")
|
|
|
|
|
|
|
|
# Make sure the realm is created
|
|
|
|
realm = get_realm(string_id)
|
|
|
|
self.assertEqual(realm.string_id, string_id)
|
|
|
|
user = get_user(email, realm)
|
|
|
|
self.assertEqual(user.realm, realm)
|
|
|
|
self.assertFalse(user.enable_marketing_emails)
|
|
|
|
|
2021-09-09 06:50:40 +02:00
|
|
|
@override_settings(OPEN_REALM_CREATION=True)
|
|
|
|
def test_create_regular_realm_welcome_bot_pm(self) -> None:
|
|
|
|
password = "test"
|
|
|
|
string_id = "zuliptest"
|
|
|
|
email = "user1@test.com"
|
|
|
|
realm_name = "Test"
|
|
|
|
|
|
|
|
# Create new realm with the email
|
|
|
|
result = self.client_post("/new/", {"email": email})
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/new/send_confirm/{email}"))
|
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
# Visit the confirmation link.
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
realm_subdomain=string_id,
|
|
|
|
realm_name=realm_name,
|
|
|
|
enable_marketing_emails=False,
|
|
|
|
)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
|
|
|
|
# Make sure the correct Welcome Bot PM is sent
|
|
|
|
welcome_msg = Message.objects.filter(
|
|
|
|
sender__email="welcome-bot@zulip.com", recipient__type=Recipient.PERSONAL
|
|
|
|
).latest("id")
|
|
|
|
self.assertTrue(welcome_msg.content.startswith("Hello, and welcome to Zulip!"))
|
|
|
|
self.assertNotIn("demo organization", welcome_msg.content)
|
|
|
|
|
|
|
|
@override_settings(OPEN_REALM_CREATION=True)
|
|
|
|
def test_create_demo_realm_welcome_bot_pm(self) -> None:
|
|
|
|
password = "test"
|
|
|
|
string_id = "zuliptest"
|
|
|
|
email = "user1@test.com"
|
|
|
|
realm_name = "Test"
|
|
|
|
|
|
|
|
# Create new realm with the email
|
|
|
|
result = self.client_post("/new/", {"email": email})
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/new/send_confirm/{email}"))
|
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
# Visit the confirmation link.
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
realm_subdomain=string_id,
|
|
|
|
realm_name=realm_name,
|
|
|
|
enable_marketing_emails=False,
|
|
|
|
is_demo_organization=True,
|
|
|
|
)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
|
|
|
|
# Make sure the correct Welcome Bot PM is sent
|
|
|
|
welcome_msg = Message.objects.filter(
|
|
|
|
sender__email="welcome-bot@zulip.com", recipient__type=Recipient.PERSONAL
|
|
|
|
).latest("id")
|
|
|
|
self.assertTrue(welcome_msg.content.startswith("Hello, and welcome to Zulip!"))
|
|
|
|
self.assertIn("demo organization", welcome_msg.content)
|
|
|
|
|
2020-05-22 15:42:46 +02:00
|
|
|
@override_settings(OPEN_REALM_CREATION=True, FREE_TRIAL_DAYS=30)
|
|
|
|
def test_create_realm_during_free_trial(self) -> None:
|
|
|
|
password = "test"
|
|
|
|
string_id = "zuliptest"
|
|
|
|
email = "user1@test.com"
|
|
|
|
realm_name = "Test"
|
|
|
|
|
|
|
|
with self.assertRaises(Realm.DoesNotExist):
|
|
|
|
get_realm(string_id)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/new/", {"email": email})
|
2020-05-22 15:42:46 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/new/send_confirm/{email}"))
|
2020-05-22 15:42:46 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email, password, realm_subdomain=string_id, realm_name=realm_name
|
|
|
|
)
|
2020-05-22 15:42:46 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
|
|
|
|
result = self.client_get(result.url, subdomain=string_id)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result.url, "http://zuliptest.testserver/upgrade/?onboarding=true")
|
2020-05-22 15:42:46 +02:00
|
|
|
|
|
|
|
result = self.client_get(result.url, subdomain=string_id)
|
2020-05-27 02:58:46 +02:00
|
|
|
self.assert_in_success_response(["Not ready to start your trial?"], result)
|
2020-05-22 15:42:46 +02:00
|
|
|
|
|
|
|
realm = get_realm(string_id)
|
|
|
|
self.assertEqual(realm.string_id, string_id)
|
|
|
|
self.assertEqual(get_user(email, realm).realm, realm)
|
|
|
|
|
|
|
|
self.assertEqual(realm.name, realm_name)
|
|
|
|
self.assertEqual(realm.subdomain, string_id)
|
|
|
|
|
2021-02-11 17:52:59 +01:00
|
|
|
@override_settings(OPEN_REALM_CREATION=True)
|
|
|
|
def test_create_two_realms(self) -> None:
|
|
|
|
"""
|
|
|
|
Verify correct behavior and PreregistrationUser handling when using
|
|
|
|
two pre-generated realm creation links to create two different realms.
|
|
|
|
"""
|
|
|
|
password = "test"
|
|
|
|
first_string_id = "zuliptest"
|
|
|
|
second_string_id = "zuliptest2"
|
|
|
|
email = "user1@test.com"
|
|
|
|
first_realm_name = "Test"
|
|
|
|
second_realm_name = "Test"
|
|
|
|
|
|
|
|
# Make sure the realms do not exist
|
|
|
|
with self.assertRaises(Realm.DoesNotExist):
|
|
|
|
get_realm(first_string_id)
|
|
|
|
with self.assertRaises(Realm.DoesNotExist):
|
|
|
|
get_realm(second_string_id)
|
|
|
|
|
|
|
|
# Now we pre-generate two realm creation links
|
|
|
|
result = self.client_post("/new/", {"email": email})
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/new/send_confirm/{email}"))
|
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
first_confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
self.assertEqual(PreregistrationUser.objects.filter(email=email, status=0).count(), 1)
|
|
|
|
|
|
|
|
# Get a second realm creation link.
|
|
|
|
result = self.client_post("/new/", {"email": email})
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/new/send_confirm/{email}"))
|
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
second_confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
|
|
|
|
self.assertNotEqual(first_confirmation_url, second_confirmation_url)
|
|
|
|
self.assertEqual(PreregistrationUser.objects.filter(email=email, status=0).count(), 2)
|
|
|
|
|
|
|
|
# Create and verify the first realm
|
|
|
|
result = self.client_get(first_confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
realm_subdomain=first_string_id,
|
|
|
|
realm_name=first_realm_name,
|
|
|
|
key=first_confirmation_url.split("/")[-1],
|
|
|
|
)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
# Make sure the realm is created
|
|
|
|
realm = get_realm(first_string_id)
|
|
|
|
self.assertEqual(realm.string_id, first_string_id)
|
|
|
|
self.assertEqual(realm.name, first_realm_name)
|
|
|
|
|
|
|
|
# One of the PreregistrationUsers should have been used up:
|
|
|
|
self.assertEqual(PreregistrationUser.objects.filter(email=email, status=0).count(), 1)
|
|
|
|
|
|
|
|
# Create and verify the second realm
|
|
|
|
result = self.client_get(second_confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
realm_subdomain=second_string_id,
|
|
|
|
realm_name=second_realm_name,
|
|
|
|
key=second_confirmation_url.split("/")[-1],
|
|
|
|
)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
# Make sure the realm is created
|
|
|
|
realm = get_realm(second_string_id)
|
|
|
|
self.assertEqual(realm.string_id, second_string_id)
|
|
|
|
self.assertEqual(realm.name, second_realm_name)
|
|
|
|
|
|
|
|
# The remaining PreregistrationUser should have been used up:
|
|
|
|
self.assertEqual(PreregistrationUser.objects.filter(email=email, status=0).count(), 0)
|
|
|
|
|
2017-10-02 22:43:43 +02:00
|
|
|
@override_settings(OPEN_REALM_CREATION=True)
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_mailinator_signup(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/new/", {"email": "hi@mailinator.com"})
|
|
|
|
self.assert_in_response("Please use your real email address.", result)
|
2016-11-05 03:26:30 +01:00
|
|
|
|
2017-10-02 22:43:43 +02:00
|
|
|
@override_settings(OPEN_REALM_CREATION=True)
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_subdomain_restrictions(self) -> None:
|
2016-10-31 23:28:20 +01:00
|
|
|
password = "test"
|
|
|
|
email = "user1@test.com"
|
|
|
|
realm_name = "Test"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/new/", {"email": email})
|
2017-10-02 22:48:13 +02:00
|
|
|
self.client_get(result["Location"])
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
self.client_get(confirmation_url)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
errors = {
|
2021-02-12 08:20:45 +01:00
|
|
|
"id": "length 3 or greater",
|
|
|
|
"-id": "cannot start or end with a",
|
|
|
|
"string-ID": "lowercase letters",
|
|
|
|
"string_id": "lowercase letters",
|
|
|
|
"stream": "unavailable",
|
|
|
|
"streams": "unavailable",
|
|
|
|
"about": "unavailable",
|
|
|
|
"abouts": "unavailable",
|
|
|
|
"zephyr": "unavailable",
|
2021-02-12 08:19:30 +01:00
|
|
|
}
|
2017-10-02 22:48:13 +02:00
|
|
|
for string_id, error_msg in errors.items():
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email, password, realm_subdomain=string_id, realm_name=realm_name
|
|
|
|
)
|
2017-10-02 22:48:13 +02:00
|
|
|
self.assert_in_response(error_msg, result)
|
|
|
|
|
|
|
|
# test valid subdomain
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
2021-02-12 08:20:45 +01:00
|
|
|
email, password, realm_subdomain="a-0", realm_name=realm_name
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-10-02 22:48:13 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertTrue(result.url.startswith("http://a-0.testserver/accounts/login/subdomain/"))
|
2017-10-19 08:30:40 +02:00
|
|
|
|
2020-12-18 20:17:20 +01:00
|
|
|
@override_settings(OPEN_REALM_CREATION=True)
|
|
|
|
def test_create_realm_using_old_subdomain_of_a_realm(self) -> None:
|
|
|
|
realm = get_realm("zulip")
|
2020-12-06 20:04:33 +01:00
|
|
|
do_change_realm_subdomain(realm, "new-name", acting_user=None)
|
2020-12-18 20:17:20 +01:00
|
|
|
|
|
|
|
password = "test"
|
|
|
|
email = "user1@test.com"
|
|
|
|
realm_name = "Test"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/new/", {"email": email})
|
2020-12-18 20:17:20 +01:00
|
|
|
self.client_get(result["Location"])
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
self.client_get(confirmation_url)
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email, password, realm_subdomain="zulip", realm_name=realm_name
|
|
|
|
)
|
2020-12-18 20:17:20 +01:00
|
|
|
self.assert_in_response("Subdomain unavailable. Please choose a different one.", result)
|
|
|
|
|
2017-10-19 08:30:40 +02:00
|
|
|
@override_settings(OPEN_REALM_CREATION=True)
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_subdomain_restrictions_root_domain(self) -> None:
|
2017-10-19 08:30:40 +02:00
|
|
|
password = "test"
|
|
|
|
email = "user1@test.com"
|
|
|
|
realm_name = "Test"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/new/", {"email": email})
|
2017-10-19 08:30:40 +02:00
|
|
|
self.client_get(result["Location"])
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
self.client_get(confirmation_url)
|
|
|
|
|
|
|
|
# test root domain will fail with ROOT_DOMAIN_LANDING_PAGE
|
|
|
|
with self.settings(ROOT_DOMAIN_LANDING_PAGE=True):
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
2021-02-12 08:20:45 +01:00
|
|
|
email, password, realm_subdomain="", realm_name=realm_name
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_in_response("unavailable", result)
|
2017-10-19 08:30:40 +02:00
|
|
|
|
|
|
|
# test valid use of root domain
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
2021-02-12 08:20:45 +01:00
|
|
|
email, password, realm_subdomain="", realm_name=realm_name
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-10-19 08:30:40 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertTrue(result.url.startswith("http://testserver/accounts/login/subdomain/"))
|
2017-10-19 08:30:40 +02:00
|
|
|
|
|
|
|
@override_settings(OPEN_REALM_CREATION=True)
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_subdomain_restrictions_root_domain_option(self) -> None:
|
2017-10-19 08:30:40 +02:00
|
|
|
password = "test"
|
|
|
|
email = "user1@test.com"
|
|
|
|
realm_name = "Test"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/new/", {"email": email})
|
2017-10-19 08:30:40 +02:00
|
|
|
self.client_get(result["Location"])
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
self.client_get(confirmation_url)
|
|
|
|
|
|
|
|
# test root domain will fail with ROOT_DOMAIN_LANDING_PAGE
|
|
|
|
with self.settings(ROOT_DOMAIN_LANDING_PAGE=True):
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
2021-02-12 08:20:45 +01:00
|
|
|
realm_subdomain="abcdef",
|
|
|
|
realm_in_root_domain="true",
|
2021-02-12 08:19:30 +01:00
|
|
|
realm_name=realm_name,
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_in_response("unavailable", result)
|
2017-10-19 08:30:40 +02:00
|
|
|
|
|
|
|
# test valid use of root domain
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
2021-02-12 08:20:45 +01:00
|
|
|
realm_subdomain="abcdef",
|
|
|
|
realm_in_root_domain="true",
|
2021-02-12 08:19:30 +01:00
|
|
|
realm_name=realm_name,
|
|
|
|
)
|
2017-10-19 08:30:40 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertTrue(result.url.startswith("http://testserver/accounts/login/subdomain/"))
|
2016-10-31 23:28:20 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_is_root_domain_available(self) -> None:
|
2017-10-19 07:42:03 +02:00
|
|
|
self.assertTrue(is_root_domain_available())
|
|
|
|
with self.settings(ROOT_DOMAIN_LANDING_PAGE=True):
|
|
|
|
self.assertFalse(is_root_domain_available())
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
realm.string_id = Realm.SUBDOMAIN_FOR_ROOT_DOMAIN
|
|
|
|
realm.save()
|
|
|
|
self.assertFalse(is_root_domain_available())
|
|
|
|
|
2018-01-25 19:08:40 +01:00
|
|
|
def test_subdomain_check_api(self) -> None:
|
|
|
|
result = self.client_get("/json/realm/subdomain/zulip")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_in_success_response(
|
|
|
|
["Subdomain unavailable. Please choose a different one."], result
|
|
|
|
)
|
2018-01-25 19:08:40 +01:00
|
|
|
|
|
|
|
result = self.client_get("/json/realm/subdomain/zu_lip")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_in_success_response(
|
2021-02-12 08:20:45 +01:00
|
|
|
["Subdomain can only have lowercase letters, numbers, and '-'s."], result
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2018-01-25 19:08:40 +01:00
|
|
|
|
2021-08-23 15:14:05 +02:00
|
|
|
with self.settings(SOCIAL_AUTH_SUBDOMAIN="zulipauth"):
|
|
|
|
result = self.client_get("/json/realm/subdomain/zulipauth")
|
|
|
|
self.assert_in_success_response(
|
|
|
|
["Subdomain unavailable. Please choose a different one."], result
|
|
|
|
)
|
|
|
|
|
2018-01-25 19:08:40 +01:00
|
|
|
result = self.client_get("/json/realm/subdomain/hufflepuff")
|
|
|
|
self.assert_in_success_response(["available"], result)
|
|
|
|
self.assert_not_in_success_response(["unavailable"], result)
|
|
|
|
|
2018-04-23 20:02:45 +02:00
|
|
|
def test_subdomain_check_management_command(self) -> None:
|
2020-12-19 18:44:53 +01:00
|
|
|
# Short names should not work, even with the flag
|
2018-04-23 20:02:45 +02:00
|
|
|
with self.assertRaises(ValidationError):
|
2021-02-12 08:20:45 +01:00
|
|
|
check_subdomain_available("aa")
|
2020-12-19 18:44:53 +01:00
|
|
|
with self.assertRaises(ValidationError):
|
2021-02-12 08:20:45 +01:00
|
|
|
check_subdomain_available("aa", allow_reserved_subdomain=True)
|
2020-12-19 18:44:53 +01:00
|
|
|
|
|
|
|
# Malformed names should never work
|
|
|
|
with self.assertRaises(ValidationError):
|
2021-02-12 08:20:45 +01:00
|
|
|
check_subdomain_available("-ba_d-")
|
2020-12-19 18:44:53 +01:00
|
|
|
with self.assertRaises(ValidationError):
|
2021-02-12 08:20:45 +01:00
|
|
|
check_subdomain_available("-ba_d-", allow_reserved_subdomain=True)
|
2020-12-19 18:44:53 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.lib.name_restrictions.is_reserved_subdomain", return_value=False):
|
2020-12-19 18:44:53 +01:00
|
|
|
# Existing realms should never work even if they are not reserved keywords
|
|
|
|
with self.assertRaises(ValidationError):
|
2021-02-12 08:20:45 +01:00
|
|
|
check_subdomain_available("zulip")
|
2020-12-19 18:44:53 +01:00
|
|
|
with self.assertRaises(ValidationError):
|
2021-02-12 08:20:45 +01:00
|
|
|
check_subdomain_available("zulip", allow_reserved_subdomain=True)
|
2020-12-19 18:44:53 +01:00
|
|
|
|
|
|
|
# Reserved ones should only work with the flag
|
|
|
|
with self.assertRaises(ValidationError):
|
2021-02-12 08:20:45 +01:00
|
|
|
check_subdomain_available("stream")
|
|
|
|
check_subdomain_available("stream", allow_reserved_subdomain=True)
|
2018-04-23 20:02:45 +02:00
|
|
|
|
2016-11-04 01:23:43 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
class UserSignUpTest(InviteUserBase):
|
2018-05-11 01:39:38 +02:00
|
|
|
def _assert_redirected_to(self, result: HttpResponse, url: str) -> None:
|
2017-08-17 18:28:21 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result["LOCATION"], url)
|
2017-08-17 18:28:21 +02:00
|
|
|
|
2021-06-23 11:31:36 +02:00
|
|
|
def verify_signup(
|
|
|
|
self,
|
|
|
|
*,
|
|
|
|
email: str = "newguy@zulip.com",
|
2021-06-24 23:54:50 +02:00
|
|
|
password: Optional[str] = "newpassword",
|
2021-06-23 11:31:36 +02:00
|
|
|
full_name: str = "New user's name",
|
|
|
|
realm: Optional[Realm] = None,
|
|
|
|
subdomain: Optional[str] = None,
|
2021-06-24 09:23:39 +02:00
|
|
|
) -> Union[UserProfile, HttpResponse]:
|
2021-06-23 11:31:36 +02:00
|
|
|
"""Common test function for signup tests. It is a goal to use this
|
|
|
|
common function for all signup tests to avoid code duplication; doing
|
|
|
|
so will likely require adding new parameters."""
|
|
|
|
|
2021-06-25 00:24:11 +02:00
|
|
|
if realm is None: # nocoverage
|
2021-06-23 11:31:36 +02:00
|
|
|
realm = get_realm("zulip")
|
|
|
|
|
|
|
|
client_kwargs: Dict[str, Any] = {}
|
|
|
|
if subdomain:
|
|
|
|
client_kwargs["subdomain"] = subdomain
|
|
|
|
|
|
|
|
result = self.client_post("/accounts/home/", {"email": email}, **client_kwargs)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
|
|
|
result = self.client_get(result["Location"], **client_kwargs)
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
# Visit the confirmation link.
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url, **client_kwargs)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
# Pick a password and agree to the ToS. This should create our
|
|
|
|
# account, log us in, and redirect to the app.
|
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email, password, full_name=full_name, **client_kwargs
|
|
|
|
)
|
|
|
|
|
2021-06-24 09:23:39 +02:00
|
|
|
if result.status_code == 200:
|
|
|
|
# This usually indicated an error returned when submitting the form.
|
|
|
|
# Return the result for the caller to deal with reacting to this, since
|
|
|
|
# in many tests this is expected and the caller wants to assert the content
|
|
|
|
# of the error.
|
|
|
|
return result
|
|
|
|
|
2021-06-23 11:31:36 +02:00
|
|
|
# Verify that we were served a redirect to the app.
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-09-13 15:48:33 +02:00
|
|
|
self.assertEqual(result["Location"], f"{realm.uri}/")
|
2021-06-23 11:31:36 +02:00
|
|
|
|
|
|
|
# Verify that we successfully logged in.
|
2021-09-13 15:52:29 +02:00
|
|
|
user_profile = get_user_by_delivery_email(email, realm)
|
2021-06-23 11:31:36 +02:00
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
|
|
|
return user_profile
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_bad_email_configuration_for_accounts_home(self) -> None:
|
2017-08-17 18:28:21 +02:00
|
|
|
"""
|
2021-04-03 12:14:01 +02:00
|
|
|
Make sure we redirect for EmailNotDeliveredException.
|
2017-08-17 18:28:21 +02:00
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("newguy")
|
2017-08-17 18:28:21 +02:00
|
|
|
|
|
|
|
smtp_mock = patch(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver.views.registration.send_confirm_registration_email",
|
2021-04-03 12:14:01 +02:00
|
|
|
side_effect=EmailNotDeliveredException,
|
2017-08-17 18:28:21 +02:00
|
|
|
)
|
|
|
|
|
2020-12-23 21:45:16 +01:00
|
|
|
with smtp_mock, self.assertLogs(level="ERROR") as m:
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email})
|
2017-08-17 18:28:21 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self._assert_redirected_to(result, "/config-error/smtp")
|
2021-04-03 12:14:01 +02:00
|
|
|
self.assertEqual(m.output, ["ERROR:root:Error in accounts_home"])
|
2017-08-17 18:28:21 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_bad_email_configuration_for_create_realm(self) -> None:
|
2017-08-17 19:59:17 +02:00
|
|
|
"""
|
2021-04-03 12:14:01 +02:00
|
|
|
Make sure we redirect for EmailNotDeliveredException.
|
2017-08-17 19:59:17 +02:00
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("newguy")
|
2017-08-17 19:59:17 +02:00
|
|
|
|
|
|
|
smtp_mock = patch(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver.views.registration.send_confirm_registration_email",
|
2021-04-03 12:14:01 +02:00
|
|
|
side_effect=EmailNotDeliveredException,
|
2017-08-17 19:59:17 +02:00
|
|
|
)
|
|
|
|
|
2020-12-23 21:45:16 +01:00
|
|
|
with smtp_mock, self.assertLogs(level="ERROR") as m:
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/new/", {"email": email})
|
2017-08-17 19:59:17 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self._assert_redirected_to(result, "/config-error/smtp")
|
2021-04-03 12:14:01 +02:00
|
|
|
self.assertEqual(m.output, ["ERROR:root:Error in create_realm"])
|
2017-08-17 19:59:17 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_user_default_language_and_timezone(self) -> None:
|
2016-11-04 01:23:43 +01:00
|
|
|
"""
|
|
|
|
Check if the default language of new user is the default language
|
|
|
|
of the realm.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("newguy")
|
2016-11-04 01:23:43 +01:00
|
|
|
password = "newpassword"
|
2017-05-04 15:20:25 +02:00
|
|
|
timezone = "US/Mountain"
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
2021-03-01 11:33:24 +01:00
|
|
|
do_set_realm_property(realm, "default_language", "de", acting_user=None)
|
2016-11-04 01:23:43 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email})
|
2016-12-16 02:01:34 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2016-11-04 01:23:43 +01:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
# Visit the confirmation link.
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
2016-12-16 02:01:34 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2016-11-04 01:23:43 +01:00
|
|
|
|
|
|
|
# Pick a password and agree to the ToS.
|
2017-05-04 15:20:25 +02:00
|
|
|
result = self.submit_reg_form_for_user(email, password, timezone=timezone)
|
2016-12-16 02:01:34 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2016-11-04 01:23:43 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.nonreg_user("newguy")
|
2016-11-04 01:23:43 +01:00
|
|
|
self.assertEqual(user_profile.default_language, realm.default_language)
|
2017-05-04 15:20:25 +02:00
|
|
|
self.assertEqual(user_profile.timezone, timezone)
|
2016-11-04 01:23:43 +01:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2016-11-04 01:23:43 +01:00
|
|
|
outbox.pop()
|
|
|
|
|
2018-03-30 22:38:16 +02:00
|
|
|
def test_default_twenty_four_hour_time(self) -> None:
|
|
|
|
"""
|
|
|
|
Check if the default twenty_four_hour_time setting of new user
|
|
|
|
is the default twenty_four_hour_time of the realm.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("newguy")
|
2018-03-30 22:38:16 +02:00
|
|
|
password = "newpassword"
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
2021-09-17 18:11:37 +02:00
|
|
|
realm_user_default = RealmUserDefault.objects.get(realm=realm)
|
|
|
|
do_set_realm_user_default_setting(
|
|
|
|
realm_user_default, "twenty_four_hour_time", True, acting_user=None
|
|
|
|
)
|
2018-03-30 22:38:16 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email})
|
2018-03-30 22:38:16 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2018-03-30 22:38:16 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
# Visit the confirmation link.
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user(email, password)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.nonreg_user("newguy")
|
2021-09-17 18:11:37 +02:00
|
|
|
realm_user_default = RealmUserDefault.objects.get(realm=realm)
|
|
|
|
self.assertEqual(
|
|
|
|
user_profile.twenty_four_hour_time, realm_user_default.twenty_four_hour_time
|
|
|
|
)
|
2018-03-30 22:38:16 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_signup_already_active(self) -> None:
|
2017-03-11 20:12:01 +01:00
|
|
|
"""
|
|
|
|
Check if signing up with an active email redirects to a login page.
|
|
|
|
"""
|
2017-05-25 01:40:26 +02:00
|
|
|
email = self.example_email("hamlet")
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email})
|
2017-03-11 20:12:01 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertIn("login", result["Location"])
|
2017-08-28 08:13:15 +02:00
|
|
|
result = self.client_get(result.url)
|
|
|
|
self.assert_in_response("You've already registered", result)
|
2017-03-11 20:12:01 +01:00
|
|
|
|
2017-11-28 02:49:50 +01:00
|
|
|
def test_signup_system_bot(self) -> None:
|
|
|
|
email = "notification-bot@zulip.com"
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email}, subdomain="lear")
|
2017-11-28 02:49:50 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertIn("login", result["Location"])
|
2017-11-28 02:49:50 +01:00
|
|
|
result = self.client_get(result.url)
|
|
|
|
|
|
|
|
# This is not really the right error message, but at least it's an error.
|
|
|
|
self.assert_in_response("You've already registered", result)
|
|
|
|
|
2017-11-25 23:26:15 +01:00
|
|
|
def test_signup_existing_email(self) -> None:
|
|
|
|
"""
|
|
|
|
Check if signing up with an email used in another realm succeeds.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.example_email("hamlet")
|
2021-06-23 11:31:36 +02:00
|
|
|
self.verify_signup(email=email, realm=get_realm("lear"), subdomain="lear")
|
2020-03-12 14:17:25 +01:00
|
|
|
self.assertEqual(UserProfile.objects.filter(delivery_email=email).count(), 2)
|
2017-11-25 23:26:15 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_signup_invalid_name(self) -> None:
|
2017-02-08 05:04:14 +01:00
|
|
|
"""
|
2017-03-11 20:10:15 +01:00
|
|
|
Check if an invalid name during signup is handled properly.
|
2017-02-08 05:04:14 +01:00
|
|
|
"""
|
|
|
|
|
2021-06-24 09:23:39 +02:00
|
|
|
result = self.verify_signup(full_name="<invalid>")
|
2017-03-18 22:48:44 +01:00
|
|
|
self.assert_in_success_response(["Invalid characters in name!"], result)
|
2017-02-08 05:04:14 +01:00
|
|
|
|
2017-08-09 22:09:38 +02:00
|
|
|
# Verify that the user is asked for name and password
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_in_success_response(["id_password", "id_full_name"], result)
|
2017-08-09 22:09:38 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_signup_without_password(self) -> None:
|
2017-03-19 01:48:12 +01:00
|
|
|
"""
|
|
|
|
Check if signing up without a password works properly when
|
|
|
|
password_auth_enabled is False.
|
|
|
|
"""
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("newuser")
|
|
|
|
with patch("zerver.views.registration.password_auth_enabled", return_value=False):
|
2021-06-24 10:14:28 +02:00
|
|
|
user_profile = self.verify_signup(email=email, password=None)
|
2017-03-19 01:48:12 +01:00
|
|
|
|
2021-06-24 10:14:28 +02:00
|
|
|
assert isinstance(user_profile, UserProfile)
|
2017-03-19 01:48:12 +01:00
|
|
|
# User should now be logged in.
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
2017-03-19 01:48:12 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_signup_without_full_name(self) -> None:
|
2017-03-18 20:36:40 +01:00
|
|
|
"""
|
|
|
|
Check if signing up without a full name redirects to a registration
|
|
|
|
form.
|
|
|
|
"""
|
|
|
|
email = "newguy@zulip.com"
|
|
|
|
password = "newpassword"
|
2021-06-24 20:00:23 +02:00
|
|
|
result = self.verify_signup(email=email, password=password, full_name="")
|
2018-06-26 00:33:05 +02:00
|
|
|
self.assert_in_success_response(["We just need you to do one last thing."], result)
|
2017-03-18 20:36:40 +01:00
|
|
|
|
2017-08-09 22:09:38 +02:00
|
|
|
# Verify that the user is asked for name and password
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_in_success_response(["id_password", "id_full_name"], result)
|
2017-08-09 22:09:38 +02:00
|
|
|
|
2020-06-14 13:32:38 +02:00
|
|
|
def test_signup_email_message_contains_org_header(self) -> None:
|
|
|
|
email = "newguy@zulip.com"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email})
|
2020-06-14 13:32:38 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2020-06-14 13:32:38 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2020-06-14 13:32:38 +02:00
|
|
|
self.assertEqual(outbox[0].extra_headers["List-Id"], "Zulip Dev <zulip.testserver>")
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_signup_with_full_name(self) -> None:
|
2017-04-20 08:25:15 +02:00
|
|
|
"""
|
|
|
|
Check if signing up without a full name redirects to a registration
|
|
|
|
form.
|
|
|
|
"""
|
|
|
|
email = "newguy@zulip.com"
|
|
|
|
password = "newpassword"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email})
|
2017-04-20 08:25:15 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2017-04-20 08:25:15 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
# Visit the confirmation link.
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/accounts/register/",
|
2021-02-12 08:19:30 +01:00
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"password": password,
|
|
|
|
"key": find_key_by_email(email),
|
|
|
|
"terms": True,
|
|
|
|
"full_name": "New Guy",
|
|
|
|
"from_confirmation": "1",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
)
|
2018-06-26 00:33:05 +02:00
|
|
|
self.assert_in_success_response(["We just need you to do one last thing."], result)
|
2017-04-20 08:25:15 +02:00
|
|
|
|
auth: Use zxcvbn to ensure password strength on server side.
For a long time, we've been only doing the zxcvbn password strength
checks on the browser, which is helpful, but means users could through
hackery (or a bug in the frontend validation code) manage to set a
too-weak password. We fix this by running our password strength
validation on the backend as well, using python-zxcvbn.
In theory, a bug in python-zxcvbn could result in it producing a
different opinion than the frontend version; if so, it'd be a pretty
bad bug in the library, and hopefully we'd hear about it from users,
report upstream, and get it fixed that way. Alternatively, we can
switch to shelling out to node like we do for KaTeX.
Fixes #6880.
2019-11-18 08:11:03 +01:00
|
|
|
def test_signup_with_weak_password(self) -> None:
|
|
|
|
"""
|
|
|
|
Check if signing up without a full name redirects to a registration
|
|
|
|
form.
|
|
|
|
"""
|
|
|
|
email = "newguy@zulip.com"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email})
|
auth: Use zxcvbn to ensure password strength on server side.
For a long time, we've been only doing the zxcvbn password strength
checks on the browser, which is helpful, but means users could through
hackery (or a bug in the frontend validation code) manage to set a
too-weak password. We fix this by running our password strength
validation on the backend as well, using python-zxcvbn.
In theory, a bug in python-zxcvbn could result in it producing a
different opinion than the frontend version; if so, it'd be a pretty
bad bug in the library, and hopefully we'd hear about it from users,
report upstream, and get it fixed that way. Alternatively, we can
switch to shelling out to node like we do for KaTeX.
Fixes #6880.
2019-11-18 08:11:03 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
auth: Use zxcvbn to ensure password strength on server side.
For a long time, we've been only doing the zxcvbn password strength
checks on the browser, which is helpful, but means users could through
hackery (or a bug in the frontend validation code) manage to set a
too-weak password. We fix this by running our password strength
validation on the backend as well, using python-zxcvbn.
In theory, a bug in python-zxcvbn could result in it producing a
different opinion than the frontend version; if so, it'd be a pretty
bad bug in the library, and hopefully we'd hear about it from users,
report upstream, and get it fixed that way. Alternatively, we can
switch to shelling out to node like we do for KaTeX.
Fixes #6880.
2019-11-18 08:11:03 +01:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
# Visit the confirmation link.
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
with self.settings(PASSWORD_MIN_LENGTH=6, PASSWORD_MIN_GUESSES=1000):
|
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/accounts/register/",
|
2021-02-12 08:19:30 +01:00
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"password": "easy",
|
|
|
|
"key": find_key_by_email(email),
|
|
|
|
"terms": True,
|
|
|
|
"full_name": "New Guy",
|
|
|
|
"from_confirmation": "1",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
)
|
auth: Use zxcvbn to ensure password strength on server side.
For a long time, we've been only doing the zxcvbn password strength
checks on the browser, which is helpful, but means users could through
hackery (or a bug in the frontend validation code) manage to set a
too-weak password. We fix this by running our password strength
validation on the backend as well, using python-zxcvbn.
In theory, a bug in python-zxcvbn could result in it producing a
different opinion than the frontend version; if so, it'd be a pretty
bad bug in the library, and hopefully we'd hear about it from users,
report upstream, and get it fixed that way. Alternatively, we can
switch to shelling out to node like we do for KaTeX.
Fixes #6880.
2019-11-18 08:11:03 +01:00
|
|
|
self.assert_in_success_response(["We just need you to do one last thing."], result)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.submit_reg_form_for_user(email, "easy", full_name="New Guy")
|
auth: Use zxcvbn to ensure password strength on server side.
For a long time, we've been only doing the zxcvbn password strength
checks on the browser, which is helpful, but means users could through
hackery (or a bug in the frontend validation code) manage to set a
too-weak password. We fix this by running our password strength
validation on the backend as well, using python-zxcvbn.
In theory, a bug in python-zxcvbn could result in it producing a
different opinion than the frontend version; if so, it'd be a pretty
bad bug in the library, and hopefully we'd hear about it from users,
report upstream, and get it fixed that way. Alternatively, we can
switch to shelling out to node like we do for KaTeX.
Fixes #6880.
2019-11-18 08:11:03 +01:00
|
|
|
self.assert_in_success_response(["The password is too weak."], result)
|
|
|
|
with self.assertRaises(UserProfile.DoesNotExist):
|
|
|
|
# Account wasn't created.
|
|
|
|
get_user(email, get_realm("zulip"))
|
|
|
|
|
2017-11-16 23:00:04 +01:00
|
|
|
def test_signup_with_default_stream_group(self) -> None:
|
|
|
|
# Check if user is subscribed to the streams of default
|
|
|
|
# stream group as well as default streams.
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("newguy")
|
2017-11-16 23:00:04 +01:00
|
|
|
password = "newpassword"
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email})
|
2017-11-16 23:00:04 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
default_streams = []
|
2021-04-29 17:22:48 +02:00
|
|
|
|
|
|
|
existing_default_streams = DefaultStream.objects.filter(realm=realm)
|
|
|
|
self.assert_length(existing_default_streams, 1)
|
|
|
|
self.assertEqual(existing_default_streams[0].stream.name, "Verona")
|
|
|
|
default_streams.append(existing_default_streams[0].stream)
|
|
|
|
|
|
|
|
for stream_name in ["venice", "rome"]:
|
2017-11-16 23:00:04 +01:00
|
|
|
stream = get_stream(stream_name, realm)
|
|
|
|
do_add_default_stream(stream)
|
|
|
|
default_streams.append(stream)
|
|
|
|
|
|
|
|
group1_streams = []
|
|
|
|
for stream_name in ["scotland", "denmark"]:
|
|
|
|
stream = get_stream(stream_name, realm)
|
|
|
|
group1_streams.append(stream)
|
|
|
|
do_create_default_stream_group(realm, "group 1", "group 1 description", group1_streams)
|
|
|
|
|
|
|
|
result = self.submit_reg_form_for_user(email, password, default_stream_groups=["group 1"])
|
|
|
|
self.check_user_subscribed_only_to_streams("newguy", default_streams + group1_streams)
|
|
|
|
|
2019-11-03 23:02:37 +01:00
|
|
|
def test_signup_two_confirmation_links(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("newguy")
|
2019-11-03 23:02:37 +01:00
|
|
|
password = "newpassword"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email})
|
2019-11-03 23:02:37 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
first_confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
first_confirmation_key = find_key_by_email(email)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email})
|
2019-11-03 23:02:37 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
second_confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
|
|
|
|
# Sanity check:
|
|
|
|
self.assertNotEqual(first_confirmation_url, second_confirmation_url)
|
|
|
|
|
|
|
|
# Register the account (this will use the second confirmation url):
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email, password, full_name="New Guy", from_confirmation="1"
|
|
|
|
)
|
|
|
|
self.assert_in_success_response(
|
|
|
|
["We just need you to do one last thing.", "New Guy", email], result
|
|
|
|
)
|
|
|
|
result = self.submit_reg_form_for_user(email, password, full_name="New Guy")
|
2020-03-12 14:17:25 +01:00
|
|
|
user_profile = UserProfile.objects.get(delivery_email=email)
|
|
|
|
self.assertEqual(user_profile.delivery_email, email)
|
2019-11-03 23:02:37 +01:00
|
|
|
|
|
|
|
# Now try to to register using the first confirmation url:
|
|
|
|
result = self.client_get(first_confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/accounts/register/",
|
2021-02-12 08:19:30 +01:00
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"password": password,
|
|
|
|
"key": first_confirmation_key,
|
|
|
|
"terms": True,
|
|
|
|
"full_name": "New Guy",
|
|
|
|
"from_confirmation": "1",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
)
|
2020-05-01 01:52:45 +02:00
|
|
|
# Error page should be displayed
|
2021-05-21 00:10:00 +02:00
|
|
|
self.assertEqual(result.status_code, 404)
|
|
|
|
self.assert_in_response("The registration link has expired or is not valid.", result)
|
2019-11-03 23:02:37 +01:00
|
|
|
|
2017-11-16 23:00:04 +01:00
|
|
|
def test_signup_with_multiple_default_stream_groups(self) -> None:
|
|
|
|
# Check if user is subscribed to the streams of default
|
|
|
|
# stream groups as well as default streams.
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.nonreg_email("newguy")
|
2017-11-16 23:00:04 +01:00
|
|
|
password = "newpassword"
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email})
|
2017-11-16 23:00:04 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2021-04-29 17:22:48 +02:00
|
|
|
DefaultStream.objects.filter(realm=realm).delete()
|
2017-11-16 23:00:04 +01:00
|
|
|
default_streams = []
|
|
|
|
for stream_name in ["venice", "verona"]:
|
|
|
|
stream = get_stream(stream_name, realm)
|
|
|
|
do_add_default_stream(stream)
|
|
|
|
default_streams.append(stream)
|
|
|
|
|
|
|
|
group1_streams = []
|
|
|
|
for stream_name in ["scotland", "denmark"]:
|
|
|
|
stream = get_stream(stream_name, realm)
|
|
|
|
group1_streams.append(stream)
|
|
|
|
do_create_default_stream_group(realm, "group 1", "group 1 description", group1_streams)
|
|
|
|
|
|
|
|
group2_streams = []
|
|
|
|
for stream_name in ["scotland", "rome"]:
|
|
|
|
stream = get_stream(stream_name, realm)
|
|
|
|
group2_streams.append(stream)
|
|
|
|
do_create_default_stream_group(realm, "group 2", "group 2 description", group2_streams)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email, password, default_stream_groups=["group 1", "group 2"]
|
|
|
|
)
|
2017-11-17 07:00:53 +01:00
|
|
|
self.check_user_subscribed_only_to_streams(
|
2021-02-12 08:19:30 +01:00
|
|
|
"newguy", list(set(default_streams + group1_streams + group2_streams))
|
|
|
|
)
|
2017-11-16 23:00:04 +01:00
|
|
|
|
2018-05-22 18:13:51 +02:00
|
|
|
def test_signup_without_user_settings_from_another_realm(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
hamlet_in_zulip = self.example_user("hamlet")
|
2020-03-12 14:17:25 +01:00
|
|
|
email = hamlet_in_zulip.delivery_email
|
2018-05-22 18:13:51 +02:00
|
|
|
password = "newpassword"
|
|
|
|
subdomain = "lear"
|
|
|
|
realm = get_realm("lear")
|
|
|
|
|
|
|
|
# Make an account in the Zulip realm, but we're not copying from there.
|
|
|
|
hamlet_in_zulip.left_side_userlist = True
|
|
|
|
hamlet_in_zulip.default_language = "de"
|
|
|
|
hamlet_in_zulip.emojiset = "twitter"
|
|
|
|
hamlet_in_zulip.high_contrast_mode = True
|
2018-06-13 20:16:51 +02:00
|
|
|
hamlet_in_zulip.enter_sends = True
|
2018-06-13 14:10:53 +02:00
|
|
|
hamlet_in_zulip.tutorial_status = UserProfile.TUTORIAL_FINISHED
|
2018-05-22 18:13:51 +02:00
|
|
|
hamlet_in_zulip.save()
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email}, subdomain=subdomain)
|
2018-05-22 18:13:51 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
result = self.client_get(result["Location"], subdomain=subdomain)
|
|
|
|
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url, subdomain=subdomain)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
2020-12-04 19:45:58 +01:00
|
|
|
email, password, source_realm_id="", HTTP_HOST=subdomain + ".testserver"
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2018-05-22 18:13:51 +02:00
|
|
|
|
|
|
|
hamlet = get_user(self.example_email("hamlet"), realm)
|
|
|
|
self.assertEqual(hamlet.left_side_userlist, False)
|
|
|
|
self.assertEqual(hamlet.default_language, "en")
|
2021-08-27 21:30:55 +02:00
|
|
|
self.assertEqual(hamlet.emojiset, "google")
|
2018-05-22 18:13:51 +02:00
|
|
|
self.assertEqual(hamlet.high_contrast_mode, False)
|
2019-06-11 08:47:49 +02:00
|
|
|
self.assertEqual(hamlet.enable_stream_audible_notifications, False)
|
2018-06-13 20:16:51 +02:00
|
|
|
self.assertEqual(hamlet.enter_sends, False)
|
2018-06-13 14:10:53 +02:00
|
|
|
self.assertEqual(hamlet.tutorial_status, UserProfile.TUTORIAL_WAITING)
|
2018-05-22 18:13:51 +02:00
|
|
|
|
|
|
|
def test_signup_with_user_settings_from_another_realm(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
hamlet_in_zulip = self.example_user("hamlet")
|
2020-03-12 14:17:25 +01:00
|
|
|
email = hamlet_in_zulip.delivery_email
|
2018-05-22 18:13:51 +02:00
|
|
|
password = "newpassword"
|
|
|
|
subdomain = "lear"
|
|
|
|
lear_realm = get_realm("lear")
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("hamlet")
|
|
|
|
with get_test_image_file("img.png") as image_file:
|
|
|
|
self.client_post("/json/users/me/avatar", {"file": image_file})
|
2020-03-12 14:17:25 +01:00
|
|
|
hamlet_in_zulip.refresh_from_db()
|
2018-05-22 18:13:51 +02:00
|
|
|
hamlet_in_zulip.left_side_userlist = True
|
|
|
|
hamlet_in_zulip.default_language = "de"
|
|
|
|
hamlet_in_zulip.emojiset = "twitter"
|
|
|
|
hamlet_in_zulip.high_contrast_mode = True
|
2018-06-13 20:16:51 +02:00
|
|
|
hamlet_in_zulip.enter_sends = True
|
2018-06-13 14:10:53 +02:00
|
|
|
hamlet_in_zulip.tutorial_status = UserProfile.TUTORIAL_FINISHED
|
2018-05-22 18:13:51 +02:00
|
|
|
hamlet_in_zulip.save()
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email}, subdomain=subdomain)
|
2018-05-22 18:13:51 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
result = self.client_get(result["Location"], subdomain=subdomain)
|
|
|
|
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url, subdomain=subdomain)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
2018-12-25 13:45:01 +01:00
|
|
|
|
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/accounts/register/",
|
|
|
|
{"password": password, "key": find_key_by_email(email), "from_confirmation": "1"},
|
2021-02-12 08:19:30 +01:00
|
|
|
subdomain=subdomain,
|
|
|
|
)
|
|
|
|
self.assert_in_success_response(
|
|
|
|
[
|
|
|
|
"Import settings from existing Zulip account",
|
|
|
|
"selected >\n Zulip Dev",
|
|
|
|
"We just need you to do one last thing.",
|
|
|
|
],
|
|
|
|
result,
|
|
|
|
)
|
2018-12-25 13:45:01 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
2020-11-16 19:33:10 +01:00
|
|
|
email,
|
|
|
|
password,
|
2020-12-04 19:45:58 +01:00
|
|
|
source_realm_id=str(hamlet_in_zulip.realm.id),
|
2020-11-16 19:33:10 +01:00
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2018-05-22 18:13:51 +02:00
|
|
|
|
2020-03-12 14:17:25 +01:00
|
|
|
hamlet_in_lear = get_user(email, lear_realm)
|
2018-05-22 18:13:51 +02:00
|
|
|
self.assertEqual(hamlet_in_lear.left_side_userlist, True)
|
|
|
|
self.assertEqual(hamlet_in_lear.default_language, "de")
|
|
|
|
self.assertEqual(hamlet_in_lear.emojiset, "twitter")
|
|
|
|
self.assertEqual(hamlet_in_lear.high_contrast_mode, True)
|
2018-06-13 20:16:51 +02:00
|
|
|
self.assertEqual(hamlet_in_lear.enter_sends, True)
|
2019-06-11 08:47:49 +02:00
|
|
|
self.assertEqual(hamlet_in_lear.enable_stream_audible_notifications, False)
|
2018-06-13 14:10:53 +02:00
|
|
|
self.assertEqual(hamlet_in_lear.tutorial_status, UserProfile.TUTORIAL_FINISHED)
|
2020-03-12 14:17:25 +01:00
|
|
|
|
2018-06-06 14:30:26 +02:00
|
|
|
zulip_path_id = avatar_disk_path(hamlet_in_zulip)
|
2020-03-12 14:17:25 +01:00
|
|
|
lear_path_id = avatar_disk_path(hamlet_in_lear)
|
2021-02-12 08:20:45 +01:00
|
|
|
with open(zulip_path_id, "rb") as f:
|
2020-10-24 09:33:54 +02:00
|
|
|
zulip_avatar_bits = f.read()
|
2021-02-12 08:20:45 +01:00
|
|
|
with open(lear_path_id, "rb") as f:
|
2020-10-24 09:33:54 +02:00
|
|
|
lear_avatar_bits = f.read()
|
2020-03-12 14:17:25 +01:00
|
|
|
|
2021-07-13 19:42:37 +02:00
|
|
|
self.assertGreater(len(zulip_avatar_bits), 500)
|
2020-03-12 14:17:25 +01:00
|
|
|
self.assertEqual(zulip_avatar_bits, lear_avatar_bits)
|
2018-05-22 18:13:51 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_signup_invalid_subdomain(self) -> None:
|
2017-03-19 01:48:12 +01:00
|
|
|
"""
|
|
|
|
Check if attempting to authenticate to the wrong subdomain logs an
|
|
|
|
error and redirects.
|
|
|
|
"""
|
|
|
|
email = "newuser@zulip.com"
|
|
|
|
password = "newpassword"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/home/", {"email": email})
|
2017-03-19 01:48:12 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2017-03-19 01:48:12 +01:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
# Visit the confirmation link.
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def invalid_subdomain(**kwargs: Any) -> Any:
|
2021-02-12 08:20:45 +01:00
|
|
|
return_data = kwargs.get("return_data", {})
|
|
|
|
return_data["invalid_subdomain"] = True
|
2017-03-19 01:48:12 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.authenticate", side_effect=invalid_subdomain):
|
2020-12-23 21:45:16 +01:00
|
|
|
with self.assertLogs(level="ERROR") as m:
|
2017-03-19 01:48:12 +01:00
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/accounts/register/",
|
2021-02-12 08:19:30 +01:00
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"password": password,
|
|
|
|
"full_name": "New User",
|
|
|
|
"key": find_key_by_email(email),
|
|
|
|
"terms": True,
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
)
|
|
|
|
self.assertEqual(
|
|
|
|
m.output,
|
|
|
|
["ERROR:root:Subdomain mismatch in registration zulip: newuser@zulip.com"],
|
|
|
|
)
|
2017-03-19 01:48:12 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
|
2020-11-16 19:33:10 +01:00
|
|
|
def test_signup_using_invalid_subdomain_preserves_state_of_form(self) -> None:
|
|
|
|
"""
|
|
|
|
Check that when we give invalid subdomain and submit the registration form
|
|
|
|
all the values in the form are preserved.
|
|
|
|
"""
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
|
|
|
|
password = "test"
|
|
|
|
email = self.example_email("iago")
|
|
|
|
realm_name = "Test"
|
|
|
|
|
|
|
|
result = self.client_post("/new/", {"email": email})
|
|
|
|
self.client_get(result["Location"])
|
|
|
|
confirmation_url = self.get_confirmation_url_from_outbox(email)
|
|
|
|
self.client_get(confirmation_url)
|
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
2021-04-20 03:21:29 +02:00
|
|
|
# Subdomain is already used, by construction.
|
2020-11-16 19:33:10 +01:00
|
|
|
realm_subdomain=realm.string_id,
|
|
|
|
realm_name=realm_name,
|
2020-12-04 19:45:58 +01:00
|
|
|
source_realm_id=str(realm.id),
|
2020-11-16 19:33:10 +01:00
|
|
|
)
|
|
|
|
self.assert_in_success_response(
|
|
|
|
[
|
|
|
|
"Subdomain unavailable. Please choose a different one.",
|
2021-05-02 20:35:32 +02:00
|
|
|
"Zulip Dev\n",
|
|
|
|
'value="test"',
|
|
|
|
'name="realm_name"',
|
2020-11-16 19:33:10 +01:00
|
|
|
],
|
|
|
|
result,
|
|
|
|
)
|
|
|
|
|
2017-11-08 22:02:59 +01:00
|
|
|
def test_replace_subdomain_in_confirmation_link(self) -> None:
|
|
|
|
"""
|
|
|
|
Check that manually changing the subdomain in a registration
|
|
|
|
confirmation link doesn't allow you to register to a different realm.
|
|
|
|
"""
|
|
|
|
email = "newuser@zulip.com"
|
2021-02-12 08:20:45 +01:00
|
|
|
self.client_post("/accounts/home/", {"email": email})
|
2017-11-08 22:02:59 +01:00
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/accounts/register/",
|
2021-02-12 08:19:30 +01:00
|
|
|
{
|
2021-02-12 08:20:45 +01:00
|
|
|
"password": "password",
|
|
|
|
"key": find_key_by_email(email),
|
|
|
|
"terms": True,
|
|
|
|
"full_name": "New User",
|
|
|
|
"from_confirmation": "1",
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
subdomain="zephyr",
|
|
|
|
)
|
2017-11-08 22:02:59 +01:00
|
|
|
self.assert_in_success_response(["We couldn't find your confirmation link"], result)
|
|
|
|
|
2021-05-28 15:57:08 +02:00
|
|
|
def test_signup_to_realm_on_manual_license_plan(self) -> None:
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
denmark_stream = get_stream("Denmark", realm)
|
|
|
|
realm.signup_notifications_stream = denmark_stream
|
|
|
|
realm.save(update_fields=["signup_notifications_stream"])
|
|
|
|
|
|
|
|
_, ledger = self.subscribe_realm_to_monthly_plan_on_manual_license_management(realm, 5, 5)
|
|
|
|
|
|
|
|
with self.settings(BILLING_ENABLED=True):
|
|
|
|
form = HomepageForm({"email": self.nonreg_email("test")}, realm=realm)
|
|
|
|
self.assertIn(
|
|
|
|
"New members cannot join this organization because all Zulip licenses",
|
|
|
|
form.errors["email"][0],
|
|
|
|
)
|
|
|
|
last_message = Message.objects.last()
|
2021-07-24 16:56:39 +02:00
|
|
|
assert last_message is not None
|
2021-05-28 15:57:08 +02:00
|
|
|
self.assertIn(
|
|
|
|
f"A new member ({self.nonreg_email('test')}) was unable to join your organization because all Zulip",
|
|
|
|
last_message.content,
|
|
|
|
)
|
|
|
|
self.assertEqual(last_message.recipient.type_id, denmark_stream.id)
|
|
|
|
|
|
|
|
ledger.licenses_at_next_renewal = 50
|
|
|
|
ledger.save(update_fields=["licenses_at_next_renewal"])
|
|
|
|
with self.settings(BILLING_ENABLED=True):
|
|
|
|
form = HomepageForm({"email": self.nonreg_email("test")}, realm=realm)
|
|
|
|
self.assertIn(
|
|
|
|
"New members cannot join this organization because all Zulip licenses",
|
|
|
|
form.errors["email"][0],
|
|
|
|
)
|
|
|
|
|
|
|
|
ledger.licenses = 50
|
|
|
|
ledger.save(update_fields=["licenses"])
|
|
|
|
with self.settings(BILLING_ENABLED=True):
|
|
|
|
form = HomepageForm({"email": self.nonreg_email("test")}, realm=realm)
|
|
|
|
self.assertEqual(form.errors, {})
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_failed_signup_due_to_restricted_domain(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
2021-03-01 11:33:24 +01:00
|
|
|
do_set_realm_property(realm, "invite_required", False, acting_user=None)
|
|
|
|
do_set_realm_property(realm, "emails_restricted_to_domains", True, acting_user=None)
|
2017-10-02 22:43:43 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
email = "user@acme.com"
|
|
|
|
form = HomepageForm({"email": email}, realm=realm)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertIn(
|
2021-02-12 08:20:45 +01:00
|
|
|
f"Your email address, {email}, is not in one of the domains", form.errors["email"][0]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2016-11-09 00:47:27 +01:00
|
|
|
|
2018-03-05 20:19:07 +01:00
|
|
|
def test_failed_signup_due_to_disposable_email(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
2018-07-27 23:26:29 +02:00
|
|
|
realm.emails_restricted_to_domains = False
|
2018-03-05 20:19:07 +01:00
|
|
|
realm.disallow_disposable_email_addresses = True
|
|
|
|
realm.save()
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
email = "abc@mailnator.com"
|
|
|
|
form = HomepageForm({"email": email}, realm=realm)
|
|
|
|
self.assertIn("Please use your real email address", form.errors["email"][0])
|
2018-03-05 20:19:07 +01:00
|
|
|
|
2018-06-20 13:08:07 +02:00
|
|
|
def test_failed_signup_due_to_email_containing_plus(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
2018-07-27 23:26:29 +02:00
|
|
|
realm.emails_restricted_to_domains = True
|
2018-06-20 13:08:07 +02:00
|
|
|
realm.save()
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
email = "iago+label@zulip.com"
|
|
|
|
form = HomepageForm({"email": email}, realm=realm)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertIn(
|
|
|
|
"Email addresses containing + are not allowed in this organization.",
|
2021-02-12 08:20:45 +01:00
|
|
|
form.errors["email"][0],
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2018-06-20 13:08:07 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_failed_signup_due_to_invite_required(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
2016-11-09 00:47:27 +01:00
|
|
|
realm.invite_required = True
|
|
|
|
realm.save()
|
2021-02-12 08:20:45 +01:00
|
|
|
email = "user@zulip.com"
|
|
|
|
form = HomepageForm({"email": email}, realm=realm)
|
|
|
|
self.assertIn(f"Please request an invite for {email} from", form.errors["email"][0])
|
2016-11-09 00:47:27 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_failed_signup_due_to_nonexistent_realm(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
email = "user@acme.com"
|
|
|
|
form = HomepageForm({"email": email}, realm=None)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertIn(
|
|
|
|
f"organization you are trying to join using {email} does not exist",
|
2021-02-12 08:20:45 +01:00
|
|
|
form.errors["email"][0],
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2016-11-09 00:47:27 +01:00
|
|
|
|
2017-11-23 02:59:51 +01:00
|
|
|
def test_access_signup_page_in_root_domain_without_realm(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/register", subdomain="", follow=True)
|
2017-11-23 02:59:51 +01:00
|
|
|
self.assert_in_success_response(["Find your Zulip accounts"], result)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.ZulipLDAPAuthBackend",
|
|
|
|
"zproject.backends.ZulipDummyBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_ldap_registration_from_confirmation(self) -> None:
|
2020-02-19 19:40:49 +01:00
|
|
|
password = self.ldap_password("newuser")
|
2016-11-02 11:10:21 +01:00
|
|
|
email = "newuser@zulip.com"
|
|
|
|
subdomain = "zulip"
|
2019-10-16 18:28:55 +02:00
|
|
|
self.init_default_ldap_database()
|
2021-02-12 08:20:45 +01:00
|
|
|
ldap_user_attr_map = {"full_name": "cn"}
|
2016-11-02 11:10:21 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.get_subdomain", return_value=subdomain):
|
|
|
|
result = self.client_post("/register/", {"email": email})
|
2016-11-02 11:10:21 +01:00
|
|
|
|
2016-12-16 02:01:34 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2016-11-02 11:10:21 +01:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
# Visit the confirmation link.
|
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2016-11-02 11:10:21 +01:00
|
|
|
for message in reversed(outbox):
|
|
|
|
if email in message.to:
|
2020-07-05 01:38:05 +02:00
|
|
|
match = re.search(settings.EXTERNAL_HOST + r"(\S+)>", message.body)
|
|
|
|
assert match is not None
|
|
|
|
[confirmation_url] = match.groups()
|
2016-11-02 11:10:21 +01:00
|
|
|
break
|
|
|
|
else:
|
2017-03-05 08:01:50 +01:00
|
|
|
raise AssertionError("Couldn't find a confirmation email.")
|
2016-11-02 11:10:21 +01:00
|
|
|
|
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_APPEND_DOMAIN="zulip.com",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2019-10-16 18:28:55 +02:00
|
|
|
):
|
2016-11-02 11:10:21 +01:00
|
|
|
result = self.client_get(confirmation_url)
|
2016-12-16 02:01:34 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2017-03-19 01:48:12 +01:00
|
|
|
|
2017-09-28 09:41:19 +02:00
|
|
|
# Full name should be set from LDAP
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Ignore",
|
|
|
|
from_confirmation="1",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
|
|
|
|
|
|
|
self.assert_in_success_response(
|
|
|
|
[
|
|
|
|
"We just need you to do one last thing.",
|
|
|
|
"New LDAP fullname",
|
|
|
|
"newuser@zulip.com",
|
|
|
|
],
|
|
|
|
result,
|
|
|
|
)
|
2017-03-19 01:48:12 +01:00
|
|
|
|
2017-08-09 22:09:38 +02:00
|
|
|
# Verify that the user is asked for name
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_in_success_response(["id_full_name"], result)
|
2019-01-16 09:56:17 +01:00
|
|
|
# Verify that user is asked for its LDAP/Active Directory password.
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_in_success_response(
|
2021-02-12 08:20:45 +01:00
|
|
|
["Enter your LDAP/Active Directory password.", "ldap-password"], result
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_not_in_success_response(["id_password"], result)
|
2017-08-09 22:09:38 +02:00
|
|
|
|
2016-11-02 11:10:21 +01:00
|
|
|
# Test the TypeError exception handler
|
2021-02-12 08:19:30 +01:00
|
|
|
with patch(
|
|
|
|
"zproject.backends.ZulipLDAPAuthBackendBase.get_mapped_name", side_effect=TypeError
|
|
|
|
):
|
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
2021-02-12 08:20:45 +01:00
|
|
|
from_confirmation="1",
|
2021-02-12 08:19:30 +01:00
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
|
|
|
self.assert_in_success_response(
|
|
|
|
["We just need you to do one last thing.", "newuser@zulip.com"], result
|
|
|
|
)
|
|
|
|
|
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.EmailAuthBackend",
|
|
|
|
"zproject.backends.ZulipLDAPUserPopulator",
|
|
|
|
"zproject.backends.ZulipDummyBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2019-10-17 23:29:30 +02:00
|
|
|
def test_ldap_populate_only_registration_from_confirmation(self) -> None:
|
2020-02-19 19:40:49 +01:00
|
|
|
password = self.ldap_password("newuser")
|
2019-10-17 23:29:30 +02:00
|
|
|
email = "newuser@zulip.com"
|
|
|
|
subdomain = "zulip"
|
2019-10-16 18:28:55 +02:00
|
|
|
self.init_default_ldap_database()
|
2021-02-12 08:20:45 +01:00
|
|
|
ldap_user_attr_map = {"full_name": "cn"}
|
2019-10-17 23:29:30 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.get_subdomain", return_value=subdomain):
|
|
|
|
result = self.client_post("/register/", {"email": email})
|
2019-10-17 23:29:30 +02:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2019-10-17 23:29:30 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
# Visit the confirmation link.
|
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2019-10-17 23:29:30 +02:00
|
|
|
for message in reversed(outbox):
|
|
|
|
if email in message.to:
|
2020-07-05 01:38:05 +02:00
|
|
|
match = re.search(settings.EXTERNAL_HOST + r"(\S+)>", message.body)
|
|
|
|
assert match is not None
|
|
|
|
[confirmation_url] = match.groups()
|
2019-10-17 23:29:30 +02:00
|
|
|
break
|
|
|
|
else:
|
|
|
|
raise AssertionError("Couldn't find a confirmation email.")
|
|
|
|
|
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_APPEND_DOMAIN="zulip.com",
|
|
|
|
AUTH_LDAP_BIND_PASSWORD="",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2021-02-12 08:20:45 +01:00
|
|
|
AUTH_LDAP_USER_DN_TEMPLATE="uid=%(user)s,ou=users,dc=zulip,dc=com",
|
2021-02-12 08:19:30 +01:00
|
|
|
):
|
2019-10-17 23:29:30 +02:00
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
|
|
|
# Full name should be set from LDAP
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Ignore",
|
|
|
|
from_confirmation="1",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
|
|
|
|
|
|
|
self.assert_in_success_response(
|
|
|
|
[
|
|
|
|
"We just need you to do one last thing.",
|
|
|
|
"New LDAP fullname",
|
|
|
|
"newuser@zulip.com",
|
|
|
|
],
|
|
|
|
result,
|
|
|
|
)
|
2019-10-17 23:29:30 +02:00
|
|
|
|
|
|
|
# Verify that the user is asked for name
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_in_success_response(["id_full_name"], result)
|
2019-10-17 23:29:30 +02:00
|
|
|
# Verify that user is NOT asked for its LDAP/Active Directory password.
|
|
|
|
# LDAP is not configured for authentication in this test.
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_not_in_success_response(
|
2021-02-12 08:20:45 +01:00
|
|
|
["Enter your LDAP/Active Directory password.", "ldap-password"], result
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2019-10-17 23:29:30 +02:00
|
|
|
# If we were using e.g. the SAML auth backend, there
|
|
|
|
# shouldn't be a password prompt, but since it uses the
|
|
|
|
# EmailAuthBackend, there should be password field here.
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_in_success_response(["id_password"], result)
|
2019-10-17 23:29:30 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.ZulipLDAPAuthBackend",
|
|
|
|
"zproject.backends.ZulipDummyBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_ldap_registration_end_to_end(self) -> None:
|
2020-02-19 19:40:49 +01:00
|
|
|
password = self.ldap_password("newuser")
|
2017-09-29 08:43:18 +02:00
|
|
|
email = "newuser@zulip.com"
|
|
|
|
subdomain = "zulip"
|
|
|
|
|
2019-10-16 18:28:55 +02:00
|
|
|
self.init_default_ldap_database()
|
2021-02-12 08:20:45 +01:00
|
|
|
ldap_user_attr_map = {"full_name": "cn"}
|
|
|
|
full_name = "New LDAP fullname"
|
2017-09-29 08:43:18 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.get_subdomain", return_value=subdomain):
|
|
|
|
result = self.client_post("/register/", {"email": email})
|
2017-09-29 08:43:18 +02:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2017-09-29 08:43:18 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_APPEND_DOMAIN="zulip.com",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2019-10-16 18:28:55 +02:00
|
|
|
):
|
2017-09-29 08:43:18 +02:00
|
|
|
# Click confirmation link
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Ignore",
|
|
|
|
from_confirmation="1",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2017-09-29 08:43:18 +02:00
|
|
|
|
|
|
|
# Full name should be set from LDAP
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_in_success_response(
|
|
|
|
["We just need you to do one last thing.", full_name, "newuser@zulip.com"], result
|
|
|
|
)
|
2017-09-29 08:43:18 +02:00
|
|
|
|
2017-10-24 19:38:31 +02:00
|
|
|
# Submit the final form with the wrong password.
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
2021-02-12 08:20:45 +01:00
|
|
|
"wrongpassword",
|
2021-02-12 08:19:30 +01:00
|
|
|
full_name=full_name,
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2017-10-24 19:38:31 +02:00
|
|
|
# Didn't create an account
|
|
|
|
with self.assertRaises(UserProfile.DoesNotExist):
|
2020-03-12 14:17:25 +01:00
|
|
|
user_profile = UserProfile.objects.get(delivery_email=email)
|
2017-10-24 19:38:31 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result.url, "/accounts/login/?email=newuser%40zulip.com")
|
|
|
|
|
2019-01-16 09:08:52 +01:00
|
|
|
# Submit the final form with the correct password.
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name=full_name,
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2020-03-12 14:17:25 +01:00
|
|
|
user_profile = UserProfile.objects.get(delivery_email=email)
|
2017-10-23 21:12:59 +02:00
|
|
|
# Name comes from form which was set by LDAP.
|
|
|
|
self.assertEqual(user_profile.full_name, full_name)
|
2019-01-16 09:08:52 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.ZulipLDAPAuthBackend",
|
|
|
|
"zproject.backends.ZulipDummyBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2019-01-16 09:08:52 +01:00
|
|
|
def test_ldap_split_full_name_mapping(self) -> None:
|
2019-10-16 18:28:55 +02:00
|
|
|
self.init_default_ldap_database()
|
2021-02-12 08:20:45 +01:00
|
|
|
ldap_user_attr_map = {"first_name": "sn", "last_name": "cn"}
|
2019-01-16 09:08:52 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
subdomain = "zulip"
|
|
|
|
email = "newuser_splitname@zulip.com"
|
2020-02-19 19:40:49 +01:00
|
|
|
password = self.ldap_password("newuser_splitname")
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.get_subdomain", return_value=subdomain):
|
|
|
|
result = self.client_post("/register/", {"email": email})
|
2019-01-16 09:08:52 +01:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2019-01-16 09:08:52 +01:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_APPEND_DOMAIN="zulip.com",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2019-10-16 18:28:55 +02:00
|
|
|
):
|
2019-01-16 09:08:52 +01:00
|
|
|
# Click confirmation link
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Ignore",
|
|
|
|
from_confirmation="1",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2019-01-16 09:08:52 +01:00
|
|
|
|
|
|
|
# Test split name mapping.
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Ignore",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2020-03-12 14:17:25 +01:00
|
|
|
user_profile = UserProfile.objects.get(delivery_email=email)
|
2019-01-16 09:08:52 +01:00
|
|
|
# Name comes from form which was set by LDAP.
|
|
|
|
self.assertEqual(user_profile.full_name, "First Last")
|
2017-09-29 08:43:18 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.ZulipLDAPAuthBackend",
|
|
|
|
"zproject.backends.ZulipDummyBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_ldap_auto_registration_on_login(self) -> None:
|
2017-10-23 20:42:37 +02:00
|
|
|
"""The most common way for LDAP authentication to be used is with a
|
|
|
|
server that doesn't have a terms-of-service required, in which
|
|
|
|
case we offer a complete single-sign-on experience (where the
|
|
|
|
user just enters their LDAP username and password, and their
|
|
|
|
account is created if it doesn't already exist).
|
|
|
|
|
|
|
|
This test verifies that flow.
|
|
|
|
"""
|
2020-02-19 19:40:49 +01:00
|
|
|
password = self.ldap_password("newuser")
|
2017-10-23 20:42:37 +02:00
|
|
|
email = "newuser@zulip.com"
|
|
|
|
subdomain = "zulip"
|
|
|
|
|
2019-10-16 18:28:55 +02:00
|
|
|
self.init_default_ldap_database()
|
2019-01-29 13:39:21 +01:00
|
|
|
ldap_user_attr_map = {
|
2021-02-12 08:20:45 +01:00
|
|
|
"full_name": "cn",
|
|
|
|
"custom_profile_field__phone_number": "homePhone",
|
2019-01-29 13:39:21 +01:00
|
|
|
}
|
2021-02-12 08:20:45 +01:00
|
|
|
full_name = "New LDAP fullname"
|
2017-10-23 20:42:37 +02:00
|
|
|
|
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_APPEND_DOMAIN="zulip.com",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2019-10-16 18:28:55 +02:00
|
|
|
):
|
2021-02-12 08:19:30 +01:00
|
|
|
self.login_with_return(email, password, HTTP_HOST=subdomain + ".testserver")
|
2017-10-23 20:42:37 +02:00
|
|
|
|
2020-03-12 14:17:25 +01:00
|
|
|
user_profile = UserProfile.objects.get(delivery_email=email)
|
2017-10-23 20:42:37 +02:00
|
|
|
# Name comes from form which was set by LDAP.
|
|
|
|
self.assertEqual(user_profile.full_name, full_name)
|
2019-01-29 13:39:21 +01:00
|
|
|
|
|
|
|
# Test custom profile fields are properly synced.
|
2021-02-12 08:19:30 +01:00
|
|
|
phone_number_field = CustomProfileField.objects.get(
|
2021-02-12 08:20:45 +01:00
|
|
|
realm=user_profile.realm, name="Phone number"
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
phone_number_field_value = CustomProfileFieldValue.objects.get(
|
|
|
|
user_profile=user_profile, field=phone_number_field
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(phone_number_field_value.value, "a-new-number")
|
2017-10-23 20:42:37 +02:00
|
|
|
|
2021-06-09 15:39:18 +02:00
|
|
|
@override_settings(AUTHENTICATION_BACKENDS=("zproject.backends.ZulipLDAPAuthBackend",))
|
|
|
|
def test_ldap_auto_registration_on_login_invalid_email_in_directory(self) -> None:
|
|
|
|
password = self.ldap_password("newuser_with_email")
|
|
|
|
username = "newuser_with_email"
|
|
|
|
subdomain = "zulip"
|
|
|
|
|
|
|
|
self.init_default_ldap_database()
|
|
|
|
|
|
|
|
self.change_ldap_user_attr("newuser_with_email", "mail", "thisisnotavalidemail")
|
|
|
|
|
|
|
|
with self.settings(
|
|
|
|
LDAP_EMAIL_ATTR="mail",
|
|
|
|
), self.assertLogs("zulip.auth.ldap", "WARNING") as mock_log:
|
|
|
|
original_user_count = UserProfile.objects.count()
|
|
|
|
self.login_with_return(username, password, HTTP_HOST=subdomain + ".testserver")
|
|
|
|
# Verify that the process failed as intended - no UserProfile is created.
|
|
|
|
self.assertEqual(UserProfile.objects.count(), original_user_count)
|
|
|
|
self.assertEqual(
|
|
|
|
mock_log.output,
|
|
|
|
["WARNING:zulip.auth.ldap:thisisnotavalidemail is not a valid email address."],
|
|
|
|
)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
@override_settings(AUTHENTICATION_BACKENDS=("zproject.backends.ZulipLDAPAuthBackend",))
|
2019-03-04 13:16:00 +01:00
|
|
|
def test_ldap_registration_multiple_realms(self) -> None:
|
2020-02-19 19:40:49 +01:00
|
|
|
password = self.ldap_password("newuser")
|
2019-03-04 13:16:00 +01:00
|
|
|
email = "newuser@zulip.com"
|
|
|
|
|
2019-10-16 18:28:55 +02:00
|
|
|
self.init_default_ldap_database()
|
2019-03-04 13:16:00 +01:00
|
|
|
ldap_user_attr_map = {
|
2021-02-12 08:20:45 +01:00
|
|
|
"full_name": "cn",
|
2019-03-04 13:16:00 +01:00
|
|
|
}
|
2021-03-10 20:54:27 +01:00
|
|
|
do_create_realm("test", "test", emails_restricted_to_domains=False)
|
2019-03-04 13:16:00 +01:00
|
|
|
|
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_APPEND_DOMAIN="zulip.com",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2019-10-16 18:28:55 +02:00
|
|
|
):
|
2019-03-04 13:16:00 +01:00
|
|
|
subdomain = "zulip"
|
2021-02-12 08:19:30 +01:00
|
|
|
self.login_with_return(email, password, HTTP_HOST=subdomain + ".testserver")
|
2019-03-04 13:16:00 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = UserProfile.objects.get(delivery_email=email, realm=get_realm("zulip"))
|
2019-03-04 13:16:00 +01:00
|
|
|
self.logout()
|
|
|
|
|
|
|
|
# Test registration in another realm works.
|
|
|
|
subdomain = "test"
|
2021-02-12 08:19:30 +01:00
|
|
|
self.login_with_return(email, password, HTTP_HOST=subdomain + ".testserver")
|
2019-03-04 13:16:00 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = UserProfile.objects.get(delivery_email=email, realm=get_realm("test"))
|
2020-03-12 14:17:25 +01:00
|
|
|
self.assertEqual(user_profile.delivery_email, email)
|
2019-03-04 13:16:00 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.ZulipLDAPAuthBackend",
|
|
|
|
"zproject.backends.ZulipDummyBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_ldap_registration_when_names_changes_are_disabled(self) -> None:
|
2020-02-19 19:40:49 +01:00
|
|
|
password = self.ldap_password("newuser")
|
2017-09-29 08:43:18 +02:00
|
|
|
email = "newuser@zulip.com"
|
|
|
|
subdomain = "zulip"
|
|
|
|
|
2019-10-16 18:28:55 +02:00
|
|
|
self.init_default_ldap_database()
|
2021-02-12 08:20:45 +01:00
|
|
|
ldap_user_attr_map = {"full_name": "cn"}
|
2017-09-29 08:43:18 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.get_subdomain", return_value=subdomain):
|
|
|
|
result = self.client_post("/register/", {"email": email})
|
2017-09-29 08:43:18 +02:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2017-09-29 08:43:18 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_APPEND_DOMAIN="zulip.com",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2019-10-16 18:28:55 +02:00
|
|
|
):
|
2017-09-29 08:43:18 +02:00
|
|
|
# Click confirmation link. This will 'authenticated_full_name'
|
|
|
|
# session variable which will be used to set the fullname of
|
|
|
|
# the user.
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Ignore",
|
|
|
|
from_confirmation="1",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2017-09-29 08:43:18 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.name_changes_disabled", return_value=True):
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2020-03-12 14:17:25 +01:00
|
|
|
user_profile = UserProfile.objects.get(delivery_email=email)
|
2017-09-29 08:43:18 +02:00
|
|
|
# Name comes from LDAP session.
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(user_profile.full_name, "New LDAP fullname")
|
2017-09-29 08:43:18 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.ZulipLDAPAuthBackend",
|
|
|
|
"zproject.backends.EmailAuthBackend",
|
|
|
|
"zproject.backends.ZulipDummyBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2019-10-25 02:26:05 +02:00
|
|
|
def test_signup_with_ldap_and_email_enabled_using_email_with_ldap_append_domain(self) -> None:
|
2019-10-16 18:28:55 +02:00
|
|
|
password = "nonldappassword"
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
email = "newuser@zulip.com"
|
|
|
|
subdomain = "zulip"
|
|
|
|
|
2019-10-16 18:28:55 +02:00
|
|
|
self.init_default_ldap_database()
|
2021-02-12 08:20:45 +01:00
|
|
|
ldap_user_attr_map = {"full_name": "cn"}
|
2019-01-16 14:09:30 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.get_subdomain", return_value=subdomain):
|
|
|
|
result = self.client_post("/register/", {"email": email})
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
2019-10-25 02:26:05 +02:00
|
|
|
# If the user's email is inside the LDAP directory and we just
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
# have a wrong password, then we refuse to create an account
|
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_APPEND_DOMAIN="zulip.com",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2019-10-16 18:28:55 +02:00
|
|
|
):
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
from_confirmation="1",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
2021-02-12 08:19:30 +01:00
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Non-LDAP Full Name",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
# We get redirected back to the login page because password was wrong
|
|
|
|
self.assertEqual(result.url, "/accounts/login/?email=newuser%40zulip.com")
|
2020-03-12 14:17:25 +01:00
|
|
|
self.assertFalse(UserProfile.objects.filter(delivery_email=email).exists())
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
|
2019-11-23 18:17:41 +01:00
|
|
|
# For the rest of the test we delete the user from ldap.
|
|
|
|
del self.mock_ldap.directory["uid=newuser,ou=users,dc=zulip,dc=com"]
|
|
|
|
|
|
|
|
# If the user's email is not in the LDAP directory, but fits LDAP_APPEND_DOMAIN,
|
|
|
|
# we refuse to create the account.
|
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_APPEND_DOMAIN="zulip.com",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2021-02-12 08:20:45 +01:00
|
|
|
), self.assertLogs("zulip.ldap", "DEBUG") as debug_log:
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Non-LDAP Full Name",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2019-11-23 18:17:41 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
# We get redirected back to the login page because emails matching LDAP_APPEND_DOMAIN,
|
2020-10-23 02:43:28 +02:00
|
|
|
# aren't allowed to create non-LDAP accounts.
|
2019-11-23 18:17:41 +01:00
|
|
|
self.assertEqual(result.url, "/accounts/login/?email=newuser%40zulip.com")
|
2020-03-12 14:17:25 +01:00
|
|
|
self.assertFalse(UserProfile.objects.filter(delivery_email=email).exists())
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
debug_log.output,
|
|
|
|
[
|
2021-02-12 08:20:45 +01:00
|
|
|
"DEBUG:zulip.ldap:ZulipLDAPAuthBackend: No LDAP user matching django_to_ldap_username result: newuser. Input username: newuser@zulip.com"
|
2021-02-12 08:19:30 +01:00
|
|
|
],
|
|
|
|
)
|
2019-11-23 18:17:41 +01:00
|
|
|
|
2020-10-23 02:43:28 +02:00
|
|
|
# If the email is outside of LDAP_APPEND_DOMAIN, we successfully create a non-LDAP account,
|
|
|
|
# with the password managed in the Zulip database.
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_APPEND_DOMAIN="example.com",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2019-10-16 18:28:55 +02:00
|
|
|
):
|
2020-12-23 21:45:16 +01:00
|
|
|
with self.assertLogs(level="WARNING") as m:
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
from_confirmation="1",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
2021-02-12 08:19:30 +01:00
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2020-12-23 21:45:16 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
m.output,
|
2021-02-12 08:20:45 +01:00
|
|
|
["WARNING:root:New account email newuser@zulip.com could not be found in LDAP"],
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
with self.assertLogs("zulip.ldap", "DEBUG") as debug_log:
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Non-LDAP Full Name",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
|
|
|
self.assertEqual(
|
|
|
|
debug_log.output,
|
|
|
|
[
|
2021-02-12 08:20:45 +01:00
|
|
|
"DEBUG:zulip.ldap:ZulipLDAPAuthBackend: Email newuser@zulip.com does not match LDAP domain example.com."
|
2021-02-12 08:19:30 +01:00
|
|
|
],
|
|
|
|
)
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result.url, "http://zulip.testserver/")
|
2020-03-12 14:17:25 +01:00
|
|
|
user_profile = UserProfile.objects.get(delivery_email=email)
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
# Name comes from the POST request, not LDAP
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(user_profile.full_name, "Non-LDAP Full Name")
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.ZulipLDAPAuthBackend",
|
|
|
|
"zproject.backends.EmailAuthBackend",
|
|
|
|
"zproject.backends.ZulipDummyBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2019-10-25 02:26:05 +02:00
|
|
|
def test_signup_with_ldap_and_email_enabled_using_email_with_ldap_email_search(self) -> None:
|
|
|
|
# If the user's email is inside the LDAP directory and we just
|
|
|
|
# have a wrong password, then we refuse to create an account
|
|
|
|
password = "nonldappassword"
|
|
|
|
email = "newuser_email@zulip.com" # belongs to user uid=newuser_with_email in the test directory
|
|
|
|
subdomain = "zulip"
|
|
|
|
|
|
|
|
self.init_default_ldap_database()
|
2021-02-12 08:20:45 +01:00
|
|
|
ldap_user_attr_map = {"full_name": "cn"}
|
2019-10-25 02:26:05 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.get_subdomain", return_value=subdomain):
|
|
|
|
result = self.client_post("/register/", {"email": email})
|
2019-10-25 02:26:05 +02:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2019-10-25 02:26:05 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_EMAIL_ATTR="mail",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2019-10-25 02:26:05 +02:00
|
|
|
):
|
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
from_confirmation="1",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
2021-02-12 08:19:30 +01:00
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2019-10-25 02:26:05 +02:00
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Non-LDAP Full Name",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2019-10-25 02:26:05 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
# We get redirected back to the login page because password was wrong
|
|
|
|
self.assertEqual(result.url, "/accounts/login/?email=newuser_email%40zulip.com")
|
2020-03-12 14:17:25 +01:00
|
|
|
self.assertFalse(UserProfile.objects.filter(delivery_email=email).exists())
|
2019-10-25 02:26:05 +02:00
|
|
|
|
|
|
|
# If the user's email is not in the LDAP directory , though, we
|
|
|
|
# successfully create an account with a password in the Zulip
|
|
|
|
# database.
|
|
|
|
password = "nonldappassword"
|
|
|
|
email = "nonexistent@zulip.com"
|
|
|
|
subdomain = "zulip"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.get_subdomain", return_value=subdomain):
|
|
|
|
result = self.client_post("/register/", {"email": email})
|
2019-10-25 02:26:05 +02:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2019-10-25 02:26:05 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_EMAIL_ATTR="mail",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2019-10-25 02:26:05 +02:00
|
|
|
):
|
2020-12-23 21:45:16 +01:00
|
|
|
with self.assertLogs(level="WARNING") as m:
|
2019-10-25 02:26:05 +02:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
from_confirmation="1",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
2021-02-12 08:19:30 +01:00
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2019-10-25 02:26:05 +02:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
m.output,
|
|
|
|
[
|
2021-02-12 08:20:45 +01:00
|
|
|
"WARNING:root:New account email nonexistent@zulip.com could not be found in LDAP"
|
2021-02-12 08:19:30 +01:00
|
|
|
],
|
|
|
|
)
|
2019-10-25 02:26:05 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with self.assertLogs("zulip.ldap", "DEBUG") as debug_log:
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Non-LDAP Full Name",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
|
|
|
self.assertEqual(
|
|
|
|
debug_log.output,
|
|
|
|
[
|
2021-02-12 08:20:45 +01:00
|
|
|
"DEBUG:zulip.ldap:ZulipLDAPAuthBackend: No LDAP user matching django_to_ldap_username result: nonexistent@zulip.com. Input username: nonexistent@zulip.com"
|
2021-02-12 08:19:30 +01:00
|
|
|
],
|
|
|
|
)
|
2019-10-25 02:26:05 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result.url, "http://zulip.testserver/")
|
2020-03-12 14:17:25 +01:00
|
|
|
user_profile = UserProfile.objects.get(delivery_email=email)
|
2019-10-25 02:26:05 +02:00
|
|
|
# Name comes from the POST request, not LDAP
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(user_profile.full_name, "Non-LDAP Full Name")
|
2019-10-25 02:26:05 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
def ldap_invite_and_signup_as(
|
2021-02-12 08:20:45 +01:00
|
|
|
self, invite_as: int, streams: Sequence[str] = ["Denmark"]
|
2021-02-12 08:19:30 +01:00
|
|
|
) -> None:
|
2019-10-16 18:28:55 +02:00
|
|
|
self.init_default_ldap_database()
|
2021-02-12 08:20:45 +01:00
|
|
|
ldap_user_attr_map = {"full_name": "cn"}
|
2019-01-16 09:59:01 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
subdomain = "zulip"
|
|
|
|
email = "newuser@zulip.com"
|
2020-02-19 19:40:49 +01:00
|
|
|
password = self.ldap_password("newuser")
|
2019-01-16 09:59:01 +01:00
|
|
|
|
|
|
|
with self.settings(
|
2021-02-12 08:19:30 +01:00
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_APPEND_DOMAIN="zulip.com",
|
2021-02-12 08:19:30 +01:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2019-10-16 18:28:55 +02:00
|
|
|
):
|
2021-02-12 08:20:45 +01:00
|
|
|
with self.assertLogs("zulip.ldap", "DEBUG") as debug_log:
|
2020-07-27 03:08:32 +02:00
|
|
|
# Invite user.
|
2021-02-12 08:20:45 +01:00
|
|
|
self.login("iago")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
debug_log.output,
|
|
|
|
[
|
2021-02-12 08:20:45 +01:00
|
|
|
"DEBUG:zulip.ldap:ZulipLDAPAuthBackend: No LDAP user matching django_to_ldap_username result: iago. Input username: iago@zulip.com"
|
2021-02-12 08:19:30 +01:00
|
|
|
],
|
|
|
|
)
|
|
|
|
response = self.invite(
|
2021-02-12 08:20:45 +01:00
|
|
|
invitee_emails="newuser@zulip.com", stream_names=streams, invite_as=invite_as
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2019-10-16 18:28:55 +02:00
|
|
|
self.assert_json_success(response)
|
|
|
|
self.logout()
|
2019-01-16 09:59:01 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Ignore",
|
|
|
|
from_confirmation="1",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2019-01-16 09:59:01 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="Ignore",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2019-01-16 09:59:01 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.ZulipLDAPAuthBackend",
|
|
|
|
"zproject.backends.EmailAuthBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2019-01-16 09:59:01 +01:00
|
|
|
def test_ldap_invite_user_as_admin(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.ldap_invite_and_signup_as(PreregistrationUser.INVITE_AS["REALM_ADMIN"])
|
|
|
|
user_profile = UserProfile.objects.get(delivery_email=self.nonreg_email("newuser"))
|
2019-01-16 09:59:01 +01:00
|
|
|
self.assertTrue(user_profile.is_realm_admin)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.ZulipLDAPAuthBackend",
|
|
|
|
"zproject.backends.EmailAuthBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2019-01-16 09:59:01 +01:00
|
|
|
def test_ldap_invite_user_as_guest(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.ldap_invite_and_signup_as(PreregistrationUser.INVITE_AS["GUEST_USER"])
|
|
|
|
user_profile = UserProfile.objects.get(delivery_email=self.nonreg_email("newuser"))
|
2019-01-16 09:59:01 +01:00
|
|
|
self.assertTrue(user_profile.is_guest)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zproject.backends.ZulipLDAPAuthBackend",
|
|
|
|
"zproject.backends.EmailAuthBackend",
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
)
|
2019-01-16 09:59:01 +01:00
|
|
|
def test_ldap_invite_streams(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
stream_name = "Rome"
|
|
|
|
realm = get_realm("zulip")
|
2019-01-16 09:59:01 +01:00
|
|
|
stream = get_stream(stream_name, realm)
|
2021-07-24 16:56:39 +02:00
|
|
|
default_streams = get_default_streams_for_realm(realm.id)
|
2019-01-16 09:59:01 +01:00
|
|
|
default_streams_name = [stream.name for stream in default_streams]
|
|
|
|
self.assertNotIn(stream_name, default_streams_name)
|
|
|
|
|
|
|
|
# Invite user.
|
2021-02-12 08:19:30 +01:00
|
|
|
self.ldap_invite_and_signup_as(
|
2021-02-12 08:20:45 +01:00
|
|
|
PreregistrationUser.INVITE_AS["REALM_ADMIN"], streams=[stream_name]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2019-01-16 09:59:01 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = UserProfile.objects.get(delivery_email=self.nonreg_email("newuser"))
|
2019-01-16 09:59:01 +01:00
|
|
|
self.assertTrue(user_profile.is_realm_admin)
|
|
|
|
sub = get_stream_subscriptions_for_user(user_profile).filter(recipient__type_id=stream.id)
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(sub, 1)
|
2019-01-16 09:59:01 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_registration_when_name_changes_are_disabled(self) -> None:
|
2017-09-29 08:43:18 +02:00
|
|
|
"""
|
|
|
|
Test `name_changes_disabled` when we are not running under LDAP.
|
|
|
|
"""
|
2020-02-19 19:40:49 +01:00
|
|
|
password = self.ldap_password("newuser")
|
2017-09-29 08:43:18 +02:00
|
|
|
email = "newuser@zulip.com"
|
|
|
|
subdomain = "zulip"
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.get_subdomain", return_value=subdomain):
|
|
|
|
result = self.client_post("/register/", {"email": email})
|
2017-09-29 08:43:18 +02:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2017-09-29 08:43:18 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.name_changes_disabled", return_value=True):
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
full_name="New Name",
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2020-03-12 14:17:25 +01:00
|
|
|
user_profile = UserProfile.objects.get(delivery_email=email)
|
2017-09-29 08:43:18 +02:00
|
|
|
# 'New Name' comes from POST data; not from LDAP session.
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(user_profile.full_name, "New Name")
|
2017-09-29 08:43:18 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_realm_creation_through_ldap(self) -> None:
|
2020-02-19 19:40:49 +01:00
|
|
|
password = self.ldap_password("newuser")
|
2017-06-15 19:24:46 +02:00
|
|
|
email = "newuser@zulip.com"
|
|
|
|
subdomain = "zulip"
|
|
|
|
realm_name = "Zulip"
|
2019-10-16 18:28:55 +02:00
|
|
|
|
|
|
|
self.init_default_ldap_database()
|
2021-02-12 08:20:45 +01:00
|
|
|
ldap_user_attr_map = {"full_name": "cn"}
|
2017-06-15 19:24:46 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
with patch("zerver.views.registration.get_subdomain", return_value=subdomain):
|
|
|
|
result = self.client_post("/register/", {"email": email})
|
2017-06-15 19:24:46 +02:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2017-06-15 19:24:46 +02:00
|
|
|
result = self.client_get(result["Location"])
|
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
# Visit the confirmation link.
|
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-06-15 19:24:46 +02:00
|
|
|
for message in reversed(outbox):
|
|
|
|
if email in message.to:
|
2020-07-05 01:38:05 +02:00
|
|
|
match = re.search(settings.EXTERNAL_HOST + r"(\S+)>", message.body)
|
|
|
|
assert match is not None
|
|
|
|
[confirmation_url] = match.groups()
|
2017-06-15 19:24:46 +02:00
|
|
|
break
|
|
|
|
else:
|
|
|
|
raise AssertionError("Couldn't find a confirmation email.")
|
|
|
|
|
|
|
|
with self.settings(
|
|
|
|
POPULATE_PROFILE_VIA_LDAP=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
LDAP_APPEND_DOMAIN="zulip.com",
|
2017-06-15 19:24:46 +02:00
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map,
|
2021-02-12 08:20:45 +01:00
|
|
|
AUTHENTICATION_BACKENDS=("zproject.backends.ZulipLDAPAuthBackend",),
|
2017-06-15 19:24:46 +02:00
|
|
|
TERMS_OF_SERVICE=False,
|
|
|
|
):
|
|
|
|
result = self.client_get(confirmation_url)
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2020-04-10 05:28:15 +02:00
|
|
|
key = find_key_by_email(email)
|
|
|
|
confirmation = Confirmation.objects.get(confirmation_key=key)
|
2017-06-15 19:24:46 +02:00
|
|
|
prereg_user = confirmation.content_object
|
2021-07-24 16:56:39 +02:00
|
|
|
assert prereg_user is not None
|
2017-06-15 19:24:46 +02:00
|
|
|
prereg_user.realm_creation = True
|
|
|
|
prereg_user.save()
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
realm_name=realm_name,
|
|
|
|
realm_subdomain=subdomain,
|
2021-02-12 08:20:45 +01:00
|
|
|
from_confirmation="1",
|
2021-02-12 08:19:30 +01:00
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
|
|
|
self.assert_in_success_response(
|
|
|
|
["We just need you to do one last thing.", "newuser@zulip.com"], result
|
|
|
|
)
|
|
|
|
|
|
|
|
@patch(
|
2021-02-12 08:20:45 +01:00
|
|
|
"DNS.dnslookup",
|
|
|
|
return_value=[["sipbtest:*:20922:101:Fred Sipb,,,:/mit/sipbtest:/bin/athena/tcsh"]],
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_registration_of_mirror_dummy_user(self, ignored: Any) -> None:
|
2016-11-02 17:31:11 +01:00
|
|
|
password = "test"
|
2017-09-16 19:51:26 +02:00
|
|
|
subdomain = "zephyr"
|
2017-05-23 01:27:31 +02:00
|
|
|
user_profile = self.mit_user("sipbtest")
|
2020-03-12 14:17:25 +01:00
|
|
|
email = user_profile.delivery_email
|
2016-11-02 17:31:11 +01:00
|
|
|
user_profile.is_mirror_dummy = True
|
|
|
|
user_profile.save()
|
2021-02-14 00:03:40 +01:00
|
|
|
change_user_is_active(user_profile, False)
|
2016-11-02 17:31:11 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/register/", {"email": email}, subdomain="zephyr")
|
2016-11-02 17:31:11 +01:00
|
|
|
|
2016-12-16 02:01:34 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(result["Location"].endswith(f"/accounts/send_confirm/{email}"))
|
2017-09-16 19:51:26 +02:00
|
|
|
result = self.client_get(result["Location"], subdomain="zephyr")
|
2016-11-02 17:31:11 +01:00
|
|
|
self.assert_in_response("Check your email so we can get started.", result)
|
|
|
|
# Visit the confirmation link.
|
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2016-11-02 17:31:11 +01:00
|
|
|
for message in reversed(outbox):
|
|
|
|
if email in message.to:
|
2020-07-05 01:38:05 +02:00
|
|
|
match = re.search(settings.EXTERNAL_HOST + r"(\S+)>", message.body)
|
|
|
|
assert match is not None
|
|
|
|
[confirmation_url] = match.groups()
|
2016-11-02 17:31:11 +01:00
|
|
|
break
|
|
|
|
else:
|
2017-03-05 08:01:50 +01:00
|
|
|
raise AssertionError("Couldn't find a confirmation email.")
|
2016-11-02 17:31:11 +01:00
|
|
|
|
2017-09-16 19:51:26 +02:00
|
|
|
result = self.client_get(confirmation_url, subdomain="zephyr")
|
2016-12-16 02:01:34 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2017-03-18 20:36:40 +01:00
|
|
|
|
2017-11-27 00:58:56 +01:00
|
|
|
# If the mirror dummy user is already active, attempting to
|
|
|
|
# submit the registration form should raise an AssertionError
|
|
|
|
# (this is an invalid state, so it's a bug we got here):
|
2021-02-14 00:03:40 +01:00
|
|
|
change_user_is_active(user_profile, True)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
with self.assertRaisesRegex(
|
|
|
|
AssertionError, "Mirror dummy user is already active!"
|
2021-02-12 08:20:45 +01:00
|
|
|
), self.assertLogs("django.request", "ERROR") as error_log:
|
2017-11-27 00:58:56 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
2021-02-12 08:20:45 +01:00
|
|
|
from_confirmation="1",
|
2017-11-27 00:58:56 +01:00
|
|
|
# Pass HTTP_HOST for the target subdomain
|
2021-02-12 08:19:30 +01:00
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
|
|
|
self.assertTrue(
|
2021-02-12 08:20:45 +01:00
|
|
|
"ERROR:django.request:Internal Server Error: /accounts/register/" in error_log.output[0]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
self.assertTrue(
|
|
|
|
'raise AssertionError("Mirror dummy user is already active!' in error_log.output[0]
|
|
|
|
)
|
|
|
|
self.assertTrue(
|
2021-02-12 08:20:45 +01:00
|
|
|
"AssertionError: Mirror dummy user is already active!" in error_log.output[0]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-09-16 19:51:26 +02:00
|
|
|
|
2021-02-14 00:03:40 +01:00
|
|
|
change_user_is_active(user_profile, False)
|
2017-03-18 20:36:40 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
2021-02-12 08:20:45 +01:00
|
|
|
from_confirmation="1",
|
2021-02-12 08:19:30 +01:00
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2016-12-16 02:01:34 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.submit_reg_form_for_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
# Pass HTTP_HOST for the target subdomain
|
|
|
|
HTTP_HOST=subdomain + ".testserver",
|
|
|
|
)
|
2016-12-16 02:01:34 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
2016-11-02 17:31:11 +01:00
|
|
|
|
2021-04-13 19:47:35 +02:00
|
|
|
@patch(
|
|
|
|
"DNS.dnslookup",
|
|
|
|
return_value=[["sipbtest:*:20922:101:Fred Sipb,,,:/mit/sipbtest:/bin/athena/tcsh"]],
|
|
|
|
)
|
|
|
|
def test_registration_of_active_mirror_dummy_user(self, ignored: Any) -> None:
|
2017-03-18 20:36:40 +01:00
|
|
|
"""
|
2017-11-27 00:58:56 +01:00
|
|
|
Trying to activate an already-active mirror dummy user should
|
|
|
|
raise an AssertionError.
|
2017-03-18 20:36:40 +01:00
|
|
|
"""
|
2017-05-23 01:27:31 +02:00
|
|
|
user_profile = self.mit_user("sipbtest")
|
2020-03-12 14:17:25 +01:00
|
|
|
email = user_profile.delivery_email
|
2017-03-18 20:36:40 +01:00
|
|
|
user_profile.is_mirror_dummy = True
|
|
|
|
user_profile.save()
|
2021-02-14 00:03:40 +01:00
|
|
|
change_user_is_active(user_profile, True)
|
2017-03-18 20:36:40 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
with self.assertRaisesRegex(
|
|
|
|
AssertionError, "Mirror dummy user is already active!"
|
2021-02-12 08:20:45 +01:00
|
|
|
), self.assertLogs("django.request", "ERROR") as error_log:
|
|
|
|
self.client_post("/register/", {"email": email}, subdomain="zephyr")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(
|
2021-02-12 08:20:45 +01:00
|
|
|
"ERROR:django.request:Internal Server Error: /register/" in error_log.output[0]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
self.assertTrue(
|
|
|
|
'raise AssertionError("Mirror dummy user is already active!' in error_log.output[0]
|
|
|
|
)
|
|
|
|
self.assertTrue(
|
2021-02-12 08:20:45 +01:00
|
|
|
"AssertionError: Mirror dummy user is already active!" in error_log.output[0]
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-03-18 20:36:40 +01:00
|
|
|
|
2019-03-13 18:26:01 +01:00
|
|
|
@override_settings(TERMS_OF_SERVICE=False)
|
|
|
|
def test_dev_user_registration(self) -> None:
|
|
|
|
"""Verify that /devtools/register_user creates a new user, logs them
|
|
|
|
in, and redirects to the logged-in app."""
|
|
|
|
count = UserProfile.objects.count()
|
2020-06-13 08:59:37 +02:00
|
|
|
email = f"user-{count}@zulip.com"
|
2019-03-13 18:26:01 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/devtools/register_user/")
|
2019-03-13 18:26:01 +01:00
|
|
|
user_profile = UserProfile.objects.all().order_by("id").last()
|
2021-07-24 16:56:39 +02:00
|
|
|
assert user_profile is not None
|
2019-03-13 18:26:01 +01:00
|
|
|
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2020-03-12 14:17:25 +01:00
|
|
|
self.assertEqual(user_profile.delivery_email, email)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result["Location"], "http://zulip.testserver/")
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
2019-03-13 18:26:01 +01:00
|
|
|
|
|
|
|
@override_settings(TERMS_OF_SERVICE=False)
|
|
|
|
def test_dev_user_registration_create_realm(self) -> None:
|
|
|
|
count = UserProfile.objects.count()
|
2020-06-13 08:59:37 +02:00
|
|
|
string_id = f"realm-{count}"
|
2019-03-13 18:26:01 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/devtools/register_realm/")
|
2019-03-13 18:26:01 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(
|
2021-02-12 08:20:45 +01:00
|
|
|
result["Location"].startswith(f"http://{string_id}.testserver/accounts/login/subdomain")
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2019-03-13 18:26:01 +01:00
|
|
|
result = self.client_get(result["Location"], subdomain=string_id)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result["Location"], f"http://{string_id}.testserver")
|
2019-03-13 18:26:01 +01:00
|
|
|
|
|
|
|
user_profile = UserProfile.objects.all().order_by("id").last()
|
2021-07-24 16:56:39 +02:00
|
|
|
assert user_profile is not None
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
2019-03-13 18:26:01 +01:00
|
|
|
|
2021-08-13 20:37:15 +02:00
|
|
|
@override_settings(TERMS_OF_SERVICE=False)
|
|
|
|
def test_dev_user_registration_create_demo_realm(self) -> None:
|
|
|
|
result = self.client_post("/devtools/register_demo_realm/")
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
|
|
|
|
realm = Realm.objects.latest("date_created")
|
|
|
|
self.assertTrue(
|
|
|
|
result["Location"].startswith(
|
|
|
|
f"http://{realm.string_id}.testserver/accounts/login/subdomain"
|
|
|
|
)
|
|
|
|
)
|
|
|
|
result = self.client_get(result["Location"], subdomain=realm.string_id)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result["Location"], f"http://{realm.string_id}.testserver")
|
|
|
|
|
|
|
|
user_profile = UserProfile.objects.all().order_by("id").last()
|
|
|
|
assert user_profile is not None
|
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
|
|
|
|
2021-09-02 01:05:30 +02:00
|
|
|
expected_deletion_date = realm.date_created + datetime.timedelta(
|
|
|
|
days=settings.DEMO_ORG_DEADLINE_DAYS
|
|
|
|
)
|
2021-08-13 20:37:15 +02:00
|
|
|
self.assertEqual(realm.demo_organization_scheduled_deletion_date, expected_deletion_date)
|
|
|
|
|
2016-10-13 20:09:32 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
class DeactivateUserTest(ZulipTestCase):
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_deactivate_user(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
user = self.example_user("hamlet")
|
2020-03-06 18:40:46 +01:00
|
|
|
email = user.email
|
|
|
|
self.login_user(user)
|
2016-10-13 20:09:32 +02:00
|
|
|
self.assertTrue(user.is_active)
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_delete("/json/users/me")
|
2016-10-13 20:09:32 +02:00
|
|
|
self.assert_json_success(result)
|
2021-02-12 08:20:45 +01:00
|
|
|
user = self.example_user("hamlet")
|
2016-10-13 20:09:32 +02:00
|
|
|
self.assertFalse(user.is_active)
|
2020-03-06 18:40:46 +01:00
|
|
|
password = initial_password(email)
|
2020-07-05 01:38:05 +02:00
|
|
|
assert password is not None
|
2020-03-06 18:40:46 +01:00
|
|
|
self.assert_login_failure(email, password=password)
|
2016-10-13 20:09:32 +02:00
|
|
|
|
2020-05-16 21:06:43 +02:00
|
|
|
def test_do_not_deactivate_final_owner(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
user = self.example_user("desdemona")
|
|
|
|
user_2 = self.example_user("iago")
|
2020-03-06 18:40:46 +01:00
|
|
|
self.login_user(user)
|
2016-10-13 20:09:32 +02:00
|
|
|
self.assertTrue(user.is_active)
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_delete("/json/users/me")
|
2020-05-16 21:06:43 +02:00
|
|
|
self.assert_json_error(result, "Cannot deactivate the only organization owner.")
|
2021-02-12 08:20:45 +01:00
|
|
|
user = self.example_user("desdemona")
|
2016-10-13 20:09:32 +02:00
|
|
|
self.assertTrue(user.is_active)
|
2020-05-16 21:06:43 +02:00
|
|
|
self.assertTrue(user.is_realm_owner)
|
2021-03-27 05:13:46 +01:00
|
|
|
do_change_user_role(user_2, UserProfile.ROLE_REALM_OWNER, acting_user=None)
|
2020-05-16 21:06:43 +02:00
|
|
|
self.assertTrue(user_2.is_realm_owner)
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_delete("/json/users/me")
|
2016-10-13 20:09:32 +02:00
|
|
|
self.assert_json_success(result)
|
2021-03-27 05:13:46 +01:00
|
|
|
do_change_user_role(user, UserProfile.ROLE_REALM_OWNER, acting_user=None)
|
2017-03-08 12:38:56 +01:00
|
|
|
|
2018-08-21 08:14:46 +02:00
|
|
|
def test_do_not_deactivate_final_user(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
realm = get_realm("zulip")
|
2021-02-14 00:03:40 +01:00
|
|
|
for user_profile in UserProfile.objects.filter(realm=realm).exclude(
|
|
|
|
role=UserProfile.ROLE_REALM_OWNER
|
|
|
|
):
|
|
|
|
do_deactivate_user(user_profile, acting_user=None)
|
2020-06-01 17:37:35 +02:00
|
|
|
user = self.example_user("desdemona")
|
2020-03-06 18:40:46 +01:00
|
|
|
self.login_user(user)
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_delete("/json/users/me")
|
2018-08-21 08:14:46 +02:00
|
|
|
self.assert_json_error(result, "Cannot deactivate the only user.")
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-03-08 12:38:56 +01:00
|
|
|
class TestLoginPage(ZulipTestCase):
|
2021-02-12 08:20:45 +01:00
|
|
|
@patch("django.http.HttpRequest.get_host")
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_login_page_redirects_for_root_alias(self, mock_get_host: MagicMock) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
mock_get_host.return_value = "www.testserver"
|
2017-08-25 05:18:28 +02:00
|
|
|
with self.settings(ROOT_DOMAIN_LANDING_PAGE=True):
|
2017-03-08 12:38:56 +01:00
|
|
|
result = self.client_get("/en/login/")
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result.url, "/accounts/go/")
|
2018-08-25 16:21:59 +02:00
|
|
|
|
2020-09-13 00:11:30 +02:00
|
|
|
result = self.client_get("/en/login/", {"next": "/upgrade/"})
|
2018-08-25 16:21:59 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result.url, "/accounts/go/?next=%2Fupgrade%2F")
|
2017-03-08 12:38:56 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
@patch("django.http.HttpRequest.get_host")
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_login_page_redirects_for_root_domain(self, mock_get_host: MagicMock) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
mock_get_host.return_value = "testserver"
|
2017-08-25 05:18:28 +02:00
|
|
|
with self.settings(ROOT_DOMAIN_LANDING_PAGE=True):
|
2017-03-08 12:38:56 +01:00
|
|
|
result = self.client_get("/en/login/")
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result.url, "/accounts/go/")
|
2018-08-25 16:21:59 +02:00
|
|
|
|
2020-09-13 00:11:30 +02:00
|
|
|
result = self.client_get("/en/login/", {"next": "/upgrade/"})
|
2018-08-25 16:21:59 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result.url, "/accounts/go/?next=%2Fupgrade%2F")
|
2017-03-08 12:38:56 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
mock_get_host.return_value = "www.testserver.com"
|
2021-02-12 08:19:30 +01:00
|
|
|
with self.settings(
|
|
|
|
ROOT_DOMAIN_LANDING_PAGE=True,
|
2021-02-12 08:20:45 +01:00
|
|
|
EXTERNAL_HOST="www.testserver.com",
|
|
|
|
ROOT_SUBDOMAIN_ALIASES=["test"],
|
2021-02-12 08:19:30 +01:00
|
|
|
):
|
2017-03-08 12:38:56 +01:00
|
|
|
result = self.client_get("/en/login/")
|
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result.url, "/accounts/go/")
|
2018-08-25 16:21:59 +02:00
|
|
|
|
2020-09-13 00:11:30 +02:00
|
|
|
result = self.client_get("/en/login/", {"next": "/upgrade/"})
|
2018-08-25 16:21:59 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result.url, "/accounts/go/?next=%2Fupgrade%2F")
|
2017-03-08 12:38:56 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
@patch("django.http.HttpRequest.get_host")
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_login_page_works_without_subdomains(self, mock_get_host: MagicMock) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
mock_get_host.return_value = "www.testserver"
|
|
|
|
with self.settings(ROOT_SUBDOMAIN_ALIASES=["www"]):
|
2017-03-08 12:38:56 +01:00
|
|
|
result = self.client_get("/en/login/")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
mock_get_host.return_value = "testserver"
|
|
|
|
with self.settings(ROOT_SUBDOMAIN_ALIASES=["www"]):
|
2017-03-08 12:38:56 +01:00
|
|
|
result = self.client_get("/en/login/")
|
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2020-03-31 08:31:22 +02:00
|
|
|
def test_login_page_registration_hint(self) -> None:
|
|
|
|
response = self.client_get("/login/")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_not_in_success_response(
|
|
|
|
["Don't have an account yet? You need to be invited to join this organization."],
|
|
|
|
response,
|
|
|
|
)
|
2020-03-31 08:31:22 +02:00
|
|
|
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
realm.invite_required = True
|
|
|
|
realm.save(update_fields=["invite_required"])
|
|
|
|
response = self.client_get("/login/")
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_in_success_response(
|
|
|
|
["Don't have an account yet? You need to be invited to join this organization."],
|
|
|
|
response,
|
|
|
|
)
|
|
|
|
|
2021-08-23 15:14:05 +02:00
|
|
|
@patch("django.http.HttpRequest.get_host", return_value="auth.testserver")
|
|
|
|
def test_social_auth_subdomain_login_page(self, mock_get_host: MagicMock) -> None:
|
|
|
|
result = self.client_get("http://auth.testserver/login/")
|
|
|
|
self.assertEqual(result.status_code, 400)
|
|
|
|
self.assert_in_response("Authentication subdomain", result)
|
|
|
|
|
|
|
|
zulip_realm = get_realm("zulip")
|
|
|
|
session = self.client.session
|
|
|
|
session["subdomain"] = "zulip"
|
|
|
|
session.save()
|
|
|
|
result = self.client_get("http://auth.testserver/login/")
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result.url, zulip_realm.uri)
|
|
|
|
|
|
|
|
session = self.client.session
|
|
|
|
session["subdomain"] = "invalid"
|
|
|
|
session.save()
|
|
|
|
result = self.client_get("http://auth.testserver/login/")
|
|
|
|
self.assertEqual(result.status_code, 400)
|
|
|
|
self.assert_in_response("Authentication subdomain", result)
|
|
|
|
|
2021-08-23 15:14:05 +02:00
|
|
|
def test_login_page_is_deactivated_validation(self) -> None:
|
|
|
|
with patch("zerver.views.auth.logging.info") as mock_info:
|
|
|
|
result = self.client_get("/login/?is_deactivated=invalid_email")
|
|
|
|
mock_info.assert_called_once()
|
|
|
|
self.assert_not_in_success_response(["invalid_email"], result)
|
|
|
|
|
2020-03-31 08:31:22 +02:00
|
|
|
|
2017-03-08 12:38:56 +01:00
|
|
|
class TestFindMyTeam(ZulipTestCase):
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_template(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/find/")
|
2021-08-02 23:20:39 +02:00
|
|
|
self.assertIn("Find your Zulip accounts", result.content.decode())
|
2017-03-08 12:38:56 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_result(self) -> None:
|
2020-08-01 15:25:54 +02:00
|
|
|
# We capitalize a letter in cordelia's email to test that the search is case-insensitive.
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/accounts/find/", dict(emails="iago@zulip.com,cordeliA@zulip.com")
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-08-25 08:10:12 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
result.url, "/accounts/find/?emails=iago%40zulip.com%2CcordeliA%40zulip.com"
|
|
|
|
)
|
2017-08-25 08:10:12 +02:00
|
|
|
result = self.client_get(result.url)
|
2021-08-02 23:20:39 +02:00
|
|
|
content = result.content.decode()
|
2017-03-08 12:38:56 +01:00
|
|
|
self.assertIn("Emails sent! You will only receive emails", content)
|
2020-08-01 15:25:54 +02:00
|
|
|
self.assertIn("iago@zulip.com", content)
|
|
|
|
self.assertIn("cordeliA@zulip.com", content)
|
2017-08-25 08:10:12 +02:00
|
|
|
from django.core.mail import outbox
|
2020-06-11 00:54:34 +02:00
|
|
|
|
2021-09-15 15:29:15 +02:00
|
|
|
self.assert_length(outbox, 2)
|
|
|
|
iago_message = outbox[1]
|
|
|
|
cordelia_message = outbox[0]
|
|
|
|
self.assertIn("Zulip Dev", iago_message.body)
|
|
|
|
self.assertNotIn("Lear & Co", iago_message.body)
|
|
|
|
self.assertIn("Zulip Dev", cordelia_message.body)
|
|
|
|
self.assertIn("Lear & Co", cordelia_message.body)
|
2017-03-08 12:38:56 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_find_team_ignore_invalid_email(self) -> None:
|
2021-02-12 08:19:30 +01:00
|
|
|
result = self.client_post(
|
2021-02-12 08:20:45 +01:00
|
|
|
"/accounts/find/", dict(emails="iago@zulip.com,invalid_email@zulip.com")
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-08-25 08:10:12 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
result.url, "/accounts/find/?emails=iago%40zulip.com%2Cinvalid_email%40zulip.com"
|
|
|
|
)
|
2017-08-25 08:10:12 +02:00
|
|
|
result = self.client_get(result.url)
|
2021-08-02 23:20:39 +02:00
|
|
|
content = result.content.decode()
|
2017-03-11 20:12:01 +01:00
|
|
|
self.assertIn("Emails sent! You will only receive emails", content)
|
2017-05-25 01:44:04 +02:00
|
|
|
self.assertIn(self.example_email("iago"), content)
|
2017-08-25 08:10:12 +02:00
|
|
|
self.assertIn("invalid_email@", content)
|
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, 1)
|
2017-08-25 08:10:12 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_find_team_reject_invalid_email(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_post("/accounts/find/", dict(emails="invalid_string"))
|
2017-08-25 08:10:12 +02:00
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
self.assertIn(b"Enter a valid email", result.content)
|
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, 0)
|
2017-03-11 20:12:01 +01:00
|
|
|
|
2017-08-25 08:30:33 +02:00
|
|
|
# Just for coverage on perhaps-unnecessary validation code.
|
2020-09-13 00:11:30 +02:00
|
|
|
result = self.client_get("/accounts/find/", {"emails": "invalid"})
|
2017-08-25 08:30:33 +02:00
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_find_team_zero_emails(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
data = {"emails": ""}
|
|
|
|
result = self.client_post("/accounts/find/", data)
|
2021-08-02 23:20:39 +02:00
|
|
|
self.assertIn("This field is required", result.content.decode())
|
2017-03-08 12:38:56 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2017-08-25 08:10:12 +02:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, 0)
|
2017-03-08 12:38:56 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_find_team_one_email(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
data = {"emails": self.example_email("hamlet")}
|
|
|
|
result = self.client_post("/accounts/find/", data)
|
2017-03-08 12:38:56 +01:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result.url, "/accounts/find/?emails=hamlet%40zulip.com")
|
2017-08-25 08:10:12 +02:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, 1)
|
2017-03-08 12:38:56 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_find_team_deactivated_user(self) -> None:
|
2021-03-27 06:02:12 +01:00
|
|
|
do_deactivate_user(self.example_user("hamlet"), acting_user=None)
|
2021-02-12 08:20:45 +01:00
|
|
|
data = {"emails": self.example_email("hamlet")}
|
|
|
|
result = self.client_post("/accounts/find/", data)
|
2017-08-25 08:14:55 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result.url, "/accounts/find/?emails=hamlet%40zulip.com")
|
2017-08-25 08:14:55 +02:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, 0)
|
2017-08-25 08:14:55 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_find_team_deactivated_realm(self) -> None:
|
2021-04-02 17:11:25 +02:00
|
|
|
do_deactivate_realm(get_realm("zulip"), acting_user=None)
|
2021-02-12 08:20:45 +01:00
|
|
|
data = {"emails": self.example_email("hamlet")}
|
|
|
|
result = self.client_post("/accounts/find/", data)
|
2017-08-25 08:14:55 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result.url, "/accounts/find/?emails=hamlet%40zulip.com")
|
2017-08-25 08:14:55 +02:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, 0)
|
2017-08-25 08:14:55 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_find_team_bot_email(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
data = {"emails": self.example_email("webhook_bot")}
|
|
|
|
result = self.client_post("/accounts/find/", data)
|
2017-08-25 08:14:55 +02:00
|
|
|
self.assertEqual(result.status_code, 302)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result.url, "/accounts/find/?emails=webhook-bot%40zulip.com")
|
2017-08-25 08:14:55 +02:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, 0)
|
2017-08-25 08:14:55 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_find_team_more_than_ten_emails(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
data = {"emails": ",".join(f"hamlet-{i}@zulip.com" for i in range(11))}
|
|
|
|
result = self.client_post("/accounts/find/", data)
|
2017-03-08 12:38:56 +01:00
|
|
|
self.assertEqual(result.status_code, 200)
|
2021-08-02 23:20:39 +02:00
|
|
|
self.assertIn("Please enter at most 10", result.content.decode())
|
2017-08-25 08:10:12 +02:00
|
|
|
from django.core.mail import outbox
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-05-17 05:41:32 +02:00
|
|
|
self.assert_length(outbox, 0)
|
2017-03-11 20:12:01 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-03-11 20:12:01 +01:00
|
|
|
class ConfirmationKeyTest(ZulipTestCase):
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_confirmation_key(self) -> None:
|
2017-03-11 20:12:01 +01:00
|
|
|
request = MagicMock()
|
|
|
|
request.session = {
|
2021-02-12 08:20:45 +01:00
|
|
|
"confirmation_key": {"confirmation_key": "xyzzy"},
|
2017-03-11 20:12:01 +01:00
|
|
|
}
|
|
|
|
result = confirmation_key(request)
|
|
|
|
self.assert_json_success(result)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assert_in_response("xyzzy", result)
|
2017-04-27 22:58:53 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-04-27 22:58:53 +02:00
|
|
|
class MobileAuthOTPTest(ZulipTestCase):
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_xor_hex_strings(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(xor_hex_strings("1237c81ab", "18989fd12"), "0aaf57cb9")
|
2017-04-27 22:58:53 +02:00
|
|
|
with self.assertRaises(AssertionError):
|
2021-02-12 08:20:45 +01:00
|
|
|
xor_hex_strings("1", "31")
|
2017-04-27 22:58:53 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_is_valid_otp(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(is_valid_otp("1234"), False)
|
|
|
|
self.assertEqual(is_valid_otp("1234abcd" * 8), True)
|
|
|
|
self.assertEqual(is_valid_otp("1234abcZ" * 8), False)
|
2017-04-27 22:58:53 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_ascii_to_hex(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(ascii_to_hex("ZcdR1234"), "5a63645231323334")
|
|
|
|
self.assertEqual(hex_to_ascii("5a63645231323334"), "ZcdR1234")
|
2017-04-27 22:58:53 +02:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_otp_encrypt_api_key(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
api_key = "12ac" * 8
|
|
|
|
otp = "7be38894" * 8
|
2018-08-01 11:45:52 +02:00
|
|
|
result = otp_encrypt_api_key(api_key, otp)
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertEqual(result, "4ad1e9f7" * 8)
|
2017-04-27 22:58:53 +02:00
|
|
|
|
|
|
|
decryped = otp_decrypt_api_key(result, otp)
|
2018-08-01 11:45:52 +02:00
|
|
|
self.assertEqual(decryped, api_key)
|
2017-04-20 08:25:15 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-11-02 14:11:48 +01:00
|
|
|
class FollowupEmailTest(ZulipTestCase):
|
|
|
|
def test_followup_day2_email(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.example_user("hamlet")
|
2017-11-02 14:11:48 +01:00
|
|
|
# Test date_joined == Sunday
|
2021-02-12 08:19:30 +01:00
|
|
|
user_profile.date_joined = datetime.datetime(
|
|
|
|
2018, 1, 7, 1, 0, 0, 0, tzinfo=datetime.timezone.utc
|
|
|
|
)
|
|
|
|
self.assertEqual(
|
|
|
|
followup_day2_email_delay(user_profile), datetime.timedelta(days=2, hours=-1)
|
|
|
|
)
|
2017-11-02 14:11:48 +01:00
|
|
|
# Test date_joined == Tuesday
|
2021-02-12 08:19:30 +01:00
|
|
|
user_profile.date_joined = datetime.datetime(
|
|
|
|
2018, 1, 2, 1, 0, 0, 0, tzinfo=datetime.timezone.utc
|
|
|
|
)
|
|
|
|
self.assertEqual(
|
|
|
|
followup_day2_email_delay(user_profile), datetime.timedelta(days=2, hours=-1)
|
|
|
|
)
|
2017-11-02 14:11:48 +01:00
|
|
|
# Test date_joined == Thursday
|
2021-02-12 08:19:30 +01:00
|
|
|
user_profile.date_joined = datetime.datetime(
|
|
|
|
2018, 1, 4, 1, 0, 0, 0, tzinfo=datetime.timezone.utc
|
|
|
|
)
|
|
|
|
self.assertEqual(
|
|
|
|
followup_day2_email_delay(user_profile), datetime.timedelta(days=1, hours=-1)
|
|
|
|
)
|
2017-11-02 14:11:48 +01:00
|
|
|
# Test date_joined == Friday
|
2021-02-12 08:19:30 +01:00
|
|
|
user_profile.date_joined = datetime.datetime(
|
|
|
|
2018, 1, 5, 1, 0, 0, 0, tzinfo=datetime.timezone.utc
|
|
|
|
)
|
|
|
|
self.assertEqual(
|
|
|
|
followup_day2_email_delay(user_profile), datetime.timedelta(days=3, hours=-1)
|
|
|
|
)
|
2017-11-02 14:11:48 +01:00
|
|
|
|
|
|
|
# Time offset of America/Phoenix is -07:00
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile.timezone = "America/Phoenix"
|
2017-11-02 14:11:48 +01:00
|
|
|
# Test date_joined == Friday in UTC, but Thursday in the user's timezone
|
2021-02-12 08:19:30 +01:00
|
|
|
user_profile.date_joined = datetime.datetime(
|
|
|
|
2018, 1, 5, 1, 0, 0, 0, tzinfo=datetime.timezone.utc
|
|
|
|
)
|
|
|
|
self.assertEqual(
|
|
|
|
followup_day2_email_delay(user_profile), datetime.timedelta(days=1, hours=-1)
|
|
|
|
)
|
|
|
|
|
2017-07-13 13:42:57 +02:00
|
|
|
|
2018-06-08 11:06:18 +02:00
|
|
|
class NoReplyEmailTest(ZulipTestCase):
|
|
|
|
def test_noreply_email_address(self) -> None:
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertTrue(
|
|
|
|
re.search(self.TOKENIZED_NOREPLY_REGEX, FromAddress.tokenized_no_reply_address())
|
|
|
|
)
|
2018-06-08 11:06:18 +02:00
|
|
|
|
|
|
|
with self.settings(ADD_TOKENS_TO_NOREPLY_ADDRESS=False):
|
|
|
|
self.assertEqual(FromAddress.tokenized_no_reply_address(), "noreply@testserver")
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-07-13 13:42:57 +02:00
|
|
|
class TwoFactorAuthTest(ZulipTestCase):
|
2021-02-12 08:20:45 +01:00
|
|
|
@patch("two_factor.models.totp")
|
python: Convert function type annotations to Python 3 style.
Generated by com2ann (slightly patched to avoid also converting
assignment type annotations, which require Python 3.6), followed by
some manual whitespace adjustment, and six fixes for runtime issues:
- def __init__(self, token: Token, parent: Optional[Node]) -> None:
+ def __init__(self, token: Token, parent: "Optional[Node]") -> None:
-def main(options: argparse.Namespace) -> NoReturn:
+def main(options: argparse.Namespace) -> "NoReturn":
-def fetch_request(url: str, callback: Any, **kwargs: Any) -> Generator[Callable[..., Any], Any, None]:
+def fetch_request(url: str, callback: Any, **kwargs: Any) -> "Generator[Callable[..., Any], Any, None]":
-def assert_server_running(server: subprocess.Popen[bytes], log_file: Optional[str]) -> None:
+def assert_server_running(server: "subprocess.Popen[bytes]", log_file: Optional[str]) -> None:
-def server_is_up(server: subprocess.Popen[bytes], log_file: Optional[str]) -> bool:
+def server_is_up(server: "subprocess.Popen[bytes]", log_file: Optional[str]) -> bool:
- method_kwarg_pairs: List[FuncKwargPair],
+ method_kwarg_pairs: "List[FuncKwargPair]",
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-19 03:48:37 +02:00
|
|
|
def test_two_factor_login(self, mock_totp: MagicMock) -> None:
|
2017-07-13 13:42:57 +02:00
|
|
|
token = 123456
|
2021-02-12 08:20:45 +01:00
|
|
|
email = self.example_email("hamlet")
|
|
|
|
password = self.ldap_password("hamlet")
|
2017-07-13 13:42:57 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
user_profile = self.example_user("hamlet")
|
2017-07-13 13:42:57 +02:00
|
|
|
user_profile.set_password(password)
|
|
|
|
user_profile.save()
|
|
|
|
self.create_default_device(user_profile)
|
|
|
|
|
python: Convert function type annotations to Python 3 style.
Generated by com2ann (slightly patched to avoid also converting
assignment type annotations, which require Python 3.6), followed by
some manual whitespace adjustment, and six fixes for runtime issues:
- def __init__(self, token: Token, parent: Optional[Node]) -> None:
+ def __init__(self, token: Token, parent: "Optional[Node]") -> None:
-def main(options: argparse.Namespace) -> NoReturn:
+def main(options: argparse.Namespace) -> "NoReturn":
-def fetch_request(url: str, callback: Any, **kwargs: Any) -> Generator[Callable[..., Any], Any, None]:
+def fetch_request(url: str, callback: Any, **kwargs: Any) -> "Generator[Callable[..., Any], Any, None]":
-def assert_server_running(server: subprocess.Popen[bytes], log_file: Optional[str]) -> None:
+def assert_server_running(server: "subprocess.Popen[bytes]", log_file: Optional[str]) -> None:
-def server_is_up(server: subprocess.Popen[bytes], log_file: Optional[str]) -> bool:
+def server_is_up(server: "subprocess.Popen[bytes]", log_file: Optional[str]) -> bool:
- method_kwarg_pairs: List[FuncKwargPair],
+ method_kwarg_pairs: "List[FuncKwargPair]",
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-19 03:48:37 +02:00
|
|
|
def totp(*args: Any, **kwargs: Any) -> int:
|
2017-07-13 13:42:57 +02:00
|
|
|
return token
|
|
|
|
|
|
|
|
mock_totp.side_effect = totp
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
with self.settings(
|
2021-02-12 08:20:45 +01:00
|
|
|
AUTHENTICATION_BACKENDS=("zproject.backends.EmailAuthBackend",),
|
|
|
|
TWO_FACTOR_CALL_GATEWAY="two_factor.gateways.fake.Fake",
|
|
|
|
TWO_FACTOR_SMS_GATEWAY="two_factor.gateways.fake.Fake",
|
2021-02-12 08:19:30 +01:00
|
|
|
TWO_FACTOR_AUTHENTICATION_ENABLED=True,
|
|
|
|
):
|
2017-07-13 13:42:57 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
first_step_data = {
|
|
|
|
"username": email,
|
|
|
|
"password": password,
|
|
|
|
"two_factor_login_view-current_step": "auth",
|
|
|
|
}
|
2021-02-12 08:20:45 +01:00
|
|
|
with self.assertLogs("two_factor.gateways.fake", "INFO") as info_logs:
|
2020-07-27 03:08:32 +02:00
|
|
|
result = self.client_post("/accounts/login/", first_step_data)
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assertEqual(
|
|
|
|
info_logs.output,
|
|
|
|
['INFO:two_factor.gateways.fake:Fake SMS to +12125550100: "Your token is: 123456"'],
|
|
|
|
)
|
2017-07-13 13:42:57 +02:00
|
|
|
self.assertEqual(result.status_code, 200)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
second_step_data = {
|
|
|
|
"token-otp_token": str(token),
|
|
|
|
"two_factor_login_view-current_step": "token",
|
|
|
|
}
|
2017-07-13 13:42:57 +02:00
|
|
|
result = self.client_post("/accounts/login/", second_step_data)
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result["Location"], "http://zulip.testserver")
|
|
|
|
|
|
|
|
# Going to login page should redirect to '/' if user is already
|
|
|
|
# logged in.
|
2021-02-12 08:20:45 +01:00
|
|
|
result = self.client_get("/accounts/login/")
|
2017-07-13 13:42:57 +02:00
|
|
|
self.assertEqual(result["Location"], "http://zulip.testserver")
|
2018-08-12 03:43:31 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2018-08-12 03:43:31 +02:00
|
|
|
class NameRestrictionsTest(ZulipTestCase):
|
|
|
|
def test_whitelisted_disposable_domains(self) -> None:
|
2021-02-12 08:20:45 +01:00
|
|
|
self.assertFalse(is_disposable_domain("OPayQ.com"))
|
2018-08-25 14:06:17 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2018-08-25 14:06:17 +02:00
|
|
|
class RealmRedirectTest(ZulipTestCase):
|
|
|
|
def test_realm_redirect_without_next_param(self) -> None:
|
|
|
|
result = self.client_get("/accounts/go/")
|
2018-12-06 11:38:20 +01:00
|
|
|
self.assert_in_success_response(["Enter your organization's Zulip URL"], result)
|
2018-08-25 14:06:17 +02:00
|
|
|
|
|
|
|
result = self.client_post("/accounts/go/", {"subdomain": "zephyr"})
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result["Location"], "http://zephyr.testserver")
|
|
|
|
|
|
|
|
result = self.client_post("/accounts/go/", {"subdomain": "invalid"})
|
|
|
|
self.assert_in_success_response(["We couldn't find that Zulip organization."], result)
|
|
|
|
|
|
|
|
def test_realm_redirect_with_next_param(self) -> None:
|
2020-09-13 00:11:30 +02:00
|
|
|
result = self.client_get("/accounts/go/", {"next": "billing"})
|
2021-02-12 08:19:30 +01:00
|
|
|
self.assert_in_success_response(
|
|
|
|
["Enter your organization's Zulip URL", 'action="/accounts/go/?next=billing"'], result
|
|
|
|
)
|
2018-08-25 14:06:17 +02:00
|
|
|
|
|
|
|
result = self.client_post("/accounts/go/?next=billing", {"subdomain": "lear"})
|
|
|
|
self.assertEqual(result.status_code, 302)
|
|
|
|
self.assertEqual(result["Location"], "http://lear.testserver/billing")
|