2017-03-08 12:12:02 +01:00
|
|
|
|
|
|
|
import ujson
|
|
|
|
|
|
|
|
from django.http import HttpResponse
|
2018-05-29 07:25:08 +02:00
|
|
|
from django.test import override_settings
|
2017-03-08 12:12:02 +01:00
|
|
|
from mock import patch
|
|
|
|
from typing import Any, Dict
|
|
|
|
|
|
|
|
from zerver.lib.initial_password import initial_password
|
|
|
|
from zerver.lib.test_classes import ZulipTestCase
|
2019-04-29 08:41:00 +02:00
|
|
|
from zerver.lib.test_helpers import MockLDAP, get_test_image_file
|
2018-08-01 10:53:40 +02:00
|
|
|
from zerver.lib.users import get_all_api_keys
|
2019-02-02 23:53:44 +01:00
|
|
|
from zerver.models import get_realm, UserProfile, \
|
2019-01-05 02:16:38 +01:00
|
|
|
get_user_profile_by_api_key
|
2017-03-08 12:12:02 +01:00
|
|
|
|
|
|
|
class ChangeSettingsTest(ZulipTestCase):
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def check_well_formed_change_settings_response(self, result: Dict[str, Any]) -> None:
|
2017-03-08 12:12:02 +01:00
|
|
|
self.assertIn("full_name", result)
|
|
|
|
|
|
|
|
# DEPRECATED, to be deleted after all uses of check_for_toggle_param
|
|
|
|
# are converted into check_for_toggle_param_patch.
|
2017-11-05 10:51:25 +01:00
|
|
|
def check_for_toggle_param(self, pattern: str, param: str) -> None:
|
2017-05-25 01:40:26 +02:00
|
|
|
self.login(self.example_email("hamlet"))
|
2017-05-07 17:21:26 +02:00
|
|
|
user_profile = self.example_user('hamlet')
|
2017-03-08 12:12:02 +01:00
|
|
|
json_result = self.client_post(pattern,
|
|
|
|
{param: ujson.dumps(True)})
|
|
|
|
self.assert_json_success(json_result)
|
|
|
|
# refetch user_profile object to correctly handle caching
|
2017-05-07 17:21:26 +02:00
|
|
|
user_profile = self.example_user('hamlet')
|
2017-03-08 12:12:02 +01:00
|
|
|
self.assertEqual(getattr(user_profile, param), True)
|
|
|
|
|
|
|
|
json_result = self.client_post(pattern,
|
|
|
|
{param: ujson.dumps(False)})
|
|
|
|
self.assert_json_success(json_result)
|
|
|
|
# refetch user_profile object to correctly handle caching
|
2017-05-07 17:21:26 +02:00
|
|
|
user_profile = self.example_user('hamlet')
|
2017-03-08 12:12:02 +01:00
|
|
|
self.assertEqual(getattr(user_profile, param), False)
|
|
|
|
|
|
|
|
# TODO: requires method consolidation, right now, there's no alternative
|
|
|
|
# for check_for_toggle_param for PATCH.
|
2017-11-05 10:51:25 +01:00
|
|
|
def check_for_toggle_param_patch(self, pattern: str, param: str) -> None:
|
2017-05-25 01:40:26 +02:00
|
|
|
self.login(self.example_email("hamlet"))
|
2017-05-07 17:21:26 +02:00
|
|
|
user_profile = self.example_user('hamlet')
|
2017-03-08 12:12:02 +01:00
|
|
|
json_result = self.client_patch(pattern,
|
|
|
|
{param: ujson.dumps(True)})
|
|
|
|
self.assert_json_success(json_result)
|
|
|
|
# refetch user_profile object to correctly handle caching
|
2017-05-07 17:21:26 +02:00
|
|
|
user_profile = self.example_user('hamlet')
|
2017-03-08 12:12:02 +01:00
|
|
|
self.assertEqual(getattr(user_profile, param), True)
|
|
|
|
|
|
|
|
json_result = self.client_patch(pattern,
|
|
|
|
{param: ujson.dumps(False)})
|
|
|
|
self.assert_json_success(json_result)
|
|
|
|
# refetch user_profile object to correctly handle caching
|
2017-05-07 17:21:26 +02:00
|
|
|
user_profile = self.example_user('hamlet')
|
2017-03-08 12:12:02 +01:00
|
|
|
self.assertEqual(getattr(user_profile, param), False)
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_successful_change_settings(self) -> None:
|
2017-03-08 12:12:02 +01:00
|
|
|
"""
|
2017-07-31 20:44:52 +02:00
|
|
|
A call to /json/settings with valid parameters changes the user's
|
2017-03-08 12:12:02 +01:00
|
|
|
settings correctly and returns correct values.
|
|
|
|
"""
|
2017-05-25 01:40:26 +02:00
|
|
|
self.login(self.example_email("hamlet"))
|
2017-07-31 20:44:52 +02:00
|
|
|
json_result = self.client_patch(
|
|
|
|
"/json/settings",
|
2017-03-08 12:12:02 +01:00
|
|
|
dict(
|
|
|
|
full_name='Foo Bar',
|
2017-05-25 01:40:26 +02:00
|
|
|
old_password=initial_password(self.example_email("hamlet")),
|
2017-03-08 12:12:02 +01:00
|
|
|
new_password='foobar1',
|
|
|
|
))
|
|
|
|
self.assert_json_success(json_result)
|
|
|
|
result = ujson.loads(json_result.content)
|
|
|
|
self.check_well_formed_change_settings_response(result)
|
2017-05-07 17:21:26 +02:00
|
|
|
self.assertEqual(self.example_user('hamlet').
|
2017-03-08 12:12:02 +01:00
|
|
|
full_name, "Foo Bar")
|
2017-04-18 03:23:32 +02:00
|
|
|
self.logout()
|
2017-05-25 01:40:26 +02:00
|
|
|
self.login(self.example_email("hamlet"), "foobar1")
|
2017-05-07 17:21:26 +02:00
|
|
|
user_profile = self.example_user('hamlet')
|
2019-05-26 22:12:46 +02:00
|
|
|
self.assert_logged_in_user_id(user_profile.id)
|
2017-03-08 12:12:02 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_illegal_name_changes(self) -> None:
|
2017-05-07 21:25:59 +02:00
|
|
|
user = self.example_user('hamlet')
|
|
|
|
email = user.email
|
2017-03-08 12:12:02 +01:00
|
|
|
self.login(email)
|
|
|
|
full_name = user.full_name
|
|
|
|
|
|
|
|
with self.settings(NAME_CHANGES_DISABLED=True):
|
2017-07-31 20:44:52 +02:00
|
|
|
json_result = self.client_patch("/json/settings",
|
|
|
|
dict(full_name='Foo Bar'))
|
2017-03-08 12:12:02 +01:00
|
|
|
|
|
|
|
# We actually fail silently here, since this only happens if
|
|
|
|
# somebody is trying to game our API, and there's no reason to
|
|
|
|
# give them the courtesy of an error reason.
|
|
|
|
self.assert_json_success(json_result)
|
|
|
|
|
2017-05-24 02:42:31 +02:00
|
|
|
user = self.example_user('hamlet')
|
2017-03-08 12:12:02 +01:00
|
|
|
self.assertEqual(user.full_name, full_name)
|
|
|
|
|
|
|
|
# Now try a too-long name
|
2017-07-31 20:44:52 +02:00
|
|
|
json_result = self.client_patch("/json/settings",
|
|
|
|
dict(full_name='x' * 1000))
|
2017-03-08 12:12:02 +01:00
|
|
|
self.assert_json_error(json_result, 'Name too long!')
|
|
|
|
|
2017-05-12 04:21:49 +02:00
|
|
|
# Now try a too-short name
|
2017-07-31 20:44:52 +02:00
|
|
|
json_result = self.client_patch("/json/settings",
|
|
|
|
dict(full_name='x'))
|
2017-05-12 04:21:49 +02:00
|
|
|
self.assert_json_error(json_result, 'Name too short!')
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_illegal_characters_in_name_changes(self) -> None:
|
2017-05-25 01:40:26 +02:00
|
|
|
email = self.example_email("hamlet")
|
2017-03-08 12:12:02 +01:00
|
|
|
self.login(email)
|
|
|
|
|
|
|
|
# Now try a name with invalid characters
|
2017-07-31 20:44:52 +02:00
|
|
|
json_result = self.client_patch("/json/settings",
|
|
|
|
dict(full_name='Opheli*'))
|
2017-03-08 12:12:02 +01:00
|
|
|
self.assert_json_error(json_result, 'Invalid characters in name!')
|
|
|
|
|
2018-05-04 18:15:54 +02:00
|
|
|
def test_change_email_to_disposable_email(self) -> None:
|
|
|
|
email = self.example_email("hamlet")
|
|
|
|
self.login(email)
|
|
|
|
realm = get_realm("zulip")
|
|
|
|
realm.disallow_disposable_email_addresses = True
|
2018-07-27 23:26:29 +02:00
|
|
|
realm.emails_restricted_to_domains = False
|
2018-05-04 18:15:54 +02:00
|
|
|
realm.save()
|
|
|
|
|
|
|
|
json_result = self.client_patch("/json/settings",
|
|
|
|
dict(email='hamlet@mailnator.com'))
|
|
|
|
self.assert_json_error(json_result, 'Please use your real email address.')
|
|
|
|
|
2017-03-08 12:12:02 +01:00
|
|
|
# This is basically a don't-explode test.
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_notify_settings(self) -> None:
|
2017-07-14 00:30:55 +02:00
|
|
|
for notification_setting in UserProfile.notification_setting_types:
|
2018-01-11 21:36:11 +01:00
|
|
|
# `notification_sound` is a string not a boolean, so this test
|
|
|
|
# doesn't work for it.
|
|
|
|
#
|
|
|
|
# TODO: Make this work more like do_test_realm_update_api
|
2019-02-01 14:08:45 +01:00
|
|
|
if notification_setting != 'notification_sound':
|
2018-01-11 21:36:11 +01:00
|
|
|
self.check_for_toggle_param_patch("/json/settings/notifications",
|
|
|
|
notification_setting)
|
|
|
|
|
|
|
|
def test_change_notification_sound(self) -> None:
|
|
|
|
pattern = "/json/settings/notifications"
|
|
|
|
param = "notification_sound"
|
|
|
|
user_profile = self.example_user('hamlet')
|
|
|
|
self.login(user_profile.email)
|
|
|
|
|
|
|
|
json_result = self.client_patch(pattern,
|
|
|
|
{param: ujson.dumps("invalid")})
|
|
|
|
self.assert_json_error(json_result, "Invalid notification sound 'invalid'")
|
|
|
|
|
|
|
|
json_result = self.client_patch(pattern,
|
|
|
|
{param: ujson.dumps("ding")})
|
|
|
|
self.assert_json_success(json_result)
|
|
|
|
|
|
|
|
# refetch user_profile object to correctly handle caching
|
|
|
|
user_profile = self.example_user('hamlet')
|
|
|
|
self.assertEqual(getattr(user_profile, param), "ding")
|
|
|
|
|
|
|
|
json_result = self.client_patch(pattern,
|
|
|
|
{param: ujson.dumps('zulip')})
|
|
|
|
|
|
|
|
self.assert_json_success(json_result)
|
|
|
|
# refetch user_profile object to correctly handle caching
|
|
|
|
user_profile = self.example_user('hamlet')
|
|
|
|
self.assertEqual(getattr(user_profile, param), 'zulip')
|
2017-03-08 12:12:02 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_toggling_boolean_user_display_settings(self) -> None:
|
2017-07-14 00:30:55 +02:00
|
|
|
"""Test updating each boolean setting in UserProfile property_types"""
|
|
|
|
boolean_settings = (s for s in UserProfile.property_types if UserProfile.property_types[s] is bool)
|
|
|
|
for display_setting in boolean_settings:
|
|
|
|
self.check_for_toggle_param_patch("/json/settings/display", display_setting)
|
2017-03-08 12:12:02 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_enter_sends_setting(self) -> None:
|
2017-03-08 12:12:02 +01:00
|
|
|
self.check_for_toggle_param('/json/users/me/enter-sends', "enter_sends")
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_wrong_old_password(self) -> None:
|
2017-05-25 01:40:26 +02:00
|
|
|
self.login(self.example_email("hamlet"))
|
2017-07-31 20:44:52 +02:00
|
|
|
result = self.client_patch(
|
|
|
|
"/json/settings",
|
2017-03-08 12:12:02 +01:00
|
|
|
dict(
|
|
|
|
old_password='bad_password',
|
|
|
|
new_password="ignored",
|
|
|
|
))
|
|
|
|
self.assert_json_error(result, "Wrong password!")
|
|
|
|
|
2018-05-29 07:25:08 +02:00
|
|
|
@override_settings(AUTHENTICATION_BACKENDS=('zproject.backends.ZulipLDAPAuthBackend',
|
|
|
|
'zproject.backends.EmailAuthBackend',
|
|
|
|
'zproject.backends.ZulipDummyBackend'),
|
|
|
|
AUTH_LDAP_BIND_PASSWORD='',
|
|
|
|
AUTH_LDAP_USER_DN_TEMPLATE='uid=%(user)s,ou=users,dc=zulip,dc=com')
|
|
|
|
def test_change_password_ldap_backend(self) -> None:
|
|
|
|
ldap_user_attr_map = {'full_name': 'fn', 'short_name': 'sn'}
|
|
|
|
ldap_patcher = patch('django_auth_ldap.config.ldap.initialize')
|
|
|
|
mock_initialize = ldap_patcher.start()
|
|
|
|
mock_ldap = MockLDAP()
|
|
|
|
mock_initialize.return_value = mock_ldap
|
|
|
|
|
|
|
|
mock_ldap.directory = {
|
|
|
|
'uid=hamlet,ou=users,dc=zulip,dc=com': {
|
2019-01-16 08:36:27 +01:00
|
|
|
'userPassword': ['ldappassword', ],
|
2018-05-29 07:25:08 +02:00
|
|
|
'fn': ['New LDAP fullname']
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
self.login(self.example_email("hamlet"))
|
|
|
|
with self.settings(LDAP_APPEND_DOMAIN="zulip.com",
|
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map):
|
|
|
|
result = self.client_patch(
|
|
|
|
"/json/settings",
|
|
|
|
dict(
|
|
|
|
old_password=initial_password(self.example_email("hamlet")),
|
|
|
|
new_password="ignored",
|
|
|
|
))
|
|
|
|
self.assert_json_error(result, "Your Zulip password is managed in LDAP")
|
|
|
|
|
|
|
|
result = self.client_patch(
|
|
|
|
"/json/settings",
|
|
|
|
dict(
|
|
|
|
old_password='ldappassword',
|
|
|
|
new_password="ignored",
|
|
|
|
))
|
|
|
|
self.assert_json_error(result, "Your Zulip password is managed in LDAP")
|
|
|
|
|
|
|
|
with self.settings(LDAP_APPEND_DOMAIN="example.com",
|
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map):
|
|
|
|
result = self.client_patch(
|
|
|
|
"/json/settings",
|
|
|
|
dict(
|
|
|
|
old_password=initial_password(self.example_email("hamlet")),
|
|
|
|
new_password="ignored",
|
|
|
|
))
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
with self.settings(LDAP_APPEND_DOMAIN=None,
|
|
|
|
AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map):
|
|
|
|
result = self.client_patch(
|
|
|
|
"/json/settings",
|
|
|
|
dict(
|
|
|
|
old_password=initial_password(self.example_email("hamlet")),
|
|
|
|
new_password="ignored",
|
|
|
|
))
|
|
|
|
self.assert_json_error(result, "Your Zulip password is managed in LDAP")
|
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_changing_nothing_returns_error(self) -> None:
|
2017-03-08 12:12:02 +01:00
|
|
|
"""
|
|
|
|
We need to supply at least one non-empty parameter
|
|
|
|
to this API, or it should fail. (Eventually, we should
|
|
|
|
probably use a patch interface for these changes.)
|
|
|
|
"""
|
2017-05-25 01:40:26 +02:00
|
|
|
self.login(self.example_email("hamlet"))
|
2017-07-31 20:44:52 +02:00
|
|
|
result = self.client_patch("/json/settings",
|
|
|
|
dict(old_password='ignored',))
|
2018-01-11 20:28:44 +01:00
|
|
|
self.assert_json_error(result, "Please fill out all fields.")
|
2017-03-08 12:12:02 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def do_test_change_user_display_setting(self, setting_name: str) -> None:
|
2017-03-08 12:12:02 +01:00
|
|
|
|
2017-07-14 00:30:55 +02:00
|
|
|
test_changes = dict(
|
|
|
|
default_language = 'de',
|
2018-07-20 09:28:32 +02:00
|
|
|
emojiset = 'google',
|
2017-07-14 00:30:55 +02:00
|
|
|
timezone = 'US/Mountain',
|
|
|
|
) # type: Dict[str, Any]
|
2017-03-08 12:20:56 +01:00
|
|
|
|
2017-05-24 02:42:31 +02:00
|
|
|
email = self.example_email('hamlet')
|
2017-03-14 10:53:09 +01:00
|
|
|
self.login(email)
|
2017-07-14 00:30:55 +02:00
|
|
|
test_value = test_changes.get(setting_name)
|
|
|
|
# Error if a setting in UserProfile.property_types does not have test values
|
|
|
|
if test_value is None:
|
2019-04-20 01:00:46 +02:00
|
|
|
raise AssertionError('No test created for %s' % (setting_name,))
|
2017-07-14 00:30:55 +02:00
|
|
|
invalid_value = 'invalid_' + setting_name
|
|
|
|
|
|
|
|
data = {setting_name: ujson.dumps(test_value)}
|
2017-03-14 10:53:09 +01:00
|
|
|
result = self.client_patch("/json/settings/display", data)
|
|
|
|
self.assert_json_success(result)
|
2017-05-24 02:42:31 +02:00
|
|
|
user_profile = self.example_user('hamlet')
|
2017-07-14 00:30:55 +02:00
|
|
|
self.assertEqual(getattr(user_profile, setting_name), test_value)
|
2017-03-14 10:53:09 +01:00
|
|
|
|
2017-07-14 00:30:55 +02:00
|
|
|
# Test to make sure invalid settings are not accepted
|
2017-03-14 10:53:09 +01:00
|
|
|
# and saved in the db.
|
2017-07-14 00:30:55 +02:00
|
|
|
data = {setting_name: ujson.dumps(invalid_value)}
|
2017-03-14 10:53:09 +01:00
|
|
|
result = self.client_patch("/json/settings/display", data)
|
2017-07-14 00:30:55 +02:00
|
|
|
# the json error for multiple word setting names (ex: default_language)
|
|
|
|
# displays as 'Invalid language'. Using setting_name.split('_') to format.
|
|
|
|
self.assert_json_error(result, "Invalid %s '%s'" % (setting_name.split('_')[-1],
|
|
|
|
invalid_value))
|
2017-05-24 02:42:31 +02:00
|
|
|
user_profile = self.example_user('hamlet')
|
2017-07-14 00:30:55 +02:00
|
|
|
self.assertNotEqual(getattr(user_profile, setting_name), invalid_value)
|
2017-03-14 10:53:09 +01:00
|
|
|
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_change_user_display_setting(self) -> None:
|
2017-07-14 00:30:55 +02:00
|
|
|
"""Test updating each non-boolean setting in UserProfile property_types"""
|
|
|
|
user_settings = (s for s in UserProfile.property_types if UserProfile.property_types[s] is not bool)
|
|
|
|
for setting in user_settings:
|
|
|
|
self.do_test_change_user_display_setting(setting)
|
2017-04-02 21:05:33 +02:00
|
|
|
|
2018-07-20 09:28:32 +02:00
|
|
|
def do_change_emojiset(self, emojiset: str) -> HttpResponse:
|
|
|
|
email = self.example_email('hamlet')
|
|
|
|
self.login(email)
|
|
|
|
data = {'emojiset': ujson.dumps(emojiset)}
|
|
|
|
result = self.client_patch("/json/settings/display", data)
|
|
|
|
return result
|
|
|
|
|
|
|
|
def test_emojiset(self) -> None:
|
|
|
|
"""Test banned emojisets are not accepted."""
|
2018-08-25 09:18:49 +02:00
|
|
|
banned_emojisets = ['apple', 'emojione']
|
|
|
|
valid_emojisets = ['google', 'google-blob', 'text', 'twitter']
|
2018-07-20 09:28:32 +02:00
|
|
|
|
|
|
|
for emojiset in banned_emojisets:
|
|
|
|
result = self.do_change_emojiset(emojiset)
|
2019-04-20 01:00:46 +02:00
|
|
|
self.assert_json_error(result, "Invalid emojiset '%s'" % (emojiset,))
|
2018-07-20 09:28:32 +02:00
|
|
|
|
|
|
|
for emojiset in valid_emojisets:
|
|
|
|
result = self.do_change_emojiset(emojiset)
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
2019-04-29 08:41:00 +02:00
|
|
|
def test_avatar_changes_disabled(self) -> None:
|
|
|
|
user = self.example_user('hamlet')
|
|
|
|
email = user.email
|
|
|
|
self.login(email)
|
|
|
|
|
|
|
|
with self.settings(AVATAR_CHANGES_DISABLED=True):
|
|
|
|
result = self.client_delete("/json/users/me/avatar")
|
|
|
|
self.assert_json_error(result, "Avatar changes are disabled in this organization.", 400)
|
|
|
|
|
|
|
|
with self.settings(AVATAR_CHANGES_DISABLED=True):
|
|
|
|
with get_test_image_file('img.png') as fp1:
|
|
|
|
result = self.client_post("/json/users/me/avatar", {'f1': fp1})
|
|
|
|
self.assert_json_error(result, "Avatar changes are disabled in this organization.", 400)
|
2017-04-02 21:05:33 +02:00
|
|
|
|
2017-03-08 12:20:56 +01:00
|
|
|
class UserChangesTest(ZulipTestCase):
|
2017-11-05 10:51:25 +01:00
|
|
|
def test_update_api_key(self) -> None:
|
2017-05-07 21:25:59 +02:00
|
|
|
user = self.example_user('hamlet')
|
|
|
|
email = user.email
|
2019-01-05 02:25:06 +01:00
|
|
|
|
2017-03-08 12:20:56 +01:00
|
|
|
self.login(email)
|
2018-08-01 10:53:40 +02:00
|
|
|
old_api_keys = get_all_api_keys(user)
|
2019-01-05 02:25:06 +01:00
|
|
|
# Ensure the old API keys are in the authentication cache, so
|
|
|
|
# that the below logic can test whether we have a cache-flushing bug.
|
|
|
|
for api_key in old_api_keys:
|
|
|
|
self.assertEqual(get_user_profile_by_api_key(api_key).email, email)
|
|
|
|
|
2017-03-08 12:20:56 +01:00
|
|
|
result = self.client_post('/json/users/me/api_key/regenerate')
|
|
|
|
self.assert_json_success(result)
|
2017-08-17 08:44:10 +02:00
|
|
|
new_api_key = result.json()['api_key']
|
2018-08-01 10:53:40 +02:00
|
|
|
self.assertNotIn(new_api_key, old_api_keys)
|
2017-05-24 02:42:31 +02:00
|
|
|
user = self.example_user('hamlet')
|
2018-08-01 10:53:40 +02:00
|
|
|
current_api_keys = get_all_api_keys(user)
|
|
|
|
self.assertIn(new_api_key, current_api_keys)
|
2019-01-05 02:16:38 +01:00
|
|
|
|
|
|
|
for api_key in old_api_keys:
|
|
|
|
with self.assertRaises(UserProfile.DoesNotExist):
|
|
|
|
get_user_profile_by_api_key(api_key)
|
|
|
|
|
|
|
|
for api_key in current_api_keys:
|
|
|
|
self.assertEqual(get_user_profile_by_api_key(api_key).email, email)
|