import time from typing import Any, Dict from unittest import mock import orjson from django.http import HttpRequest, HttpResponse from django.test import override_settings from zerver.lib.initial_password import initial_password from zerver.lib.rate_limiter import add_ratelimit_rule, remove_ratelimit_rule from zerver.lib.test_classes import ZulipTestCase from zerver.lib.test_helpers import get_test_image_file from zerver.lib.users import get_all_api_keys from zerver.models import UserProfile, get_user_profile_by_api_key class ChangeSettingsTest(ZulipTestCase): def check_well_formed_change_settings_response(self, result: Dict[str, Any]) -> None: self.assertIn("full_name", result) # DEPRECATED, to be deleted after all uses of check_for_toggle_param # are converted into check_for_toggle_param_patch. def check_for_toggle_param(self, pattern: str, param: str) -> None: self.login("hamlet") user_profile = self.example_user("hamlet") json_result = self.client_post(pattern, {param: orjson.dumps(True).decode()}) self.assert_json_success(json_result) # refetch user_profile object to correctly handle caching user_profile = self.example_user("hamlet") self.assertEqual(getattr(user_profile, param), True) json_result = self.client_post(pattern, {param: orjson.dumps(False).decode()}) self.assert_json_success(json_result) # refetch user_profile object to correctly handle caching user_profile = self.example_user("hamlet") self.assertEqual(getattr(user_profile, param), False) # TODO: requires method consolidation, right now, there's no alternative # for check_for_toggle_param for PATCH. def check_for_toggle_param_patch(self, pattern: str, param: str) -> None: self.login("hamlet") user_profile = self.example_user("hamlet") json_result = self.client_patch(pattern, {param: orjson.dumps(True).decode()}) self.assert_json_success(json_result) # refetch user_profile object to correctly handle caching user_profile = self.example_user("hamlet") self.assertEqual(getattr(user_profile, param), True) json_result = self.client_patch(pattern, {param: orjson.dumps(False).decode()}) self.assert_json_success(json_result) # refetch user_profile object to correctly handle caching user_profile = self.example_user("hamlet") self.assertEqual(getattr(user_profile, param), False) def test_successful_change_settings(self) -> None: """ A call to /json/settings with valid parameters changes the user's settings correctly and returns correct values. """ user = self.example_user("hamlet") self.login_user(user) json_result = self.client_patch( "/json/settings", dict( full_name="Foo Bar", old_password=initial_password(user.delivery_email), new_password="foobar1", ), ) self.assert_json_success(json_result) result = orjson.loads(json_result.content) self.check_well_formed_change_settings_response(result) user.refresh_from_db() self.assertEqual(user.full_name, "Foo Bar") self.logout() # This is one of the few places we log in directly # with Django's client (to test the password change # with as few moving parts as possible). request = HttpRequest() request.session = self.client.session self.assertTrue( self.client.login( request=request, username=user.delivery_email, password="foobar1", realm=user.realm, ), ) self.assert_logged_in_user_id(user.id) def test_password_change_check_strength(self) -> None: self.login("hamlet") with self.settings(PASSWORD_MIN_LENGTH=3, PASSWORD_MIN_GUESSES=1000): json_result = self.client_patch( "/json/settings", dict( full_name="Foo Bar", old_password=initial_password(self.example_email("hamlet")), new_password="easy", ), ) self.assert_json_error(json_result, "New password is too weak!") json_result = self.client_patch( "/json/settings", dict( full_name="Foo Bar", old_password=initial_password(self.example_email("hamlet")), new_password="f657gdGGk9", ), ) self.assert_json_success(json_result) def test_illegal_name_changes(self) -> None: user = self.example_user("hamlet") self.login_user(user) full_name = user.full_name with self.settings(NAME_CHANGES_DISABLED=True): json_result = self.client_patch("/json/settings", dict(full_name="Foo Bar")) # We actually fail silently here, since this only happens if # somebody is trying to game our API, and there's no reason to # give them the courtesy of an error reason. self.assert_json_success(json_result) user = self.example_user("hamlet") self.assertEqual(user.full_name, full_name) # Now try a too-long name json_result = self.client_patch("/json/settings", dict(full_name="x" * 1000)) self.assert_json_error(json_result, "Name too long!") # Now try a too-short name json_result = self.client_patch("/json/settings", dict(full_name="x")) self.assert_json_error(json_result, "Name too short!") def test_illegal_characters_in_name_changes(self) -> None: self.login("hamlet") # Now try a name with invalid characters json_result = self.client_patch("/json/settings", dict(full_name="Opheli*")) self.assert_json_error(json_result, "Invalid characters in name!") def test_change_email_to_disposable_email(self) -> None: hamlet = self.example_user("hamlet") self.login_user(hamlet) realm = hamlet.realm realm.disallow_disposable_email_addresses = True realm.emails_restricted_to_domains = False realm.save() json_result = self.client_patch("/json/settings", dict(email="hamlet@mailnator.com")) self.assert_json_error(json_result, "Please use your real email address.") # This is basically a don't-explode test. def test_notify_settings(self) -> None: for notification_setting in UserProfile.notification_setting_types: # `notification_sound` is a string not a boolean, so this test # doesn't work for it. # # TODO: Make this work more like do_test_realm_update_api if notification_setting != "notification_sound": self.check_for_toggle_param_patch( "/json/settings/notifications", notification_setting ) def test_change_notification_sound(self) -> None: pattern = "/json/settings/notifications" param = "notification_sound" user_profile = self.example_user("hamlet") self.login_user(user_profile) json_result = self.client_patch(pattern, {param: orjson.dumps("invalid").decode()}) self.assert_json_error(json_result, "Invalid notification sound 'invalid'") json_result = self.client_patch(pattern, {param: orjson.dumps("ding").decode()}) self.assert_json_success(json_result) # refetch user_profile object to correctly handle caching user_profile = self.example_user("hamlet") self.assertEqual(getattr(user_profile, param), "ding") json_result = self.client_patch(pattern, {param: orjson.dumps("zulip").decode()}) self.assert_json_success(json_result) # refetch user_profile object to correctly handle caching user_profile = self.example_user("hamlet") self.assertEqual(getattr(user_profile, param), "zulip") def test_toggling_boolean_user_display_settings(self) -> None: """Test updating each boolean setting in UserProfile property_types""" boolean_settings = ( s for s in UserProfile.property_types if UserProfile.property_types[s] is bool ) for display_setting in boolean_settings: self.check_for_toggle_param_patch("/json/settings/display", display_setting) def test_enter_sends_setting(self) -> None: self.check_for_toggle_param("/json/users/me/enter-sends", "enter_sends") def test_wrong_old_password(self) -> None: self.login("hamlet") result = self.client_patch( "/json/settings", dict( old_password="bad_password", new_password="ignored", ), ) self.assert_json_error(result, "Wrong password!") def test_wrong_old_password_rate_limiter(self) -> None: self.login("hamlet") with self.settings(RATE_LIMITING_AUTHENTICATE=True): add_ratelimit_rule(10, 2, domain="authenticate_by_username") start_time = time.time() with mock.patch("time.time", return_value=start_time): result = self.client_patch( "/json/settings", dict( old_password="bad_password", new_password="ignored", ), ) self.assert_json_error(result, "Wrong password!") result = self.client_patch( "/json/settings", dict( old_password="bad_password", new_password="ignored", ), ) self.assert_json_error(result, "Wrong password!") # We're over the limit, so we'll get blocked even with the correct password. result = self.client_patch( "/json/settings", dict( old_password=initial_password(self.example_email("hamlet")), new_password="ignored", ), ) self.assert_json_error( result, "You're making too many attempts! Try again in 10 seconds." ) # After time passes, we should be able to succeed if we give the correct password. with mock.patch("time.time", return_value=start_time + 11): json_result = self.client_patch( "/json/settings", dict( old_password=initial_password(self.example_email("hamlet")), new_password="foobar1", ), ) self.assert_json_success(json_result) remove_ratelimit_rule(10, 2, domain="authenticate_by_username") @override_settings( AUTHENTICATION_BACKENDS=( "zproject.backends.ZulipLDAPAuthBackend", "zproject.backends.EmailAuthBackend", "zproject.backends.ZulipDummyBackend", ) ) def test_change_password_ldap_backend(self) -> None: self.init_default_ldap_database() ldap_user_attr_map = {"full_name": "cn", "short_name": "sn"} self.login("hamlet") with self.settings( LDAP_APPEND_DOMAIN="zulip.com", AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map ): result = self.client_patch( "/json/settings", dict( old_password=initial_password(self.example_email("hamlet")), new_password="ignored", ), ) self.assert_json_error(result, "Your Zulip password is managed in LDAP") result = self.client_patch( "/json/settings", dict( old_password=self.ldap_password("hamlet"), # hamlet's password in LDAP new_password="ignored", ), ) self.assert_json_error(result, "Your Zulip password is managed in LDAP") with self.settings( LDAP_APPEND_DOMAIN="example.com", AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map ), self.assertLogs("zulip.ldap", "DEBUG") as debug_log: result = self.client_patch( "/json/settings", dict( old_password=initial_password(self.example_email("hamlet")), new_password="ignored", ), ) self.assert_json_success(result) self.assertEqual( debug_log.output, [ "DEBUG:zulip.ldap:ZulipLDAPAuthBackend: Email hamlet@zulip.com does not match LDAP domain example.com." ], ) with self.settings(LDAP_APPEND_DOMAIN=None, AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map): result = self.client_patch( "/json/settings", dict( old_password=initial_password(self.example_email("hamlet")), new_password="ignored", ), ) self.assert_json_error(result, "Your Zulip password is managed in LDAP") def test_changing_nothing_returns_error(self) -> None: """ We need to supply at least one non-empty parameter to this API, or it should fail. (Eventually, we should probably use a patch interface for these changes.) """ self.login("hamlet") result = self.client_patch("/json/settings", dict(old_password="ignored")) self.assert_json_error(result, "Please fill out all fields.") def do_test_change_user_display_setting(self, setting_name: str) -> None: test_changes: Dict[str, Any] = dict( default_language="de", default_view="all_messages", emojiset="google", timezone="US/Mountain", demote_inactive_streams=2, color_scheme=2, ) self.login("hamlet") test_value = test_changes.get(setting_name) # Error if a setting in UserProfile.property_types does not have test values if test_value is None: raise AssertionError(f"No test created for {setting_name}") if isinstance(test_value, int): invalid_value: Any = 100 else: invalid_value = "invalid_" + setting_name data = {setting_name: orjson.dumps(test_value).decode()} result = self.client_patch("/json/settings/display", data) self.assert_json_success(result) user_profile = self.example_user("hamlet") self.assertEqual(getattr(user_profile, setting_name), test_value) # Test to make sure invalid settings are not accepted # and saved in the db. data = {setting_name: orjson.dumps(invalid_value).decode()} result = self.client_patch("/json/settings/display", data) # the json error for multiple word setting names (ex: default_language) # displays as 'Invalid language'. Using setting_name.split('_') to format. self.assert_json_error(result, f"Invalid {setting_name}") user_profile = self.example_user("hamlet") self.assertNotEqual(getattr(user_profile, setting_name), invalid_value) def test_change_user_display_setting(self) -> None: """Test updating each non-boolean setting in UserProfile property_types""" user_settings = ( s for s in UserProfile.property_types if UserProfile.property_types[s] is not bool ) for setting in user_settings: self.do_test_change_user_display_setting(setting) def do_change_emojiset(self, emojiset: str) -> HttpResponse: self.login("hamlet") data = {"emojiset": orjson.dumps(emojiset).decode()} result = self.client_patch("/json/settings/display", data) return result def test_emojiset(self) -> None: """Test banned emojisets are not accepted.""" banned_emojisets = ["apple", "emojione"] valid_emojisets = ["google", "google-blob", "text", "twitter"] for emojiset in banned_emojisets: result = self.do_change_emojiset(emojiset) self.assert_json_error(result, "Invalid emojiset") for emojiset in valid_emojisets: result = self.do_change_emojiset(emojiset) self.assert_json_success(result) def test_avatar_changes_disabled(self) -> None: self.login("hamlet") with self.settings(AVATAR_CHANGES_DISABLED=True): result = self.client_delete("/json/users/me/avatar") self.assert_json_error(result, "Avatar changes are disabled in this organization.", 400) with self.settings(AVATAR_CHANGES_DISABLED=True): with get_test_image_file("img.png") as fp1: result = self.client_post("/json/users/me/avatar", {"f1": fp1}) self.assert_json_error(result, "Avatar changes are disabled in this organization.", 400) class UserChangesTest(ZulipTestCase): def test_update_api_key(self) -> None: user = self.example_user("hamlet") email = user.email self.login_user(user) old_api_keys = get_all_api_keys(user) # Ensure the old API keys are in the authentication cache, so # that the below logic can test whether we have a cache-flushing bug. for api_key in old_api_keys: self.assertEqual(get_user_profile_by_api_key(api_key).email, email) result = self.client_post("/json/users/me/api_key/regenerate") self.assert_json_success(result) new_api_key = result.json()["api_key"] self.assertNotIn(new_api_key, old_api_keys) user = self.example_user("hamlet") current_api_keys = get_all_api_keys(user) self.assertIn(new_api_key, current_api_keys) for api_key in old_api_keys: with self.assertRaises(UserProfile.DoesNotExist): get_user_profile_by_api_key(api_key) for api_key in current_api_keys: self.assertEqual(get_user_profile_by_api_key(api_key).email, email)