import importlib import os from typing import List, Optional import django.urls.resolvers from django.test import Client from zerver.lib.test_classes import ZulipTestCase from zerver.models import Realm, Stream from zproject import urls class PublicURLTest(ZulipTestCase): """ Account creation URLs are accessible even when not logged in. Authenticated URLs redirect to a page. """ def fetch(self, method: str, urls: List[str], expected_status: int) -> None: for url in urls: # e.g. self.client_post(url) if method is "post" response = getattr(self, method)(url) self.assertEqual( response.status_code, expected_status, msg=f"Expected {expected_status}, received {response.status_code} for {method} to {url}", ) def test_public_urls(self) -> None: """ Test which views are accessible when not logged in. """ # FIXME: We should also test the Tornado URLs -- this codepath # can't do so because this Django test mechanism doesn't go # through Tornado. denmark_stream_id = Stream.objects.get(name="Denmark").id get_urls = { 200: [ "/accounts/home/", "/accounts/login/", "/en/accounts/home/", "/ru/accounts/home/", "/en/accounts/login/", "/ru/accounts/login/", "/help/", ], 302: [ # These 302 because they redirect to the spectator experience. "/", "/en/", "/ru/", ], 400: [ "/json/messages", ], 401: [ f"/json/streams/{denmark_stream_id}/members", "/api/v1/users/me/subscriptions", "/api/v1/messages", "/api/v1/streams", ], 404: ["/help/nonexistent", "/help/include/admin", "/help/" + "z" * 1000], } # Add all files in 'templates/zerver/help' directory (except for 'main.html' and # 'index.md') to `get_urls['200']` list. for doc in os.listdir("./templates/zerver/help"): if doc.startswith(".") or "~" in doc or "#" in doc: continue # nocoverage -- just here for convenience if doc not in {"main.html", "index.md", "include", "missing.md"}: get_urls[200].append("/help/" + os.path.splitext(doc)[0]) # Strip the extension. post_urls = { 200: ["/accounts/login/"], 302: ["/accounts/logout/"], 401: [ "/json/messages", "/json/invites", "/json/subscriptions/exists", "/api/v1/users/me/subscriptions/properties", "/json/fetch_api_key", "/json/users/me/subscriptions", "/api/v1/users/me/subscriptions", "/json/export/realm", ], 400: [ "/api/v1/external/github", "/api/v1/fetch_api_key", ], } patch_urls = { 401: ["/json/settings"], } for status_code, url_set in get_urls.items(): self.fetch("client_get", url_set, status_code) for status_code, url_set in post_urls.items(): self.fetch("client_post", url_set, status_code) for status_code, url_set in patch_urls.items(): self.fetch("client_patch", url_set, status_code) def test_config_error_endpoints_dev_env(self) -> None: """ The content of these pages is tested separately. Here we simply sanity-check that all the URLs load correctly. """ auth_types = [auth.lower() for auth in Realm.AUTHENTICATION_FLAGS] for auth in [ "azuread", "email", "remoteuser", # The endpoint is generated dynamically based on the configuration of the OIDC backend, # so it can't be tested here. "openid connect", ]: # We do not have configerror pages for AzureAD and Email. auth_types.remove(auth) auth_types += [ "smtp", "remoteuser/remote_user_backend_disabled", "remoteuser/remote_user_header_missing", ] urls = [f"/config-error/{auth_type}" for auth_type in auth_types] with self.settings(DEVELOPMENT=True): for url in urls: response = self.client_get(url) self.assert_in_success_response(["Configuration error"], response) class URLResolutionTest(ZulipTestCase): def get_callback_string(self, pattern: django.urls.resolvers.URLPattern) -> Optional[str]: callback_str = hasattr(pattern, "lookup_str") and "lookup_str" callback_str = callback_str or "_callback_str" return getattr(pattern, callback_str, None) def check_function_exists(self, module_name: str, view: str) -> None: module = importlib.import_module(module_name) self.assertTrue(hasattr(module, view), f"View {module_name}.{view} does not exist") # Tests function-based views declared in urls.urlpatterns for # whether the function exists. We at present do not test the # class-based views. def test_non_api_url_resolution(self) -> None: for pattern in urls.urlpatterns: callback_str = self.get_callback_string(pattern) if callback_str: (module_name, base_view) = callback_str.rsplit(".", 1) self.check_function_exists(module_name, base_view) class ErrorPageTest(ZulipTestCase): def test_bogus_http_host(self) -> None: # This tests that we've successfully worked around a certain bug in # Django's exception handling. The enforce_csrf_checks=True, # secure=True, and HTTP_REFERER with an `https:` scheme are all # there to get us down just the right path for Django to blow up # when presented with an HTTP_HOST that's not a valid DNS name. client = Client(enforce_csrf_checks=True) result = client.post( "/json/users", secure=True, HTTP_REFERER="https://somewhere", HTTP_HOST="$nonsense" ) self.assertEqual(result.status_code, 400)