import time from datetime import datetime, timezone from typing import Any, Dict from unittest import mock import orjson from django.http import HttpRequest, HttpResponse from django.test import override_settings from zerver.lib.initial_password import initial_password from zerver.lib.rate_limiter import add_ratelimit_rule, remove_ratelimit_rule from zerver.lib.test_classes import ZulipTestCase from zerver.lib.test_helpers import get_test_image_file from zerver.lib.users import get_all_api_keys from zerver.models import ( Draft, NotificationTriggers, ScheduledMessageNotificationEmail, UserProfile, get_user_profile_by_api_key, ) class ChangeSettingsTest(ZulipTestCase): # TODO: requires method consolidation, right now, there's no alternative # for check_for_toggle_param for PATCH. def check_for_toggle_param_patch(self, pattern: str, param: str) -> None: self.login("hamlet") user_profile = self.example_user("hamlet") json_result = self.client_patch(pattern, {param: orjson.dumps(True).decode()}) self.assert_json_success(json_result) # refetch user_profile object to correctly handle caching user_profile = self.example_user("hamlet") self.assertEqual(getattr(user_profile, param), True) json_result = self.client_patch(pattern, {param: orjson.dumps(False).decode()}) self.assert_json_success(json_result) # refetch user_profile object to correctly handle caching user_profile = self.example_user("hamlet") self.assertEqual(getattr(user_profile, param), False) def test_successful_change_settings(self) -> None: """ A call to /json/settings with valid parameters changes the user's settings correctly and returns correct values. """ user = self.example_user("hamlet") self.login_user(user) json_result = self.client_patch( "/json/settings", dict( full_name="Foo Bar", old_password=initial_password(user.delivery_email), new_password="foobar1", ), ) self.assert_json_success(json_result) user.refresh_from_db() self.assertEqual(user.full_name, "Foo Bar") self.logout() # This is one of the few places we log in directly # with Django's client (to test the password change # with as few moving parts as possible). request = HttpRequest() request.session = self.client.session self.assertTrue( self.client.login( request=request, username=user.delivery_email, password="foobar1", realm=user.realm, ), ) self.assert_logged_in_user_id(user.id) def test_password_change_check_strength(self) -> None: self.login("hamlet") with self.settings(PASSWORD_MIN_LENGTH=3, PASSWORD_MIN_GUESSES=1000): json_result = self.client_patch( "/json/settings", dict( full_name="Foo Bar", old_password=initial_password(self.example_email("hamlet")), new_password="easy", ), ) self.assert_json_error(json_result, "New password is too weak!") json_result = self.client_patch( "/json/settings", dict( full_name="Foo Bar", old_password=initial_password(self.example_email("hamlet")), new_password="f657gdGGk9", ), ) self.assert_json_success(json_result) def test_illegal_name_changes(self) -> None: user = self.example_user("hamlet") self.login_user(user) full_name = user.full_name with self.settings(NAME_CHANGES_DISABLED=True): json_result = self.client_patch("/json/settings", dict(full_name="Foo Bar")) # We actually fail silently here, since this only happens if # somebody is trying to game our API, and there's no reason to # give them the courtesy of an error reason. self.assert_json_success(json_result) user = self.example_user("hamlet") self.assertEqual(user.full_name, full_name) # Now try a too-long name json_result = self.client_patch("/json/settings", dict(full_name="x" * 1000)) self.assert_json_error(json_result, "Name too long!") # Now try a too-short name json_result = self.client_patch("/json/settings", dict(full_name="x")) self.assert_json_error(json_result, "Name too short!") def test_illegal_characters_in_name_changes(self) -> None: self.login("hamlet") # Now try a name with invalid characters json_result = self.client_patch("/json/settings", dict(full_name="Opheli*")) self.assert_json_error(json_result, "Invalid characters in name!") def test_change_email_to_disposable_email(self) -> None: hamlet = self.example_user("hamlet") self.login_user(hamlet) realm = hamlet.realm realm.disallow_disposable_email_addresses = True realm.emails_restricted_to_domains = False realm.save() json_result = self.client_patch("/json/settings", dict(email="hamlet@mailnator.com")) self.assert_json_error(json_result, "Please use your real email address.") def test_change_email_batching_period(self) -> None: hamlet = self.example_user("hamlet") cordelia = self.example_user("cordelia") othello = self.example_user("othello") self.login_user(hamlet) # Default is two minutes self.assertEqual(hamlet.email_notifications_batching_period_seconds, 120) result = self.client_patch( "/json/settings", {"email_notifications_batching_period_seconds": -1} ) self.assert_json_error(result, "Invalid email batching period: -1 seconds") result = self.client_patch( "/json/settings", {"email_notifications_batching_period_seconds": 7 * 24 * 60 * 60 + 10} ) self.assert_json_error(result, "Invalid email batching period: 604810 seconds") result = self.client_patch( "/json/settings", {"email_notifications_batching_period_seconds": 5 * 60} ) self.assert_json_success(result) hamlet = self.example_user("hamlet") self.assertEqual(hamlet.email_notifications_batching_period_seconds, 300) # Test that timestamps get updated for existing ScheduledMessageNotificationEmail rows hamlet_msg_id1 = self.send_stream_message(sender=cordelia, stream_name="Verona") hamlet_msg_id2 = self.send_stream_message(sender=cordelia, stream_name="Verona") othello_msg_id1 = self.send_stream_message(sender=cordelia, stream_name="Verona") def create_entry(user_profile_id: int, message_id: int, timestamp: datetime) -> int: # The above messages don't actually mention anyone. We just fill up the trigger # because we need to. entry = ScheduledMessageNotificationEmail.objects.create( user_profile_id=user_profile_id, message_id=message_id, trigger=NotificationTriggers.MENTION, scheduled_timestamp=timestamp, ) return entry.id def get_datetime_object(minutes: int) -> datetime: return datetime( year=2021, month=8, day=10, hour=10, minute=minutes, second=15, tzinfo=timezone.utc ) hamlet_timestamp = get_datetime_object(10) othello_timestamp = get_datetime_object(20) hamlet_entry1_id = create_entry(hamlet.id, hamlet_msg_id1, hamlet_timestamp) hamlet_entry2_id = create_entry(hamlet.id, hamlet_msg_id2, hamlet_timestamp) othello_entry1_id = create_entry(othello.id, othello_msg_id1, othello_timestamp) # Update Hamlet's setting from 300 seconds (5 minutes) to 600 seconds (10 minutes) self.assertEqual(hamlet.email_notifications_batching_period_seconds, 300) result = self.client_patch( "/json/settings", {"email_notifications_batching_period_seconds": 10 * 60} ) self.assert_json_success(result) hamlet = self.example_user("hamlet") self.assertEqual(hamlet.email_notifications_batching_period_seconds, 10 * 60) def check_scheduled_timestamp(entry_id: int, expected_timestamp: datetime) -> None: entry = ScheduledMessageNotificationEmail.objects.get(id=entry_id) self.assertEqual(entry.scheduled_timestamp, expected_timestamp) # For Hamlet, the new scheduled timestamp should have been updated expected_hamlet_timestamp = get_datetime_object(15) check_scheduled_timestamp(hamlet_entry1_id, expected_hamlet_timestamp) check_scheduled_timestamp(hamlet_entry2_id, expected_hamlet_timestamp) # Nothing should have changed for Othello check_scheduled_timestamp(othello_entry1_id, othello_timestamp) def test_toggling_boolean_user_settings(self) -> None: """Test updating each boolean setting in UserProfile property_types""" boolean_settings = ( s for s in UserProfile.property_types if UserProfile.property_types[s] is bool ) for user_setting in boolean_settings: self.check_for_toggle_param_patch("/json/settings", user_setting) def test_wrong_old_password(self) -> None: self.login("hamlet") result = self.client_patch( "/json/settings", dict( old_password="bad_password", new_password="ignored", ), ) self.assert_json_error(result, "Wrong password!") def test_wrong_old_password_rate_limiter(self) -> None: self.login("hamlet") with self.settings(RATE_LIMITING_AUTHENTICATE=True): add_ratelimit_rule(10, 2, domain="authenticate_by_username") start_time = time.time() with mock.patch("time.time", return_value=start_time): result = self.client_patch( "/json/settings", dict( old_password="bad_password", new_password="ignored", ), ) self.assert_json_error(result, "Wrong password!") result = self.client_patch( "/json/settings", dict( old_password="bad_password", new_password="ignored", ), ) self.assert_json_error(result, "Wrong password!") # We're over the limit, so we'll get blocked even with the correct password. result = self.client_patch( "/json/settings", dict( old_password=initial_password(self.example_email("hamlet")), new_password="ignored", ), ) self.assert_json_error( result, "You're making too many attempts! Try again in 10 seconds." ) # After time passes, we should be able to succeed if we give the correct password. with mock.patch("time.time", return_value=start_time + 11): json_result = self.client_patch( "/json/settings", dict( old_password=initial_password(self.example_email("hamlet")), new_password="foobar1", ), ) self.assert_json_success(json_result) remove_ratelimit_rule(10, 2, domain="authenticate_by_username") @override_settings( AUTHENTICATION_BACKENDS=( "zproject.backends.ZulipLDAPAuthBackend", "zproject.backends.EmailAuthBackend", "zproject.backends.ZulipDummyBackend", ) ) def test_change_password_ldap_backend(self) -> None: self.init_default_ldap_database() ldap_user_attr_map = {"full_name": "cn", "short_name": "sn"} self.login("hamlet") with self.settings( LDAP_APPEND_DOMAIN="zulip.com", AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map ): result = self.client_patch( "/json/settings", dict( old_password=initial_password(self.example_email("hamlet")), new_password="ignored", ), ) self.assert_json_error(result, "Your Zulip password is managed in LDAP") result = self.client_patch( "/json/settings", dict( old_password=self.ldap_password("hamlet"), # hamlet's password in LDAP new_password="ignored", ), ) self.assert_json_error(result, "Your Zulip password is managed in LDAP") with self.settings( LDAP_APPEND_DOMAIN="example.com", AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map ), self.assertLogs("zulip.ldap", "DEBUG") as debug_log: result = self.client_patch( "/json/settings", dict( old_password=initial_password(self.example_email("hamlet")), new_password="ignored", ), ) self.assert_json_success(result) self.assertEqual( debug_log.output, [ "DEBUG:zulip.ldap:ZulipLDAPAuthBackend: Email hamlet@zulip.com does not match LDAP domain example.com." ], ) with self.settings(LDAP_APPEND_DOMAIN=None, AUTH_LDAP_USER_ATTR_MAP=ldap_user_attr_map): result = self.client_patch( "/json/settings", dict( old_password=initial_password(self.example_email("hamlet")), new_password="ignored", ), ) self.assert_json_error(result, "Your Zulip password is managed in LDAP") def do_test_change_user_setting(self, setting_name: str) -> None: test_changes: Dict[str, Any] = dict( default_language="de", default_view="all_messages", emojiset="google", timezone="US/Mountain", demote_inactive_streams=2, color_scheme=2, email_notifications_batching_period_seconds=100, notification_sound="ding", desktop_icon_count_display=2, ) self.login("hamlet") test_value = test_changes.get(setting_name) # Error if a setting in UserProfile.property_types does not have test values if test_value is None: raise AssertionError(f"No test created for {setting_name}") if setting_name not in ["demote_inactive_streams", "color_scheme"]: data = {setting_name: test_value} else: data = {setting_name: orjson.dumps(test_value).decode()} result = self.client_patch("/json/settings", data) self.assert_json_success(result) user_profile = self.example_user("hamlet") self.assertEqual(getattr(user_profile, setting_name), test_value) def test_change_user_setting(self) -> None: """Test updating each non-boolean setting in UserProfile property_types""" user_settings = ( s for s in UserProfile.property_types if UserProfile.property_types[s] is not bool ) for setting in user_settings: self.do_test_change_user_setting(setting) self.do_test_change_user_setting("timezone") def test_invalid_setting_value(self) -> None: invalid_values_dict = dict( default_language="invalid_de", default_view="invalid_view", emojiset="apple", timezone="invalid_US/Mountain", demote_inactive_streams=10, color_scheme=10, notification_sound="invalid_sound", desktop_icon_count_display=10, ) self.login("hamlet") for setting_name in invalid_values_dict.keys(): invalid_value = invalid_values_dict.get(setting_name) if isinstance(invalid_value, str): invalid_value = orjson.dumps(invalid_value).decode() req = {setting_name: invalid_value} result = self.client_patch("/json/settings", req) expected_error_msg = f"Invalid {setting_name}" if setting_name == "notification_sound": expected_error_msg = f"Invalid notification sound '{invalid_value}'" self.assert_json_error(result, expected_error_msg) hamlet = self.example_user("hamlet") self.assertNotEqual(getattr(hamlet, setting_name), invalid_value) def do_change_emojiset(self, emojiset: str) -> HttpResponse: self.login("hamlet") data = {"emojiset": emojiset} result = self.client_patch("/json/settings", data) return result def test_emojiset(self) -> None: """Test banned emoji sets are not accepted.""" banned_emojisets = ["apple", "emojione"] valid_emojisets = ["google", "google-blob", "text", "twitter"] for emojiset in banned_emojisets: result = self.do_change_emojiset(emojiset) self.assert_json_error(result, "Invalid emojiset") for emojiset in valid_emojisets: result = self.do_change_emojiset(emojiset) self.assert_json_success(result) def test_avatar_changes_disabled(self) -> None: self.login("hamlet") with self.settings(AVATAR_CHANGES_DISABLED=True): result = self.client_delete("/json/users/me/avatar") self.assert_json_error(result, "Avatar changes are disabled in this organization.", 400) with self.settings(AVATAR_CHANGES_DISABLED=True): with get_test_image_file("img.png") as fp1: result = self.client_post("/json/users/me/avatar", {"f1": fp1}) self.assert_json_error(result, "Avatar changes are disabled in this organization.", 400) def test_invalid_setting_name(self) -> None: self.login("hamlet") # Now try an invalid setting name json_result = self.client_patch("/json/settings", dict(invalid_setting="value")) self.assert_json_success(json_result) result = orjson.loads(json_result.content) self.assertIn("ignored_parameters_unsupported", result) self.assertEqual(result["ignored_parameters_unsupported"], ["invalid_setting"]) def test_changing_setting_using_display_setting_endpoint(self) -> None: """ This test is just for adding coverage for `/settings/display` endpoint which is now deprecated. """ self.login("hamlet") result = self.client_patch( "/json/settings/display", dict(color_scheme=UserProfile.COLOR_SCHEME_NIGHT) ) self.assert_json_success(result) hamlet = self.example_user("hamlet") self.assertEqual(hamlet.color_scheme, UserProfile.COLOR_SCHEME_NIGHT) def test_changing_setting_using_notification_setting_endpoint(self) -> None: """ This test is just for adding coverage for `/settings/notifications` endpoint which is now deprecated. """ self.login("hamlet") result = self.client_patch( "/json/settings/notifications", dict(enable_stream_desktop_notifications=orjson.dumps(True).decode()), ) self.assert_json_success(result) hamlet = self.example_user("hamlet") self.assertEqual(hamlet.enable_stream_desktop_notifications, True) class UserChangesTest(ZulipTestCase): def test_update_api_key(self) -> None: user = self.example_user("hamlet") email = user.email self.login_user(user) old_api_keys = get_all_api_keys(user) # Ensure the old API keys are in the authentication cache, so # that the below logic can test whether we have a cache-flushing bug. for api_key in old_api_keys: self.assertEqual(get_user_profile_by_api_key(api_key).email, email) result = self.client_post("/json/users/me/api_key/regenerate") self.assert_json_success(result) new_api_key = result.json()["api_key"] self.assertNotIn(new_api_key, old_api_keys) user = self.example_user("hamlet") current_api_keys = get_all_api_keys(user) self.assertIn(new_api_key, current_api_keys) for api_key in old_api_keys: with self.assertRaises(UserProfile.DoesNotExist): get_user_profile_by_api_key(api_key) for api_key in current_api_keys: self.assertEqual(get_user_profile_by_api_key(api_key).email, email) class UserDraftSettingsTests(ZulipTestCase): def test_enable_drafts_syncing(self) -> None: hamlet = self.example_user("hamlet") hamlet.enable_drafts_synchronization = False hamlet.save() payload = {"enable_drafts_synchronization": orjson.dumps(True).decode()} resp = self.api_patch(hamlet, "/api/v1/settings", payload) self.assert_json_success(resp) hamlet = self.example_user("hamlet") self.assertTrue(hamlet.enable_drafts_synchronization) def test_disable_drafts_syncing(self) -> None: aaron = self.example_user("aaron") self.assertTrue(aaron.enable_drafts_synchronization) initial_count = Draft.objects.count() # Create some drafts. These should be deleted once aaron disables # syncing drafts. visible_stream_id = self.get_stream_id(self.get_streams(aaron)[0]) draft_dicts = [ { "type": "stream", "to": [visible_stream_id], "topic": "thinking out loud", "content": "What if pigs really could fly?", "timestamp": 15954790199, }, { "type": "private", "to": [], "topic": "", "content": "What if made it possible to sync drafts in Zulip?", "timestamp": 1595479020, }, ] payload = {"drafts": orjson.dumps(draft_dicts).decode()} resp = self.api_post(aaron, "/api/v1/drafts", payload) self.assert_json_success(resp) self.assertEqual(Draft.objects.count() - initial_count, 2) payload = {"enable_drafts_synchronization": orjson.dumps(False).decode()} resp = self.api_patch(aaron, "/api/v1/settings", payload) self.assert_json_success(resp) aaron = self.example_user("aaron") self.assertFalse(aaron.enable_drafts_synchronization) self.assertEqual(Draft.objects.count() - initial_count, 0)