1
0
mirror of https://github.com/haiwen/seahub.git synced 2025-08-31 06:34:40 +00:00

[invitation] Check duplicated accepter and add blocklist for accepter

This commit is contained in:
zhengxie
2016-12-19 16:12:47 +08:00
parent 4a99ee32a0
commit 11fdfe7299
5 changed files with 90 additions and 2 deletions

View File

@@ -1,4 +1,5 @@
# Copyright (c) 2012-2016 Seafile Ltd.
from django.utils.translation import ugettext as _
from rest_framework import status
from rest_framework.authentication import SessionAuthentication
@@ -11,11 +12,13 @@ from seahub.api2.permissions import CanInviteGuest
from seahub.api2.throttling import UserRateThrottle
from seahub.api2.utils import api_error
from seahub.base.accounts import User
from seahub.invitations.models import Invitation
from seahub.utils import is_valid_email
from seahub.invitations.models import Invitation
from seahub.invitations.utils import block_accepter
json_content_type = 'application/json; charset=utf-8'
class InvitationsView(APIView):
authentication_classes = (TokenAuthentication, SessionAuthentication)
permission_classes = (IsAuthenticated, CanInviteGuest)
@@ -32,7 +35,7 @@ class InvitationsView(APIView):
return Response(invitations)
def post(self, request, format=None):
# Send a invitation.
# Send invitation.
itype = request.data.get('type', '').lower()
if not itype or itype != 'guest':
return api_error(status.HTTP_400_BAD_REQUEST, 'type invalid.')
@@ -45,6 +48,15 @@ class InvitationsView(APIView):
return api_error(status.HTTP_400_BAD_REQUEST,
_('Email %s invalid.') % accepter)
if block_accepter(accepter):
return api_error(status.HTTP_400_BAD_REQUEST,
_('The email address is not allowed to be invited as a guest.'))
if Invitation.objects.filter(inviter=request.user.username,
accepter=accepter).count() > 0:
return api_error(status.HTTP_400_BAD_REQUEST,
_('%s is already invited.') % accepter)
try:
User.objects.get(accepter)
user_exists = True

View File

@@ -0,0 +1,18 @@
# Copyright (c) 2012-2016 Seafile Ltd.
import re
from django.conf import settings
def block_accepter(accepter):
for pattern in settings.INVITATION_ACCEPTER_BLACKLIST:
if pattern.startswith('*'):
if accepter.endswith(pattern[1:]):
return True
elif accepter == pattern:
return True
else:
compiled_pattern = re.compile(pattern)
if compiled_pattern.search(accepter) is not None:
return True
return False

View File

@@ -522,6 +522,7 @@ ENABLE_FOLDER_PERM = False
# Guest Invite #
####################
ENABLE_GUEST_INVITATION = False
INVITATION_ACCEPTER_BLACKLIST = []
#####################
# Sudo Mode #

View File

@@ -1,6 +1,7 @@
import json
from mock import patch
from django.test import override_settings
from post_office.models import Email
from seahub.base.accounts import UserPermissions
@@ -35,6 +36,48 @@ class InvitationsTest(BaseTestCase):
assert len(Invitation.objects.all()) == 1
@patch.object(CanInviteGuest, 'has_permission')
@patch.object(UserPermissions, 'can_invite_guest')
def test_can_not_add_same_email(self, mock_can_invite_guest, mock_has_permission):
mock_can_invite_guest.return_val = True
mock_has_permission.return_val = True
assert len(Invitation.objects.all()) == 0
resp = self.client.post(self.endpoint, {
'type': 'guest',
'accepter': 'some_random_user@1.com',
})
self.assertEqual(201, resp.status_code)
json_resp = json.loads(resp.content)
assert json_resp['inviter'] == self.username
assert json_resp['accepter'] == 'some_random_user@1.com'
assert json_resp['expire_time'] is not None
resp = self.client.post(self.endpoint, {
'type': 'guest',
'accepter': 'some_random_user@1.com',
})
self.assertEqual(400, resp.status_code)
assert len(Invitation.objects.all()) == 1
@override_settings(INVITATION_ACCEPTER_BLACKLIST=["a@a.com", "*@a-a-a.com", r".*@(foo|bar).com"])
@patch.object(CanInviteGuest, 'has_permission')
@patch.object(UserPermissions, 'can_invite_guest')
def test_can_not_add_blocked_email(self, mock_can_invite_guest, mock_has_permission):
mock_can_invite_guest.return_val = True
mock_has_permission.return_val = True
assert len(Invitation.objects.all()) == 0
resp = self.client.post(self.endpoint, {
'type': 'guest',
'accepter': 'some_random_user@a-a-a.com',
})
self.assertEqual(400, resp.status_code)
assert len(Invitation.objects.all()) == 0
@patch.object(CanInviteGuest, 'has_permission')
@patch.object(UserPermissions, 'can_invite_guest')
def test_can_send_mail(self, mock_can_invite_guest, mock_has_permission):

View File

@@ -0,0 +1,14 @@
from django.test import override_settings
from seahub.invitations.utils import block_accepter
from seahub.test_utils import BaseTestCase
class BlockAccepterTest(BaseTestCase):
@override_settings(INVITATION_ACCEPTER_BLACKLIST=["a@a.com", "*@a-a-a.com", r".*@(foo|bar).com"])
def test_email_in_blacklist(self):
assert block_accepter('a@a.com') is True
assert block_accepter('a@a-a-a.com') is True
assert block_accepter('a@foo.com') is True
assert block_accepter('a@bar.com') is True
assert block_accepter('a@foobar.com') is False