mirror of
https://github.com/haiwen/seahub.git
synced 2025-09-10 03:11:07 +00:00
* delete thridpart/social_django * delete social_django in seahub/urls.py * delete social_django in seahub/settings.py * delete seahub/notifications/management/commands/send_wxwork_notices.py * delete social_django in code annotation * delete seahub/social_core * delete tests/seahub/social_core * delete social_core in seahub/urls.py * delete social_core in seahub/settings.py * change app_label to auth in SocialAuthUser model * 2to3 asserts * 2to3 basestring * 2to3 dict * 2to3 except * 2to3 filter * 2to3 future * 2to3 has_key * 2to3 idioms * 2to3 import * 2to3 imports * 2to3 long * 2to3 map * 2to3 next * 2to3 numliterals * 2to3 print * 2to3 raise * 2to3 raw_input * 2to3 reduce * 2to3 reload * 2to3 set_literal * 2to3 unicode * 2to3 urllib * 2to3 ws_comma * 2to3 xrange * 2to3 zip * add pymysql in __init__.py * fix encode and decode in seahub/cconvert.py * fix seafserv_rpc.is_passwd_set in seahub/views/__init__.py * fix smart_unicode to smart_text * fix force_unicode to force_text * delete seaserv.get_session_info * delete seaserv.ccnet_rpc * fix indent error in seahub/auth/middleware.py * update dev-requirements * update test-requirements * update requirements * fix StringIO to BytesIO in thumbnail * fix seaserv.list_inner_pub_repos to seafile_api.get_inner_pub_repo_list * fix seaserv.list_org_inner_pub_repos to seafile_api.list_org_inner_pub_repos * add logger in seahub/utils/__init__.py * fix sort cmp in seahub/views/__init__.py * fix sort cmp in seahub/base/management/commands/export_file_access_log.py * fix sort cmp in seahub/api2/endpoints/repo_trash.py * fix sort cmp in seahub/api2/endpoints/shared_repos.py * fix sort cmp in seahub/api2/endpoints/shared_folders.py * fix sort cmp in seahub/wiki/views.py * fix sort cmp in seahub/api2/endpoints/wiki_pages.py * fix sort cmp in seahub/api2/endpoints/group_libraries.py * fix sort cmp in seahub/base/models.py * fix sort cmp in seahub/api2/endpoints/upload_links.py * fix sort cmp in seahub/views/ajax.py * fix sort cmp in seahub/api2/views.py * fix sort cmp in seahub/views/wiki.py * fix sort cmp in seahub/api2/endpoints/repos.py * fix sort cmp in seahub/api2/endpoints/starred_items.py * fix sort cmp in seahub/views/file.py * fix sort cmp in seahub/api2/endpoints/dir.py * fix sort cmp in seahub/api2/endpoints/share_links.py * fix cmp to cmp_to_key in seahub/api2/endpoints/admin/device_trusted_ip.py * fix cmp to cmp_to_key in tests/api/endpoints/admin/test_device_trusted_ip.py * delete encode('utf-8') in seafile_api.list_dir_by_commit_and_path * delete encode('utf-8') in is_file_starred * delete encode('utf-8') in seafile_api.list_dir_by_path * delete path.encode('utf-8') in seahub/views/file.py * fix os.write to add encode('utf-8') * add encode('utf-8') for hashlib * add encode('utf-8') for hmac * fix with open(file, 'wb') for binary file * fix encode and decode in seahub/utils/hasher.py * fix next in thirdpart/shibboleth/views.py * fix next in seahub/profile/views.py * fix next in seahub/notifications/views.py * fix next in seahub/institutions/views.py * fix next in seahub/options/views.py * fix next in seahub/share/views.py * fix next in seahub/avatar/views.py * fix next in seahub/views/__init__.py * fix next in seahub/group/views.py * fix next in seahub/views/wiki.py * fix next in seahub/views/sysadmin.py * fix next in seahub/views/file.py * fix string.lowercase to string.ascii_lowercase in test * fix open file add 'rb' in test * fix self.user.username in test * add migrations in file_participants * fix list_org_inner_pub_repos to list_org_inner_pub_repos_by_owner * fix from seaserv import is_passwd_set to seafile_api.is_password_set * fix assert bytes resp.content in test * fix seafile_api.get_inner_pub_repo_list to seafile_api.list_inner_pub_repos_by_owner * fix seafile_api.is_passwd_set to seafile_api.is_password_set * fix AccountsApiTest assert length * rewrite sort_devices cmp to operator.lt * fix bytes + str in seahub/api2/views.py * fix assert bytes resp.content in test * fix hashlib encode in seahub/thirdpart/registration/models.py * change app_label to base in SocialAuthUser * fix base64 encode in seahub/base/database_storage/database_storage.py * fix assert bytes resp.content * remove path.decode in def mkstemp() * remove path.decode in FpathToLinkTest * remove str decode in FileTagTest * remove mock_write_xls.assert_called_once() in SysUserAdminExportExcelTest * fix urllib assert in FilesApiTest * fix link fields in FileCommentsTest * fix get_related_users_by_repo() * fix assert list in GetRepoSharedUsersTest * fix create user in AccountTest * fix repeated key in dict seahub/api2/views.py * add drone.yml * update nginx conf in test * update test conf in test * update dist and push after test success * update drone conf to dist and push * fix assert in BeSharedReposTest * fix seafile_api.list_org_inner_pub_repos_by_owner(org_id, username) to seafile_api.list_org_inner_pub_repos(org_id) * fix seafile_api.list_inner_pub_repos_by_owner(username) to seafile_api.get_inner_pub_repo_list() * update pyjwt requirement * update dist branch in drone * add SKIP in dist and push * fix StringIO to BytesIO in seahub/avatar/models.py * fix if org_id > 0 to if org_id and org_id > 0 * remove payment * fix StringIO to BytesIO in seahub/base/database_storage/database_storage.py * fix send_message to seafile_api.publish_event in seahub/drafts/utils.py * fix send_message to seafile_api.publish_event in seahub/api2/views.py * fix send_message to seafile_api.publish_event in seahub/api2/endpoints/repos.py * fix send_message to seafile_api.publish_event in seahub/views/file.py * fix send_message to seafile_api.publish_event in seahub/utils/__init__.py * fix image_file.read encode in seahub/base/database_storage/database_storage.py * fix DatabaseStorageTest * remove .travis.yml * drone branch include master
226 lines
9.6 KiB
Python
226 lines
9.6 KiB
Python
import datetime
|
|
import hashlib
|
|
import re
|
|
|
|
from django.conf import settings
|
|
from django.contrib.auth.models import User
|
|
from django.contrib.sites.models import Site
|
|
from django.core import mail
|
|
from django.core import management
|
|
from django.test import TestCase
|
|
|
|
from registration.models import RegistrationProfile
|
|
|
|
|
|
class RegistrationModelTests(TestCase):
|
|
"""
|
|
Test the model and manager used in the default backend.
|
|
|
|
"""
|
|
user_info = {'username': 'alice',
|
|
'password': 'swordfish',
|
|
'email': 'alice@example.com'}
|
|
|
|
def setUp(self):
|
|
self.old_activation = getattr(settings, 'ACCOUNT_ACTIVATION_DAYS', None)
|
|
settings.ACCOUNT_ACTIVATION_DAYS = 7
|
|
|
|
def tearDown(self):
|
|
settings.ACCOUNT_ACTIVATION_DAYS = self.old_activation
|
|
|
|
def test_profile_creation(self):
|
|
"""
|
|
Creating a registration profile for a user populates the
|
|
profile with the correct user and a SHA1 hash to use as
|
|
activation key.
|
|
|
|
"""
|
|
new_user = User.objects.create_user(**self.user_info)
|
|
profile = RegistrationProfile.objects.create_profile(new_user)
|
|
|
|
self.assertEqual(RegistrationProfile.objects.count(), 1)
|
|
self.assertEqual(profile.user.id, new_user.id)
|
|
self.assertTrue(re.match('^[a-f0-9]{40}$', profile.activation_key))
|
|
self.assertEqual(str(profile),
|
|
"Registration information for alice")
|
|
|
|
def test_activation_email(self):
|
|
"""
|
|
``RegistrationProfile.send_activation_email`` sends an
|
|
email.
|
|
|
|
"""
|
|
new_user = User.objects.create_user(**self.user_info)
|
|
profile = RegistrationProfile.objects.create_profile(new_user)
|
|
profile.send_activation_email(Site.objects.get_current())
|
|
self.assertEqual(len(mail.outbox), 1)
|
|
self.assertEqual(mail.outbox[0].to, [self.user_info['email']])
|
|
|
|
def test_user_creation(self):
|
|
"""
|
|
Creating a new user populates the correct data, and sets the
|
|
user's account inactive.
|
|
|
|
"""
|
|
new_user = RegistrationProfile.objects.create_inactive_user(site=Site.objects.get_current(),
|
|
**self.user_info)
|
|
self.assertEqual(new_user.username, 'alice')
|
|
self.assertEqual(new_user.email, 'alice@example.com')
|
|
self.assertTrue(new_user.check_password('swordfish'))
|
|
self.assertFalse(new_user.is_active)
|
|
|
|
def test_user_creation_email(self):
|
|
"""
|
|
By default, creating a new user sends an activation email.
|
|
|
|
"""
|
|
new_user = RegistrationProfile.objects.create_inactive_user(site=Site.objects.get_current(),
|
|
**self.user_info)
|
|
self.assertEqual(len(mail.outbox), 1)
|
|
|
|
def test_user_creation_no_email(self):
|
|
"""
|
|
Passing ``send_email=False`` when creating a new user will not
|
|
send an activation email.
|
|
|
|
"""
|
|
new_user = RegistrationProfile.objects.create_inactive_user(site=Site.objects.get_current(),
|
|
send_email=False,
|
|
**self.user_info)
|
|
self.assertEqual(len(mail.outbox), 0)
|
|
|
|
def test_unexpired_account(self):
|
|
"""
|
|
``RegistrationProfile.activation_key_expired()`` is ``False``
|
|
within the activation window.
|
|
|
|
"""
|
|
new_user = RegistrationProfile.objects.create_inactive_user(site=Site.objects.get_current(),
|
|
**self.user_info)
|
|
profile = RegistrationProfile.objects.get(user=new_user)
|
|
self.assertFalse(profile.activation_key_expired())
|
|
|
|
def test_expired_account(self):
|
|
"""
|
|
``RegistrationProfile.activation_key_expired()`` is ``True``
|
|
outside the activation window.
|
|
|
|
"""
|
|
new_user = RegistrationProfile.objects.create_inactive_user(site=Site.objects.get_current(),
|
|
**self.user_info)
|
|
new_user.date_joined -= datetime.timedelta(days=settings.ACCOUNT_ACTIVATION_DAYS + 1)
|
|
new_user.save()
|
|
profile = RegistrationProfile.objects.get(user=new_user)
|
|
self.assertTrue(profile.activation_key_expired())
|
|
|
|
def test_valid_activation(self):
|
|
"""
|
|
Activating a user within the permitted window makes the
|
|
account active, and resets the activation key.
|
|
|
|
"""
|
|
new_user = RegistrationProfile.objects.create_inactive_user(site=Site.objects.get_current(),
|
|
**self.user_info)
|
|
profile = RegistrationProfile.objects.get(user=new_user)
|
|
activated = RegistrationProfile.objects.activate_user(profile.activation_key)
|
|
|
|
self.assertTrue(isinstance(activated, User))
|
|
self.assertEqual(activated.id, new_user.id)
|
|
self.assertTrue(activated.is_active)
|
|
|
|
profile = RegistrationProfile.objects.get(user=new_user)
|
|
self.assertEqual(profile.activation_key, RegistrationProfile.ACTIVATED)
|
|
|
|
def test_expired_activation(self):
|
|
"""
|
|
Attempting to activate outside the permitted window does not
|
|
activate the account.
|
|
|
|
"""
|
|
new_user = RegistrationProfile.objects.create_inactive_user(site=Site.objects.get_current(),
|
|
**self.user_info)
|
|
new_user.date_joined -= datetime.timedelta(days=settings.ACCOUNT_ACTIVATION_DAYS + 1)
|
|
new_user.save()
|
|
|
|
profile = RegistrationProfile.objects.get(user=new_user)
|
|
activated = RegistrationProfile.objects.activate_user(profile.activation_key)
|
|
|
|
self.assertFalse(isinstance(activated, User))
|
|
self.assertFalse(activated)
|
|
|
|
new_user = User.objects.get(username='alice')
|
|
self.assertFalse(new_user.is_active)
|
|
|
|
profile = RegistrationProfile.objects.get(user=new_user)
|
|
self.assertNotEqual(profile.activation_key, RegistrationProfile.ACTIVATED)
|
|
|
|
def test_activation_invalid_key(self):
|
|
"""
|
|
Attempting to activate with a key which is not a SHA1 hash
|
|
fails.
|
|
|
|
"""
|
|
self.assertFalse(RegistrationProfile.objects.activate_user('foo'))
|
|
|
|
def test_activation_already_activated(self):
|
|
"""
|
|
Attempting to re-activate an already-activated account fails.
|
|
|
|
"""
|
|
new_user = RegistrationProfile.objects.create_inactive_user(site=Site.objects.get_current(),
|
|
**self.user_info)
|
|
profile = RegistrationProfile.objects.get(user=new_user)
|
|
RegistrationProfile.objects.activate_user(profile.activation_key)
|
|
|
|
profile = RegistrationProfile.objects.get(user=new_user)
|
|
self.assertFalse(RegistrationProfile.objects.activate_user(profile.activation_key))
|
|
|
|
def test_activation_nonexistent_key(self):
|
|
"""
|
|
Attempting to activate with a non-existent key (i.e., one not
|
|
associated with any account) fails.
|
|
|
|
"""
|
|
# Due to the way activation keys are constructed during
|
|
# registration, this will never be a valid key.
|
|
invalid_key = hashlib.sha1('foo'.encode('utf-8')).hexdigest()
|
|
self.assertFalse(RegistrationProfile.objects.activate_user(invalid_key))
|
|
|
|
def test_expired_user_deletion(self):
|
|
"""
|
|
``RegistrationProfile.objects.delete_expired_users()`` only
|
|
deletes inactive users whose activation window has expired.
|
|
|
|
"""
|
|
new_user = RegistrationProfile.objects.create_inactive_user(site=Site.objects.get_current(),
|
|
**self.user_info)
|
|
expired_user = RegistrationProfile.objects.create_inactive_user(site=Site.objects.get_current(),
|
|
username='bob',
|
|
password='secret',
|
|
email='bob@example.com')
|
|
expired_user.date_joined -= datetime.timedelta(days=settings.ACCOUNT_ACTIVATION_DAYS + 1)
|
|
expired_user.save()
|
|
|
|
RegistrationProfile.objects.delete_expired_users()
|
|
self.assertEqual(RegistrationProfile.objects.count(), 1)
|
|
self.assertRaises(User.DoesNotExist, User.objects.get, username='bob')
|
|
|
|
def test_management_command(self):
|
|
"""
|
|
The ``cleanupregistration`` management command properly
|
|
deletes expired accounts.
|
|
|
|
"""
|
|
new_user = RegistrationProfile.objects.create_inactive_user(site=Site.objects.get_current(),
|
|
**self.user_info)
|
|
expired_user = RegistrationProfile.objects.create_inactive_user(site=Site.objects.get_current(),
|
|
username='bob',
|
|
password='secret',
|
|
email='bob@example.com')
|
|
expired_user.date_joined -= datetime.timedelta(days=settings.ACCOUNT_ACTIVATION_DAYS + 1)
|
|
expired_user.save()
|
|
|
|
management.call_command('cleanupregistration')
|
|
self.assertEqual(RegistrationProfile.objects.count(), 1)
|
|
self.assertRaises(User.DoesNotExist, User.objects.get, username='bob')
|