mirror of
https://git.selfprivacy.org/SelfPrivacy/selfprivacy-rest-api.git
synced 2024-11-23 12:31:27 +00:00
536 lines
18 KiB
Python
536 lines
18 KiB
Python
# pylint: disable=redefined-outer-name
|
|
# pylint: disable=unused-argument
|
|
# pylint: disable=missing-function-docstring
|
|
import datetime
|
|
import pytest
|
|
from mnemonic import Mnemonic
|
|
|
|
from selfprivacy_api.repositories.tokens.json_tokens_repository import (
|
|
JsonTokensRepository,
|
|
)
|
|
|
|
TOKEN_REPO = JsonTokensRepository()
|
|
|
|
from tests.common import read_json, write_json
|
|
|
|
|
|
TOKENS_FILE_CONTETS = {
|
|
"tokens": [
|
|
{
|
|
"token": "TEST_TOKEN",
|
|
"name": "test_token",
|
|
"date": "2022-01-14 08:31:10.789314",
|
|
},
|
|
{
|
|
"token": "TEST_TOKEN2",
|
|
"name": "test_token2",
|
|
"date": "2022-01-14 08:31:10.789314",
|
|
},
|
|
]
|
|
}
|
|
|
|
DATE_FORMATS = [
|
|
"%Y-%m-%dT%H:%M:%S.%fZ",
|
|
"%Y-%m-%dT%H:%M:%S.%f",
|
|
"%Y-%m-%d %H:%M:%S.%fZ",
|
|
"%Y-%m-%d %H:%M:%S.%f",
|
|
]
|
|
|
|
|
|
def test_get_tokens_info(authorized_client, tokens_file):
|
|
response = authorized_client.get("/auth/tokens")
|
|
assert response.status_code == 200
|
|
assert response.json() == [
|
|
{"name": "test_token", "date": "2022-01-14T08:31:10.789314", "is_caller": True},
|
|
{
|
|
"name": "test_token2",
|
|
"date": "2022-01-14T08:31:10.789314",
|
|
"is_caller": False,
|
|
},
|
|
]
|
|
|
|
|
|
def test_get_tokens_unauthorized(client, tokens_file):
|
|
response = client.get("/auth/tokens")
|
|
assert response.status_code == 401
|
|
|
|
|
|
def test_delete_token_unauthorized(client, tokens_file):
|
|
response = client.delete("/auth/tokens")
|
|
assert response.status_code == 401
|
|
assert read_json(tokens_file) == TOKENS_FILE_CONTETS
|
|
|
|
|
|
def test_delete_token(authorized_client, tokens_file):
|
|
response = authorized_client.delete(
|
|
"/auth/tokens", json={"token_name": "test_token2"}
|
|
)
|
|
assert response.status_code == 200
|
|
assert read_json(tokens_file) == {
|
|
"tokens": [
|
|
{
|
|
"token": "TEST_TOKEN",
|
|
"name": "test_token",
|
|
"date": "2022-01-14 08:31:10.789314",
|
|
}
|
|
]
|
|
}
|
|
|
|
|
|
def test_delete_self_token(authorized_client, tokens_file):
|
|
response = authorized_client.delete(
|
|
"/auth/tokens", json={"token_name": "test_token"}
|
|
)
|
|
assert response.status_code == 400
|
|
assert read_json(tokens_file) == TOKENS_FILE_CONTETS
|
|
|
|
|
|
def test_delete_nonexistent_token(authorized_client, tokens_file):
|
|
response = authorized_client.delete(
|
|
"/auth/tokens", json={"token_name": "test_token3"}
|
|
)
|
|
assert response.status_code == 404
|
|
assert read_json(tokens_file) == TOKENS_FILE_CONTETS
|
|
|
|
|
|
def test_refresh_token_unauthorized(client, tokens_file):
|
|
response = client.post("/auth/tokens")
|
|
assert response.status_code == 401
|
|
assert read_json(tokens_file) == TOKENS_FILE_CONTETS
|
|
|
|
|
|
def test_refresh_token(authorized_client, tokens_file):
|
|
response = authorized_client.post("/auth/tokens")
|
|
assert response.status_code == 200
|
|
new_token = response.json()["token"]
|
|
assert TOKEN_REPO.get_token_by_token_string(new_token) is not None
|
|
|
|
|
|
# new device
|
|
|
|
|
|
def test_get_new_device_auth_token_unauthorized(client, tokens_file):
|
|
response = client.post("/auth/new_device")
|
|
assert response.status_code == 401
|
|
assert read_json(tokens_file) == TOKENS_FILE_CONTETS
|
|
|
|
|
|
def test_get_new_device_auth_token(authorized_client, tokens_file):
|
|
response = authorized_client.post("/auth/new_device")
|
|
assert response.status_code == 200
|
|
assert "token" in response.json()
|
|
token = Mnemonic(language="english").to_entropy(response.json()["token"]).hex()
|
|
assert read_json(tokens_file)["new_device"]["token"] == token
|
|
|
|
|
|
def test_get_and_delete_new_device_token(authorized_client, tokens_file):
|
|
response = authorized_client.post("/auth/new_device")
|
|
assert response.status_code == 200
|
|
assert "token" in response.json()
|
|
token = Mnemonic(language="english").to_entropy(response.json()["token"]).hex()
|
|
assert read_json(tokens_file)["new_device"]["token"] == token
|
|
response = authorized_client.delete(
|
|
"/auth/new_device", json={"token": response.json()["token"]}
|
|
)
|
|
assert response.status_code == 200
|
|
assert read_json(tokens_file) == TOKENS_FILE_CONTETS
|
|
|
|
|
|
def test_delete_token_unauthenticated(client, tokens_file):
|
|
response = client.delete("/auth/new_device")
|
|
assert response.status_code == 401
|
|
assert read_json(tokens_file) == TOKENS_FILE_CONTETS
|
|
|
|
|
|
def test_get_and_authorize_new_device(client, authorized_client, tokens_file):
|
|
response = authorized_client.post("/auth/new_device")
|
|
assert response.status_code == 200
|
|
assert "token" in response.json()
|
|
token = Mnemonic(language="english").to_entropy(response.json()["token"]).hex()
|
|
assert read_json(tokens_file)["new_device"]["token"] == token
|
|
response = client.post(
|
|
"/auth/new_device/authorize",
|
|
json={"token": response.json()["token"], "device": "new_device"},
|
|
)
|
|
assert response.status_code == 200
|
|
assert read_json(tokens_file)["tokens"][2]["token"] == response.json()["token"]
|
|
assert read_json(tokens_file)["tokens"][2]["name"] == "new_device"
|
|
|
|
|
|
def test_authorize_new_device_with_invalid_token(client, tokens_file):
|
|
response = client.post(
|
|
"/auth/new_device/authorize",
|
|
json={"token": "invalid_token", "device": "new_device"},
|
|
)
|
|
assert response.status_code == 404
|
|
assert read_json(tokens_file) == TOKENS_FILE_CONTETS
|
|
|
|
|
|
def test_get_and_authorize_used_token(client, authorized_client, tokens_file):
|
|
response = authorized_client.post("/auth/new_device")
|
|
assert response.status_code == 200
|
|
assert "token" in response.json()
|
|
token = Mnemonic(language="english").to_entropy(response.json()["token"]).hex()
|
|
assert read_json(tokens_file)["new_device"]["token"] == token
|
|
response = client.post(
|
|
"/auth/new_device/authorize",
|
|
json={"token": response.json()["token"], "device": "new_device"},
|
|
)
|
|
assert response.status_code == 200
|
|
assert read_json(tokens_file)["tokens"][2]["token"] == response.json()["token"]
|
|
assert read_json(tokens_file)["tokens"][2]["name"] == "new_device"
|
|
response = client.post(
|
|
"/auth/new_device/authorize",
|
|
json={"token": response.json()["token"], "device": "new_device"},
|
|
)
|
|
assert response.status_code == 404
|
|
|
|
|
|
def test_get_and_authorize_token_after_12_minutes(
|
|
client, authorized_client, tokens_file
|
|
):
|
|
response = authorized_client.post("/auth/new_device")
|
|
assert response.status_code == 200
|
|
assert "token" in response.json()
|
|
token = Mnemonic(language="english").to_entropy(response.json()["token"]).hex()
|
|
assert read_json(tokens_file)["new_device"]["token"] == token
|
|
|
|
file_data = read_json(tokens_file)
|
|
file_data["new_device"]["expiration"] = str(
|
|
datetime.datetime.now() - datetime.timedelta(minutes=13)
|
|
)
|
|
write_json(tokens_file, file_data)
|
|
|
|
response = client.post(
|
|
"/auth/new_device/authorize",
|
|
json={"token": response.json()["token"], "device": "new_device"},
|
|
)
|
|
assert response.status_code == 404
|
|
|
|
|
|
def test_authorize_without_token(client, tokens_file):
|
|
response = client.post(
|
|
"/auth/new_device/authorize",
|
|
json={"device": "new_device"},
|
|
)
|
|
assert response.status_code == 422
|
|
assert read_json(tokens_file) == TOKENS_FILE_CONTETS
|
|
|
|
|
|
# Recovery tokens
|
|
# GET /auth/recovery_token returns token status
|
|
# - if token is valid, returns 200 and token status
|
|
# - token status:
|
|
# - exists (boolean)
|
|
# - valid (boolean)
|
|
# - date (string)
|
|
# - expiration (string)
|
|
# - uses_left (int)
|
|
# - if token is invalid, returns 400 and empty body
|
|
# POST /auth/recovery_token generates a new token
|
|
# has two optional parameters:
|
|
# - expiration (string in datetime format)
|
|
# - uses_left (int)
|
|
# POST /auth/recovery_token/use uses the token
|
|
# required arguments:
|
|
# - token (string)
|
|
# - device (string)
|
|
# - if token is valid, returns 200 and token
|
|
# - if token is invalid, returns 404
|
|
# - if request is invalid, returns 400
|
|
|
|
|
|
def test_get_recovery_token_status_unauthorized(client, tokens_file):
|
|
response = client.get("/auth/recovery_token")
|
|
assert response.status_code == 401
|
|
assert read_json(tokens_file) == TOKENS_FILE_CONTETS
|
|
|
|
|
|
def test_get_recovery_token_when_none_exists(authorized_client, tokens_file):
|
|
response = authorized_client.get("/auth/recovery_token")
|
|
assert response.status_code == 200
|
|
assert response.json() == {
|
|
"exists": False,
|
|
"valid": False,
|
|
"date": None,
|
|
"expiration": None,
|
|
"uses_left": None,
|
|
}
|
|
assert read_json(tokens_file) == TOKENS_FILE_CONTETS
|
|
|
|
|
|
def test_generate_recovery_token(authorized_client, client, tokens_file):
|
|
# Generate token without expiration and uses_left
|
|
response = authorized_client.post("/auth/recovery_token")
|
|
assert response.status_code == 200
|
|
assert "token" in response.json()
|
|
mnemonic_token = response.json()["token"]
|
|
token = Mnemonic(language="english").to_entropy(mnemonic_token).hex()
|
|
assert read_json(tokens_file)["recovery_token"]["token"] == token
|
|
|
|
time_generated = read_json(tokens_file)["recovery_token"]["date"]
|
|
assert time_generated is not None
|
|
# Assert that the token was generated near the current time
|
|
assert (
|
|
datetime.datetime.strptime(time_generated, "%Y-%m-%dT%H:%M:%S.%f")
|
|
- datetime.timedelta(seconds=5)
|
|
< datetime.datetime.now()
|
|
)
|
|
|
|
# Try to get token status
|
|
response = authorized_client.get("/auth/recovery_token")
|
|
assert response.status_code == 200
|
|
assert response.json() == {
|
|
"exists": True,
|
|
"valid": True,
|
|
"date": time_generated,
|
|
"expiration": None,
|
|
"uses_left": None,
|
|
}
|
|
|
|
# Try to use the token
|
|
recovery_response = client.post(
|
|
"/auth/recovery_token/use",
|
|
json={"token": mnemonic_token, "device": "recovery_device"},
|
|
)
|
|
assert recovery_response.status_code == 200
|
|
new_token = recovery_response.json()["token"]
|
|
assert read_json(tokens_file)["tokens"][2]["token"] == new_token
|
|
assert read_json(tokens_file)["tokens"][2]["name"] == "recovery_device"
|
|
|
|
# Try to use token again
|
|
recovery_response = client.post(
|
|
"/auth/recovery_token/use",
|
|
json={"token": mnemonic_token, "device": "recovery_device2"},
|
|
)
|
|
assert recovery_response.status_code == 200
|
|
new_token = recovery_response.json()["token"]
|
|
assert read_json(tokens_file)["tokens"][3]["token"] == new_token
|
|
assert read_json(tokens_file)["tokens"][3]["name"] == "recovery_device2"
|
|
|
|
|
|
@pytest.mark.parametrize("timeformat", DATE_FORMATS)
|
|
def test_generate_recovery_token_with_expiration_date(
|
|
authorized_client, client, tokens_file, timeformat
|
|
):
|
|
# Generate token with expiration date
|
|
# Generate expiration date in the future
|
|
expiration_date = datetime.datetime.now() + datetime.timedelta(minutes=5)
|
|
expiration_date_str = expiration_date.strftime(timeformat)
|
|
response = authorized_client.post(
|
|
"/auth/recovery_token",
|
|
json={"expiration": expiration_date_str},
|
|
)
|
|
assert response.status_code == 200
|
|
assert "token" in response.json()
|
|
mnemonic_token = response.json()["token"]
|
|
token = Mnemonic(language="english").to_entropy(mnemonic_token).hex()
|
|
assert read_json(tokens_file)["recovery_token"]["token"] == token
|
|
assert datetime.datetime.strptime(
|
|
read_json(tokens_file)["recovery_token"]["expiration"], "%Y-%m-%dT%H:%M:%S.%f"
|
|
) == datetime.datetime.strptime(expiration_date_str, timeformat)
|
|
|
|
time_generated = read_json(tokens_file)["recovery_token"]["date"]
|
|
assert time_generated is not None
|
|
# Assert that the token was generated near the current time
|
|
assert (
|
|
datetime.datetime.strptime(time_generated, "%Y-%m-%dT%H:%M:%S.%f")
|
|
- datetime.timedelta(seconds=5)
|
|
< datetime.datetime.now()
|
|
)
|
|
|
|
# Try to get token status
|
|
response = authorized_client.get("/auth/recovery_token")
|
|
assert response.status_code == 200
|
|
assert response.json() == {
|
|
"exists": True,
|
|
"valid": True,
|
|
"date": time_generated,
|
|
"expiration": expiration_date.strftime("%Y-%m-%dT%H:%M:%S.%f"),
|
|
"uses_left": None,
|
|
}
|
|
|
|
# Try to use the token
|
|
recovery_response = client.post(
|
|
"/auth/recovery_token/use",
|
|
json={"token": mnemonic_token, "device": "recovery_device"},
|
|
)
|
|
assert recovery_response.status_code == 200
|
|
new_token = recovery_response.json()["token"]
|
|
assert read_json(tokens_file)["tokens"][2]["token"] == new_token
|
|
assert read_json(tokens_file)["tokens"][2]["name"] == "recovery_device"
|
|
|
|
# Try to use token again
|
|
recovery_response = client.post(
|
|
"/auth/recovery_token/use",
|
|
json={"token": mnemonic_token, "device": "recovery_device2"},
|
|
)
|
|
assert recovery_response.status_code == 200
|
|
new_token = recovery_response.json()["token"]
|
|
assert read_json(tokens_file)["tokens"][3]["token"] == new_token
|
|
assert read_json(tokens_file)["tokens"][3]["name"] == "recovery_device2"
|
|
|
|
# Try to use token after expiration date
|
|
new_data = read_json(tokens_file)
|
|
new_data["recovery_token"]["expiration"] = datetime.datetime.now().strftime(
|
|
"%Y-%m-%dT%H:%M:%S.%f"
|
|
)
|
|
write_json(tokens_file, new_data)
|
|
recovery_response = client.post(
|
|
"/auth/recovery_token/use",
|
|
json={"token": mnemonic_token, "device": "recovery_device3"},
|
|
)
|
|
assert recovery_response.status_code == 404
|
|
# Assert that the token was not created in JSON
|
|
assert read_json(tokens_file)["tokens"] == new_data["tokens"]
|
|
|
|
# Get the status of the token
|
|
response = authorized_client.get("/auth/recovery_token")
|
|
assert response.status_code == 200
|
|
assert response.json() == {
|
|
"exists": True,
|
|
"valid": False,
|
|
"date": time_generated,
|
|
"expiration": new_data["recovery_token"]["expiration"],
|
|
"uses_left": None,
|
|
}
|
|
|
|
|
|
@pytest.mark.parametrize("timeformat", DATE_FORMATS)
|
|
def test_generate_recovery_token_with_expiration_in_the_past(
|
|
authorized_client, tokens_file, timeformat
|
|
):
|
|
# Server must return 400 if expiration date is in the past
|
|
expiration_date = datetime.datetime.utcnow() - datetime.timedelta(minutes=5)
|
|
expiration_date_str = expiration_date.strftime(timeformat)
|
|
response = authorized_client.post(
|
|
"/auth/recovery_token",
|
|
json={"expiration": expiration_date_str},
|
|
)
|
|
assert response.status_code == 400
|
|
assert "recovery_token" not in read_json(tokens_file)
|
|
|
|
|
|
def test_generate_recovery_token_with_invalid_time_format(
|
|
authorized_client, tokens_file
|
|
):
|
|
# Server must return 400 if expiration date is in the past
|
|
expiration_date = "invalid_time_format"
|
|
response = authorized_client.post(
|
|
"/auth/recovery_token",
|
|
json={"expiration": expiration_date},
|
|
)
|
|
assert response.status_code == 422
|
|
assert "recovery_token" not in read_json(tokens_file)
|
|
|
|
|
|
def test_generate_recovery_token_with_limited_uses(
|
|
authorized_client, client, tokens_file
|
|
):
|
|
# Generate token with limited uses
|
|
response = authorized_client.post(
|
|
"/auth/recovery_token",
|
|
json={"uses": 2},
|
|
)
|
|
assert response.status_code == 200
|
|
assert "token" in response.json()
|
|
mnemonic_token = response.json()["token"]
|
|
token = Mnemonic(language="english").to_entropy(mnemonic_token).hex()
|
|
assert read_json(tokens_file)["recovery_token"]["token"] == token
|
|
assert read_json(tokens_file)["recovery_token"]["uses_left"] == 2
|
|
|
|
# Get the date of the token
|
|
time_generated = read_json(tokens_file)["recovery_token"]["date"]
|
|
assert time_generated is not None
|
|
assert (
|
|
datetime.datetime.strptime(time_generated, "%Y-%m-%dT%H:%M:%S.%f")
|
|
- datetime.timedelta(seconds=5)
|
|
< datetime.datetime.now()
|
|
)
|
|
|
|
# Try to get token status
|
|
response = authorized_client.get("/auth/recovery_token")
|
|
assert response.status_code == 200
|
|
assert response.json() == {
|
|
"exists": True,
|
|
"valid": True,
|
|
"date": time_generated,
|
|
"expiration": None,
|
|
"uses_left": 2,
|
|
}
|
|
|
|
# Try to use the token
|
|
recovery_response = client.post(
|
|
"/auth/recovery_token/use",
|
|
json={"token": mnemonic_token, "device": "recovery_device"},
|
|
)
|
|
assert recovery_response.status_code == 200
|
|
new_token = recovery_response.json()["token"]
|
|
assert read_json(tokens_file)["tokens"][2]["token"] == new_token
|
|
assert read_json(tokens_file)["tokens"][2]["name"] == "recovery_device"
|
|
|
|
assert read_json(tokens_file)["recovery_token"]["uses_left"] == 1
|
|
|
|
# Get the status of the token
|
|
response = authorized_client.get("/auth/recovery_token")
|
|
assert response.status_code == 200
|
|
assert response.json() == {
|
|
"exists": True,
|
|
"valid": True,
|
|
"date": time_generated,
|
|
"expiration": None,
|
|
"uses_left": 1,
|
|
}
|
|
|
|
# Try to use token again
|
|
recovery_response = client.post(
|
|
"/auth/recovery_token/use",
|
|
json={"token": mnemonic_token, "device": "recovery_device2"},
|
|
)
|
|
assert recovery_response.status_code == 200
|
|
new_token = recovery_response.json()["token"]
|
|
assert read_json(tokens_file)["tokens"][3]["token"] == new_token
|
|
assert read_json(tokens_file)["tokens"][3]["name"] == "recovery_device2"
|
|
|
|
# Get the status of the token
|
|
response = authorized_client.get("/auth/recovery_token")
|
|
assert response.status_code == 200
|
|
assert response.json() == {
|
|
"exists": True,
|
|
"valid": False,
|
|
"date": time_generated,
|
|
"expiration": None,
|
|
"uses_left": 0,
|
|
}
|
|
|
|
# Try to use token after limited uses
|
|
recovery_response = client.post(
|
|
"/auth/recovery_token/use",
|
|
json={"token": mnemonic_token, "device": "recovery_device3"},
|
|
)
|
|
assert recovery_response.status_code == 404
|
|
|
|
assert read_json(tokens_file)["recovery_token"]["uses_left"] == 0
|
|
|
|
|
|
def test_generate_recovery_token_with_negative_uses(
|
|
authorized_client, client, tokens_file
|
|
):
|
|
# Generate token with limited uses
|
|
response = authorized_client.post(
|
|
"/auth/recovery_token",
|
|
json={"uses": -2},
|
|
)
|
|
assert response.status_code == 400
|
|
assert "recovery_token" not in read_json(tokens_file)
|
|
|
|
|
|
def test_generate_recovery_token_with_zero_uses(authorized_client, client, tokens_file):
|
|
# Generate token with limited uses
|
|
response = authorized_client.post(
|
|
"/auth/recovery_token",
|
|
json={"uses": 0},
|
|
)
|
|
assert response.status_code == 400
|
|
assert "recovery_token" not in read_json(tokens_file)
|