forked from CGM_Public/pretix_original
* Get rid of unmaintained dependency python-u2flib-server * Update webauthn requirement from ==0.4.* to ==2.0.* * Fix tests * Update src/pretix/control/views/auth.py Co-authored-by: Richard Schreiber <schreiber@rami.io> * Update src/pretix/control/views/auth.py Co-authored-by: Richard Schreiber <schreiber@rami.io> * Update src/pretix/control/views/user.py Co-authored-by: Richard Schreiber <schreiber@rami.io> * Update src/pretix/control/views/user.py Co-authored-by: Richard Schreiber <schreiber@rami.io> * Update src/pretix/control/views/user.py Co-authored-by: Richard Schreiber <schreiber@rami.io> --------- Co-authored-by: Richard Schreiber <schreiber@rami.io>
497 lines
19 KiB
Python
497 lines
19 KiB
Python
#
|
|
# This file is part of pretix (Community Edition).
|
|
#
|
|
# Copyright (C) 2014-2020 Raphael Michel and contributors
|
|
# Copyright (C) 2020-2021 rami.io GmbH and contributors
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General
|
|
# Public License as published by the Free Software Foundation in version 3 of the License.
|
|
#
|
|
# ADDITIONAL TERMS APPLY: Pursuant to Section 7 of the GNU Affero General Public License, additional terms are
|
|
# applicable granting you additional permissions and placing additional restrictions on your usage of this software.
|
|
# Please refer to the pretix LICENSE file to obtain the full terms applicable to this work. If you did not receive
|
|
# this file, see <https://pretix.eu/about/en/license>.
|
|
#
|
|
# This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
|
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
|
|
# details.
|
|
#
|
|
# You should have received a copy of the GNU Affero General Public License along with this program. If not, see
|
|
# <https://www.gnu.org/licenses/>.
|
|
#
|
|
|
|
# This file is based on an earlier version of pretix which was released under the Apache License 2.0. The full text of
|
|
# the Apache License 2.0 can be obtained at <http://www.apache.org/licenses/LICENSE-2.0>.
|
|
#
|
|
# This file may have since been changed and any changes are released under the terms of AGPLv3 as described above. A
|
|
# full history of changes and contributors is available at <https://github.com/pretix/pretix>.
|
|
#
|
|
# This file contains Apache-licensed contributions copyrighted by: Jason Estibeiro
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software distributed under the Apache License 2.0 is
|
|
# distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations under the License.
|
|
|
|
import time
|
|
|
|
import pytest
|
|
from django.utils.timezone import now
|
|
from django_otp.oath import TOTP
|
|
from django_otp.plugins.otp_static.models import StaticDevice
|
|
from django_otp.plugins.otp_totp.models import TOTPDevice
|
|
from tests.base import SoupTest, extract_form_fields
|
|
from webauthn.registration.verify_registration_response import (
|
|
VerifiedRegistration,
|
|
)
|
|
|
|
from pretix.base.models import (
|
|
Event, Organizer, U2FDevice, User, WebAuthnDevice,
|
|
)
|
|
from pretix.testutils.mock import mocker_context
|
|
|
|
|
|
class UserSettingsTest(SoupTest):
|
|
def setUp(self):
|
|
super().setUp()
|
|
self.user = User.objects.create_user('dummy@dummy.dummy', 'barfoofoo')
|
|
self.client.login(email='dummy@dummy.dummy', password='barfoofoo')
|
|
doc = self.get_doc('/control/settings')
|
|
self.form_data = extract_form_fields(doc.select('.container-fluid form')[0])
|
|
|
|
def save(self, data):
|
|
form_data = self.form_data.copy()
|
|
form_data.update(data)
|
|
return self.post_doc('/control/settings', form_data)
|
|
|
|
def test_set_name(self):
|
|
doc = self.save({
|
|
'fullname': 'Peter Miller',
|
|
})
|
|
assert doc.select(".alert-success")
|
|
self.user = User.objects.get(pk=self.user.pk)
|
|
assert self.user.fullname == 'Peter Miller'
|
|
|
|
def test_change_email_require_password(self):
|
|
doc = self.save({
|
|
'email': 'foo@example.com',
|
|
})
|
|
assert doc.select(".alert-danger")
|
|
self.user = User.objects.get(pk=self.user.pk)
|
|
assert self.user.email == 'dummy@dummy.dummy'
|
|
|
|
def test_change_email_success(self):
|
|
doc = self.save({
|
|
'email': 'foo@example.com',
|
|
'old_pw': 'barfoofoo'
|
|
})
|
|
assert doc.select(".alert-success")
|
|
self.user = User.objects.get(pk=self.user.pk)
|
|
assert self.user.email == 'foo@example.com'
|
|
|
|
def test_change_email_no_duplicates(self):
|
|
User.objects.create_user('foo@example.com', 'foo')
|
|
doc = self.save({
|
|
'email': 'foo@example.com',
|
|
'old_pw': 'barfoofoo'
|
|
})
|
|
assert doc.select(".alert-danger")
|
|
self.user = User.objects.get(pk=self.user.pk)
|
|
assert self.user.email == 'dummy@dummy.dummy'
|
|
|
|
def test_change_password_require_password(self):
|
|
doc = self.save({
|
|
'new_pw': 'foo',
|
|
'new_pw_repeat': 'foo',
|
|
})
|
|
assert doc.select(".alert-danger")
|
|
pw = self.user.password
|
|
self.user = User.objects.get(pk=self.user.pk)
|
|
assert self.user.password == pw
|
|
|
|
def test_change_password_wrong_backend(self):
|
|
self.user.auth_backend = 'test_request'
|
|
self.user.save()
|
|
self.save({
|
|
'new_pw': 'foobarbar',
|
|
'new_pw_repeat': 'foobarbar',
|
|
'old_pw': 'barfoofoo',
|
|
})
|
|
pw = self.user.password
|
|
self.user = User.objects.get(pk=self.user.pk)
|
|
assert self.user.password == pw
|
|
|
|
def test_change_password_success(self):
|
|
doc = self.save({
|
|
'new_pw': 'foobarbar',
|
|
'new_pw_repeat': 'foobarbar',
|
|
'old_pw': 'barfoofoo',
|
|
})
|
|
assert doc.select(".alert-success")
|
|
self.user = User.objects.get(pk=self.user.pk)
|
|
assert self.user.check_password("foobarbar")
|
|
|
|
def test_change_password_short(self):
|
|
doc = self.save({
|
|
'new_pw': 'foo',
|
|
'new_pw_repeat': 'foo',
|
|
'old_pw': 'barfoofoo',
|
|
})
|
|
assert doc.select(".alert-danger")
|
|
pw = self.user.password
|
|
self.user = User.objects.get(pk=self.user.pk)
|
|
assert self.user.password == pw
|
|
|
|
def test_change_password_user_attribute_similarity(self):
|
|
doc = self.save({
|
|
'new_pw': 'dummy123',
|
|
'new_pw_repeat': 'dummy123',
|
|
'old_pw': 'barfoofoo',
|
|
})
|
|
assert doc.select(".alert-danger")
|
|
pw = self.user.password
|
|
self.user = User.objects.get(pk=self.user.pk)
|
|
assert self.user.password == pw
|
|
|
|
def test_change_password_require_repeat(self):
|
|
doc = self.save({
|
|
'new_pw': 'foooooooooooooo',
|
|
'new_pw_repeat': 'baaaaaaaaaaaar',
|
|
'old_pw': 'barfoofoo',
|
|
})
|
|
assert doc.select(".alert-danger")
|
|
pw = self.user.password
|
|
self.user = User.objects.get(pk=self.user.pk)
|
|
assert self.user.password == pw
|
|
|
|
def test_change_password_require_new(self):
|
|
doc = self.save({
|
|
'new_pw': 'barfoofoo',
|
|
'new_pw_repeat': 'barfoofoo',
|
|
'old_pw': 'barfoofoo',
|
|
})
|
|
assert doc.select(".alert-danger")
|
|
|
|
def test_needs_password_change(self):
|
|
self.user.needs_password_change = True
|
|
self.user.save()
|
|
doc = self.save({
|
|
'email': 'foo@example.com',
|
|
'old_pw': 'barfoofoo'
|
|
})
|
|
assert doc.select(".alert-success")
|
|
assert doc.select(".alert-warning")
|
|
self.user.refresh_from_db()
|
|
assert self.user.needs_password_change is True
|
|
|
|
def test_needs_password_change_changed(self):
|
|
self.user.needs_password_change = True
|
|
self.user.save()
|
|
self.save({
|
|
'new_pw': 'foobarbar',
|
|
'new_pw_repeat': 'foobarbar',
|
|
'old_pw': 'barfoofoo'
|
|
})
|
|
self.user.refresh_from_db()
|
|
assert self.user.needs_password_change is False
|
|
|
|
|
|
@pytest.fixture
|
|
def class_monkeypatch(request, monkeypatch):
|
|
request.cls.monkeypatch = monkeypatch
|
|
|
|
|
|
@pytest.mark.usefixtures("class_monkeypatch")
|
|
class UserSettings2FATest(SoupTest):
|
|
def setUp(self):
|
|
super().setUp()
|
|
self.user = User.objects.create_user('dummy@dummy.dummy', 'dummy')
|
|
self.client.login(email='dummy@dummy.dummy', password='dummy')
|
|
session = self.client.session
|
|
session['pretix_auth_login_time'] = int(time.time())
|
|
session.save()
|
|
|
|
def test_require_reauth(self):
|
|
session = self.client.session
|
|
session['pretix_auth_login_time'] = int(time.time()) - 3600 * 2
|
|
session.save()
|
|
|
|
response = self.client.get('/control/settings/2fa/')
|
|
self.assertIn('/control/reauth', response['Location'])
|
|
self.assertEqual(response.status_code, 302)
|
|
|
|
response = self.client.post('/control/reauth/?next=/control/settings/2fa/', {
|
|
'password': 'dummy'
|
|
})
|
|
self.assertIn('/control/settings/2fa/', response['Location'])
|
|
self.assertEqual(response.status_code, 302)
|
|
|
|
def test_enable_require_device(self):
|
|
r = self.client.post('/control/settings/2fa/enable', follow=True)
|
|
assert 'alert-danger' in r.content.decode()
|
|
self.user.refresh_from_db()
|
|
assert not self.user.require_2fa
|
|
|
|
def test_enable(self):
|
|
U2FDevice.objects.create(user=self.user, name='Test')
|
|
r = self.client.post('/control/settings/2fa/enable', follow=True)
|
|
assert 'alert-success' in r.content.decode()
|
|
self.user.refresh_from_db()
|
|
assert self.user.require_2fa
|
|
|
|
def test_disable(self):
|
|
self.user.require_2fa = True
|
|
self.user.save()
|
|
r = self.client.post('/control/settings/2fa/disable', follow=True)
|
|
assert 'alert-success' in r.content.decode()
|
|
self.user.refresh_from_db()
|
|
assert not self.user.require_2fa
|
|
|
|
def test_gen_emergency(self):
|
|
self.client.get('/control/settings/2fa/')
|
|
d = StaticDevice.objects.get(user=self.user, name='emergency')
|
|
assert d.token_set.count() == 10
|
|
old_tokens = set(t.token for t in d.token_set.all())
|
|
self.client.post('/control/settings/2fa/regenemergency')
|
|
new_tokens = set(t.token for t in d.token_set.all())
|
|
d = StaticDevice.objects.get(user=self.user, name='emergency')
|
|
assert d.token_set.count() == 10
|
|
assert old_tokens != new_tokens
|
|
|
|
def test_delete_u2f(self):
|
|
d = U2FDevice.objects.create(user=self.user, name='Test')
|
|
self.client.get('/control/settings/2fa/u2f/{}/delete'.format(d.pk))
|
|
self.client.post('/control/settings/2fa/u2f/{}/delete'.format(d.pk))
|
|
assert not U2FDevice.objects.exists()
|
|
|
|
def test_delete_webauthn(self):
|
|
d = WebAuthnDevice.objects.create(user=self.user, name='Test')
|
|
self.client.get('/control/settings/2fa/webauthn/{}/delete'.format(d.pk))
|
|
self.client.post('/control/settings/2fa/webauthn/{}/delete'.format(d.pk))
|
|
assert not WebAuthnDevice.objects.exists()
|
|
|
|
def test_delete_totp(self):
|
|
d = TOTPDevice.objects.create(user=self.user, name='Test')
|
|
self.client.get('/control/settings/2fa/totp/{}/delete'.format(d.pk))
|
|
self.client.post('/control/settings/2fa/totp/{}/delete'.format(d.pk))
|
|
assert not TOTPDevice.objects.exists()
|
|
|
|
def test_create_webauthn_require_https(self):
|
|
r = self.client.post('/control/settings/2fa/add', {
|
|
'devicetype': 'webauthn',
|
|
'name': 'Foo'
|
|
})
|
|
assert 'alert-danger' in r.content.decode()
|
|
|
|
def test_create_webauthn(self):
|
|
with mocker_context() as mocker:
|
|
mocker.patch('django.http.request.HttpRequest.is_secure')
|
|
self.client.post('/control/settings/2fa/add', {
|
|
'devicetype': 'webauthn',
|
|
'name': 'Foo'
|
|
})
|
|
d = WebAuthnDevice.objects.first()
|
|
assert d.name == 'Foo'
|
|
assert not d.confirmed
|
|
|
|
def test_create_totp(self):
|
|
self.client.post('/control/settings/2fa/add', {
|
|
'devicetype': 'totp',
|
|
'name': 'Foo'
|
|
})
|
|
d = TOTPDevice.objects.first()
|
|
assert d.name == 'Foo'
|
|
|
|
def test_confirm_totp(self):
|
|
self.client.post('/control/settings/2fa/add', {
|
|
'devicetype': 'totp',
|
|
'name': 'Foo'
|
|
}, follow=True)
|
|
d = TOTPDevice.objects.first()
|
|
totp = TOTP(d.bin_key, d.step, d.t0, d.digits, d.drift)
|
|
totp.time = time.time()
|
|
r = self.client.post('/control/settings/2fa/totp/{}/confirm'.format(d.pk), {
|
|
'token': str(totp.token()),
|
|
'activate': 'on'
|
|
}, follow=True)
|
|
d.refresh_from_db()
|
|
assert d.confirmed
|
|
assert 'alert-success' in r.content.decode()
|
|
self.user.refresh_from_db()
|
|
assert self.user.require_2fa
|
|
|
|
def test_confirm_totp_failed(self):
|
|
self.client.post('/control/settings/2fa/add', {
|
|
'devicetype': 'totp',
|
|
'name': 'Foo'
|
|
}, follow=True)
|
|
d = TOTPDevice.objects.first()
|
|
totp = TOTP(d.bin_key, d.step, d.t0, d.digits, d.drift)
|
|
totp.time = time.time()
|
|
r = self.client.post('/control/settings/2fa/totp/{}/confirm'.format(d.pk), {
|
|
'token': str(totp.token() - 2)
|
|
}, follow=True)
|
|
assert 'alert-danger' in r.content.decode()
|
|
d.refresh_from_db()
|
|
assert not d.confirmed
|
|
|
|
def test_confirm_webauthn_failed(self):
|
|
with mocker_context() as mocker:
|
|
mocker.patch('django.http.request.HttpRequest.is_secure')
|
|
self.client.post('/control/settings/2fa/add', {
|
|
'devicetype': 'webauthn',
|
|
'name': 'Foo'
|
|
}, follow=True)
|
|
d = WebAuthnDevice.objects.first()
|
|
r = self.client.post('/control/settings/2fa/webauthn/{}/confirm'.format(d.pk), {
|
|
'token': 'FOO'
|
|
}, follow=True)
|
|
assert 'alert-danger' in r.content.decode()
|
|
d.refresh_from_db()
|
|
assert not d.confirmed
|
|
|
|
def test_confirm_webauthn_success(self):
|
|
with mocker_context() as mocker:
|
|
mocker.patch('django.http.request.HttpRequest.is_secure')
|
|
self.client.post('/control/settings/2fa/add', {
|
|
'devicetype': 'webauthn',
|
|
'name': 'Foo'
|
|
}, follow=True)
|
|
|
|
m = self.monkeypatch
|
|
m.setattr("webauthn.verify_registration_response",
|
|
lambda *args, **kwargs: VerifiedRegistration(
|
|
b'', b'', 1, '', 'foo', 'public-key', True, b'', 'single_device', True
|
|
))
|
|
|
|
d = WebAuthnDevice.objects.first()
|
|
r = self.client.post('/control/settings/2fa/webauthn/{}/confirm'.format(d.pk), {
|
|
'token': '{}',
|
|
'activate': 'on'
|
|
}, follow=True)
|
|
d.refresh_from_db()
|
|
assert d.confirmed
|
|
assert 'alert-success' in r.content.decode()
|
|
self.user.refresh_from_db()
|
|
assert self.user.require_2fa
|
|
m.undo()
|
|
|
|
|
|
class UserSettingsNotificationsTest(SoupTest):
|
|
def setUp(self):
|
|
super().setUp()
|
|
self.user = User.objects.create_user('dummy@dummy.dummy', 'dummy')
|
|
self.client.login(email='dummy@dummy.dummy', password='dummy')
|
|
|
|
o = Organizer.objects.create(name='Dummy', slug='dummy')
|
|
self.event = Event.objects.create(
|
|
organizer=o, name='Dummy', slug='dummy',
|
|
date_from=now(), plugins='pretix.plugins.banktransfer'
|
|
)
|
|
t = o.teams.create(can_change_orders=True, all_events=True)
|
|
t.members.add(self.user)
|
|
|
|
def test_toggle_all(self):
|
|
assert self.user.notifications_send
|
|
self.client.post('/control/settings/notifications/', {
|
|
'notifications_send': 'off'
|
|
})
|
|
self.user.refresh_from_db()
|
|
assert not self.user.notifications_send
|
|
self.client.post('/control/settings/notifications/', {
|
|
'notifications_send': 'on'
|
|
})
|
|
self.user.refresh_from_db()
|
|
assert self.user.notifications_send
|
|
|
|
def test_global_enable(self):
|
|
self.client.post('/control/settings/notifications/', {
|
|
'mail:pretix.event.order.placed': 'on'
|
|
})
|
|
assert self.user.notification_settings.get(
|
|
event__isnull=True, method='mail', action_type='pretix.event.order.placed'
|
|
).enabled is True
|
|
|
|
def test_global_disable(self):
|
|
self.user.notification_settings.create(
|
|
event=None, method='mail', action_type='pretix.event.order.placed', enabled=True
|
|
)
|
|
self.client.post('/control/settings/notifications/', {
|
|
'mail:pretix.event.order.placed': 'off'
|
|
})
|
|
assert self.user.notification_settings.get(
|
|
event__isnull=True, method='mail', action_type='pretix.event.order.placed'
|
|
).enabled is False
|
|
|
|
def test_event_enabled_disable(self):
|
|
self.user.notification_settings.create(
|
|
event=self.event, method='mail', action_type='pretix.event.order.placed', enabled=True
|
|
)
|
|
self.client.post('/control/settings/notifications/?event={}'.format(self.event.pk), {
|
|
'mail:pretix.event.order.placed': 'off'
|
|
})
|
|
assert self.user.notification_settings.get(
|
|
event=self.event, method='mail', action_type='pretix.event.order.placed'
|
|
).enabled is False
|
|
|
|
def test_event_global_disable(self):
|
|
self.client.post('/control/settings/notifications/?event={}'.format(self.event.pk), {
|
|
'mail:pretix.event.order.placed': 'off'
|
|
})
|
|
assert self.user.notification_settings.get(
|
|
event=self.event, method='mail', action_type='pretix.event.order.placed'
|
|
).enabled is False
|
|
|
|
def test_event_disabled_enable(self):
|
|
self.user.notification_settings.create(
|
|
event=self.event, method='mail', action_type='pretix.event.order.placed', enabled=False
|
|
)
|
|
self.client.post('/control/settings/notifications/?event={}'.format(self.event.pk), {
|
|
'mail:pretix.event.order.placed': 'on'
|
|
})
|
|
assert self.user.notification_settings.get(
|
|
event=self.event, method='mail', action_type='pretix.event.order.placed'
|
|
).enabled is True
|
|
|
|
def test_event_global_enable(self):
|
|
self.client.post('/control/settings/notifications/?event={}'.format(self.event.pk), {
|
|
'mail:pretix.event.order.placed': 'on'
|
|
})
|
|
assert self.user.notification_settings.get(
|
|
event=self.event, method='mail', action_type='pretix.event.order.placed'
|
|
).enabled is True
|
|
|
|
def test_event_enabled_global(self):
|
|
self.user.notification_settings.create(
|
|
event=self.event, method='mail', action_type='pretix.event.order.placed', enabled=True
|
|
)
|
|
self.client.post('/control/settings/notifications/?event={}'.format(self.event.pk), {
|
|
'mail:pretix.event.order.placed': 'global'
|
|
})
|
|
assert not self.user.notification_settings.filter(
|
|
event=self.event, method='mail', action_type='pretix.event.order.placed'
|
|
).exists()
|
|
|
|
def test_event_disabled_global(self):
|
|
self.user.notification_settings.create(
|
|
event=self.event, method='mail', action_type='pretix.event.order.placed', enabled=False
|
|
)
|
|
self.client.post('/control/settings/notifications/?event={}'.format(self.event.pk), {
|
|
'mail:pretix.event.order.placed': 'global'
|
|
})
|
|
assert not self.user.notification_settings.filter(
|
|
event=self.event, method='mail', action_type='pretix.event.order.placed'
|
|
).exists()
|
|
|
|
def test_disable_all_via_link(self):
|
|
assert self.user.notifications_send
|
|
self.client.post('/control/settings/notifications/off/{}/{}/'.format(self.user.pk, self.user.notifications_token))
|
|
self.user.refresh_from_db()
|
|
assert not self.user.notifications_send
|
|
|
|
def test_disable_all_via_link_anonymous(self):
|
|
self.client.logout()
|
|
assert self.user.notifications_send
|
|
self.client.post('/control/settings/notifications/off/{}/{}/'.format(self.user.pk, self.user.notifications_token))
|
|
self.user.refresh_from_db()
|
|
assert not self.user.notifications_send
|