mirror of
https://github.com/zulip/zulip.git
synced 2025-11-12 18:06:44 +00:00
For users who are not logged in and for those who don't have 'prefers_web_public_view' set in session, we redirect them to the default login page where they can choose to login as spectator or authenticated user.
164 lines
6.3 KiB
Python
164 lines
6.3 KiB
Python
import importlib
|
|
import os
|
|
from typing import List, Optional
|
|
|
|
import django.urls.resolvers
|
|
from django.test import Client
|
|
|
|
from zerver.lib.test_classes import ZulipTestCase
|
|
from zerver.models import Realm, Stream
|
|
from zproject import urls
|
|
|
|
|
|
class PublicURLTest(ZulipTestCase):
|
|
"""
|
|
Account creation URLs are accessible even when not logged in. Authenticated
|
|
URLs redirect to a page.
|
|
"""
|
|
|
|
def fetch(self, method: str, urls: List[str], expected_status: int) -> None:
|
|
for url in urls:
|
|
# e.g. self.client_post(url) if method is "post"
|
|
response = getattr(self, method)(url)
|
|
self.assertEqual(
|
|
response.status_code,
|
|
expected_status,
|
|
msg=f"Expected {expected_status}, received {response.status_code} for {method} to {url}",
|
|
)
|
|
|
|
def test_public_urls(self) -> None:
|
|
"""
|
|
Test which views are accessible when not logged in.
|
|
"""
|
|
# FIXME: We should also test the Tornado URLs -- this codepath
|
|
# can't do so because this Django test mechanism doesn't go
|
|
# through Tornado.
|
|
denmark_stream_id = Stream.objects.get(name="Denmark").id
|
|
get_urls = {
|
|
200: [
|
|
"/accounts/home/",
|
|
"/accounts/login/",
|
|
"/en/accounts/home/",
|
|
"/ru/accounts/home/",
|
|
"/en/accounts/login/",
|
|
"/ru/accounts/login/",
|
|
"/help/",
|
|
],
|
|
302: [
|
|
# These 302 because they redirect to the spectator experience.
|
|
"/",
|
|
"/en/",
|
|
"/ru/",
|
|
],
|
|
400: [
|
|
"/json/messages",
|
|
],
|
|
401: [
|
|
f"/json/streams/{denmark_stream_id}/members",
|
|
"/api/v1/users/me/subscriptions",
|
|
"/api/v1/messages",
|
|
"/api/v1/streams",
|
|
],
|
|
404: ["/help/nonexistent", "/help/include/admin", "/help/" + "z" * 1000],
|
|
}
|
|
|
|
# Add all files in 'templates/zerver/help' directory (except for 'main.html' and
|
|
# 'index.md') to `get_urls['200']` list.
|
|
for doc in os.listdir("./templates/zerver/help"):
|
|
if doc.startswith(".") or "~" in doc or "#" in doc:
|
|
continue # nocoverage -- just here for convenience
|
|
if doc not in {"main.html", "index.md", "include", "missing.md"}:
|
|
get_urls[200].append("/help/" + os.path.splitext(doc)[0]) # Strip the extension.
|
|
|
|
post_urls = {
|
|
200: ["/accounts/login/"],
|
|
302: ["/accounts/logout/"],
|
|
401: [
|
|
"/json/messages",
|
|
"/json/invites",
|
|
"/json/subscriptions/exists",
|
|
"/api/v1/users/me/subscriptions/properties",
|
|
"/json/fetch_api_key",
|
|
"/json/users/me/subscriptions",
|
|
"/api/v1/users/me/subscriptions",
|
|
"/json/export/realm",
|
|
],
|
|
400: [
|
|
"/api/v1/external/github",
|
|
"/api/v1/fetch_api_key",
|
|
],
|
|
}
|
|
patch_urls = {
|
|
401: ["/json/settings"],
|
|
}
|
|
|
|
for status_code, url_set in get_urls.items():
|
|
self.fetch("client_get", url_set, status_code)
|
|
for status_code, url_set in post_urls.items():
|
|
self.fetch("client_post", url_set, status_code)
|
|
for status_code, url_set in patch_urls.items():
|
|
self.fetch("client_patch", url_set, status_code)
|
|
|
|
def test_config_error_endpoints_dev_env(self) -> None:
|
|
"""
|
|
The content of these pages is tested separately.
|
|
Here we simply sanity-check that all the URLs load
|
|
correctly.
|
|
"""
|
|
auth_types = [auth.lower() for auth in Realm.AUTHENTICATION_FLAGS]
|
|
for auth in [
|
|
"azuread",
|
|
"email",
|
|
"remoteuser",
|
|
# The endpoint is generated dynamically based on the configuration of the OIDC backend,
|
|
# so it can't be tested here.
|
|
"openid connect",
|
|
]: # We do not have configerror pages for AzureAD and Email.
|
|
auth_types.remove(auth)
|
|
|
|
auth_types += [
|
|
"smtp",
|
|
"remoteuser/remote_user_backend_disabled",
|
|
"remoteuser/remote_user_header_missing",
|
|
]
|
|
urls = [f"/config-error/{auth_type}" for auth_type in auth_types]
|
|
with self.settings(DEVELOPMENT=True):
|
|
for url in urls:
|
|
response = self.client_get(url)
|
|
self.assert_in_success_response(["Configuration error"], response)
|
|
|
|
|
|
class URLResolutionTest(ZulipTestCase):
|
|
def get_callback_string(self, pattern: django.urls.resolvers.URLPattern) -> Optional[str]:
|
|
callback_str = hasattr(pattern, "lookup_str") and "lookup_str"
|
|
callback_str = callback_str or "_callback_str"
|
|
return getattr(pattern, callback_str, None)
|
|
|
|
def check_function_exists(self, module_name: str, view: str) -> None:
|
|
module = importlib.import_module(module_name)
|
|
self.assertTrue(hasattr(module, view), f"View {module_name}.{view} does not exist")
|
|
|
|
# Tests function-based views declared in urls.urlpatterns for
|
|
# whether the function exists. We at present do not test the
|
|
# class-based views.
|
|
def test_non_api_url_resolution(self) -> None:
|
|
for pattern in urls.urlpatterns:
|
|
callback_str = self.get_callback_string(pattern)
|
|
if callback_str:
|
|
(module_name, base_view) = callback_str.rsplit(".", 1)
|
|
self.check_function_exists(module_name, base_view)
|
|
|
|
|
|
class ErrorPageTest(ZulipTestCase):
|
|
def test_bogus_http_host(self) -> None:
|
|
# This tests that we've successfully worked around a certain bug in
|
|
# Django's exception handling. The enforce_csrf_checks=True,
|
|
# secure=True, and HTTP_REFERER with an `https:` scheme are all
|
|
# there to get us down just the right path for Django to blow up
|
|
# when presented with an HTTP_HOST that's not a valid DNS name.
|
|
client = Client(enforce_csrf_checks=True)
|
|
result = client.post(
|
|
"/json/users", secure=True, HTTP_REFERER="https://somewhere", HTTP_HOST="$nonsense"
|
|
)
|
|
self.assertEqual(result.status_code, 400)
|