# Copyright (C) CVAT.ai Corporation # # SPDX-License-Identifier: MIT import json from contextlib import contextmanager from http import HTTPStatus from typing import Generator, Optional from unittest import mock import pytest from cvat_sdk.api_client import ApiClient, Configuration, models from shared.utils.config import BASE_URL, USER_PASS, make_api_client @pytest.mark.usefixtures("restore_db_per_class") class TestBasicAuth: def test_can_use_basic_auth(self, admin_user: str): username = admin_user config = Configuration(host=BASE_URL, username=username, password=USER_PASS) with ApiClient(config) as client: (user, response) = client.users_api.retrieve_self() assert response.status == HTTPStatus.OK assert user.username == username @pytest.mark.usefixtures("restore_db_per_function") class TestTokenAuth: @staticmethod def login(api_client: ApiClient, username: str) -> models.Token: (auth, _) = api_client.auth_api.create_login( models.LoginSerializerExRequest(username=username, password=USER_PASS) ) # Remove automatically managed cookies api_client.cookies.pop("sessionid") api_client.cookies.pop("csrftoken") # Set up the token authentication api_client.set_default_header("Authorization", "Token " + auth.key) return auth @classmethod @contextmanager def make_client(cls, username: Optional[str] = None) -> Generator[ApiClient, None, None]: with ApiClient(Configuration(host=BASE_URL)) as api_client: if username: cls.login(api_client, username) yield api_client def _test_can_auth(self, api_client: ApiClient, *, username: str, auth_key: str): from cvat_sdk.api_client.rest import RESTClientObject original_request = RESTClientObject.request def patched_request(*args, **kwargs): assert "sessionid" not in kwargs["headers"].get("Cookie", "") assert "X-CSRFToken" not in kwargs["headers"] assert kwargs["headers"]["Authorization"] == "Token " + auth_key return original_request(api_client.rest_client, *args, **kwargs) with mock.patch.object( api_client.rest_client, "request", side_effect=patched_request ) as mock_request: (user, response) = api_client.users_api.retrieve_self() mock_request.assert_called_once() assert response.status == HTTPStatus.OK assert user.username == username def test_can_use_token_auth(self, admin_user: str): username = admin_user with self.make_client() as api_client: auth = self.login(api_client, username=username) assert auth.key self._test_can_auth(api_client, username=username, auth_key=auth.key) def test_can_use_token_auth_from_config(self, admin_user: str): username = admin_user with self.make_client() as api_client: auth = self.login(api_client, username=username) config = Configuration( host=BASE_URL, api_key={ "tokenAuth": auth.key, }, ) with ApiClient(config) as api_client: self._test_can_auth(api_client, username=username, auth_key=auth.key) def test_can_logout(self, admin_user: str): with self.make_client(admin_user) as api_client: (_, response) = api_client.auth_api.create_logout() assert response.status == HTTPStatus.OK (_, response) = api_client.users_api.retrieve_self( _parse_response=False, _check_status=False ) assert response.status == HTTPStatus.UNAUTHORIZED @pytest.mark.usefixtures("restore_db_per_function") class TestSessionAuth: @staticmethod def login(api_client: ApiClient, username: str) -> models.Token: (auth, _) = api_client.auth_api.create_login( models.LoginSerializerExRequest(username=username, password=USER_PASS) ) # Set up the session and CSRF authentication api_client.set_default_header("Origin", api_client.build_origin_header()) api_client.set_default_header("X-CSRFToken", api_client.cookies["csrftoken"].value) return auth @classmethod @contextmanager def make_client(cls, username: Optional[str] = None) -> Generator[ApiClient, None, None]: with ApiClient(Configuration(host=BASE_URL)) as api_client: if username: cls.login(api_client, username) yield api_client def _test_can_use_auth(self, api_client: ApiClient, *, username: str): from cvat_sdk.api_client.rest import RESTClientObject original_request = RESTClientObject.request def patched_request(*args, **kwargs): assert "sessionid" in kwargs["headers"].get("Cookie", "") assert "csrftoken" in kwargs["headers"].get("Cookie", "") assert "X-CSRFToken" in kwargs["headers"] assert "Origin" in kwargs["headers"] assert "Authorization" not in kwargs["headers"] return original_request(api_client.rest_client, *args, **kwargs) with mock.patch.object( api_client.rest_client, "request", side_effect=patched_request ) as mock_request: (user, response) = api_client.users_api.retrieve_self() mock_request.assert_called_once() assert response.status == HTTPStatus.OK assert user.username == username # Check CSRF authentication in an "unsafe" request api_client.users_api.partial_update( user.id, patched_user_request=models.PatchedUserRequest(first_name="Newname") ) def test_can_use_session_auth(self, admin_user: str): username = admin_user with self.make_client(username) as api_client: self._test_can_use_auth(api_client, username=username) def test_can_use_session_auth_from_config(self, admin_user: str): username = admin_user with self.make_client(username) as api_client: config = Configuration( host=BASE_URL, api_key={ "sessionAuth": api_client.cookies["sessionid"].value, "csrfAuth": api_client.cookies["csrftoken"].value, }, ) with ApiClient(config) as api_client: self._test_can_use_auth(api_client, username=username) def test_can_logout(self, admin_user: str): with self.make_client(admin_user) as api_client: (_, response) = api_client.auth_api.create_logout() assert response.status == HTTPStatus.OK (_, response) = api_client.users_api.retrieve_self( _parse_response=False, _check_status=False ) assert response.status == HTTPStatus.UNAUTHORIZED @pytest.mark.usefixtures("restore_db_per_function") class TestCredentialsManagement: def test_can_register(self): username = "newuser" email = "123@456.com" with ApiClient(Configuration(host=BASE_URL)) as api_client: (user, response) = api_client.auth_api.create_register( models.RegisterSerializerExRequest( username=username, password1=USER_PASS, password2=USER_PASS, email=email ) ) assert response.status == HTTPStatus.CREATED assert user.username == username with make_api_client(username) as api_client: (user, response) = api_client.users_api.retrieve_self() assert response.status == HTTPStatus.OK assert user.username == username assert user.email == email def test_can_change_password(self, admin_user: str): username = admin_user new_pass = "5w4knrqaW#$@gewa" with make_api_client(username) as api_client: (info, response) = api_client.auth_api.create_password_change( models.PasswordChangeRequest( old_password=USER_PASS, new_password1=new_pass, new_password2=new_pass ) ) assert response.status == HTTPStatus.OK assert info.detail == "New password has been saved." (_, response) = api_client.users_api.retrieve_self( _parse_response=False, _check_status=False ) assert response.status == HTTPStatus.UNAUTHORIZED api_client.configuration.password = new_pass (user, response) = api_client.users_api.retrieve_self() assert response.status == HTTPStatus.OK assert user.username == username def test_can_report_weak_password(self, admin_user: str): username = admin_user new_pass = "pass" with make_api_client(username) as api_client: (_, response) = api_client.auth_api.create_password_change( models.PasswordChangeRequest( old_password=USER_PASS, new_password1=new_pass, new_password2=new_pass ), _parse_response=False, _check_status=False, ) assert response.status == HTTPStatus.BAD_REQUEST assert json.loads(response.data) == { "new_password2": [ "This password is too short. It must contain at least 8 characters.", "This password is too common.", ] } def test_can_report_mismatching_passwords(self, admin_user: str): username = admin_user with make_api_client(username) as api_client: (_, response) = api_client.auth_api.create_password_change( models.PasswordChangeRequest( old_password=USER_PASS, new_password1="3j4tb13/T$#", new_password2="q#@$n34g5" ), _parse_response=False, _check_status=False, ) assert response.status == HTTPStatus.BAD_REQUEST assert json.loads(response.data) == { "new_password2": ["The two password fields didn’t match."] }