|
|
- from django.contrib.auth.hashers import make_password
- from hc.accounts.models import Credential
- from hc.test import BaseTestCase
-
-
- class CheckTokenTestCase(BaseTestCase):
- def setUp(self):
- super().setUp()
- self.profile.token = make_password("secret-token", "login")
- self.profile.save()
-
- self.checks_url = "/projects/%s/checks/" % self.project.code
-
- def test_it_shows_form(self):
- r = self.client.get("/accounts/check_token/alice/secret-token/")
- self.assertContains(r, "You are about to log in")
-
- def test_it_redirects(self):
- r = self.client.post("/accounts/check_token/alice/secret-token/")
-
- self.assertRedirects(r, self.checks_url)
-
- # After login, token should be blank
- self.profile.refresh_from_db()
- self.assertEqual(self.profile.token, "")
-
- def test_it_redirects_already_logged_in(self):
- # Login
- self.client.login(username="[email protected]", password="password")
-
- # Login again, when already authenticated
- r = self.client.post("/accounts/check_token/alice/secret-token/")
-
- self.assertRedirects(r, self.checks_url)
-
- def test_it_redirects_bad_login(self):
- # Login with a bad token
- url = "/accounts/check_token/alice/invalid-token/"
- r = self.client.post(url, follow=True)
- self.assertRedirects(r, "/accounts/login/")
- self.assertContains(r, "incorrect or expired")
-
- def test_it_handles_next_parameter(self):
- url = "/accounts/check_token/alice/secret-token/?next=" + self.channels_url
- r = self.client.post(url)
- self.assertRedirects(r, self.channels_url)
-
- def test_it_ignores_bad_next_parameter(self):
- url = "/accounts/check_token/alice/secret-token/?next=/evil/"
- r = self.client.post(url)
- self.assertRedirects(r, self.checks_url)
-
- def test_it_redirects_to_webauthn_form(self):
- Credential.objects.create(user=self.alice, name="Alices Key")
-
- r = self.client.post("/accounts/check_token/alice/secret-token/")
- self.assertRedirects(
- r, "/accounts/login/two_factor/", fetch_redirect_response=False
- )
-
- # It should not log the user in yet
- self.assertNotIn("_auth_user_id", self.client.session)
-
- # Instead, it should set 2fa_user_id in the session
- user_id, email, valid_until = self.client.session["2fa_user"]
- self.assertEqual(user_id, self.alice.id)
|