mirror of
https://github.com/GSA/notifications-admin.git
synced 2026-02-05 02:42:26 -05:00
Merge remote-tracking branch 'origin/master' into implement_send_sms_and_email
This commit is contained in:
@@ -8,6 +8,7 @@ from flask_login import LoginManager
|
||||
from flask_wtf import CsrfProtect
|
||||
from werkzeug.exceptions import abort
|
||||
from app.notify_client.api_client import NotificationsAdminAPIClient
|
||||
from app.notify_client.user_api_client import UserApiClient
|
||||
from app.its_dangerous_session import ItsdangerousSessionInterface
|
||||
import app.proxy_fix
|
||||
from config import configs
|
||||
@@ -18,6 +19,7 @@ login_manager = LoginManager()
|
||||
csrf = CsrfProtect()
|
||||
|
||||
notifications_api_client = NotificationsAdminAPIClient()
|
||||
user_api_client = UserApiClient()
|
||||
|
||||
|
||||
def create_app(config_name, config_overrides=None):
|
||||
@@ -31,6 +33,7 @@ def create_app(config_name, config_overrides=None):
|
||||
init_csrf(application)
|
||||
|
||||
notifications_api_client.init_app(application)
|
||||
user_api_client.init_app(application)
|
||||
|
||||
login_manager.init_app(application)
|
||||
login_manager.login_view = 'main.sign_in'
|
||||
|
||||
@@ -13,7 +13,7 @@ def add_code(user_id, code, code_type):
|
||||
|
||||
db.session.add(code)
|
||||
db.session.commit()
|
||||
return code.id
|
||||
return code
|
||||
|
||||
|
||||
def get_codes(user_id, code_type=None):
|
||||
@@ -23,7 +23,7 @@ def get_codes(user_id, code_type=None):
|
||||
|
||||
|
||||
def get_code_by_code(user_id, code, code_type):
|
||||
return VerifyCodes.query.filter_by(user_id=user_id, code=code, code_type=code_type).first()
|
||||
return VerifyCodes.query.filter_by(user_id=user_id, code=hashpw(code), code_type=code_type).first()
|
||||
|
||||
|
||||
def use_code(id):
|
||||
|
||||
@@ -15,7 +15,7 @@ from app.models import User
|
||||
from app.main.dao import users_dao
|
||||
from app.main.forms import RegisterUserForm
|
||||
|
||||
from app.notify_client.user_api_client import UserApiClient
|
||||
from app import user_api_client
|
||||
|
||||
# TODO how do we handle duplicate unverifed email addresses?
|
||||
# malicious or otherwise.
|
||||
@@ -28,23 +28,11 @@ def register():
|
||||
|
||||
if form.validate_on_submit():
|
||||
|
||||
# TODO remove once all api integrations done
|
||||
user = User(name=form.name.data,
|
||||
email_address=form.email_address.data,
|
||||
mobile_number=form.mobile_number.data,
|
||||
password=form.password.data,
|
||||
created_at=datetime.now(),
|
||||
role_id=1)
|
||||
users_dao.insert_user(user)
|
||||
|
||||
user_api_client = UserApiClient(current_app.config['API_HOST_NAME'],
|
||||
current_app.config['ADMIN_CLIENT_USER_NAME'],
|
||||
current_app.config['ADMIN_CLIENT_SECRET'])
|
||||
try:
|
||||
user_api_client.register_user(form.name.data,
|
||||
form.email_address.data,
|
||||
form.mobile_number.data,
|
||||
form.password.data)
|
||||
user = user_api_client.register_user(form.name.data,
|
||||
form.email_address.data,
|
||||
form.mobile_number.data,
|
||||
form.password.data)
|
||||
except HTTPError as e:
|
||||
if e.status_code == 404:
|
||||
abort(404)
|
||||
@@ -56,10 +44,10 @@ def register():
|
||||
# How do we report to the user there is a problem with
|
||||
# sending codes apart from service unavailable?
|
||||
# at the moment i believe http 500 is fine.
|
||||
send_sms_code(user_id=user.id, mobile_number=form.mobile_number.data)
|
||||
send_email_code(user_id=user.id, email=form.email_address.data)
|
||||
send_sms_code(user_id=user.id, mobile_number=user.mobile_number)
|
||||
send_email_code(user_id=user.id, email=user.email_address)
|
||||
session['expiry_date'] = str(datetime.now() + timedelta(hours=1))
|
||||
session['user_email'] = user.email_address
|
||||
session['user_details'] = {"email": user.email_address, "id": user.id}
|
||||
return redirect('/verify')
|
||||
|
||||
return render_template('views/register.html', form=form)
|
||||
|
||||
@@ -1,5 +1,10 @@
|
||||
from flask import (
|
||||
render_template, redirect, jsonify, session, url_for)
|
||||
render_template,
|
||||
redirect,
|
||||
jsonify,
|
||||
session,
|
||||
url_for
|
||||
)
|
||||
|
||||
from flask_login import login_user
|
||||
|
||||
@@ -12,13 +17,16 @@ from app.main.forms import VerifyForm
|
||||
def verify():
|
||||
# TODO there needs to be a way to regenerate a session id
|
||||
# or handle gracefully.
|
||||
user = users_dao.get_user_by_email(session['user_email'])
|
||||
codes = verify_codes_dao.get_codes(user.id)
|
||||
user_id = session['user_details']['id']
|
||||
codes = verify_codes_dao.get_codes(user_id)
|
||||
form = VerifyForm(codes)
|
||||
if form.validate_on_submit():
|
||||
verify_codes_dao.use_code_for_user_and_type(user_id=user.id, code_type='email')
|
||||
verify_codes_dao.use_code_for_user_and_type(user_id=user.id, code_type='sms')
|
||||
users_dao.activate_user(user.id)
|
||||
login_user(user)
|
||||
verify_codes_dao.use_code_for_user_and_type(user_id=user_id, code_type='email')
|
||||
verify_codes_dao.use_code_for_user_and_type(user_id=user_id, code_type='sms')
|
||||
|
||||
# TODO complete verify and login flow
|
||||
# users_dao.activate_user(user.id)
|
||||
# login_user(user)
|
||||
|
||||
return redirect(url_for('.add_service', first='first'))
|
||||
return render_template('views/verify.html', form=form)
|
||||
|
||||
@@ -12,7 +12,7 @@ class VerifyCodes(db.Model):
|
||||
code_types = ['email', 'sms']
|
||||
|
||||
id = db.Column(db.Integer, primary_key=True)
|
||||
user_id = db.Column(db.Integer, db.ForeignKey('users.id'), index=True, unique=False, nullable=False)
|
||||
user_id = db.Column(db.Integer, index=True, unique=False, nullable=False)
|
||||
code = db.Column(db.String, nullable=False)
|
||||
code_type = db.Column(db.Enum(code_types, name='verify_code_types'), index=False, unique=False, nullable=False)
|
||||
expiry_datetime = db.Column(db.DateTime, nullable=False)
|
||||
|
||||
@@ -3,16 +3,72 @@ from client.notifications import BaseAPIClient
|
||||
|
||||
class UserApiClient(BaseAPIClient):
|
||||
|
||||
def __init__(self, base_url, client_id, secret):
|
||||
super(self.__class__, self).__init__(base_url=base_url,
|
||||
client_id=client_id,
|
||||
secret=secret)
|
||||
def __init__(self, base_url=None, client_id=None, secret=None):
|
||||
super(self.__class__, self).__init__(base_url=base_url or 'base_url',
|
||||
client_id=client_id or 'client_id',
|
||||
secret=secret or 'secret')
|
||||
|
||||
def init_app(self, app):
|
||||
self.base_url = app.config['API_HOST_NAME']
|
||||
self.client_id = app.config['ADMIN_CLIENT_USER_NAME']
|
||||
self.secret = app.config['ADMIN_CLIENT_SECRET']
|
||||
self.user_max_failed_login_count = app.config["MAX_FAILED_LOGIN_COUNT"]
|
||||
|
||||
def register_user(self, name, email_address, mobile_number, password):
|
||||
data = {
|
||||
"name": name,
|
||||
"email_address": email_address,
|
||||
"mobile_number": mobile_number,
|
||||
"password": password}
|
||||
"password": password
|
||||
}
|
||||
user_data = self.post("/user", data)
|
||||
return User(user_data, max_failed_login_count=self.user_max_failed_login_count)
|
||||
|
||||
return self.post("/user", data)
|
||||
|
||||
class User(object):
|
||||
|
||||
def __init__(self, fields, max_failed_login_count=3):
|
||||
self.fields = fields
|
||||
self.max_failed_login_count = max_failed_login_count
|
||||
|
||||
@property
|
||||
def id(self):
|
||||
return self.fields.get('id')
|
||||
|
||||
@property
|
||||
def name(self):
|
||||
return self.fields.get('name')
|
||||
|
||||
@property
|
||||
def email_address(self):
|
||||
return self.fields.get('email_address')
|
||||
|
||||
@property
|
||||
def mobile_number(self):
|
||||
return self.fields.get('mobile_number')
|
||||
|
||||
@property
|
||||
def password_changed_at(self):
|
||||
return self.fields.get('password_changed_at')
|
||||
|
||||
@property
|
||||
def is_authenticated(self):
|
||||
return self.fields.get('is_authenticated')
|
||||
|
||||
@property
|
||||
def is_active(self):
|
||||
if self.fields.get('state') != 'active':
|
||||
return False
|
||||
else:
|
||||
return True
|
||||
|
||||
@property
|
||||
def is_anonymous(self):
|
||||
return False
|
||||
|
||||
@property
|
||||
def is_locked(self):
|
||||
if self.fields.get('failed_login_count') < self.max_failed_login_count:
|
||||
return False
|
||||
else:
|
||||
return True
|
||||
|
||||
26
migrations/versions/90_remove_user_fk_verify_codes.py
Normal file
26
migrations/versions/90_remove_user_fk_verify_codes.py
Normal file
@@ -0,0 +1,26 @@
|
||||
"""empty message
|
||||
|
||||
Revision ID: 90_remove_user_fk_verify_codes
|
||||
Revises: 80_remove_services
|
||||
Create Date: 2016-01-19 20:57:41.986177
|
||||
|
||||
"""
|
||||
|
||||
# revision identifiers, used by Alembic.
|
||||
revision = '90_remove_user_fk_verify_codes'
|
||||
down_revision = '80_remove_services'
|
||||
|
||||
from alembic import op
|
||||
import sqlalchemy as sa
|
||||
|
||||
|
||||
def upgrade():
|
||||
### commands auto generated by Alembic - please adjust! ###
|
||||
op.drop_constraint('verify_codes_user_id_fkey', 'verify_codes', type_='foreignkey')
|
||||
### end Alembic commands ###
|
||||
|
||||
|
||||
def downgrade():
|
||||
### commands auto generated by Alembic - please adjust! ###
|
||||
op.create_foreign_key('verify_codes_user_id_fkey', 'verify_codes', 'users', ['user_id'], ['id'])
|
||||
### end Alembic commands ###
|
||||
@@ -53,6 +53,19 @@ def create_test_user(state):
|
||||
return user
|
||||
|
||||
|
||||
def create_test_api_user(state):
|
||||
from app.notify_client.user_api_client import User
|
||||
user_data = {'id': 1,
|
||||
'name': 'Test User',
|
||||
'password': 'somepassword',
|
||||
'email_address': TEST_USER_EMAIL,
|
||||
'mobile_number': '+441234123412',
|
||||
'state': state
|
||||
}
|
||||
user = User(user_data)
|
||||
return user
|
||||
|
||||
|
||||
def create_another_test_user(state):
|
||||
user = User(name='Another Test User',
|
||||
password='someOtherpassword',
|
||||
|
||||
@@ -3,17 +3,15 @@ from pytest import fail
|
||||
|
||||
from app.main.dao import verify_codes_dao
|
||||
from app.main.encryption import check_hash
|
||||
from tests import create_test_user, create_another_test_user
|
||||
|
||||
|
||||
def test_insert_new_code_and_get_it_back(app_, db_, db_session):
|
||||
user = create_test_user('pending')
|
||||
|
||||
verify_codes_dao.add_code(user_id=user.id, code='12345', code_type='email')
|
||||
saved_codes = verify_codes_dao.get_codes(user_id=user.id, code_type='email')
|
||||
verify_codes_dao.add_code(user_id=1, code='12345', code_type='email')
|
||||
saved_codes = verify_codes_dao.get_codes(user_id=1, code_type='email')
|
||||
assert len(saved_codes) == 1
|
||||
saved_code = saved_codes[0]
|
||||
assert saved_code.user_id == user.id
|
||||
assert saved_code.user_id == 1
|
||||
assert check_hash('12345', saved_code.code)
|
||||
assert saved_code.code_type == 'email'
|
||||
assert saved_code.code_used is False
|
||||
@@ -22,65 +20,18 @@ def test_insert_new_code_and_get_it_back(app_, db_, db_session):
|
||||
def test_insert_new_code_should_thrw_exception_when_type_does_not_exist(app_,
|
||||
db_,
|
||||
db_session):
|
||||
user = create_test_user('pending')
|
||||
try:
|
||||
verify_codes_dao.add_code(user_id=user.id, code='23545', code_type='not_real')
|
||||
verify_codes_dao.add_code(user_id=1, code='23545', code_type='not_real')
|
||||
fail('Should have thrown an exception')
|
||||
except sqlalchemy.exc.DataError as e:
|
||||
assert 'invalid input value for enum verify_code_types: "not_real"' in e.orig.pgerror
|
||||
|
||||
|
||||
def test_should_throw_exception_when_user_does_not_exist(app_,
|
||||
db_,
|
||||
db_session):
|
||||
try:
|
||||
verify_codes_dao.add_code(user_id=1, code='12345', code_type='email')
|
||||
fail('Should throw exception')
|
||||
except sqlalchemy.exc.IntegrityError as e:
|
||||
assert 'ERROR: insert or update on table "verify_codes" violates ' \
|
||||
'foreign key constraint "verify_codes_user_id_fkey"' in e.orig.pgerror
|
||||
|
||||
|
||||
def test_should_return_none_if_code_is_used(app_,
|
||||
db_,
|
||||
db_session):
|
||||
user = create_test_user('pending')
|
||||
|
||||
verify_codes_dao.add_code(user_id=user.id, code='12345', code_type='email')
|
||||
verify_codes_dao.use_code(user_id=user.id, code='12345', code_type='email')
|
||||
saved_code = verify_codes_dao.get_code_by_code(user_id=user.id, code_type='email', code='12345')
|
||||
assert saved_code.code_used is True
|
||||
|
||||
|
||||
def test_should_return_none_if_code_is_used(app_,
|
||||
db_,
|
||||
db_session):
|
||||
user = create_test_user('pending')
|
||||
|
||||
verify_codes_dao.add_code(user_id=user.id, code='12345', code_type='sms')
|
||||
code = verify_codes_dao.get_codes(user_id=user.id, code_type='sms')
|
||||
verify_codes_dao.use_code(code[0].id)
|
||||
used_code = verify_codes_dao.get_codes(user_id=user.id, code_type='sms')
|
||||
assert used_code == []
|
||||
|
||||
|
||||
def test_should_return_all_unused_code_when_there_are_many(app_,
|
||||
db_,
|
||||
db_session):
|
||||
user = create_test_user('pending')
|
||||
another_user = create_another_test_user('active')
|
||||
verify_codes_dao.add_code(user_id=user.id, code='12345', code_type='sms')
|
||||
id = verify_codes_dao.add_code(user_id=user.id, code='09876', code_type='email')
|
||||
verify_codes_dao.use_code(id)
|
||||
verify_codes_dao.add_code(user_id=user.id, code='12345', code_type='email')
|
||||
verify_codes_dao.add_code(user_id=user.id, code='23456', code_type='email')
|
||||
verify_codes_dao.add_code(user_id=another_user.id, code='12345', code_type='sms')
|
||||
verify_codes_dao.add_code(user_id=another_user.id, code='12345', code_type='email')
|
||||
|
||||
user_codes = verify_codes_dao.get_codes(user_id=user.id, code_type='email')
|
||||
assert len(user_codes) == 2
|
||||
s = sorted(user_codes, key=lambda r: r.expiry_datetime)
|
||||
assert check_hash('12345', s[0].code)
|
||||
assert check_hash('23456', s[1].code)
|
||||
assert [(code.code_used, code.code_type, code.user_id) for code in user_codes] == \
|
||||
[(False, 'email', user.id), (False, 'email', user.id)]
|
||||
code = verify_codes_dao.add_code(user_id=1, code='12345', code_type='email')
|
||||
verify_codes_dao.use_code(code.id)
|
||||
saved_code = verify_codes_dao.get_code_by_code(user_id=1, code_type='email', code='12345')
|
||||
assert not saved_code
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
from flask import url_for
|
||||
|
||||
from tests.conftest import mock_register_user
|
||||
from tests.conftest import mock_register_user as mock_user
|
||||
|
||||
|
||||
def test_render_register_returns_template_with_form(app_, db_, db_session):
|
||||
@@ -16,7 +16,6 @@ def test_process_register_creates_new_user(app_,
|
||||
mock_send_sms,
|
||||
mock_send_email,
|
||||
mocker):
|
||||
|
||||
user_data = {
|
||||
'name': 'Some One Valid',
|
||||
'email_address': 'someone@example.gov.uk',
|
||||
@@ -24,7 +23,7 @@ def test_process_register_creates_new_user(app_,
|
||||
'password': 'validPassword!'
|
||||
}
|
||||
|
||||
mock_register_user(mocker, user_data)
|
||||
mock_user(mocker, user_data)
|
||||
|
||||
with app_.test_request_context():
|
||||
response = app_.test_client().post('/register',
|
||||
@@ -76,7 +75,7 @@ def test_should_add_verify_codes_on_session(app_,
|
||||
'password': 'validPassword!'
|
||||
}
|
||||
|
||||
mock_register_user(mocker, user_data)
|
||||
mock_user(mocker, user_data)
|
||||
with app_.test_client() as client:
|
||||
response = client.post('/register',
|
||||
data=user_data)
|
||||
|
||||
@@ -1,6 +1,8 @@
|
||||
from flask import json, url_for
|
||||
from app.main.dao import users_dao, verify_codes_dao
|
||||
from tests import create_test_user
|
||||
from tests import create_test_api_user
|
||||
|
||||
import pytest
|
||||
|
||||
|
||||
def test_should_return_verify_template(app_, db_, db_session):
|
||||
@@ -9,8 +11,8 @@ def test_should_return_verify_template(app_, db_, db_session):
|
||||
# TODO this lives here until we work out how to
|
||||
# reassign the session after it is lost mid register process
|
||||
with client.session_transaction() as session:
|
||||
user = create_test_user('pending')
|
||||
session['user_email'] = user.email_address
|
||||
user = create_test_api_user('pending')
|
||||
session['user_details'] = {'email_address': user.email_address, 'id': user.id}
|
||||
response = client.get(url_for('main.verify'))
|
||||
assert response.status_code == 200
|
||||
assert (
|
||||
@@ -24,8 +26,8 @@ def test_should_redirect_to_add_service_when_code_are_correct(app_,
|
||||
with app_.test_request_context():
|
||||
with app_.test_client() as client:
|
||||
with client.session_transaction() as session:
|
||||
user = create_test_user('pending')
|
||||
session['user_email'] = user.email_address
|
||||
user = create_test_api_user('pending')
|
||||
session['user_details'] = {'email_address': user.email_address, 'id': user.id}
|
||||
verify_codes_dao.add_code(user_id=user.id, code='12345', code_type='sms')
|
||||
verify_codes_dao.add_code(user_id=user.id, code='23456', code_type='email')
|
||||
response = client.post(url_for('main.verify'),
|
||||
@@ -35,12 +37,13 @@ def test_should_redirect_to_add_service_when_code_are_correct(app_,
|
||||
assert response.location == url_for('main.add_service', first='first', _external=True)
|
||||
|
||||
|
||||
@pytest.mark.xfail(reason='Activation refactor to use api not completed')
|
||||
def test_should_activate_user_after_verify(app_, db_, db_session):
|
||||
with app_.test_request_context():
|
||||
with app_.test_client() as client:
|
||||
with client.session_transaction() as session:
|
||||
user = create_test_user('pending')
|
||||
session['user_email'] = user.email_address
|
||||
user = create_test_api_user('pending')
|
||||
session['user_details'] = {'email_address': user.email_address, 'id': user.id}
|
||||
verify_codes_dao.add_code(user_id=user.id, code='12345', code_type='sms')
|
||||
verify_codes_dao.add_code(user_id=user.id, code='23456', code_type='email')
|
||||
client.post(url_for('main.verify'),
|
||||
@@ -55,8 +58,8 @@ def test_should_return_200_when_codes_are_wrong(app_, db_, db_session):
|
||||
with app_.test_request_context():
|
||||
with app_.test_client() as client:
|
||||
with client.session_transaction() as session:
|
||||
user = create_test_user('pending')
|
||||
session['user_email'] = user.email_address
|
||||
user = create_test_api_user('pending')
|
||||
session['user_details'] = {'email_address': user.email_address, 'id': user.id}
|
||||
verify_codes_dao.add_code(user_id=user.id, code='23345', code_type='sms')
|
||||
verify_codes_dao.add_code(user_id=user.id, code='98456', code_type='email')
|
||||
response = client.post(url_for('main.verify'),
|
||||
@@ -68,14 +71,15 @@ def test_should_return_200_when_codes_are_wrong(app_, db_, db_session):
|
||||
assert resp_data.count('Code does not match') == 2
|
||||
|
||||
|
||||
@pytest.mark.xfail(reason='Activation refactor to use api not completed')
|
||||
def test_should_mark_all_codes_as_used_when_many_codes_exist(app_,
|
||||
db_,
|
||||
db_session):
|
||||
with app_.test_request_context():
|
||||
with app_.test_client() as client:
|
||||
with client.session_transaction() as session:
|
||||
user = create_test_user('pending')
|
||||
session['user_email'] = user.email_address
|
||||
user = create_test_api_user('pending')
|
||||
session['user_details'] = {'email_address': user.email_address, 'id': user.id}
|
||||
code1 = verify_codes_dao.add_code(user_id=user.id, code='23345', code_type='sms')
|
||||
code2 = verify_codes_dao.add_code(user_id=user.id, code='98456', code_type='email')
|
||||
code3 = verify_codes_dao.add_code(user_id=user.id, code='12345', code_type='sms')
|
||||
|
||||
@@ -204,13 +204,9 @@ def mock_delete_service_template(mocker):
|
||||
|
||||
|
||||
def mock_register_user(mocker, user_data):
|
||||
data = {
|
||||
"email_address": user_data['email_address'],
|
||||
"failed_login_count": 0,
|
||||
"mobile_number": user_data['mobile_number'],
|
||||
"name": user_data['name'],
|
||||
"state": "pending"
|
||||
}
|
||||
mock_class = mocker.patch('app.main.views.register.UserApiClient')
|
||||
mock_class.register_user.return_value = data
|
||||
user_data['id'] = 1
|
||||
from app.notify_client.user_api_client import User
|
||||
user = User(user_data)
|
||||
mock_class = mocker.patch('app.user_api_client.register_user')
|
||||
mock_class.return_value = user
|
||||
return mock_class
|
||||
|
||||
Reference in New Issue
Block a user